about summary refs log tree commit diff
path: root/modules/services/drone/server/default.nix
blob: abd323f15ee1158487ed536992162847147b0404 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
{ config, lib, pkgs, ... }:
let
  cfg = config.my.services.drone;
  secrets = config.age.secrets;
in {
  config = lib.mkIf cfg.enable {
    systemd.services.drone-server = {
      wantedBy = [ "multi-user.target" ];
      serviceConfig = {
        EnvironmentFile = [ cfg.sharedSecretFile ];
        Environment = [
          "DRONE_DATABASE_DRIVER=sqlite3"
          "DRONE_DATABASE_DATASOURCE=/var/lib/drone-server/drone.sqlite"
          "DRONE_SERVER_HOST=${cfg.vhostName}"
          "DRONE_SERVER_PROTO=https"
          "DRONE_SERVER_PORT=:${toString cfg.port}"
          "DRONE_USER_CREATE=username:${cfg.admin},admin:true"
          "DRONE_JSONNET_ENABLED=true"
          "DRONE_STARLARK_ENABLED=true"
        ];
        StateDirectory = "drone-server";
        ExecStart = "${pkgs.drone}/bin/drone-server";
        User = "drone";
        Group = "drone";
      };
    };

    users.users.drone = {
      isSystemUser = true;
      createHome = true;
      group = "drone";
    };

    users.groups.drone = { };

    services.nginx.virtualHosts."${cfg.vhostName}" = {
      forceSSL = true;
      useACMEHost = cfg.vhostName;
      locations."/" = {
        proxyPass = "http://127.0.0.1:${toString cfg.port}";
        proxyWebsockets = true;
      };
    };

    security.acme.certs."${cfg.vhostName}" = {
      dnsProvider = "gcloud";
      credentialsFile = secrets."acme/credentials".path;
    };

    my.services.backup = { paths = [ "/var/lib/droner-server" ]; };
  };
}