2020-04-24 23:36:52 +00:00
|
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
|
|
let
|
2024-05-15 15:35:15 +00:00
|
|
|
|
inherit (lib)
|
|
|
|
|
attrValues
|
|
|
|
|
concatMapStrings
|
|
|
|
|
concatStringsSep
|
|
|
|
|
const
|
|
|
|
|
elem
|
|
|
|
|
filterAttrs
|
|
|
|
|
isString
|
|
|
|
|
literalExpression
|
|
|
|
|
mapAttrs
|
|
|
|
|
mapAttrsToList
|
|
|
|
|
mkAfter
|
|
|
|
|
mkBefore
|
|
|
|
|
mkDefault
|
|
|
|
|
mkEnableOption
|
|
|
|
|
mkIf
|
|
|
|
|
mkMerge
|
|
|
|
|
mkOption
|
|
|
|
|
mkPackageOption
|
|
|
|
|
mkRemovedOptionModule
|
|
|
|
|
mkRenamedOptionModule
|
|
|
|
|
optionalString
|
|
|
|
|
types
|
|
|
|
|
versionAtLeast
|
|
|
|
|
;
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
|
|
cfg = config.services.postgresql;
|
|
|
|
|
|
|
|
|
|
postgresql =
|
2023-03-30 22:05:00 +00:00
|
|
|
|
let
|
|
|
|
|
# ensure that
|
|
|
|
|
# services.postgresql = {
|
|
|
|
|
# enableJIT = true;
|
|
|
|
|
# package = pkgs.postgresql_<major>;
|
|
|
|
|
# };
|
|
|
|
|
# works.
|
2024-05-15 15:35:15 +00:00
|
|
|
|
base = if cfg.enableJIT then cfg.package.withJIT else cfg.package.withoutJIT;
|
2023-03-30 22:05:00 +00:00
|
|
|
|
in
|
2020-04-24 23:36:52 +00:00
|
|
|
|
if cfg.extraPlugins == []
|
2023-03-30 22:05:00 +00:00
|
|
|
|
then base
|
2024-01-02 11:29:13 +00:00
|
|
|
|
else base.withPackages cfg.extraPlugins;
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
2020-09-25 04:45:31 +00:00
|
|
|
|
toStr = value:
|
|
|
|
|
if true == value then "yes"
|
|
|
|
|
else if false == value then "no"
|
|
|
|
|
else if isString value then "'${lib.replaceStrings ["'"] ["''"] value}'"
|
2024-05-15 15:35:15 +00:00
|
|
|
|
else builtins.toString value;
|
2020-09-25 04:45:31 +00:00
|
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
|
# The main PostgreSQL configuration file.
|
2024-04-21 15:54:59 +00:00
|
|
|
|
configFile = pkgs.writeTextDir "postgresql.conf" (concatStringsSep "\n" (mapAttrsToList (n: v: "${n} = ${toStr v}") (filterAttrs (const (x: x != null)) cfg.settings)));
|
2021-04-05 15:23:46 +00:00
|
|
|
|
|
|
|
|
|
configFileCheck = pkgs.runCommand "postgresql-configfile-check" {} ''
|
|
|
|
|
${cfg.package}/bin/postgres -D${configFile} -C config_file >/dev/null
|
|
|
|
|
touch $out
|
|
|
|
|
'';
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
|
|
groupAccessAvailable = versionAtLeast postgresql.version "11.0";
|
|
|
|
|
|
|
|
|
|
in
|
|
|
|
|
|
|
|
|
|
{
|
2020-09-25 04:45:31 +00:00
|
|
|
|
imports = [
|
|
|
|
|
(mkRemovedOptionModule [ "services" "postgresql" "extraConfig" ] "Use services.postgresql.settings instead.")
|
2024-04-21 15:54:59 +00:00
|
|
|
|
|
|
|
|
|
(mkRenamedOptionModule [ "services" "postgresql" "logLinePrefix" ] [ "services" "postgresql" "settings" "log_line_prefix" ])
|
|
|
|
|
(mkRenamedOptionModule [ "services" "postgresql" "port" ] [ "services" "postgresql" "settings" "port" ])
|
2020-09-25 04:45:31 +00:00
|
|
|
|
];
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
|
|
###### interface
|
|
|
|
|
|
|
|
|
|
options = {
|
|
|
|
|
|
|
|
|
|
services.postgresql = {
|
|
|
|
|
|
2024-04-21 15:54:59 +00:00
|
|
|
|
enable = mkEnableOption "PostgreSQL Server";
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
2024-04-21 15:54:59 +00:00
|
|
|
|
enableJIT = mkEnableOption "JIT support";
|
2023-03-30 22:05:00 +00:00
|
|
|
|
|
2024-01-02 11:29:13 +00:00
|
|
|
|
package = mkPackageOption pkgs "postgresql" {
|
|
|
|
|
example = "postgresql_15";
|
2020-04-24 23:36:52 +00:00
|
|
|
|
};
|
|
|
|
|
|
2021-04-05 15:23:46 +00:00
|
|
|
|
checkConfig = mkOption {
|
|
|
|
|
type = types.bool;
|
|
|
|
|
default = true;
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = "Check the syntax of the configuration file at compile time";
|
2021-04-05 15:23:46 +00:00
|
|
|
|
};
|
|
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
|
dataDir = mkOption {
|
|
|
|
|
type = types.path;
|
2021-10-06 13:57:05 +00:00
|
|
|
|
defaultText = literalExpression ''"/var/lib/postgresql/''${config.services.postgresql.package.psqlSchema}"'';
|
2023-11-16 04:20:00 +00:00
|
|
|
|
example = "/var/lib/postgresql/15";
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = ''
|
2020-08-20 17:08:02 +00:00
|
|
|
|
The data directory for PostgreSQL. If left as the default value
|
|
|
|
|
this directory will automatically be created before the PostgreSQL server starts, otherwise
|
|
|
|
|
the sysadmin is responsible for ensuring the directory exists with appropriate ownership
|
|
|
|
|
and permissions.
|
2020-04-24 23:36:52 +00:00
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
authentication = mkOption {
|
|
|
|
|
type = types.lines;
|
|
|
|
|
default = "";
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = ''
|
2020-11-03 02:18:15 +00:00
|
|
|
|
Defines how users authenticate themselves to the server. See the
|
2022-08-21 13:32:41 +00:00
|
|
|
|
[PostgreSQL documentation for pg_hba.conf](https://www.postgresql.org/docs/current/auth-pg-hba-conf.html)
|
2020-11-03 02:18:15 +00:00
|
|
|
|
for details on the expected format of this option. By default,
|
|
|
|
|
peer based authentication will be used for users connecting
|
|
|
|
|
via the Unix socket, and md5 password authentication will be
|
|
|
|
|
used for users connecting via TCP. Any added rules will be
|
|
|
|
|
inserted above the default rules. If you'd like to replace the
|
2022-08-21 13:32:41 +00:00
|
|
|
|
default rules entirely, you can use `lib.mkForce` in your
|
2020-11-03 02:18:15 +00:00
|
|
|
|
module.
|
2020-04-24 23:36:52 +00:00
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
identMap = mkOption {
|
|
|
|
|
type = types.lines;
|
|
|
|
|
default = "";
|
2023-10-09 19:29:22 +00:00
|
|
|
|
example = ''
|
|
|
|
|
map-name-0 system-username-0 database-username-0
|
|
|
|
|
map-name-1 system-username-1 database-username-1
|
|
|
|
|
'';
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = ''
|
2020-04-24 23:36:52 +00:00
|
|
|
|
Defines the mapping from system users to database users.
|
|
|
|
|
|
2023-10-09 19:29:22 +00:00
|
|
|
|
See the [auth doc](https://postgresql.org/docs/current/auth-username-maps.html).
|
2020-04-24 23:36:52 +00:00
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
initdbArgs = mkOption {
|
|
|
|
|
type = with types; listOf str;
|
|
|
|
|
default = [];
|
|
|
|
|
example = [ "--data-checksums" "--allow-group-access" ];
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = ''
|
2022-08-12 12:06:08 +00:00
|
|
|
|
Additional arguments passed to `initdb` during data dir
|
2020-04-24 23:36:52 +00:00
|
|
|
|
initialisation.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
initialScript = mkOption {
|
|
|
|
|
type = types.nullOr types.path;
|
|
|
|
|
default = null;
|
2023-10-09 19:29:22 +00:00
|
|
|
|
example = literalExpression ''
|
|
|
|
|
pkgs.writeText "init-sql-script" '''
|
|
|
|
|
alter user postgres with password 'myPassword';
|
|
|
|
|
''';'';
|
|
|
|
|
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = ''
|
2020-04-24 23:36:52 +00:00
|
|
|
|
A file containing SQL statements to execute on first startup.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
ensureDatabases = mkOption {
|
|
|
|
|
type = types.listOf types.str;
|
|
|
|
|
default = [];
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = ''
|
2020-04-24 23:36:52 +00:00
|
|
|
|
Ensures that the specified databases exist.
|
|
|
|
|
This option will never delete existing databases, especially not when the value of this
|
|
|
|
|
option is changed. This means that databases created once through this option or
|
|
|
|
|
otherwise have to be removed manually.
|
|
|
|
|
'';
|
|
|
|
|
example = [
|
|
|
|
|
"gitea"
|
|
|
|
|
"nextcloud"
|
|
|
|
|
];
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
ensureUsers = mkOption {
|
|
|
|
|
type = types.listOf (types.submodule {
|
|
|
|
|
options = {
|
|
|
|
|
name = mkOption {
|
|
|
|
|
type = types.str;
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = ''
|
2020-04-24 23:36:52 +00:00
|
|
|
|
Name of the user to ensure.
|
|
|
|
|
'';
|
|
|
|
|
};
|
2022-12-28 21:21:41 +00:00
|
|
|
|
|
2024-01-02 11:29:13 +00:00
|
|
|
|
ensureDBOwnership = mkOption {
|
|
|
|
|
type = types.bool;
|
|
|
|
|
default = false;
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = ''
|
2024-01-02 11:29:13 +00:00
|
|
|
|
Grants the user ownership to a database with the same name.
|
|
|
|
|
This database must be defined manually in
|
|
|
|
|
[](#opt-services.postgresql.ensureDatabases).
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2022-12-28 21:21:41 +00:00
|
|
|
|
ensureClauses = mkOption {
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = ''
|
2022-12-28 21:21:41 +00:00
|
|
|
|
An attrset of clauses to grant to the user. Under the hood this uses the
|
|
|
|
|
[ALTER USER syntax](https://www.postgresql.org/docs/current/sql-alteruser.html) for each attrName where
|
|
|
|
|
the attrValue is true in the attrSet:
|
|
|
|
|
`ALTER USER user.name WITH attrName`
|
|
|
|
|
'';
|
|
|
|
|
example = literalExpression ''
|
|
|
|
|
{
|
|
|
|
|
superuser = true;
|
|
|
|
|
createrole = true;
|
|
|
|
|
createdb = true;
|
|
|
|
|
}
|
|
|
|
|
'';
|
|
|
|
|
default = {};
|
|
|
|
|
defaultText = lib.literalMD ''
|
|
|
|
|
The default, `null`, means that the user created will have the default permissions assigned by PostgreSQL. Subsequent server starts will not set or unset the clause, so imperative changes are preserved.
|
|
|
|
|
'';
|
|
|
|
|
type = types.submodule {
|
|
|
|
|
options = let
|
|
|
|
|
defaultText = lib.literalMD ''
|
|
|
|
|
`null`: do not set. For newly created roles, use PostgreSQL's default. For existing roles, do not touch this clause.
|
|
|
|
|
'';
|
|
|
|
|
in {
|
|
|
|
|
superuser = mkOption {
|
|
|
|
|
type = types.nullOr types.bool;
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = ''
|
2022-12-28 21:21:41 +00:00
|
|
|
|
Grants the user, created by the ensureUser attr, superuser permissions. From the postgres docs:
|
|
|
|
|
|
|
|
|
|
A database superuser bypasses all permission checks,
|
|
|
|
|
except the right to log in. This is a dangerous privilege
|
|
|
|
|
and should not be used carelessly; it is best to do most
|
|
|
|
|
of your work as a role that is not a superuser. To create
|
|
|
|
|
a new database superuser, use CREATE ROLE name SUPERUSER.
|
|
|
|
|
You must do this as a role that is already a superuser.
|
|
|
|
|
|
|
|
|
|
More information on postgres roles can be found [here](https://www.postgresql.org/docs/current/role-attributes.html)
|
|
|
|
|
'';
|
|
|
|
|
default = null;
|
|
|
|
|
inherit defaultText;
|
|
|
|
|
};
|
|
|
|
|
createrole = mkOption {
|
|
|
|
|
type = types.nullOr types.bool;
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = ''
|
2022-12-28 21:21:41 +00:00
|
|
|
|
Grants the user, created by the ensureUser attr, createrole permissions. From the postgres docs:
|
|
|
|
|
|
|
|
|
|
A role must be explicitly given permission to create more
|
|
|
|
|
roles (except for superusers, since those bypass all
|
|
|
|
|
permission checks). To create such a role, use CREATE
|
|
|
|
|
ROLE name CREATEROLE. A role with CREATEROLE privilege
|
|
|
|
|
can alter and drop other roles, too, as well as grant or
|
|
|
|
|
revoke membership in them. However, to create, alter,
|
|
|
|
|
drop, or change membership of a superuser role, superuser
|
|
|
|
|
status is required; CREATEROLE is insufficient for that.
|
|
|
|
|
|
|
|
|
|
More information on postgres roles can be found [here](https://www.postgresql.org/docs/current/role-attributes.html)
|
|
|
|
|
'';
|
|
|
|
|
default = null;
|
|
|
|
|
inherit defaultText;
|
|
|
|
|
};
|
|
|
|
|
createdb = mkOption {
|
|
|
|
|
type = types.nullOr types.bool;
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = ''
|
2022-12-28 21:21:41 +00:00
|
|
|
|
Grants the user, created by the ensureUser attr, createdb permissions. From the postgres docs:
|
|
|
|
|
|
|
|
|
|
A role must be explicitly given permission to create
|
|
|
|
|
databases (except for superusers, since those bypass all
|
|
|
|
|
permission checks). To create such a role, use CREATE
|
|
|
|
|
ROLE name CREATEDB.
|
|
|
|
|
|
|
|
|
|
More information on postgres roles can be found [here](https://www.postgresql.org/docs/current/role-attributes.html)
|
|
|
|
|
'';
|
|
|
|
|
default = null;
|
|
|
|
|
inherit defaultText;
|
|
|
|
|
};
|
|
|
|
|
"inherit" = mkOption {
|
|
|
|
|
type = types.nullOr types.bool;
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = ''
|
2022-12-28 21:21:41 +00:00
|
|
|
|
Grants the user created inherit permissions. From the postgres docs:
|
|
|
|
|
|
|
|
|
|
A role is given permission to inherit the privileges of
|
|
|
|
|
roles it is a member of, by default. However, to create a
|
|
|
|
|
role without the permission, use CREATE ROLE name
|
|
|
|
|
NOINHERIT.
|
|
|
|
|
|
|
|
|
|
More information on postgres roles can be found [here](https://www.postgresql.org/docs/current/role-attributes.html)
|
|
|
|
|
'';
|
|
|
|
|
default = null;
|
|
|
|
|
inherit defaultText;
|
|
|
|
|
};
|
|
|
|
|
login = mkOption {
|
|
|
|
|
type = types.nullOr types.bool;
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = ''
|
2022-12-28 21:21:41 +00:00
|
|
|
|
Grants the user, created by the ensureUser attr, login permissions. From the postgres docs:
|
|
|
|
|
|
|
|
|
|
Only roles that have the LOGIN attribute can be used as
|
|
|
|
|
the initial role name for a database connection. A role
|
|
|
|
|
with the LOGIN attribute can be considered the same as a
|
|
|
|
|
“database user”. To create a role with login privilege,
|
|
|
|
|
use either:
|
|
|
|
|
|
|
|
|
|
CREATE ROLE name LOGIN; CREATE USER name;
|
|
|
|
|
|
|
|
|
|
(CREATE USER is equivalent to CREATE ROLE except that
|
|
|
|
|
CREATE USER includes LOGIN by default, while CREATE ROLE
|
|
|
|
|
does not.)
|
|
|
|
|
|
|
|
|
|
More information on postgres roles can be found [here](https://www.postgresql.org/docs/current/role-attributes.html)
|
|
|
|
|
'';
|
|
|
|
|
default = null;
|
|
|
|
|
inherit defaultText;
|
|
|
|
|
};
|
|
|
|
|
replication = mkOption {
|
|
|
|
|
type = types.nullOr types.bool;
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = ''
|
2022-12-28 21:21:41 +00:00
|
|
|
|
Grants the user, created by the ensureUser attr, replication permissions. From the postgres docs:
|
|
|
|
|
|
|
|
|
|
A role must explicitly be given permission to initiate
|
|
|
|
|
streaming replication (except for superusers, since those
|
|
|
|
|
bypass all permission checks). A role used for streaming
|
|
|
|
|
replication must have LOGIN permission as well. To create
|
|
|
|
|
such a role, use CREATE ROLE name REPLICATION LOGIN.
|
|
|
|
|
|
|
|
|
|
More information on postgres roles can be found [here](https://www.postgresql.org/docs/current/role-attributes.html)
|
|
|
|
|
'';
|
|
|
|
|
default = null;
|
|
|
|
|
inherit defaultText;
|
|
|
|
|
};
|
|
|
|
|
bypassrls = mkOption {
|
|
|
|
|
type = types.nullOr types.bool;
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = ''
|
2022-12-28 21:21:41 +00:00
|
|
|
|
Grants the user, created by the ensureUser attr, replication permissions. From the postgres docs:
|
|
|
|
|
|
|
|
|
|
A role must be explicitly given permission to bypass
|
|
|
|
|
every row-level security (RLS) policy (except for
|
|
|
|
|
superusers, since those bypass all permission checks). To
|
|
|
|
|
create such a role, use CREATE ROLE name BYPASSRLS as a
|
|
|
|
|
superuser.
|
|
|
|
|
|
|
|
|
|
More information on postgres roles can be found [here](https://www.postgresql.org/docs/current/role-attributes.html)
|
|
|
|
|
'';
|
|
|
|
|
default = null;
|
|
|
|
|
inherit defaultText;
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
};
|
2020-04-24 23:36:52 +00:00
|
|
|
|
};
|
|
|
|
|
});
|
|
|
|
|
default = [];
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = ''
|
2024-01-02 11:29:13 +00:00
|
|
|
|
Ensures that the specified users exist.
|
2020-04-24 23:36:52 +00:00
|
|
|
|
The PostgreSQL users will be identified using peer authentication. This authenticates the Unix user with the
|
|
|
|
|
same name only, and that without the need for a password.
|
2024-01-02 11:29:13 +00:00
|
|
|
|
This option will never delete existing users or remove DB ownership of databases
|
|
|
|
|
once granted with `ensureDBOwnership = true;`. This means that this must be
|
|
|
|
|
cleaned up manually when changing after changing the config in here.
|
2020-04-24 23:36:52 +00:00
|
|
|
|
'';
|
2021-10-06 13:57:05 +00:00
|
|
|
|
example = literalExpression ''
|
2020-04-24 23:36:52 +00:00
|
|
|
|
[
|
|
|
|
|
{
|
|
|
|
|
name = "nextcloud";
|
|
|
|
|
}
|
|
|
|
|
{
|
|
|
|
|
name = "superuser";
|
2024-01-02 11:29:13 +00:00
|
|
|
|
ensureDBOwnership = true;
|
2020-04-24 23:36:52 +00:00
|
|
|
|
}
|
|
|
|
|
]
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
enableTCPIP = mkOption {
|
|
|
|
|
type = types.bool;
|
|
|
|
|
default = false;
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = ''
|
2020-04-24 23:36:52 +00:00
|
|
|
|
Whether PostgreSQL should listen on all network interfaces.
|
|
|
|
|
If disabled, the database can only be accessed via its Unix
|
|
|
|
|
domain socket or via TCP connections to localhost.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
extraPlugins = mkOption {
|
2024-01-02 11:29:13 +00:00
|
|
|
|
type = with types; coercedTo (listOf path) (path: _ignorePg: path) (functionTo (listOf path));
|
|
|
|
|
default = _: [];
|
|
|
|
|
example = literalExpression "ps: with ps; [ postgis pg_repack ]";
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = ''
|
2024-01-02 11:29:13 +00:00
|
|
|
|
List of PostgreSQL plugins.
|
2020-04-24 23:36:52 +00:00
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2020-09-25 04:45:31 +00:00
|
|
|
|
settings = mkOption {
|
2024-04-21 15:54:59 +00:00
|
|
|
|
type = with types; submodule {
|
|
|
|
|
freeformType = attrsOf (oneOf [ bool float int str ]);
|
|
|
|
|
options = {
|
|
|
|
|
shared_preload_libraries = mkOption {
|
|
|
|
|
type = nullOr (coercedTo (listOf str) (concatStringsSep ", ") str);
|
|
|
|
|
default = null;
|
|
|
|
|
example = literalExpression ''[ "auto_explain" "anon" ]'';
|
|
|
|
|
description = ''
|
|
|
|
|
List of libraries to be preloaded.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
log_line_prefix = mkOption {
|
|
|
|
|
type = types.str;
|
|
|
|
|
default = "[%p] ";
|
|
|
|
|
example = "%m [%p] ";
|
|
|
|
|
description = ''
|
|
|
|
|
A printf-style string that is output at the beginning of each log line.
|
|
|
|
|
Upstream default is `'%m [%p] '`, i.e. it includes the timestamp. We do
|
|
|
|
|
not include the timestamp, because journal has it anyway.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
port = mkOption {
|
|
|
|
|
type = types.port;
|
|
|
|
|
default = 5432;
|
|
|
|
|
description = ''
|
|
|
|
|
The port on which PostgreSQL listens.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
};
|
2020-09-25 04:45:31 +00:00
|
|
|
|
default = {};
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = ''
|
2020-09-25 04:45:31 +00:00
|
|
|
|
PostgreSQL configuration. Refer to
|
2024-01-02 11:29:13 +00:00
|
|
|
|
<https://www.postgresql.org/docs/current/config-setting.html#CONFIG-SETTING-CONFIGURATION-FILE>
|
2022-09-09 14:08:57 +00:00
|
|
|
|
for an overview of `postgresql.conf`.
|
2020-09-25 04:45:31 +00:00
|
|
|
|
|
2022-09-09 14:08:57 +00:00
|
|
|
|
::: {.note}
|
|
|
|
|
String values will automatically be enclosed in single quotes. Single quotes will be
|
|
|
|
|
escaped with two single quotes as described by the upstream documentation linked above.
|
|
|
|
|
:::
|
2020-09-25 04:45:31 +00:00
|
|
|
|
'';
|
2021-10-06 13:57:05 +00:00
|
|
|
|
example = literalExpression ''
|
2020-09-25 04:45:31 +00:00
|
|
|
|
{
|
|
|
|
|
log_connections = true;
|
|
|
|
|
log_statement = "all";
|
2023-08-04 22:07:22 +00:00
|
|
|
|
logging_collector = true;
|
|
|
|
|
log_disconnections = true;
|
2020-09-25 04:45:31 +00:00
|
|
|
|
log_destination = lib.mkForce "syslog";
|
|
|
|
|
}
|
|
|
|
|
'';
|
2020-04-24 23:36:52 +00:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
recoveryConfig = mkOption {
|
|
|
|
|
type = types.nullOr types.lines;
|
|
|
|
|
default = null;
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = ''
|
2022-08-12 12:06:08 +00:00
|
|
|
|
Contents of the {file}`recovery.conf` file.
|
2020-04-24 23:36:52 +00:00
|
|
|
|
'';
|
|
|
|
|
};
|
2020-09-25 04:45:31 +00:00
|
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
|
superUser = mkOption {
|
|
|
|
|
type = types.str;
|
2020-09-25 04:45:31 +00:00
|
|
|
|
default = "postgres";
|
2020-04-24 23:36:52 +00:00
|
|
|
|
internal = true;
|
2020-09-25 04:45:31 +00:00
|
|
|
|
readOnly = true;
|
2024-04-21 15:54:59 +00:00
|
|
|
|
description = ''
|
2020-09-25 04:45:31 +00:00
|
|
|
|
PostgreSQL superuser account to use for various operations. Internal since changing
|
|
|
|
|
this value would lead to breakage while setting up databases.
|
2020-04-24 23:36:52 +00:00
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
###### implementation
|
|
|
|
|
|
|
|
|
|
config = mkIf cfg.enable {
|
|
|
|
|
|
2024-01-02 11:29:13 +00:00
|
|
|
|
assertions = map ({ name, ensureDBOwnership, ... }: {
|
2024-05-15 15:35:15 +00:00
|
|
|
|
assertion = ensureDBOwnership -> elem name cfg.ensureDatabases;
|
2024-01-02 11:29:13 +00:00
|
|
|
|
message = ''
|
|
|
|
|
For each database user defined with `services.postgresql.ensureUsers` and
|
|
|
|
|
`ensureDBOwnership = true;`, a database with the same name must be defined
|
|
|
|
|
in `services.postgresql.ensureDatabases`.
|
|
|
|
|
|
|
|
|
|
Offender: ${name} has not been found among databases.
|
|
|
|
|
'';
|
|
|
|
|
}) cfg.ensureUsers;
|
|
|
|
|
|
2020-09-25 04:45:31 +00:00
|
|
|
|
services.postgresql.settings =
|
|
|
|
|
{
|
|
|
|
|
hba_file = "${pkgs.writeText "pg_hba.conf" cfg.authentication}";
|
|
|
|
|
ident_file = "${pkgs.writeText "pg_ident.conf" cfg.identMap}";
|
|
|
|
|
log_destination = "stderr";
|
|
|
|
|
listen_addresses = if cfg.enableTCPIP then "*" else "localhost";
|
2023-03-30 22:05:00 +00:00
|
|
|
|
jit = mkDefault (if cfg.enableJIT then "on" else "off");
|
2020-09-25 04:45:31 +00:00
|
|
|
|
};
|
|
|
|
|
|
2021-12-19 01:06:50 +00:00
|
|
|
|
services.postgresql.package = let
|
|
|
|
|
mkThrow = ver: throw "postgresql_${ver} was removed, please upgrade your postgresql version.";
|
2023-11-16 04:20:00 +00:00
|
|
|
|
base = if versionAtLeast config.system.stateVersion "23.11" then pkgs.postgresql_15
|
|
|
|
|
else if versionAtLeast config.system.stateVersion "22.05" then pkgs.postgresql_14
|
2023-03-30 22:05:00 +00:00
|
|
|
|
else if versionAtLeast config.system.stateVersion "21.11" then pkgs.postgresql_13
|
2023-11-16 04:20:00 +00:00
|
|
|
|
else if versionAtLeast config.system.stateVersion "20.03" then mkThrow "11"
|
2023-03-30 22:05:00 +00:00
|
|
|
|
else if versionAtLeast config.system.stateVersion "17.09" then mkThrow "9_6"
|
|
|
|
|
else mkThrow "9_5";
|
2021-12-19 01:06:50 +00:00
|
|
|
|
in
|
2020-04-24 23:36:52 +00:00
|
|
|
|
# Note: when changing the default, make it conditional on
|
|
|
|
|
# ‘system.stateVersion’ to maintain compatibility with existing
|
|
|
|
|
# systems!
|
2023-03-30 22:05:00 +00:00
|
|
|
|
mkDefault (if cfg.enableJIT then base.withJIT else base);
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
2020-08-20 17:08:02 +00:00
|
|
|
|
services.postgresql.dataDir = mkDefault "/var/lib/postgresql/${cfg.package.psqlSchema}";
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
2023-10-09 19:29:22 +00:00
|
|
|
|
services.postgresql.authentication = mkMerge [
|
|
|
|
|
(mkBefore "# Generated file; do not edit!")
|
|
|
|
|
(mkAfter
|
2020-04-24 23:36:52 +00:00
|
|
|
|
''
|
2023-10-09 19:29:22 +00:00
|
|
|
|
# default value of services.postgresql.authentication
|
2020-04-24 23:36:52 +00:00
|
|
|
|
local all all peer
|
|
|
|
|
host all all 127.0.0.1/32 md5
|
|
|
|
|
host all all ::1/128 md5
|
2023-10-09 19:29:22 +00:00
|
|
|
|
'')
|
|
|
|
|
];
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
|
|
users.users.postgres =
|
|
|
|
|
{ name = "postgres";
|
|
|
|
|
uid = config.ids.uids.postgres;
|
|
|
|
|
group = "postgres";
|
|
|
|
|
description = "PostgreSQL server user";
|
|
|
|
|
home = "${cfg.dataDir}";
|
|
|
|
|
useDefaultShell = true;
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
users.groups.postgres.gid = config.ids.gids.postgres;
|
|
|
|
|
|
|
|
|
|
environment.systemPackages = [ postgresql ];
|
|
|
|
|
|
|
|
|
|
environment.pathsToLink = [
|
|
|
|
|
"/share/postgresql"
|
|
|
|
|
];
|
|
|
|
|
|
2023-05-24 13:37:59 +00:00
|
|
|
|
system.checks = lib.optional (cfg.checkConfig && pkgs.stdenv.hostPlatform == pkgs.stdenv.buildPlatform) configFileCheck;
|
2021-04-05 15:23:46 +00:00
|
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
|
systemd.services.postgresql =
|
|
|
|
|
{ description = "PostgreSQL Server";
|
|
|
|
|
|
|
|
|
|
wantedBy = [ "multi-user.target" ];
|
|
|
|
|
after = [ "network.target" ];
|
|
|
|
|
|
|
|
|
|
environment.PGDATA = cfg.dataDir;
|
|
|
|
|
|
|
|
|
|
path = [ postgresql ];
|
|
|
|
|
|
|
|
|
|
preStart =
|
|
|
|
|
''
|
|
|
|
|
if ! test -e ${cfg.dataDir}/PG_VERSION; then
|
2020-08-20 17:08:02 +00:00
|
|
|
|
# Cleanup the data directory.
|
2020-04-24 23:36:52 +00:00
|
|
|
|
rm -f ${cfg.dataDir}/*.conf
|
|
|
|
|
|
2020-08-20 17:08:02 +00:00
|
|
|
|
# Initialise the database.
|
2020-04-24 23:36:52 +00:00
|
|
|
|
initdb -U ${cfg.superUser} ${concatStringsSep " " cfg.initdbArgs}
|
2020-08-20 17:08:02 +00:00
|
|
|
|
|
2020-04-24 23:36:52 +00:00
|
|
|
|
# See postStart!
|
|
|
|
|
touch "${cfg.dataDir}/.first_startup"
|
|
|
|
|
fi
|
2020-08-20 17:08:02 +00:00
|
|
|
|
|
2021-04-05 15:23:46 +00:00
|
|
|
|
ln -sfn "${configFile}/postgresql.conf" "${cfg.dataDir}/postgresql.conf"
|
2020-04-24 23:36:52 +00:00
|
|
|
|
${optionalString (cfg.recoveryConfig != null) ''
|
|
|
|
|
ln -sfn "${pkgs.writeText "recovery.conf" cfg.recoveryConfig}" \
|
|
|
|
|
"${cfg.dataDir}/recovery.conf"
|
|
|
|
|
''}
|
|
|
|
|
'';
|
|
|
|
|
|
2020-09-25 04:45:31 +00:00
|
|
|
|
# Wait for PostgreSQL to be ready to accept connections.
|
|
|
|
|
postStart =
|
|
|
|
|
''
|
2024-05-15 15:35:15 +00:00
|
|
|
|
PSQL="psql --port=${builtins.toString cfg.settings.port}"
|
2020-09-25 04:45:31 +00:00
|
|
|
|
|
|
|
|
|
while ! $PSQL -d postgres -c "" 2> /dev/null; do
|
|
|
|
|
if ! kill -0 "$MAINPID"; then exit 1; fi
|
|
|
|
|
sleep 0.1
|
|
|
|
|
done
|
|
|
|
|
|
|
|
|
|
if test -e "${cfg.dataDir}/.first_startup"; then
|
|
|
|
|
${optionalString (cfg.initialScript != null) ''
|
|
|
|
|
$PSQL -f "${cfg.initialScript}" -d postgres
|
|
|
|
|
''}
|
|
|
|
|
rm -f "${cfg.dataDir}/.first_startup"
|
|
|
|
|
fi
|
|
|
|
|
'' + optionalString (cfg.ensureDatabases != []) ''
|
|
|
|
|
${concatMapStrings (database: ''
|
|
|
|
|
$PSQL -tAc "SELECT 1 FROM pg_database WHERE datname = '${database}'" | grep -q 1 || $PSQL -tAc 'CREATE DATABASE "${database}"'
|
|
|
|
|
'') cfg.ensureDatabases}
|
|
|
|
|
'' + ''
|
2022-12-28 21:21:41 +00:00
|
|
|
|
${
|
|
|
|
|
concatMapStrings
|
|
|
|
|
(user:
|
2024-01-02 11:29:13 +00:00
|
|
|
|
let
|
|
|
|
|
dbOwnershipStmt = optionalString
|
|
|
|
|
user.ensureDBOwnership
|
|
|
|
|
''$PSQL -tAc 'ALTER DATABASE "${user.name}" OWNER TO "${user.name}";' '';
|
2022-12-28 21:21:41 +00:00
|
|
|
|
|
|
|
|
|
filteredClauses = filterAttrs (name: value: value != null) user.ensureClauses;
|
|
|
|
|
|
|
|
|
|
clauseSqlStatements = attrValues (mapAttrs (n: v: if v then n else "no${n}") filteredClauses);
|
|
|
|
|
|
|
|
|
|
userClauses = ''$PSQL -tAc 'ALTER ROLE "${user.name}" ${concatStringsSep " " clauseSqlStatements}' '';
|
|
|
|
|
in ''
|
|
|
|
|
$PSQL -tAc "SELECT 1 FROM pg_roles WHERE rolname='${user.name}'" | grep -q 1 || $PSQL -tAc 'CREATE USER "${user.name}"'
|
|
|
|
|
${userClauses}
|
2024-01-02 11:29:13 +00:00
|
|
|
|
|
|
|
|
|
${dbOwnershipStmt}
|
2022-12-28 21:21:41 +00:00
|
|
|
|
''
|
|
|
|
|
)
|
|
|
|
|
cfg.ensureUsers
|
|
|
|
|
}
|
2020-09-25 04:45:31 +00:00
|
|
|
|
'';
|
|
|
|
|
|
2020-08-20 17:08:02 +00:00
|
|
|
|
serviceConfig = mkMerge [
|
2020-04-24 23:36:52 +00:00
|
|
|
|
{ ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
|
|
|
|
|
User = "postgres";
|
|
|
|
|
Group = "postgres";
|
|
|
|
|
RuntimeDirectory = "postgresql";
|
|
|
|
|
Type = if versionAtLeast cfg.package.version "9.6"
|
|
|
|
|
then "notify"
|
|
|
|
|
else "simple";
|
|
|
|
|
|
|
|
|
|
# Shut down Postgres using SIGINT ("Fast Shutdown mode"). See
|
2023-11-16 04:20:00 +00:00
|
|
|
|
# https://www.postgresql.org/docs/current/server-shutdown.html
|
2020-04-24 23:36:52 +00:00
|
|
|
|
KillSignal = "SIGINT";
|
|
|
|
|
KillMode = "mixed";
|
|
|
|
|
|
|
|
|
|
# Give Postgres a decent amount of time to clean up after
|
|
|
|
|
# receiving systemd's SIGINT.
|
|
|
|
|
TimeoutSec = 120;
|
|
|
|
|
|
2020-08-20 17:08:02 +00:00
|
|
|
|
ExecStart = "${postgresql}/bin/postgres";
|
|
|
|
|
}
|
|
|
|
|
(mkIf (cfg.dataDir == "/var/lib/postgresql/${cfg.package.psqlSchema}") {
|
|
|
|
|
StateDirectory = "postgresql postgresql/${cfg.package.psqlSchema}";
|
|
|
|
|
StateDirectoryMode = if groupAccessAvailable then "0750" else "0700";
|
|
|
|
|
})
|
|
|
|
|
];
|
2020-04-24 23:36:52 +00:00
|
|
|
|
|
|
|
|
|
unitConfig.RequiresMountsFor = "${cfg.dataDir}";
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
};
|
|
|
|
|
|
2023-02-02 18:25:31 +00:00
|
|
|
|
meta.doc = ./postgresql.md;
|
2020-04-24 23:36:52 +00:00
|
|
|
|
meta.maintainers = with lib.maintainers; [ thoughtpolice danbst ];
|
|
|
|
|
}
|