Merge pull request #20128 from mdaiter/stanchion_server

stanchion: init at 2.1.1

Changed files
+281
nixos
modules
misc
services
databases
pkgs
servers
nosql
riak-cs
top-level
+2
nixos/modules/misc/ids.nix
···
hound = 259;
leaps = 260;
ipfs = 261;
# When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399!
···
hound = 259;
leaps = 260;
ipfs = 261;
# When adding a gid, make sure it doesn't match an existing
# uid. Users and groups with the same name should have equal
···
hound = 259;
leaps = 260;
ipfs = 261;
+
stanchion = 262;
# When adding a uid, make sure it doesn't match an existing gid. And don't use uids above 399!
···
hound = 259;
leaps = 260;
ipfs = 261;
+
stanchion = 262;
# When adding a gid, make sure it doesn't match an existing
# uid. Users and groups with the same name should have equal
+1
nixos/modules/module-list.nix
···
./services/databases/postgresql.nix
./services/databases/redis.nix
./services/databases/riak.nix
./services/databases/virtuoso.nix
./services/desktops/accountsservice.nix
./services/desktops/geoclue2.nix
···
./services/databases/postgresql.nix
./services/databases/redis.nix
./services/databases/riak.nix
+
./services/databases/stanchion.nix
./services/databases/virtuoso.nix
./services/desktops/accountsservice.nix
./services/desktops/geoclue2.nix
+211
nixos/modules/services/databases/stanchion.nix
···
···
+
{ config, lib, pkgs, ... }:
+
+
with lib;
+
+
let
+
+
cfg = config.services.stanchion;
+
+
in
+
+
{
+
+
###### interface
+
+
options = {
+
+
services.stanchion = {
+
+
enable = mkEnableOption "stanchion";
+
+
package = mkOption {
+
type = types.package;
+
default = pkgs.stanchion;
+
example = literalExample "pkgs.stanchion";
+
description = ''
+
Stanchion package to use.
+
'';
+
};
+
+
nodeName = mkOption {
+
type = types.str;
+
default = "stanchion@127.0.0.1";
+
description = ''
+
Name of the Erlang node.
+
'';
+
};
+
+
adminKey = mkOption {
+
type = types.str;
+
default = "";
+
description = ''
+
Name of admin user.
+
'';
+
};
+
+
adminSecret = mkOption {
+
type = types.str;
+
default = "";
+
description = ''
+
Name of admin secret
+
'';
+
};
+
+
riakHost = mkOption {
+
type = types.str;
+
default = "127.0.0.1:8087";
+
description = ''
+
Name of riak hosting service.
+
'';
+
};
+
+
listener = mkOption {
+
type = types.str;
+
default = "127.0.0.1:8085";
+
description = ''
+
Name of Riak CS listening service.
+
'';
+
};
+
+
stanchionHost = mkOption {
+
type = types.str;
+
default = "127.0.0.1:8085";
+
description = ''
+
Name of stanchion hosting service.
+
'';
+
};
+
+
stanchionSsl = mkOption {
+
type = types.bool;
+
default = true;
+
description = ''
+
Tell stanchion to use SSL.
+
'';
+
};
+
+
distributedCookie = mkOption {
+
type = types.str;
+
default = "riak";
+
description = ''
+
Cookie for distributed node communication. All nodes in the
+
same cluster should use the same cookie or they will not be able to
+
communicate.
+
'';
+
};
+
+
dataDir = mkOption {
+
type = types.path;
+
default = "/var/db/stanchion";
+
description = ''
+
Data directory for Stanchion.
+
'';
+
};
+
+
logDir = mkOption {
+
type = types.path;
+
default = "/var/log/stanchion";
+
description = ''
+
Log directory for Stanchino.
+
'';
+
};
+
+
extraConfig = mkOption {
+
type = types.lines;
+
default = "";
+
description = ''
+
Additional text to be appended to <filename>stanchion.conf</filename>.
+
'';
+
};
+
};
+
};
+
+
###### implementation
+
+
config = mkIf cfg.enable {
+
+
environment.systemPackages = [ cfg.package ];
+
+
environment.etc."stanchion/advanced.config".text = ''
+
[{stanchion, []}].
+
'';
+
+
environment.etc."stanchion/stanchion.conf".text = ''
+
listener = ${cfg.listener}
+
+
riak_host = ${cfg.riakHost}
+
+
${optionalString (cfg.adminKey == "") "#"} admin.key=${optionalString (cfg.adminKey != "") cfg.adminKey}
+
${optionalString (cfg.adminSecret == "") "#"} admin.secret=${optionalString (cfg.adminSecret != "") cfg.adminSecret}
+
+
platform_bin_dir = ${pkgs.stanchion}/bin
+
platform_data_dir = ${cfg.dataDir}
+
platform_etc_dir = /etc/stanchion
+
platform_lib_dir = ${pkgs.stanchion}/lib
+
platform_log_dir = ${cfg.logDir}
+
+
nodename = ${cfg.nodeName}
+
+
distributed_cookie = ${cfg.distributedCookie}
+
+
stanchion_ssl=${if cfg.stanchionSsl then "on" else "off"}
+
+
${cfg.extraConfig}
+
'';
+
+
users.extraUsers.stanchion = {
+
name = "stanchion";
+
uid = config.ids.uids.stanchion;
+
group = "stanchion";
+
description = "Stanchion server user";
+
};
+
+
users.extraGroups.stanchion.gid = config.ids.gids.stanchion;
+
+
systemd.services.stanchion = {
+
description = "Stanchion Server";
+
+
wantedBy = [ "multi-user.target" ];
+
after = [ "network.target" ];
+
+
path = [
+
pkgs.utillinux # for `logger`
+
pkgs.bash
+
];
+
+
environment.HOME = "${cfg.dataDir}";
+
environment.STANCHION_DATA_DIR = "${cfg.dataDir}";
+
environment.STANCHION_LOG_DIR = "${cfg.logDir}";
+
environment.STANCHION_ETC_DIR = "/etc/stanchion";
+
+
preStart = ''
+
if ! test -e ${cfg.logDir}; then
+
mkdir -m 0755 -p ${cfg.logDir}
+
chown -R stanchion:stanchion ${cfg.logDir}
+
fi
+
+
if ! test -e ${cfg.dataDir}; then
+
mkdir -m 0700 -p ${cfg.dataDir}
+
chown -R stanchion:stanchion ${cfg.dataDir}
+
fi
+
'';
+
+
serviceConfig = {
+
ExecStart = "${cfg.package}/bin/stanchion console";
+
ExecStop = "${cfg.package}/bin/stanchion stop";
+
StandardInput = "tty";
+
User = "stanchion";
+
Group = "stanchion";
+
PermissionsStartOnly = true;
+
# Give Stanchion a decent amount of time to clean up.
+
TimeoutStopSec = 120;
+
LimitNOFILE = 65536;
+
};
+
+
unitConfig.RequiresMountsFor = [
+
"${cfg.dataDir}"
+
"${cfg.logDir}"
+
"/etc/stanchion"
+
];
+
};
+
};
+
}
+63
pkgs/servers/nosql/riak-cs/stanchion.nix
···
···
+
{ stdenv, lib, fetchurl, unzip, erlang, git, wget, which, pam, coreutils, riak }:
+
+
stdenv.mkDerivation rec {
+
name = "stanchion-2.1.1";
+
+
buildInputs = [
+
which unzip erlang pam git wget
+
];
+
+
src = fetchurl {
+
url = "http://s3.amazonaws.com/downloads.basho.com/stanchion/2.1/2.1.1/stanchion-2.1.1.tar.gz";
+
sha256 = "1443arwgg7qvlx3msyg99qvvhck7qxphdjslcp494i60fhr2g8ja";
+
};
+
+
+
postPatch = ''
+
sed -i deps/node_package/priv/base/env.sh \
+
-e 's@{{platform_data_dir}}@''${RIAK_DATA_DIR:-/var/db/stanchion}@' \
+
-e 's@^RUNNER_SCRIPT_DIR=.*@RUNNER_SCRIPT_DIR='$out'/bin@' \
+
-e 's@^RUNNER_BASE_DIR=.*@RUNNER_BASE_DIR='$out'@' \
+
-e 's@^RUNNER_ETC_DIR=.*@RUNNER_ETC_DIR=''${RIAK_ETC_DIR:-/etc/stanchion}@' \
+
-e 's@^RUNNER_LOG_DIR=.*@RUNNER_LOG_DIR=''${RIAK_LOG_DIR:-/var/log}@'
+
'';
+
+
preBuild = ''
+
patchShebangs .
+
'';
+
+
buildPhase = ''
+
runHook preBuild
+
+
make rel
+
+
runHook postBuild
+
'';
+
+
doCheck = false;
+
+
installPhase = ''
+
runHook preInstall
+
+
mkdir $out
+
mv rel/stanchion/etc rel/stanchion/riak-etc
+
mkdir -p rel/stanchion/etc
+
mv rel/stanchion/riak-etc rel/stanchion/etc/stanchion
+
mv rel/stanchion/* $out
+
+
for prog in $out/bin/*; do
+
substituteInPlace $prog \
+
--replace '. "`cd \`dirname $0\` && /bin/pwd`/../lib/env.sh"' \
+
". $out/lib/env.sh"
+
done
+
+
runHook postInstall
+
'';
+
+
meta = with lib; {
+
maintainers = with maintainers; [ mdaiter ];
+
description = "Manager for Riak CS";
+
platforms = [ "x86_64-linux" ];
+
license = licenses.asl20;
+
};
+
}
+4
pkgs/top-level/all-packages.nix
···
riak = callPackage ../servers/nosql/riak/2.1.1.nix { };
influxdb = callPackage ../servers/nosql/influxdb { };
mysql55 = callPackage ../servers/sql/mysql/5.5.x.nix {
···
riak = callPackage ../servers/nosql/riak/2.1.1.nix { };
+
stanchion = callPackage ../servers/nosql/riak-cs/stanchion.nix {
+
erlang = erlang_basho_R16B03;
+
};
+
influxdb = callPackage ../servers/nosql/influxdb { };
mysql55 = callPackage ../servers/sql/mysql/5.5.x.nix {