···
lib.mapAttrsToList (key: val: "${key} = ${valueToString val}") value ));
+
# Manual initialization tool
initTool = pkgs.writeShellScriptBin "mfsmaster-init" ''
if [ ! -e ${cfg.master.settings.DATA_PATH}/metadata.mfs ]; then
cp ${pkgs.moosefs}/var/mfs/metadata.mfs.empty ${cfg.master.settings.DATA_PATH}
···
+
masterCfg = settingsFormat.generate "mfsmaster.cfg" cfg.master.settings;
+
metaloggerCfg = settingsFormat.generate "mfsmetalogger.cfg" cfg.metalogger.settings;
+
chunkserverCfg = settingsFormat.generate "mfschunkserver.cfg" cfg.chunkserver.settings;
systemdService = name: extraConfig: configFile: {
wantedBy = [ "multi-user.target" ];
wants = [ "network-online.target" ];
···
masterHost = lib.mkOption {
+
description = "IP or DNS name of the MooseFS master server.";
runAsUser = lib.mkOption {
+
description = "Run daemons as moosefs user instead of root for better security.";
+
client.enable = lib.mkEnableOption "MooseFS client";
+
Enable MooseFS master daemon.
+
The master server coordinates all MooseFS operations and stores metadata.
+
autoInit = lib.mkOption {
+
description = "Whether to automatically initialize the master's metadata directory on first run. Use with caution.";
type = with lib.types; listOf str;
+
description = "Export definitions for MooseFS (see mfsexports.cfg).";
"* / rw,alldirs,admin,maproot=0:0"
···
openFirewall = lib.mkOption {
+
description = "Whether to automatically open required firewall ports for master service.";
···
options.DATA_PATH = lib.mkOption {
default = "/var/lib/mfs";
+
description = "Directory for storing master metadata.";
+
description = "Master configuration options (mfsmaster.cfg).";
+
enable = lib.mkEnableOption "MooseFS metalogger daemon that maintains a backup copy of the master's metadata";
settings = lib.mkOption {
type = lib.types.submodule {
···
options.DATA_PATH = lib.mkOption {
default = "/var/lib/mfs";
+
description = "Directory for storing metalogger data.";
+
description = "Metalogger configuration options (mfsmetalogger.cfg).";
+
enable = lib.mkEnableOption "MooseFS chunkserver daemon that stores file data";
openFirewall = lib.mkOption {
+
description = "Whether to automatically open required firewall ports for chunkserver service.";
type = with lib.types; listOf str;
+
description = "Mount points used by chunkserver for data storage (see mfshdd.cfg).";
+
example = [ "/mnt/hdd1" "/mnt/hdd2" ];
settings = lib.mkOption {
···
options.DATA_PATH = lib.mkOption {
default = "/var/lib/mfs";
+
description = "Directory for lock files and other runtime data.";
+
description = "Chunkserver configuration options (mfschunkserver.cfg).";
+
enable = lib.mkEnableOption ''
+
MooseFS CGI server for web interface.
+
Warning: The CGI server interface should be properly secured from unauthorized access,
+
as it provides full control over your MooseFS installation.
+
openFirewall = lib.mkOption {
+
description = "Whether to automatically open the web interface port.";
+
settings = lib.mkOption {
+
type = lib.types.submodule {
+
freeformType = settingsFormat.type;
+
BIND_HOST = lib.mkOption {
+
description = "IP address to bind CGI server to.";
+
description = "Port for CGI server to listen on.";
+
description = "CGI server configuration options.";
+
config = lib.mkIf (cfg.client.enable || cfg.master.enable || cfg.metalogger.enable || cfg.chunkserver.enable || cfg.cgiserver.enable) {
+
warnings = [ ( lib.mkIf (!cfg.runAsUser) "Running MooseFS services as root is not recommended.") ];
+
master.settings = lib.mkIf cfg.master.enable (lib.mkMerge [
+
WORKING_USER = mfsUser;
+
EXPORTS_FILENAME = toString ( pkgs.writeText "mfsexports.cfg"
+
(lib.concatStringsSep "\n" cfg.master.exports));
+
(lib.mkIf cfg.cgiserver.enable {
+
MFSCGISERV = toString cfg.cgiserver.settings.PORT;
metalogger.settings = lib.mkIf cfg.metalogger.enable {
···
+
users = lib.mkIf ( cfg.runAsUser && ( cfg.master.enable || cfg.metalogger.enable || cfg.chunkserver.enable || cfg.cgiserver.enable ) ) {
+
description = "MooseFS daemon user";
···
(lib.optional cfg.client.enable pkgs.moosefs) ++
(lib.optional cfg.master.enable initTool);
+
networking.firewall.allowedTCPPorts = lib.mkMerge [
+
(lib.optionals cfg.master.openFirewall [ 9419 9420 9421 ])
+
(lib.optional cfg.chunkserver.openFirewall 9422)
+
(lib.optional (cfg.cgiserver.enable && cfg.cgiserver.openFirewall) cfg.cgiserver.settings.PORT)
+
systemd.tmpfiles.rules = [
+
(lib.optionalString cfg.master.enable
+
"d ${cfg.master.settings.DATA_PATH} 0700 ${mfsUser} ${mfsUser} -")
+
# Metalogger directories
+
(lib.optionalString cfg.metalogger.enable
+
"d ${cfg.metalogger.settings.DATA_PATH} 0700 ${mfsUser} ${mfsUser} -")
+
# Chunkserver directories
+
(lib.optionalString cfg.chunkserver.enable
+
"d ${cfg.chunkserver.settings.DATA_PATH} 0700 ${mfsUser} ${mfsUser} -")
+
] ++ lib.optionals (cfg.chunkserver.enable && cfg.chunkserver.hdds != null)
+
(map (dir: "d ${dir} 0755 ${mfsUser} ${mfsUser} -") cfg.chunkserver.hdds);
+
systemd.services = lib.mkMerge [
+
(lib.mkIf cfg.master.enable {
+
mfs-master = (lib.mkMerge [
+
(systemdService "master" {
+
TimeoutStartSec = 1800;
+
Restart = "on-failure";
+
preStart = lib.mkIf cfg.master.autoInit "${initTool}/bin/mfsmaster-init";
+
(lib.mkIf cfg.metalogger.enable {
+
mfs-metalogger = systemdService "metalogger" {
+
Restart = "on-abnormal";
+
(lib.mkIf cfg.chunkserver.enable {
+
mfs-chunkserver = systemdService "chunkserver" {
+
Restart = "on-abnormal";
+
(lib.mkIf cfg.cgiserver.enable {
+
description = "MooseFS CGI Server";
+
wantedBy = [ "multi-user.target" ];
+
after = [ "mfs-master.service" ];
+
ExecStart = "${pkgs.moosefs}/bin/mfscgiserv -D /var/lib/mfs -f start";
+
ExecStop = "${pkgs.moosefs}/bin/mfscgiserv -D /var/lib/mfs stop";
+
Restart = "on-failure";
+
WorkingDirectory = "/var/lib/mfs";