summary refs log tree commit diff
diff options
context:
space:
mode:
authorAustin Seipp <aseipp@pobox.com>2018-05-01 02:17:46 -0500
committerAustin Seipp <aseipp@pobox.com>2018-05-01 15:47:36 -0500
commit5a24d99fa628169c9fdeb37d3437cc3e7fa521ac (patch)
treea5b6032200f667e8274a31a52e41899b044d1b9d
parent55eec81118574b607ad7cfe9c26919134bcc2365 (diff)
downloadnixpkgs-5a24d99fa628169c9fdeb37d3437cc3e7fa521ac.tar
nixpkgs-5a24d99fa628169c9fdeb37d3437cc3e7fa521ac.tar.gz
nixpkgs-5a24d99fa628169c9fdeb37d3437cc3e7fa521ac.tar.bz2
nixpkgs-5a24d99fa628169c9fdeb37d3437cc3e7fa521ac.tar.lz
nixpkgs-5a24d99fa628169c9fdeb37d3437cc3e7fa521ac.tar.xz
nixpkgs-5a24d99fa628169c9fdeb37d3437cc3e7fa521ac.tar.zst
nixpkgs-5a24d99fa628169c9fdeb37d3437cc3e7fa521ac.zip
foundationdb: split into multiple, major-versioned packages to make upgrades user-controllable
Signed-off-by: Austin Seipp <aseipp@pobox.com>
-rw-r--r--nixos/modules/services/databases/foundationdb.nix19
-rw-r--r--nixos/modules/services/databases/foundationdb.xml10
-rw-r--r--pkgs/servers/foundationdb/default.nix176
-rw-r--r--pkgs/top-level/all-packages.nix7
4 files changed, 132 insertions, 80 deletions
diff --git a/nixos/modules/services/databases/foundationdb.nix b/nixos/modules/services/databases/foundationdb.nix
index 443cc6d5e45..693d2fde991 100644
--- a/nixos/modules/services/databases/foundationdb.nix
+++ b/nixos/modules/services/databases/foundationdb.nix
@@ -4,6 +4,7 @@ with lib;
 
 let
   cfg = config.services.foundationdb;
+  pkg = cfg.package;
 
   # used for initial cluster configuration
   initialIpAddr = if (cfg.publicAddress != "auto") then cfg.publicAddress else "127.0.0.1";
@@ -24,7 +25,7 @@ let
     group         = ${cfg.group}
 
     [fdbserver]
-    command        = ${pkgs.foundationdb}/bin/fdbserver
+    command        = ${pkg}/bin/fdbserver
     public_address = ${cfg.publicAddress}:$ID
     listen_address = ${cfg.listenAddress}
     datadir        = ${cfg.dataDir}/$ID
@@ -36,7 +37,7 @@ let
     storage_memory = ${cfg.storageMemory}
 
     ${optionalString (cfg.tls != null) ''
-      tls_plugin           = ${pkgs.foundationdb}/libexec/plugins/FDBLibTLS.so
+      tls_plugin           = ${pkg}/libexec/plugins/FDBLibTLS.so
       tls_certificate_file = ${cfg.tls.certificate}
       tls_key_file         = ${cfg.tls.key}
       tls_verify_peers     = ${cfg.tls.allowedPeers}
@@ -50,7 +51,7 @@ let
     ${fdbServers cfg.serverProcesses}
 
     [backup_agent]
-    command = ${pkgs.foundationdb}/libexec/backup_agent
+    command = ${pkg}/libexec/backup_agent
     ${backupAgents cfg.backupProcesses}
   '';
 in
@@ -59,6 +60,14 @@ in
 
     enable = mkEnableOption "FoundationDB Server";
 
+    package = mkOption {
+      type        = types.package;
+      description = ''
+        The FoundationDB package to use for this server. This must be specified by the user
+        in order to ensure migrations and upgrades are controlled appropriately.
+      '';
+    };
+
     publicAddress = mkOption {
       type        = types.str;
       default     = "auto";
@@ -314,7 +323,7 @@ in
     meta.doc         = ./foundationdb.xml;
     meta.maintainers = with lib.maintainers; [ thoughtpolice ];
 
-    environment.systemPackages = [ pkgs.foundationdb ];
+    environment.systemPackages = [ pkg ];
 
     users.extraUsers = optionalAttrs (cfg.user == "foundationdb") (singleton
       { name        = "foundationdb";
@@ -368,7 +377,7 @@ in
           ReadWritePaths        = lib.concatStringsSep " " (map (x: "-" + x) rwpaths);
         };
 
-      path = [ pkgs.foundationdb pkgs.coreutils ];
+      path = [ pkg pkgs.coreutils ];
 
       preStart = ''
         rm -f ${cfg.pidfile}   && \
diff --git a/nixos/modules/services/databases/foundationdb.xml b/nixos/modules/services/databases/foundationdb.xml
index 045193f4b75..def9cc43669 100644
--- a/nixos/modules/services/databases/foundationdb.xml
+++ b/nixos/modules/services/databases/foundationdb.xml
@@ -12,7 +12,7 @@
 
 <para><emphasis>Maintainer:</emphasis> Austin Seipp</para>
 
-<para><emphasis>Default version:</emphasis> 5.1.x</para>
+<para><emphasis>Available version(s):</emphasis> 5.1.x</para>
 
 <para>FoundationDB (or "FDB") is a distributed, open source, high performance,
 transactional key-value store. It can store petabytes of data and deliver
@@ -26,9 +26,17 @@ exceptional performance while maintaining consistency and ACID semantics
 
 <programlisting>
 services.foundationdb.enable = true;
+services.foundationdb.package = pkgs.foundationdb51; # FoundationDB 5.1.x
 </programlisting>
 </para>
 
+<para>The <option>services.foundationdb.package</option> option is required,
+and must always be specified. Because FoundationDB network protocols and
+on-disk storage formats may change between (major) versions, and upgrades must
+be explicitly handled by the user, you must always manually specify this
+yourself so that the NixOS module will use the proper version. Note that minor,
+bugfix releases are always compatible.</para>
+
 <para>After running <command>nixos-rebuild</command>, you can verify whether
 FoundationDB is running by executing <command>fdbcli</command> (which is added
 to <option>environment.systemPackages</option>):
diff --git a/pkgs/servers/foundationdb/default.nix b/pkgs/servers/foundationdb/default.nix
index 3397c2ba386..b1745dd5371 100644
--- a/pkgs/servers/foundationdb/default.nix
+++ b/pkgs/servers/foundationdb/default.nix
@@ -1,103 +1,131 @@
 { stdenv, fetchurl, fetchFromGitHub
-, which, findutils, m4, gawk, python, openjdk, mono58, libressl_2_6
+, which, findutils, m4, gawk
+, python, openjdk, mono58, libressl_2_6
+, boost16x
 }:
 
 let
-  version = "5.1.7";
-  branch  = "release-5.1";
-  rev     = "9ad8d02386d4a6a5efecf898df80f2747695c627";
-  sha256  = "1rc472ih24f9s5g3xmnlp3v62w206ny0pvvw02bzpix2sdrpbp06";
+  makeFdb =
+    { version
+    , branch
+    , rev, sha256
 
-  # hysterical raisins dictate a version of boost this old. however,
-  # we luckily do not need to build anything, we just need the header
-  # files.
-  boost152 = stdenv.mkDerivation rec {
-    name = "boost-headers-1.52.0";
+    # fdb 6.0+ support boost 1.6x+, so default to it
+    , boost ? boost16x
+    }: stdenv.mkDerivation rec {
+        name = "foundationdb-${version}";
+        inherit version;
 
-    src = fetchurl {
-      url = "mirror://sourceforge/boost/boost_1_52_0.tar.bz2";
-      sha256 = "14mc7gsnnahdjaxbbslzk79rc0d12h1i681cd3srdwr3fzynlar2";
-    };
+        src = fetchFromGitHub {
+          owner = "apple";
+          repo  = "foundationdb";
+          inherit rev sha256;
+        };
 
-    buildPhase = ":";
-    configurePhase = ":";
-    installPhase = ''
-      mkdir -p $out/include/
-      cp -R boost $out/include/
-    '';
-  };
+        nativeBuildInputs = [ gawk which m4 findutils mono58 ];
+        buildInputs = [ python openjdk libressl_2_6 boost ];
 
-in stdenv.mkDerivation rec {
-  name = "foundationdb-${version}";
-  inherit version;
+        patches =
+          [ ./fix-scm-version.patch
+            ./ldflags.patch
+          ];
 
-  src = fetchFromGitHub {
-    owner = "apple";
-    repo  = "foundationdb";
-    inherit rev sha256;
-  };
+        postPatch = ''
+          substituteInPlace ./build/scver.mk \
+            --subst-var-by NIXOS_FDB_VERSION_ID "${rev}" \
+            --subst-var-by NIXOS_FDB_SCBRANCH   "${branch}"
 
-  nativeBuildInputs = [ gawk which m4 findutils boost152 mono58 ];
-  buildInputs = [ python openjdk libressl_2_6 ];
+          substituteInPlace ./Makefile \
+            --replace 'shell which ccache' 'shell true' \
+            --replace -Werror ""
 
-  patches =
-    [ ./fix-scm-version.patch
-      ./ldflags.patch
-    ];
+          substituteInPlace ./Makefile \
+            --replace libstdc++_pic libstdc++
 
-  postPatch = ''
-    substituteInPlace ./build/scver.mk \
-      --subst-var-by NIXOS_FDB_VERSION_ID "${rev}" \
-      --subst-var-by NIXOS_FDB_SCBRANCH   "${branch}"
+          substituteInPlace ./build/link-validate.sh \
+            --replace 'exit 1' '#exit 1'
 
-    substituteInPlace ./Makefile \
-      --replace 'shell which ccache' 'shell true' \
-      --replace -Werror ""
+          patchShebangs .
+        '';
 
-    substituteInPlace ./Makefile \
-      --replace libstdc++_pic libstdc++
+        enableParallelBuilding = true;
+        makeFlags = [ "all" "fdb_c" "fdb_java" "KVRELEASE=1" ];
 
-    substituteInPlace ./build/link-validate.sh \
-      --replace 'exit 1' '#exit 1'
+        configurePhase = ":";
+        installPhase = ''
+          mkdir -vp $out/{bin,libexec/plugins} $lib/{lib,share/java} $dev/include/foundationdb
 
-    patchShebangs .
-  '';
+          cp -v ./lib/libfdb_c.so     $lib/lib
+          cp -v ./lib/libfdb_java.so  $lib/lib
 
-  enableParallelBuilding = true;
-  makeFlags = [ "all" "fdb_c" "fdb_java" "KVRELEASE=1" ];
+          cp -v ./lib/libFDBLibTLS.so $out/libexec/plugins/FDBLibTLS.so
 
-  configurePhase = ":";
-  installPhase = ''
-    mkdir -vp $out/{bin,libexec/plugins} $lib/{lib,share/java} $dev/include/foundationdb
+          cp -v ./bindings/c/foundationdb/fdb_c.h           $dev/include/foundationdb
+          cp -v ./bindings/c/foundationdb/fdb_c_options.g.h $dev/include/foundationdb
 
-    cp -v ./lib/libfdb_c.so     $lib/lib
-    cp -v ./lib/libfdb_java.so  $lib/lib
+          cp -v ./bindings/java/foundationdb-client.jar     $lib/share/java
 
-    cp -v ./lib/libFDBLibTLS.so $out/libexec/plugins/FDBLibTLS.so
+          for x in fdbbackup fdbcli fdbserver fdbmonitor; do
+            cp -v "./bin/$x" $out/bin;
+          done
 
-    cp -v ./bindings/c/foundationdb/fdb_c.h           $dev/include/foundationdb
-    cp -v ./bindings/c/foundationdb/fdb_c_options.g.h $dev/include/foundationdb
+          ln -sfv $out/bin/fdbbackup $out/bin/dr_agent
+          ln -sfv $out/bin/fdbbackup $out/bin/fdbrestore
+          ln -sfv $out/bin/fdbbackup $out/bin/fdbdr
 
-    cp -v ./bindings/java/foundationdb-client.jar     $lib/share/java
+          ln -sfv $out/bin/fdbbackup $out/libexec/backup_agent
+        '';
 
-    for x in fdbbackup fdbcli fdbserver fdbmonitor; do
-      cp -v "./bin/$x" $out/bin;
-    done
+        outputs = [ "out" "lib" "dev" ];
 
-    ln -sfv $out/bin/fdbbackup $out/bin/dr_agent
-    ln -sfv $out/bin/fdbbackup $out/bin/fdbrestore
-    ln -sfv $out/bin/fdbbackup $out/bin/fdbdr
+        meta = with stdenv.lib; {
+          description = "Open source, distributed, transactional key-value store";
+          homepage    = https://www.foundationdb.org;
+          license     = licenses.asl20;
+          platforms   = platforms.linux;
+          maintainers = with maintainers; [ thoughtpolice ];
+       };
+    };
 
-    ln -sfv $out/bin/fdbbackup $out/libexec/backup_agent
-  '';
+  # hysterical raisins dictate a version of boost this old. however,
+  # we luckily do not need to build anything, we just need the header
+  # files.
+  boost152 = stdenv.mkDerivation rec {
+    name = "boost-headers-1.52.0";
+
+    src = fetchurl {
+      url = "mirror://sourceforge/boost/boost_1_52_0.tar.bz2";
+      sha256 = "14mc7gsnnahdjaxbbslzk79rc0d12h1i681cd3srdwr3fzynlar2";
+    };
+
+    configurePhase = ":";
+    buildPhase = ":";
+    installPhase = "mkdir -p $out/include && cp -R boost $out/include/";
+  };
+
+in with builtins; {
 
-  outputs = [ "out" "lib" "dev" ];
+  foundationdb51 = makeFdb {
+    version = "5.1.7";
+    branch  = "release-5.1";
+    rev     = "9ad8d02386d4a6a5efecf898df80f2747695c627";
+    sha256  = "1rc472ih24f9s5g3xmnlp3v62w206ny0pvvw02bzpix2sdrpbp06";
+    boost   = boost152;
+  };
+
+  foundationdb52 = makeFdb rec {
+    version = "5.2.0pre1488_${substring 0 8 rev}";
+    branch  = "master";
+    rev     = "18f345487ed8d90a5c170d813349fa625cf05b4e";
+    sha256  = "0mz30fxj6q99cvjzg39s5zm992i6h2l2cb70lc58bdhsz92dz3vc";
+    boost   = boost152;
+  };
 
-  meta = with stdenv.lib; {
-    description = "Open source, distributed, transactional key-value store";
-    homepage    = https://www.foundationdb.org;
-    license     = licenses.asl20;
-    platforms   = platforms.linux;
-    maintainers = with maintainers; [ thoughtpolice ];
+  foundationdb60 = makeFdb rec {
+    version = "6.0.0pre1636_${substring 0 8 rev}";
+    branch  = "master";
+    rev     = "1265a7b6d5e632dd562b3012e70f0727979806bd";
+    sha256  = "0z1i5bkbszsbn8cc48rlhr29m54n2s0gq3dln0n7f97gf58mi5yf";
   };
+
 }
diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix
index df7e97e4f22..11f0d4ae423 100644
--- a/pkgs/top-level/all-packages.nix
+++ b/pkgs/top-level/all-packages.nix
@@ -2421,6 +2421,13 @@ with pkgs;
 
   fuseiso = callPackage ../tools/filesystems/fuseiso { };
 
+  fdbPackages = callPackage ../servers/foundationdb { stdenv = overrideCC stdenv gcc49; };
+
+  inherit (fdbPackages)
+    foundationdb51
+    foundationdb52
+    foundationdb60;
+
   foundationdb = callPackage ../servers/foundationdb { stdenv = overrideCC stdenv gcc49; };
 
   fuse-7z-ng = callPackage ../tools/filesystems/fuse-7z-ng { };