Compare commits
92 Commits
push-qxwmr
...
main
| Author | SHA1 | Date | |
|---|---|---|---|
| 8bef2e6b2e | |||
|
|
8eaca289ad | ||
|
|
6f2d482187 | ||
|
|
4c30418f12 | ||
|
|
3c66094d89 | ||
|
|
a8f180f8da | ||
|
|
e22218d589 | ||
|
|
228c60bcf7 | ||
|
|
ed2b2d9df9 | ||
|
|
7e2a127d11 | ||
|
|
8c8bacb1ab | ||
|
|
8ba71144b6 | ||
|
|
7f2d15c8a1 | ||
|
|
486463c793 | ||
|
|
071603d688 | ||
|
|
c612561ec3 | ||
|
|
a88cd2be40 | ||
|
|
7140b417d3 | ||
|
|
c7a42cca7f | ||
|
|
29ca23c629 | ||
|
|
cd7210de1b | ||
|
|
c2ebafcf92 | ||
|
|
2a9e4e7860 | ||
|
|
43a7652624 | ||
|
|
65fd25bc2e | ||
|
|
f89ea15749 | ||
|
|
19d4833be8 | ||
|
|
82f12eaf6f | ||
|
|
0b5a8e98de | ||
|
|
c5bddada05 | ||
|
|
62b64c3b3e | ||
|
|
19a1ad6081 | ||
|
|
a2df5db3d6 | ||
|
|
ac46f890ea | ||
|
|
83f78d9f59 | ||
|
|
19abf8d288 | ||
|
|
e5105e31c4 | ||
|
|
0f847b4799 | ||
|
|
40a8a823b8 | ||
|
|
e3adb3fc71 | ||
|
|
a569a1d147 | ||
|
|
64718b77ca | ||
|
|
7b34c39736 | ||
|
|
4d6ab60793 | ||
|
|
35bffee544 | ||
|
|
16917fd79b | ||
|
|
895c116c01 | ||
|
|
e67151f7b9 | ||
|
|
8d26ec1760 | ||
|
|
7a9062b629 | ||
|
|
de07454a0a | ||
|
|
6fe60f61cf | ||
|
|
3fa74847e4 | ||
|
|
fc37140b52 | ||
|
|
83406c61f3 | ||
|
|
6d736e7e80 | ||
|
|
7b6cec4100 | ||
|
|
e21a6516b5 | ||
|
|
6ffe8ea5f6 | ||
|
|
0a2fefd141 | ||
|
|
0c885d05b6 | ||
|
|
58d85b117a | ||
|
|
ad58d7b6e9 | ||
|
|
7a63cb9642 | ||
|
|
196b98da36 | ||
|
|
42acbe95b8 | ||
|
|
b6b065e365 | ||
|
|
4b1955b189 | ||
|
|
ef7ef8b843 | ||
|
|
38c1367322 | ||
|
|
8e72c086fd | ||
|
|
c454b1339d | ||
|
|
d1b2d43e5b | ||
|
|
da98ca0f1c | ||
|
|
1953540d08 | ||
|
|
be31b9ce21 | ||
|
|
169b4016e6 | ||
|
|
2e55028a1b | ||
|
|
1d228231f2 | ||
|
|
affb926450 | ||
|
|
c7f65e929f | ||
|
|
ba4ff493e8 | ||
|
|
eb08803e2a | ||
|
|
bbc9486f0e | ||
|
|
999d709350 | ||
|
|
0b1a330cc2 | ||
|
|
995b7cf50d | ||
|
|
bc290fe59f | ||
|
|
5477b13233 | ||
|
|
d6170e5efb | ||
|
|
18fe117363 | ||
|
|
33a868acc2 |
@@ -58,51 +58,53 @@
|
|||||||
pkgs.buildPackages.xorg.lndir
|
pkgs.buildPackages.xorg.lndir
|
||||||
pkgs.glibcLocales
|
pkgs.glibcLocales
|
||||||
pkgs.kbd.out
|
pkgs.kbd.out
|
||||||
self.nixosConfigurations."test-flash-machine-${pkgs.hostPlatform.system}".pkgs.perlPackages.ConfigIniFiles
|
self.nixosConfigurations."test-flash-machine-${pkgs.stdenv.hostPlatform.system}".pkgs.perlPackages.ConfigIniFiles
|
||||||
self.nixosConfigurations."test-flash-machine-${pkgs.hostPlatform.system}".pkgs.perlPackages.FileSlurp
|
self.nixosConfigurations."test-flash-machine-${pkgs.stdenv.hostPlatform.system}".pkgs.perlPackages.FileSlurp
|
||||||
pkgs.bubblewrap
|
pkgs.bubblewrap
|
||||||
|
|
||||||
self.nixosConfigurations."test-flash-machine-${pkgs.hostPlatform.system}".config.system.build.toplevel
|
self.nixosConfigurations."test-flash-machine-${pkgs.stdenv.hostPlatform.system}".config.system.build.toplevel
|
||||||
self.nixosConfigurations."test-flash-machine-${pkgs.hostPlatform.system}".config.system.build.diskoScript
|
self.nixosConfigurations."test-flash-machine-${pkgs.stdenv.hostPlatform.system}".config.system.build.diskoScript
|
||||||
self.nixosConfigurations."test-flash-machine-${pkgs.hostPlatform.system}".config.system.build.diskoScript.drvPath
|
self.nixosConfigurations."test-flash-machine-${pkgs.stdenv.hostPlatform.system}".config.system.build.diskoScript.drvPath
|
||||||
]
|
]
|
||||||
++ builtins.map (i: i.outPath) (builtins.attrValues self.inputs);
|
++ builtins.map (i: i.outPath) (builtins.attrValues self.inputs);
|
||||||
closureInfo = pkgs.closureInfo { rootPaths = dependencies; };
|
closureInfo = pkgs.closureInfo { rootPaths = dependencies; };
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
# Skip flash test on aarch64-linux for now as it's too slow
|
# Skip flash test on aarch64-linux for now as it's too slow
|
||||||
checks = lib.optionalAttrs (pkgs.stdenv.isLinux && pkgs.hostPlatform.system != "aarch64-linux") {
|
checks =
|
||||||
nixos-test-flash = self.clanLib.test.baseTest {
|
lib.optionalAttrs (pkgs.stdenv.isLinux && pkgs.stdenv.hostPlatform.system != "aarch64-linux")
|
||||||
name = "flash";
|
{
|
||||||
nodes.target = {
|
nixos-test-flash = self.clanLib.test.baseTest {
|
||||||
virtualisation.emptyDiskImages = [ 4096 ];
|
name = "flash";
|
||||||
virtualisation.memorySize = 4096;
|
nodes.target = {
|
||||||
|
virtualisation.emptyDiskImages = [ 4096 ];
|
||||||
|
virtualisation.memorySize = 4096;
|
||||||
|
|
||||||
virtualisation.useNixStoreImage = true;
|
virtualisation.useNixStoreImage = true;
|
||||||
virtualisation.writableStore = true;
|
virtualisation.writableStore = true;
|
||||||
|
|
||||||
environment.systemPackages = [ self.packages.${pkgs.system}.clan-cli ];
|
environment.systemPackages = [ self.packages.${pkgs.system}.clan-cli ];
|
||||||
environment.etc."install-closure".source = "${closureInfo}/store-paths";
|
environment.etc."install-closure".source = "${closureInfo}/store-paths";
|
||||||
|
|
||||||
nix.settings = {
|
nix.settings = {
|
||||||
substituters = lib.mkForce [ ];
|
substituters = lib.mkForce [ ];
|
||||||
hashed-mirrors = null;
|
hashed-mirrors = null;
|
||||||
connect-timeout = lib.mkForce 3;
|
connect-timeout = lib.mkForce 3;
|
||||||
flake-registry = "";
|
flake-registry = "";
|
||||||
experimental-features = [
|
experimental-features = [
|
||||||
"nix-command"
|
"nix-command"
|
||||||
"flakes"
|
"flakes"
|
||||||
];
|
];
|
||||||
};
|
};
|
||||||
|
};
|
||||||
|
testScript = ''
|
||||||
|
start_all()
|
||||||
|
machine.succeed("echo 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIRWUusawhlIorx7VFeQJHmMkhl9X3QpnvOdhnV/bQNG root@target' > ./test_id_ed25519.pub")
|
||||||
|
# Some distros like to automount disks with spaces
|
||||||
|
machine.succeed('mkdir -p "/mnt/with spaces" && mkfs.ext4 /dev/vdc && mount /dev/vdc "/mnt/with spaces"')
|
||||||
|
machine.succeed("clan flash write --ssh-pubkey ./test_id_ed25519.pub --keymap de --language de_DE.UTF-8 --debug --flake ${self.checks.x86_64-linux.clan-core-for-checks} --yes --disk main /dev/vdc test-flash-machine-${pkgs.stdenv.hostPlatform.system}")
|
||||||
|
'';
|
||||||
|
} { inherit pkgs self; };
|
||||||
};
|
};
|
||||||
testScript = ''
|
|
||||||
start_all()
|
|
||||||
machine.succeed("echo 'ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIRWUusawhlIorx7VFeQJHmMkhl9X3QpnvOdhnV/bQNG root@target' > ./test_id_ed25519.pub")
|
|
||||||
# Some distros like to automount disks with spaces
|
|
||||||
machine.succeed('mkdir -p "/mnt/with spaces" && mkfs.ext4 /dev/vdc && mount /dev/vdc "/mnt/with spaces"')
|
|
||||||
machine.succeed("clan flash write --ssh-pubkey ./test_id_ed25519.pub --keymap de --language de_DE.UTF-8 --debug --flake ${self.checks.x86_64-linux.clan-core-for-checks} --yes --disk main /dev/vdc test-flash-machine-${pkgs.hostPlatform.system}")
|
|
||||||
'';
|
|
||||||
} { inherit pkgs self; };
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -160,9 +160,9 @@
|
|||||||
closureInfo = pkgs.closureInfo {
|
closureInfo = pkgs.closureInfo {
|
||||||
rootPaths = [
|
rootPaths = [
|
||||||
privateInputs.clan-core-for-checks
|
privateInputs.clan-core-for-checks
|
||||||
self.nixosConfigurations."test-install-machine-${pkgs.hostPlatform.system}".config.system.build.toplevel
|
self.nixosConfigurations."test-install-machine-${pkgs.stdenv.hostPlatform.system}".config.system.build.toplevel
|
||||||
self.nixosConfigurations."test-install-machine-${pkgs.hostPlatform.system}".config.system.build.initialRamdisk
|
self.nixosConfigurations."test-install-machine-${pkgs.stdenv.hostPlatform.system}".config.system.build.initialRamdisk
|
||||||
self.nixosConfigurations."test-install-machine-${pkgs.hostPlatform.system}".config.system.build.diskoScript
|
self.nixosConfigurations."test-install-machine-${pkgs.stdenv.hostPlatform.system}".config.system.build.diskoScript
|
||||||
pkgs.stdenv.drvPath
|
pkgs.stdenv.drvPath
|
||||||
pkgs.bash.drvPath
|
pkgs.bash.drvPath
|
||||||
pkgs.buildPackages.xorg.lndir
|
pkgs.buildPackages.xorg.lndir
|
||||||
@@ -215,7 +215,7 @@
|
|||||||
# Prepare test flake and Nix store
|
# Prepare test flake and Nix store
|
||||||
flake_dir = prepare_test_flake(
|
flake_dir = prepare_test_flake(
|
||||||
temp_dir,
|
temp_dir,
|
||||||
"${self.checks.${pkgs.hostPlatform.system}.clan-core-for-checks}",
|
"${self.checks.${pkgs.stdenv.hostPlatform.system}.clan-core-for-checks}",
|
||||||
"${closureInfo}"
|
"${closureInfo}"
|
||||||
)
|
)
|
||||||
|
|
||||||
@@ -296,7 +296,7 @@
|
|||||||
# Prepare test flake and Nix store
|
# Prepare test flake and Nix store
|
||||||
flake_dir = prepare_test_flake(
|
flake_dir = prepare_test_flake(
|
||||||
temp_dir,
|
temp_dir,
|
||||||
"${self.checks.${pkgs.hostPlatform.system}.clan-core-for-checks}",
|
"${self.checks.${pkgs.stdenv.hostPlatform.system}.clan-core-for-checks}",
|
||||||
"${closureInfo}"
|
"${closureInfo}"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
let
|
let
|
||||||
|
|
||||||
cli = self.packages.${pkgs.hostPlatform.system}.clan-cli-full;
|
cli = self.packages.${pkgs.stdenv.hostPlatform.system}.clan-cli-full;
|
||||||
|
|
||||||
ollama-model = pkgs.callPackage ./qwen3-4b-instruct.nix { };
|
ollama-model = pkgs.callPackage ./qwen3-4b-instruct.nix { };
|
||||||
in
|
in
|
||||||
@@ -53,7 +53,7 @@ in
|
|||||||
pytest
|
pytest
|
||||||
pytest-xdist
|
pytest-xdist
|
||||||
(cli.pythonRuntime.pkgs.toPythonModule cli)
|
(cli.pythonRuntime.pkgs.toPythonModule cli)
|
||||||
self.legacyPackages.${pkgs.hostPlatform.system}.nixosTestLib
|
self.legacyPackages.${pkgs.stdenv.hostPlatform.system}.nixosTestLib
|
||||||
]
|
]
|
||||||
))
|
))
|
||||||
];
|
];
|
||||||
|
|||||||
@@ -2,7 +2,7 @@
|
|||||||
|
|
||||||
let
|
let
|
||||||
|
|
||||||
cli = self.packages.${pkgs.hostPlatform.system}.clan-cli-full;
|
cli = self.packages.${pkgs.stdenv.hostPlatform.system}.clan-cli-full;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
name = "systemd-abstraction";
|
name = "systemd-abstraction";
|
||||||
|
|||||||
@@ -115,9 +115,9 @@
|
|||||||
let
|
let
|
||||||
closureInfo = pkgs.closureInfo {
|
closureInfo = pkgs.closureInfo {
|
||||||
rootPaths = [
|
rootPaths = [
|
||||||
self.packages.${pkgs.hostPlatform.system}.clan-cli
|
self.packages.${pkgs.stdenv.hostPlatform.system}.clan-cli
|
||||||
self.checks.${pkgs.hostPlatform.system}.clan-core-for-checks
|
self.checks.${pkgs.stdenv.hostPlatform.system}.clan-core-for-checks
|
||||||
self.clanInternals.machines.${pkgs.hostPlatform.system}.test-update-machine.config.system.build.toplevel
|
self.clanInternals.machines.${pkgs.stdenv.hostPlatform.system}.test-update-machine.config.system.build.toplevel
|
||||||
pkgs.stdenv.drvPath
|
pkgs.stdenv.drvPath
|
||||||
pkgs.bash.drvPath
|
pkgs.bash.drvPath
|
||||||
pkgs.buildPackages.xorg.lndir
|
pkgs.buildPackages.xorg.lndir
|
||||||
@@ -132,7 +132,7 @@
|
|||||||
imports = [ self.nixosModules.test-update-machine ];
|
imports = [ self.nixosModules.test-update-machine ];
|
||||||
};
|
};
|
||||||
extraPythonPackages = _p: [
|
extraPythonPackages = _p: [
|
||||||
self.legacyPackages.${pkgs.hostPlatform.system}.nixosTestLib
|
self.legacyPackages.${pkgs.stdenv.hostPlatform.system}.nixosTestLib
|
||||||
];
|
];
|
||||||
|
|
||||||
testScript = ''
|
testScript = ''
|
||||||
@@ -154,7 +154,7 @@
|
|||||||
# Prepare test flake and Nix store
|
# Prepare test flake and Nix store
|
||||||
flake_dir = prepare_test_flake(
|
flake_dir = prepare_test_flake(
|
||||||
temp_dir,
|
temp_dir,
|
||||||
"${self.checks.${pkgs.hostPlatform.system}.clan-core-for-checks}",
|
"${self.checks.${pkgs.stdenv.hostPlatform.system}.clan-core-for-checks}",
|
||||||
"${closureInfo}"
|
"${closureInfo}"
|
||||||
)
|
)
|
||||||
(flake_dir / ".clan-flake").write_text("") # Ensure .clan-flake exists
|
(flake_dir / ".clan-flake").write_text("") # Ensure .clan-flake exists
|
||||||
@@ -226,7 +226,7 @@
|
|||||||
"--to",
|
"--to",
|
||||||
"ssh://root@192.168.1.1",
|
"ssh://root@192.168.1.1",
|
||||||
"--no-check-sigs",
|
"--no-check-sigs",
|
||||||
f"${self.packages.${pkgs.hostPlatform.system}.clan-cli}",
|
f"${self.packages.${pkgs.stdenv.hostPlatform.system}.clan-cli}",
|
||||||
"--extra-experimental-features", "nix-command flakes",
|
"--extra-experimental-features", "nix-command flakes",
|
||||||
],
|
],
|
||||||
check=True,
|
check=True,
|
||||||
@@ -242,7 +242,7 @@
|
|||||||
"-o", "UserKnownHostsFile=/dev/null",
|
"-o", "UserKnownHostsFile=/dev/null",
|
||||||
"-o", "StrictHostKeyChecking=no",
|
"-o", "StrictHostKeyChecking=no",
|
||||||
f"root@192.168.1.1",
|
f"root@192.168.1.1",
|
||||||
"${self.packages.${pkgs.hostPlatform.system}.clan-cli}/bin/clan",
|
"${self.packages.${pkgs.stdenv.hostPlatform.system}.clan-cli}/bin/clan",
|
||||||
"machines",
|
"machines",
|
||||||
"update",
|
"update",
|
||||||
"--debug",
|
"--debug",
|
||||||
@@ -270,7 +270,7 @@
|
|||||||
|
|
||||||
# Run clan update command
|
# Run clan update command
|
||||||
subprocess.run([
|
subprocess.run([
|
||||||
"${self.packages.${pkgs.hostPlatform.system}.clan-cli-full}/bin/clan",
|
"${self.packages.${pkgs.stdenv.hostPlatform.system}.clan-cli-full}/bin/clan",
|
||||||
"machines",
|
"machines",
|
||||||
"update",
|
"update",
|
||||||
"--debug",
|
"--debug",
|
||||||
@@ -297,7 +297,7 @@
|
|||||||
|
|
||||||
# Run clan update command with --build-host
|
# Run clan update command with --build-host
|
||||||
subprocess.run([
|
subprocess.run([
|
||||||
"${self.packages.${pkgs.hostPlatform.system}.clan-cli-full}/bin/clan",
|
"${self.packages.${pkgs.stdenv.hostPlatform.system}.clan-cli-full}/bin/clan",
|
||||||
"machines",
|
"machines",
|
||||||
"update",
|
"update",
|
||||||
"--debug",
|
"--debug",
|
||||||
|
|||||||
@@ -1,3 +1,6 @@
|
|||||||
|
!!! Danger "Experimental"
|
||||||
|
This service is experimental and will change in the future.
|
||||||
|
|
||||||
This service sets up a certificate authority (CA) that can issue certificates to
|
This service sets up a certificate authority (CA) that can issue certificates to
|
||||||
other machines in your clan. For this the `ca` role is used.
|
other machines in your clan. For this the `ca` role is used.
|
||||||
It additionally provides a `default` role, that can be applied to all machines
|
It additionally provides a `default` role, that can be applied to all machines
|
||||||
|
|||||||
@@ -1,3 +1,6 @@
|
|||||||
|
!!! Danger "Experimental"
|
||||||
|
This service is experimental and will change in the future.
|
||||||
|
|
||||||
This module enables hosting clan-internal services easily, which can be resolved
|
This module enables hosting clan-internal services easily, which can be resolved
|
||||||
inside your VPN. This allows defining a custom top-level domain (e.g. `.clan`)
|
inside your VPN. This allows defining a custom top-level domain (e.g. `.clan`)
|
||||||
and exposing endpoints from a machine to others, which will be
|
and exposing endpoints from a machine to others, which will be
|
||||||
|
|||||||
@@ -1 +1,83 @@
|
|||||||
This a test README just to appease the eval warnings if we don't have one
|
!!! Danger "Experimental"
|
||||||
|
This service is for demonstration purpose only and may change in the future.
|
||||||
|
|
||||||
|
The Hello-World Clan Service is a minimal example showing how to build and register your own service.
|
||||||
|
|
||||||
|
It serves as a reference implementation and is used in clan-core CI tests to ensure compatibility.
|
||||||
|
|
||||||
|
## What it demonstrates
|
||||||
|
|
||||||
|
- How to define a basic Clan-compatible service.
|
||||||
|
- How to structure your service for discovery and configuration.
|
||||||
|
- How Clan services interact with nixos.
|
||||||
|
|
||||||
|
## Testing
|
||||||
|
|
||||||
|
This service demonstrates two levels of testing to ensure quality and stability across releases:
|
||||||
|
|
||||||
|
1. **Unit & Integration Testing** — via [`nix-unit`](https://github.com/nix-community/nix-unit)
|
||||||
|
2. **End-to-End Testing** — via **NixOS VM tests**, which we extended to support **container virtualization** for better performance.
|
||||||
|
|
||||||
|
We highly advocate following the [Practical Testing Pyramid](https://martinfowler.com/articles/practical-test-pyramid.html):
|
||||||
|
|
||||||
|
* Write **unit tests** for core logic and invariants.
|
||||||
|
* Add **one or two end-to-end (E2E)** tests to confirm your service starts and behaves correctly in a real NixOS environment.
|
||||||
|
|
||||||
|
NixOS is **untyped** and frequently changes; tests are the safest way to ensure long-term stability of services.
|
||||||
|
|
||||||
|
```
|
||||||
|
/ \
|
||||||
|
/ \
|
||||||
|
/ E2E \
|
||||||
|
/-------\
|
||||||
|
/ \
|
||||||
|
/Integration\
|
||||||
|
/-------------\
|
||||||
|
/ \
|
||||||
|
/ Unit Tests \
|
||||||
|
-------------------
|
||||||
|
```
|
||||||
|
|
||||||
|
### nix-unit
|
||||||
|
|
||||||
|
We highly advocate the usage of
|
||||||
|
|
||||||
|
[nix-unit](https://github.com/nix-community/nix-unit)
|
||||||
|
|
||||||
|
Example in: tests/eval-tests.nix
|
||||||
|
|
||||||
|
If you use flake-parts you can use the [native integration](https://flake.parts/options/nix-unit.html)
|
||||||
|
|
||||||
|
If nix-unit succeeds you'r nixos evaluation should be mostly correct.
|
||||||
|
|
||||||
|
!!! Tip
|
||||||
|
- Ensure most used 'settings' and variants are tested.
|
||||||
|
- Think about some important edge-cases your system should handle.
|
||||||
|
|
||||||
|
### NixOS VM / Container Test
|
||||||
|
|
||||||
|
!!! Warning "Early Vars & clanTest"
|
||||||
|
The testing system around vars is experimental
|
||||||
|
|
||||||
|
`clanTest` is still experimental and enables container virtualization by default.
|
||||||
|
This is still early and might have some limitations.
|
||||||
|
|
||||||
|
Some minimal boilerplate is needed to use `clanTest`
|
||||||
|
|
||||||
|
```nix
|
||||||
|
nixosLib = import (inputs.nixpkgs + "/nixos/lib") { }
|
||||||
|
nixosLib.runTest (
|
||||||
|
{ ... }:
|
||||||
|
{
|
||||||
|
imports = [
|
||||||
|
self.modules.nixosTest.clanTest
|
||||||
|
# Example in tests/vm/default.nix
|
||||||
|
testModule
|
||||||
|
];
|
||||||
|
hostPkgs = pkgs;
|
||||||
|
|
||||||
|
# Uncomment if you don't want or cannot use containers
|
||||||
|
# test.useContainers = false;
|
||||||
|
}
|
||||||
|
)
|
||||||
|
```
|
||||||
|
|||||||
@@ -8,7 +8,7 @@
|
|||||||
{
|
{
|
||||||
_class = "clan.service";
|
_class = "clan.service";
|
||||||
manifest.name = "clan-core/hello-word";
|
manifest.name = "clan-core/hello-word";
|
||||||
manifest.description = "This is a test";
|
manifest.description = "Minimal example clan service that greets the world";
|
||||||
manifest.readme = builtins.readFile ./README.md;
|
manifest.readme = builtins.readFile ./README.md;
|
||||||
|
|
||||||
# This service provides two roles: "morning" and "evening". Roles can be
|
# This service provides two roles: "morning" and "evening". Roles can be
|
||||||
|
|||||||
@@ -26,7 +26,7 @@ in
|
|||||||
# The hello-world service being tested
|
# The hello-world service being tested
|
||||||
../../clanServices/hello-world
|
../../clanServices/hello-world
|
||||||
# Required modules
|
# Required modules
|
||||||
../../nixosModules/clanCore
|
../../nixosModules
|
||||||
];
|
];
|
||||||
testName = "hello-world";
|
testName = "hello-world";
|
||||||
tests = ./tests/eval-tests.nix;
|
tests = ./tests/eval-tests.nix;
|
||||||
|
|||||||
@@ -4,7 +4,7 @@
|
|||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
let
|
let
|
||||||
testFlake = clanLib.clan {
|
testClan = clanLib.clan {
|
||||||
self = { };
|
self = { };
|
||||||
# Point to the folder of the module
|
# Point to the folder of the module
|
||||||
# TODO: make this optional
|
# TODO: make this optional
|
||||||
@@ -33,10 +33,20 @@ let
|
|||||||
};
|
};
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
test_simple = {
|
/**
|
||||||
config = testFlake.config;
|
We highly advocate the usage of:
|
||||||
|
https://github.com/nix-community/nix-unit
|
||||||
|
|
||||||
expr = { };
|
If you use flake-parts you can use the native integration: https://flake.parts/options/nix-unit.html
|
||||||
expected = { };
|
*/
|
||||||
|
test_simple = {
|
||||||
|
# Allows inspection via the nix-repl
|
||||||
|
# Ignored by nix-unit; it only looks at 'expr' and 'expected'
|
||||||
|
inherit testClan;
|
||||||
|
|
||||||
|
# Assert that jon has the
|
||||||
|
# configured greeting in 'environment.etc.hello.text'
|
||||||
|
expr = testClan.config.nixosConfigurations.jon.config.environment.etc."hello".text;
|
||||||
|
expected = "Good evening World!";
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,8 +1,5 @@
|
|||||||
🚧🚧🚧 Experimental 🚧🚧🚧
|
!!! Danger "Experimental"
|
||||||
|
This service is experimental and will change in the future.
|
||||||
Use at your own risk.
|
|
||||||
|
|
||||||
We are still refining its interfaces, instability and breakages are expected.
|
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -1,3 +1,6 @@
|
|||||||
|
!!! Danger "Experimental"
|
||||||
|
This service is experimental and will change in the future.
|
||||||
|
|
||||||
## Usage
|
## Usage
|
||||||
|
|
||||||
```
|
```
|
||||||
|
|||||||
@@ -39,6 +39,7 @@
|
|||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
let
|
let
|
||||||
|
uniqueStrings = list: builtins.attrNames (builtins.groupBy lib.id list);
|
||||||
# Collect searchDomains from all servers in this instance
|
# Collect searchDomains from all servers in this instance
|
||||||
allServerSearchDomains = lib.flatten (
|
allServerSearchDomains = lib.flatten (
|
||||||
lib.mapAttrsToList (_name: machineConfig: machineConfig.settings.certificate.searchDomains or [ ]) (
|
lib.mapAttrsToList (_name: machineConfig: machineConfig.settings.certificate.searchDomains or [ ]) (
|
||||||
@@ -46,7 +47,7 @@
|
|||||||
)
|
)
|
||||||
);
|
);
|
||||||
# Merge client's searchDomains with all servers' searchDomains
|
# Merge client's searchDomains with all servers' searchDomains
|
||||||
searchDomains = lib.uniqueStrings (settings.certificate.searchDomains ++ allServerSearchDomains);
|
searchDomains = uniqueStrings (settings.certificate.searchDomains ++ allServerSearchDomains);
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
clan.core.vars.generators.openssh-ca = lib.mkIf (searchDomains != [ ]) {
|
clan.core.vars.generators.openssh-ca = lib.mkIf (searchDomains != [ ]) {
|
||||||
|
|||||||
@@ -1,8 +1,5 @@
|
|||||||
🚧🚧🚧 Experimental 🚧🚧🚧
|
!!! Danger "Experimental"
|
||||||
|
This service is experimental and will change in the future.
|
||||||
Use at your own risk.
|
|
||||||
|
|
||||||
We are still refining its interfaces, instability and breakages are expected.
|
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
|
|||||||
@@ -41,14 +41,14 @@ let
|
|||||||
# In this case it is 'self-zerotier-redux'
|
# In this case it is 'self-zerotier-redux'
|
||||||
# This is usually only used internally, but we can use it to test the evaluation of service module in isolation
|
# This is usually only used internally, but we can use it to test the evaluation of service module in isolation
|
||||||
# evaluatedService =
|
# evaluatedService =
|
||||||
# testFlake.clanInternals.inventoryClass.distributedServices.importedModulesEvaluated.self-zerotier-redux.config;
|
# testFlake.clanInternals.inventoryClass.distributedServices.servicesEval.config.mappedServices.self-zerotier-redux.config;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
test_simple = {
|
test_simple = {
|
||||||
inherit testFlake;
|
inherit testFlake;
|
||||||
|
|
||||||
expr =
|
expr =
|
||||||
testFlake.config.clan.clanInternals.inventoryClass.distributedServices.importedModulesEvaluated.self-wifi.config;
|
testFlake.config.clan.clanInternals.inventoryClass.distributedServices.servicesEval.config.mappedServices.self-wifi.config;
|
||||||
expected = 1;
|
expected = 1;
|
||||||
|
|
||||||
# expr = {
|
# expr = {
|
||||||
|
|||||||
@@ -1,12 +1,9 @@
|
|||||||
🚧🚧🚧 Experimental 🚧🚧🚧
|
!!! Danger "Experimental"
|
||||||
|
This service is experimental and will change in the future.
|
||||||
Use at your own risk.
|
|
||||||
|
|
||||||
We are still refining its interfaces, instability and breakages are expected.
|
|
||||||
|
|
||||||
---
|
---
|
||||||
|
|
||||||
This module sets up [yggdrasil](https://yggdrasil-network.github.io/) across your clan.
|
This module sets up [yggdrasil](https://yggdrasil-network.github.io/) across your clan.
|
||||||
|
|
||||||
Yggdrasil is designed to be a future-proof and decentralised alternative to the
|
Yggdrasil is designed to be a future-proof and decentralised alternative to the
|
||||||
structured routing protocols commonly used today on the internet. Inside your
|
structured routing protocols commonly used today on the internet. Inside your
|
||||||
|
|||||||
@@ -140,6 +140,9 @@
|
|||||||
pkgs,
|
pkgs,
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
|
let
|
||||||
|
uniqueStrings = list: builtins.attrNames (builtins.groupBy lib.id list);
|
||||||
|
in
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
(import ./shared.nix {
|
(import ./shared.nix {
|
||||||
@@ -156,7 +159,7 @@
|
|||||||
config = {
|
config = {
|
||||||
systemd.services.zerotier-inventory-autoaccept =
|
systemd.services.zerotier-inventory-autoaccept =
|
||||||
let
|
let
|
||||||
machines = lib.uniqueStrings (
|
machines = uniqueStrings (
|
||||||
(lib.optionals (roles ? moon) (lib.attrNames roles.moon.machines))
|
(lib.optionals (roles ? moon) (lib.attrNames roles.moon.machines))
|
||||||
++ (lib.optionals (roles ? controller) (lib.attrNames roles.controller.machines))
|
++ (lib.optionals (roles ? controller) (lib.attrNames roles.controller.machines))
|
||||||
++ (lib.optionals (roles ? peer) (lib.attrNames roles.peer.machines))
|
++ (lib.optionals (roles ? peer) (lib.attrNames roles.peer.machines))
|
||||||
|
|||||||
18
devFlake/flake.lock
generated
18
devFlake/flake.lock
generated
@@ -105,11 +105,11 @@
|
|||||||
},
|
},
|
||||||
"nixpkgs-dev": {
|
"nixpkgs-dev": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1761631514,
|
"lastModified": 1762328495,
|
||||||
"narHash": "sha256-VsXz+2W4DFBozzppbF9SXD9pNcv17Z+c/lYXvPJi/eI=",
|
"narHash": "sha256-IUZvw5kvLiExApP9+SK/styzEKSqfe0NPclu9/z85OQ=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "a0b0d4b52b5f375658ca8371dc49bff171dbda91",
|
"rev": "4c621660e393922cf68cdbfc40eb5a2d54d3989a",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -128,11 +128,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1760652422,
|
"lastModified": 1761730856,
|
||||||
"narHash": "sha256-C88Pgz38QIl9JxQceexqL2G7sw9vodHWx1Uaq+NRJrw=",
|
"narHash": "sha256-t1i5p/vSWwueZSC0Z2BImxx3BjoUDNKyC2mk24krcMY=",
|
||||||
"owner": "NuschtOS",
|
"owner": "NuschtOS",
|
||||||
"repo": "search",
|
"repo": "search",
|
||||||
"rev": "3ebeebe8b6a49dfb11f771f761e0310f7c48d726",
|
"rev": "e29de6db0cb3182e9aee75a3b1fd1919d995d85b",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -208,11 +208,11 @@
|
|||||||
"nixpkgs": []
|
"nixpkgs": []
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1761311587,
|
"lastModified": 1762366246,
|
||||||
"narHash": "sha256-Msq86cR5SjozQGCnC6H8C+0cD4rnx91BPltZ9KK613Y=",
|
"narHash": "sha256-3xc/f/ZNb5ma9Fc9knIzEwygXotA+0BZFQ5V5XovSOQ=",
|
||||||
"owner": "numtide",
|
"owner": "numtide",
|
||||||
"repo": "treefmt-nix",
|
"repo": "treefmt-nix",
|
||||||
"rev": "2eddae033e4e74bf581c2d1dfa101f9033dbd2dc",
|
"rev": "a82c779ca992190109e431d7d680860e6723e048",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
|||||||
@@ -51,7 +51,7 @@ Make sure you have the following:
|
|||||||
**Note:** This creates a new directory in your current location
|
**Note:** This creates a new directory in your current location
|
||||||
|
|
||||||
```shellSession
|
```shellSession
|
||||||
nix run https://git.clan.lol/clan/clan-core/archive/main.tar.gz#clan-cli --refresh -- flakes create
|
nix run "https://git.clan.lol/clan/clan-core/archive/main.tar.gz#clan-cli" --refresh -- flakes create
|
||||||
```
|
```
|
||||||
|
|
||||||
3. Enter a **name** in the prompt:
|
3. Enter a **name** in the prompt:
|
||||||
|
|||||||
@@ -150,10 +150,61 @@ Those are very similar to NixOS VM tests, as in they run virtualized nixos machi
|
|||||||
As of now the container test driver is a downstream development in clan-core.
|
As of now the container test driver is a downstream development in clan-core.
|
||||||
Basically everything stated under the NixOS VM tests sections applies here, except some limitations.
|
Basically everything stated under the NixOS VM tests sections applies here, except some limitations.
|
||||||
|
|
||||||
Limitations:
|
### Using Container Tests vs VM Tests
|
||||||
|
|
||||||
- Cannot run in interactive mode, however while the container test runs, it logs a nsenter command that can be used to log into each of the container.
|
Container tests are **enabled by default** for all tests using the clan testing framework.
|
||||||
- setuid binaries don't work
|
They offer significant performance advantages over VM tests:
|
||||||
|
|
||||||
|
- **Faster startup**
|
||||||
|
- **Lower resource usage**: No full kernel boot or hardware emulation overhead
|
||||||
|
|
||||||
|
To control whether a test uses containers or VMs, use the `clan.test.useContainers` option:
|
||||||
|
|
||||||
|
```nix
|
||||||
|
{
|
||||||
|
clan = {
|
||||||
|
directory = ./.;
|
||||||
|
test.useContainers = true; # Use containers (default)
|
||||||
|
# test.useContainers = false; # Use VMs instead
|
||||||
|
};
|
||||||
|
}
|
||||||
|
```
|
||||||
|
|
||||||
|
**When to use VM tests instead of container tests:**
|
||||||
|
|
||||||
|
- Testing kernel features, modules, or boot processes
|
||||||
|
- Testing hardware-specific features
|
||||||
|
- When you need full system isolation
|
||||||
|
|
||||||
|
### System Requirements for Container Tests
|
||||||
|
|
||||||
|
Container tests require the **`uid-range`** system feature** in the Nix sandbox.
|
||||||
|
This feature allows Nix to allocate a range of UIDs for containers to use, enabling `systemd-nspawn` containers to run properly inside the Nix build sandbox.
|
||||||
|
|
||||||
|
**Configuration:**
|
||||||
|
|
||||||
|
The `uid-range` feature requires the `auto-allocate-uids` setting to be enabled in your Nix configuration.
|
||||||
|
|
||||||
|
To verify or enable it, add to your `/etc/nix/nix.conf` or NixOS configuration:
|
||||||
|
|
||||||
|
```nix
|
||||||
|
settings.experimental-features = [
|
||||||
|
"auto-allocate-uids"
|
||||||
|
];
|
||||||
|
|
||||||
|
nix.settings.auto-allocate-uids = true;
|
||||||
|
nix.settings.system-features = [ "uid-range" ];
|
||||||
|
```
|
||||||
|
|
||||||
|
**Technical details:**
|
||||||
|
|
||||||
|
- Container tests set `requiredSystemFeatures = [ "uid-range" ];` in their derivation (see `lib/test/container-test-driver/driver-module.nix:98`)
|
||||||
|
- Without this feature, containers cannot properly manage user namespaces and will fail to start
|
||||||
|
|
||||||
|
### Limitations
|
||||||
|
|
||||||
|
- Cannot run in interactive mode, however while the container test runs, it logs a nsenter command that can be used to log into each of the containers.
|
||||||
|
- Early implementation and limited by features.
|
||||||
|
|
||||||
### Where to find examples for NixOS container tests
|
### Where to find examples for NixOS container tests
|
||||||
|
|
||||||
|
|||||||
36
flake.lock
generated
36
flake.lock
generated
@@ -31,11 +31,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1760701190,
|
"lastModified": 1762276996,
|
||||||
"narHash": "sha256-y7UhnWlER8r776JsySqsbTUh2Txf7K30smfHlqdaIQw=",
|
"narHash": "sha256-TtcPgPmp2f0FAnc+DMEw4ardEgv1SGNR3/WFGH0N19M=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "disko",
|
"repo": "disko",
|
||||||
"rev": "3a9450b26e69dcb6f8de6e2b07b3fc1c288d85f5",
|
"rev": "af087d076d3860760b3323f6b583f4d828c1ac17",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -51,11 +51,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1760948891,
|
"lastModified": 1762040540,
|
||||||
"narHash": "sha256-TmWcdiUUaWk8J4lpjzu4gCGxWY6/Ok7mOK4fIFfBuU4=",
|
"narHash": "sha256-z5PlZ47j50VNF3R+IMS9LmzI5fYRGY/Z5O5tol1c9I4=",
|
||||||
"owner": "hercules-ci",
|
"owner": "hercules-ci",
|
||||||
"repo": "flake-parts",
|
"repo": "flake-parts",
|
||||||
"rev": "864599284fc7c0ba6357ed89ed5e2cd5040f0c04",
|
"rev": "0010412d62a25d959151790968765a70c436598b",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -71,11 +71,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1761339987,
|
"lastModified": 1762304480,
|
||||||
"narHash": "sha256-IUaawVwItZKi64IA6kF6wQCLCzpXbk2R46dHn8sHkig=",
|
"narHash": "sha256-ikVIPB/ea/BAODk6aksgkup9k2jQdrwr4+ZRXtBgmSs=",
|
||||||
"owner": "nix-darwin",
|
"owner": "nix-darwin",
|
||||||
"repo": "nix-darwin",
|
"repo": "nix-darwin",
|
||||||
"rev": "7cd9aac79ee2924a85c211d21fafd394b06a38de",
|
"rev": "b8c7ac030211f18bd1f41eae0b815571853db7a2",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -99,11 +99,11 @@
|
|||||||
},
|
},
|
||||||
"nixos-facter-modules": {
|
"nixos-facter-modules": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1761137276,
|
"lastModified": 1762264948,
|
||||||
"narHash": "sha256-4lDjGnWRBLwqKQ4UWSUq6Mvxu9r8DSqCCydodW/Jsi8=",
|
"narHash": "sha256-iaRf6n0KPl9hndnIft3blm1YTAyxSREV1oX0MFZ6Tk4=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "nixos-facter-modules",
|
"repo": "nixos-facter-modules",
|
||||||
"rev": "70bcd64225d167c7af9b475c4df7b5abba5c7de8",
|
"rev": "fa695bff9ec37fd5bbd7ee3181dbeb5f97f53c96",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@@ -115,10 +115,10 @@
|
|||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 315532800,
|
"lastModified": 315532800,
|
||||||
"narHash": "sha256-yDxtm0PESdgNetiJN5+MFxgubBcLDTiuSjjrJiyvsvM=",
|
"narHash": "sha256-LDT9wuUZtjPfmviCcVWif5+7j4kBI2mWaZwjNNeg4eg=",
|
||||||
"rev": "d7f52a7a640bc54c7bb414cca603835bf8dd4b10",
|
"rev": "a7fc11be66bdfb5cdde611ee5ce381c183da8386",
|
||||||
"type": "tarball",
|
"type": "tarball",
|
||||||
"url": "https://releases.nixos.org/nixpkgs/nixpkgs-25.11pre871443.d7f52a7a640b/nixexprs.tar.xz"
|
"url": "https://releases.nixos.org/nixpkgs/nixpkgs-25.11pre887438.a7fc11be66bd/nixexprs.tar.xz"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
"type": "tarball",
|
"type": "tarball",
|
||||||
@@ -181,11 +181,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1761311587,
|
"lastModified": 1762366246,
|
||||||
"narHash": "sha256-Msq86cR5SjozQGCnC6H8C+0cD4rnx91BPltZ9KK613Y=",
|
"narHash": "sha256-3xc/f/ZNb5ma9Fc9knIzEwygXotA+0BZFQ5V5XovSOQ=",
|
||||||
"owner": "numtide",
|
"owner": "numtide",
|
||||||
"repo": "treefmt-nix",
|
"repo": "treefmt-nix",
|
||||||
"rev": "2eddae033e4e74bf581c2d1dfa101f9033dbd2dc",
|
"rev": "a82c779ca992190109e431d7d680860e6723e048",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
|||||||
@@ -2,11 +2,7 @@
|
|||||||
lib,
|
lib,
|
||||||
clanLib,
|
clanLib,
|
||||||
}:
|
}:
|
||||||
let
|
|
||||||
services = clanLib.callLib ./distributed-service/inventory-adapter.nix { };
|
|
||||||
in
|
|
||||||
{
|
{
|
||||||
inherit (services) mapInstances;
|
|
||||||
inventoryModule = {
|
inventoryModule = {
|
||||||
_file = "clanLib.inventory.module";
|
_file = "clanLib.inventory.module";
|
||||||
imports = [
|
imports = [
|
||||||
|
|||||||
@@ -28,19 +28,15 @@ in
|
|||||||
elemType = submoduleWith {
|
elemType = submoduleWith {
|
||||||
class = "clan.service";
|
class = "clan.service";
|
||||||
specialArgs = {
|
specialArgs = {
|
||||||
exports = config.exports;
|
|
||||||
directory = directory;
|
directory = directory;
|
||||||
clanLib = specialArgs.clanLib;
|
clanLib = specialArgs.clanLib;
|
||||||
|
exports = config.exports;
|
||||||
};
|
};
|
||||||
modules = [
|
modules = [
|
||||||
(
|
(
|
||||||
{ name, ... }:
|
{ name, ... }:
|
||||||
{
|
{
|
||||||
_module.args._ctx = [ name ];
|
_module.args._ctx = [ name ];
|
||||||
_module.args.clanLib = specialArgs.clanLib;
|
|
||||||
_module.args.exports = config.exports;
|
|
||||||
_module.args.directory = directory;
|
|
||||||
|
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
./service-module.nix
|
./service-module.nix
|
||||||
|
|||||||
@@ -1,171 +0,0 @@
|
|||||||
# Adapter function between the inventory.instances and the clan.service module
|
|
||||||
#
|
|
||||||
# Data flow:
|
|
||||||
# - inventory.instances -> Adapter -> clan.service module -> Service Resources (i.e. NixosModules per Machine, Vars per Service, etc.)
|
|
||||||
#
|
|
||||||
# What this file does:
|
|
||||||
#
|
|
||||||
# - Resolves the [Module] to an actual module-path and imports it.
|
|
||||||
# - Groups together all the same modules into a single import and creates all instances for it.
|
|
||||||
# - Resolves the inventory tags into machines. Tags don't exist at the service level.
|
|
||||||
# Also combines the settings for 'machines' and 'tags'.
|
|
||||||
{
|
|
||||||
lib,
|
|
||||||
clanLib,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
{
|
|
||||||
mapInstances =
|
|
||||||
{
|
|
||||||
# This is used to resolve the module imports from 'flake.inputs'
|
|
||||||
flakeInputs,
|
|
||||||
# The clan inventory
|
|
||||||
inventory,
|
|
||||||
directory,
|
|
||||||
clanCoreModules,
|
|
||||||
prefix ? [ ],
|
|
||||||
exportsModule,
|
|
||||||
}:
|
|
||||||
let
|
|
||||||
# machineHasTag = machineName: tagName: lib.elem tagName inventory.machines.${machineName}.tags;
|
|
||||||
|
|
||||||
# map the instances into the module
|
|
||||||
importedModuleWithInstances = lib.mapAttrs (
|
|
||||||
instanceName: instance:
|
|
||||||
let
|
|
||||||
resolvedModule = clanLib.resolveModule {
|
|
||||||
moduleSpec = instance.module;
|
|
||||||
inherit flakeInputs clanCoreModules;
|
|
||||||
};
|
|
||||||
|
|
||||||
# Every instance includes machines via roles
|
|
||||||
# :: { client :: ... }
|
|
||||||
instanceRoles = lib.mapAttrs (
|
|
||||||
roleName: role:
|
|
||||||
let
|
|
||||||
resolvedMachines = clanLib.inventory.resolveTags {
|
|
||||||
members = {
|
|
||||||
# Explicit members
|
|
||||||
machines = lib.attrNames role.machines;
|
|
||||||
# Resolved Members
|
|
||||||
tags = lib.attrNames role.tags;
|
|
||||||
};
|
|
||||||
inherit (inventory) machines;
|
|
||||||
inherit instanceName roleName;
|
|
||||||
};
|
|
||||||
in
|
|
||||||
# instances.<instanceName>.roles.<roleName> =
|
|
||||||
# Remove "tags", they are resolved into "machines"
|
|
||||||
(removeAttrs role [ "tags" ])
|
|
||||||
// {
|
|
||||||
machines = lib.genAttrs resolvedMachines.machines (
|
|
||||||
machineName:
|
|
||||||
let
|
|
||||||
machineSettings = instance.roles.${roleName}.machines.${machineName}.settings or { };
|
|
||||||
in
|
|
||||||
# TODO: tag settings
|
|
||||||
# Wait for this feature until option introspection for 'settings' is done.
|
|
||||||
# This might get too complex to handle otherwise.
|
|
||||||
# settingsViaTags = lib.filterAttrs (
|
|
||||||
# tagName: _: machineHasTag machineName tagName
|
|
||||||
# ) instance.roles.${roleName}.tags;
|
|
||||||
{
|
|
||||||
# TODO: Do we want to wrap settings with
|
|
||||||
# setDefaultModuleLocation "inventory.instances.${instanceName}.roles.${roleName}.tags.${tagName}";
|
|
||||||
settings = {
|
|
||||||
imports = [
|
|
||||||
machineSettings
|
|
||||||
]; # ++ lib.attrValues (lib.mapAttrs (_tagName: v: v.settings) settingsViaTags);
|
|
||||||
};
|
|
||||||
}
|
|
||||||
);
|
|
||||||
}
|
|
||||||
) instance.roles;
|
|
||||||
in
|
|
||||||
{
|
|
||||||
inherit (instance) module;
|
|
||||||
inherit resolvedModule instanceRoles;
|
|
||||||
}
|
|
||||||
) inventory.instances or { };
|
|
||||||
|
|
||||||
# Group the instances by the module they resolve to
|
|
||||||
# This is necessary to evaluate the module in a single pass
|
|
||||||
# :: { <module.input>_<module.name> :: [ { name, value } ] }
|
|
||||||
# Since 'perMachine' needs access to all the instances we should include them as a whole
|
|
||||||
grouped = lib.foldlAttrs (
|
|
||||||
acc: instanceName: instance:
|
|
||||||
let
|
|
||||||
inputName = if instance.module.input == null then "<clan-core>" else instance.module.input;
|
|
||||||
id = inputName + "-" + instance.module.name;
|
|
||||||
in
|
|
||||||
acc
|
|
||||||
// {
|
|
||||||
${id} = acc.${id} or [ ] ++ [
|
|
||||||
{
|
|
||||||
inherit instanceName instance;
|
|
||||||
}
|
|
||||||
];
|
|
||||||
}
|
|
||||||
) { } importedModuleWithInstances;
|
|
||||||
|
|
||||||
# servicesEval.config.mappedServices.self-A.result.final.jon.nixosModule
|
|
||||||
allMachines = lib.mapAttrs (machineName: _: {
|
|
||||||
# This is the list of nixosModules for each machine
|
|
||||||
machineImports = lib.foldlAttrs (
|
|
||||||
acc: _module_ident: serviceModule:
|
|
||||||
acc ++ [ serviceModule.result.final.${machineName}.nixosModule or { } ]
|
|
||||||
) [ ] servicesEval.config.mappedServices;
|
|
||||||
}) inventory.machines or { };
|
|
||||||
|
|
||||||
evalServices =
|
|
||||||
{ modules, prefix }:
|
|
||||||
lib.evalModules {
|
|
||||||
class = "clan";
|
|
||||||
specialArgs = {
|
|
||||||
inherit clanLib;
|
|
||||||
_ctx = prefix;
|
|
||||||
};
|
|
||||||
modules = [
|
|
||||||
(import ./all-services-wrapper.nix { inherit directory; })
|
|
||||||
]
|
|
||||||
++ modules;
|
|
||||||
};
|
|
||||||
|
|
||||||
servicesEval = evalServices {
|
|
||||||
inherit prefix;
|
|
||||||
modules = [
|
|
||||||
{
|
|
||||||
inherit exportsModule;
|
|
||||||
mappedServices = lib.mapAttrs (_module_ident: instances: {
|
|
||||||
imports = [
|
|
||||||
# Import the resolved module.
|
|
||||||
# i.e. clan.modules.admin
|
|
||||||
{
|
|
||||||
options.module = lib.mkOption {
|
|
||||||
type = lib.types.raw;
|
|
||||||
default = (builtins.head instances).instance.module;
|
|
||||||
};
|
|
||||||
}
|
|
||||||
(builtins.head instances).instance.resolvedModule
|
|
||||||
] # Include all the instances that correlate to the resolved module
|
|
||||||
++ (builtins.map (v: {
|
|
||||||
instances.${v.instanceName}.roles = v.instance.instanceRoles;
|
|
||||||
}) instances);
|
|
||||||
}) grouped;
|
|
||||||
}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
importedModulesEvaluated = servicesEval.config.mappedServices;
|
|
||||||
|
|
||||||
in
|
|
||||||
{
|
|
||||||
inherit
|
|
||||||
servicesEval
|
|
||||||
importedModuleWithInstances
|
|
||||||
# Exposed for testing
|
|
||||||
grouped
|
|
||||||
allMachines
|
|
||||||
importedModulesEvaluated
|
|
||||||
;
|
|
||||||
};
|
|
||||||
}
|
|
||||||
@@ -7,10 +7,14 @@
|
|||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
let
|
let
|
||||||
inherit (lib) mkOption types uniqueStrings;
|
inherit (lib) mkOption types;
|
||||||
inherit (types) attrsWith submoduleWith;
|
inherit (types) attrsWith submoduleWith;
|
||||||
|
|
||||||
errorContext = "Error context: ${lib.concatStringsSep "." _ctx}";
|
errorContext = "Error context: ${lib.concatStringsSep "." _ctx}";
|
||||||
|
# TODO:
|
||||||
|
# Remove once this gets merged upstream; performs in O(n*log(n) instead of O(n^2))
|
||||||
|
# https://github.com/NixOS/nixpkgs/pull/355616/files
|
||||||
|
uniqueStrings = list: builtins.attrNames (builtins.groupBy lib.id list);
|
||||||
/**
|
/**
|
||||||
Merges the role- and machine-settings using the role interface
|
Merges the role- and machine-settings using the role interface
|
||||||
|
|
||||||
|
|||||||
@@ -4,63 +4,53 @@
|
|||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
let
|
let
|
||||||
inherit (lib)
|
|
||||||
evalModules
|
|
||||||
;
|
|
||||||
|
|
||||||
evalInventory =
|
flakeInputsFixture = {
|
||||||
m:
|
upstream.clan.modules = {
|
||||||
(evalModules {
|
uzzi = {
|
||||||
# Static modules
|
_class = "clan.service";
|
||||||
modules = [
|
manifest = {
|
||||||
clanLib.inventory.inventoryModule
|
name = "uzzi-from-upstream";
|
||||||
{
|
|
||||||
_file = "test file";
|
|
||||||
tags.all = [ ];
|
|
||||||
tags.nixos = [ ];
|
|
||||||
tags.darwin = [ ];
|
|
||||||
}
|
|
||||||
{
|
|
||||||
modules.test = { };
|
|
||||||
}
|
|
||||||
m
|
|
||||||
];
|
|
||||||
}).config;
|
|
||||||
|
|
||||||
callInventoryAdapter =
|
|
||||||
inventoryModule:
|
|
||||||
let
|
|
||||||
inventory = evalInventory inventoryModule;
|
|
||||||
flakeInputsFixture = {
|
|
||||||
self.clan.modules = inventoryModule.modules or { };
|
|
||||||
# Example upstream module
|
|
||||||
upstream.clan.modules = {
|
|
||||||
uzzi = {
|
|
||||||
_class = "clan.service";
|
|
||||||
manifest = {
|
|
||||||
name = "uzzi-from-upstream";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
in
|
|
||||||
clanLib.inventory.mapInstances {
|
|
||||||
directory = ./.;
|
|
||||||
clanCoreModules = { };
|
|
||||||
flakeInputs = flakeInputsFixture;
|
|
||||||
inherit inventory;
|
|
||||||
exportsModule = { };
|
|
||||||
};
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
createTestClan =
|
||||||
|
testClan:
|
||||||
|
let
|
||||||
|
res = clanLib.clan ({
|
||||||
|
# Static / mocked
|
||||||
|
specialArgs = {
|
||||||
|
clan-core = {
|
||||||
|
clan.modules = { };
|
||||||
|
};
|
||||||
|
};
|
||||||
|
self.inputs = flakeInputsFixture // {
|
||||||
|
self.clan = res.config;
|
||||||
|
};
|
||||||
|
directory = ./.;
|
||||||
|
exportsModule = { };
|
||||||
|
|
||||||
|
imports = [
|
||||||
|
testClan
|
||||||
|
];
|
||||||
|
});
|
||||||
|
in
|
||||||
|
res;
|
||||||
|
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
extraModules = import ./extraModules.nix { inherit clanLib; };
|
extraModules = import ./extraModules.nix { inherit clanLib; };
|
||||||
exports = import ./exports.nix { inherit lib clanLib; };
|
exports = import ./exports.nix { inherit lib clanLib; };
|
||||||
settings = import ./settings.nix { inherit lib callInventoryAdapter; };
|
settings = import ./settings.nix { inherit lib createTestClan; };
|
||||||
specialArgs = import ./specialArgs.nix { inherit lib callInventoryAdapter; };
|
specialArgs = import ./specialArgs.nix { inherit lib createTestClan; };
|
||||||
resolve_module_spec = import ./import_module_spec.nix { inherit lib callInventoryAdapter; };
|
resolve_module_spec = import ./import_module_spec.nix {
|
||||||
|
inherit lib createTestClan;
|
||||||
|
};
|
||||||
test_simple =
|
test_simple =
|
||||||
let
|
let
|
||||||
res = callInventoryAdapter {
|
res = createTestClan {
|
||||||
# Authored module
|
# Authored module
|
||||||
# A minimal module looks like this
|
# A minimal module looks like this
|
||||||
# It isn't exactly doing anything but it's a valid module that produces an output
|
# It isn't exactly doing anything but it's a valid module that produces an output
|
||||||
@@ -71,7 +61,7 @@ in
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
# User config
|
# User config
|
||||||
instances."instance_foo" = {
|
inventory.instances."instance_foo" = {
|
||||||
module = {
|
module = {
|
||||||
name = "simple-module";
|
name = "simple-module";
|
||||||
};
|
};
|
||||||
@@ -81,7 +71,7 @@ in
|
|||||||
{
|
{
|
||||||
# Test that the module is mapped into the output
|
# Test that the module is mapped into the output
|
||||||
# We might change the attribute name in the future
|
# We might change the attribute name in the future
|
||||||
expr = res.importedModulesEvaluated ? "<clan-core>-simple-module";
|
expr = res.config._services.mappedServices ? "<clan-core>-simple-module";
|
||||||
expected = true;
|
expected = true;
|
||||||
inherit res;
|
inherit res;
|
||||||
};
|
};
|
||||||
@@ -92,7 +82,7 @@ in
|
|||||||
# All instances should be included within one evaluation to make all of them available
|
# All instances should be included within one evaluation to make all of them available
|
||||||
test_module_grouping =
|
test_module_grouping =
|
||||||
let
|
let
|
||||||
res = callInventoryAdapter {
|
res = createTestClan {
|
||||||
# Authored module
|
# Authored module
|
||||||
# A minimal module looks like this
|
# A minimal module looks like this
|
||||||
# It isn't exactly doing anything but it's a valid module that produces an output
|
# It isn't exactly doing anything but it's a valid module that produces an output
|
||||||
@@ -112,18 +102,19 @@ in
|
|||||||
|
|
||||||
perMachine = { }: { };
|
perMachine = { }: { };
|
||||||
};
|
};
|
||||||
|
|
||||||
# User config
|
# User config
|
||||||
instances."instance_foo" = {
|
inventory.instances."instance_foo" = {
|
||||||
module = {
|
module = {
|
||||||
name = "A";
|
name = "A";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
instances."instance_bar" = {
|
inventory.instances."instance_bar" = {
|
||||||
module = {
|
module = {
|
||||||
name = "B";
|
name = "B";
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
instances."instance_baz" = {
|
inventory.instances."instance_baz" = {
|
||||||
module = {
|
module = {
|
||||||
name = "A";
|
name = "A";
|
||||||
};
|
};
|
||||||
@@ -133,16 +124,16 @@ in
|
|||||||
{
|
{
|
||||||
# Test that the module is mapped into the output
|
# Test that the module is mapped into the output
|
||||||
# We might change the attribute name in the future
|
# We might change the attribute name in the future
|
||||||
expr = lib.mapAttrs (_n: v: builtins.length v) res.grouped;
|
expr = lib.attrNames res.config._services.mappedServices;
|
||||||
expected = {
|
expected = [
|
||||||
"<clan-core>-A" = 2;
|
"<clan-core>-A"
|
||||||
"<clan-core>-B" = 1;
|
"<clan-core>-B"
|
||||||
};
|
];
|
||||||
};
|
};
|
||||||
|
|
||||||
test_creates_all_instances =
|
test_creates_all_instances =
|
||||||
let
|
let
|
||||||
res = callInventoryAdapter {
|
res = createTestClan {
|
||||||
# Authored module
|
# Authored module
|
||||||
# A minimal module looks like this
|
# A minimal module looks like this
|
||||||
# It isn't exactly doing anything but it's a valid module that produces an output
|
# It isn't exactly doing anything but it's a valid module that produces an output
|
||||||
@@ -154,22 +145,24 @@ in
|
|||||||
|
|
||||||
perMachine = { }: { };
|
perMachine = { }: { };
|
||||||
};
|
};
|
||||||
instances."instance_foo" = {
|
inventory = {
|
||||||
module = {
|
instances."instance_foo" = {
|
||||||
name = "A";
|
module = {
|
||||||
input = "self";
|
name = "A";
|
||||||
|
input = "self";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
instances."instance_bar" = {
|
||||||
instances."instance_bar" = {
|
module = {
|
||||||
module = {
|
name = "A";
|
||||||
name = "A";
|
input = "self";
|
||||||
input = "self";
|
};
|
||||||
};
|
};
|
||||||
};
|
instances."instance_zaza" = {
|
||||||
instances."instance_zaza" = {
|
module = {
|
||||||
module = {
|
name = "B";
|
||||||
name = "B";
|
input = null;
|
||||||
input = null;
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
@@ -177,7 +170,7 @@ in
|
|||||||
{
|
{
|
||||||
# Test that the module is mapped into the output
|
# Test that the module is mapped into the output
|
||||||
# We might change the attribute name in the future
|
# We might change the attribute name in the future
|
||||||
expr = lib.attrNames res.importedModulesEvaluated.self-A.instances;
|
expr = lib.attrNames res.config._services.mappedServices.self-A.instances;
|
||||||
expected = [
|
expected = [
|
||||||
"instance_bar"
|
"instance_bar"
|
||||||
"instance_foo"
|
"instance_foo"
|
||||||
@@ -187,7 +180,7 @@ in
|
|||||||
# Membership via roles
|
# Membership via roles
|
||||||
test_add_machines_directly =
|
test_add_machines_directly =
|
||||||
let
|
let
|
||||||
res = callInventoryAdapter {
|
res = createTestClan {
|
||||||
# Authored module
|
# Authored module
|
||||||
# A minimal module looks like this
|
# A minimal module looks like this
|
||||||
# It isn't exactly doing anything but it's a valid module that produces an output
|
# It isn't exactly doing anything but it's a valid module that produces an output
|
||||||
@@ -202,38 +195,40 @@ in
|
|||||||
|
|
||||||
# perMachine = {}: {};
|
# perMachine = {}: {};
|
||||||
};
|
};
|
||||||
machines = {
|
inventory = {
|
||||||
jon = { };
|
machines = {
|
||||||
sara = { };
|
jon = { };
|
||||||
hxi = { };
|
sara = { };
|
||||||
};
|
hxi = { };
|
||||||
instances."instance_foo" = {
|
|
||||||
module = {
|
|
||||||
name = "A";
|
|
||||||
input = "self";
|
|
||||||
};
|
};
|
||||||
roles.peer.machines.jon = { };
|
instances."instance_foo" = {
|
||||||
};
|
module = {
|
||||||
instances."instance_bar" = {
|
name = "A";
|
||||||
module = {
|
input = "self";
|
||||||
name = "A";
|
};
|
||||||
input = "self";
|
roles.peer.machines.jon = { };
|
||||||
};
|
};
|
||||||
roles.peer.machines.sara = { };
|
instances."instance_bar" = {
|
||||||
};
|
module = {
|
||||||
instances."instance_zaza" = {
|
name = "A";
|
||||||
module = {
|
input = "self";
|
||||||
name = "B";
|
};
|
||||||
input = null;
|
roles.peer.machines.sara = { };
|
||||||
|
};
|
||||||
|
instances."instance_zaza" = {
|
||||||
|
module = {
|
||||||
|
name = "B";
|
||||||
|
input = null;
|
||||||
|
};
|
||||||
|
roles.peer.tags.all = { };
|
||||||
};
|
};
|
||||||
roles.peer.tags.all = { };
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
# Test that the module is mapped into the output
|
# Test that the module is mapped into the output
|
||||||
# We might change the attribute name in the future
|
# We might change the attribute name in the future
|
||||||
expr = lib.attrNames res.importedModulesEvaluated.self-A.result.allMachines;
|
expr = lib.attrNames res.config._services.mappedServices.self-A.result.allMachines;
|
||||||
expected = [
|
expected = [
|
||||||
"jon"
|
"jon"
|
||||||
"sara"
|
"sara"
|
||||||
@@ -243,7 +238,7 @@ in
|
|||||||
# Membership via tags
|
# Membership via tags
|
||||||
test_add_machines_via_tags =
|
test_add_machines_via_tags =
|
||||||
let
|
let
|
||||||
res = callInventoryAdapter {
|
res = createTestClan {
|
||||||
# Authored module
|
# Authored module
|
||||||
# A minimal module looks like this
|
# A minimal module looks like this
|
||||||
# It isn't exactly doing anything but it's a valid module that produces an output
|
# It isn't exactly doing anything but it's a valid module that produces an output
|
||||||
@@ -257,35 +252,37 @@ in
|
|||||||
|
|
||||||
# perMachine = {}: {};
|
# perMachine = {}: {};
|
||||||
};
|
};
|
||||||
machines = {
|
inventory = {
|
||||||
jon = {
|
machines = {
|
||||||
tags = [ "foo" ];
|
jon = {
|
||||||
|
tags = [ "foo" ];
|
||||||
|
};
|
||||||
|
sara = {
|
||||||
|
tags = [ "foo" ];
|
||||||
|
};
|
||||||
|
hxi = { };
|
||||||
};
|
};
|
||||||
sara = {
|
instances."instance_foo" = {
|
||||||
tags = [ "foo" ];
|
module = {
|
||||||
|
name = "A";
|
||||||
|
input = "self";
|
||||||
|
};
|
||||||
|
roles.peer.tags.foo = { };
|
||||||
};
|
};
|
||||||
hxi = { };
|
instances."instance_zaza" = {
|
||||||
};
|
module = {
|
||||||
instances."instance_foo" = {
|
name = "B";
|
||||||
module = {
|
input = null;
|
||||||
name = "A";
|
};
|
||||||
input = "self";
|
roles.peer.tags.all = { };
|
||||||
};
|
};
|
||||||
roles.peer.tags.foo = { };
|
|
||||||
};
|
|
||||||
instances."instance_zaza" = {
|
|
||||||
module = {
|
|
||||||
name = "B";
|
|
||||||
input = null;
|
|
||||||
};
|
|
||||||
roles.peer.tags.all = { };
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
# Test that the module is mapped into the output
|
# Test that the module is mapped into the output
|
||||||
# We might change the attribute name in the future
|
# We might change the attribute name in the future
|
||||||
expr = lib.attrNames res.importedModulesEvaluated.self-A.result.allMachines;
|
expr = lib.attrNames res.config._services.mappedServices.self-A.result.allMachines;
|
||||||
expected = [
|
expected = [
|
||||||
"jon"
|
"jon"
|
||||||
"sara"
|
"sara"
|
||||||
@@ -293,6 +290,9 @@ in
|
|||||||
};
|
};
|
||||||
|
|
||||||
machine_imports = import ./machine_imports.nix { inherit lib clanLib; };
|
machine_imports = import ./machine_imports.nix { inherit lib clanLib; };
|
||||||
per_machine_args = import ./per_machine_args.nix { inherit lib callInventoryAdapter; };
|
per_machine_args = import ./per_machine_args.nix { inherit lib createTestClan; };
|
||||||
per_instance_args = import ./per_instance_args.nix { inherit lib callInventoryAdapter; };
|
per_instance_args = import ./per_instance_args.nix {
|
||||||
|
inherit lib;
|
||||||
|
callInventoryAdapter = createTestClan;
|
||||||
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
{ callInventoryAdapter, ... }:
|
{ createTestClan, ... }:
|
||||||
let
|
let
|
||||||
# Authored module
|
# Authored module
|
||||||
# A minimal module looks like this
|
# A minimal module looks like this
|
||||||
@@ -23,10 +23,13 @@ let
|
|||||||
|
|
||||||
resolve =
|
resolve =
|
||||||
spec:
|
spec:
|
||||||
callInventoryAdapter {
|
createTestClan {
|
||||||
inherit modules machines;
|
inherit modules;
|
||||||
instances."instance_foo" = {
|
inventory = {
|
||||||
module = spec;
|
inherit machines;
|
||||||
|
instances."instance_foo" = {
|
||||||
|
module = spec;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
in
|
in
|
||||||
@@ -36,25 +39,16 @@ in
|
|||||||
(resolve {
|
(resolve {
|
||||||
name = "A";
|
name = "A";
|
||||||
input = "self";
|
input = "self";
|
||||||
}).importedModuleWithInstances.instance_foo.resolvedModule;
|
}).config._services.mappedServices.self-A.manifest.name;
|
||||||
expected = {
|
expected = "network";
|
||||||
_class = "clan.service";
|
|
||||||
manifest = {
|
|
||||||
name = "network";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
test_import_remote_module_by_name = {
|
test_import_remote_module_by_name = {
|
||||||
expr =
|
expr =
|
||||||
(resolve {
|
(resolve {
|
||||||
name = "uzzi";
|
name = "uzzi";
|
||||||
input = "upstream";
|
input = "upstream";
|
||||||
}).importedModuleWithInstances.instance_foo.resolvedModule;
|
}).config._services.mappedServices.upstream-uzzi.manifest.name;
|
||||||
expected = {
|
expected = "uzzi-from-upstream";
|
||||||
_class = "clan.service";
|
|
||||||
manifest = {
|
|
||||||
name = "uzzi-from-upstream";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -58,39 +58,43 @@ let
|
|||||||
sara = { };
|
sara = { };
|
||||||
};
|
};
|
||||||
res = callInventoryAdapter {
|
res = callInventoryAdapter {
|
||||||
inherit modules machines;
|
inherit modules;
|
||||||
instances."instance_foo" = {
|
|
||||||
module = {
|
inventory = {
|
||||||
name = "A";
|
inherit machines;
|
||||||
input = "self";
|
instances."instance_foo" = {
|
||||||
|
module = {
|
||||||
|
name = "A";
|
||||||
|
input = "self";
|
||||||
|
};
|
||||||
|
roles.peer.machines.jon = {
|
||||||
|
settings.timeout = lib.mkForce "foo-peer-jon";
|
||||||
|
};
|
||||||
|
roles.peer = {
|
||||||
|
settings.timeout = "foo-peer";
|
||||||
|
};
|
||||||
|
roles.controller.machines.jon = { };
|
||||||
};
|
};
|
||||||
roles.peer.machines.jon = {
|
instances."instance_bar" = {
|
||||||
settings.timeout = lib.mkForce "foo-peer-jon";
|
module = {
|
||||||
|
name = "A";
|
||||||
|
input = "self";
|
||||||
|
};
|
||||||
|
roles.peer.machines.jon = {
|
||||||
|
settings.timeout = "bar-peer-jon";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
roles.peer = {
|
# TODO: move this into a seperate test.
|
||||||
settings.timeout = "foo-peer";
|
# Seperate out the check that this module is never imported
|
||||||
|
# import the module "B" (undefined)
|
||||||
|
# All machines have this instance
|
||||||
|
instances."instance_zaza" = {
|
||||||
|
module = {
|
||||||
|
name = "B";
|
||||||
|
input = null;
|
||||||
|
};
|
||||||
|
roles.peer.tags.all = { };
|
||||||
};
|
};
|
||||||
roles.controller.machines.jon = { };
|
|
||||||
};
|
|
||||||
instances."instance_bar" = {
|
|
||||||
module = {
|
|
||||||
name = "A";
|
|
||||||
input = "self";
|
|
||||||
};
|
|
||||||
roles.peer.machines.jon = {
|
|
||||||
settings.timeout = "bar-peer-jon";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
# TODO: move this into a seperate test.
|
|
||||||
# Seperate out the check that this module is never imported
|
|
||||||
# import the module "B" (undefined)
|
|
||||||
# All machines have this instance
|
|
||||||
instances."instance_zaza" = {
|
|
||||||
module = {
|
|
||||||
name = "B";
|
|
||||||
input = null;
|
|
||||||
};
|
|
||||||
roles.peer.tags.all = { };
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
@@ -105,9 +109,10 @@ in
|
|||||||
{
|
{
|
||||||
# settings should evaluate
|
# settings should evaluate
|
||||||
test_per_instance_arguments = {
|
test_per_instance_arguments = {
|
||||||
|
inherit res;
|
||||||
expr = {
|
expr = {
|
||||||
instanceName =
|
instanceName =
|
||||||
res.importedModulesEvaluated.self-A.result.allRoles.peer.allInstances."instance_foo".allMachines.jon.passthru.instanceName;
|
res.config._services.mappedServices.self-A.result.allRoles.peer.allInstances."instance_foo".allMachines.jon.passthru.instanceName;
|
||||||
|
|
||||||
# settings are specific.
|
# settings are specific.
|
||||||
# Below we access:
|
# Below we access:
|
||||||
@@ -115,11 +120,11 @@ in
|
|||||||
# roles = peer
|
# roles = peer
|
||||||
# machines = jon
|
# machines = jon
|
||||||
settings =
|
settings =
|
||||||
res.importedModulesEvaluated.self-A.result.allRoles.peer.allInstances.instance_foo.allMachines.jon.passthru.settings;
|
res.config._services.mappedServices.self-A.result.allRoles.peer.allInstances.instance_foo.allMachines.jon.passthru.settings;
|
||||||
machine =
|
machine =
|
||||||
res.importedModulesEvaluated.self-A.result.allRoles.peer.allInstances.instance_foo.allMachines.jon.passthru.machine;
|
res.config._services.mappedServices.self-A.result.allRoles.peer.allInstances.instance_foo.allMachines.jon.passthru.machine;
|
||||||
roles =
|
roles =
|
||||||
res.importedModulesEvaluated.self-A.result.allRoles.peer.allInstances.instance_foo.allMachines.jon.passthru.roles;
|
res.config._services.mappedServices.self-A.result.allRoles.peer.allInstances.instance_foo.allMachines.jon.passthru.roles;
|
||||||
};
|
};
|
||||||
expected = {
|
expected = {
|
||||||
instanceName = "instance_foo";
|
instanceName = "instance_foo";
|
||||||
@@ -160,9 +165,9 @@ in
|
|||||||
|
|
||||||
# TODO: Cannot be tested like this anymore
|
# TODO: Cannot be tested like this anymore
|
||||||
test_per_instance_settings_vendoring = {
|
test_per_instance_settings_vendoring = {
|
||||||
x = res.importedModulesEvaluated.self-A;
|
x = res.config._services.mappedServices.self-A;
|
||||||
expr =
|
expr =
|
||||||
res.importedModulesEvaluated.self-A.result.allRoles.peer.allInstances.instance_foo.allMachines.jon.passthru.vendoredSettings;
|
res.config._services.mappedServices.self-A.result.allRoles.peer.allInstances.instance_foo.allMachines.jon.passthru.vendoredSettings;
|
||||||
expected = {
|
expected = {
|
||||||
timeout = "config.thing";
|
timeout = "config.thing";
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -1,4 +1,4 @@
|
|||||||
{ lib, callInventoryAdapter }:
|
{ lib, createTestClan }:
|
||||||
let
|
let
|
||||||
# Authored module
|
# Authored module
|
||||||
# A minimal module looks like this
|
# A minimal module looks like this
|
||||||
@@ -39,36 +39,40 @@ let
|
|||||||
jon = { };
|
jon = { };
|
||||||
sara = { };
|
sara = { };
|
||||||
};
|
};
|
||||||
res = callInventoryAdapter {
|
res = createTestClan {
|
||||||
inherit modules machines;
|
inherit modules;
|
||||||
instances."instance_foo" = {
|
inventory = {
|
||||||
module = {
|
|
||||||
name = "A";
|
inherit machines;
|
||||||
input = "self";
|
instances."instance_foo" = {
|
||||||
|
module = {
|
||||||
|
name = "A";
|
||||||
|
input = "self";
|
||||||
|
};
|
||||||
|
roles.peer.machines.jon = {
|
||||||
|
settings.timeout = lib.mkForce "foo-peer-jon";
|
||||||
|
};
|
||||||
|
roles.peer = {
|
||||||
|
settings.timeout = "foo-peer";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
roles.peer.machines.jon = {
|
instances."instance_bar" = {
|
||||||
settings.timeout = lib.mkForce "foo-peer-jon";
|
module = {
|
||||||
|
name = "A";
|
||||||
|
input = "self";
|
||||||
|
};
|
||||||
|
roles.peer.machines.jon = {
|
||||||
|
settings.timeout = "bar-peer-jon";
|
||||||
|
};
|
||||||
};
|
};
|
||||||
roles.peer = {
|
instances."instance_zaza" = {
|
||||||
settings.timeout = "foo-peer";
|
module = {
|
||||||
|
name = "B";
|
||||||
|
input = null;
|
||||||
|
};
|
||||||
|
roles.peer.tags.all = { };
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
instances."instance_bar" = {
|
|
||||||
module = {
|
|
||||||
name = "A";
|
|
||||||
input = "self";
|
|
||||||
};
|
|
||||||
roles.peer.machines.jon = {
|
|
||||||
settings.timeout = "bar-peer-jon";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
instances."instance_zaza" = {
|
|
||||||
module = {
|
|
||||||
name = "B";
|
|
||||||
input = null;
|
|
||||||
};
|
|
||||||
roles.peer.tags.all = { };
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
in
|
in
|
||||||
|
|
||||||
@@ -79,7 +83,7 @@ in
|
|||||||
inherit res;
|
inherit res;
|
||||||
expr = {
|
expr = {
|
||||||
hasMachineSettings =
|
hasMachineSettings =
|
||||||
res.importedModulesEvaluated.self-A.result.allMachines.jon.passthru.instances.instance_foo.roles.peer.machines.jon
|
res.config._services.mappedServices.self-A.result.allMachines.jon.passthru.instances.instance_foo.roles.peer.machines.jon
|
||||||
? settings;
|
? settings;
|
||||||
|
|
||||||
# settings are specific.
|
# settings are specific.
|
||||||
@@ -88,10 +92,10 @@ in
|
|||||||
# roles = peer
|
# roles = peer
|
||||||
# machines = jon
|
# machines = jon
|
||||||
specificMachineSettings =
|
specificMachineSettings =
|
||||||
res.importedModulesEvaluated.self-A.result.allMachines.jon.passthru.instances.instance_foo.roles.peer.machines.jon.settings;
|
res.config._services.mappedServices.self-A.result.allMachines.jon.passthru.instances.instance_foo.roles.peer.machines.jon.settings;
|
||||||
|
|
||||||
hasRoleSettings =
|
hasRoleSettings =
|
||||||
res.importedModulesEvaluated.self-A.result.allMachines.jon.passthru.instances.instance_foo.roles.peer
|
res.config._services.mappedServices.self-A.result.allMachines.jon.passthru.instances.instance_foo.roles.peer
|
||||||
? settings;
|
? settings;
|
||||||
|
|
||||||
# settings are specific.
|
# settings are specific.
|
||||||
@@ -100,7 +104,7 @@ in
|
|||||||
# roles = peer
|
# roles = peer
|
||||||
# machines = *
|
# machines = *
|
||||||
specificRoleSettings =
|
specificRoleSettings =
|
||||||
res.importedModulesEvaluated.self-A.result.allMachines.jon.passthru.instances.instance_foo.roles.peer;
|
res.config._services.mappedServices.self-A.result.allMachines.jon.passthru.instances.instance_foo.roles.peer;
|
||||||
};
|
};
|
||||||
expected = {
|
expected = {
|
||||||
hasMachineSettings = true;
|
hasMachineSettings = true;
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
{ callInventoryAdapter, lib, ... }:
|
{ createTestClan, lib, ... }:
|
||||||
let
|
let
|
||||||
res = callInventoryAdapter {
|
res = createTestClan {
|
||||||
modules."A" = {
|
modules."A" = {
|
||||||
_class = "clan.service";
|
_class = "clan.service";
|
||||||
manifest = {
|
manifest = {
|
||||||
@@ -21,28 +21,31 @@ let
|
|||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
machines = {
|
inventory = {
|
||||||
jon = { };
|
|
||||||
sara = { };
|
machines = {
|
||||||
};
|
jon = { };
|
||||||
instances."instance_foo" = {
|
sara = { };
|
||||||
module = {
|
|
||||||
name = "A";
|
|
||||||
input = "self";
|
|
||||||
};
|
};
|
||||||
# Settings for both jon and sara
|
instances."instance_foo" = {
|
||||||
roles.peer.settings = {
|
module = {
|
||||||
timeout = 40;
|
name = "A";
|
||||||
|
input = "self";
|
||||||
|
};
|
||||||
|
# Settings for both jon and sara
|
||||||
|
roles.peer.settings = {
|
||||||
|
timeout = 40;
|
||||||
|
};
|
||||||
|
# Jon overrides timeout
|
||||||
|
roles.peer.machines.jon = {
|
||||||
|
settings.timeout = lib.mkForce 42;
|
||||||
|
};
|
||||||
|
roles.peer.machines.sara = { };
|
||||||
};
|
};
|
||||||
# Jon overrides timeout
|
|
||||||
roles.peer.machines.jon = {
|
|
||||||
settings.timeout = lib.mkForce 42;
|
|
||||||
};
|
|
||||||
roles.peer.machines.sara = { };
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
config = res.servicesEval.config.mappedServices.self-A;
|
config = res.config._services.mappedServices.self-A;
|
||||||
|
|
||||||
#
|
#
|
||||||
applySettings =
|
applySettings =
|
||||||
|
|||||||
@@ -1,6 +1,6 @@
|
|||||||
{ callInventoryAdapter, lib, ... }:
|
{ createTestClan, lib, ... }:
|
||||||
let
|
let
|
||||||
res = callInventoryAdapter {
|
res = createTestClan {
|
||||||
modules."A" = m: {
|
modules."A" = m: {
|
||||||
_class = "clan.service";
|
_class = "clan.service";
|
||||||
config = {
|
config = {
|
||||||
@@ -14,19 +14,21 @@ let
|
|||||||
default = m;
|
default = m;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
machines = {
|
inventory = {
|
||||||
jon = { };
|
machines = {
|
||||||
};
|
jon = { };
|
||||||
instances."instance_foo" = {
|
};
|
||||||
module = {
|
instances."instance_foo" = {
|
||||||
name = "A";
|
module = {
|
||||||
input = "self";
|
name = "A";
|
||||||
|
input = "self";
|
||||||
|
};
|
||||||
|
roles.peer.machines.jon = { };
|
||||||
};
|
};
|
||||||
roles.peer.machines.jon = { };
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
specialArgs = lib.attrNames res.servicesEval.config.mappedServices.self-A.test.specialArgs;
|
specialArgs = lib.attrNames res.config._services.mappedServices.self-A.test.specialArgs;
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
test_simple = {
|
test_simple = {
|
||||||
|
|||||||
@@ -19,6 +19,7 @@
|
|||||||
imports = [
|
imports = [
|
||||||
./top-level-interface.nix
|
./top-level-interface.nix
|
||||||
./module.nix
|
./module.nix
|
||||||
|
./distributed-services.nix
|
||||||
./checks.nix
|
./checks.nix
|
||||||
];
|
];
|
||||||
}
|
}
|
||||||
|
|||||||
163
modules/clan/distributed-services.nix
Normal file
163
modules/clan/distributed-services.nix
Normal file
@@ -0,0 +1,163 @@
|
|||||||
|
{
|
||||||
|
lib,
|
||||||
|
clanLib,
|
||||||
|
config,
|
||||||
|
clan-core,
|
||||||
|
...
|
||||||
|
}:
|
||||||
|
let
|
||||||
|
inherit (lib) mkOption types;
|
||||||
|
# Keep a reference to top-level
|
||||||
|
clanConfig = config;
|
||||||
|
|
||||||
|
inventory = clanConfig.inventory;
|
||||||
|
flakeInputs = clanConfig.self.inputs;
|
||||||
|
clanCoreModules = clan-core.clan.modules;
|
||||||
|
|
||||||
|
grouped = lib.foldlAttrs (
|
||||||
|
acc: instanceName: instance:
|
||||||
|
let
|
||||||
|
inputName = if instance.module.input == null then "<clan-core>" else instance.module.input;
|
||||||
|
id = inputName + "-" + instance.module.name;
|
||||||
|
in
|
||||||
|
acc
|
||||||
|
// {
|
||||||
|
${id} = acc.${id} or [ ] ++ [
|
||||||
|
{
|
||||||
|
inherit instanceName instance;
|
||||||
|
}
|
||||||
|
];
|
||||||
|
}
|
||||||
|
) { } importedModuleWithInstances;
|
||||||
|
|
||||||
|
importedModuleWithInstances = lib.mapAttrs (
|
||||||
|
instanceName: instance:
|
||||||
|
let
|
||||||
|
resolvedModule = clanLib.resolveModule {
|
||||||
|
moduleSpec = instance.module;
|
||||||
|
inherit flakeInputs clanCoreModules;
|
||||||
|
};
|
||||||
|
|
||||||
|
# Every instance includes machines via roles
|
||||||
|
# :: { client :: ... }
|
||||||
|
instanceRoles = lib.mapAttrs (
|
||||||
|
roleName: role:
|
||||||
|
let
|
||||||
|
resolvedMachines = clanLib.inventory.resolveTags {
|
||||||
|
members = {
|
||||||
|
# Explicit members
|
||||||
|
machines = lib.attrNames role.machines;
|
||||||
|
# Resolved Members
|
||||||
|
tags = lib.attrNames role.tags;
|
||||||
|
};
|
||||||
|
inherit (inventory) machines;
|
||||||
|
inherit instanceName roleName;
|
||||||
|
};
|
||||||
|
in
|
||||||
|
# instances.<instanceName>.roles.<roleName> =
|
||||||
|
# Remove "tags", they are resolved into "machines"
|
||||||
|
(removeAttrs role [ "tags" ])
|
||||||
|
// {
|
||||||
|
machines = lib.genAttrs resolvedMachines.machines (
|
||||||
|
machineName:
|
||||||
|
let
|
||||||
|
machineSettings = instance.roles.${roleName}.machines.${machineName}.settings or { };
|
||||||
|
in
|
||||||
|
# TODO: tag settings
|
||||||
|
# Wait for this feature until option introspection for 'settings' is done.
|
||||||
|
# This might get too complex to handle otherwise.
|
||||||
|
# settingsViaTags = lib.filterAttrs (
|
||||||
|
# tagName: _: machineHasTag machineName tagName
|
||||||
|
# ) instance.roles.${roleName}.tags;
|
||||||
|
{
|
||||||
|
# TODO: Do we want to wrap settings with
|
||||||
|
# setDefaultModuleLocation "inventory.instances.${instanceName}.roles.${roleName}.tags.${tagName}";
|
||||||
|
settings = {
|
||||||
|
imports = [
|
||||||
|
machineSettings
|
||||||
|
]; # ++ lib.attrValues (lib.mapAttrs (_tagName: v: v.settings) settingsViaTags);
|
||||||
|
};
|
||||||
|
}
|
||||||
|
);
|
||||||
|
}
|
||||||
|
) instance.roles;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
inherit (instance) module;
|
||||||
|
inherit resolvedModule instanceRoles;
|
||||||
|
}
|
||||||
|
) inventory.instances or { };
|
||||||
|
in
|
||||||
|
{
|
||||||
|
_class = "clan";
|
||||||
|
options._services = mkOption {
|
||||||
|
visible = false;
|
||||||
|
description = ''
|
||||||
|
All service instances
|
||||||
|
|
||||||
|
!!! Danger "Internal API"
|
||||||
|
Do not rely on this API yet.
|
||||||
|
|
||||||
|
- Will be renamed to just 'services' in the future.
|
||||||
|
Once the name can be claimed again.
|
||||||
|
- Structure will change.
|
||||||
|
|
||||||
|
API will be declared as public after beeing simplified.
|
||||||
|
'';
|
||||||
|
type = types.submoduleWith {
|
||||||
|
# TODO: Remove specialArgs
|
||||||
|
specialArgs = {
|
||||||
|
inherit clanLib;
|
||||||
|
};
|
||||||
|
modules = [
|
||||||
|
(import ../../lib/inventory/distributed-service/all-services-wrapper.nix {
|
||||||
|
inherit (clanConfig) directory;
|
||||||
|
})
|
||||||
|
# Dependencies
|
||||||
|
{
|
||||||
|
exportsModule = clanConfig.exportsModule;
|
||||||
|
}
|
||||||
|
{
|
||||||
|
# TODO: Rename to "allServices"
|
||||||
|
# All services
|
||||||
|
mappedServices = lib.mapAttrs (_module_ident: instances: {
|
||||||
|
imports = [
|
||||||
|
# Import the resolved module.
|
||||||
|
# i.e. clan.modules.admin
|
||||||
|
{
|
||||||
|
options.module = lib.mkOption {
|
||||||
|
type = lib.types.raw;
|
||||||
|
default = (builtins.head instances).instance.module;
|
||||||
|
};
|
||||||
|
}
|
||||||
|
(builtins.head instances).instance.resolvedModule
|
||||||
|
] # Include all the instances that correlate to the resolved module
|
||||||
|
++ (builtins.map (v: {
|
||||||
|
instances.${v.instanceName}.roles = v.instance.instanceRoles;
|
||||||
|
}) instances);
|
||||||
|
}) grouped;
|
||||||
|
}
|
||||||
|
];
|
||||||
|
};
|
||||||
|
default = { };
|
||||||
|
};
|
||||||
|
options._allMachines = mkOption {
|
||||||
|
internal = true;
|
||||||
|
type = types.raw;
|
||||||
|
default = lib.mapAttrs (machineName: _: {
|
||||||
|
# This is the list of nixosModules for each machine
|
||||||
|
machineImports = lib.foldlAttrs (
|
||||||
|
acc: _module_ident: serviceModule:
|
||||||
|
acc ++ [ serviceModule.result.final.${machineName}.nixosModule or { } ]
|
||||||
|
) [ ] config._services.mappedServices;
|
||||||
|
}) inventory.machines or { };
|
||||||
|
};
|
||||||
|
|
||||||
|
config = {
|
||||||
|
clanInternals.inventoryClass.machines = config._allMachines;
|
||||||
|
# clanInternals.inventoryClass.distributedServices = config._services;
|
||||||
|
|
||||||
|
# Exports from distributed services
|
||||||
|
exports = config._services.exports;
|
||||||
|
};
|
||||||
|
}
|
||||||
@@ -3,12 +3,16 @@
|
|||||||
lib,
|
lib,
|
||||||
clanModule,
|
clanModule,
|
||||||
clanLib,
|
clanLib,
|
||||||
|
clan-core,
|
||||||
}:
|
}:
|
||||||
let
|
let
|
||||||
eval = lib.evalModules {
|
eval = lib.evalModules {
|
||||||
modules = [
|
modules = [
|
||||||
clanModule
|
clanModule
|
||||||
];
|
];
|
||||||
|
specialArgs = {
|
||||||
|
self = clan-core;
|
||||||
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
evalDocs = pkgs.nixosOptionsDoc {
|
evalDocs = pkgs.nixosOptionsDoc {
|
||||||
|
|||||||
@@ -12,6 +12,7 @@ in
|
|||||||
}:
|
}:
|
||||||
let
|
let
|
||||||
jsonDocs = import ./eval-docs.nix {
|
jsonDocs = import ./eval-docs.nix {
|
||||||
|
clan-core = self;
|
||||||
inherit
|
inherit
|
||||||
pkgs
|
pkgs
|
||||||
lib
|
lib
|
||||||
|
|||||||
@@ -219,8 +219,6 @@ in
|
|||||||
inherit nixosConfigurations;
|
inherit nixosConfigurations;
|
||||||
inherit darwinConfigurations;
|
inherit darwinConfigurations;
|
||||||
|
|
||||||
exports = config.clanInternals.inventoryClass.distributedServices.servicesEval.config.exports;
|
|
||||||
|
|
||||||
clanInternals = {
|
clanInternals = {
|
||||||
inventoryClass =
|
inventoryClass =
|
||||||
let
|
let
|
||||||
@@ -254,21 +252,9 @@ in
|
|||||||
exportsModule = config.exportsModule;
|
exportsModule = config.exportsModule;
|
||||||
}
|
}
|
||||||
(
|
(
|
||||||
{ config, ... }:
|
{ ... }:
|
||||||
{
|
{
|
||||||
staticModules = clan-core.clan.modules;
|
staticModules = clan-core.clan.modules;
|
||||||
|
|
||||||
distributedServices = clanLib.inventory.mapInstances {
|
|
||||||
inherit (config)
|
|
||||||
inventory
|
|
||||||
directory
|
|
||||||
flakeInputs
|
|
||||||
exportsModule
|
|
||||||
;
|
|
||||||
clanCoreModules = clan-core.clan.modules;
|
|
||||||
prefix = [ "distributedServices" ];
|
|
||||||
};
|
|
||||||
machines = config.distributedServices.allMachines;
|
|
||||||
}
|
}
|
||||||
)
|
)
|
||||||
];
|
];
|
||||||
|
|||||||
@@ -67,9 +67,6 @@ in
|
|||||||
type = types.raw;
|
type = types.raw;
|
||||||
};
|
};
|
||||||
|
|
||||||
distributedServices = mkOption {
|
|
||||||
type = types.raw;
|
|
||||||
};
|
|
||||||
inventory = mkOption {
|
inventory = mkOption {
|
||||||
type = types.raw;
|
type = types.raw;
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -5,7 +5,7 @@
|
|||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
# If we also need zfs, we can use the unstable version as we otherwise don't have a new enough kernel version
|
# If we also need zfs, we can use the unstable version as we otherwise don't have a new enough kernel version
|
||||||
boot.zfs.package = pkgs.zfsUnstable;
|
boot.zfs.package = pkgs.zfs_unstable or pkgs.zfsUnstable;
|
||||||
|
|
||||||
# Enable bcachefs support
|
# Enable bcachefs support
|
||||||
boot.supportedFilesystems.bcachefs = lib.mkDefault true;
|
boot.supportedFilesystems.bcachefs = lib.mkDefault true;
|
||||||
|
|||||||
@@ -18,7 +18,7 @@ let
|
|||||||
inputs.data-mesher.nixosModules.data-mesher
|
inputs.data-mesher.nixosModules.data-mesher
|
||||||
];
|
];
|
||||||
config = {
|
config = {
|
||||||
clan.core.clanPkgs = lib.mkDefault self.packages.${pkgs.hostPlatform.system};
|
clan.core.clanPkgs = lib.mkDefault self.packages.${pkgs.stdenv.hostPlatform.system};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
in
|
in
|
||||||
|
|||||||
@@ -6,7 +6,7 @@
|
|||||||
}:
|
}:
|
||||||
|
|
||||||
let
|
let
|
||||||
isUnstable = config.boot.zfs.package == pkgs.zfsUnstable;
|
isUnstable = config.boot.zfs.package == pkgs.zfs_unstable or pkgs.zfsUnstable;
|
||||||
zfsCompatibleKernelPackages = lib.filterAttrs (
|
zfsCompatibleKernelPackages = lib.filterAttrs (
|
||||||
name: kernelPackages:
|
name: kernelPackages:
|
||||||
(builtins.match "linux_[0-9]+_[0-9]+" name) != null
|
(builtins.match "linux_[0-9]+_[0-9]+" name) != null
|
||||||
@@ -30,5 +30,5 @@ let
|
|||||||
in
|
in
|
||||||
{
|
{
|
||||||
# Note this might jump back and worth as kernel get added or removed.
|
# Note this might jump back and worth as kernel get added or removed.
|
||||||
boot.kernelPackages = lib.mkIf (lib.meta.availableOn pkgs.hostPlatform pkgs.zfs) latestKernelPackage;
|
boot.kernelPackages = lib.mkIf (lib.meta.availableOn pkgs.stdenv.hostPlatform pkgs.zfs) latestKernelPackage;
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -4,6 +4,7 @@
|
|||||||
padding: 8px;
|
padding: 8px;
|
||||||
flex-direction: column;
|
flex-direction: column;
|
||||||
align-items: flex-start;
|
align-items: flex-start;
|
||||||
|
gap: 4px;
|
||||||
|
|
||||||
border-radius: 5px;
|
border-radius: 5px;
|
||||||
border: 1px solid var(--clr-border-def-2, #d8e8eb);
|
border: 1px solid var(--clr-border-def-2, #d8e8eb);
|
||||||
|
|||||||
@@ -1,11 +1,13 @@
|
|||||||
import { onCleanup, onMount } from "solid-js";
|
import { onCleanup, onMount } from "solid-js";
|
||||||
import styles from "./ContextMenu.module.css";
|
import styles from "./ContextMenu.module.css";
|
||||||
import { Typography } from "../Typography/Typography";
|
import { Typography } from "../Typography/Typography";
|
||||||
|
import { Divider } from "../Divider/Divider";
|
||||||
|
import Icon from "../Icon/Icon";
|
||||||
|
|
||||||
export const Menu = (props: {
|
export const Menu = (props: {
|
||||||
x: number;
|
x: number;
|
||||||
y: number;
|
y: number;
|
||||||
onSelect: (option: "move") => void;
|
onSelect: (option: "move" | "delete") => void;
|
||||||
close: () => void;
|
close: () => void;
|
||||||
intersect: string[];
|
intersect: string[];
|
||||||
}) => {
|
}) => {
|
||||||
@@ -54,13 +56,31 @@ export const Menu = (props: {
|
|||||||
>
|
>
|
||||||
<Typography
|
<Typography
|
||||||
hierarchy="label"
|
hierarchy="label"
|
||||||
size="s"
|
|
||||||
weight="bold"
|
|
||||||
color={currentMachine() ? "primary" : "quaternary"}
|
color={currentMachine() ? "primary" : "quaternary"}
|
||||||
>
|
>
|
||||||
Move
|
Move
|
||||||
</Typography>
|
</Typography>
|
||||||
</li>
|
</li>
|
||||||
|
<Divider />
|
||||||
|
<li
|
||||||
|
class={styles.item}
|
||||||
|
aria-disabled={!currentMachine()}
|
||||||
|
onClick={() => {
|
||||||
|
console.log("Delete clicked", currentMachine());
|
||||||
|
props.onSelect("delete");
|
||||||
|
props.close();
|
||||||
|
}}
|
||||||
|
>
|
||||||
|
<Typography
|
||||||
|
hierarchy="label"
|
||||||
|
color={currentMachine() ? "primary" : "quaternary"}
|
||||||
|
>
|
||||||
|
<span class="flex items-center gap-2">
|
||||||
|
Delete
|
||||||
|
<Icon icon="Trash" font-size="inherit" />
|
||||||
|
</span>
|
||||||
|
</Typography>
|
||||||
|
</li>
|
||||||
</ul>
|
</ul>
|
||||||
);
|
);
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -71,7 +71,7 @@ const Machines = () => {
|
|||||||
}
|
}
|
||||||
|
|
||||||
const result = ctx.machinesQuery.data;
|
const result = ctx.machinesQuery.data;
|
||||||
return Object.keys(result).length > 0 ? result : undefined;
|
return Object.keys(result).length > 0 ? result : [];
|
||||||
};
|
};
|
||||||
|
|
||||||
return (
|
return (
|
||||||
@@ -117,7 +117,7 @@ const Machines = () => {
|
|||||||
}
|
}
|
||||||
>
|
>
|
||||||
<nav>
|
<nav>
|
||||||
<For each={Object.entries(machines()!)}>
|
<For each={Object.entries(machines())}>
|
||||||
{([id, machine]) => (
|
{([id, machine]) => (
|
||||||
<MachineRoute
|
<MachineRoute
|
||||||
clanURI={clanURI}
|
clanURI={clanURI}
|
||||||
|
|||||||
@@ -206,8 +206,8 @@ const ClanSceneController = (props: RouteSectionProps) => {
|
|||||||
<AddMachine
|
<AddMachine
|
||||||
onCreated={async (id) => {
|
onCreated={async (id) => {
|
||||||
const promise = currentPromise();
|
const promise = currentPromise();
|
||||||
|
await ctx.machinesQuery.refetch();
|
||||||
if (promise) {
|
if (promise) {
|
||||||
await ctx.machinesQuery.refetch();
|
|
||||||
promise.resolve({ id });
|
promise.resolve({ id });
|
||||||
setCurrentPromise(null);
|
setCurrentPromise(null);
|
||||||
}
|
}
|
||||||
|
|||||||
@@ -18,12 +18,12 @@ export class MachineManager {
|
|||||||
|
|
||||||
private disposeRoot: () => void;
|
private disposeRoot: () => void;
|
||||||
|
|
||||||
private machinePositionsSignal: Accessor<SceneData>;
|
private machinePositionsSignal: Accessor<SceneData | undefined>;
|
||||||
|
|
||||||
constructor(
|
constructor(
|
||||||
scene: THREE.Scene,
|
scene: THREE.Scene,
|
||||||
registry: ObjectRegistry,
|
registry: ObjectRegistry,
|
||||||
machinePositionsSignal: Accessor<SceneData>,
|
machinePositionsSignal: Accessor<SceneData | undefined>,
|
||||||
machinesQueryResult: MachinesQueryResult,
|
machinesQueryResult: MachinesQueryResult,
|
||||||
selectedIds: Accessor<Set<string>>,
|
selectedIds: Accessor<Set<string>>,
|
||||||
setMachinePos: (id: string, position: [number, number] | null) => void,
|
setMachinePos: (id: string, position: [number, number] | null) => void,
|
||||||
@@ -39,8 +39,9 @@ export class MachineManager {
|
|||||||
if (!machinesQueryResult.data) return;
|
if (!machinesQueryResult.data) return;
|
||||||
|
|
||||||
const actualIds = Object.keys(machinesQueryResult.data);
|
const actualIds = Object.keys(machinesQueryResult.data);
|
||||||
const machinePositions = machinePositionsSignal();
|
|
||||||
// Remove stale
|
const machinePositions = machinePositionsSignal() || {};
|
||||||
|
|
||||||
for (const id of Object.keys(machinePositions)) {
|
for (const id of Object.keys(machinePositions)) {
|
||||||
if (!actualIds.includes(id)) {
|
if (!actualIds.includes(id)) {
|
||||||
console.log("Removing stale machine", id);
|
console.log("Removing stale machine", id);
|
||||||
@@ -61,8 +62,7 @@ export class MachineManager {
|
|||||||
// Effect 2: sync store → scene
|
// Effect 2: sync store → scene
|
||||||
//
|
//
|
||||||
createEffect(() => {
|
createEffect(() => {
|
||||||
const positions = machinePositionsSignal();
|
const positions = machinePositionsSignal() || {};
|
||||||
if (!positions) return;
|
|
||||||
|
|
||||||
// Remove machines from scene
|
// Remove machines from scene
|
||||||
for (const [id, repr] of this.machines) {
|
for (const [id, repr] of this.machines) {
|
||||||
@@ -103,7 +103,7 @@ export class MachineManager {
|
|||||||
|
|
||||||
nextGridPos(): [number, number] {
|
nextGridPos(): [number, number] {
|
||||||
const occupiedPositions = new Set(
|
const occupiedPositions = new Set(
|
||||||
Object.values(this.machinePositionsSignal()).map((data) =>
|
Object.values(this.machinePositionsSignal() || {}).map((data) =>
|
||||||
keyFromPos(data.position),
|
keyFromPos(data.position),
|
||||||
),
|
),
|
||||||
);
|
);
|
||||||
|
|||||||
@@ -32,6 +32,9 @@ import {
|
|||||||
} from "./highlightStore";
|
} from "./highlightStore";
|
||||||
import { createMachineMesh } from "./MachineRepr";
|
import { createMachineMesh } from "./MachineRepr";
|
||||||
import { useClanContext } from "@/src/routes/Clan/Clan";
|
import { useClanContext } from "@/src/routes/Clan/Clan";
|
||||||
|
import client from "@api/clan/client";
|
||||||
|
import { navigateToClan } from "../hooks/clan";
|
||||||
|
import { useNavigate } from "@solidjs/router";
|
||||||
|
|
||||||
function intersectMachines(
|
function intersectMachines(
|
||||||
event: MouseEvent,
|
event: MouseEvent,
|
||||||
@@ -100,7 +103,7 @@ export function CubeScene(props: {
|
|||||||
onCreate: () => Promise<{ id: string }>;
|
onCreate: () => Promise<{ id: string }>;
|
||||||
selectedIds: Accessor<Set<string>>;
|
selectedIds: Accessor<Set<string>>;
|
||||||
onSelect: (v: Set<string>) => void;
|
onSelect: (v: Set<string>) => void;
|
||||||
sceneStore: Accessor<SceneData>;
|
sceneStore: Accessor<SceneData | undefined>;
|
||||||
setMachinePos: (machineId: string, pos: [number, number] | null) => void;
|
setMachinePos: (machineId: string, pos: [number, number] | null) => void;
|
||||||
isLoading: boolean;
|
isLoading: boolean;
|
||||||
clanURI: string;
|
clanURI: string;
|
||||||
@@ -131,9 +134,6 @@ export function CubeScene(props: {
|
|||||||
|
|
||||||
let machineManager: MachineManager;
|
let machineManager: MachineManager;
|
||||||
|
|
||||||
const [positionMode, setPositionMode] = createSignal<"grid" | "circle">(
|
|
||||||
"grid",
|
|
||||||
);
|
|
||||||
// Managed by controls
|
// Managed by controls
|
||||||
const [isDragging, setIsDragging] = createSignal(false);
|
const [isDragging, setIsDragging] = createSignal(false);
|
||||||
|
|
||||||
@@ -142,10 +142,6 @@ export function CubeScene(props: {
|
|||||||
// TODO: Unify this with actionRepr position
|
// TODO: Unify this with actionRepr position
|
||||||
const [cursorPosition, setCursorPosition] = createSignal<[number, number]>();
|
const [cursorPosition, setCursorPosition] = createSignal<[number, number]>();
|
||||||
|
|
||||||
const [cameraInfo, setCameraInfo] = createSignal({
|
|
||||||
position: { x: 0, y: 0, z: 0 },
|
|
||||||
spherical: { radius: 0, theta: 0, phi: 0 },
|
|
||||||
});
|
|
||||||
// Context menu state
|
// Context menu state
|
||||||
const [contextOpen, setContextOpen] = createSignal(false);
|
const [contextOpen, setContextOpen] = createSignal(false);
|
||||||
const [menuPos, setMenuPos] = createSignal<{ x: number; y: number }>();
|
const [menuPos, setMenuPos] = createSignal<{ x: number; y: number }>();
|
||||||
@@ -157,7 +153,6 @@ export function CubeScene(props: {
|
|||||||
const BASE_SIZE = 0.9; // Height of the cube above the ground
|
const BASE_SIZE = 0.9; // Height of the cube above the ground
|
||||||
const CUBE_SIZE = BASE_SIZE / 1.5; //
|
const CUBE_SIZE = BASE_SIZE / 1.5; //
|
||||||
const BASE_HEIGHT = 0.05; // Height of the cube above the ground
|
const BASE_HEIGHT = 0.05; // Height of the cube above the ground
|
||||||
const CUBE_Y = 0 + CUBE_SIZE / 2 + BASE_HEIGHT / 2; // Y position of the cube above the ground
|
|
||||||
const CUBE_SEGMENT_HEIGHT = CUBE_SIZE / 1;
|
const CUBE_SEGMENT_HEIGHT = CUBE_SIZE / 1;
|
||||||
|
|
||||||
const FLOOR_COLOR = 0xcdd8d9;
|
const FLOOR_COLOR = 0xcdd8d9;
|
||||||
@@ -201,6 +196,8 @@ export function CubeScene(props: {
|
|||||||
|
|
||||||
const grid = new THREE.GridHelper(1000, 1000 / 1, 0xe1edef, 0xe1edef);
|
const grid = new THREE.GridHelper(1000, 1000 / 1, 0xe1edef, 0xe1edef);
|
||||||
|
|
||||||
|
const navigate = useNavigate();
|
||||||
|
|
||||||
onMount(() => {
|
onMount(() => {
|
||||||
// Scene setup
|
// Scene setup
|
||||||
scene = new THREE.Scene();
|
scene = new THREE.Scene();
|
||||||
@@ -311,21 +308,12 @@ export function CubeScene(props: {
|
|||||||
bgCamera,
|
bgCamera,
|
||||||
);
|
);
|
||||||
|
|
||||||
// controls.addEventListener("start", (e) => {
|
|
||||||
// setIsDragging(true);
|
|
||||||
// });
|
|
||||||
// controls.addEventListener("end", (e) => {
|
|
||||||
// setIsDragging(false);
|
|
||||||
// });
|
|
||||||
|
|
||||||
// Lighting
|
// Lighting
|
||||||
const ambientLight = new THREE.AmbientLight(0xd9f2f7, 0.72);
|
const ambientLight = new THREE.AmbientLight(0xd9f2f7, 0.72);
|
||||||
scene.add(ambientLight);
|
scene.add(ambientLight);
|
||||||
|
|
||||||
const directionalLight = new THREE.DirectionalLight(0xffffff, 3.5);
|
const directionalLight = new THREE.DirectionalLight(0xffffff, 3.5);
|
||||||
|
|
||||||
// scene.add(new THREE.DirectionalLightHelper(directionalLight));
|
|
||||||
// scene.add(new THREE.CameraHelper(camera));
|
|
||||||
const lightPos = new THREE.Spherical(
|
const lightPos = new THREE.Spherical(
|
||||||
15,
|
15,
|
||||||
initialSphericalCameraPosition.phi - Math.PI / 8,
|
initialSphericalCameraPosition.phi - Math.PI / 8,
|
||||||
@@ -412,30 +400,6 @@ export function CubeScene(props: {
|
|||||||
actionMachine = createActionMachine();
|
actionMachine = createActionMachine();
|
||||||
scene.add(actionMachine);
|
scene.add(actionMachine);
|
||||||
|
|
||||||
// const spherical = new THREE.Spherical();
|
|
||||||
// spherical.setFromVector3(camera.position);
|
|
||||||
|
|
||||||
// Function to update camera info
|
|
||||||
const updateCameraInfo = () => {
|
|
||||||
const spherical = new THREE.Spherical();
|
|
||||||
spherical.setFromVector3(camera.position);
|
|
||||||
setCameraInfo({
|
|
||||||
position: {
|
|
||||||
x: Math.round(camera.position.x * 100) / 100,
|
|
||||||
y: Math.round(camera.position.y * 100) / 100,
|
|
||||||
z: Math.round(camera.position.z * 100) / 100,
|
|
||||||
},
|
|
||||||
spherical: {
|
|
||||||
radius: Math.round(spherical.radius * 100) / 100,
|
|
||||||
theta: Math.round(spherical.theta * 100) / 100,
|
|
||||||
phi: Math.round(spherical.phi * 100) / 100,
|
|
||||||
},
|
|
||||||
});
|
|
||||||
};
|
|
||||||
|
|
||||||
// Initial camera info update
|
|
||||||
updateCameraInfo();
|
|
||||||
|
|
||||||
createEffect(
|
createEffect(
|
||||||
on(ctx.worldMode, (mode) => {
|
on(ctx.worldMode, (mode) => {
|
||||||
if (mode === "create") {
|
if (mode === "create") {
|
||||||
@@ -661,7 +625,8 @@ export function CubeScene(props: {
|
|||||||
});
|
});
|
||||||
|
|
||||||
const snapToGrid = (point: THREE.Vector3) => {
|
const snapToGrid = (point: THREE.Vector3) => {
|
||||||
if (!props.sceneStore) return;
|
const store = props.sceneStore() || {};
|
||||||
|
|
||||||
// Snap to grid
|
// Snap to grid
|
||||||
const snapped = new THREE.Vector3(
|
const snapped = new THREE.Vector3(
|
||||||
Math.round(point.x / GRID_SIZE) * GRID_SIZE,
|
Math.round(point.x / GRID_SIZE) * GRID_SIZE,
|
||||||
@@ -670,7 +635,7 @@ export function CubeScene(props: {
|
|||||||
);
|
);
|
||||||
|
|
||||||
// Skip snapping if there's already a cube at this position
|
// Skip snapping if there's already a cube at this position
|
||||||
const positions = Object.entries(props.sceneStore());
|
const positions = Object.entries(store);
|
||||||
const intersects = positions.some(
|
const intersects = positions.some(
|
||||||
([_id, p]) => p.position[0] === snapped.x && p.position[1] === snapped.z,
|
([_id, p]) => p.position[0] === snapped.x && p.position[1] === snapped.z,
|
||||||
);
|
);
|
||||||
@@ -694,7 +659,6 @@ export function CubeScene(props: {
|
|||||||
};
|
};
|
||||||
|
|
||||||
const onAddClick = (event: MouseEvent) => {
|
const onAddClick = (event: MouseEvent) => {
|
||||||
setPositionMode("grid");
|
|
||||||
ctx.setWorldMode("create");
|
ctx.setWorldMode("create");
|
||||||
renderLoop.requestRender();
|
renderLoop.requestRender();
|
||||||
};
|
};
|
||||||
@@ -706,9 +670,6 @@ export function CubeScene(props: {
|
|||||||
if (!actionRepr) return;
|
if (!actionRepr) return;
|
||||||
|
|
||||||
actionRepr.visible = true;
|
actionRepr.visible = true;
|
||||||
// (actionRepr.material as THREE.MeshPhongMaterial).emissive.set(
|
|
||||||
// worldMode() === "create" ? CREATE_BASE_EMISSIVE : MOVE_BASE_EMISSIVE,
|
|
||||||
// );
|
|
||||||
|
|
||||||
// Calculate mouse position in normalized device coordinates
|
// Calculate mouse position in normalized device coordinates
|
||||||
// (-1 to +1) for both components
|
// (-1 to +1) for both components
|
||||||
@@ -736,23 +697,38 @@ export function CubeScene(props: {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
const handleMenuSelect = (mode: "move") => {
|
const handleMenuSelect = async (mode: "move" | "delete") => {
|
||||||
|
const firstId = menuIntersection()[0];
|
||||||
|
if (!firstId) {
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
const machine = machineManager.machines.get(firstId);
|
||||||
|
if (mode === "delete") {
|
||||||
|
console.log("deleting machine", firstId);
|
||||||
|
await client.post("delete_machine", {
|
||||||
|
body: {
|
||||||
|
machine: { flake: { identifier: props.clanURI }, name: firstId },
|
||||||
|
},
|
||||||
|
});
|
||||||
|
navigateToClan(navigate, props.clanURI);
|
||||||
|
ctx.machinesQuery.refetch();
|
||||||
|
ctx.serviceInstancesQuery.refetch();
|
||||||
|
return;
|
||||||
|
}
|
||||||
|
|
||||||
|
// Else "move" mode
|
||||||
ctx.setWorldMode(mode);
|
ctx.setWorldMode(mode);
|
||||||
setHighlightGroups({ move: new Set(menuIntersection()) });
|
setHighlightGroups({ move: new Set(menuIntersection()) });
|
||||||
|
|
||||||
// Find the position of the first selected machine
|
// Find the position of the first selected machine
|
||||||
// Set the actionMachine position to that
|
// Set the actionMachine position to that
|
||||||
const firstId = menuIntersection()[0];
|
if (machine && actionMachine) {
|
||||||
if (firstId) {
|
actionMachine.position.set(
|
||||||
const machine = machineManager.machines.get(firstId);
|
machine.group.position.x,
|
||||||
if (machine && actionMachine) {
|
0,
|
||||||
actionMachine.position.set(
|
machine.group.position.z,
|
||||||
machine.group.position.x,
|
);
|
||||||
0,
|
setCursorPosition([machine.group.position.x, machine.group.position.z]);
|
||||||
machine.group.position.z,
|
|
||||||
);
|
|
||||||
setCursorPosition([machine.group.position.x, machine.group.position.z]);
|
|
||||||
}
|
|
||||||
}
|
}
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|||||||
@@ -766,6 +766,28 @@ def test_prompt(
|
|||||||
assert sops_store.get(my_generator, "prompt_persist").decode() == "prompt_persist"
|
assert sops_store.get(my_generator, "prompt_persist").decode() == "prompt_persist"
|
||||||
|
|
||||||
|
|
||||||
|
@pytest.mark.with_core
|
||||||
|
def test_non_existing_dependency_raises_error(
|
||||||
|
monkeypatch: pytest.MonkeyPatch,
|
||||||
|
flake_with_sops: ClanFlake,
|
||||||
|
) -> None:
|
||||||
|
"""Ensure that a generator with a non-existing dependency raises a clear error."""
|
||||||
|
flake = flake_with_sops
|
||||||
|
|
||||||
|
config = flake.machines["my_machine"] = create_test_machine_config()
|
||||||
|
my_generator = config["clan"]["core"]["vars"]["generators"]["my_generator"]
|
||||||
|
my_generator["files"]["my_value"]["secret"] = False
|
||||||
|
my_generator["script"] = 'echo "$RANDOM" > "$out"/my_value'
|
||||||
|
my_generator["dependencies"] = ["non_existing_generator"]
|
||||||
|
flake.refresh()
|
||||||
|
monkeypatch.chdir(flake.path)
|
||||||
|
with pytest.raises(
|
||||||
|
ClanError,
|
||||||
|
match="Generator 'my_generator' on machine 'my_machine' depends on generator 'non_existing_generator', but 'non_existing_generator' does not exist",
|
||||||
|
):
|
||||||
|
cli.run(["vars", "generate", "--flake", str(flake.path), "my_machine"])
|
||||||
|
|
||||||
|
|
||||||
@pytest.mark.with_core
|
@pytest.mark.with_core
|
||||||
def test_shared_vars_must_never_depend_on_machine_specific_vars(
|
def test_shared_vars_must_never_depend_on_machine_specific_vars(
|
||||||
monkeypatch: pytest.MonkeyPatch,
|
monkeypatch: pytest.MonkeyPatch,
|
||||||
|
|||||||
@@ -66,6 +66,41 @@ class Generator:
|
|||||||
_public_store: "StoreBase | None" = None
|
_public_store: "StoreBase | None" = None
|
||||||
_secret_store: "StoreBase | None" = None
|
_secret_store: "StoreBase | None" = None
|
||||||
|
|
||||||
|
@staticmethod
|
||||||
|
def validate_dependencies(
|
||||||
|
generator_name: str,
|
||||||
|
machine_name: str,
|
||||||
|
dependencies: list[str],
|
||||||
|
generators_data: dict[str, dict],
|
||||||
|
) -> list[GeneratorKey]:
|
||||||
|
"""Validate and build dependency keys for a generator.
|
||||||
|
|
||||||
|
Args:
|
||||||
|
generator_name: Name of the generator that has dependencies
|
||||||
|
machine_name: Name of the machine the generator belongs to
|
||||||
|
dependencies: List of dependency generator names
|
||||||
|
generators_data: Dictionary of all available generators for this machine
|
||||||
|
|
||||||
|
Returns:
|
||||||
|
List of GeneratorKey objects
|
||||||
|
|
||||||
|
Raises:
|
||||||
|
ClanError: If a dependency does not exist
|
||||||
|
|
||||||
|
"""
|
||||||
|
deps_list = []
|
||||||
|
for dep in dependencies:
|
||||||
|
if dep not in generators_data:
|
||||||
|
msg = f"Generator '{generator_name}' on machine '{machine_name}' depends on generator '{dep}', but '{dep}' does not exist. Please check your configuration."
|
||||||
|
raise ClanError(msg)
|
||||||
|
deps_list.append(
|
||||||
|
GeneratorKey(
|
||||||
|
machine=None if generators_data[dep]["share"] else machine_name,
|
||||||
|
name=dep,
|
||||||
|
)
|
||||||
|
)
|
||||||
|
return deps_list
|
||||||
|
|
||||||
@property
|
@property
|
||||||
def key(self) -> GeneratorKey:
|
def key(self) -> GeneratorKey:
|
||||||
if self.share:
|
if self.share:
|
||||||
@@ -240,15 +275,12 @@ class Generator:
|
|||||||
name=gen_name,
|
name=gen_name,
|
||||||
share=share,
|
share=share,
|
||||||
files=files,
|
files=files,
|
||||||
dependencies=[
|
dependencies=cls.validate_dependencies(
|
||||||
GeneratorKey(
|
gen_name,
|
||||||
machine=None
|
machine_name,
|
||||||
if generators_data[dep]["share"]
|
gen_data["dependencies"],
|
||||||
else machine_name,
|
generators_data,
|
||||||
name=dep,
|
),
|
||||||
)
|
|
||||||
for dep in gen_data["dependencies"]
|
|
||||||
],
|
|
||||||
migrate_fact=gen_data.get("migrateFact"),
|
migrate_fact=gen_data.get("migrateFact"),
|
||||||
validation_hash=gen_data.get("validationHash"),
|
validation_hash=gen_data.get("validationHash"),
|
||||||
prompts=prompts,
|
prompts=prompts,
|
||||||
|
|||||||
@@ -245,7 +245,7 @@ class SecretStore(StoreBase):
|
|||||||
output_dir / "activation" / generator.name / file.name
|
output_dir / "activation" / generator.name / file.name
|
||||||
)
|
)
|
||||||
out_file.parent.mkdir(parents=True, exist_ok=True)
|
out_file.parent.mkdir(parents=True, exist_ok=True)
|
||||||
out_file.write_bytes(self.get(generator, file.name))
|
out_file.write_bytes(file.value)
|
||||||
if "partitioning" in phases:
|
if "partitioning" in phases:
|
||||||
for generator in vars_generators:
|
for generator in vars_generators:
|
||||||
for file in generator.files:
|
for file in generator.files:
|
||||||
@@ -254,7 +254,7 @@ class SecretStore(StoreBase):
|
|||||||
output_dir / "partitioning" / generator.name / file.name
|
output_dir / "partitioning" / generator.name / file.name
|
||||||
)
|
)
|
||||||
out_file.parent.mkdir(parents=True, exist_ok=True)
|
out_file.parent.mkdir(parents=True, exist_ok=True)
|
||||||
out_file.write_bytes(self.get(generator, file.name))
|
out_file.write_bytes(file.value)
|
||||||
|
|
||||||
hash_data = self.generate_hash(machine)
|
hash_data = self.generate_hash(machine)
|
||||||
if hash_data:
|
if hash_data:
|
||||||
|
|||||||
@@ -246,7 +246,7 @@ class SecretStore(StoreBase):
|
|||||||
)
|
)
|
||||||
# chmod after in case it doesn't have u+w
|
# chmod after in case it doesn't have u+w
|
||||||
target_path.touch(mode=0o600)
|
target_path.touch(mode=0o600)
|
||||||
target_path.write_bytes(self.get(generator, file.name))
|
target_path.write_bytes(file.value)
|
||||||
target_path.chmod(file.mode)
|
target_path.chmod(file.mode)
|
||||||
|
|
||||||
if "partitioning" in phases:
|
if "partitioning" in phases:
|
||||||
@@ -260,7 +260,7 @@ class SecretStore(StoreBase):
|
|||||||
)
|
)
|
||||||
# chmod after in case it doesn't have u+w
|
# chmod after in case it doesn't have u+w
|
||||||
target_path.touch(mode=0o600)
|
target_path.touch(mode=0o600)
|
||||||
target_path.write_bytes(self.get(generator, file.name))
|
target_path.write_bytes(file.value)
|
||||||
target_path.chmod(file.mode)
|
target_path.chmod(file.mode)
|
||||||
|
|
||||||
@override
|
@override
|
||||||
|
|||||||
@@ -211,7 +211,7 @@ class ClanSelectError(ClanError):
|
|||||||
|
|
||||||
def __str__(self) -> str:
|
def __str__(self) -> str:
|
||||||
if self.description:
|
if self.description:
|
||||||
return f"{self.msg} Reason: {self.description}"
|
return f"{self.msg} Reason: {self.description}. Use flag '--debug' to see full nix trace."
|
||||||
return self.msg
|
return self.msg
|
||||||
|
|
||||||
def __repr__(self) -> str:
|
def __repr__(self) -> str:
|
||||||
|
|||||||
@@ -59,9 +59,7 @@ def upload_sources(machine: Machine, ssh: Host, upload_inputs: bool) -> str:
|
|||||||
if not has_path_inputs and not upload_inputs:
|
if not has_path_inputs and not upload_inputs:
|
||||||
# Just copy the flake to the remote machine, we can substitute other inputs there.
|
# Just copy the flake to the remote machine, we can substitute other inputs there.
|
||||||
path = flake_data["path"]
|
path = flake_data["path"]
|
||||||
if machine._class_ == "darwin":
|
remote_url = f"ssh-ng://{remote_url_base}"
|
||||||
remote_program_params = "?remote-program=bash -lc 'exec nix-daemon --stdio'"
|
|
||||||
remote_url = f"ssh-ng://{remote_url_base}{remote_program_params}"
|
|
||||||
cmd = nix_command(
|
cmd = nix_command(
|
||||||
[
|
[
|
||||||
"copy",
|
"copy",
|
||||||
|
|||||||
@@ -17,7 +17,7 @@
|
|||||||
runCommand,
|
runCommand,
|
||||||
setuptools,
|
setuptools,
|
||||||
webkitgtk_6_0,
|
webkitgtk_6_0,
|
||||||
wrapGAppsHook,
|
wrapGAppsHook3,
|
||||||
python,
|
python,
|
||||||
lib,
|
lib,
|
||||||
stdenv,
|
stdenv,
|
||||||
@@ -87,7 +87,7 @@ buildPythonApplication rec {
|
|||||||
nativeBuildInputs = [
|
nativeBuildInputs = [
|
||||||
setuptools
|
setuptools
|
||||||
copyDesktopItems
|
copyDesktopItems
|
||||||
wrapGAppsHook
|
wrapGAppsHook3
|
||||||
gobject-introspection
|
gobject-introspection
|
||||||
];
|
];
|
||||||
|
|
||||||
|
|||||||
@@ -64,6 +64,9 @@
|
|||||||
'';
|
'';
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
|
legacyPackages = {
|
||||||
|
inherit jsonDocs clanModulesViaService;
|
||||||
|
};
|
||||||
packages = {
|
packages = {
|
||||||
inherit module-docs;
|
inherit module-docs;
|
||||||
};
|
};
|
||||||
|
|||||||
@@ -11,151 +11,10 @@
|
|||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
let
|
let
|
||||||
inherit (lib)
|
|
||||||
mapAttrsToList
|
|
||||||
mapAttrs
|
|
||||||
mkOption
|
|
||||||
types
|
|
||||||
splitString
|
|
||||||
stringLength
|
|
||||||
substring
|
|
||||||
;
|
|
||||||
inherit (self) clanLib;
|
|
||||||
|
|
||||||
serviceModules = self.clan.modules;
|
|
||||||
|
|
||||||
baseHref = "/option-search/";
|
baseHref = "/option-search/";
|
||||||
|
|
||||||
getRoles =
|
|
||||||
module:
|
|
||||||
(clanLib.evalService {
|
|
||||||
modules = [ module ];
|
|
||||||
prefix = [ ];
|
|
||||||
}).config.roles;
|
|
||||||
|
|
||||||
getManifest =
|
|
||||||
module:
|
|
||||||
(clanLib.evalService {
|
|
||||||
modules = [ module ];
|
|
||||||
prefix = [ ];
|
|
||||||
}).config.manifest;
|
|
||||||
|
|
||||||
settingsModules = module: mapAttrs (_roleName: roleConfig: roleConfig.interface) (getRoles module);
|
|
||||||
|
|
||||||
# Map each letter to its capitalized version
|
# Map each letter to its capitalized version
|
||||||
capitalizeChar =
|
|
||||||
char:
|
|
||||||
{
|
|
||||||
a = "A";
|
|
||||||
b = "B";
|
|
||||||
c = "C";
|
|
||||||
d = "D";
|
|
||||||
e = "E";
|
|
||||||
f = "F";
|
|
||||||
g = "G";
|
|
||||||
h = "H";
|
|
||||||
i = "I";
|
|
||||||
j = "J";
|
|
||||||
k = "K";
|
|
||||||
l = "L";
|
|
||||||
m = "M";
|
|
||||||
n = "N";
|
|
||||||
o = "O";
|
|
||||||
p = "P";
|
|
||||||
q = "Q";
|
|
||||||
r = "R";
|
|
||||||
s = "S";
|
|
||||||
t = "T";
|
|
||||||
u = "U";
|
|
||||||
v = "V";
|
|
||||||
w = "W";
|
|
||||||
x = "X";
|
|
||||||
y = "Y";
|
|
||||||
z = "Z";
|
|
||||||
}
|
|
||||||
.${char};
|
|
||||||
|
|
||||||
title =
|
|
||||||
name:
|
|
||||||
let
|
|
||||||
# split by -
|
|
||||||
parts = splitString "-" name;
|
|
||||||
# capitalize first letter of each part
|
|
||||||
capitalize = part: (capitalizeChar (substring 0 1 part)) + substring 1 (stringLength part) part;
|
|
||||||
capitalizedParts = map capitalize parts;
|
|
||||||
in
|
|
||||||
builtins.concatStringsSep " " capitalizedParts;
|
|
||||||
|
|
||||||
fakeInstanceOptions =
|
|
||||||
name: module:
|
|
||||||
let
|
|
||||||
manifest = getManifest module;
|
|
||||||
description = ''
|
|
||||||
# ${title name} (Clan Service)
|
|
||||||
|
|
||||||
**${manifest.description}**
|
|
||||||
|
|
||||||
${lib.optionalString (manifest ? readme) manifest.readme}
|
|
||||||
|
|
||||||
${
|
|
||||||
if manifest.categories != [ ] then
|
|
||||||
"Categories: " + builtins.concatStringsSep ", " manifest.categories
|
|
||||||
else
|
|
||||||
"No categories defined"
|
|
||||||
}
|
|
||||||
|
|
||||||
'';
|
|
||||||
in
|
|
||||||
{
|
|
||||||
options = {
|
|
||||||
instances.${name} = lib.mkOption {
|
|
||||||
inherit description;
|
|
||||||
type = types.submodule {
|
|
||||||
options.roles = mapAttrs (
|
|
||||||
roleName: roleSettingsModule:
|
|
||||||
mkOption {
|
|
||||||
type = types.submodule {
|
|
||||||
_file = "docs flake-module";
|
|
||||||
imports = [
|
|
||||||
{ _module.args = { inherit clanLib; }; }
|
|
||||||
(import ../../modules/inventoryClass/role.nix {
|
|
||||||
nestedSettingsOption = mkOption {
|
|
||||||
type = types.raw;
|
|
||||||
description = ''
|
|
||||||
See [instances.${name}.roles.${roleName}.settings](${baseHref}?option_scope=0&option=inventory.instances.${name}.roles.${roleName}.settings)
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
settingsOption = mkOption {
|
|
||||||
type = types.submoduleWith {
|
|
||||||
modules = [ roleSettingsModule ];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
})
|
|
||||||
];
|
|
||||||
};
|
|
||||||
}
|
|
||||||
) (settingsModules module);
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
docModules = [
|
|
||||||
{
|
|
||||||
inherit self;
|
|
||||||
}
|
|
||||||
self.modules.clan.default
|
|
||||||
{
|
|
||||||
options.inventory = lib.mkOption {
|
|
||||||
type = types.submoduleWith {
|
|
||||||
modules = [
|
|
||||||
{ noInstanceOptions = true; }
|
|
||||||
]
|
|
||||||
++ mapAttrsToList fakeInstanceOptions serviceModules;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
||||||
];
|
|
||||||
|
|
||||||
baseModule =
|
baseModule =
|
||||||
# Module
|
# Module
|
||||||
@@ -208,12 +67,6 @@
|
|||||||
title = "Clan Options";
|
title = "Clan Options";
|
||||||
# scopes = mapAttrsToList mkScope serviceModules;
|
# scopes = mapAttrsToList mkScope serviceModules;
|
||||||
scopes = [
|
scopes = [
|
||||||
{
|
|
||||||
inherit baseHref;
|
|
||||||
name = "Flake Options (clan.nix file)";
|
|
||||||
modules = docModules;
|
|
||||||
urlPrefix = "https://git.clan.lol/clan/clan-core/src/branch/main/";
|
|
||||||
}
|
|
||||||
{
|
{
|
||||||
name = "Machine Options (clan.core NixOS options)";
|
name = "Machine Options (clan.core NixOS options)";
|
||||||
optionsJSON = "${coreOptions}/share/doc/nixos/options.json";
|
optionsJSON = "${coreOptions}/share/doc/nixos/options.json";
|
||||||
|
|||||||
Reference in New Issue
Block a user