nixpkgs/nixos/modules/services/networking/haproxy.nix

63 lines
1.5 KiB
Nix
Raw Normal View History

{ config, lib, pkgs, ... }:
2013-10-29 15:55:25 +01:00
let
cfg = config.services.haproxy;
haproxyCfg = pkgs.writeText "haproxy.conf" cfg.config;
in
with lib;
2013-10-29 15:55:25 +01:00
{
options = {
services.haproxy = {
enable = mkOption {
type = types.bool;
2013-10-29 15:55:25 +01:00
default = false;
description = ''
Whether to enable HAProxy, the reliable, high performance TCP/HTTP
load balancer.
'';
2013-10-29 15:55:25 +01:00
};
config = mkOption {
type = types.nullOr types.lines;
default = null;
description = ''
Contents of the HAProxy configuration file,
<filename>haproxy.conf</filename>.
'';
2013-10-29 15:55:25 +01:00
};
};
};
config = mkIf cfg.enable {
assertions = [{
assertion = cfg.config != null;
message = "You must provide services.haproxy.config.";
}];
2013-10-29 15:55:25 +01:00
systemd.services.haproxy = {
description = "HAProxy";
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
serviceConfig = {
Type = "forking";
PIDFile = "/run/haproxy.pid";
2013-10-29 15:55:25 +01:00
ExecStartPre = "${pkgs.haproxy}/sbin/haproxy -c -q -f ${haproxyCfg}";
ExecStart = "${pkgs.haproxy}/sbin/haproxy -D -f ${haproxyCfg} -p /run/haproxy.pid";
ExecReload = "-${pkgs.bash}/bin/bash -c \"exec ${pkgs.haproxy}/sbin/haproxy -D -f ${haproxyCfg} -p /run/haproxy.pid -sf $MAINPID\"";
2013-10-29 15:55:25 +01:00
};
};
environment.systemPackages = [ pkgs.haproxy ];
users.users.haproxy = {
2013-10-29 15:55:25 +01:00
group = "haproxy";
uid = config.ids.uids.haproxy;
};
users.groups.haproxy.gid = config.ids.uids.haproxy;
2013-10-29 15:55:25 +01:00
};
}