Cleanup
All checks were successful
Lint / lint (push) Successful in 14s

This commit is contained in:
Gabriel Simmer 2023-09-09 22:54:02 +01:00
parent d8057c6020
commit 32aa2cd6ac
Signed by: arch
SSH key fingerprint: SHA256:m3OEcdtrnBpMX+2BDGh/byv3hrCekCLzDYMdvGEKPPQ
2 changed files with 0 additions and 117 deletions

View file

@ -1,21 +0,0 @@
image: nixos/unstable
secrets:
- b0e58bfc-64c4-4b93-9054-b5db47d96a49
- a3f6aa54-9243-4808-b5a5-414644732c02
- 9972d0f8-7159-4057-bb0c-648d8deac791
- a2e02b24-b89f-4d60-8319-c6883b567430
packages:
- nixos.terraform
- nixos.awscli2
sources:
- git@git.sr.ht:~gmem/infra
tasks:
- terraform-plan: |
set +x
aws configure import --csv file://.aws.csv
export AWS_PROFILE=terraform-srht
export VERCEL_API_TOKEN=$(cat ~/.vercel)
set -x
cd infra
terraform -chdir=terraform init
terraform -chdir=terraform plan

View file

@ -1,96 +0,0 @@
let
krops = builtins.fetchGit {
url = "https://cgit.krebsco.de/krops/";
};
lib = import "${krops}/lib";
pkgs = import "${krops}/pkgs" {};
oracle-gitea-runner-source = lib.evalSource [
{
nixpkgs.git = {
ref = "ea95c0917609e5c48023cc7c6141bea2fdf13970";
url = https://github.com/NixOS/nixpkgs;
shallow = true;
};
nixos-config.file = toString ./oracle-gitea-runner/configuration.nix;
"hardware.nix".file = toString ./oracle-gitea-runner/hardware.nix;
}
];
oracle-nix-cache-source = lib.evalSource [
{
nixpkgs.git = {
ref = "66aedfd010204949cb225cf749be08cb13ce1813";
url = https://github.com/NixOS/nixpkgs;
shallow = true;
};
nixos-config.file = toString ./oracle-nix-cache/configuration.nix;
"hardware.nix".file = toString ./oracle-nix-cache/hardware.nix;
}
];
nas-source = lib.evalSource [
{
nixpkgs.git = {
ref = "origin/nixos-unstable";
url = https://github.com/NixOS/nixpkgs;
};
home-manager.git = {
ref = "origin/master";
url = https://github.com/nix-community/home-manager;
};
nixos-config.file = toString ./nas/configuration.nix;
"hardware.nix".file = toString ./nas/hardware.nix;
"n8n.nix".file = toString ./nas/nixpkgs/n8n.nix;
"dns.db".file = toString ./nas/dns.db;
}
];
seattle-source = lib.evalSource [
{
nixpkgs.git = {
ref = "6e287913f7b1ef537c97aa301b67c34ea46b640f";
url = https://github.com/NixOS/nixpkgs;
shallow = true;
};
nixos-config.file = toString ./seattle/configuration.nix;
"hardware.nix".file = toString ./seattle/hardware.nix;
}
];
glasgow-source = lib.evalSource [
{
nixpkgs.git = {
ref = "6e287913f7b1ef537c97aa301b67c34ea46b640f";
url = https://github.com/NixOS/nixpkgs;
shallow = true;
};
nixos-config.file = toString ./glasgow/configuration.nix;
"hardware.nix".file = toString ./glasgow/hardware.nix;
}
];
in {
oracle-gitea-runner = pkgs.krops.writeDeploy "oracle-gitea-runner" {
source = oracle-gitea-runner-source;
target = "root@143.47.229.209";
};
oracle-nginx-funnel = pkgs.krops.writeDeploy "oracle-nginx-funnel" {
source = oracle-nix-cache-source;
target = "root@141.147.109.157";
};
nas = pkgs.krops.writeDeploy "nas" {
source = nas-source;
target = "root@192.168.50.229";
};
seattle = pkgs.krops.writeDeploy "seattle" {
source = seattle-source;
target = "root@seattle";
};
glasgow = pkgs.krops.writeDeploy "glasgow" {
source = glasgow-source;
target = "root@192.168.50.144";
};
}