aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorFranck <franck@fcuny.net>2022-11-07 08:09:25 -0800
committerFranck <franck@fcuny.net>2022-11-07 08:09:25 -0800
commitbb7025da134fef21f4ccafee74a75428b56a27de (patch)
tree6e0ff5e7b3ee7367d1fedbf57a407040b8b8ec49
parentref(home/git): update mapping for the git-helper (diff)
parentfix(services/drone): enable drone (diff)
downloadinfra-bb7025da134fef21f4ccafee74a75428b56a27de.tar.gz
Merge pull request 'fcuny/ci-drone' (#1) from fcuny/test-woodpecker into main
Reviewed-on: https://git.fcuny.net/fcuny/world/pulls/1
-rw-r--r--home/default.nix1
-rw-r--r--home/drone-cli/default.nix12
-rw-r--r--hosts/aptos/home.nix1
-rw-r--r--hosts/tahoe/secrets/drone/secrets.agebin0 -> 703 bytes
-rw-r--r--hosts/tahoe/secrets/secrets.nix5
-rw-r--r--hosts/tahoe/services.nix6
-rw-r--r--modules/services/default.nix1
-rw-r--r--modules/services/drone/default.nix39
-rw-r--r--modules/services/drone/runner-docker/default.nix40
-rw-r--r--modules/services/drone/runner-exec/default.nix58
-rw-r--r--modules/services/drone/server/default.nix48
-rw-r--r--tools/dnsupdate/main.go1
12 files changed, 212 insertions, 0 deletions
diff --git a/home/default.nix b/home/default.nix
index f7eca99..e89d8c7 100644
--- a/home/default.nix
+++ b/home/default.nix
@@ -6,6 +6,7 @@
./bluetooth
./direnv
./documentation
+ ./drone-cli
./element
./emacs
./eog
diff --git a/home/drone-cli/default.nix b/home/drone-cli/default.nix
new file mode 100644
index 0000000..68173c8
--- /dev/null
+++ b/home/drone-cli/default.nix
@@ -0,0 +1,12 @@
+{ config, lib, pkgs, ... }:
+let cfg = config.my.home.drone-cli;
+in
+{
+ options.my.home.drone-cli = with lib; {
+ enable = mkEnableOption "drone-cli configuration";
+ };
+ config = lib.mkIf cfg.enable {
+ home.packages = with pkgs; [ drone-cli ];
+ home.sessionVariables = { DRONE_SERVER = "https://ci.fcuny.net/"; };
+ };
+}
diff --git a/hosts/aptos/home.nix b/hosts/aptos/home.nix
index 2d60b53..2faaa82 100644
--- a/hosts/aptos/home.nix
+++ b/hosts/aptos/home.nix
@@ -38,6 +38,7 @@
go.enable = true;
python.enable = true;
rust.enable = true;
+ drone-cli.enable = true;
# web
firefox.enable = true;
diff --git a/hosts/tahoe/secrets/drone/secrets.age b/hosts/tahoe/secrets/drone/secrets.age
new file mode 100644
index 0000000..c0eb97b
--- /dev/null
+++ b/hosts/tahoe/secrets/drone/secrets.age
Binary files differ
diff --git a/hosts/tahoe/secrets/secrets.nix b/hosts/tahoe/secrets/secrets.nix
index 390f2b6..7b9500f 100644
--- a/hosts/tahoe/secrets/secrets.nix
+++ b/hosts/tahoe/secrets/secrets.nix
@@ -22,6 +22,11 @@ in
mode = "0440";
};
+ "drone/secrets.age" = {
+ publicKeys = all;
+ owner = "drone";
+ };
+
"buildkite/graphql.age" = {
publicKeys = all;
owner = "buildkite-agent-builder-1";
diff --git a/hosts/tahoe/services.nix b/hosts/tahoe/services.nix
index f7edfa4..e5f53ab 100644
--- a/hosts/tahoe/services.nix
+++ b/hosts/tahoe/services.nix
@@ -20,6 +20,12 @@ in
enable = true;
stateDir = "/var/lib/gitea";
};
+ drone = {
+ enable = true;
+ vhostName = "ci.fcuny.net";
+ runners = [ "docker" "exec" ];
+ sharedSecretFile = secrets."drone/secrets".path;
+ };
prometheus = { enable = true; };
grafana = {
enable = true;
diff --git a/modules/services/default.nix b/modules/services/default.nix
index c67a6cd..73e2e6d 100644
--- a/modules/services/default.nix
+++ b/modules/services/default.nix
@@ -6,6 +6,7 @@
./backup
./buildkite
./cgit
+ ./drone
./fwupd
./gerrit
./gitea
diff --git a/modules/services/drone/default.nix b/modules/services/drone/default.nix
new file mode 100644
index 0000000..dedf120
--- /dev/null
+++ b/modules/services/drone/default.nix
@@ -0,0 +1,39 @@
+# A docker-based CI/CD system
+#
+# Inspired by [1]
+# [1]: https://github.com/Mic92/dotfiles/blob/master/nixos/eve/modules/drone.nix
+{ lib, ... }: {
+ imports = [ ./runner-docker ./runner-exec ./server ];
+
+ options.my.services.drone = with lib; {
+ enable = mkEnableOption "Drone CI";
+ vhostName = mkOption {
+ type = types.str;
+ example = "drone.fcuny.net";
+ description = "Name for the virtual host";
+ };
+ runners = mkOption {
+ type = with types; listOf (enum [ "exec" "docker" ]);
+ default = [ ];
+ example = [ "exec" "docker" ];
+ description = "Types of runners to enable";
+ };
+ admin = mkOption {
+ type = types.str;
+ default = "fcuny";
+ example = "admin";
+ description = "Name of the admin user";
+ };
+ port = mkOption {
+ type = types.port;
+ default = 3030;
+ example = 8080;
+ description = "Internal port of the Drone UI";
+ };
+ sharedSecretFile = mkOption {
+ type = types.str;
+ example = "/run/secrets/drone-rpc.env";
+ description = "Shared RPC secret to inject into server and runners";
+ };
+ };
+}
diff --git a/modules/services/drone/runner-docker/default.nix b/modules/services/drone/runner-docker/default.nix
new file mode 100644
index 0000000..428a8d6
--- /dev/null
+++ b/modules/services/drone/runner-docker/default.nix
@@ -0,0 +1,40 @@
+{ config, lib, pkgs, ... }:
+let
+ cfg = config.my.services.drone;
+ hasRunner = (name: builtins.elem name cfg.runners);
+ dockerPkg = pkgs.drone-runner-docker;
+in
+{
+ config = lib.mkIf (cfg.enable && hasRunner "docker") {
+ systemd.services.drone-runner-docker = {
+ wantedBy = [ "multi-user.target" ];
+ after = [ "docker.socket" ]; # Needs the socket to be available
+ # might break deployment
+ restartIfChanged = false;
+ confinement.enable = true;
+ serviceConfig = {
+ Environment = [
+ "DRONE_SERVER_HOST=${cfg.vhostName}"
+ "DRONE_SERVER_PROTO=https"
+ "DRONE_RUNNER_CAPACITY=10"
+ "CLIENT_DRONE_RPC_HOST=127.0.0.1:${toString cfg.port}"
+ ];
+ BindPaths = [ "/var/run/docker.sock" ];
+ EnvironmentFile = [ cfg.sharedSecretFile ];
+ ExecStart = "${dockerPkg}/bin/drone-runner-docker";
+ User = "drone-runner-docker";
+ Group = "drone-runner-docker";
+ };
+ };
+
+ # Make sure it is activated in that case
+ virtualisation.docker.enable = true;
+
+ users.users.drone-runner-docker = {
+ isSystemUser = true;
+ group = "drone-runner-docker";
+ extraGroups = [ "docker" ]; # Give access to the daemon
+ };
+ users.groups.drone-runner-docker = { };
+ };
+}
diff --git a/modules/services/drone/runner-exec/default.nix b/modules/services/drone/runner-exec/default.nix
new file mode 100644
index 0000000..cbfbb9d
--- /dev/null
+++ b/modules/services/drone/runner-exec/default.nix
@@ -0,0 +1,58 @@
+{ config, lib, pkgs, ... }:
+let
+ cfg = config.my.services.drone;
+ hasRunner = (name: builtins.elem name cfg.runners);
+ execPkg = pkgs.drone-runner-exec;
+in
+{
+ config = lib.mkIf (cfg.enable && hasRunner "exec") {
+ systemd.services.drone-runner-exec = {
+ wantedBy = [ "multi-user.target" ];
+ # might break deployment
+ restartIfChanged = false;
+ confinement.enable = true;
+ confinement.packages = with pkgs; [ git gnutar bash nixUnstable gzip ];
+ path = with pkgs; [ git gnutar bash nixUnstable gzip ];
+ serviceConfig = {
+ Environment = [
+ "DRONE_SERVER_HOST=${cfg.vhostName}"
+ "DRONE_SERVER_PROTO=https"
+ "DRONE_RUNNER_CAPACITY=10"
+ "CLIENT_DRONE_RPC_HOST=127.0.0.1:${toString cfg.port}"
+ "PAGER=cat"
+ ];
+ BindPaths = [
+ "/nix/var/nix/daemon-socket/socket"
+ "/var/run/docker.sock"
+ ];
+ BindReadOnlyPaths = [
+ "/etc/resolv.conf:/etc/resolv.conf"
+ "/etc/resolvconf.conf:/etc/resolvconf.conf"
+ "/etc/passwd:/etc/passwd"
+ "/etc/group:/etc/group"
+ "/nix/var/nix/profiles/system/etc/nix:/etc/nix"
+ "${
+ config.environment.etc."ssl/certs/ca-certificates.crt".source
+ }:/etc/ssl/certs/ca-certificates.crt"
+ "${
+ config.environment.etc."ssh/ssh_known_hosts".source
+ }:/etc/ssh/ssh_known_hosts"
+ "/etc/machine-id"
+ # channels are dynamic paths in the nix store, therefore we need to bind mount the whole thing
+ "/nix/"
+ ];
+ EnvironmentFile = [ cfg.sharedSecretFile ];
+ ExecStart = "${execPkg}/bin/drone-runner-exec";
+ User = "drone-runner-exec";
+ Group = "drone-runner-exec";
+ };
+ };
+
+ users.users.drone-runner-exec = {
+ isSystemUser = true;
+ group = "drone-runner-exec";
+ extraGroups = [ "docker" ]; # Give access to the daemon
+ };
+ users.groups.drone-runner-exec = { };
+ };
+}
diff --git a/modules/services/drone/server/default.nix b/modules/services/drone/server/default.nix
new file mode 100644
index 0000000..77f4ee2
--- /dev/null
+++ b/modules/services/drone/server/default.nix
@@ -0,0 +1,48 @@
+{ config, lib, pkgs, ... }:
+let
+ cfg = config.my.services.drone;
+ secrets = config.age.secrets;
+in
+{
+ config = lib.mkIf cfg.enable {
+ systemd.services.drone-server = {
+ wantedBy = [ "multi-user.target" ];
+ serviceConfig = {
+ EnvironmentFile = [ cfg.sharedSecretFile ];
+ Environment = [
+ "DRONE_DATABASE_DRIVER=sqlite3"
+ "DRONE_DATABASE_DATASOURCE=/var/lib/drone-server/drone.sqlite"
+ "DRONE_SERVER_HOST=${cfg.vhostName}"
+ "DRONE_SERVER_PROTO=https"
+ "DRONE_SERVER_PORT=:${toString cfg.port}"
+ "DRONE_USER_CREATE=username:${cfg.admin},admin:true"
+ "DRONE_JSONNET_ENABLED=true"
+ "DRONE_STARLARK_ENABLED=true"
+ ];
+ StateDirectory = "drone-server";
+ ExecStart = "${pkgs.drone}/bin/drone-server";
+ User = "drone";
+ Group = "drone";
+ };
+ };
+
+ users.users.drone = {
+ isSystemUser = true;
+ createHome = true;
+ group = "drone";
+ };
+
+ users.groups.drone = { };
+
+ services.nginx.virtualHosts."${cfg.vhostName}" = {
+ forceSSL = true;
+ enableACME = true;
+ locations."/" = {
+ proxyPass = "http://127.0.0.1:${toString cfg.port}";
+ proxyWebsockets = true;
+ };
+ };
+
+ my.services.backup = { paths = [ "/var/lib/droner-server" ]; };
+ };
+}
diff --git a/tools/dnsupdate/main.go b/tools/dnsupdate/main.go
index fcac9f1..6748ee9 100644
--- a/tools/dnsupdate/main.go
+++ b/tools/dnsupdate/main.go
@@ -19,6 +19,7 @@ var desiredRecords = []string{
"bt",
"cs",
"dash",
+ "drone",
"music",
"unifi",
}