mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-12-25 23:23:07 +00:00
e0464e4788
In preparation for the deprecation of `stdenv.isX`. These shorthands are not conducive to cross-compilation because they hide the platforms. Darwin might get cross-compilation for which the continued usage of `stdenv.isDarwin` will get in the way One example of why this is bad and especially affects compiler packages https://www.github.com/NixOS/nixpkgs/pull/343059 There are too many files to go through manually but a treewide should get users thinking when they see a `hostPlatform.isX` in a place where it doesn't make sense. ``` fd --type f "\.nix" | xargs sd --fixed-strings "stdenv.is" "stdenv.hostPlatform.is" fd --type f "\.nix" | xargs sd --fixed-strings "stdenv'.is" "stdenv'.hostPlatform.is" fd --type f "\.nix" | xargs sd --fixed-strings "clangStdenv.is" "clangStdenv.hostPlatform.is" fd --type f "\.nix" | xargs sd --fixed-strings "gccStdenv.is" "gccStdenv.hostPlatform.is" fd --type f "\.nix" | xargs sd --fixed-strings "stdenvNoCC.is" "stdenvNoCC.hostPlatform.is" fd --type f "\.nix" | xargs sd --fixed-strings "inherit (stdenv) is" "inherit (stdenv.hostPlatform) is" fd --type f "\.nix" | xargs sd --fixed-strings "buildStdenv.is" "buildStdenv.hostPlatform.is" fd --type f "\.nix" | xargs sd --fixed-strings "effectiveStdenv.is" "effectiveStdenv.hostPlatform.is" fd --type f "\.nix" | xargs sd --fixed-strings "originalStdenv.is" "originalStdenv.hostPlatform.is" ```
96 lines
2.9 KiB
Nix
96 lines
2.9 KiB
Nix
{ config, lib, pkgs, ... }: with lib;
|
|
let
|
|
cfg = config.services.promtail;
|
|
|
|
prettyJSON = conf: pkgs.runCommandLocal "promtail-config.json" {} ''
|
|
echo '${builtins.toJSON conf}' | ${pkgs.buildPackages.jq}/bin/jq 'del(._module)' > $out
|
|
'';
|
|
|
|
allowSystemdJournal = cfg.configuration ? scrape_configs && lib.any (v: v ? journal) cfg.configuration.scrape_configs;
|
|
|
|
allowPositionsFile = !lib.hasPrefix "/var/cache/promtail" positionsFile;
|
|
positionsFile = cfg.configuration.positions.filename;
|
|
in {
|
|
options.services.promtail = with types; {
|
|
enable = mkEnableOption "the Promtail ingresser";
|
|
|
|
|
|
configuration = mkOption {
|
|
type = (pkgs.formats.json {}).type;
|
|
description = ''
|
|
Specify the configuration for Promtail in Nix.
|
|
'';
|
|
};
|
|
|
|
extraFlags = mkOption {
|
|
type = listOf str;
|
|
default = [];
|
|
example = [ "--server.http-listen-port=3101" ];
|
|
description = ''
|
|
Specify a list of additional command line flags,
|
|
which get escaped and are then passed to Loki.
|
|
'';
|
|
};
|
|
};
|
|
|
|
config = mkIf cfg.enable {
|
|
services.promtail.configuration.positions.filename = mkDefault "/var/cache/promtail/positions.yaml";
|
|
|
|
systemd.services.promtail = {
|
|
description = "Promtail log ingress";
|
|
wantedBy = [ "multi-user.target" ];
|
|
stopIfChanged = false;
|
|
|
|
preStart = ''
|
|
${lib.getExe pkgs.promtail} -config.file=${prettyJSON cfg.configuration} -check-syntax
|
|
'';
|
|
|
|
serviceConfig = {
|
|
Restart = "on-failure";
|
|
TimeoutStopSec = 10;
|
|
|
|
ExecStart = "${pkgs.promtail}/bin/promtail -config.file=${prettyJSON cfg.configuration} ${escapeShellArgs cfg.extraFlags}";
|
|
|
|
ProtectSystem = "strict";
|
|
ProtectHome = true;
|
|
PrivateTmp = true;
|
|
PrivateDevices = true;
|
|
ProtectKernelTunables = true;
|
|
ProtectControlGroups = true;
|
|
RestrictSUIDSGID = true;
|
|
PrivateMounts = true;
|
|
CacheDirectory = "promtail";
|
|
ReadWritePaths = lib.optional allowPositionsFile (builtins.dirOf positionsFile);
|
|
|
|
User = "promtail";
|
|
Group = "promtail";
|
|
|
|
CapabilityBoundingSet = "";
|
|
NoNewPrivileges = true;
|
|
|
|
ProtectKernelModules = true;
|
|
SystemCallArchitectures = "native";
|
|
ProtectKernelLogs = true;
|
|
ProtectClock = true;
|
|
|
|
LockPersonality = true;
|
|
ProtectHostname = true;
|
|
RestrictRealtime = true;
|
|
MemoryDenyWriteExecute = true;
|
|
PrivateUsers = true;
|
|
|
|
SupplementaryGroups = lib.optional (allowSystemdJournal) "systemd-journal";
|
|
} // (optionalAttrs (!pkgs.stdenv.hostPlatform.isAarch64) { # FIXME: figure out why this breaks on aarch64
|
|
SystemCallFilter = "@system-service";
|
|
});
|
|
};
|
|
|
|
users.groups.promtail = {};
|
|
users.users.promtail = {
|
|
description = "Promtail service user";
|
|
isSystemUser = true;
|
|
group = "promtail";
|
|
};
|
|
};
|
|
}
|