ae359d1ef2
Fixes issues described in #208242 for this part of the nixpkgs tree. There are no behavioral changes in this, it only adjusts the code so that it is easier to understand.
141 lines
4.3 KiB
Nix
141 lines
4.3 KiB
Nix
{ config, lib, pkgs, options, ... }:
|
|
|
|
let
|
|
cfg = config.services.prometheus.exporters.pve;
|
|
inherit (lib)
|
|
mkOption
|
|
types
|
|
mkPackageOption
|
|
optionalString
|
|
optionalAttrs
|
|
;
|
|
|
|
# pve exporter requires a config file so create an empty one if configFile is not provided
|
|
emptyConfigFile = pkgs.writeTextFile {
|
|
name = "pve.yml";
|
|
text = "default:";
|
|
};
|
|
|
|
computedConfigFile = if cfg.configFile == null then emptyConfigFile else cfg.configFile;
|
|
in
|
|
{
|
|
port = 9221;
|
|
extraOpts = {
|
|
package = mkPackageOption pkgs "prometheus-pve-exporter" { };
|
|
|
|
environmentFile = mkOption {
|
|
type = with types; nullOr path;
|
|
default = null;
|
|
example = "/etc/prometheus-pve-exporter/pve.env";
|
|
description = ''
|
|
Path to the service's environment file. This path can either be a computed path in /nix/store or a path in the local filesystem.
|
|
|
|
The environment file should NOT be stored in /nix/store as it contains passwords and/or keys in plain text.
|
|
|
|
Environment reference: https://github.com/prometheus-pve/prometheus-pve-exporter#authentication
|
|
'';
|
|
};
|
|
|
|
configFile = mkOption {
|
|
type = with types; nullOr path;
|
|
default = null;
|
|
example = "/etc/prometheus-pve-exporter/pve.yml";
|
|
description = ''
|
|
Path to the service's config file. This path can either be a computed path in /nix/store or a path in the local filesystem.
|
|
|
|
The config file should NOT be stored in /nix/store as it will contain passwords and/or keys in plain text.
|
|
|
|
If both configFile and environmentFile are provided, the configFile option will be ignored.
|
|
|
|
Configuration reference: https://github.com/prometheus-pve/prometheus-pve-exporter/#authentication
|
|
'';
|
|
};
|
|
|
|
server = {
|
|
keyFile = mkOption {
|
|
type = with types; nullOr path;
|
|
default = null;
|
|
example = "/var/lib/prometheus-pve-exporter/privkey.key";
|
|
description = ''
|
|
Path to a SSL private key file for the server
|
|
'';
|
|
};
|
|
|
|
certFile = mkOption {
|
|
type = with types; nullOr path;
|
|
default = null;
|
|
example = "/var/lib/prometheus-pve-exporter/full-chain.pem";
|
|
description = ''
|
|
Path to a SSL certificate file for the server
|
|
'';
|
|
};
|
|
};
|
|
|
|
collectors = {
|
|
status = mkOption {
|
|
type = types.bool;
|
|
default = true;
|
|
description = ''
|
|
Collect Node/VM/CT status
|
|
'';
|
|
};
|
|
version = mkOption {
|
|
type = types.bool;
|
|
default = true;
|
|
description = ''
|
|
Collect PVE version info
|
|
'';
|
|
};
|
|
node = mkOption {
|
|
type = types.bool;
|
|
default = true;
|
|
description = ''
|
|
Collect PVE node info
|
|
'';
|
|
};
|
|
cluster = mkOption {
|
|
type = types.bool;
|
|
default = true;
|
|
description = ''
|
|
Collect PVE cluster info
|
|
'';
|
|
};
|
|
resources = mkOption {
|
|
type = types.bool;
|
|
default = true;
|
|
description = ''
|
|
Collect PVE resources info
|
|
'';
|
|
};
|
|
config = mkOption {
|
|
type = types.bool;
|
|
default = true;
|
|
description = ''
|
|
Collect PVE onboot status
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
serviceOpts = {
|
|
serviceConfig = {
|
|
DynamicUser = cfg.environmentFile == null;
|
|
LoadCredential = "configFile:${computedConfigFile}";
|
|
ExecStart = ''
|
|
${cfg.package}/bin/pve_exporter \
|
|
--${optionalString (!cfg.collectors.status) "no-"}collector.status \
|
|
--${optionalString (!cfg.collectors.version) "no-"}collector.version \
|
|
--${optionalString (!cfg.collectors.node) "no-"}collector.node \
|
|
--${optionalString (!cfg.collectors.cluster) "no-"}collector.cluster \
|
|
--${optionalString (!cfg.collectors.resources) "no-"}collector.resources \
|
|
--${optionalString (!cfg.collectors.config) "no-"}collector.config \
|
|
${optionalString (cfg.server.keyFile != null) "--server.keyfile ${cfg.server.keyFile}"} \
|
|
${optionalString (cfg.server.certFile != null) "--server.certfile ${cfg.server.certFile}"} \
|
|
--config.file %d/configFile \
|
|
--web.listen-address ${cfg.listenAddress}:${toString cfg.port}
|
|
'';
|
|
} // optionalAttrs (cfg.environmentFile != null) {
|
|
EnvironmentFile = cfg.environmentFile;
|
|
};
|
|
};
|
|
}
|