Merge pull request #128 from Infinisil/fix-enable-conditions

fix conditions for enabling services
This commit is contained in:
Robin Raymond 2018-06-09 15:18:46 +02:00 committed by GitHub
commit f016b9689a
No known key found for this signature in database
GPG key ID: 4AEE18F83AFDEB23
7 changed files with 11 additions and 11 deletions

View file

@ -56,7 +56,7 @@ let
${cmdPostexec}
'';
in {
config = lib.mkIf config.mailserver.borgbackup.enable {
config = lib.mkIf (config.mailserver.enable && cfg.enable) {
environment.systemPackages = with pkgs; [
borgbackup
];

View file

@ -20,7 +20,7 @@ let
cfg = config.mailserver;
in
{
config = lib.mkIf cfg.virusScanning {
config = lib.mkIf (cfg.enable && cfg.virusScanning) {
services.clamav.daemon.enable = true;
services.clamav.updater.enable = true;

View file

@ -20,7 +20,7 @@ let
cfg = config.mailserver;
in
{
config = lib.mkIf cfg.localDnsResolver {
config = lib.mkIf (cfg.enable && cfg.localDnsResolver) {
services.kresd.enable = true;
networking.nameservers = [ "127.0.0.1" ];
};

View file

@ -20,7 +20,7 @@ let
cfg = config.mailserver;
in
{
config = lib.mkIf cfg.monitoring.enable {
config = lib.mkIf (cfg.enable && cfg.monitoring.enable) {
services.monit = {
enable = true;
config = ''

View file

@ -24,7 +24,7 @@ let
acmeRoot = "/var/lib/acme/acme-challenge";
in
{
config = lib.mkIf (cfg.certificateScheme == 3) {
config = lib.mkIf (cfg.enable && cfg.certificateScheme == 3) {
services.nginx = {
enable = true;
virtualHosts."${cfg.fqdn}" = {

View file

@ -22,7 +22,7 @@ let
cfg = config.mailserver;
in
{
config = mkIf cfg.rebootAfterKernelUpgrade.enable {
config = mkIf (cfg.enable && cfg.rebootAfterKernelUpgrade.enable) {
systemd.services.nixos-upgrade.serviceConfig.ExecStartPost = pkgs.writeScript "post-upgrade-check" ''
#!${pkgs.stdenv.shell}

View file

@ -39,7 +39,7 @@ let
'';
postexecString = optionalString postexecDefined "cmd_postexec ${postexecWrapped}";
in {
config = mkIf cfg.backup.enable {
config = mkIf (cfg.enable && cfg.backup.enable) {
services.rsnapshot = {
enable = true;
cronIntervals = cfg.backup.cronIntervals;