fixed systemd sandboxing

This commit is contained in:
2026-03-30 12:59:54 -04:00
parent 93fc700fa2
commit 26e4620f8f
3 changed files with 16 additions and 10 deletions

View File

@@ -5,6 +5,10 @@ in
{
networking.firewall.allowedTCPPorts = [ 5432 ];
# Symlink pg_wal to a ZFS dataset on the special (metadata) vdev for fast WAL writes
# this is required for systemd sandboxing
systemd.services.postgresql.serviceConfig.ReadWritePaths = [ "/zfs/media/database/postgres-wal" ];
services.postgresql = {
enable = true;
package = pkgs.postgresql_17_jit;