6afb255d97
these changes were generated with nixq 0.0.2, by running nixq ">> lib.mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> Inherit >> mdDoc[remove]" --batchmode nixos/**.nix two mentions of the mdDoc function remain in nixos/, both of which are inside of comments. Since lib.mdDoc is already defined as just id, this commit is a no-op as far as Nix (and the built manual) is concerned.
159 lines
5 KiB
Nix
159 lines
5 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
cfg = config.services.minio;
|
|
|
|
legacyCredentials = cfg: pkgs.writeText "minio-legacy-credentials" ''
|
|
MINIO_ROOT_USER=${cfg.accessKey}
|
|
MINIO_ROOT_PASSWORD=${cfg.secretKey}
|
|
'';
|
|
in
|
|
{
|
|
meta.maintainers = [ maintainers.bachp ];
|
|
|
|
options.services.minio = {
|
|
enable = mkEnableOption "Minio Object Storage";
|
|
|
|
listenAddress = mkOption {
|
|
default = ":9000";
|
|
type = types.str;
|
|
description = "IP address and port of the server.";
|
|
};
|
|
|
|
consoleAddress = mkOption {
|
|
default = ":9001";
|
|
type = types.str;
|
|
description = "IP address and port of the web UI (console).";
|
|
};
|
|
|
|
dataDir = mkOption {
|
|
default = [ "/var/lib/minio/data" ];
|
|
type = types.listOf (types.either types.path types.str);
|
|
description = "The list of data directories or nodes for storing the objects. Use one path for regular operation and the minimum of 4 endpoints for Erasure Code mode.";
|
|
};
|
|
|
|
configDir = mkOption {
|
|
default = "/var/lib/minio/config";
|
|
type = types.path;
|
|
description = "The config directory, for the access keys and other settings.";
|
|
};
|
|
|
|
accessKey = mkOption {
|
|
default = "";
|
|
type = types.str;
|
|
description = ''
|
|
Access key of 5 to 20 characters in length that clients use to access the server.
|
|
This overrides the access key that is generated by minio on first startup and stored inside the
|
|
`configDir` directory.
|
|
'';
|
|
};
|
|
|
|
secretKey = mkOption {
|
|
default = "";
|
|
type = types.str;
|
|
description = ''
|
|
Specify the Secret key of 8 to 40 characters in length that clients use to access the server.
|
|
This overrides the secret key that is generated by minio on first startup and stored inside the
|
|
`configDir` directory.
|
|
'';
|
|
};
|
|
|
|
rootCredentialsFile = mkOption {
|
|
type = types.nullOr types.path;
|
|
default = null;
|
|
description = ''
|
|
File containing the MINIO_ROOT_USER, default is "minioadmin", and
|
|
MINIO_ROOT_PASSWORD (length >= 8), default is "minioadmin"; in the format of
|
|
an EnvironmentFile=, as described by systemd.exec(5).
|
|
'';
|
|
example = "/etc/nixos/minio-root-credentials";
|
|
};
|
|
|
|
region = mkOption {
|
|
default = "us-east-1";
|
|
type = types.str;
|
|
description = ''
|
|
The physical location of the server. By default it is set to us-east-1, which is same as AWS S3's and Minio's default region.
|
|
'';
|
|
};
|
|
|
|
browser = mkOption {
|
|
default = true;
|
|
type = types.bool;
|
|
description = "Enable or disable access to web UI.";
|
|
};
|
|
|
|
package = mkPackageOption pkgs "minio" { };
|
|
};
|
|
|
|
config = mkIf cfg.enable {
|
|
warnings = optional ((cfg.accessKey != "") || (cfg.secretKey != "")) "services.minio.`accessKey` and services.minio.`secretKey` are deprecated, please use services.minio.`rootCredentialsFile` instead.";
|
|
|
|
systemd = lib.mkMerge [{
|
|
tmpfiles.rules = [
|
|
"d '${cfg.configDir}' - minio minio - -"
|
|
] ++ (map (x: "d '" + x + "' - minio minio - - ") (builtins.filter lib.types.path.check cfg.dataDir));
|
|
|
|
services.minio = {
|
|
description = "Minio Object Storage";
|
|
wants = [ "network-online.target" ];
|
|
after = [ "network-online.target" ];
|
|
wantedBy = [ "multi-user.target" ];
|
|
serviceConfig = {
|
|
ExecStart = "${cfg.package}/bin/minio server --json --address ${cfg.listenAddress} --console-address ${cfg.consoleAddress} --config-dir=${cfg.configDir} ${toString cfg.dataDir}";
|
|
Type = "simple";
|
|
User = "minio";
|
|
Group = "minio";
|
|
LimitNOFILE = 65536;
|
|
EnvironmentFile =
|
|
if (cfg.rootCredentialsFile != null) then cfg.rootCredentialsFile
|
|
else if ((cfg.accessKey != "") || (cfg.secretKey != "")) then (legacyCredentials cfg)
|
|
else null;
|
|
};
|
|
environment = {
|
|
MINIO_REGION = "${cfg.region}";
|
|
MINIO_BROWSER = "${if cfg.browser then "on" else "off"}";
|
|
};
|
|
};
|
|
}
|
|
|
|
(lib.mkIf (cfg.rootCredentialsFile != null) {
|
|
# The service will fail if the credentials file is missing
|
|
services.minio.unitConfig.ConditionPathExists = cfg.rootCredentialsFile;
|
|
|
|
# The service will not restart if the credentials file has
|
|
# been changed. This can cause stale root credentials.
|
|
paths.minio-root-credentials = {
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
pathConfig = {
|
|
PathChanged = [ cfg.rootCredentialsFile ];
|
|
Unit = "minio-restart.service";
|
|
};
|
|
};
|
|
|
|
services.minio-restart = {
|
|
description = "Restart MinIO";
|
|
|
|
script = ''
|
|
systemctl restart minio.service
|
|
'';
|
|
|
|
serviceConfig = {
|
|
Type = "oneshot";
|
|
Restart = "on-failure";
|
|
RestartSec = 5;
|
|
};
|
|
};
|
|
})];
|
|
|
|
users.users.minio = {
|
|
group = "minio";
|
|
uid = config.ids.uids.minio;
|
|
};
|
|
|
|
users.groups.minio.gid = config.ids.uids.minio;
|
|
};
|
|
}
|