emily
4e87e35bb5
It has been a recurring issue that flake lockfile bumps in this repo here make the forgejo patches no longer apply. The dedicated repository (nix-forgejo) solves this by not overriding the existing forgejo derivation from nixpkgs but rather having its own. Additionally, nix-forgejo pins and uses a "known good" nixpkgs revision itself, unless `pkgs` is passed on import. So if issues should arise after a flake bump, we can use that revision by modifying our import statement, or we can rollback the nix-forgejo revision itself. Moving forgejo out of tree also makes iterating on it a lot easier and opens a lot of other possibilities :)
217 lines
7.3 KiB
Nix
217 lines
7.3 KiB
Nix
{
|
|
description = "Bagel cooking infrastructure";
|
|
|
|
inputs = {
|
|
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable";
|
|
|
|
terranix.url = "github:terranix/terranix";
|
|
terranix.inputs.nixpkgs.follows = "nixpkgs";
|
|
|
|
agenix.url = "github:ryantm/agenix";
|
|
agenix.inputs.nixpkgs.follows = "nixpkgs";
|
|
|
|
colmena.url = "github:zhaofengli/colmena";
|
|
colmena.inputs.nixpkgs.follows = "nixpkgs";
|
|
|
|
hydra.url = "git+https://git.lix.systems/lix-project/hydra.git";
|
|
hydra.inputs.nixpkgs.follows = "nixpkgs";
|
|
|
|
nix-gerrit.url = "git+https://git.lix.systems/the-distro/nix-gerrit.git?ref=refs/heads/bump-minor-3_10";
|
|
nix-gerrit.inputs.nixpkgs.follows = "nixpkgs";
|
|
|
|
nix-forgejo.url = "git+https://git.lix.systems/the-distro/nix-forgejo.git";
|
|
nix-forgejo.flake = false;
|
|
|
|
ofborg.url = "git+https://git.lix.systems/the-distro/ofborg.git?ref=refs/heads/vcs-generalization";
|
|
ofborg.flake = false;
|
|
|
|
gerrit-dashboard.url = "git+https://git.lix.systems/the-distro/gerrit-monitoring.git";
|
|
gerrit-dashboard.flake = false;
|
|
|
|
buildbot-nix.url = "git+https://git.lix.systems/lix-project/buildbot-nix.git?ref=refs/heads/forkos";
|
|
buildbot-nix.inputs.nixpkgs.follows = "nixpkgs";
|
|
|
|
channel-scripts.url = "git+https://git.lix.systems/the-distro/channel-scripts.git";
|
|
channel-scripts.inputs.nixpkgs.follows = "nixpkgs";
|
|
|
|
stateless-uptime-kuma.url = "git+https://git.dgnum.eu/DGNum/stateless-uptime-kuma.git";
|
|
stateless-uptime-kuma.flake = false;
|
|
|
|
lix.follows = "hydra/lix";
|
|
|
|
grapevine = {
|
|
type = "gitlab";
|
|
host = "gitlab.computer.surgery";
|
|
owner = "matrix";
|
|
repo = "grapevine-fork";
|
|
inputs.nixpkgs.follows = "nixpkgs";
|
|
};
|
|
};
|
|
|
|
outputs = { self, nixpkgs, terranix, colmena, ofborg, ... } @ inputs:
|
|
let
|
|
supportedSystems = [ "x86_64-linux" "aarch64-linux" ];
|
|
forEachSystem = f: builtins.listToAttrs (map (system: {
|
|
name = system;
|
|
value = f system;
|
|
}) supportedSystems);
|
|
systemBits = forEachSystem (system: rec {
|
|
inherit system;
|
|
pkgs = import nixpkgs {
|
|
localSystem = system;
|
|
overlays = [
|
|
inputs.hydra.overlays.default
|
|
inputs.lix.overlays.default
|
|
inputs.nix-gerrit.overlays.default
|
|
inputs.channel-scripts.overlays.default
|
|
(import inputs.ofborg {
|
|
pkgs = import nixpkgs { localSystem = system; };
|
|
}).overlay
|
|
(import "${inputs.stateless-uptime-kuma}/overlay.nix")
|
|
];
|
|
};
|
|
terraform = pkgs.opentofu;
|
|
terraformCfg = terranix.lib.terranixConfiguration {
|
|
inherit system;
|
|
modules = [
|
|
./terraform
|
|
{
|
|
bagel.dnsimple.enable = true;
|
|
bagel.hydra.enable = true;
|
|
}
|
|
];
|
|
};
|
|
});
|
|
forEachSystem' = f: forEachSystem (system: (f systemBits.${system}));
|
|
inherit (nixpkgs) lib;
|
|
in
|
|
{
|
|
apps = forEachSystem' ({ system, pkgs, terraformCfg, terraform, ... }: {
|
|
tf = {
|
|
type = "app";
|
|
program = toString (pkgs.writers.writeBash "tf" ''
|
|
set -eo pipefail
|
|
ln -snf ${terraformCfg} config.tf.json
|
|
exec ${lib.getExe terraform} "$@"
|
|
'');
|
|
};
|
|
|
|
default = self.apps.${system}.tf;
|
|
});
|
|
|
|
devShells = forEachSystem' ({ system, pkgs, ... }: {
|
|
default = pkgs.mkShell {
|
|
packages = [
|
|
inputs.agenix.packages.${system}.agenix
|
|
|
|
pkgs.opentofu
|
|
|
|
(pkgs.callPackage ./lib/colmena-wrapper.nix { })
|
|
];
|
|
};
|
|
});
|
|
|
|
nixosConfigurations = (colmena.lib.makeHive self.outputs.colmena).nodes;
|
|
|
|
colmena = let
|
|
commonModules = [
|
|
inputs.agenix.nixosModules.default
|
|
inputs.hydra.nixosModules.hydra
|
|
inputs.buildbot-nix.nixosModules.buildbot-coordinator
|
|
inputs.buildbot-nix.nixosModules.buildbot-worker
|
|
|
|
./services
|
|
./common
|
|
];
|
|
|
|
floralInfraModules = commonModules ++ [
|
|
({ config, lib, ... }: {
|
|
# This means that anyone with @floral-infra permissions
|
|
# can ssh on root of every machines handled here.
|
|
bagel.admins.allowedGroups = [
|
|
"floral-infra"
|
|
];
|
|
|
|
# Tag all machines which have local boot as local bootables.
|
|
deployment.tags = lib.mkMerge [
|
|
[ "floral" ]
|
|
(lib.mkIf (config.bagel.baremetal.builders.enable -> !config.bagel.baremetal.builders.netboot)
|
|
[ "localboot" ]
|
|
)
|
|
];
|
|
|
|
bagel.monitoring.grafana-agent.tenant = "floral";
|
|
bagel.secrets.tenant = "floral";
|
|
bagel.builders.extra-build-capacity.provider.tenant = "floral";
|
|
bagel.services.buildbot.tenant = "floral";
|
|
})
|
|
];
|
|
|
|
# These are Floral baremetal builders.
|
|
makeBuilder = i:
|
|
let
|
|
enableNetboot = i >= 6;
|
|
in
|
|
lib.nameValuePair "builder-${toString i}" {
|
|
imports = floralInfraModules;
|
|
bagel.baremetal.builders = { enable = true; num = i; netboot = enableNetboot; };
|
|
};
|
|
|
|
lixInfraModules = commonModules ++ [
|
|
{
|
|
# This means that anyone with @lix-infra permissions
|
|
# can ssh on root of every machines handled here.
|
|
bagel.admins.allowedGroups = [
|
|
"lix-infra"
|
|
];
|
|
|
|
# Tag all machines which have local boot as local bootables.
|
|
# Lix has no netbootable machine.
|
|
deployment.tags = [ "localboot" "lix" ];
|
|
|
|
bagel.monitoring.grafana-agent.tenant = "lix";
|
|
bagel.secrets.tenant = "lix";
|
|
bagel.builders.extra-build-capacity.provider = {
|
|
tenant = "lix";
|
|
buildfarmPublicKeys = [
|
|
# buildbot.lix.systems SSH key
|
|
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIDu4cEqZzAI/1vZjSQkTJ4ijIg9nuloOuSKUrnkJIOFn"
|
|
];
|
|
};
|
|
bagel.services.buildbot.tenant = "lix";
|
|
}
|
|
];
|
|
|
|
builders = lib.listToAttrs (map makeBuilder [4 5 10 11]);
|
|
in {
|
|
meta.nixpkgs = systemBits.x86_64-linux.pkgs;
|
|
# Add any non-x86_64 native systems here.
|
|
# Cross compilation is not supported yet.
|
|
meta.nodeNixpkgs =
|
|
let
|
|
aarch64-systems = systems: lib.genAttrs systems (system: systemBits.aarch64-linux.pkgs);
|
|
in
|
|
aarch64-systems [
|
|
"build01-aarch64-lix"
|
|
];
|
|
meta.specialArgs.inputs = inputs;
|
|
|
|
bagel-box.imports = floralInfraModules ++ [ ./hosts/bagel-box ];
|
|
meta01.imports = floralInfraModules ++ [ ./hosts/meta01 ];
|
|
gerrit01.imports = floralInfraModules ++ [ ./hosts/gerrit01 ];
|
|
fodwatch.imports = floralInfraModules ++ [ ./hosts/fodwatch ];
|
|
git.imports = floralInfraModules ++ [ ./hosts/git ];
|
|
wob-vpn-gw.imports = floralInfraModules ++ [ ./hosts/wob-vpn-gw ];
|
|
buildbot.imports = floralInfraModules ++ [ ./hosts/buildbot ];
|
|
public01.imports = floralInfraModules ++ [ ./hosts/public01 ];
|
|
build-coord.imports = floralInfraModules ++ [ ./hosts/build-coord ];
|
|
|
|
build01-aarch64-lix.imports = lixInfraModules ++ [ ./hosts/build01-aarch64-lix ];
|
|
buildbot-lix.imports = lixInfraModules ++ [ ./hosts/buildbot-lix ];
|
|
} // builders;
|
|
|
|
hydraJobs = builtins.mapAttrs (n: v: v.config.system.build.netbootDir or v.config.system.build.toplevel) self.nixosConfigurations;
|
|
buildbotJobs = builtins.mapAttrs (_: v: v.config.system.build.toplevel) self.nixosConfigurations;
|
|
};
|
|
}
|