2021-12-01 23:27:26 +02:00
|
|
|
{ pkgs, lib, config, tools, ... }:
|
|
|
|
let
|
|
|
|
inherit (tools.meta) domain;
|
|
|
|
in
|
|
|
|
{
|
|
|
|
age.secrets = {
|
|
|
|
hydraS3 = {
|
|
|
|
file = ../../../../secrets/hydra-s3.age;
|
|
|
|
group = "hydra";
|
|
|
|
mode = "0440";
|
|
|
|
};
|
|
|
|
hydra-bincache-key = {
|
|
|
|
file = ../../../../secrets/hydra-bincache.age;
|
|
|
|
group = "hydra";
|
|
|
|
mode = "0440";
|
|
|
|
};
|
|
|
|
hydra-builder-key = {
|
|
|
|
file = ../../../../secrets/hydra-builder-key.age;
|
|
|
|
group = "hydra";
|
|
|
|
mode = "0440";
|
|
|
|
};
|
|
|
|
} // lib.mapAttrs' (k: v: lib.nameValuePair "hydra-database-credentials-for-${k}" v)
|
|
|
|
(lib.genAttrs [ "hydra-queue-runner" "hydra-www" "hydra" ]
|
|
|
|
(x:
|
|
|
|
{
|
|
|
|
file = ../../../../secrets/hydra-db-credentials.age;
|
|
|
|
group = "hydra";
|
|
|
|
owner = x;
|
|
|
|
mode = "0400";
|
|
|
|
}
|
|
|
|
)
|
|
|
|
);
|
|
|
|
|
|
|
|
reservePortsFor = [ "hydra" ];
|
|
|
|
|
2021-12-04 00:54:06 +02:00
|
|
|
services.nginx.appendHttpConfig = ''
|
|
|
|
limit_req_zone $binary_remote_addr zone=hydra_api_push_limiter:10m rate=1r/m;
|
|
|
|
'';
|
|
|
|
|
|
|
|
services.nginx.virtualHosts."hydra.${domain}" = lib.recursiveUpdate (tools.nginx.vhosts.proxy "http://127.0.0.1:${config.portsStr.hydra}") {
|
|
|
|
locations."/api/push" = {
|
|
|
|
proxyPass = "http://127.0.0.1:${config.portsStr.hydra}";
|
|
|
|
extraConfig = ''
|
|
|
|
auth_request off;
|
|
|
|
proxy_method PUT;
|
|
|
|
limit_req zone=hydra_api_push_limiter burst=3 nodelay;
|
|
|
|
limit_req_status 429;
|
|
|
|
'';
|
|
|
|
};
|
|
|
|
};
|
2021-12-01 23:27:26 +02:00
|
|
|
|
|
|
|
services.oauth2_proxy.nginx.virtualHosts = [ "hydra.${domain}" ];
|
|
|
|
|
|
|
|
services.hydra = {
|
|
|
|
enable = true;
|
|
|
|
hydraURL = "https://hydra.${domain}";
|
|
|
|
port = config.ports.hydra;
|
|
|
|
notificationSender = "hydra@${domain}";
|
|
|
|
buildMachinesFiles = [ "/etc/nix/hydra-machines" ];
|
|
|
|
useSubstitutes = true;
|
|
|
|
extraConfig = ''
|
|
|
|
store_uri = s3://nix-store?scheme=https&endpoint=object-storage.${domain}&secret-key=${config.age.secrets.hydra-bincache-key.path}
|
|
|
|
server_store_uri = https://cache.${domain}
|
|
|
|
'';
|
|
|
|
extraEnv = {
|
|
|
|
AWS_SHARED_CREDENTIALS_FILE = config.age.secrets.hydraS3.path;
|
|
|
|
PGPASSFILE = config.age.secrets."hydra-database-credentials-for-hydra".path;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
# override weird hydra module stuff
|
|
|
|
|
|
|
|
systemd.services = {
|
|
|
|
hydra-send-stats = lib.mkForce {};
|
|
|
|
} // lib.genAttrs [ "hydra-notify" "hydra-queue-runner" "hydra-server" ]
|
|
|
|
(x: let
|
|
|
|
name = if x == "hydra-server" then "hydra-www" else
|
|
|
|
if x == "hydra-notify" then "hydra-queue-runner" else x;
|
|
|
|
in {
|
|
|
|
environment = {
|
|
|
|
PGPASSFILE = lib.mkForce config.age.secrets."hydra-database-credentials-for-${name}".path;
|
|
|
|
};
|
|
|
|
}
|
|
|
|
);
|
|
|
|
|
|
|
|
nix.extraOptions = lib.mkForce ''
|
|
|
|
allowed-uris = https://git.${domain}
|
|
|
|
keep-outputs = true
|
|
|
|
keep-derivations = true
|
|
|
|
'';
|
|
|
|
|
|
|
|
programs.ssh.knownHosts.git = {
|
|
|
|
hostNames = [ "git.${domain}" ];
|
2022-02-01 22:18:08 +02:00
|
|
|
publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAICz2nGA+Y4OxhMKsV6vKIns3hOoBkK557712h7FfWXcE";
|
2021-12-01 23:27:26 +02:00
|
|
|
};
|
|
|
|
}
|