diff options
| author | Daiderd Jordan <daiderd@gmail.com> | 2018-02-26 20:39:54 +0100 |
|---|---|---|
| committer | GitHub <noreply@github.com> | 2018-02-26 20:39:54 +0100 |
| commit | e9fc93dab56e3a383db61501beafc0070e120dca (patch) | |
| tree | 27a2dfd17dbff968e3f6bdec7ed85e283be4d8db /modules | |
| parent | 3bf2c6652fddf8efc46bc741dc3d7dc901088d03 (diff) | |
| parent | 48d6fe551d2cc3681cbe88966995a58561c956cd (diff) | |
Merge pull request #70 from rvl/buildkite-agent-module
Add buildkite-agent module
Diffstat (limited to 'modules')
| -rw-r--r-- | modules/services/buildkite-agent.nix | 237 |
1 files changed, 237 insertions, 0 deletions
diff --git a/modules/services/buildkite-agent.nix b/modules/services/buildkite-agent.nix new file mode 100644 index 0000000..96c2f3b --- /dev/null +++ b/modules/services/buildkite-agent.nix @@ -0,0 +1,237 @@ +{ config, lib, pkgs, ... }: + +with lib; + +let + cfg = config.services.buildkite-agent; + + mkHookOption = { name, description, example ? null }: { + inherit name; + value = mkOption { + default = null; + inherit description; + type = types.nullOr types.lines; + } // (if example == null then {} else { inherit example; }); + }; + mkHookOptions = hooks: listToAttrs (map mkHookOption hooks); + + hooksDir = let + mkHookEntry = name: value: '' + cat > $out/${name} <<EOF + #! ${pkgs.stdenv.shell} + set -e + ${value} + EOF + chmod 755 $out/${name} + ''; + in pkgs.runCommand "buildkite-agent-hooks" {} '' + mkdir $out + ${concatStringsSep "\n" (mapAttrsToList mkHookEntry (filterAttrs (n: v: v != null) cfg.hooks))} + ''; + +in + +{ + options = { + services.buildkite-agent.enable = mkEnableOption "buildkite-agent"; + + services.buildkite-agent.package = mkOption { + default = pkgs.buildkite-agent; + defaultText = "pkgs.buildkite-agent"; + description = "Which buildkite-agent derivation to use"; + type = types.package; + }; + + services.buildkite-agent.dataDir = mkOption { + default = "/var/lib/buildkite-agent"; + description = "The workdir for the agent"; + type = types.str; + }; + + services.buildkite-agent.runtimePackages = mkOption { + default = [ pkgs.bash pkgs.nix ]; + defaultText = "[ pkgs.bash pkgs.nix ]"; + description = "Add programs to the buildkite-agent environment"; + type = types.listOf types.package; + }; + + services.buildkite-agent.tokenPath = mkOption { + type = types.path; + description = '' + The token from your Buildkite "Agents" page. + + A run-time path to the token file, which is supposed to be provisioned + outside of Nix store. + ''; + }; + + services.buildkite-agent.name = mkOption { + type = types.str; + default = "%hostname-%n"; + description = '' + The name of the agent. + ''; + }; + + services.buildkite-agent.meta-data = mkOption { + type = types.str; + default = ""; + example = "queue=default,docker=true,ruby2=true"; + description = '' + Meta data for the agent. This is a comma-separated list of + <code>key=value</code> pairs. + ''; + }; + + services.buildkite-agent.extraConfig = mkOption { + type = types.lines; + default = ""; + example = "debug=true"; + description = '' + Extra lines to be added verbatim to the configuration file. + ''; + }; + + services.buildkite-agent.openssh = + { privateKeyPath = mkOption { + type = types.path; + description = '' + Private agent key. + + A run-time path to the key file, which is supposed to be provisioned + outside of Nix store. + ''; + }; + publicKeyPath = mkOption { + type = types.path; + description = '' + Public agent key. + + A run-time path to the key file, which is supposed to be provisioned + outside of Nix store. + ''; + }; + }; + + services.buildkite-agent.hooks = mkHookOptions [ + { name = "checkout"; + description = '' + The `checkout` hook script will replace the default checkout routine of the + bootstrap.sh script. You can use this hook to do your own SCM checkout + behaviour + ''; } + { name = "command"; + description = '' + The `command` hook script will replace the default implementation of running + the build command. + ''; } + { name = "environment"; + description = '' + The `environment` hook will run before all other commands, and can be used + to set up secrets, data, etc. Anything exported in hooks will be available + to the build script. + + Note: the contents of this file will be copied to the world-readable + Nix store. + ''; + example = '' + export SECRET_VAR=`head -1 /run/keys/secret` + ''; } + { name = "post-artifact"; + description = '' + The `post-artifact` hook will run just after artifacts are uploaded + ''; } + { name = "post-checkout"; + description = '' + The `post-checkout` hook will run after the bootstrap script has checked out + your projects source code. + ''; } + { name = "post-command"; + description = '' + The `post-command` hook will run after the bootstrap script has run your + build commands + ''; } + { name = "pre-artifact"; + description = '' + The `pre-artifact` hook will run just before artifacts are uploaded + ''; } + { name = "pre-checkout"; + description = '' + The `pre-checkout` hook will run just before your projects source code is + checked out from your SCM provider + ''; } + { name = "pre-command"; + description = '' + The `pre-command` hook will run just before your build command runs + ''; } + { name = "pre-exit"; + description = '' + The `pre-exit` hook will run just before your build job finishes + ''; } + ]; + }; + + config = mkIf config.services.buildkite-agent.enable { + users.users.buildkite-agent = + { name = "buildkite-agent"; + home = cfg.dataDir; + description = "Buildkite agent user"; + }; + users.groups.buildkite-agent = + { name = "buildkite-agent"; + description = "Buildkite agent user group"; + }; + + environment.systemPackages = [ cfg.package ]; + + launchd.daemons.buildkite-agent = + { + path = cfg.runtimePackages ++ [ pkgs.coreutils cfg.package ] + ++ (if pkgs.stdenv.isDarwin then [ pkgs.darwin.DarwinTools ] else []); + environment = { + HOME = cfg.dataDir; + NIX_SSL_CERT_FILE = "${pkgs.cacert}/etc/ssl/certs/ca-bundle.crt"; + } // (if config.nix.useDaemon then { NIX_REMOTE = "daemon"; } else {}); + + ## NB: maximum care is taken so that secrets (ssh keys and the CI token) + ## don't end up in the Nix store. + script = let + sshDir = "${cfg.dataDir}/.ssh"; + in + '' + mkdir -m 0700 -p "${sshDir}" + cp -f "${toString cfg.openssh.privateKeyPath}" "${sshDir}/id_rsa" + cp -f "${toString cfg.openssh.publicKeyPath}" "${sshDir}/id_rsa.pub" + chmod 600 "${sshDir}"/id_rsa* + + cat > "${cfg.dataDir}/buildkite-agent.cfg" <<EOF + token="$(cat ${toString cfg.tokenPath})" + name="${cfg.name}" + meta-data="${cfg.meta-data}" + build-path="${cfg.dataDir}/builds" + hooks-path="${hooksDir}" + ${cfg.extraConfig} + EOF + + # Secrets exist in the buildkite-agent home directory + chmod 750 "${cfg.dataDir}" + chmod 640 "${cfg.dataDir}/buildkite-agent.cfg" + + exec buildkite-agent start --config "${cfg.dataDir}/buildkite-agent.cfg" + ''; + + serviceConfig = { + KeepAlive = true; + RunAtLoad = true; + ProcessType = "Interactive"; + ThrottleInterval = 30; + + GroupName = "buildkite-agent"; + UserName = "buildkite-agent"; + WorkingDirectory = config.users.users.buildkite-agent.home; + StandardErrorPath = "${cfg.dataDir}/buildkite-agent.log"; + StandardOutPath = "${cfg.dataDir}/buildkite-agent.log"; + }; + }; + }; +} |
