{ clan-core, nixpkgs, lib }: { directory # The directory containing the machines subdirectory , specialArgs ? { } # Extra arguments to pass to nixosSystem i.e. useful to make self available , machines ? { } # allows to include machine-specific modules i.e. machines.${name} = { ... } , clanName # Needs to be (globally) unique, as this determines the folder name where the flake gets downloaded to. }: let machinesDirs = lib.optionalAttrs (builtins.pathExists "${directory}/machines") (builtins.readDir (directory + /machines)); machineSettings = machineName: # CLAN_MACHINE_SETTINGS_FILE allows to override the settings file temporarily # This is useful for doing a dry-run before writing changes into the settings.json # Using CLAN_MACHINE_SETTINGS_FILE requires passing --impure to nix eval if builtins.getEnv "CLAN_MACHINE_SETTINGS_FILE" != "" then builtins.fromJSON (builtins.readFile (builtins.getEnv "CLAN_MACHINE_SETTINGS_FILE")) else lib.optionalAttrs (builtins.pathExists "${directory}/machines/${machineName}/settings.json") (builtins.fromJSON (builtins.readFile (directory + /machines/${machineName}/settings.json))); # Read additional imports specified via a config option in settings.json # This is not an infinite recursion, because the imports are discovered here # before calling evalModules. # It is still useful to have the imports as an option, as this allows for type # checking and easy integration with the config frontend(s) machineImports = machineSettings: map (module: clan-core.clanModules.${module}) (machineSettings.clanImports or [ ]); # TODO: remove default system once we have a hardware-config mechanism nixosConfiguration = { system ? "x86_64-linux", name }: nixpkgs.lib.nixosSystem { modules = let settings = machineSettings name; in (machineImports settings) ++ [ settings clan-core.nixosModules.clanCore (machines.${name} or { }) { clanCore.machineName = name; clanCore.clanDir = directory; nixpkgs.hostPlatform = lib.mkForce system; # speeds up nix commands by using the nixpkgs from the host system (especially useful in VMs) nix.registry.nixpkgs.to = { type = "path"; path = lib.mkDefault nixpkgs; }; } ]; inherit specialArgs; }; allMachines = machinesDirs // machines; supportedSystems = [ "x86_64-linux" "aarch64-linux" "riscv64-linux" "x86_64-darwin" "aarch64-darwin" ]; nixosConfigurations = lib.mapAttrs (name: _: nixosConfiguration { inherit name; }) allMachines; # This instantiates nixos for each system that we support: # configPerSystem = ..nixosConfiguration # We need this to build nixos secret generators for each system configsPerSystem = builtins.listToAttrs (builtins.map (system: lib.nameValuePair system (lib.mapAttrs (name: _: nixosConfiguration { inherit name system; }) allMachines)) supportedSystems); in { inherit nixosConfigurations; clanInternals = { machines = configsPerSystem; clanName = clanName; all-machines-json = lib.mapAttrs (system: configs: nixpkgs.legacyPackages.${system}.writers.writeJSON "machines.json" (lib.mapAttrs (_: m: m.config.system.clan.deployment.data) configs)) configsPerSystem; }; }