meta: remove unused hosts

This commit is contained in:
Max Headroom 2022-01-06 20:35:49 +01:00
parent 74254d650b
commit 77c1a0e407
8 changed files with 0 additions and 159 deletions

View file

@ -47,34 +47,10 @@
in {
nixosModules = aspect.modules;
nixosConfigurations = lib.genAttrs [
"styx"
"meet"
"git"
"VEGAS"
] mkNixOS;
deploy.nodes = with deploy-rs-lib; {
styx = {
hostname = "styx.services.privatevoid.net";
profiles.system = {
user = "root";
path = activate.nixos self.nixosConfigurations.styx;
};
};
meet = {
hostname = "meet.services.privatevoid.net";
profiles.system = {
user = "root";
path = activate.nixos self.nixosConfigurations.meet;
};
};
git = {
hostname = "git.services.privatevoid.net";
profiles.system = {
user = "root";
path = activate.nixos self.nixosConfigurations.git;
};
};
VEGAS = {
hostname = "vegas.backbone.privatevoid.net";
profiles.system = {

View file

@ -3,9 +3,6 @@ let
in with tools.dns; {
# NixOS machines
styx = import ./styx tools;
meet = import ./meet tools;
git = import ./git tools;
VEGAS = import ./VEGAS tools;
# Non-NixOS machine metadata

View file

@ -1,7 +0,0 @@
tools: {
ssh.id = with tools.dns; {
publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIC0rChVEO9Qt7hr7vyiyOP7N45CjaxssFCZNOPCszEQi";
hostNames = subResolve "git" "services";
};
nixos = import ./system.nix;
}

View file

@ -1,55 +0,0 @@
{ config, pkgs, lib, modulesPath, aspect, inputs, ... }:
{
imports = [
(modulesPath + "/virtualisation/lxc-container.nix")
inputs.agenix.nixosModules.age
]
++ (import ../../users "server").groups.admin
++ aspect.sets.server
++ (with aspect.modules; [ ]);
age.secrets = {
giteaDBPassword = {
file = ../../secrets/gitea-db-credentials.age;
owner = "git";
group = "gitea";
mode = "0400";
};
};
networking.hostName = "git";
networking.firewall.enable = false;
nix.trustedUsers = [ "root" "@wheel" ];
security.sudo.wheelNeedsPassword = false;
services.gitea = {
enable = true;
appName = "Private Void Gitea";
domain = "git";
rootUrl = "https://git.privatevoid.net";
disableRegistration = true;
ssh.enable = true;
user = "git";
log.level = "Warn";
database = {
createDatabase = false;
type = "postgres";
host = "10.1.0.1";
port = 5432;
name = "gitea";
user = "gitea";
passwordFile = config.age.secrets.giteaDBPassword.path;
};
};
users.users.git = {
description = "Git Service";
home = config.services.gitea.stateDir;
useDefaultShell = true;
group = "gitea";
isSystemUser = true;
};
}

View file

@ -1,7 +0,0 @@
tools: {
ssh.id = with tools.dns; {
publicKey = "ssh-invalid";
hostNames = subResolve "meet" "services";
};
nixos = import ./system.nix;
}

View file

@ -1,39 +0,0 @@
{ config, pkgs, modulesPath, aspect, inputs, ... }:
{
imports = [
(modulesPath + "/virtualisation/lxc-container.nix")
inputs.agenix.nixosModules.age
]
++ (import ../../users "server").groups.admin
++ aspect.sets.server
++ (with aspect.modules; [ ]);
networking.hostName = "meet";
networking.firewall.enable = false;
nix.trustedUsers = [ "root" "@wheel" ];
security.sudo.wheelNeedsPassword = false;
services.jitsi-meet = {
enable = true;
hostName = "meet.privatevoid.net";
nginx.enable = true;
jicofo.enable = true;
videobridge.enable = true;
prosody.enable = true;
config.p2p.enabled = false;
};
services.jitsi-videobridge = {
nat.publicAddress = "95.216.8.12";
nat.localAddress = "10.10.1.204";
};
services.nginx.virtualHosts."meet.privatevoid.net" = {
enableACME = false;
forceSSL = false;
locations."=/images/watermark.svg" = {
return = "200";
};
};
environment.noXlibs = false;
}

View file

@ -1,7 +0,0 @@
tools: {
ssh.id = with tools.dns; {
publicKey = "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIOYLrmiuPK77cw71QNzG2zaWs6gsxmYuLyqsUrWMYLnk";
hostNames = subResolve "styx" "services";
};
nixos = import ./system.nix;
}

View file

@ -1,17 +0,0 @@
{ config, pkgs, modulesPath, aspect, inputs, ... }:
{
imports = [
(modulesPath + "/virtualisation/lxc-container.nix")
inputs.agenix.nixosModules.age
]
++ (import ../../users "server").groups.admin
++ aspect.sets.server
++ (with aspect.modules; [ hydra ]);
networking.hostName = "styx";
networking.firewall.enable = false;
nix.trustedUsers = [ "root" "@wheel" ];
security.sudo.wheelNeedsPassword = false;
}