infra/flake.nix
Gabriel Simmer 26bc849577
All checks were successful
Lint / lint (push) Successful in 17s
Experiment with Nix to apply Terraform
2023-09-08 11:26:32 +01:00

139 lines
4.5 KiB
Nix

{
description = "Nix flake for my infrastructure";
inputs = {
agenix.url = "github:ryantm/agenix";
terranix.url = "github:terranix/terranix";
nixpkgs.url = "github:NixOS/nixpkgs/nixpkgs-unstable";
nixinate.url = "github:matthewcroughan/nixinate";
home-manager.url = "github:nix-community/home-manager";
home-manager.inputs.nixpkgs.follows = "nixpkgs";
nixos-generators = {
url = "github:nix-community/nixos-generators";
inputs.nixpkgs.follows = "nixpkgs";
};
};
outputs = { self, nixpkgs, nixos-generators, nixinate, home-manager, agenix, terranix }:
let
pkgs = nixpkgs.legacyPackages.x86_64-linux;
tf = terranix.lib.terranixConfiguration {
system = "x86_64-linux";
modules = [ ./terraform/main.nix ];
};
in {
devShells.x86_64-linux.default = with pkgs; mkShell {
shellHook =
''
set -o allexport
source .env set
set +o allexport
'';
nativeBuildInputs = [
jq terraform ansible kubectl awscli2
nodePackages.yaml-language-server
k9s terraform-ls kubernetes-helm nil
];
buildInputs = [ ];
};
packages.aarch64-linux = {
raspberry-pi = nixos-generators.nixosGenerate {
system = "aarch64-linux";
modules = [
(nixpkgs + "/nixos/modules/installer/sd-card/sd-image-aarch64-installer.nix")
./pi-imgs/pi-initial.nix
];
format = "sd-aarch64-installer";
};
};
apps = nixinate.nixinate.x86_64-linux self // {
x86_64-linux = {
tf-plan = {
type = "app";
program = toString (pkgs.writers.writeBash "plan" ''
if [[ -e terraform/config.tf.json ]]; then rm -f terraform/config.tf.json; fi
cp ${tf} terraform/config.tf.json \
&& ${pkgs.terraform}/bin/terraform -chdir=terraform init \
&& ${pkgs.terraform}/bin/terraform -chdir=terraform plan -out=plan.out
'');
};
tf-apply = {
type = "app";
program = toString (pkgs.writers.writeBash "apply" ''
if [[ -e terraform/config.tf.json ]]; then rm -f terraform/config.tf.json; fi
cp ${tf} terraform/config.tf.json \
&& ${pkgs.terraform}/bin/terraform -chdir=terraform init \
&& ${pkgs.terraform}/bin/terraform -chdir=terraform apply plan.out
'');
};
};
};
homeConfigurations."gsimmer" = home-manager.lib.homeManagerConfiguration {
inherit pkgs;
modules = [ ./nix/london/gsimmer.nix ];
};
nixosConfigurations = {
london = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
modules = [
(import ./nix/london/configuration.nix)
home-manager.nixosModules.home-manager
{
home-manager.useUserPackages = true;
home-manager.users.gsimmer = import ./nix/london/gsimmer.nix;
}
];
};
oracle-gitea-runner = nixpkgs.lib.nixosSystem {
system = "aarch64-linux";
modules = [
(import ./nix/oracle-gitea-runner/configuration.nix)
{
_module.args.nixinate = {
host = "143.47.229.209";
sshUser = "root";
buildOn = "remote";
substituteOnTarget = true;
hermetic = false;
};
}
];
};
monitoring = nixpkgs.lib.nixosSystem {
system = "aarch64-linux";
modules = [
(import ./nix/monitoring/configuration.nix)
{
_module.args.nixinate = {
host = "monitoring";
sshUser = "root";
buildOn = "remote";
substituteOnTarget = true;
hermetic = false;
};
}
];
};
nas = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
modules = [
(import ./nix/nas/configuration.nix)
agenix.nixosModules.default
home-manager.nixosModules.home-manager
{
home-manager.users.gsimmer = import ./nix/nas/home.nix;
_module.args.nixinate = {
host = "vancouver";
sshUser = "gsimmer";
buildOn = "remote";
substituteOnTarget = true;
hermetic = false;
};
}
];
};
};
};
}