provisioning/config.defaults.toml

151 lines
3.0 KiB
TOML
Raw Permalink Normal View History

feat: Complete config-driven architecture migration v2.0.0 Transform provisioning system from ENV-based to hierarchical config-driven architecture. This represents a complete system redesign with breaking changes requiring migration. ## Migration Summary - 65+ files migrated across entire codebase - 200+ ENV variables replaced with 476 config accessors - 29 syntax errors fixed across 17 files - 92% token efficiency maintained during migration ## Core Features Added ### Hierarchical Configuration System - 6-layer precedence: defaults → user → project → infra → env → runtime - Deep merge strategy with intelligent precedence rules - Multi-environment support (dev/test/prod) with auto-detection - Configuration templates for all environments ### Enhanced Interpolation Engine - Dynamic variables: {{paths.base}}, {{env.HOME}}, {{now.date}} - Git context: {{git.branch}}, {{git.commit}}, {{git.remote}} - SOPS integration: {{sops.decrypt()}} for secrets management - Path operations: {{path.join()}} for dynamic construction - Security: circular dependency detection, injection prevention ### Comprehensive Validation - Structure, path, type, semantic, and security validation - Code injection and path traversal detection - Detailed error reporting with actionable messages - Configuration health checks and warnings ## Architecture Changes ### Configuration Management (core/nulib/lib_provisioning/config/) - loader.nu: 1600+ line hierarchical config loader with validation - accessor.nu: 476 config accessor functions replacing ENV vars ### Provider System (providers/) - AWS, UpCloud, Local providers fully config-driven - Unified middleware system with standardized interfaces ### Task Services (core/nulib/taskservs/) - Kubernetes, storage, networking, registry services migrated - Template-driven configuration generation ### Cluster Management (core/nulib/clusters/) - Complete lifecycle management through configuration - Environment-specific cluster templates ## New Configuration Files - config.defaults.toml: System defaults (84 lines) - config.*.toml.example: Environment templates (400+ lines each) - Enhanced CLI: validate, env, multi-environment support ## Security Enhancements - Type-safe configuration access through validated functions - SOPS integration for encrypted secrets management - Input validation preventing injection attacks - Environment isolation and access controls ## Breaking Changes ⚠️ ENV variables no longer supported as primary configuration ⚠️ Function signatures require --config parameter ⚠️ CLI arguments and return types modified ⚠️ Provider authentication now config-driven ## Migration Path 1. Backup current environment variables 2. Copy config.user.toml.example → config.user.toml 3. Migrate ENV vars to TOML format 4. Validate: ./core/nulib/provisioning validate config 5. Test functionality with new configuration ## Validation Results ✅ Structure valid ✅ Paths valid ✅ Types valid ✅ Semantic rules valid ✅ File references valid System ready for production use with config-driven architecture. 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <noreply@anthropic.com>
2025-09-23 02:36:50 +00:00
# Default configuration for Provisioning System
# This file provides default values for all configuration options
[core]
version = "1.0.0"
name = "provisioning"
feat: Complete config-driven architecture migration v2.0.0 Transform provisioning system from ENV-based to hierarchical config-driven architecture. This represents a complete system redesign with breaking changes requiring migration. ## Migration Summary - 65+ files migrated across entire codebase - 200+ ENV variables replaced with 476 config accessors - 29 syntax errors fixed across 17 files - 92% token efficiency maintained during migration ## Core Features Added ### Hierarchical Configuration System - 6-layer precedence: defaults → user → project → infra → env → runtime - Deep merge strategy with intelligent precedence rules - Multi-environment support (dev/test/prod) with auto-detection - Configuration templates for all environments ### Enhanced Interpolation Engine - Dynamic variables: {{paths.base}}, {{env.HOME}}, {{now.date}} - Git context: {{git.branch}}, {{git.commit}}, {{git.remote}} - SOPS integration: {{sops.decrypt()}} for secrets management - Path operations: {{path.join()}} for dynamic construction - Security: circular dependency detection, injection prevention ### Comprehensive Validation - Structure, path, type, semantic, and security validation - Code injection and path traversal detection - Detailed error reporting with actionable messages - Configuration health checks and warnings ## Architecture Changes ### Configuration Management (core/nulib/lib_provisioning/config/) - loader.nu: 1600+ line hierarchical config loader with validation - accessor.nu: 476 config accessor functions replacing ENV vars ### Provider System (providers/) - AWS, UpCloud, Local providers fully config-driven - Unified middleware system with standardized interfaces ### Task Services (core/nulib/taskservs/) - Kubernetes, storage, networking, registry services migrated - Template-driven configuration generation ### Cluster Management (core/nulib/clusters/) - Complete lifecycle management through configuration - Environment-specific cluster templates ## New Configuration Files - config.defaults.toml: System defaults (84 lines) - config.*.toml.example: Environment templates (400+ lines each) - Enhanced CLI: validate, env, multi-environment support ## Security Enhancements - Type-safe configuration access through validated functions - SOPS integration for encrypted secrets management - Input validation preventing injection attacks - Environment isolation and access controls ## Breaking Changes ⚠️ ENV variables no longer supported as primary configuration ⚠️ Function signatures require --config parameter ⚠️ CLI arguments and return types modified ⚠️ Provider authentication now config-driven ## Migration Path 1. Backup current environment variables 2. Copy config.user.toml.example → config.user.toml 3. Migrate ENV vars to TOML format 4. Validate: ./core/nulib/provisioning validate config 5. Test functionality with new configuration ## Validation Results ✅ Structure valid ✅ Paths valid ✅ Types valid ✅ Semantic rules valid ✅ File references valid System ready for production use with config-driven architecture. 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <noreply@anthropic.com>
2025-09-23 02:36:50 +00:00
[paths]
generate = "generate"
run_clusters = "clusters"
run_taskservs = "taskservs"
extensions = "{{paths.base}}/.provisioning-extensions"
infra = "{{paths.base}}/infra"
feat: Complete config-driven architecture migration v2.0.0 Transform provisioning system from ENV-based to hierarchical config-driven architecture. This represents a complete system redesign with breaking changes requiring migration. ## Migration Summary - 65+ files migrated across entire codebase - 200+ ENV variables replaced with 476 config accessors - 29 syntax errors fixed across 17 files - 92% token efficiency maintained during migration ## Core Features Added ### Hierarchical Configuration System - 6-layer precedence: defaults → user → project → infra → env → runtime - Deep merge strategy with intelligent precedence rules - Multi-environment support (dev/test/prod) with auto-detection - Configuration templates for all environments ### Enhanced Interpolation Engine - Dynamic variables: {{paths.base}}, {{env.HOME}}, {{now.date}} - Git context: {{git.branch}}, {{git.commit}}, {{git.remote}} - SOPS integration: {{sops.decrypt()}} for secrets management - Path operations: {{path.join()}} for dynamic construction - Security: circular dependency detection, injection prevention ### Comprehensive Validation - Structure, path, type, semantic, and security validation - Code injection and path traversal detection - Detailed error reporting with actionable messages - Configuration health checks and warnings ## Architecture Changes ### Configuration Management (core/nulib/lib_provisioning/config/) - loader.nu: 1600+ line hierarchical config loader with validation - accessor.nu: 476 config accessor functions replacing ENV vars ### Provider System (providers/) - AWS, UpCloud, Local providers fully config-driven - Unified middleware system with standardized interfaces ### Task Services (core/nulib/taskservs/) - Kubernetes, storage, networking, registry services migrated - Template-driven configuration generation ### Cluster Management (core/nulib/clusters/) - Complete lifecycle management through configuration - Environment-specific cluster templates ## New Configuration Files - config.defaults.toml: System defaults (84 lines) - config.*.toml.example: Environment templates (400+ lines each) - Enhanced CLI: validate, env, multi-environment support ## Security Enhancements - Type-safe configuration access through validated functions - SOPS integration for encrypted secrets management - Input validation preventing injection attacks - Environment isolation and access controls ## Breaking Changes ⚠️ ENV variables no longer supported as primary configuration ⚠️ Function signatures require --config parameter ⚠️ CLI arguments and return types modified ⚠️ Provider authentication now config-driven ## Migration Path 1. Backup current environment variables 2. Copy config.user.toml.example → config.user.toml 3. Migrate ENV vars to TOML format 4. Validate: ./core/nulib/provisioning validate config 5. Test functionality with new configuration ## Validation Results ✅ Structure valid ✅ Paths valid ✅ Types valid ✅ Semantic rules valid ✅ File references valid System ready for production use with config-driven architecture. 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <noreply@anthropic.com>
2025-09-23 02:36:50 +00:00
base = "/Users/Akasha/repo-cnz/src/provisioning"
kloud = "{{paths.base}}/infra"
providers = "{{paths.base}}/providers"
taskservs = "{{paths.base}}/taskservs"
clusters = "{{paths.base}}/cluster"
resources = "{{paths.base}}/resources"
templates = "{{paths.base}}/templates"
tools = "{{paths.base}}/tools"
core = "{{paths.base}}/core"
[paths.files]
defs = "defs.toml"
req_versions = "{{paths.core}}/versions.yaml"
vars = "{{paths.base}}/vars.yaml"
feat: Complete config-driven architecture migration v2.0.0 Transform provisioning system from ENV-based to hierarchical config-driven architecture. This represents a complete system redesign with breaking changes requiring migration. ## Migration Summary - 65+ files migrated across entire codebase - 200+ ENV variables replaced with 476 config accessors - 29 syntax errors fixed across 17 files - 92% token efficiency maintained during migration ## Core Features Added ### Hierarchical Configuration System - 6-layer precedence: defaults → user → project → infra → env → runtime - Deep merge strategy with intelligent precedence rules - Multi-environment support (dev/test/prod) with auto-detection - Configuration templates for all environments ### Enhanced Interpolation Engine - Dynamic variables: {{paths.base}}, {{env.HOME}}, {{now.date}} - Git context: {{git.branch}}, {{git.commit}}, {{git.remote}} - SOPS integration: {{sops.decrypt()}} for secrets management - Path operations: {{path.join()}} for dynamic construction - Security: circular dependency detection, injection prevention ### Comprehensive Validation - Structure, path, type, semantic, and security validation - Code injection and path traversal detection - Detailed error reporting with actionable messages - Configuration health checks and warnings ## Architecture Changes ### Configuration Management (core/nulib/lib_provisioning/config/) - loader.nu: 1600+ line hierarchical config loader with validation - accessor.nu: 476 config accessor functions replacing ENV vars ### Provider System (providers/) - AWS, UpCloud, Local providers fully config-driven - Unified middleware system with standardized interfaces ### Task Services (core/nulib/taskservs/) - Kubernetes, storage, networking, registry services migrated - Template-driven configuration generation ### Cluster Management (core/nulib/clusters/) - Complete lifecycle management through configuration - Environment-specific cluster templates ## New Configuration Files - config.defaults.toml: System defaults (84 lines) - config.*.toml.example: Environment templates (400+ lines each) - Enhanced CLI: validate, env, multi-environment support ## Security Enhancements - Type-safe configuration access through validated functions - SOPS integration for encrypted secrets management - Input validation preventing injection attacks - Environment isolation and access controls ## Breaking Changes ⚠️ ENV variables no longer supported as primary configuration ⚠️ Function signatures require --config parameter ⚠️ CLI arguments and return types modified ⚠️ Provider authentication now config-driven ## Migration Path 1. Backup current environment variables 2. Copy config.user.toml.example → config.user.toml 3. Migrate ENV vars to TOML format 4. Validate: ./core/nulib/provisioning validate config 5. Test functionality with new configuration ## Validation Results ✅ Structure valid ✅ Paths valid ✅ Types valid ✅ Semantic rules valid ✅ File references valid System ready for production use with config-driven architecture. 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <noreply@anthropic.com>
2025-09-23 02:36:50 +00:00
settings = "{{paths.base}}/kcl/settings.k"
keys = "{{paths.base}}/keys.yaml"
requirements = "{{paths.base}}/requirements.yaml"
notify_icon = "{{paths.base}}/resources/icon.png"
[cache]
enabled = true
path = "{{paths.base}}/.cache/versions"
infra_cache = "{{paths.infra}}/{{infra.current}}/cache/versions"
grace_period = 86400 # 24 hours default
check_updates = false
max_cache_size = "10MB"
[http]
use_curl = false # Use curl instead of nushell's http get for API calls
[infra]
current = "default" # Current infra context
feat: Complete config-driven architecture migration v2.0.0 Transform provisioning system from ENV-based to hierarchical config-driven architecture. This represents a complete system redesign with breaking changes requiring migration. ## Migration Summary - 65+ files migrated across entire codebase - 200+ ENV variables replaced with 476 config accessors - 29 syntax errors fixed across 17 files - 92% token efficiency maintained during migration ## Core Features Added ### Hierarchical Configuration System - 6-layer precedence: defaults → user → project → infra → env → runtime - Deep merge strategy with intelligent precedence rules - Multi-environment support (dev/test/prod) with auto-detection - Configuration templates for all environments ### Enhanced Interpolation Engine - Dynamic variables: {{paths.base}}, {{env.HOME}}, {{now.date}} - Git context: {{git.branch}}, {{git.commit}}, {{git.remote}} - SOPS integration: {{sops.decrypt()}} for secrets management - Path operations: {{path.join()}} for dynamic construction - Security: circular dependency detection, injection prevention ### Comprehensive Validation - Structure, path, type, semantic, and security validation - Code injection and path traversal detection - Detailed error reporting with actionable messages - Configuration health checks and warnings ## Architecture Changes ### Configuration Management (core/nulib/lib_provisioning/config/) - loader.nu: 1600+ line hierarchical config loader with validation - accessor.nu: 476 config accessor functions replacing ENV vars ### Provider System (providers/) - AWS, UpCloud, Local providers fully config-driven - Unified middleware system with standardized interfaces ### Task Services (core/nulib/taskservs/) - Kubernetes, storage, networking, registry services migrated - Template-driven configuration generation ### Cluster Management (core/nulib/clusters/) - Complete lifecycle management through configuration - Environment-specific cluster templates ## New Configuration Files - config.defaults.toml: System defaults (84 lines) - config.*.toml.example: Environment templates (400+ lines each) - Enhanced CLI: validate, env, multi-environment support ## Security Enhancements - Type-safe configuration access through validated functions - SOPS integration for encrypted secrets management - Input validation preventing injection attacks - Environment isolation and access controls ## Breaking Changes ⚠️ ENV variables no longer supported as primary configuration ⚠️ Function signatures require --config parameter ⚠️ CLI arguments and return types modified ⚠️ Provider authentication now config-driven ## Migration Path 1. Backup current environment variables 2. Copy config.user.toml.example → config.user.toml 3. Migrate ENV vars to TOML format 4. Validate: ./core/nulib/provisioning validate config 5. Test functionality with new configuration ## Validation Results ✅ Structure valid ✅ Paths valid ✅ Types valid ✅ Semantic rules valid ✅ File references valid System ready for production use with config-driven architecture. 🤖 Generated with [Claude Code](https://claude.ai/code) Co-Authored-By: Claude <noreply@anthropic.com>
2025-09-23 02:36:50 +00:00
[debug]
enabled = false
metadata = false
check = false
remote = false
log_level = "info"
no_terminal = false
[output]
file_viewer = "less"
format = "yaml"
[sops]
use_sops = true
config_path = "{{paths.base}}/.sops.yaml"
key_search_paths = [
"{{paths.base}}/keys/age.txt",
"~/.config/sops/age/keys.txt"
]
[taskservs]
run_path = "{{paths.base}}/run/taskservs"
[clusters]
run_path = "{{paths.base}}/run/clusters"
[generation]
dir_path = "{{paths.base}}/generated"
defs_file = "defs.toml"
# Environment-specific overrides
[environments.dev]
debug.enabled = true
debug.log_level = "debug"
[environments.test]
debug.check = true
[environments.prod]
debug.enabled = false
debug.log_level = "warn"
# Provider configurations
[providers]
default = "local"
[providers.aws]
api_url = ""
auth = ""
interface = "CLI" # API or CLI
[providers.upcloud]
api_url = "https://api.upcloud.com/1.3"
auth = ""
interface = "CLI" # API or CLI
[providers.local]
api_url = ""
auth = ""
interface = "CLI" # API or CLI
# Tool Detection and Plugin Configuration
[tools]
use_kcl = false
use_kcl_plugin = false
use_tera_plugin = false
# AI Integration Configuration
[ai]
enabled = false
provider = "openai"
api_key = ""
model = "gpt-4"
timeout = 30
# SSH Configuration
[ssh]
user = ""
options = ["StrictHostKeyChecking=accept-new", "UserKnownHostsFile=/dev/null"]
timeout = 30
debug = false
# Extension System Configuration
[extensions]
path = ""
mode = "full"
profile = ""
allowed = ""
blocked = ""
custom_providers = ""
custom_taskservs = ""
# Key Management Service Configuration
[kms]
server = ""
auth_method = "certificate"
client_cert = ""
client_key = ""
ca_cert = ""
api_token = ""
username = ""
password = ""
timeout = 30
verify_ssl = true