mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-25 16:33:15 +00:00
nixos: add services.rsyncd.socketActivated option
Define systemd-socket activation using the upstream configuration files as a reference. The "rsyncd" systemd unit has been renamed to "rsync" for consistency with upstream.
This commit is contained in:
parent
750510ee7c
commit
f32d7e4e03
@ -46,6 +46,13 @@ in {
|
||||
'';
|
||||
};
|
||||
|
||||
socketActivated = mkOption {
|
||||
default = false;
|
||||
type = types.bool;
|
||||
description =
|
||||
"If enabled Rsync will be socket-activated rather than run persistently.";
|
||||
};
|
||||
|
||||
};
|
||||
};
|
||||
|
||||
@ -63,12 +70,55 @@ in {
|
||||
|
||||
services.rsyncd.settings.global.port = toString cfg.port;
|
||||
|
||||
systemd.services.rsyncd = {
|
||||
description = "Rsync daemon";
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
serviceConfig.ExecStart =
|
||||
"${pkgs.rsync}/bin/rsync --daemon --no-detach --config=${configFile}";
|
||||
systemd = let
|
||||
serviceConfigSecurity = {
|
||||
ProtectSystem = "full";
|
||||
PrivateDevices = "on";
|
||||
NoNewPrivileges = "on";
|
||||
};
|
||||
in {
|
||||
services.rsync = {
|
||||
enable = !cfg.socketActivated;
|
||||
aliases = [ "rsyncd" ];
|
||||
|
||||
description = "fast remote file copy program daemon";
|
||||
after = [ "network.target" ];
|
||||
documentation = [ "man:rsync(1)" "man:rsyncd.conf(5)" ];
|
||||
|
||||
serviceConfig = serviceConfigSecurity // {
|
||||
ExecStart =
|
||||
"${pkgs.rsync}/bin/rsync --daemon --no-detach --config=${configFile}";
|
||||
RestartSec = 1;
|
||||
};
|
||||
|
||||
wantedBy = [ "multi-user.target" ];
|
||||
};
|
||||
|
||||
services."rsync@" = {
|
||||
description = "fast remote file copy program daemon";
|
||||
after = [ "network.target" ];
|
||||
|
||||
serviceConfig = serviceConfigSecurity // {
|
||||
ExecStart = "${pkgs.rsync}/bin/rsync --daemon --config=${configFile}";
|
||||
StandardInput = "socket";
|
||||
StandardOutput = "inherit";
|
||||
StandardError = "journal";
|
||||
};
|
||||
};
|
||||
|
||||
sockets.rsync = {
|
||||
enable = cfg.socketActivated;
|
||||
|
||||
description = "socket for fast remote file copy program daemon";
|
||||
conflicts = [ "rsync.service" ];
|
||||
|
||||
listenStreams = [ (toString cfg.port) ];
|
||||
socketConfig.Accept = true;
|
||||
|
||||
wantedBy = [ "sockets.target" ];
|
||||
};
|
||||
};
|
||||
|
||||
};
|
||||
|
||||
meta.maintainers = with lib.maintainers; [ ehmry ];
|
||||
|
@ -2,24 +2,35 @@ import ./make-test-python.nix ({ pkgs, ... }: {
|
||||
name = "rsyncd";
|
||||
meta.maintainers = with pkgs.lib.maintainers; [ ehmry ];
|
||||
|
||||
nodes.machine.services.rsyncd = {
|
||||
enable = true;
|
||||
settings = {
|
||||
global = {
|
||||
"reverse lookup" = false;
|
||||
"forward lookup" = false;
|
||||
nodes = let
|
||||
mkNode = socketActivated:
|
||||
{ config, ... }: {
|
||||
networking.firewall.allowedTCPPorts = [ config.services.rsyncd.port ];
|
||||
services.rsyncd = {
|
||||
enable = true;
|
||||
inherit socketActivated;
|
||||
settings = {
|
||||
global = {
|
||||
"reverse lookup" = false;
|
||||
"forward lookup" = false;
|
||||
};
|
||||
tmp = {
|
||||
path = "/nix/store";
|
||||
comment = "test module";
|
||||
};
|
||||
};
|
||||
};
|
||||
};
|
||||
tmp = {
|
||||
path = "/nix/store";
|
||||
comment = "test module";
|
||||
};
|
||||
|
||||
};
|
||||
in {
|
||||
a = mkNode false;
|
||||
b = mkNode true;
|
||||
};
|
||||
|
||||
testScript = ''
|
||||
start_all()
|
||||
machine.wait_for_unit("rsyncd")
|
||||
machine.succeed("rsync localhost::")
|
||||
a.wait_for_unit("rsync")
|
||||
b.wait_for_unit("sockets.target")
|
||||
b.succeed("rsync a::")
|
||||
a.succeed("rsync b::")
|
||||
'';
|
||||
})
|
||||
|
Loading…
Reference in New Issue
Block a user