juspay/github-nix-ci
{ "createdAt": "2024-06-20T20:14:48Z", "defaultBranch": "main", "description": "A simple NixOS & nix-darwin module for self-hosting GitHub runners", "fullName": "juspay/github-nix-ci", "homepage": "", "language": "Nix", "name": "github-nix-ci", "pushedAt": "2025-08-01T23:53:50Z", "stargazersCount": 88, "topics": [], "updatedAt": "2025-11-25T21:54:13Z", "url": "https://github.com/juspay/github-nix-ci"}github-nix-ci
Section titled “github-nix-ci”github-nix-ci is a simple NixOS & nix-darwin module (wrapping[^wrap] the ones in nixpkgs and nix-darwin) for [self-hosting GitHub runners][gh-runner] on your machines (which could be a remote server or your personal macbook), so as to provide self-hosted CI for both personal and organization-wide repositories on GitHub.
What it does
Section titled “What it does”We provide a [NixOS][nixos] and [nix-darwin] module[^wrap] that can be imported and utilized as easily as:
{ services.github-nix-ci = { age.secretsDir = ./secrets; personalRunners = { "srid/nixos-config".num = 1; "srid/haskell-flake".num = 3; }; orgRunners = { "zed-industries".num = 10; }; };}Activating this configuration spins up the required GitHub runners, with appropriate [labels][label] (hostname and Nix [system]s).
In conjunction with [nixci] (which is installed in the runners by default), your GitHub Actions workflow YAML can be as simple as follows in order to run CI, on your own machines, for your Nix flakes based projects:
jobs: nix: runs-on: ${{ matrix.system }} strategy: matrix: system: [aarch64-darwin, x86_64-darwin, x86_64-linux] steps: - uses: actions/checkout@v4 - run: nixci build --systems "github:nix-systems/${{ matrix.system }}"Getting Started
Section titled “Getting Started”Repurposing an existing machine for running [self-hosted GitHub runners][gh-runner] involves the following steps.
1. Create system configuration for the machine
Section titled “1. Create system configuration for the machine”New configuration
Section titled “New configuration”If you do not already have a NixOS (for Linux) or nix-darwin (for macOS) system configuration, begin with the templates provided by nixos-flake. Alternatively, you may start from the minimal example ([./example]!(./example/flake.nix)) in this repo. If you use both the platforms, you can keep them in a single flake as the aforementioned example demonstrates.
[!TIP] If you use
nixos-flake, activating the configuration is as simple as runningnix run .#activate(if done locally) ornix run .#deployif done remotely.
Existing configuration
Section titled “Existing configuration”If you already have a NixOS or nix-darwin system configuration, you can use github-nix-ci as follows:
- Switch your configuration to using flakes, if not already.[^non-flake]
- Add this repo as a flake input
- Add
inputs.github-nix-ci.nixosModules.default(if NixOS) orinputs.github-nix-ci.darwinModules.default(if macOS/nix-darwin) to themoduleslist of your top-level system configuration.
[^non-flake] !: Non-flake users too can use this module by using fetchGit or the like.
Test that everything is okay by activating your configuration.
2. Create personal access tokens
Section titled “2. Create personal access tokens”For our runners to be able to authorize against GitHub, we need to create fine-grained personal access tokens (PAC) for each user and organization.
- Go to https://github.com/settings/personal-access-tokens/new
- Create a fine-grained PAC
- Under Resource owner, choose the user or organization for whose repositories your runners will be building the CI for.
- Under Repository access, choose the appropriate option based on your needs
- Setup the necessary permissions
- If the token is for a personal account, under Permissions -> Repository permissions, set Administration to “Read and write”
- If the token is for an organization, under Permissions -> Organization permissions, set Self-hosted runners to “Read and write”
- Don’t forget to “Allow public repositories” under “Actions -> Runner groups -> Default” (ref).
Add tokens to your configuration using agenix
Section titled “Add tokens to your configuration using agenix”[!TIP] Follow the agenix tutorial for details. This PR in
srid/nixos-configcan also be used as reference.
[!NOTE] This module does not mandate the use of
agenix. If you use something else other thanagenixfor secrets management, set thetokenFileoption manually.
- Create a
./secrets/secrets.nixcontaining the SSH keys of yourself and the machines, as well as the list of token.agefiles (see next point). See./example/secrets/secrets.nixfor reference. - Create a
.agefile for each PAC secret you created in the previous section- Run
agenix -e secrets/github-nix-ci/NAME.token.agewhereNAMEis the name of the github user or the organization the PAC is associated with, and then paste your token secret in it, saving the file.
- Run
3. Configure github-nix-ci runners
Section titled “3. Configure github-nix-ci runners”Now that you have set everything up, it is time to configure the runners themselves. For both NixOS and nix-darwin, you can add the following configuration:
services.github-nix-ci = { age.secretsDir = ./secrets; # Only if you use agenix personalRunners = { "srid/emanote".num = 1; "srid/haskell-flake".num = 3; }; orgRunners = { "zed-industries".num = 10; };};The above configuration adds 3 sets of GitHub runner daemons. Two of them are associated with the personal repos, whereas the 3rd set is associated with the organization (and thus any repository under that organization). The num property will spin-up that many runners for the associated repo or organization. Setting a num value that is greater than 1 enables you to run actions in parallel (upto the value of num).
Activate your configuration, and visit Settings -> Actions -> Runners page of your repository or organization settings to confirm that the runners are ready and healthy.
4. Add the workflow to your repositories
Section titled “4. Add the workflow to your repositories”[!WARNING] A note on security of self-hosted GitHub runners: GitHub recommends using self-hosted runners only with private repositories, as forks “can potentially run dangerous code on [the] self-hosted runner machine by creating a pull request that executes the code in a workflow”.
You can mitigate this risk by going to the Fork pull request workflows from outside collaborators setting (under Settings -> Actions -> General) and enabling “Require approval for all outside collaborators”.
Finally, you are equipped to add an actions workflow file to one of the repositories to test everything out. Here’s an example if you have configured both NixOS and macOS runners:
name: "CI"on: push: branches: - main pull_request:jobs: nix: runs-on: ${{ matrix.system }} strategy: matrix: system: [aarch64-darwin, x86_64-linux] fail-fast: false steps: - uses: actions/checkout@v4 - name: nixci run: nixci --extra-access-tokens "github.com=${{ secrets.GITHUB_TOKEN }}" build --systems "${{ matrix.system }}"The above workflow uses [nixci] to build all outputs of your project flake.
Matrix builds
Section titled “Matrix builds”Because [nixci] supports generating GitHub’s workflow matrix configuration, you can use the following workflow YAML to schedule jobs at a fine-grained level to each runner:
name: "CI"on: push: branches: - main pull_request:jobs:
configure: runs-on: x86_64-linux outputs: matrix: ${{ steps.set-matrix.outputs.matrix }} steps: - uses: actions/checkout@v4 - id: set-matrix run: echo "matrix=$(nixci gh-matrix --systems=x86_64-linux,aarch64-darwin | jq -c .)" >> $GITHUB_OUTPUT
nix: runs-on: ${{ matrix.system }} permissions: contents: read needs: configure strategy: matrix: ${{ fromJson(needs.configure.outputs.matrix) }} fail-fast: false steps: - uses: actions/checkout@v4 - run: | nixci \ --extra-access-tokens "github.com=${{ secrets.GITHUB_TOKEN }}" \ build \ --systems "${{ matrix.system }}" \ .#default.${{ matrix.subflake}}See srid/haskell-flake for a real-world example.
Production
Section titled “Production”Common issues
Section titled “Common issues”Forbidden Runner version ... is deprecated and cannot receive messages.
Section titled “Forbidden Runner version ... is deprecated and cannot receive messages.”Your runner may suddenly crash with an error like this:
Jun 27 22:39:54 dosa Runner.Listener[424134] !: An error occured: Error: Forbidden Runner version v2.316.1 is deprecated and cannot receive messages.To resolve this, you need to update your github runner package by updating the nixpkgs flake input and then re-deploy. See https://github.com/actions/runner/issues/3332#issuecomment-2187929070
[!TIP]
The
github-runnerpackage is auto-updated in nixpkgs by the r-ryantm bot (example), and then automatically gets backported (example) to stable NixOS releases.
Examples
Section titled “Examples”- [
./example]!(./example) srid/nixos-config
[nixci] !: https://github.com/srid/nixci [nix-darwin] !: https://nixos.asia/en/nix-darwin [nixos] !: https://nixos.asia/en/nixos [label] !: https://docs.github.com/en/actions/hosting-your-own-runners/managing-self-hosted-runners/using-labels-with-self-hosted-runners [system] !: https://flake.parts/system [gh-runner] !: https://docs.github.com/en/actions/hosting-your-own-runners/managing-self-hosted-runners/about-self-hosted-runners [pac] !: https://docs.github.com/en/authentication/keeping-your-account-and-data-secure/managing-your-personal-access-tokens#creating-a-fine-grained-personal-access-token [ragenix] !: https://github.com/yaxitech/ragenix [flake-parts] !: https://nixos.asia/en/flake-parts
[^wrap] !: Our module wraps the upstream NixOS and nix-darwin modules, whilst providing a platform-independent module interface, in addition to wiring up anything else required (users, secrets) to get going easily.