lib > builtins

This commit is contained in:
asyncnomi 2025-08-03 01:05:02 +02:00
parent 47ccd698a9
commit 22f93f23ed
6 changed files with 39 additions and 38 deletions

View file

@ -11,6 +11,7 @@
outputs = { self, nixpkgs-25-05, nixpkgs-unstable, deploy-rs, agenix }: let
system = "x86_64-linux";
lib = nixpkgs-25-05.lib;
# Mapping version identifiers to nixpkgs
nixpkgsMap = {
@ -40,16 +41,16 @@
nodes = import ./nodes.nix;
mapping = import ./mapping.nix;
findRolesForHost = hostName: builtins.filter
(roleName: builtins.elem hostName mapping.${roleName}.hosts)
(builtins.attrNames mapping);
findRolesForHost = hostName: lib.filter
(roleName: lib.elem hostName mapping.${roleName}.hosts)
(lib.attrNames mapping);
getModulesForHost = hostName: let
roles = findRolesForHost hostName;
modulesList = builtins.map
modulesList = map
(role: mapping.${role}._inherit or [])
roles;
in builtins.concatLists modulesList;
in lib.lists.concatLists modulesList;
defaultModules = [
agenix.nixosModules.default
@ -58,7 +59,7 @@
];
in {
nixosConfigurations = builtins.mapAttrs (name: config:
nixosConfigurations = lib.mapAttrs (name: config:
nixpkgsMap.${config.ver}.lib.nixosSystem {
system = config.system;
modules = getModulesForHost "${name}" ++ defaultModules ++ [{ hostName = "${name}"; }];
@ -70,8 +71,8 @@
autoRollback = true;
magicRollback = true;
remoteBuild = true;
nodes = builtins.mapAttrs (name: config: {
hostname = builtins.head (builtins.split "/" config.ip4);
nodes = lib.mapAttrs (name: config: {
hostname = lib.lists.head (lib.strings.splitString "/" config.ip4);
profilesOrder = [ "system" ];
profiles = {
system = {
@ -82,6 +83,6 @@
};
# This is highly advised, and will prevent many possible mistakes, just run "deploy -s" to bypass it
checks = builtins.mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) deploy-rs.lib;
checks = lib.mapAttrs (system: deployLib: deployLib.deployChecks self.deploy) deploy-rs.lib;
};
}

View file

@ -32,7 +32,7 @@ let
"172.19.${toString (peerConfig.zone + 127)}.0/24"
"fc00:f::${toString (peerConfig.zone + 127)}:0/112"
];
Endpoint = "${builtins.head (builtins.split "/" peerConfig.ip4)}:51820";
Endpoint = "${lib.lists.head (lib.strings.splitString "/" peerConfig.ip4)}:51820";
PersistentKeepalive = 25;
}) peerConfigs;

View file

@ -1,4 +1,4 @@
{ config, ... }:
{ config, lib, ... }:
let
# Import nodes
@ -17,7 +17,7 @@ in
# Do not edit, will be overwritten by Nixos
domain ${config.networking.domain}
search ${config.networking.domain}
${builtins.concatStringsSep "\n" (map (ip: "nameserver ${ip}") config.services.dnsmasq.settings.listen-address)}
${lib.strings.concatStringsSep "\n" (map (ip: "nameserver ${ip}") config.services.dnsmasq.settings.listen-address)}
options edns0 trust-ad
'';

View file

@ -28,7 +28,7 @@ in
# Replication tasks are not authenticated
# The wireguard mesh cryptographically
# ensures the sender is who we expect.
authentication = lib.mkForce (builtins.concatStringsSep "\n" ([''
authentication = lib.mkForce (lib.strings.concatStringsSep "\n" ([''
#type database DBuser auth-method optional_ident_map
local all all peer map=superuser_map
'']
@ -36,7 +36,7 @@ in
(map (slaveName: let slaveNode = nodes.${slaveName}; in
"host replication replication 172.19.${toString slaveNode.zone}.${toString slaveNode.id}/32 trust"
) mapping.db.slaves)
++ lib.optionals (builtins.elem myName mapping.db.slaves) [
++ lib.optionals (lib.elem myName mapping.db.slaves) [
"host replication replication ${masterIP}/32 trust"
]));
ensureUsers = lib.mkIf (myName == mapping.db.master) [{
@ -55,7 +55,7 @@ in
} // lib.optionalAttrs (myName == mapping.db.master) {
wal_sender_timeout = "60s";
wal_keep_size = 1000; # In MB
} // lib.optionalAttrs (builtins.elem myName mapping.db.slaves) {
} // lib.optionalAttrs (lib.elem myName mapping.db.slaves) {
wal_receiver_timeout = "60s";
hot_standby = "on";
primary_conninfo = "host=${masterIP} port=5432 user=replication";
@ -64,7 +64,7 @@ in
# This preStart script sync the slaves to the master
# systemd.services.<name>.preStart has a mergeable type,
# this code will be prepend to the default one
systemd.services.postgresql.preStart = lib.mkIf (builtins.elem myName mapping.db.slaves) (lib.mkBefore ''
systemd.services.postgresql.preStart = lib.mkIf (lib.elem myName mapping.db.slaves) (lib.mkBefore ''
if ! test -e ${cfg.dataDir}/PG_VERSION; then
echo "Setting up PostgreSQL slave replication..."

View file

@ -84,11 +84,11 @@ let
#####
# host to dn
hostToDomain = hostname: builtins.replaceStrings ["-"] ["."] hostname;
hostToLfDomain = hostname: builtins.replaceStrings [".lasuite.federez"] [".lf."] (hostToDomain hostname);
hostToDomain = hostname: lib.replaceStrings ["-"] ["."] hostname;
hostToLfDomain = hostname: lib.replaceStrings [".lasuite.federez"] [".lf."] (hostToDomain hostname);
# Remove cidr notation
rmCidr = ip: builtins.head (builtins.split "/" ip);
rmCidr = ip: lib.lists.head (lib.strings.splitString "/" ip);
# Gen NS
toNSRecord = host: "\tIN NS ${hostToDomain host}.net.";
@ -140,7 +140,7 @@ let
) nodes);
# Gen first NS for SOA
firstNS = builtins.head mapping.dns.secondary;
firstNS = lib.lists.head mapping.dns.secondary;
firstNSDn = "${hostToDomain firstNS}.net.";
# Generate SPF record with all mail server IPs
@ -150,7 +150,7 @@ let
spfIpv6Records = lib.flatten (lib.mapAttrsToList (hostname: node:
lib.optional (supportsIPv6 node) "ip6:${rmCidr node.ip6}"
) mailConfigs);
spfRecord = "v=spf1 a:lasuite.federez.net ${builtins.concatStringsSep " " (spfIpv4Records ++ spfIpv6Records)} ~all";
spfRecord = "v=spf1 a:lasuite.federez.net ${lib.strings.concatStringsSep " " (spfIpv4Records ++ spfIpv6Records)} ~all";
# Zone conf
zone-lasuite-federez-net = pkgs.writeText "zone-lasuite-federez-net" ''
@ -165,15 +165,15 @@ let
IN TXT "${spfRecord}"
${builtins.concatStringsSep "\n" nsRecords}
${builtins.concatStringsSep "\n" mxRecords}
${builtins.concatStringsSep "\n" soaARecords}
${builtins.concatStringsSep "\n" soaAAAARecords}
${lib.strings.concatStringsSep "\n" nsRecords}
${lib.strings.concatStringsSep "\n" mxRecords}
${lib.strings.concatStringsSep "\n" soaARecords}
${lib.strings.concatStringsSep "\n" soaAAAARecords}
${builtins.concatStringsSep "\n" nsARecords}
${builtins.concatStringsSep "\n" nsAAAARecords}
${builtins.concatStringsSep "\n" mxARecords}
${builtins.concatStringsSep "\n" mxAAAARecords}
${lib.strings.concatStringsSep "\n" nsARecords}
${lib.strings.concatStringsSep "\n" nsAAAARecords}
${lib.strings.concatStringsSep "\n" mxARecords}
${lib.strings.concatStringsSep "\n" mxAAAARecords}
_dmarc IN TXT "v=DMARC1; p=quarantine; ruf=mailto:monitoring@federez.net"
_mta-sts IN TXT "v=STSv1; id=1"
@ -191,8 +191,8 @@ let
60 ; expire
60 ) ; minimum TTL
${builtins.concatStringsSep "\n" lfARecords}
${builtins.concatStringsSep "\n" lfAAAARecords}
${lib.strings.concatStringsSep "\n" lfARecords}
${lib.strings.concatStringsSep "\n" lfAAAARecords}
'';
in
{
@ -266,12 +266,12 @@ in
] else [
{
domain = "lasuite.federez.net";
master = builtins.head remotesNames;
master = lib.lists.head remotesNames;
acl = remotesACLNames;
}
{
domain = "lf";
master = builtins.head remotesNames;
master = lib.lists.head remotesNames;
acl = remotesACLNames;
module = "mod-queryacl/local";
}

View file

@ -13,18 +13,18 @@ let
generatedCredsCommand = mbox: ''
${pkgs.maddy}/bin/maddyctl creds remove --yes ${mbox}
${pkgs.maddy}/bin/maddyctl creds create --password $(cat ${config.age.secrets."mbox-${builtins.head (builtins.split "@" mbox)}".path}) ${mbox}
${pkgs.maddy}/bin/maddyctl creds create --password $(cat ${config.age.secrets."mbox-${lib.lists.head (lib.strings.splitString "@" mbox)}".path}) ${mbox}
'';
maddyDeployCreds = pkgs.writeShellScriptBin "maddyDeployCreds" ''
${builtins.concatStringsSep "\n" (map generatedCredsCommand acct)}
${lib.strings.concatStringsSep "\n" (map generatedCredsCommand acct)}
'';
hostToDomain = hostname: "${builtins.replaceStrings ["-"] ["."] hostname}.net";
hostToDomain = hostname: "${lib.replaceStrings ["-"] ["."] hostname}.net";
buildSecret = mbox: {
"mbox-${builtins.head (builtins.split "@" mbox)}" = {
file = ./../../secrets/mail/mbox + ( "/" + builtins.head (builtins.split "@" mbox) + ".age" );
"mbox-${lib.lists.head (lib.strings.splitString "@" mbox)}" = {
file = ./../../secrets/mail/mbox + ( "/" + lib.lists.head (lib.strings.splitString "@" mbox) + ".age" );
owner = "maddy";
group = "maddy";
};