2014-04-14 18:26:48 +04:00
|
|
|
|
{ config, lib, pkgs, utils, ... }:
|
2012-06-02 04:15:07 +04:00
|
|
|
|
|
2013-01-01 17:42:43 +04:00
|
|
|
|
with utils;
|
2014-05-05 23:52:33 +04:00
|
|
|
|
with lib;
|
2014-04-14 18:26:48 +04:00
|
|
|
|
with import ./systemd-unit-options.nix { inherit config lib; };
|
2015-04-20 12:31:17 +03:00
|
|
|
|
with import ./systemd-lib.nix { inherit config lib pkgs; };
|
2012-06-02 04:15:07 +04:00
|
|
|
|
|
|
|
|
|
let
|
|
|
|
|
|
2013-01-16 15:33:18 +04:00
|
|
|
|
cfg = config.systemd;
|
2012-06-18 07:31:21 +04:00
|
|
|
|
|
2013-01-16 16:17:57 +04:00
|
|
|
|
systemd = cfg.package;
|
2012-06-02 04:15:07 +04:00
|
|
|
|
|
2014-04-18 02:38:40 +04:00
|
|
|
|
upstreamSystemUnits =
|
2012-06-15 02:44:56 +04:00
|
|
|
|
[ # Targets.
|
2012-06-02 04:15:07 +04:00
|
|
|
|
"basic.target"
|
2013-01-08 20:26:51 +04:00
|
|
|
|
"sysinit.target"
|
2012-06-02 04:15:07 +04:00
|
|
|
|
"sockets.target"
|
2012-06-15 02:44:56 +04:00
|
|
|
|
"graphical.target"
|
|
|
|
|
"multi-user.target"
|
|
|
|
|
"network.target"
|
2014-12-02 04:19:06 +03:00
|
|
|
|
"network-pre.target"
|
2013-07-16 13:55:12 +04:00
|
|
|
|
"network-online.target"
|
2012-06-15 02:44:56 +04:00
|
|
|
|
"nss-lookup.target"
|
|
|
|
|
"nss-user-lookup.target"
|
|
|
|
|
"time-sync.target"
|
2012-08-11 02:56:12 +04:00
|
|
|
|
#"cryptsetup.target"
|
2012-08-15 02:14:48 +04:00
|
|
|
|
"sigpwr.target"
|
2013-03-27 16:58:12 +04:00
|
|
|
|
"timers.target"
|
|
|
|
|
"paths.target"
|
2014-04-16 02:59:26 +04:00
|
|
|
|
"rpcbind.target"
|
2012-06-15 02:44:56 +04:00
|
|
|
|
|
2013-01-22 00:01:48 +04:00
|
|
|
|
# Rescue mode.
|
2013-01-08 21:24:06 +04:00
|
|
|
|
"rescue.target"
|
|
|
|
|
"rescue.service"
|
|
|
|
|
|
2012-06-15 21:09:22 +04:00
|
|
|
|
# Udev.
|
2012-07-17 01:47:11 +04:00
|
|
|
|
"systemd-udevd-control.socket"
|
|
|
|
|
"systemd-udevd-kernel.socket"
|
2014-04-17 20:52:31 +04:00
|
|
|
|
"systemd-udevd.service"
|
2012-06-15 21:09:22 +04:00
|
|
|
|
"systemd-udev-settle.service"
|
|
|
|
|
"systemd-udev-trigger.service"
|
|
|
|
|
|
2014-04-17 20:52:31 +04:00
|
|
|
|
# Consoles.
|
|
|
|
|
"getty.target"
|
|
|
|
|
"getty@.service"
|
|
|
|
|
"serial-getty@.service"
|
|
|
|
|
"container-getty@.service"
|
|
|
|
|
"systemd-vconsole-setup.service"
|
|
|
|
|
|
2012-08-15 02:14:48 +04:00
|
|
|
|
# Hardware (started by udev when a relevant device is plugged in).
|
|
|
|
|
"sound.target"
|
|
|
|
|
"bluetooth.target"
|
|
|
|
|
"printer.target"
|
|
|
|
|
"smartcard.target"
|
|
|
|
|
|
2012-06-15 02:44:56 +04:00
|
|
|
|
# Login stuff.
|
|
|
|
|
"systemd-logind.service"
|
|
|
|
|
"autovt@.service"
|
2012-10-18 19:54:07 +04:00
|
|
|
|
#"systemd-vconsole-setup.service"
|
2012-06-15 02:44:56 +04:00
|
|
|
|
"systemd-user-sessions.service"
|
2012-06-15 21:09:22 +04:00
|
|
|
|
"dbus-org.freedesktop.login1.service"
|
2014-04-16 12:48:14 +04:00
|
|
|
|
"dbus-org.freedesktop.machine1.service"
|
2012-06-15 22:51:48 +04:00
|
|
|
|
"user@.service"
|
2012-06-15 02:44:56 +04:00
|
|
|
|
|
|
|
|
|
# Journal.
|
|
|
|
|
"systemd-journald.socket"
|
|
|
|
|
"systemd-journald.service"
|
2012-07-20 20:02:42 +04:00
|
|
|
|
"systemd-journal-flush.service"
|
2014-04-17 21:05:29 +04:00
|
|
|
|
"systemd-journal-gatewayd.socket"
|
|
|
|
|
"systemd-journal-gatewayd.service"
|
2014-08-24 01:28:03 +04:00
|
|
|
|
"systemd-journald-dev-log.socket"
|
2012-07-17 01:47:11 +04:00
|
|
|
|
"syslog.socket"
|
2012-06-02 04:15:07 +04:00
|
|
|
|
|
2012-06-15 02:44:56 +04:00
|
|
|
|
# SysV init compatibility.
|
|
|
|
|
"systemd-initctl.socket"
|
|
|
|
|
"systemd-initctl.service"
|
|
|
|
|
|
2012-08-07 00:52:08 +04:00
|
|
|
|
# Kernel module loading.
|
2014-04-17 20:52:31 +04:00
|
|
|
|
"systemd-modules-load.service"
|
|
|
|
|
"kmod-static-nodes.service"
|
2012-08-07 00:52:08 +04:00
|
|
|
|
|
2012-06-02 04:15:07 +04:00
|
|
|
|
# Filesystems.
|
2012-07-17 01:47:11 +04:00
|
|
|
|
"systemd-fsck@.service"
|
|
|
|
|
"systemd-fsck-root.service"
|
2012-06-15 02:44:56 +04:00
|
|
|
|
"systemd-remount-fs.service"
|
2012-06-02 04:15:07 +04:00
|
|
|
|
"local-fs.target"
|
|
|
|
|
"local-fs-pre.target"
|
|
|
|
|
"remote-fs.target"
|
|
|
|
|
"remote-fs-pre.target"
|
|
|
|
|
"swap.target"
|
2012-06-15 02:44:56 +04:00
|
|
|
|
"dev-hugepages.mount"
|
2012-06-02 04:15:07 +04:00
|
|
|
|
"dev-mqueue.mount"
|
2014-04-16 02:59:26 +04:00
|
|
|
|
"proc-sys-fs-binfmt_misc.mount"
|
2014-04-28 11:13:57 +04:00
|
|
|
|
"sys-fs-fuse-connections.mount"
|
|
|
|
|
"sys-kernel-config.mount"
|
2012-06-15 02:44:56 +04:00
|
|
|
|
"sys-kernel-debug.mount"
|
|
|
|
|
|
2014-04-16 02:59:26 +04:00
|
|
|
|
# Maintaining state across reboots.
|
|
|
|
|
"systemd-random-seed.service"
|
2014-04-18 21:37:15 +04:00
|
|
|
|
"systemd-backlight@.service"
|
|
|
|
|
"systemd-rfkill@.service"
|
2014-04-16 02:59:26 +04:00
|
|
|
|
|
2012-06-15 02:44:56 +04:00
|
|
|
|
# Hibernate / suspend.
|
|
|
|
|
"hibernate.target"
|
|
|
|
|
"suspend.target"
|
|
|
|
|
"sleep.target"
|
2013-03-27 16:58:12 +04:00
|
|
|
|
"hybrid-sleep.target"
|
2012-07-20 23:40:50 +04:00
|
|
|
|
"systemd-hibernate.service"
|
|
|
|
|
"systemd-suspend.service"
|
2013-03-27 16:58:12 +04:00
|
|
|
|
"systemd-hybrid-sleep.service"
|
2012-07-20 23:40:50 +04:00
|
|
|
|
"systemd-shutdownd.socket"
|
|
|
|
|
"systemd-shutdownd.service"
|
2012-06-02 04:15:07 +04:00
|
|
|
|
|
|
|
|
|
# Reboot stuff.
|
|
|
|
|
"reboot.target"
|
2012-07-17 01:47:11 +04:00
|
|
|
|
"systemd-reboot.service"
|
2012-06-02 04:15:07 +04:00
|
|
|
|
"poweroff.target"
|
2012-07-17 01:47:11 +04:00
|
|
|
|
"systemd-poweroff.service"
|
2012-06-02 04:15:07 +04:00
|
|
|
|
"halt.target"
|
2012-07-17 01:47:11 +04:00
|
|
|
|
"systemd-halt.service"
|
2012-06-02 04:15:07 +04:00
|
|
|
|
"ctrl-alt-del.target"
|
|
|
|
|
"shutdown.target"
|
|
|
|
|
"umount.target"
|
|
|
|
|
"final.target"
|
2012-08-15 02:14:48 +04:00
|
|
|
|
"kexec.target"
|
2013-09-16 19:15:42 +04:00
|
|
|
|
"systemd-kexec.service"
|
2014-04-16 02:59:26 +04:00
|
|
|
|
"systemd-update-utmp.service"
|
2012-06-15 02:44:56 +04:00
|
|
|
|
|
2012-06-20 01:02:54 +04:00
|
|
|
|
# Password entry.
|
|
|
|
|
"systemd-ask-password-console.path"
|
|
|
|
|
"systemd-ask-password-console.service"
|
|
|
|
|
"systemd-ask-password-wall.path"
|
|
|
|
|
"systemd-ask-password-wall.service"
|
2014-04-16 02:59:26 +04:00
|
|
|
|
|
|
|
|
|
# Slices / containers.
|
|
|
|
|
"slices.target"
|
|
|
|
|
"-.slice"
|
|
|
|
|
"system.slice"
|
|
|
|
|
"user.slice"
|
|
|
|
|
"machine.slice"
|
|
|
|
|
"systemd-machined.service"
|
2014-04-17 15:23:06 +04:00
|
|
|
|
|
|
|
|
|
# Temporary file creation / cleanup.
|
|
|
|
|
"systemd-tmpfiles-clean.service"
|
2014-04-17 18:10:48 +04:00
|
|
|
|
"systemd-tmpfiles-clean.timer"
|
2014-04-17 15:23:06 +04:00
|
|
|
|
"systemd-tmpfiles-setup.service"
|
|
|
|
|
"systemd-tmpfiles-setup-dev.service"
|
2014-04-17 20:52:31 +04:00
|
|
|
|
|
|
|
|
|
# Misc.
|
|
|
|
|
"systemd-sysctl.service"
|
2013-01-22 00:01:48 +04:00
|
|
|
|
]
|
|
|
|
|
|
2014-07-25 22:05:57 +04:00
|
|
|
|
++ cfg.additionalUpstreamSystemUnits;
|
2012-06-02 04:15:07 +04:00
|
|
|
|
|
2014-04-18 02:38:40 +04:00
|
|
|
|
upstreamSystemWants =
|
2013-03-27 16:58:12 +04:00
|
|
|
|
[ #"basic.target.wants"
|
2012-06-15 02:44:56 +04:00
|
|
|
|
"sysinit.target.wants"
|
|
|
|
|
"sockets.target.wants"
|
|
|
|
|
"local-fs.target.wants"
|
|
|
|
|
"multi-user.target.wants"
|
2013-03-27 16:58:12 +04:00
|
|
|
|
"timers.target.wants"
|
2012-06-15 02:44:56 +04:00
|
|
|
|
];
|
|
|
|
|
|
2014-04-18 02:38:40 +04:00
|
|
|
|
upstreamUserUnits =
|
|
|
|
|
[ "basic.target"
|
|
|
|
|
"default.target"
|
|
|
|
|
"exit.target"
|
|
|
|
|
"paths.target"
|
|
|
|
|
"shutdown.target"
|
|
|
|
|
"sockets.target"
|
|
|
|
|
"systemd-exit.service"
|
|
|
|
|
"timers.target"
|
|
|
|
|
];
|
|
|
|
|
|
2012-10-16 00:01:30 +04:00
|
|
|
|
makeJobScript = name: text:
|
2014-06-09 23:41:07 +04:00
|
|
|
|
let x = pkgs.writeTextFile { name = "unit-script"; executable = true; destination = "/bin/${shellEscape name}"; inherit text; };
|
|
|
|
|
in "${x}/bin/${shellEscape name}";
|
2012-07-20 01:41:42 +04:00
|
|
|
|
|
2012-10-09 23:14:15 +04:00
|
|
|
|
unitConfig = { name, config, ... }: {
|
|
|
|
|
config = {
|
|
|
|
|
unitConfig =
|
2014-03-12 21:35:50 +04:00
|
|
|
|
optionalAttrs (config.requires != [])
|
|
|
|
|
{ Requires = toString config.requires; }
|
|
|
|
|
// optionalAttrs (config.wants != [])
|
|
|
|
|
{ Wants = toString config.wants; }
|
|
|
|
|
// optionalAttrs (config.after != [])
|
|
|
|
|
{ After = toString config.after; }
|
|
|
|
|
// optionalAttrs (config.before != [])
|
|
|
|
|
{ Before = toString config.before; }
|
|
|
|
|
// optionalAttrs (config.bindsTo != [])
|
|
|
|
|
{ BindsTo = toString config.bindsTo; }
|
|
|
|
|
// optionalAttrs (config.partOf != [])
|
|
|
|
|
{ PartOf = toString config.partOf; }
|
|
|
|
|
// optionalAttrs (config.conflicts != [])
|
|
|
|
|
{ Conflicts = toString config.conflicts; }
|
2014-11-20 00:11:30 +03:00
|
|
|
|
// optionalAttrs (config.requisite != [])
|
|
|
|
|
{ Requisite = toString config.requisite; }
|
2014-03-12 21:35:50 +04:00
|
|
|
|
// optionalAttrs (config.restartTriggers != [])
|
|
|
|
|
{ X-Restart-Triggers = toString config.restartTriggers; }
|
|
|
|
|
// optionalAttrs (config.description != "") {
|
2012-10-09 23:14:15 +04:00
|
|
|
|
Description = config.description;
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
|
2012-08-06 19:45:59 +04:00
|
|
|
|
serviceConfig = { name, config, ... }: {
|
2013-11-18 18:45:24 +04:00
|
|
|
|
config = mkMerge
|
2014-04-17 20:52:31 +04:00
|
|
|
|
[ { # Default path for systemd services. Should be quite minimal.
|
2013-11-18 18:45:24 +04:00
|
|
|
|
path =
|
|
|
|
|
[ pkgs.coreutils
|
|
|
|
|
pkgs.findutils
|
|
|
|
|
pkgs.gnugrep
|
|
|
|
|
pkgs.gnused
|
|
|
|
|
systemd
|
|
|
|
|
];
|
|
|
|
|
environment.PATH = config.path;
|
2014-04-17 20:52:31 +04:00
|
|
|
|
}
|
2013-11-18 18:45:24 +04:00
|
|
|
|
(mkIf (config.preStart != "")
|
|
|
|
|
{ serviceConfig.ExecStartPre = makeJobScript "${name}-pre-start" ''
|
|
|
|
|
#! ${pkgs.stdenv.shell} -e
|
|
|
|
|
${config.preStart}
|
|
|
|
|
'';
|
|
|
|
|
})
|
|
|
|
|
(mkIf (config.script != "")
|
|
|
|
|
{ serviceConfig.ExecStart = makeJobScript "${name}-start" ''
|
|
|
|
|
#! ${pkgs.stdenv.shell} -e
|
|
|
|
|
${config.script}
|
|
|
|
|
'' + " " + config.scriptArgs;
|
|
|
|
|
})
|
|
|
|
|
(mkIf (config.postStart != "")
|
|
|
|
|
{ serviceConfig.ExecStartPost = makeJobScript "${name}-post-start" ''
|
|
|
|
|
#! ${pkgs.stdenv.shell} -e
|
|
|
|
|
${config.postStart}
|
|
|
|
|
'';
|
|
|
|
|
})
|
2014-09-16 07:03:20 +04:00
|
|
|
|
(mkIf (config.reload != "")
|
|
|
|
|
{ serviceConfig.ExecReload = makeJobScript "${name}-reload" ''
|
|
|
|
|
#! ${pkgs.stdenv.shell} -e
|
|
|
|
|
${config.reload}
|
|
|
|
|
'';
|
|
|
|
|
})
|
2013-11-26 21:24:55 +04:00
|
|
|
|
(mkIf (config.preStop != "")
|
|
|
|
|
{ serviceConfig.ExecStop = makeJobScript "${name}-pre-stop" ''
|
|
|
|
|
#! ${pkgs.stdenv.shell} -e
|
|
|
|
|
${config.preStop}
|
|
|
|
|
'';
|
|
|
|
|
})
|
2013-11-18 18:45:24 +04:00
|
|
|
|
(mkIf (config.postStop != "")
|
|
|
|
|
{ serviceConfig.ExecStopPost = makeJobScript "${name}-post-stop" ''
|
|
|
|
|
#! ${pkgs.stdenv.shell} -e
|
|
|
|
|
${config.postStop}
|
|
|
|
|
'';
|
|
|
|
|
})
|
|
|
|
|
];
|
2012-08-06 19:45:59 +04:00
|
|
|
|
};
|
|
|
|
|
|
2012-12-28 16:29:53 +04:00
|
|
|
|
mountConfig = { name, config, ... }: {
|
|
|
|
|
config = {
|
|
|
|
|
mountConfig =
|
|
|
|
|
{ What = config.what;
|
|
|
|
|
Where = config.where;
|
|
|
|
|
} // optionalAttrs (config.type != "") {
|
|
|
|
|
Type = config.type;
|
|
|
|
|
} // optionalAttrs (config.options != "") {
|
|
|
|
|
Options = config.options;
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
|
2013-09-24 00:56:05 +04:00
|
|
|
|
automountConfig = { name, config, ... }: {
|
|
|
|
|
config = {
|
|
|
|
|
automountConfig =
|
|
|
|
|
{ Where = config.where;
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
|
2014-04-17 20:52:31 +04:00
|
|
|
|
commonUnitText = def: ''
|
2014-03-12 21:20:57 +04:00
|
|
|
|
[Unit]
|
|
|
|
|
${attrsToSection def.unitConfig}
|
|
|
|
|
'';
|
|
|
|
|
|
2012-10-02 02:58:11 +04:00
|
|
|
|
targetToUnit = name: def:
|
2013-04-20 00:28:00 +04:00
|
|
|
|
{ inherit (def) wantedBy requiredBy enable;
|
2012-10-02 02:58:11 +04:00
|
|
|
|
text =
|
|
|
|
|
''
|
|
|
|
|
[Unit]
|
|
|
|
|
${attrsToSection def.unitConfig}
|
|
|
|
|
'';
|
|
|
|
|
};
|
2012-06-18 23:28:31 +04:00
|
|
|
|
|
2012-10-02 02:58:11 +04:00
|
|
|
|
serviceToUnit = name: def:
|
2013-04-20 00:28:00 +04:00
|
|
|
|
{ inherit (def) wantedBy requiredBy enable;
|
2014-03-12 21:20:57 +04:00
|
|
|
|
text = commonUnitText def +
|
2012-06-18 23:28:31 +04:00
|
|
|
|
''
|
|
|
|
|
[Service]
|
2012-10-30 20:27:14 +04:00
|
|
|
|
${let env = cfg.globalEnvironment // def.environment;
|
2014-07-30 12:28:05 +04:00
|
|
|
|
in concatMapStrings (n:
|
2014-12-07 23:44:20 +03:00
|
|
|
|
let s = optionalString (env."${n}" != null)
|
|
|
|
|
"Environment=\"${n}=${env.${n}}\"\n";
|
2014-07-30 12:28:05 +04:00
|
|
|
|
in if stringLength s >= 2048 then throw "The value of the environment variable ‘${n}’ in systemd service ‘${name}.service’ is too long." else s) (attrNames env)}
|
2014-03-17 18:02:53 +04:00
|
|
|
|
${if def.reloadIfChanged then ''
|
|
|
|
|
X-ReloadIfChanged=true
|
|
|
|
|
'' else if !def.restartIfChanged then ''
|
|
|
|
|
X-RestartIfChanged=false
|
|
|
|
|
'' else ""}
|
2013-01-05 04:05:25 +04:00
|
|
|
|
${optionalString (!def.stopIfChanged) "X-StopIfChanged=false"}
|
2012-10-02 00:27:42 +04:00
|
|
|
|
${attrsToSection def.serviceConfig}
|
2012-06-18 23:28:31 +04:00
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2012-10-02 02:58:11 +04:00
|
|
|
|
socketToUnit = name: def:
|
2013-04-20 00:28:00 +04:00
|
|
|
|
{ inherit (def) wantedBy requiredBy enable;
|
2014-03-12 21:20:57 +04:00
|
|
|
|
text = commonUnitText def +
|
2012-10-02 02:58:11 +04:00
|
|
|
|
''
|
|
|
|
|
[Socket]
|
|
|
|
|
${attrsToSection def.socketConfig}
|
2013-05-14 18:07:55 +04:00
|
|
|
|
${concatStringsSep "\n" (map (s: "ListenStream=${s}") def.listenStreams)}
|
2012-10-02 02:58:11 +04:00
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2013-03-02 04:03:13 +04:00
|
|
|
|
timerToUnit = name: def:
|
2013-04-20 00:28:00 +04:00
|
|
|
|
{ inherit (def) wantedBy requiredBy enable;
|
2014-03-12 21:20:57 +04:00
|
|
|
|
text = commonUnitText def +
|
2013-03-02 04:03:13 +04:00
|
|
|
|
''
|
|
|
|
|
[Timer]
|
|
|
|
|
${attrsToSection def.timerConfig}
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2014-03-31 14:23:27 +04:00
|
|
|
|
pathToUnit = name: def:
|
|
|
|
|
{ inherit (def) wantedBy requiredBy enable;
|
|
|
|
|
text = commonUnitText def +
|
|
|
|
|
''
|
|
|
|
|
[Path]
|
|
|
|
|
${attrsToSection def.pathConfig}
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2012-12-28 16:29:53 +04:00
|
|
|
|
mountToUnit = name: def:
|
2013-04-20 00:28:00 +04:00
|
|
|
|
{ inherit (def) wantedBy requiredBy enable;
|
2014-03-12 21:20:57 +04:00
|
|
|
|
text = commonUnitText def +
|
2012-12-28 16:29:53 +04:00
|
|
|
|
''
|
|
|
|
|
[Mount]
|
|
|
|
|
${attrsToSection def.mountConfig}
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2013-09-24 00:56:05 +04:00
|
|
|
|
automountToUnit = name: def:
|
|
|
|
|
{ inherit (def) wantedBy requiredBy enable;
|
2014-03-12 21:20:57 +04:00
|
|
|
|
text = commonUnitText def +
|
2013-09-24 00:56:05 +04:00
|
|
|
|
''
|
|
|
|
|
[Automount]
|
|
|
|
|
${attrsToSection def.automountConfig}
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2012-06-02 04:15:07 +04:00
|
|
|
|
in
|
|
|
|
|
|
|
|
|
|
{
|
|
|
|
|
|
2012-06-15 02:44:56 +04:00
|
|
|
|
###### interface
|
|
|
|
|
|
|
|
|
|
options = {
|
|
|
|
|
|
2013-01-16 16:17:57 +04:00
|
|
|
|
systemd.package = mkOption {
|
|
|
|
|
default = pkgs.systemd;
|
|
|
|
|
type = types.package;
|
|
|
|
|
description = "The systemd package.";
|
|
|
|
|
};
|
|
|
|
|
|
2013-01-16 15:33:18 +04:00
|
|
|
|
systemd.units = mkOption {
|
2012-06-18 23:28:31 +04:00
|
|
|
|
description = "Definition of systemd units.";
|
2012-06-18 07:31:21 +04:00
|
|
|
|
default = {};
|
|
|
|
|
type = types.attrsOf types.optionSet;
|
2013-11-18 16:18:58 +04:00
|
|
|
|
options = { name, config, ... }:
|
2014-04-18 01:35:05 +04:00
|
|
|
|
{ options = concreteUnitOptions;
|
2013-11-18 16:18:58 +04:00
|
|
|
|
config = {
|
2014-03-13 03:18:17 +04:00
|
|
|
|
unit = mkDefault (makeUnit name config);
|
2013-11-18 16:18:58 +04:00
|
|
|
|
};
|
2012-06-18 07:31:21 +04:00
|
|
|
|
};
|
2012-06-18 23:28:31 +04:00
|
|
|
|
};
|
|
|
|
|
|
2013-01-16 15:33:18 +04:00
|
|
|
|
systemd.packages = mkOption {
|
2012-08-21 19:28:47 +04:00
|
|
|
|
default = [];
|
|
|
|
|
type = types.listOf types.package;
|
|
|
|
|
description = "Packages providing systemd units.";
|
|
|
|
|
};
|
|
|
|
|
|
2013-01-16 15:33:18 +04:00
|
|
|
|
systemd.targets = mkOption {
|
2012-10-02 02:58:11 +04:00
|
|
|
|
default = {};
|
|
|
|
|
type = types.attrsOf types.optionSet;
|
2014-04-18 01:35:05 +04:00
|
|
|
|
options = [ targetOptions unitConfig ];
|
2012-10-02 02:58:11 +04:00
|
|
|
|
description = "Definition of systemd target units.";
|
|
|
|
|
};
|
|
|
|
|
|
2013-01-16 15:33:18 +04:00
|
|
|
|
systemd.services = mkOption {
|
2012-06-18 23:28:31 +04:00
|
|
|
|
default = {};
|
|
|
|
|
type = types.attrsOf types.optionSet;
|
2012-10-09 23:14:15 +04:00
|
|
|
|
options = [ serviceOptions unitConfig serviceConfig ];
|
2012-10-02 02:58:11 +04:00
|
|
|
|
description = "Definition of systemd service units.";
|
|
|
|
|
};
|
|
|
|
|
|
2013-01-16 15:33:18 +04:00
|
|
|
|
systemd.sockets = mkOption {
|
2012-10-02 02:58:11 +04:00
|
|
|
|
default = {};
|
|
|
|
|
type = types.attrsOf types.optionSet;
|
2012-10-09 23:14:15 +04:00
|
|
|
|
options = [ socketOptions unitConfig ];
|
2012-10-02 02:58:11 +04:00
|
|
|
|
description = "Definition of systemd socket units.";
|
2012-06-15 02:44:56 +04:00
|
|
|
|
};
|
|
|
|
|
|
2013-03-02 04:03:13 +04:00
|
|
|
|
systemd.timers = mkOption {
|
|
|
|
|
default = {};
|
|
|
|
|
type = types.attrsOf types.optionSet;
|
|
|
|
|
options = [ timerOptions unitConfig ];
|
|
|
|
|
description = "Definition of systemd timer units.";
|
|
|
|
|
};
|
|
|
|
|
|
2014-03-31 14:23:27 +04:00
|
|
|
|
systemd.paths = mkOption {
|
|
|
|
|
default = {};
|
|
|
|
|
type = types.attrsOf types.optionSet;
|
|
|
|
|
options = [ pathOptions unitConfig ];
|
|
|
|
|
description = "Definition of systemd path units.";
|
|
|
|
|
};
|
|
|
|
|
|
2013-01-16 15:33:18 +04:00
|
|
|
|
systemd.mounts = mkOption {
|
2012-12-28 16:29:53 +04:00
|
|
|
|
default = [];
|
|
|
|
|
type = types.listOf types.optionSet;
|
|
|
|
|
options = [ mountOptions unitConfig mountConfig ];
|
|
|
|
|
description = ''
|
|
|
|
|
Definition of systemd mount units.
|
|
|
|
|
This is a list instead of an attrSet, because systemd mandates the names to be derived from
|
|
|
|
|
the 'where' attribute.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2013-09-24 00:56:05 +04:00
|
|
|
|
systemd.automounts = mkOption {
|
|
|
|
|
default = [];
|
|
|
|
|
type = types.listOf types.optionSet;
|
|
|
|
|
options = [ automountOptions unitConfig automountConfig ];
|
|
|
|
|
description = ''
|
|
|
|
|
Definition of systemd automount units.
|
|
|
|
|
This is a list instead of an attrSet, because systemd mandates the names to be derived from
|
|
|
|
|
the 'where' attribute.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2013-01-16 15:33:18 +04:00
|
|
|
|
systemd.defaultUnit = mkOption {
|
2012-06-18 07:31:21 +04:00
|
|
|
|
default = "multi-user.target";
|
2013-10-30 14:02:04 +04:00
|
|
|
|
type = types.str;
|
2012-06-18 07:31:21 +04:00
|
|
|
|
description = "Default unit started when the system boots.";
|
|
|
|
|
};
|
2012-07-20 01:32:50 +04:00
|
|
|
|
|
2013-01-16 15:33:18 +04:00
|
|
|
|
systemd.globalEnvironment = mkOption {
|
2012-10-30 20:27:14 +04:00
|
|
|
|
type = types.attrs;
|
|
|
|
|
default = {};
|
|
|
|
|
example = { TZ = "CET"; };
|
|
|
|
|
description = ''
|
|
|
|
|
Environment variables passed to <emphasis>all</emphasis> systemd units.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2013-11-15 22:49:01 +04:00
|
|
|
|
systemd.extraConfig = mkOption {
|
|
|
|
|
default = "";
|
|
|
|
|
type = types.lines;
|
|
|
|
|
example = "DefaultLimitCORE=infinity";
|
|
|
|
|
description = ''
|
|
|
|
|
Extra config options for systemd. See man systemd-system.conf for
|
|
|
|
|
available options.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2012-07-20 01:32:50 +04:00
|
|
|
|
services.journald.console = mkOption {
|
|
|
|
|
default = "";
|
2013-10-30 14:02:04 +04:00
|
|
|
|
type = types.str;
|
2012-11-02 17:10:06 +04:00
|
|
|
|
description = "If non-empty, write log messages to the specified TTY device.";
|
2012-07-20 01:32:50 +04:00
|
|
|
|
};
|
2012-08-06 19:45:59 +04:00
|
|
|
|
|
2012-12-16 23:28:45 +04:00
|
|
|
|
services.journald.rateLimitInterval = mkOption {
|
|
|
|
|
default = "10s";
|
2013-10-30 14:02:04 +04:00
|
|
|
|
type = types.str;
|
2012-12-16 23:28:45 +04:00
|
|
|
|
description = ''
|
|
|
|
|
Configures the rate limiting interval that is applied to all
|
|
|
|
|
messages generated on the system. This rate limiting is applied
|
|
|
|
|
per-service, so that two services which log do not interfere with
|
|
|
|
|
each other's limit. The value may be specified in the following
|
|
|
|
|
units: s, min, h, ms, us. To turn off any kind of rate limiting,
|
|
|
|
|
set either value to 0.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
services.journald.rateLimitBurst = mkOption {
|
|
|
|
|
default = 100;
|
|
|
|
|
type = types.uniq types.int;
|
|
|
|
|
description = ''
|
|
|
|
|
Configures the rate limiting burst limit (number of messages per
|
|
|
|
|
interval) that is applied to all messages generated on the system.
|
|
|
|
|
This rate limiting is applied per-service, so that two services
|
|
|
|
|
which log do not interfere with each other's limit.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2013-11-29 14:57:42 +04:00
|
|
|
|
services.journald.extraConfig = mkOption {
|
|
|
|
|
default = "";
|
|
|
|
|
type = types.lines;
|
|
|
|
|
example = "Storage=volatile";
|
|
|
|
|
description = ''
|
|
|
|
|
Extra config options for systemd-journald. See man journald.conf
|
|
|
|
|
for available options.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2014-02-01 17:50:20 +04:00
|
|
|
|
services.journald.enableHttpGateway = mkOption {
|
|
|
|
|
default = false;
|
|
|
|
|
type = types.bool;
|
|
|
|
|
description = ''
|
2014-04-17 21:05:29 +04:00
|
|
|
|
Whether to enable the HTTP gateway to the journal.
|
2014-02-01 17:50:20 +04:00
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2013-02-24 14:54:01 +04:00
|
|
|
|
services.logind.extraConfig = mkOption {
|
|
|
|
|
default = "";
|
2013-11-16 00:56:45 +04:00
|
|
|
|
type = types.lines;
|
2013-02-24 14:54:01 +04:00
|
|
|
|
example = "HandleLidSwitch=ignore";
|
|
|
|
|
description = ''
|
|
|
|
|
Extra config options for systemd-logind. See man logind.conf for
|
|
|
|
|
available options.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2014-04-17 18:10:48 +04:00
|
|
|
|
systemd.tmpfiles.rules = mkOption {
|
|
|
|
|
type = types.listOf types.str;
|
|
|
|
|
default = [];
|
|
|
|
|
example = [ "d /tmp 1777 root root 10d" ];
|
|
|
|
|
description = ''
|
|
|
|
|
Rules for creating and cleaning up temporary files
|
|
|
|
|
automatically. See
|
|
|
|
|
<citerefentry><refentrytitle>tmpfiles.d</refentrytitle><manvolnum>5</manvolnum></citerefentry>
|
|
|
|
|
for the exact format. You should not use this option to create
|
|
|
|
|
files required by systemd services, since there is no
|
|
|
|
|
guarantee that <command>systemd-tmpfiles</command> runs when
|
|
|
|
|
the system is reconfigured using
|
|
|
|
|
<command>nixos-rebuild</command>.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2014-04-18 02:38:40 +04:00
|
|
|
|
systemd.user.units = mkOption {
|
|
|
|
|
description = "Definition of systemd per-user units.";
|
|
|
|
|
default = {};
|
|
|
|
|
type = types.attrsOf types.optionSet;
|
|
|
|
|
options = { name, config, ... }:
|
|
|
|
|
{ options = concreteUnitOptions;
|
|
|
|
|
config = {
|
|
|
|
|
unit = mkDefault (makeUnit name config);
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
systemd.user.services = mkOption {
|
|
|
|
|
default = {};
|
|
|
|
|
type = types.attrsOf types.optionSet;
|
|
|
|
|
options = [ serviceOptions unitConfig serviceConfig ];
|
|
|
|
|
description = "Definition of systemd per-user service units.";
|
|
|
|
|
};
|
|
|
|
|
|
2014-12-30 07:46:36 +03:00
|
|
|
|
systemd.user.timers = mkOption {
|
|
|
|
|
default = {};
|
|
|
|
|
type = types.attrsOf types.optionSet;
|
|
|
|
|
options = [ timerOptions unitConfig ];
|
|
|
|
|
description = "Definition of systemd per-user timer units.";
|
|
|
|
|
};
|
|
|
|
|
|
2014-06-20 22:34:21 +04:00
|
|
|
|
systemd.user.sockets = mkOption {
|
|
|
|
|
default = {};
|
|
|
|
|
type = types.attrsOf types.optionSet;
|
|
|
|
|
options = [ socketOptions unitConfig ];
|
|
|
|
|
description = "Definition of systemd per-user socket units.";
|
|
|
|
|
};
|
|
|
|
|
|
2014-07-25 22:05:57 +04:00
|
|
|
|
systemd.additionalUpstreamSystemUnits = mkOption {
|
|
|
|
|
default = [ ];
|
|
|
|
|
type = types.listOf types.str;
|
|
|
|
|
example = [ "debug-shell.service" "systemd-quotacheck.service" ];
|
|
|
|
|
description = ''
|
|
|
|
|
Additional units shipped with systemd that shall be enabled.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2012-06-15 02:44:56 +04:00
|
|
|
|
};
|
|
|
|
|
|
2012-08-06 19:45:59 +04:00
|
|
|
|
|
2012-06-02 04:15:07 +04:00
|
|
|
|
###### implementation
|
|
|
|
|
|
2015-04-19 22:05:12 +03:00
|
|
|
|
config = {
|
2012-06-02 04:15:07 +04:00
|
|
|
|
|
2014-04-23 01:23:05 +04:00
|
|
|
|
warnings = concatLists (mapAttrsToList (name: service:
|
|
|
|
|
optional (service.serviceConfig.Type or "" == "oneshot" && service.serviceConfig.Restart or "no" != "no")
|
|
|
|
|
"Service ‘${name}.service’ with ‘Type=oneshot’ must have ‘Restart=no’") cfg.services);
|
2014-04-10 08:55:17 +04:00
|
|
|
|
|
2014-04-18 02:38:40 +04:00
|
|
|
|
system.build.units = cfg.units;
|
2012-06-16 08:19:43 +04:00
|
|
|
|
|
2012-06-02 04:15:07 +04:00
|
|
|
|
environment.systemPackages = [ systemd ];
|
2012-08-06 19:45:59 +04:00
|
|
|
|
|
2014-04-18 02:38:40 +04:00
|
|
|
|
environment.etc."systemd/system".source =
|
|
|
|
|
generateUnits "system" cfg.units upstreamSystemUnits upstreamSystemWants;
|
|
|
|
|
|
|
|
|
|
environment.etc."systemd/user".source =
|
|
|
|
|
generateUnits "user" cfg.user.units upstreamUserUnits [];
|
2013-05-09 18:21:42 +04:00
|
|
|
|
|
|
|
|
|
environment.etc."systemd/system.conf".text =
|
|
|
|
|
''
|
|
|
|
|
[Manager]
|
2013-11-15 22:49:01 +04:00
|
|
|
|
${config.systemd.extraConfig}
|
2013-05-09 18:21:42 +04:00
|
|
|
|
'';
|
|
|
|
|
|
|
|
|
|
environment.etc."systemd/journald.conf".text =
|
|
|
|
|
''
|
|
|
|
|
[Journal]
|
|
|
|
|
RateLimitInterval=${config.services.journald.rateLimitInterval}
|
|
|
|
|
RateLimitBurst=${toString config.services.journald.rateLimitBurst}
|
|
|
|
|
${optionalString (config.services.journald.console != "") ''
|
|
|
|
|
ForwardToConsole=yes
|
|
|
|
|
TTYPath=${config.services.journald.console}
|
|
|
|
|
''}
|
2013-11-29 14:57:42 +04:00
|
|
|
|
${config.services.journald.extraConfig}
|
2013-05-09 18:21:42 +04:00
|
|
|
|
'';
|
|
|
|
|
|
|
|
|
|
environment.etc."systemd/logind.conf".text =
|
|
|
|
|
''
|
|
|
|
|
[Login]
|
|
|
|
|
${config.services.logind.extraConfig}
|
|
|
|
|
'';
|
2012-06-15 02:44:56 +04:00
|
|
|
|
|
2013-05-09 18:25:24 +04:00
|
|
|
|
environment.etc."systemd/sleep.conf".text =
|
|
|
|
|
''
|
|
|
|
|
[Sleep]
|
|
|
|
|
'';
|
|
|
|
|
|
2013-07-19 23:18:44 +04:00
|
|
|
|
system.activationScripts.systemd = stringAfter [ "groups" ]
|
2012-11-29 21:51:44 +04:00
|
|
|
|
''
|
2013-07-20 19:07:26 +04:00
|
|
|
|
mkdir -m 0755 -p /var/lib/udev
|
|
|
|
|
mkdir -p /var/log/journal
|
|
|
|
|
chmod 0755 /var/log/journal
|
2012-11-29 21:51:44 +04:00
|
|
|
|
|
2013-07-19 23:18:44 +04:00
|
|
|
|
# Make all journals readable to users in the wheel and adm
|
|
|
|
|
# groups, in addition to those in the systemd-journal group.
|
|
|
|
|
# Users can always read their own journals.
|
2014-08-18 16:21:45 +04:00
|
|
|
|
${pkgs.acl}/bin/setfacl -nm g:wheel:rx,d:g:wheel:rx,g:adm:rx,d:g:adm:rx /var/log/journal || true
|
2012-11-29 21:51:44 +04:00
|
|
|
|
'';
|
|
|
|
|
|
2012-11-02 02:32:12 +04:00
|
|
|
|
# Target for ‘charon send-keys’ to hook into.
|
2014-02-11 16:00:10 +04:00
|
|
|
|
users.extraGroups.keys.gid = config.ids.gids.keys;
|
|
|
|
|
|
2013-01-16 15:33:18 +04:00
|
|
|
|
systemd.targets.keys =
|
2012-11-02 02:32:12 +04:00
|
|
|
|
{ description = "Security Keys";
|
2014-02-26 22:35:04 +04:00
|
|
|
|
unitConfig.X-StopOnReconfiguration = true;
|
2012-11-02 02:32:12 +04:00
|
|
|
|
};
|
|
|
|
|
|
2014-11-26 22:19:31 +03:00
|
|
|
|
systemd.targets.network-online.after = [ "ip-up.target" ];
|
|
|
|
|
|
2014-12-02 04:19:06 +03:00
|
|
|
|
systemd.targets.network-pre = {
|
|
|
|
|
wantedBy = [ "network.target" ];
|
|
|
|
|
before = [ "network.target" ];
|
|
|
|
|
};
|
|
|
|
|
|
2014-12-02 04:17:46 +03:00
|
|
|
|
systemd.targets.remote-fs-pre = {
|
|
|
|
|
wantedBy = [ "remote-fs.target" ];
|
|
|
|
|
before = [ "remote-fs.target" ];
|
|
|
|
|
};
|
|
|
|
|
|
2013-01-16 15:33:18 +04:00
|
|
|
|
systemd.units =
|
2013-01-08 21:24:06 +04:00
|
|
|
|
mapAttrs' (n: v: nameValuePair "${n}.target" (targetToUnit n v)) cfg.targets
|
2012-10-02 02:58:11 +04:00
|
|
|
|
// mapAttrs' (n: v: nameValuePair "${n}.service" (serviceToUnit n v)) cfg.services
|
2012-12-28 16:29:53 +04:00
|
|
|
|
// mapAttrs' (n: v: nameValuePair "${n}.socket" (socketToUnit n v)) cfg.sockets
|
2013-03-02 04:03:13 +04:00
|
|
|
|
// mapAttrs' (n: v: nameValuePair "${n}.timer" (timerToUnit n v)) cfg.timers
|
2014-03-31 14:23:27 +04:00
|
|
|
|
// mapAttrs' (n: v: nameValuePair "${n}.path" (pathToUnit n v)) cfg.paths
|
2012-12-28 16:29:53 +04:00
|
|
|
|
// listToAttrs (map
|
2013-01-01 17:42:43 +04:00
|
|
|
|
(v: let n = escapeSystemdPath v.where;
|
2013-09-24 00:56:05 +04:00
|
|
|
|
in nameValuePair "${n}.mount" (mountToUnit n v)) cfg.mounts)
|
|
|
|
|
// listToAttrs (map
|
|
|
|
|
(v: let n = escapeSystemdPath v.where;
|
|
|
|
|
in nameValuePair "${n}.automount" (automountToUnit n v)) cfg.automounts);
|
2012-06-15 02:44:56 +04:00
|
|
|
|
|
2014-04-18 02:38:40 +04:00
|
|
|
|
systemd.user.units =
|
2014-12-30 07:46:36 +03:00
|
|
|
|
mapAttrs' (n: v: nameValuePair "${n}.service" (serviceToUnit n v)) cfg.user.services
|
|
|
|
|
// mapAttrs' (n: v: nameValuePair "${n}.socket" (socketToUnit n v)) cfg.user.sockets
|
|
|
|
|
// mapAttrs' (n: v: nameValuePair "${n}.timer" (timerToUnit n v)) cfg.user.timers;
|
2014-04-18 02:38:40 +04:00
|
|
|
|
|
2014-04-30 15:53:12 +04:00
|
|
|
|
system.requiredKernelConfig = map config.lib.kernelConfig.isEnabled
|
|
|
|
|
[ "DEVTMPFS" "CGROUPS" "INOTIFY_USER" "SIGNALFD" "TIMERFD" "EPOLL" "NET"
|
|
|
|
|
"SYSFS" "PROC_FS" "FHANDLE" "DMIID" "AUTOFS4_FS" "TMPFS_POSIX_ACL"
|
|
|
|
|
"TMPFS_XATTR" "SECCOMP"
|
|
|
|
|
];
|
2012-11-29 21:51:44 +04:00
|
|
|
|
|
2012-11-30 19:12:04 +04:00
|
|
|
|
environment.shellAliases =
|
|
|
|
|
{ start = "systemctl start";
|
|
|
|
|
stop = "systemctl stop";
|
|
|
|
|
restart = "systemctl restart";
|
|
|
|
|
status = "systemctl status";
|
|
|
|
|
};
|
|
|
|
|
|
2013-07-19 23:18:44 +04:00
|
|
|
|
users.extraGroups.systemd-journal.gid = config.ids.gids.systemd-journal;
|
2014-02-01 17:50:20 +04:00
|
|
|
|
users.extraUsers.systemd-journal-gateway.uid = config.ids.uids.systemd-journal-gateway;
|
|
|
|
|
users.extraGroups.systemd-journal-gateway.gid = config.ids.gids.systemd-journal-gateway;
|
2013-07-19 23:18:44 +04:00
|
|
|
|
|
2013-10-09 16:28:35 +04:00
|
|
|
|
# Generate timer units for all services that have a ‘startAt’ value.
|
|
|
|
|
systemd.timers =
|
|
|
|
|
mapAttrs (name: service:
|
|
|
|
|
{ wantedBy = [ "timers.target" ];
|
|
|
|
|
timerConfig.OnCalendar = service.startAt;
|
|
|
|
|
})
|
|
|
|
|
(filterAttrs (name: service: service.startAt != "") cfg.services);
|
|
|
|
|
|
2014-04-17 21:05:29 +04:00
|
|
|
|
systemd.sockets.systemd-journal-gatewayd.wantedBy =
|
|
|
|
|
optional config.services.journald.enableHttpGateway "sockets.target";
|
|
|
|
|
|
2014-04-17 14:03:04 +04:00
|
|
|
|
# Provide the systemd-user PAM service, required to run systemd
|
|
|
|
|
# user instances.
|
|
|
|
|
security.pam.services.systemd-user =
|
|
|
|
|
{ # Ensure that pam_systemd gets included. This is special-cased
|
|
|
|
|
# in systemd to provide XDG_RUNTIME_DIR.
|
|
|
|
|
startSession = true;
|
|
|
|
|
};
|
|
|
|
|
|
2014-04-17 15:23:06 +04:00
|
|
|
|
environment.etc."tmpfiles.d/x11.conf".source = "${systemd}/example/tmpfiles.d/x11.conf";
|
|
|
|
|
|
2014-04-17 18:10:48 +04:00
|
|
|
|
environment.etc."tmpfiles.d/nixos.conf".text =
|
|
|
|
|
''
|
|
|
|
|
# This file is created automatically and should not be modified.
|
|
|
|
|
# Please change the option ‘systemd.tmpfiles.rules’ instead.
|
2014-12-28 09:33:59 +03:00
|
|
|
|
|
|
|
|
|
z /var/log/journal 2755 root systemd-journal - -
|
|
|
|
|
z /var/log/journal/%m 2755 root systemd-journal - -
|
|
|
|
|
z /var/log/journal/%m/* 0640 root systemd-journal - -
|
|
|
|
|
|
2014-04-17 18:10:48 +04:00
|
|
|
|
${concatStringsSep "\n" cfg.tmpfiles.rules}
|
|
|
|
|
'';
|
|
|
|
|
|
2015-05-11 13:39:37 +03:00
|
|
|
|
# Some overrides to upstream units.
|
|
|
|
|
systemd.services."systemd-backlight@".restartIfChanged = false;
|
|
|
|
|
systemd.services."systemd-rfkill@".restartIfChanged = false;
|
2014-05-20 13:10:20 +04:00
|
|
|
|
systemd.services."user@".restartIfChanged = false;
|
2014-07-17 22:59:25 +04:00
|
|
|
|
systemd.services.systemd-journal-flush.restartIfChanged = false;
|
2015-05-11 13:39:37 +03:00
|
|
|
|
systemd.services.systemd-journald.restartIfChanged = false; # FIXME: shouldn't be necessary with systemd 219
|
|
|
|
|
systemd.services.systemd-random-seed.restartIfChanged = false;
|
|
|
|
|
systemd.services.systemd-remount-fs.restartIfChanged = false;
|
|
|
|
|
systemd.services.systemd-update-utmp.restartIfChanged = false;
|
|
|
|
|
systemd.services.systemd-user-sessions.restartIfChanged = false; # Restart kills all active sessions.
|
|
|
|
|
systemd.targets.local-fs.unitConfig.X-StopOnReconfiguration = true;
|
|
|
|
|
systemd.targets.remote-fs.unitConfig.X-StopOnReconfiguration = true;
|
2014-07-12 01:33:40 +04:00
|
|
|
|
|
2015-04-19 22:05:12 +03:00
|
|
|
|
};
|
2014-11-20 00:11:30 +03:00
|
|
|
|
|
2012-06-02 04:15:07 +04:00
|
|
|
|
}
|