fleet: remove package, module, test
deprecated and unmaintained upstream
This commit is contained in:
parent
f039bf9abc
commit
c3eefe801a
|
@ -475,7 +475,7 @@
|
||||||
nylon = 168;
|
nylon = 168;
|
||||||
#panamax = 170; # unused
|
#panamax = 170; # unused
|
||||||
exim = 172;
|
exim = 172;
|
||||||
fleet = 173;
|
#fleet = 173; # unused
|
||||||
input = 174;
|
input = 174;
|
||||||
sddm = 175;
|
sddm = 175;
|
||||||
tss = 176;
|
tss = 176;
|
||||||
|
|
|
@ -170,7 +170,6 @@
|
||||||
./services/backup/rsnapshot.nix
|
./services/backup/rsnapshot.nix
|
||||||
./services/backup/tarsnap.nix
|
./services/backup/tarsnap.nix
|
||||||
./services/backup/znapzend.nix
|
./services/backup/znapzend.nix
|
||||||
./services/cluster/fleet.nix
|
|
||||||
./services/cluster/kubernetes/default.nix
|
./services/cluster/kubernetes/default.nix
|
||||||
./services/cluster/kubernetes/dns.nix
|
./services/cluster/kubernetes/dns.nix
|
||||||
./services/cluster/kubernetes/dashboard.nix
|
./services/cluster/kubernetes/dashboard.nix
|
||||||
|
|
|
@ -1,150 +0,0 @@
|
||||||
{ config, lib, pkgs, ... }:
|
|
||||||
|
|
||||||
with lib;
|
|
||||||
|
|
||||||
let
|
|
||||||
cfg = config.services.fleet;
|
|
||||||
|
|
||||||
in {
|
|
||||||
|
|
||||||
##### Interface
|
|
||||||
options.services.fleet = {
|
|
||||||
enable = mkOption {
|
|
||||||
type = types.bool;
|
|
||||||
default = false;
|
|
||||||
description = ''
|
|
||||||
Whether to enable fleet service.
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
listen = mkOption {
|
|
||||||
type = types.listOf types.str;
|
|
||||||
default = [ "/var/run/fleet.sock" ];
|
|
||||||
example = [ "/var/run/fleet.sock" "127.0.0.1:49153" ];
|
|
||||||
description = ''
|
|
||||||
Fleet listening addresses.
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
etcdServers = mkOption {
|
|
||||||
type = types.listOf types.str;
|
|
||||||
default = [ "http://127.0.0.1:2379" ];
|
|
||||||
description = ''
|
|
||||||
Fleet list of etcd endpoints to use.
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
publicIp = mkOption {
|
|
||||||
type = types.nullOr types.str;
|
|
||||||
default = "";
|
|
||||||
description = ''
|
|
||||||
Fleet IP address that should be published with the local Machine's
|
|
||||||
state and any socket information. If not set, fleetd will attempt
|
|
||||||
to detect the IP it should publish based on the machine's IP
|
|
||||||
routing information.
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
etcdCafile = mkOption {
|
|
||||||
type = types.nullOr types.path;
|
|
||||||
default = null;
|
|
||||||
description = ''
|
|
||||||
Fleet TLS ca file when SSL certificate authentication is enabled
|
|
||||||
in etcd endpoints.
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
etcdKeyfile = mkOption {
|
|
||||||
type = types.nullOr types.path;
|
|
||||||
default = null;
|
|
||||||
description = ''
|
|
||||||
Fleet TLS key file when SSL certificate authentication is enabled
|
|
||||||
in etcd endpoints.
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
etcdCertfile = mkOption {
|
|
||||||
type = types.nullOr types.path;
|
|
||||||
default = null;
|
|
||||||
description = ''
|
|
||||||
Fleet TLS cert file when SSL certificate authentication is enabled
|
|
||||||
in etcd endpoints.
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
metadata = mkOption {
|
|
||||||
type = types.attrsOf types.str;
|
|
||||||
default = {};
|
|
||||||
apply = attrs: concatMapStringsSep "," (n: "${n}=${attrs."${n}"}") (attrNames attrs);
|
|
||||||
example = literalExample ''
|
|
||||||
{
|
|
||||||
region = "us-west";
|
|
||||||
az = "us-west-1";
|
|
||||||
}
|
|
||||||
'';
|
|
||||||
description = ''
|
|
||||||
Key/value pairs that are published with the local to the fleet registry.
|
|
||||||
This data can be used directly by a client of fleet to make scheduling decisions.
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
extraConfig = mkOption {
|
|
||||||
type = types.attrsOf types.str;
|
|
||||||
apply = mapAttrs' (n: v: nameValuePair ("FLEET_" + n) v);
|
|
||||||
default = {};
|
|
||||||
example = literalExample ''
|
|
||||||
{
|
|
||||||
VERBOSITY = 1;
|
|
||||||
ETCD_REQUEST_TIMEOUT = "2.0";
|
|
||||||
AGENT_TTL = "40s";
|
|
||||||
}
|
|
||||||
'';
|
|
||||||
description = ''
|
|
||||||
Fleet extra config. See
|
|
||||||
<link xlink:href="https://github.com/coreos/fleet/blob/master/Documentation/deployment-and-configuration.md"/>
|
|
||||||
for configuration options.
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
|
|
||||||
};
|
|
||||||
|
|
||||||
##### Implementation
|
|
||||||
config = mkIf cfg.enable {
|
|
||||||
systemd.services.fleet = {
|
|
||||||
description = "Fleet Init System Daemon";
|
|
||||||
wantedBy = [ "multi-user.target" ];
|
|
||||||
after = [ "network.target" "fleet.socket" "etcd.service" "docker.service" ];
|
|
||||||
requires = [ "fleet.socket" ];
|
|
||||||
environment = {
|
|
||||||
FLEET_ETCD_SERVERS = concatStringsSep "," cfg.etcdServers;
|
|
||||||
FLEET_PUBLIC_IP = cfg.publicIp;
|
|
||||||
FLEET_ETCD_CAFILE = cfg.etcdCafile;
|
|
||||||
FLEET_ETCD_KEYFILE = cfg.etcdKeyfile;
|
|
||||||
FLEET_ETCD_CERTFILE = cfg.etcdCertfile;
|
|
||||||
FLEET_METADATA = cfg.metadata;
|
|
||||||
} // cfg.extraConfig;
|
|
||||||
serviceConfig = {
|
|
||||||
ExecStart = "${pkgs.fleet}/bin/fleetd";
|
|
||||||
Group = "fleet";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
systemd.sockets.fleet = {
|
|
||||||
description = "Fleet Socket for the API";
|
|
||||||
wantedBy = [ "sockets.target" ];
|
|
||||||
listenStreams = cfg.listen;
|
|
||||||
socketConfig = {
|
|
||||||
ListenStream = "/var/run/fleet.sock";
|
|
||||||
SocketMode = "0660";
|
|
||||||
SocketUser = "root";
|
|
||||||
SocketGroup = "fleet";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
services.etcd.enable = mkDefault true;
|
|
||||||
virtualisation.docker.enable = mkDefault true;
|
|
||||||
|
|
||||||
environment.systemPackages = [ pkgs.fleet ];
|
|
||||||
users.extraGroups.fleet.gid = config.ids.gids.fleet;
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -284,7 +284,6 @@ in rec {
|
||||||
tests.ferm = callTest tests/ferm.nix {};
|
tests.ferm = callTest tests/ferm.nix {};
|
||||||
tests.firefox = callTest tests/firefox.nix {};
|
tests.firefox = callTest tests/firefox.nix {};
|
||||||
tests.firewall = callTest tests/firewall.nix {};
|
tests.firewall = callTest tests/firewall.nix {};
|
||||||
tests.fleet = callTestOnMatchingSystems ["x86_64-linux"] tests/fleet.nix {};
|
|
||||||
tests.fwupd = callTest tests/fwupd.nix {};
|
tests.fwupd = callTest tests/fwupd.nix {};
|
||||||
#tests.gitlab = callTest tests/gitlab.nix {};
|
#tests.gitlab = callTest tests/gitlab.nix {};
|
||||||
tests.gitolite = callTest tests/gitolite.nix {};
|
tests.gitolite = callTest tests/gitolite.nix {};
|
||||||
|
|
|
@ -1,76 +0,0 @@
|
||||||
import ./make-test.nix ({ pkgs, ...} : rec {
|
|
||||||
name = "simple";
|
|
||||||
meta = with pkgs.stdenv.lib.maintainers; {
|
|
||||||
maintainers = [ offline ];
|
|
||||||
};
|
|
||||||
|
|
||||||
nodes = {
|
|
||||||
node1 =
|
|
||||||
{ config, pkgs, ... }:
|
|
||||||
{
|
|
||||||
services = {
|
|
||||||
etcd = {
|
|
||||||
enable = true;
|
|
||||||
listenPeerUrls = ["http://0.0.0.0:7001"];
|
|
||||||
initialAdvertisePeerUrls = ["http://node1:7001"];
|
|
||||||
initialCluster = ["node1=http://node1:7001" "node2=http://node2:7001"];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
services.fleet = {
|
|
||||||
enable = true;
|
|
||||||
metadata.name = "node1";
|
|
||||||
};
|
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [ 7001 ];
|
|
||||||
};
|
|
||||||
|
|
||||||
node2 =
|
|
||||||
{ config, pkgs, ... }:
|
|
||||||
{
|
|
||||||
services = {
|
|
||||||
etcd = {
|
|
||||||
enable = true;
|
|
||||||
listenPeerUrls = ["http://0.0.0.0:7001"];
|
|
||||||
initialAdvertisePeerUrls = ["http://node2:7001"];
|
|
||||||
initialCluster = ["node1=http://node1:7001" "node2=http://node2:7001"];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
services.fleet = {
|
|
||||||
enable = true;
|
|
||||||
metadata.name = "node2";
|
|
||||||
};
|
|
||||||
|
|
||||||
networking.firewall.allowedTCPPorts = [ 7001 ];
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
service = builtins.toFile "hello.service" ''
|
|
||||||
[Unit]
|
|
||||||
Description=Hello World
|
|
||||||
|
|
||||||
[Service]
|
|
||||||
ExecStart=/bin/sh -c "while true; do echo \"Hello, world\"; /var/run/current-system/sw/bin/sleep 1; done"
|
|
||||||
|
|
||||||
[X-Fleet]
|
|
||||||
MachineMetadata=name=node2
|
|
||||||
'';
|
|
||||||
|
|
||||||
testScript =
|
|
||||||
''
|
|
||||||
startAll;
|
|
||||||
$node1->waitForUnit("fleet.service");
|
|
||||||
$node2->waitForUnit("fleet.service");
|
|
||||||
|
|
||||||
$node2->waitUntilSucceeds("fleetctl list-machines | grep node1");
|
|
||||||
$node1->waitUntilSucceeds("fleetctl list-machines | grep node2");
|
|
||||||
|
|
||||||
$node1->succeed("cp ${service} hello.service && fleetctl submit hello.service");
|
|
||||||
$node1->succeed("fleetctl list-unit-files | grep hello");
|
|
||||||
$node1->succeed("fleetctl start hello.service");
|
|
||||||
$node1->waitUntilSucceeds("fleetctl list-units | grep running");
|
|
||||||
$node1->succeed("fleetctl stop hello.service");
|
|
||||||
$node1->succeed("fleetctl destroy hello.service");
|
|
||||||
'';
|
|
||||||
})
|
|
|
@ -1,37 +0,0 @@
|
||||||
{ stdenv, lib, go, fetchFromGitHub }:
|
|
||||||
|
|
||||||
stdenv.mkDerivation rec {
|
|
||||||
name = "fleet-${version}";
|
|
||||||
version = "1.0.0";
|
|
||||||
|
|
||||||
src = fetchFromGitHub {
|
|
||||||
owner = "coreos";
|
|
||||||
repo = "fleet";
|
|
||||||
rev = "v${version}";
|
|
||||||
sha256 = "0j48ajz19aqfzv9iyznnn39aw51y1nqcl270grmvi5cbqycmrfm0";
|
|
||||||
};
|
|
||||||
|
|
||||||
buildInputs = [ go ];
|
|
||||||
|
|
||||||
buildPhase = ''
|
|
||||||
patchShebangs build
|
|
||||||
./build
|
|
||||||
'';
|
|
||||||
|
|
||||||
installPhase = ''
|
|
||||||
mkdir -p $out
|
|
||||||
mv bin $out
|
|
||||||
'';
|
|
||||||
|
|
||||||
meta = with stdenv.lib; {
|
|
||||||
description = "A distributed init system";
|
|
||||||
homepage = https://coreos.com/using-coreos/clustering/;
|
|
||||||
license = licenses.asl20;
|
|
||||||
maintainers = with maintainers; [
|
|
||||||
cstrahan
|
|
||||||
jgeerds
|
|
||||||
offline
|
|
||||||
];
|
|
||||||
platforms = platforms.unix;
|
|
||||||
};
|
|
||||||
}
|
|
|
@ -12407,8 +12407,6 @@ with pkgs;
|
||||||
firebird = callPackage ../servers/firebird { icu = null; stdenv = overrideCC stdenv gcc5; };
|
firebird = callPackage ../servers/firebird { icu = null; stdenv = overrideCC stdenv gcc5; };
|
||||||
firebirdSuper = callPackage ../servers/firebird { icu = icu58; superServer = true; stdenv = overrideCC stdenv gcc5; };
|
firebirdSuper = callPackage ../servers/firebird { icu = icu58; superServer = true; stdenv = overrideCC stdenv gcc5; };
|
||||||
|
|
||||||
fleet = callPackage ../servers/fleet { };
|
|
||||||
|
|
||||||
foswiki = callPackage ../servers/foswiki { };
|
foswiki = callPackage ../servers/foswiki { };
|
||||||
|
|
||||||
frab = callPackage ../servers/web-apps/frab { };
|
frab = callPackage ../servers/web-apps/frab { };
|
||||||
|
|
Loading…
Reference in a new issue