about summary refs log tree commit diff
path: root/users
diff options
context:
space:
mode:
authorAspen Smith <root@gws.fyi>2024-03-31T17·50-0400
committerclbot <clbot@tvl.fyi>2024-03-31T17·56+0000
commit55ab8b1e6a0d6fad331cc7b6c748ff30a856c385 (patch)
treeb99b40f996ddc0e056702e2dc9ae276f93579960 /users
parent9b6aee4b9effa5bb9ff267f587f2026476c06117 (diff)
fix(aspen/system): Remove buildkite agent on ogopogo r/7812
I never got this working

Change-Id: Iacb68a7d6d5fe1d1f1f390d09f106c4eb9a51b6a
Reviewed-on: https://cl.tvl.fyi/c/depot/+/11301
Reviewed-by: aspen <root@gws.fyi>
Autosubmit: aspen <root@gws.fyi>
Tested-by: BuildkiteCI
Diffstat (limited to 'users')
-rw-r--r--users/aspen/system/system/machines/ogopogo.nix42
1 files changed, 0 insertions, 42 deletions
diff --git a/users/aspen/system/system/machines/ogopogo.nix b/users/aspen/system/system/machines/ogopogo.nix
index d64d5931e3..e80a0906db 100644
--- a/users/aspen/system/system/machines/ogopogo.nix
+++ b/users/aspen/system/system/machines/ogopogo.nix
@@ -96,48 +96,6 @@
     };
   };
 
-  services.buildkite-agents.ogopogo-1 = rec {
-    enable = true;
-    tokenPath = config.age.secretsDir + "/buildkite-token";
-    privateSshKeyPath = config.age.secretsDir + "/buildkite-ssh-key";
-    runtimePackages = with pkgs; [
-      docker
-      nix
-      gnutar
-      gzip
-      bash
-    ];
-    tags = {
-      queue = "ogopogo";
-    };
-    dataDir = "/home/grfn/buildkite-agent";
-
-    hooks.environment = ''
-      export BUILDKITE_AGENT_HOME=${dataDir}
-    '';
-  };
-  systemd.services.buildkite-agent-ogopogo-1.serviceConfig.User =
-    lib.mkForce "grfn";
-  users.users.grfn.extraGroups = [ "keys" ];
-
-  age.secrets =
-    let
-      secret = name: depot.users.aspen.secrets."${name}.age";
-    in
-    {
-      buildkite-ssh-key = {
-        file = secret "buildkite-ssh-key";
-        group = "keys";
-        mode = "0440";
-      };
-
-      buildkite-token = {
-        file = secret "buildkite-token";
-        group = "keys";
-        mode = "0440";
-      };
-    };
-
   nix.settings.substituters = [ "ssh://grfn@172.16.0.5" ];
   nix.settings.trusted-substituters = [ "ssh://grfn@172.16.0.5" ];
   programs.ssh.knownHosts.mugwump = {