mirror of
https://github.com/NixOS/nixpkgs.git
synced 2025-07-21 01:20:34 +03:00

This avoids restarting the postgresql server, when only ensureDatabases or ensureUsers have been changed. It will also allow to properly wait for recovery to finish later. To wait for "postgresql is ready" in other services, we now provide a postgresql.target. Resolves #400018 Co-authored-by: Marcel <me@m4rc3l.de>
381 lines
11 KiB
Nix
381 lines
11 KiB
Nix
{
|
|
config,
|
|
lib,
|
|
options,
|
|
pkgs,
|
|
...
|
|
}:
|
|
|
|
let
|
|
cfg = config.services.zabbixProxy;
|
|
opt = options.services.zabbixProxy;
|
|
pgsql = config.services.postgresql;
|
|
mysql = config.services.mysql;
|
|
|
|
inherit (lib)
|
|
mkAfter
|
|
mkDefault
|
|
mkEnableOption
|
|
mkIf
|
|
mkMerge
|
|
mkOption
|
|
;
|
|
inherit (lib)
|
|
attrValues
|
|
concatMapStringsSep
|
|
getName
|
|
literalExpression
|
|
optional
|
|
optionalAttrs
|
|
optionalString
|
|
types
|
|
;
|
|
inherit (lib.generators) toKeyValue;
|
|
|
|
user = "zabbix";
|
|
group = "zabbix";
|
|
runtimeDir = "/run/zabbix";
|
|
stateDir = "/var/lib/zabbix";
|
|
passwordFile = "${runtimeDir}/zabbix-dbpassword.conf";
|
|
|
|
moduleEnv = pkgs.symlinkJoin {
|
|
name = "zabbix-proxy-module-env";
|
|
paths = attrValues cfg.modules;
|
|
};
|
|
|
|
configFile = pkgs.writeText "zabbix_proxy.conf" (
|
|
toKeyValue { listsAsDuplicateKeys = true; } cfg.settings
|
|
);
|
|
|
|
mysqlLocal = cfg.database.createLocally && cfg.database.type == "mysql";
|
|
pgsqlLocal = cfg.database.createLocally && cfg.database.type == "pgsql";
|
|
|
|
in
|
|
|
|
{
|
|
imports = [
|
|
(lib.mkRemovedOptionModule [
|
|
"services"
|
|
"zabbixProxy"
|
|
"extraConfig"
|
|
] "Use services.zabbixProxy.settings instead.")
|
|
];
|
|
|
|
# interface
|
|
|
|
options = {
|
|
|
|
services.zabbixProxy = {
|
|
enable = mkEnableOption "the Zabbix Proxy";
|
|
|
|
server = mkOption {
|
|
type = types.str;
|
|
description = ''
|
|
The IP address or hostname of the Zabbix server to connect to.
|
|
'';
|
|
};
|
|
|
|
package = mkOption {
|
|
type = types.package;
|
|
default =
|
|
if cfg.database.type == "mysql" then
|
|
pkgs.zabbix.proxy-mysql
|
|
else if cfg.database.type == "pgsql" then
|
|
pkgs.zabbix.proxy-pgsql
|
|
else
|
|
pkgs.zabbix.proxy-sqlite;
|
|
defaultText = literalExpression "pkgs.zabbix.proxy-pgsql";
|
|
description = "The Zabbix package to use.";
|
|
};
|
|
|
|
extraPackages = mkOption {
|
|
type = types.listOf types.package;
|
|
default = with pkgs; [
|
|
nettools
|
|
nmap
|
|
traceroute
|
|
];
|
|
defaultText = literalExpression "[ nettools nmap traceroute ]";
|
|
description = ''
|
|
Packages to be added to the Zabbix {env}`PATH`.
|
|
Typically used to add executables for scripts, but can be anything.
|
|
'';
|
|
};
|
|
|
|
modules = mkOption {
|
|
type = types.attrsOf types.package;
|
|
description = "A set of modules to load.";
|
|
default = { };
|
|
example = literalExpression ''
|
|
{
|
|
"dummy.so" = pkgs.stdenv.mkDerivation {
|
|
name = "zabbix-dummy-module-''${cfg.package.version}";
|
|
src = cfg.package.src;
|
|
buildInputs = [ cfg.package ];
|
|
sourceRoot = "zabbix-''${cfg.package.version}/src/modules/dummy";
|
|
installPhase = '''
|
|
mkdir -p $out/lib
|
|
cp dummy.so $out/lib/
|
|
''';
|
|
};
|
|
}
|
|
'';
|
|
};
|
|
|
|
database = {
|
|
type = mkOption {
|
|
type = types.enum [
|
|
"mysql"
|
|
"pgsql"
|
|
"sqlite"
|
|
];
|
|
example = "mysql";
|
|
default = "pgsql";
|
|
description = "Database engine to use.";
|
|
};
|
|
|
|
host = mkOption {
|
|
type = types.str;
|
|
default = "localhost";
|
|
description = "Database host address.";
|
|
};
|
|
|
|
port = mkOption {
|
|
type = types.port;
|
|
default = if cfg.database.type == "mysql" then mysql.port else pgsql.settings.port;
|
|
defaultText = literalExpression ''
|
|
if config.${opt.database.type} == "mysql"
|
|
then config.${options.services.mysql.port}
|
|
else config.services.postgresql.settings.port
|
|
'';
|
|
description = "Database host port.";
|
|
};
|
|
|
|
name = mkOption {
|
|
type = types.str;
|
|
default = if cfg.database.type == "sqlite" then "${stateDir}/zabbix.db" else "zabbix";
|
|
defaultText = literalExpression "zabbix";
|
|
description = "Database name.";
|
|
};
|
|
|
|
user = mkOption {
|
|
type = types.str;
|
|
default = "zabbix";
|
|
description = "Database user.";
|
|
};
|
|
|
|
passwordFile = mkOption {
|
|
type = types.nullOr types.path;
|
|
default = null;
|
|
example = "/run/keys/zabbix-dbpassword";
|
|
description = ''
|
|
A file containing the password corresponding to
|
|
{option}`database.user`.
|
|
'';
|
|
};
|
|
|
|
socket = mkOption {
|
|
type = types.nullOr types.path;
|
|
default = null;
|
|
example = "/run/postgresql";
|
|
description = "Path to the unix socket file to use for authentication.";
|
|
};
|
|
|
|
createLocally = mkOption {
|
|
type = types.bool;
|
|
default = true;
|
|
description = "Whether to create a local database automatically.";
|
|
};
|
|
};
|
|
|
|
listen = {
|
|
ip = mkOption {
|
|
type = types.str;
|
|
default = "0.0.0.0";
|
|
description = ''
|
|
List of comma delimited IP addresses that the trapper should listen on.
|
|
Trapper will listen on all network interfaces if this parameter is missing.
|
|
'';
|
|
};
|
|
|
|
port = mkOption {
|
|
type = types.port;
|
|
default = 10051;
|
|
description = ''
|
|
Listen port for trapper.
|
|
'';
|
|
};
|
|
};
|
|
|
|
openFirewall = mkOption {
|
|
type = types.bool;
|
|
default = false;
|
|
description = ''
|
|
Open ports in the firewall for the Zabbix Proxy.
|
|
'';
|
|
};
|
|
|
|
settings = mkOption {
|
|
type =
|
|
with types;
|
|
attrsOf (oneOf [
|
|
int
|
|
str
|
|
(listOf str)
|
|
]);
|
|
default = { };
|
|
description = ''
|
|
Zabbix Proxy configuration. Refer to
|
|
<https://www.zabbix.com/documentation/current/manual/appendix/config/zabbix_proxy>
|
|
for details on supported values.
|
|
'';
|
|
example = {
|
|
CacheSize = "1G";
|
|
SSHKeyLocation = "/var/lib/zabbix/.ssh";
|
|
StartPingers = 32;
|
|
};
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
# implementation
|
|
|
|
config = mkIf cfg.enable {
|
|
|
|
assertions = [
|
|
{
|
|
assertion = !config.services.zabbixServer.enable;
|
|
message = "Please choose one of services.zabbixServer or services.zabbixProxy.";
|
|
}
|
|
{
|
|
assertion =
|
|
cfg.database.createLocally -> cfg.database.user == user && cfg.database.name == cfg.database.user;
|
|
message = "services.zabbixProxy.database.user must be set to ${user} if services.zabbixProxy.database.createLocally is set true";
|
|
}
|
|
{
|
|
assertion = cfg.database.createLocally -> cfg.database.passwordFile == null;
|
|
message = "a password cannot be specified if services.zabbixProxy.database.createLocally is set to true";
|
|
}
|
|
];
|
|
|
|
services.zabbixProxy.settings = mkMerge [
|
|
{
|
|
LogType = "console";
|
|
ListenIP = cfg.listen.ip;
|
|
ListenPort = cfg.listen.port;
|
|
Server = cfg.server;
|
|
# TODO: set to cfg.database.socket if database type is pgsql?
|
|
DBHost = optionalString (cfg.database.createLocally != true) cfg.database.host;
|
|
DBName = cfg.database.name;
|
|
DBUser = cfg.database.user;
|
|
SocketDir = runtimeDir;
|
|
FpingLocation = "/run/wrappers/bin/fping";
|
|
LoadModule = builtins.attrNames cfg.modules;
|
|
}
|
|
(mkIf (cfg.database.createLocally != true) { DBPort = cfg.database.port; })
|
|
(mkIf (cfg.database.passwordFile != null) { Include = [ "${passwordFile}" ]; })
|
|
(mkIf (mysqlLocal && cfg.database.socket != null) { DBSocket = cfg.database.socket; })
|
|
(mkIf (cfg.modules != { }) { LoadModulePath = "${moduleEnv}/lib"; })
|
|
];
|
|
|
|
networking.firewall = mkIf cfg.openFirewall {
|
|
allowedTCPPorts = [ cfg.listen.port ];
|
|
};
|
|
|
|
services.mysql = optionalAttrs mysqlLocal {
|
|
enable = true;
|
|
package = mkDefault pkgs.mariadb;
|
|
};
|
|
|
|
systemd.services.mysql.postStart = mkAfter (
|
|
optionalString mysqlLocal ''
|
|
( echo "CREATE DATABASE IF NOT EXISTS \`${cfg.database.name}\` CHARACTER SET utf8 COLLATE utf8_bin;"
|
|
echo "CREATE USER IF NOT EXISTS '${cfg.database.user}'@'localhost' IDENTIFIED WITH ${
|
|
if (getName config.services.mysql.package == getName pkgs.mariadb) then
|
|
"unix_socket"
|
|
else
|
|
"auth_socket"
|
|
};"
|
|
echo "GRANT ALL PRIVILEGES ON \`${cfg.database.name}\`.* TO '${cfg.database.user}'@'localhost';"
|
|
) | ${config.services.mysql.package}/bin/mysql -N
|
|
''
|
|
);
|
|
|
|
services.postgresql = optionalAttrs pgsqlLocal {
|
|
enable = true;
|
|
ensureDatabases = [ cfg.database.name ];
|
|
ensureUsers = [
|
|
{
|
|
name = cfg.database.user;
|
|
ensureDBOwnership = true;
|
|
}
|
|
];
|
|
};
|
|
|
|
users.users.${user} = {
|
|
description = "Zabbix daemon user";
|
|
uid = config.ids.uids.zabbix;
|
|
inherit group;
|
|
};
|
|
|
|
users.groups.${group} = {
|
|
gid = config.ids.gids.zabbix;
|
|
};
|
|
|
|
security.wrappers = {
|
|
fping = {
|
|
setuid = true;
|
|
owner = "root";
|
|
group = "root";
|
|
source = "${pkgs.fping}/bin/fping";
|
|
};
|
|
};
|
|
|
|
systemd.services.zabbix-proxy = {
|
|
description = "Zabbix Proxy";
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
after = optional mysqlLocal "mysql.service" ++ optional pgsqlLocal "postgresql.target";
|
|
|
|
path = [ "/run/wrappers" ] ++ cfg.extraPackages;
|
|
preStart =
|
|
optionalString pgsqlLocal ''
|
|
if ! test -e "${stateDir}/db-created"; then
|
|
cat ${cfg.package}/share/zabbix/database/postgresql/schema.sql | ${pgsql.package}/bin/psql ${cfg.database.name}
|
|
touch "${stateDir}/db-created"
|
|
fi
|
|
''
|
|
+ optionalString mysqlLocal ''
|
|
if ! test -e "${stateDir}/db-created"; then
|
|
cat ${cfg.package}/share/zabbix/database/mysql/schema.sql | ${mysql.package}/bin/mysql ${cfg.database.name}
|
|
touch "${stateDir}/db-created"
|
|
fi
|
|
''
|
|
+ optionalString (cfg.database.type == "sqlite") ''
|
|
if ! test -e "${cfg.database.name}"; then
|
|
${pkgs.sqlite}/bin/sqlite3 "${cfg.database.name}" < ${cfg.package}/share/zabbix/database/sqlite3/schema.sql
|
|
fi
|
|
''
|
|
+ optionalString (cfg.database.passwordFile != null) ''
|
|
# create a copy of the supplied password file in a format zabbix can consume
|
|
install -m 0600 <(echo "DBPassword = $(cat ${cfg.database.passwordFile})") ${passwordFile}
|
|
'';
|
|
|
|
serviceConfig = {
|
|
ExecStart = "@${cfg.package}/sbin/zabbix_proxy zabbix_proxy -f --config ${configFile}";
|
|
Restart = "always";
|
|
RestartSec = 2;
|
|
|
|
User = user;
|
|
Group = group;
|
|
RuntimeDirectory = "zabbix";
|
|
StateDirectory = "zabbix";
|
|
PrivateTmp = true;
|
|
};
|
|
};
|
|
|
|
};
|
|
|
|
}
|