chore: Refactor meta to a module architecture
Get rid of the weird half nix half module stuff.
This commit is contained in:
parent
380f65560b
commit
fdb602d30e
37 changed files with 749 additions and 694 deletions
|
@ -98,7 +98,7 @@ The general metadata is declared in `meta/nodes.nix`, the main values to declare
|
||||||
Create the directory `secrets` in the configuration folder, and add a `secrets.nix` file containing :
|
Create the directory `secrets` in the configuration folder, and add a `secrets.nix` file containing :
|
||||||
|
|
||||||
```nix
|
```nix
|
||||||
(import ../../../keys).mkSecrets [ "host02" ] [
|
(import ../../../keys.nix).mkSecrets [ "host02" ] [
|
||||||
# List of secrets for host02
|
# List of secrets for host02
|
||||||
]
|
]
|
||||||
```
|
```
|
||||||
|
|
|
@ -4,8 +4,8 @@
|
||||||
# SPDX-License-Identifier: EUPL-1.2
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
|
|
||||||
{
|
{
|
||||||
sources ? import ./npins,
|
sources ? import ./sources.nix,
|
||||||
pkgs ? import sources.nixpkgs { },
|
pkgs ? sources.bootstrapNixpkgs,
|
||||||
}:
|
}:
|
||||||
|
|
||||||
let
|
let
|
||||||
|
|
80
hive.nix
80
hive.nix
|
@ -4,44 +4,33 @@
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: EUPL-1.2
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
|
|
||||||
|
# TODO: change comments to ### \n # [text] \n #
|
||||||
|
|
||||||
let
|
let
|
||||||
sources' = import ./npins;
|
### Init some tooling
|
||||||
|
|
||||||
# Patch sources directly
|
sources = import ./sources.nix;
|
||||||
sources = builtins.mapAttrs (patch.base { pkgs = import sources'.nixos-unstable { }; })
|
|
||||||
.applyPatches' sources';
|
inherit (sources) bootstrapNixpkgs;
|
||||||
|
|
||||||
|
lib = bootstrapNixpkgs.lib.extend (_: _: {
|
||||||
|
extra = import ./lib/nix-lib;
|
||||||
|
});
|
||||||
|
|
||||||
|
nix-lib = lib.extra; # TODO: Assess perf penalty of fixed point
|
||||||
|
# TODO same but using bootstrapnixpkgs for nix-lib instanciation
|
||||||
|
# original statement: import ./lib/nix-lib;
|
||||||
|
|
||||||
nix-lib = import ./lib/nix-lib;
|
|
||||||
inherit (nix-lib) mapSingleFuse;
|
inherit (nix-lib) mapSingleFuse;
|
||||||
|
|
||||||
patch = import ./lib/nix-patches { patchFile = ./patches; };
|
### Let's build meta
|
||||||
|
meta = (import ./meta) lib;
|
||||||
|
|
||||||
nodes' = import ./meta/nodes;
|
nodes = builtins.attrNames meta.nodes;
|
||||||
nodes = builtins.attrNames nodes';
|
|
||||||
|
|
||||||
mkNode = node: {
|
### Nixpkgs instanciation
|
||||||
deployment.systemType = system node;
|
|
||||||
};
|
|
||||||
|
|
||||||
nixpkgs' = import ./meta/nixpkgs.nix;
|
nixpkgs' = import ./meta/nixpkgs.nix;
|
||||||
# All supported nixpkgs versions × systems, instanciated
|
|
||||||
nixpkgs = mapSingleFuse (s: mapSingleFuse (mkSystemNixpkgs s) nixpkgs'.versions) nixpkgs'.systems;
|
|
||||||
|
|
||||||
# Get the configured nixos version for the node,
|
|
||||||
# defaulting to the one defined in meta/nixpkgs
|
|
||||||
version = node: nodes'.${node}.nixpkgs.version;
|
|
||||||
system = node: nodes'.${node}.nixpkgs.system;
|
|
||||||
category = node: nixpkgs'.categories.${system node};
|
|
||||||
|
|
||||||
nodePkgs = node: nixpkgs.${system node}.${version node};
|
|
||||||
|
|
||||||
# Builds a patched version of nixpkgs, only as the source
|
|
||||||
mkNixpkgs' =
|
|
||||||
v:
|
|
||||||
patch.mkNixpkgsSrc rec {
|
|
||||||
src = sources'.${name};
|
|
||||||
name = "nixos-${v}";
|
|
||||||
};
|
|
||||||
|
|
||||||
# Build up the nixpkgs configuration for Liminix embedded systems
|
# Build up the nixpkgs configuration for Liminix embedded systems
|
||||||
mkLiminixConfig =
|
mkLiminixConfig =
|
||||||
|
@ -57,20 +46,34 @@ let
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
||||||
# Build up the arguments to instantiate a nixpkgs given a system and a version.
|
# Build up the arguments to instantiate a nixpkgs given a system and a version.
|
||||||
mkNixpkgsConfig =
|
mkNixpkgsConfig =
|
||||||
system:
|
system:
|
||||||
{
|
{
|
||||||
nixos = _: { };
|
nixos = _: { }; # TODO: add nix-pkgs overlay here
|
||||||
zyxel-nwa50ax = mkLiminixConfig system;
|
zyxel-nwa50ax = mkLiminixConfig system;
|
||||||
netconf = _: { };
|
netconf = _: { };
|
||||||
}
|
}
|
||||||
.${system} or (throw "Unknown system: ${system} for nixpkgs configuration instantiation");
|
.${system} or (throw "Unknown system: ${system} for nixpkgs configuration instantiation");
|
||||||
|
|
||||||
# Instanciates the required nixpkgs version
|
# Instanciates the required nixpkgs version
|
||||||
mkSystemNixpkgs = system: version: import (mkNixpkgs' version) (mkNixpkgsConfig system version);
|
mkSystemNixpkgs = system: version:
|
||||||
|
import sources."nixos-${version}" (mkNixpkgsConfig system version);
|
||||||
|
|
||||||
###
|
# All supported nixpkgs versions × systems, instanciated
|
||||||
|
nixpkgs = mapSingleFuse (s: mapSingleFuse (mkSystemNixpkgs s) nixpkgs'.versions) nixpkgs'.systems;
|
||||||
|
|
||||||
|
|
||||||
|
# Get the configured nixos version for the node,
|
||||||
|
# defaulting to the one defined in meta/nixpkgs
|
||||||
|
version = node: meta.nodes.${node}.nixpkgs.version;
|
||||||
|
system = node: meta.nodes.${node}.nixpkgs.system;
|
||||||
|
category = node: nixpkgs'.categories.${system node};
|
||||||
|
|
||||||
|
nodePkgs = node: nixpkgs.${system node}.${version node};
|
||||||
|
|
||||||
|
##########
|
||||||
# Function to create arguments based on the node
|
# Function to create arguments based on the node
|
||||||
#
|
#
|
||||||
mkArgs = node: rec {
|
mkArgs = node: rec {
|
||||||
|
@ -79,11 +82,19 @@ let
|
||||||
};
|
};
|
||||||
|
|
||||||
sourcePkgs = nodePkgs node;
|
sourcePkgs = nodePkgs node;
|
||||||
meta = (import ./meta) lib;
|
inherit meta;
|
||||||
|
|
||||||
nodeMeta = meta.nodes.${node};
|
nodeMeta = meta.nodes.${node};
|
||||||
nodePath = "machines/${category node}/${node}";
|
nodePath = "machines/${category node}/${node}";
|
||||||
};
|
};
|
||||||
|
|
||||||
|
##########
|
||||||
|
# Module for each node (quite empty since almost everything is in the default module)
|
||||||
|
#
|
||||||
|
mkNode = node: {
|
||||||
|
deployment.systemType = system node;
|
||||||
|
};
|
||||||
|
|
||||||
in
|
in
|
||||||
|
|
||||||
{
|
{
|
||||||
|
@ -94,7 +105,7 @@ in
|
||||||
specialArgs = {
|
specialArgs = {
|
||||||
inherit nixpkgs sources;
|
inherit nixpkgs sources;
|
||||||
|
|
||||||
dgn-keys = import ./keys;
|
dgn-keys = import ./lib/keys { inherit meta lib; };
|
||||||
};
|
};
|
||||||
|
|
||||||
nodeSpecialArgs = mapSingleFuse mkArgs nodes;
|
nodeSpecialArgs = mapSingleFuse mkArgs nodes;
|
||||||
|
@ -218,5 +229,6 @@ in
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
}
|
}
|
||||||
// (mapSingleFuse mkNode nodes)
|
// (mapSingleFuse mkNode nodes)
|
||||||
|
|
|
@ -5,9 +5,9 @@
|
||||||
{ lib, pkgs, ... }:
|
{ lib, pkgs, ... }:
|
||||||
|
|
||||||
let
|
let
|
||||||
dgn-keys = import ../keys;
|
dgn-keys = import ../keys.nix;
|
||||||
|
|
||||||
dgn-members = (import ../meta lib).organization.groups.root;
|
dgn-members = (import ../meta lib).config.organization.groups.root;
|
||||||
in
|
in
|
||||||
|
|
||||||
{
|
{
|
||||||
|
|
13
keys.nix
Normal file
13
keys.nix
Normal file
|
@ -0,0 +1,13 @@
|
||||||
|
# SPDX-FileCopyrightText: 2024 Tom Hubrecht <tom.hubrecht@dgnum.eu>
|
||||||
|
#
|
||||||
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
|
|
||||||
|
let
|
||||||
|
_sources = import ../npins;
|
||||||
|
|
||||||
|
inherit (import _sources.nixpkgs { }) lib;
|
||||||
|
|
||||||
|
meta = (import ../meta lib).config;
|
||||||
|
|
||||||
|
in
|
||||||
|
import ./lib/keys { inherit meta lib; }
|
|
@ -1,20 +1,15 @@
|
||||||
|
# SPDX-FileCopyrightText: 2024 Ryan Lahfa <ryan.lahfa@dgnum.eu>
|
||||||
# SPDX-FileCopyrightText: 2024 Tom Hubrecht <tom.hubrecht@dgnum.eu>
|
# SPDX-FileCopyrightText: 2024 Tom Hubrecht <tom.hubrecht@dgnum.eu>
|
||||||
|
# SPDX-FileContributor: Maurice Debray <maurice.debray@dgnum.eu>
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: EUPL-1.2
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
|
|
||||||
|
{ meta, lib }:
|
||||||
let
|
let
|
||||||
_sources = import ../npins;
|
inherit (import ../nix-lib) setDefault unique;
|
||||||
|
|
||||||
inherit (import _sources.nixpkgs { }) lib;
|
|
||||||
|
|
||||||
meta = import ../meta lib;
|
|
||||||
|
|
||||||
inherit (import ../lib/nix-lib) setDefault unique;
|
|
||||||
|
|
||||||
getAttr = lib.flip builtins.getAttr;
|
getAttr = lib.flip builtins.getAttr;
|
||||||
|
|
||||||
in
|
in
|
||||||
|
|
||||||
rec {
|
rec {
|
||||||
|
|
||||||
_memberKeys = builtins.mapAttrs (_: v: v.sshKeys) meta.organization.members;
|
_memberKeys = builtins.mapAttrs (_: v: v.sshKeys) meta.organization.members;
|
||||||
|
@ -42,7 +37,10 @@ rec {
|
||||||
|
|
||||||
mkSecrets = nodes: setDefault { publicKeys = unique (builtins.concatMap getNodeKeys' nodes); };
|
mkSecrets = nodes: setDefault { publicKeys = unique (builtins.concatMap getNodeKeys' nodes); };
|
||||||
|
|
||||||
machineKeysBySystem = system:
|
machineKeysBySystem =
|
||||||
|
system:
|
||||||
rootKeys
|
rootKeys
|
||||||
++ (getNodeKeys (builtins.attrNames (lib.filterAttrs (_: v: v.nixpkgs.system == system) meta.nodes)));
|
++ (getNodeKeys (
|
||||||
|
builtins.attrNames (lib.filterAttrs (_: v: v.nixpkgs.system == system) meta.nodes)
|
||||||
|
));
|
||||||
}
|
}
|
|
@ -2,6 +2,6 @@
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: EUPL-1.2
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
|
|
||||||
(import ../../../../keys).mkSecrets [ "bridge01" ] [
|
(import ../../../../keys.nix).mkSecrets [ "bridge01" ] [
|
||||||
# List of secrets for bridge01
|
# List of secrets for bridge01
|
||||||
]
|
]
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: EUPL-1.2
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
|
|
||||||
(import ../../../../../keys).mkSecrets [ "compute01" ] [
|
(import ../../../../../keys.nix).mkSecrets [ "compute01" ] [
|
||||||
"kanidm-password_admin"
|
"kanidm-password_admin"
|
||||||
"kanidm-password_idm_admin"
|
"kanidm-password_idm_admin"
|
||||||
]
|
]
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: EUPL-1.2
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
|
|
||||||
(import ../../../../keys).mkSecrets [ "compute01" ] [
|
(import ../../../../keys.nix).mkSecrets [ "compute01" ] [
|
||||||
# List of secrets for compute01
|
# List of secrets for compute01
|
||||||
"arkheon-env_file"
|
"arkheon-env_file"
|
||||||
"bupstash-put_key"
|
"bupstash-put_key"
|
||||||
|
|
|
@ -2,6 +2,6 @@
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: EUPL-1.2
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
|
|
||||||
(import ../../../../keys).mkSecrets [ "geo01" ] [
|
(import ../../../../keys.nix).mkSecrets [ "geo01" ] [
|
||||||
# List of secrets for geo01
|
# List of secrets for geo01
|
||||||
]
|
]
|
||||||
|
|
|
@ -2,6 +2,6 @@
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: EUPL-1.2
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
|
|
||||||
(import ../../../../keys).mkSecrets [ "geo02" ] [
|
(import ../../../../keys.nix).mkSecrets [ "geo02" ] [
|
||||||
# List of secrets for geo02
|
# List of secrets for geo02
|
||||||
]
|
]
|
||||||
|
|
|
@ -2,6 +2,6 @@
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifer: EUPL-1.2
|
# SPDX-License-Identifer: EUPL-1.2
|
||||||
|
|
||||||
(import ../../../../keys).mkSecrets [ "hypervisor01" ] [
|
(import ../../../../keys.nix).mkSecrets [ "hypervisor01" ] [
|
||||||
|
|
||||||
]
|
]
|
||||||
|
|
|
@ -2,6 +2,6 @@
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifer: EUPL-1.2
|
# SPDX-License-Identifer: EUPL-1.2
|
||||||
|
|
||||||
(import ../../../../keys).mkSecrets [ "hypervisor02" ] [
|
(import ../../../../keys.nix).mkSecrets [ "hypervisor02" ] [
|
||||||
|
|
||||||
]
|
]
|
||||||
|
|
|
@ -2,6 +2,6 @@
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifer: EUPL-1.2
|
# SPDX-License-Identifer: EUPL-1.2
|
||||||
|
|
||||||
(import ../../../../keys).mkSecrets [ "hypervisor03" ] [
|
(import ../../../../keys.nix).mkSecrets [ "hypervisor03" ] [
|
||||||
|
|
||||||
]
|
]
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: EUPL-1.2
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
|
|
||||||
(import ../../../../keys).mkSecrets [ "rescue01" ] [
|
(import ../../../../keys.nix).mkSecrets [ "rescue01" ] [
|
||||||
# List of secrets for rescue01
|
# List of secrets for rescue01
|
||||||
"stateless-uptime-kuma-password"
|
"stateless-uptime-kuma-password"
|
||||||
]
|
]
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: EUPL-1.2
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
|
|
||||||
(import ../../../../keys).mkSecrets [ "storage01" ] [
|
(import ../../../../keys.nix).mkSecrets [ "storage01" ] [
|
||||||
# List of secrets for storage01
|
# List of secrets for storage01
|
||||||
"bupstash-put_key"
|
"bupstash-put_key"
|
||||||
"forgejo-mailer_password_file"
|
"forgejo-mailer_password_file"
|
||||||
|
|
|
@ -2,6 +2,6 @@
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifer: EUPL-1.2
|
# SPDX-License-Identifer: EUPL-1.2
|
||||||
|
|
||||||
(import ../../../../keys).mkSecrets [ "tower01" ] [
|
(import ../../../../keys.nix).mkSecrets [ "tower01" ] [
|
||||||
|
|
||||||
]
|
]
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: EUPL-1.2
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
|
|
||||||
(import ../../../../keys).mkSecrets [ "vault01" ] [
|
(import ../../../../keys.nix).mkSecrets [ "vault01" ] [
|
||||||
# List of secrets for vault01
|
# List of secrets for vault01
|
||||||
"radius-auth_token_file"
|
"radius-auth_token_file"
|
||||||
"radius-ca_pem_file"
|
"radius-ca_pem_file"
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: EUPL-1.2
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
|
|
||||||
(import ../../../../keys).mkSecrets [ "web01" ] [
|
(import ../../../../keys.nix).mkSecrets [ "web01" ] [
|
||||||
# List of secrets for web01
|
# List of secrets for web01
|
||||||
"acme-certs_secret"
|
"acme-certs_secret"
|
||||||
"bupstash-put_key"
|
"bupstash-put_key"
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: EUPL-1.2
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
|
|
||||||
(import ../../../../keys).mkSecrets [ "web02" ] [
|
(import ../../../../keys.nix).mkSecrets [ "web02" ] [
|
||||||
# List of secrets for web02
|
# List of secrets for web02
|
||||||
"cas_eleves-secret_key_file"
|
"cas_eleves-secret_key_file"
|
||||||
"kadenios-secret_key_file"
|
"kadenios-secret_key_file"
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: EUPL-1.2
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
|
|
||||||
(import ../../../../keys).mkSecrets [ "web03" ] [
|
(import ../../../../keys.nix).mkSecrets [ "web03" ] [
|
||||||
# List of secrets for web03
|
# List of secrets for web03
|
||||||
"bupstash-put_key"
|
"bupstash-put_key"
|
||||||
"dj_annuaire-secret_key_file"
|
"dj_annuaire-secret_key_file"
|
||||||
|
|
|
@ -12,11 +12,9 @@ lib:
|
||||||
(lib.evalModules {
|
(lib.evalModules {
|
||||||
modules = [
|
modules = [
|
||||||
./options.nix
|
./options.nix
|
||||||
{
|
./network.nix
|
||||||
network = import ./network.nix;
|
./nodes
|
||||||
nodes = import ./nodes;
|
./organization.nix
|
||||||
organization = import ./organization.nix;
|
|
||||||
}
|
|
||||||
];
|
];
|
||||||
class = "dgnumMeta";
|
class = "dgnumMeta";
|
||||||
}).config
|
}).config
|
||||||
|
|
|
@ -6,6 +6,7 @@
|
||||||
# SPDX-License-Identifier: EUPL-1.2
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
|
|
||||||
{
|
{
|
||||||
|
network = {
|
||||||
bridge01 = {
|
bridge01 = {
|
||||||
hostId = "f57f3ba0";
|
hostId = "f57f3ba0";
|
||||||
|
|
||||||
|
@ -287,4 +288,5 @@
|
||||||
hostId = "8afc7749";
|
hostId = "8afc7749";
|
||||||
netbirdIp = "100.80.157.46";
|
netbirdIp = "100.80.157.46";
|
||||||
};
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -2,9 +2,10 @@
|
||||||
# SPDX-FileContributor: Ryan Lahfa <ryan.lahfa@dgnum.eu>
|
# SPDX-FileContributor: Ryan Lahfa <ryan.lahfa@dgnum.eu>
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: EUPL-1.2
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
|
{
|
||||||
builtins.foldl' (nodes: path: nodes // import path) { } [
|
imports = [
|
||||||
./liminix.nix
|
./liminix.nix
|
||||||
./nixos.nix
|
./nixos.nix
|
||||||
./netconf.nix
|
./netconf.nix
|
||||||
]
|
];
|
||||||
|
}
|
||||||
|
|
|
@ -16,6 +16,7 @@
|
||||||
# }
|
# }
|
||||||
|
|
||||||
{
|
{
|
||||||
|
nodes = {
|
||||||
ap01 = {
|
ap01 = {
|
||||||
site = "unknown";
|
site = "unknown";
|
||||||
adminGroups = [ "fai" ];
|
adminGroups = [ "fai" ];
|
||||||
|
@ -29,4 +30,5 @@
|
||||||
version = "24.05";
|
version = "24.05";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -2,6 +2,7 @@
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: EUPL-1.2
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
{
|
{
|
||||||
|
nodes = {
|
||||||
netcore02 = {
|
netcore02 = {
|
||||||
site = "hyp01";
|
site = "hyp01";
|
||||||
|
|
||||||
|
@ -46,4 +47,5 @@
|
||||||
# system = "netconf";
|
# system = "netconf";
|
||||||
# };
|
# };
|
||||||
# };
|
# };
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -26,6 +26,7 @@
|
||||||
- luj01 -> VM de Luj
|
- luj01 -> VM de Luj
|
||||||
*/
|
*/
|
||||||
{
|
{
|
||||||
|
nodes = {
|
||||||
bridge01 = {
|
bridge01 = {
|
||||||
site = "hyp01";
|
site = "hyp01";
|
||||||
|
|
||||||
|
@ -290,4 +291,5 @@
|
||||||
system = "nixos";
|
system = "nixos";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -13,6 +13,7 @@
|
||||||
*/
|
*/
|
||||||
|
|
||||||
{
|
{
|
||||||
|
organization = {
|
||||||
members = {
|
members = {
|
||||||
agroudiev = {
|
agroudiev = {
|
||||||
name = "Antoine Groudiev";
|
name = "Antoine Groudiev";
|
||||||
|
@ -163,4 +164,5 @@
|
||||||
# Videos DGNum
|
# Videos DGNum
|
||||||
peertube.admins = [ "thubrecht" ];
|
peertube.admins = [ "thubrecht" ];
|
||||||
};
|
};
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|
|
@ -6,8 +6,8 @@
|
||||||
# Nix expression to check if meta module is evaluating correctly.
|
# Nix expression to check if meta module is evaluating correctly.
|
||||||
# To do so run `nix-build ./verify.nix`
|
# To do so run `nix-build ./verify.nix`
|
||||||
let
|
let
|
||||||
sources = import ../npins;
|
sources = import ../sources.nix;
|
||||||
pkgs = import sources.nixpkgs { };
|
pkgs = sources.bootstrapNixpkgs;
|
||||||
|
|
||||||
dns = import sources."dns.nix" { inherit pkgs; };
|
dns = import sources."dns.nix" { inherit pkgs; };
|
||||||
in
|
in
|
||||||
|
|
|
@ -58,7 +58,7 @@ in
|
||||||
users.users = builtins.mapAttrs (
|
users.users = builtins.mapAttrs (
|
||||||
username: members:
|
username: members:
|
||||||
{
|
{
|
||||||
openssh.authorizedKeys.keys = dgn-keys.getKeys members;
|
openssh.authorizedKeys.keys = dgn-keys.getMemberKeys members;
|
||||||
}
|
}
|
||||||
// optionalAttrs (username == "root") { inherit (nodeMeta) hashedPassword; }
|
// optionalAttrs (username == "root") { inherit (nodeMeta) hashedPassword; }
|
||||||
) cfg.users;
|
) cfg.users;
|
||||||
|
|
|
@ -114,7 +114,7 @@ in
|
||||||
access = [
|
access = [
|
||||||
{
|
{
|
||||||
repo = "default";
|
repo = "default";
|
||||||
keys = dgn-keys.getKeys [
|
keys = dgn-keys.getNodeKeys [
|
||||||
"compute01"
|
"compute01"
|
||||||
"storage01"
|
"storage01"
|
||||||
"vault01"
|
"vault01"
|
||||||
|
@ -131,7 +131,7 @@ in
|
||||||
};
|
};
|
||||||
|
|
||||||
programs.ssh.knownHosts =
|
programs.ssh.knownHosts =
|
||||||
lib.extra.mapFuse (host: { "${host}.dgnum".publicKey = builtins.head (dgn-keys.getNodeKeys host); })
|
lib.extra.mapFuse (host: { "${host}.dgnum".publicKey = builtins.head dgn-keys._nodeKeys.${host}; })
|
||||||
[
|
[
|
||||||
"compute01"
|
"compute01"
|
||||||
"geo01"
|
"geo01"
|
||||||
|
|
|
@ -2,7 +2,7 @@
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: EUPL-1.2
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
|
|
||||||
(import ../../../../keys).mkSecrets [ ] [
|
(import ../../../../keys.nix).mkSecrets [ ] [
|
||||||
"compute01.key"
|
"compute01.key"
|
||||||
"storage01.key"
|
"storage01.key"
|
||||||
"web01.key"
|
"web01.key"
|
||||||
|
|
|
@ -2,4 +2,4 @@
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: EUPL-1.2
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
|
|
||||||
{ netbox-agent.publicKeys = (import ../../../../keys).machineKeysBySystem "nixos"; }
|
{ netbox-agent.publicKeys = (import ../../../../keys.nix).machineKeysBySystem "nixos"; }
|
||||||
|
|
|
@ -2,4 +2,4 @@
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: EUPL-1.2
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
|
|
||||||
{ mail.publicKeys = (import ../../../keys).machineKeysBySystem "nixos"; }
|
{ mail.publicKeys = (import ../../../keys.nix).machineKeysBySystem "nixos"; }
|
||||||
|
|
|
@ -2,4 +2,4 @@
|
||||||
#
|
#
|
||||||
# SPDX-License-Identifier: EUPL-1.2
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
|
|
||||||
{ __arkheon-token_file.publicKeys = (import ../../../keys).machineKeysBySystem "nixos"; }
|
{ __arkheon-token_file.publicKeys = (import ../../../keys.nix).machineKeysBySystem "nixos"; }
|
||||||
|
|
23
sources.nix
Normal file
23
sources.nix
Normal file
|
@ -0,0 +1,23 @@
|
||||||
|
# SPDX-FileCopyrightText: 2024 Ryan Lahfa <ryan.lahfa@dgnum.eu>
|
||||||
|
# SPDX-FileCopyrightText: 2024 Tom Hubrecht <tom.hubrecht@dgnum.eu>
|
||||||
|
# SPDX-FileContributor: Maurice Debray <maurice.debray@dgnum.eu>
|
||||||
|
#
|
||||||
|
# SPDX-License-Identifier: EUPL-1.2
|
||||||
|
|
||||||
|
let
|
||||||
|
sources' = import ./npins;
|
||||||
|
|
||||||
|
bootstrapNixpkgs = import sources'.nixpkgs { };
|
||||||
|
|
||||||
|
patch = (import ./lib/nix-patches { patchFile = ./patches; }).base {
|
||||||
|
pkgs = bootstrapNixpkgs;
|
||||||
|
};
|
||||||
|
|
||||||
|
sources = builtins.mapAttrs (
|
||||||
|
k: src:
|
||||||
|
patch.applyPatches {
|
||||||
|
inherit src;
|
||||||
|
name = k;
|
||||||
|
}
|
||||||
|
) sources';
|
||||||
|
in sources // { bootstrapNixpkgs = bootstrapNixpkgs; unpatchedSources = sources; }
|
|
@ -7,7 +7,7 @@
|
||||||
let
|
let
|
||||||
inherit (lib) attrNames genAttrs;
|
inherit (lib) attrNames genAttrs;
|
||||||
|
|
||||||
nodes = attrNames (import ../meta/nodes);
|
nodes = attrNames (import ../meta lib).nodes;
|
||||||
in
|
in
|
||||||
|
|
||||||
{
|
{
|
||||||
|
|
Loading…
Add table
Reference in a new issue