This commit is contained in:
Oystein Kristoffer Tveit 2024-08-19 00:19:17 +02:00
parent 94e0e5d6c7
commit 7ec2c5de20
Signed by: oysteikt
GPG Key ID: 9F2F7D8250F35146
3 changed files with 117 additions and 1 deletions

View File

@ -1,5 +1,8 @@
# This should go to `/etc/mysqladm/config.toml` # This should go to `/etc/mysqladm/config.toml`
[server]
socket_path = "/var/run/mysqladm/mysqladm.sock"
[mysql] [mysql]
host = "localhost" host = "localhost"
port = 3306 port = 3306

View File

@ -52,11 +52,16 @@
overlays = { overlays = {
default = self.overlays.mysqladm-rs; default = self.overlays.mysqladm-rs;
greg-ng = final: prev: { mysqladm-rs = final: prev: {
inherit (self.packages.${prev.system}) mysqladm-rs; inherit (self.packages.${prev.system}) mysqladm-rs;
}; };
}; };
nixosModules = {
default = self.nixosModules.mysqladm-rs;
mysqladm-rs = import ./nix/module.nix;
};
packages = let packages = let
cargoToml = builtins.fromTOML (builtins.readFile ./Cargo.toml); cargoToml = builtins.fromTOML (builtins.readFile ./Cargo.toml);
cargoLock = ./Cargo.lock; cargoLock = ./Cargo.lock;

108
nix/module.nix Normal file
View File

@ -0,0 +1,108 @@
{ config, pkgs, lib, ... }:
let
cfg = config.services.mysqladm-rs;
format = pkgs.formats.toml { };
in
{
options.services.mysqladm-rs = {
enable = lib.mkEnableOption "Enable mysqladm-rs";
package = lib.mkPackageOption pkgs "mysqladm-rs" { };
createLocalUser = lib.mkOption {
type = lib.types.bool;
default = false;
description = "Create a local database user for mysqladm-rs";
};
settings = lib.mkOption {
default = { };
type = lib.types.submodule {
freeformType = format.type;
options = {
server = {
socket_path = lib.mkOption {
type = lib.types.path;
default = "/var/run/mysqladm/mysqladm.sock";
description = "Path to the MySQL socket";
};
};
mysql = {
host = lib.mkOption {
type = lib.types.str;
default = "localhost";
description = "MySQL host";
};
port = lib.mkOption {
type = lib.types.int;
default = 3306;
description = "MySQL port";
};
username = lib.mkOption {
type = lib.types.str;
default = "root";
description = "MySQL username";
};
# passwordFile = lib.mkOption {
# type = lib.types.path;
# default = "secret";
# description = "Path to a file containing the MySQL password";
# };
password = lib.mkOption {
type = lib.types.str;
default = "secret";
description = "MySQL password";
};
timeout = lib.mkOption {
type = lib.types.int;
default = 2;
description = "Number of seconds to wait for a response from the MySQL server";
};
};
};
};
};
};
config = let
configFile = format.generate "mysqladm-rs.conf" cfg.settings;
in lib.mkIf config.services.mysqladm-rs.enable {
environment.systemPackages = [ cfg.package ];
services.mysql.ensureUsers = lib.mkIf cfg.createLocalUser [
{
name = "mysqladm";
ensurePermissions = {
"mysql.*" = "SELECT, INSERT, UPDATE, DELETE";
"information_schema.*" = "SELECT";
"*.*" = "CREATE USER, GRANT OPTION";
};
}
];
systemd.services."mysqladm@" = {
description = "MySQL administration tool for non-admin users";
# after = [ "mysql.target" ];
environment.RUST_LOG = "debug";
serviceConfig = {
Type = "notify";
ExecStart = "${lib.getExe cfg.package} server socket-activate --config ${configFile}";
User = "mysqladm";
Group = "mysqladm";
DynamicUser = true;
};
};
systemd.sockets."mysqladm" = {
description = "MySQL administration tool for non-admin users";
wantedBy = [ "sockets.target" ];
restartTriggers = [ configFile ];
socketConfig = {
ListenStream = cfg.settings.server.socket_path;
Accept = "yes";
PassCredentials = true;
};
};
};
}