diff --git a/flake.lock b/flake.lock index 87f7e34..fb42bce 100644 --- a/flake.lock +++ b/flake.lock @@ -28,11 +28,11 @@ "nixpkgs": "nixpkgs" }, "locked": { - "lastModified": 1754248966, - "narHash": "sha256-vzWjxutToys3QoQF1JhiY+mG9L25+iDyfz7gMK17r8U=", + "lastModified": 1754252459, + "narHash": "sha256-L0uz4di53ARTZAnNGaV5ThzbGwrS6mjyYp8C1ZHabR0=", "owner": "kyren223", "repo": "eko", - "rev": "5a46ec07dc1169fc2f9665eb2cf08bf945f0186c", + "rev": "6c8eb66e755a8e78dbf3e407756ef40a9dc5c14c", "type": "github" }, "original": { diff --git a/nixosModules/eko.nix b/nixosModules/eko.nix index 12c5e87..5e4af3d 100644 --- a/nixosModules/eko.nix +++ b/nixosModules/eko.nix @@ -32,21 +32,21 @@ # "z '${cfg.dataDir}' ${cfg.permission} ${cfg.user} ${cfg.group} - -" # ]; # Works - users.users.eko.homeMode = "0750"; - systemd.tmpfiles.rules = [ - "d /var/lib/eko 0750 eko eko" - ]; - systemd.services.eko.serviceConfig.StateDirectoryMode = lib.mkForce "0750"; - systemd.services.eko.serviceConfig.StateDirectory = "eko"; - systemd.services.eko.serviceConfig.ReadWritePaths = [ - "/var/lib/eko" - ]; + # users.users.eko.homeMode = "0750"; + # systemd.tmpfiles.rules = [ + # "d /var/lib/eko 0750 eko eko" + # ]; + # systemd.services.eko.serviceConfig.StateDirectoryMode = lib.mkForce "0750"; + # systemd.services.eko.serviceConfig.StateDirectory = "eko"; + # systemd.services.eko.serviceConfig.ReadWritePaths = [ + # "/var/lib/eko" + # ]; systemd.services.grafana = { serviceConfig = { ProtectHome = lib.mkForce false; ProtectSystem = lib.mkForce false; PrivateTmp = lib.mkForce false; - ReadWritePaths = [ "/var/lib/eko" ]; + ReadWritePaths = [ config.services.eko.dataDir ]; }; };