mirror of
https://github.com/ilyakooo0/nixpkgs.git
synced 2024-11-12 23:27:50 +03:00
Merge pull request #216230 from tcheronneau/master
nixos/{consul-template,vault-agent}: init
This commit is contained in:
commit
50200de3f4
@ -15245,6 +15245,12 @@
|
||||
}];
|
||||
name = "David Tchekachev";
|
||||
};
|
||||
tcheronneau = {
|
||||
email = "nix@mcth.fr";
|
||||
github = "tcheronneau";
|
||||
githubId = 7914437;
|
||||
name = "Thomas Cheronneau";
|
||||
};
|
||||
tckmn = {
|
||||
email = "andy@tck.mn";
|
||||
github = "tckmn";
|
||||
|
@ -87,6 +87,10 @@ In addition to numerous new and upgraded packages, this release has the followin
|
||||
|
||||
- [keyd](https://github.com/rvaiya/keyd), a key remapping daemon for linux. Available as [services.keyd](#opt-services.keyd.enable).
|
||||
|
||||
- [consul-template](https://github.com/hashicorp/consul-template/), a template rendering, notifier, and supervisor for HashiCorp Consul and Vault data. Available as [services.consul-template](#opt-services.consul-template.instances).
|
||||
|
||||
- [vault-agent](https://developer.hashicorp.com/vault/docs/agent), a template rendering and API auth proxy for HashiCorp Vault, similar to `consul-template`. Available as [services.vault-agent](#opt-services.vault-agent.instances).
|
||||
|
||||
- [v2rayA](https://v2raya.org), a Linux web GUI client of Project V which supports V2Ray, Xray, SS, SSR, Trojan and Pingtunnel. Available as [services.v2raya](options.html#opt-services.v2raya.enable).
|
||||
|
||||
- [wstunnel](https://github.com/erebe/wstunnel), a proxy tunnelling arbitrary TCP or UDP traffic through a WebSocket connection. Instances may be configured via [services.wstunnel](options.html#opt-services.wstunnel.enable).
|
||||
|
@ -1109,6 +1109,7 @@
|
||||
./services/security/torsocks.nix
|
||||
./services/security/usbguard.nix
|
||||
./services/security/vault.nix
|
||||
./services/security/vault-agent.nix
|
||||
./services/security/vaultwarden/default.nix
|
||||
./services/security/yubikey-agent.nix
|
||||
./services/system/automatic-timezoned.nix
|
||||
|
128
nixos/modules/services/security/vault-agent.nix
Normal file
128
nixos/modules/services/security/vault-agent.nix
Normal file
@ -0,0 +1,128 @@
|
||||
{ config, lib, pkgs, ... }:
|
||||
|
||||
with lib;
|
||||
|
||||
let
|
||||
format = pkgs.formats.json { };
|
||||
commonOptions = { pkgName, flavour ? pkgName }: mkOption {
|
||||
default = { };
|
||||
description = mdDoc ''
|
||||
Attribute set of ${flavour} instances.
|
||||
Creates independent `${flavour}-''${name}.service` systemd units for each instance defined here.
|
||||
'';
|
||||
type = with types; attrsOf (submodule ({ name, ... }: {
|
||||
options = {
|
||||
enable = mkEnableOption (mdDoc "this ${flavour} instance") // { default = true; };
|
||||
|
||||
package = mkPackageOptionMD pkgs pkgName { };
|
||||
|
||||
user = mkOption {
|
||||
type = types.str;
|
||||
default = "root";
|
||||
description = mdDoc ''
|
||||
User under which this instance runs.
|
||||
'';
|
||||
};
|
||||
|
||||
group = mkOption {
|
||||
type = types.str;
|
||||
default = "root";
|
||||
description = mdDoc ''
|
||||
Group under which this instance runs.
|
||||
'';
|
||||
};
|
||||
|
||||
settings = mkOption {
|
||||
type = types.submodule {
|
||||
freeformType = format.type;
|
||||
|
||||
options = {
|
||||
pid_file = mkOption {
|
||||
default = "/run/${flavour}/${name}.pid";
|
||||
type = types.str;
|
||||
description = mdDoc ''
|
||||
Path to use for the pid file.
|
||||
'';
|
||||
};
|
||||
|
||||
template = mkOption {
|
||||
default = [ ];
|
||||
type = with types; listOf (attrsOf anything);
|
||||
description =
|
||||
let upstreamDocs =
|
||||
if flavour == "vault-agent"
|
||||
then "https://developer.hashicorp.com/vault/docs/agent/template"
|
||||
else "https://github.com/hashicorp/consul-template/blob/main/docs/configuration.md#templates";
|
||||
in
|
||||
mdDoc ''
|
||||
Template section of ${flavour}.
|
||||
Refer to <${upstreamDocs}> for supported values.
|
||||
'';
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
default = { };
|
||||
|
||||
description =
|
||||
let upstreamDocs =
|
||||
if flavour == "vault-agent"
|
||||
then "https://developer.hashicorp.com/vault/docs/agent#configuration-file-options"
|
||||
else "https://github.com/hashicorp/consul-template/blob/main/docs/configuration.md#configuration-file";
|
||||
in
|
||||
mdDoc ''
|
||||
Free-form settings written directly to the `config.json` file.
|
||||
Refer to <${upstreamDocs}> for supported values.
|
||||
|
||||
::: {.note}
|
||||
Resulting format is JSON not HCL.
|
||||
Refer to <https://www.hcl2json.com/> if you are unsure how to convert HCL options to JSON.
|
||||
:::
|
||||
'';
|
||||
};
|
||||
};
|
||||
}));
|
||||
};
|
||||
|
||||
createAgentInstance = { instance, name, flavour }:
|
||||
let
|
||||
configFile = format.generate "${name}.json" instance.settings;
|
||||
in
|
||||
mkIf (instance.enable) {
|
||||
description = "${flavour} daemon - ${name}";
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
after = [ "network.target" ];
|
||||
path = [ pkgs.getent ];
|
||||
startLimitIntervalSec = 60;
|
||||
startLimitBurst = 3;
|
||||
serviceConfig = {
|
||||
User = instance.user;
|
||||
Group = instance.group;
|
||||
RuntimeDirectory = flavour;
|
||||
ExecStart = "${getExe instance.package} ${optionalString ((getName instance.package) == "vault") "agent"} -config ${configFile}";
|
||||
ExecReload = "${pkgs.coreutils}/bin/kill -SIGHUP $MAINPID";
|
||||
KillSignal = "SIGINT";
|
||||
TimeoutStopSec = "30s";
|
||||
Restart = "on-failure";
|
||||
};
|
||||
};
|
||||
in
|
||||
{
|
||||
options = {
|
||||
services.consul-template.instances = commonOptions { pkgName = "consul-template"; };
|
||||
services.vault-agent.instances = commonOptions { pkgName = "vault"; flavour = "vault-agent"; };
|
||||
};
|
||||
|
||||
config = mkMerge (map
|
||||
(flavour:
|
||||
let cfg = config.services.${flavour}; in
|
||||
mkIf (cfg.instances != { }) {
|
||||
systemd.services = mapAttrs'
|
||||
(name: instance: nameValuePair "${flavour}-${name}" (createAgentInstance { inherit name instance flavour; }))
|
||||
cfg.instances;
|
||||
})
|
||||
[ "consul-template" "vault-agent" ]);
|
||||
|
||||
meta.maintainers = with maintainers; [ indeednotjames tcheronneau ];
|
||||
}
|
||||
|
@ -146,6 +146,7 @@ in {
|
||||
collectd = handleTest ./collectd.nix {};
|
||||
connman = handleTest ./connman.nix {};
|
||||
consul = handleTest ./consul.nix {};
|
||||
consul-template = handleTest ./consul-template.nix {};
|
||||
containers-bridge = handleTest ./containers-bridge.nix {};
|
||||
containers-custom-pkgs.nix = handleTest ./containers-custom-pkgs.nix {};
|
||||
containers-ephemeral = handleTest ./containers-ephemeral.nix {};
|
||||
@ -753,6 +754,7 @@ in {
|
||||
varnish60 = handleTest ./varnish.nix { package = pkgs.varnish60; };
|
||||
varnish72 = handleTest ./varnish.nix { package = pkgs.varnish72; };
|
||||
vault = handleTest ./vault.nix {};
|
||||
vault-agent = handleTest ./vault-agent.nix {};
|
||||
vault-dev = handleTest ./vault-dev.nix {};
|
||||
vault-postgresql = handleTest ./vault-postgresql.nix {};
|
||||
vaultwarden = handleTest ./vaultwarden.nix {};
|
||||
|
36
nixos/tests/consul-template.nix
Normal file
36
nixos/tests/consul-template.nix
Normal file
@ -0,0 +1,36 @@
|
||||
import ./make-test-python.nix ({ ... }: {
|
||||
name = "consul-template";
|
||||
|
||||
nodes.machine = { ... }: {
|
||||
services.consul-template.instances.example.settings = {
|
||||
template = [{
|
||||
contents = ''
|
||||
{{ key "example" }}
|
||||
'';
|
||||
perms = "0600";
|
||||
destination = "/example";
|
||||
}];
|
||||
};
|
||||
|
||||
services.consul = {
|
||||
enable = true;
|
||||
extraConfig = {
|
||||
server = true;
|
||||
bootstrap_expect = 1;
|
||||
bind_addr = "127.0.0.1";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
testScript = ''
|
||||
machine.wait_for_unit("consul.service")
|
||||
machine.wait_for_open_port(8500)
|
||||
|
||||
machine.wait_for_unit("consul-template-example.service")
|
||||
|
||||
machine.wait_until_succeeds('consul kv put example example')
|
||||
|
||||
machine.wait_for_file("/example")
|
||||
machine.succeed('grep "example" /example')
|
||||
'';
|
||||
})
|
52
nixos/tests/vault-agent.nix
Normal file
52
nixos/tests/vault-agent.nix
Normal file
@ -0,0 +1,52 @@
|
||||
import ./make-test-python.nix ({ pkgs, ... }: {
|
||||
name = "vault-agent";
|
||||
|
||||
nodes.machine = { config, pkgs, ... }: {
|
||||
services.vault-agent.instances.example.settings = {
|
||||
vault.address = config.environment.variables.VAULT_ADDR;
|
||||
|
||||
auto_auth = [{
|
||||
method = [{
|
||||
type = "token_file";
|
||||
config.token_file_path = pkgs.writeText "vault-token" config.environment.variables.VAULT_TOKEN;
|
||||
}];
|
||||
}];
|
||||
|
||||
template = [{
|
||||
contents = ''
|
||||
{{- with secret "secret/example" }}
|
||||
{{ .Data.data.key }}"
|
||||
{{- end }}
|
||||
'';
|
||||
perms = "0600";
|
||||
destination = "/example";
|
||||
}];
|
||||
};
|
||||
|
||||
services.vault = {
|
||||
enable = true;
|
||||
dev = true;
|
||||
devRootTokenID = config.environment.variables.VAULT_TOKEN;
|
||||
};
|
||||
|
||||
environment = {
|
||||
systemPackages = [ pkgs.vault ];
|
||||
variables = {
|
||||
VAULT_ADDR = "http://localhost:8200";
|
||||
VAULT_TOKEN = "root";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
testScript = ''
|
||||
machine.wait_for_unit("vault.service")
|
||||
machine.wait_for_open_port(8200)
|
||||
|
||||
machine.wait_until_succeeds('vault kv put secret/example key=example')
|
||||
|
||||
machine.wait_for_unit("vault-agent-example.service")
|
||||
|
||||
machine.wait_for_file("/example")
|
||||
machine.succeed('grep "example" /example')
|
||||
'';
|
||||
})
|
@ -38,7 +38,7 @@ buildGoModule rec {
|
||||
--prefix PATH ${lib.makeBinPath [ gawk glibc ]}
|
||||
'';
|
||||
|
||||
passthru.tests = { inherit (nixosTests) vault vault-postgresql vault-dev; };
|
||||
passthru.tests = { inherit (nixosTests) vault vault-postgresql vault-dev vault-agent; };
|
||||
|
||||
meta = with lib; {
|
||||
homepage = "https://www.vaultproject.io/";
|
||||
|
@ -1,4 +1,4 @@
|
||||
{ lib, buildGoModule, fetchFromGitHub }:
|
||||
{ lib, buildGoModule, fetchFromGitHub, nixosTests }:
|
||||
|
||||
buildGoModule rec {
|
||||
pname = "consul-template";
|
||||
@ -17,6 +17,10 @@ buildGoModule rec {
|
||||
# execute tests so we skip them here
|
||||
doCheck = false;
|
||||
|
||||
passthru.tests = {
|
||||
inherit (nixosTests) consul-template;
|
||||
};
|
||||
|
||||
meta = with lib; {
|
||||
homepage = "https://github.com/hashicorp/consul-template/";
|
||||
description = "Generic template rendering and notifications with Consul";
|
||||
|
Loading…
Reference in New Issue
Block a user