176 lines
4.8 KiB
Nix
176 lines
4.8 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
|
|
let
|
|
|
|
cfg = config.virtualisation.azure.agent;
|
|
|
|
waagent = with pkgs; stdenv.mkDerivation rec {
|
|
name = "waagent-2.0";
|
|
src = pkgs.fetchgit {
|
|
url = https://github.com/Phreedom/WALinuxAgent.git;
|
|
rev = "9dba81c7b1239c7971ec96e405e403c7cd224e6b";
|
|
sha256 = "0khxk3ns3z37v26f2qj6m3m698a0vqpc9bxg5p7fyr3xza5gzwhs";
|
|
};
|
|
buildInputs = [ makeWrapper python pythonPackages.wrapPython ];
|
|
runtimeDeps = [ findutils gnugrep gawk coreutils openssl openssh
|
|
nettools # for hostname
|
|
procps # for pidof
|
|
shadow # for useradd, usermod
|
|
utillinux # for (u)mount, fdisk, sfdisk, mkswap
|
|
parted
|
|
];
|
|
pythonPath = [ pythonPackages.pyasn1 ];
|
|
|
|
configurePhase = false;
|
|
buildPhase = false;
|
|
|
|
installPhase = ''
|
|
substituteInPlace config/99-azure-product-uuid.rules \
|
|
--replace /bin/chmod "${coreutils}/bin/chmod"
|
|
mkdir -p $out/lib/udev/rules.d
|
|
cp config/*.rules $out/lib/udev/rules.d
|
|
|
|
mkdir -p $out/bin
|
|
cp waagent $out/bin/
|
|
chmod +x $out/bin/waagent
|
|
|
|
wrapProgram "$out/bin/waagent" \
|
|
--prefix PYTHONPATH : $PYTHONPATH \
|
|
--prefix PATH : "${makeSearchPath "bin" runtimeDeps}"
|
|
'';
|
|
};
|
|
|
|
provisionedHook = pkgs.writeScript "provisioned-hook" ''
|
|
#!${pkgs.stdenv.shell}
|
|
${config.systemd.package}/bin/systemctl start provisioned.target
|
|
'';
|
|
|
|
in
|
|
|
|
{
|
|
|
|
###### interface
|
|
|
|
options.virtualisation.azure.agent.enable = mkOption {
|
|
default = false;
|
|
description = "Whether to enable the Windows Azure Linux Agent.";
|
|
};
|
|
|
|
###### implementation
|
|
|
|
config = mkIf cfg.enable {
|
|
assertions = [ {
|
|
assertion = pkgs.stdenv.isi686 || pkgs.stdenv.isx86_64;
|
|
message = "Azure not currently supported on ${pkgs.stdenv.system}";
|
|
} {
|
|
assertion = config.networking.networkmanager.enable == false;
|
|
message = "Windows Azure Linux Agent is not compatible with NetworkManager";
|
|
} ];
|
|
|
|
boot.initrd.kernelModules = [ "ata_piix" ];
|
|
networking.firewall.allowedUDPPorts = [ 68 ];
|
|
|
|
|
|
environment.etc."waagent.conf".text = ''
|
|
#
|
|
# Windows Azure Linux Agent Configuration
|
|
#
|
|
|
|
Role.StateConsumer=${provisionedHook}
|
|
|
|
# Enable instance creation
|
|
Provisioning.Enabled=y
|
|
|
|
# Password authentication for root account will be unavailable.
|
|
Provisioning.DeleteRootPassword=n
|
|
|
|
# Generate fresh host key pair.
|
|
Provisioning.RegenerateSshHostKeyPair=y
|
|
|
|
# Supported values are "rsa", "dsa" and "ecdsa".
|
|
Provisioning.SshHostKeyPairType=ed25519
|
|
|
|
# Monitor host name changes and publish changes via DHCP requests.
|
|
Provisioning.MonitorHostName=y
|
|
|
|
# Decode CustomData from Base64.
|
|
Provisioning.DecodeCustomData=n
|
|
|
|
# Execute CustomData after provisioning.
|
|
Provisioning.ExecuteCustomData=n
|
|
|
|
# Format if unformatted. If 'n', resource disk will not be mounted.
|
|
ResourceDisk.Format=y
|
|
|
|
# File system on the resource disk
|
|
# Typically ext3 or ext4. FreeBSD images should use 'ufs2' here.
|
|
ResourceDisk.Filesystem=ext4
|
|
|
|
# Mount point for the resource disk
|
|
ResourceDisk.MountPoint=/mnt/resource
|
|
|
|
# Respond to load balancer probes if requested by Windows Azure.
|
|
LBProbeResponder=y
|
|
|
|
# Enable logging to serial console (y|n)
|
|
# When stdout is not enough...
|
|
# 'y' if not set
|
|
Logs.Console=y
|
|
|
|
# Enable verbose logging (y|n)
|
|
Logs.Verbose=n
|
|
|
|
# Root device timeout in seconds.
|
|
OS.RootDeviceScsiTimeout=300
|
|
'';
|
|
|
|
services.udev.packages = [ waagent ];
|
|
|
|
networking.dhcpcd.persistent = true;
|
|
|
|
services.logrotate = {
|
|
enable = true;
|
|
config = ''
|
|
/var/log/waagent.log {
|
|
compress
|
|
monthly
|
|
rotate 6
|
|
notifempty
|
|
missingok
|
|
}
|
|
'';
|
|
};
|
|
|
|
systemd.targets.provisioned = {
|
|
description = "Services Requiring Azure VM provisioning to have finished";
|
|
wantedBy = [ "sshd.service" ];
|
|
before = [ "sshd.service" ];
|
|
};
|
|
|
|
|
|
systemd.services.waagent = {
|
|
wantedBy = [ "sshd.service" ];
|
|
before = [ "sshd.service" ];
|
|
after = [ "ip-up.target" ];
|
|
wants = [ "ip-up.target" ];
|
|
|
|
environment = {
|
|
GIT_SSL_CAINFO = "/etc/ssl/certs/ca-certificates.crt";
|
|
OPENSSL_X509_CERT_FILE = "/etc/ssl/certs/ca-certificates.crt";
|
|
SSL_CERT_FILE = "/etc/ssl/certs/ca-certificates.crt";
|
|
};
|
|
|
|
path = [ pkgs.e2fsprogs ];
|
|
description = "Windows Azure Agent Service";
|
|
unitConfig.ConditionPathExists = "/etc/waagent.conf";
|
|
serviceConfig = {
|
|
ExecStart = "${waagent}/bin/waagent -daemon";
|
|
Type = "simple";
|
|
};
|
|
};
|
|
|
|
};
|
|
|
|
}
|