{ config, lib, pkgs, ... }: with lib; let cfg = config.services.buildkite-agent; mkHookOption = { name, description, example ? null }: { inherit name; value = mkOption { default = null; inherit description; type = types.nullOr types.lines; } // (if example == null then {} else { inherit example; }); }; mkHookOptions = hooks: listToAttrs (map mkHookOption hooks); hooksDir = let mkHookEntry = name: value: '' cat > $out/${name} <<'EOF' #! ${pkgs.runtimeShell} set -e ${value} EOF chmod 755 $out/${name} ''; in pkgs.runCommand "buildkite-agent-hooks" { preferLocalBuild = true; } '' mkdir $out ${concatStringsSep "\n" (mapAttrsToList mkHookEntry (filterAttrs (n: v: v != null) cfg.hooks))} ''; defaultUser = "buildkite-agent"; in { options = { services.buildkite-agent = { enable = mkEnableOption "buildkite-agent"; package = mkOption { default = pkgs.buildkite-agent; defaultText = "pkgs.buildkite-agent"; description = "Which buildkite-agent derivation to use"; type = types.package; }; dataDir = mkOption { default = "/var/lib/buildkite-agent"; description = "The workdir for the agent"; type = types.str; }; runtimePackages = mkOption { default = [ pkgs.bash pkgs.gnutar pkgs.gzip pkgs.git pkgs.nix ]; defaultText = "[ pkgs.bash pkgs.gnutar pkgs.gzip pkgs.git pkgs.nix ]"; description = "Add programs to the buildkite-agent environment"; type = types.listOf types.package; }; user = mkOption { type = types.str; default = defaultUser; description = '' Set this option when you want to run the buildkite agent as something else than the default user "buildkite-agent". ''; }; tokenPath = mkOption { type = types.path; description = '' The token from your Buildkite "Agents" page. A run-time path to the token file, which is supposed to be provisioned outside of Nix store. ''; }; name = mkOption { type = types.str; default = "%hostname-%n"; description = '' The name of the agent. ''; }; tags = mkOption { type = types.attrsOf types.str; default = {}; example = { queue = "default"; docker = "true"; ruby2 ="true"; }; description = '' Tags for the agent. ''; }; extraConfig = mkOption { type = types.lines; default = ""; example = "debug=true"; description = '' Extra lines to be added verbatim to the configuration file. ''; }; privateSshKeyPath = mkOption { type = types.nullOr types.path; default = null; ## maximum care is taken so that secrets (ssh keys and the CI token) ## don't end up in the Nix store. apply = final: if final == null then null else toString final; description = '' OpenSSH private key A run-time path to the key file, which is supposed to be provisioned outside of Nix store. ''; }; hooks = mkHookOptions [ { name = "checkout"; description = '' The `checkout` hook script will replace the default checkout routine of the bootstrap.sh script. You can use this hook to do your own SCM checkout behaviour ''; } { name = "command"; description = '' The `command` hook script will replace the default implementation of running the build command. ''; } { name = "environment"; description = '' The `environment` hook will run before all other commands, and can be used to set up secrets, data, etc. Anything exported in hooks will be available to the build script. Note: the contents of this file will be copied to the world-readable Nix store. ''; example = '' export SECRET_VAR=`head -1 /run/keys/secret` ''; } { name = "post-artifact"; description = '' The `post-artifact` hook will run just after artifacts are uploaded ''; } { name = "post-checkout"; description = '' The `post-checkout` hook will run after the bootstrap script has checked out your projects source code. ''; } { name = "post-command"; description = '' The `post-command` hook will run after the bootstrap script has run your build commands ''; } { name = "pre-artifact"; description = '' The `pre-artifact` hook will run just before artifacts are uploaded ''; } { name = "pre-checkout"; description = '' The `pre-checkout` hook will run just before your projects source code is checked out from your SCM provider ''; } { name = "pre-command"; description = '' The `pre-command` hook will run just before your build command runs ''; } { name = "pre-exit"; description = '' The `pre-exit` hook will run just before your build job finishes ''; } ]; hooksPath = mkOption { type = types.path; default = hooksDir; defaultText = "generated from services.buildkite-agent.hooks"; description = '' Path to the directory storing the hooks. Consider using instead. ''; }; shell = mkOption { type = types.str; default = "${pkgs.bash}/bin/bash -e -c"; description = '' Command that buildkite-agent 3 will execute when it spawns a shell. ''; }; }; }; config = mkIf config.services.buildkite-agent.enable { users.users.buildkite-agent = mkIf (cfg.user == defaultUser) { name = "buildkite-agent"; home = cfg.dataDir; createHome = true; description = "Buildkite agent user"; extraGroups = [ "keys" ]; isSystemUser = true; }; environment.systemPackages = [ cfg.package ]; systemd.services.buildkite-agent = { description = "Buildkite Agent"; wantedBy = [ "multi-user.target" ]; after = [ "network.target" ]; path = cfg.runtimePackages ++ [ pkgs.coreutils ]; environment = config.networking.proxy.envVars // { HOME = cfg.dataDir; NIX_REMOTE = "daemon"; }; ## NB: maximum care is taken so that secrets (ssh keys and the CI token) ## don't end up in the Nix store. preStart = let sshDir = "${cfg.dataDir}/.ssh"; tagStr = lib.concatStringsSep "," (lib.mapAttrsToList (name: value: "${name}=${value}") cfg.tags); in optionalString (cfg.privateSshKeyPath != null) '' mkdir -m 0700 -p "${sshDir}" cp -f "${toString cfg.privateSshKeyPath}" "${sshDir}/id_rsa" chmod 600 "${sshDir}"/id_rsa '' + '' cat > "${cfg.dataDir}/buildkite-agent.cfg" <' are mutually exclusive. ''; } ]; }; imports = [ (mkRenamedOptionModule [ "services" "buildkite-agent" "token" ] [ "services" "buildkite-agent" "tokenPath" ]) (mkRenamedOptionModule [ "services" "buildkite-agent" "openssh" "privateKey" ] [ "services" "buildkite-agent" "privateSshKeyPath" ]) (mkRenamedOptionModule [ "services" "buildkite-agent" "openssh" "privateKeyPath" ] [ "services" "buildkite-agent" "privateSshKeyPath" ]) (mkRemovedOptionModule [ "services" "buildkite-agent" "openssh" "publicKey" ] "SSH public keys aren't necessary to clone private repos.") (mkRemovedOptionModule [ "services" "buildkite-agent" "openssh" "publicKeyPath" ] "SSH public keys aren't necessary to clone private repos.") (mkRenamedOptionModule [ "services" "buildkite-agent" "meta-data"] [ "services" "buildkite-agent" "tags" ]) ]; }