treewide: move StartLimitIntervalSec/StartLimitBurst to unitConfig

Changed files
+23 -7
doc
languages-frameworks
nixos
modules
services
cluster
spark
games
matrix
networking
virtualisation
tests
+2
doc/languages-frameworks/beam.section.md
···
'';
Restart = "on-failure";
RestartSec = 5;
StartLimitBurst = 3;
StartLimitInterval = 10;
};
···
'';
Restart = "on-failure";
RestartSec = 5;
+
};
+
unitConfig = {
StartLimitBurst = 3;
StartLimitInterval = 10;
};
+6 -2
nixos/modules/services/cluster/spark/default.nix
···
ExecStart = "${cfg.package}/sbin/start-master.sh";
ExecStop = "${cfg.package}/sbin/stop-master.sh";
TimeoutSec = 300;
-
StartLimitBurst = 10;
Restart = "always";
};
};
spark-worker = lib.mkIf cfg.worker.enable {
···
ExecStart = "${cfg.package}/sbin/start-worker.sh spark://${cfg.worker.master}";
ExecStop = "${cfg.package}/sbin/stop-worker.sh";
TimeoutSec = 300;
-
StartLimitBurst = 10;
Restart = "always";
};
};
};
···
ExecStart = "${cfg.package}/sbin/start-master.sh";
ExecStop = "${cfg.package}/sbin/stop-master.sh";
TimeoutSec = 300;
Restart = "always";
+
};
+
unitConfig = {
+
StartLimitBurst = 10;
};
};
spark-worker = lib.mkIf cfg.worker.enable {
···
ExecStart = "${cfg.package}/sbin/start-worker.sh spark://${cfg.worker.master}";
ExecStop = "${cfg.package}/sbin/stop-worker.sh";
TimeoutSec = 300;
Restart = "always";
+
};
+
unitConfig = {
+
StartLimitBurst = 10;
};
};
};
+2
nixos/modules/services/games/xonotic.nix
···
Restart = "on-failure";
RestartSec = 10;
StartLimitBurst = 5;
};
};
···
Restart = "on-failure";
RestartSec = 10;
+
};
+
unitConfig = {
StartLimitBurst = 5;
};
};
+3 -1
nixos/modules/services/matrix/conduit.nix
···
ExecStart = "${cfg.package}/bin/conduit";
Restart = "on-failure";
RestartSec = 10;
-
StartLimitBurst = 5;
UMask = "077";
};
};
};
···
ExecStart = "${cfg.package}/bin/conduit";
Restart = "on-failure";
RestartSec = 10;
UMask = "077";
+
};
+
unitConfig = {
+
StartLimitBurst = 5;
};
};
};
+3 -1
nixos/modules/services/networking/fedimintd.nix
···
Restart = "always";
RestartSec = 10;
-
StartLimitBurst = 5;
UMask = "007";
LimitNOFILE = "100000";
···
"@system-service"
"~@privileged"
];
};
}
))
···
Restart = "always";
RestartSec = 10;
UMask = "007";
LimitNOFILE = "100000";
···
"@system-service"
"~@privileged"
];
+
};
+
unitConfig = {
+
StartLimitBurst = 5;
};
}
))
+3 -1
nixos/modules/services/networking/frr.nix
···
Nice = -5;
Type = "forking";
NotifyAccess = "all";
-
StartLimitBurst = "3";
TimeoutSec = 120;
WatchdogSec = 60;
RestartSec = 5;
···
ExecStart = "${pkgs.frr}/libexec/frr/frrinit.sh start";
ExecStop = "${pkgs.frr}/libexec/frr/frrinit.sh stop";
ExecReload = "${pkgs.frr}/libexec/frr/frrinit.sh reload";
};
};
};
···
Nice = -5;
Type = "forking";
NotifyAccess = "all";
TimeoutSec = 120;
WatchdogSec = 60;
RestartSec = 5;
···
ExecStart = "${pkgs.frr}/libexec/frr/frrinit.sh start";
ExecStop = "${pkgs.frr}/libexec/frr/frrinit.sh stop";
ExecReload = "${pkgs.frr}/libexec/frr/frrinit.sh reload";
+
};
+
unitConfig = {
+
StartLimitBurst = "3";
};
};
};
+3 -1
nixos/modules/virtualisation/docker-rootless.nix
···
TimeoutSec = 0;
RestartSec = 2;
Restart = "always";
-
StartLimitBurst = 3;
LimitNOFILE = "infinity";
LimitNPROC = "infinity";
LimitCORE = "infinity";
Delegate = true;
NotifyAccess = "all";
KillMode = "mixed";
};
};
};
···
TimeoutSec = 0;
RestartSec = 2;
Restart = "always";
LimitNOFILE = "infinity";
LimitNPROC = "infinity";
LimitCORE = "infinity";
Delegate = true;
NotifyAccess = "all";
KillMode = "mixed";
+
};
+
unitConfig = {
+
StartLimitBurst = 3;
};
};
};
+1 -1
nixos/tests/vault-postgresql.nix
···
];
# Try for about 10 minutes rather than the default of 5 attempts.
serviceConfig.RestartSec = 1;
-
serviceConfig.StartLimitBurst = 600;
};
# systemd.services.vault.unitConfig.RequiresMountsFor = "/run/keys/";
···
];
# Try for about 10 minutes rather than the default of 5 attempts.
serviceConfig.RestartSec = 1;
+
unitConfig.StartLimitBurst = 600;
};
# systemd.services.vault.unitConfig.RequiresMountsFor = "/run/keys/";