1
0
Fork 0

container: Remove TimeoutStopSec override

This commit is contained in:
Daniel Kempkens 2023-05-25 18:59:20 +02:00
parent 330416837b
commit 02302aabf5
Signed by: daniel
SSH key fingerprint: SHA256:Ks/MyhQYcPRQiwMKLAKquWCdCPe3JXlb1WttgnAoSeM
12 changed files with 0 additions and 68 deletions

View file

@ -32,18 +32,6 @@
}; };
}; };
systemd.services.podman-signald.serviceConfig = {
TimeoutStopSec = lib.mkForce 5;
};
systemd.services.podman-matrix-signal.serviceConfig = {
TimeoutStopSec = lib.mkForce 5;
};
systemd.services.podman-matrix-whatsapp.serviceConfig = {
TimeoutStopSec = lib.mkForce 5;
};
networking.firewall.interfaces."podman+" = { networking.firewall.interfaces."podman+" = {
allowedUDPPorts = [ 443 ]; allowedUDPPorts = [ 443 ];
allowedTCPPorts = [ 443 ]; allowedTCPPorts = [ 443 ];

View file

@ -25,14 +25,6 @@
}; };
}; };
systemd.services.podman-proxitok-web.serviceConfig = {
TimeoutStopSec = lib.mkForce 5;
};
systemd.services.podman-proxitok-signer.serviceConfig = {
TimeoutStopSec = lib.mkForce 5;
};
systemd.tmpfiles.rules = [ systemd.tmpfiles.rules = [
"d /etc/container-proxitok/cache 0755 33 33" "d /etc/container-proxitok/cache 0755 33 33"
]; ];

View file

@ -43,18 +43,6 @@
{ {
requires = lib.mkAfter mounts; requires = lib.mkAfter mounts;
after = lib.mkAfter mounts; after = lib.mkAfter mounts;
serviceConfig = {
TimeoutStopSec = lib.mkForce 30;
};
};
systemd.services.podman-archivist-redis.serviceConfig = {
TimeoutStopSec = lib.mkForce 30;
};
systemd.services.podman-archivist-es.serviceConfig = {
TimeoutStopSec = lib.mkForce 30;
}; };
services.nginx.virtualHosts."tubearchivist.internal.kempkens.network" = { services.nginx.virtualHosts."tubearchivist.internal.kempkens.network" = {

View file

@ -20,10 +20,6 @@ in
]; ];
}; };
systemd.services.podman-weewx.serviceConfig = {
TimeoutStopSec = lib.mkForce 5;
};
systemd.tmpfiles.rules = [ systemd.tmpfiles.rules = [
"d ${data-dir} 0755 421 421" "d ${data-dir} 0755 421 421"
"d ${data-dir}/html 0755 421 421" "d ${data-dir}/html 0755 421 421"

View file

@ -45,10 +45,6 @@
requires = lib.mkAfter depends; requires = lib.mkAfter depends;
bindsTo = [ "wg.service" ]; bindsTo = [ "wg.service" ];
after = lib.mkForce ([ "wg.service" ] ++ depends); after = lib.mkForce ([ "wg.service" ] ++ depends);
serviceConfig = {
TimeoutStopSec = lib.mkForce 10;
};
}; };
systemd.services.podman-omegabrr = systemd.services.podman-omegabrr =
@ -59,10 +55,6 @@
requires = lib.mkAfter depends; requires = lib.mkAfter depends;
bindsTo = [ "wg.service" ]; bindsTo = [ "wg.service" ];
after = lib.mkForce ([ "wg.service" ] ++ depends); after = lib.mkForce ([ "wg.service" ] ++ depends);
serviceConfig = {
TimeoutStopSec = lib.mkForce 10;
};
}; };
services.nginx.virtualHosts."autobrr.internal.kempkens.network" = { services.nginx.virtualHosts."autobrr.internal.kempkens.network" = {

View file

@ -25,10 +25,6 @@
systemd.services.podman-convos = { systemd.services.podman-convos = {
bindsTo = [ "wg.service" ]; bindsTo = [ "wg.service" ];
after = lib.mkForce [ "wg.service" ]; after = lib.mkForce [ "wg.service" ];
serviceConfig = {
TimeoutStopSec = lib.mkForce 5;
};
}; };
services.nginx.virtualHosts."convos.internal.kempkens.network" = { services.nginx.virtualHosts."convos.internal.kempkens.network" = {

View file

@ -22,10 +22,6 @@
systemd.services.podman-prowlarr = { systemd.services.podman-prowlarr = {
bindsTo = [ "wg.service" ]; bindsTo = [ "wg.service" ];
after = lib.mkForce [ "wg.service" ]; after = lib.mkForce [ "wg.service" ];
serviceConfig = {
TimeoutStopSec = lib.mkForce 5;
};
}; };
services.nginx.virtualHosts."prowlarr.internal.kempkens.network" = { services.nginx.virtualHosts."prowlarr.internal.kempkens.network" = {

View file

@ -37,10 +37,6 @@
requires = lib.mkAfter mounts; requires = lib.mkAfter mounts;
bindsTo = [ "wg.service" ]; bindsTo = [ "wg.service" ];
after = lib.mkForce ([ "wg.service" ] ++ mounts); after = lib.mkForce ([ "wg.service" ] ++ mounts);
serviceConfig = {
TimeoutStopSec = lib.mkForce 10;
};
}; };
services.nginx.virtualHosts."qbittorrent.internal.kempkens.network" = { services.nginx.virtualHosts."qbittorrent.internal.kempkens.network" = {

View file

@ -37,10 +37,6 @@
requires = lib.mkAfter (mounts ++ depends); requires = lib.mkAfter (mounts ++ depends);
bindsTo = [ "wg.service" ]; bindsTo = [ "wg.service" ];
after = lib.mkForce ([ "wg.service" ] ++ mounts ++ depends); after = lib.mkForce ([ "wg.service" ] ++ mounts ++ depends);
serviceConfig = {
TimeoutStopSec = lib.mkForce 5;
};
}; };
services.nginx.virtualHosts."radarr.internal.kempkens.network" = { services.nginx.virtualHosts."radarr.internal.kempkens.network" = {

View file

@ -34,10 +34,6 @@
requires = lib.mkAfter mounts; requires = lib.mkAfter mounts;
bindsTo = [ "wg.service" ]; bindsTo = [ "wg.service" ];
after = lib.mkForce ([ "wg.service" ] ++ mounts); after = lib.mkForce ([ "wg.service" ] ++ mounts);
serviceConfig = {
TimeoutStopSec = lib.mkForce 10;
};
}; };
services.nginx.virtualHosts."sabnzbd.internal.kempkens.network" = { services.nginx.virtualHosts."sabnzbd.internal.kempkens.network" = {

View file

@ -36,10 +36,6 @@
requires = lib.mkAfter mounts; requires = lib.mkAfter mounts;
bindsTo = [ "wg.service" ]; bindsTo = [ "wg.service" ];
after = lib.mkForce ([ "wg.service" ] ++ mounts); after = lib.mkForce ([ "wg.service" ] ++ mounts);
serviceConfig = {
TimeoutStopSec = lib.mkForce 5;
};
}; };
services.nginx.virtualHosts."sonarr.internal.kempkens.network" = { services.nginx.virtualHosts."sonarr.internal.kempkens.network" = {