1
0
nixfiles/flake/nixosConfigurations.nix

66 lines
1.9 KiB
Nix
Raw Permalink Normal View History

{ self
, nixpkgs
, ...
}@inputs:
2023-03-23 16:45:30 +01:00
let
generateNixosSystem = {
name,
system ? "x86_64-linux",
2023-04-21 23:03:11 +02:00
group ? null,
modules ? [],
}: let
2023-03-23 17:09:54 +01:00
localNixpkgs = nixpkgs.lib.attrByPath [ "nixpkgs-${name}" ] nixpkgs inputs;
in localNixpkgs.lib.nixosSystem {
system = system;
modules = modules ++ [
self.nixosModules.nixfilesInputs
2024-05-13 16:33:20 +02:00
self.nixosModules.clerie
({ config, lib, ... }: {
# Apply overlays
nixpkgs.overlays = [
self.overlays.nixfilesInputs
self.overlays.clerie
];
2023-03-23 16:45:30 +01:00
/*
Make the contents of the flake availiable to modules.
Useful for having the monitoring server scraping the
target config from all other servers automatically.
*/
_module.args = {
inputs = inputs;
_nixfiles = self;
};
# Expose host group to monitoring
2023-04-21 23:03:11 +02:00
clerie.monitoring = nixpkgs.lib.attrsets.optionalAttrs (group != null) { serviceLevel = group; };
# Automatically load secrets from sops file for host
2024-04-20 23:20:14 +02:00
sops.defaultSopsFile = ../hosts + "/${name}/secrets.json";
sops.secrets = let
secretFile = config.sops.defaultSopsFile;
secretNames = builtins.filter (name: name != "sops") (builtins.attrNames (builtins.fromJSON (builtins.readFile secretFile)));
secrets = if builtins.pathExists secretFile then
lib.listToAttrs (builtins.map (name: lib.nameValuePair name {}) secretNames)
else
{};
in
secrets;
2024-04-20 23:20:14 +02:00
})
# Config to be applied to every host
../configuration/common
../users/clerie
# Host specific config
(../hosts + "/${name}/configuration.nix")
2023-03-23 16:45:30 +01:00
];
};
mapToNixosConfigurations = hosts: builtins.mapAttrs (name: host: generateNixosSystem host) hosts;
in
mapToNixosConfigurations self.clerie.hosts