about summary refs log tree commit diff
path: root/nixos/modules/services/misc
diff options
context:
space:
mode:
authorsuperherointj <5861043+superherointj@users.noreply.github.com>2024-01-16 20:31:49 -0300
committersuperherointj <5861043+superherointj@users.noreply.github.com>2024-01-26 16:40:11 -0300
commitcbe8e0c9809aa50a4a9c389cab2879b3f8935c0f (patch)
tree96ad2a826fc84446b7a138000a866284c7708da2 /nixos/modules/services/misc
parent29d18e8f6f78ff5782c097d019d082a978d90160 (diff)
downloadnixlib-cbe8e0c9809aa50a4a9c389cab2879b3f8935c0f.tar
nixlib-cbe8e0c9809aa50a4a9c389cab2879b3f8935c0f.tar.gz
nixlib-cbe8e0c9809aa50a4a9c389cab2879b3f8935c0f.tar.bz2
nixlib-cbe8e0c9809aa50a4a9c389cab2879b3f8935c0f.tar.lz
nixlib-cbe8e0c9809aa50a4a9c389cab2879b3f8935c0f.tar.xz
nixlib-cbe8e0c9809aa50a4a9c389cab2879b3f8935c0f.tar.zst
nixlib-cbe8e0c9809aa50a4a9c389cab2879b3f8935c0f.zip
nixos/etcd: fix etcd category from misc to databases
Diffstat (limited to 'nixos/modules/services/misc')
-rw-r--r--nixos/modules/services/misc/etcd.nix232
1 files changed, 0 insertions, 232 deletions
diff --git a/nixos/modules/services/misc/etcd.nix b/nixos/modules/services/misc/etcd.nix
deleted file mode 100644
index a5b3abdbcb59..000000000000
--- a/nixos/modules/services/misc/etcd.nix
+++ /dev/null
@@ -1,232 +0,0 @@
-{ config, lib, options, pkgs, ... }:
-
-with lib;
-
-let
-  cfg = config.services.etcd;
-  opt = options.services.etcd;
-
-in {
-
-  options.services.etcd = {
-    enable = mkOption {
-      description = lib.mdDoc "Whether to enable etcd.";
-      default = false;
-      type = types.bool;
-    };
-
-    package = mkPackageOption pkgs "etcd" { };
-
-    name = mkOption {
-      description = lib.mdDoc "Etcd unique node name.";
-      default = config.networking.hostName;
-      defaultText = literalExpression "config.networking.hostName";
-      type = types.str;
-    };
-
-    advertiseClientUrls = mkOption {
-      description = lib.mdDoc "Etcd list of this member's client URLs to advertise to the rest of the cluster.";
-      default = cfg.listenClientUrls;
-      defaultText = literalExpression "config.${opt.listenClientUrls}";
-      type = types.listOf types.str;
-    };
-
-    listenClientUrls = mkOption {
-      description = lib.mdDoc "Etcd list of URLs to listen on for client traffic.";
-      default = ["http://127.0.0.1:2379"];
-      type = types.listOf types.str;
-    };
-
-    listenPeerUrls = mkOption {
-      description = lib.mdDoc "Etcd list of URLs to listen on for peer traffic.";
-      default = ["http://127.0.0.1:2380"];
-      type = types.listOf types.str;
-    };
-
-    initialAdvertisePeerUrls = mkOption {
-      description = lib.mdDoc "Etcd list of this member's peer URLs to advertise to rest of the cluster.";
-      default = cfg.listenPeerUrls;
-      defaultText = literalExpression "config.${opt.listenPeerUrls}";
-      type = types.listOf types.str;
-    };
-
-    initialCluster = mkOption {
-      description = lib.mdDoc "Etcd initial cluster configuration for bootstrapping.";
-      default = ["${cfg.name}=http://127.0.0.1:2380"];
-      defaultText = literalExpression ''["''${config.${opt.name}}=http://127.0.0.1:2380"]'';
-      type = types.listOf types.str;
-    };
-
-    initialClusterState = mkOption {
-      description = lib.mdDoc "Etcd initial cluster configuration for bootstrapping.";
-      default = "new";
-      type = types.enum ["new" "existing"];
-    };
-
-    initialClusterToken = mkOption {
-      description = lib.mdDoc "Etcd initial cluster token for etcd cluster during bootstrap.";
-      default = "etcd-cluster";
-      type = types.str;
-    };
-
-    discovery = mkOption {
-      description = lib.mdDoc "Etcd discovery url";
-      default = "";
-      type = types.str;
-    };
-
-    clientCertAuth = mkOption {
-      description = lib.mdDoc "Whether to use certs for client authentication";
-      default = false;
-      type = types.bool;
-    };
-
-    trustedCaFile = mkOption {
-      description = lib.mdDoc "Certificate authority file to use for clients";
-      default = null;
-      type = types.nullOr types.path;
-    };
-
-    certFile = mkOption {
-      description = lib.mdDoc "Cert file to use for clients";
-      default = null;
-      type = types.nullOr types.path;
-    };
-
-    keyFile = mkOption {
-      description = lib.mdDoc "Key file to use for clients";
-      default = null;
-      type = types.nullOr types.path;
-    };
-
-    openFirewall = mkOption {
-      type = types.bool;
-      default = false;
-      description = lib.mdDoc ''
-        Open etcd ports in the firewall.
-        Ports opened:
-        - 2379/tcp for client requests
-        - 2380/tcp for peer communication
-      '';
-    };
-
-    peerCertFile = mkOption {
-      description = lib.mdDoc "Cert file to use for peer to peer communication";
-      default = cfg.certFile;
-      defaultText = literalExpression "config.${opt.certFile}";
-      type = types.nullOr types.path;
-    };
-
-    peerKeyFile = mkOption {
-      description = lib.mdDoc "Key file to use for peer to peer communication";
-      default = cfg.keyFile;
-      defaultText = literalExpression "config.${opt.keyFile}";
-      type = types.nullOr types.path;
-    };
-
-    peerTrustedCaFile = mkOption {
-      description = lib.mdDoc "Certificate authority file to use for peer to peer communication";
-      default = cfg.trustedCaFile;
-      defaultText = literalExpression "config.${opt.trustedCaFile}";
-      type = types.nullOr types.path;
-    };
-
-    peerClientCertAuth = mkOption {
-      description = lib.mdDoc "Whether to check all incoming peer requests from the cluster for valid client certificates signed by the supplied CA";
-      default = false;
-      type = types.bool;
-    };
-
-    extraConf = mkOption {
-      description = lib.mdDoc ''
-        Etcd extra configuration. See
-        <https://github.com/coreos/etcd/blob/master/Documentation/op-guide/configuration.md#configuration-flags>
-      '';
-      type = types.attrsOf types.str;
-      default = {};
-      example = literalExpression ''
-        {
-          "CORS" = "*";
-          "NAME" = "default-name";
-          "MAX_RESULT_BUFFER" = "1024";
-          "MAX_CLUSTER_SIZE" = "9";
-          "MAX_RETRY_ATTEMPTS" = "3";
-        }
-      '';
-    };
-
-    dataDir = mkOption {
-      type = types.path;
-      default = "/var/lib/etcd";
-      description = lib.mdDoc "Etcd data directory.";
-    };
-  };
-
-  config = mkIf cfg.enable {
-    systemd.tmpfiles.settings."10-etcd".${cfg.dataDir}.d = {
-      user = "etcd";
-      mode = "0700";
-    };
-
-    systemd.services.etcd = {
-      description = "etcd key-value store";
-      wantedBy = [ "multi-user.target" ];
-      after = [ "network-online.target" ]
-        ++ lib.optional config.networking.firewall.enable "firewall.service";
-      wants = [ "network-online.target" ]
-        ++ lib.optional config.networking.firewall.enable "firewall.service";
-
-      environment = (filterAttrs (n: v: v != null) {
-        ETCD_NAME = cfg.name;
-        ETCD_DISCOVERY = cfg.discovery;
-        ETCD_DATA_DIR = cfg.dataDir;
-        ETCD_ADVERTISE_CLIENT_URLS = concatStringsSep "," cfg.advertiseClientUrls;
-        ETCD_LISTEN_CLIENT_URLS = concatStringsSep "," cfg.listenClientUrls;
-        ETCD_LISTEN_PEER_URLS = concatStringsSep "," cfg.listenPeerUrls;
-        ETCD_INITIAL_ADVERTISE_PEER_URLS = concatStringsSep "," cfg.initialAdvertisePeerUrls;
-        ETCD_PEER_CLIENT_CERT_AUTH = toString cfg.peerClientCertAuth;
-        ETCD_PEER_TRUSTED_CA_FILE = cfg.peerTrustedCaFile;
-        ETCD_PEER_CERT_FILE = cfg.peerCertFile;
-        ETCD_PEER_KEY_FILE = cfg.peerKeyFile;
-        ETCD_CLIENT_CERT_AUTH = toString cfg.clientCertAuth;
-        ETCD_TRUSTED_CA_FILE = cfg.trustedCaFile;
-        ETCD_CERT_FILE = cfg.certFile;
-        ETCD_KEY_FILE = cfg.keyFile;
-      }) // (optionalAttrs (cfg.discovery == ""){
-        ETCD_INITIAL_CLUSTER = concatStringsSep "," cfg.initialCluster;
-        ETCD_INITIAL_CLUSTER_STATE = cfg.initialClusterState;
-        ETCD_INITIAL_CLUSTER_TOKEN = cfg.initialClusterToken;
-      }) // (mapAttrs' (n: v: nameValuePair "ETCD_${n}" v) cfg.extraConf);
-
-      unitConfig = {
-        Documentation = "https://github.com/coreos/etcd";
-      };
-
-      serviceConfig = {
-        Type = "notify";
-        Restart = "always";
-        RestartSec = "30s";
-        ExecStart = "${cfg.package}/bin/etcd";
-        User = "etcd";
-        LimitNOFILE = 40000;
-      };
-    };
-
-    environment.systemPackages = [ cfg.package ];
-
-    networking.firewall = lib.mkIf cfg.openFirewall {
-      allowedTCPPorts = [
-        2379 # for client requests
-        2380 # for peer communication
-      ];
-    };
-
-    users.users.etcd = {
-      isSystemUser = true;
-      group = "etcd";
-      description = "Etcd daemon user";
-      home = cfg.dataDir;
-    };
-    users.groups.etcd = {};
-  };
-}