This commit is contained in:
David Arnold 2021-05-13 17:27:08 -04:00
parent c3fa598922
commit db6d83c61e
No known key found for this signature in database
GPG key ID: 6D6A936E69C59D08
53 changed files with 1916 additions and 1599 deletions

View file

@ -1,4 +1,4 @@
{ pkgs ? import <nixpkgs> {}
{ pkgs ? import <nixpkgs> { }
, lib ? pkgs.lib
, kubenix ? import ../. { inherit pkgs lib; }
@ -7,12 +7,12 @@
, k8sVersion ? "1.21"
, registryUrl ? throw "Registry url not defined"
, throwError ? true # whether any testing error should throw an error
, enabledTests ? null }:
, enabledTests ? null
}:
with lib;
let
images = pkgs.callPackage ./images.nix {};
images = pkgs.callPackage ./images.nix { };
config = (kubenix.evalModules {
modules = [
@ -34,7 +34,7 @@ let
#./legacy/k8s.nix
#./legacy/crd.nix
#./legacy/modules.nix
./helm/simple.nix
# ./helm/simple.nix
# ./istio/bookinfo.nix # infinite recursion
./submodules/simple.nix
./submodules/defaults.nix
@ -48,7 +48,7 @@ let
docker.registryUrl = registryUrl;
defaults = [
{
features = ["k8s"];
features = [ "k8s" ];
default = {
kubernetes.version = k8sVersion;
};
@ -64,4 +64,5 @@ let
inherit kubenix nixosPath;
};
}).config;
in pkgs.recurseIntoAttrs config.testing
in
pkgs.recurseIntoAttrs config.testing

View file

@ -3,7 +3,6 @@
with lib;
with kubenix.lib;
with pkgs.dockerTools;
let
corev1 = config.kubernetes.api.resources.core.v1;
appsv1 = config.kubernetes.api.resources.apps.v1;
@ -31,7 +30,8 @@ let
finalImageName = "docker.io/bitnami/bitnami-shell";
finalImageTag = "10";
};
in {
in
{
imports = [ kubenix.modules.test kubenix.modules.helm kubenix.modules.k8s ];
test = {
@ -43,15 +43,17 @@ in {
appsv1.StatefulSet ? "app-psql-postgresql-primary" &&
appsv1.StatefulSet ? "app-psql-postgresql-read" &&
corev1.Secret ? "app-psql-postgresql" &&
corev1.Service ? "app-psql-postgresql-headless" ;
} {
message = "should have values passed";
assertion = appsv1.StatefulSet.app-psql-postgresql-read.spec.replicas == 2;
} {
message = "should have namespace defined";
assertion =
appsv1.StatefulSet.app-psql-postgresql-primary.metadata.namespace == "test";
}];
corev1.Service ? "app-psql-postgresql-headless";
}
{
message = "should have values passed";
assertion = appsv1.StatefulSet.app-psql-postgresql-read.spec.replicas == 2;
}
{
message = "should have namespace defined";
assertion =
appsv1.StatefulSet.app-psql-postgresql-primary.metadata.namespace == "test";
}];
testScript = ''
kube.wait_until_succeeds("docker load < ${postgresql}")
kube.wait_until_succeeds("docker load < ${postgresqlExporter}")
@ -61,7 +63,7 @@ in {
'';
};
kubernetes.resources.namespaces.test = {};
kubernetes.resources.namespaces.test = { };
kubernetes.helm.instances.app-psql = {
namespace = "test";

View file

@ -10,47 +10,49 @@ with lib;
contents = [ pkgs.bash pkgs.curl pkgs.cacert ];
};
nginx = let
nginxPort = "80";
nginxConf = pkgs.writeText "nginx.conf" ''
user nginx nginx;
daemon off;
error_log /dev/stdout info;
pid /dev/null;
events {}
http {
access_log /dev/stdout;
server {
listen ${nginxPort};
index index.html;
location / {
root ${nginxWebRoot};
nginx =
let
nginxPort = "80";
nginxConf = pkgs.writeText "nginx.conf" ''
user nginx nginx;
daemon off;
error_log /dev/stdout info;
pid /dev/null;
events {}
http {
access_log /dev/stdout;
server {
listen ${nginxPort};
index index.html;
location / {
root ${nginxWebRoot};
}
}
}
}
'';
nginxWebRoot = pkgs.writeTextDir "index.html" ''
<html><body><h1>Hello from NGINX</h1></body></html>
'';
in dockerTools.buildLayeredImage {
name = "xtruder/nginx";
tag = "latest";
contents = [pkgs.nginx];
extraCommands = ''
mkdir -p etc
chmod u+w etc
mkdir -p var/cache/nginx
chmod u+w var/cache/nginx
mkdir -p var/log/nginx
chmod u+w var/log/nginx
echo "nginx:x:1000:1000::/:" > etc/passwd
echo "nginx:x:1000:nginx" > etc/group
'';
config = {
Cmd = ["nginx" "-c" nginxConf];
ExposedPorts = {
"${nginxPort}/tcp" = {};
'';
nginxWebRoot = pkgs.writeTextDir "index.html" ''
<html><body><h1>Hello from NGINX</h1></body></html>
'';
in
dockerTools.buildLayeredImage {
name = "xtruder/nginx";
tag = "latest";
contents = [ pkgs.nginx ];
extraCommands = ''
mkdir -p etc
chmod u+w etc
mkdir -p var/cache/nginx
chmod u+w var/cache/nginx
mkdir -p var/log/nginx
chmod u+w var/log/nginx
echo "nginx:x:1000:1000::/:" > etc/passwd
echo "nginx:x:1000:nginx" > etc/group
'';
config = {
Cmd = [ "nginx" "-c" nginxConf ];
ExposedPorts = {
"${nginxPort}/tcp" = { };
};
};
};
};
}

View file

@ -18,25 +18,28 @@
name = "http";
protocol = "HTTP";
};
hosts = ["*"];
hosts = [ "*" ];
}];
};
};
VirtualService.bookinfo = {
spec = {
hosts = ["*"];
gateways = ["bookinfo-gateway"];
hosts = [ "*" ];
gateways = [ "bookinfo-gateway" ];
http = [{
match = [{
uri.exact = "/productpage";
} {
uri.exact = "/login";
} {
uri.exact = "/logout";
} {
uri.prefix = "/api/v1/products";
}];
}
{
uri.exact = "/login";
}
{
uri.exact = "/logout";
}
{
uri.prefix = "/api/v1/products";
}];
route = [{
destination = {
host = "productpage";
@ -63,13 +66,15 @@
subsets = [{
name = "v1";
labels.version = "v1";
} {
name = "v2";
labels.version = "v2";
} {
name = "v3";
labels.version = "v3";
}];
}
{
name = "v2";
labels.version = "v2";
}
{
name = "v3";
labels.version = "v3";
}];
};
};
@ -79,16 +84,19 @@
subsets = [{
name = "v1";
labels.version = "v1";
} {
name = "v2";
labels.version = "v2";
} {
name = "v2-mysql";
labels.version = "v2-mysql";
} {
name = "v2-mysql-vm";
labels.version = "v2-mysql-vm";
}];
}
{
name = "v2";
labels.version = "v2";
}
{
name = "v2-mysql";
labels.version = "v2-mysql";
}
{
name = "v2-mysql-vm";
labels.version = "v2-mysql-vm";
}];
};
};
@ -98,10 +106,11 @@
subsets = [{
name = "v1";
labels.version = "v1";
} {
name = "v2";
labels.version = "v2";
}];
}
{
name = "v2";
labels.version = "v2";
}];
};
};
};

View file

@ -1,10 +1,10 @@
{ config, lib, kubenix, pkgs, ... }:
with lib;
let
latestCrontab = config.kubernetes.api.resources.cronTabs.latest;
in {
in
{
imports = with kubenix.modules; [ test k8s ];
test = {
@ -37,7 +37,8 @@ in {
};
};
} {
}
{
group = "stable.example.com";
version = "v2";
kind = "CronTab";
@ -56,7 +57,8 @@ in {
};
};
};
} {
}
{
group = "stable.example.com";
version = "v3";
kind = "CronTab";

View file

@ -1,11 +1,11 @@
{ config, lib, kubenix, ... }:
with lib;
let
pod1 = config.kubernetes.api.resources.pods.pod1;
pod2 = config.kubernetes.api.resources.pods.pod2;
in {
in
{
imports = with kubenix.modules; [ test k8s ];
test = {
@ -14,16 +14,18 @@ in {
assertions = [{
message = "Should have label set with resource";
assertion = pod1.metadata.labels.resource-label == "value";
} {
message = "Should have default label set with group, version, kind";
assertion = pod1.metadata.labels.gvk-label == "value";
} {
message = "Should have conditional annotation set";
assertion = pod2.metadata.annotations.conditional-annotation == "value";
}];
}
{
message = "Should have default label set with group, version, kind";
assertion = pod1.metadata.labels.gvk-label == "value";
}
{
message = "Should have conditional annotation set";
assertion = pod2.metadata.annotations.conditional-annotation == "value";
}];
};
kubernetes.resources.pods.pod1 = {};
kubernetes.resources.pods.pod1 = { };
kubernetes.resources.pods.pod2 = {
metadata.labels.custom-label = "value";
@ -32,17 +34,19 @@ in {
kubernetes.api.defaults = [{
resource = "pods";
default.metadata.labels.resource-label = "value";
} {
group = "core";
kind = "Pod";
version = "v1";
default.metadata.labels.gvk-label = "value";
} {
resource = "pods";
default = { config, ... }: {
config.metadata.annotations = mkIf (config.metadata.labels ? "custom-label") {
conditional-annotation = "value";
}
{
group = "core";
kind = "Pod";
version = "v1";
default.metadata.labels.gvk-label = "value";
}
{
resource = "pods";
default = { config, ... }: {
config.metadata.annotations = mkIf (config.metadata.labels ? "custom-label") {
conditional-annotation = "value";
};
};
};
}];
}];
}

View file

@ -1,7 +1,6 @@
{ config, lib, pkgs, kubenix, images, ... }:
with lib;
let
cfg = config.kubernetes.api.resources.deployments.nginx;
image = images.nginx;
@ -16,12 +15,13 @@ let
spec.containers = [{
name = "curl";
image = config.docker.images.curl.path;
args = ["curl" "--retry" "20" "--retry-connrefused" "http://nginx"];
args = [ "curl" "--retry" "20" "--retry-connrefused" "http://nginx" ];
}];
spec.restartPolicy = "Never";
});
in {
in
{
imports = [ kubenix.modules.test kubenix.modules.k8s kubenix.modules.docker ];
test = {
@ -35,13 +35,15 @@ in {
else if ((builtins.compareVersions config.kubernetes.version "1.8") <= 0)
then cfg.apiVersion == "apps/v1beta2"
else cfg.apiVersion == "apps/v1";
} {
message = "should have corrent kind set";
assertion = cfg.kind == "Deployment";
} {
message = "should have replicas set";
assertion = cfg.spec.replicas == 3;
}];
}
{
message = "should have corrent kind set";
assertion = cfg.kind == "Deployment";
}
{
message = "should have replicas set";
assertion = cfg.spec.replicas == 3;
}];
script = ''
import time

View file

@ -1,11 +1,11 @@
{ config, lib, kubenix, ... }:
with lib;
let
pod = config.kubernetes.api.resources.core.v1.Pod.test;
deployment = config.kubernetes.api.resources.apps.v1.Deployment.nginx-deployment;
in {
in
{
imports = with kubenix.modules; [ test k8s ];
test = {
@ -15,10 +15,11 @@ in {
assertions = [{
message = "Pod should have name set";
assertion = pod.metadata.name == "test";
} {
message = "Deployment should have name set";
assertion = deployment.metadata.name == "nginx-deployment";
}];
}
{
message = "Deployment should have name set";
assertion = deployment.metadata.name == "nginx-deployment";
}];
};
kubernetes.imports = [

View file

@ -1,10 +1,10 @@
{ config, lib, kubenix, pkgs, ... }:
with lib;
let
cfg = config.kubernetes.api.resources.customResourceDefinitions.crontabs;
in {
in
{
imports = with kubenix.modules; [ test k8s ];
test = {
@ -34,7 +34,7 @@ in {
plural = "crontabs";
singular = "crontab";
kind = "CronTab";
shortNames = ["ct"];
shortNames = [ "ct" ];
};
};
};
@ -55,7 +55,7 @@ in {
};
}];
kubernetes.resources.namespaces.test = {};
kubernetes.resources.namespaces.test = { };
kubernetes.resources."stable.example.com"."v1".CronTab.crontab.spec.schedule = "* * * * *";
}

View file

@ -1,8 +1,8 @@
{ config, kubenix, ... }:
let
cfg = config.kubernetes.api.resources.pods.nginx;
in {
in
{
imports = [ kubenix.modules.test kubenix.modules.k8s ];
test = {
@ -11,11 +11,12 @@ in {
assertions = [{
message = "should have apiVersion and kind set";
assertion = cfg.apiVersion == "v1" && cfg.kind == "Pod";
} {
message = "should have name set";
assertion = cfg.metadata.name == "nginx";
}];
}
{
message = "should have name set";
assertion = cfg.metadata.name == "nginx";
}];
};
kubernetes.resources.pods.nginx = {};
kubernetes.resources.pods.nginx = { };
}

View file

@ -1,10 +1,10 @@
{ name, config, lib, kubenix, images, ... }:
with lib;
let
cfg = config.submodules.instances.passthru;
in {
in
{
imports = with kubenix.modules; [ test submodules k8s docker ];
test = {
@ -13,16 +13,17 @@ in {
assertions = [{
message = "Submodule has correct name set";
assertion = (head config.kubernetes.objects).metadata.name == "passthru";
} {
message = "Should expose docker image";
assertion = (head config.docker.export).imageName == "xtruder/nginx";
}];
}
{
message = "Should expose docker image";
assertion = (head config.docker.export).imageName == "xtruder/nginx";
}];
};
kubernetes.namespace = "test-namespace";
submodules.imports = [{
module = {name, config, ...}: {
module = { name, config, ... }: {
imports = with kubenix.modules; [ submodule k8s docker ];
config = {

View file

@ -1,16 +1,18 @@
{ options, config, lib, kubenix, pkgs, ... }:
with lib;
let
findObject = { kind, name }: filter (object:
object.kind == kind && object.metadata.name == name
) config.kubernetes.objects;
findObject = { kind, name }: filter
(object:
object.kind == kind && object.metadata.name == name
)
config.kubernetes.objects;
getObject = filter: head (findObject filter);
hasObject = { kind, name }: length (findObject { inherit kind name; }) == 1;
in {
in
{
imports = with kubenix.modules; [ test k8s legacy ];
test = {
@ -20,12 +22,13 @@ in {
assertions = [{
message = "should define crd in module";
assertion =
hasObject {kind = "SecretClaim"; name = "module-claim";};
} {
message = "should define crd in root";
assertion =
hasObject {kind = "SecretClaim"; name = "root-claim";};
}];
hasObject { kind = "SecretClaim"; name = "module-claim"; };
}
{
message = "should define crd in root";
assertion =
hasObject { kind = "SecretClaim"; name = "root-claim"; };
}];
};
kubernetes.namespace = "test";
@ -40,7 +43,7 @@ in {
type = mkOption {
description = "Type of the secret";
type = types.enum ["Opaque" "kubernetes.io/tls"];
type = types.enum [ "Opaque" "kubernetes.io/tls" ];
default = "Opaque";
};
@ -62,7 +65,7 @@ in {
};
};
config = {
config = {
kubernetes.resources.customResourceDefinitions.secret-claims = {
kind = "CustomResourceDefinition";
apiVersion = "apiextensions.k8s.io/v1beta1";
@ -74,7 +77,7 @@ in {
names = {
plural = "secretclaims";
kind = "SecretClaim";
shortNames = ["scl"];
shortNames = [ "scl" ];
};
};
};

View file

@ -1,10 +1,10 @@
{ config, lib, kubenix, pkgs, ... }:
with lib;
let
cfg = config.kubernetes.api.resources.deployments.app;
in {
in
{
imports = with kubenix.modules; [ test k8s legacy ];
test = {
@ -15,13 +15,14 @@ in {
assertion =
cfg.kind == "Deployment" &&
cfg.metadata.name == "app";
} {
message = "should have correct defaults set";
assertion =
cfg.metadata.namespace == "test" &&
cfg.metadata.labels.label1 == "value1" &&
cfg.metadata.labels.label2 == "value2";
}];
}
{
message = "should have correct defaults set";
assertion =
cfg.metadata.namespace == "test" &&
cfg.metadata.labels.label1 == "value1" &&
cfg.metadata.labels.label2 == "value2";
}];
};
kubernetes.resources.deployments.app = {
@ -39,7 +40,7 @@ in {
};
kubernetes.resources.configMaps.app = {
data."my-conf.json" = builtins.toJSON {};
data."my-conf.json" = builtins.toJSON { };
};
kubernetes.defaults = {

View file

@ -1,16 +1,18 @@
{ options, config, lib, kubenix, pkgs, ... }:
with lib;
let
findObject = { kind, name }: filter (object:
object.kind == kind && object.metadata.name == name
) config.kubernetes.objects;
findObject = { kind, name }: filter
(object:
object.kind == kind && object.metadata.name == name
)
config.kubernetes.objects;
getObject = filter: head (findObject filter);
hasObject = { kind, name }: length (findObject { inherit kind name; }) == 1;
in {
in
{
imports = with kubenix.modules; [ test k8s legacy ];
test = {
@ -19,21 +21,21 @@ in {
assertions = [{
message = "should have all objects";
assertion =
hasObject {kind = "Deployment"; name = "myapp";} &&
hasObject {kind = "Deployment"; name = "myapp2";} &&
hasObject {kind = "Deployment"; name = "myapp2-app2";};
} {
message = "should have default labels set";
assertion =
(getObject {kind = "Deployment"; name = "myapp2-app2";})
.metadata.labels.module-label or false == "value" &&
(getObject {kind = "Deployment"; name = "myapp2";})
.metadata.labels.module-label or false == "value";
} {
message = "should passthru resources to root module";
assertion =
config.kubernetes.resources.deployments.myapp2-app2-app.metadata.labels.module-label or false == "value";
}];
hasObject { kind = "Deployment"; name = "myapp"; } &&
hasObject { kind = "Deployment"; name = "myapp2"; } &&
hasObject { kind = "Deployment"; name = "myapp2-app2"; };
}
{
message = "should have default labels set";
assertion =
(getObject { kind = "Deployment"; name = "myapp2-app2"; }).metadata.labels.module-label or false == "value" &&
(getObject { kind = "Deployment"; name = "myapp2"; }).metadata.labels.module-label or false == "value";
}
{
message = "should passthru resources to root module";
assertion =
config.kubernetes.resources.deployments.myapp2-app2-app.metadata.labels.module-label or false == "value";
}];
};
kubernetes.defaults.all.metadata.labels.module-label = "value";

View file

@ -1,11 +1,11 @@
{ name, config, lib, kubenix, images, ... }:
with lib;
let
cfg = config.submodules.instances.test.config;
deployment = cfg.kubernetes.api.deployments.nginx;
in {
in
{
imports = [ kubenix.modules.test kubenix.module ];
test = {
@ -14,13 +14,15 @@ in {
assertions = [{
message = "Namespace not propagated";
assertion = deployment.metadata.namespace == "test";
} {
message = "Version not propagated";
assertion = cfg.kubernetes.version == config.kubernetes.version;
} {
message = "docker image should be added to exported images";
assertion = (head config.docker.export) == images.nginx;
}];
}
{
message = "Version not propagated";
assertion = cfg.kubernetes.version == config.kubernetes.version;
}
{
message = "docker image should be added to exported images";
assertion = (head config.docker.export) == images.nginx;
}];
testScript = ''
kube.wait_until_succeeds("docker load < ${images.nginx}")
kube.wait_until_succeeds("kubectl apply -f ${config.kubernetes.result}")
@ -31,7 +33,7 @@ in {
};
submodules.imports = [{
module = {name, config, ...}: {
module = { name, config, ... }: {
submodule.name = "nginx";
kubernetes.api.deployments.nginx = {
metadata = {
@ -55,7 +57,7 @@ in {
};
}];
kubernetes.api.namespaces.test = {};
kubernetes.api.namespaces.test = { };
submodules.instances.test = {
submodule = "nginx";

View file

@ -1,7 +1,6 @@
{ name, config, lib, kubenix, ... }:
with lib;
let
instance1 = config.submodules.instances.instance1;
instance2 = config.submodules.instances.instance2;
@ -10,7 +9,7 @@ let
instance5 = config.submodules.instances.instance5;
versioned-submodule = config.submodules.instances.versioned-submodule;
submodule = {name, ...}: {
submodule = { name, ... }: {
imports = [ kubenix.modules.submodule ];
options.submodule.args = {
@ -25,7 +24,8 @@ let
};
};
};
in {
in
{
imports = with kubenix.modules; [ test submodules ];
test = {
@ -34,95 +34,130 @@ in {
assertions = [{
message = "should apply defaults by tag1";
assertion = instance1.config.submodule.args.value == "value1";
} {
message = "should apply defaults by tag2";
assertion = instance2.config.submodule.args.value == "value2";
} {
message = "should apply defaults by tag2";
assertion = instance3.config.submodule.args.value == "value2";
} {
message = "should apply defaults to all";
assertion =
instance1.config.submodule.args.defaultValue == "value" &&
instance2.config.submodule.args.defaultValue == "value";
} {
message = "instance1 and instance3 should have value of default-value";
assertion = instance3.config.submodule.args.defaultValue == "default-value";
} {
message = "should apply defaults by submodule name";
assertion = instance4.config.submodule.args.value == "value4";
} {
message = "should apply defaults by custom condition";
assertion = instance5.config.submodule.args.defaultValue == "my-custom-value";
} {
message = "should apply defaults to versioned submodule";
assertion = versioned-submodule.config.submodule.args.defaultValue == "versioned-submodule";
}];
}
{
message = "should apply defaults by tag2";
assertion = instance2.config.submodule.args.value == "value2";
}
{
message = "should apply defaults by tag2";
assertion = instance3.config.submodule.args.value == "value2";
}
{
message = "should apply defaults to all";
assertion =
instance1.config.submodule.args.defaultValue == "value" &&
instance2.config.submodule.args.defaultValue == "value";
}
{
message = "instance1 and instance3 should have value of default-value";
assertion = instance3.config.submodule.args.defaultValue == "default-value";
}
{
message = "should apply defaults by submodule name";
assertion = instance4.config.submodule.args.value == "value4";
}
{
message = "should apply defaults by custom condition";
assertion = instance5.config.submodule.args.defaultValue == "my-custom-value";
}
{
message = "should apply defaults to versioned submodule";
assertion = versioned-submodule.config.submodule.args.defaultValue == "versioned-submodule";
}];
};
submodules.imports = [{
modules = [submodule {
submodule = {
name = "submodule1";
tags = ["tag1"];
};
modules = [
submodule
{
submodule = {
name = "submodule1";
tags = [ "tag1" ];
};
}
];
}
{
modules = [
submodule
{
submodule = {
name = "submodule2";
tags = [ "tag2" ];
};
}
];
}
{
modules = [
submodule
{
submodule = {
name = "submodule3";
tags = [ "tag2" ];
};
}
];
}
{
modules = [
submodule
{
submodule = {
name = "submodule4";
};
}
];
}
{
modules = [
submodule
{
submodule = {
name = "submodule5";
};
submodule.args.value = "custom-value";
}
];
}
{
modules = [
submodule
{
submodule = {
name = "versioned-submodule";
version = "2.0.0";
};
}
];
}];
} {
modules = [submodule {
submodule = {
name = "submodule2";
tags = ["tag2"];
};
}];
} {
modules = [submodule {
submodule = {
name = "submodule3";
tags = ["tag2"];
};
}];
} {
modules = [submodule {
submodule = {
name = "submodule4";
};
}];
} {
modules = [submodule {
submodule = {
name = "submodule5";
};
submodule.args.value = "custom-value";
}];
} {
modules = [submodule {
submodule = {
name = "versioned-submodule";
version = "2.0.0";
};
}];
}];
submodules.defaults = [{
default.submodule.args.defaultValue = mkDefault "value";
} {
tags = ["tag1"];
default.submodule.args.value = mkDefault "value1";
} {
tags = ["tag2"];
default.submodule.args.value = mkDefault "value2";
} {
name = "submodule4";
default.submodule.args.value = mkDefault "value4";
} {
default = {config, ...}: {
submodule.args.defaultValue = mkIf (config.submodule.args.value == "custom-value") "my-custom-value";
};
} {
name = "versioned-submodule";
version = "2.0.0";
default.submodule.args.value = mkDefault "versioned";
}];
}
{
tags = [ "tag1" ];
default.submodule.args.value = mkDefault "value1";
}
{
tags = [ "tag2" ];
default.submodule.args.value = mkDefault "value2";
}
{
name = "submodule4";
default.submodule.args.value = mkDefault "value4";
}
{
default = { config, ... }: {
submodule.args.defaultValue = mkIf (config.submodule.args.value == "custom-value") "my-custom-value";
};
}
{
name = "versioned-submodule";
version = "2.0.0";
default.submodule.args.value = mkDefault "versioned";
}];
submodules.instances.instance1.submodule = "submodule1";
submodules.instances.instance2.submodule = "submodule2";

View file

@ -1,7 +1,6 @@
{ name, config, lib, kubenix, subm-lib, ... }:
with lib;
let
submodule = {
imports = [ kubenix.modules.submodule ];
@ -13,7 +12,8 @@ let
};
};
};
in {
in
{
imports = with kubenix.modules; [ test submodules ];
test = {
@ -26,7 +26,7 @@ in {
};
submodules.imports = [{
modules = [submodule];
modules = [ submodule ];
exportAs = "subm-lib";
}];
}

View file

@ -1,7 +1,6 @@
{ name, config, lib, kubenix, ... }:
with lib;
let
submodule = { name, ... }: {
imports = [ kubenix.modules.submodule ];
@ -11,14 +10,15 @@ let
passthru.global.${name} = "true";
};
};
in {
in
{
imports = with kubenix.modules; [ test submodules ];
options = {
global = mkOption {
description = "Global value";
type = types.attrs;
default = {};
default = { };
};
};
@ -29,17 +29,19 @@ in {
assertions = [{
message = "should passthru values if passthru enabled";
assertion = hasAttr "inst1" config.global && config.global.inst1 == "true";
} {
message = "should not passthru values if passthru not enabled";
assertion = !(hasAttr "inst2" config.global);
} {
message = "should passthru by default";
assertion = hasAttr "inst3" config.global && config.global.inst3 == "true";
}];
}
{
message = "should not passthru values if passthru not enabled";
assertion = !(hasAttr "inst2" config.global);
}
{
message = "should passthru by default";
assertion = hasAttr "inst3" config.global && config.global.inst3 == "true";
}];
};
submodules.imports = [{
modules = [submodule];
modules = [ submodule ];
}];
submodules.instances.inst1 = {

View file

@ -1,11 +1,11 @@
{ name, config, lib, kubenix, ... }:
with lib;
let
cfg = config.submodules.instances.instance;
args = cfg.config.submodule.args;
in {
in
{
imports = with kubenix.modules; [ test submodules ];
test = {
@ -14,22 +14,27 @@ in {
assertions = [{
message = "Submodule name is set";
assertion = cfg.name == "instance";
} {
message = "Submodule version is set";
assertion = cfg.version == null;
} {
message = "Submodule config has submodule definition";
assertion = cfg.config.submodule.name == "submodule";
} {
message = "Should have argument set";
assertion = args.value == "test";
} {
message = "Should have submodule name set";
assertion = args.name == "instance";
} {
message = "should have tag set";
assertion = elem "tag" (cfg.config.submodule.tags);
}];
}
{
message = "Submodule version is set";
assertion = cfg.version == null;
}
{
message = "Submodule config has submodule definition";
assertion = cfg.config.submodule.name == "submodule";
}
{
message = "Should have argument set";
assertion = args.value == "test";
}
{
message = "Should have submodule name set";
assertion = args.name == "instance";
}
{
message = "should have tag set";
assertion = elem "tag" (cfg.config.submodule.tags);
}];
};
submodules.propagate.enable = true;
@ -51,7 +56,7 @@ in {
config = {
submodule.name = "submodule";
submodule.tags = ["tag"];
submodule.tags = [ "tag" ];
};
};
}];

View file

@ -1,7 +1,6 @@
{ name, config, lib, kubenix, ... }:
with lib;
let
inst-exact = config.submodules.instances.inst-exact.config;
inst-regex = config.submodules.instances.inst-regex.config;
@ -17,7 +16,8 @@ let
config.submodule.name = "subm";
};
in {
in
{
imports = with kubenix.modules; [ test submodules ];
test = {
@ -26,36 +26,45 @@ in {
assertions = [{
message = "should select exact version";
assertion = inst-exact.version == "1.1.0";
} {
message = "should select regex version";
assertion = inst-regex.version == "1.2.1";
} {
message = "should select latest version";
assertion = inst-latest.version == "1.2.1";
}];
}
{
message = "should select regex version";
assertion = inst-regex.version == "1.2.1";
}
{
message = "should select latest version";
assertion = inst-latest.version == "1.2.1";
}];
};
submodules.imports = [{
modules = [{
config.submodule.version = "1.0.0";
config.version = "1.0.0";
} submodule];
} {
modules = [{
config.submodule.version = "1.1.0";
config.version = "1.1.0";
} submodule];
} {
modules = [{
config.submodule.version = "1.2.0";
config.version = "1.2.0";
} submodule];
} {
modules = [{
config.submodule.version = "1.2.1";
config.version = "1.2.1";
} submodule];
}];
}
submodule];
}
{
modules = [{
config.submodule.version = "1.1.0";
config.version = "1.1.0";
}
submodule];
}
{
modules = [{
config.submodule.version = "1.2.0";
config.version = "1.2.0";
}
submodule];
}
{
modules = [{
config.submodule.version = "1.2.1";
config.version = "1.2.1";
}
submodule];
}];
submodules.instances.inst-exact = {
submodule = "subm";