From eefaaf41d67ea28c3f70150958f6a29533dce709 Mon Sep 17 00:00:00 2001 From: Luflosi Date: Sun, 24 Jul 2022 20:49:05 +0200 Subject: kubo: rename from ipfs Go-IPFS was renamed to Kubo in version 0.14.0, see https://github.com/ipfs/kubo/issues/8959. --- nixos/modules/module-list.nix | 2 +- .../modules/services/network-filesystems/ipfs.nix | 323 ------------------- .../modules/services/network-filesystems/kubo.nix | 346 +++++++++++++++++++++ nixos/tests/all-tests.nix | 2 +- nixos/tests/ipfs.nix | 61 ---- nixos/tests/kubo.nix | 61 ++++ .../networking/ipfs-migrator/all-migrations.nix | 63 ---- .../networking/ipfs-migrator/default.nix | 23 -- .../networking/ipfs-migrator/unwrapped.nix | 35 --- pkgs/applications/networking/ipfs/default.nix | 62 ---- .../networking/kubo-migrator/all-migrations.nix | 63 ++++ .../networking/kubo-migrator/default.nix | 23 ++ .../networking/kubo-migrator/unwrapped.nix | 35 +++ pkgs/applications/networking/kubo/default.nix | 63 ++++ .../python-modules/ipfshttpclient/default.nix | 4 +- pkgs/development/python-modules/ipwhl/default.nix | 4 +- pkgs/top-level/aliases.nix | 4 + pkgs/top-level/all-packages.nix | 15 +- 18 files changed, 609 insertions(+), 580 deletions(-) delete mode 100644 nixos/modules/services/network-filesystems/ipfs.nix create mode 100644 nixos/modules/services/network-filesystems/kubo.nix delete mode 100644 nixos/tests/ipfs.nix create mode 100644 nixos/tests/kubo.nix delete mode 100644 pkgs/applications/networking/ipfs-migrator/all-migrations.nix delete mode 100644 pkgs/applications/networking/ipfs-migrator/default.nix delete mode 100644 pkgs/applications/networking/ipfs-migrator/unwrapped.nix delete mode 100644 pkgs/applications/networking/ipfs/default.nix create mode 100644 pkgs/applications/networking/kubo-migrator/all-migrations.nix create mode 100644 pkgs/applications/networking/kubo-migrator/default.nix create mode 100644 pkgs/applications/networking/kubo-migrator/unwrapped.nix create mode 100644 pkgs/applications/networking/kubo/default.nix diff --git a/nixos/modules/module-list.nix b/nixos/modules/module-list.nix index dec66e395aa..edde5d6ab6d 100644 --- a/nixos/modules/module-list.nix +++ b/nixos/modules/module-list.nix @@ -721,7 +721,7 @@ ./services/network-filesystems/drbd.nix ./services/network-filesystems/glusterfs.nix ./services/network-filesystems/kbfs.nix - ./services/network-filesystems/ipfs.nix + ./services/network-filesystems/kubo.nix ./services/network-filesystems/litestream/default.nix ./services/network-filesystems/netatalk.nix ./services/network-filesystems/nfsd.nix diff --git a/nixos/modules/services/network-filesystems/ipfs.nix b/nixos/modules/services/network-filesystems/ipfs.nix deleted file mode 100644 index b9cf9ea882f..00000000000 --- a/nixos/modules/services/network-filesystems/ipfs.nix +++ /dev/null @@ -1,323 +0,0 @@ -{ config, lib, pkgs, utils, ... }: -with lib; -let - cfg = config.services.ipfs; - - ipfsFlags = utils.escapeSystemdExecArgs ( - optional cfg.autoMount "--mount" ++ - optional cfg.enableGC "--enable-gc" ++ - optional (cfg.serviceFdlimit != null) "--manage-fdlimit=false" ++ - optional (cfg.defaultMode == "offline") "--offline" ++ - optional (cfg.defaultMode == "norouting") "--routing=none" ++ - cfg.extraFlags - ); - - profile = - if cfg.localDiscovery - then "local-discovery" - else "server"; - - splitMulitaddr = addrRaw: lib.tail (lib.splitString "/" addrRaw); - - multiaddrToListenStream = addrRaw: - let - addr = splitMulitaddr addrRaw; - s = builtins.elemAt addr; - in - if s 0 == "ip4" && s 2 == "tcp" - then "${s 1}:${s 3}" - else if s 0 == "ip6" && s 2 == "tcp" - then "[${s 1}]:${s 3}" - else if s 0 == "unix" - then "/${lib.concatStringsSep "/" (lib.tail addr)}" - else null; # not valid for listen stream, skip - - multiaddrToListenDatagram = addrRaw: - let - addr = splitMulitaddr addrRaw; - s = builtins.elemAt addr; - in - if s 0 == "ip4" && s 2 == "udp" - then "${s 1}:${s 3}" - else if s 0 == "ip6" && s 2 == "udp" - then "[${s 1}]:${s 3}" - else null; # not valid for listen datagram, skip - -in -{ - - ###### interface - - options = { - - services.ipfs = { - - enable = mkEnableOption (lib.mdDoc "Interplanetary File System (WARNING: may cause severe network degredation)"); - - package = mkOption { - type = types.package; - default = pkgs.ipfs; - defaultText = literalExpression "pkgs.ipfs"; - description = lib.mdDoc "Which IPFS package to use."; - }; - - user = mkOption { - type = types.str; - default = "ipfs"; - description = lib.mdDoc "User under which the IPFS daemon runs"; - }; - - group = mkOption { - type = types.str; - default = "ipfs"; - description = lib.mdDoc "Group under which the IPFS daemon runs"; - }; - - dataDir = mkOption { - type = types.str; - default = - if versionAtLeast config.system.stateVersion "17.09" - then "/var/lib/ipfs" - else "/var/lib/ipfs/.ipfs"; - defaultText = literalExpression '' - if versionAtLeast config.system.stateVersion "17.09" - then "/var/lib/ipfs" - else "/var/lib/ipfs/.ipfs" - ''; - description = lib.mdDoc "The data dir for IPFS"; - }; - - defaultMode = mkOption { - type = types.enum [ "online" "offline" "norouting" ]; - default = "online"; - description = lib.mdDoc "systemd service that is enabled by default"; - }; - - autoMount = mkOption { - type = types.bool; - default = false; - description = lib.mdDoc "Whether IPFS should try to mount /ipfs and /ipns at startup."; - }; - - autoMigrate = mkOption { - type = types.bool; - default = true; - description = lib.mdDoc "Whether IPFS should try to run the fs-repo-migration at startup."; - }; - - ipfsMountDir = mkOption { - type = types.str; - default = "/ipfs"; - description = lib.mdDoc "Where to mount the IPFS namespace to"; - }; - - ipnsMountDir = mkOption { - type = types.str; - default = "/ipns"; - description = lib.mdDoc "Where to mount the IPNS namespace to"; - }; - - gatewayAddress = mkOption { - type = types.str; - default = "/ip4/127.0.0.1/tcp/8080"; - description = lib.mdDoc "Where the IPFS Gateway can be reached"; - }; - - apiAddress = mkOption { - type = types.str; - default = "/ip4/127.0.0.1/tcp/5001"; - description = lib.mdDoc "Where IPFS exposes its API to"; - }; - - swarmAddress = mkOption { - type = types.listOf types.str; - default = [ - "/ip4/0.0.0.0/tcp/4001" - "/ip6/::/tcp/4001" - "/ip4/0.0.0.0/udp/4001/quic" - "/ip6/::/udp/4001/quic" - ]; - description = lib.mdDoc "Where IPFS listens for incoming p2p connections"; - }; - - enableGC = mkOption { - type = types.bool; - default = false; - description = lib.mdDoc "Whether to enable automatic garbage collection"; - }; - - emptyRepo = mkOption { - type = types.bool; - default = false; - description = lib.mdDoc "If set to true, the repo won't be initialized with help files"; - }; - - extraConfig = mkOption { - type = types.attrs; - description = lib.mdDoc '' - Attrset of daemon configuration to set using {command}`ipfs config`, every time the daemon starts. - These are applied last, so may override configuration set by other options in this module. - Keep in mind that this configuration is stateful; i.e., unsetting anything in here does not reset the value to the default! - ''; - default = { }; - example = { - Datastore.StorageMax = "100GB"; - Discovery.MDNS.Enabled = false; - Bootstrap = [ - "/ip4/128.199.219.111/tcp/4001/ipfs/QmSoLSafTMBsPKadTEgaXctDQVcqN88CNLHXMkTNwMKPnu" - "/ip4/162.243.248.213/tcp/4001/ipfs/QmSoLueR4xBeUbY9WZ9xGUUxunbKWcrNFTDAadQJmocnWm" - ]; - Swarm.AddrFilters = null; - }; - - }; - - extraFlags = mkOption { - type = types.listOf types.str; - description = lib.mdDoc "Extra flags passed to the IPFS daemon"; - default = [ ]; - }; - - localDiscovery = mkOption { - type = types.bool; - description = lib.mdDoc ''Whether to enable local discovery for the ipfs daemon. - This will allow ipfs to scan ports on your local network. Some hosting services will ban you if you do this. - ''; - default = false; - }; - - serviceFdlimit = mkOption { - type = types.nullOr types.int; - default = null; - description = lib.mdDoc "The fdlimit for the IPFS systemd unit or `null` to have the daemon attempt to manage it"; - example = 64 * 1024; - }; - - startWhenNeeded = mkOption { - type = types.bool; - default = false; - description = lib.mdDoc "Whether to use socket activation to start IPFS when needed."; - }; - - }; - }; - - ###### implementation - - config = mkIf cfg.enable { - environment.systemPackages = [ cfg.package ]; - environment.variables.IPFS_PATH = cfg.dataDir; - - # https://github.com/lucas-clemente/quic-go/wiki/UDP-Receive-Buffer-Size - boot.kernel.sysctl."net.core.rmem_max" = mkDefault 2500000; - - programs.fuse = mkIf cfg.autoMount { - userAllowOther = true; - }; - - users.users = mkIf (cfg.user == "ipfs") { - ipfs = { - group = cfg.group; - home = cfg.dataDir; - createHome = false; - uid = config.ids.uids.ipfs; - description = "IPFS daemon user"; - packages = [ - pkgs.ipfs-migrator - ]; - }; - }; - - users.groups = mkIf (cfg.group == "ipfs") { - ipfs.gid = config.ids.gids.ipfs; - }; - - systemd.tmpfiles.rules = [ - "d '${cfg.dataDir}' - ${cfg.user} ${cfg.group} - -" - ] ++ optionals cfg.autoMount [ - "d '${cfg.ipfsMountDir}' - ${cfg.user} ${cfg.group} - -" - "d '${cfg.ipnsMountDir}' - ${cfg.user} ${cfg.group} - -" - ]; - - # The hardened systemd unit breaks the fuse-mount function according to documentation in the unit file itself - systemd.packages = if cfg.autoMount - then [ cfg.package.systemd_unit ] - else [ cfg.package.systemd_unit_hardened ]; - - systemd.services.ipfs = { - path = [ "/run/wrappers" cfg.package ]; - environment.IPFS_PATH = cfg.dataDir; - - preStart = '' - if [[ ! -f "$IPFS_PATH/config" ]]; then - ipfs init ${optionalString cfg.emptyRepo "-e"} --profile=${profile} - else - # After an unclean shutdown this file may exist which will cause the config command to attempt to talk to the daemon. This will hang forever if systemd is holding our sockets open. - rm -vf "$IPFS_PATH/api" - '' + optionalString cfg.autoMigrate '' - ${pkgs.ipfs-migrator}/bin/fs-repo-migrations -to '${cfg.package.repoVersion}' -y - '' + '' - ipfs --offline config profile apply ${profile} >/dev/null - fi - '' + optionalString cfg.autoMount '' - ipfs --offline config Mounts.FuseAllowOther --json true - ipfs --offline config Mounts.IPFS ${cfg.ipfsMountDir} - ipfs --offline config Mounts.IPNS ${cfg.ipnsMountDir} - '' + '' - ipfs --offline config show \ - | ${pkgs.jq}/bin/jq '. * $extraConfig' --argjson extraConfig ${ - escapeShellArg (builtins.toJSON ( - recursiveUpdate - { - Addresses.API = cfg.apiAddress; - Addresses.Gateway = cfg.gatewayAddress; - Addresses.Swarm = cfg.swarmAddress; - } - cfg.extraConfig - )) - } \ - | ipfs --offline config replace - - ''; - serviceConfig = { - ExecStart = [ "" "${cfg.package}/bin/ipfs daemon ${ipfsFlags}" ]; - User = cfg.user; - Group = cfg.group; - StateDirectory = ""; - ReadWritePaths = optionals (!cfg.autoMount) [ "" cfg.dataDir ]; - } // optionalAttrs (cfg.serviceFdlimit != null) { LimitNOFILE = cfg.serviceFdlimit; }; - } // optionalAttrs (!cfg.startWhenNeeded) { - wantedBy = [ "default.target" ]; - }; - - systemd.sockets.ipfs-gateway = { - wantedBy = [ "sockets.target" ]; - socketConfig = { - ListenStream = - let - fromCfg = multiaddrToListenStream cfg.gatewayAddress; - in - [ "" ] ++ lib.optional (fromCfg != null) fromCfg; - ListenDatagram = - let - fromCfg = multiaddrToListenDatagram cfg.gatewayAddress; - in - [ "" ] ++ lib.optional (fromCfg != null) fromCfg; - }; - }; - - systemd.sockets.ipfs-api = { - wantedBy = [ "sockets.target" ]; - # We also include "%t/ipfs.sock" because there is no way to put the "%t" - # in the multiaddr. - socketConfig.ListenStream = - let - fromCfg = multiaddrToListenStream cfg.apiAddress; - in - [ "" "%t/ipfs.sock" ] ++ lib.optional (fromCfg != null) fromCfg; - }; - }; - - meta = { - maintainers = with lib.maintainers; [ Luflosi ]; - }; -} diff --git a/nixos/modules/services/network-filesystems/kubo.nix b/nixos/modules/services/network-filesystems/kubo.nix new file mode 100644 index 00000000000..9942e4e41ad --- /dev/null +++ b/nixos/modules/services/network-filesystems/kubo.nix @@ -0,0 +1,346 @@ +{ config, lib, pkgs, utils, ... }: +with lib; +let + cfg = config.services.kubo; + + kuboFlags = utils.escapeSystemdExecArgs ( + optional cfg.autoMount "--mount" ++ + optional cfg.enableGC "--enable-gc" ++ + optional (cfg.serviceFdlimit != null) "--manage-fdlimit=false" ++ + optional (cfg.defaultMode == "offline") "--offline" ++ + optional (cfg.defaultMode == "norouting") "--routing=none" ++ + cfg.extraFlags + ); + + profile = + if cfg.localDiscovery + then "local-discovery" + else "server"; + + splitMulitaddr = addrRaw: lib.tail (lib.splitString "/" addrRaw); + + multiaddrToListenStream = addrRaw: + let + addr = splitMulitaddr addrRaw; + s = builtins.elemAt addr; + in + if s 0 == "ip4" && s 2 == "tcp" + then "${s 1}:${s 3}" + else if s 0 == "ip6" && s 2 == "tcp" + then "[${s 1}]:${s 3}" + else if s 0 == "unix" + then "/${lib.concatStringsSep "/" (lib.tail addr)}" + else null; # not valid for listen stream, skip + + multiaddrToListenDatagram = addrRaw: + let + addr = splitMulitaddr addrRaw; + s = builtins.elemAt addr; + in + if s 0 == "ip4" && s 2 == "udp" + then "${s 1}:${s 3}" + else if s 0 == "ip6" && s 2 == "udp" + then "[${s 1}]:${s 3}" + else null; # not valid for listen datagram, skip + +in +{ + + ###### interface + + options = { + + services.kubo = { + + enable = mkEnableOption (lib.mdDoc "Interplanetary File System (WARNING: may cause severe network degredation)"); + + package = mkOption { + type = types.package; + default = pkgs.kubo; + defaultText = literalExpression "pkgs.kubo"; + description = lib.mdDoc "Which Kubo package to use."; + }; + + user = mkOption { + type = types.str; + default = "ipfs"; + description = lib.mdDoc "User under which the Kubo daemon runs"; + }; + + group = mkOption { + type = types.str; + default = "ipfs"; + description = lib.mdDoc "Group under which the Kubo daemon runs"; + }; + + dataDir = mkOption { + type = types.str; + default = + if versionAtLeast config.system.stateVersion "17.09" + then "/var/lib/ipfs" + else "/var/lib/ipfs/.ipfs"; + defaultText = literalExpression '' + if versionAtLeast config.system.stateVersion "17.09" + then "/var/lib/ipfs" + else "/var/lib/ipfs/.ipfs" + ''; + description = lib.mdDoc "The data dir for Kubo"; + }; + + defaultMode = mkOption { + type = types.enum [ "online" "offline" "norouting" ]; + default = "online"; + description = lib.mdDoc "systemd service that is enabled by default"; + }; + + autoMount = mkOption { + type = types.bool; + default = false; + description = lib.mdDoc "Whether Kubo should try to mount /ipfs and /ipns at startup."; + }; + + autoMigrate = mkOption { + type = types.bool; + default = true; + description = lib.mdDoc "Whether Kubo should try to run the fs-repo-migration at startup."; + }; + + ipfsMountDir = mkOption { + type = types.str; + default = "/ipfs"; + description = lib.mdDoc "Where to mount the IPFS namespace to"; + }; + + ipnsMountDir = mkOption { + type = types.str; + default = "/ipns"; + description = lib.mdDoc "Where to mount the IPNS namespace to"; + }; + + gatewayAddress = mkOption { + type = types.str; + default = "/ip4/127.0.0.1/tcp/8080"; + description = lib.mdDoc "Where the IPFS Gateway can be reached"; + }; + + apiAddress = mkOption { + type = types.str; + default = "/ip4/127.0.0.1/tcp/5001"; + description = lib.mdDoc "Where Kubo exposes its API to"; + }; + + swarmAddress = mkOption { + type = types.listOf types.str; + default = [ + "/ip4/0.0.0.0/tcp/4001" + "/ip6/::/tcp/4001" + "/ip4/0.0.0.0/udp/4001/quic" + "/ip6/::/udp/4001/quic" + ]; + description = lib.mdDoc "Where Kubo listens for incoming p2p connections"; + }; + + enableGC = mkOption { + type = types.bool; + default = false; + description = lib.mdDoc "Whether to enable automatic garbage collection"; + }; + + emptyRepo = mkOption { + type = types.bool; + default = false; + description = lib.mdDoc "If set to true, the repo won't be initialized with help files"; + }; + + extraConfig = mkOption { + type = types.attrs; + description = lib.mdDoc '' + Attrset of daemon configuration to set using {command}`ipfs config`, every time the daemon starts. + These are applied last, so may override configuration set by other options in this module. + Keep in mind that this configuration is stateful; i.e., unsetting anything in here does not reset the value to the default! + ''; + default = { }; + example = { + Datastore.StorageMax = "100GB"; + Discovery.MDNS.Enabled = false; + Bootstrap = [ + "/ip4/128.199.219.111/tcp/4001/ipfs/QmSoLSafTMBsPKadTEgaXctDQVcqN88CNLHXMkTNwMKPnu" + "/ip4/162.243.248.213/tcp/4001/ipfs/QmSoLueR4xBeUbY9WZ9xGUUxunbKWcrNFTDAadQJmocnWm" + ]; + Swarm.AddrFilters = null; + }; + + }; + + extraFlags = mkOption { + type = types.listOf types.str; + description = lib.mdDoc "Extra flags passed to the Kubo daemon"; + default = [ ]; + }; + + localDiscovery = mkOption { + type = types.bool; + description = lib.mdDoc ''Whether to enable local discovery for the Kubo daemon. + This will allow Kubo to scan ports on your local network. Some hosting services will ban you if you do this. + ''; + default = false; + }; + + serviceFdlimit = mkOption { + type = types.nullOr types.int; + default = null; + description = lib.mdDoc "The fdlimit for the Kubo systemd unit or `null` to have the daemon attempt to manage it"; + example = 64 * 1024; + }; + + startWhenNeeded = mkOption { + type = types.bool; + default = false; + description = lib.mdDoc "Whether to use socket activation to start Kubo when needed."; + }; + + }; + }; + + ###### implementation + + config = mkIf cfg.enable { + environment.systemPackages = [ cfg.package ]; + environment.variables.IPFS_PATH = cfg.dataDir; + + # https://github.com/lucas-clemente/quic-go/wiki/UDP-Receive-Buffer-Size + boot.kernel.sysctl."net.core.rmem_max" = mkDefault 2500000; + + programs.fuse = mkIf cfg.autoMount { + userAllowOther = true; + }; + + users.users = mkIf (cfg.user == "ipfs") { + ipfs = { + group = cfg.group; + home = cfg.dataDir; + createHome = false; + uid = config.ids.uids.ipfs; + description = "IPFS daemon user"; + packages = [ + pkgs.kubo-migrator + ]; + }; + }; + + users.groups = mkIf (cfg.group == "ipfs") { + ipfs.gid = config.ids.gids.ipfs; + }; + + systemd.tmpfiles.rules = [ + "d '${cfg.dataDir}' - ${cfg.user} ${cfg.group} - -" + ] ++ optionals cfg.autoMount [ + "d '${cfg.ipfsMountDir}' - ${cfg.user} ${cfg.group} - -" + "d '${cfg.ipnsMountDir}' - ${cfg.user} ${cfg.group} - -" + ]; + + # The hardened systemd unit breaks the fuse-mount function according to documentation in the unit file itself + systemd.packages = if cfg.autoMount + then [ cfg.package.systemd_unit ] + else [ cfg.package.systemd_unit_hardened ]; + + systemd.services.ipfs = { + path = [ "/run/wrappers" cfg.package ]; + environment.IPFS_PATH = cfg.dataDir; + + preStart = '' + if [[ ! -f "$IPFS_PATH/config" ]]; then + ipfs init ${optionalString cfg.emptyRepo "-e"} --profile=${profile} + else + # After an unclean shutdown this file may exist which will cause the config command to attempt to talk to the daemon. This will hang forever if systemd is holding our sockets open. + rm -vf "$IPFS_PATH/api" + '' + optionalString cfg.autoMigrate '' + ${pkgs.kubo-migrator}/bin/fs-repo-migrations -to '${cfg.package.repoVersion}' -y + '' + '' + ipfs --offline config profile apply ${profile} >/dev/null + fi + '' + optionalString cfg.autoMount '' + ipfs --offline config Mounts.FuseAllowOther --json true + ipfs --offline config Mounts.IPFS ${cfg.ipfsMountDir} + ipfs --offline config Mounts.IPNS ${cfg.ipnsMountDir} + '' + '' + ipfs --offline config show \ + | ${pkgs.jq}/bin/jq '. * $extraConfig' --argjson extraConfig ${ + escapeShellArg (builtins.toJSON ( + recursiveUpdate + { + Addresses.API = cfg.apiAddress; + Addresses.Gateway = cfg.gatewayAddress; + Addresses.Swarm = cfg.swarmAddress; + } + cfg.extraConfig + )) + } \ + | ipfs --offline config replace - + ''; + serviceConfig = { + ExecStart = [ "" "${cfg.package}/bin/ipfs daemon ${kuboFlags}" ]; + User = cfg.user; + Group = cfg.group; + StateDirectory = ""; + ReadWritePaths = optionals (!cfg.autoMount) [ "" cfg.dataDir ]; + } // optionalAttrs (cfg.serviceFdlimit != null) { LimitNOFILE = cfg.serviceFdlimit; }; + } // optionalAttrs (!cfg.startWhenNeeded) { + wantedBy = [ "default.target" ]; + }; + + systemd.sockets.ipfs-gateway = { + wantedBy = [ "sockets.target" ]; + socketConfig = { + ListenStream = + let + fromCfg = multiaddrToListenStream cfg.gatewayAddress; + in + [ "" ] ++ lib.optional (fromCfg != null) fromCfg; + ListenDatagram = + let + fromCfg = multiaddrToListenDatagram cfg.gatewayAddress; + in + [ "" ] ++ lib.optional (fromCfg != null) fromCfg; + }; + }; + + systemd.sockets.ipfs-api = { + wantedBy = [ "sockets.target" ]; + # We also include "%t/ipfs.sock" because there is no way to put the "%t" + # in the multiaddr. + socketConfig.ListenStream = + let + fromCfg = multiaddrToListenStream cfg.apiAddress; + in + [ "" "%t/ipfs.sock" ] ++ lib.optional (fromCfg != null) fromCfg; + }; + }; + + meta = { + maintainers = with lib.maintainers; [ Luflosi ]; + }; + + imports = [ + (mkRenamedOptionModule [ "services" "ipfs" "enable" ] [ "services" "kubo" "enable" ]) + (mkRenamedOptionModule [ "services" "ipfs" "package" ] [ "services" "kubo" "package" ]) + (mkRenamedOptionModule [ "services" "ipfs" "user" ] [ "services" "kubo" "user" ]) + (mkRenamedOptionModule [ "services" "ipfs" "group" ] [ "services" "kubo" "group" ]) + (mkRenamedOptionModule [ "services" "ipfs" "dataDir" ] [ "services" "kubo" "dataDir" ]) + (mkRenamedOptionModule [ "services" "ipfs" "defaultMode" ] [ "services" "kubo" "defaultMode" ]) + (mkRenamedOptionModule [ "services" "ipfs" "autoMount" ] [ "services" "kubo" "autoMount" ]) + (mkRenamedOptionModule [ "services" "ipfs" "autoMigrate" ] [ "services" "kubo" "autoMigrate" ]) + (mkRenamedOptionModule [ "services" "ipfs" "ipfsMountDir" ] [ "services" "kubo" "ipfsMountDir" ]) + (mkRenamedOptionModule [ "services" "ipfs" "ipnsMountDir" ] [ "services" "kubo" "ipnsMountDir" ]) + (mkRenamedOptionModule [ "services" "ipfs" "gatewayAddress" ] [ "services" "kubo" "gatewayAddress" ]) + (mkRenamedOptionModule [ "services" "ipfs" "apiAddress" ] [ "services" "kubo" "apiAddress" ]) + (mkRenamedOptionModule [ "services" "ipfs" "swarmAddress" ] [ "services" "kubo" "swarmAddress" ]) + (mkRenamedOptionModule [ "services" "ipfs" "enableGC" ] [ "services" "kubo" "enableGC" ]) + (mkRenamedOptionModule [ "services" "ipfs" "emptyRepo" ] [ "services" "kubo" "emptyRepo" ]) + (mkRenamedOptionModule [ "services" "ipfs" "extraConfig" ] [ "services" "kubo" "extraConfig" ]) + (mkRenamedOptionModule [ "services" "ipfs" "extraFlags" ] [ "services" "kubo" "extraFlags" ]) + (mkRenamedOptionModule [ "services" "ipfs" "localDiscovery" ] [ "services" "kubo" "localDiscovery" ]) + (mkRenamedOptionModule [ "services" "ipfs" "serviceFdlimit" ] [ "services" "kubo" "serviceFdlimit" ]) + (mkRenamedOptionModule [ "services" "ipfs" "startWhenNeeded" ] [ "services" "kubo" "startWhenNeeded" ]) + ]; +} diff --git a/nixos/tests/all-tests.nix b/nixos/tests/all-tests.nix index 36c51b57310..efe1f10707c 100644 --- a/nixos/tests/all-tests.nix +++ b/nixos/tests/all-tests.nix @@ -284,7 +284,6 @@ in { installer-systemd-stage-1 = handleTest ./installer-systemd-stage-1.nix {}; invoiceplane = handleTest ./invoiceplane.nix {}; iodine = handleTest ./iodine.nix {}; - ipfs = handleTest ./ipfs.nix {}; ipv6 = handleTest ./ipv6.nix {}; iscsi-multipath-root = handleTest ./iscsi-multipath-root.nix {}; iscsi-root = handleTest ./iscsi-root.nix {}; @@ -317,6 +316,7 @@ in { ksm = handleTest ./ksm.nix {}; kthxbye = handleTest ./kthxbye.nix {}; kubernetes = handleTestOn ["x86_64-linux"] ./kubernetes {}; + kubo = handleTest ./kubo.nix {}; ladybird = handleTest ./ladybird.nix {}; languagetool = handleTest ./languagetool.nix {}; latestKernel.login = handleTest ./login.nix { latestKernel = true; }; diff --git a/nixos/tests/ipfs.nix b/nixos/tests/ipfs.nix deleted file mode 100644 index 024822745ad..00000000000 --- a/nixos/tests/ipfs.nix +++ /dev/null @@ -1,61 +0,0 @@ -import ./make-test-python.nix ({ pkgs, ...} : { - name = "ipfs"; - meta = with pkgs.lib.maintainers; { - maintainers = [ mguentner ]; - }; - - nodes.machine = { ... }: { - services.ipfs = { - enable = true; - # Also will add a unix domain socket socket API address, see module. - startWhenNeeded = true; - apiAddress = "/ip4/127.0.0.1/tcp/2324"; - dataDir = "/mnt/ipfs"; - }; - }; - - nodes.fuse = { ... }: { - services.ipfs = { - enable = true; - apiAddress = "/ip4/127.0.0.1/tcp/2324"; - autoMount = true; - }; - }; - - testScript = '' - start_all() - - # IPv4 activation - - machine.succeed("ipfs --api /ip4/127.0.0.1/tcp/2324 id") - ipfs_hash = machine.succeed( - "echo fnord | ipfs --api /ip4/127.0.0.1/tcp/2324 add | awk '{ print $2 }'" - ) - - machine.succeed(f"ipfs cat /ipfs/{ipfs_hash.strip()} | grep fnord") - - # Unix domain socket activation - - machine.stop_job("ipfs") - - ipfs_hash = machine.succeed( - "echo fnord2 | ipfs --api /unix/run/ipfs.sock add | awk '{ print $2 }'" - ) - machine.succeed( - f"ipfs --api /unix/run/ipfs.sock cat /ipfs/{ipfs_hash.strip()} | grep fnord2" - ) - - # Test if setting dataDir works properly with the hardened systemd unit - machine.succeed("test -e /mnt/ipfs/config") - machine.succeed("test ! -e /var/lib/ipfs/") - - # Test FUSE mountpoint - ipfs_hash = fuse.succeed( - "echo fnord3 | ipfs --api /ip4/127.0.0.1/tcp/2324 add --quieter" - ) - - # The FUSE mount functionality is broken as of v0.13.0. - # See https://github.com/ipfs/kubo/issues/9044. - # fuse.succeed(f"cat /ipfs/{ipfs_hash.strip()} | grep fnord3") - ''; -}) diff --git a/nixos/tests/kubo.nix b/nixos/tests/kubo.nix new file mode 100644 index 00000000000..e84a873a1a1 --- /dev/null +++ b/nixos/tests/kubo.nix @@ -0,0 +1,61 @@ +import ./make-test-python.nix ({ pkgs, ...} : { + name = "kubo"; + meta = with pkgs.lib.maintainers; { + maintainers = [ mguentner ]; + }; + + nodes.machine = { ... }: { + services.kubo = { + enable = true; + # Also will add a unix domain socket socket API address, see module. + startWhenNeeded = true; + apiAddress = "/ip4/127.0.0.1/tcp/2324"; + dataDir = "/mnt/ipfs"; + }; + }; + + nodes.fuse = { ... }: { + services.kubo = { + enable = true; + apiAddress = "/ip4/127.0.0.1/tcp/2324"; + autoMount = true; + }; + }; + + testScript = '' + start_all() + + # IPv4 activation + + machine.succeed("ipfs --api /ip4/127.0.0.1/tcp/2324 id") + ipfs_hash = machine.succeed( + "echo fnord | ipfs --api /ip4/127.0.0.1/tcp/2324 add | awk '{ print $2 }'" + ) + + machine.succeed(f"ipfs cat /ipfs/{ipfs_hash.strip()} | grep fnord") + + # Unix domain socket activation + + machine.stop_job("ipfs") + + ipfs_hash = machine.succeed( + "echo fnord2 | ipfs --api /unix/run/ipfs.sock add | awk '{ print $2 }'" + ) + machine.succeed( + f"ipfs --api /unix/run/ipfs.sock cat /ipfs/{ipfs_hash.strip()} | grep fnord2" + ) + + # Test if setting dataDir works properly with the hardened systemd unit + machine.succeed("test -e /mnt/ipfs/config") + machine.succeed("test ! -e /var/lib/ipfs/") + + # Test FUSE mountpoint + ipfs_hash = fuse.succeed( + "echo fnord3 | ipfs --api /ip4/127.0.0.1/tcp/2324 add --quieter" + ) + + # The FUSE mount functionality is broken as of v0.13.0. + # See https://github.com/ipfs/kubo/issues/9044. + # fuse.succeed(f"cat /ipfs/{ipfs_hash.strip()} | grep fnord3") + ''; +}) diff --git a/pkgs/applications/networking/ipfs-migrator/all-migrations.nix b/pkgs/applications/networking/ipfs-migrator/all-migrations.nix deleted file mode 100644 index a376e9f895b..00000000000 --- a/pkgs/applications/networking/ipfs-migrator/all-migrations.nix +++ /dev/null @@ -1,63 +0,0 @@ -{ lib -, stdenv -, symlinkJoin -, buildGoModule -, ipfs-migrator-unwrapped -}: - -# This package contains all the individual migrations in the bin directory. -# This is used by fs-repo-migrations and could also be used by IPFS itself -# when starting it like this: ipfs daemon --migrate - -let - fs-repo-common = pname: version: buildGoModule { - inherit pname version; - inherit (ipfs-migrator-unwrapped) src; - sourceRoot = "source/${pname}"; - vendorSha256 = null; - doCheck = false; - meta = ipfs-migrator-unwrapped.meta // { - mainProgram = pname; - description = "Individual migration for the filesystem repository of ipfs clients"; - }; - }; - - # Concatenation of the latest repo version and the version of that migration - version = "12.1.0.2"; - - fs-repo-11-to-12 = fs-repo-common "fs-repo-11-to-12" "1.0.2"; - fs-repo-10-to-11 = fs-repo-common "fs-repo-10-to-11" "1.0.1"; - fs-repo-9-to-10 = fs-repo-common "fs-repo-9-to-10" "1.0.1"; - fs-repo-8-to-9 = fs-repo-common "fs-repo-8-to-9" "1.0.1"; - fs-repo-7-to-8 = fs-repo-common "fs-repo-7-to-8" "1.0.1"; - fs-repo-6-to-7 = fs-repo-common "fs-repo-6-to-7" "1.0.1"; - fs-repo-5-to-6 = fs-repo-common "fs-repo-5-to-6" "1.0.1"; - fs-repo-4-to-5 = fs-repo-common "fs-repo-4-to-5" "1.0.1"; - fs-repo-3-to-4 = fs-repo-common "fs-repo-3-to-4" "1.0.1"; - fs-repo-2-to-3 = fs-repo-common "fs-repo-2-to-3" "1.0.1"; - fs-repo-1-to-2 = fs-repo-common "fs-repo-1-to-2" "1.0.1"; - fs-repo-0-to-1 = fs-repo-common "fs-repo-0-to-1" "1.0.1"; - - all-migrations = [ - fs-repo-11-to-12 - fs-repo-10-to-11 - fs-repo-9-to-10 - fs-repo-8-to-9 - fs-repo-7-to-8 - ] ++ lib.optional (!stdenv.isDarwin) # I didn't manage to fix this on macOS: - fs-repo-6-to-7 # gx/ipfs/QmSGRM5Udmy1jsFBr1Cawez7Lt7LZ3ZKA23GGVEsiEW6F3/eventfd/eventfd.go:27:32: undefined: syscall.SYS_EVENTFD2 - ++ [ - fs-repo-5-to-6 - fs-repo-4-to-5 - fs-repo-3-to-4 - fs-repo-2-to-3 - fs-repo-1-to-2 - fs-repo-0-to-1 - ]; - -in - -symlinkJoin { - name = "ipfs-migrator-all-fs-repo-migrations-${version}"; - paths = all-migrations; -} diff --git a/pkgs/applications/networking/ipfs-migrator/default.nix b/pkgs/applications/networking/ipfs-migrator/default.nix deleted file mode 100644 index d8c5de150bb..00000000000 --- a/pkgs/applications/networking/ipfs-migrator/default.nix +++ /dev/null @@ -1,23 +0,0 @@ -{ lib -, buildEnv -, makeWrapper -, ipfs-migrator-unwrapped -, ipfs-migrator-all-fs-repo-migrations -}: - -buildEnv { - name = "ipfs-migrator-${ipfs-migrator-unwrapped.version}"; - - nativeBuildInputs = [ makeWrapper ]; - - paths = [ ipfs-migrator-unwrapped ]; - - pathsToLink = [ "/bin" ]; - - postBuild = '' - wrapProgram "$out/bin/fs-repo-migrations" \ - --prefix PATH ':' '${lib.makeBinPath [ ipfs-migrator-all-fs-repo-migrations ]}' - ''; - - inherit (ipfs-migrator-unwrapped) meta; -} diff --git a/pkgs/applications/networking/ipfs-migrator/unwrapped.nix b/pkgs/applications/networking/ipfs-migrator/unwrapped.nix deleted file mode 100644 index c8ade793218..00000000000 --- a/pkgs/applications/networking/ipfs-migrator/unwrapped.nix +++ /dev/null @@ -1,35 +0,0 @@ -{ lib -, buildGoModule -, fetchFromGitHub -}: - -buildGoModule rec { - pname = "ipfs-migrator"; - version = "2.0.2"; - - src = fetchFromGitHub { - owner = "ipfs"; - repo = "fs-repo-migrations"; - # Use the latest git tag here, since v2.0.2 does not - # contain the latest migration fs-repo-11-to-12/v1.0.2 - # The fs-repo-migrations code itself is the same between - # the two versions but the migration code, which is built - # into separate binaries, is not. - rev = "fs-repo-11-to-12/v1.0.2"; - sha256 = "sha256-CG4utwH+/+Igw+SP3imhl39wijlB53UGtkJG5Mwh+Ik="; - }; - - sourceRoot = "source/fs-repo-migrations"; - - vendorSha256 = "sha256-/DqkBBtR/nU8gk3TFqNKY5zQU6BFMc3N8Ti+38mi/jk="; - - doCheck = false; - - meta = with lib; { - description = "Migrations for the filesystem repository of ipfs clients"; - homepage = "https://github.com/ipfs/fs-repo-migrations"; - license = licenses.mit; - maintainers = with maintainers; [ Luflosi elitak ]; - mainProgram = "fs-repo-migrations"; - }; -} diff --git a/pkgs/applications/networking/ipfs/default.nix b/pkgs/applications/networking/ipfs/default.nix deleted file mode 100644 index 6054bca1d8a..00000000000 --- a/pkgs/applications/networking/ipfs/default.nix +++ /dev/null @@ -1,62 +0,0 @@ -{ lib, buildGoModule, fetchurl, nixosTests, openssl, pkg-config }: - -buildGoModule rec { - pname = "ipfs"; - version = "0.15.0"; # When updating, also check if the repo version changed and adjust repoVersion below - rev = "v${version}"; - - passthru.repoVersion = "12"; # Also update ipfs-migrator when changing the repo version - - # go-ipfs makes changes to it's source tarball that don't match the git source. - src = fetchurl { - url = "https://github.com/ipfs/kubo/releases/download/${rev}/kubo-source.tar.gz"; - hash = "sha256-GkOY1G2CKXbMbHXkw5v27HmfkJIl2nZOmjjZbzuaRWs="; - }; - - # tarball contains multiple files/directories - postUnpack = '' - mkdir ipfs-src - shopt -s extglob - mv !(ipfs-src) ipfs-src || true - cd ipfs-src - ''; - - sourceRoot = "."; - - subPackages = [ "cmd/ipfs" ]; - - buildInputs = [ openssl ]; - nativeBuildInputs = [ pkg-config ]; - tags = [ "openssl" ]; - - passthru.tests.ipfs = nixosTests.ipfs; - - vendorSha256 = null; - - outputs = [ "out" "systemd_unit" "systemd_unit_hardened" ]; - - postPatch = '' - substituteInPlace 'misc/systemd/ipfs.service' \ - --replace '/usr/bin/ipfs' "$out/bin/ipfs" - substituteInPlace 'misc/systemd/ipfs-hardened.service' \ - --replace '/usr/bin/ipfs' "$out/bin/ipfs" - ''; - - postInstall = '' - install --mode=444 -D 'misc/systemd/ipfs-api.socket' "$systemd_unit/etc/systemd/system/ipfs-api.socket" - install --mode=444 -D 'misc/systemd/ipfs-gateway.socket' "$systemd_unit/etc/systemd/system/ipfs-gateway.socket" - install --mode=444 -D 'misc/systemd/ipfs.service' "$systemd_unit/etc/systemd/system/ipfs.service" - - install --mode=444 -D 'misc/systemd/ipfs-api.socket' "$systemd_unit_hardened/etc/systemd/system/ipfs-api.socket" - install --mode=444 -D 'misc/systemd/ipfs-gateway.socket' "$systemd_unit_hardened/etc/systemd/system/ipfs-gateway.socket" - install --mode=444 -D 'misc/systemd/ipfs-hardened.service' "$systemd_unit_hardened/etc/systemd/system/ipfs.service" - ''; - - meta = with lib; { - description = "A global, versioned, peer-to-peer filesystem"; - homepage = "https://ipfs.io/"; - license = licenses.mit; - platforms = platforms.unix; - maintainers = with maintainers; [ fpletz ]; - }; -} diff --git a/pkgs/applications/networking/kubo-migrator/all-migrations.nix b/pkgs/applications/networking/kubo-migrator/all-migrations.nix new file mode 100644 index 00000000000..a9197c9db5f --- /dev/null +++ b/pkgs/applications/networking/kubo-migrator/all-migrations.nix @@ -0,0 +1,63 @@ +{ lib +, stdenv +, symlinkJoin +, buildGoModule +, kubo-migrator-unwrapped +}: + +# This package contains all the individual migrations in the bin directory. +# This is used by fs-repo-migrations and could also be used by Kubo itself +# when starting it like this: ipfs daemon --migrate + +let + fs-repo-common = pname: version: buildGoModule { + inherit pname version; + inherit (kubo-migrator-unwrapped) src; + sourceRoot = "source/${pname}"; + vendorSha256 = null; + doCheck = false; + meta = kubo-migrator-unwrapped.meta // { + mainProgram = pname; + description = "Individual migration for the filesystem repository of Kubo clients"; + }; + }; + + # Concatenation of the latest repo version and the version of that migration + version = "12.1.0.2"; + + fs-repo-11-to-12 = fs-repo-common "fs-repo-11-to-12" "1.0.2"; + fs-repo-10-to-11 = fs-repo-common "fs-repo-10-to-11" "1.0.1"; + fs-repo-9-to-10 = fs-repo-common "fs-repo-9-to-10" "1.0.1"; + fs-repo-8-to-9 = fs-repo-common "fs-repo-8-to-9" "1.0.1"; + fs-repo-7-to-8 = fs-repo-common "fs-repo-7-to-8" "1.0.1"; + fs-repo-6-to-7 = fs-repo-common "fs-repo-6-to-7" "1.0.1"; + fs-repo-5-to-6 = fs-repo-common "fs-repo-5-to-6" "1.0.1"; + fs-repo-4-to-5 = fs-repo-common "fs-repo-4-to-5" "1.0.1"; + fs-repo-3-to-4 = fs-repo-common "fs-repo-3-to-4" "1.0.1"; + fs-repo-2-to-3 = fs-repo-common "fs-repo-2-to-3" "1.0.1"; + fs-repo-1-to-2 = fs-repo-common "fs-repo-1-to-2" "1.0.1"; + fs-repo-0-to-1 = fs-repo-common "fs-repo-0-to-1" "1.0.1"; + + all-migrations = [ + fs-repo-11-to-12 + fs-repo-10-to-11 + fs-repo-9-to-10 + fs-repo-8-to-9 + fs-repo-7-to-8 + ] ++ lib.optional (!stdenv.isDarwin) # I didn't manage to fix this on macOS: + fs-repo-6-to-7 # gx/ipfs/QmSGRM5Udmy1jsFBr1Cawez7Lt7LZ3ZKA23GGVEsiEW6F3/eventfd/eventfd.go:27:32: undefined: syscall.SYS_EVENTFD2 + ++ [ + fs-repo-5-to-6 + fs-repo-4-to-5 + fs-repo-3-to-4 + fs-repo-2-to-3 + fs-repo-1-to-2 + fs-repo-0-to-1 + ]; + +in + +symlinkJoin { + name = "kubo-migrator-all-fs-repo-migrations-${version}"; + paths = all-migrations; +} diff --git a/pkgs/applications/networking/kubo-migrator/default.nix b/pkgs/applications/networking/kubo-migrator/default.nix new file mode 100644 index 00000000000..e45cbf84d52 --- /dev/null +++ b/pkgs/applications/networking/kubo-migrator/default.nix @@ -0,0 +1,23 @@ +{ lib +, buildEnv +, makeWrapper +, kubo-migrator-unwrapped +, kubo-migrator-all-fs-repo-migrations +}: + +buildEnv { + name = "kubo-migrator-${kubo-migrator-unwrapped.version}"; + + nativeBuildInputs = [ makeWrapper ]; + + paths = [ kubo-migrator-unwrapped ]; + + pathsToLink = [ "/bin" ]; + + postBuild = '' + wrapProgram "$out/bin/fs-repo-migrations" \ + --prefix PATH ':' '${lib.makeBinPath [ kubo-migrator-all-fs-repo-migrations ]}' + ''; + + inherit (kubo-migrator-unwrapped) meta; +} diff --git a/pkgs/applications/networking/kubo-migrator/unwrapped.nix b/pkgs/applications/networking/kubo-migrator/unwrapped.nix new file mode 100644 index 00000000000..a99ab2b2cbb --- /dev/null +++ b/pkgs/applications/networking/kubo-migrator/unwrapped.nix @@ -0,0 +1,35 @@ +{ lib +, buildGoModule +, fetchFromGitHub +}: + +buildGoModule rec { + pname = "kubo-migrator"; + version = "2.0.2"; + + src = fetchFromGitHub { + owner = "ipfs"; + repo = "fs-repo-migrations"; + # Use the latest git tag here, since v2.0.2 does not + # contain the latest migration fs-repo-11-to-12/v1.0.2 + # The fs-repo-migrations code itself is the same between + # the two versions but the migration code, which is built + # into separate binaries, is not. + rev = "fs-repo-11-to-12/v1.0.2"; + sha256 = "sha256-CG4utwH+/+Igw+SP3imhl39wijlB53UGtkJG5Mwh+Ik="; + }; + + sourceRoot = "source/fs-repo-migrations"; + + vendorSha256 = "sha256-/DqkBBtR/nU8gk3TFqNKY5zQU6BFMc3N8Ti+38mi/jk="; + + doCheck = false; + + meta = with lib; { + description = "Migrations for the filesystem repository of Kubo clients"; + homepage = "https://github.com/ipfs/fs-repo-migrations"; + license = licenses.mit; + maintainers = with maintainers; [ Luflosi elitak ]; + mainProgram = "fs-repo-migrations"; + }; +} diff --git a/pkgs/applications/networking/kubo/default.nix b/pkgs/applications/networking/kubo/default.nix new file mode 100644 index 00000000000..dc6f1edd574 --- /dev/null +++ b/pkgs/applications/networking/kubo/default.nix @@ -0,0 +1,63 @@ +{ lib, buildGoModule, fetchurl, nixosTests, openssl, pkg-config }: + +buildGoModule rec { + pname = "kubo"; + version = "0.15.0"; # When updating, also check if the repo version changed and adjust repoVersion below + rev = "v${version}"; + + passthru.repoVersion = "12"; # Also update kubo-migrator when changing the repo version + + # Kubo makes changes to it's source tarball that don't match the git source. + src = fetchurl { + url = "https://github.com/ipfs/kubo/releases/download/${rev}/kubo-source.tar.gz"; + hash = "sha256-GkOY1G2CKXbMbHXkw5v27HmfkJIl2nZOmjjZbzuaRWs="; + }; + + # tarball contains multiple files/directories + postUnpack = '' + mkdir kubo-src + shopt -s extglob + mv !(kubo-src) kubo-src || true + cd kubo-src + ''; + + sourceRoot = "."; + + subPackages = [ "cmd/ipfs" ]; + + buildInputs = [ openssl ]; + nativeBuildInputs = [ pkg-config ]; + tags = [ "openssl" ]; + + passthru.tests.kubo = nixosTests.kubo; + + vendorSha256 = null; + + outputs = [ "out" "systemd_unit" "systemd_unit_hardened" ]; + + postPatch = '' + substituteInPlace 'misc/systemd/ipfs.service' \ + --replace '/usr/bin/ipfs' "$out/bin/ipfs" + substituteInPlace 'misc/systemd/ipfs-hardened.service' \ + --replace '/usr/bin/ipfs' "$out/bin/ipfs" + ''; + + postInstall = '' + install --mode=444 -D 'misc/systemd/ipfs-api.socket' "$systemd_unit/etc/systemd/system/ipfs-api.socket" + install --mode=444 -D 'misc/systemd/ipfs-gateway.socket' "$systemd_unit/etc/systemd/system/ipfs-gateway.socket" + install --mode=444 -D 'misc/systemd/ipfs.service' "$systemd_unit/etc/systemd/system/ipfs.service" + + install --mode=444 -D 'misc/systemd/ipfs-api.socket' "$systemd_unit_hardened/etc/systemd/system/ipfs-api.socket" + install --mode=444 -D 'misc/systemd/ipfs-gateway.socket' "$systemd_unit_hardened/etc/systemd/system/ipfs-gateway.socket" + install --mode=444 -D 'misc/systemd/ipfs-hardened.service' "$systemd_unit_hardened/etc/systemd/system/ipfs.service" + ''; + + meta = with lib; { + description = "A global, versioned, peer-to-peer filesystem"; + homepage = "https://ipfs.io/"; + license = licenses.mit; + platforms = platforms.unix; + mainProgram = "ipfs"; + maintainers = with maintainers; [ fpletz ]; + }; +} diff --git a/pkgs/development/python-modules/ipfshttpclient/default.nix b/pkgs/development/python-modules/ipfshttpclient/default.nix index 6af860a3980..71e0194a6b2 100644 --- a/pkgs/development/python-modules/ipfshttpclient/default.nix +++ b/pkgs/development/python-modules/ipfshttpclient/default.nix @@ -14,7 +14,7 @@ , pytest-order , pytest-cid , mock -, ipfs +, kubo , httpx , httpcore }: @@ -46,7 +46,7 @@ buildPythonPackage rec { pytest-order pytest-cid mock - ipfs + kubo httpcore httpx ]; diff --git a/pkgs/development/python-modules/ipwhl/default.nix b/pkgs/development/python-modules/ipwhl/default.nix index 8bbf257ebdc..6ccb1dabebb 100644 --- a/pkgs/development/python-modules/ipwhl/default.nix +++ b/pkgs/development/python-modules/ipwhl/default.nix @@ -1,5 +1,5 @@ { lib, buildPythonPackage, pythonOlder, fetchFromSourcehut -, ipfs, packaging, tomli }: +, kubo, packaging, tomli }: buildPythonPackage rec { pname = "ipwhl"; @@ -14,7 +14,7 @@ buildPythonPackage rec { sha256 = "sha256-YaIYcoUnbiv9wUOFIzGj2sWGbh7NsqRQcqOR2X6+QZA="; }; - buildInputs = [ ipfs ]; + buildInputs = [ kubo ]; propagatedBuildInputs = [ packaging tomli ]; doCheck = false; # there's no test pythonImportsCheck = [ "ipwhl" ]; diff --git a/pkgs/top-level/aliases.nix b/pkgs/top-level/aliases.nix index 891f83f1a61..abe58292c63 100644 --- a/pkgs/top-level/aliases.nix +++ b/pkgs/top-level/aliases.nix @@ -515,6 +515,10 @@ mapAliases ({ interfacer = throw "interfacer is deprecated and archived by upstream"; # Added 2022-04-05 inter-ui = throw "'inter-ui' has been renamed to/replaced by 'inter'"; # Converted to throw 2022-09-24 iops = throw "iops was removed: upstream is gone"; # Added 2022-02-06 + ipfs = kubo; # Added 2022-09-27 + ipfs-migrator-all-fs-repo-migrations = kubo-migrator-all-fs-repo-migrations; # Added 2022-09-27 + ipfs-migrator-unwrapped = kubo-migrator-unwrapped; # Added 2022-09-27 + ipfs-migrator = kubo-migrator; # Added 2022-09-27 iproute = throw "'iproute' has been renamed to/replaced by 'iproute2'"; # Converted to throw 2022-09-24 ipsecTools = throw "ipsecTools has benn removed, because it was no longer maintained upstream"; # Added 2021-12-15 itch-setup = throw "itch-setup has benn removed, use itch instead"; # Added 2022-06-02 diff --git a/pkgs/top-level/all-packages.nix b/pkgs/top-level/all-packages.nix index 80f7c717a3d..5f6efdc5c27 100644 --- a/pkgs/top-level/all-packages.nix +++ b/pkgs/top-level/all-packages.nix @@ -7830,17 +7830,10 @@ with pkgs; ipfetch = callPackage ../tools/networking/ipfetch { }; - ipfs = callPackage ../applications/networking/ipfs { - openssl = openssl_1_1; - }; ipfs-cluster = callPackage ../applications/networking/ipfs-cluster { buildGoModule = buildGo119Module; }; - ipfs-migrator-all-fs-repo-migrations = callPackage ../applications/networking/ipfs-migrator/all-migrations.nix { }; - ipfs-migrator-unwrapped = callPackage ../applications/networking/ipfs-migrator/unwrapped.nix { }; - ipfs-migrator = callPackage ../applications/networking/ipfs-migrator { }; - ipfs-upload-client = callPackage ../applications/networking/ipfs-upload-client { }; ipget = callPackage ../applications/networking/ipget { }; @@ -8185,6 +8178,14 @@ with pkgs; kubergrunt = callPackage ../applications/networking/cluster/kubergrunt { }; + kubo = callPackage ../applications/networking/kubo { + openssl = openssl_1_1; + }; + + kubo-migrator-all-fs-repo-migrations = callPackage ../applications/networking/kubo-migrator/all-migrations.nix { }; + kubo-migrator-unwrapped = callPackage ../applications/networking/kubo-migrator/unwrapped.nix { }; + kubo-migrator = callPackage ../applications/networking/kubo-migrator { }; + kwalletcli = libsForQt5.callPackage ../tools/security/kwalletcli { }; peruse = libsForQt5.callPackage ../tools/misc/peruse { }; -- cgit 1.4.1