infra/modules/nixos/buildbot.nix
2023-12-24 07:16:59 +00:00

77 lines
2.4 KiB
Nix

{ config, inputs, pkgs, ... }:
{
imports = [
inputs.buildbot-nix.nixosModules.buildbot-master
inputs.buildbot-nix.nixosModules.buildbot-worker
];
services.nginx.virtualHosts."buildbot.nix-community.org" = {
enableACME = true;
forceSSL = true;
};
services.telegraf.extraConfig.inputs.prometheus.urls = [
"http://localhost:8011/metrics"
];
sops.secrets.buildbot-github-oauth-secret = { };
sops.secrets.buildbot-github-token = { };
sops.secrets.buildbot-github-webhook-secret = { };
sops.secrets.buildbot-nix-workers = { };
sops.secrets.cachix-auth-token = { };
services.buildbot-nix.master = {
enable = true;
buildSystems = [ "x86_64-linux" "aarch64-linux" "x86_64-darwin" "aarch64-darwin" ];
domain = "buildbot.nix-community.org";
evalMaxMemorySize = "4096";
evalWorkerCount = 16;
workersFile = config.sops.secrets.buildbot-nix-workers.path;
cachix = {
name = "nix-community";
authTokenFile = config.sops.secrets.cachix-auth-token.path;
};
github = {
tokenFile = config.sops.secrets.buildbot-github-token.path;
webhookSecretFile = config.sops.secrets.buildbot-github-webhook-secret.path;
oauthSecretFile = config.sops.secrets.buildbot-github-oauth-secret.path;
oauthId = "9bbd3e8bbfebb197d2ca";
user = "nix-community-buildbot";
admins = [ "adisbladis" "Mic92" "ryantm" "zimbatm" "zowoq" ];
topic = "nix-community-buildbot";
};
};
services.buildbot-master = {
package = pkgs.buildbot;
extraConfig = ''
c['services'].append(reporters.Prometheus(port=8011))
'';
pythonPackages = ps: [
(ps.buildPythonPackage rec {
pname = "buildbot-prometheus";
version = "0c81a89bbe34628362652fbea416610e215b5d1e";
src = pkgs.fetchFromGitHub {
owner = "claws";
repo = "buildbot-prometheus";
rev = version;
hash = "sha256-bz2Nv2RZ44i1VoPvQ/XjGMfTT6TmW6jhEVwItPk23SM=";
};
propagatedBuildInputs = [ ps.prometheus-client ];
doCheck = false;
})
];
};
systemd.targets.multi-user.unitConfig.Upholds = [
"buildbot-master.service"
"buildbot-worker.service"
];
sops.secrets.buildbot-nix-worker-password = { };
services.buildbot-nix.worker = {
enable = true;
workerPasswordFile = config.sops.secrets.buildbot-nix-worker-password.path;
};
}