forked from rarias/bscpkgs
		
	Access to the 23080 local port will be done by applying the INPUT rules, which pass through nixos-fw. Reviewed-by: Aleix Boné <abonerib@bsc.es>
		
			
				
	
	
		
			127 lines
		
	
	
		
			4.8 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			127 lines
		
	
	
		
			4.8 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
| { pkgs, lib, config, ... }:
 | |
| 
 | |
| {
 | |
|   age.secrets.gitlab-pm-shell.file = ../../secrets/gitlab-runner-shell-token.age;
 | |
|   age.secrets.gitlab-pm-docker.file = ../../secrets/gitlab-runner-docker-token.age;
 | |
|   age.secrets.gitlab-bsc-docker.file = ../../secrets/gitlab-bsc-docker-token.age;
 | |
| 
 | |
|   services.gitlab-runner = {
 | |
|     enable = true;
 | |
|     settings.concurrent = 5;
 | |
|     services = let
 | |
|       common-shell = {
 | |
|         executor = "shell";
 | |
|         environmentVariables = {
 | |
|           SHELL = "${pkgs.bash}/bin/bash";
 | |
|         };
 | |
|       };
 | |
|       common-docker = {
 | |
|         executor = "docker";
 | |
|         dockerImage = "debian:stable";
 | |
|         registrationFlags = [
 | |
|           "--docker-network-mode host"
 | |
|         ];
 | |
|         environmentVariables = {
 | |
|           https_proxy = "http://hut:23080";
 | |
|           http_proxy = "http://hut:23080";
 | |
|         };
 | |
|       };
 | |
|     in {
 | |
|       # For pm.bsc.es/gitlab
 | |
|       gitlab-pm-shell = common-shell // {
 | |
|         authenticationTokenConfigFile = config.age.secrets.gitlab-pm-shell.path;
 | |
|       };
 | |
|       gitlab-pm-docker = common-docker // {
 | |
|         authenticationTokenConfigFile = config.age.secrets.gitlab-pm-docker.path;
 | |
|       };
 | |
| 
 | |
|       gitlab-bsc-docker = {
 | |
|         # gitlab.bsc.es still uses the old token mechanism
 | |
|         registrationConfigFile = config.age.secrets.gitlab-bsc-docker.path;
 | |
|         tagList = [ "docker" "hut" ];
 | |
|         environmentVariables = {
 | |
|           # We cannot access the hut local interface from docker, so we connect
 | |
|           # to hut directly via the ethernet one.
 | |
|           https_proxy = "http://hut:23080";
 | |
|           http_proxy = "http://hut:23080";
 | |
|         };
 | |
|         executor = "docker";
 | |
|         dockerImage = "alpine";
 | |
|         dockerVolumes = [
 | |
|           "/nix/store:/nix/store:ro"
 | |
|           "/nix/var/nix/db:/nix/var/nix/db:ro"
 | |
|           "/nix/var/nix/daemon-socket:/nix/var/nix/daemon-socket:ro"
 | |
|         ];
 | |
|         dockerExtraHosts = [
 | |
|           # Required to pass the proxy via hut
 | |
|           "hut:10.0.40.7"
 | |
|         ];
 | |
|         dockerDisableCache = true;
 | |
|         registrationFlags = [
 | |
|           # Increase build log length to 64 MiB
 | |
|           "--output-limit 65536"
 | |
|         ];
 | |
|         preBuildScript = pkgs.writeScript "setup-container" ''
 | |
|           mkdir -p -m 0755 /nix/var/log/nix/drvs
 | |
|           mkdir -p -m 0755 /nix/var/nix/gcroots
 | |
|           mkdir -p -m 0755 /nix/var/nix/profiles
 | |
|           mkdir -p -m 0755 /nix/var/nix/temproots
 | |
|           mkdir -p -m 0755 /nix/var/nix/userpool
 | |
|           mkdir -p -m 1777 /nix/var/nix/gcroots/per-user
 | |
|           mkdir -p -m 1777 /nix/var/nix/profiles/per-user
 | |
|           mkdir -p -m 0755 /nix/var/nix/profiles/per-user/root
 | |
|           mkdir -p -m 0700 "$HOME/.nix-defexpr"
 | |
|           mkdir -p -m 0700 "$HOME/.ssh"
 | |
|           cat > "$HOME/.ssh/config" << EOF
 | |
|           Host bscpm04.bsc.es gitlab-internal.bsc.es
 | |
|             User git
 | |
|             ProxyCommand nc -X connect -x hut:23080 %h %p
 | |
|           Host amdlogin1.bsc.es armlogin1.bsc.es hualogin1.bsc.es glogin1.bsc.es glogin2.bsc.es fpgalogin1.bsc.es
 | |
|             ProxyCommand nc -X connect -x hut:23080 %h %p
 | |
|           EOF
 | |
|           cat >> "$HOME/.ssh/known_hosts" << EOF
 | |
|           bscpm04.bsc.es ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIPx4mC0etyyjYUT2Ztc/bs4ZXSbVMrogs1ZTP924PDgT
 | |
|           gitlab-internal.bsc.es ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIF9arsAOSRB06hdy71oTvJHG2Mg8zfebADxpvc37lZo3
 | |
|           EOF
 | |
|           . ${pkgs.nix}/etc/profile.d/nix-daemon.sh
 | |
|           # Required to load SSL certificate paths
 | |
|           . ${pkgs.cacert}/nix-support/setup-hook
 | |
|         '';
 | |
|         environmentVariables = {
 | |
|           ENV = "/etc/profile";
 | |
|           USER = "root";
 | |
|           NIX_REMOTE = "daemon";
 | |
|           PATH = "${config.system.path}/bin:/bin:/sbin:/usr/bin:/usr/sbin";
 | |
|         };
 | |
|       };
 | |
|     };
 | |
|   };
 | |
| 
 | |
|   # DOCKER* chains are useless, override at FORWARD and nixos-fw
 | |
|   networking.firewall.extraCommands = ''
 | |
|     # Don't forward any traffic from docker
 | |
|     iptables -I FORWARD 1 -p all -i docker0 -j nixos-fw-log-refuse
 | |
| 
 | |
|     # Allow incoming traffic from docker to 23080
 | |
|     iptables -A nixos-fw -p tcp -i docker0 -d hut --dport 23080 -j ACCEPT
 | |
|   '';
 | |
| 
 | |
|   #systemd.services.gitlab-runner.serviceConfig.Shell = "${pkgs.bash}/bin/bash";
 | |
|   systemd.services.gitlab-runner.serviceConfig.DynamicUser = lib.mkForce false;
 | |
|   systemd.services.gitlab-runner.serviceConfig.User = "gitlab-runner";
 | |
|   systemd.services.gitlab-runner.serviceConfig.Group = "gitlab-runner";
 | |
|   systemd.services.gitlab-runner.serviceConfig.ExecStart = lib.mkForce
 | |
|     ''${pkgs.gitlab-runner}/bin/gitlab-runner run --config ''${HOME}/.gitlab-runner/config.toml --listen-address "127.0.0.1:9252" --working-directory ''${HOME}'';
 | |
| 
 | |
|   users.users.gitlab-runner = {
 | |
|     uid = config.ids.uids.gitlab-runner;
 | |
|     #isNormalUser = true;
 | |
|     home = "/var/lib/gitlab-runner";
 | |
|     description = "Gitlab Runner";
 | |
|     group = "gitlab-runner";
 | |
|     extraGroups = [ "docker" ];
 | |
|     createHome = true;
 | |
|   };
 | |
|   users.groups.gitlab-runner.gid = config.ids.gids.gitlab-runner;
 | |
| }
 |