mirror of
https://github.com/NixOS/nixpkgs.git
synced 2025-06-09 17:46:29 +09:00
nixos/signald: drop
This commit is contained in:
parent
f8e91921e7
commit
9958792cae
3 changed files with 4 additions and 117 deletions
|
@ -904,7 +904,6 @@
|
||||||
./services/misc/servarr/whisparr.nix
|
./services/misc/servarr/whisparr.nix
|
||||||
./services/misc/serviio.nix
|
./services/misc/serviio.nix
|
||||||
./services/misc/sickbeard.nix
|
./services/misc/sickbeard.nix
|
||||||
./services/misc/signald.nix
|
|
||||||
./services/misc/siproxd.nix
|
./services/misc/siproxd.nix
|
||||||
./services/misc/snapper.nix
|
./services/misc/snapper.nix
|
||||||
./services/misc/soft-serve.nix
|
./services/misc/soft-serve.nix
|
||||||
|
|
|
@ -318,6 +318,10 @@ in
|
||||||
The conduwuit project has been discontinued by upstream.
|
The conduwuit project has been discontinued by upstream.
|
||||||
See https://github.com/NixOS/nixpkgs/pull/397902 for more information.
|
See https://github.com/NixOS/nixpkgs/pull/397902 for more information.
|
||||||
'')
|
'')
|
||||||
|
(mkRemovedOptionModule [ "services" "signald" ] ''
|
||||||
|
The signald project is unmaintained and has long been incompatible with the
|
||||||
|
official Signal servers.
|
||||||
|
'')
|
||||||
|
|
||||||
# Do NOT add any option renames here, see top of the file
|
# Do NOT add any option renames here, see top of the file
|
||||||
];
|
];
|
||||||
|
|
|
@ -1,116 +0,0 @@
|
||||||
{
|
|
||||||
config,
|
|
||||||
lib,
|
|
||||||
pkgs,
|
|
||||||
...
|
|
||||||
}:
|
|
||||||
let
|
|
||||||
cfg = config.services.signald;
|
|
||||||
dataDir = "/var/lib/signald";
|
|
||||||
defaultUser = "signald";
|
|
||||||
in
|
|
||||||
{
|
|
||||||
options.services.signald = {
|
|
||||||
enable = lib.mkEnableOption "signald, the unofficial daemon for interacting with Signal";
|
|
||||||
|
|
||||||
user = lib.mkOption {
|
|
||||||
type = lib.types.str;
|
|
||||||
default = defaultUser;
|
|
||||||
description = "User under which signald runs.";
|
|
||||||
};
|
|
||||||
|
|
||||||
group = lib.mkOption {
|
|
||||||
type = lib.types.str;
|
|
||||||
default = defaultUser;
|
|
||||||
description = "Group under which signald runs.";
|
|
||||||
};
|
|
||||||
|
|
||||||
socketPath = lib.mkOption {
|
|
||||||
type = lib.types.str;
|
|
||||||
default = "/run/signald/signald.sock";
|
|
||||||
description = "Path to the signald socket";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
config = lib.mkIf cfg.enable {
|
|
||||||
users.users = lib.optionalAttrs (cfg.user == defaultUser) {
|
|
||||||
${defaultUser} = {
|
|
||||||
group = cfg.group;
|
|
||||||
isSystemUser = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
users.groups = lib.optionalAttrs (cfg.group == defaultUser) {
|
|
||||||
${defaultUser} = { };
|
|
||||||
};
|
|
||||||
|
|
||||||
systemd.services.signald = {
|
|
||||||
description = "A daemon for interacting with the Signal Private Messenger";
|
|
||||||
wants = [ "network.target" ];
|
|
||||||
wantedBy = [ "multi-user.target" ];
|
|
||||||
after = [ "network.target" ];
|
|
||||||
|
|
||||||
serviceConfig = {
|
|
||||||
User = cfg.user;
|
|
||||||
Group = cfg.group;
|
|
||||||
ExecStart = "${pkgs.signald}/bin/signald -d ${dataDir} -s ${cfg.socketPath}";
|
|
||||||
ExecStartPre = "${pkgs.signald}/bin/signald -d ${dataDir} -s ${cfg.socketPath} --migrate-data";
|
|
||||||
Restart = "on-failure";
|
|
||||||
StateDirectory = "signald";
|
|
||||||
RuntimeDirectory = "signald";
|
|
||||||
StateDirectoryMode = "0750";
|
|
||||||
RuntimeDirectoryMode = "0750";
|
|
||||||
|
|
||||||
BindReadOnlyPaths = [
|
|
||||||
"/nix/store"
|
|
||||||
"-/etc/resolv.conf"
|
|
||||||
"-/etc/nsswitch.conf"
|
|
||||||
"-/etc/hosts"
|
|
||||||
"-/etc/localtime"
|
|
||||||
];
|
|
||||||
CapabilityBoundingSet = "";
|
|
||||||
# ProtectClock= adds DeviceAllow=char-rtc r
|
|
||||||
DeviceAllow = "";
|
|
||||||
# Use a static user so other applications can access the files
|
|
||||||
#DynamicUser = true;
|
|
||||||
LockPersonality = true;
|
|
||||||
# Needed for java
|
|
||||||
#MemoryDenyWriteExecute = true;
|
|
||||||
NoNewPrivileges = true;
|
|
||||||
PrivateDevices = true;
|
|
||||||
PrivateMounts = true;
|
|
||||||
# Needs network access
|
|
||||||
#PrivateNetwork = true;
|
|
||||||
PrivateTmp = true;
|
|
||||||
PrivateUsers = true;
|
|
||||||
ProcSubset = "pid";
|
|
||||||
ProtectClock = true;
|
|
||||||
ProtectHome = true;
|
|
||||||
ProtectHostname = true;
|
|
||||||
# Would re-mount paths ignored by temporary root
|
|
||||||
#ProtectSystem = "strict";
|
|
||||||
ProtectControlGroups = true;
|
|
||||||
ProtectKernelLogs = true;
|
|
||||||
ProtectKernelModules = true;
|
|
||||||
ProtectKernelTunables = true;
|
|
||||||
ProtectProc = "invisible";
|
|
||||||
RestrictAddressFamilies = [
|
|
||||||
"AF_INET"
|
|
||||||
"AF_INET6"
|
|
||||||
"AF_UNIX"
|
|
||||||
];
|
|
||||||
RestrictNamespaces = true;
|
|
||||||
RestrictRealtime = true;
|
|
||||||
RestrictSUIDSGID = true;
|
|
||||||
SystemCallArchitectures = "native";
|
|
||||||
SystemCallFilter = [
|
|
||||||
"@system-service"
|
|
||||||
"~@privileged @resources @setuid @keyring"
|
|
||||||
];
|
|
||||||
TemporaryFileSystem = "/:ro";
|
|
||||||
# Does not work well with the temporary root
|
|
||||||
#UMask = "0066";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
|
||||||
}
|
|
Loading…
Add table
Add a link
Reference in a new issue