1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
|
// SPDX-FileCopyrightText: 2020 Serokell <https://serokell.io/>
//
// SPDX-License-Identifier: MPL-2.0
use std::borrow::Cow;
use std::path::PathBuf;
#[macro_export]
macro_rules! good_panic {
($($tts:tt)*) => {{
error!($($tts)*);
std::process::exit(1);
}}
}
pub mod data;
pub mod deploy;
pub mod push;
#[derive(PartialEq, Debug)]
pub struct DeployFlake<'a> {
pub repo: &'a str,
pub node: Option<&'a str>,
pub profile: Option<&'a str>,
}
pub fn parse_flake(flake: &str) -> DeployFlake {
let flake_fragment_start = flake.find('#');
let (repo, maybe_fragment) = match flake_fragment_start {
Some(s) => (&flake[..s], Some(&flake[s + 1..])),
None => (flake, None),
};
let (node, profile) = match maybe_fragment {
Some(fragment) => {
let fragment_profile_start = fragment.find('.');
match fragment_profile_start {
Some(s) => (Some(&fragment[..s]), Some(&fragment[s + 1..])),
None => (Some(fragment), None),
}
}
None => (None, None),
};
DeployFlake {
repo,
node,
profile,
}
}
#[test]
fn test_parse_flake() {
assert_eq!(
parse_flake("../deploy/examples/system#example"),
DeployFlake {
repo: "../deploy/examples/system",
node: Some("example"),
profile: None
}
);
assert_eq!(
parse_flake("../deploy/examples/system#example.system"),
DeployFlake {
repo: "../deploy/examples/system",
node: Some("example"),
profile: Some("system")
}
);
assert_eq!(
parse_flake("../deploy/examples/system"),
DeployFlake {
repo: "../deploy/examples/system",
node: None,
profile: None,
}
);
}
pub struct DeployData<'a> {
pub sudo: Option<String>,
pub ssh_user: Cow<'a, str>,
pub profile_user: Cow<'a, str>,
pub profile_path: String,
pub current_exe: PathBuf,
}
pub async fn make_deploy_data<'a>(
profile_name: &str,
node_name: &str,
merged_settings: &'a data::GenericSettings,
) -> Result<DeployData<'a>, Box<dyn std::error::Error>> {
let ssh_user: Cow<str> = match &merged_settings.ssh_user {
Some(u) => u.into(),
None => whoami::username().into(),
};
let profile_user: Cow<str> = match &merged_settings.user {
Some(x) => x.into(),
None => match &merged_settings.ssh_user {
Some(x) => x.into(),
None => good_panic!(
"Neither user nor sshUser set for profile `{}` of node `{}`",
profile_name,
node_name
),
},
};
let profile_path = match &profile_user[..] {
"root" => format!("/nix/var/nix/profiles/{}", profile_name),
_ => format!(
"/nix/var/nix/profiles/per-user/{}/{}",
profile_user, profile_name
),
};
let sudo: Option<String> = match merged_settings.user {
Some(ref user) if user != &ssh_user => Some(format!("sudo -u {}", user)),
_ => None,
};
let current_exe = std::env::current_exe().expect("Expected to find current executable path");
if !current_exe.starts_with("/nix/store/") {
good_panic!("The deploy binary must be in the Nix store");
}
Ok(DeployData {
sudo,
ssh_user,
profile_user,
profile_path,
current_exe,
})
}
pub fn deploy_path_to_activate_path_str(
deploy_path: &std::path::Path,
) -> Result<String, Box<dyn std::error::Error>> {
Ok(format!(
"{}/activate",
deploy_path
.parent()
.ok_or("Deploy path too short")?
.to_str()
.ok_or("Deploy path is not valid utf8")?
.to_owned()
))
}
#[test]
fn test_activate_path_generation() {
match deploy_path_to_activate_path_str(&std::path::PathBuf::from(
"/blah/blah/deploy-rs/bin/deploy",
)) {
Err(_) => panic!(""),
Ok(x) => assert_eq!(x, "/blah/blah/deploy-rs/bin/activate".to_string()),
}
}
|