nixpkgs/nixos/modules/services/misc/etcd.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

206 lines
6.5 KiB
Nix
Raw Normal View History

{ config, lib, options, pkgs, ... }:
2014-11-15 15:27:27 +00:00
with lib;
let
cfg = config.services.etcd;
opt = options.services.etcd;
2014-11-15 15:27:27 +00:00
in {
options.services.etcd = {
enable = mkOption {
description = lib.mdDoc "Whether to enable etcd.";
2014-11-15 15:27:27 +00:00
default = false;
type = types.bool;
2014-11-15 15:27:27 +00:00
};
name = mkOption {
description = lib.mdDoc "Etcd unique node name.";
2014-11-15 15:27:27 +00:00
default = config.networking.hostName;
defaultText = literalExpression "config.networking.hostName";
2014-11-15 15:27:27 +00:00
type = types.str;
};
advertiseClientUrls = mkOption {
description = lib.mdDoc "Etcd list of this member's client URLs to advertise to the rest of the cluster.";
2014-11-15 15:27:27 +00:00
default = cfg.listenClientUrls;
defaultText = literalExpression "config.${opt.listenClientUrls}";
2014-11-15 15:27:27 +00:00
type = types.listOf types.str;
};
listenClientUrls = mkOption {
description = lib.mdDoc "Etcd list of URLs to listen on for client traffic.";
default = ["http://127.0.0.1:2379"];
2014-11-15 15:27:27 +00:00
type = types.listOf types.str;
};
listenPeerUrls = mkOption {
description = lib.mdDoc "Etcd list of URLs to listen on for peer traffic.";
default = ["http://127.0.0.1:2380"];
2014-11-15 15:27:27 +00:00
type = types.listOf types.str;
};
initialAdvertisePeerUrls = mkOption {
description = lib.mdDoc "Etcd list of this member's peer URLs to advertise to rest of the cluster.";
2014-11-15 15:27:27 +00:00
default = cfg.listenPeerUrls;
defaultText = literalExpression "config.${opt.listenPeerUrls}";
2014-11-15 15:27:27 +00:00
type = types.listOf types.str;
};
initialCluster = mkOption {
description = lib.mdDoc "Etcd initial cluster configuration for bootstrapping.";
default = ["${cfg.name}=http://127.0.0.1:2380"];
defaultText = literalExpression ''["''${config.${opt.name}}=http://127.0.0.1:2380"]'';
2014-11-15 15:27:27 +00:00
type = types.listOf types.str;
};
initialClusterState = mkOption {
description = lib.mdDoc "Etcd initial cluster configuration for bootstrapping.";
2014-11-15 15:27:27 +00:00
default = "new";
type = types.enum ["new" "existing"];
};
initialClusterToken = mkOption {
description = lib.mdDoc "Etcd initial cluster token for etcd cluster during bootstrap.";
2014-11-15 15:27:27 +00:00
default = "etcd-cluster";
type = types.str;
};
discovery = mkOption {
description = lib.mdDoc "Etcd discovery url";
2014-11-15 15:27:27 +00:00
default = "";
type = types.str;
};
clientCertAuth = mkOption {
description = lib.mdDoc "Whether to use certs for client authentication";
default = false;
type = types.bool;
};
trustedCaFile = mkOption {
description = lib.mdDoc "Certificate authority file to use for clients";
default = null;
type = types.nullOr types.path;
};
certFile = mkOption {
description = lib.mdDoc "Cert file to use for clients";
default = null;
type = types.nullOr types.path;
};
keyFile = mkOption {
description = lib.mdDoc "Key file to use for clients";
default = null;
type = types.nullOr types.path;
};
peerCertFile = mkOption {
description = lib.mdDoc "Cert file to use for peer to peer communication";
default = cfg.certFile;
defaultText = literalExpression "config.${opt.certFile}";
type = types.nullOr types.path;
};
peerKeyFile = mkOption {
description = lib.mdDoc "Key file to use for peer to peer communication";
default = cfg.keyFile;
defaultText = literalExpression "config.${opt.keyFile}";
type = types.nullOr types.path;
};
peerTrustedCaFile = mkOption {
description = lib.mdDoc "Certificate authority file to use for peer to peer communication";
default = cfg.trustedCaFile;
defaultText = literalExpression "config.${opt.trustedCaFile}";
type = types.nullOr types.path;
};
peerClientCertAuth = mkOption {
description = lib.mdDoc "Whether to check all incoming peer requests from the cluster for valid client certificates signed by the supplied CA";
default = false;
type = types.bool;
};
2014-11-15 15:27:27 +00:00
extraConf = mkOption {
description = lib.mdDoc ''
2014-11-15 15:27:27 +00:00
Etcd extra configuration. See
<https://github.com/coreos/etcd/blob/master/Documentation/op-guide/configuration.md#configuration-flags>
2014-11-15 15:27:27 +00:00
'';
type = types.attrsOf types.str;
default = {};
example = literalExpression ''
2014-11-15 15:27:27 +00:00
{
"CORS" = "*";
"NAME" = "default-name";
"MAX_RESULT_BUFFER" = "1024";
"MAX_CLUSTER_SIZE" = "9";
"MAX_RETRY_ATTEMPTS" = "3";
2014-11-15 15:27:27 +00:00
}
'';
};
dataDir = mkOption {
type = types.path;
default = "/var/lib/etcd";
description = lib.mdDoc "Etcd data directory.";
2014-11-15 15:27:27 +00:00
};
};
config = mkIf cfg.enable {
systemd.tmpfiles.rules = [
"d '${cfg.dataDir}' 0700 etcd - - -"
];
2014-11-15 15:27:27 +00:00
systemd.services.etcd = {
description = "etcd key-value store";
2014-11-15 15:27:27 +00:00
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
2014-11-15 15:27:27 +00:00
environment = (filterAttrs (n: v: v != null) {
ETCD_NAME = cfg.name;
2014-11-15 15:27:27 +00:00
ETCD_DISCOVERY = cfg.discovery;
ETCD_DATA_DIR = cfg.dataDir;
ETCD_ADVERTISE_CLIENT_URLS = concatStringsSep "," cfg.advertiseClientUrls;
ETCD_LISTEN_CLIENT_URLS = concatStringsSep "," cfg.listenClientUrls;
ETCD_LISTEN_PEER_URLS = concatStringsSep "," cfg.listenPeerUrls;
ETCD_INITIAL_ADVERTISE_PEER_URLS = concatStringsSep "," cfg.initialAdvertisePeerUrls;
ETCD_PEER_TRUSTED_CA_FILE = cfg.peerTrustedCaFile;
ETCD_PEER_CERT_FILE = cfg.peerCertFile;
ETCD_PEER_KEY_FILE = cfg.peerKeyFile;
ETCD_CLIENT_CERT_AUTH = toString cfg.peerClientCertAuth;
ETCD_TRUSTED_CA_FILE = cfg.trustedCaFile;
ETCD_CERT_FILE = cfg.certFile;
ETCD_KEY_FILE = cfg.keyFile;
}) // (optionalAttrs (cfg.discovery == ""){
2014-11-15 15:27:27 +00:00
ETCD_INITIAL_CLUSTER = concatStringsSep "," cfg.initialCluster;
ETCD_INITIAL_CLUSTER_STATE = cfg.initialClusterState;
ETCD_INITIAL_CLUSTER_TOKEN = cfg.initialClusterToken;
}) // (mapAttrs' (n: v: nameValuePair "ETCD_${n}" v) cfg.extraConf);
unitConfig = {
Documentation = "https://github.com/coreos/etcd";
};
2014-11-15 15:27:27 +00:00
serviceConfig = {
2016-03-27 02:01:00 +00:00
Type = "notify";
ExecStart = "${pkgs.etcd}/bin/etcd";
2014-11-15 15:27:27 +00:00
User = "etcd";
LimitNOFILE = 40000;
2014-11-15 15:27:27 +00:00
};
};
environment.systemPackages = [ pkgs.etcd ];
2014-11-15 15:27:27 +00:00
users.users.etcd = {
isSystemUser = true;
group = "etcd";
2014-11-15 15:27:27 +00:00
description = "Etcd daemon user";
home = cfg.dataDir;
};
users.groups.etcd = {};
2014-11-15 15:27:27 +00:00
};
}