🔥 ipfs-cluster service is now upstream
This commit is contained in:
parent
4503ca8cc8
commit
765d3d3919
24
flake.lock
generated
24
flake.lock
generated
@ -7,11 +7,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1743125241,
|
"lastModified": 1743350051,
|
||||||
"narHash": "sha256-TA/xYqZbBwCCprXf8ABORDsjJy0Idw6OdQNqYQhgKCM=",
|
"narHash": "sha256-QtVfBQe5VBnRPP5ustegPlsTdV/SZzt8akOIN5Hlwjk=",
|
||||||
"owner": "nix-darwin",
|
"owner": "nix-darwin",
|
||||||
"repo": "nix-darwin",
|
"repo": "nix-darwin",
|
||||||
"rev": "75f8e4dbc553d3052f917e66ee874f69d49c9981",
|
"rev": "eaff8219d629bb86e71e3274e1b7915014e7fb22",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -137,11 +137,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1743136572,
|
"lastModified": 1743438213,
|
||||||
"narHash": "sha256-uwaVrKgi6g1TUq56247j6QvvFtYHloCkjCrEpGBvV54=",
|
"narHash": "sha256-ZZDN+0v1r4I1xkQWlt8euOJv5S4EvElUCZMrDjTCEsY=",
|
||||||
"owner": "nix-community",
|
"owner": "nix-community",
|
||||||
"repo": "home-manager",
|
"repo": "home-manager",
|
||||||
"rev": "1efd2503172016a6742c87b47b43ca2c8145607d",
|
"rev": "ccd7df836e1f42ea84806760f25b77b586370259",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -222,11 +222,11 @@
|
|||||||
},
|
},
|
||||||
"nixpkgs": {
|
"nixpkgs": {
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1743076231,
|
"lastModified": 1743320628,
|
||||||
"narHash": "sha256-yQugdVfi316qUfqzN8JMaA2vixl+45GxNm4oUfXlbgw=",
|
"narHash": "sha256-FurMxmjEEqEMld11eX2vgfAx0Rz0JhoFm8UgxbfCZa8=",
|
||||||
"owner": "NixOS",
|
"owner": "NixOS",
|
||||||
"repo": "nixpkgs",
|
"repo": "nixpkgs",
|
||||||
"rev": "6c5963357f3c1c840201eda129a99d455074db04",
|
"rev": "63158b9cbb6ec93d26255871c447b0f01da81619",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
@ -441,11 +441,11 @@
|
|||||||
]
|
]
|
||||||
},
|
},
|
||||||
"locked": {
|
"locked": {
|
||||||
"lastModified": 1742700801,
|
"lastModified": 1743305778,
|
||||||
"narHash": "sha256-ZGlpUDsuBdeZeTNgoMv+aw0ByXT2J3wkYw9kJwkAS4M=",
|
"narHash": "sha256-Ux/UohNtnM5mn9SFjaHp6IZe2aAnUCzklMluNtV6zFo=",
|
||||||
"owner": "Mic92",
|
"owner": "Mic92",
|
||||||
"repo": "sops-nix",
|
"repo": "sops-nix",
|
||||||
"rev": "67566fe68a8bed2a7b1175fdfb0697ed22ae8852",
|
"rev": "8e873886bbfc32163fe027b8676c75637b7da114",
|
||||||
"type": "github"
|
"type": "github"
|
||||||
},
|
},
|
||||||
"original": {
|
"original": {
|
||||||
|
@ -3,7 +3,6 @@
|
|||||||
{
|
{
|
||||||
imports = [
|
imports = [
|
||||||
./default.nix
|
./default.nix
|
||||||
../../services/ipfs-cluster.nix
|
|
||||||
];
|
];
|
||||||
|
|
||||||
services = {
|
services = {
|
||||||
|
@ -1,138 +0,0 @@
|
|||||||
## From https://github.com/NixOS/nixpkgs/pull/100871
|
|
||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
with lib;
|
|
||||||
let
|
|
||||||
cfg = config.services.ipfs-cluster;
|
|
||||||
|
|
||||||
# secret is by envvar, not flag
|
|
||||||
initFlags = toString [
|
|
||||||
(optionalString (cfg.initPeers != [ ]) "--peers")
|
|
||||||
(lib.strings.concatStringsSep "," cfg.initPeers)
|
|
||||||
];
|
|
||||||
in
|
|
||||||
{
|
|
||||||
###### interface
|
|
||||||
options = {
|
|
||||||
services.ipfs-cluster = {
|
|
||||||
enable = mkEnableOption "Pinset orchestration for IPFS - requires ipfs daemon to be useful";
|
|
||||||
|
|
||||||
user = mkOption {
|
|
||||||
type = types.str;
|
|
||||||
default = "ipfs";
|
|
||||||
description = "User under which the ipfs-cluster daemon runs.";
|
|
||||||
};
|
|
||||||
|
|
||||||
group = mkOption {
|
|
||||||
type = types.str;
|
|
||||||
default = "ipfs";
|
|
||||||
description = "Group under which the ipfs-cluster daemon runs.";
|
|
||||||
};
|
|
||||||
|
|
||||||
consensus = mkOption {
|
|
||||||
type = types.enum [
|
|
||||||
"raft"
|
|
||||||
"crdt"
|
|
||||||
];
|
|
||||||
description = "Consensus protocol - 'raft' or 'crdt'. https://cluster.ipfs.io/documentation/guides/consensus/";
|
|
||||||
};
|
|
||||||
|
|
||||||
dataDir = mkOption {
|
|
||||||
type = types.str;
|
|
||||||
default = "/var/lib/ipfs-cluster";
|
|
||||||
description = "The data dir for ipfs-cluster.";
|
|
||||||
};
|
|
||||||
|
|
||||||
initPeers = mkOption {
|
|
||||||
type = types.listOf types.str;
|
|
||||||
default = [ ];
|
|
||||||
description = "Peer addresses to initialize with on first run.";
|
|
||||||
};
|
|
||||||
|
|
||||||
openSwarmPort = mkOption {
|
|
||||||
type = types.bool;
|
|
||||||
description = "Open swarm port, secured by the cluster secret. This does not expose the API or proxy. https://cluster.ipfs.io/documentation/guides/security/";
|
|
||||||
};
|
|
||||||
|
|
||||||
secretFile = mkOption {
|
|
||||||
type = types.nullOr types.path;
|
|
||||||
default = null;
|
|
||||||
description = ''
|
|
||||||
File containing the cluster secret in the format of EnvironmentFile as described by
|
|
||||||
<citerefentry><refentrytitle>systemd.exec</refentrytitle>
|
|
||||||
<manvolnum>5</manvolnum></citerefentry>. For example:
|
|
||||||
<programlisting>
|
|
||||||
CLUSTER_SECRET=<replaceable>...</replaceable>
|
|
||||||
</programlisting>
|
|
||||||
|
|
||||||
if null, a new secret will be generated on first run.
|
|
||||||
A secret in the correct format can also be generated by: openssl rand -hex 32
|
|
||||||
'';
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
###### implementation
|
|
||||||
|
|
||||||
config = mkIf cfg.enable {
|
|
||||||
environment.systemPackages = [ pkgs.ipfs-cluster ];
|
|
||||||
systemd = {
|
|
||||||
tmpfiles.rules = [ "d '${cfg.dataDir}' - ${cfg.user} ${cfg.group} - -" ];
|
|
||||||
|
|
||||||
services.ipfs-cluster-init = {
|
|
||||||
path = [
|
|
||||||
"/run/wrappers"
|
|
||||||
pkgs.ipfs-cluster
|
|
||||||
];
|
|
||||||
environment.IPFS_CLUSTER_PATH = cfg.dataDir;
|
|
||||||
wantedBy = [ "default.target" ];
|
|
||||||
|
|
||||||
serviceConfig =
|
|
||||||
{
|
|
||||||
# "" clears exec list (man systemd.service -> execStart)
|
|
||||||
ExecStart = [
|
|
||||||
""
|
|
||||||
"${pkgs.ipfs-cluster}/bin/ipfs-cluster-service init --consensus ${cfg.consensus} ${initFlags}"
|
|
||||||
];
|
|
||||||
Type = "oneshot";
|
|
||||||
RemainAfterExit = true;
|
|
||||||
User = cfg.user;
|
|
||||||
Group = cfg.group;
|
|
||||||
}
|
|
||||||
// optionalAttrs (cfg.secretFile != null) {
|
|
||||||
EnvironmentFile = cfg.secretFile;
|
|
||||||
};
|
|
||||||
unitConfig.ConditionDirectoryNotEmpty = "!${cfg.dataDir}";
|
|
||||||
};
|
|
||||||
|
|
||||||
services.ipfs-cluster = {
|
|
||||||
environment.IPFS_CLUSTER_PATH = cfg.dataDir;
|
|
||||||
wantedBy = [ "multi-user.target" ];
|
|
||||||
|
|
||||||
wants = [ "ipfs-cluster-init.service" ];
|
|
||||||
after = [ "ipfs-cluster-init.service" ];
|
|
||||||
|
|
||||||
serviceConfig =
|
|
||||||
{
|
|
||||||
ExecStart = [
|
|
||||||
""
|
|
||||||
"${pkgs.ipfs-cluster}/bin/ipfs-cluster-service daemon"
|
|
||||||
];
|
|
||||||
User = cfg.user;
|
|
||||||
Group = cfg.group;
|
|
||||||
}
|
|
||||||
// optionalAttrs (cfg.secretFile != null) {
|
|
||||||
EnvironmentFile = cfg.secretFile;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
networking.firewall.allowedTCPPorts = mkIf cfg.openSwarmPort [
|
|
||||||
9094
|
|
||||||
9096
|
|
||||||
];
|
|
||||||
};
|
|
||||||
}
|
|
Loading…
x
Reference in New Issue
Block a user