summaryrefslogtreecommitdiff
path: root/pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
diff options
context:
space:
mode:
authorDominique Martinet <asmadeus@codewreck.org>2020-05-09 20:43:24 +0200
committerBjørn Forsman <bjorn.forsman@gmail.com>2020-05-10 20:24:33 +0200
commitd8fa2627f307e72a0d7f232168b137569f3a6dc6 (patch)
tree32bd647d28986e99c30f6484c52ed3cf71a41e41 /pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch
parent73415984208d2bc4e71e729294e2b17132692b29 (diff)
mpd: remove user/group from conf
the options should not be set as we already change user with service file, man mpd.conf says "Do not use this option if you start MPD as an unprivileged user" The group option actually is not documented at all anymore and probably no longer exists. These options get in the way of setting up confinement for the service, as it would otherwise be pretty straightforward to setup, but even if mpd is not root it would check the user exists within the chroot which is more work (need to get nss working): systemd.services.mpd = { serviceConfig.BindPaths = [ # mpd state dir "/var/lib/mpd" # notify systemd service started up "/run/systemd/notify" ]; serviceConfig.BindReadOnlyPaths = [ "/path/to/music:/var/lib/mpd/music" ]; # ProtectSystem is not compatible with confinement serviceConfig.ProtectSystem = lib.mkForce false; confinement = { enable = true; binSh = null; mode = "chroot-only"; }; };
Diffstat (limited to 'pkgs/development/python-modules/python-mapnik/python-mapnik_std_optional.patch')
0 files changed, 0 insertions, 0 deletions