Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: 2fc097ad74d8
Choose a base ref
...
head repository: NixOS/nixpkgs
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 1c4480e9318f
Choose a head ref
  • 8 commits
  • 3 files changed
  • 3 contributors

Commits on Jun 11, 2020

  1. Copy the full SHA
    c8a2e63 View commit details
  2. Copy the full SHA
    74ff433 View commit details
  3. nixos/ipfs: consolidate services into one ipfs.service

    Previously we had three services for different config flavors. This is
    confusing because only one instance of IPFS can run on a host / port
    combination at once. So move all into ipfs.service, which contains the
    configuration specified in services.ipfs.
    
    Also remove the env wrapper and just use systemd env configuration.
    matthewbauer committed Jun 11, 2020

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    c5f4019 View commit details

Commits on Jun 12, 2020

  1. nixos/ipfs: add startWhenNeeded option

    This makes it possible to only start IPFS when needed. So a user’s
    IPFS daemon only starts when they actually use it.
    
    A few important warnings though:
    
      - This probably shouldn’t be mixed with services.ipfs.autoMount
        since you want /ipfs and /ipns aren’t activated like this
      - ipfs.socket assumes that you are using ports 5001 and 8080 for the
        API and gateway respectively. We could do some parsing to figure
        out what is in apiAddress and gatewayAddress, but that’s kind of
        difficult given the nonstandard address format.
      - Apparently? this doesn’t work with the --api commands used in the tests.
    
    Of course you can always start automatically with startWhenNeeded =
    false, or just running ‘systemctl start ipfs.service’.
    
    Tested with the following test (modified from tests/ipfs.nix):
    
      import ./make-test-python.nix ({ pkgs, ...} : {
        name = "ipfs";
    
        nodes.machine = { ... }: {
          services.ipfs = {
            enable = true;
            startWhenNeeded = true;
          };
        };
    
        testScript = ''
          start_all()
    
          machine.wait_until_succeeds("ipfs id")
          ipfs_hash = machine.succeed("echo fnord | ipfs add | awk '{ print $2 }'")
    
          machine.succeed(f"ipfs cat /ipfs/{ipfs_hash.strip()} | grep fnord")
        '';
      })
    
    Fixes #90145
    
    Update nixos/modules/services/network-filesystems/ipfs.nix
    
    Co-authored-by: Florian Klink <flokli@flokli.de>
    matthewbauer and flokli committed Jun 12, 2020

    Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    b36ef70 View commit details
  2. Verified

    This commit was created on GitHub.com and signed with GitHub’s verified signature. The key has expired.
    Copy the full SHA
    fa06d8f View commit details
  3. Copy the full SHA
    982a17a View commit details
  4. Copy the full SHA
    2c2f6c0 View commit details
  5. Merge pull request #90157 from obsidiansystems/socket-based-ipfs

    Add socket-based IPFS support
    Ericson2314 authored Jun 12, 2020
    Copy the full SHA
    1c4480e View commit details
Showing with 81 additions and 87 deletions.
  1. +66 −87 nixos/modules/services/network-filesystems/ipfs.nix
  2. +7 −0 nixos/tests/ipfs.nix
  3. +8 −0 pkgs/applications/networking/ipfs/default.nix
153 changes: 66 additions & 87 deletions nixos/modules/services/network-filesystems/ipfs.nix
Original file line number Diff line number Diff line change
@@ -1,69 +1,17 @@
{ config, lib, pkgs, ... }:
{ config, lib, pkgs, options, ... }:
with lib;
let
inherit (pkgs) ipfs runCommand makeWrapper;

cfg = config.services.ipfs;
opt = options.services.ipfs;

ipfsFlags = toString ([
(optionalString cfg.autoMount "--mount")
#(optionalString cfg.autoMigrate "--migrate")
(optionalString cfg.enableGC "--enable-gc")
(optionalString (cfg.serviceFdlimit != null) "--manage-fdlimit=false")
(optionalString (cfg.defaultMode == "offline") "--offline")
(optionalString (cfg.defaultMode == "norouting") "--routing=none")
] ++ cfg.extraFlags);

defaultDataDir = if versionAtLeast config.system.stateVersion "17.09" then
"/var/lib/ipfs" else
"/var/lib/ipfs/.ipfs";

# Wrapping the ipfs binary with the environment variable IPFS_PATH set to dataDir because we can't set it in the user environment
wrapped = runCommand "ipfs" { buildInputs = [ makeWrapper ]; preferLocalBuild = true; } ''
mkdir -p "$out/bin"
makeWrapper "${ipfs}/bin/ipfs" "$out/bin/ipfs" \
--set IPFS_PATH ${cfg.dataDir} \
--prefix PATH : /run/wrappers/bin
'';


commonEnv = {
environment.IPFS_PATH = cfg.dataDir;
path = [ wrapped ];
serviceConfig.User = cfg.user;
serviceConfig.Group = cfg.group;
};

baseService = recursiveUpdate commonEnv {
wants = [ "ipfs-init.service" ];
# NB: migration must be performed prior to pre-start, else we get the failure message!
preStart = optionalString cfg.autoMount ''
ipfs --local config Mounts.FuseAllowOther --json true
ipfs --local config Mounts.IPFS ${cfg.ipfsMountDir}
ipfs --local config Mounts.IPNS ${cfg.ipnsMountDir}
'' + concatStringsSep "\n" (collect
isString
(mapAttrsRecursive
(path: value:
# Using heredoc below so that the value is never improperly quoted
''
read value <<EOF
${builtins.toJSON value}
EOF
ipfs --local config --json "${concatStringsSep "." path}" "$value"
'')
({ Addresses.API = cfg.apiAddress;
Addresses.Gateway = cfg.gatewayAddress;
Addresses.Swarm = cfg.swarmAddress;
} //
cfg.extraConfig))
);
serviceConfig = {
ExecStart = "${wrapped}/bin/ipfs daemon ${ipfsFlags}";
Restart = "on-failure";
RestartSec = 1;
} // optionalAttrs (cfg.serviceFdlimit != null) { LimitNOFILE = cfg.serviceFdlimit; };
};
in {

###### interface
@@ -88,7 +36,9 @@ in {

dataDir = mkOption {
type = types.str;
default = defaultDataDir;
default = if versionAtLeast config.system.stateVersion "17.09"
then "/var/lib/ipfs"
else "/var/lib/ipfs/.ipfs";
description = "The data dir for IPFS";
};

@@ -98,18 +48,6 @@ in {
description = "systemd service that is enabled by default";
};

/*
autoMigrate = mkOption {
type = types.bool;
default = false;
description = ''
Whether IPFS should try to migrate the file system automatically.
The daemon will need to be able to download a binary from https://ipfs.io to perform the migration.
'';
};
*/

autoMount = mkOption {
type = types.bool;
default = false;
@@ -199,13 +137,21 @@ in {
example = 64*1024;
};

startWhenNeeded = mkOption {
type = types.bool;
default = false;
description = "Whether to use socket activation to start IPFS when needed.";
};

};
};

###### implementation

config = mkIf cfg.enable {
environment.systemPackages = [ wrapped ];
environment.systemPackages = [ pkgs.ipfs ];
environment.variables.IPFS_PATH = cfg.dataDir;

programs.fuse = mkIf cfg.autoMount {
userAllowOther = true;
};
@@ -234,10 +180,14 @@ in {
"d '${cfg.ipnsMountDir}' - ${cfg.user} ${cfg.group} - -"
];

systemd.services.ipfs-init = recursiveUpdate commonEnv {
systemd.packages = [ pkgs.ipfs ];

systemd.services.ipfs-init = {
description = "IPFS Initializer";

before = [ "ipfs.service" "ipfs-offline.service" "ipfs-norouting.service" ];
environment.IPFS_PATH = cfg.dataDir;

path = [ pkgs.ipfs ];

script = ''
if [[ ! -f ${cfg.dataDir}/config ]]; then
@@ -251,34 +201,63 @@ in {
fi
'';

wantedBy = [ "default.target" ];

serviceConfig = {
Type = "oneshot";
RemainAfterExit = true;
User = cfg.user;
Group = cfg.group;
};
};

# TODO These 3 definitions possibly be further abstracted through use of a function
# like: mutexServices "ipfs" [ "", "offline", "norouting" ] { ... shared conf here ... }
systemd.services.ipfs = {
path = [ "/run/wrappers" pkgs.ipfs ];
environment.IPFS_PATH = cfg.dataDir;

wants = [ "ipfs-init.service" ];
after = [ "ipfs-init.service" ];

systemd.services.ipfs = recursiveUpdate baseService {
description = "IPFS Daemon";
wantedBy = mkIf (cfg.defaultMode == "online") [ "multi-user.target" ];
after = [ "network.target" "ipfs-init.service" ];
conflicts = [ "ipfs-offline.service" "ipfs-norouting.service"];
preStart = optionalString cfg.autoMount ''
ipfs --local config Mounts.FuseAllowOther --json true
ipfs --local config Mounts.IPFS ${cfg.ipfsMountDir}
ipfs --local config Mounts.IPNS ${cfg.ipnsMountDir}
'' + concatStringsSep "\n" (collect
isString
(mapAttrsRecursive
(path: value:
# Using heredoc below so that the value is never improperly quoted
''
read value <<EOF
${builtins.toJSON value}
EOF
ipfs --local config --json "${concatStringsSep "." path}" "$value"
'')
({ Addresses.API = cfg.apiAddress;
Addresses.Gateway = cfg.gatewayAddress;
Addresses.Swarm = cfg.swarmAddress;
} //
cfg.extraConfig))
);
serviceConfig = {
ExecStart = ["" "${pkgs.ipfs}/bin/ipfs daemon ${ipfsFlags}"];
User = cfg.user;
Group = cfg.group;
} // optionalAttrs (cfg.serviceFdlimit != null) { LimitNOFILE = cfg.serviceFdlimit; };
} // optionalAttrs (!cfg.startWhenNeeded) {
wantedBy = [ "default.target" ];
};

systemd.services.ipfs-offline = recursiveUpdate baseService {
description = "IPFS Daemon (offline mode)";
wantedBy = mkIf (cfg.defaultMode == "offline") [ "multi-user.target" ];
after = [ "ipfs-init.service" ];
conflicts = [ "ipfs.service" "ipfs-norouting.service"];
systemd.sockets.ipfs-gateway = {
wantedBy = [ "sockets.target" ];
socketConfig.ListenStream = [ "" ]
++ lib.optional (cfg.gatewayAddress == opt.gatewayAddress.default) [ "127.0.0.1:8080" "[::1]:8080" ];
};

systemd.services.ipfs-norouting = recursiveUpdate baseService {
description = "IPFS Daemon (no routing mode)";
wantedBy = mkIf (cfg.defaultMode == "norouting") [ "multi-user.target" ];
after = [ "ipfs-init.service" ];
conflicts = [ "ipfs.service" "ipfs-offline.service"];
systemd.sockets.ipfs-api = {
wantedBy = [ "sockets.target" ];
socketConfig.ListenStream = [ "" "%t/ipfs.sock" ]
++ lib.optional (cfg.apiAddress == opt.apiAddress.default) [ "127.0.0.1:5001" "[::1]:5001" ];
};

};
7 changes: 7 additions & 0 deletions nixos/tests/ipfs.nix
Original file line number Diff line number Diff line change
@@ -21,5 +21,12 @@ import ./make-test-python.nix ({ pkgs, ...} : {
)
machine.succeed(f"ipfs cat /ipfs/{ipfs_hash.strip()} | grep fnord")
ipfs_hash = machine.succeed(
"echo fnord2 | ipfs --api /unix/run/ipfs.sock add | awk '{ print $2 }'"
)
machine.succeed(
f"ipfs --api /unix/run/ipfs.sock cat /ipfs/{ipfs_hash.strip()} | grep fnord2"
)
'';
})
8 changes: 8 additions & 0 deletions pkgs/applications/networking/ipfs/default.nix
Original file line number Diff line number Diff line change
@@ -26,6 +26,14 @@ buildGoModule rec {

vendorSha256 = null;

postInstall = ''
install -D misc/systemd/ipfs.service $out/etc/systemd/system/ipfs.service
install -D misc/systemd/ipfs-api.socket $out/etc/systemd/system/ipfs-api.socket
install -D misc/systemd/ipfs-gateway.socket $out/etc/systemd/system/ipfs-gateway.socket
substituteInPlace $out/etc/systemd/system/ipfs.service \
--replace /usr/bin/ipfs $out/bin/ipfs
'';

meta = with stdenv.lib; {
description = "A global, versioned, peer-to-peer filesystem";
homepage = "https://ipfs.io/";