infrastructure/flake.nix

93 lines
3.1 KiB
Nix
Raw Normal View History

2021-10-13 16:49:41 +02:00
{
description = "Delft Deployment";
# Based on:
# * https://github.com/serokell/pegasus-infra/blob/master/flake.nix
# * https://git.voidcorp.nl/j00lz/nixos-configs/src/branch/main/flake.nix
2021-11-16 21:52:43 +01:00
2021-11-16 16:28:55 +01:00
inputs = {
deploy-rs.url = "github:serokell/deploy-rs";
2021-11-21 19:30:19 +01:00
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable-small";
2021-11-16 16:28:55 +01:00
serokell-nix.url = "github:serokell/serokell.nix";
vault-secrets.url = "github:serokell/vault-secrets";
};
2021-10-13 16:49:41 +02:00
2021-11-17 00:55:01 +01:00
outputs =
{ self, nixpkgs, deploy-rs, vault-secrets, serokell-nix, ... }@inputs:
2021-11-16 21:52:43 +01:00
let
inherit (nixpkgs) lib;
2021-11-21 19:30:19 +01:00
inherit (builtins) filter mapAttrs;
2021-11-16 21:52:43 +01:00
system = "x86_64-linux";
2021-11-21 19:30:19 +01:00
hosts = import ./hosts.nix;
# Create a nixosConfiguration based on a foldername (nixname) and if the host is an LXC container or a VM.
2021-11-21 16:32:30 +01:00
mkConfig = { hostname, profile ? hostname, lxc ? true, ... }: {
"${profile}" = lib.nixosSystem {
2021-11-16 21:52:43 +01:00
inherit system;
modules =
2021-11-22 00:10:21 +01:00
[ ./nixos/common ./nixos/hosts/${profile}/configuration.nix ]
2021-11-21 14:35:09 +01:00
++ (if lxc then [
"${nixpkgs}/nixos/modules/virtualisation/lxc-container.nix"
./nixos/common/generic-lxc.nix
] else
[ ./nixos/common/generic-vm.nix ]);
2021-11-21 19:30:19 +01:00
specialArgs = { inherit hosts inputs; };
2021-11-16 16:28:55 +01:00
};
2021-10-17 21:02:20 +02:00
};
2021-10-18 18:54:07 +02:00
# Same as above, but for the nodes part of deploy.
2021-11-21 16:32:30 +01:00
mkDeploy = { ip, hostname, profile ? hostname, ... }: {
"${hostname}" = {
hostname = ip;
fastConnection = true;
profiles.system = {
user = "root";
2021-11-21 19:30:19 +01:00
path = deploy-rs.lib.${system}.activate.nixos
self.nixosConfigurations.${profile};
2021-11-21 16:32:30 +01:00
};
};
2021-11-21 16:32:30 +01:00
};
2021-10-18 23:26:26 +02:00
# Import all nixos host definitions that are actual nix machines
2021-11-21 19:30:19 +01:00
nixHosts = filter ({ nix ? true, ... }: nix) hosts;
2021-11-22 00:10:21 +01:00
pkgs = serokell-nix.lib.pkgsWith nixpkgs.legacyPackages.${system}
[ vault-secrets.overlay ];
in {
# Make the config and deploy sets
2021-11-22 00:10:21 +01:00
nixosConfigurations = lib.foldr (el: acc: acc // mkConfig el) { } nixHosts;
2021-11-21 16:32:30 +01:00
deploy.nodes = lib.foldr (el: acc: acc // mkDeploy el) { } nixHosts;
2021-11-03 22:55:03 +01:00
2021-11-22 00:10:21 +01:00
apps.x86_64-linux.vault-push-approles = {
type = "app";
program = "${pkgs.vault-push-approles self}/bin/vault-push-approles";
};
apps.x86_64-linux.vault-push-approle-envs = {
type = "app";
program =
"${pkgs.vault-push-approle-envs self}/bin/vault-push-approle-envs";
};
2021-11-16 21:52:43 +01:00
# Use by running `nix develop`
2021-11-22 00:10:21 +01:00
devShell.${system} = pkgs.mkShell {
2021-11-20 23:41:11 +01:00
VAULT_ADDR = "http://10.42.42.6:8200/";
2021-11-21 16:32:30 +01:00
# This only support bash so just execute zsh in bash as a workaround :/
buildInputs = with pkgs; [
2021-11-16 16:28:55 +01:00
deploy-rs.packages.${system}.deploy-rs
fluxcd
k9s
kubectl
kubectx
2021-11-21 16:32:30 +01:00
terraform
nixfmt
nixUnstable
vault
2021-11-22 00:10:21 +01:00
(vault-push-approle-envs self { })
(vault-push-approles self { })
2021-11-16 16:28:55 +01:00
];
};
2021-11-23 14:26:40 +01:00
checks = mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) deploy-rs.lib;
2021-11-16 16:28:55 +01:00
};
2021-10-13 16:49:41 +02:00
}