0
0
Fork 0
mirror of https://github.com/NixOS/nixpkgs.git synced 2025-07-21 01:20:34 +03:00
nixpkgs/nixos/modules/services/misc/rippled.nix
Silvan Mosberger d9d87c5196 treewide: format all inactive Nix files
After final improvements to the official formatter implementation,
this commit now performs the first treewide reformat of Nix files using it.
This is part of the implementation of RFC 166.

Only "inactive" files are reformatted, meaning only files that
aren't being touched by any PR with activity in the past 2 months.
This is to avoid conflicts for PRs that might soon be merged.
Later we can do a full treewide reformat to get the rest,
which should not cause as many conflicts.

A CI check has already been running for some time to ensure that new and
already-formatted files are formatted, so the files being reformatted here
should also stay formatted.

This commit was automatically created and can be verified using

    nix-build https://github.com/infinisil/treewide-nixpkgs-reformat-script/archive/a08b3a4d199c6124ac5b36a889d9099b4383463f.tar.gz \
      --argstr baseRev 0128fbb0a5
    result/bin/apply-formatting $NIXPKGS_PATH
2024-12-10 20:29:24 +01:00

463 lines
13 KiB
Nix

{
config,
lib,
options,
pkgs,
...
}:
let
cfg = config.services.rippled;
opt = options.services.rippled;
b2i = val: if val then "1" else "0";
dbCfg = db: ''
type=${db.type}
path=${db.path}
${lib.optionalString (db.compression != null) ("compression=${b2i db.compression}")}
${lib.optionalString (db.onlineDelete != null) ("online_delete=${toString db.onlineDelete}")}
${lib.optionalString (db.advisoryDelete != null) ("advisory_delete=${b2i db.advisoryDelete}")}
${db.extraOpts}
'';
rippledCfg =
''
[server]
${lib.concatMapStringsSep "\n" (n: "port_${n}") (lib.attrNames cfg.ports)}
${lib.concatMapStrings (p: ''
[port_${p.name}]
ip=${p.ip}
port=${toString p.port}
protocol=${lib.concatStringsSep "," p.protocol}
${lib.optionalString (p.user != "") "user=${p.user}"}
${lib.optionalString (p.password != "") "user=${p.password}"}
admin=${lib.concatStringsSep "," p.admin}
${lib.optionalString (p.ssl.key != null) "ssl_key=${p.ssl.key}"}
${lib.optionalString (p.ssl.cert != null) "ssl_cert=${p.ssl.cert}"}
${lib.optionalString (p.ssl.chain != null) "ssl_chain=${p.ssl.chain}"}
'') (lib.attrValues cfg.ports)}
[database_path]
${cfg.databasePath}
[node_db]
${dbCfg cfg.nodeDb}
${lib.optionalString (cfg.tempDb != null) ''
[temp_db]
${dbCfg cfg.tempDb}''}
${lib.optionalString (cfg.importDb != null) ''
[import_db]
${dbCfg cfg.importDb}''}
[ips]
${lib.concatStringsSep "\n" cfg.ips}
[ips_fixed]
${lib.concatStringsSep "\n" cfg.ipsFixed}
[validators]
${lib.concatStringsSep "\n" cfg.validators}
[node_size]
${cfg.nodeSize}
[ledger_history]
${toString cfg.ledgerHistory}
[fetch_depth]
${toString cfg.fetchDepth}
[validation_quorum]
${toString cfg.validationQuorum}
[sntp_servers]
${lib.concatStringsSep "\n" cfg.sntpServers}
${lib.optionalString cfg.statsd.enable ''
[insight]
server=statsd
address=${cfg.statsd.address}
prefix=${cfg.statsd.prefix}
''}
[rpc_startup]
{ "command": "log_level", "severity": "${cfg.logLevel}" }
''
+ cfg.extraConfig;
portOptions =
{ name, ... }:
{
options = {
name = lib.mkOption {
internal = true;
default = name;
};
ip = lib.mkOption {
default = "127.0.0.1";
description = "Ip where rippled listens.";
type = lib.types.str;
};
port = lib.mkOption {
description = "Port where rippled listens.";
type = lib.types.port;
};
protocol = lib.mkOption {
description = "Protocols expose by rippled.";
type = lib.types.listOf (
lib.types.enum [
"http"
"https"
"ws"
"wss"
"peer"
]
);
};
user = lib.mkOption {
description = "When set, these credentials will be required on HTTP/S requests.";
type = lib.types.str;
default = "";
};
password = lib.mkOption {
description = "When set, these credentials will be required on HTTP/S requests.";
type = lib.types.str;
default = "";
};
admin = lib.mkOption {
description = "A comma-separated list of admin IP addresses.";
type = lib.types.listOf lib.types.str;
default = [ "127.0.0.1" ];
};
ssl = {
key = lib.mkOption {
description = ''
Specifies the filename holding the SSL key in PEM format.
'';
default = null;
type = lib.types.nullOr lib.types.path;
};
cert = lib.mkOption {
description = ''
Specifies the path to the SSL certificate file in PEM format.
This is not needed if the chain includes it.
'';
default = null;
type = lib.types.nullOr lib.types.path;
};
chain = lib.mkOption {
description = ''
If you need a certificate chain, specify the path to the
certificate chain here. The chain may include the end certificate.
'';
default = null;
type = lib.types.nullOr lib.types.path;
};
};
};
};
dbOptions = {
options = {
type = lib.mkOption {
description = "Rippled database type.";
type = lib.types.enum [
"rocksdb"
"nudb"
];
default = "rocksdb";
};
path = lib.mkOption {
description = "Location to store the database.";
type = lib.types.path;
default = cfg.databasePath;
defaultText = lib.literalExpression "config.${opt.databasePath}";
};
compression = lib.mkOption {
description = "Whether to enable snappy compression.";
type = lib.types.nullOr lib.types.bool;
default = null;
};
onlineDelete = lib.mkOption {
description = "Enable automatic purging of older ledger information.";
type = lib.types.nullOr (lib.types.addCheck lib.types.int (v: v > 256));
default = cfg.ledgerHistory;
defaultText = lib.literalExpression "config.${opt.ledgerHistory}";
};
advisoryDelete = lib.mkOption {
description = ''
If set, then require administrative RPC call "can_delete"
to enable online deletion of ledger records.
'';
type = lib.types.nullOr lib.types.bool;
default = null;
};
extraOpts = lib.mkOption {
description = "Extra database options.";
type = lib.types.lines;
default = "";
};
};
};
in
{
###### interface
options = {
services.rippled = {
enable = lib.mkEnableOption "rippled, a decentralized cryptocurrency blockchain daemon implementing the XRP Ledger protocol in C++";
package = lib.mkPackageOption pkgs "rippled" { };
ports = lib.mkOption {
description = "Ports exposed by rippled";
type = with lib.types; attrsOf (submodule portOptions);
default = {
rpc = {
port = 5005;
admin = [ "127.0.0.1" ];
protocol = [ "http" ];
};
peer = {
port = 51235;
ip = "0.0.0.0";
protocol = [ "peer" ];
};
ws_public = {
port = 5006;
ip = "0.0.0.0";
protocol = [
"ws"
"wss"
];
};
};
};
nodeDb = lib.mkOption {
description = "Rippled main database options.";
type = with lib.types; nullOr (submodule dbOptions);
default = {
type = "rocksdb";
extraOpts = ''
open_files=2000
filter_bits=12
cache_mb=256
file_size_pb=8
file_size_mult=2;
'';
};
};
tempDb = lib.mkOption {
description = "Rippled temporary database options.";
type = with lib.types; nullOr (submodule dbOptions);
default = null;
};
importDb = lib.mkOption {
description = "Settings for performing a one-time import.";
type = with lib.types; nullOr (submodule dbOptions);
default = null;
};
nodeSize = lib.mkOption {
description = ''
Rippled size of the node you are running.
"tiny", "small", "medium", "large", and "huge"
'';
type = lib.types.enum [
"tiny"
"small"
"medium"
"large"
"huge"
];
default = "small";
};
ips = lib.mkOption {
description = ''
List of hostnames or ips where the Ripple protocol is served.
For a starter list, you can either copy entries from:
https://ripple.com/ripple.txt or if you prefer you can let it
default to r.ripple.com 51235
A port may optionally be specified after adding a space to the
address. By convention, if known, IPs are listed in from most
to least trusted.
'';
type = lib.types.listOf lib.types.str;
default = [ "r.ripple.com 51235" ];
};
ipsFixed = lib.mkOption {
description = ''
List of IP addresses or hostnames to which rippled should always
attempt to maintain peer connections with. This is useful for
manually forming private networks, for example to configure a
validation server that connects to the Ripple network through a
public-facing server, or for building a set of cluster peers.
A port may optionally be specified after adding a space to the address
'';
type = lib.types.listOf lib.types.str;
default = [ ];
};
validators = lib.mkOption {
description = ''
List of nodes to always accept as validators. Nodes are specified by domain
or public key.
'';
type = lib.types.listOf lib.types.str;
default = [
"n949f75evCHwgyP4fPVgaHqNHxUVN15PsJEZ3B3HnXPcPjcZAoy7 RL1"
"n9MD5h24qrQqiyBC8aeqqCWvpiBiYQ3jxSr91uiDvmrkyHRdYLUj RL2"
"n9L81uNCaPgtUJfaHh89gmdvXKAmSt5Gdsw2g1iPWaPkAHW5Nm4C RL3"
"n9KiYM9CgngLvtRCQHZwgC2gjpdaZcCcbt3VboxiNFcKuwFVujzS RL4"
"n9LdgEtkmGB9E2h3K4Vp7iGUaKuq23Zr32ehxiU8FWY7xoxbWTSA RL5"
];
};
databasePath = lib.mkOption {
description = ''
Path to the ripple database.
'';
type = lib.types.path;
default = "/var/lib/rippled";
};
validationQuorum = lib.mkOption {
description = ''
The minimum number of trusted validations a ledger must have before
the server considers it fully validated.
'';
type = lib.types.int;
default = 3;
};
ledgerHistory = lib.mkOption {
description = ''
The number of past ledgers to acquire on server startup and the minimum
to maintain while running.
'';
type = lib.types.either lib.types.int (lib.types.enum [ "full" ]);
default = 1296000; # 1 month
};
fetchDepth = lib.mkOption {
description = ''
The number of past ledgers to serve to other peers that request historical
ledger data (or "full" for no limit).
'';
type = lib.types.either lib.types.int (lib.types.enum [ "full" ]);
default = "full";
};
sntpServers = lib.mkOption {
description = ''
IP address or domain of NTP servers to use for time synchronization.;
'';
type = lib.types.listOf lib.types.str;
default = [
"time.windows.com"
"time.apple.com"
"time.nist.gov"
"pool.ntp.org"
];
};
logLevel = lib.mkOption {
description = "Logging verbosity.";
type = lib.types.enum [
"debug"
"error"
"info"
];
default = "error";
};
statsd = {
enable = lib.mkEnableOption "statsd monitoring for rippled";
address = lib.mkOption {
description = "The UDP address and port of the listening StatsD server.";
default = "127.0.0.1:8125";
type = lib.types.str;
};
prefix = lib.mkOption {
description = "A string prepended to each collected metric.";
default = "";
type = lib.types.str;
};
};
extraConfig = lib.mkOption {
default = "";
type = lib.types.lines;
description = ''
Extra lines to be added verbatim to the rippled.cfg configuration file.
'';
};
config = lib.mkOption {
internal = true;
default = pkgs.writeText "rippled.conf" rippledCfg;
defaultText = lib.literalMD "generated config file";
};
};
};
###### implementation
config = lib.mkIf cfg.enable {
users.users.rippled = {
description = "Ripple server user";
isSystemUser = true;
group = "rippled";
home = cfg.databasePath;
createHome = true;
};
users.groups.rippled = { };
systemd.services.rippled = {
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
serviceConfig = {
ExecStart = "${cfg.package}/bin/rippled --fg --conf ${cfg.config}";
User = "rippled";
Restart = "on-failure";
LimitNOFILE = 10000;
};
};
environment.systemPackages = [ cfg.package ];
};
}