about summary refs log tree commit diff
path: root/users/wpcarro/terraform
diff options
context:
space:
mode:
authorVincent Ambo <mail@tazj.in>2022-01-30T16·06+0300
committertazjin <tazjin@tvl.su>2022-01-31T16·11+0000
commitaa122cbae78ce97d60c0c98ba14df753d97e40b1 (patch)
tree12b98d85c4b18fe870feb26de70db9ba61837bd7 /users/wpcarro/terraform
parent2d10d60fac0fd00a71b65cfdcb9fba0477b2086c (diff)
style: format entire depot with nixpkgs-fmt r/3723
This CL can be used to compare the style of nixpkgs-fmt against other
formatters (nixpkgs, alejandra).

Change-Id: I87c6abff6bcb546b02ead15ad0405f81e01b6d9e
Reviewed-on: https://cl.tvl.fyi/c/depot/+/4397
Tested-by: BuildkiteCI
Reviewed-by: sterni <sternenseemann@systemli.org>
Reviewed-by: lukegb <lukegb@tvl.fyi>
Reviewed-by: wpcarro <wpcarro@gmail.com>
Reviewed-by: Profpatsch <mail@profpatsch.de>
Reviewed-by: kanepyork <rikingcoding@gmail.com>
Reviewed-by: tazjin <tazjin@tvl.su>
Reviewed-by: cynthia <cynthia@tvl.fyi>
Reviewed-by: edef <edef@edef.eu>
Reviewed-by: eta <tvl@eta.st>
Reviewed-by: grfn <grfn@gws.fyi>
Diffstat (limited to 'users/wpcarro/terraform')
-rw-r--r--users/wpcarro/terraform/default.nix336
1 files changed, 170 insertions, 166 deletions
diff --git a/users/wpcarro/terraform/default.nix b/users/wpcarro/terraform/default.nix
index be35785a54..d73d46dbf9 100644
--- a/users/wpcarro/terraform/default.nix
+++ b/users/wpcarro/terraform/default.nix
@@ -7,179 +7,183 @@ let
 
   images = import "${pkgs.path}/nixos/modules/virtualisation/gce-images.nix";
   nixosImage = images."20.09";
-in {
-  googleCloudVM = {
-    project,
-    name,
-    region,
-    zone,
-    configuration,
-    extraConfig ? {},
-  }: let
-    inherit (configuration.users.users) root;
-    inherit (configuration.networking) firewall;
-
-    # Convert NixOS-style port numbers to Terraform-style.
-    asStrings = xs: map toString xs;
-    asRanges = xs: map (x: "${toString x.from}-${toString x.to}") xs;
-
-    sshKeys = concatStringsSep "\n"
-      (map (key: "root:${key}") root.openssh.authorizedKeys.keys);
-
-    os = depot.ops.nixos.nixosFor (_: {
-      imports = [
-        "${pkgs.path}/nixos/modules/virtualisation/google-compute-image.nix"
-        configuration
-      ];
-
-      networking.hostName = name;
-
-      fileSystems."/nix" = {
-        device = "/dev/disk/by-label/google-${name}-disk";
-        fsType = "ext4";
+in
+{
+  googleCloudVM =
+    { project
+    , name
+    , region
+    , zone
+    , configuration
+    , extraConfig ? { }
+    ,
+    }:
+    let
+      inherit (configuration.users.users) root;
+      inherit (configuration.networking) firewall;
+
+      # Convert NixOS-style port numbers to Terraform-style.
+      asStrings = xs: map toString xs;
+      asRanges = xs: map (x: "${toString x.from}-${toString x.to}") xs;
+
+      sshKeys = concatStringsSep "\n"
+        (map (key: "root:${key}") root.openssh.authorizedKeys.keys);
+
+      os = depot.ops.nixos.nixosFor (_: {
+        imports = [
+          "${pkgs.path}/nixos/modules/virtualisation/google-compute-image.nix"
+          configuration
+        ];
+
+        networking.hostName = name;
+
+        fileSystems."/nix" = {
+          device = "/dev/disk/by-label/google-${name}-disk";
+          fsType = "ext4";
+        };
+      });
+
+      osRoot = os.config.system.build.toplevel;
+      osPath = unsafeDiscardStringContext (toString osRoot.outPath);
+      drvPath = unsafeDiscardStringContext (toString osRoot.drvPath);
+    in
+    writeText "terraform.tf.json" (toJSON (lib.recursiveUpdate extraConfig {
+      provider.google = {
+        inherit project region zone;
       };
-    });
-
-    osRoot = os.config.system.build.toplevel;
-    osPath = unsafeDiscardStringContext (toString osRoot.outPath);
-    drvPath = unsafeDiscardStringContext (toString osRoot.drvPath);
-  in writeText "terraform.tf.json" (toJSON (lib.recursiveUpdate extraConfig {
-    provider.google = {
-      inherit project region zone;
-    };
-
-    resource.google_compute_instance."${name}" = {
-      inherit name zone;
-      machine_type = "e2-standard-2";
-  
-      tags = [
-        "http-server"
-        "https-server"
-        "${name}-firewall"
-      ];
-  
-      boot_disk = {
-        device_name = "boot";
-        initialize_params = {
-          size = 10;
-          image = "projects/nixos-cloud/global/images/${nixosImage.name}";
+
+      resource.google_compute_instance."${name}" = {
+        inherit name zone;
+        machine_type = "e2-standard-2";
+
+        tags = [
+          "http-server"
+          "https-server"
+          "${name}-firewall"
+        ];
+
+        boot_disk = {
+          device_name = "boot";
+          initialize_params = {
+            size = 10;
+            image = "projects/nixos-cloud/global/images/${nixosImage.name}";
+          };
+        };
+
+        attached_disk = {
+          source = "\${google_compute_disk.${name}.id}";
+          device_name = "${name}-disk";
+        };
+
+        network_interface = {
+          network = "default";
+          subnetwork = "default";
+          access_config = { };
+        };
+
+        # Copy root's SSH keys from the NixOS configuration and expose them to the
+        # metadata server.
+        metadata = {
+          inherit sshKeys;
+          ssh-keys = sshKeys;
+
+          # NixOS's fetch-instance-ssh-keys.bash relies on these fields being
+          # available on the metadata server.
+          ssh_host_ed25519_key = "\${tls_private_key.${name}.private_key_pem}";
+          ssh_host_ed25519_key_pub = "\${tls_private_key.${name}.public_key_pem}";
+
+          # Even though we have SSH access, having oslogin can still be useful for
+          # troubleshooting in the browser if for some reason SSH isn't working as
+          # expected.
+          enable-oslogin = "TRUE";
         };
+
+        service_account.scopes = [ "cloud-platform" ];
       };
-  
-      attached_disk = {
-        source = "\${google_compute_disk.${name}.id}";
-        device_name = "${name}-disk";
+
+      resource.tls_private_key."${name}" = {
+        algorithm = "ECDSA";
+        ecdsa_curve = "P384";
       };
-  
-      network_interface = {
+
+      resource.google_compute_firewall."${name}" = {
+        name = "${name}-firewall";
         network = "default";
-        subnetwork = "default";
-        access_config = {};
-      };
-  
-      # Copy root's SSH keys from the NixOS configuration and expose them to the
-      # metadata server.
-      metadata = {
-        inherit sshKeys;
-        ssh-keys = sshKeys;
-
-        # NixOS's fetch-instance-ssh-keys.bash relies on these fields being
-        # available on the metadata server.
-        ssh_host_ed25519_key = "\${tls_private_key.${name}.private_key_pem}";
-        ssh_host_ed25519_key_pub = "\${tls_private_key.${name}.public_key_pem}";
-
-        # Even though we have SSH access, having oslogin can still be useful for
-        # troubleshooting in the browser if for some reason SSH isn't working as
-        # expected.
-        enable-oslogin = "TRUE";
-      };
-  
-      service_account.scopes = ["cloud-platform"];
-    };
-
-    resource.tls_private_key."${name}" = {
-      algorithm = "ECDSA";
-      ecdsa_curve = "P384";
-    };
-
-    resource.google_compute_firewall."${name}" = {
-      name = "${name}-firewall";
-      network = "default";
-
-      # Read the firewall configuration from the NixOS configuration.
-      allow = [
-        {
-          protocol = "tcp";
-          ports = concatLists [
-            (asStrings (firewall.allowedTCPPorts or []))
-            (asRanges (firewall.allowedTCPPortRanges or []))
-          ];
-        }
-        {
-          protocol = "udp";
-          ports = concatLists [
-            (asStrings (firewall.allowedUDPPorts or []))
-            (asRanges (firewall.allowedUDPPortRanges or []))
-          ];
-        }
-      ];
-      source_ranges = ["0.0.0.0/0"];
-    };
-  
-    resource.google_compute_disk."${name}" = {
-      inherit zone;
-      name = "${name}-disk";
-      size = 100;
-    };
-
-    resource.null_resource.deploy_nixos = {
-      triggers = {
-        # Redeploy when the NixOS configuration changes.
-        os = "${osPath}";
-        # Redeploy when a new machine is provisioned.
-        machine_id = "\${google_compute_instance.${name}.id}";
+
+        # Read the firewall configuration from the NixOS configuration.
+        allow = [
+          {
+            protocol = "tcp";
+            ports = concatLists [
+              (asStrings (firewall.allowedTCPPorts or [ ]))
+              (asRanges (firewall.allowedTCPPortRanges or [ ]))
+            ];
+          }
+          {
+            protocol = "udp";
+            ports = concatLists [
+              (asStrings (firewall.allowedUDPPorts or [ ]))
+              (asRanges (firewall.allowedUDPPortRanges or [ ]))
+            ];
+          }
+        ];
+        source_ranges = [ "0.0.0.0/0" ];
       };
 
-      connection = {
-        host = "\${google_compute_instance.${name}.network_interface[0].access_config[0].nat_ip}";
+      resource.google_compute_disk."${name}" = {
+        inherit zone;
+        name = "${name}-disk";
+        size = 100;
       };
 
-      provisioner = [
-        { remote-exec.inline = ["true"]; }
-        {
-          local-exec.command = ''
-            export PATH="${pkgs.openssh}/bin:$PATH"
-
-            scratch="$(mktemp -d)"
-            function cleanup() {
-              rm -rf $scratch
-            }
-            trap cleanup EXIT
-
-            # write out ssh key
-            echo -n "''${tls_private_key.${name}.private_key_pem}" > $scratch/id_rsa.pem
-            chmod 0600 $scratch/id_rsa.pem
-
-            export NIX_SSHOPTS="\
-              -o StrictHostKeyChecking=no\
-              -o UserKnownHostsFile=/dev/null\
-              -o GlobalKnownHostsFile=/dev/null\
-              -o IdentityFile=$scratch/id_rsa.pem
-            "
-
-            nix-build ${drvPath}
-            nix-copy-closure --to \
-              root@''${google_compute_instance.${name}.network_interface[0].access_config[0].nat_ip} \
-              ${osPath} --gzip --use-substitutes
-          '';
-        }
-        {
-          remote-exec.inline = [
-            "nix-env --profile /nix/var/nix/profiles/system --set ${osPath}"
-            "${osPath}/bin/switch-to-configuration switch"
-          ];
-        }
-      ];
-    };
-  }));
+      resource.null_resource.deploy_nixos = {
+        triggers = {
+          # Redeploy when the NixOS configuration changes.
+          os = "${osPath}";
+          # Redeploy when a new machine is provisioned.
+          machine_id = "\${google_compute_instance.${name}.id}";
+        };
+
+        connection = {
+          host = "\${google_compute_instance.${name}.network_interface[0].access_config[0].nat_ip}";
+        };
+
+        provisioner = [
+          { remote-exec.inline = [ "true" ]; }
+          {
+            local-exec.command = ''
+              export PATH="${pkgs.openssh}/bin:$PATH"
+
+              scratch="$(mktemp -d)"
+              function cleanup() {
+                rm -rf $scratch
+              }
+              trap cleanup EXIT
+
+              # write out ssh key
+              echo -n "''${tls_private_key.${name}.private_key_pem}" > $scratch/id_rsa.pem
+              chmod 0600 $scratch/id_rsa.pem
+
+              export NIX_SSHOPTS="\
+                -o StrictHostKeyChecking=no\
+                -o UserKnownHostsFile=/dev/null\
+                -o GlobalKnownHostsFile=/dev/null\
+                -o IdentityFile=$scratch/id_rsa.pem
+              "
+
+              nix-build ${drvPath}
+              nix-copy-closure --to \
+                root@''${google_compute_instance.${name}.network_interface[0].access_config[0].nat_ip} \
+                ${osPath} --gzip --use-substitutes
+            '';
+          }
+          {
+            remote-exec.inline = [
+              "nix-env --profile /nix/var/nix/profiles/system --set ${osPath}"
+              "${osPath}/bin/switch-to-configuration switch"
+            ];
+          }
+        ];
+      };
+    }));
 }