hades: add gitlab runners
This commit is contained in:
parent
9907170295
commit
4eed5ee93d
hosts/hades
modules/secrets
|
@ -156,6 +156,57 @@ in {
|
||||||
services = {
|
services = {
|
||||||
openssh.enable = true;
|
openssh.enable = true;
|
||||||
vnstat.enable = true;
|
vnstat.enable = true;
|
||||||
|
|
||||||
|
gitlab-runner = {
|
||||||
|
enable = true;
|
||||||
|
settings = {
|
||||||
|
concurrent = 4;
|
||||||
|
};
|
||||||
|
services = {
|
||||||
|
nix = {
|
||||||
|
authenticationTokenConfigFile = config.age.secrets."gitlab-runner/hades-nix-runner-env".path;
|
||||||
|
dockerImage = "alpine";
|
||||||
|
dockerVolumes = [
|
||||||
|
"/nix/store:/nix/store:ro"
|
||||||
|
"/nix/var/nix/db:/nix/var/nix/db:ro"
|
||||||
|
"/nix/var/nix/daemon-socket:/nix/var/nix/daemon-socket:ro"
|
||||||
|
];
|
||||||
|
dockerDisableCache = true;
|
||||||
|
preBuildScript = pkgs.writeScript "setup-container" ''
|
||||||
|
mkdir -p -m 0755 /nix/var/log/nix/drvs
|
||||||
|
mkdir -p -m 0755 /nix/var/nix/gcroots
|
||||||
|
mkdir -p -m 0755 /nix/var/nix/profiles
|
||||||
|
mkdir -p -m 0755 /nix/var/nix/temproots
|
||||||
|
mkdir -p -m 0755 /nix/var/nix/userpool
|
||||||
|
mkdir -p -m 1777 /nix/var/nix/gcroots/per-user
|
||||||
|
mkdir -p -m 1777 /nix/var/nix/profiles/per-user
|
||||||
|
mkdir -p -m 0755 /nix/var/nix/profiles/per-user/root
|
||||||
|
mkdir -p -m 0700 "$HOME/.nix-defexpr"
|
||||||
|
|
||||||
|
. ${pkgs.nix}/etc/profile.d/nix.sh
|
||||||
|
|
||||||
|
${pkgs.nix}/bin/nix-env -i ${lib.concatStringsSep " " (with pkgs; [nix cacert git openssh])}
|
||||||
|
|
||||||
|
${pkgs.nix}/bin/nix-channel --add https://nixos.org/channels/nixpkgs-unstable
|
||||||
|
${pkgs.nix}/bin/nix-channel --update nixpkgs
|
||||||
|
|
||||||
|
mkdir -p ~/.config/nix
|
||||||
|
echo "experimental-features = nix-command flakes" > ~/.config/nix/nix.conf
|
||||||
|
'';
|
||||||
|
environmentVariables = {
|
||||||
|
ENV = "/etc/profile";
|
||||||
|
USER = "root";
|
||||||
|
NIX_REMOTE = "daemon";
|
||||||
|
PATH = "/nix/var/nix/profiles/default/bin:/nix/var/nix/profiles/default/sbin:/bin:/sbin:/usr/bin:/usr/sbin";
|
||||||
|
NIX_SSL_CERT_FILE = "/nix/var/nix/profiles/default/etc/ssl/certs/ca-bundle.crt";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
default = {
|
||||||
|
authenticationTokenConfigFile = config.age.secrets."gitlab-runner/hades-runner-env".path;
|
||||||
|
dockerImage = "debian:stable";
|
||||||
|
};
|
||||||
|
};
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
virtualisation.docker.enable = true;
|
virtualisation.docker.enable = true;
|
||||||
|
|
|
@ -13,6 +13,9 @@
|
||||||
// attrs;
|
// attrs;
|
||||||
in
|
in
|
||||||
lib.mapAttrs toSecret {
|
lib.mapAttrs toSecret {
|
||||||
|
"gitlab-runner/hades-nix-runner-env".path;
|
||||||
|
"gitlab-runner/hades-runner-env".path;
|
||||||
|
|
||||||
"lohr/shared-secret" = {};
|
"lohr/shared-secret" = {};
|
||||||
|
|
||||||
"matrix-synapse/secret-config" = {
|
"matrix-synapse/secret-config" = {
|
||||||
|
|
8
modules/secrets/gitlab-runner/hades-nix-runner-env.age
Normal file
8
modules/secrets/gitlab-runner/hades-nix-runner-env.age
Normal file
|
@ -0,0 +1,8 @@
|
||||||
|
age-encryption.org/v1
|
||||||
|
-> ssh-ed25519 k2gHjw 0Qkzquxwa8PSNg6yq+CsfC4JfPLfxEIBKq1krrynlxg
|
||||||
|
QOHmNCQsV10zSnYvEeSpK95oXXlS+J4pw6EIR1KzxoU
|
||||||
|
-> ssh-ed25519 pX8y2g YbFzF2/mWizY4SOnNKzkcBEEsHYc1mTCpzWZ5vf6Zy0
|
||||||
|
p2E9Uh0rWa8qbf2SvB5e4lxS+MEx5KGumKd28UHW0/0
|
||||||
|
--- naIsBkYqZMgekqmxTgESGMuFIKoagS68mfXbid7k9e0
|
||||||
|
U´<"Œ°´{24>—eµ^ûˆ™ÎÇ*C³†íg f†{ÊúÞvѨËIÈå_Á¬Fúoe3.6,cFÕK
|
||||||
|
<EFBFBD>»$ª9]¦@Ñê{<ÃáºÅAsªÿp!v¼ תîí‰ÌÇ•C<E280A2>çãrÄ0iVìö8ý>~L
|
7
modules/secrets/gitlab-runner/hades-runner-env.age
Normal file
7
modules/secrets/gitlab-runner/hades-runner-env.age
Normal file
|
@ -0,0 +1,7 @@
|
||||||
|
age-encryption.org/v1
|
||||||
|
-> ssh-ed25519 k2gHjw EQkuI0FlwczzVWR3wvx+lXUNd0NnUjpBhOhmmIJ8Xhk
|
||||||
|
SXMz4M9n7kcuacBkJUg//iLYLJ5qP2BlQnD2zALskuw
|
||||||
|
-> ssh-ed25519 pX8y2g fmzHtkHXHjHiva7dGs7Khof1VzMMj6CLC4oghYf7lEk
|
||||||
|
Yx6G693eo5EqviIj/8t5JWjziYCSSJlwDNG92FPc7ro
|
||||||
|
--- /vsxhnYSHZFsDJtDbl8TKTgDS/XwqkTOXB2isT6K+LY
|
||||||
|
báÊÇ™‰Ë)<FL³0(S’ñÂ0SNÁ²È’}µëSëš¼›‹Ó¯ZÖ"÷¡ŠþQ?o<>
jHë;h@øb^ŽšŠhÁƒk^ziìë?ˆøUî æGJ”·ü¨Àåk1<á(z-¦›iq±‰Š
|
|
@ -13,6 +13,8 @@ let
|
||||||
in {
|
in {
|
||||||
"gandi/api-key.age".publicKeys = [alarsyo hades];
|
"gandi/api-key.age".publicKeys = [alarsyo hades];
|
||||||
|
|
||||||
|
"gitlab-runner/hades-runner-env.age".publicKeys = [alarsyo hades];
|
||||||
|
"gitlab-runner/hades-nix-runner-env.age".publicKeys = [alarsyo hades];
|
||||||
"gitlab-runner/thanatos-runner-env.age".publicKeys = [alarsyo thanatos];
|
"gitlab-runner/thanatos-runner-env.age".publicKeys = [alarsyo thanatos];
|
||||||
"gitlab-runner/thanatos-nix-runner-env.age".publicKeys = [alarsyo thanatos];
|
"gitlab-runner/thanatos-nix-runner-env.age".publicKeys = [alarsyo thanatos];
|
||||||
|
|
||||||
|
|
Loading…
Reference in a new issue