Fixes #16181 - using bin output for Go services

Changed files
+12 -12
nixos
+1 -1
nixos/modules/services/misc/confd.nix
···
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
serviceConfig = {
-
ExecStart = "${cfg.package}/bin/confd";
};
};
···
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
serviceConfig = {
+
ExecStart = "${cfg.package.bin}/bin/confd";
};
};
+1 -1
nixos/modules/services/misc/etcd.nix
···
serviceConfig = {
Type = "notify";
-
ExecStart = "${pkgs.etcd}/bin/etcd";
User = "etcd";
PermissionsStartOnly = true;
};
···
serviceConfig = {
Type = "notify";
+
ExecStart = "${pkgs.etcd.bin}/bin/etcd";
User = "etcd";
PermissionsStartOnly = true;
};
+1 -1
nixos/modules/services/monitoring/bosun.nix
···
User = cfg.user;
Group = cfg.group;
ExecStart = ''
-
${cfg.package}/bin/bosun -c ${configFile}
'';
};
};
···
User = cfg.user;
Group = cfg.group;
ExecStart = ''
+
${cfg.package.bin}/bin/bosun -c ${configFile}
'';
};
};
+1 -1
nixos/modules/services/monitoring/grafana.nix
···
after = ["networking.target"];
environment = mapAttrs' (n: v: nameValuePair "GF_${n}" (toString v)) envOptions;
serviceConfig = {
-
ExecStart = "${cfg.package}/bin/grafana-server -homepath ${cfg.dataDir}";
WorkingDirectory = cfg.dataDir;
User = "grafana";
};
···
after = ["networking.target"];
environment = mapAttrs' (n: v: nameValuePair "GF_${n}" (toString v)) envOptions;
serviceConfig = {
+
ExecStart = "${cfg.package.bin}/bin/grafana-server -homepath ${cfg.dataDir}";
WorkingDirectory = cfg.dataDir;
User = "grafana";
};
+1 -1
nixos/modules/services/monitoring/scollector.nix
···
PermissionsStartOnly = true;
User = cfg.user;
Group = cfg.group;
-
ExecStart = "${cfg.package}/bin/scollector -conf=${conf} ${lib.concatStringsSep " " cfg.extraOpts}";
};
};
···
PermissionsStartOnly = true;
User = cfg.user;
Group = cfg.group;
+
ExecStart = "${cfg.package.bin}/bin/scollector -conf=${conf} ${lib.concatStringsSep " " cfg.extraOpts}";
};
};
+4 -4
nixos/modules/services/networking/consul.nix
···
(filterAttrs (n: _: hasPrefix "consul.d/" n) config.environment.etc);
serviceConfig = {
-
ExecStart = "@${cfg.package}/bin/consul consul agent -config-dir /etc/consul.d"
+ concatMapStrings (n: " -config-file ${n}") configFiles;
-
ExecReload = "${cfg.package}/bin/consul reload";
PermissionsStartOnly = true;
User = if cfg.dropPrivileges then "consul" else null;
TimeoutStartSec = "0";
} // (optionalAttrs (cfg.leaveOnStop) {
-
ExecStop = "${cfg.package}/bin/consul leave";
});
path = with pkgs; [ iproute gnugrep gawk consul ];
···
serviceConfig = {
ExecStart = ''
-
${cfg.alerts.package}/bin/consul-alerts start \
--alert-addr=${cfg.alerts.listenAddr} \
--consul-addr=${cfg.alerts.consulAddr} \
${optionalString cfg.alerts.watchChecks "--watch-checks"} \
···
(filterAttrs (n: _: hasPrefix "consul.d/" n) config.environment.etc);
serviceConfig = {
+
ExecStart = "@${cfg.package.bin}/bin/consul consul agent -config-dir /etc/consul.d"
+ concatMapStrings (n: " -config-file ${n}") configFiles;
+
ExecReload = "${cfg.package.bin}/bin/consul reload";
PermissionsStartOnly = true;
User = if cfg.dropPrivileges then "consul" else null;
TimeoutStartSec = "0";
} // (optionalAttrs (cfg.leaveOnStop) {
+
ExecStop = "${cfg.package.bin}/bin/consul leave";
});
path = with pkgs; [ iproute gnugrep gawk consul ];
···
serviceConfig = {
ExecStart = ''
+
${cfg.alerts.package.bin}/bin/consul-alerts start \
--alert-addr=${cfg.alerts.listenAddr} \
--consul-addr=${cfg.alerts.consulAddr} \
${optionalString cfg.alerts.watchChecks "--watch-checks"} \
+1 -1
nixos/modules/services/networking/skydns.nix
···
SKYDNS_NAMESERVERS = concatStringsSep "," cfg.nameservers;
};
serviceConfig = {
-
ExecStart = "${cfg.package}/bin/skydns";
};
};
···
SKYDNS_NAMESERVERS = concatStringsSep "," cfg.nameservers;
};
serviceConfig = {
+
ExecStart = "${cfg.package.bin}/bin/skydns";
};
};
+1 -1
nixos/modules/services/security/hologram.nix
···
wantedBy = [ "multi-user.target" ];
serviceConfig = {
-
ExecStart = "${pkgs.hologram}/bin/hologram-server --debug --conf ${cfgFile}";
};
};
};
···
wantedBy = [ "multi-user.target" ];
serviceConfig = {
+
ExecStart = "${pkgs.hologram.bin}/bin/hologram-server --debug --conf ${cfgFile}";
};
};
};
+1 -1
nixos/modules/services/security/oauth2_proxy.nix
···
serviceConfig = {
User = "oauth2_proxy";
Restart = "always";
-
ExecStart = "${cfg.package}/bin/oauth2_proxy ${mkCommandLine cfg}";
};
};
···
serviceConfig = {
User = "oauth2_proxy";
Restart = "always";
+
ExecStart = "${cfg.package.bin}/bin/oauth2_proxy ${mkCommandLine cfg}";
};
};