-
Notifications
You must be signed in to change notification settings - Fork 16
/
Copy pathpostgresql.nix
477 lines (432 loc) · 15.8 KB
/
postgresql.nix
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
# SPDX-FileCopyrightText: 2021 Richard Brežák and NixNG contributors
#
# SPDX-License-Identifier: MPL-2.0
#
# This Source Code Form is subject to the terms of the Mozilla Public
# License, v. 2.0. If a copy of the MPL was not distributed with this
# file, You can obtain one at http://mozilla.org/MPL/2.0/.
#
# This file incorporates work sublicensed from the MIT License to
# Mozilla Public License, v. 2.0, for which the following copyright applies:
# Copyright (c) 2003-2021 Eelco Dolstra and the Nixpkgs/NixOS contributors
{
pkgs,
lib,
config,
...
}:
let
cfg = config.services.postgresql;
# BEGIN Copyright (c) 2003-2021 Eelco Dolstra and the Nixpkgs/NixOS contributors
toStr =
value:
if true == value then
"yes"
else if false == value then
"no"
else if lib.isString value then
"'${lib.replaceStrings [ "'" ] [ "''" ] value}'"
else
toString value;
configFile = pkgs.writeTextDir "postgresql.conf" (
lib.concatStringsSep "\n" (lib.mapAttrsToList (n: v: "${n} = ${toStr v}") cfg.config)
);
in
{
options = {
services.postgresql = {
enable = lib.mkEnableOption "PostgreSQL Server";
package = lib.mkOption {
type = lib.types.package;
example = lib.literalExample "pkgs.postgresql_11";
description = ''
PostgreSQL package to use.
'';
};
port = lib.mkOption {
type = lib.types.int;
default = 5432;
description = ''
The port on which PostgreSQL listens.
'';
apply = toString;
};
checkConfig = lib.mkOption {
type = lib.types.bool;
default = true;
description = "Check the syntax of the configuration file at compile time";
};
dataDir = lib.mkOption {
type = lib.types.path;
defaultText = "/var/lib/postgresql/\${config.services.postgresql.package.psqlSchema}";
example = "/var/lib/postgresql/11";
description = ''
The data directory for PostgreSQL. If left as the default value
this directory will automatically be created before the PostgreSQL server starts, otherwise
the sysadmin is responsible for ensuring the directory exists with appropriate ownership
and permissions.
'';
};
authentication = lib.mkOption {
type = lib.types.lines;
default = "";
description = ''
Defines how users authenticate themselves to the server. See the
<link xlink:href="https://www.postgresql.org/docs/current/auth-pg-hba-conf.html">
PostgreSQL documentation for pg_hba.conf</link>
for details on the expected format of this option. By default,
peer based authentication will be used for users connecting
via the Unix socket, and md5 password authentication will be
used for users connecting via TCP. Any added rules will be
inserted above the default rules. If you'd like to replace the
default rules entirely, you can use <function>lib.mkForce</function> in your
module.
'';
};
identMap = lib.mkOption {
type = lib.types.lines;
default = "";
description = ''
Defines the mapping from system users to database users.
The general form is:
map-name system-username database-username
'';
};
initdbArgs = lib.mkOption {
type = with lib.types; listOf str;
default = [ ];
example = [
"--data-checksums"
"--allow-group-access"
];
description = ''
Additional arguments passed to <literal>initdb</literal> during data dir
initialisation.
'';
};
initialScript = lib.mkOption {
type =
with lib.types;
nullOr (oneOf [
package
str
]);
default = null;
description = ''
A file containing SQL statements to execute on first startup.
'';
};
ensureExtensions = lib.mkOption {
type = with lib.types; attrsOf (listOf str);
default = { };
description = ''
Ensure that the specified extensions exist.
'';
example = {
"pg_trgm" = [ "hydra" ];
};
};
ensureDatabases = lib.mkOption {
type =
with lib.types;
oneOf [
(listOf str)
(attrsOf (attrsOf str))
];
default = [ ];
description = ''
Ensures that the specified databases exist.
This option will never delete existing databases, especially not when the value of this
option is changed. This means that databases created once through this option or
otherwise have to be removed manually.
'';
example = lib.literalExample ''
[
"gitea" = { encoding = UTF-8; }
"hydra"
]
'';
};
ensureUsers = lib.mkOption {
type =
with lib.types;
listOf (submodule {
options = {
name = lib.mkOption {
type = str;
description = ''
Name of the user to ensure.
'';
};
ensurePermissions = lib.mkOption {
type = attrsOf str;
default = { };
description = ''
Permissions to ensure for the user, specified as an attribute set.
The attribute names specify the database and tables to grant the permissions for.
The attribute values specify the permissions to grant. You may specify one or
multiple comma-separated SQL privileges here.
For more information on how to specify the target
and on which privileges exist, see the
<link xlink:href="https://www.postgresql.org/docs/current/sql-grant.html">GRANT syntax</link>.
The attributes are used as <code>GRANT ''${attrName} ON ''${attrValue}</code>.
'';
example = lib.literalExample ''
{
"DATABASE \"nextcloud\"" = "ALL PRIVILEGES";
"ALL TABLES IN SCHEMA public" = "ALL PRIVILEGES";
}
'';
};
ensureDBOwnership = lib.mkOption {
type = bool;
default = false;
description = lib.mdDoc ''
Grants the user ownership to a database with the same name.
This database must be defined manually in
[](#opt-services.postgresql.ensureDatabases).
'';
};
};
});
default = [ ];
description = ''
Ensures that the specified users exist and have at least the ensured permissions.
The PostgreSQL users will be identified using peer authentication. This authenticates the Unix user with the
same name only, and that without the need for a password.
This option will never delete existing users or remove permissions, especially not when the value of this
option is changed. This means that users created and permissions assigned once through this option or
otherwise have to be removed manually.
'';
example = lib.literalExample ''
[
{
name = "nextcloud";
ensurePermissions = {
"DATABASE nextcloud" = "ALL PRIVILEGES";
};
}
{
name = "superuser";
ensurePermissions = {
"ALL TABLES IN SCHEMA public" = "ALL PRIVILEGES";
};
}
]
'';
};
enableTCPIP = lib.mkOption {
type = lib.types.bool;
default = false;
description = ''
Whether PostgreSQL should listen on all network interfaces.
If disabled, the database can only be accessed via its Unix
domain socket or via TCP connections to localhost.
'';
};
logLinePrefix = lib.mkOption {
type = lib.types.str;
default = "Postgres [%p] ";
example = "%m [%p] ";
description = ''
A printf-style string that is output at the beginning of each log line.
Upstream default is <literal>'%m [%p] '</literal>, i.e. it includes the timestamp. We do
not include the timestamp, because journal has it anyway.
'';
};
extraPlugins = lib.mkOption {
type = with lib.types; listOf path;
default = [ ];
example = lib.literalExample "with pkgs.postgresql_11.pkgs; [ postgis pg_repack ]";
description = ''
List of PostgreSQL plugins. PostgreSQL version for each plugin should
match version for <literal>services.postgresql.package</literal> value.
'';
};
config = lib.mkOption {
type =
with lib.types;
attrsOf (oneOf [
bool
float
int
str
]);
default = { };
description = ''
PostgreSQL configuration. Refer to
<link xlink:href="https://www.postgresql.org/docs/11/config-setting.html#CONFIG-SETTING-CONFIGURATION-FILE"/>
for an overview of <literal>postgresql.conf</literal>.
<note><para>
String values will automatically be enclosed in single quotes. Single quotes will be
escaped with two single quotes as described by the upstream documentation linked above.
</para></note>
'';
example = lib.literalExample ''
{
log_connections = true;
log_statement = "all";
logging_collector = true
log_disconnections = true
log_destination = lib.mkForce "syslog";
}
'';
};
recoveryConfig = lib.mkOption {
type = with lib.types; nullOr lines;
default = null;
description = ''
Contents of the <filename>recovery.conf</filename> file.
'';
};
superUser = lib.mkOption {
type = lib.types.str;
default = "postgres";
internal = true;
readOnly = true;
description = ''
PostgreSQL superuser account to use for various operations. Internal since changing
this value would lead to breakage while setting up databases.
'';
};
};
};
# END Copyright (c) 2003-2021 Eelco Dolstra and the Nixpkgs/NixOS contributors
config = lib.mkIf cfg.enable {
environment.systemPackages = [ cfg.package ];
# BEGIN Copyright (c) 2003-2021 Eelco Dolstra and the Nixpkgs/NixOS contributors
services.postgresql.config = {
hba_file = "${pkgs.writeText "pg_hba.conf" cfg.authentication}";
ident_file = "${pkgs.writeText "pg_ident.conf" cfg.identMap}";
log_destination = "stderr";
log_line_prefix = cfg.logLinePrefix;
listen_addresses = if cfg.enableTCPIP then "*" else "localhost";
port = cfg.port;
};
services.postgresql.dataDir = lib.mkDefault "/var/lib/postgresql/${cfg.package.psqlSchema}";
services.postgresql.authentication = lib.mkAfter ''
# Generated file; do not edit!
local all all peer
host all all 127.0.0.1/32 md5
host all all ::1/128 md5
'';
users.users.postgres = {
uid = config.ids.uids.postgres;
group = "postgres";
description = "PostgreSQL server user";
createHome = false;
home = "${cfg.dataDir}";
useDefaultShell = true;
};
users.groups.postgres.gid = config.ids.gids.postgres;
# TODO Why?
# environment.pathsToLink = [
# "/share/postgresql"
# ];
# TODO Reimplement
# system.extraDependencies = lib.optional (cfg.checkConfig && pkgs.stdenv.hostPlatform == pkgs.stdenv.buildPlatform) configFileCheck;
# END Copyright (c) 2003-2021 Eelco Dolstra and the Nixpkgs/NixOS contributors
init.services.postgresql = {
environment.PGDATA = cfg.dataDir;
ensureSomething.create."dataDir" = {
type = "directory";
mode = "750";
owner = "postgres:postgres";
persistent = true;
dst = cfg.dataDir;
};
ensureSomething.create."runSocket" = {
type = "directory";
mode = "755";
owner = "postgres:postgres";
persistent = false;
dst = "/run/postgresql/";
};
# BEGIN Copyright (c) 2003-2021 Eelco Dolstra and the Nixpkgs/NixOS contributors
script = pkgs.writeShellScript "postgresql" ''
function _sigterm() {
if ! [ -z "$postgresql" ] && kill -0 "$postgresql" ; then
kill -TERM "$postgresql"
wait "$postgresql"
fi
exit 0
}
trap _sigterm TERM
if [[ ! -e ${cfg.dataDir}/PG_VERSION ]] ; then
# Clean up the data directory
rm -f ${cfg.dataDir}/*.conf
# Initialize the database
chpst -u postgres:postgres ${cfg.package}/bin/initdb -U ${cfg.superUser} ${lib.concatStringsSep " " cfg.initdbArgs}
touch ${cfg.dataDir}/.first_startup
fi
ln -sfn ${configFile}/postgresql.conf ${cfg.dataDir}/postgresql.conf
${lib.optionalString (cfg.recoveryConfig != null) ''
ln -sfn "${pkgs.writeText "recovery.conf" cfg.recoveryConfig}" \
"${cfg.dataDir}/recovery.conf"
''}
chpst -u postgres:postgres ${cfg.package}/bin/postgres &
postgresql=$!
PSQL="chpst -u postgres:postgres ${cfg.package}/bin/psql --port=${cfg.port}"
while ! $PSQL -d postgres -c "" 2> /dev/null ; do
if ! kill -0 "$postgresql"; then exit 1; fi
sleep 0.1
done
${lib.concatMapStrings
(
{ database, options }:
''
$PSQL -tAc "SELECT 1 FROM pg_database WHERE datname = '${database}'" | grep -q 1 || $PSQL -tAc 'CREATE DATABASE "${database}" ${
if options != "" then "WITH " + options else ""
}'
''
)
(
(
if lib.isList cfg.ensureDatabases then
map (x: {
database = x;
options = "";
})
else
lib.mapAttrsToList (
k: v: {
database = k;
options = lib.concatStringsSep " " (lib.mapAttrsToList (k: v: "${k} = \"${v}\"") v);
}
)
)
cfg.ensureDatabases
)
}
${lib.concatMapStrings (user: ''
$PSQL -tAc "SELECT 1 FROM pg_roles WHERE rolname='${user.name}'" | grep -q 1 || $PSQL -tAc 'CREATE USER "${user.name}"'
${lib.concatStringsSep "\n" (
lib.mapAttrsToList (database: permission: ''
$PSQL -tAc 'GRANT ${permission} ON ${database} TO "${user.name}"'
'') user.ensurePermissions
)}
${lib.optionalString user.ensureDBOwnership ''$PSQL -tAc 'ALTER DATABASE "${user.name}" OWNER TO "${user.name}";' ''}
'') cfg.ensureUsers}
${lib.concatStrings (
lib.mapAttrsToList (
extension: schemas:
lib.concatMapStrings (schema: ''
$PSQL -tAc "create extension if not exists ${extension}" ${schema}
'') schemas
) cfg.ensureExtensions
)}
if test -e "${cfg.dataDir}/.first_startup"; then
${
lib.optionalString (cfg.initialScript != null) ''
$PSQL -f "${cfg.initialScript}" -d postgres
''
}
rm -f "${cfg.dataDir}/.first_startup"
fi
wait $postgresql
'';
# END Copyright (c) 2003-2021 Eelco Dolstra and the Nixpkgs/NixOS contributors
enabled = true;
};
};
}