6afb255d97
these changes were generated with nixq 0.0.2, by running nixq ">> lib.mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> Inherit >> mdDoc[remove]" --batchmode nixos/**.nix two mentions of the mdDoc function remain in nixos/, both of which are inside of comments. Since lib.mdDoc is already defined as just id, this commit is a no-op as far as Nix (and the built manual) is concerned.
157 lines
5 KiB
Nix
157 lines
5 KiB
Nix
{ config, lib, pkgs, ... }: with lib; let
|
||
cfg = config.services.icingaweb2.modules.monitoring;
|
||
|
||
configIni = ''
|
||
[security]
|
||
protected_customvars = "${concatStringsSep "," cfg.generalConfig.protectedVars}"
|
||
'';
|
||
|
||
backendsIni = let
|
||
formatBool = b: if b then "1" else "0";
|
||
in concatStringsSep "\n" (mapAttrsToList (name: config: ''
|
||
[${name}]
|
||
type = "ido"
|
||
resource = "${config.resource}"
|
||
disabled = "${formatBool config.disabled}"
|
||
'') cfg.backends);
|
||
|
||
transportsIni = concatStringsSep "\n" (mapAttrsToList (name: config: ''
|
||
[${name}]
|
||
type = "${config.type}"
|
||
${optionalString (config.instance != null) ''instance = "${config.instance}"''}
|
||
${optionalString (config.type == "local" || config.type == "remote") ''path = "${config.path}"''}
|
||
${optionalString (config.type != "local") ''
|
||
host = "${config.host}"
|
||
${optionalString (config.port != null) ''port = "${toString config.port}"''}
|
||
user${optionalString (config.type == "api") "name"} = "${config.username}"
|
||
''}
|
||
${optionalString (config.type == "api") ''password = "${config.password}"''}
|
||
${optionalString (config.type == "remote") ''resource = "${config.resource}"''}
|
||
'') cfg.transports);
|
||
|
||
in {
|
||
options.services.icingaweb2.modules.monitoring = with types; {
|
||
enable = mkOption {
|
||
type = bool;
|
||
default = true;
|
||
description = "Whether to enable the icingaweb2 monitoring module.";
|
||
};
|
||
|
||
generalConfig = {
|
||
mutable = mkOption {
|
||
type = bool;
|
||
default = false;
|
||
description = "Make config.ini of the monitoring module mutable (e.g. via the web interface).";
|
||
};
|
||
|
||
protectedVars = mkOption {
|
||
type = listOf str;
|
||
default = [ "*pw*" "*pass*" "community" ];
|
||
description = "List of string patterns for custom variables which should be excluded from user’s view.";
|
||
};
|
||
};
|
||
|
||
mutableBackends = mkOption {
|
||
type = bool;
|
||
default = false;
|
||
description = "Make backends.ini of the monitoring module mutable (e.g. via the web interface).";
|
||
};
|
||
|
||
backends = mkOption {
|
||
default = { icinga = { resource = "icinga_ido"; }; };
|
||
description = "Monitoring backends to define";
|
||
type = attrsOf (submodule ({ name, ... }: {
|
||
options = {
|
||
name = mkOption {
|
||
visible = false;
|
||
default = name;
|
||
type = str;
|
||
description = "Name of this backend";
|
||
};
|
||
|
||
resource = mkOption {
|
||
type = str;
|
||
description = "Name of the IDO resource";
|
||
};
|
||
|
||
disabled = mkOption {
|
||
type = bool;
|
||
default = false;
|
||
description = "Disable this backend";
|
||
};
|
||
};
|
||
}));
|
||
};
|
||
|
||
mutableTransports = mkOption {
|
||
type = bool;
|
||
default = true;
|
||
description = "Make commandtransports.ini of the monitoring module mutable (e.g. via the web interface).";
|
||
};
|
||
|
||
transports = mkOption {
|
||
default = {};
|
||
description = "Command transports to define";
|
||
type = attrsOf (submodule ({ name, ... }: {
|
||
options = {
|
||
name = mkOption {
|
||
visible = false;
|
||
default = name;
|
||
type = str;
|
||
description = "Name of this transport";
|
||
};
|
||
|
||
type = mkOption {
|
||
type = enum [ "api" "local" "remote" ];
|
||
default = "api";
|
||
description = "Type of this transport";
|
||
};
|
||
|
||
instance = mkOption {
|
||
type = nullOr str;
|
||
default = null;
|
||
description = "Assign a icinga instance to this transport";
|
||
};
|
||
|
||
path = mkOption {
|
||
type = str;
|
||
description = "Path to the socket for local or remote transports";
|
||
};
|
||
|
||
host = mkOption {
|
||
type = str;
|
||
description = "Host for the api or remote transport";
|
||
};
|
||
|
||
port = mkOption {
|
||
type = nullOr str;
|
||
default = null;
|
||
description = "Port to connect to for the api or remote transport";
|
||
};
|
||
|
||
username = mkOption {
|
||
type = str;
|
||
description = "Username for the api or remote transport";
|
||
};
|
||
|
||
password = mkOption {
|
||
type = str;
|
||
description = "Password for the api transport";
|
||
};
|
||
|
||
resource = mkOption {
|
||
type = str;
|
||
description = "SSH identity resource for the remote transport";
|
||
};
|
||
};
|
||
}));
|
||
};
|
||
};
|
||
|
||
config = mkIf (config.services.icingaweb2.enable && cfg.enable) {
|
||
environment.etc = { "icingaweb2/enabledModules/monitoring" = { source = "${pkgs.icingaweb2}/modules/monitoring"; }; }
|
||
// optionalAttrs (!cfg.generalConfig.mutable) { "icingaweb2/modules/monitoring/config.ini".text = configIni; }
|
||
// optionalAttrs (!cfg.mutableBackends) { "icingaweb2/modules/monitoring/backends.ini".text = backendsIni; }
|
||
// optionalAttrs (!cfg.mutableTransports) { "icingaweb2/modules/monitoring/commandtransports.ini".text = transportsIni; };
|
||
};
|
||
}
|