treewide: convert fake octal ints to strings

These were being cast to strings later and then reinterpreted as
octal.

+4 -4
nixos/modules/security/acme/default.nix
···
Type = "oneshot";
User = user;
Group = mkDefault "acme";
-
UMask = 0022;
-
StateDirectoryMode = 750;
+
UMask = "0022";
+
StateDirectoryMode = "750";
ProtectSystem = "strict";
ReadWritePaths = [
"/var/lib/acme"
···
serviceConfig = commonServiceConfig // {
StateDirectory = "acme/.minica";
BindPaths = "/var/lib/acme/.minica:/tmp/ca";
-
UMask = 0077;
+
UMask = "0077";
};
# Working directory will be /tmp
···
serviceConfig = commonServiceConfig // {
Group = data.group;
-
UMask = 0027;
+
UMask = "0027";
StateDirectory = "acme/${cert}";
+1 -1
nixos/modules/services/logging/journalwatch.nix
···
Type = "oneshot";
# requires a relative directory name to create beneath /var/lib
StateDirectory = user;
-
StateDirectoryMode = 0750;
+
StateDirectoryMode = "0750";
ExecStart = "${pkgs.python3Packages.journalwatch}/bin/journalwatch mail";
# lowest CPU and IO priority, but both still in best-effort class to prevent starvation
Nice=19;
+1 -1
nixos/modules/services/matrix/appservice-discord.nix
···
PrivateTmp = true;
WorkingDirectory = appDir;
StateDirectory = baseNameOf dataDir;
-
UMask = 0027;
+
UMask = "0027";
EnvironmentFile = cfg.environmentFile;
ExecStart = ''
+1 -1
nixos/modules/services/matrix/mautrix-telegram.nix
···
PrivateTmp = true;
WorkingDirectory = pkgs.mautrix-telegram; # necessary for the database migration scripts to be found
StateDirectory = baseNameOf dataDir;
-
UMask = 0027;
+
UMask = "0027";
EnvironmentFile = cfg.environmentFile;
ExecStart = ''
+1 -1
nixos/modules/services/misc/geoipupdate.nix
···
DynamicUser = true;
ReadWritePaths = cfg.settings.DatabaseDirectory;
RuntimeDirectory = "geoipupdate";
-
RuntimeDirectoryMode = 0700;
+
RuntimeDirectoryMode = "0700";
CapabilityBoundingSet = "";
PrivateDevices = true;
PrivateMounts = true;
+1 -1
nixos/modules/services/misc/mx-puppet-discord.nix
···
PrivateTmp = true;
WorkingDirectory = pkgs.mx-puppet-discord;
StateDirectory = baseNameOf dataDir;
-
UMask = 0027;
+
UMask = "0027";
ExecStart = ''
${pkgs.mx-puppet-discord}/bin/mx-puppet-discord \
+1 -1
nixos/modules/services/misc/rmfakecloud.nix
···
SystemCallArchitectures = "native";
WorkingDirectory = serviceDataDir;
StateDirectory = baseNameOf serviceDataDir;
-
UMask = 0027;
+
UMask = "0027";
};
};
};
+1 -1
nixos/modules/services/monitoring/parsedmarc.nix
···
Group = "parsedmarc";
DynamicUser = true;
RuntimeDirectory = "parsedmarc";
-
RuntimeDirectoryMode = 0700;
+
RuntimeDirectoryMode = "0700";
CapabilityBoundingSet = "";
PrivateDevices = true;
PrivateMounts = true;
+1 -1
nixos/modules/services/web-apps/bookstack.nix
···
User = user;
WorkingDirectory = "${bookstack}";
RuntimeDirectory = "bookstack/cache";
-
RuntimeDirectoryMode = 0700;
+
RuntimeDirectoryMode = "0700";
};
path = [ pkgs.replace-secret ];
script =
+2 -2
nixos/modules/services/web-apps/discourse.nix
···
"public"
"sockets"
];
-
RuntimeDirectoryMode = 0750;
+
RuntimeDirectoryMode = "0750";
StateDirectory = map (p: "discourse/" + p) [
"uploads"
"backups"
"tmp"
];
-
StateDirectoryMode = 0750;
+
StateDirectoryMode = "0750";
LogsDirectory = "discourse";
TimeoutSec = "infinity";
Restart = "on-failure";
+1 -1
nixos/modules/services/web-apps/keycloak.nix
···
Group = "keycloak";
DynamicUser = true;
RuntimeDirectory = "keycloak";
-
RuntimeDirectoryMode = 0700;
+
RuntimeDirectoryMode = "0700";
AmbientCapabilities = "CAP_NET_BIND_SERVICE";
};
script = ''
+1 -1
nixos/modules/services/web-apps/snipe-it.nix
···
User = user;
WorkingDirectory = snipe-it;
RuntimeDirectory = "snipe-it/cache";
-
RuntimeDirectoryMode = 0700;
+
RuntimeDirectoryMode = "0700";
};
path = [ pkgs.replace-secret ];
script =