This commit is contained in:
Chris Kruining 2025-09-18 10:37:06 +02:00
parent 781cc647ef
commit 4168001713
No known key found for this signature in database
GPG key ID: EB894A3560CCCAD2
11 changed files with 123 additions and 195 deletions

View file

@ -27,8 +27,53 @@ in
};
};
perInstance = instanceArgs: {
nixosModule = lib.modules.importApply ./roles/server.nix (instanceArgs // { inherit pkgs; });
perInstance = { instanceName, settings, machine, roles, ... }: {
nixosModule = { config, ... }: {
clan.core.vars.generators = {
k3s = {
share = false;
files = {
ip_v6 = {
deploy = false;
secret = false;
};
ip_v4 = {
deploy = false;
secret = false;
};
token = {
deploy = false;
secret = true;
};
};
runtimeInputs = with pkgs; [ pwgen ];
script = ''
echo "::1" > "$out/ip_v6"
echo "127.0.0.1" > "$out/ip_v4"
pwgen 50 1 > "$out/token"
'';
};
};
networking.firewall = {
allowedTCPPorts = [
6443 # k3s: required so that pods can reach the API server (running on port 6443 by default)
2379 # k3s, etcd clients: required if using a "High Availability Embedded etcd" configuration
2380 # k3s, etcd peers: required if using a "High Availability Embedded etcd" configuration
];
allowedUDPPorts = [
8472 # k3s, flannel: required if using multi-node for inter-node networking
];
};
services.k3s = {
enable = true;
role = "server";
token = config.clan.core.vars.generators.k3s.files.token.value;
clusterInit = true;
};
};
};
};
@ -40,8 +85,43 @@ in
options = {};
};
perInstance = instanceArgs: {
nixosModule = lib.modules.importApply ./roles/agent.nix (instanceArgs // { inherit pkgs; });
perInstance = { instanceName, settings, machine, roles, ... }: {
nixosModule = { config, ... }:
let
inherit (builtins) head pathExists readFile;
controller = head (lib.attrNames roles.controller.machines or {});
# Read the controller's ip address
ipAddressPath = "${config.clan.core.settings.directory}/vars/per-machine/${controller}/k3s/ip_v4";
ipAddress = if pathExists ipAddressPath then readFile ipAddressPath else null;
# Read the controller's token
tokenPath = "${config.clan.core.settings.directory}/vars/per-machine/${controller}/k3s/token";
token = if pathExists tokenPath then readFile tokenPath else null;
in
{
networking.firewall = {
allowedTCPPorts = [
6443 # k3s: required so that pods can reach the API server (running on port 6443 by default)
2379 # k3s, etcd clients: required if using a "High Availability Embedded etcd" configuration
2380 # k3s, etcd peers: required if using a "High Availability Embedded etcd" configuration
];
allowedUDPPorts = [
8472 # k3s, flannel: required if using multi-node for inter-node networking
];
};
services = {
k3s = {
enable = true;
role = "agent";
token = token;
serverAddr = "https://${ipAddress}:6443";
};
};
};
};
};
}

View file

@ -6,10 +6,10 @@ in
clan.modules.k3s = module;
perSystem = { ... }: {
# clan.nixosTests.k3s = {
# imports = [ ./tests/vm/default.nix ];
clan.nixosTests.k3s = {
imports = [ ./tests/vm/default.nix ];
# clan.modules."@amarth/k3s" = module;
# };
clan.modules."@amarth/k3s" = module;
};
};
}

View file

@ -1,38 +0,0 @@
{ config, lib, pkgs, roles, ... }:
let
inherit (builtins) head pathExists readFile;
controller = head (lib.attrNames roles.controller.machines or {});
# Read the controller's ip address
ipAddressPath = "${config.clan.core.settings.directory}/vars/per-machine/${controller}/k3s/ip_v4";
ipAddress = if pathExists ipAddressPath then readFile ipAddressPath else null;
# Read the controller's token
tokenPath = "${config.clan.core.settings.directory}/vars/per-machine/${controller}/k3s/token";
token = if pathExists tokenPath then readFile tokenPath else null;
in
{
config = {
networking.firewall = {
allowedTCPPorts = [
6443 # k3s: required so that pods can reach the API server (running on port 6443 by default)
2379 # k3s, etcd clients: required if using a "High Availability Embedded etcd" configuration
2380 # k3s, etcd peers: required if using a "High Availability Embedded etcd" configuration
];
allowedUDPPorts = [
8472 # k3s, flannel: required if using multi-node for inter-node networking
];
};
services = {
k3s = {
enable = true;
role = "agent";
token = token;
serverAddr = "https://${ipAddress}:6443";
};
};
};
}

View file

@ -1,51 +0,0 @@
{ config, lib, pkgs, ... }:
{
config = {
clan.core.vars.generators = {
k3s = {
share = false;
files = {
ip_v6 = {
deploy = false;
secret = false;
};
ip_v4 = {
deploy = false;
secret = false;
};
token = {
deploy = false;
secret = true;
};
};
runtimeInputs = with pkgs; [ pwgen ];
script = ''
echo "::1" > "$out/ip_v6"
echo "127.0.0.1" > "$out/ip_v4"
pwgen 50 1 > "$out/token"
'';
};
};
networking.firewall = {
allowedTCPPorts = [
6443 # k3s: required so that pods can reach the API server (running on port 6443 by default)
2379 # k3s, etcd clients: required if using a "High Availability Embedded etcd" configuration
2380 # k3s, etcd peers: required if using a "High Availability Embedded etcd" configuration
];
allowedUDPPorts = [
8472 # k3s, flannel: required if using multi-node for inter-node networking
];
};
services = {
k3s = {
enable = true;
role = "server";
token = config.clan.core.vars.generators.k3s.token.value;
clusterInit = true;
};
};
};
}

View file

@ -26,15 +26,15 @@
};
};
};
nodes = {
node1 = {};
node2 = {};
node3 = {};
};
testScript = ''
start_all()
'';
};
nodes = {
node1 = {};
node2 = {};
node3 = {};
};
testScript = ''
start_all()
'';
}