Compare commits

...
Sign in to create a new pull request.

6 commits
master ... json

Author SHA1 Message Date
4be5f3dd8b
add toml
flesh out toml

move function

restore translations for ini

source escaping rules

tests pass
2025-08-24 11:35:12 +02:00
0d3f8c0376
fix arg count 2025-08-24 11:35:12 +02:00
ae46ef757c
escape json 2025-08-24 11:35:12 +02:00
d3688f5426
use more common naming scheme 2025-08-24 11:35:12 +02:00
a0cfdffbdc
add shorthands 2025-08-24 11:35:12 +02:00
b3f77d4bb0
add json templating 2025-08-24 11:35:12 +02:00
6 changed files with 146 additions and 9 deletions

View file

@ -1,6 +1,6 @@
{
inputs.nixpkgs.url = "github:nixos/nixpkgs/nixos-unstable";
outputs = { nixpkgs, ... }@self: let
outputs = { nixpkgs, ... }: let
supportedArchitectures = [
"aarch64-darwin"
"aarch64-linux"
@ -11,12 +11,17 @@
packages = nixpkgs.lib.genAttrs supportedArchitectures (system: {
nix_templater = nixpkgs.legacyPackages.${system}.callPackage ./pkgs/nix_templater {};
});
legacyPackages = nixpkgs.lib.genAttrs supportedArchitectures (system: import ./lib.nix {
legacyPackages = nixpkgs.lib.genAttrs supportedArchitectures (system: let
pkgs = nixpkgs.legacyPackages.${system};
in import ./lib.nix {
inherit pkgs;
inherit (pkgs) lib;
nix_templater = packages.${system}.nix_templater;
});
checks = nixpkgs.lib.genAttrs supportedArchitectures (system: {
template = import ./tests/template.nix { inherit legacyPackages system nixpkgs; };
json = import ./tests/json.nix { inherit legacyPackages system nixpkgs; };
toml = import ./tests/toml.nix { inherit legacyPackages system nixpkgs; };
});
};
}

56
lib.nix
View file

@ -1,18 +1,28 @@
{ pkgs, nix_templater }:
{
pkgs,
nix_templater,
lib ? pkgs.lib,
}:
let
escapeJson = {
"\"" = ''\"'';
"\\" = ''\\'';
};
in
rec {
# placeholder to be substituted with the content of a secret file
fileContents = file: {
outPath = "<${builtins.placeholder "nix_template"}${toString file}${builtins.placeholder "nix_template"}>";
file = file;
};
# make a template with placeholders
template_text = { name, text, outPath }:
# make a template with placeholders from a text
templateText = { name, text, outPath, translations ? {} }:
pkgs.runCommand name {
textBeforeTemplate = text;
script = ''
#!/bin/sh
${nix_templater}/bin/nix_templater ${builtins.placeholder "out"}/template ${builtins.placeholder "nix_template"} "${outPath}"
${nix_templater}/bin/nix_templater ${builtins.placeholder "out"}/template ${builtins.placeholder "nix_template"} "${outPath}" '${lib.strings.toJSON translations}'
'';
passAsFile = [ "script" "textBeforeTemplate" ];
} ''
@ -21,4 +31,42 @@
cp $scriptPath $out/bin/${name}
chmod +x $out/bin/${name}
'';
# make a template with placeholders from a file
templateFromFile = { name, templateFile, outPath, translations ? {} }:
pkgs.runCommand name {
inherit templateFile;
script = ''
#!/bin/sh
${nix_templater}/bin/nix_templater ${builtins.placeholder "out"}/template ${builtins.placeholder "nix_template"} "${outPath}" '${lib.strings.toJSON translations}'
'';
passAsFile = [ "script" ];
} ''
mkdir -p $out/bin
cp $templateFile $out/template
cp $scriptPath $out/bin/${name}
chmod +x $out/bin/${name}
'';
translateFile = translations: generator: { name, value, outPath }: templateFromFile {
inherit name outPath translations;
templateFile = generator value;
};
translateText = translations: generator: { name, value, outPath }: templateText {
inherit name outPath translations;
text = generator value;
};
# escaping: https://www.json.org/json-en.html
templateJson = translateFile escapeJson (pkgs.writers.writeJSON "template.json");
# just json
templateYaml = translateFile escapeJson (pkgs.writers.writeYAML "template.yaml");
# escaping: technically also control characters (U+0000 to U+001F): https://toml.io/en/v0.3.0#string
templateToml = translateFile escapeJson (pkgs.writers.writeTOML "template.toml");
# escaping: https://git.kernel.org/pub/scm/git/git.git/tree/Documentation/config.txt?id=a54a84b333adbecf7bc4483c0e36ed5878cac17b#n47
templateIniWith = options: translateText escapeJson (lib.generators.toINI options);
templateIni = templateIniWith { };
}

View file

@ -1,10 +1,12 @@
# replace occurrences of a magic string in a template file
from json import loads
import sys
from pathlib import Path
template_file = sys.argv[1]
magic_string = sys.argv[2]
outfile = sys.argv[3]
translations = loads(sys.argv[4]) if len(sys.argv) >= 5 else {}
if Path(outfile).exists():
print(f"{outfile} already exists, aborting")
@ -26,7 +28,7 @@ while True:
]
output += template_bytes[loc : loc + magic_start]
# TODO handle errors better here
output += Path(magic_file.decode()).read_bytes()
output += Path(magic_file.decode()).read_bytes().decode().translate(str.maketrans(translations)).encode()
loc = loc + magic_start + magic_end + len(magic_string) + 1
Path(outfile).write_bytes(output)

41
tests/json.nix Normal file
View file

@ -0,0 +1,41 @@
# test injecting a secret into a json template
{ legacyPackages, system, nixpkgs }:
let
hostPkgs = nixpkgs.legacyPackages.${system};
secret_file = hostPkgs.writeText "secret" "secret\\needing\"escaping";
in (nixpkgs.lib.nixos.runTest {
inherit hostPkgs;
name = "nix_templates";
nodes.machine = {pkgs, ...}: {
config = {
systemd.services.testservice = {
wantedBy = [ "multi-user.target" ];
serviceConfig = {
Type = "oneshot";
ExecStartPre = "${legacyPackages.${system}.templateJson {
name = "test";
value = {
foo = "text";
bar = legacyPackages.${system}.fileContents secret_file;
};
outPath = "./test";
}}/bin/test";
ExecStart = pkgs.writeScript "test_file_got_templates" ''
#!/bin/sh
cat ./test | grep -q 'secret'
'';
};
};
};
};
testScript = ''
start_all()
print(machine.execute("uname -a"))
machine.wait_for_unit("multi-user.target")
print(machine.succeed("cat /test"))
print(machine.succeed("cat /test | grep -q secret"))
print(machine.succeed("cat /test | ${hostPkgs.jq}/bin/jq"))
'';
})

View file

@ -1,4 +1,4 @@
# test injecting a secret into a template
# test injecting a secret into a text template
{ legacyPackages, system, nixpkgs }:
let
# this file would usually be outside of the store
@ -14,7 +14,7 @@ in (nixpkgs.lib.nixos.runTest {
wantedBy = [ "multi-user.target" ];
serviceConfig = {
Type = "oneshot";
ExecStartPre = "${legacyPackages.${system}.template_text {
ExecStartPre = "${legacyPackages.${system}.templateText {
name = "test";
text = ''
public text

41
tests/toml.nix Normal file
View file

@ -0,0 +1,41 @@
# test injecting a secret into a toml template
{ legacyPackages, system, nixpkgs }:
let
hostPkgs = nixpkgs.legacyPackages.${system};
secret_file = hostPkgs.writeText "secret" "secret\\needing\"escaping";
in (nixpkgs.lib.nixos.runTest {
inherit hostPkgs;
name = "nix_templates";
nodes.machine = {pkgs, ...}: {
config = {
systemd.services.testservice = {
wantedBy = [ "multi-user.target" ];
serviceConfig = {
Type = "oneshot";
ExecStartPre = "${legacyPackages.${system}.templateToml {
name = "test";
value = {
foo = "text";
bar = legacyPackages.${system}.fileContents secret_file;
};
outPath = "./test";
}}/bin/test";
ExecStart = pkgs.writeScript "test_file_got_templates" ''
#!/bin/sh
cat ./test | grep -q 'secret'
'';
};
};
};
};
testScript = ''
start_all()
print(machine.execute("uname -a"))
machine.wait_for_unit("multi-user.target")
print(machine.succeed("cat /test"))
print(machine.succeed("cat /test | grep -q secret"))
# print(machine.succeed("cat /test | ${hostPkgs.jq}/bin/jq"))
'';
})