diff options
author | Chris Farmiloe <chrisfarms@gmail.com> | 2014-06-12 16:08:49 +0200 |
---|---|---|
committer | Michael Raskin <7c6f434c@mail.ru> | 2014-09-02 01:48:50 +0400 |
commit | 76a4de68c17217e016043dc19b98a96ea5073b0f (patch) | |
tree | 5a07f837aba74d505a901b8a5a4a91b395c25065 /nixos | |
parent | 8ef11bb0ee4567826d9a7509ea2c8f1e226bcebf (diff) | |
download | nixlib-76a4de68c17217e016043dc19b98a96ea5073b0f.tar nixlib-76a4de68c17217e016043dc19b98a96ea5073b0f.tar.gz nixlib-76a4de68c17217e016043dc19b98a96ea5073b0f.tar.bz2 nixlib-76a4de68c17217e016043dc19b98a96ea5073b0f.tar.lz nixlib-76a4de68c17217e016043dc19b98a96ea5073b0f.tar.xz nixlib-76a4de68c17217e016043dc19b98a96ea5073b0f.tar.zst nixlib-76a4de68c17217e016043dc19b98a96ea5073b0f.zip |
formatting/retab
Diffstat (limited to 'nixos')
-rw-r--r-- | nixos/modules/virtualisation/openvswitch.nix | 205 |
1 files changed, 101 insertions, 104 deletions
diff --git a/nixos/modules/virtualisation/openvswitch.nix b/nixos/modules/virtualisation/openvswitch.nix index 2070dd0f7839..c1579d94657c 100644 --- a/nixos/modules/virtualisation/openvswitch.nix +++ b/nixos/modules/virtualisation/openvswitch.nix @@ -5,116 +5,113 @@ with lib; let - cfg = config.virtualisation.vswitch; + cfg = config.virtualisation.vswitch; in { - # ------------------------------------------------------------ - - options = { - - virtualisation.vswitch.enable = mkOption { - type = types.bool; - default = false; - description = - '' - Enable Open vSwitch. A configuration - daemon (ovs-server) will be started. - ''; - }; - - - virtualisation.vswitch.package = mkOption { - type = types.package; - default = pkgs.openvswitch; - description = - '' - Open vSwitch package to use. - ''; - }; + options = { + + virtualisation.vswitch.enable = mkOption { + type = types.bool; + default = false; + description = + '' + Enable Open vSwitch. A configuration + daemon (ovs-server) will be started. + ''; + }; + + + virtualisation.vswitch.package = mkOption { + type = types.package; + default = pkgs.openvswitch; + description = + '' + Open vSwitch package to use. + ''; + }; + + }; + + config = mkIf cfg.enable (let + + # Where the communication sockets live + runDir = "/var/run/openvswitch"; + + # Where the config database live (can't be in nix-store) + stateDir = "/var/db/openvswitch"; + + # The path to the an initialized version of the database + db = pkgs.stdenv.mkDerivation { + name = "vswitch.db"; + unpackPhase = "true"; + buildPhase = "true"; + buildInputs = with pkgs; [ + cfg.package + ]; + installPhase = + '' + ensureDir $out/ + ''; + }; + + in { + + environment.systemPackages = [ cfg.package ]; + + boot.kernelModules = [ "tun" "openvswitch" ]; + + boot.extraModulePackages = [ cfg.package ]; + + systemd.services.ovsdb = { + description = "Open_vSwitch Database Server"; + wantedBy = [ "multi-user.target" ]; + after = [ "systemd-udev-settle.service" ]; + wants = [ "vswitchd.service" ]; + path = [ cfg.package ]; + restartTriggers = [ db cfg.package ]; + # Create the config database + preStart = + '' + mkdir -p ${runDir} + mkdir -p /var/db/openvswitch + chmod +w /var/db/openvswitch + if [[ ! -e /var/db/openvswitch/conf.db ]]; then + ${cfg.package}/bin/ovsdb-tool create \ + "/var/db/openvswitch/conf.db" \ + "${cfg.package}/share/openvswitch/vswitch.ovsschema" + fi + chmod -R +w /var/db/openvswitch + ''; + serviceConfig.ExecStart = + '' + ${cfg.package}/bin/ovsdb-server \ + --remote=punix:${runDir}/db.sock \ + --private-key=db:Open_vSwitch,SSL,private_key \ + --certificate=db:Open_vSwitch,SSL,certificate \ + --bootstrap-ca-cert=db:Open_vSwitch,SSL,ca_cert \ + --unixctl=ovsdb.ctl.sock \ + /var/db/openvswitch/conf.db + ''; + serviceConfig.Restart = "always"; + serviceConfig.RestartSec = 3; + postStart = + '' + ${cfg.package}/bin/ovs-vsctl --timeout 3 --retry --no-wait init + ''; + + }; + + systemd.services.vswitchd = { + description = "Open_vSwitch Daemon"; + bindsTo = [ "ovsdb.service" ]; + after = [ "ovsdb.service" ]; + path = [ cfg.package ]; + serviceConfig.ExecStart = ''${cfg.package}/bin/ovs-vswitchd''; }; - # ------------------------------------------------------------ - - config = mkIf cfg.enable (let - - # Where the communication sockets live - runDir = "/var/run/openvswitch"; - - # Where the config database live (can't be in nix-store) - stateDir = "/var/db/openvswitch"; - - # The path to the an initialized version of the database - db = pkgs.stdenv.mkDerivation { - name = "vswitch.db"; - unpackPhase = "true"; - buildPhase = "true"; - buildInputs = with pkgs; [ - cfg.package - ]; - installPhase = - '' - ensureDir $out/ - ''; - }; - - in { - - environment.systemPackages = [ cfg.package ]; - - boot.kernelModules = [ "tun" "openvswitch" ]; - - boot.extraModulePackages = [ cfg.package ]; - - systemd.services.ovsdb = { - description = "Open_vSwitch Database Server"; - wantedBy = [ "multi-user.target" ]; - after = [ "systemd-udev-settle.service" ]; - wants = [ "vswitchd.service" ]; - path = [ cfg.package ]; - restartTriggers = [ db cfg.package ]; - # Create the config database - preStart = - '' - mkdir -p ${runDir} - mkdir -p /var/db/openvswitch - chmod +w /var/db/openvswitch - if [[ ! -e /var/db/openvswitch/conf.db ]]; then - ${cfg.package}/bin/ovsdb-tool create \ - "/var/db/openvswitch/conf.db" \ - "${cfg.package}/share/openvswitch/vswitch.ovsschema" - fi - chmod -R +w /var/db/openvswitch - ''; - serviceConfig.ExecStart = - '' - ${cfg.package}/bin/ovsdb-server \ - --remote=punix:${runDir}/db.sock \ - --private-key=db:Open_vSwitch,SSL,private_key \ - --certificate=db:Open_vSwitch,SSL,certificate \ - --bootstrap-ca-cert=db:Open_vSwitch,SSL,ca_cert \ - --unixctl=ovsdb.ctl.sock \ - /var/db/openvswitch/conf.db - ''; - serviceConfig.Restart = "always"; - serviceConfig.RestartSec = 3; - postStart = - '' - ${cfg.package}/bin/ovs-vsctl --timeout 3 --retry --no-wait init - ''; - - }; - - systemd.services.vswitchd = { - description = "Open_vSwitch Daemon"; - bindsTo = [ "ovsdb.service" ]; - after = [ "ovsdb.service" ]; - path = [ cfg.package ]; - serviceConfig.ExecStart = ''${cfg.package}/bin/ovs-vswitchd''; - }; - - }); + }); } |