cluster/services/patroni: implement incandescence provider for databases and users
This commit is contained in:
parent
393e5e2669
commit
2952099b61
4 changed files with 141 additions and 1 deletions
87
cluster/services/patroni/create-databases.nix
Normal file
87
cluster/services/patroni/create-databases.nix
Normal file
|
@ -0,0 +1,87 @@
|
|||
{ cluster, config, lib, pkgs, ... }:
|
||||
|
||||
let
|
||||
inherit (cluster.config.services.patroni) secrets;
|
||||
|
||||
patroni = cluster.config.links.patroni-pg-access;
|
||||
|
||||
cfg = cluster.config.patroni;
|
||||
|
||||
writeQueryFile = pkgs.writeText "patroni-query.sql";
|
||||
|
||||
psqlRunFile = file: ''
|
||||
export PGPASSWORD="$(< ${secrets.PATRONI_SUPERUSER_PASSWORD.path})"
|
||||
while ! ${config.services.patroni.postgresqlPackage}/bin/psql 'host=${patroni.ipv4} port=${patroni.portStr} dbname=postgres user=postgres' --tuples-only --csv --file="${file}"; do
|
||||
sleep 3
|
||||
done
|
||||
'';
|
||||
|
||||
psql = query: psqlRunFile (writeQueryFile query);
|
||||
|
||||
psqlSecret = getSecret: queryTemplate: let
|
||||
queryTemplateFile = writeQueryFile queryTemplate;
|
||||
in ''
|
||||
umask 77
|
||||
secretFile="$(mktemp -ut patroniSecret.XXXXXXXXXXXXXXXX)"
|
||||
queryFile="$(mktemp -ut patroniQuery.XXXXXXXXXXXXXXXX)"
|
||||
trap "rm -f $secretFile $queryFile" EXIT
|
||||
${getSecret} > "$secretFile"
|
||||
cp --no-preserve=mode ${queryTemplateFile} "$queryFile"
|
||||
${pkgs.replace-secret}/bin/replace-secret '@SECRET@' "$secretFile" "$queryFile"
|
||||
${psqlRunFile "$queryFile"}
|
||||
'';
|
||||
|
||||
genPassword = pkgs.writeShellScript "patroni-generate-user-password" ''
|
||||
umask 77
|
||||
base64 -w0 /dev/urandom | tr -d /+ | head -c256 | tee "/run/keys/locksmith-provider-patroni-$1"
|
||||
'';
|
||||
in
|
||||
|
||||
{
|
||||
services.incandescence.providers.patroni = lib.mkIf config.services.haproxy.enable {
|
||||
locksmith = true;
|
||||
wantedBy = [ "patroni.service" "multi-user.target" ];
|
||||
partOf = [ "patroni.service" ];
|
||||
wants = [ "postgresql.service" ];
|
||||
after = [ "postgresql.service" ];
|
||||
|
||||
formulae = {
|
||||
user = {
|
||||
destroyAfterDays = 0;
|
||||
create = user: psqlSecret "${genPassword} ${user}" ''
|
||||
CREATE USER ${user} PASSWORD '@SECRET@';
|
||||
'';
|
||||
destroy = psqlSecret "printenv OBJECT" ''
|
||||
DROP USER @SECRET@;
|
||||
'';
|
||||
};
|
||||
database = {
|
||||
destroyAfterDays = 30;
|
||||
deps = [ "user" ];
|
||||
create = db: psql ''
|
||||
CREATE DATABASE ${db} OWNER ${cfg.databases.${db}.owner};
|
||||
'';
|
||||
destroy = psqlSecret "printenv OBJECT" ''
|
||||
DROP DATABASE @SECRET@;
|
||||
'';
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
services.locksmith.providers.patroni = lib.mkIf config.services.haproxy.enable {
|
||||
secrets = lib.mapAttrs (user: userConfig: {
|
||||
command = {
|
||||
envFile = ''
|
||||
echo "PGPASSWORD=$(cat /run/keys/locksmith-provider-patroni-${user})"
|
||||
rm -f /run/keys/locksmith-provider-patroni-${user}
|
||||
'';
|
||||
pgpass = ''
|
||||
echo "*:*:*:${user}:$(cat /run/keys/locksmith-provider-patroni-${user})"
|
||||
rm -f /run/keys/locksmith-provider-patroni-${user}
|
||||
'';
|
||||
}.${userConfig.locksmith.format};
|
||||
checkUpdate = "test -e /run/keys/locksmith-provider-patroni-${user}";
|
||||
inherit (userConfig.locksmith) nodes;
|
||||
}) cfg.users;
|
||||
};
|
||||
}
|
|
@ -1,6 +1,11 @@
|
|||
{ config, lib, ... }:
|
||||
{ config, ... }:
|
||||
|
||||
{
|
||||
imports = [
|
||||
./options.nix
|
||||
./incandescence.nix
|
||||
];
|
||||
|
||||
links = {
|
||||
patroni-pg-internal.ipv4 = "0.0.0.0";
|
||||
patroni-api.ipv4 = "0.0.0.0";
|
||||
|
@ -15,6 +20,7 @@
|
|||
worker = [
|
||||
./worker.nix
|
||||
./metrics.nix
|
||||
./create-databases.nix
|
||||
];
|
||||
haproxy = ./haproxy.nix;
|
||||
};
|
||||
|
|
10
cluster/services/patroni/incandescence.nix
Normal file
10
cluster/services/patroni/incandescence.nix
Normal file
|
@ -0,0 +1,10 @@
|
|||
{ config, lib, ... }:
|
||||
|
||||
{
|
||||
incandescence.providers.patroni = {
|
||||
objects = {
|
||||
user = lib.attrNames config.patroni.users;
|
||||
database = lib.attrNames config.patroni.databases;
|
||||
};
|
||||
};
|
||||
}
|
37
cluster/services/patroni/options.nix
Normal file
37
cluster/services/patroni/options.nix
Normal file
|
@ -0,0 +1,37 @@
|
|||
{ lib, ... }:
|
||||
|
||||
let
|
||||
inherit (lib) mkOption;
|
||||
inherit (lib.types) attrsOf enum listOf submodule str;
|
||||
in
|
||||
|
||||
{
|
||||
options.patroni = {
|
||||
databases = mkOption {
|
||||
type = attrsOf (submodule ({ name, ... }: {
|
||||
options = {
|
||||
owner = mkOption {
|
||||
type = str;
|
||||
default = name;
|
||||
};
|
||||
};
|
||||
}));
|
||||
};
|
||||
users = mkOption {
|
||||
type = attrsOf (submodule ({ ... }: {
|
||||
options = {
|
||||
locksmith = {
|
||||
nodes = mkOption {
|
||||
type = listOf str;
|
||||
default = [];
|
||||
};
|
||||
format = mkOption {
|
||||
type = enum [ "pgpass" "envFile" ];
|
||||
default = "pgpass";
|
||||
};
|
||||
};
|
||||
};
|
||||
}));
|
||||
};
|
||||
};
|
||||
}
|
Loading…
Reference in a new issue