···
+
{ config, lib, pkgs, ... }:
+
cfg = config.services.self-deploy;
+
workingDirectory = "/var/lib/nixos-self-deploy";
+
repositoryDirectory = "${workingDirectory}/repo";
+
outPath = "${workingDirectory}/system";
+
gitWithRepo = "git -C ${repositoryDirectory}";
+
if builtins.isString value
+
then " --argstr ${lib.escapeShellArg key} ${lib.escapeShellArg value}"
+
else " --arg ${lib.escapeShellArg key} ${lib.escapeShellArg (toString value)}";
+
lib.concatStrings (lib.mapAttrsToList toArg args);
+
isPathType = x: lib.strings.isCoercibleToString x && builtins.substring 0 1 (toString x) == "/";
+
options.services.self-deploy = {
+
enable = lib.mkEnableOption "self-deploy";
+
nixFile = lib.mkOption {
+
default = "/default.nix";
+
Path to nix file in repository. Leading '/' refers to root of
+
nixAttribute = lib.mkOption {
+
Attribute of `nixFile` that builds the current system.
+
nixArgs = lib.mkOption {
+
type = lib.types.attrs;
+
Arguments to `nix-build` passed as `--argstr` or `--arg` depending on
+
switchCommand = lib.mkOption {
+
type = lib.types.enum [ "boot" "switch" "dry-activate" "test" ];
+
The `switch-to-configuration` subcommand used.
+
repository = lib.mkOption {
+
type = with lib.types; oneOf [ path str ];
+
The repository to fetch from. Must be properly formatted for git.
+
If this value is set to a path (must begin with `/`) then it's
+
assumed that the repository is local and the resulting service
+
won't wait for the network to be up.
+
If the repository will be fetched over SSH, you must add an
+
entry to `programs.ssh.knownHosts` for the SSH host for the fetch
+
sshKeyFile = lib.mkOption {
+
type = with lib.types; nullOr path;
+
Path to SSH private key used to fetch private repositories over
+
branch = lib.mkOption {
+
Technically speaking any ref can be specified here, as this is
+
passed directly to a `git fetch`, but for the use-case of
+
continuous deployment you're likely to want to specify a branch.
+
startAt = lib.mkOption {
+
type = with lib.types; either str (listOf str);
+
The schedule on which to run the `self-deploy` service. Format
+
specified by `systemd.time 7`.
+
This value can also be a list of `systemd.time 7` formatted
+
strings, in which case the service will be started on multiple
+
config = lib.mkIf cfg.enable {
+
systemd.services.self-deploy = {
+
wantedBy = [ "multi-user.target" ];
+
requires = lib.mkIf (!(isPathType cfg.repository)) [ "network-online.target" ];
+
environment.GIT_SSH_COMMAND = lib.mkIf (!(isNull cfg.sshKeyFile))
+
"${pkgs.openssh}/bin/ssh -i ${lib.escapeShellArg cfg.sshKeyFile}";
+
restartIfChanged = false;
+
if [ ! -e ${repositoryDirectory} ]; then
+
mkdir --parents ${repositoryDirectory}
+
git init ${repositoryDirectory}
+
${gitWithRepo} fetch ${lib.escapeShellArg cfg.repository} ${lib.escapeShellArg cfg.branch}
+
${gitWithRepo} checkout FETCH_HEAD
+
nix-build${renderNixArgs cfg.nixArgs} ${lib.cli.toGNUCommandLineShell { } {
+
attr = cfg.nixAttribute;
+
}} ${lib.escapeShellArg "${repositoryDirectory}${cfg.nixFile}"}
+
${lib.optionalString (cfg.switchCommand != "test")
+
"nix-env --profile /nix/var/nix/profiles/system --set ${outPath}"}
+
${outPath}/bin/switch-to-configuration ${cfg.switchCommand}
+
${gitWithRepo} gc --prune=all
+
${lib.optionalString (cfg.switchCommand == "boot") "systemctl reboot"}