- add top-level option `clanImports` to clanCore
- clanImports can be set and checked as any other option
- buildClan resolves the clanImports from the settings.json before calling evalModules to prevent infinite recursions
- new endpoint PUT machines/{name}/schema to allow getting the schema for a specific list of imports
- to retrieve the currently imported modules, cimply do a GET or PU on machines/{name}/config which will return `clanImports` as part of the config
Still missing: get list of available modules
81 lines
3.0 KiB
Nix
81 lines
3.0 KiB
Nix
{ clan-core, nixpkgs, lib }:
|
|
{ directory # The directory containing the machines subdirectory
|
|
, specialArgs ? { } # Extra arguments to pass to nixosSystem i.e. useful to make self available
|
|
, machines ? { } # allows to include machine-specific modules i.e. machines.${name} = { ... }
|
|
}:
|
|
let
|
|
machinesDirs = lib.optionalAttrs (builtins.pathExists "${directory}/machines") (builtins.readDir (directory + /machines));
|
|
|
|
machineSettings = machineName:
|
|
# CLAN_MACHINE_SETTINGS_FILE allows to override the settings file temporarily
|
|
# This is useful for doing a dry-run before writing changes into the settings.json
|
|
# Using CLAN_MACHINE_SETTINGS_FILE requires passing --impure to nix eval
|
|
if builtins.getEnv "CLAN_MACHINE_SETTINGS_FILE" != ""
|
|
then builtins.fromJSON (builtins.readFile (builtins.getEnv "CLAN_MACHINE_SETTINGS_FILE"))
|
|
else
|
|
lib.optionalAttrs (builtins.pathExists "${directory}/machines/${machineName}/settings.json")
|
|
(builtins.fromJSON
|
|
(builtins.readFile (directory + /machines/${machineName}/settings.json)));
|
|
|
|
# Read additional imports specified via a config option in settings.json
|
|
# This is not an infinite recursion, because the imports are discovered here
|
|
# before calling evalModules.
|
|
# It is still useful to have the imports as an option, as this allows for type
|
|
# checking and easy integration with the config frontend(s)
|
|
machineImports = machineSettings:
|
|
map
|
|
(module: clan-core.clanModules.${module})
|
|
(machineSettings.clanImports or [ ]);
|
|
|
|
# TODO: remove default system once we have a hardware-config mechanism
|
|
nixosConfiguration = { system ? "x86_64-linux", name }: nixpkgs.lib.nixosSystem {
|
|
modules =
|
|
let
|
|
settings = machineSettings name;
|
|
in
|
|
(machineImports settings)
|
|
++ [
|
|
settings
|
|
clan-core.nixosModules.clanCore
|
|
(machines.${name} or { })
|
|
{
|
|
clanCore.machineName = name;
|
|
clanCore.clanDir = directory;
|
|
nixpkgs.hostPlatform = lib.mkForce system;
|
|
}
|
|
];
|
|
inherit specialArgs;
|
|
};
|
|
|
|
allMachines = machinesDirs // machines;
|
|
|
|
supportedSystems = [
|
|
"x86_64-linux"
|
|
"aarch64-linux"
|
|
"riscv64-linux"
|
|
"x86_64-darwin"
|
|
"aarch64-darwin"
|
|
];
|
|
|
|
nixosConfigurations = lib.mapAttrs (name: _: nixosConfiguration { inherit name; }) allMachines;
|
|
|
|
# This instantiates nixos for each system that we support:
|
|
# configPerSystem = <system>.<machine>.nixosConfiguration
|
|
# We need this to build nixos secret generators for each system
|
|
configsPerSystem = builtins.listToAttrs
|
|
(builtins.map
|
|
(system: lib.nameValuePair system
|
|
(lib.mapAttrs (name: _: nixosConfiguration { inherit name system; }) allMachines))
|
|
supportedSystems);
|
|
in
|
|
{
|
|
inherit nixosConfigurations;
|
|
|
|
clanInternals = {
|
|
machines = configsPerSystem;
|
|
all-machines-json = lib.mapAttrs
|
|
(system: configs: nixpkgs.legacyPackages.${system}.writers.writeJSON "machines.json" (lib.mapAttrs (_: m: m.config.system.clan.deployment.data) configs))
|
|
configsPerSystem;
|
|
};
|
|
}
|