Skip to content
Permalink

Comparing changes

Choose two branches to see what’s changed or to start a new pull request. If you need to, you can also or learn more about diff comparisons.

Open a pull request

Create a new pull request by comparing changes across two branches. If you need to, you can also . Learn more about diff comparisons here.
base repository: NixOS/nixpkgs
Failed to load repositories. Confirm that selected base ref is valid, then try again.
Loading
base: d18c016c2a17
Choose a base ref
...
head repository: NixOS/nixpkgs
Failed to load repositories. Confirm that selected head ref is valid, then try again.
Loading
compare: 7a8d5dc8a676
Choose a head ref

Commits on Jun 14, 2020

  1. mantainers: add pasqui23

    pasqui23 committed Jun 14, 2020
    Copy the full SHA
    73dd8a7 View commit details
  2. zplugin: init at 2.3

    pasqui23 committed Jun 14, 2020
    Copy the full SHA
    79f4822 View commit details

Commits on Oct 28, 2020

  1. electron: remove extra output from print-hashes script

    to make it more usable for automated update
    prusnak committed Oct 28, 2020
    Copy the full SHA
    c46b2a3 View commit details
  2. electron: 8.5.1 -> 8.5.2

    prusnak committed Oct 28, 2020
    Copy the full SHA
    c074301 View commit details
  3. electron: 9.3.0 -> 9.3.3

    prusnak committed Oct 28, 2020
    Copy the full SHA
    2d30596 View commit details
  4. electron: 10.1.1 -> 10.1.5

    prusnak committed Oct 28, 2020
    Copy the full SHA
    0743d15 View commit details

Commits on Oct 29, 2020

  1. grafana-loki: 1.6.1 -> 2.0.0

    Convert to use buildGoModule and add a patch for a test failing on
    golang>=1.15.
    mweinelt committed Oct 29, 2020
    Copy the full SHA
    09bbd40 View commit details
  2. checksec: 2.2.3 -> 2.4.0

    r-ryantm committed Oct 29, 2020
    Copy the full SHA
    cb28da0 View commit details
  3. Copy the full SHA
    82b3584 View commit details
  4. armadillo: 10.1.0 -> 10.1.1

    r-ryantm committed Oct 29, 2020
    Copy the full SHA
    56d5df2 View commit details

Commits on Oct 30, 2020

  1. bdf2psf: 1.197 -> 1.198

    rnhmjoj committed Oct 30, 2020
    Copy the full SHA
    e79ac7b View commit details
  2. Copy the full SHA
    460a30c View commit details
  3. chrony: 3.5.1 -> 4.0

    bbigras committed Oct 30, 2020
    Copy the full SHA
    4e6f5a3 View commit details

Commits on Oct 31, 2020

  1. zoxide: 0.4.3 -> 0.5.0

    ajeetdsouza/zoxide@v0.4.3...v0.5.0
    
    Tests are disabled on darwin because they fail and I can't troubleshoot
    (since I don't have a darwin system).
    
    Co-authored-by: Sandro Jäckel <sandro.jaeckel@gmail.com>
    cole-h and SuperSandro2000 committed Oct 31, 2020
    Copy the full SHA
    f5ac1c6 View commit details
  2. hugo: 0.76.5 -> 0.77.0

    Frostman committed Oct 31, 2020
    Copy the full SHA
    5c43426 View commit details
  3. nixos/modules: fix systemd start rate-limits

    These were broken since 2016:
    systemd/systemd@f0367da
    since StartLimitIntervalSec got moved into [Unit] from [Service].
    StartLimitBurst has also been moved accordingly, so let's fix that one
    too.
    
    NixOS systems have been producing logs such as:
    /nix/store/wf98r55aszi1bkmln1lvdbp7znsfr70i-unit-caddy.service/caddy.service:31:
    Unknown key name 'StartLimitIntervalSec' in section 'Service', ignoring.
    
    I have also removed some unnecessary duplication in units disabling
    rate limiting since setting either interval or burst to zero disables it
    (https://github.com/systemd/systemd/blob/ad16158c10dfc3258831a9ff2f1a988214f51653/src/basic/ratelimit.c#L16)
    lf- committed Oct 31, 2020
    Copy the full SHA
    b37bbca View commit details
  4. Copy the full SHA
    534b0f1 View commit details
  5. neovim: revert change to extraMakeWrapperArgs

    wrapNeovim incited users to use a list instead of a string. Revert that:
    the change is not super useful while breaking home-manager.
    Matthieu Coudron committed Oct 31, 2020
    Copy the full SHA
    95702fe View commit details
  6. Merge pull request #90322 from pasqui23/zplg2

    zplugin: init at 2.3
    ryantm authored Oct 31, 2020
    Copy the full SHA
    893c94b View commit details
  7. Copy the full SHA
    be93137 View commit details
  8. neovim: restore neovim.override

    the compatibility layer for `wrapNeovim` introduced in #101265
    broke the recommended way of configuration:
    https://nixos.org/manual/nixpkgs/stable/#custom-configuration
    https://nixos.wiki/wiki/Vim#Customizations
    
    restore the old ways.
    Matthieu Coudron committed Oct 31, 2020
    Copy the full SHA
    db15722 View commit details
  9. Merge pull request #102228 from SuperSandro2000/rubocop-1.1.0

    rubocop: 0.77.0 -> 1.1.0
    Ma27 authored Oct 31, 2020
    Copy the full SHA
    7616553 View commit details
  10. Copy the full SHA
    c178fe4 View commit details
  11. Copy the full SHA
    644079e View commit details
  12. nixos-install: pass through keep-going flag

    hyperfekt committed Oct 31, 2020
    Copy the full SHA
    1338647 View commit details
  13. Merge pull request #101986 from mweinelt/loki2

    grafana-loki: 1.6.1 -> 2.0.0
    marsam authored Oct 31, 2020
    Copy the full SHA
    2faef82 View commit details
  14. Merge pull request #102207 from Frostman/hugo-0.77.0

    hugo: 0.76.5 -> 0.77.0
    Ma27 authored Oct 31, 2020
    Copy the full SHA
    a64f9cf View commit details
  15. pythonPackages.toolz: create Python 2 package

    nbke authored and Jonathan Ringer committed Oct 31, 2020
    Copy the full SHA
    c1cf4ab View commit details
  16. python3Packages.toolz: 0.10.0 -> 0.11.1

    nbke authored and Jonathan Ringer committed Oct 31, 2020
    Copy the full SHA
    a103c58 View commit details
  17. vimPlugins: update

    tuxinaut authored and Jonathan Ringer committed Oct 31, 2020
    Copy the full SHA
    bb6dfa9 View commit details
  18. Copy the full SHA
    441abe9 View commit details
  19. Merge pull request #97512 from lf-/StartLimitIntervalSec

    nixos/modules: fix systemd start rate-limits
    nh2 authored Oct 31, 2020
    Copy the full SHA
    02d0df5 View commit details
  20. Merge pull request #102177 from Ma27/bump-matrix-synapse

    matrix-synapse: 1.22.0 -> 1.22.1
    Ma27 authored Oct 31, 2020
    Copy the full SHA
    b18d189 View commit details
  21. Merge pull request #102170 from rnhmjoj/bdf2psf

    bdf2psf: 1.197 -> 1.198
    rnhmjoj authored Oct 31, 2020
    Copy the full SHA
    f93de9d View commit details
  22. Merge pull request #102231 from teto/neovim_fix

    neovim: revert change to extraMakeWrapperArgs
    teto authored Oct 31, 2020
    Copy the full SHA
    36ac62c View commit details
  23. Copy the full SHA
    6f8621d View commit details
  24. Copy the full SHA
    39dbc77 View commit details
  25. Merge pull request #100520 from hyperfekt/patch-3

    nixos-install: add passthrough --keep-going flag
    worldofpeace authored Oct 31, 2020
    Copy the full SHA
    eaaf925 View commit details
  26. nixos/prometheus: Support environmentFile (#97933)

    For the same reason Alertmanager supports environmentFile to pass
    secrets along, it is useful to support the same for Prometheus'
    configuration to store bearer tokens outside the Nix store.
    pkern authored Oct 31, 2020
    Copy the full SHA
    ec6b095 View commit details
  27. Copy the full SHA
    f7904ca View commit details
  28. Copy the full SHA
    7d834ef View commit details
  29. Merge pull request #102249 from rnhmjoj/firefox-audio

    nixos/tests/firefox: add audio subtest
    andir authored Oct 31, 2020
    Copy the full SHA
    fd0b383 View commit details
  30. ffsend: 0.2.65 -> 0.2.68

    r-ryantm committed Oct 31, 2020
    Copy the full SHA
    ddefc77 View commit details
  31. Merge pull request #102180 from cole-h/zoxide

    zoxide: 0.4.3 -> 0.5.0
    marsam authored Oct 31, 2020
    Copy the full SHA
    705b159 View commit details

Commits on Nov 1, 2020

  1. Merge pull request #102279 from r-ryantm/auto-update/ffsend

    ffsend: 0.2.65 -> 0.2.68
    ryantm authored Nov 1, 2020
    Copy the full SHA
    3099c68 View commit details
  2. Merge pull request #102095 from r-ryantm/auto-update/armadillo

    armadillo: 10.1.0 -> 10.1.1
    ryantm authored Nov 1, 2020
    Copy the full SHA
    d7b437a View commit details
  3. Merge pull request #102030 from r-ryantm/auto-update/cloudflared

    cloudflared: 2020.10.0 -> 2020.10.2
    thoughtpolice authored Nov 1, 2020
    Copy the full SHA
    09ff423 View commit details
  4. Merge pull request #102026 from r-ryantm/auto-update/checksec

    checksec: 2.2.3 -> 2.4.0
    thoughtpolice authored Nov 1, 2020
    Copy the full SHA
    c1a8104 View commit details
  5. Merge pull request #102185 from bbigras/chrony

    chrony: 3.5.1 -> 4.0
    thoughtpolice authored Nov 1, 2020
    Copy the full SHA
    4e57249 View commit details
  6. Copy the full SHA
    0c77c15 View commit details
Showing with 589 additions and 327 deletions.
  1. +6 −0 maintainers/maintainer-list.nix
  2. +1 −0 nixos/doc/manual/default.nix
  3. +17 −0 nixos/doc/manual/man-nixos-install.xml
  4. +8 −0 nixos/doc/manual/release-notes/rl-2103.xml
  5. +1 −1 nixos/modules/installer/tools/nixos-install.sh
  6. +1 −2 nixos/modules/services/continuous-integration/hercules-ci-agent/default.nix
  7. +1 −1 nixos/modules/services/databases/victoriametrics.nix
  8. +2 −3 nixos/modules/services/hardware/lcd.nix
  9. +1 −1 nixos/modules/services/mail/dovecot.nix
  10. +2 −2 nixos/modules/services/misc/autorandr.nix
  11. +1 −1 nixos/modules/services/misc/cgminer.nix
  12. +2 −2 nixos/modules/services/misc/safeeyes.nix
  13. +47 −1 nixos/modules/services/monitoring/prometheus/default.nix
  14. +2 −2 nixos/modules/services/monitoring/teamviewer.nix
  15. +3 −5 nixos/modules/services/network-filesystems/ceph.nix
  16. +1 −1 nixos/modules/services/networking/cjdns.nix
  17. +1 −0 nixos/modules/services/networking/dnsdist.nix
  18. +2 −2 nixos/modules/services/networking/mullvad-vpn.nix
  19. +2 −2 nixos/modules/services/networking/namecoind.nix
  20. +2 −2 nixos/modules/services/networking/nextdns.nix
  21. +1 −1 nixos/modules/services/networking/nix-store-gcs-proxy.nix
  22. +2 −2 nixos/modules/services/networking/nsd.nix
  23. +2 −2 nixos/modules/services/networking/supybot.nix
  24. +1 −4 nixos/modules/services/networking/tailscale.nix
  25. +2 −2 nixos/modules/services/security/vault.nix
  26. +2 −1 nixos/modules/services/web-apps/moinmoin.nix
  27. +2 −2 nixos/modules/services/web-servers/caddy.nix
  28. +2 −1 nixos/modules/services/web-servers/nginx/default.nix
  29. +2 −2 nixos/modules/services/web-servers/traefik.nix
  30. +4 −4 nixos/modules/services/x11/xserver.nix
  31. +12 −4 nixos/modules/system/boot/systemd-unit-options.nix
  32. +21 −8 nixos/modules/system/boot/systemd.nix
  33. +85 −6 nixos/tests/firefox.nix
  34. +4 −8 pkgs/applications/editors/neovim/utils.nix
  35. +5 −5 pkgs/applications/editors/neovim/wrapper.nix
  36. +3 −3 pkgs/applications/misc/hugo/default.nix
  37. +2 −2 pkgs/applications/networking/cloudflared/default.nix
  38. +3 −3 pkgs/applications/version-management/git-and-tools/git-gone/default.nix
  39. +3 −3 pkgs/applications/version-management/git-and-tools/git-trim/default.nix
  40. +2 −2 pkgs/development/libraries/armadillo/default.nix
  41. +1 −0 pkgs/development/ocaml-modules/fiat-p256/default.nix
  42. +6 −4 pkgs/development/ocaml-modules/hex/default.nix
  43. +28 −0 pkgs/development/python-modules/toolz/2.nix
  44. +2 −4 pkgs/development/python-modules/toolz/default.nix
  45. +13 −7 pkgs/development/tools/analysis/pev/default.nix
  46. +18 −18 pkgs/development/tools/electron/default.nix
  47. +2 −2 pkgs/development/tools/electron/print-hashes.sh
  48. +2 −2 pkgs/development/tools/packer/default.nix
  49. +15 −10 pkgs/development/tools/rubocop/Gemfile.lock
  50. +41 −20 pkgs/development/tools/rubocop/gemset.nix
  51. +90 −90 pkgs/misc/vim-plugins/generated.nix
  52. +2 −2 pkgs/os-specific/linux/checksec/default.nix
  53. +2 −2 pkgs/servers/matrix-synapse/default.nix
  54. +18 −12 pkgs/servers/monitoring/loki/default.nix
  55. +40 −0 pkgs/shells/zsh/zplugin/default.nix
  56. +2 −2 pkgs/tools/misc/bdf2psf/default.nix
  57. +3 −3 pkgs/tools/misc/ffsend/default.nix
  58. +29 −3 pkgs/tools/misc/zoxide/default.nix
  59. +0 −26 pkgs/tools/networking/chrony/allow-clock_adjtime.patch
  60. +4 −9 pkgs/tools/networking/chrony/default.nix
  61. +0 −13 pkgs/tools/networking/chrony/fix-seccomp-build.patch
  62. +4 −4 pkgs/top-level/all-packages.nix
  63. +4 −1 pkgs/top-level/python-packages.nix
6 changes: 6 additions & 0 deletions maintainers/maintainer-list.nix
Original file line number Diff line number Diff line change
@@ -6613,6 +6613,12 @@
githubId = 131844;
name = "Igor Pashev";
};
pasqui23 = {
email = "p3dimaria@hotmail.it";
github = "pasqui23";
githubId = 6931743;
name = "pasqui23";
};
patryk27 = {
email = "wychowaniec.patryk@gmail.com";
github = "Patryk27";
1 change: 1 addition & 0 deletions nixos/doc/manual/default.nix
Original file line number Diff line number Diff line change
@@ -63,6 +63,7 @@ let
"--stringparam html.script './highlightjs/highlight.pack.js ./highlightjs/loader.js'"
"--param xref.with.number.and.title 1"
"--param toc.section.depth 0"
"--param generate.consistent.ids 1"
"--stringparam admon.style ''"
"--stringparam callout.graphics.extension .svg"
"--stringparam current.docid manual"
17 changes: 17 additions & 0 deletions nixos/doc/manual/man-nixos-install.xml
Original file line number Diff line number Diff line change
@@ -106,6 +106,12 @@
</arg>
</arg>

<arg>
<arg choice='plain'>
<option>--keep-going</option>
</arg>
</arg>

<arg>
<arg choice='plain'>
<option>--help</option>
@@ -301,6 +307,17 @@
</para>
</listitem>
</varlistentry>
<varlistentry>
<term>
<option>--keep-going</option>
</term>
<listitem>
<para>
Causes Nix to continue building derivations as far as possible
in the face of failed builds.
</para>
</listitem>
</varlistentry>
<varlistentry>
<term>
<option>--help</option>
8 changes: 8 additions & 0 deletions nixos/doc/manual/release-notes/rl-2103.xml
Original file line number Diff line number Diff line change
@@ -132,6 +132,14 @@
to <package>nextcloud20</package>.
</para>
</listitem>
<listitem>
<para>
NixOS now emits a deprecation warning if systemd's <literal>StartLimitInterval</literal> setting is used in a <literal>serviceConfig</literal> section instead of in a <literal>unitConfig</literal>; that setting is deprecated and now undocumented for the service section by systemd upstream, but still effective and somewhat buggy there, which can be confusing. See <link xlink:href="https://github.com/NixOS/nixpkgs/issues/45785">#45785</link> for details.
</para>
<para>
All services should use <xref linkend="opt-systemd.services._name_.startLimitIntervalSec" /> or <literal>StartLimitIntervalSec</literal> in <xref linkend="opt-systemd.services._name_.unitConfig" /> instead.
</para>
</listitem>
</itemizedlist>
</section>
</section>
2 changes: 1 addition & 1 deletion nixos/modules/installer/tools/nixos-install.sh
Original file line number Diff line number Diff line change
@@ -64,7 +64,7 @@ while [ "$#" -gt 0 ]; do
--no-bootloader)
noBootLoader=1
;;
--show-trace|--impure)
--show-trace|--impure|--keep-going)
extraBuildFlags+=("$i")
;;
--help)
Original file line number Diff line number Diff line change
@@ -25,19 +25,18 @@ in
];

config = mkIf cfg.enable {

systemd.services.hercules-ci-agent = {
wantedBy = [ "multi-user.target" ];
after = [ "network-online.target" ];
wants = [ "network-online.target" ];
path = [ config.nix.package ];
startLimitBurst = 30 * 1000000; # practically infinite
serviceConfig = {
User = "hercules-ci-agent";
ExecStart = command;
ExecStartPre = testCommand;
Restart = "on-failure";
RestartSec = 120;
StartLimitBurst = 30 * 1000000; # practically infinite
};
};

2 changes: 1 addition & 1 deletion nixos/modules/services/databases/victoriametrics.nix
Original file line number Diff line number Diff line change
@@ -40,10 +40,10 @@ let cfg = config.services.victoriametrics; in
systemd.services.victoriametrics = {
description = "VictoriaMetrics time series database";
after = [ "network.target" ];
startLimitBurst = 5;
serviceConfig = {
Restart = "on-failure";
RestartSec = 1;
StartLimitBurst = 5;
StateDirectory = "victoriametrics";
DynamicUser = true;
ExecStart = ''
5 changes: 2 additions & 3 deletions nixos/modules/services/hardware/lcd.nix
Original file line number Diff line number Diff line change
@@ -151,14 +151,13 @@ in with lib; {
description = "LCDproc - client";
after = [ "lcdd.service" ];
wantedBy = [ "lcd.target" ];
# Allow restarting for eternity
startLimitIntervalSec = lib.mkIf cfg.client.restartForever 0;
serviceConfig = serviceCfg // {
ExecStart = "${pkg}/bin/lcdproc -f -c ${clientCfg}";
# If the server is being restarted at the same time, the client will
# fail as it cannot connect, so space it out a bit.
RestartSec = "5";
# Allow restarting for eternity
StartLimitIntervalSec = lib.mkIf cfg.client.restartForever "0";
StartLimitBurst = lib.mkIf cfg.client.restartForever "0";
};
};
};
2 changes: 1 addition & 1 deletion nixos/modules/services/mail/dovecot.nix
Original file line number Diff line number Diff line change
@@ -427,12 +427,12 @@ in
wantedBy = [ "multi-user.target" ];
restartTriggers = [ cfg.configFile modulesDir ];

startLimitIntervalSec = 60; # 1 min
serviceConfig = {
ExecStart = "${dovecotPkg}/sbin/dovecot -F";
ExecReload = "${dovecotPkg}/sbin/doveadm reload";
Restart = "on-failure";
RestartSec = "1s";
StartLimitInterval = "1min";
RuntimeDirectory = [ "dovecot2" ];
};

4 changes: 2 additions & 2 deletions nixos/modules/services/misc/autorandr.nix
Original file line number Diff line number Diff line change
@@ -37,9 +37,9 @@ in {
description = "Autorandr execution hook";
after = [ "sleep.target" ];

startLimitIntervalSec = 5;
startLimitBurst = 1;
serviceConfig = {
StartLimitInterval = 5;
StartLimitBurst = 1;
ExecStart = "${pkgs.autorandr}/bin/autorandr --batch --change --default ${cfg.defaultTarget}";
Type = "oneshot";
RemainAfterExit = false;
2 changes: 1 addition & 1 deletion nixos/modules/services/misc/cgminer.nix
Original file line number Diff line number Diff line change
@@ -126,12 +126,12 @@ in
GPU_USE_SYNC_OBJECTS = "1";
};

startLimitIntervalSec = 60; # 1 min
serviceConfig = {
ExecStart = "${pkgs.cgminer}/bin/cgminer --syslog --text-only --config ${cgminerConfig}";
User = cfg.user;
RestartSec = "30s";
Restart = "always";
StartLimitInterval = "1m";
};
};

4 changes: 2 additions & 2 deletions nixos/modules/services/misc/safeeyes.nix
Original file line number Diff line number Diff line change
@@ -32,14 +32,14 @@ in
wantedBy = [ "graphical-session.target" ];
partOf = [ "graphical-session.target" ];

startLimitIntervalSec = 350;
startLimitBurst = 10;
serviceConfig = {
ExecStart = ''
${pkgs.safeeyes}/bin/safeeyes
'';
Restart = "on-failure";
RestartSec = 3;
StartLimitInterval = 350;
StartLimitBurst = 10;
};
};

48 changes: 47 additions & 1 deletion nixos/modules/services/monitoring/prometheus/default.nix
Original file line number Diff line number Diff line change
@@ -45,7 +45,7 @@ let

cmdlineArgs = cfg.extraFlags ++ [
"--storage.tsdb.path=${workingDir}/data/"
"--config.file=${prometheusYml}"
"--config.file=/run/prometheus/prometheus-substituted.yaml"
"--web.listen-address=${cfg.listenAddress}:${builtins.toString cfg.port}"
"--alertmanager.notification-queue-capacity=${toString cfg.alertmanagerNotificationQueueCapacity}"
"--alertmanager.timeout=${toString cfg.alertmanagerTimeout}s"
@@ -522,6 +522,45 @@ in {
'';
};

environmentFile = mkOption {
type = types.nullOr types.path;
default = null;
example = "/root/prometheus.env";
description = ''
Environment file as defined in <citerefentry>
<refentrytitle>systemd.exec</refentrytitle><manvolnum>5</manvolnum>
</citerefentry>.
Secrets may be passed to the service without adding them to the
world-readable Nix store, by specifying placeholder variables as
the option value in Nix and setting these variables accordingly in the
environment file.
Environment variables from this file will be interpolated into the
config file using envsubst with this syntax:
<literal>$ENVIRONMENT ''${VARIABLE}</literal>
<programlisting>
# Example scrape config entry handling an OAuth bearer token
{
job_name = "home_assistant";
metrics_path = "/api/prometheus";
scheme = "https";
bearer_token = "\''${HOME_ASSISTANT_BEARER_TOKEN}";
[...]
}
</programlisting>
<programlisting>
# Content of the environment file
HOME_ASSISTANT_BEARER_TOKEN=someoauthbearertoken
</programlisting>
Note that this file needs to be available on the host on which
<literal>Prometheus</literal> is running.
'';
};

configText = mkOption {
type = types.nullOr types.lines;
default = null;
@@ -662,12 +701,19 @@ in {
systemd.services.prometheus = {
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
preStart = ''
${lib.getBin pkgs.envsubst}/bin/envsubst -o "/run/prometheus/prometheus-substituted.yaml" \
-i "${prometheusYml}"
'';
serviceConfig = {
ExecStart = "${cfg.package}/bin/prometheus" +
optionalString (length cmdlineArgs != 0) (" \\\n " +
concatStringsSep " \\\n " cmdlineArgs);
User = "prometheus";
Restart = "always";
EnvironmentFile = mkIf (cfg.environmentFile != null) [ cfg.environmentFile ];
RuntimeDirectory = "prometheus";
RuntimeDirectoryMode = "0700";
WorkingDirectory = workingDir;
StateDirectory = cfg.stateDir;
};
4 changes: 2 additions & 2 deletions nixos/modules/services/monitoring/teamviewer.nix
Original file line number Diff line number Diff line change
@@ -31,14 +31,14 @@ in
after = [ "NetworkManager-wait-online.service" "network.target" ];
preStart = "mkdir -pv /var/lib/teamviewer /var/log/teamviewer";

startLimitIntervalSec = 60;
startLimitBurst = 10;
serviceConfig = {
Type = "forking";
ExecStart = "${pkgs.teamviewer}/bin/teamviewerd -d";
PIDFile = "/run/teamviewerd.pid";
ExecReload = "${pkgs.coreutils}/bin/kill -HUP $MAINPID";
Restart = "on-abort";
StartLimitInterval = "60";
StartLimitBurst = "10";
};
};
};
8 changes: 3 additions & 5 deletions nixos/modules/services/network-filesystems/ceph.nix
Original file line number Diff line number Diff line change
@@ -28,6 +28,9 @@ let

# Don't start services that are not yet initialized
unitConfig.ConditionPathExists = "/var/lib/${stateDirectory}/keyring";
startLimitBurst =
if daemonType == "osd" then 30 else if lib.elem daemonType ["mgr" "mds"] then 3 else 5;
startLimitIntervalSec = 60 * 30; # 30 mins

serviceConfig = {
LimitNOFILE = 1048576;
@@ -39,22 +42,17 @@ let
ProtectHome = "true";
ProtectSystem = "full";
Restart = "on-failure";
StartLimitBurst = "5";
StartLimitInterval = "30min";
StateDirectory = stateDirectory;
User = "ceph";
Group = if daemonType == "osd" then "disk" else "ceph";
ExecStart = ''${ceph.out}/bin/${if daemonType == "rgw" then "radosgw" else "ceph-${daemonType}"} \
-f --cluster ${clusterName} --id ${daemonId}'';
} // optionalAttrs (daemonType == "osd") {
ExecStartPre = ''${ceph.lib}/libexec/ceph/ceph-osd-prestart.sh --id ${daemonId} --cluster ${clusterName}'';
StartLimitBurst = "30";
RestartSec = "20s";
PrivateDevices = "no"; # osd needs disk access
} // optionalAttrs ( daemonType == "mon") {
RestartSec = "10";
} // optionalAttrs (lib.elem daemonType ["mgr" "mds"]) {
StartLimitBurst = "3";
};
});

2 changes: 1 addition & 1 deletion nixos/modules/services/networking/cjdns.nix
Original file line number Diff line number Diff line change
@@ -264,10 +264,10 @@ in
''
);

startLimitIntervalSec = 0;
serviceConfig = {
Type = "forking";
Restart = "always";
StartLimitInterval = 0;
RestartSec = 1;
CapabilityBoundingSet = "CAP_NET_ADMIN CAP_NET_RAW CAP_SETUID";
ProtectSystem = true;
1 change: 1 addition & 0 deletions nixos/modules/services/networking/dnsdist.nix
Original file line number Diff line number Diff line change
@@ -41,6 +41,7 @@ in {
systemd.services.dnsdist = {
wantedBy = [ "multi-user.target" ];

startLimitIntervalSec = 0;
serviceConfig = {
DynamicUser = true;

4 changes: 2 additions & 2 deletions nixos/modules/services/networking/mullvad-vpn.nix
Original file line number Diff line number Diff line change
@@ -29,9 +29,9 @@ with lib;
# Needed for ping
"/run/wrappers"
];
startLimitBurst = 5;
startLimitIntervalSec = 20;
serviceConfig = {
StartLimitBurst = 5;
StartLimitIntervalSec = 20;
ExecStart = "${pkgs.mullvad-vpn}/bin/mullvad-daemon -v --disable-stdout-timestamps";
Restart = "always";
RestartSec = 1;
4 changes: 2 additions & 2 deletions nixos/modules/services/networking/namecoind.nix
Original file line number Diff line number Diff line change
@@ -165,6 +165,8 @@ in
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];

startLimitIntervalSec = 120;
startLimitBurst = 5;
serviceConfig = {
User = "namecoin";
Group = "namecoin";
@@ -176,8 +178,6 @@ in
TimeoutStopSec = "60s";
TimeoutStartSec = "2s";
Restart = "always";
StartLimitInterval = "120s";
StartLimitBurst = "5";
};

preStart = optionalString (cfg.wallet != "${dataDir}/wallet.dat") ''
4 changes: 2 additions & 2 deletions nixos/modules/services/networking/nextdns.nix
Original file line number Diff line number Diff line change
@@ -28,9 +28,9 @@ in {
environment = {
SERVICE_RUN_MODE = "1";
};
startLimitIntervalSec = 5;
startLimitBurst = 10;
serviceConfig = {
StartLimitInterval = 5;
StartLimitBurst = 10;
ExecStart = "${pkgs.nextdns}/bin/nextdns run ${escapeShellArgs config.services.nextdns.arguments}";
RestartSec = 120;
LimitMEMLOCK = "infinity";
2 changes: 1 addition & 1 deletion nixos/modules/services/networking/nix-store-gcs-proxy.nix
Original file line number Diff line number Diff line change
@@ -42,9 +42,9 @@ in
description = "A HTTP nix store that proxies requests to Google Storage";
wantedBy = ["multi-user.target"];

startLimitIntervalSec = 10;
serviceConfig = {
RestartSec = 5;
StartLimitInterval = 10;
ExecStart = ''
${pkgs.nix-store-gcs-proxy}/bin/nix-store-gcs-proxy \
--bucket-name ${cfg.bucketName} \
4 changes: 2 additions & 2 deletions nixos/modules/services/networking/nsd.nix
Original file line number Diff line number Diff line change
@@ -916,14 +916,14 @@ in
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];

startLimitBurst = 4;
startLimitIntervalSec = 5 * 60; # 5 mins
serviceConfig = {
ExecStart = "${nsdPkg}/sbin/nsd -d -c ${nsdEnv}/nsd.conf";
StandardError = "null";
PIDFile = pidFile;
Restart = "always";
RestartSec = "4s";
StartLimitBurst = 4;
StartLimitInterval = "5min";
};

preStart = ''
Loading