treewide: use new tmpfiles api
This commit is contained in:
parent
bfc3865336
commit
f5d513c573
@ -78,11 +78,15 @@ in
|
||||
else settingsFormat.generate "regreet.toml" cfg.settings;
|
||||
};
|
||||
|
||||
systemd.tmpfiles.rules = let
|
||||
group = config.users.users.${config.services.greetd.settings.default_session.user}.group;
|
||||
in [
|
||||
"d /var/log/regreet 0755 greeter ${group} - -"
|
||||
"d /var/cache/regreet 0755 greeter ${group} - -"
|
||||
];
|
||||
systemd.tmpfiles.settings."10-regreet" = let
|
||||
defaultConfig = {
|
||||
user = "greeter";
|
||||
group = config.users.users.${config.services.greetd.settings.default_session.user}.group;
|
||||
mode = "0755";
|
||||
};
|
||||
in {
|
||||
"/var/log/regreet".d = defaultConfig;
|
||||
"/var/cache/regreet".d = defaultConfig;
|
||||
};
|
||||
};
|
||||
}
|
||||
|
@ -70,9 +70,10 @@ in {
|
||||
|
||||
config = mkIf cfg.enable {
|
||||
|
||||
systemd.tmpfiles.rules = [
|
||||
"d '${cfg.dataDir}' - mopidy mopidy - -"
|
||||
];
|
||||
systemd.tmpfiles.settings."10-mopidy".${cfg.dataDir}.d = {
|
||||
user = "mopidy";
|
||||
group = "mopidy";
|
||||
};
|
||||
|
||||
systemd.services.mopidy = {
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
|
@ -143,11 +143,13 @@ in
|
||||
|
||||
environment.systemPackages = [ pkgs.mlmmj ];
|
||||
|
||||
systemd.tmpfiles.rules = [
|
||||
''d "${stateDir}" -''
|
||||
''d "${spoolDir}/${cfg.listDomain}" -''
|
||||
''Z "${spoolDir}" - "${cfg.user}" "${cfg.group}" -''
|
||||
];
|
||||
systemd.tmpfiles.settings."10-mlmmj" = {
|
||||
${stateDir}.d = { };
|
||||
"${spoolDir}/${cfg.listDomain}".d = { };
|
||||
${spoolDir}.Z = {
|
||||
inherit (cfg) user group;
|
||||
};
|
||||
};
|
||||
|
||||
systemd.services.mlmmj-maintd = {
|
||||
description = "mlmmj maintenance daemon";
|
||||
|
@ -99,7 +99,11 @@ in
|
||||
${cfg.extraConfig}
|
||||
'';
|
||||
|
||||
systemd.tmpfiles.rules = [ "d /var/cache/postfixadmin/templates_c 700 ${user} ${user}" ];
|
||||
systemd.tmpfiles.settings."10-postfixadmin"."/var/cache/postfixadmin/templates_c".d = {
|
||||
inherit user;
|
||||
group = user;
|
||||
mode = "700";
|
||||
};
|
||||
|
||||
services.nginx = {
|
||||
enable = true;
|
||||
|
@ -95,9 +95,11 @@ in {
|
||||
|
||||
services.rss2email.config.to = cfg.to;
|
||||
|
||||
systemd.tmpfiles.rules = [
|
||||
"d /var/rss2email 0700 rss2email rss2email - -"
|
||||
];
|
||||
systemd.tmpfiles.settings."10-rss2email"."/var/rss2email".d = {
|
||||
user = "rss2email";
|
||||
group = "rss2email";
|
||||
mode = "0700";
|
||||
};
|
||||
|
||||
systemd.services.rss2email = let
|
||||
conf = pkgs.writeText "rss2email.cfg" (lib.generators.toINI {} ({
|
||||
|
@ -93,7 +93,11 @@ in {
|
||||
|
||||
environment.etc."zeyple.conf".source = ini.generate "zeyple.conf" cfg.settings;
|
||||
|
||||
systemd.tmpfiles.rules = [ "f '${cfg.settings.zeyple.log_file}' 0600 ${cfg.user} ${cfg.group} - -" ];
|
||||
systemd.tmpfiles.settings."10-zeyple".${cfg.settings.zeyple.log_file}.f = {
|
||||
inherit (cfg) user group;
|
||||
mode = "0600";
|
||||
};
|
||||
|
||||
services.logrotate = mkIf cfg.rotateLogs {
|
||||
enable = true;
|
||||
settings.zeyple = {
|
||||
|
@ -152,9 +152,10 @@ in {
|
||||
};
|
||||
|
||||
config = mkIf cfg.enable {
|
||||
systemd.tmpfiles.rules = [
|
||||
"d '${cfg.dataDir}' 0700 etcd - - -"
|
||||
];
|
||||
systemd.tmpfiles.settings."10-etcd".${cfg.dataDir}.d = {
|
||||
user = "etcd";
|
||||
mode = "0700";
|
||||
};
|
||||
|
||||
systemd.services.etcd = {
|
||||
description = "etcd key-value store";
|
||||
|
@ -45,9 +45,10 @@ in
|
||||
};
|
||||
|
||||
config = mkIf cfg.enable {
|
||||
systemd.tmpfiles.rules = [
|
||||
"d '${cfg.dataDir}' 0700 ${cfg.user} ${cfg.group} - -"
|
||||
];
|
||||
systemd.tmpfiles.settings."10-lidarr".${cfg.dataDir}.d = {
|
||||
inherit (cfg) user group;
|
||||
mode = "0700";
|
||||
};
|
||||
|
||||
systemd.services.lidarr = {
|
||||
description = "Lidarr";
|
||||
|
@ -40,9 +40,10 @@ in
|
||||
};
|
||||
|
||||
config = mkIf cfg.enable {
|
||||
systemd.tmpfiles.rules = [
|
||||
"d '${cfg.dataDir}' 0700 ${cfg.user} ${cfg.group} - -"
|
||||
];
|
||||
systemd.tmpfiles.settings."10-radarr".${cfg.dataDir}.d = {
|
||||
inherit (cfg) user group;
|
||||
mode = "0700";
|
||||
};
|
||||
|
||||
systemd.services.radarr = {
|
||||
description = "Radarr";
|
||||
|
@ -45,9 +45,10 @@ in
|
||||
};
|
||||
|
||||
config = mkIf cfg.enable {
|
||||
systemd.tmpfiles.rules = [
|
||||
"d '${cfg.dataDir}' 0700 ${cfg.user} ${cfg.group} - -"
|
||||
];
|
||||
systemd.tmpfiles.settings."10-readarr".${cfg.dataDir}.d = {
|
||||
inherit (cfg) user group;
|
||||
mode = "0700";
|
||||
};
|
||||
|
||||
systemd.services.readarr = {
|
||||
description = "Readarr";
|
||||
|
@ -79,9 +79,10 @@ in
|
||||
};
|
||||
|
||||
config = mkIf cfg.enable {
|
||||
systemd.tmpfiles.rules = [
|
||||
"d '${cfg.logDir}' - alerta alerta - -"
|
||||
];
|
||||
systemd.tmpfiles.settings."10-alerta".${cfg.logDir}.d = {
|
||||
user = "alerta";
|
||||
group = "alerta";
|
||||
};
|
||||
|
||||
systemd.services.alerta = {
|
||||
description = "Alerta Monitoring System";
|
||||
|
@ -160,9 +160,9 @@ in
|
||||
config = mkIf cfg.enable {
|
||||
environment.systemPackages = [ pkgs.kapacitor ];
|
||||
|
||||
systemd.tmpfiles.rules = [
|
||||
"d '${cfg.dataDir}' - ${cfg.user} ${cfg.group} - -"
|
||||
];
|
||||
systemd.tmpfiles.settings."10-kapacitor".${cfg.dataDir}.d = {
|
||||
inherit (cfg) user group;
|
||||
};
|
||||
|
||||
systemd.services.kapacitor = {
|
||||
description = "Kapacitor Real-Time Stream Processing Engine";
|
||||
|
@ -374,7 +374,11 @@ in
|
||||
};
|
||||
|
||||
# munin_stats plugin breaks as of 2.0.33 when this doesn't exist
|
||||
systemd.tmpfiles.rules = [ "d /run/munin 0755 munin munin -" ];
|
||||
systemd.tmpfiles.settings."10-munin"."/run/munin".d = {
|
||||
mode = "0755";
|
||||
user = "munin";
|
||||
group = "munin";
|
||||
};
|
||||
|
||||
}) (mkIf cronCfg.enable {
|
||||
|
||||
@ -399,11 +403,17 @@ in
|
||||
};
|
||||
};
|
||||
|
||||
systemd.tmpfiles.rules = [
|
||||
"d /run/munin 0755 munin munin -"
|
||||
"d /var/log/munin 0755 munin munin -"
|
||||
"d /var/www/munin 0755 munin munin -"
|
||||
"d /var/lib/munin 0755 munin munin -"
|
||||
];
|
||||
systemd.tmpfiles.settings."20-munin" = let
|
||||
defaultConfig = {
|
||||
mode = "0755";
|
||||
user = "munin";
|
||||
group = "munin";
|
||||
};
|
||||
in {
|
||||
"/run/munin".d = defaultConfig;
|
||||
"/var/log/munin".d = defaultConfig;
|
||||
"/var/www/munin".d = defaultConfig;
|
||||
"/var/lib/munin".d = defaultConfig;
|
||||
};
|
||||
})];
|
||||
}
|
||||
|
@ -90,8 +90,10 @@ in
|
||||
};
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
};
|
||||
systemd.tmpfiles.rules = [
|
||||
"d ${dirname (cfg.flags.pidfile)} 0755 root root -"
|
||||
];
|
||||
systemd.tmpfiles.settings."10-osquery".${dirname (cfg.flags.pidfile)}.d = {
|
||||
user = "root";
|
||||
group = "root";
|
||||
mode = "0755";
|
||||
};
|
||||
};
|
||||
}
|
||||
|
@ -59,9 +59,10 @@ in {
|
||||
group = "riemanndash";
|
||||
};
|
||||
|
||||
systemd.tmpfiles.rules = [
|
||||
"d '${cfg.dataDir}' - riemanndash riemanndash - -"
|
||||
];
|
||||
systemd.tmpfiles.settings."10-riemanndash".${cfg.dataDir}.d = {
|
||||
user = "riemanndash";
|
||||
group = "riemanndash";
|
||||
};
|
||||
|
||||
systemd.services.riemann-dash = {
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
|
@ -56,8 +56,10 @@ in
|
||||
};
|
||||
};
|
||||
|
||||
systemd.tmpfiles.rules = [
|
||||
"d ${cfg.cacheDir} 0700 root root - -"
|
||||
];
|
||||
systemd.tmpfiles.settings."10-cachefilesd".${cfg.cacheDir}.d = {
|
||||
user = "root";
|
||||
group = "root";
|
||||
mode = "0700";
|
||||
};
|
||||
};
|
||||
}
|
||||
|
@ -398,12 +398,18 @@ in
|
||||
in
|
||||
mkMerge targets;
|
||||
|
||||
systemd.tmpfiles.rules = [
|
||||
"d /etc/ceph - ceph ceph - -"
|
||||
"d /run/ceph 0770 ceph ceph -"
|
||||
"d /var/lib/ceph - ceph ceph - -"]
|
||||
++ optionals cfg.mgr.enable [ "d /var/lib/ceph/mgr - ceph ceph - -"]
|
||||
++ optionals cfg.mon.enable [ "d /var/lib/ceph/mon - ceph ceph - -"]
|
||||
++ optionals cfg.osd.enable [ "d /var/lib/ceph/osd - ceph ceph - -"];
|
||||
systemd.tmpfiles.settings."10-ceph" = let
|
||||
defaultConfig = {
|
||||
user = "ceph";
|
||||
group = "ceph";
|
||||
};
|
||||
in {
|
||||
"/etc/ceph".d = defaultConfig;
|
||||
"/run/ceph".d = defaultConfig // { mode = "0770"; };
|
||||
"/var/lib/ceph".d = defaultConfig;
|
||||
"/var/lib/ceph/mgr".d = mkIf (cfg.mgr.enable) defaultConfig;
|
||||
"/var/lib/ceph/mon".d = mkIf (cfg.mon.enable) defaultConfig;
|
||||
"/var/lib/ceph/osd".d = mkIf (cfg.osd.enable) defaultConfig;
|
||||
};
|
||||
};
|
||||
}
|
||||
|
@ -92,7 +92,12 @@ in {
|
||||
(mkIf cfg.enableRedirector {
|
||||
security.wrappers."keybase-redirector".source = "${pkgs.kbfs}/bin/redirector";
|
||||
|
||||
systemd.tmpfiles.rules = [ "d /keybase 0755 root root 0" ];
|
||||
systemd.tmpfiles.settings."10-kbfs"."/keybase".d = {
|
||||
user = "root";
|
||||
group = "root";
|
||||
mode = "0755";
|
||||
age = "0";
|
||||
};
|
||||
|
||||
# Upstream: https://github.com/keybase/client/blob/master/packaging/linux/systemd/keybase-redirector.service
|
||||
systemd.user.services.keybase-redirector = {
|
||||
|
@ -307,12 +307,13 @@ in
|
||||
ipfs.gid = config.ids.gids.ipfs;
|
||||
};
|
||||
|
||||
systemd.tmpfiles.rules = [
|
||||
"d '${cfg.dataDir}' - ${cfg.user} ${cfg.group} - -"
|
||||
] ++ optionals cfg.autoMount [
|
||||
"d '${cfg.settings.Mounts.IPFS}' - ${cfg.user} ${cfg.group} - -"
|
||||
"d '${cfg.settings.Mounts.IPNS}' - ${cfg.user} ${cfg.group} - -"
|
||||
];
|
||||
systemd.tmpfiles.settings."10-kubo" = let
|
||||
defaultConfig = { inherit (cfg) user group; };
|
||||
in {
|
||||
${cfg.dataDir}.d = defaultConfig;
|
||||
${cfg.settings.Mounts.IPFS}.d = mkIf (cfg.autoMount) defaultConfig;
|
||||
${cfg.settings.Mounts.IPNS}.d = mkIf (cfg.autoMount) defaultConfig;
|
||||
};
|
||||
|
||||
# The hardened systemd unit breaks the fuse-mount function according to documentation in the unit file itself
|
||||
systemd.packages = if cfg.autoMount
|
||||
|
@ -81,9 +81,9 @@ in
|
||||
gid = config.ids.gids.ircd;
|
||||
};
|
||||
|
||||
systemd.tmpfiles.rules = [
|
||||
"d ${cfg.statedir} - ${cfg.user} ${cfg.group} - -"
|
||||
];
|
||||
systemd.tmpfiles.settings."10-charybdis".${cfg.statedir}.d = {
|
||||
inherit (cfg) user group;
|
||||
};
|
||||
|
||||
environment.etc."charybdis/ircd.conf".source = configFile;
|
||||
|
||||
|
@ -395,11 +395,11 @@ in
|
||||
};
|
||||
};
|
||||
|
||||
systemd.tmpfiles.rules = [
|
||||
"d /var/log/jitsi/jibri 755 jibri jibri"
|
||||
];
|
||||
|
||||
|
||||
systemd.tmpfiles.settings."10-jibri"."/var/log/jitsi/jibri".d = {
|
||||
user = "jibri";
|
||||
group = "jibri";
|
||||
mode = "755";
|
||||
};
|
||||
|
||||
# Configure Chromium to not show the "Chrome is being controlled by automatic test software" message.
|
||||
environment.etc."chromium/policies/managed/managed_policies.json".text = builtins.toJSON { CommandLineFlagSecurityWarningsEnabled = false; };
|
||||
|
@ -191,17 +191,25 @@ in {
|
||||
# Provide a default set of `extraPackages`.
|
||||
services.deluge.extraPackages = with pkgs; [ unzip gnutar xz bzip2 ];
|
||||
|
||||
systemd.tmpfiles.rules = [
|
||||
"d '${cfg.dataDir}' 0770 ${cfg.user} ${cfg.group}"
|
||||
"d '${cfg.dataDir}/.config' 0770 ${cfg.user} ${cfg.group}"
|
||||
"d '${cfg.dataDir}/.config/deluge' 0770 ${cfg.user} ${cfg.group}"
|
||||
]
|
||||
++ optional (cfg.config ? download_location)
|
||||
"d '${cfg.config.download_location}' 0770 ${cfg.user} ${cfg.group}"
|
||||
++ optional (cfg.config ? torrentfiles_location)
|
||||
"d '${cfg.config.torrentfiles_location}' 0770 ${cfg.user} ${cfg.group}"
|
||||
++ optional (cfg.config ? move_completed_path)
|
||||
"d '${cfg.config.move_completed_path}' 0770 ${cfg.user} ${cfg.group}";
|
||||
systemd.tmpfiles.settings."10-deluged" = let
|
||||
defaultConfig = {
|
||||
inherit (cfg) user group;
|
||||
mode = "0770";
|
||||
};
|
||||
in {
|
||||
"${cfg.dataDir}".d = defaultConfig;
|
||||
"${cfg.dataDir}/.config".d = defaultConfig;
|
||||
"${cfg.dataDir}/.config/deluge".d = defaultConfig;
|
||||
}
|
||||
// optionalAttrs (cfg.config ? download_location) {
|
||||
${cfg.config.download_location}.d = defaultConfig;
|
||||
}
|
||||
// optionalAttrs (cfg.config ? torrentfiles_location) {
|
||||
${cfg.config.torrentfiles_location}.d = defaultConfig;
|
||||
}
|
||||
// optionalAttrs (cfg.config ? move_completed_path) {
|
||||
${cfg.config.move_completed_path}.d = defaultConfig;
|
||||
};
|
||||
|
||||
systemd.services.deluged = {
|
||||
after = [ "network.target" ];
|
||||
|
@ -309,17 +309,25 @@ in
|
||||
(lib.mkIf cfg.usePreconfiguredStreaming streamingConfig)
|
||||
];
|
||||
|
||||
systemd.tmpfiles.rules = [
|
||||
"d '/var/lib/epgstation/key' - ${username} ${groupname} - -"
|
||||
"d '/var/lib/epgstation/streamfiles' - ${username} ${groupname} - -"
|
||||
"d '/var/lib/epgstation/drop' - ${username} ${groupname} - -"
|
||||
"d '/var/lib/epgstation/recorded' - ${username} ${groupname} - -"
|
||||
"d '/var/lib/epgstation/thumbnail' - ${username} ${groupname} - -"
|
||||
"d '/var/lib/epgstation/db/subscribers' - ${username} ${groupname} - -"
|
||||
"d '/var/lib/epgstation/db/migrations/mysql' - ${username} ${groupname} - -"
|
||||
"d '/var/lib/epgstation/db/migrations/postgres' - ${username} ${groupname} - -"
|
||||
"d '/var/lib/epgstation/db/migrations/sqlite' - ${username} ${groupname} - -"
|
||||
];
|
||||
systemd.tmpfiles.settings."10-epgstation" =
|
||||
lib.listToAttrs
|
||||
(map (dir: lib.nameValuePair dir {
|
||||
d = {
|
||||
user = username;
|
||||
group = groupname;
|
||||
};
|
||||
})
|
||||
[
|
||||
"/var/lib/epgstation/key"
|
||||
"/var/lib/epgstation/streamfiles"
|
||||
"/var/lib/epgstation/drop"
|
||||
"/var/lib/epgstation/recorded"
|
||||
"/var/lib/epgstation/thumbnail"
|
||||
"/var/lib/epgstation/db/subscribers"
|
||||
"/var/lib/epgstation/db/migrations/mysql"
|
||||
"/var/lib/epgstation/db/migrations/postgres"
|
||||
"/var/lib/epgstation/db/migrations/sqlite"
|
||||
]);
|
||||
|
||||
systemd.services.epgstation = {
|
||||
inherit description;
|
||||
|
@ -165,9 +165,10 @@ in
|
||||
port = mkIf (cfg.port != null) cfg.port;
|
||||
};
|
||||
|
||||
systemd.tmpfiles.rules = [
|
||||
"d '/etc/mirakurun' - ${username} ${groupname} - -"
|
||||
];
|
||||
systemd.tmpfiles.settings."10-mirakurun"."/etc/mirakurun".d = {
|
||||
user = username;
|
||||
group = groupname;
|
||||
};
|
||||
|
||||
systemd.services.mirakurun = {
|
||||
description = mirakurun.meta.description;
|
||||
|
@ -412,20 +412,25 @@ in {
|
||||
'';
|
||||
};
|
||||
|
||||
systemd.tmpfiles.rules = [
|
||||
"d ${cfg.dataDir} 0710 ${user} ${group} - -"
|
||||
"d ${cfg.dataDir}/public 0750 ${user} ${group} - -"
|
||||
"d ${cfg.dataDir}/public/uploads 0750 ${user} ${group} - -"
|
||||
"d ${cfg.dataDir}/storage 0700 ${user} ${group} - -"
|
||||
"d ${cfg.dataDir}/storage/app 0700 ${user} ${group} - -"
|
||||
"d ${cfg.dataDir}/storage/fonts 0700 ${user} ${group} - -"
|
||||
"d ${cfg.dataDir}/storage/framework 0700 ${user} ${group} - -"
|
||||
"d ${cfg.dataDir}/storage/framework/cache 0700 ${user} ${group} - -"
|
||||
"d ${cfg.dataDir}/storage/framework/sessions 0700 ${user} ${group} - -"
|
||||
"d ${cfg.dataDir}/storage/framework/views 0700 ${user} ${group} - -"
|
||||
"d ${cfg.dataDir}/storage/logs 0700 ${user} ${group} - -"
|
||||
"d ${cfg.dataDir}/storage/uploads 0700 ${user} ${group} - -"
|
||||
];
|
||||
systemd.tmpfiles.settings."10-bookstack" = let
|
||||
defaultConfig = {
|
||||
inherit user group;
|
||||
mode = "0700";
|
||||
};
|
||||
in {
|
||||
"${cfg.dataDir}".d = defaultConfig // { mode = "0710"; };
|
||||
"${cfg.dataDir}/public".d = defaultConfig // { mode = "0750"; };
|
||||
"${cfg.dataDir}/public/uploads".d = defaultConfig // { mode = "0750"; };
|
||||
"${cfg.dataDir}/storage".d = defaultConfig;
|
||||
"${cfg.dataDir}/storage/app".d = defaultConfig;
|
||||
"${cfg.dataDir}/storage/fonts".d = defaultConfig;
|
||||
"${cfg.dataDir}/storage/framework".d = defaultConfig;
|
||||
"${cfg.dataDir}/storage/framework/cache".d = defaultConfig;
|
||||
"${cfg.dataDir}/storage/framework/sessions".d = defaultConfig;
|
||||
"${cfg.dataDir}/storage/framework/views".d = defaultConfig;
|
||||
"${cfg.dataDir}/storage/logs".d = defaultConfig;
|
||||
"${cfg.dataDir}/storage/uploads".d = defaultConfig;
|
||||
};
|
||||
|
||||
users = {
|
||||
users = mkIf (user == "bookstack") {
|
||||
|
@ -228,9 +228,10 @@ in
|
||||
};
|
||||
users.groups."${cfg.user}" = { };
|
||||
|
||||
systemd.tmpfiles.rules = [
|
||||
"d '${cfg.dataDir}' - ${cfg.user} ${config.users.users.${cfg.user}.group} - -"
|
||||
];
|
||||
systemd.tmpfiles.settings."10-freshrss".${cfg.dataDir}.d = {
|
||||
inherit (cfg) user;
|
||||
group = config.users.users.${cfg.user}.group;
|
||||
};
|
||||
|
||||
systemd.services.freshrss-config =
|
||||
let
|
||||
|
@ -277,9 +277,7 @@ in
|
||||
|
||||
# The systemd service will fail to execute the preStart hook
|
||||
# if the WorkingDirectory does not exist
|
||||
systemd.tmpfiles.rules = [
|
||||
''d "${cfg.statePath}" -''
|
||||
];
|
||||
systemd.tmpfiles.settings."10-mattermost".${cfg.statePath}.d = { };
|
||||
|
||||
systemd.services.mattermost = {
|
||||
description = "Mattermost chat service";
|
||||
|
@ -255,9 +255,10 @@ in
|
||||
} ];
|
||||
};
|
||||
|
||||
systemd.tmpfiles.rules = [
|
||||
"d '${stateDir}' 0750 ${user} ${group} - -"
|
||||
];
|
||||
systemd.tmpfiles.settings."10-moodle".${stateDir}.d = {
|
||||
inherit user group;
|
||||
mode = "0750";
|
||||
};
|
||||
|
||||
systemd.services.moodle-init = {
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
|
@ -163,10 +163,15 @@ in {
|
||||
Please do not disable HTTPS mode in production. In this mode, access to the nifi is opened without authentication.
|
||||
'';
|
||||
|
||||
systemd.tmpfiles.rules = [
|
||||
"d '/var/lib/nifi/conf' 0750 ${cfg.user} ${cfg.group}"
|
||||
"L+ '/var/lib/nifi/lib' - - - - ${cfg.package}/lib"
|
||||
];
|
||||
systemd.tmpfiles.settings."10-nifi" = {
|
||||
"/var/lib/nifi/conf".d = {
|
||||
inherit (cfg) user group;
|
||||
mode = "0750";
|
||||
};
|
||||
"/var/lib/nifi/lib"."L+" = {
|
||||
argument = "${cfg.package}/lib";
|
||||
};
|
||||
};
|
||||
|
||||
|
||||
systemd.services.nifi = {
|
||||
|
@ -334,8 +334,10 @@ in {
|
||||
optionalAttrs (cfg.group == "writefreely") { writefreely = { }; };
|
||||
};
|
||||
|
||||
systemd.tmpfiles.rules =
|
||||
[ "d '${cfg.stateDir}' 0750 ${cfg.user} ${cfg.group} - -" ];
|
||||
systemd.tmpfiles.settings."10-writefreely".${cfg.stateDir}.d = {
|
||||
inherit (cfg) user group;
|
||||
mode = "0750";
|
||||
};
|
||||
|
||||
systemd.services.writefreely = {
|
||||
after = [ "network.target" ]
|
||||
|
Loading…
Reference in New Issue
Block a user