S3 cache setup
This commit is contained in:
parent
75726dc403
commit
7720224bbd
8 changed files with 45 additions and 1 deletions
|
|
@ -200,6 +200,9 @@
|
||||||
# Nix configuration
|
# Nix configuration
|
||||||
nix_configuration
|
nix_configuration
|
||||||
|
|
||||||
|
# S3 cache read
|
||||||
|
./modules/nixos/s3_cache_read.nix
|
||||||
|
|
||||||
# Agenix configuration
|
# Agenix configuration
|
||||||
agenix.nixosModules.default
|
agenix.nixosModules.default
|
||||||
{
|
{
|
||||||
|
|
@ -238,6 +241,9 @@
|
||||||
nixos-hardware.nixosModules.common-pc-ssd
|
nixos-hardware.nixosModules.common-pc-ssd
|
||||||
./instances/thor/configuration.nix
|
./instances/thor/configuration.nix
|
||||||
|
|
||||||
|
# S3 cache write
|
||||||
|
./modules/nixos/s3_cache_write.nix
|
||||||
|
|
||||||
./modules/nixos/pro_audio.nix
|
./modules/nixos/pro_audio.nix
|
||||||
./modules/nixos/kdeconnect.nix
|
./modules/nixos/kdeconnect.nix
|
||||||
./modules/nixos/steam.nix
|
./modules/nixos/steam.nix
|
||||||
|
|
@ -268,6 +274,9 @@
|
||||||
./instances/odin/hardware-configuration.nix
|
./instances/odin/hardware-configuration.nix
|
||||||
./instances/odin/common_configuration.nix
|
./instances/odin/common_configuration.nix
|
||||||
|
|
||||||
|
# S3 cache write
|
||||||
|
./modules/nixos/s3_cache_write.nix
|
||||||
|
|
||||||
# ./modules/nixos/pro_audio.nix
|
# ./modules/nixos/pro_audio.nix
|
||||||
./modules/nixos/kdeconnect.nix
|
./modules/nixos/kdeconnect.nix
|
||||||
./modules/nixos/steam.nix
|
./modules/nixos/steam.nix
|
||||||
|
|
|
||||||
|
|
@ -104,6 +104,7 @@
|
||||||
proxyWebsockets = true;
|
proxyWebsockets = true;
|
||||||
};
|
};
|
||||||
extraConfig = ''
|
extraConfig = ''
|
||||||
|
client_max_body_size 6g;
|
||||||
proxy_pass_header Authorization;
|
proxy_pass_header Authorization;
|
||||||
proxy_buffering off;
|
proxy_buffering off;
|
||||||
'';
|
'';
|
||||||
|
|
|
||||||
|
|
@ -1,7 +1,11 @@
|
||||||
{
|
{
|
||||||
security.sudo.wheelNeedsPassword = false;
|
security.sudo.wheelNeedsPassword = false;
|
||||||
nix.settings = {
|
nix.settings = {
|
||||||
substituters = [ "https://hyprland.cachix.org" ];
|
substituters = [
|
||||||
|
"s3://nix-cache?endpoint=heimdall.tsn:9000&scheme=http"
|
||||||
|
"s3://nix-cache?endpoint=s3.bertof.net"
|
||||||
|
"https://hyprland.cachix.org"
|
||||||
|
];
|
||||||
|
|
||||||
trusted-users = [
|
trusted-users = [
|
||||||
"root"
|
"root"
|
||||||
|
|
|
||||||
4
modules/nixos/s3_cache_read.nix
Normal file
4
modules/nixos/s3_cache_read.nix
Normal file
|
|
@ -0,0 +1,4 @@
|
||||||
|
{ config, ... }: {
|
||||||
|
age.secrets.s3_cache_read.file = ../../secrets/s3_cache_read.age;
|
||||||
|
systemd.services.nix-daemon.serviceConfig.EnvironmentFile = config.age.secrets.s3_cache_read.path;
|
||||||
|
}
|
||||||
5
modules/nixos/s3_cache_write.nix
Normal file
5
modules/nixos/s3_cache_write.nix
Normal file
|
|
@ -0,0 +1,5 @@
|
||||||
|
{ config, lib, ... }: {
|
||||||
|
age.secrets.s3_cache_write.file = ../../secrets/s3_cache_write.age;
|
||||||
|
systemd.services.nix-daemon.serviceConfig.EnvironmentFile = lib.mkForce config.age.secrets.s3_cache_write.path;
|
||||||
|
}
|
||||||
|
|
||||||
19
secrets/s3_cache_read.age
Normal file
19
secrets/s3_cache_read.age
Normal file
|
|
@ -0,0 +1,19 @@
|
||||||
|
age-encryption.org/v1
|
||||||
|
-> ssh-ed25519 hGQASA G3TGk4qo8DMYTHfyJL0pfdNJ9ne7tIan0c0lPBfWWVQ
|
||||||
|
bazgE8wB5d6R13HH498beHaJWRhXK9Yt3T0L5ijJ+EM
|
||||||
|
-> ssh-ed25519 4behFA YT0OQi3hpn/jBdr2d0y7vO2BRuUqOJat/mSMhWtLtDo
|
||||||
|
UUOafLht9mF5bgLLcTYR/QJnxAUShqd2zitSZd+7VdY
|
||||||
|
-> ssh-ed25519 XSnoeQ 32kTcJCX1INUwaXIEWpzgjoul+1p0KcHuVDtT6ZsNFs
|
||||||
|
GghX9UPSEirjQZYBE1GJW7KkRAYqydT5NoQQGCpOY1w
|
||||||
|
-> ssh-ed25519 l795CA TbbhVlrXkV5WWApcOVNz3YxwxI2GLa83TFqECsKUHEQ
|
||||||
|
0yhucRC79qToTvSabSL/MwmzhI7hblIL0ErZWNiVi1g
|
||||||
|
-> ssh-ed25519 yiYoXg sXZHM2bny/vXG+wq/Yh62cmRxZSNn7pOrO0LnxDg23s
|
||||||
|
2vjQIn91qlZqSYg58bCMFAqta8arXHZCfpgYU3Gj5ck
|
||||||
|
-> ssh-ed25519 XgC3XA wfk2g7+d9mNRKM5fSQi2luxpHM/5CALDvnfN7HNd6xo
|
||||||
|
NkLd2h9laQtUYIsoEXI3BPZVixzhFmslWJjpQt1Hwco
|
||||||
|
-> ssh-ed25519 IvyYug vj1EGqt6TqZY6c3YQquRca+v7zwwhaXArt+mesA4pGE
|
||||||
|
jiZC7eed0I3MFopntzHBcEYhQHHrhFTzTwFN5PO7LNk
|
||||||
|
-> ssh-ed25519 v7O/FA KBfLseqIoO2QmrO9IdLOzf2ViFfRt1OfDjeYjb4Z0FY
|
||||||
|
d2OjGEDj43UmIgG2HEx/nRnRyEWyws3Tx4LeXudL2hc
|
||||||
|
--- 8dDjpCdPDALUBJGMZBrzTfKS11NGBxsd5jJCPUa/BQc
|
||||||
|
xEjØði!^ÏÔ¾<C394><C2BE>ýgÈoÄk“¯uj!¬jóŠvÄpçòDƾ«=úBE^(ûTð.aëH9òùeV Èg¾Ö*a÷„ k }þˆ<C3BE>‚d=ñÊþ¥À6¥¢7fQkLryO#:߀œžÂ –¾OÙãÝ‚¹ x®¢cíÜcøÓ©2Õ¿ìzHöèX+N°/’ÑB,ø–ƒ¸Š
|
||||||
BIN
secrets/s3_cache_write.age
Normal file
BIN
secrets/s3_cache_write.age
Normal file
Binary file not shown.
|
|
@ -47,4 +47,6 @@ in
|
||||||
"spotify_password.age".publicKeys = devUsers ++ systems;
|
"spotify_password.age".publicKeys = devUsers ++ systems;
|
||||||
"thor_wg_priv.age".publicKeys = devUsers ++ [ thor ];
|
"thor_wg_priv.age".publicKeys = devUsers ++ [ thor ];
|
||||||
"wg_psk.age".publicKeys = devUsers ++ systems;
|
"wg_psk.age".publicKeys = devUsers ++ systems;
|
||||||
|
"s3_cache_write.age".publicKeys = devUsers ++ [ thor odin ];
|
||||||
|
"s3_cache_read.age".publicKeys = devUsers ++ systems;
|
||||||
}
|
}
|
||||||
|
|
|
||||||
Loading…
Add table
Add a link
Reference in a new issue