Support boot.tmpOnTmpfs without privileges
This commit is contained in:
parent
15386e5145
commit
a171b3d080
2 changed files with 3 additions and 2 deletions
|
@ -1,6 +1,7 @@
|
||||||
{
|
{
|
||||||
docker-compose.services.webserver = { pkgs, ... }: {
|
docker-compose.services.webserver = { pkgs, ... }: {
|
||||||
nixos.useSystemd = true;
|
nixos.useSystemd = true;
|
||||||
|
nixos.configuration.boot.tmpOnTmpfs = true;
|
||||||
nixos.configuration.services.nginx.enable = true;
|
nixos.configuration.services.nginx.enable = true;
|
||||||
nixos.configuration.services.nginx.virtualHosts.localhost.root = "${pkgs.nix.doc}/share/doc/nix/manual";
|
nixos.configuration.services.nginx.virtualHosts.localhost.root = "${pkgs.nix.doc}/share/doc/nix/manual";
|
||||||
service.useHostStore = true;
|
service.useHostStore = true;
|
||||||
|
|
|
@ -29,10 +29,10 @@ in
|
||||||
"/sys/fs/cgroup:/sys/fs/cgroup:ro"
|
"/sys/fs/cgroup:/sys/fs/cgroup:ro"
|
||||||
];
|
];
|
||||||
service.tmpfs = [
|
service.tmpfs = [
|
||||||
"/tmp:exec,mode=777"
|
|
||||||
"/run" # noexec is fine because exes should be symlinked from elsewhere anyway
|
"/run" # noexec is fine because exes should be symlinked from elsewhere anyway
|
||||||
"/run/wrappers" # noexec breaks this intentionally
|
"/run/wrappers" # noexec breaks this intentionally
|
||||||
];
|
] ++ lib.optional (config.nixos.evaluatedConfig.boot.tmpOnTmpfs) "/tmp:exec,mode=777";
|
||||||
|
|
||||||
service.stop_signal = "SIGRTMIN+3";
|
service.stop_signal = "SIGRTMIN+3";
|
||||||
service.tty = true;
|
service.tty = true;
|
||||||
};
|
};
|
||||||
|
|
Loading…
Reference in a new issue