All checks were successful
Run pre-commit on all files / pre-commit (push) Successful in 35s
Run pre-commit on all files / pre-commit (pull_request) Successful in 37s
Check meta / check_dns (pull_request) Successful in 15s
Check meta / check_meta (pull_request) Successful in 16s
Check workflows / check_workflows (pull_request) Successful in 17s
Build all the nodes / Jaccess01 (pull_request) Successful in 1m31s
Build all the nodes / Jaccess04 (pull_request) Successful in 1m32s
Build all the nodes / ap01 (pull_request) Successful in 1m34s
Build all the nodes / netcore01 (pull_request) Successful in 30s
Build all the nodes / netcore02 (pull_request) Successful in 30s
Build all the nodes / hypervisor02 (pull_request) Successful in 1m7s
Build all the nodes / geo01 (pull_request) Successful in 1m31s
Build all the nodes / hypervisor01 (pull_request) Successful in 1m25s
Build all the nodes / geo02 (pull_request) Successful in 1m31s
Build all the nodes / build01 (pull_request) Successful in 1m42s
Build the shell / build-shell (pull_request) Successful in 27s
Build all the nodes / lab-router01 (pull_request) Successful in 1m10s
Build all the nodes / compute01 (pull_request) Successful in 2m8s
Build all the nodes / hypervisor03 (pull_request) Successful in 1m13s
Build all the nodes / tower01 (pull_request) Successful in 1m10s
Build all the nodes / web02 (pull_request) Successful in 1m12s
Build all the nodes / iso (pull_request) Successful in 1m21s
Build all the nodes / zulip01 (pull_request) Successful in 1m12s
Build all the nodes / web03 (pull_request) Successful in 1m18s
Build all the nodes / rescue01 (pull_request) Successful in 1m27s
Build all the nodes / web01 (pull_request) Successful in 1m26s
Build all the nodes / krz01 (pull_request) Successful in 1m48s
Build all the nodes / bridge01 (pull_request) Successful in 3m13s
Build all the nodes / vault01 (pull_request) Successful in 1m56s
Build all the nodes / cof02 (pull_request) Successful in 3m1s
Build all the nodes / storage01 (pull_request) Successful in 2m59s
88331c17ba434359491e8d5889cce872464052c2 → 36ab78dab7da2e4e27911007033713bab534187b Last 50 commits: 4a9cc5b yaziPlugins.nord: 0-unstable-2025-05-14 -> 0-unstable-2025-05-20 3a21a5f yaziPlugins.bypass: 25.3.2-unstable-2025-05-11 -> 25.3.2-unstable-2025-05-30 4a33c1f yaziPlugins.chmod: 25.2.26-unstable-2025-03-02 -> 25.5.28-unstable-2025-05-28 d8a966d yaziPlugins.duckdb: 25.4.8-unstable-2025-04-28 -> 25.4.8-unstable-2025-05-29 a34c6ce yaziPlugins.full-border: 25.2.26-unstable-2025-03-11 -> 25.2.26-unstable-2025-05-28 f001557 yaziPlugins.git: 25.4.4-unstable-2025-04-04 -> 25.5.28-unstable-2025-05-28 bc9ffd5 yaziPlugins.jump-to-char: 25.2.26-unstable-2025-03-02 -> 25.5.28-unstable-2025-05-28 44ff8d2 yaziPlugins.lsar: 25.2.26-unstable-2025-03-02 -> 25.5.28-unstable-2025-05-28 717a2ae yaziPlugins.mactag: 25.4.4-unstable-2025-04-04 -> 25.5.28-unstable-2025-05-28 553f466 yaziPlugins.mediainfo: 25.4.8-unstable-2025-05-19 -> 25.5.28-unstable-2025-05-30 4e1a12f yaziPlugins.miller: 0-unstable-2024-08-28 -> 0-unstable-2025-04-17 f3f3a4c yaziPlugins.mime-ext: 25.4.4-unstable-2025-04-04 -> 25.5.28-unstable-2025-05-28 75df65c yaziPlugins.mount: 25.2.26-unstable-2025-03-02 -> 25.5.28-unstable-2025-05-28 f1397d8 yaziPlugins.piper: 25.4.8-unstable-2025-04-21 -> 25.5.28-unstable-2025-05-28 6fa8d2a yaziPlugins.projects: 0-unstable-2025-05-17 -> 0-unstable-2025-05-29 207f5c9 yaziPlugins.restore: 25.2.7-unstable-2025-04-24 -> 25.5.28-unstable-2025-05-30 1ae39ce yaziPlugins.rich-preview: 0-unstable-2025-04-22 -> 0-unstable-2025-05-30 f71c138 yaziPlugins.rsync: 0-unstable-2025-04-12 -> 0-unstable-2025-04-24 72cec16 yaziPlugins.smart-enter: 25.2.26-unstable-2025-03-02 -> 25.5.28-unstable-2025-05-28 f321ed4 yaziPlugins.smart-filter: 25.2.26-unstable-2025-03-02 -> 25.5.28-unstable-2025-05-28 8cb9c2b yaziPlugins.smart-paste: 0-unstable-2025-04-27 -> 25.5.28-unstable-2025-05-28 a1c5b3d yaziPlugins.starship: 25.4.8-unstable-2025-04-20 -> 25.4.8-unstable-2025-05-30 e994d45 yaziPlugins.toggle-pane: 25.2.26-unstable-2025-04-21 -> 25.5.28-unstable-2025-05-28 4114a89 yaziPlugins.vcs-files: 25.4.8-unstable-2025-04-08 -> 25.5.28-unstable-2025-05-28 7b13298 update yaziPlugins.yatline to 0-unstable-2025-05-31 6c2b3c9 yaziPlugins.yatline-githead: init at 0-unstable-2025-05-31 b7e36fe yaziPlugins.bypass: 25.3.2-unstable-2025-05-30 -> 25.3.2-unstable-2025-06-01 fe5c759 yaziPlugins.ouch: 0-unstable-2025-04-12 -> 0-unstable-2025-06-01 790e54e yaziPlugins.restore: 25.5.28-unstable-2025-05-30 -> 25.5.31-unstable-2025-06-05 c3d5384 yaziPlugins.update: allow updating all in set bdf8e91 yaziPlugins.update: allow committing changes 0f1d346 yaziPlugins.update: cleanup bc9494e yaziPlugins: update on 2025-06-06 f821dc9 yaziPlugins.rsync: update from 0-unstable-2025-04-24 to 0-unstable-2025-06-07 6aedbbb yaziPlugins: update on 2025-06-11 2f4d5d6 grafana: 12.0.0+security-01 -> 12.0.1+security-01 0fcbbed [Backport release-25.05] grafana: 12.0.0+security-01 -> 12.0.1+security-01, fix CVE-2025-3415 (#416372) ce48dbc firefly-iii-data-importer: 1.6.1 -> 1.6.3 7278363 coqPackages.coq-elpi: 2.5.0 -> 2.5.2 4a56f1f [Backport release-25.05] victoriametrics: 1.118.0 -> 1.119.0 (#415501) 98d2a5f workflows: use bash shell explicitly c539888 workflows/reviewers: fix downloading eval results when undrafting 169f649 workflows/nixpkgs-vet: remove outdated comment 6a03633 [25.05] workflows/reviewers: actually ping maintainers when undrafting (#416398) c69bf3d workflows: run without condition on changed paths d39cc5a workflows/build: build all the basics in a single workflow 4b21b23 workflows/lint: run all the static lints in same workflow e6c1c77 workflows/check: run "checks" in one workflow 1fd7b8b vivaldi: 7.4.3684.46 -> 7.4.3684.50 f66ac6c [Backport release-25.05] workflows/check: run "checks" in one workflow (#416406) |
||
---|---|---|
.forgejo/workflows | ||
lib | ||
LICENSES | ||
machines | ||
meta | ||
modules | ||
patches | ||
pkgs | ||
scripts | ||
workflows | ||
.envrc | ||
.gitattributes | ||
.gitignore | ||
bootstrap.nix | ||
CONTRIBUTE.md | ||
default.nix | ||
hive.nix | ||
keys.nix | ||
lon.lock | ||
lon.nix | ||
README.md | ||
REUSE.toml | ||
shell.nix |
❄️ infrastructure
The dgnum infrastructure.
Contributing
Some instruction on how to contribute are available (in french) in /CONTRIBUTE.md. You're expected to read this document before commiting to the repo.
Some documentation for the development tools are provided in the aforementioned file.
Using the binary cache
Add the following module to your configuration (and pin this repo using your favorite tool: npins, lon, etc...):
{ lib, ... }:
let
dgnum-infra = PINNED_PATH_TO_INFRA;
in {
nix.settings = (import dgnum-infra { }).mkCacheSettings {
caches = [ "infra" ];
};
}
Adding a new machine
The first step is to create a minimal viable NixOS host, using tha means necessary. The second step is to find a name for this host, it must be unique from the other hosts.
Tip
For the rest of this part, we assume that the host is named
host02
Download the keys
The public SSH keys of host02
have to be saved to keys
, preferably only the ssh-ed25519
one.
It can be retreived with :
ssh-keyscan address.of.host02 2>/dev/null | awk '/ssh-ed25519/ {print $2,$3}'
Initialize the machine folder and configuration
- Create a folder
host02
undermachines/
- Copy the hardware configuration file generated by
nixos-generate-config
tomachines/host02/_hardware-configuration.nix
- Create a
machines/host02/_configuration.nix
file, it will contain the main configuration options, the basic content of this file should be the following
{ lib, ... }:
lib.extra.mkConfig {
enabledModules = [
# List of modules to enable
];
enabledServices = [
# List of services to enable
];
extraConfig = {
services.netbird.enable = true;
};
root = ./.;
}
Fill in the metadata
Network configuration
The network is declared in meta/network.nix
, the necessary hostId
value can be generated with :
head -c4 /dev/urandom | od -A none -t x4 | sed 's/ //'
Other details
The general metadata is declared in meta/nodes.nix
, the main values to declare are :
site
, where the node is physically locatedstateVersion
nixpkgs
, the nixpkgs version to use
Initialize secrets
Create the directory secrets
in the configuration folder, and add a secrets.nix
file containing :
(import ../../../keys.nix).mkSecrets [ "host02" ] [
# List of secrets for host02
]
This will be used for future secret management.
Update encrypted files
Both the Arkheon, Netbox and notification modules have secrets that are deployed on all machines. To make those services work correctly, run in modules/dgn-records
, modules/dgn-netbox-agent
and modules/dgn-notify
:
agenix -r
Commit and create a PR
Once all of this is done, check that the configuration builds correctly :
colmena build --on host02
Apply it, and create a Pull Request.