mirror of
https://cgit.krebsco.de/krops
synced 2024-11-01 00:39:48 +01:00
Compare commits
No commits in common. "master" and "v1.13.0" have entirely different histories.
9 changed files with 94 additions and 673 deletions
228
README.md
228
README.md
|
@ -1,13 +1,12 @@
|
||||||
# krops (krebs operations)
|
# krops (krebs ops)
|
||||||
|
|
||||||
krops is a lightweight toolkit to deploy NixOS systems, remotely or locally.
|
krops is a lightweigt toolkit to deploy NixOS systems, remotely or locally.
|
||||||
|
|
||||||
|
|
||||||
## Some Features
|
## Some Features
|
||||||
|
|
||||||
- store your secrets in [password store](https://www.passwordstore.org/)
|
- store your secrets in [password store](https://www.passwordstore.org/)
|
||||||
or [passage](https://github.com/FiloSottile/passage)
|
- build your system remotely
|
||||||
- build your systems remotely
|
|
||||||
- minimal overhead (it's basically just `nixos-rebuild switch`!)
|
- minimal overhead (it's basically just `nixos-rebuild switch`!)
|
||||||
- run from custom nixpkgs branch/checkout/fork
|
- run from custom nixpkgs branch/checkout/fork
|
||||||
|
|
||||||
|
@ -16,12 +15,12 @@ krops is a lightweight toolkit to deploy NixOS systems, remotely or locally.
|
||||||
|
|
||||||
Create a file named `krops.nix` (name doesn't matter) with following content:
|
Create a file named `krops.nix` (name doesn't matter) with following content:
|
||||||
|
|
||||||
```nix
|
```
|
||||||
let
|
let
|
||||||
krops = (import <nixpkgs> {}).fetchgit {
|
krops = (import <nixpkgs> {}).fetchgit {
|
||||||
url = https://cgit.krebsco.de/krops/;
|
url = https://cgit.krebsco.de/krops/;
|
||||||
rev = "v1.25.0";
|
rev = "3022582ade8049e6ccf18f358cedb996d6716945";
|
||||||
sha256 = "07mg3iaqjf1w49vmwfchi7b1w55bh7rvsbgicp2m47gnj9alwdb6";
|
sha256 = "0k3zhv2830z4bljcdvf6ciwjihk2zzcn9y23p49c6sba5hbsd6jb";
|
||||||
};
|
};
|
||||||
|
|
||||||
lib = import "${krops}/lib";
|
lib = import "${krops}/lib";
|
||||||
|
@ -53,175 +52,11 @@ in
|
||||||
```
|
```
|
||||||
|
|
||||||
and run `$(nix-build --no-out-link krops.nix)` to deploy the target machine.
|
and run `$(nix-build --no-out-link krops.nix)` to deploy the target machine.
|
||||||
krops exports some funtions under `krops.` namely:
|
|
||||||
|
|
||||||
## writeDeploy
|
Under the hood, this will make the sources available on the target machine
|
||||||
|
|
||||||
This will make the sources available on the target machine
|
|
||||||
below `/var/src`, and execute `nixos-rebuild switch -I /var/src`.
|
below `/var/src`, and execute `nixos-rebuild switch -I /var/src`.
|
||||||
|
|
||||||
|
|
||||||
### `target`
|
|
||||||
|
|
||||||
The `target` attribute to `writeDeploy` can either be a string or an attribute
|
|
||||||
set, specifying where to make the sources available, as well as where to run
|
|
||||||
the deployment.
|
|
||||||
|
|
||||||
If specified as string, the format could be described as:
|
|
||||||
```
|
|
||||||
[[USER]@]HOST[:PORT][/SOME/PATH]
|
|
||||||
```
|
|
||||||
|
|
||||||
Portions in square brackets are optional.
|
|
||||||
|
|
||||||
If the `USER` is the empty string, as in e.g. `@somehost`, then the username
|
|
||||||
will be obtained by ssh from its configuration files.
|
|
||||||
|
|
||||||
If the `target` attribute is an attribute set, then it can specify the
|
|
||||||
attributes `extraOptions`, `host`, `path`, `port`, `sudo`, and `user`.
|
|
||||||
The `extraOptions` is a list of strings that get passed to ssh as additional
|
|
||||||
arguments. The `sudo` attribute is a boolean and if set to true, then it's
|
|
||||||
possible to to deploy to targets that disallow sshing in as root, but allow
|
|
||||||
(preferably passwordless) sudo.
|
|
||||||
Example:
|
|
||||||
|
|
||||||
```nix
|
|
||||||
pkgs.krops.writeDeploy "deploy" {
|
|
||||||
source = /* ... */;
|
|
||||||
target = lib.mkTarget "user@host/path" // {
|
|
||||||
extraOptions = [
|
|
||||||
"-o" "LogLevel=DEBUG"
|
|
||||||
];
|
|
||||||
sudo = true;
|
|
||||||
};
|
|
||||||
}
|
|
||||||
```
|
|
||||||
For more details about the `target` attribute, please check the `mkTarget`
|
|
||||||
function in [lib/default.nix](lib/default.nix).
|
|
||||||
|
|
||||||
### `backup` (optional, defaults to false)
|
|
||||||
|
|
||||||
Backup all paths specified in source before syncing new sources.
|
|
||||||
|
|
||||||
### `buildTarget` (optional)
|
|
||||||
|
|
||||||
If set the evaluation and build of the system will be executed on this host.
|
|
||||||
`buildTarget` takes the same arguments as target.
|
|
||||||
Sources will be synced to both `buildTarget` and `target`.
|
|
||||||
Built packages will be uploaded from the `buildTarget` to `target` directly
|
|
||||||
This requires the building machine to have ssh access to the target.
|
|
||||||
To build the system on the same machine, that runs the krops command,
|
|
||||||
set up a local ssh service and set the build host to localhost.
|
|
||||||
|
|
||||||
### `crossDeploy` (optional, defaults to false)
|
|
||||||
|
|
||||||
Use this option if target host architecture is not the same as the build host
|
|
||||||
architecture as set by `buildHost` i.e. deploying to aarch64 from a x86_64
|
|
||||||
machine. Setting this option will disable building & running nix in the wrong
|
|
||||||
architecture when running `nixos-rebuild` on the deploying machine. It is
|
|
||||||
required to set `nixpkgs.localSystem.system` in the NixOS configuration to the
|
|
||||||
architecture of the target host. This option is only useful if the build host
|
|
||||||
also has remote builders that are capable of producing artifacts for the deploy
|
|
||||||
architecture.
|
|
||||||
|
|
||||||
### `fast` (optional, defaults to false)
|
|
||||||
|
|
||||||
Run `nixos-rebuild` immediately without building the system in a dedicated `nix
|
|
||||||
build` step.
|
|
||||||
|
|
||||||
### `force` (optional, defaults to false)
|
|
||||||
|
|
||||||
Create the sentinel file (`/var/src/.populate`) before syncing the new source.
|
|
||||||
|
|
||||||
### `operation` (optional, defaults to "switch")
|
|
||||||
|
|
||||||
Specifies which `nixos-rebuild` operation to perform.
|
|
||||||
|
|
||||||
### `useNixOutputMonitor` (optional, defaults to `"opportunistic"`)
|
|
||||||
|
|
||||||
Specifies when to pipe `nixos-rebuild`'s output to
|
|
||||||
[nom](https://github.com/maralorn/nix-output-monitor).
|
|
||||||
|
|
||||||
Supported values:
|
|
||||||
|
|
||||||
* `"opportunistic"` (default) -
|
|
||||||
Use `nom` only if it is present on the target machine.
|
|
||||||
|
|
||||||
* `"optimistic"` -
|
|
||||||
Use `nom`, assuming it is present on the target machine.
|
|
||||||
|
|
||||||
* `"pessimistic"` -
|
|
||||||
Use `nom` via `nix-shell` on the target machine.
|
|
||||||
|
|
||||||
* `true` -
|
|
||||||
Use `nom`.
|
|
||||||
If it is not present on the target machine, then use it via `nix-shell`.
|
|
||||||
|
|
||||||
* `false` -
|
|
||||||
Don't use `nom`
|
|
||||||
|
|
||||||
## writeTest
|
|
||||||
|
|
||||||
Very similiar to writeDeploy, but just builds the system on the target without
|
|
||||||
activating it.
|
|
||||||
|
|
||||||
This basically makes the sources available on the target machine
|
|
||||||
below `/var/src`, and executes `NIX_PATH=/var/src nix-build -A system '<nixpkgs/nixos>'`.
|
|
||||||
|
|
||||||
### `target`
|
|
||||||
|
|
||||||
[see `writeDeploy`](#writeDeploy)
|
|
||||||
|
|
||||||
### `backup` (optional, defaults to false)
|
|
||||||
|
|
||||||
[see `writeDeploy`](#writeDeploy)
|
|
||||||
|
|
||||||
### `force` (optional, defaults to false)
|
|
||||||
|
|
||||||
[see `writeDeploy`](#writeDeploy)
|
|
||||||
|
|
||||||
### `trace` (optional, defaults to false)
|
|
||||||
|
|
||||||
run nix-build with `--show-trace`
|
|
||||||
|
|
||||||
## writeCommand
|
|
||||||
|
|
||||||
This can be used to run other commands than `nixos-rebuild` or pre/post build hooks.
|
|
||||||
|
|
||||||
### `command`
|
|
||||||
|
|
||||||
A function which takes the targetPath as an attribute.
|
|
||||||
Example to activate/deactivate a swapfile before/after build:
|
|
||||||
|
|
||||||
```nix
|
|
||||||
pkgs.krops.writeCommand "deploy-with-swap" {
|
|
||||||
source = source;
|
|
||||||
target = "root@YOUR_IP_ADDRESS_OR_HOST_NAME_HERE";
|
|
||||||
command = targetPath: ''
|
|
||||||
swapon /var/swapfile
|
|
||||||
nixos-rebuild -I ${targetPath} switch
|
|
||||||
swapoff /var/swapfile
|
|
||||||
'';
|
|
||||||
}
|
|
||||||
```
|
|
||||||
|
|
||||||
### `target`
|
|
||||||
|
|
||||||
[see `writeDeploy`](#writeDeploy)
|
|
||||||
|
|
||||||
### `backup` (optional, defaults to false)
|
|
||||||
|
|
||||||
[see `writeDeploy`](#writeDeploy)
|
|
||||||
|
|
||||||
### `force` (optional, defaults to false)
|
|
||||||
|
|
||||||
[see `writeDeploy`](#writeDeploy)
|
|
||||||
|
|
||||||
### `allocateTTY` (optional, defaults to false)
|
|
||||||
|
|
||||||
whether the ssh session should do a pseudo-terminal allocation.
|
|
||||||
sets `-t` on the ssh command.
|
|
||||||
|
|
||||||
## Source Types
|
## Source Types
|
||||||
|
|
||||||
### `derivation`
|
### `derivation`
|
||||||
|
@ -242,28 +77,13 @@ using [`rsync`](https://rsync.samba.org/).
|
||||||
Supported attributes:
|
Supported attributes:
|
||||||
|
|
||||||
* `path` -
|
* `path` -
|
||||||
absolute path to files that should by transferred.
|
absolute path to files that should by transfered
|
||||||
|
|
||||||
* `useChecksum` (optional) -
|
* `useChecksum` (optional) -
|
||||||
boolean that controls whether file contents should be checked to decide
|
boolean that controls whether file contents should be checked to decide
|
||||||
whether a file has changed. This is useful when `path` points at files
|
whether a file has changed. This is useful when `path` points at files
|
||||||
with mangled timestamps, e.g. the Nix store.
|
with mangled timestamps, e.g. the Nix store.
|
||||||
|
|
||||||
The default value is `true` if `path` is a derivation, and `false` otherwise.
|
|
||||||
|
|
||||||
* `filters` (optional)
|
|
||||||
List of filters that should be passed to [`rsync`](https://rsync.samba.org/).
|
|
||||||
Filters are specified as attribute sets with the attributes `type` and
|
|
||||||
`pattern`. Supported filter types are `include` and `exclude`.
|
|
||||||
Checkout the filter rules section in the
|
|
||||||
[rsync manual](https://download.samba.org/pub/rsync/rsync.html)
|
|
||||||
for further information.
|
|
||||||
|
|
||||||
* `deleteExcluded` (optional)
|
|
||||||
boolean that controls whether the excluded directories should be deleted
|
|
||||||
if they exist on the target. This is passed to the `--delete-excluded` option
|
|
||||||
of rsync. Defaults to `true`.
|
|
||||||
|
|
||||||
|
|
||||||
### `git`
|
### `git`
|
||||||
|
|
||||||
|
@ -280,10 +100,6 @@ Supported attributes:
|
||||||
* `clean.exclude` -
|
* `clean.exclude` -
|
||||||
List of patterns that should be excluded from Git cleaning.
|
List of patterns that should be excluded from Git cleaning.
|
||||||
|
|
||||||
* `shallow` (optional)
|
|
||||||
boolean that controls whether only the requested commit ref. should be fetched
|
|
||||||
instead of the whole history, to save disk space and bandwith. Defaults to `false`.
|
|
||||||
|
|
||||||
|
|
||||||
### `pass`
|
### `pass`
|
||||||
|
|
||||||
|
@ -299,29 +115,6 @@ Supported attributes:
|
||||||
sub-directory in the password store.
|
sub-directory in the password store.
|
||||||
|
|
||||||
|
|
||||||
### `passage`
|
|
||||||
|
|
||||||
The passage source type decrypts files from a local
|
|
||||||
[passage store](https://github.com/FiloSottile/passage)
|
|
||||||
and transfers them to the target using
|
|
||||||
[`rsync`](https://rsync.samba.org/).
|
|
||||||
|
|
||||||
Supported attributes:
|
|
||||||
|
|
||||||
* `dir` -
|
|
||||||
Path to the passage store.
|
|
||||||
For a partial transfer, this may point to a subdirectory.
|
|
||||||
Example: `~/.passage/store/hosts/MYHOSTNAME`
|
|
||||||
|
|
||||||
* `identities_file` (optional) -
|
|
||||||
Path to the identities file.
|
|
||||||
Defaults to `~/.passage/identities`.
|
|
||||||
|
|
||||||
* `age` (optional) -
|
|
||||||
Path of the age binary.
|
|
||||||
Defaults to `age` (absolute path gets resolved using `passage`'s search path.)
|
|
||||||
|
|
||||||
|
|
||||||
### `pipe`
|
### `pipe`
|
||||||
|
|
||||||
Executes a local command, capture its stdout, and send that as a file to the
|
Executes a local command, capture its stdout, and send that as a file to the
|
||||||
|
@ -350,9 +143,8 @@ Supported attributes:
|
||||||
|
|
||||||
## Communication
|
## Communication
|
||||||
|
|
||||||
Comments, questions, pull-requests and patches, etc. are very welcome, and can be directed
|
Comments, questions, pull-requests, etc. are very welcome, and can be directed
|
||||||
at:
|
at:
|
||||||
|
|
||||||
- IRC: #krebs at hackint
|
- IRC: #krebs at freenode
|
||||||
- Mail: [spam@krebsco.de](mailto:spam@krebsco.de)
|
- Mail: [spam@krebsco.de](mailto:spam@krebsco.de)
|
||||||
- Github: https://github.com/krebs/krops/
|
|
||||||
|
|
4
ci.nix
4
ci.nix
|
@ -5,7 +5,7 @@ let
|
||||||
pkgs = import "${krops}/pkgs" {};
|
pkgs = import "${krops}/pkgs" {};
|
||||||
|
|
||||||
source = lib.evalSource [{
|
source = lib.evalSource [{
|
||||||
nixos-config.file = pkgs.writeText "nixos-config" ''
|
nixos-config.file = toString (pkgs.writeText "nixos-config" ''
|
||||||
{ pkgs, ... }: {
|
{ pkgs, ... }: {
|
||||||
|
|
||||||
fileSystems."/" = { device = "/dev/sda1"; };
|
fileSystems."/" = { device = "/dev/sda1"; };
|
||||||
|
@ -13,7 +13,7 @@ let
|
||||||
services.openssh.enable = true;
|
services.openssh.enable = true;
|
||||||
environment.systemPackages = [ pkgs.git ];
|
environment.systemPackages = [ pkgs.git ];
|
||||||
}
|
}
|
||||||
'';
|
'');
|
||||||
nixpkgs.symlink = toString <nixpkgs>;
|
nixpkgs.symlink = toString <nixpkgs>;
|
||||||
}];
|
}];
|
||||||
in {
|
in {
|
||||||
|
|
27
flake.lock
27
flake.lock
|
@ -1,27 +0,0 @@
|
||||||
{
|
|
||||||
"nodes": {
|
|
||||||
"nixpkgs": {
|
|
||||||
"locked": {
|
|
||||||
"lastModified": 1689940971,
|
|
||||||
"narHash": "sha256-397xShPnFqPC59Bmpo3lS+/Aw0yoDRMACGo1+h2VJMo=",
|
|
||||||
"owner": "NixOS",
|
|
||||||
"repo": "nixpkgs",
|
|
||||||
"rev": "9ca785644d067445a4aa749902b29ccef61f7476",
|
|
||||||
"type": "github"
|
|
||||||
},
|
|
||||||
"original": {
|
|
||||||
"owner": "NixOS",
|
|
||||||
"ref": "nixos-unstable",
|
|
||||||
"repo": "nixpkgs",
|
|
||||||
"type": "github"
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"root": {
|
|
||||||
"inputs": {
|
|
||||||
"nixpkgs": "nixpkgs"
|
|
||||||
}
|
|
||||||
}
|
|
||||||
},
|
|
||||||
"root": "root",
|
|
||||||
"version": 7
|
|
||||||
}
|
|
29
flake.nix
29
flake.nix
|
@ -1,29 +0,0 @@
|
||||||
{
|
|
||||||
description = "krops - krebs operations";
|
|
||||||
|
|
||||||
inputs = {
|
|
||||||
nixpkgs.url = "github:NixOS/nixpkgs/nixos-unstable";
|
|
||||||
};
|
|
||||||
|
|
||||||
outputs = { self, nixpkgs, ... }:
|
|
||||||
let
|
|
||||||
supportedSystems = [
|
|
||||||
"x86_64-linux"
|
|
||||||
"i686-linux"
|
|
||||||
"aarch64-linux"
|
|
||||||
"riscv64-linux"
|
|
||||||
];
|
|
||||||
forAllSystems = nixpkgs.lib.genAttrs supportedSystems;
|
|
||||||
in
|
|
||||||
{
|
|
||||||
lib = forAllSystems (system:
|
|
||||||
let
|
|
||||||
pkgs = nixpkgs.legacyPackages.${system};
|
|
||||||
krops = pkgs.callPackage ./pkgs/krops {};
|
|
||||||
populate = pkgs.callPackage ./pkgs/populate {};
|
|
||||||
in {
|
|
||||||
inherit populate;
|
|
||||||
inherit (krops) rebuild runShell withNixOutputMonitor writeCommand writeDeploy writeTest;
|
|
||||||
});
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -28,23 +28,13 @@ let {
|
||||||
# This function's return value can be used as pkgs.populate input.
|
# This function's return value can be used as pkgs.populate input.
|
||||||
source: sanitize (eval source).config.source;
|
source: sanitize (eval source).config.source;
|
||||||
|
|
||||||
maybeHostName = default: let
|
getHostName = let
|
||||||
# We're parsing /etc/hostname here because reading
|
# We're parsing /etc/hostname here because reading
|
||||||
# /proc/sys/kernel/hostname yields ""
|
# /proc/sys/kernel/hostname yields ""
|
||||||
path = "/etc/hostname";
|
y = lib.filter lib.types.label.check (lib.splitString "\n" (lib.readFile /etc/hostname));
|
||||||
lines = lib.splitString "\n" (lib.readFile path);
|
|
||||||
hostNames = lib.filter lib.types.label.check lines;
|
|
||||||
in
|
in
|
||||||
if lib.pathExists path then
|
if lib.length y != 1 then throw "malformed /etc/hostname" else
|
||||||
if lib.length hostNames == 1 then
|
lib.elemAt y 0;
|
||||||
lib.head hostNames
|
|
||||||
else
|
|
||||||
lib.trace "malformed ${path}" default
|
|
||||||
else
|
|
||||||
default;
|
|
||||||
|
|
||||||
firstWord = s:
|
|
||||||
lib.head (lib.match "^([^[:space:]]*).*" s);
|
|
||||||
|
|
||||||
isLocalTarget = let
|
isLocalTarget = let
|
||||||
origin = lib.mkTarget "";
|
origin = lib.mkTarget "";
|
||||||
|
@ -53,26 +43,15 @@ let {
|
||||||
lib.elem target.host [origin.host "localhost"];
|
lib.elem target.host [origin.host "localhost"];
|
||||||
|
|
||||||
mkTarget = s: let
|
mkTarget = s: let
|
||||||
parse = lib.match "(([^@]*)@)?(([^:/]+))?(:([^/]+))?(/.*)?" s;
|
default = defVal: val: if val != null then val else defVal;
|
||||||
|
parse = lib.match "(([^@]+)@)?(([^:/]+))?(:([^/]+))?(/.*)?" s;
|
||||||
elemAt' = xs: i: if lib.length xs > i then lib.elemAt xs i else null;
|
elemAt' = xs: i: if lib.length xs > i then lib.elemAt xs i else null;
|
||||||
filterNull = lib.filterAttrs (n: v: v != null);
|
|
||||||
in {
|
in {
|
||||||
user = lib.maybeEnv "LOGNAME" null;
|
user = default (lib.getEnv "LOGNAME") (elemAt' parse 1);
|
||||||
host = lib.maybeEnv "HOSTNAME" (lib.maybeHostName "localhost");
|
host = default (lib.maybeEnv "HOSTNAME" lib.getHostName) (elemAt' parse 3);
|
||||||
port = null;
|
port = default "22" /* "ssh"? */ (elemAt' parse 5);
|
||||||
path = "/var/src";
|
path = default "/var/src" /* no default? */ (elemAt' parse 6);
|
||||||
sudo = false;
|
};
|
||||||
extraOptions = [];
|
|
||||||
} // (if lib.isString s then filterNull {
|
|
||||||
user = elemAt' parse 1;
|
|
||||||
host = elemAt' parse 3;
|
|
||||||
port = elemAt' parse 5;
|
|
||||||
path = elemAt' parse 6;
|
|
||||||
} else s);
|
|
||||||
|
|
||||||
mkUserPortSSHOpts = target:
|
|
||||||
(lib.optionals (target.user != null) ["-l" target.user]) ++
|
|
||||||
(lib.optionals (target.port != null) ["-p" target.port]);
|
|
||||||
|
|
||||||
shell = let
|
shell = let
|
||||||
isSafeChar = lib.testString "[-+./0-9:=A-Z_a-z]";
|
isSafeChar = lib.testString "[-+./0-9:=A-Z_a-z]";
|
||||||
|
|
|
@ -21,15 +21,11 @@
|
||||||
};
|
};
|
||||||
file = lib.mkOption {
|
file = lib.mkOption {
|
||||||
apply = x:
|
apply = x:
|
||||||
if lib.types.absolute-pathname.check x || lib.types.package.check x
|
if lib.types.absolute-pathname.check x
|
||||||
then { path = x; }
|
then { path = x; }
|
||||||
else x;
|
else x;
|
||||||
default = null;
|
default = null;
|
||||||
type = lib.types.nullOr (lib.types.oneOf [
|
type = lib.types.nullOr (lib.types.either lib.types.absolute-pathname source-types.file);
|
||||||
lib.types.absolute-pathname
|
|
||||||
lib.types.package
|
|
||||||
source-types.file
|
|
||||||
]);
|
|
||||||
};
|
};
|
||||||
git = lib.mkOption {
|
git = lib.mkOption {
|
||||||
default = null;
|
default = null;
|
||||||
|
@ -39,17 +35,6 @@
|
||||||
default = null;
|
default = null;
|
||||||
type = lib.types.nullOr source-types.pass;
|
type = lib.types.nullOr source-types.pass;
|
||||||
};
|
};
|
||||||
passage = lib.mkOption {
|
|
||||||
apply = x:
|
|
||||||
if lib.types.pathname.check x
|
|
||||||
then { dir = x; }
|
|
||||||
else x;
|
|
||||||
default = null;
|
|
||||||
type = lib.types.nullOr (lib.types.oneOf [
|
|
||||||
lib.types.pathname
|
|
||||||
source-types.passage
|
|
||||||
]);
|
|
||||||
};
|
|
||||||
pipe = lib.mkOption {
|
pipe = lib.mkOption {
|
||||||
apply = x:
|
apply = x:
|
||||||
if lib.types.absolute-pathname.check x
|
if lib.types.absolute-pathname.check x
|
||||||
|
@ -69,18 +54,6 @@
|
||||||
};
|
};
|
||||||
});
|
});
|
||||||
|
|
||||||
filter = lib.types.submodule {
|
|
||||||
options = {
|
|
||||||
type = lib.mkOption {
|
|
||||||
type = lib.types.enum ["include" "exclude"];
|
|
||||||
default = "exclude";
|
|
||||||
};
|
|
||||||
pattern = lib.mkOption {
|
|
||||||
type = lib.types.str;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
source-types = {
|
source-types = {
|
||||||
derivation = lib.types.submodule {
|
derivation = lib.types.submodule {
|
||||||
options = {
|
options = {
|
||||||
|
@ -98,43 +71,6 @@
|
||||||
default = false;
|
default = false;
|
||||||
type = lib.types.bool;
|
type = lib.types.bool;
|
||||||
};
|
};
|
||||||
exclude = lib.mkOption {
|
|
||||||
apply = x:
|
|
||||||
if x != [] then
|
|
||||||
lib.warn
|
|
||||||
"file.*.exclude is deprecated in favor of file.*.filters"
|
|
||||||
x
|
|
||||||
else
|
|
||||||
x;
|
|
||||||
description = ''
|
|
||||||
DEPRECATED, use `filters`.
|
|
||||||
'';
|
|
||||||
type = lib.types.listOf lib.types.str;
|
|
||||||
default = [];
|
|
||||||
example = [".git"];
|
|
||||||
};
|
|
||||||
filters = lib.mkOption {
|
|
||||||
type = lib.types.listOf filter;
|
|
||||||
default = [];
|
|
||||||
example = [
|
|
||||||
{
|
|
||||||
type = "include";
|
|
||||||
pattern = "*.nix";
|
|
||||||
}
|
|
||||||
{
|
|
||||||
type = "include";
|
|
||||||
pattern = "*/";
|
|
||||||
}
|
|
||||||
{
|
|
||||||
type = "exclude";
|
|
||||||
pattern = "*";
|
|
||||||
}
|
|
||||||
];
|
|
||||||
};
|
|
||||||
deleteExcluded = lib.mkOption {
|
|
||||||
default = true;
|
|
||||||
type = lib.types.bool;
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
git = lib.types.submodule {
|
git = lib.types.submodule {
|
||||||
|
@ -145,20 +81,12 @@
|
||||||
type = lib.types.listOf lib.types.str;
|
type = lib.types.listOf lib.types.str;
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
fetchAlways = lib.mkOption {
|
|
||||||
type = lib.types.bool;
|
|
||||||
default = false;
|
|
||||||
};
|
|
||||||
ref = lib.mkOption {
|
ref = lib.mkOption {
|
||||||
type = lib.types.str; # TODO lib.types.git.ref
|
type = lib.types.str; # TODO lib.types.git.ref
|
||||||
};
|
};
|
||||||
url = lib.mkOption {
|
url = lib.mkOption {
|
||||||
type = lib.types.str; # TODO lib.types.git.url
|
type = lib.types.str; # TODO lib.types.git.url
|
||||||
};
|
};
|
||||||
shallow = lib.mkOption {
|
|
||||||
default = false;
|
|
||||||
type = lib.types.bool;
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
pass = lib.types.submodule {
|
pass = lib.types.submodule {
|
||||||
|
@ -171,21 +99,6 @@
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
passage = lib.types.submodule {
|
|
||||||
options = {
|
|
||||||
age = lib.mkOption {
|
|
||||||
default = "age";
|
|
||||||
type = lib.types.pathname;
|
|
||||||
};
|
|
||||||
dir = lib.mkOption {
|
|
||||||
type = lib.types.pathname;
|
|
||||||
};
|
|
||||||
identities_file = lib.mkOption {
|
|
||||||
default = toString ~/.passage/identities;
|
|
||||||
type = lib.types.pathname;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
pipe = lib.types.submodule {
|
pipe = lib.types.submodule {
|
||||||
options = {
|
options = {
|
||||||
command = lib.mkOption {
|
command = lib.mkOption {
|
||||||
|
|
|
@ -1,7 +1,15 @@
|
||||||
{ overlays ? [], ... }@args:
|
{ overlays ? [], ... }@args:
|
||||||
|
|
||||||
|
let
|
||||||
|
nix-writers = builtins.fetchGit {
|
||||||
|
url = https://cgit.krebsco.de/nix-writers/;
|
||||||
|
rev = "c528cf970e292790b414b4c1c8c8e9d7e73b2a71";
|
||||||
|
};
|
||||||
|
in
|
||||||
|
|
||||||
import <nixpkgs> (args // {
|
import <nixpkgs> (args // {
|
||||||
overlays = [
|
overlays = overlays ++ [
|
||||||
(import ./overlay.nix)
|
(import ./overlay.nix)
|
||||||
] ++ overlays;
|
(import "${nix-writers}/pkgs")
|
||||||
|
];
|
||||||
})
|
})
|
||||||
|
|
|
@ -2,145 +2,45 @@ let
|
||||||
lib = import ../../lib;
|
lib = import ../../lib;
|
||||||
in
|
in
|
||||||
|
|
||||||
{ nix, openssh, populate, writers }: rec {
|
{ exec, nix, openssh, populate, writeDash }: rec {
|
||||||
|
|
||||||
rebuild = {
|
rebuild = args: target:
|
||||||
useNixOutputMonitor
|
exec "rebuild.${target.host}" rec {
|
||||||
}:
|
filename = "${openssh}/bin/ssh";
|
||||||
args: target:
|
argv = [
|
||||||
runShell target {}
|
filename
|
||||||
(withNixOutputMonitor target useNixOutputMonitor /* sh */ ''
|
"-l" target.user
|
||||||
NIX_PATH=${lib.escapeShellArg target.path} \
|
"-p" target.port
|
||||||
nixos-rebuild ${lib.escapeShellArgs args}
|
target.host
|
||||||
'');
|
"nixos-rebuild -I ${lib.escapeShellArg target.path} ${
|
||||||
|
lib.concatMapStringsSep " " lib.escapeShellArg args
|
||||||
|
}"
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
runShell = target: {
|
writeDeploy = name: { force ? false, source, target }: let
|
||||||
allocateTTY ? false
|
|
||||||
}: command:
|
|
||||||
let
|
|
||||||
command' = /* sh */ ''
|
|
||||||
${lib.optionalString target.sudo "sudo"} \
|
|
||||||
/bin/sh -c ${lib.escapeShellArg command}
|
|
||||||
'';
|
|
||||||
in
|
|
||||||
if lib.isLocalTarget target
|
|
||||||
then command'
|
|
||||||
else
|
|
||||||
writers.writeDash "krops.${target.host}.${lib.firstWord command}" ''
|
|
||||||
exec ${openssh}/bin/ssh ${lib.escapeShellArgs (lib.flatten [
|
|
||||||
(lib.mkUserPortSSHOpts target)
|
|
||||||
(if allocateTTY then "-t" else "-T")
|
|
||||||
target.extraOptions
|
|
||||||
target.host
|
|
||||||
command'
|
|
||||||
])}
|
|
||||||
'';
|
|
||||||
|
|
||||||
withNixOutputMonitor = target: mode_: command: let
|
|
||||||
mode =
|
|
||||||
lib.getAttr (lib.typeOf mode_) {
|
|
||||||
bool = lib.toJSON mode_;
|
|
||||||
string = mode_;
|
|
||||||
};
|
|
||||||
in /* sh */ ''
|
|
||||||
printf '# use nix-output-monitor: %s\n' ${lib.escapeShellArg mode} >&2
|
|
||||||
${lib.getAttr mode rec {
|
|
||||||
opportunistic = /* sh */ ''
|
|
||||||
if command -v nom >/dev/null; then
|
|
||||||
${optimistic}
|
|
||||||
else
|
|
||||||
${false}
|
|
||||||
fi
|
|
||||||
'';
|
|
||||||
optimistic = /* sh */ ''
|
|
||||||
(${command}) 2>&1 | nom
|
|
||||||
'';
|
|
||||||
pessimistic = /* sh */ ''
|
|
||||||
NIX_PATH=${lib.escapeShellArg target.path} \
|
|
||||||
nix-shell -p nix-output-monitor --run ${lib.escapeShellArg optimistic}
|
|
||||||
'';
|
|
||||||
true = /* sh */ ''
|
|
||||||
if command -v nom >/dev/null; then
|
|
||||||
${optimistic}
|
|
||||||
else
|
|
||||||
${pessimistic}
|
|
||||||
fi
|
|
||||||
'';
|
|
||||||
false = command;
|
|
||||||
}}
|
|
||||||
'';
|
|
||||||
|
|
||||||
writeCommand = name: {
|
|
||||||
command ? (targetPath: "echo ${targetPath}"),
|
|
||||||
backup ? false,
|
|
||||||
force ? false,
|
|
||||||
allocateTTY ? false,
|
|
||||||
source,
|
|
||||||
target
|
|
||||||
}: let
|
|
||||||
target' = lib.mkTarget target;
|
target' = lib.mkTarget target;
|
||||||
in
|
in
|
||||||
writers.writeDash name ''
|
writeDash name ''
|
||||||
set -efu
|
set -efu
|
||||||
${populate { inherit backup force source; target = target'; }}
|
${populate { inherit force source; target = target'; }}
|
||||||
${runShell target' { inherit allocateTTY; } (command target'.path)}
|
${rebuild ["switch"] target'}
|
||||||
'';
|
'';
|
||||||
|
|
||||||
writeDeploy = name: {
|
writeTest = name: { force ? false, source, target }: let
|
||||||
backup ? false,
|
|
||||||
buildTarget ? null,
|
|
||||||
crossDeploy ? false,
|
|
||||||
fast ? null,
|
|
||||||
force ? false,
|
|
||||||
operation ? "switch",
|
|
||||||
source,
|
|
||||||
target,
|
|
||||||
useNixOutputMonitor ? "opportunistic"
|
|
||||||
}: let
|
|
||||||
buildTarget' =
|
|
||||||
if buildTarget == null
|
|
||||||
then target'
|
|
||||||
else lib.mkTarget buildTarget;
|
|
||||||
target' = lib.mkTarget target;
|
|
||||||
in
|
|
||||||
lib.traceIf (fast != null) "writeDeploy: it's now always fast, setting the `fast` attribute is deprecated and will be removed in future" (
|
|
||||||
writers.writeDash name ''
|
|
||||||
set -efu
|
|
||||||
${lib.optionalString (buildTarget' != target')
|
|
||||||
(populate { inherit backup force source; target = buildTarget'; })}
|
|
||||||
${populate { inherit backup force source; target = target'; }}
|
|
||||||
${rebuild { inherit useNixOutputMonitor; } ([
|
|
||||||
operation
|
|
||||||
] ++ lib.optionals crossDeploy [
|
|
||||||
"--no-build-nix"
|
|
||||||
] ++ lib.optionals (buildTarget' != target') [
|
|
||||||
"--build-host" "${buildTarget'.user}@${buildTarget'.host}"
|
|
||||||
"--target-host" "${target'.user}@${target'.host}"
|
|
||||||
] ++ lib.optionals target'.sudo [
|
|
||||||
"--use-remote-sudo"
|
|
||||||
]) buildTarget'}
|
|
||||||
''
|
|
||||||
);
|
|
||||||
|
|
||||||
writeTest = name: {
|
|
||||||
backup ? false,
|
|
||||||
force ? false,
|
|
||||||
source,
|
|
||||||
target,
|
|
||||||
trace ? false
|
|
||||||
}: let
|
|
||||||
target' = lib.mkTarget target;
|
target' = lib.mkTarget target;
|
||||||
in
|
in
|
||||||
assert lib.isLocalTarget target';
|
assert lib.isLocalTarget target';
|
||||||
writers.writeDash name ''
|
writeDash name ''
|
||||||
set -efu
|
set -efu
|
||||||
${populate { inherit backup force source; target = target'; }} >&2
|
${populate { inherit force source; target = target'; }} >&2
|
||||||
NIX_PATH=${lib.escapeShellArg target'.path} \
|
NIX_PATH=${lib.escapeShellArg target'.path} \
|
||||||
${nix}/bin/nix-build \
|
${nix}/bin/nix-build \
|
||||||
-A system \
|
-A system \
|
||||||
--keep-going \
|
--keep-going \
|
||||||
--no-out-link \
|
--no-out-link \
|
||||||
${lib.optionalString trace "--show-trace"} \
|
--show-trace \
|
||||||
'<nixpkgs/nixos>'
|
'<nixpkgs/nixos>'
|
||||||
'';
|
'';
|
||||||
|
|
||||||
}
|
}
|
||||||
|
|
|
@ -1,17 +1,17 @@
|
||||||
with import ../../lib;
|
with import ../../lib;
|
||||||
with shell;
|
with shell;
|
||||||
|
|
||||||
{ coreutils, dash, findutils, git, jq, openssh, pass, passage, rsync, writers }:
|
{ coreutils, dash, findutils, git, jq, openssh, pass, rsync, writeDash }:
|
||||||
|
|
||||||
let
|
let
|
||||||
check = { force, target }: let
|
check = { force, target }: let
|
||||||
sentinelFile = "${target.path}/.populate";
|
sentinelFile = "${target.path}/.populate";
|
||||||
in runShell target /* sh */ ''
|
in shell' target /* sh */ ''
|
||||||
${optionalString force /* sh */ ''
|
${optionalString force /* sh */ ''
|
||||||
mkdir -vp ${quote (dirOf sentinelFile)} >&2
|
mkdir -vp ${quote (dirOf sentinelFile)} >&2
|
||||||
touch ${quote sentinelFile}
|
touch ${quote sentinelFile}
|
||||||
''}
|
''}
|
||||||
if ! test -e ${quote sentinelFile}; then
|
if ! test -f ${quote sentinelFile}; then
|
||||||
>&2 printf 'error: missing sentinel file: %s\n' ${quote (
|
>&2 printf 'error: missing sentinel file: %s\n' ${quote (
|
||||||
optionalString (!isLocalTarget target) "${target.host}:" +
|
optionalString (!isLocalTarget target) "${target.host}:" +
|
||||||
sentinelFile
|
sentinelFile
|
||||||
|
@ -20,60 +20,20 @@ let
|
||||||
fi
|
fi
|
||||||
'';
|
'';
|
||||||
|
|
||||||
do-backup = { target }: let
|
pop.derivation = target: source: shell' target /* sh */ ''
|
||||||
sentinelFile = "${target.path}/.populate";
|
|
||||||
in
|
|
||||||
runShell target /* sh */ ''
|
|
||||||
if ! test -d ${quote sentinelFile}; then
|
|
||||||
>&2 printf 'error" sentinel file is not a directory: %s\n' ${quote (
|
|
||||||
optionalString (!isLocalTarget target) "${target.host}:" +
|
|
||||||
sentinelFile
|
|
||||||
)}
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
rsync >&2 \
|
|
||||||
-aAXF \
|
|
||||||
--delete \
|
|
||||||
--exclude /.populate \
|
|
||||||
--link-dest=${quote target.path} \
|
|
||||||
${target.path}/ \
|
|
||||||
${target.path}/.populate/backup/
|
|
||||||
'';
|
|
||||||
|
|
||||||
pop.derivation = target: source: runShell target /* sh */ ''
|
|
||||||
nix-build -E ${quote source.text} -o ${quote target.path} >&2
|
nix-build -E ${quote source.text} -o ${quote target.path} >&2
|
||||||
'';
|
'';
|
||||||
|
|
||||||
pop.file = target: source: let
|
pop.file = target: source: let
|
||||||
config = rsyncDefaultConfig // derivedConfig // sourceConfig;
|
configAttrs = ["useChecksum"];
|
||||||
derivedConfig = {
|
config = filterAttrs (name: _: elem name configAttrs) source;
|
||||||
useChecksum =
|
|
||||||
if isStorePath source.path
|
|
||||||
then true
|
|
||||||
else rsyncDefaultConfig.useChecksum;
|
|
||||||
};
|
|
||||||
sourceConfig =
|
|
||||||
filterAttrs (name: _: elem name (attrNames rsyncDefaultConfig)) source;
|
|
||||||
sourcePath =
|
|
||||||
if isStorePath source.path
|
|
||||||
then quote (toString source.path)
|
|
||||||
else quote source.path;
|
|
||||||
in
|
in
|
||||||
rsync' target config sourcePath;
|
rsync' target config (quote source.path);
|
||||||
|
|
||||||
pop.git = target: source: runShell target /* sh */ ''
|
pop.git = target: source: shell' target /* sh */ ''
|
||||||
set -efu
|
set -efu
|
||||||
# Remove target path if it doesn't look like a git worktree.
|
|
||||||
# This can happen e.g. when it had a different type earlier.
|
|
||||||
if ! test -e ${quote target.path}/.git; then
|
|
||||||
rm -fR ${quote target.path}
|
|
||||||
fi
|
|
||||||
if ! test -e ${quote target.path}; then
|
if ! test -e ${quote target.path}; then
|
||||||
${if source.shallow then /* sh */ ''
|
git clone --recurse-submodules ${quote source.url} ${quote target.path}
|
||||||
git init ${quote target.path}
|
|
||||||
'' else /* sh */ ''
|
|
||||||
git clone --recurse-submodules ${quote source.url} ${quote target.path}
|
|
||||||
''}
|
|
||||||
fi
|
fi
|
||||||
cd ${quote target.path}
|
cd ${quote target.path}
|
||||||
if ! url=$(git config remote.origin.url); then
|
if ! url=$(git config remote.origin.url); then
|
||||||
|
@ -86,21 +46,9 @@ let
|
||||||
hash=${quote source.ref}
|
hash=${quote source.ref}
|
||||||
|
|
||||||
if ! test "$(git log --format=%H -1)" = "$hash"; then
|
if ! test "$(git log --format=%H -1)" = "$hash"; then
|
||||||
${if source.fetchAlways then /* sh */ ''
|
if ! git log -1 "$hash" >/dev/null 2>&1; then
|
||||||
${if source.shallow then /* sh */ ''
|
git fetch origin
|
||||||
git fetch --depth=1 origin "$hash"
|
fi
|
||||||
'' else /* sh */ ''
|
|
||||||
git fetch origin
|
|
||||||
''}
|
|
||||||
'' else /* sh */ ''
|
|
||||||
if ! git log -1 "$hash" >/dev/null 2>&1; then
|
|
||||||
${if source.shallow then /* sh */ ''
|
|
||||||
git fetch --depth=1 origin "$hash"
|
|
||||||
'' else /* sh */ ''
|
|
||||||
git fetch origin
|
|
||||||
''}
|
|
||||||
fi
|
|
||||||
''}
|
|
||||||
git reset --hard "$hash" >&2
|
git reset --hard "$hash" >&2
|
||||||
git submodule update --init --recursive
|
git submodule update --init --recursive
|
||||||
fi
|
fi
|
||||||
|
@ -119,16 +67,8 @@ let
|
||||||
umask 0077
|
umask 0077
|
||||||
|
|
||||||
if test -e ${quote source.dir}/.git; then
|
if test -e ${quote source.dir}/.git; then
|
||||||
local_pass_info=${quote source.name}\ $(
|
local_pass_info=${quote source.name}\ $(${git}/bin/git -C ${quote source.dir} log -1 --format=%H ${quote source.name})
|
||||||
${git}/bin/git -C ${quote source.dir} log -1 --format=%H ${quote source.name}
|
remote_pass_info=$(${shell' target /* sh */ ''
|
||||||
# we append a hash for every symlink, otherwise we would miss updates on
|
|
||||||
# files where the symlink points to
|
|
||||||
${findutils}/bin/find ${quote source.dir}/${quote source.name} -type l \
|
|
||||||
-exec ${coreutils}/bin/realpath {} + |
|
|
||||||
${coreutils}/bin/sort |
|
|
||||||
${findutils}/bin/xargs -r -n 1 ${git}/bin/git -C ${quote source.dir} log -1 --format=%H
|
|
||||||
)
|
|
||||||
remote_pass_info=$(${runShell target /* sh */ ''
|
|
||||||
cat ${quote target.path}/.pass_info || :
|
cat ${quote target.path}/.pass_info || :
|
||||||
''})
|
''})
|
||||||
|
|
||||||
|
@ -143,80 +83,45 @@ let
|
||||||
rm -fR "$tmp_dir"
|
rm -fR "$tmp_dir"
|
||||||
}
|
}
|
||||||
|
|
||||||
${findutils}/bin/find ${quote passPrefix} -type f -follow ! -name .gpg-id |
|
${findutils}/bin/find ${quote passPrefix} -type f |
|
||||||
while read -r gpg_path; do
|
while read -r gpg_path; do
|
||||||
|
|
||||||
rel_name=''${gpg_path#${quote passPrefix}}
|
rel_name=''${gpg_path#${quote passPrefix}}
|
||||||
rel_name=''${rel_name%.gpg}
|
rel_name=''${rel_name%.gpg}
|
||||||
|
|
||||||
pass_date=$(
|
pass_date=$(
|
||||||
if test -e ${quote source.dir}/.git; then
|
${git}/bin/git -C ${quote source.dir} log -1 --format=%aI "$gpg_path"
|
||||||
${git}/bin/git -C ${quote source.dir} log -1 --format=%aI "$gpg_path"
|
|
||||||
fi
|
|
||||||
)
|
)
|
||||||
pass_name=${quote source.name}/$rel_name
|
pass_name=${quote source.name}/$rel_name
|
||||||
tmp_path=$tmp_dir/$rel_name
|
tmp_path=$tmp_dir/$rel_name
|
||||||
|
|
||||||
${coreutils}/bin/mkdir -p "$(${coreutils}/bin/dirname "$tmp_path")"
|
${coreutils}/bin/mkdir -p "$(${coreutils}/bin/dirname "$tmp_path")"
|
||||||
PASSWORD_STORE_DIR=${quote source.dir} ${pass}/bin/pass show "$pass_name" > "$tmp_path"
|
PASSWORD_STORE_DIR=${quote source.dir} ${pass}/bin/pass show "$pass_name" > "$tmp_path"
|
||||||
if [ -n "$pass_date" ]; then
|
${coreutils}/bin/touch -d "$pass_date" "$tmp_path"
|
||||||
${coreutils}/bin/touch -d "$pass_date" "$tmp_path"
|
|
||||||
fi
|
|
||||||
done
|
done
|
||||||
|
|
||||||
if test -n "''${local_pass_info-}"; then
|
if test -n "''${local_pass_info-}"; then
|
||||||
echo "$local_pass_info" > "$tmp_dir"/.pass_info
|
echo "$local_pass_info" > "$tmp_dir"/.pass_info
|
||||||
fi
|
fi
|
||||||
|
|
||||||
${rsync' target rsyncDefaultConfig /* sh */ "$tmp_dir"}
|
${rsync' target {} /* sh */ "$tmp_dir"}
|
||||||
'';
|
|
||||||
|
|
||||||
pop.passage = target: source: /* sh */ ''
|
|
||||||
set -efu
|
|
||||||
|
|
||||||
export PASSAGE_AGE=${quote source.age}
|
|
||||||
export PASSAGE_DIR=${quote source.dir}
|
|
||||||
export PASSAGE_IDENTITIES_FILE=${quote source.identities_file}
|
|
||||||
|
|
||||||
umask 0077
|
|
||||||
|
|
||||||
tmp_dir=$(${coreutils}/bin/mktemp -dt populate-passage.XXXXXXXX)
|
|
||||||
trap cleanup EXIT
|
|
||||||
cleanup() {
|
|
||||||
rm -fR "$tmp_dir"
|
|
||||||
}
|
|
||||||
|
|
||||||
${findutils}/bin/find "$PASSAGE_DIR" -type f -name \*.age -follow |
|
|
||||||
while read -r age_path; do
|
|
||||||
|
|
||||||
rel_name=''${age_path#$PASSAGE_DIR}
|
|
||||||
rel_name=''${rel_name%.age}
|
|
||||||
|
|
||||||
tmp_path=$tmp_dir/$rel_name
|
|
||||||
|
|
||||||
${coreutils}/bin/mkdir -p "$(${coreutils}/bin/dirname "$tmp_path")"
|
|
||||||
${passage}/bin/passage show "$rel_name" > "$tmp_path"
|
|
||||||
${coreutils}/bin/touch -r "$age_path" "$tmp_path"
|
|
||||||
done
|
|
||||||
|
|
||||||
${rsync' target rsyncDefaultConfig /* sh */ "$tmp_dir"}
|
|
||||||
'';
|
'';
|
||||||
|
|
||||||
pop.pipe = target: source: /* sh */ ''
|
pop.pipe = target: source: /* sh */ ''
|
||||||
${quote source.command} | {
|
${quote source.command} | {
|
||||||
${runShell target /* sh */ "cat > ${quote target.path}"}
|
${shell' target /* sh */ "cat > ${quote target.path}"}
|
||||||
}
|
}
|
||||||
'';
|
'';
|
||||||
|
|
||||||
# TODO rm -fR instead of ln -f?
|
# TODO rm -fR instead of ln -f?
|
||||||
pop.symlink = target: source: runShell target /* sh */ ''
|
pop.symlink = target: source: shell' target /* sh */ ''
|
||||||
ln -fnsT ${quote source.target} ${quote target.path}
|
ln -fnsT ${quote source.target} ${quote target.path}
|
||||||
'';
|
'';
|
||||||
|
|
||||||
populate = target: name: source: let
|
populate = target: name: source: let
|
||||||
source' = source.${source.type};
|
source' = source.${source.type};
|
||||||
target' = target // { path = "${target.path}/${name}"; };
|
target' = target // { path = "${target.path}/${name}"; };
|
||||||
in writers.writeDash "populate.${target'.host}.${name}" ''
|
in writeDash "populate.${target'.host}.${name}" ''
|
||||||
set -efu
|
set -efu
|
||||||
${pop.${source.type} target' source'}
|
${pop.${source.type} target' source'}
|
||||||
'';
|
'';
|
||||||
|
@ -227,59 +132,39 @@ let
|
||||||
source_path=$source_path/
|
source_path=$source_path/
|
||||||
fi
|
fi
|
||||||
${rsync}/bin/rsync \
|
${rsync}/bin/rsync \
|
||||||
${optionalString config.useChecksum /* sh */ "--checksum"} \
|
${optionalString (config.useChecksum or false) /* sh */ "--checksum"} \
|
||||||
${optionalString target.sudo /* sh */ "--rsync-path=\"sudo rsync\""} \
|
|
||||||
${concatMapStringsSep " "
|
|
||||||
(pattern: /* sh */ "--exclude ${quote pattern}")
|
|
||||||
config.exclude} \
|
|
||||||
${concatMapStringsSep " "
|
|
||||||
(filter: /* sh */ "--${filter.type} ${quote filter.pattern}")
|
|
||||||
config.filters} \
|
|
||||||
-e ${quote (ssh' target)} \
|
-e ${quote (ssh' target)} \
|
||||||
-vFrlptD \
|
-vFrlptD \
|
||||||
${optionalString config.deleteExcluded /* sh */ "--delete-excluded"} \
|
--delete-excluded \
|
||||||
"$source_path" \
|
"$source_path" \
|
||||||
${quote (
|
${quote (
|
||||||
optionalString (!isLocalTarget target) (
|
optionalString (!isLocalTarget target)
|
||||||
(optionalString (target.user != "") "${target.user}@") +
|
"${target.user}@${target.host}:" +
|
||||||
"${target.host}:"
|
|
||||||
) +
|
|
||||||
target.path
|
target.path
|
||||||
)} \
|
)} \
|
||||||
>&2
|
>&2
|
||||||
'';
|
'';
|
||||||
|
|
||||||
rsyncDefaultConfig = {
|
shell' = target: script:
|
||||||
useChecksum = false;
|
|
||||||
exclude = [];
|
|
||||||
filters = [];
|
|
||||||
deleteExcluded = true;
|
|
||||||
};
|
|
||||||
|
|
||||||
runShell = target: command:
|
|
||||||
if isLocalTarget target
|
if isLocalTarget target
|
||||||
then command
|
then script
|
||||||
else
|
else /* sh */ ''
|
||||||
if target.sudo then /* sh */ ''
|
${ssh' target} ${quote target.host} ${quote script}
|
||||||
${ssh' target} ${quote target.host} ${quote "sudo bash -c ${quote command}"}
|
'';
|
||||||
'' else ''
|
|
||||||
${ssh' target} ${quote target.host} ${quote command}
|
|
||||||
'';
|
|
||||||
|
|
||||||
ssh' = target: concatMapStringsSep " " quote (flatten [
|
ssh' = target: concatMapStringsSep " " quote [
|
||||||
"${openssh}/bin/ssh"
|
"${openssh}/bin/ssh"
|
||||||
(mkUserPortSSHOpts target)
|
"-l" target.user
|
||||||
|
"-o" "ControlPersist=no"
|
||||||
|
"-p" target.port
|
||||||
"-T"
|
"-T"
|
||||||
target.extraOptions
|
];
|
||||||
]);
|
|
||||||
|
|
||||||
in
|
in
|
||||||
|
|
||||||
{ backup ? false, force ? false, source, target }:
|
{ force ? false, source, target }: writeDash "populate.${target.host}" ''
|
||||||
writers.writeDash "populate.${target.host}" ''
|
|
||||||
set -efu
|
set -efu
|
||||||
${check { inherit force target; }}
|
${check { inherit force target; }}
|
||||||
set -x
|
set -x
|
||||||
${optionalString backup (do-backup { inherit target; })}
|
|
||||||
${concatStringsSep "\n" (mapAttrsToList (populate target) source)}
|
${concatStringsSep "\n" (mapAttrsToList (populate target) source)}
|
||||||
''
|
''
|
||||||
|
|
Loading…
Reference in a new issue