clan-infra/modules/web01/gitea/actions-runner.nix

217 lines
7.5 KiB
Nix
Raw Normal View History

2023-07-13 09:05:07 +00:00
{ config, self, pkgs, lib, ... }:
2023-07-20 15:11:22 +00:00
let
2023-07-21 08:32:57 +00:00
storeDeps = pkgs.runCommand "store-deps" { } ''
mkdir -p $out/bin
2023-07-20 15:15:25 +00:00
for dir in ${toString [ pkgs.coreutils pkgs.findutils pkgs.gnugrep pkgs.gawk pkgs.git pkgs.nix pkgs.bash pkgs.jq pkgs.nodejs ]}; do
2023-07-20 15:11:22 +00:00
for bin in "$dir"/bin/*; do
2023-07-21 08:32:57 +00:00
ln -s "$bin" "$out/bin/$(basename "$bin")"
2023-07-20 15:11:22 +00:00
done
done
# Add SSL CA certs
mkdir -p $out/etc/ssl/certs
cp -a "${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt" $out/etc/ssl/certs/ca-bundle.crt
'';
2024-03-12 15:56:48 +00:00
numInstances = 2;
2023-07-20 15:11:22 +00:00
in
2023-10-04 18:44:40 +00:00
lib.mkMerge [{
2023-07-21 08:55:31 +00:00
# everything here has no dependencies on the store
2023-07-20 13:24:19 +00:00
systemd.services.gitea-runner-nix-image = {
wantedBy = [ "multi-user.target" ];
after = [ "podman.service" ];
requires = [ "podman.service" ];
path = [ config.virtualisation.podman.package pkgs.gnutar pkgs.shadow pkgs.getent ];
2023-07-20 15:11:22 +00:00
# we also include etc here because the cleanup job also wants the nixuser to be present
2023-07-20 13:24:19 +00:00
script = ''
2023-07-21 08:32:57 +00:00
set -eux -o pipefail
mkdir -p etc/nix
# Create an unpriveleged user that we can use also without the run-as-user.sh script
touch etc/passwd etc/group
groupid=$(cut -d: -f3 < <(getent group nixuser))
userid=$(cut -d: -f3 < <(getent passwd nixuser))
groupadd --prefix $(pwd) --gid "$groupid" nixuser
2023-09-28 15:02:46 +00:00
emptypassword='$6$1ero.LwbisiU.h3D$GGmnmECbPotJoPQ5eoSTD6tTjKnSWZcjHoVTkxFLZP17W9hRi/XkmCiAMOfWruUwy8gMjINrBMNODc7cYEo4K.'
useradd --prefix $(pwd) -p "$emptypassword" -m -d /tmp -u "$userid" -g "$groupid" -G nixuser nixuser
2023-07-21 08:32:57 +00:00
cat <<NIX_CONFIG > etc/nix/nix.conf
accept-flake-config = true
experimental-features = nix-command flakes
NIX_CONFIG
cat <<NSSWITCH > etc/nsswitch.conf
passwd: files mymachines systemd
group: files mymachines systemd
shadow: files
hosts: files mymachines dns myhostname
networks: files
ethers: files
services: files
protocols: files
rpc: files
NSSWITCH
# list the content as it will be imported into the container
tar -cv . | tar -tvf -
tar -cv . | podman import - gitea-runner-nix
2023-07-20 13:24:19 +00:00
'';
serviceConfig = {
2023-07-21 08:32:57 +00:00
RuntimeDirectory = "gitea-runner-nix-image";
WorkingDirectory = "/run/gitea-runner-nix-image";
2023-07-20 13:24:19 +00:00
Type = "oneshot";
RemainAfterExit = true;
};
};
2023-07-21 08:32:57 +00:00
users.users.nixuser = {
group = "nixuser";
description = "Used for running nix ci jobs";
home = "/var/empty";
isSystemUser = true;
};
users.groups.nixuser = { };
2023-10-04 18:44:40 +00:00
}
{
systemd.services = lib.genAttrs (builtins.genList (n: "gitea-runner-nix${builtins.toString n}-token") numInstances) (name: {
wantedBy = [ "multi-user.target" ];
after = [ "gitea.service" ];
environment = {
GITEA_CUSTOM = "/var/lib/gitea/custom";
GITEA_WORK_DIR = "/var/lib/gitea";
};
script = ''
set -euo pipefail
token=$(${lib.getExe self.packages.${pkgs.hostPlatform.system}.gitea} actions generate-runner-token)
echo "TOKEN=$token" > /var/lib/gitea-registration/${name}
'';
unitConfig.ConditionPathExists = [ "!/var/lib/gitea-registration/${name}" ];
serviceConfig = {
User = "gitea";
Group = "gitea";
StateDirectory = "gitea-registration";
Type = "oneshot";
RemainAfterExit = true;
};
});
# Format of the token file:
virtualisation = {
podman.enable = true;
podman.extraPackages = [ pkgs.zfs ];
2023-07-13 09:05:07 +00:00
};
2023-10-04 18:44:40 +00:00
virtualisation.containers.storage.settings = {
storage.driver = "zfs";
storage.graphroot = "/var/lib/containers/storage";
storage.runroot = "/run/containers/storage";
storage.options.zfs.fsname = "zroot/root/podman";
};
2023-07-13 09:05:07 +00:00
2023-10-04 18:44:40 +00:00
virtualisation.containers.containersConf.settings = {
# podman seems to not work with systemd-resolved
containers.dns_servers = [ "8.8.8.8" "8.8.4.4" ];
switch to native nix gitea action gitea: check runner label flake.lock: Update Flake lock file updates: • Updated input 'disko': 'github:nix-community/disko/15c4d57b41b6b57024aec015e5d30a4ed4713034' (2023-07-04) → 'github:nix-community/disko/68eb09b1833301d729ae6e89583173b6ceaade1c' (2023-07-13) • Updated input 'homepage': 'git+https://git.clan.lol/clan/clan-homepage?ref=refs/heads/main&rev=ffe31cffbdcc22fbf92bde02beda9b17aebe6a82' (2023-07-05) → 'git+https://git.clan.lol/clan/clan-homepage?ref=refs/heads/main&rev=b1573761fd03b6d6ae2170211953e08a2f430b8c' (2023-07-11) • Updated input 'nixpkgs': 'github:Mic92/nixpkgs/9e9bef88786414db7178ad610e7874730d21c5bb' (2023-07-13) → 'github:Mic92/nixpkgs/76873846521e9f2eacc3d2db7c3643b222e22a59' (2023-07-13) • Updated input 'sops-nix': 'github:Mic92/sops-nix/5ed3c22c1fa0515e037e36956a67fe7e32c92957' (2023-07-02) → 'github:Mic92/sops-nix/88b964df6981e4844c07be8c192aa6bdca768a10' (2023-07-12) • Updated input 'srvos': 'github:numtide/srvos/c9fa5cf4b6014807655bf8356b3cddc86f741b7a' (2023-07-03) → 'github:numtide/srvos/e8ae8c0ac816b6388199a475bd6188943e47f5b9' (2023-07-13) • Updated input 'treefmt-nix': 'github:numtide/treefmt-nix/df3f32b0cc253dfc7009b7317e8f0e7ccd70b1cf' (2023-06-29) → 'github:numtide/treefmt-nix/f1dca68b908f3dd656b923b9fb62f7d755133662' (2023-07-13) flake.lock: Update Flake lock file updates: • Updated input 'nixpkgs': 'github:Mic92/nixpkgs/76873846521e9f2eacc3d2db7c3643b222e22a59' (2023-07-13) → 'github:Mic92/nixpkgs/21d75bf07c3cd8c10aea2e86e7d683e12b8bc5c4' (2023-07-13) flake.lock: Update Flake lock file updates: • Updated input 'nixpkgs': 'github:Mic92/nixpkgs/21d75bf07c3cd8c10aea2e86e7d683e12b8bc5c4' (2023-07-13) → 'github:Mic92/nixpkgs/dc54601ce60a6e7b427d124550d43067ee605b53' (2023-07-13)
2023-07-13 10:01:23 +00:00
};
2023-10-04 18:44:40 +00:00
}
{
systemd.services = lib.genAttrs (builtins.genList (n: "gitea-runner-nix${builtins.toString n}") numInstances) (name: {
after = [
"${name}-token.service"
"gitea-runner-nix-image.service"
];
requires = [
"${name}-token.service"
"gitea-runner-nix-image.service"
];
# TODO: systemd confinment
serviceConfig = {
# Hardening (may overlap with DynamicUser=)
# The following options are only for optimizing output of systemd-analyze
AmbientCapabilities = "";
CapabilityBoundingSet = "";
# ProtectClock= adds DeviceAllow=char-rtc r
DeviceAllow = "";
NoNewPrivileges = true;
PrivateDevices = true;
PrivateMounts = true;
PrivateTmp = true;
PrivateUsers = true;
ProtectClock = true;
ProtectControlGroups = true;
ProtectHome = true;
ProtectHostname = true;
ProtectKernelLogs = true;
ProtectKernelModules = true;
ProtectKernelTunables = true;
ProtectSystem = "strict";
RemoveIPC = true;
RestrictNamespaces = true;
RestrictRealtime = true;
RestrictSUIDSGID = true;
UMask = "0066";
ProtectProc = "invisible";
SystemCallFilter = [
"~@clock"
"~@cpu-emulation"
"~@module"
"~@mount"
"~@obsolete"
"~@raw-io"
"~@reboot"
"~@swap"
# needed by go?
#"~@resources"
"~@privileged"
"~capset"
"~setdomainname"
"~sethostname"
];
RestrictAddressFamilies = [ "AF_INET" "AF_INET6" "AF_UNIX" "AF_NETLINK" ];
# Needs network access
PrivateNetwork = false;
# Cannot be true due to Node
MemoryDenyWriteExecute = false;
# The more restrictive "pid" option makes `nix` commands in CI emit
# "GC Warning: Couldn't read /proc/stat"
# You may want to set this to "pid" if not using `nix` commands
ProcSubset = "all";
# Coverage programs for compiled code such as `cargo-tarpaulin` disable
# ASLR (address space layout randomization) which requires the
# `personality` syscall
# You may want to set this to `true` if not using coverage tooling on
# compiled code
LockPersonality = false;
# Note that this has some interactions with the User setting; so you may
# want to consult the systemd docs if using both.
DynamicUser = true;
};
});
services.gitea-actions-runner.instances = lib.genAttrs (builtins.genList (n: "nix${builtins.toString n}") numInstances) (name: {
enable = true;
name = "nix-runner";
# take the git root url from the gitea config
# only possible if you've also configured your gitea though the same nix config
# otherwise you need to set it manually
url = config.services.gitea.settings.server.ROOT_URL;
# use your favourite nix secret manager to get a path for this
tokenFile = "/var/lib/gitea-registration/gitea-runner-${name}-token";
labels = [ "nix:docker://gitea-runner-nix" ];
settings = {
container.options = "-e NIX_BUILD_SHELL=/bin/bash -e PAGER=cat -e PATH=/bin -e SSL_CERT_FILE=/etc/ssl/certs/ca-bundle.crt --device /dev/kvm -v /nix:/nix -v ${storeDeps}/bin:/bin -v ${storeDeps}/etc/ssl:/etc/ssl --user nixuser --device=/dev/kvm";
# the default network that also respects our dns server settings
2023-11-29 13:20:36 +00:00
container.network = "host";
2023-10-04 18:44:40 +00:00
container.valid_volumes = [
"/nix"
"${storeDeps}/bin"
"${storeDeps}/etc/ssl"
];
};
});
}]