mirror of
https://github.com/NixOS/nixpkgs.git
synced 2025-01-15 01:15:51 +00:00
4f0dadbf38
After final improvements to the official formatter implementation, this commit now performs the first treewide reformat of Nix files using it. This is part of the implementation of RFC 166. Only "inactive" files are reformatted, meaning only files that aren't being touched by any PR with activity in the past 2 months. This is to avoid conflicts for PRs that might soon be merged. Later we can do a full treewide reformat to get the rest, which should not cause as many conflicts. A CI check has already been running for some time to ensure that new and already-formatted files are formatted, so the files being reformatted here should also stay formatted. This commit was automatically created and can be verified using nix-builda08b3a4d19
.tar.gz \ --argstr baseRevb32a094368
result/bin/apply-formatting $NIXPKGS_PATH
240 lines
7.1 KiB
Nix
240 lines
7.1 KiB
Nix
{
|
|
config,
|
|
lib,
|
|
pkgs,
|
|
...
|
|
}:
|
|
|
|
with lib;
|
|
|
|
let
|
|
cfg = config.services.elasticsearch;
|
|
|
|
es7 = builtins.compareVersions cfg.package.version "7" >= 0;
|
|
|
|
esConfig = ''
|
|
network.host: ${cfg.listenAddress}
|
|
cluster.name: ${cfg.cluster_name}
|
|
${lib.optionalString cfg.single_node "discovery.type: single-node"}
|
|
${lib.optionalString (cfg.single_node && es7) "gateway.auto_import_dangling_indices: true"}
|
|
|
|
http.port: ${toString cfg.port}
|
|
transport.port: ${toString cfg.tcp_port}
|
|
|
|
${cfg.extraConf}
|
|
'';
|
|
|
|
configDir = cfg.dataDir + "/config";
|
|
|
|
elasticsearchYml = pkgs.writeTextFile {
|
|
name = "elasticsearch.yml";
|
|
text = esConfig;
|
|
};
|
|
|
|
loggingConfigFilename = "log4j2.properties";
|
|
loggingConfigFile = pkgs.writeTextFile {
|
|
name = loggingConfigFilename;
|
|
text = cfg.logging;
|
|
};
|
|
|
|
esPlugins = pkgs.buildEnv {
|
|
name = "elasticsearch-plugins";
|
|
paths = cfg.plugins;
|
|
postBuild = "${pkgs.coreutils}/bin/mkdir -p $out/plugins";
|
|
};
|
|
|
|
in
|
|
{
|
|
|
|
###### interface
|
|
|
|
options.services.elasticsearch = {
|
|
enable = mkOption {
|
|
description = "Whether to enable elasticsearch.";
|
|
default = false;
|
|
type = types.bool;
|
|
};
|
|
|
|
package = mkPackageOption pkgs "elasticsearch" { };
|
|
|
|
listenAddress = mkOption {
|
|
description = "Elasticsearch listen address.";
|
|
default = "127.0.0.1";
|
|
type = types.str;
|
|
};
|
|
|
|
port = mkOption {
|
|
description = "Elasticsearch port to listen for HTTP traffic.";
|
|
default = 9200;
|
|
type = types.port;
|
|
};
|
|
|
|
tcp_port = mkOption {
|
|
description = "Elasticsearch port for the node to node communication.";
|
|
default = 9300;
|
|
type = types.int;
|
|
};
|
|
|
|
cluster_name = mkOption {
|
|
description = "Elasticsearch name that identifies your cluster for auto-discovery.";
|
|
default = "elasticsearch";
|
|
type = types.str;
|
|
};
|
|
|
|
single_node = mkOption {
|
|
description = "Start a single-node cluster";
|
|
default = true;
|
|
type = types.bool;
|
|
};
|
|
|
|
extraConf = mkOption {
|
|
description = "Extra configuration for elasticsearch.";
|
|
default = "";
|
|
type = types.str;
|
|
example = ''
|
|
node.name: "elasticsearch"
|
|
node.master: true
|
|
node.data: false
|
|
'';
|
|
};
|
|
|
|
logging = mkOption {
|
|
description = "Elasticsearch logging configuration.";
|
|
default = ''
|
|
logger.action.name = org.elasticsearch.action
|
|
logger.action.level = info
|
|
|
|
appender.console.type = Console
|
|
appender.console.name = console
|
|
appender.console.layout.type = PatternLayout
|
|
appender.console.layout.pattern = [%d{ISO8601}][%-5p][%-25c{1.}] %marker%m%n
|
|
|
|
rootLogger.level = info
|
|
rootLogger.appenderRef.console.ref = console
|
|
'';
|
|
type = types.str;
|
|
};
|
|
|
|
dataDir = mkOption {
|
|
type = types.path;
|
|
default = "/var/lib/elasticsearch";
|
|
description = ''
|
|
Data directory for elasticsearch.
|
|
'';
|
|
};
|
|
|
|
extraCmdLineOptions = mkOption {
|
|
description = "Extra command line options for the elasticsearch launcher.";
|
|
default = [ ];
|
|
type = types.listOf types.str;
|
|
};
|
|
|
|
extraJavaOptions = mkOption {
|
|
description = "Extra command line options for Java.";
|
|
default = [ ];
|
|
type = types.listOf types.str;
|
|
example = [ "-Djava.net.preferIPv4Stack=true" ];
|
|
};
|
|
|
|
plugins = mkOption {
|
|
description = "Extra elasticsearch plugins";
|
|
default = [ ];
|
|
type = types.listOf types.package;
|
|
example = lib.literalExpression "[ pkgs.elasticsearchPlugins.discovery-ec2 ]";
|
|
};
|
|
|
|
restartIfChanged = mkOption {
|
|
type = types.bool;
|
|
description = ''
|
|
Automatically restart the service on config change.
|
|
This can be set to false to defer restarts on a server or cluster.
|
|
Please consider the security implications of inadvertently running an older version,
|
|
and the possibility of unexpected behavior caused by inconsistent versions across a cluster when disabling this option.
|
|
'';
|
|
default = true;
|
|
};
|
|
|
|
};
|
|
|
|
###### implementation
|
|
|
|
config = mkIf cfg.enable {
|
|
systemd.services.elasticsearch = {
|
|
description = "Elasticsearch Daemon";
|
|
wantedBy = [ "multi-user.target" ];
|
|
after = [ "network.target" ];
|
|
path = [ pkgs.inetutils ];
|
|
inherit (cfg) restartIfChanged;
|
|
environment = {
|
|
ES_HOME = cfg.dataDir;
|
|
ES_JAVA_OPTS = toString cfg.extraJavaOptions;
|
|
ES_PATH_CONF = configDir;
|
|
};
|
|
serviceConfig = {
|
|
ExecStart = "${cfg.package}/bin/elasticsearch ${toString cfg.extraCmdLineOptions}";
|
|
User = "elasticsearch";
|
|
PermissionsStartOnly = true;
|
|
LimitNOFILE = "1024000";
|
|
Restart = "always";
|
|
TimeoutStartSec = "infinity";
|
|
};
|
|
preStart = ''
|
|
${optionalString (!config.boot.isContainer) ''
|
|
# Only set vm.max_map_count if lower than ES required minimum
|
|
# This avoids conflict if configured via boot.kernel.sysctl
|
|
if [ `${pkgs.procps}/bin/sysctl -n vm.max_map_count` -lt 262144 ]; then
|
|
${pkgs.procps}/bin/sysctl -w vm.max_map_count=262144
|
|
fi
|
|
''}
|
|
|
|
mkdir -m 0700 -p ${cfg.dataDir}
|
|
|
|
# Install plugins
|
|
ln -sfT ${esPlugins}/plugins ${cfg.dataDir}/plugins
|
|
ln -sfT ${cfg.package}/lib ${cfg.dataDir}/lib
|
|
ln -sfT ${cfg.package}/modules ${cfg.dataDir}/modules
|
|
|
|
# elasticsearch needs to create the elasticsearch.keystore in the config directory
|
|
# so this directory needs to be writable.
|
|
mkdir -m 0700 -p ${configDir}
|
|
|
|
# Note that we copy config files from the nix store instead of symbolically linking them
|
|
# because otherwise X-Pack Security will raise the following exception:
|
|
# java.security.AccessControlException:
|
|
# access denied ("java.io.FilePermission" "/var/lib/elasticsearch/config/elasticsearch.yml" "read")
|
|
|
|
cp ${elasticsearchYml} ${configDir}/elasticsearch.yml
|
|
# Make sure the logging configuration for old elasticsearch versions is removed:
|
|
rm -f "${configDir}/logging.yml"
|
|
cp ${loggingConfigFile} ${configDir}/${loggingConfigFilename}
|
|
mkdir -p ${configDir}/scripts
|
|
cp ${cfg.package}/config/jvm.options ${configDir}/jvm.options
|
|
# redirect jvm logs to the data directory
|
|
mkdir -m 0700 -p ${cfg.dataDir}/logs
|
|
${pkgs.sd}/bin/sd 'logs/gc.log' '${cfg.dataDir}/logs/gc.log' ${configDir}/jvm.options \
|
|
|
|
if [ "$(id -u)" = 0 ]; then chown -R elasticsearch:elasticsearch ${cfg.dataDir}; fi
|
|
'';
|
|
postStart = ''
|
|
# Make sure elasticsearch is up and running before dependents
|
|
# are started
|
|
while ! ${pkgs.curl}/bin/curl -sS -f http://${cfg.listenAddress}:${toString cfg.port} 2>/dev/null; do
|
|
sleep 1
|
|
done
|
|
'';
|
|
};
|
|
|
|
environment.systemPackages = [ cfg.package ];
|
|
|
|
users = {
|
|
groups.elasticsearch.gid = config.ids.gids.elasticsearch;
|
|
users.elasticsearch = {
|
|
uid = config.ids.uids.elasticsearch;
|
|
description = "Elasticsearch daemon user";
|
|
home = cfg.dataDir;
|
|
group = "elasticsearch";
|
|
};
|
|
};
|
|
};
|
|
}
|