arkitekt-next 0.16.0__py3-none-any.whl → 0.17.0__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.

Potentially problematic release.


This version of arkitekt-next might be problematic. Click here for more details.

Files changed (57) hide show
  1. arkitekt_next/app/fakts.py +27 -1
  2. arkitekt_next/cli/commands/call/local.py +1 -1
  3. arkitekt_next/cli/commands/call/main.py +14 -7
  4. arkitekt_next/cli/templates/filter.py +7 -7
  5. arkitekt_next/cli/templates/simple.py +4 -1
  6. arkitekt_next/py.typed +0 -0
  7. {arkitekt_next-0.16.0.dist-info → arkitekt_next-0.17.0.dist-info}/METADATA +1 -1
  8. {arkitekt_next-0.16.0.dist-info → arkitekt_next-0.17.0.dist-info}/RECORD +11 -56
  9. arkitekt_next/__blok__.py +0 -58
  10. arkitekt_next/bloks/__init__.py +0 -1
  11. arkitekt_next/bloks/admin.py +0 -43
  12. arkitekt_next/bloks/alpaka.py +0 -139
  13. arkitekt_next/bloks/arkitekt.py +0 -55
  14. arkitekt_next/bloks/base.py +0 -217
  15. arkitekt_next/bloks/channel.py +0 -27
  16. arkitekt_next/bloks/config.py +0 -43
  17. arkitekt_next/bloks/elektro.py +0 -42
  18. arkitekt_next/bloks/fluss.py +0 -33
  19. arkitekt_next/bloks/gateway.py +0 -224
  20. arkitekt_next/bloks/internal_docker.py +0 -90
  21. arkitekt_next/bloks/kabinet.py +0 -46
  22. arkitekt_next/bloks/kraph.py +0 -45
  23. arkitekt_next/bloks/livekit.py +0 -85
  24. arkitekt_next/bloks/lok.py +0 -415
  25. arkitekt_next/bloks/lovekit.py +0 -202
  26. arkitekt_next/bloks/mikro.py +0 -42
  27. arkitekt_next/bloks/minio.py +0 -178
  28. arkitekt_next/bloks/mount.py +0 -34
  29. arkitekt_next/bloks/namegen.py +0 -34
  30. arkitekt_next/bloks/ollama.py +0 -90
  31. arkitekt_next/bloks/orkestrator.py +0 -122
  32. arkitekt_next/bloks/postgres.py +0 -134
  33. arkitekt_next/bloks/redis.py +0 -79
  34. arkitekt_next/bloks/rekuest.py +0 -30
  35. arkitekt_next/bloks/secret.py +0 -32
  36. arkitekt_next/bloks/self_signed.py +0 -91
  37. arkitekt_next/bloks/services/__init__.py +0 -27
  38. arkitekt_next/bloks/services/admin.py +0 -21
  39. arkitekt_next/bloks/services/certer.py +0 -14
  40. arkitekt_next/bloks/services/channel.py +0 -12
  41. arkitekt_next/bloks/services/config.py +0 -13
  42. arkitekt_next/bloks/services/db.py +0 -23
  43. arkitekt_next/bloks/services/gateway.py +0 -39
  44. arkitekt_next/bloks/services/livekit.py +0 -20
  45. arkitekt_next/bloks/services/lok.py +0 -24
  46. arkitekt_next/bloks/services/mount.py +0 -9
  47. arkitekt_next/bloks/services/name.py +0 -11
  48. arkitekt_next/bloks/services/ollama.py +0 -21
  49. arkitekt_next/bloks/services/redis.py +0 -19
  50. arkitekt_next/bloks/services/s3.py +0 -21
  51. arkitekt_next/bloks/services/secret.py +0 -16
  52. arkitekt_next/bloks/services/socket.py +0 -13
  53. arkitekt_next/bloks/socket.py +0 -40
  54. arkitekt_next/bloks/tailscale.py +0 -90
  55. {arkitekt_next-0.16.0.dist-info → arkitekt_next-0.17.0.dist-info}/WHEEL +0 -0
  56. {arkitekt_next-0.16.0.dist-info → arkitekt_next-0.17.0.dist-info}/entry_points.txt +0 -0
  57. {arkitekt_next-0.16.0.dist-info → arkitekt_next-0.17.0.dist-info}/licenses/LICENSE +0 -0
@@ -1,46 +0,0 @@
1
- from typing import Dict, Any
2
- import secrets
3
-
4
-
5
- from blok import blok, InitContext, ExecutionContext, Option
6
- from blok.tree import Repo, YamlFile
7
- from arkitekt_next.bloks.base import BaseArkitektService
8
-
9
-
10
- @blok("live.arkitekt.kabinet", description="a container and app management service")
11
- class KabinetBlok(BaseArkitektService):
12
- def __init__(self) -> None:
13
- self.dev = False
14
- self.host = "kabinet"
15
- self.command = "bash run-debug.sh"
16
- self.repo = "https://github.com/arkitektio/kabinet-server"
17
- self.scopes = {
18
- "kabinet_deploy": "Deploy containers",
19
- "kabinet_add_repo": "Add repositories to the database",
20
- }
21
- self.mount_repo = False
22
- self.build_repo = False
23
- self.buckets = ["media"]
24
- self.secret_key = secrets.token_hex(16)
25
- self.ensured_repos = ["jhnnsrs/ome:main", "jhnnsrs/renderer:main"]
26
- self.image = "jhnnsrs/kabinet:nightly"
27
-
28
- def get_additional_config(self):
29
- return {"ensured_repos": self.ensured_repos}
30
-
31
- def get_builder(self):
32
- return "arkitekt.generic"
33
-
34
- def build(self, context: ExecutionContext):
35
- context.docker_compose.set_nested("services", self.host, self.service)
36
-
37
- def get_additional_options(self):
38
- with_repos = Option(
39
- subcommand="repos",
40
- help="The default repos to enable for the service",
41
- default=self.secret_key,
42
- )
43
-
44
- return [
45
- with_repos,
46
- ]
@@ -1,45 +0,0 @@
1
- import click
2
- from pydantic import BaseModel
3
- from typing import Dict, Any
4
- import yaml
5
- import secrets
6
- from blok import blok, InitContext
7
-
8
- from blok import blok, InitContext, ExecutionContext, Option
9
- from blok.tree import YamlFile, Repo
10
- from arkitekt_next.bloks.base import BaseArkitektService
11
-
12
-
13
- class AccessCredentials(BaseModel):
14
- password: str
15
- username: str
16
- host: str
17
- port: str
18
- db_name: str
19
-
20
-
21
- @blok(
22
- "live.arkitekt.kraph",
23
- description="Kraph allows you to interconnect structures in a graph database",
24
- )
25
- class KraphBlok(BaseArkitektService):
26
- def __init__(self) -> None:
27
- self.dev = False
28
- self.host = "kraph"
29
- self.command = "bash run-debug.sh"
30
- self.repo = "https://github.com/arkitektio/kraph-server"
31
- self.scopes = {
32
- "kraph_read": "Read from the graph database",
33
- "mikro_write": "Write image to the database",
34
- }
35
- self.image = "jhnnsrs/kraph:nightly"
36
- self.mount_repo = False
37
- self.build_repo = False
38
- self.buckets = ["media"]
39
- self.secret_key = secrets.token_hex(16)
40
-
41
- def get_builder(self):
42
- return "arkitekt.generic"
43
-
44
- def build(self, context: ExecutionContext):
45
- context.docker_compose.set_nested("services", self.host, self.service)
@@ -1,85 +0,0 @@
1
- from typing import Dict, Any
2
- import secrets
3
-
4
- from arkitekt_next.bloks.services.gateway import GatewayService
5
- from arkitekt_next.bloks.services.livekit import LivekitService, LivekitCredentials
6
- from blok import blok, InitContext, ExecutionContext, Option
7
- from blok.tree import YamlFile, Repo
8
-
9
-
10
- @blok(LivekitService, description="a self-hosted livekit server")
11
- class LocalLiveKitBlok:
12
- def __init__(self) -> None:
13
- self.host = "livekit"
14
- self.command = ["--dev", "--bind", "0.0.0.0"]
15
- self.image = "livekit/livekit-server:latest"
16
- self.mount_repo = True
17
- self.build_repo = True
18
- self.secret_key = secrets.token_hex(16)
19
- self.ensured_repos = []
20
- self.port_range = [50000, 50030]
21
- self.api_key = "devkey"
22
- self.api_secret = "secret"
23
- self.skip = False
24
- self.api_port = 7880
25
-
26
- def preflight(self, init: InitContext, gateway: GatewayService):
27
- for key, value in init.kwargs.items():
28
- setattr(self, key, value)
29
-
30
- deps = init.dependencies
31
-
32
- if self.skip:
33
- return
34
-
35
- gateway.expose_port(7880, self.host, True)
36
- gateway.expose_port_to(7882, self.host, 7880, False)
37
-
38
- self.initialized = True
39
-
40
- def get_access(self):
41
- return LivekitCredentials(
42
- **{
43
- "api_key": self.api_key,
44
- "api_secret": self.api_secret,
45
- "host": self.host,
46
- "port": self.api_port,
47
- }
48
- )
49
-
50
- def build(self, context: ExecutionContext):
51
- if self.skip:
52
- return
53
- db_service = {
54
- "image": self.image,
55
- "command": self.command,
56
- "ports": [
57
- f"{self.port_range[0]}-{self.port_range[1]}:{self.port_range[0]}-{self.port_range[1]}",
58
- "7881:7881",
59
- ],
60
- }
61
-
62
- context.docker_compose.set_nested("services", self.host, db_service)
63
-
64
- def get_options(self):
65
- with_host = Option(
66
- subcommand="host",
67
- help="The fakts url for connection",
68
- default=self.host,
69
- )
70
- with_skip = Option(
71
- subcommand="skip",
72
- help="The fakts_next url for connection",
73
- default=False,
74
- type=bool,
75
- )
76
-
77
- return [
78
- with_host,
79
- with_skip,
80
- ]
81
-
82
- def __str__(self) -> str:
83
- return (
84
- f"LiveKitBlok(host={self.host}, command={self.command}, image={self.image})"
85
- )
@@ -1,415 +0,0 @@
1
- import click
2
-
3
- from pydantic import BaseModel
4
- from cryptography.hazmat.primitives import serialization as crypto_serialization
5
- from cryptography.hazmat.primitives.asymmetric import rsa
6
- from cryptography.hazmat.backends import default_backend as crypto_default_backend
7
- from typing import Dict, Optional
8
- from arkitekt_next.bloks.secret import SecretBlok
9
- from arkitekt_next.bloks.services.admin import AdminService
10
- from arkitekt_next.bloks.services.db import DBService
11
- from arkitekt_next.bloks.services.s3 import S3Service
12
- from arkitekt_next.bloks.services.gateway import GatewayService
13
- from arkitekt_next.bloks.services.livekit import LivekitService
14
- from arkitekt_next.bloks.services.lok import LokCredentials, LokService
15
- import yaml
16
- import secrets
17
- from dataclasses import asdict
18
-
19
- from arkitekt_next.bloks.services.redis import RedisService
20
- from blok import blok, InitContext, ExecutionContext, Option
21
- from blok.bloks.services.dns import DnsService
22
- from blok.tree import YamlFile, Repo
23
- from blok import blok, InitContext
24
-
25
-
26
- DEFAULT_ARKITEKT_URL = "http://localhost:8000"
27
-
28
-
29
- # Define a custom user type that will parse and validate the user input
30
- class UserParamType(click.ParamType):
31
- name = "user"
32
-
33
- def convert(self, value, param, ctx):
34
- if isinstance(value, dict):
35
- return value
36
- try:
37
- name, password = value.split(":")
38
- return {"username": name, "password": password}
39
- except ValueError:
40
- self.fail(
41
- f"User '{value}' is not in the correct format. It should be 'name:password'.",
42
- param,
43
- ctx,
44
- )
45
-
46
-
47
- USER = UserParamType()
48
-
49
-
50
- # Define a custom user type that will parse and validate the user input
51
- class GroupParamType(click.ParamType):
52
- name = "group"
53
-
54
- def convert(self, value, param, ctx):
55
- if isinstance(value, dict):
56
- return value
57
- try:
58
- name, description = value.split(":")
59
- return {"name": name, "description": description}
60
- except ValueError:
61
- self.fail(
62
- f"User '{value}' is not in the correct format. It should be 'name:password'.",
63
- param,
64
- ctx,
65
- )
66
-
67
-
68
- GROUP = GroupParamType()
69
-
70
-
71
- class RedeemTokenParamType(click.ParamType):
72
- name = "redeem_token"
73
-
74
- def convert(self, value, param, ctx):
75
- if isinstance(value, dict):
76
- assert "user" in value, f"scope is required {value}"
77
- assert "token" in value, f"description is required {value}"
78
- return value
79
-
80
- try:
81
- user, token = value.split(":")
82
- return {"user": user, "token": token}
83
- except ValueError:
84
- self.fail(
85
- f"RedeemToken '{value}' is not in the correct format. It should be 'username:token'.",
86
- param,
87
- ctx,
88
- )
89
-
90
-
91
- TOKEN = RedeemTokenParamType()
92
-
93
-
94
- class ScopeParamType(click.ParamType):
95
- name = "scope"
96
-
97
- def convert(self, value, param, ctx):
98
- if isinstance(value, dict):
99
- assert "scope" in value, f"scope is required {value}"
100
- assert "description" in value, f"description is required {value}"
101
- return value
102
-
103
- try:
104
- name, description = value.split(":")
105
- return {"scope": name, "description": description}
106
- except ValueError:
107
- self.fail(
108
- f"Scopes '{value}' is not in the correct format. It should be 'scope:description'.",
109
- param,
110
- ctx,
111
- )
112
-
113
-
114
- SCOPE = ScopeParamType()
115
-
116
-
117
- @blok(LokService, description="Lok is an authentication and authorization service")
118
- class LokBlok:
119
- db_name: str
120
-
121
- def __init__(self) -> None:
122
- self.db_name = "lok_db"
123
- self.mount_repo = False
124
- self.build_repo = False
125
- self.private_key = None
126
- self.public_key = None
127
- self.host = "lok"
128
- self.dev = False
129
- self.with_repo = False
130
- self.command = "bash run-debug.sh"
131
- self.repo = "https://github.com/jhnnsrs/lok-server-next"
132
- self.image = "jhnnsrs/lok_next:nightly"
133
- self.users = []
134
- self.tokens = []
135
- self.groups = []
136
- self.secret_key = secrets.token_hex(16)
137
- self.scopes = {
138
- "openid": "The open id connect scope",
139
- "read": "A generic read access",
140
- "write": "A generic write access",
141
- }
142
- self.email_service: str = "smtp"
143
- self.email_host: str = "NOT_SET"
144
- self.email_port: int = 587
145
- self.email_user: str = "NOT_SET"
146
- self.email_password: str = "NOT_SET"
147
- self.email_from: str = "NOT_SET"
148
-
149
- self.buckets = ["media"]
150
- self.key = None
151
- self.deployment_name = "default"
152
- self.token_expiry_seconds = 700000
153
- self.preformed_redeem_tokens = [secrets.token_hex(16) for i in range(80)]
154
- self.registered_tokens = {}
155
- self.local_access = None
156
- self.registered_instances = [
157
- {
158
- "identifier": "local-lok",
159
- "service": "live.arkitekt.lok",
160
- "aliases": [
161
- {
162
- "layer": "public",
163
- "kind": "relative",
164
- "path": "lok",
165
- "challenge": "ht",
166
- }
167
- ],
168
- },
169
- {
170
- "identifier": "local-datalayer",
171
- "service": "live.arkitekt.s3",
172
- "aliases": [
173
- {
174
- "layer": "public",
175
- "kind": "relative",
176
- "challenge": "minio/health/live",
177
- }
178
- ],
179
- },
180
- ]
181
-
182
- def retrieve_credentials(self) -> LokCredentials:
183
- return LokCredentials(
184
- public_key=self.public_key, key_type="RS256", issuer="lok"
185
- )
186
-
187
- def retrieve_labels(self, service_name: str, builder_name: str) -> list[str]:
188
- return [
189
- f"fakts.service={service_name}",
190
- f"fakts.builder={builder_name}",
191
- ]
192
-
193
- def retrieve_token(self, user: str = "admin") -> str:
194
- new_token = self.secret_blok.retrieve_secret()
195
- self.registered_tokens[user] = new_token
196
-
197
- return new_token
198
-
199
- def register_scopes(self, scopes_dict: Dict[str, str]) -> LokCredentials:
200
- self.scopes = self.scopes | scopes_dict
201
-
202
- def register_service_on_subpath(self, service_name: str, subpath: str, htpath: str):
203
- registered_instance = {
204
- "identifier": f"local-{service_name}",
205
- "service": service_name,
206
- "aliases": [
207
- {
208
- "layer": "public",
209
- "kind": "relative",
210
- "path": subpath,
211
- "challenge": htpath,
212
- }
213
- ],
214
- }
215
- self.registered_instances.append(registered_instance)
216
-
217
- def preflight(
218
- self,
219
- init: InitContext,
220
- gateway: GatewayService,
221
- db: DBService,
222
- redis: RedisService,
223
- admin: AdminService,
224
- secrets: SecretBlok,
225
- s3: S3Service,
226
- ):
227
- for key, value in init.kwargs.items():
228
- setattr(self, key, value)
229
-
230
- assert self.public_key, "Public key is required"
231
- assert self.private_key, "Private key is required"
232
-
233
- self.exposed_path = gateway.expose_service(
234
- "lok", 80, self.host, strip_prefix=False
235
- )
236
- self.exposed_services = {"live.arkitekt.lok": {}}
237
-
238
- gateway.expose_mapped(".well-known", 80, self.host, "lok")
239
-
240
- self.secret_blok = secrets
241
- self.postgress_access = db.register_db(self.host)
242
- self.redis_access = redis.register()
243
- self.admin_access = admin.retrieve()
244
- self.s3_access = s3.create_buckets(self.buckets)
245
- self.initialized = True
246
-
247
- def build(self, context: ExecutionContext):
248
- depends_on = []
249
-
250
- if self.redis_access.dependency:
251
- depends_on.append(self.redis_access.dependency)
252
-
253
- if self.postgress_access.dependency:
254
- depends_on.append(self.postgress_access.dependency)
255
-
256
- if self.s3_access.dependency:
257
- depends_on.append(self.s3_access.dependency)
258
-
259
- db_service = {
260
- "depends_on": depends_on,
261
- "volumes": [
262
- "./configs/lok.yaml:/workspace/config.yaml",
263
- ],
264
- }
265
-
266
- if self.mount_repo or self.dev:
267
- context.file_tree.set_nested("mounts", "lok", Repo(self.repo))
268
- db_service["volumes"].append("./mounts/lok:/workspace")
269
-
270
- if self.build_repo or self.dev:
271
- context.file_tree.set_nested("mounts", "lok", Repo(self.repo))
272
- db_service["build"] = "./mounts/lok"
273
- else:
274
- db_service["image"] = self.image
275
-
276
- db_service["command"] = self.command
277
-
278
- trusted_origins = []
279
-
280
- configuration = YamlFile(
281
- **{
282
- "db": asdict(self.postgress_access),
283
- "users": [user for user in self.users],
284
- "django": {
285
- "admin": asdict(self.admin_access),
286
- "debug": True,
287
- "hosts": ["*"],
288
- "secret_key": self.secret_key,
289
- },
290
- "redis": asdict(self.redis_access),
291
- "lok": asdict(self.retrieve_credentials()),
292
- "private_key": self.private_key,
293
- "public_key": self.public_key,
294
- "scopes": self.scopes,
295
- "redeem_tokens": [
296
- {"user": name, "token": token}
297
- for name, token in self.registered_tokens.items()
298
- ],
299
- "groups": [group for group in self.groups],
300
- "deployment": {"name": self.deployment_name},
301
- "s3": asdict(self.s3_access),
302
- "token_expire_seconds": self.token_expiry_seconds,
303
- "force_script_name": "lok",
304
- "layers": [
305
- {
306
- "identifier": "public",
307
- "kind": "public",
308
- }
309
- ],
310
- "instances": self.registered_instances,
311
- "csrf_trusted_origins": trusted_origins,
312
- "email": {
313
- "service": self.email_service,
314
- "host": self.email_host,
315
- "port": self.email_port,
316
- "user": self.email_user,
317
- "password": self.email_password,
318
- "from": self.email_from,
319
- },
320
- }
321
- )
322
-
323
- context.file_tree.set_nested("configs", "lok.yaml", configuration)
324
-
325
- context.docker_compose.set_nested("services", self.host, db_service)
326
-
327
- def get_options(self):
328
- key = rsa.generate_private_key(
329
- public_exponent=65537, key_size=2048, backend=crypto_default_backend()
330
- )
331
-
332
- private_key = key.private_bytes(
333
- crypto_serialization.Encoding.PEM,
334
- crypto_serialization.PrivateFormat.PKCS8,
335
- crypto_serialization.NoEncryption(),
336
- ).decode()
337
-
338
- public_key = (
339
- key.public_key()
340
- .public_bytes(
341
- crypto_serialization.Encoding.OpenSSH,
342
- crypto_serialization.PublicFormat.OpenSSH,
343
- )
344
- .decode()
345
- )
346
-
347
- with_dev = Option(
348
- subcommand="dev",
349
- help="Run the service in development mode",
350
- type=bool,
351
- default=self.dev,
352
- show_default=True,
353
- )
354
-
355
- with_fakts_url = Option(
356
- subcommand="db_name",
357
- help="The name of the database",
358
- default="db_name",
359
- show_default=True,
360
- )
361
- with_users = Option(
362
- subcommand="users",
363
- help="Users that should be greated by default. Format is name:password",
364
- default=["admin:admin"],
365
- multiple=True,
366
- type=USER,
367
- show_default=True,
368
- )
369
- with_groups = Option(
370
- subcommand="groups",
371
- help="Groups that should be greated by default. Format is name:description",
372
- default=["admin:admin_group"],
373
- multiple=True,
374
- type=GROUP,
375
- show_default=True,
376
- )
377
- with_public_key = Option(
378
- subcommand="public_key",
379
- help="The public key for the JWT creation",
380
- default=public_key,
381
- required=True,
382
- callback=validate_public_key,
383
- )
384
- with_private_key = Option(
385
- subcommand="private_key",
386
- help="The corresponding private key for the JWT creation",
387
- default=private_key,
388
- callback=validate_private_key,
389
- required=True,
390
- )
391
-
392
- return [
393
- with_dev,
394
- with_fakts_url,
395
- with_users,
396
- with_groups,
397
- with_private_key,
398
- with_public_key,
399
- ]
400
-
401
-
402
- def validate_public_key(ctx, param, value):
403
- if not value.startswith("ssh-rsa"):
404
- raise click.BadParameter(
405
- f"Public key must be in ssh-rsa format. Started with {value}"
406
- )
407
- return value
408
-
409
-
410
- def validate_private_key(ctx, param, value):
411
- if not value.startswith("-----BEGIN PRIVATE KEY-----"):
412
- raise click.BadParameter(
413
- f"Private key must be in PEM format. Started with {value}"
414
- )
415
- return value