2017-01-07 19:16:26 +01:00
|
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
|
|
|
|
|
|
let
|
|
|
|
|
|
2017-05-15 23:53:49 +02:00
|
|
|
|
cfg = config.systemd.user;
|
|
|
|
|
|
2023-11-11 00:51:53 +01:00
|
|
|
|
inherit (lib)
|
2024-04-15 19:57:48 +02:00
|
|
|
|
any attrValues getAttr hm isBool literalExpression mkIf mkMerge
|
|
|
|
|
mkEnableOption mkOption types;
|
2019-10-29 03:29:12 +01:00
|
|
|
|
|
2023-11-07 15:55:17 +01:00
|
|
|
|
settingsFormat = pkgs.formats.ini { listsAsDuplicateKeys = true; };
|
|
|
|
|
|
2019-10-29 03:29:12 +01:00
|
|
|
|
# From <nixpkgs/nixos/modules/system/boot/systemd-lib.nix>
|
2021-07-18 23:34:50 +02:00
|
|
|
|
mkPathSafeName =
|
2022-12-16 05:45:46 +01:00
|
|
|
|
lib.replaceStrings [ "@" ":" "\\" "[" "]" ] [ "-" "-" "-" "" "" ];
|
2021-07-18 23:34:50 +02:00
|
|
|
|
|
2023-11-07 15:55:17 +01:00
|
|
|
|
removeIfEmpty = attrs: names:
|
|
|
|
|
lib.filterAttrs (name: value: !(builtins.elem name names) || value != "")
|
|
|
|
|
attrs;
|
|
|
|
|
|
2019-10-29 03:29:12 +01:00
|
|
|
|
toSystemdIni = lib.generators.toINI {
|
2020-10-25 22:39:02 +01:00
|
|
|
|
listsAsDuplicateKeys = true;
|
2017-01-07 19:16:26 +01:00
|
|
|
|
mkKeyValue = key: value:
|
|
|
|
|
let
|
2021-07-18 23:34:50 +02:00
|
|
|
|
value' = if isBool value then
|
|
|
|
|
(if value then "true" else "false")
|
|
|
|
|
else
|
|
|
|
|
toString value;
|
|
|
|
|
in "${key}=${value'}";
|
2017-01-07 19:16:26 +01:00
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
buildService = style: name: serviceCfg:
|
|
|
|
|
let
|
2017-12-02 22:52:35 +01:00
|
|
|
|
filename = "${name}.${style}";
|
2019-10-29 03:29:12 +01:00
|
|
|
|
pathSafeName = mkPathSafeName filename;
|
2017-12-02 22:52:35 +01:00
|
|
|
|
|
|
|
|
|
# Needed because systemd derives unit names from the ultimate
|
|
|
|
|
# link target.
|
2019-02-19 08:10:04 +01:00
|
|
|
|
source = pkgs.writeTextFile {
|
|
|
|
|
name = pathSafeName;
|
|
|
|
|
text = toSystemdIni serviceCfg;
|
2022-04-07 08:38:20 +02:00
|
|
|
|
destination = "/${filename}";
|
2019-02-19 08:10:04 +01:00
|
|
|
|
} + "/${filename}";
|
2017-01-07 19:16:26 +01:00
|
|
|
|
|
2022-09-07 19:09:17 +02:00
|
|
|
|
install = variant: target: {
|
|
|
|
|
name = "systemd/user/${target}.${variant}/${filename}";
|
2017-11-12 00:49:36 +01:00
|
|
|
|
value = { inherit source; };
|
2021-07-18 23:34:50 +02:00
|
|
|
|
};
|
|
|
|
|
in lib.singleton {
|
|
|
|
|
name = "systemd/user/${filename}";
|
|
|
|
|
value = { inherit source; };
|
2022-09-07 19:09:17 +02:00
|
|
|
|
} ++ map (install "wants") (serviceCfg.Install.WantedBy or [ ])
|
|
|
|
|
++ map (install "requires") (serviceCfg.Install.RequiredBy or [ ]);
|
2017-01-07 19:16:26 +01:00
|
|
|
|
|
|
|
|
|
buildServices = style: serviceCfgs:
|
2019-10-29 03:29:12 +01:00
|
|
|
|
lib.concatLists (lib.mapAttrsToList (buildService style) serviceCfgs);
|
2017-01-07 19:16:26 +01:00
|
|
|
|
|
2020-08-04 19:38:14 +02:00
|
|
|
|
servicesStartTimeoutMs = builtins.toString cfg.servicesStartTimeoutMs;
|
|
|
|
|
|
2021-07-18 23:34:50 +02:00
|
|
|
|
unitType = unitKind:
|
|
|
|
|
with types;
|
2023-05-11 15:50:37 +02:00
|
|
|
|
let primitive = oneOf [ bool int str path ];
|
2021-07-18 23:34:50 +02:00
|
|
|
|
in attrsOf (attrsOf (attrsOf (either primitive (listOf primitive)))) // {
|
|
|
|
|
description = "systemd ${unitKind} unit configuration";
|
|
|
|
|
};
|
2018-05-09 15:22:34 +02:00
|
|
|
|
|
2018-10-18 06:30:36 +02:00
|
|
|
|
unitDescription = type: ''
|
|
|
|
|
Definition of systemd per-user ${type} units. Attributes are
|
|
|
|
|
merged recursively.
|
2023-06-30 07:22:38 +02:00
|
|
|
|
|
2018-10-18 06:30:36 +02:00
|
|
|
|
Note that the attributes follow the capitalization and naming used
|
|
|
|
|
by systemd. More details can be found in
|
2023-06-30 07:22:38 +02:00
|
|
|
|
{manpage}`systemd.${type}(5)`.
|
2018-10-18 06:30:36 +02:00
|
|
|
|
'';
|
|
|
|
|
|
2021-07-18 23:34:50 +02:00
|
|
|
|
unitExample = type:
|
2021-10-09 11:14:08 +02:00
|
|
|
|
literalExpression ''
|
2021-07-18 23:34:50 +02:00
|
|
|
|
{
|
|
|
|
|
${lib.toLower type}-name = {
|
|
|
|
|
Unit = {
|
|
|
|
|
Description = "Example description";
|
|
|
|
|
Documentation = [ "man:example(1)" "man:example(5)" ];
|
|
|
|
|
};
|
2018-10-18 06:30:36 +02:00
|
|
|
|
|
2021-07-18 23:34:50 +02:00
|
|
|
|
${type} = {
|
|
|
|
|
…
|
|
|
|
|
};
|
2019-08-29 19:12:39 +02:00
|
|
|
|
};
|
2020-12-04 18:39:05 +01:00
|
|
|
|
};
|
2021-07-18 23:34:50 +02:00
|
|
|
|
'';
|
2018-10-18 06:30:36 +02:00
|
|
|
|
|
2021-07-18 23:34:50 +02:00
|
|
|
|
sessionVariables = mkIf (cfg.sessionVariables != { }) {
|
|
|
|
|
"environment.d/10-home-manager.conf".text = lib.concatStringsSep "\n"
|
|
|
|
|
(lib.mapAttrsToList (n: v: "${n}=${toString v}") cfg.sessionVariables)
|
|
|
|
|
+ "\n";
|
|
|
|
|
};
|
2017-01-07 19:16:26 +01:00
|
|
|
|
|
2023-11-11 00:51:53 +01:00
|
|
|
|
settings = mkIf (any (v: v != { }) (attrValues cfg.settings)) {
|
2023-11-07 15:55:17 +01:00
|
|
|
|
"systemd/user.conf".source =
|
|
|
|
|
settingsFormat.generate "user.conf" cfg.settings;
|
|
|
|
|
};
|
|
|
|
|
|
2021-07-18 23:34:50 +02:00
|
|
|
|
in {
|
2019-10-29 03:29:12 +01:00
|
|
|
|
meta.maintainers = [ lib.maintainers.rycee ];
|
2017-09-26 23:40:31 +02:00
|
|
|
|
|
2017-01-07 19:16:26 +01:00
|
|
|
|
options = {
|
|
|
|
|
systemd.user = {
|
2024-04-15 19:57:48 +02:00
|
|
|
|
enable = mkEnableOption "the user systemd service manager" // {
|
|
|
|
|
default = pkgs.stdenv.isLinux;
|
|
|
|
|
defaultText = literalExpression "pkgs.stdenv.isLinux";
|
|
|
|
|
};
|
|
|
|
|
|
2017-10-20 14:02:05 +02:00
|
|
|
|
systemctlPath = mkOption {
|
|
|
|
|
default = "${pkgs.systemd}/bin/systemctl";
|
2022-11-03 23:13:29 +01:00
|
|
|
|
defaultText = literalExpression ''"''${pkgs.systemd}/bin/systemctl"'';
|
2017-10-20 14:02:05 +02:00
|
|
|
|
type = types.str;
|
2023-07-02 01:45:18 +02:00
|
|
|
|
description = ''
|
2023-07-01 01:30:13 +02:00
|
|
|
|
Absolute path to the {command}`systemctl` tool. This
|
2017-10-20 14:02:05 +02:00
|
|
|
|
option may need to be set if running Home Manager on a
|
|
|
|
|
non-NixOS distribution.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
2017-01-07 19:16:26 +01:00
|
|
|
|
services = mkOption {
|
2021-07-18 23:34:50 +02:00
|
|
|
|
default = { };
|
2019-04-10 00:40:45 +02:00
|
|
|
|
type = unitType "service";
|
2023-07-02 01:45:18 +02:00
|
|
|
|
description = (unitDescription "service");
|
2018-10-18 06:30:36 +02:00
|
|
|
|
example = unitExample "Service";
|
2017-01-07 19:16:26 +01:00
|
|
|
|
};
|
|
|
|
|
|
2020-12-04 14:14:24 +01:00
|
|
|
|
slices = mkOption {
|
2021-07-18 23:34:50 +02:00
|
|
|
|
default = { };
|
2022-10-07 06:49:39 +02:00
|
|
|
|
type = unitType "slice";
|
2023-07-02 01:45:18 +02:00
|
|
|
|
description = (unitDescription "slice");
|
2022-10-07 06:49:39 +02:00
|
|
|
|
example = unitExample "Slice";
|
2020-12-04 14:14:24 +01:00
|
|
|
|
};
|
|
|
|
|
|
2017-06-29 01:06:08 +02:00
|
|
|
|
sockets = mkOption {
|
2021-07-18 23:34:50 +02:00
|
|
|
|
default = { };
|
2019-04-10 00:40:45 +02:00
|
|
|
|
type = unitType "socket";
|
2023-07-02 01:45:18 +02:00
|
|
|
|
description = (unitDescription "socket");
|
2018-10-18 06:30:36 +02:00
|
|
|
|
example = unitExample "Socket";
|
2017-06-29 01:06:08 +02:00
|
|
|
|
};
|
|
|
|
|
|
2017-01-09 22:48:53 +01:00
|
|
|
|
targets = mkOption {
|
2021-07-18 23:34:50 +02:00
|
|
|
|
default = { };
|
2019-04-10 00:40:45 +02:00
|
|
|
|
type = unitType "target";
|
2023-07-02 01:45:18 +02:00
|
|
|
|
description = (unitDescription "target");
|
2018-10-18 06:30:36 +02:00
|
|
|
|
example = unitExample "Target";
|
2017-01-09 22:48:53 +01:00
|
|
|
|
};
|
|
|
|
|
|
2017-01-07 19:16:26 +01:00
|
|
|
|
timers = mkOption {
|
2021-07-18 23:34:50 +02:00
|
|
|
|
default = { };
|
2019-04-10 00:40:45 +02:00
|
|
|
|
type = unitType "timer";
|
2023-07-02 01:45:18 +02:00
|
|
|
|
description = (unitDescription "timer");
|
2018-10-18 06:30:36 +02:00
|
|
|
|
example = unitExample "Timer";
|
2017-01-07 19:16:26 +01:00
|
|
|
|
};
|
2017-12-04 11:17:46 +01:00
|
|
|
|
|
2018-06-29 12:14:35 +02:00
|
|
|
|
paths = mkOption {
|
2021-07-18 23:34:50 +02:00
|
|
|
|
default = { };
|
2019-04-10 00:40:45 +02:00
|
|
|
|
type = unitType "path";
|
2023-07-02 01:45:18 +02:00
|
|
|
|
description = (unitDescription "path");
|
2018-10-18 06:30:36 +02:00
|
|
|
|
example = unitExample "Path";
|
2018-06-29 12:14:35 +02:00
|
|
|
|
};
|
|
|
|
|
|
2020-11-27 21:29:44 +01:00
|
|
|
|
mounts = mkOption {
|
2021-07-18 23:34:50 +02:00
|
|
|
|
default = { };
|
2020-11-27 21:29:44 +01:00
|
|
|
|
type = unitType "mount";
|
2023-07-02 01:45:18 +02:00
|
|
|
|
description = (unitDescription "mount");
|
2020-11-27 21:29:44 +01:00
|
|
|
|
example = unitExample "Mount";
|
|
|
|
|
};
|
|
|
|
|
|
2019-10-29 03:29:12 +01:00
|
|
|
|
automounts = mkOption {
|
2021-07-18 23:34:50 +02:00
|
|
|
|
default = { };
|
2019-10-29 03:29:12 +01:00
|
|
|
|
type = unitType "automount";
|
2023-07-02 01:45:18 +02:00
|
|
|
|
description = (unitDescription "automount");
|
2019-10-29 03:29:12 +01:00
|
|
|
|
example = unitExample "Automount";
|
|
|
|
|
};
|
|
|
|
|
|
2017-12-04 11:17:46 +01:00
|
|
|
|
startServices = mkOption {
|
2020-12-13 21:53:49 +01:00
|
|
|
|
default = "suggest";
|
2021-07-18 23:34:50 +02:00
|
|
|
|
type = with types;
|
|
|
|
|
either bool (enum [ "suggest" "legacy" "sd-switch" ]);
|
|
|
|
|
apply = p: if isBool p then if p then "legacy" else "suggest" else p;
|
2023-07-02 01:45:18 +02:00
|
|
|
|
description = ''
|
2020-12-13 21:53:49 +01:00
|
|
|
|
Whether new or changed services that are wanted by active targets
|
|
|
|
|
should be started. Additionally, stop obsolete services from the
|
|
|
|
|
previous generation.
|
2023-07-01 02:40:42 +02:00
|
|
|
|
|
2020-12-13 21:53:49 +01:00
|
|
|
|
The alternatives are
|
2023-07-01 02:40:42 +02:00
|
|
|
|
|
|
|
|
|
`suggest` (or `false`)
|
|
|
|
|
: Use a very simple shell script to print suggested
|
|
|
|
|
{command}`systemctl` commands to run. You will have to
|
|
|
|
|
manually run those commands after the switch.
|
|
|
|
|
|
|
|
|
|
`legacy` (or `true`)
|
|
|
|
|
: Use a Ruby script to, in a more robust fashion, determine the
|
|
|
|
|
necessary changes and automatically run the
|
|
|
|
|
{command}`systemctl` commands.
|
|
|
|
|
|
|
|
|
|
`sd-switch`
|
|
|
|
|
: Use sd-switch, a third party application, to perform the service
|
|
|
|
|
updates. This tool offers more features while having a small
|
|
|
|
|
closure size. Note, it requires a fully functional user D-Bus
|
|
|
|
|
session. Once tested and deemed sufficiently robust, this will
|
|
|
|
|
become the default.
|
2017-12-04 11:17:46 +01:00
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
servicesStartTimeoutMs = mkOption {
|
|
|
|
|
default = 0;
|
2020-12-13 21:53:49 +01:00
|
|
|
|
type = types.ints.unsigned;
|
2023-07-02 01:45:18 +02:00
|
|
|
|
description = ''
|
2020-12-13 21:53:49 +01:00
|
|
|
|
How long to wait for started services to fail until their start is
|
|
|
|
|
considered successful. The value 0 indicates no timeout.
|
2017-12-04 11:17:46 +01:00
|
|
|
|
'';
|
|
|
|
|
};
|
2019-03-22 12:47:49 +01:00
|
|
|
|
|
|
|
|
|
sessionVariables = mkOption {
|
2021-07-18 23:34:50 +02:00
|
|
|
|
default = { };
|
2019-03-22 12:47:49 +01:00
|
|
|
|
type = with types; attrsOf (either int str);
|
|
|
|
|
example = { EDITOR = "vim"; };
|
2023-07-02 01:45:18 +02:00
|
|
|
|
description = ''
|
2019-03-22 12:47:49 +01:00
|
|
|
|
Environment variables that will be set for the user session.
|
|
|
|
|
The variable values must be as described in
|
2023-07-01 01:30:13 +02:00
|
|
|
|
{manpage}`environment.d(5)`.
|
2019-03-22 12:47:49 +01:00
|
|
|
|
'';
|
|
|
|
|
};
|
2023-11-07 15:55:17 +01:00
|
|
|
|
|
|
|
|
|
settings = mkOption {
|
|
|
|
|
apply = sections:
|
|
|
|
|
sections // {
|
|
|
|
|
# Setting one of these to an empty value would reset any
|
|
|
|
|
# previous settings, so we’ll remove them instead if they
|
|
|
|
|
# are not explicitly set.
|
|
|
|
|
Manager = removeIfEmpty sections.Manager [
|
|
|
|
|
"ManagerEnvironment"
|
|
|
|
|
"DefaultEnvironment"
|
|
|
|
|
];
|
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
type = types.submodule {
|
|
|
|
|
freeformType = settingsFormat.type;
|
|
|
|
|
|
|
|
|
|
options = let
|
|
|
|
|
inherit (lib) concatStringsSep escapeShellArg mapAttrsToList;
|
|
|
|
|
environmentOption = args:
|
|
|
|
|
mkOption {
|
|
|
|
|
type = with types;
|
|
|
|
|
attrsOf (nullOr (oneOf [ str path package ]));
|
|
|
|
|
default = { };
|
|
|
|
|
example = literalExpression ''
|
|
|
|
|
{
|
|
|
|
|
PATH = "%u/bin:%u/.cargo/bin";
|
|
|
|
|
}
|
|
|
|
|
'';
|
|
|
|
|
apply = value:
|
|
|
|
|
concatStringsSep " "
|
|
|
|
|
(mapAttrsToList (n: v: "${n}=${escapeShellArg v}") value);
|
|
|
|
|
} // args;
|
|
|
|
|
in {
|
|
|
|
|
Manager = {
|
|
|
|
|
DefaultEnvironment = environmentOption {
|
|
|
|
|
description = ''
|
|
|
|
|
Configures environment variables passed to all executed processes.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
ManagerEnvironment = environmentOption {
|
|
|
|
|
description = ''
|
|
|
|
|
Sets environment variables just for the manager process itself.
|
|
|
|
|
'';
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
default = { };
|
|
|
|
|
example = literalExpression ''
|
|
|
|
|
{
|
|
|
|
|
Manager.DefaultCPUAccounting = true;
|
|
|
|
|
}
|
|
|
|
|
'';
|
|
|
|
|
description = ''
|
|
|
|
|
Extra config options for user session service manager. See {manpage}`systemd-user.conf(5)` for
|
|
|
|
|
available options.
|
|
|
|
|
'';
|
|
|
|
|
};
|
2017-01-07 19:16:26 +01:00
|
|
|
|
};
|
|
|
|
|
};
|
|
|
|
|
|
2022-04-24 16:26:25 +02:00
|
|
|
|
# If we run under a Linux system we assume that systemd is
|
|
|
|
|
# available, in particular we assume that systemctl is in PATH.
|
|
|
|
|
# Do not install any user services if username is root.
|
2024-04-15 19:57:48 +02:00
|
|
|
|
config = mkIf (cfg.enable && config.home.username != "root") {
|
|
|
|
|
assertions = [{
|
|
|
|
|
assertion = pkgs.stdenv.isLinux;
|
|
|
|
|
message = "This module is only available on Linux.";
|
|
|
|
|
}];
|
|
|
|
|
|
2022-04-24 16:26:25 +02:00
|
|
|
|
xdg.configFile = mkMerge [
|
|
|
|
|
(lib.listToAttrs ((buildServices "service" cfg.services)
|
|
|
|
|
++ (buildServices "slice" cfg.slices)
|
|
|
|
|
++ (buildServices "socket" cfg.sockets)
|
|
|
|
|
++ (buildServices "target" cfg.targets)
|
|
|
|
|
++ (buildServices "timer" cfg.timers)
|
|
|
|
|
++ (buildServices "path" cfg.paths)
|
|
|
|
|
++ (buildServices "mount" cfg.mounts)
|
|
|
|
|
++ (buildServices "automount" cfg.automounts)))
|
|
|
|
|
|
|
|
|
|
sessionVariables
|
2023-11-07 15:55:17 +01:00
|
|
|
|
|
|
|
|
|
settings
|
2022-04-24 16:26:25 +02:00
|
|
|
|
];
|
|
|
|
|
|
|
|
|
|
# Run systemd service reload if user is logged in. If we're
|
|
|
|
|
# running this from the NixOS module then XDG_RUNTIME_DIR is not
|
|
|
|
|
# set and systemd commands will fail. We'll therefore have to
|
|
|
|
|
# set it ourselves in that case.
|
|
|
|
|
home.activation.reloadSystemd = hm.dag.entryAfter [ "linkGeneration" ] (let
|
|
|
|
|
cmd = {
|
|
|
|
|
suggest = ''
|
|
|
|
|
PATH=${dirOf cfg.systemctlPath}:$PATH \
|
|
|
|
|
bash ${./systemd-activate.sh} "''${oldGenPath=}" "$newGenPath"
|
|
|
|
|
'';
|
|
|
|
|
legacy = ''
|
|
|
|
|
PATH=${dirOf cfg.systemctlPath}:$PATH \
|
|
|
|
|
${pkgs.ruby}/bin/ruby ${./systemd-activate.rb} \
|
|
|
|
|
"''${oldGenPath=}" "$newGenPath" "${servicesStartTimeoutMs}"
|
|
|
|
|
'';
|
|
|
|
|
sd-switch = let
|
|
|
|
|
timeoutArg = if cfg.servicesStartTimeoutMs != 0 then
|
|
|
|
|
"--timeout " + servicesStartTimeoutMs
|
|
|
|
|
else
|
|
|
|
|
"";
|
|
|
|
|
in ''
|
|
|
|
|
${pkgs.sd-switch}/bin/sd-switch \
|
|
|
|
|
''${DRY_RUN:+--dry-run} $VERBOSE_ARG ${timeoutArg} \
|
|
|
|
|
''${oldGenPath:+--old-units $oldGenPath/home-files/.config/systemd/user} \
|
|
|
|
|
--new-units $newGenPath/home-files/.config/systemd/user
|
|
|
|
|
'';
|
|
|
|
|
};
|
2018-02-18 16:39:28 +01:00
|
|
|
|
|
2022-04-24 16:26:25 +02:00
|
|
|
|
ensureRuntimeDir =
|
|
|
|
|
"XDG_RUNTIME_DIR=\${XDG_RUNTIME_DIR:-/run/user/$(id -u)}";
|
2019-11-17 21:16:28 +01:00
|
|
|
|
|
2022-04-24 16:26:25 +02:00
|
|
|
|
systemctl = "${ensureRuntimeDir} ${cfg.systemctlPath}";
|
|
|
|
|
in ''
|
|
|
|
|
systemdStatus=$(${systemctl} --user is-system-running 2>&1 || true)
|
2021-07-18 23:34:50 +02:00
|
|
|
|
|
2022-04-24 16:26:25 +02:00
|
|
|
|
if [[ $systemdStatus == 'running' || $systemdStatus == 'degraded' ]]; then
|
|
|
|
|
if [[ $systemdStatus == 'degraded' ]]; then
|
|
|
|
|
warnEcho "The user systemd session is degraded:"
|
|
|
|
|
${systemctl} --user --no-pager --state=failed
|
|
|
|
|
warnEcho "Attempting to reload services anyway..."
|
|
|
|
|
fi
|
2019-11-17 21:16:28 +01:00
|
|
|
|
|
2022-04-24 16:26:25 +02:00
|
|
|
|
${ensureRuntimeDir} \
|
|
|
|
|
${getAttr cfg.startServices cmd}
|
|
|
|
|
else
|
|
|
|
|
echo "User systemd daemon not running. Skipping reload."
|
|
|
|
|
fi
|
2021-07-18 23:34:50 +02:00
|
|
|
|
|
2022-04-24 16:26:25 +02:00
|
|
|
|
unset systemdStatus
|
|
|
|
|
'');
|
|
|
|
|
};
|
2017-01-07 19:16:26 +01:00
|
|
|
|
}
|