{ description = "Bagel cooking infrastructure"; inputs = { nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable"; terranix.url = "github:terranix/terranix"; terranix.inputs.nixpkgs.follows = "nixpkgs"; agenix.url = "github:ryantm/agenix"; agenix.inputs.nixpkgs.follows = "nixpkgs"; colmena.url = "github:zhaofengli/colmena"; colmena.inputs.nixpkgs.follows = "nixpkgs"; hydra.url = "git+https://git.lix.systems/lix-project/hydra.git"; hydra.inputs.nixpkgs.follows = "nixpkgs"; nix-gerrit.url = "git+https://git.lix.systems/the-distro/nix-gerrit.git?ref=refs/heads/bump-minor-3_10"; nix-gerrit.inputs.nixpkgs.follows = "nixpkgs"; ofborg.url = "git+https://git.lix.systems/the-distro/ofborg.git"; ofborg.inputs.nixpkgs.follows = "nixpkgs"; gerrit-dashboard.url = "git+https://git.lix.systems/the-distro/gerrit-monitoring.git"; gerrit-dashboard.flake = false; buildbot-nix.url = "git+https://git.lix.systems/lix-project/buildbot-nix.git?ref=refs/heads/forkos"; buildbot-nix.inputs.nixpkgs.follows = "nixpkgs"; channel-scripts.url = "git+https://git.lix.systems/the-distro/channel-scripts.git"; channel-scripts.inputs.nixpkgs.follows = "nixpkgs"; stateless-uptime-kuma.url = "git+https://git.dgnum.eu/DGNum/stateless-uptime-kuma.git"; stateless-uptime-kuma.flake = false; lix.follows = "hydra/lix"; grapevine = { type = "gitlab"; host = "gitlab.computer.surgery"; owner = "matrix"; repo = "grapevine-fork"; inputs.nixpkgs.follows = "nixpkgs"; }; }; outputs = { self, nixpkgs, terranix, colmena, ... } @ inputs: let supportedSystems = [ "x86_64-linux" "aarch64-linux" ]; forEachSystem = f: builtins.listToAttrs (map (system: { name = system; value = f system; }) supportedSystems); systemBits = forEachSystem (system: rec { inherit system; pkgs = import nixpkgs { localSystem = system; overlays = [ inputs.hydra.overlays.default inputs.lix.overlays.default inputs.nix-gerrit.overlays.default inputs.channel-scripts.overlays.default (super: self: { inherit (inputs.ofborg.packages.${system}) ofborg; }) (import "${inputs.stateless-uptime-kuma}/overlay.nix") ]; }; terraform = pkgs.opentofu; terraformCfg = terranix.lib.terranixConfiguration { inherit system; modules = [ ./terraform { bagel.dnsimple.enable = true; bagel.hydra.enable = true; } ]; }; }); forEachSystem' = f: forEachSystem (system: (f systemBits.${system})); inherit (nixpkgs) lib; in { apps = forEachSystem' ({ system, pkgs, terraformCfg, terraform, ... }: { tf = { type = "app"; program = toString (pkgs.writers.writeBash "tf" '' set -eo pipefail ln -snf ${terraformCfg} config.tf.json exec ${lib.getExe terraform} "$@" ''); }; default = self.apps.${system}.tf; }); devShells = forEachSystem' ({ system, pkgs, ... }: { default = pkgs.mkShell { packages = [ inputs.agenix.packages.${system}.agenix pkgs.opentofu (pkgs.callPackage ./lib/colmena-wrapper.nix { }) ]; }; }); nixosConfigurations = (colmena.lib.makeHive self.outputs.colmena).nodes; colmena = let commonModules = [ inputs.agenix.nixosModules.default inputs.hydra.nixosModules.hydra inputs.buildbot-nix.nixosModules.buildbot-coordinator inputs.buildbot-nix.nixosModules.buildbot-worker ./services ./common ]; floralInfraModules = commonModules ++ [ ({ config, lib, ... }: { # This means that anyone with @floral-infra permissions # can ssh on root of every machines handled here. bagel.admins.allowedGroups = [ "floral-infra" ]; # Tag all machines which have local boot as local bootables. deployment.tags = lib.mkMerge [ [ "floral" ] (lib.mkIf (config.bagel.baremetal.builders.enable -> !config.bagel.baremetal.builders.netboot) [ "localboot" ] ) ]; bagel.monitoring.grafana-agent.tenant = "floral"; bagel.secrets.tenant = "floral"; bagel.builders.extra-build-capacity.provider.tenant = "floral"; bagel.services.buildbot.tenant = "floral"; }) ]; # These are Floral baremetal builders. makeBuilder = i: let enableNetboot = i >= 6; in lib.nameValuePair "builder-${toString i}" { imports = floralInfraModules; bagel.baremetal.builders = { enable = true; num = i; netboot = enableNetboot; }; }; lixInfraModules = commonModules ++ [ { # This means that anyone with @lix-infra permissions # can ssh on root of every machines handled here. bagel.admins.allowedGroups = [ "lix-infra" ]; # Tag all machines which have local boot as local bootables. # Lix has no netbootable machine. deployment.tags = [ "localboot" "lix" ]; bagel.monitoring.grafana-agent.tenant = "lix"; bagel.secrets.tenant = "lix"; bagel.builders.extra-build-capacity.provider = { tenant = "lix"; buildfarmPublicKeys = [ # buildbot.lix.systems SSH key "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDu4cEqZzAI/1vZjSQkTJ4ijIg9nuloOuSKUrnkJIOFn" ]; }; bagel.services.buildbot.tenant = "lix"; } ]; builders = lib.listToAttrs (map makeBuilder [4 5 10 11]); in { meta.nixpkgs = systemBits.x86_64-linux.pkgs; # Add any non-x86_64 native systems here. # Cross compilation is not supported yet. meta.nodeNixpkgs = let aarch64-systems = systems: lib.genAttrs systems (system: systemBits.aarch64-linux.pkgs); in aarch64-systems [ "build01-aarch64-lix" ]; meta.specialArgs.inputs = inputs; bagel-box.imports = floralInfraModules ++ [ ./hosts/bagel-box ]; meta01.imports = floralInfraModules ++ [ ./hosts/meta01 ]; gerrit01.imports = floralInfraModules ++ [ ./hosts/gerrit01 ]; fodwatch.imports = floralInfraModules ++ [ ./hosts/fodwatch ]; git.imports = floralInfraModules ++ [ ./hosts/git ]; wob-vpn-gw.imports = floralInfraModules ++ [ ./hosts/wob-vpn-gw ]; buildbot.imports = floralInfraModules ++ [ ./hosts/buildbot ]; public01.imports = floralInfraModules ++ [ ./hosts/public01 ]; build-coord.imports = floralInfraModules ++ [ ./hosts/build-coord ]; build01-aarch64-lix.imports = lixInfraModules ++ [ ./hosts/build01-aarch64-lix ]; buildbot-lix.imports = lixInfraModules ++ [ ./hosts/buildbot-lix ]; } // builders; hydraJobs = builtins.mapAttrs (n: v: v.config.system.build.netbootDir or v.config.system.build.toplevel) self.nixosConfigurations; buildbotJobs = builtins.mapAttrs (_: v: v.config.system.build.toplevel) self.nixosConfigurations; }; }