infra/modules/nixos/buildbot.nix

67 lines
1.7 KiB
Nix
Raw Normal View History

2024-07-24 19:05:26 +10:00
{
config,
inputs,
...
}:
2023-10-25 11:53:51 +10:00
{
imports = [
inputs.buildbot-nix.nixosModules.buildbot-master
2023-11-21 09:33:18 +10:00
inputs.buildbot-nix.nixosModules.buildbot-worker
2023-10-25 11:53:51 +10:00
];
services.nginx.virtualHosts."buildbot.nix-community.org" = {
enableACME = true;
forceSSL = true;
};
2023-11-21 09:33:18 +10:00
sops.secrets.buildbot-github-oauth-secret = { };
sops.secrets.buildbot-github-app-secret-key = { };
2023-11-21 09:33:18 +10:00
sops.secrets.buildbot-github-webhook-secret = { };
sops.secrets.buildbot-nix-workers = { };
2023-12-24 09:35:53 +10:00
sops.secrets.cachix-auth-token = { };
2023-10-25 11:53:51 +10:00
services.buildbot-nix.master = {
enable = true;
2024-07-24 19:05:26 +10:00
admins = [
"adisbladis"
"ryantm"
"zimbatm"
"zowoq"
];
buildSystems = [
"x86_64-linux"
"aarch64-linux"
"x86_64-darwin"
"aarch64-darwin"
];
buildRetries = 0;
2023-10-25 11:53:51 +10:00
domain = "buildbot.nix-community.org";
evalMaxMemorySize = 4096;
2024-07-26 09:05:35 +10:00
evalWorkerCount = 32;
jobReportLimit = 100;
2023-11-21 09:33:18 +10:00
workersFile = config.sops.secrets.buildbot-nix-workers.path;
cachix = {
enable = true;
name = "nix-community";
auth.authToken.file = config.sops.secrets.cachix-auth-token.path;
};
2023-10-25 11:53:51 +10:00
github = {
authType.app = {
id = 920387;
secretKeyFile = config.sops.secrets.buildbot-github-app-secret-key.path;
};
2023-11-21 09:33:18 +10:00
webhookSecretFile = config.sops.secrets.buildbot-github-webhook-secret.path;
oauthSecretFile = config.sops.secrets.buildbot-github-oauth-secret.path;
oauthId = "Iv23liN9rjd1Bm3bvYKZ";
2023-10-25 11:53:51 +10:00
topic = "nix-community-buildbot";
};
};
2023-11-21 09:33:18 +10:00
sops.secrets.buildbot-nix-worker-password = { };
services.buildbot-nix.worker = {
enable = true;
workerPasswordFile = config.sops.secrets.buildbot-nix-worker-password.path;
};
2023-10-25 11:53:51 +10:00
}