This commit is contained in:
GTrunSec 2022-04-02 12:40:35 -07:00
parent a0ce293db8
commit 60592d3096
No known key found for this signature in database
GPG key ID: 2368FAFA4ABDD2A0
55 changed files with 23668 additions and 30925 deletions

View file

@ -1,20 +1,20 @@
{ system ? builtins.currentSystem
, evalModules ? (import ../. { }).evalModules.${system}
}:
{ k8sVersion ? "1.21"
, registry ? throw "Registry url not defined"
, doThrowError ? true # whether any testing error should throw an error
, enabledTests ? null
}:
let
config = (evalModules {
module =
{ kubenix, pkgs, ... }: {
imports = [ kubenix.modules.testing ];
{
system ? builtins.currentSystem,
evalModules ? (import ../. {}).evalModules.${system},
}: {
k8sVersion ? "1.21",
registry ? throw "Registry url not defined",
doThrowError ? true, # whether any testing error should throw an error
enabledTests ? null,
}: let
config =
(evalModules {
module = {
kubenix,
pkgs,
...
}: {
imports = [kubenix.modules.testing];
testing = {
inherit doThrowError enabledTests;
@ -36,21 +36,20 @@ let
./submodules/passthru.nix
];
args = { images = pkgs.callPackage ./images.nix { }; };
args = {images = pkgs.callPackage ./images.nix {};};
docker.registryUrl = registry;
common = [
{
features = [ "k8s" ];
features = ["k8s"];
options = {
kubernetes.version = k8sVersion;
};
}
];
};
};
}).config;
})
.config;
in
config.testing // { recurseForDerivations = true; }
config.testing // {recurseForDerivations = true;}

View file

@ -1,43 +1,44 @@
{ pkgs, dockerTools, lib, ... }:
with lib;
{
pkgs,
dockerTools,
lib,
...
}:
with lib; {
curl = dockerTools.buildLayeredImage {
name = "curl";
tag = "latest";
config.Cmd = [ "${pkgs.bash}" "-c" "sleep infinity" ];
contents = [ pkgs.bash pkgs.curl pkgs.cacert ];
config.Cmd = ["${pkgs.bash}" "-c" "sleep infinity"];
contents = [pkgs.bash pkgs.curl pkgs.cacert];
};
nginx =
let
nginxPort = "80";
nginxConf = pkgs.writeText "nginx.conf" ''
user nginx nginx;
daemon off;
error_log /dev/stdout info;
pid /dev/null;
events {}
http {
access_log /dev/stdout;
server {
listen ${nginxPort};
index index.html;
location / {
root ${nginxWebRoot};
}
nginx = let
nginxPort = "80";
nginxConf = pkgs.writeText "nginx.conf" ''
user nginx nginx;
daemon off;
error_log /dev/stdout info;
pid /dev/null;
events {}
http {
access_log /dev/stdout;
server {
listen ${nginxPort};
index index.html;
location / {
root ${nginxWebRoot};
}
}
'';
nginxWebRoot = pkgs.writeTextDir "index.html" ''
<html><body><h1>Hello from NGINX</h1></body></html>
'';
in
}
'';
nginxWebRoot = pkgs.writeTextDir "index.html" ''
<html><body><h1>Hello from NGINX</h1></body></html>
'';
in
dockerTools.buildLayeredImage {
name = "xtruder/nginx";
tag = "latest";
contents = [ pkgs.nginx ];
contents = [pkgs.nginx];
extraCommands = ''
mkdir -p etc
chmod u+w etc
@ -49,9 +50,9 @@ with lib;
echo "nginx:x:1000:nginx" > etc/group
'';
config = {
Cmd = [ "nginx" "-c" nginxConf ];
Cmd = ["nginx" "-c" nginxConf];
ExposedPorts = {
"${nginxPort}/tcp" = { };
"${nginxPort}/tcp" = {};
};
};
};

View file

@ -1,7 +1,9 @@
{ config, kubenix, ... }:
{
imports = with kubenix.modules; [ test k8s istio ];
config,
kubenix,
...
}: {
imports = with kubenix.modules; [test k8s istio];
test = {
name = "istio-bookinfo";
@ -12,61 +14,72 @@
Gateway."bookinfo-gateway" = {
spec = {
selector.istio = "ingressgateway";
servers = [{
port = {
number = 80;
name = "http";
protocol = "HTTP";
};
hosts = [ "*" ];
}];
servers = [
{
port = {
number = 80;
name = "http";
protocol = "HTTP";
};
hosts = ["*"];
}
];
};
};
VirtualService.bookinfo = {
spec = {
hosts = [ "*" ];
gateways = [ "bookinfo-gateway" ];
http = [{
match = [{
uri.exact = "/productpage";
hosts = ["*"];
gateways = ["bookinfo-gateway"];
http = [
{
match = [
{
uri.exact = "/productpage";
}
{
uri.exact = "/login";
}
{
uri.exact = "/logout";
}
{
uri.prefix = "/api/v1/products";
}
];
route = [
{
destination = {
host = "productpage";
port.number = 9080;
};
}
];
}
{
uri.exact = "/login";
}
{
uri.exact = "/logout";
}
{
uri.prefix = "/api/v1/products";
}];
route = [{
destination = {
host = "productpage";
port.number = 9080;
};
}];
}];
];
};
};
DestinationRule.productpage = {
spec = {
host = "productpage";
subsets = [{
name = "v1";
labels.version = "v1";
}];
subsets = [
{
name = "v1";
labels.version = "v1";
}
];
};
};
DestinationRule.reviews = {
spec = {
host = "reviews";
subsets = [{
name = "v1";
labels.version = "v1";
}
subsets = [
{
name = "v1";
labels.version = "v1";
}
{
name = "v2";
labels.version = "v2";
@ -74,17 +87,19 @@
{
name = "v3";
labels.version = "v3";
}];
}
];
};
};
DestinationRule.ratings = {
spec = {
host = "ratings";
subsets = [{
name = "v1";
labels.version = "v1";
}
subsets = [
{
name = "v1";
labels.version = "v1";
}
{
name = "v2";
labels.version = "v2";
@ -96,21 +111,24 @@
{
name = "v2-mysql-vm";
labels.version = "v2-mysql-vm";
}];
}
];
};
};
DestinationRule.details = {
spec = {
host = "details";
subsets = [{
name = "v1";
labels.version = "v1";
}
subsets = [
{
name = "v1";
labels.version = "v1";
}
{
name = "v2";
labels.version = "v2";
}];
}
];
};
};
};

View file

@ -1,20 +1,25 @@
{ config, lib, kubenix, pkgs, ... }:
with lib;
let
latestCrontab = config.kubernetes.api.resources.cronTabs.latest;
in
{
imports = with kubenix.modules; [ test k8s ];
config,
lib,
kubenix,
pkgs,
...
}:
with lib; let
latestCrontab = config.kubernetes.api.resources.cronTabs.latest;
in {
imports = with kubenix.modules; [test k8s];
test = {
name = "k8s-crd";
description = "Simple test tesing CRD";
enable = builtins.compareVersions config.kubernetes.version "1.8" >= 0;
assertions = [{
message = "Custom resource should have correct version set";
assertion = latestCrontab.apiVersion == "stable.example.com/v2";
}];
assertions = [
{
message = "Custom resource should have correct version set";
assertion = latestCrontab.apiVersion == "stable.example.com/v2";
}
];
script = ''
@pytest.mark.applymanifest('${config.kubernetes.resultYAML}')
def test_testing_module(kube):
@ -50,7 +55,6 @@ in
type = types.str;
};
};
}
{
group = "stable.example.com";

View file

@ -1,20 +1,23 @@
{ config, lib, kubenix, ... }:
with lib;
let
{
config,
lib,
kubenix,
...
}:
with lib; let
pod1 = config.kubernetes.api.resources.pods.pod1;
pod2 = config.kubernetes.api.resources.pods.pod2;
in
{
imports = with kubenix.modules; [ test k8s ];
in {
imports = with kubenix.modules; [test k8s];
test = {
name = "k8s-defaults";
description = "Simple k8s testing wheter name, apiVersion and kind are preset";
assertions = [{
message = "Should have label set with resource";
assertion = pod1.metadata.labels.resource-label == "value";
}
assertions = [
{
message = "Should have label set with resource";
assertion = pod1.metadata.labels.resource-label == "value";
}
{
message = "Should have default label set with group, version, kind";
assertion = pod1.metadata.labels.gvk-label == "value";
@ -22,19 +25,21 @@ in
{
message = "Should have conditional annotation set";
assertion = pod2.metadata.annotations.conditional-annotation == "value";
}];
}
];
};
kubernetes.resources.pods.pod1 = { };
kubernetes.resources.pods.pod1 = {};
kubernetes.resources.pods.pod2 = {
metadata.labels.custom-label = "value";
};
kubernetes.api.defaults = [{
resource = "pods";
default.metadata.labels.resource-label = "value";
}
kubernetes.api.defaults = [
{
resource = "pods";
default.metadata.labels.resource-label = "value";
}
{
group = "core";
kind = "Pod";
@ -43,10 +48,11 @@ in
}
{
resource = "pods";
default = { config, ... }: {
default = {config, ...}: {
config.metadata.annotations = mkIf (config.metadata.labels ? "custom-label") {
conditional-annotation = "value";
};
};
}];
}
];
}

View file

@ -1,7 +1,13 @@
{ config, lib, pkgs, kubenix, images, test, ... }:
with lib;
let
{
config,
lib,
pkgs,
kubenix,
images,
test,
...
}:
with lib; let
cfg = config.kubernetes.api.resources.deployments.nginx;
image = images.nginx;
@ -12,30 +18,31 @@ let
namespace = config.kubernetes.namespace;
name = "curl";
};
spec.containers = [{
name = "curl";
image = config.docker.images.curl.path;
args = [ "curl" "--retry" "20" "--retry-connrefused" "http://nginx" ];
}];
spec.containers = [
{
name = "curl";
image = config.docker.images.curl.path;
args = ["curl" "--retry" "20" "--retry-connrefused" "http://nginx"];
}
];
spec.restartPolicy = "Never";
});
in
{
imports = [ kubenix.modules.test kubenix.modules.k8s kubenix.modules.docker ];
in {
imports = [kubenix.modules.test kubenix.modules.k8s kubenix.modules.docker];
test = {
name = "k8s-deployment";
description = "Simple k8s testing a simple deployment";
assertions = [{
message = "should have correct apiVersion and kind set";
assertion =
if ((builtins.compareVersions config.kubernetes.version "1.7") <= 0)
then cfg.apiVersion == "apps/v1beta1"
else if ((builtins.compareVersions config.kubernetes.version "1.8") <= 0)
then cfg.apiVersion == "apps/v1beta2"
else cfg.apiVersion == "apps/v1";
}
assertions = [
{
message = "should have correct apiVersion and kind set";
assertion =
if ((builtins.compareVersions config.kubernetes.version "1.7") <= 0)
then cfg.apiVersion == "apps/v1beta1"
else if ((builtins.compareVersions config.kubernetes.version "1.8") <= 0)
then cfg.apiVersion == "apps/v1beta2"
else cfg.apiVersion == "apps/v1";
}
{
message = "should have corrent kind set";
assertion = cfg.kind == "Deployment";
@ -43,7 +50,8 @@ in
{
message = "should have replicas set";
assertion = cfg.spec.replicas == 3;
}];
}
];
script = ''
import time
@ -97,10 +105,12 @@ in
kubernetes.resources.services.nginx = {
spec = {
ports = [{
name = "http";
port = 80;
}];
ports = [
{
name = "http";
port = 80;
}
];
selector.app = "nginx";
};
};

View file

@ -1,25 +1,29 @@
{ config, lib, kubenix, ... }:
with lib;
let
{
config,
lib,
kubenix,
...
}:
with lib; let
pod = config.kubernetes.api.resources.core.v1.Pod.test;
deployment = config.kubernetes.api.resources.apps.v1.Deployment.nginx-deployment;
in
{
imports = with kubenix.modules; [ test k8s ];
in {
imports = with kubenix.modules; [test k8s];
test = {
name = "k8s-imports";
description = "Simple k8s testing imports";
enable = builtins.compareVersions config.kubernetes.version "1.10" >= 0;
assertions = [{
message = "Pod should have name set";
assertion = pod.metadata.name == "test";
}
assertions = [
{
message = "Pod should have name set";
assertion = pod.metadata.name == "test";
}
{
message = "Deployment should have name set";
assertion = deployment.metadata.name == "nginx-deployment";
}];
}
];
};
kubernetes.imports = [

View file

@ -1,22 +1,28 @@
{ config, lib, kubenix, pkgs, ... }:
with lib;
let
cfg = config.kubernetes.api.resources.customResourceDefinitions.crontabs;
in
{
imports = with kubenix.modules; [ test k8s ];
config,
lib,
kubenix,
pkgs,
...
}:
with lib; let
cfg = config.kubernetes.api.resources.customResourceDefinitions.crontabs;
in {
imports = with kubenix.modules; [test k8s];
test = {
name = "k8s-order";
description = "test tesing k8s resource order";
assertions = [{
message = "should have correct order of resources";
assertion =
(elemAt config.kubernetes.objects 0).kind == "CustomResourceDefinition" &&
(elemAt config.kubernetes.objects 1).kind == "Namespace" &&
(elemAt config.kubernetes.objects 2).kind == "CronTab";
}];
assertions = [
{
message = "should have correct order of resources";
assertion =
(elemAt config.kubernetes.objects 0).kind
== "CustomResourceDefinition"
&& (elemAt config.kubernetes.objects 1).kind == "Namespace"
&& (elemAt config.kubernetes.objects 2).kind == "CronTab";
}
];
};
kubernetes.resources.customResourceDefinitions.crontabs = {
@ -24,38 +30,42 @@ in
metadata.name = "crontabs.stable.example.com";
spec = {
group = "stable.example.com";
versions = [{
name = "v1";
served = true;
schema = true;
}];
versions = [
{
name = "v1";
served = true;
schema = true;
}
];
scope = "Namespaced";
names = {
plural = "crontabs";
singular = "crontab";
kind = "CronTab";
shortNames = [ "ct" ];
shortNames = ["ct"];
};
};
};
kubernetes.customTypes = [{
name = "crontabs";
description = "CronTabs resources";
kubernetes.customTypes = [
{
name = "crontabs";
description = "CronTabs resources";
attrName = "cronTabs";
group = "stable.example.com";
version = "v1";
kind = "CronTab";
module = {
options.schedule = mkOption {
description = "Crontab schedule script";
type = types.str;
attrName = "cronTabs";
group = "stable.example.com";
version = "v1";
kind = "CronTab";
module = {
options.schedule = mkOption {
description = "Crontab schedule script";
type = types.str;
};
};
};
}];
}
];
kubernetes.resources.namespaces.test = { };
kubernetes.resources.namespaces.test = {};
kubernetes.resources."stable.example.com"."v1".CronTab.crontab.spec.schedule = "* * * * *";
}

View file

@ -1,22 +1,26 @@
{ config, kubenix, ... }:
let
cfg = config.kubernetes.api.resources.pods.nginx;
in
{
imports = [ kubenix.modules.test kubenix.modules.k8s ];
config,
kubenix,
...
}: let
cfg = config.kubernetes.api.resources.pods.nginx;
in {
imports = [kubenix.modules.test kubenix.modules.k8s];
test = {
name = "k8s-simple";
description = "Simple k8s testing wheter name, apiVersion and kind are preset";
assertions = [{
message = "should have apiVersion and kind set";
assertion = cfg.apiVersion == "v1" && cfg.kind == "Pod";
}
assertions = [
{
message = "should have apiVersion and kind set";
assertion = cfg.apiVersion == "v1" && cfg.kind == "Pod";
}
{
message = "should have name set";
assertion = cfg.metadata.name == "nginx";
}];
}
];
};
kubernetes.resources.pods.nginx = { };
kubernetes.resources.pods.nginx = {};
}

View file

@ -1,54 +1,68 @@
{ name, config, lib, kubenix, images, ... }:
with lib;
let
cfg = config.submodules.instances.passthru;
in
{
imports = with kubenix.modules; [ test submodules k8s docker ];
name,
config,
lib,
kubenix,
images,
...
}:
with lib; let
cfg = config.submodules.instances.passthru;
in {
imports = with kubenix.modules; [test submodules k8s docker];
test = {
name = "k8s-submodule";
description = "Simple k8s submodule test";
assertions = [{
message = "Submodule has correct name set";
assertion = (head config.kubernetes.objects).metadata.name == "passthru";
}
assertions = [
{
message = "Submodule has correct name set";
assertion = (head config.kubernetes.objects).metadata.name == "passthru";
}
{
message = "Should expose docker image";
assertion = (head config.docker.export).imageName == "xtruder/nginx";
}];
}
];
};
kubernetes.namespace = "test-namespace";
submodules.imports = [{
module = { name, config, ... }: {
imports = with kubenix.modules; [ submodule k8s docker ];
submodules.imports = [
{
module = {
name,
config,
...
}: {
imports = with kubenix.modules; [submodule k8s docker];
config = {
submodule = {
name = "test-submodule";
passthru = {
kubernetes.objects = config.kubernetes.objects;
docker.images = config.docker.images;
config = {
submodule = {
name = "test-submodule";
passthru = {
kubernetes.objects = config.kubernetes.objects;
docker.images = config.docker.images;
};
};
};
kubernetes.resources.pods.nginx = {
metadata.name = name;
spec.containers.nginx.image = config.docker.images.nginx.path;
};
kubernetes.resources.pods.nginx = {
metadata.name = name;
spec.containers.nginx.image = config.docker.images.nginx.path;
};
docker.images.nginx.image = images.nginx;
docker.images.nginx.image = images.nginx;
};
};
};
}];
}
];
kubernetes.api.defaults = [{
propagate = true;
default.metadata.labels.my-label = "my-value";
}];
kubernetes.api.defaults = [
{
propagate = true;
default.metadata.labels.my-label = "my-value";
}
];
submodules.instances.passthru = {
submodule = "test-submodule";

View file

@ -1,7 +1,11 @@
{ name, config, lib, kubenix, ... }:
with lib;
let
{
name,
config,
lib,
kubenix,
...
}:
with lib; let
instance1 = config.submodules.instances.instance1;
instance2 = config.submodules.instances.instance2;
instance3 = config.submodules.instances.instance3;
@ -9,8 +13,8 @@ let
instance5 = config.submodules.instances.instance5;
versioned-submodule = config.submodules.instances.versioned-submodule;
submodule = { name, ... }: {
imports = [ kubenix.modules.submodule ];
submodule = {name, ...}: {
imports = [kubenix.modules.submodule];
options.submodule.args = {
value = mkOption {
@ -24,17 +28,17 @@ let
};
};
};
in
{
imports = with kubenix.modules; [ test submodules ];
in {
imports = with kubenix.modules; [test submodules];
test = {
name = "submodules-defaults";
description = "Simple submodule test";
assertions = [{
message = "should apply defaults by tag1";
assertion = instance1.config.submodule.args.value == "value1";
}
assertions = [
{
message = "should apply defaults by tag1";
assertion = instance1.config.submodule.args.value == "value1";
}
{
message = "should apply defaults by tag2";
assertion = instance2.config.submodule.args.value == "value2";
@ -46,8 +50,9 @@ in
{
message = "should apply defaults to all";
assertion =
instance1.config.submodule.args.defaultValue == "value" &&
instance2.config.submodule.args.defaultValue == "value";
instance1.config.submodule.args.defaultValue
== "value"
&& instance2.config.submodule.args.defaultValue == "value";
}
{
message = "instance1 and instance3 should have value of default-value";
@ -64,27 +69,29 @@ in
{
message = "should apply defaults to versioned submodule";
assertion = versioned-submodule.config.submodule.args.defaultValue == "versioned-submodule";
}];
};
submodules.imports = [{
modules = [
submodule
{
submodule = {
name = "submodule1";
tags = [ "tag1" ];
};
}
];
}
};
submodules.imports = [
{
modules = [
submodule
{
submodule = {
name = "submodule1";
tags = ["tag1"];
};
}
];
}
{
modules = [
submodule
{
submodule = {
name = "submodule2";
tags = [ "tag2" ];
tags = ["tag2"];
};
}
];
@ -95,7 +102,7 @@ in
{
submodule = {
name = "submodule3";
tags = [ "tag2" ];
tags = ["tag2"];
};
}
];
@ -131,17 +138,19 @@ in
};
}
];
}];
}
];
submodules.defaults = [{
default.submodule.args.defaultValue = mkDefault "value";
}
submodules.defaults = [
{
tags = [ "tag1" ];
default.submodule.args.defaultValue = mkDefault "value";
}
{
tags = ["tag1"];
default.submodule.args.value = mkDefault "value1";
}
{
tags = [ "tag2" ];
tags = ["tag2"];
default.submodule.args.value = mkDefault "value2";
}
{
@ -149,7 +158,7 @@ in
default.submodule.args.value = mkDefault "value4";
}
{
default = { config, ... }: {
default = {config, ...}: {
submodule.args.defaultValue = mkIf (config.submodule.args.value == "custom-value") "my-custom-value";
};
}
@ -157,7 +166,8 @@ in
name = "versioned-submodule";
version = "2.0.0";
default.submodule.args.value = mkDefault "versioned";
}];
}
];
submodules.instances.instance1.submodule = "submodule1";
submodules.instances.instance2.submodule = "submodule2";

View file

@ -1,9 +1,14 @@
{ name, config, lib, kubenix, subm-lib, ... }:
with lib;
let
{
name,
config,
lib,
kubenix,
subm-lib,
...
}:
with lib; let
submodule = {
imports = [ kubenix.modules.submodule ];
imports = [kubenix.modules.submodule];
config.submodule = {
name = "subm";
@ -12,21 +17,24 @@ let
};
};
};
in
{
imports = with kubenix.modules; [ test submodules ];
in {
imports = with kubenix.modules; [test submodules];
test = {
name = "submodules-exports";
description = "Submodules exports test";
assertions = [{
message = "should have library exported";
assertion = subm-lib.id 1 == 1;
}];
assertions = [
{
message = "should have library exported";
assertion = subm-lib.id 1 == 1;
}
];
};
submodules.imports = [{
modules = [ submodule ];
exportAs = "subm-lib";
}];
submodules.imports = [
{
modules = [submodule];
exportAs = "subm-lib";
}
];
}

View file

@ -1,24 +1,27 @@
{ name, config, lib, kubenix, ... }:
with lib;
let
submodule = { name, ... }: {
imports = [ kubenix.modules.submodule ];
{
name,
config,
lib,
kubenix,
...
}:
with lib; let
submodule = {name, ...}: {
imports = [kubenix.modules.submodule];
config.submodule = {
name = "subm";
passthru.global.${name} = "true";
};
};
in
{
imports = with kubenix.modules; [ test submodules ];
in {
imports = with kubenix.modules; [test submodules];
options = {
global = mkOption {
description = "Global value";
type = types.attrs;
default = { };
default = {};
};
};
@ -26,10 +29,11 @@ in
test = {
name = "submodules-passthru";
description = "Submodules passthru test";
assertions = [{
message = "should passthru values if passthru enabled";
assertion = hasAttr "inst1" config.global && config.global.inst1 == "true";
}
assertions = [
{
message = "should passthru values if passthru enabled";
assertion = hasAttr "inst1" config.global && config.global.inst1 == "true";
}
{
message = "should not passthru values if passthru not enabled";
assertion = !(hasAttr "inst2" config.global);
@ -37,12 +41,15 @@ in
{
message = "should passthru by default";
assertion = hasAttr "inst3" config.global && config.global.inst3 == "true";
}];
}
];
};
submodules.imports = [{
modules = [ submodule ];
}];
submodules.imports = [
{
modules = [submodule];
}
];
submodules.instances.inst1 = {
submodule = "subm";

View file

@ -1,20 +1,24 @@
{ name, config, lib, kubenix, ... }:
with lib;
let
{
name,
config,
lib,
kubenix,
...
}:
with lib; let
cfg = config.submodules.instances.instance;
args = cfg.config.submodule.args;
in
{
imports = with kubenix.modules; [ test submodules ];
in {
imports = with kubenix.modules; [test submodules];
test = {
name = "submodules-simple";
description = "Simple k8s submodule test";
assertions = [{
message = "Submodule name is set";
assertion = cfg.name == "instance";
}
assertions = [
{
message = "Submodule name is set";
assertion = cfg.name == "instance";
}
{
message = "Submodule version is set";
assertion = cfg.version == null;
@ -34,32 +38,35 @@ in
{
message = "should have tag set";
assertion = elem "tag" (cfg.config.submodule.tags);
}];
}
];
};
submodules.propagate.enable = true;
submodules.imports = [{
module = { submodule, ... }: {
imports = [ kubenix.modules.submodule ];
submodules.imports = [
{
module = {submodule, ...}: {
imports = [kubenix.modules.submodule];
options.submodule.args = {
name = mkOption {
description = "Submodule name";
type = types.str;
default = submodule.name;
options.submodule.args = {
name = mkOption {
description = "Submodule name";
type = types.str;
default = submodule.name;
};
value = mkOption {
description = "Submodule argument";
type = types.str;
};
};
value = mkOption {
description = "Submodule argument";
type = types.str;
config = {
submodule.name = "submodule";
submodule.tags = ["tag"];
};
};
config = {
submodule.name = "submodule";
submodule.tags = [ "tag" ];
};
};
}];
}
];
submodules.instances.instance = {
submodule = "submodule";

View file

@ -1,13 +1,17 @@
{ name, config, lib, kubenix, ... }:
with lib;
let
{
name,
config,
lib,
kubenix,
...
}:
with lib; let
inst-exact = config.submodules.instances.inst-exact.config;
inst-regex = config.submodules.instances.inst-regex.config;
inst-latest = config.submodules.instances.inst-latest.config;
submodule = {
imports = [ kubenix.modules.submodule ];
imports = [kubenix.modules.submodule];
options.version = mkOption {
type = types.str;
@ -16,17 +20,17 @@ let
config.submodule.name = "subm";
};
in
{
imports = with kubenix.modules; [ test submodules ];
in {
imports = with kubenix.modules; [test submodules];
test = {
name = "submodules-versioning";
description = "Submodules versioning test";
assertions = [{
message = "should select exact version";
assertion = inst-exact.version == "1.1.0";
}
assertions = [
{
message = "should select exact version";
assertion = inst-exact.version == "1.1.0";
}
{
message = "should select regex version";
assertion = inst-regex.version == "1.2.1";
@ -34,37 +38,48 @@ in
{
message = "should select latest version";
assertion = inst-latest.version == "1.2.1";
}];
}
];
};
submodules.imports = [{
modules = [{
config.submodule.version = "1.0.0";
config.version = "1.0.0";
}
submodule];
}
submodules.imports = [
{
modules = [{
config.submodule.version = "1.1.0";
config.version = "1.1.0";
}
submodule];
modules = [
{
config.submodule.version = "1.0.0";
config.version = "1.0.0";
}
submodule
];
}
{
modules = [{
config.submodule.version = "1.2.0";
config.version = "1.2.0";
}
submodule];
modules = [
{
config.submodule.version = "1.1.0";
config.version = "1.1.0";
}
submodule
];
}
{
modules = [{
config.submodule.version = "1.2.1";
config.version = "1.2.1";
}
submodule];
}];
modules = [
{
config.submodule.version = "1.2.0";
config.version = "1.2.0";
}
submodule
];
}
{
modules = [
{
config.submodule.version = "1.2.1";
config.version = "1.2.1";
}
submodule
];
}
];
submodules.instances.inst-exact = {
submodule = "subm";