54 lines
1.9 KiB
Nix
54 lines
1.9 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
consul = config.services.consul.package;
|
|
|
|
consulCfg = config.services.consul.extraConfig;
|
|
consulHttpAddr = "${consulCfg.addresses.http or "127.0.0.1"}:${toString (consulCfg.ports.http or 8500)}";
|
|
in
|
|
{
|
|
options.systemd.services = mkOption {
|
|
type = with types; attrsOf (submodule ({ config, ... }: let
|
|
cfg = config.distributed;
|
|
in {
|
|
config = mkIf cfg.enable {
|
|
|
|
};
|
|
}));
|
|
};
|
|
|
|
config.systemd.packages = pipe config.systemd.services [
|
|
(filterAttrs (_: v: v.distributed.enable))
|
|
(mapAttrsToList (n: v: let
|
|
inherit (v.serviceConfig) ExecStart;
|
|
|
|
cfg = v.distributed;
|
|
|
|
svc = config.consul.services.${cfg.registerService};
|
|
|
|
runWithRegistration = pkgs.writeShellScript "run-with-registration" ''
|
|
trap '${svc.commands.deregister}' EXIT
|
|
${svc.commands.register}
|
|
''${@}
|
|
'';
|
|
|
|
waitForConsul = pkgs.writeShellScript "wait-for-consul" ''
|
|
while ! ${consul}/bin/consul lock --name="pre-flight-check" --n=${toString cfg.replicas} --shell=false "$1" ${pkgs.coreutils}/bin/true; do
|
|
sleep 1
|
|
done
|
|
'';
|
|
|
|
hasSpecialPrefix = elem (substring 0 1 ExecStart) [ "@" "-" ":" "+" "!" ];
|
|
in assert !hasSpecialPrefix; pkgs.writeTextDir "etc/systemd/system/${n}.service.d/distributed.conf" ''
|
|
[Service]
|
|
ExecStartPre=${waitForConsul} 'services/${n}%i'
|
|
ExecStart=
|
|
ExecStart=${consul}/bin/consul lock --name=${n} --n=${toString cfg.replicas} --shell=false --child-exit-code 'services/${n}%i' ${optionalString (cfg.registerService != null) runWithRegistration} ${ExecStart}
|
|
Environment="CONSUL_HTTP_ADDR=${consulHttpAddr}"
|
|
${optionalString (v.serviceConfig ? RestrictAddressFamilies) "RestrictAddressFamilies=AF_NETLINK"}
|
|
${optionalString (cfg.registerService != null) "ExecStopPost=${svc.commands.deregister}"}
|
|
''))
|
|
];
|
|
}
|