This commit is contained in:
David Arnold 2021-05-13 17:27:08 -04:00
parent c3fa598922
commit db6d83c61e
No known key found for this signature in database
GPG key ID: 6D6A936E69C59D08
53 changed files with 1916 additions and 1599 deletions

3
ci.nix
View file

@ -8,4 +8,5 @@ let
inherit pkgs lib;
nixosPath = "${nixpkgsSrc}/nixos";
};
in pkgs.recurseIntoAttrs release
in
pkgs.recurseIntoAttrs release

View file

@ -7,7 +7,6 @@ in
}:
with lib;
let
kubenixLib = import ./lib { inherit lib pkgs; };
lib' = lib.extend (lib: self: import ./lib/extra.nix { inherit lib pkgs; });
@ -18,28 +17,34 @@ let
# evalModules with same interface as lib.evalModules and kubenix as
# special argument
evalModules = {
module ? null,
modules ? [module],
specialArgs ? defaultSpecialArgs, ...
}@attrs: let
evalModules =
{ module ? null
, modules ? [ module ]
, specialArgs ? defaultSpecialArgs
, ...
}@attrs:
let
attrs' = filterAttrs (n: _: n != "module") attrs;
in lib'.evalModules (recursiveUpdate {
in
lib'.evalModules (recursiveUpdate
{
inherit specialArgs modules;
args = {
inherit pkgs;
name = "default";
};
} attrs');
}
attrs');
modules = import ./modules;
# legacy support for buildResources
buildResources = {
configuration ? {},
writeJSON ? true,
writeHash ? true
}: let
buildResources =
{ configuration ? { }
, writeJSON ? true
, writeHash ? true
}:
let
evaled = evalModules {
modules = [
configuration
@ -53,11 +58,13 @@ let
if writeJSON
then pkgs.writeText "resources.json" (builtins.toJSON generated)
else generated;
in result;
in
result;
kubenix = {
inherit evalModules buildResources modules;
lib = kubenixLib;
};
in kubenix
in
kubenix

View file

@ -1,10 +1,10 @@
{ config, lib, pkgs, kubenix, ... }:
with lib;
let
nginx = pkgs.callPackage ./image.nix { };
in {
in
{
imports = with kubenix.modules; [ k8s docker ];
docker.images.nginx.image = nginx;

View file

@ -1,14 +1,16 @@
{ pkgs ? import <nixpkgs> { }, lib ? pkgs.lib, spec ? ./istio-schema.json }:
with lib;
let
gen = rec {
mkMerge = values: ''mkMerge [${concatMapStrings (value: "
mkMerge = values: ''mkMerge [${concatMapStrings
(value: "
${value}
") values}]'';
")
values}]'';
toNixString = value: if isAttrs value || isList value
toNixString = value:
if isAttrs value || isList value
then builtins.toJSON value
else if isString value
then ''"${value}"''
@ -18,11 +20,11 @@ let
removeEmptyLines = str: concatStringsSep "\n" (filter (l: (builtins.match "( |)+" l) == null) (splitString "\n" str));
mkOption = {
description ? null,
type ? null,
default ? null,
apply ? null
mkOption =
{ description ? null
, type ? null
, default ? null
, apply ? null
}: removeEmptyLines ''mkOption {
${optionalString (description != null) "description = ${builtins.toJSON description};"}
${optionalString (type != null) ''type = ${type};''}
@ -81,7 +83,8 @@ let
fetchSpecs = path: builtins.fromJSON (fixJSON (builtins.readFile path));
genDefinitions = swagger: with gen; (mapAttrs (name: definition:
genDefinitions = swagger: with gen; (mapAttrs
(name: definition:
# if $ref is in definition it means it's an alias of other definition
if hasAttr "$ref" definition
then definitions."${refDefinition definition}"
@ -92,7 +95,8 @@ let
}
else {
options = mapAttrs (propName: property:
options = mapAttrs
(propName: property:
let
isRequired = elem propName (definition.required or [ ]);
requiredOrNot = type: if isRequired then type else types.nullOr type;
@ -129,9 +133,11 @@ let
# if x-kubernetes-patch-merge-key is set then make it an
# attribute set of submodules
if hasAttr "x-kubernetes-patch-merge-key" property
then let
then
let
mergeKey = property."x-kubernetes-patch-merge-key";
in {
in
{
type = requiredOrNot (coerceAttrsOfSubmodulesToListByKey (refDefinition property.items) mergeKey);
apply = attrsToList;
}
@ -175,45 +181,59 @@ let
else {
type = requiredOrNot (mapType property);
};
in mkOption ({
in
mkOption ({
description = property.description or "";
} // optionProperties)
) definition.properties;
)
definition.properties;
config =
let
optionalProps = filterAttrs (propName: property:
optionalProps = filterAttrs
(propName: property:
!(elem propName (definition.required or [ ]))
) definition.properties;
in mapAttrs (name: property: mkOverride 1002 null) optionalProps;
)
definition.properties;
in
mapAttrs (name: property: mkOverride 1002 null) optionalProps;
}
) swagger.definitions);
)
swagger.definitions);
genResources = swagger: (mapAttrsToList (name: property: rec {
genResources = swagger: (mapAttrsToList
(name: property: rec {
splittedType = splitString "." (removePrefix "me.snowdrop.istio.api." property.javaType);
group = (concatStringsSep "." (take ((length splittedType) - 2) splittedType)) + ".istio.io";
kind = removeSuffix "Spec" (last splittedType);
version = last (take ((length splittedType) - 1) splittedType);
ref = removePrefix "#/definitions/" property."$ref";
})
(filterAttrs (name: property:
(filterAttrs
(name: property:
(hasPrefix "me.snowdrop.istio.api" property.javaType) &&
hasSuffix "Spec" property.javaType
) swagger.properties)) ++ (mapAttrsToList (name: property: rec {
)
swagger.properties)) ++ (mapAttrsToList
(name: property: rec {
splittedType = splitString "." (removePrefix "me.snowdrop.istio.mixer." property.javaType);
group = "config.istio.io";
version = "v1alpha2";
kind = head (tail splittedType);
ref = removePrefix "#/definitions/" property."$ref";
}) (filterAttrs (name: property:
})
(filterAttrs
(name: property:
(hasPrefix "me.snowdrop.istio.mixer" property.javaType) &&
hasSuffix "Spec" property.javaType
) swagger.properties));
)
swagger.properties));
swagger = fetchSpecs spec;
definitions = genDefinitions swagger;
in pkgs.writeText "gen.nix"
"# This file was generated with kubenix k8s generator, do not edit
in
pkgs.writeText "gen.nix" ''
# This file was generated with kubenix k8s generator, do not edit
{lib, config, ... }:
with lib;
@ -306,27 +326,35 @@ let
);
definitions = {
${concatStrings (mapAttrsToList (name: value: "
${concatStrings (mapAttrsToList
(name: value: "
\"${name}\" = {${optionalString (hasAttr "options" value) "
options = {${concatStrings (mapAttrsToList (name: value: "
options = {${concatStrings (mapAttrsToList
(name: value: "
\"${name}\" = ${value};
") value.options)}};
")
value.options)}};
"}${optionalString (hasAttr "config" value) "
config = {${concatStrings (mapAttrsToList (name: value: "
config = {${concatStrings (mapAttrsToList
(name: value: "
\"${name}\" = ${value};
") value.config)}};
")
value.config)}};
"}};
") definitions)}
")
definitions)}
} // (import ./overrides.nix {inheirt definitions lib;}));
in {
kubernetes.customResources = [
${concatMapStrings (resource: ''{
${concatMapStrings
(resource: ''{
group = "${resource.group}";
version = "${resource.version}";
kind = "${resource.kind}";
description = "";
module = definitions."${resource.ref}";
}'') (genResources swagger)}
}'')
(genResources swagger)}
];
}
"
''

View file

@ -2,17 +2,20 @@
, pkgs ? import <nixpkgs> { }
, lib ? pkgs.lib
, spec ? ./specs/1.21/swagger.json
, ... }:
, ...
}:
with lib;
let
gen = rec {
mkMerge = values: ''mkMerge [${concatMapStrings (value: "
mkMerge = values: ''mkMerge [${concatMapStrings
(value: "
${value}
") values}]'';
")
values}]'';
toNixString = value: if isAttrs value || isList value
toNixString = value:
if isAttrs value || isList value
then builtins.toJSON value
else if isString value
then ''"${value}"''
@ -22,11 +25,11 @@ let
removeEmptyLines = str: concatStringsSep "\n" (filter (l: (builtins.match "( |)+" l) == null) (splitString "\n" str));
mkOption = {
description ? null,
type ? null,
default ? null,
apply ? null
mkOption =
{ description ? null
, type ? null
, default ? null
, apply ? null
}: removeEmptyLines ''mkOption {
${optionalString (description != null) "description = ${builtins.toJSON description};"}
${optionalString (type != null) ''type = ${type};''}
@ -83,7 +86,8 @@ let
refType = attr: head (tail (tail (splitString "/" attr."$ref")));
compareVersions = ver1: ver2: let
compareVersions = ver1: ver2:
let
getVersion = v: substring 1 10 v;
splitVersion = v: builtins.splitVersion (getVersion v);
isAlpha = v: elem "alpha" (splitVersion v);
@ -94,13 +98,15 @@ let
v1 = patchVersion ver1;
v2 = patchVersion ver2;
in builtins.compareVersions v1 v2;
in
builtins.compareVersions v1 v2;
fixJSON = content: replaceStrings [ "\\u" ] [ "u" ] content;
fetchSpecs = path: builtins.fromJSON (fixJSON (builtins.readFile path));
genDefinitions = swagger: with gen; mapAttrs (name: definition:
genDefinitions = swagger: with gen; mapAttrs
(name: definition:
# if $ref is in definition it means it's an alias of other definition
if hasAttr "$ref" definition
then definitions."${refDefinition definition}"
@ -110,7 +116,8 @@ let
# in other case it's an actual definition
else {
options = mapAttrs (propName: property:
options = mapAttrs
(propName: property:
let
isRequired = elem propName (definition.required or [ ]);
requiredOrNot = type: if isRequired then type else types.nullOr type;
@ -144,9 +151,11 @@ let
# if x-kubernetes-patch-merge-key is set then make it an
# attribute set of submodules
if hasAttr "x-kubernetes-patch-merge-key" property
then let
then
let
mergeKey = property."x-kubernetes-patch-merge-key";
in {
in
{
type = requiredOrNot (coerceAttrsOfSubmodulesToListByKey (refDefinition property.items) mergeKey);
apply = attrsToList;
}
@ -190,39 +199,53 @@ let
else {
type = requiredOrNot (mapType property);
};
in mkOption ({
in
mkOption ({
description = property.description or "";
} // optionProperties)
) definition.properties;
)
definition.properties;
config =
let
optionalProps = filterAttrs (propName: property:
optionalProps = filterAttrs
(propName: property:
!(elem propName (definition.required or [ ]))
) definition.properties;
in mapAttrs (name: property: mkOverride 1002 null) optionalProps;
)
definition.properties;
in
mapAttrs (name: property: mkOverride 1002 null) optionalProps;
}
) swagger.definitions;
)
swagger.definitions;
mapCharPairs = f: s1: s2: concatStrings (imap0 (i: c1:
mapCharPairs = f: s1: s2: concatStrings (imap0
(i: c1:
f i c1 (if i >= stringLength s2 then "" else elemAt (stringToCharacters s2) i)
) (stringToCharacters s1));
)
(stringToCharacters s1));
getAttrName = resource: kind:
mapCharPairs (i: c1: c2:
mapCharPairs
(i: c1: c2:
if hasPrefix "API" kind && i == 0 then "A"
else if i == 0 then c1
else if c2 == "" || (toLower c2) != c1 then c1
else c2
) resource kind;
)
resource
kind;
genResourceTypes = swagger: mapAttrs' (name: path: let
genResourceTypes = swagger: mapAttrs'
(name: path:
let
ref = refType (head path.post.parameters).schema;
group' = path.post."x-kubernetes-group-version-kind".group;
version' = path.post."x-kubernetes-group-version-kind".version;
kind' = path.post."x-kubernetes-group-version-kind".kind;
name' = last (splitString "/" name);
attrName = getAttrName name' kind';
in nameValuePair ref {
in
nameValuePair ref {
inherit ref attrName;
name = name';
@ -232,33 +255,48 @@ let
description = swagger.definitions.${ref}.description;
defintion = refDefinition (head path.post.parameters).schema;
})
(filterAttrs (name: path:
(filterAttrs
(name: path:
hasAttr "post" path &&
path.post."x-kubernetes-action" == "post"
) swagger.paths);
)
swagger.paths);
swagger = fetchSpecs spec;
definitions = genDefinitions swagger;
resourceTypes = genResourceTypes swagger;
resourceTypesByKind = zipAttrs (mapAttrsToList (name: resourceType: {
resourceTypesByKind = zipAttrs (mapAttrsToList
(name: resourceType: {
${resourceType.kind} = resourceType;
}) resourceTypes);
})
resourceTypes);
resourcesTypesByKindSortByVersion = mapAttrs (kind: resourceTypes:
reverseList (sort (r1: r2:
resourcesTypesByKindSortByVersion = mapAttrs
(kind: resourceTypes:
reverseList (sort
(r1: r2:
compareVersions r1.version r2.version > 0
) resourceTypes)
) resourceTypesByKind;
)
resourceTypes)
)
resourceTypesByKind;
latestResourceTypesByKind =
mapAttrs (kind: resources: last resources) resourcesTypesByKindSortByVersion;
genResourceOptions = resource: with gen; let
submoduleForDefinition' = definition: let
in submoduleForDefinition
definition.ref definition.name definition.kind definition.group definition.version;
in mkOption {
submoduleForDefinition' = definition:
let
in
submoduleForDefinition
definition.ref
definition.name
definition.kind
definition.group
definition.version;
in
mkOption {
description = resource.description;
type = types.attrsOf (submoduleForDefinition' resource);
default = { };
@ -415,7 +453,9 @@ let
};
}
'';
in pkgs.runCommand "k8s-${name}-gen.nix" {
in
pkgs.runCommand "k8s-${name}-gen.nix"
{
buildInputs = [ pkgs.haskellPackages.nixfmt ];
} ''
cp ${builtins.toFile "k8s-${name}-gen-raw.nix" generated} $out

View file

@ -4,12 +4,14 @@ with lib;
{
copyDockerImages = { images, dest, args ? "" }:
pkgs.writeScript "copy-docker-images.sh" (concatMapStrings (image: ''
pkgs.writeScript "copy-docker-images.sh" (concatMapStrings
(image: ''
#!${pkgs.runtimeShell}
set -e
echo "copying '${image.imageName}:${image.imageTag}' to '${dest}/${image.imageName}:${image.imageTag}'"
${pkgs.skopeo}/bin/skopeo copy ${args} $@ docker-archive:${image} ${dest}/${image.imageName}:${image.imageTag}
'') images);
'')
images);
}

View file

@ -21,20 +21,25 @@ rec {
else mkOverride priority value;
loadYAML = path: importJSON (pkgs.runCommand "yaml-to-json" {
} "${pkgs.remarshal}/bin/remarshal -i ${path} -if yaml -of json > $out");
loadYAML = path: importJSON (pkgs.runCommand "yaml-to-json"
{ } "${pkgs.remarshal}/bin/remarshal -i ${path} -if yaml -of json > $out");
toYAML = config: builtins.readFile (pkgs.runCommand "to-yaml" {
toYAML = config: builtins.readFile (pkgs.runCommand "to-yaml"
{
buildInputs = [ pkgs.remarshal ];
} ''
remarshal -i ${pkgs.writeText "to-json" (builtins.toJSON config)} -if json -of yaml > $out
'');
toMultiDocumentYaml = name: documents: pkgs.runCommand name {
toMultiDocumentYaml = name: documents: pkgs.runCommand name
{
buildInputs = [ pkgs.remarshal ];
} (concatMapStringsSep "\necho --- >> $out\n" (d:
}
(concatMapStringsSep "\necho --- >> $out\n"
(d:
"remarshal -i ${builtins.toFile "doc" (builtins.toJSON d)} -if json -of yaml >> $out"
) documents);
)
documents);
toBase64 = value:
builtins.readFile
@ -42,10 +47,13 @@ rec {
exp = base: exp: foldr (value: acc: acc * base) 1 (range 1 exp);
octalToDecimal = value: (foldr (char: acc: {
octalToDecimal = value: (foldr
(char: acc: {
i = acc.i + 1;
value = acc.value + (toInt char) * (exp 8 acc.i);
}) {i = 0; value = 0;} (stringToCharacters value)).value;
})
{ i = 0; value = 0; }
(stringToCharacters value)).value;
submoduleWithSpecialArgs = opts: specialArgs:
let
@ -59,12 +67,14 @@ rec {
let
coerce = def: if isFunction def then def else { config = def; };
modules = opts' ++ map (def: { _file = def.file; imports = [ (coerce def.value) ]; }) defs;
in (evalModules {
in
(evalModules {
inherit modules specialArgs;
prefix = loc;
}).config;
getSubOptions = prefix: (evalModules
{ modules = opts'; inherit prefix specialArgs;
{
modules = opts'; inherit prefix specialArgs;
# This is a work-around due to the fact that some sub-modules,
# such as the one included in an attribute set, expects a "args"
# attribute to be given to the sub-module. As the option
@ -92,11 +102,14 @@ rec {
};
};
coerceListOfSubmodulesToAttrs = submodule: keyFn: let
coerceListOfSubmodulesToAttrs = submodule: keyFn:
let
mergeValuesByFn = keyFn: values:
listToAttrs (map (value:
listToAttrs (map
(value:
nameValuePair (toString (keyFn value)) value
) values);
)
values);
# Either value of type `finalType` or `coercedType`, the latter is
# converted to `finalType` using `coerceFunc`.
@ -113,14 +126,16 @@ rec {
else
let coerced = coerceFunc val; in assert finalType.check coerced; coerced;
in finalType.merge loc (map (def: def // { value = coerceVal def.value; }) defs);
in
finalType.merge loc (map (def: def // { value = coerceVal def.value; }) defs);
getSubOptions = finalType.getSubOptions;
getSubModules = finalType.getSubModules;
substSubModules = m: coercedTo coercedType coerceFunc (finalType.substSubModules m);
typeMerge = t1: t2: null;
functor = (defaultFunctor name) // { wrapped = finalType; };
};
in coercedTo
in
coercedTo
(types.listOf (types.submodule submodule))
(mergeValuesByFn keyFn)
(types.attrsOf (types.submodule submodule));

View file

@ -16,9 +16,12 @@ with lib;
, values ? { }
# kubernetes version to template chart for
, kubeVersion ? null }: let
, kubeVersion ? null
}:
let
valuesJsonFile = builtins.toFile "${name}-values.json" (builtins.toJSON values);
in stdenvNoCC.mkDerivation {
in
stdenvNoCC.mkDerivation {
name = "${name}.json";
buildCommand = ''
# template helm file and write resources to yaml

View file

@ -1,9 +1,9 @@
{ stdenvNoCC, lib, kubernetes-helm, cacert }:
let
cleanName = name: lib.replaceStrings [ "/" ] [ "-" ] name;
in {
in
{
# name of the chart
chart
@ -26,7 +26,8 @@ in {
, verify ? false
# pass --devel to helm chart
, devel ? false }: stdenvNoCC.mkDerivation {
, devel ? false
}: stdenvNoCC.mkDerivation {
name = "${cleanName chart}-${if version == null then "dev" else version}";
buildCommand = ''

View file

@ -1,9 +1,9 @@
{ pkgs ? import <nixpkgs> { } }:
let
fetchhelm = pkgs.callPackage ./fetchhelm.nix { };
chart2json = pkgs.callPackage ./chart2json.nix { };
in rec {
in
rec {
postgresql-chart = fetchhelm {
chart = "stable/postgresql";
version = "0.18.1";

View file

@ -42,14 +42,18 @@ rec {
};
# Creates hashed kubernetes list from a list of kubernetes objects
mkHashedList = { items, labels ? {} }: let
mkHashedList = { items, labels ? { } }:
let
hash = builtins.hashString "sha1" (builtins.toJSON items);
labeledItems = map (item: recursiveUpdate item {
labeledItems = map
(item: recursiveUpdate item {
metadata.labels."kubenix/hash" = hash;
}) items;
})
items;
in mkList {
in
mkList {
items = labeledItems;
labels = {
"kubenix/hash" = hash;

View file

@ -1,10 +1,10 @@
{ config, lib, pkgs, docker, ... }:
with lib;
let
cfg = config.docker;
in {
in
{
imports = [ ./base.nix ];
options.docker = {

View file

@ -4,7 +4,6 @@
{ config, lib, pkgs, helm, ... }:
with lib;
let
cfg = config.kubernetes.helm;
@ -17,14 +16,17 @@ let
merge = loc: foldl' (res: def: recursiveUpdate res def.value) { };
};
parseApiVersion = apiVersion: let
parseApiVersion = apiVersion:
let
splitted = splitString "/" apiVersion;
in {
in
{
group = if length splitted == 1 then "core" else head splitted;
version = last splitted;
};
in {
in
{
imports = [ ./k8s.nix ];
options.kubernetes.helm = {
@ -96,15 +98,21 @@ in {
# expose helm helper methods as module argument
_module.args.helm = import ../lib/helm { inherit pkgs; };
kubernetes.api.resources = mkMerge (flatten (mapAttrsToList (_: instance:
map (object: let
kubernetes.api.resources = mkMerge (flatten (mapAttrsToList
(_: instance:
map
(object:
let
apiVersion = parseApiVersion object.apiVersion;
name = object.metadata.name;
in {
in
{
"${apiVersion.group}"."${apiVersion.version}".${object.kind}."${name}" = mkMerge ([
object
] ++ instance.overrides);
}) instance.objects
) cfg.instances));
})
instance.objects
)
cfg.instances));
};
}

View file

@ -3,7 +3,8 @@
with lib;
{
"istio_networking_v1alpha3_StringMatch" = recursiveUpdate (recursiveUpdate
"istio_networking_v1alpha3_StringMatch" = recursiveUpdate
(recursiveUpdate
definitions."istio_networking_v1alpha3_StringMatch_Exact"
definitions."istio_networking_v1alpha3_StringMatch_Prefix"
)

View file

@ -2,7 +2,6 @@
{ lib, config, ... }:
with lib;
let
types = lib.types // rec {
str = mkOptionType {
@ -23,11 +22,14 @@ let
let
coerceVal = val:
if finalType.check val then val
else let
else
let
coerced = coerceFunc val;
in assert finalType.check coerced; coerced;
in
assert finalType.check coerced; coerced;
in finalType.merge loc (map (def: def // { value = coerceVal def.value; }) defs);
in
finalType.merge loc (map (def: def // { value = coerceVal def.value; }) defs);
getSubOptions = finalType.getSubOptions;
getSubModules = finalType.getSubModules;
substSubModules = m: coercedTo coercedType coerceFunc (finalType.substSubModules m);
@ -44,11 +46,13 @@ let
mergeValuesByKey = mergeKey: values:
listToAttrs (map
(value: nameValuePair (
(value: nameValuePair
(
if isAttrs value.${mergeKey}
then toString value.${mergeKey}.content
else (toString value.${mergeKey})
) value)
)
value)
values);
submoduleOf = ref: types.submodule ({ name, ... }: {
@ -56,12 +60,14 @@ let
config = definitions."${ref}".config;
});
submoduleWithMergeOf = ref: mergeKey: types.submodule ({name, ...}: let
submoduleWithMergeOf = ref: mergeKey: types.submodule ({ name, ... }:
let
convertName = name:
if definitions."${ref}".options.${mergeKey}.type == types.int
then toInt name
else name;
in {
in
{
options = definitions."${ref}".options;
config = definitions."${ref}".config // {
${mergeKey} = mkOverride 1002 (convertName name);
@ -4698,7 +4704,8 @@ let
};
} // (import ./istio-overrides.nix { inherit definitions lib; });
in {
in
{
kubernetes.customResources = [
{
group = "networking.istio.io";
@ -4706,211 +4713,246 @@ in {
kind = "DestinationRule";
description = "";
module = definitions."istio_networking_v1alpha3_DestinationRule";
}{
}
{
group = "networking.istio.io";
version = "v1alpha3";
kind = "EnvoyFilter";
description = "";
module = definitions."istio_networking_v1alpha3_EnvoyFilter";
}{
}
{
group = "networking.istio.io";
version = "v1alpha3";
kind = "Gateway";
description = "";
module = definitions."istio_networking_v1alpha3_Gateway";
}{
}
{
group = "authentication.istio.io";
version = "v1alpha1";
kind = "Policy";
description = "";
module = definitions."istio_authentication_v1alpha1_Policy";
}{
}
{
group = "rbac.istio.io";
version = "v1alpha1";
kind = "RbacConfig";
description = "";
module = definitions."istio_rbac_v1alpha1_RbacConfig";
}{
}
{
group = "policy.istio.io";
version = "v1beta1";
kind = "Rule";
description = "";
module = definitions."istio_policy_v1beta1_Rule";
}{
}
{
group = "networking.istio.io";
version = "v1alpha3";
kind = "ServiceEntry";
description = "";
module = definitions."istio_networking_v1alpha3_ServiceEntry";
}{
}
{
group = "rbac.istio.io";
version = "v1alpha1";
kind = "ServiceRole";
description = "";
module = definitions."istio_rbac_v1alpha1_ServiceRole";
}{
}
{
group = "rbac.istio.io";
version = "v1alpha1";
kind = "ServiceRoleBinding";
description = "";
module = definitions."istio_rbac_v1alpha1_ServiceRoleBinding";
}{
}
{
group = "networking.istio.io";
version = "v1alpha3";
kind = "VirtualService";
description = "";
module = definitions."istio_networking_v1alpha3_VirtualService";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "apikey";
description = "";
module = definitions."istio_mixer_apikey_InstanceMsg";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "authorization";
description = "";
module = definitions."istio_mixer_authorization_InstanceMsg";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "bypass";
description = "";
module = definitions."istio_adapter_bypass_Params";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "checknothing";
description = "";
module = definitions."istio_mixer_checknothing_InstanceMsg";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "circonus";
description = "";
module = definitions."istio_adapter_circonus_Params";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "denier";
description = "";
module = definitions."istio_adapter_denier_Params";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "edge";
description = "";
module = definitions."istio_mixer_edge_InstanceMsg";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "fluentd";
description = "";
module = definitions."istio_adapter_fluentd_Params";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "kubernetesenv";
description = "";
module = definitions."istio_adapter_kubernetesenv_Params";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "listentry";
description = "";
module = definitions."istio_mixer_listentry_InstanceMsg";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "logentry";
description = "";
module = definitions."istio_mixer_logentry_InstanceMsg";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "memquota";
description = "";
module = definitions."istio_adapter_memquota_Params";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "metric";
description = "";
module = definitions."istio_mixer_metric_InstanceMsg";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "opa";
description = "";
module = definitions."istio_adapter_opa_Params";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "prometheus";
description = "";
module = definitions."istio_adapter_prometheus_Params";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "quota";
description = "";
module = definitions."istio_mixer_quota_InstanceMsg";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "rbac";
description = "";
module = definitions."istio_adapter_rbac_Params";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "redisquota";
description = "";
module = definitions."istio_adapter_redisquota_Params";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "reportnothing";
description = "";
module = definitions."istio_mixer_reportnothing_InstanceMsg";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "servicecontrol";
description = "";
module = definitions."istio_adapter_servicecontrol_Params";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "signalfx";
description = "";
module = definitions."istio_adapter_signalfx_Params";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "solarwinds";
description = "";
module = definitions."istio_adapter_solarwinds_Params";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "stackdriver";
description = "";
module = definitions."istio_adapter_stackdriver_Params";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "statsd";
description = "";
module = definitions."istio_adapter_statsd_Params";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "stdio";
description = "";
module = definitions."istio_adapter_stdio_Params";
}{
}
{
group = "config.istio.io";
version = "v1alpha2";
kind = "tracespan";

View file

@ -4,9 +4,11 @@ stdenv.mkDerivation rec {
pname = "k3s-airgap-images";
version = k3s.version;
src = let
src =
let
throwError = throw "Unsupported system ${stdenv.hostPlatform.system}";
in {
in
{
x86_64-linux = fetchurl {
url = "https://github.com/rancher/k3s/releases/download/v${version}/k3s-airgap-images-amd64.tar";
sha256 = "sha256-6kQmlpNV+4cU1Kn5lyZhutXYK5qYdey0jubzYRRF3vA=";

View file

@ -3,19 +3,20 @@
{ options, config, lib, pkgs, k8s, ... }:
with lib;
let
cfg = config.kubernetes;
gvkKeyFn = type: "${type.group}/${type.version}/${type.kind}";
getDefaults = resource: group: version: kind:
catAttrs "default" (filter (default:
catAttrs "default" (filter
(default:
(resource == null || default.resource == null || default.resource == resource) &&
(default.group == null || default.group == group) &&
(default.version == null || default.version == version) &&
(default.kind == null || default.kind == kind)
) cfg.api.defaults);
)
cfg.api.defaults);
moduleToAttrs = value:
if isAttrs value
@ -79,7 +80,8 @@ let
types = mkOption {
description = "List of registered kubernetes types";
type = coerceListOfSubmodulesToAttrs {
type = coerceListOfSubmodulesToAttrs
{
options = {
group = mkOption {
description = "Resource type group";
@ -106,7 +108,8 @@ let
type = types.str;
};
};
} gvkKeyFn;
}
gvkKeyFn;
default = { };
};
};
@ -120,24 +123,32 @@ let
indexOf = lst: value:
head (filter (v: v != -1) (imap0 (i: v: if v == value then i else -1) lst));
compareVersions = ver1: ver2: let
compareVersions = ver1: ver2:
let
getVersion = v: substring 1 10 v;
splittedVer1 = builtins.splitVersion (getVersion ver1);
splittedVer2 = builtins.splitVersion (getVersion ver2);
v1 = if length splittedVer1 == 1 then "${getVersion ver1}prod" else getVersion ver1;
v2 = if length splittedVer2 == 1 then "${getVersion ver2}prod" else getVersion ver2;
in builtins.compareVersions v1 v2;
in
builtins.compareVersions v1 v2;
customResourceTypesByAttrName = zipAttrs (mapAttrsToList (_: resourceType: {
customResourceTypesByAttrName = zipAttrs (mapAttrsToList
(_: resourceType: {
${resourceType.attrName} = resourceType;
}) cfg.customTypes);
})
cfg.customTypes);
customResourceTypesByAttrNameSortByVersion = mapAttrs (_: resourceTypes:
reverseList (sort (r1: r2:
customResourceTypesByAttrNameSortByVersion = mapAttrs
(_: resourceTypes:
reverseList (sort
(r1: r2:
compareVersions r1.version r2.version > 0
) resourceTypes)
) customResourceTypesByAttrName;
)
resourceTypes)
)
customResourceTypesByAttrName;
latestCustomResourceTypes =
mapAttrsToList (_: resources: last resources) customResourceTypesByAttrNameSortByVersion;
@ -174,17 +185,24 @@ let
};
};
customResourceOptions = (mapAttrsToList (_: ct: {config, ...}: let
customResourceOptions = (mapAttrsToList
(_: ct: { config, ... }:
let
module = customResourceModuleForType config ct;
in {
in
{
options.resources.${ct.group}.${ct.version}.${ct.kind} = mkOption {
description = ct.description;
type = types.attrsOf (types.submodule module);
default = { };
};
}) cfg.customTypes) ++ (map (ct: { options, config, ... }: let
})
cfg.customTypes) ++ (map
(ct: { options, config, ... }:
let
module = customResourceModuleForType config ct;
in {
in
{
options.resources.${ct.attrName} = mkOption {
description = ct.description;
type = types.attrsOf (types.submodule module);
@ -193,9 +211,11 @@ let
config.resources.${ct.group}.${ct.version}.${ct.kind} =
mkAliasDefinitions options.resources.${ct.attrName};
}) latestCustomResourceTypes);
})
latestCustomResourceTypes);
in {
in
{
imports = [ ./base.nix ];
options.kubernetes = {
@ -244,7 +264,8 @@ in {
customTypes = mkOption {
description = "List of custom resource types to make API for";
type = coerceListOfSubmodulesToAttrs {
type = coerceListOfSubmodulesToAttrs
{
options = {
group = mkOption {
description = "Custom type group";
@ -284,18 +305,21 @@ in {
default = { };
};
};
} gvkKeyFn;
}
gvkKeyFn;
default = { };
};
objects = mkOption {
description = "List of generated kubernetes objects";
type = types.listOf types.attrs;
apply = items: sort (r1: r2:
apply = items: sort
(r1: r2:
if elem r1.kind cfg.resourceOrder && elem r2.kind cfg.resourceOrder
then indexOf cfg.resourceOrder r1.kind < indexOf cfg.resourceOrder r2.kind
else if elem r1.kind cfg.resourceOrder then true else false
) (unique items);
)
(unique items);
default = [ ];
};
@ -327,7 +351,8 @@ in {
kubernetes.version = mkDefault cfg.version;
kubernetes.namespace = mkDefault cfg.namespace;
};
} {
}
{
features = [ "k8s" "submodule" ];
module = { config, ... }: {
# set module defaults
@ -353,9 +378,11 @@ in {
kubernetes.api = mkMerge ([{
# register custom types
types = mapAttrsToList (_: cr: {
types = mapAttrsToList
(_: cr: {
inherit (cr) name group version kind attrName;
}) cfg.customTypes;
})
cfg.customTypes;
defaults = [{
default = {
@ -373,7 +400,9 @@ in {
}] ++
# import of yaml files
(map (i: let
(map
(i:
let
# load yaml file
object = loadYAML i;
groupVersion = splitString "/" object.apiVersion;
@ -383,14 +412,18 @@ in {
if version == (head groupVersion)
then "core" else head groupVersion;
kind = object.kind;
in {
in
{
resources.${group}.${version}.${kind}.${name} = object;
}) cfg.imports));
})
cfg.imports));
kubernetes.objects = flatten (mapAttrsToList (_: type:
kubernetes.objects = flatten (mapAttrsToList
(_: type:
mapAttrsToList (name: resource: moduleToAttrs resource)
cfg.api.resources.${type.group}.${type.version}.${type.kind}
) cfg.api.types);
)
cfg.api.types);
kubernetes.generated = k8s.mkHashedList {
items = config.kubernetes.objects;

View file

@ -3,7 +3,6 @@
{ options, config, pkgs, lib, kubenix, ... }:
with lib;
let
parentModule = module;
globalConfig = config;
@ -29,7 +28,8 @@ let
else if isAttrs mkOptionDefault.module then module // attrs
else module
);
in [
in
[
{
_module.args.name = module.name;
_module.args.module = module;
@ -50,19 +50,22 @@ let
mapAttrs' (name: resource: nameValuePair "${serviceName}-${name}" resource) resources;
# TODO: rewrite using mkOptionType
defaultModuleConfigurationOptions = mapAttrs (name: moduleDefinition: mkOption {
defaultModuleConfigurationOptions = mapAttrs
(name: moduleDefinition: mkOption {
description = "Module default configuration for ${name} module";
type = types.coercedTo types.unspecified (value: [ value ]) (types.listOf types.unspecified);
default = [ ];
apply = filter (v: v != [ ]);
}) config.kubernetes.moduleDefinitions;
})
config.kubernetes.moduleDefinitions;
getModuleDefinition = name:
if hasAttr name config.kubernetes.moduleDefinitions
then config.kubernetes.moduleDefinitions.${name}
else throw ''requested kubernetes moduleDefinition with name "${name}" does not exist'';
in {
in
{
imports = [ ./k8s.nix ];
options.kubernetes.moduleDefinitions = mkOption {
@ -135,9 +138,11 @@ in {
configuration = mkOption {
description = "Module configuration";
type = submoduleWithSpecialArgs {
type = submoduleWithSpecialArgs
{
imports = mkModuleOptions (getModuleDefinition config.module) config;
} {
}
{
inherit kubenix;
};
default = { };
@ -163,17 +168,24 @@ in {
config = {
kubernetes = mkMerge [{
api.defaults = mapAttrsToList (attrName: default: let
api.defaults = mapAttrsToList
(attrName: default:
let
type = head (mapAttrsToList (_: v: v) (filterAttrs (_: type: type.attrName == attrName) config.kubernetes.api.types));
in {
in
{
default = { imports = default; };
} // (if (attrName == "all") then { } else {
resource = type.name;
})) config.kubernetes.defaults;
}))
config.kubernetes.defaults;
resources = mkMerge (
mapAttrsToList (name: module:
mapAttrs' (_: type: let
mapAttrsToList
(name: module:
mapAttrs'
(_: type:
let
moduleDefinition = getModuleDefinition module.module;
moduleResources = module.configuration.kubernetes.api.resources.${type.attrName} or { };
@ -182,30 +194,36 @@ in {
if moduleDefinition.prefixResources && type.kind != "CustomResourceDefinition"
then prefixResources (moduleToAttrs moduleResources) name
else moduleToAttrs moduleResources;
in nameValuePair type.attrName
in
nameValuePair type.attrName
(if moduleDefinition.assignAsDefaults
then mkAllDefault moduleConfig 1000
else moduleConfig)
) module.configuration.kubernetes.api.types
) config.kubernetes.modules
)
module.configuration.kubernetes.api.types
)
config.kubernetes.modules
);
# custom types created from customResourceDefinitions
customTypes =
mapAttrsToList (name: crd: {
mapAttrsToList
(name: crd: {
group = crd.spec.group;
version = crd.spec.version;
kind = crd.spec.names.kind;
name = crd.spec.names.plural;
attrName = mkOptionDefault name;
}) (config.kubernetes.resources.customResourceDefinitions or {});
})
(config.kubernetes.resources.customResourceDefinitions or { });
defaultModuleConfiguration.all = {
_file = head options.kubernetes.defaultModuleConfiguration.files;
config.kubernetes.version = mkDefault config.kubernetes.version;
config.kubernetes.moduleDefinitions = config.kubernetes.moduleDefinitions;
};
} {
}
{
resources = mkAliasDefinitions options.kubernetes.customResources;
}];
};

View file

@ -1,7 +1,6 @@
{ config, options, kubenix, pkgs, lib, ... }:
with lib;
let
cfg = config.submodules;
parentConfig = config;
@ -14,7 +13,8 @@ let
else true;
getDefaults = { name, version, tags, features }:
catAttrs "default" (filter (submoduleDefault:
catAttrs "default" (filter
(submoduleDefault:
(submoduleDefault.name == null || submoduleDefault.name == name) &&
(matchesVersion submoduleDefault.version version) &&
(
@ -25,43 +25,57 @@ let
(length submoduleDefault.features == 0) ||
(length (intersectLists submoduleDefault.features features)) > 0
)
) config.submodules.defaults);
)
config.submodules.defaults);
specialArgs = cfg.specialArgs // {
parentConfig = config;
};
findSubmodule = {name, version ? null, latest ? true}: let
matchingSubmodules = filter (el:
findSubmodule = { name, version ? null, latest ? true }:
let
matchingSubmodules = filter
(el:
el.definition.name == name &&
(matchesVersion version el.definition.version)
) cfg.imports;
)
cfg.imports;
versionSortedSubmodules = sort (s1: s2:
versionSortedSubmodules = sort
(s1: s2:
if builtins.compareVersions s1.definition.version s2.definition.version > 0
then true else false
) matchingSubmodules;
)
matchingSubmodules;
matchingModule =
if length versionSortedSubmodules == 0
then throw "No module found ${name}/${if version == null then "latest" else version}"
else head versionSortedSubmodules;
in matchingModule;
in
matchingModule;
passthruConfig = mapAttrsToList (name: opt: {
${name} = mkMerge (mapAttrsToList (_: inst:
passthruConfig = mapAttrsToList
(name: opt: {
${name} = mkMerge (mapAttrsToList
(_: inst:
if inst.passthru.enable
then inst.config.submodule.passthru.${name} or { }
else { }
) config.submodules.instances);
)
config.submodules.instances);
_module.args = mkMerge (mapAttrsToList (_: inst:
_module.args = mkMerge (mapAttrsToList
(_: inst:
if inst.passthru.enable
then inst.config.submodule.passthru._module.args or { }
else { }
) config.submodules.instances);
}) (removeAttrs options ["_definedNames" "_module" "_m" "submodules"]);
in {
)
config.submodules.instances);
})
(removeAttrs options [ "_definedNames" "_module" "_m" "submodules" ]);
in
{
imports = [ ./base.nix ];
options = {
@ -124,7 +138,8 @@ in {
types.coercedTo
types.path
(module: { inherit module; })
(types.submodule ({name, config, ...}: let
(types.submodule ({ name, config, ... }:
let
evaledSubmodule' = evalModules {
inherit specialArgs;
modules = config.modules ++ [ ./base.nix ];
@ -135,7 +150,8 @@ in {
if (!(elem "submodule" evaledSubmodule'.config._m.features))
then throw "no submodule defined"
else evaledSubmodule';
in {
in
{
options = {
module = mkOption {
description = "Module defining submodule";
@ -181,7 +197,8 @@ in {
submodules.instances = mkOption {
description = "Attribute set of submodule instances";
default = { };
type = types.attrsOf (types.submodule ({name, config, options, ...}: let
type = types.attrsOf (types.submodule ({ name, config, options, ... }:
let
# submodule associated with
submodule = findSubmodule {
name = config.submodule;
@ -198,7 +215,8 @@ in {
tags = submoduleDefinition.tags;
features = submodule.features;
};
in {
in
{
options = {
name = mkOption {
description = "Submodule instance name";
@ -229,13 +247,15 @@ in {
config = mkOption {
description = "Submodule instance ${config.name} for ${submoduleDefinition.name}:${submoduleDefinition.version} config";
type = submoduleWithSpecialArgs ({...}: {
type = submoduleWithSpecialArgs
({ ... }: {
imports = submodule.modules ++ defaults ++ [ ./base.nix ];
_module.args.pkgs = pkgs;
_module.args.name = config.name;
_module.args.submodule = config;
submodule.args = mkAliasDefinitions options.args;
}) specialArgs;
})
specialArgs;
default = { };
};
@ -251,9 +271,11 @@ in {
config = mkMerge ([
{
# register exported functions as args
_module.args = mkMerge (map (submodule: {
_module.args = mkMerge (map
(submodule: {
${submodule.exportAs} = submodule.definition.exports;
}) (filter (submodule: submodule.exportAs != null) cfg.imports));
})
(filter (submodule: submodule.exportAs != null) cfg.imports));
_m.features = [ "submodules" ];
@ -267,10 +289,12 @@ in {
};
}]
(map (propagate: {
(map
(propagate: {
features = propagate.features;
default = propagate.module;
}) config._m.propagate)
})
config._m.propagate)
];
}

View file

@ -1,7 +1,6 @@
{ nixosPath, config, pkgs, lib, kubenix, ... }:
with lib;
let
cfg = config.testing;
@ -18,7 +17,8 @@ let
isTestEnabled = test:
(cfg.enabledTests == null || elem test.name cfg.enabledTests) && test.enable;
in {
in
{
imports = [
./docker.nix
./driver/kubetest.nix
@ -61,9 +61,11 @@ in {
tests = mkOption {
description = "List of test cases";
default = [ ];
type = types.listOf (types.coercedTo types.path (module: {
type = types.listOf (types.coercedTo types.path
(module: {
inherit module;
}) (types.submodule testModule));
})
(types.submodule testModule));
apply = tests: filter isTestEnabled tests;
};

View file

@ -2,7 +2,6 @@
with lib;
with import ../../lib/docker.nix { inherit lib pkgs; };
let
testing = config.testing;
@ -10,7 +9,8 @@ let
cfg = config.testing.docker;
in {
in
{
options.testing.docker = {
registryUrl = mkOption {
description = "Docker registry url";

View file

@ -1,7 +1,6 @@
{ lib, config, pkgs, ... }:
with lib;
let
testing = config.testing;
cfg = testing.driver.kubetest;
@ -16,14 +15,16 @@ let
toTestScript = t:
if isString t.script
then pkgs.writeText "${t.name}.py" ''
then
pkgs.writeText "${t.name}.py" ''
${cfg.defaultHeader}
${t.script}
''
else t.script;
tests = pkgs.linkFarm "${testing.name}-tests" (
map (t: {
map
(t: {
path = toTestScript t;
name = "${t.name}_test.py";
})
@ -35,7 +36,8 @@ let
${pythonEnv}/bin/pytest -p no:cacheprovider ${tests} $@
'';
in {
in
{
options.testing.driver.kubetest = {
defaultHeader = mkOption {
type = types.lines;

View file

@ -1,7 +1,6 @@
{ lib, config, testing, kubenix, ... }:
with lib;
let
modules = [
# testing module
@ -36,16 +35,19 @@ let
# defaults that can be applied on tests
defaults =
filter (d:
filter
(d:
(intersectLists d.features testFeatures) == d.features ||
(length d.features) == 0
) testing.defaults;
)
testing.defaults;
# add default modules to all modules
modulesWithDefaults = modules ++ (map (d: d.default) defaults);
# evaled test
evaled = let
evaled =
let
evaled' = kubenix.evalModules {
modules = modulesWithDefaults;
};
@ -54,7 +56,8 @@ let
else if (builtins.tryEval evaled'.config.test.assertions).success
then evaled' else null;
in {
in
{
options = {
module = mkOption {
description = "Module defining kubenix test";

View file

@ -1,7 +1,6 @@
{ lib, config, pkgs, ... }:
with lib;
let
testing = config.testing;
@ -32,7 +31,8 @@ let
echo "--> running tests"
${testing.testScript} --kube-config=$KUBECONFIG
'';
in {
in
{
options.testing.runtime.local = {
script = mkOption {
type = types.package;

View file

@ -9,7 +9,6 @@
}:
with lib;
let
testing = config.testing;
kubeconfig = "/etc/${config.services.kubernetes.pki.etcClusterAdminKubeconfig}";

View file

@ -1,11 +1,11 @@
{ lib, config, pkgs, ... }:
with lib;
let
cfg = config.test;
in {
in
{
options.test = {
name = mkOption {
description = "Test name";

View file

@ -27,4 +27,3 @@ stdenv.mkDerivation {
homepage = "https://github.com/kubernetes/kubectl";
};
}

View file

@ -8,7 +8,6 @@ in
}:
with lib;
let
kubenix = import ./. { inherit pkgs; };

View file

@ -7,10 +7,10 @@
, k8sVersion ? "1.21"
, registryUrl ? throw "Registry url not defined"
, throwError ? true # whether any testing error should throw an error
, enabledTests ? null }:
, enabledTests ? null
}:
with lib;
let
images = pkgs.callPackage ./images.nix { };
@ -34,7 +34,7 @@ let
#./legacy/k8s.nix
#./legacy/crd.nix
#./legacy/modules.nix
./helm/simple.nix
# ./helm/simple.nix
# ./istio/bookinfo.nix # infinite recursion
./submodules/simple.nix
./submodules/defaults.nix
@ -64,4 +64,5 @@ let
inherit kubenix nixosPath;
};
}).config;
in pkgs.recurseIntoAttrs config.testing
in
pkgs.recurseIntoAttrs config.testing

View file

@ -3,7 +3,6 @@
with lib;
with kubenix.lib;
with pkgs.dockerTools;
let
corev1 = config.kubernetes.api.resources.core.v1;
appsv1 = config.kubernetes.api.resources.apps.v1;
@ -31,7 +30,8 @@ let
finalImageName = "docker.io/bitnami/bitnami-shell";
finalImageTag = "10";
};
in {
in
{
imports = [ kubenix.modules.test kubenix.modules.helm kubenix.modules.k8s ];
test = {
@ -44,10 +44,12 @@ in {
appsv1.StatefulSet ? "app-psql-postgresql-read" &&
corev1.Secret ? "app-psql-postgresql" &&
corev1.Service ? "app-psql-postgresql-headless";
} {
}
{
message = "should have values passed";
assertion = appsv1.StatefulSet.app-psql-postgresql-read.spec.replicas == 2;
} {
}
{
message = "should have namespace defined";
assertion =
appsv1.StatefulSet.app-psql-postgresql-primary.metadata.namespace == "test";

View file

@ -10,7 +10,8 @@ with lib;
contents = [ pkgs.bash pkgs.curl pkgs.cacert ];
};
nginx = let
nginx =
let
nginxPort = "80";
nginxConf = pkgs.writeText "nginx.conf" ''
user nginx nginx;
@ -32,7 +33,8 @@ with lib;
nginxWebRoot = pkgs.writeTextDir "index.html" ''
<html><body><h1>Hello from NGINX</h1></body></html>
'';
in dockerTools.buildLayeredImage {
in
dockerTools.buildLayeredImage {
name = "xtruder/nginx";
tag = "latest";
contents = [ pkgs.nginx ];

View file

@ -30,11 +30,14 @@
http = [{
match = [{
uri.exact = "/productpage";
} {
}
{
uri.exact = "/login";
} {
}
{
uri.exact = "/logout";
} {
}
{
uri.prefix = "/api/v1/products";
}];
route = [{
@ -63,10 +66,12 @@
subsets = [{
name = "v1";
labels.version = "v1";
} {
}
{
name = "v2";
labels.version = "v2";
} {
}
{
name = "v3";
labels.version = "v3";
}];
@ -79,13 +84,16 @@
subsets = [{
name = "v1";
labels.version = "v1";
} {
}
{
name = "v2";
labels.version = "v2";
} {
}
{
name = "v2-mysql";
labels.version = "v2-mysql";
} {
}
{
name = "v2-mysql-vm";
labels.version = "v2-mysql-vm";
}];
@ -98,7 +106,8 @@
subsets = [{
name = "v1";
labels.version = "v1";
} {
}
{
name = "v2";
labels.version = "v2";
}];

View file

@ -1,10 +1,10 @@
{ config, lib, kubenix, pkgs, ... }:
with lib;
let
latestCrontab = config.kubernetes.api.resources.cronTabs.latest;
in {
in
{
imports = with kubenix.modules; [ test k8s ];
test = {
@ -37,7 +37,8 @@ in {
};
};
} {
}
{
group = "stable.example.com";
version = "v2";
kind = "CronTab";
@ -56,7 +57,8 @@ in {
};
};
};
} {
}
{
group = "stable.example.com";
version = "v3";
kind = "CronTab";

View file

@ -1,11 +1,11 @@
{ config, lib, kubenix, ... }:
with lib;
let
pod1 = config.kubernetes.api.resources.pods.pod1;
pod2 = config.kubernetes.api.resources.pods.pod2;
in {
in
{
imports = with kubenix.modules; [ test k8s ];
test = {
@ -14,10 +14,12 @@ in {
assertions = [{
message = "Should have label set with resource";
assertion = pod1.metadata.labels.resource-label == "value";
} {
}
{
message = "Should have default label set with group, version, kind";
assertion = pod1.metadata.labels.gvk-label == "value";
} {
}
{
message = "Should have conditional annotation set";
assertion = pod2.metadata.annotations.conditional-annotation == "value";
}];
@ -32,12 +34,14 @@ in {
kubernetes.api.defaults = [{
resource = "pods";
default.metadata.labels.resource-label = "value";
} {
}
{
group = "core";
kind = "Pod";
version = "v1";
default.metadata.labels.gvk-label = "value";
} {
}
{
resource = "pods";
default = { config, ... }: {
config.metadata.annotations = mkIf (config.metadata.labels ? "custom-label") {

View file

@ -1,7 +1,6 @@
{ config, lib, pkgs, kubenix, images, ... }:
with lib;
let
cfg = config.kubernetes.api.resources.deployments.nginx;
image = images.nginx;
@ -21,7 +20,8 @@ let
spec.restartPolicy = "Never";
});
in {
in
{
imports = [ kubenix.modules.test kubenix.modules.k8s kubenix.modules.docker ];
test = {
@ -35,10 +35,12 @@ in {
else if ((builtins.compareVersions config.kubernetes.version "1.8") <= 0)
then cfg.apiVersion == "apps/v1beta2"
else cfg.apiVersion == "apps/v1";
} {
}
{
message = "should have corrent kind set";
assertion = cfg.kind == "Deployment";
} {
}
{
message = "should have replicas set";
assertion = cfg.spec.replicas == 3;
}];

View file

@ -1,11 +1,11 @@
{ config, lib, kubenix, ... }:
with lib;
let
pod = config.kubernetes.api.resources.core.v1.Pod.test;
deployment = config.kubernetes.api.resources.apps.v1.Deployment.nginx-deployment;
in {
in
{
imports = with kubenix.modules; [ test k8s ];
test = {
@ -15,7 +15,8 @@ in {
assertions = [{
message = "Pod should have name set";
assertion = pod.metadata.name == "test";
} {
}
{
message = "Deployment should have name set";
assertion = deployment.metadata.name == "nginx-deployment";
}];

View file

@ -1,10 +1,10 @@
{ config, lib, kubenix, pkgs, ... }:
with lib;
let
cfg = config.kubernetes.api.resources.customResourceDefinitions.crontabs;
in {
in
{
imports = with kubenix.modules; [ test k8s ];
test = {

View file

@ -1,8 +1,8 @@
{ config, kubenix, ... }:
let
cfg = config.kubernetes.api.resources.pods.nginx;
in {
in
{
imports = [ kubenix.modules.test kubenix.modules.k8s ];
test = {
@ -11,7 +11,8 @@ in {
assertions = [{
message = "should have apiVersion and kind set";
assertion = cfg.apiVersion == "v1" && cfg.kind == "Pod";
} {
}
{
message = "should have name set";
assertion = cfg.metadata.name == "nginx";
}];

View file

@ -1,10 +1,10 @@
{ name, config, lib, kubenix, images, ... }:
with lib;
let
cfg = config.submodules.instances.passthru;
in {
in
{
imports = with kubenix.modules; [ test submodules k8s docker ];
test = {
@ -13,7 +13,8 @@ in {
assertions = [{
message = "Submodule has correct name set";
assertion = (head config.kubernetes.objects).metadata.name == "passthru";
} {
}
{
message = "Should expose docker image";
assertion = (head config.docker.export).imageName == "xtruder/nginx";
}];

View file

@ -1,16 +1,18 @@
{ options, config, lib, kubenix, pkgs, ... }:
with lib;
let
findObject = { kind, name }: filter (object:
findObject = { kind, name }: filter
(object:
object.kind == kind && object.metadata.name == name
) config.kubernetes.objects;
)
config.kubernetes.objects;
getObject = filter: head (findObject filter);
hasObject = { kind, name }: length (findObject { inherit kind name; }) == 1;
in {
in
{
imports = with kubenix.modules; [ test k8s legacy ];
test = {
@ -21,7 +23,8 @@ in {
message = "should define crd in module";
assertion =
hasObject { kind = "SecretClaim"; name = "module-claim"; };
} {
}
{
message = "should define crd in root";
assertion =
hasObject { kind = "SecretClaim"; name = "root-claim"; };

View file

@ -1,10 +1,10 @@
{ config, lib, kubenix, pkgs, ... }:
with lib;
let
cfg = config.kubernetes.api.resources.deployments.app;
in {
in
{
imports = with kubenix.modules; [ test k8s legacy ];
test = {
@ -15,7 +15,8 @@ in {
assertion =
cfg.kind == "Deployment" &&
cfg.metadata.name == "app";
} {
}
{
message = "should have correct defaults set";
assertion =
cfg.metadata.namespace == "test" &&

View file

@ -1,16 +1,18 @@
{ options, config, lib, kubenix, pkgs, ... }:
with lib;
let
findObject = { kind, name }: filter (object:
findObject = { kind, name }: filter
(object:
object.kind == kind && object.metadata.name == name
) config.kubernetes.objects;
)
config.kubernetes.objects;
getObject = filter: head (findObject filter);
hasObject = { kind, name }: length (findObject { inherit kind name; }) == 1;
in {
in
{
imports = with kubenix.modules; [ test k8s legacy ];
test = {
@ -22,14 +24,14 @@ in {
hasObject { kind = "Deployment"; name = "myapp"; } &&
hasObject { kind = "Deployment"; name = "myapp2"; } &&
hasObject { kind = "Deployment"; name = "myapp2-app2"; };
} {
}
{
message = "should have default labels set";
assertion =
(getObject {kind = "Deployment"; name = "myapp2-app2";})
.metadata.labels.module-label or false == "value" &&
(getObject {kind = "Deployment"; name = "myapp2";})
.metadata.labels.module-label or false == "value";
} {
(getObject { kind = "Deployment"; name = "myapp2-app2"; }).metadata.labels.module-label or false == "value" &&
(getObject { kind = "Deployment"; name = "myapp2"; }).metadata.labels.module-label or false == "value";
}
{
message = "should passthru resources to root module";
assertion =
config.kubernetes.resources.deployments.myapp2-app2-app.metadata.labels.module-label or false == "value";

View file

@ -1,11 +1,11 @@
{ name, config, lib, kubenix, images, ... }:
with lib;
let
cfg = config.submodules.instances.test.config;
deployment = cfg.kubernetes.api.deployments.nginx;
in {
in
{
imports = [ kubenix.modules.test kubenix.module ];
test = {
@ -14,10 +14,12 @@ in {
assertions = [{
message = "Namespace not propagated";
assertion = deployment.metadata.namespace == "test";
} {
}
{
message = "Version not propagated";
assertion = cfg.kubernetes.version == config.kubernetes.version;
} {
}
{
message = "docker image should be added to exported images";
assertion = (head config.docker.export) == images.nginx;
}];

View file

@ -1,7 +1,6 @@
{ name, config, lib, kubenix, ... }:
with lib;
let
instance1 = config.submodules.instances.instance1;
instance2 = config.submodules.instances.instance2;
@ -25,7 +24,8 @@ let
};
};
};
in {
in
{
imports = with kubenix.modules; [ test submodules ];
test = {
@ -34,91 +34,126 @@ in {
assertions = [{
message = "should apply defaults by tag1";
assertion = instance1.config.submodule.args.value == "value1";
} {
}
{
message = "should apply defaults by tag2";
assertion = instance2.config.submodule.args.value == "value2";
} {
}
{
message = "should apply defaults by tag2";
assertion = instance3.config.submodule.args.value == "value2";
} {
}
{
message = "should apply defaults to all";
assertion =
instance1.config.submodule.args.defaultValue == "value" &&
instance2.config.submodule.args.defaultValue == "value";
} {
}
{
message = "instance1 and instance3 should have value of default-value";
assertion = instance3.config.submodule.args.defaultValue == "default-value";
} {
}
{
message = "should apply defaults by submodule name";
assertion = instance4.config.submodule.args.value == "value4";
} {
}
{
message = "should apply defaults by custom condition";
assertion = instance5.config.submodule.args.defaultValue == "my-custom-value";
} {
}
{
message = "should apply defaults to versioned submodule";
assertion = versioned-submodule.config.submodule.args.defaultValue == "versioned-submodule";
}];
};
submodules.imports = [{
modules = [submodule {
modules = [
submodule
{
submodule = {
name = "submodule1";
tags = [ "tag1" ];
};
}];
} {
modules = [submodule {
}
];
}
{
modules = [
submodule
{
submodule = {
name = "submodule2";
tags = [ "tag2" ];
};
}];
} {
modules = [submodule {
}
];
}
{
modules = [
submodule
{
submodule = {
name = "submodule3";
tags = [ "tag2" ];
};
}];
} {
modules = [submodule {
}
];
}
{
modules = [
submodule
{
submodule = {
name = "submodule4";
};
}];
} {
modules = [submodule {
}
];
}
{
modules = [
submodule
{
submodule = {
name = "submodule5";
};
submodule.args.value = "custom-value";
}];
} {
modules = [submodule {
}
];
}
{
modules = [
submodule
{
submodule = {
name = "versioned-submodule";
version = "2.0.0";
};
}];
}
];
}];
submodules.defaults = [{
default.submodule.args.defaultValue = mkDefault "value";
} {
}
{
tags = [ "tag1" ];
default.submodule.args.value = mkDefault "value1";
} {
}
{
tags = [ "tag2" ];
default.submodule.args.value = mkDefault "value2";
} {
}
{
name = "submodule4";
default.submodule.args.value = mkDefault "value4";
} {
}
{
default = { config, ... }: {
submodule.args.defaultValue = mkIf (config.submodule.args.value == "custom-value") "my-custom-value";
};
} {
}
{
name = "versioned-submodule";
version = "2.0.0";
default.submodule.args.value = mkDefault "versioned";

View file

@ -1,7 +1,6 @@
{ name, config, lib, kubenix, subm-lib, ... }:
with lib;
let
submodule = {
imports = [ kubenix.modules.submodule ];
@ -13,7 +12,8 @@ let
};
};
};
in {
in
{
imports = with kubenix.modules; [ test submodules ];
test = {

View file

@ -1,7 +1,6 @@
{ name, config, lib, kubenix, ... }:
with lib;
let
submodule = { name, ... }: {
imports = [ kubenix.modules.submodule ];
@ -11,7 +10,8 @@ let
passthru.global.${name} = "true";
};
};
in {
in
{
imports = with kubenix.modules; [ test submodules ];
options = {
@ -29,10 +29,12 @@ in {
assertions = [{
message = "should passthru values if passthru enabled";
assertion = hasAttr "inst1" config.global && config.global.inst1 == "true";
} {
}
{
message = "should not passthru values if passthru not enabled";
assertion = !(hasAttr "inst2" config.global);
} {
}
{
message = "should passthru by default";
assertion = hasAttr "inst3" config.global && config.global.inst3 == "true";
}];

View file

@ -1,11 +1,11 @@
{ name, config, lib, kubenix, ... }:
with lib;
let
cfg = config.submodules.instances.instance;
args = cfg.config.submodule.args;
in {
in
{
imports = with kubenix.modules; [ test submodules ];
test = {
@ -14,19 +14,24 @@ in {
assertions = [{
message = "Submodule name is set";
assertion = cfg.name == "instance";
} {
}
{
message = "Submodule version is set";
assertion = cfg.version == null;
} {
}
{
message = "Submodule config has submodule definition";
assertion = cfg.config.submodule.name == "submodule";
} {
}
{
message = "Should have argument set";
assertion = args.value == "test";
} {
}
{
message = "Should have submodule name set";
assertion = args.name == "instance";
} {
}
{
message = "should have tag set";
assertion = elem "tag" (cfg.config.submodule.tags);
}];

View file

@ -1,7 +1,6 @@
{ name, config, lib, kubenix, ... }:
with lib;
let
inst-exact = config.submodules.instances.inst-exact.config;
inst-regex = config.submodules.instances.inst-regex.config;
@ -17,7 +16,8 @@ let
config.submodule.name = "subm";
};
in {
in
{
imports = with kubenix.modules; [ test submodules ];
test = {
@ -26,10 +26,12 @@ in {
assertions = [{
message = "should select exact version";
assertion = inst-exact.version == "1.1.0";
} {
}
{
message = "should select regex version";
assertion = inst-regex.version == "1.2.1";
} {
}
{
message = "should select latest version";
assertion = inst-latest.version == "1.2.1";
}];
@ -39,22 +41,29 @@ in {
modules = [{
config.submodule.version = "1.0.0";
config.version = "1.0.0";
} submodule];
} {
}
submodule];
}
{
modules = [{
config.submodule.version = "1.1.0";
config.version = "1.1.0";
} submodule];
} {
}
submodule];
}
{
modules = [{
config.submodule.version = "1.2.0";
config.version = "1.2.0";
} submodule];
} {
}
submodule];
}
{
modules = [{
config.submodule.version = "1.2.1";
config.version = "1.2.1";
} submodule];
}
submodule];
}];
submodules.instances.inst-exact = {