Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Replace Network-interfaces.target #18491

Merged
merged 45 commits into from
Oct 2, 2016
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
45 commits
Select commit Hold shift + click to select a range
926428b
cassandra service: network-interfaces.target -> network.target
joachifm Sep 10, 2016
167eef2
influxdb service: network-interfaces.target -> network.target
joachifm Sep 10, 2016
54b3e4f
neo4j service: network-interfaces.target -> network.target
joachifm Sep 10, 2016
5a085ca
apache-kafka service: network-interfaces.target -> network.target
joachifm Sep 10, 2016
ebc8e08
folding-at-home service: network-interfaces.target -> network.target
joachifm Sep 10, 2016
2d48f1c
mesos-master service: network-interfaces.target -> network.target
joachifm Sep 10, 2016
9b1177f
mesos-slave service: network-interfaces.target -> network.target
joachifm Sep 10, 2016
4c7f53e
svnserve service: network-interfaces.target -> network.target
joachifm Sep 10, 2016
c2d007e
zookeeper service: network-interfaces.target -> network.target
joachifm Sep 10, 2016
b38c0c9
graphite service: network-interfaces.target -> network.target
joachifm Sep 10, 2016
1a60210
nagios service: network-interfaces.target -> network.target
joachifm Sep 10, 2016
22976bc
openafs-client service: network-interfaces.target -> network.target
joachifm Sep 10, 2016
69e15b7
bind service: network-interfaces.target -> network.target
joachifm Sep 10, 2016
ae71667
cjdns service: network-interfaces.target -> network.target
joachifm Sep 10, 2016
652e0b4
oidentd service: network-interfaces.target -> network.target
joachifm Sep 10, 2016
67d9369
radicale service: network-interfaces.target -> network{,-online}.target
joachifm Sep 10, 2016
795defa
tcpcrypt service: remove use of network-interfaces.target
joachifm Sep 10, 2016
768b333
tinc service: remove use of network-interfaces.target
joachifm Sep 10, 2016
cda9af6
wpa-supplicant service: remove use of network-interfaces.target
joachifm Sep 10, 2016
c7ed675
xinetd service: remove use of network-interfaces.target
joachifm Sep 10, 2016
5a2a351
zerobin service: remove use of network-interfaces.target
joachifm Sep 10, 2016
3826c19
chronos service: remove use of network-interfaces.target
joachifm Sep 10, 2016
b6e5c62
marathon service: remove use of network-interfaces.target
joachifm Sep 10, 2016
94ed3de
elasticsearch service: remove use of network-interfaces.target
joachifm Sep 10, 2016
b5756c8
kibana service: remove use of network-interfaces.target
joachifm Sep 10, 2016
820b769
oauth2_proxy: remove use of network-interfaces.target
joachifm Sep 10, 2016
c71bb91
peerflix: remove use of network-interfaces.target
joachifm Sep 10, 2016
3dc6979
tomcat: remove use of network-interfaces.target
joachifm Sep 10, 2016
bc77104
networking.dhcpcd: use upstream targets
groxxda Sep 8, 2016
3ada966
treewide: minor format / style / documentation fixes
groxxda Sep 8, 2016
9819cdc
wicd: get closer to upstream service definition
groxxda Sep 12, 2016
fbf0abf
softether: improve service dependencies
groxxda Sep 12, 2016
23ca90b
monitoring.monit: get closer to upstream service definition
groxxda Sep 12, 2016
5481831
misc.etcd: get closer to upstream service definition
groxxda Sep 12, 2016
4231293
cluster.kubernetes: fix service ordering
groxxda Sep 12, 2016
97416ea
gpve service: network-interfaces.target -> network.target
groxxda Sep 12, 2016
d43b2b9
openvpn service: network-interfaces.target -> network.target
groxxda Sep 12, 2016
60430b1
lshd service: remove use of network-interfaces.target
groxxda Sep 12, 2016
8524df1
networking.nat: replace network-interfaces.target
groxxda Sep 8, 2016
2d46004
multi-user.target should not pull network.target
groxxda Sep 9, 2016
e90471d
systemd-networkd.service: remove network-interfaces.target ordering
groxxda Sep 12, 2016
072c1dc
network-interfaces-scripted: rework dependencies
groxxda Sep 9, 2016
85c36d1
network-interfaces.target: add deprecation notice
groxxda Sep 13, 2016
60a9edb
tests.networking: remove network-interfaces.target
groxxda Sep 13, 2016
fc0dc65
network-interfaces-scripted: DefaultDependencies is a unitConfig
joachifm Oct 2, 2016
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
10 changes: 5 additions & 5 deletions nixos/modules/services/cluster/kubernetes.nix
Original file line number Diff line number Diff line change
Expand Up @@ -421,7 +421,7 @@ in {
description = "Kubernetes Api Server";
wantedBy = [ "multi-user.target" ];
requires = ["kubernetes-setup.service"];
after = [ "network-interfaces.target" "etcd.service" ];
after = [ "network.target" "etcd.service" "kubernetes-setup.service" ];
serviceConfig = {
ExecStart = let
authorizationPolicyFile =
Expand Down Expand Up @@ -468,7 +468,7 @@ in {
systemd.services.kube-scheduler = {
description = "Kubernetes Scheduler Service";
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" "kubernetes-apiserver.service" ];
after = [ "network.target" "kubernetes-apiserver.service" ];
serviceConfig = {
ExecStart = ''${cfg.package}/bin/kube-scheduler \
--address=${cfg.scheduler.address} \
Expand All @@ -487,7 +487,7 @@ in {
systemd.services.kube-controller-manager = {
description = "Kubernetes Controller Manager Service";
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" "kubernetes-apiserver.service" ];
after = [ "network.target" "kubernetes-apiserver.service" ];
serviceConfig = {
ExecStart = ''${cfg.package}/bin/kube-controller-manager \
--address=${cfg.controllerManager.address} \
Expand All @@ -511,7 +511,7 @@ in {
description = "Kubernetes Kubelet Service";
wantedBy = [ "multi-user.target" ];
requires = ["kubernetes-setup.service"];
after = [ "network-interfaces.target" "etcd.service" "docker.service" ];
after = [ "network.target" "etcd.service" "docker.service" "kubernetes-setup.service" ];
path = [ pkgs.gitMinimal pkgs.openssh ];
script = ''
export PATH="/bin:/sbin:/usr/bin:/usr/sbin:$PATH"
Expand Down Expand Up @@ -542,7 +542,7 @@ in {
systemd.services.kube-proxy = {
description = "Kubernetes Proxy Service";
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" "etcd.service" ];
after = [ "network.target" "etcd.service" ];
serviceConfig = {
ExecStart = ''${cfg.package}/bin/kube-proxy \
--master=${cfg.proxy.master} \
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/databases/cassandra.nix
Original file line number Diff line number Diff line change
Expand Up @@ -377,7 +377,7 @@ in {
systemd.services.cassandra = {
description = "Cassandra Daemon";
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" ];
after = [ "network.target" ];
environment = cassandraEnvironment;
restartTriggers = [ cassandraConfFile cassandraLogFile cassandraRackFile ];
serviceConfig = {
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/databases/influxdb.nix
Original file line number Diff line number Diff line change
Expand Up @@ -160,7 +160,7 @@ in
systemd.services.influxdb = {
description = "InfluxDB Server";
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" ];
after = [ "network.target" ];
serviceConfig = {
ExecStart = ''${cfg.package}/bin/influxd -config "${configFile}"'';
User = "${cfg.user}";
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/databases/neo4j.nix
Original file line number Diff line number Diff line change
Expand Up @@ -123,7 +123,7 @@ in {
systemd.services.neo4j = {
description = "Neo4j Daemon";
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" ];
after = [ "network.target" ];
environment = { NEO4J_INSTANCE = cfg.dataDir; };
serviceConfig = {
ExecStart = "${cfg.package}/bin/neo4j console";
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/misc/apache-kafka.nix
Original file line number Diff line number Diff line change
Expand Up @@ -139,7 +139,7 @@ in {
systemd.services.apache-kafka = {
description = "Apache Kafka Daemon";
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" ];
after = [ "network.target" ];
serviceConfig = {
ExecStart = ''
${pkgs.jre}/bin/java \
Expand Down
10 changes: 8 additions & 2 deletions nixos/modules/services/misc/etcd.nix
Original file line number Diff line number Diff line change
Expand Up @@ -143,9 +143,9 @@ in {

config = mkIf cfg.enable {
systemd.services.etcd = {
description = "Etcd Daemon";
description = "etcd key-value store";
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" ];
after = [ "network.target" ];

environment = (filterAttrs (n: v: v != null) {
ETCD_NAME = cfg.name;
Expand All @@ -168,12 +168,18 @@ in {
ETCD_INITIAL_CLUSTER_TOKEN = cfg.initialClusterToken;
}) // (mapAttrs' (n: v: nameValuePair "ETCD_${n}" v) cfg.extraConf);

unitConfig = {
Documentation = "https://github.com/coreos/etcd";
};

serviceConfig = {
Type = "notify";
ExecStart = "${pkgs.etcd.bin}/bin/etcd";
User = "etcd";
PermissionsStartOnly = true;
LimitNOFILE = 40000;
};

preStart = ''
mkdir -m 0700 -p ${cfg.dataDir}
if [ "$(id -u)" = 0 ]; then chown etcd ${cfg.dataDir}; fi
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/misc/folding-at-home.nix
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ in {
};

systemd.services.foldingathome = {
after = [ "network-interfaces.target" ];
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
preStart = ''
mkdir -m 0755 -p ${stateDir}
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/misc/mesos-master.nix
Original file line number Diff line number Diff line change
Expand Up @@ -80,7 +80,7 @@ in {
systemd.services.mesos-master = {
description = "Mesos Master";
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" ];
after = [ "network.target" ];
serviceConfig = {
ExecStart = ''
${pkgs.mesos}/bin/mesos-master \
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/misc/mesos-slave.nix
Original file line number Diff line number Diff line change
Expand Up @@ -105,7 +105,7 @@ in {
systemd.services.mesos-slave = {
description = "Mesos Slave";
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" ];
after = [ "network.target" ];
environment.MESOS_CONTAINERIZERS = concatStringsSep "," containerizers;
serviceConfig = {
ExecStart = ''
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/misc/svnserve.nix
Original file line number Diff line number Diff line change
Expand Up @@ -35,7 +35,7 @@ in

config = mkIf cfg.enable {
systemd.services.svnserve = {
after = [ "network-interfaces.target" ];
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
preStart = "mkdir -p ${cfg.svnBaseDir}";
script = "${pkgs.subversion.out}/bin/svnserve -r ${cfg.svnBaseDir} -d --foreground --pid-file=/var/run/svnserve.pid";
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/misc/zookeeper.nix
Original file line number Diff line number Diff line change
Expand Up @@ -113,7 +113,7 @@ in {
systemd.services.zookeeper = {
description = "Zookeeper Daemon";
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" ];
after = [ "network.target" ];
environment = { ZOOCFGDIR = configDir; };
serviceConfig = {
ExecStart = ''
Expand Down
14 changes: 7 additions & 7 deletions nixos/modules/services/monitoring/graphite.nix
Original file line number Diff line number Diff line change
Expand Up @@ -387,7 +387,7 @@ in {
systemd.services.carbonCache = let name = "carbon-cache"; in {
description = "Graphite Data Storage Backend";
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" ];
after = [ "network.target" ];
environment = carbonEnv;
serviceConfig = {
ExecStart = "${pkgs.pythonPackages.twisted}/bin/twistd ${carbonOpts name}";
Expand All @@ -410,7 +410,7 @@ in {
enable = cfg.carbon.enableAggregator;
description = "Carbon Data Aggregator";
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" ];
after = [ "network.target" ];
environment = carbonEnv;
serviceConfig = {
ExecStart = "${pkgs.pythonPackages.twisted}/bin/twistd ${carbonOpts name}";
Expand All @@ -426,7 +426,7 @@ in {
systemd.services.carbonRelay = let name = "carbon-relay"; in {
description = "Carbon Data Relay";
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" ];
after = [ "network.target" ];
environment = carbonEnv;
serviceConfig = {
ExecStart = "${pkgs.pythonPackages.twisted}/bin/twistd ${carbonOpts name}";
Expand All @@ -448,7 +448,7 @@ in {
systemd.services.graphiteWeb = {
description = "Graphite Web Interface";
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" ];
after = [ "network.target" ];
path = [ pkgs.perl ];
environment = {
PYTHONPATH = let
Expand Down Expand Up @@ -501,7 +501,7 @@ in {
systemd.services.graphiteApi = {
description = "Graphite Api Interface";
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" ];
after = [ "network.target" ];
environment = {
PYTHONPATH = let
aenv = pkgs.python.buildEnv.override {
Expand Down Expand Up @@ -538,7 +538,7 @@ in {
systemd.services.seyren = {
description = "Graphite Alerting Dashboard";
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" "mongodb.service" ];
after = [ "network.target" "mongodb.service" ];
environment = seyrenConfig;
serviceConfig = {
ExecStart = "${pkgs.seyren}/bin/seyren -httpPort ${toString cfg.seyren.port}";
Expand All @@ -561,7 +561,7 @@ in {
systemd.services.graphitePager = {
description = "Graphite Pager Alerting Daemon";
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" "redis.service" ];
after = [ "network.target" "redis.service" ];
environment = {
REDIS_URL = cfg.pager.redisUrl;
GRAPHITE_URL = cfg.pager.graphiteUrl;
Expand Down
13 changes: 9 additions & 4 deletions nixos/modules/services/monitoring/monit.nix
Original file line number Diff line number Diff line change
Expand Up @@ -36,11 +36,16 @@ in
];

systemd.services.monit = {
description = "Monit system watcher";
after = [ "network-interfaces.target" ];
description = "Pro-active monitoring utility for unix systems";
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

While this is a good description, what monit does it obscures the name if on the boot screen "Pro-active monitoring utility for unix systems started" appears.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Sorry, I don't understand the problem? Is it that it doesn't mention the name of the unit being started?

Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

yes.

after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
script = "${pkgs.monit}/bin/monit -I -c /etc/monit.conf";
serviceConfig.Restart = "always";
serviceConfig = {
ExecStart = "${pkgs.monit}/bin/monit -I -c /etc/monit.conf";
ExecStop = "${pkgs.monit}/bin/monit -c /etc/monit.conf quit";
ExecReload = "${pkgs.monit}/bin/monit -c /etc/monit.conf reload";
KillMode = "process";
Restart = "always";
};
};
};
}
2 changes: 1 addition & 1 deletion nixos/modules/services/monitoring/nagios.nix
Original file line number Diff line number Diff line change
Expand Up @@ -163,7 +163,7 @@ in
description = "Nagios monitoring daemon";
path = [ pkgs.nagios ];
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" ];
after = [ "network.target" ];

serviceConfig = {
User = "nagios";
Expand Down
Original file line number Diff line number Diff line change
Expand Up @@ -75,7 +75,7 @@ in
systemd.services.afsd = {
description = "AFS client";
wantedBy = [ "multi-user.target" ];
after = [ "network-interfaces.target" ];
after = [ "network.target" ];

preStart = ''
mkdir -p -m 0755 /afs
Expand Down
5 changes: 3 additions & 2 deletions nixos/modules/services/networking/bind.nix
Original file line number Diff line number Diff line change
Expand Up @@ -145,8 +145,8 @@ in
};

systemd.services.bind = {
description = "BIND name server job";
after = [ "network-interfaces.target" ];
description = "BIND Domain Name Server";
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];

preStart = ''
Expand All @@ -155,6 +155,7 @@ in
'';

script = "${pkgs.bind.bin}/sbin/named -u ${bindUser} ${optionalString cfg.ipv4Only "-4"} -c ${cfg.configFile} -f";
unitConfig.Documentation = "man:named(8)";
};
};
}
6 changes: 3 additions & 3 deletions nixos/modules/services/networking/cjdns.nix
Original file line number Diff line number Diff line change
Expand Up @@ -208,9 +208,9 @@ in
# networking.firewall.allowedUDPPorts = ...

systemd.services.cjdns = {
description = "encrypted networking for everybody";
wantedBy = [ "network.target" ];
after = [ "networkSetup.service" "network-interfaces.target" ];
description = "cjdns: routing engine designed for security, scalability, speed and ease of use";
wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];

preStart = if cfg.confFile != "" then "" else ''
[ -e /etc/cjdns.keys ] && source /etc/cjdns.keys
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/networking/dhcpcd.nix
Original file line number Diff line number Diff line change
Expand Up @@ -158,8 +158,8 @@ in
{ description = "DHCP Client";

wantedBy = [ "multi-user.target" ];
after = [ "network.target" ];
wants = [ "network.target" ];
before = [ "network.target" ];

# Stopping dhcpcd during a reconfiguration is undesirable
# because it brings down the network interfaces configured by
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/networking/gvpe.nix
Original file line number Diff line number Diff line change
Expand Up @@ -105,7 +105,7 @@ in
config = mkIf cfg.enable {
systemd.services.gvpe = {
description = "GNU Virtual Private Ethernet node";
after = [ "network-interfaces.target" ];
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];

preStart = ''
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/networking/nat.nix
Original file line number Diff line number Diff line change
Expand Up @@ -171,7 +171,7 @@ in
systemd.services = mkIf (!config.networking.firewall.enable) { nat = {
description = "Network Address Translation";
wantedBy = [ "network.target" ];
after = [ "network-interfaces.target" "systemd-modules-load.service" ];
after = [ "network-pre.target" "systemd-modules-load.service" ];
path = [ pkgs.iptables ];
unitConfig.ConditionCapability = "CAP_NET_ADMIN";

Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/networking/oidentd.nix
Original file line number Diff line number Diff line change
Expand Up @@ -25,7 +25,7 @@ with lib;

config = mkIf config.services.oidentd.enable {
systemd.services.oidentd = {
after = [ "network-interfaces.target" ];
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
serviceConfig.Type = "forking";
script = "${pkgs.oidentd}/sbin/oidentd -u oidentd -g nogroup" +
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/networking/openvpn.nix
Original file line number Diff line number Diff line change
Expand Up @@ -56,7 +56,7 @@ let
description = "OpenVPN instance ‘${name}’";

wantedBy = optional cfg.autoStart "multi-user.target";
after = [ "network-interfaces.target" ];
after = [ "network.target" ];

path = [ pkgs.iptables pkgs.iproute pkgs.nettools ];

Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/networking/radicale.nix
Original file line number Diff line number Diff line change
Expand Up @@ -50,7 +50,7 @@ in

systemd.services.radicale = {
description = "A Simple Calendar and Contact Server";
after = [ "network-interfaces.target" ];
after = [ "network.target" ];
wantedBy = [ "multi-user.target" ];
script = "${pkgs.pythonPackages.radicale}/bin/radicale -C ${confFile} -f";
serviceConfig.User = "radicale";
Expand Down
16 changes: 9 additions & 7 deletions nixos/modules/services/networking/softether.nix
Original file line number Diff line number Diff line change
Expand Up @@ -63,7 +63,6 @@ in
];
systemd.services."softether-init" = {
description = "SoftEther VPN services initial task";
wantedBy = [ "network-interfaces.target" ];
serviceConfig = {
Type = "oneshot";
RemainAfterExit = false;
Expand All @@ -84,8 +83,9 @@ in
(mkIf (cfg.vpnserver.enable) {
systemd.services.vpnserver = {
description = "SoftEther VPN Server";
after = [ "softether-init.service" ];
wantedBy = [ "network-interfaces.target" ];
after = [ "softether-init.service" "network.target" ];
wants = [ "softether-init.service" ];
wantedBy = [ "multi-user.target" ];
serviceConfig = {
Type = "forking";
ExecStart = "${pkg}/bin/vpnserver start";
Expand All @@ -104,8 +104,9 @@ in
(mkIf (cfg.vpnbridge.enable) {
systemd.services.vpnbridge = {
description = "SoftEther VPN Bridge";
after = [ "softether-init.service" ];
wantedBy = [ "network-interfaces.target" ];
after = [ "softether-init.service" "network.target" ];
wants = [ "softether-init.service" ];
wantedBy = [ "multi-user.target" ];
serviceConfig = {
Type = "forking";
ExecStart = "${pkg}/bin/vpnbridge start";
Expand All @@ -124,8 +125,9 @@ in
(mkIf (cfg.vpnclient.enable) {
systemd.services.vpnclient = {
description = "SoftEther VPN Client";
after = [ "softether-init.service" ];
wantedBy = [ "network-interfaces.target" ];
after = [ "softether-init.service" "network.target" ];
wants = [ "softether-init.service" ];
wantedBy = [ "multi-user.target" ];
serviceConfig = {
Type = "forking";
ExecStart = "${pkg}/bin/vpnclient start";
Expand Down
2 changes: 1 addition & 1 deletion nixos/modules/services/networking/ssh/lshd.nix
Original file line number Diff line number Diff line change
Expand Up @@ -120,7 +120,7 @@ in
systemd.services.lshd = {
description = "GNU lshd SSH2 daemon";

after = [ "network-interfaces.target" ];
after = [ "network.target" ];

wantedBy = [ "multi-user.target" ];

Expand Down
Loading