Auto restart services on OOM

This commit is contained in:
Henry Hiles 2025-08-23 11:00:06 -04:00
commit 80b9e756d5
No known key found for this signature in database
8 changed files with 30 additions and 7 deletions

View file

@ -5,6 +5,7 @@
... ...
}: { }: {
config = { config = {
systemd.services.caddy.serviceConfig.Restart = lib.mkForce "always";
networking.firewall.allowedTCPPorts = [443]; networking.firewall.allowedTCPPorts = [443];
services.caddy = { services.caddy = {
enable = true; enable = true;

View file

@ -1,8 +1,14 @@
{ {
lib,
pkgs, pkgs,
config, config,
... ...
}: { }: {
systemd.services = {
livekit.serviceConfig.Restart = lib.mkForce "always";
lk-jwt-service.serviceConfig.Restart = lib.mkForce "always";
};
services = let services = let
domain = "call.federated.nexus"; domain = "call.federated.nexus";
in { in {

View file

@ -9,7 +9,15 @@
in { in {
imports = [inputs.lasuite-docs-proxy.nixosModules.default]; imports = [inputs.lasuite-docs-proxy.nixosModules.default];
systemd.services.lasuite-docs-collaboration-server.serviceConfig.EnvironmentFile = cfg.environmentFile; systemd.services = {
lasuite-docs-collaboration-server.serviceConfig = {
EnvironmentFile = cfg.environmentFile;
Restart = "always";
};
lasuite-docs-celery.serviceConfig.Restart = "always";
lasuite-docs.serviceConfig.Restart = "always";
};
services = let services = let
proxySocket = "/var/run/lasuite-docs-proxy/socket"; proxySocket = "/var/run/lasuite-docs-proxy/socket";

View file

@ -1,4 +1,5 @@
{ {
lib,
pkgs, pkgs,
inputs, inputs,
config, config,
@ -67,4 +68,6 @@ in {
caddy.virtualHosts."${domain}".extraConfig = "reverse_proxy 127.0.0.1:${config.services.matrix-ooye.socket}"; caddy.virtualHosts."${domain}".extraConfig = "reverse_proxy 127.0.0.1:${config.services.matrix-ooye.socket}";
}; };
systemd.services.matrix-ooye.serviceConfig.Restart = lib.mkForce "always";
} }

View file

@ -1,7 +1,13 @@
{inputs, ...}: { {
inputs,
lib,
...
}: {
imports = [inputs.grapevine.nixosModules.default]; imports = [inputs.grapevine.nixosModules.default];
networking.firewall.allowedTCPPorts = [8448]; networking.firewall.allowedTCPPorts = [8448];
systemd.services.grapevine.serviceConfig.Restart = lib.mkForce "always";
services = let services = let
domain = "federated.nexus"; domain = "federated.nexus";
subdomain = "matrix.${domain}"; subdomain = "matrix.${domain}";

View file

@ -9,4 +9,6 @@
caddy.authedHosts."redlib.federated.nexus" = with config.services.redlib; "reverse_proxy ${address}:${toString port}"; caddy.authedHosts."redlib.federated.nexus" = with config.services.redlib; "reverse_proxy ${address}:${toString port}";
}; };
systemd.services.redlib.serviceConfig.Restart = "always";
} }

View file

@ -109,7 +109,7 @@
UMask = "007"; UMask = "007";
}; };
in { in {
searx.serviceConfig = commonConfig; searx.serviceConfig = commonConfig // {Restart = "always";};
searx-init.serviceConfig = commonConfig; searx-init.serviceConfig = commonConfig;
}; };
} }

View file

@ -19,10 +19,7 @@
}; };
stylix = { stylix = {
url = "github:danth/stylix"; url = "github:danth/stylix";
inputs = { inputs.nixpkgs.follows = "nixpkgs";
nixpkgs.follows = "nixpkgs";
base16.url = "github:SuperSandro2000/base16.nix/patch-1";
};
}; };
ooye = { ooye = {
url = "git+https://cgit.rory.gay/nix/OOYE-module.git"; url = "git+https://cgit.rory.gay/nix/OOYE-module.git";