summaryrefslogtreecommitdiff
path: root/nixos/modules/services
diff options
context:
space:
mode:
authorEthel Morgan <eth@ethulhu.co.uk>2020-06-30 16:30:32 +0100
committerEthel Morgan <eth@ethulhu.co.uk>2020-06-30 16:30:32 +0100
commitada2aad995e0f9aa04088b4ef212690b0e9ab29e (patch)
tree6a2cf02505a022ca9ccda1907ff60c67363e1662 /nixos/modules/services
parent691e8ab6ee00bbfad5cc207ad09a9b78d4ef9958 (diff)
update various pkgs.eth.catbus-*
Diffstat (limited to '')
-rw-r--r--nixos/modules/services/catbus-lgtv.nix4
-rw-r--r--nixos/modules/services/catbus-networkpresence.nix2
2 files changed, 3 insertions, 3 deletions
diff --git a/nixos/modules/services/catbus-lgtv.nix b/nixos/modules/services/catbus-lgtv.nix
index 9b2af13..2744e6d 100644
--- a/nixos/modules/services/catbus-lgtv.nix
+++ b/nixos/modules/services/catbus-lgtv.nix
@@ -85,7 +85,7 @@ in {
serviceConfig = {
DynamicUser = true;
- ExecStart = "${pkgs.eth.catbus-lgtv}/bin/catbus-actuator-lgtv --config-path ${configJSON}";
+ ExecStart = "${pkgs.eth.catbus-lgtv}/bin/catbus-lgtv-actuator --config-path ${configJSON}";
NoNewPrivileges = true;
ProtectKernelTunables = true;
@@ -105,7 +105,7 @@ in {
serviceConfig = {
DynamicUser = true;
- ExecStart = "${pkgs.eth.catbus-lgtv}/bin/catbus-observer-lgtv --config-path ${configJSON}";
+ ExecStart = "${pkgs.eth.catbus-lgtv}/bin/catbus-lgtv-observer --config-path ${configJSON}";
NoNewPrivileges = true;
ProtectKernelTunables = true;
diff --git a/nixos/modules/services/catbus-networkpresence.nix b/nixos/modules/services/catbus-networkpresence.nix
index e69550c..5f5ff29 100644
--- a/nixos/modules/services/catbus-networkpresence.nix
+++ b/nixos/modules/services/catbus-networkpresence.nix
@@ -68,7 +68,7 @@ in {
DynamicUser = true;
AmbientCapabilities = "CAP_NET_RAW CAP_NET_ADMIN";
- ExecStart = "${pkgs.eth.catbus-networkpresence}/bin/catbus-observer-networkpresence --config-path ${configJSON} --interface ${cfg.interface}";
+ ExecStart = "${pkgs.eth.catbus-networkpresence}/bin/catbus-networkpresence-observer --config-path ${configJSON} --interface ${cfg.interface}";
NoNewPrivileges = true;
ProtectKernelTunables = true;