raito
76276a8da3
This is the first Lix machine we are enrolling in our infrastructure (!). It's using all the previous commits to make it cozy with our current infra style. Signed-off-by: Raito Bezarius <masterancpp@gmail.com>
196 lines
6.4 KiB
Nix
196 lines
6.4 KiB
Nix
{
|
|
description = "Bagel cooking infrastructure";
|
|
|
|
inputs = {
|
|
nixpkgs.url = "github:NixOS/nixpkgs/nixpkgs-unstable";
|
|
|
|
terranix.url = "github:terranix/terranix";
|
|
terranix.inputs.nixpkgs.follows = "nixpkgs";
|
|
|
|
agenix.url = "github:ryantm/agenix";
|
|
agenix.inputs.nixpkgs.follows = "nixpkgs";
|
|
|
|
colmena.url = "github:zhaofengli/colmena";
|
|
colmena.inputs.nixpkgs.follows = "nixpkgs";
|
|
|
|
hydra.url = "git+https://git.lix.systems/lix-project/hydra.git";
|
|
hydra.inputs.nixpkgs.follows = "nixpkgs";
|
|
|
|
nix-gerrit.url = "git+https://git.lix.systems/the-distro/nix-gerrit.git";
|
|
nix-gerrit.inputs.nixpkgs.follows = "nixpkgs";
|
|
|
|
gerrit-dashboard.url = "git+https://git.lix.systems/the-distro/gerrit-monitoring.git";
|
|
gerrit-dashboard.flake = false;
|
|
|
|
buildbot-nix.url = "git+https://git.lix.systems/lix-project/buildbot-nix.git?ref=refs/heads/forkos";
|
|
buildbot-nix.inputs.nixpkgs.follows = "nixpkgs";
|
|
|
|
channel-scripts.url = "git+https://git.lix.systems/the-distro/channel-scripts.git";
|
|
channel-scripts.inputs.nixpkgs.follows = "nixpkgs";
|
|
|
|
stateless-uptime-kuma.url = "git+https://git.dgnum.eu/DGNum/stateless-uptime-kuma.git";
|
|
stateless-uptime-kuma.flake = false;
|
|
|
|
lix.follows = "hydra/lix";
|
|
|
|
grapevine = {
|
|
type = "gitlab";
|
|
host = "gitlab.computer.surgery";
|
|
owner = "matrix";
|
|
repo = "grapevine-fork";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
};
|
|
|
|
outputs = { self, nixpkgs, terranix, colmena, ... } @ inputs:
|
|
let
|
|
supportedSystems = [ "x86_64-linux" "aarch64-linux" ];
|
|
forEachSystem = f: builtins.listToAttrs (map (system: {
|
|
name = system;
|
|
value = f system;
|
|
}) supportedSystems);
|
|
systemBits = forEachSystem (system: rec {
|
|
inherit system;
|
|
pkgs = import nixpkgs {
|
|
localSystem = system;
|
|
overlays = [
|
|
inputs.hydra.overlays.default
|
|
inputs.lix.overlays.default
|
|
inputs.nix-gerrit.overlays.default
|
|
inputs.channel-scripts.overlays.default
|
|
(import "${inputs.stateless-uptime-kuma}/overlay.nix")
|
|
];
|
|
};
|
|
terraform = pkgs.opentofu;
|
|
terraformCfg = terranix.lib.terranixConfiguration {
|
|
inherit system;
|
|
modules = [
|
|
./terraform
|
|
{
|
|
bagel.dnsimple.enable = true;
|
|
bagel.hydra.enable = true;
|
|
}
|
|
];
|
|
};
|
|
});
|
|
forEachSystem' = f: forEachSystem (system: (f systemBits.${system}));
|
|
inherit (nixpkgs) lib;
|
|
in
|
|
{
|
|
apps = forEachSystem' ({ system, pkgs, terraformCfg, terraform, ... }: {
|
|
tf = {
|
|
type = "app";
|
|
program = toString (pkgs.writers.writeBash "tf" ''
|
|
set -eo pipefail
|
|
ln -snf ${terraformCfg} config.tf.json
|
|
exec ${lib.getExe terraform} "$@"
|
|
'');
|
|
};
|
|
|
|
default = self.apps.${system}.tf;
|
|
});
|
|
|
|
devShells = forEachSystem' ({ system, pkgs, ... }: {
|
|
default = pkgs.mkShell {
|
|
packages = [
|
|
inputs.agenix.packages.${system}.agenix
|
|
|
|
pkgs.opentofu
|
|
|
|
(pkgs.callPackage ./lib/colmena-wrapper.nix { })
|
|
];
|
|
};
|
|
});
|
|
|
|
nixosConfigurations = (colmena.lib.makeHive self.outputs.colmena).nodes;
|
|
|
|
colmena = let
|
|
commonModules = [
|
|
inputs.agenix.nixosModules.default
|
|
inputs.hydra.nixosModules.hydra
|
|
inputs.buildbot-nix.nixosModules.buildbot-coordinator
|
|
inputs.buildbot-nix.nixosModules.buildbot-worker
|
|
|
|
./services
|
|
./common
|
|
];
|
|
|
|
floralInfraModules = commonModules ++ [
|
|
({ config, lib, ... }: {
|
|
# This means that anyone with @floral-infra permissions
|
|
# can ssh on root of every machines handled here.
|
|
bagel.admins.allowedGroups = [
|
|
"floral-infra"
|
|
];
|
|
|
|
# Tag all machines which have local boot as local bootables.
|
|
deployment.tags = lib.mkIf (config.bagel.baremetal.builders.enable -> !config.bagel.baremetal.builders.netboot)
|
|
[ "localboot" ];
|
|
|
|
bagel.monitoring.grafana-agent.tenant = "floral";
|
|
bagel.secrets.tenant = "floral";
|
|
bagel.builders.extra-build-capacity.provider.tenant = "floral";
|
|
})
|
|
];
|
|
|
|
# These are Floral baremetal builders.
|
|
makeBuilder = i:
|
|
let
|
|
enableNetboot = i >= 6;
|
|
in
|
|
lib.nameValuePair "builder-${toString i}" {
|
|
imports = floralInfraModules;
|
|
bagel.baremetal.builders = { enable = true; num = i; netboot = enableNetboot; };
|
|
};
|
|
|
|
lixInfraModules = commonModules ++ [
|
|
{
|
|
# This means that anyone with @lix-infra permissions
|
|
# can ssh on root of every machines handled here.
|
|
bagel.admins.allowedGroups = [
|
|
"lix-infra"
|
|
];
|
|
|
|
# Tag all machines which have local boot as local bootables.
|
|
# Lix has no netbootable machine.
|
|
deployment.tags = [ "localboot" ];
|
|
|
|
|
|
bagel.monitoring.grafana-agent.tenant = "lix";
|
|
bagel.secrets.tenant = "lix";
|
|
bagel.builders.extra-build-capacity.provider.tenant = "lix";
|
|
}
|
|
];
|
|
|
|
builders = lib.listToAttrs (lib.genList makeBuilder 11);
|
|
in {
|
|
meta.nixpkgs = systemBits.x86_64-linux.pkgs;
|
|
# Add any non-x86_64 native systems here.
|
|
# Cross compilation is not supported yet.
|
|
meta.nodeNixpkgs =
|
|
let
|
|
aarch64-systems = systems: lib.genAttrs systems (system: systemBits.aarch64-linux.pkgs);
|
|
in
|
|
aarch64-systems [
|
|
"build01-aarch64-lix"
|
|
];
|
|
meta.specialArgs.inputs = inputs;
|
|
|
|
bagel-box.imports = floralInfraModules ++ [ ./hosts/bagel-box ];
|
|
meta01.imports = floralInfraModules ++ [ ./hosts/meta01 ];
|
|
gerrit01.imports = floralInfraModules ++ [ ./hosts/gerrit01 ];
|
|
fodwatch.imports = floralInfraModules ++ [ ./hosts/fodwatch ];
|
|
git.imports = floralInfraModules ++ [ ./hosts/git ];
|
|
wob-vpn-gw.imports = floralInfraModules ++ [ ./hosts/wob-vpn-gw ];
|
|
buildbot.imports = floralInfraModules ++ [ ./hosts/buildbot ];
|
|
public01.imports = floralInfraModules ++ [ ./hosts/public01 ];
|
|
build-coord.imports = floralInfraModules ++ [ ./hosts/build-coord ];
|
|
|
|
build01-aarch64-lix.imports = lixInfraModules ++ [ ./hosts/build01-aarch64-lix ];
|
|
} // builders;
|
|
|
|
hydraJobs = builtins.mapAttrs (n: v: v.config.system.build.netbootDir or v.config.system.build.toplevel) self.nixosConfigurations;
|
|
buildbotJobs = builtins.mapAttrs (_: v: v.config.system.build.toplevel) self.nixosConfigurations;
|
|
};
|
|
}
|