diff --git a/modules/services/httpapi.nix b/modules/services/httpapi.nix index 69d084f8..aca0c2e6 100644 --- a/modules/services/httpapi.nix +++ b/modules/services/httpapi.nix @@ -45,5 +45,6 @@ inputs: }; secrets."httpapi/token" = {}; }; + systemd.tmpfiles.rules = [ "d /srv/api 0700 nginx nginx" ]; }; } diff --git a/modules/services/mirism.nix b/modules/services/mirism.nix index 0f74bb94..3bc368a6 100644 --- a/modules/services/mirism.nix +++ b/modules/services/mirism.nix @@ -12,24 +12,28 @@ inputs: in mkIf mirism.enable { users = { users.mirism = { isSystemUser = true; group = "mirism"; }; groups.mirism = {}; }; - systemd.services = listToAttrs (map - (instance: - { - name = "mirism-${instance}"; - value = + systemd = + { + services = listToAttrs (map + (instance: { - description = "mirism ${instance}"; - after = [ "network.target" ]; - wantedBy = [ "multi-user.target" ]; - serviceConfig = + name = "mirism-${instance}"; + value = { - User = inputs.config.users.users.mirism.name; - Group = inputs.config.users.users.mirism.group; - ExecStart = "${inputs.pkgs.localPackages.mirism}/bin/${instance}"; + description = "mirism ${instance}"; + after = [ "network.target" ]; + wantedBy = [ "multi-user.target" ]; + serviceConfig = + { + User = inputs.config.users.users.mirism.name; + Group = inputs.config.users.users.mirism.group; + ExecStart = "${inputs.pkgs.localPackages.mirism}/bin/${instance}"; + }; }; - }; - }) - [ "ng01" "beta" ]); + }) + [ "ng01" "beta" ]); + tmpfiles.rules = [ "d /srv/entry.mirism 0700 nginx nginx" "d /srv/mirism 0700 nginx nginx" ]; + }; nixos.services = { nginx =