nixpkgs/nixos/modules/services/misc/gitea.nix

Ignoring revisions in .git-blame-ignore-revs. Click here to bypass and see the normal blame view.

665 lines
23 KiB
Nix
Raw Normal View History

{ config, lib, options, pkgs, ... }:
2017-10-18 04:16:46 +00:00
with lib;
let
cfg = config.services.gitea;
opt = options.services.gitea;
exe = lib.getExe cfg.package;
pg = config.services.postgresql;
useMysql = cfg.database.type == "mysql";
usePostgresql = cfg.database.type == "postgres";
useSqlite = cfg.database.type == "sqlite3";
format = pkgs.formats.ini { };
2017-10-18 04:16:46 +00:00
configFile = pkgs.writeText "app.ini" ''
APP_NAME = ${cfg.appName}
RUN_USER = ${cfg.user}
RUN_MODE = prod
2020-04-23 21:53:18 +00:00
${generators.toINI {} cfg.settings}
${optionalString (cfg.extraConfig != null) cfg.extraConfig}
2017-10-18 04:16:46 +00:00
'';
in
{
imports = [
(mkRenamedOptionModule [ "services" "gitea" "cookieSecure" ] [ "services" "gitea" "settings" "session" "COOKIE_SECURE" ])
(mkRenamedOptionModule [ "services" "gitea" "disableRegistration" ] [ "services" "gitea" "settings" "service" "DISABLE_REGISTRATION" ])
(mkRenamedOptionModule [ "services" "gitea" "log" "level" ] [ "services" "gitea" "settings" "log" "LEVEL" ])
(mkRenamedOptionModule [ "services" "gitea" "log" "rootPath" ] [ "services" "gitea" "settings" "log" "ROOT_PATH" ])
(mkRenamedOptionModule [ "services" "gitea" "ssh" "clonePort" ] [ "services" "gitea" "settings" "server" "SSH_PORT" ])
(mkRemovedOptionModule [ "services" "gitea" "ssh" "enable" ] "services.gitea.ssh.enable has been migrated into freeform setting services.gitea.settings.server.DISABLE_SSH. Keep in mind that the setting is inverted")
];
2017-10-18 04:16:46 +00:00
options = {
services.gitea = {
enable = mkOption {
default = false;
type = types.bool;
description = lib.mdDoc "Enable Gitea Service.";
2017-10-18 04:16:46 +00:00
};
package = mkOption {
default = pkgs.gitea;
type = types.package;
defaultText = literalExpression "pkgs.gitea";
description = lib.mdDoc "gitea derivation to use";
};
2017-10-18 04:16:46 +00:00
useWizard = mkOption {
default = false;
type = types.bool;
description = lib.mdDoc "Do not generate a configuration and use gitea' installation wizard instead. The first registered user will be administrator.";
2017-10-18 04:16:46 +00:00
};
stateDir = mkOption {
default = "/var/lib/gitea";
type = types.str;
description = lib.mdDoc "gitea data directory.";
2017-10-18 04:16:46 +00:00
};
user = mkOption {
type = types.str;
default = "gitea";
description = lib.mdDoc "User account under which gitea runs.";
2017-10-18 04:16:46 +00:00
};
database = {
type = mkOption {
type = types.enum [ "sqlite3" "mysql" "postgres" ];
example = "mysql";
default = "sqlite3";
description = lib.mdDoc "Database engine to use.";
2017-10-18 04:16:46 +00:00
};
host = mkOption {
type = types.str;
default = "127.0.0.1";
description = lib.mdDoc "Database host address.";
2017-10-18 04:16:46 +00:00
};
port = mkOption {
2021-06-18 15:27:06 +00:00
type = types.port;
2022-05-19 20:16:44 +00:00
default = if !usePostgresql then 3306 else pg.port;
defaultText = literalExpression ''
if config.${opt.database.type} != "postgresql"
then 3306
else config.${options.services.postgresql.port}
'';
description = lib.mdDoc "Database host port.";
2017-10-18 04:16:46 +00:00
};
name = mkOption {
type = types.str;
default = "gitea";
description = lib.mdDoc "Database name.";
2017-10-18 04:16:46 +00:00
};
user = mkOption {
type = types.str;
default = "gitea";
description = lib.mdDoc "Database user.";
2017-10-18 04:16:46 +00:00
};
password = mkOption {
type = types.str;
default = "";
description = lib.mdDoc ''
The password corresponding to {option}`database.user`.
2017-10-18 04:16:46 +00:00
Warning: this is stored in cleartext in the Nix store!
Use {option}`database.passwordFile` instead.
2017-10-18 04:16:46 +00:00
'';
};
passwordFile = mkOption {
type = types.nullOr types.path;
default = null;
example = "/run/keys/gitea-dbpassword";
description = lib.mdDoc ''
2017-10-18 04:16:46 +00:00
A file containing the password corresponding to
{option}`database.user`.
2017-10-18 04:16:46 +00:00
'';
};
socket = mkOption {
type = types.nullOr types.path;
default = if (cfg.database.createDatabase && usePostgresql) then "/run/postgresql" else if (cfg.database.createDatabase && useMysql) then "/run/mysqld/mysqld.sock" else null;
defaultText = literalExpression "null";
example = "/run/mysqld/mysqld.sock";
description = lib.mdDoc "Path to the unix socket file to use for authentication.";
};
2017-10-18 04:16:46 +00:00
path = mkOption {
type = types.str;
default = "${cfg.stateDir}/data/gitea.db";
defaultText = literalExpression ''"''${config.${opt.stateDir}}/data/gitea.db"'';
description = lib.mdDoc "Path to the sqlite3 database file.";
2017-10-18 04:16:46 +00:00
};
createDatabase = mkOption {
type = types.bool;
default = true;
description = lib.mdDoc "Whether to create a local database automatically.";
};
2017-10-18 04:16:46 +00:00
};
dump = {
enable = mkOption {
type = types.bool;
default = false;
description = lib.mdDoc ''
Enable a timer that runs gitea dump to generate backup-files of the
current gitea database and repositories.
'';
};
interval = mkOption {
type = types.str;
default = "04:31";
example = "hourly";
description = lib.mdDoc ''
Run a gitea dump at this interval. Runs by default at 04:31 every day.
The format is described in
{manpage}`systemd.time(7)`.
'';
};
2020-07-30 21:04:23 +00:00
backupDir = mkOption {
type = types.str;
default = "${cfg.stateDir}/dump";
defaultText = literalExpression ''"''${config.${opt.stateDir}}/dump"'';
description = lib.mdDoc "Path to the dump files.";
2020-07-30 21:04:23 +00:00
};
type = mkOption {
type = types.enum [ "zip" "rar" "tar" "sz" "tar.gz" "tar.xz" "tar.bz2" "tar.br" "tar.lz4" "tar.zst" ];
default = "zip";
description = lib.mdDoc "Archive format used to store the dump file.";
};
file = mkOption {
type = types.nullOr types.str;
default = null;
2022-12-18 00:31:14 +00:00
description = lib.mdDoc "Filename to be used for the dump. If `null` a default name is chosen by gitea.";
example = "gitea-dump";
};
};
2020-08-02 17:32:17 +00:00
lfs = {
enable = mkOption {
type = types.bool;
default = false;
description = lib.mdDoc "Enables git-lfs support.";
2020-08-02 17:32:17 +00:00
};
contentDir = mkOption {
type = types.str;
default = "${cfg.stateDir}/data/lfs";
defaultText = literalExpression ''"''${config.${opt.stateDir}}/data/lfs"'';
description = lib.mdDoc "Where to store LFS files.";
2020-08-02 17:32:17 +00:00
};
};
2017-10-18 04:16:46 +00:00
appName = mkOption {
type = types.str;
default = "gitea: Gitea Service";
description = lib.mdDoc "Application name.";
2017-10-18 04:16:46 +00:00
};
repositoryRoot = mkOption {
type = types.str;
default = "${cfg.stateDir}/repositories";
defaultText = literalExpression ''"''${config.${opt.stateDir}}/repositories"'';
description = lib.mdDoc "Path to the git repositories.";
2017-10-18 04:16:46 +00:00
};
domain = mkOption {
type = types.str;
default = "localhost";
description = lib.mdDoc "Domain name of your server.";
2017-10-18 04:16:46 +00:00
};
rootUrl = mkOption {
type = types.str;
default = "http://localhost:3000/";
description = lib.mdDoc "Full public URL of gitea server.";
2017-10-18 04:16:46 +00:00
};
httpAddress = mkOption {
type = types.str;
default = "0.0.0.0";
description = lib.mdDoc "HTTP listen address.";
2017-10-18 04:16:46 +00:00
};
httpPort = mkOption {
type = types.port;
2017-10-18 04:16:46 +00:00
default = 3000;
description = lib.mdDoc "HTTP listen port.";
2017-10-18 04:16:46 +00:00
};
enableUnixSocket = mkOption {
type = types.bool;
default = false;
description = lib.mdDoc "Configure Gitea to listen on a unix socket instead of the default TCP port.";
};
2017-10-18 04:16:46 +00:00
staticRootPath = mkOption {
type = types.either types.str types.path;
default = cfg.package.data;
defaultText = literalExpression "package.data";
2017-10-18 04:16:46 +00:00
example = "/var/lib/gitea/data";
description = lib.mdDoc "Upper level of template and static files path.";
2017-10-18 04:16:46 +00:00
};
mailerPasswordFile = mkOption {
type = types.nullOr types.str;
default = null;
example = "/var/lib/secrets/gitea/mailpw";
description = lib.mdDoc "Path to a file containing the SMTP password.";
};
2020-04-23 21:53:18 +00:00
settings = mkOption {
default = {};
description = lib.mdDoc ''
Gitea configuration. Refer to <https://docs.gitea.io/en-us/config-cheat-sheet/>
2020-04-23 21:53:18 +00:00
for details on supported values.
'';
example = literalExpression ''
2020-04-23 21:53:18 +00:00
{
"cron.sync_external_users" = {
RUN_AT_START = true;
SCHEDULE = "@every 24h";
UPDATE_EXISTING = true;
};
mailer = {
ENABLED = true;
MAILER_TYPE = "sendmail";
FROM = "do-not-reply@example.org";
SENDMAIL_PATH = "''${pkgs.system-sendmail}/bin/sendmail";
2020-04-23 21:53:18 +00:00
};
other = {
SHOW_FOOTER_VERSION = false;
};
}
'';
type = with types; submodule {
freeformType = format.type;
options = {
log = {
ROOT_PATH = mkOption {
default = "${cfg.stateDir}/log";
defaultText = literalExpression ''"''${config.${opt.stateDir}}/log"'';
type = types.str;
description = lib.mdDoc "Root path for log files.";
};
LEVEL = mkOption {
default = "Info";
type = types.enum [ "Trace" "Debug" "Info" "Warn" "Error" "Critical" ];
description = lib.mdDoc "General log level.";
};
};
server = {
DISABLE_SSH = mkOption {
type = types.bool;
default = false;
description = lib.mdDoc "Disable external SSH feature.";
};
SSH_PORT = mkOption {
type = types.port;
default = 22;
example = 2222;
description = lib.mdDoc ''
SSH port displayed in clone URL.
The option is required to configure a service when the external visible port
differs from the local listening port i.e. if port forwarding is used.
'';
};
};
service = {
DISABLE_REGISTRATION = mkEnableOption (lib.mdDoc "the registration lock") // {
description = lib.mdDoc ''
By default any user can create an account on this `gitea` instance.
This can be disabled by using this option.
*Note:* please keep in mind that this should be added after the initial
deploy unless [](#opt-services.gitea.useWizard)
is `true` as the first registered user will be the administrator if
no install wizard is used.
'';
};
};
session = {
COOKIE_SECURE = mkOption {
type = types.bool;
default = false;
description = lib.mdDoc ''
Marks session cookies as "secure" as a hint for browsers to only send
them via HTTPS. This option is recommend, if gitea is being served over HTTPS.
'';
};
};
};
};
2020-04-23 21:53:18 +00:00
};
2017-10-18 04:16:46 +00:00
extraConfig = mkOption {
2020-04-23 21:53:18 +00:00
type = with types; nullOr str;
default = null;
description = lib.mdDoc "Configuration lines appended to the generated gitea configuration file.";
2017-10-18 04:16:46 +00:00
};
};
};
config = mkIf cfg.enable {
assertions = [
{ assertion = cfg.database.createDatabase -> useSqlite || cfg.database.user == cfg.user;
message = "services.gitea.database.user must match services.gitea.user if the database is to be automatically provisioned";
}
];
2020-04-23 21:53:18 +00:00
services.gitea.settings = {
"cron.update_checker".ENABLED = lib.mkDefault false;
2020-04-23 21:53:18 +00:00
database = mkMerge [
{
DB_TYPE = cfg.database.type;
}
(mkIf (useMysql || usePostgresql) {
HOST = if cfg.database.socket != null then cfg.database.socket else cfg.database.host + ":" + toString cfg.database.port;
NAME = cfg.database.name;
USER = cfg.database.user;
PASSWD = "#dbpass#";
})
(mkIf useSqlite {
PATH = cfg.database.path;
})
(mkIf usePostgresql {
SSL_MODE = "disable";
})
];
repository = {
ROOT = cfg.repositoryRoot;
};
server = mkMerge [
{
DOMAIN = cfg.domain;
2021-10-05 10:25:28 +00:00
STATIC_ROOT_PATH = toString cfg.staticRootPath;
LFS_JWT_SECRET = "#lfsjwtsecret#";
ROOT_URL = cfg.rootUrl;
}
(mkIf cfg.enableUnixSocket {
PROTOCOL = "http+unix";
HTTP_ADDR = "/run/gitea/gitea.sock";
})
(mkIf (!cfg.enableUnixSocket) {
HTTP_ADDR = cfg.httpAddress;
HTTP_PORT = cfg.httpPort;
})
2020-08-02 17:32:17 +00:00
(mkIf cfg.lfs.enable {
LFS_START_SERVER = true;
})
];
2020-04-23 21:53:18 +00:00
session = {
COOKIE_NAME = lib.mkDefault "session";
2020-04-23 21:53:18 +00:00
};
security = {
SECRET_KEY = "#secretkey#";
INTERNAL_TOKEN = "#internaltoken#";
2020-04-23 21:53:18 +00:00
INSTALL_LOCK = true;
};
mailer = mkIf (cfg.mailerPasswordFile != null) {
PASSWD = "#mailerpass#";
};
oauth2 = {
JWT_SECRET = "#oauth2jwtsecret#";
};
lfs = mkIf (cfg.lfs.enable) {
PATH = cfg.lfs.contentDir;
};
2020-04-23 21:53:18 +00:00
};
services.postgresql = optionalAttrs (usePostgresql && cfg.database.createDatabase) {
enable = mkDefault true;
ensureDatabases = [ cfg.database.name ];
ensureUsers = [
{ name = cfg.database.user;
ensurePermissions = { "DATABASE ${cfg.database.name}" = "ALL PRIVILEGES"; };
}
];
};
services.mysql = optionalAttrs (useMysql && cfg.database.createDatabase) {
enable = mkDefault true;
package = mkDefault pkgs.mariadb;
ensureDatabases = [ cfg.database.name ];
ensureUsers = [
{ name = cfg.database.user;
ensurePermissions = { "${cfg.database.name}.*" = "ALL PRIVILEGES"; };
}
];
};
2017-10-18 04:16:46 +00:00
systemd.tmpfiles.rules = [
2020-07-30 21:04:23 +00:00
"d '${cfg.dump.backupDir}' 0750 ${cfg.user} gitea - -"
"z '${cfg.dump.backupDir}' 0750 ${cfg.user} gitea - -"
"Z '${cfg.dump.backupDir}' - ${cfg.user} gitea - -"
2020-08-02 17:32:17 +00:00
"d '${cfg.lfs.contentDir}' 0750 ${cfg.user} gitea - -"
"z '${cfg.lfs.contentDir}' 0750 ${cfg.user} gitea - -"
"Z '${cfg.lfs.contentDir}' - ${cfg.user} gitea - -"
"d '${cfg.repositoryRoot}' 0750 ${cfg.user} gitea - -"
"z '${cfg.repositoryRoot}' 0750 ${cfg.user} gitea - -"
"Z '${cfg.repositoryRoot}' - ${cfg.user} gitea - -"
"d '${cfg.stateDir}' 0750 ${cfg.user} gitea - -"
"d '${cfg.stateDir}/conf' 0750 ${cfg.user} gitea - -"
"d '${cfg.stateDir}/custom' 0750 ${cfg.user} gitea - -"
"d '${cfg.stateDir}/custom/conf' 0750 ${cfg.user} gitea - -"
"d '${cfg.stateDir}/data' 0750 ${cfg.user} gitea - -"
"d '${cfg.stateDir}/log' 0750 ${cfg.user} gitea - -"
"z '${cfg.stateDir}' 0750 ${cfg.user} gitea - -"
"z '${cfg.stateDir}/.ssh' 0700 ${cfg.user} gitea - -"
"z '${cfg.stateDir}/conf' 0750 ${cfg.user} gitea - -"
"z '${cfg.stateDir}/custom' 0750 ${cfg.user} gitea - -"
"z '${cfg.stateDir}/custom/conf' 0750 ${cfg.user} gitea - -"
"z '${cfg.stateDir}/data' 0750 ${cfg.user} gitea - -"
"z '${cfg.stateDir}/log' 0750 ${cfg.user} gitea - -"
"Z '${cfg.stateDir}' - ${cfg.user} gitea - -"
# If we have a folder or symlink with gitea locales, remove it
# And symlink the current gitea locales in place
"L+ '${cfg.stateDir}/conf/locale' - - - - ${cfg.package.out}/locale"
];
2017-10-18 04:16:46 +00:00
systemd.services.gitea = {
description = "gitea";
after = [ "network.target" ] ++ lib.optional usePostgresql "postgresql.service" ++ lib.optional useMysql "mysql.service";
2017-10-18 04:16:46 +00:00
wantedBy = [ "multi-user.target" ];
path = [ cfg.package pkgs.git pkgs.gnupg ];
2017-10-18 04:16:46 +00:00
# In older versions the secret naming for JWT was kind of confusing.
# The file jwt_secret hold the value for LFS_JWT_SECRET and JWT_SECRET
2022-12-18 00:31:14 +00:00
# wasn't persistent at all.
# To fix that, there is now the file oauth2_jwt_secret containing the
# values for JWT_SECRET and the file jwt_secret gets renamed to
# lfs_jwt_secret.
# We have to consider this to stay compatible with older installations.
2017-10-18 04:16:46 +00:00
preStart = let
runConfig = "${cfg.stateDir}/custom/conf/app.ini";
secretKey = "${cfg.stateDir}/custom/conf/secret_key";
oauth2JwtSecret = "${cfg.stateDir}/custom/conf/oauth2_jwt_secret";
oldLfsJwtSecret = "${cfg.stateDir}/custom/conf/jwt_secret"; # old file for LFS_JWT_SECRET
lfsJwtSecret = "${cfg.stateDir}/custom/conf/lfs_jwt_secret"; # new file for LFS_JWT_SECRET
internalToken = "${cfg.stateDir}/custom/conf/internal_token";
replaceSecretBin = "${pkgs.replace-secret}/bin/replace-secret";
2017-10-18 04:16:46 +00:00
in ''
# copy custom configuration and generate a random secret key if needed
2022-05-19 20:16:44 +00:00
${optionalString (!cfg.useWizard) ''
function gitea_setup {
cp -f ${configFile} ${runConfig}
if [ ! -s ${secretKey} ]; then
${exe} generate secret SECRET_KEY > ${secretKey}
fi
# Migrate LFS_JWT_SECRET filename
if [[ -s ${oldLfsJwtSecret} && ! -s ${lfsJwtSecret} ]]; then
mv ${oldLfsJwtSecret} ${lfsJwtSecret}
fi
if [ ! -s ${oauth2JwtSecret} ]; then
${exe} generate secret JWT_SECRET > ${oauth2JwtSecret}
fi
if [ ! -s ${lfsJwtSecret} ]; then
${exe} generate secret LFS_JWT_SECRET > ${lfsJwtSecret}
fi
if [ ! -s ${internalToken} ]; then
${exe} generate secret INTERNAL_TOKEN > ${internalToken}
fi
chmod u+w '${runConfig}'
${replaceSecretBin} '#secretkey#' '${secretKey}' '${runConfig}'
${replaceSecretBin} '#dbpass#' '${cfg.database.passwordFile}' '${runConfig}'
${replaceSecretBin} '#oauth2jwtsecret#' '${oauth2JwtSecret}' '${runConfig}'
${replaceSecretBin} '#lfsjwtsecret#' '${lfsJwtSecret}' '${runConfig}'
${replaceSecretBin} '#internaltoken#' '${internalToken}' '${runConfig}'
${lib.optionalString (cfg.mailerPasswordFile != null) ''
${replaceSecretBin} '#mailerpass#' '${cfg.mailerPasswordFile}' '${runConfig}'
''}
chmod u-w '${runConfig}'
}
(umask 027; gitea_setup)
2017-10-18 04:16:46 +00:00
''}
# run migrations/init the database
${exe} migrate
2017-10-18 04:16:46 +00:00
# update all hooks' binary paths
${exe} admin regenerate hooks
# update command option in authorized_keys
if [ -r ${cfg.stateDir}/.ssh/authorized_keys ]
then
${exe} admin regenerate keys
fi
2017-10-18 04:16:46 +00:00
'';
serviceConfig = {
Type = "simple";
User = cfg.user;
Group = "gitea";
2017-10-18 04:16:46 +00:00
WorkingDirectory = cfg.stateDir;
ExecStart = "${exe} web --pid /run/gitea/gitea.pid";
2017-10-18 04:16:46 +00:00
Restart = "always";
2020-07-30 21:20:27 +00:00
# Runtime directory and mode
RuntimeDirectory = "gitea";
RuntimeDirectoryMode = "0755";
2020-07-31 12:53:48 +00:00
# Access write directories
2020-08-02 17:32:17 +00:00
ReadWritePaths = [ cfg.dump.backupDir cfg.repositoryRoot cfg.stateDir cfg.lfs.contentDir ];
2020-07-31 12:53:48 +00:00
UMask = "0027";
# Capabilities
CapabilityBoundingSet = "";
# Security
NoNewPrivileges = true;
# Sandboxing
ProtectSystem = "strict";
ProtectHome = true;
2020-07-31 12:53:48 +00:00
PrivateTmp = true;
PrivateDevices = true;
2020-07-31 12:53:48 +00:00
PrivateUsers = true;
ProtectHostname = true;
ProtectClock = true;
ProtectKernelTunables = true;
ProtectKernelModules = true;
2020-07-31 12:53:48 +00:00
ProtectKernelLogs = true;
ProtectControlGroups = true;
2020-07-31 12:53:48 +00:00
RestrictAddressFamilies = [ "AF_UNIX AF_INET AF_INET6" ];
LockPersonality = true;
2020-07-31 12:53:48 +00:00
MemoryDenyWriteExecute = true;
RestrictRealtime = true;
2020-07-31 12:53:48 +00:00
RestrictSUIDSGID = true;
PrivateMounts = true;
2020-07-31 12:53:48 +00:00
# System Call Filtering
SystemCallArchitectures = "native";
SystemCallFilter = "~@clock @cpu-emulation @debug @keyring @module @mount @obsolete @raw-io @reboot @setuid @swap";
2017-10-18 04:16:46 +00:00
};
environment = {
USER = cfg.user;
HOME = cfg.stateDir;
GITEA_WORK_DIR = cfg.stateDir;
};
};
users.users = mkIf (cfg.user == "gitea") {
gitea = {
2017-10-18 04:16:46 +00:00
description = "Gitea Service";
home = cfg.stateDir;
useDefaultShell = true;
group = "gitea";
2019-10-12 20:25:28 +00:00
isSystemUser = true;
2017-10-18 04:16:46 +00:00
};
};
users.groups.gitea = {};
2020-04-23 21:53:18 +00:00
warnings =
optional (cfg.database.password != "") "config.services.gitea.database.password will be stored as plaintext in the Nix store. Use database.passwordFile instead." ++
2020-04-23 21:53:18 +00:00
optional (cfg.extraConfig != null) ''
services.gitea.`extraConfig` is deprecated, please use services.gitea.`settings`.
'';
2017-10-18 04:16:46 +00:00
# Create database passwordFile default when password is configured.
services.gitea.database.passwordFile =
2022-05-19 20:16:44 +00:00
mkDefault (toString (pkgs.writeTextFile {
2017-10-18 04:16:46 +00:00
name = "gitea-database-password";
text = cfg.database.password;
2022-05-19 20:16:44 +00:00
}));
systemd.services.gitea-dump = mkIf cfg.dump.enable {
description = "gitea dump";
after = [ "gitea.service" ];
path = [ cfg.package ];
environment = {
USER = cfg.user;
HOME = cfg.stateDir;
GITEA_WORK_DIR = cfg.stateDir;
};
serviceConfig = {
Type = "oneshot";
User = cfg.user;
ExecStart = "${exe} dump --type ${cfg.dump.type}" + optionalString (cfg.dump.file != null) " --file ${cfg.dump.file}";
2020-07-30 21:04:23 +00:00
WorkingDirectory = cfg.dump.backupDir;
};
};
systemd.timers.gitea-dump = mkIf cfg.dump.enable {
description = "Update timer for gitea-dump";
partOf = [ "gitea-dump.service" ];
wantedBy = [ "timers.target" ];
timerConfig.OnCalendar = cfg.dump.interval;
};
2017-10-18 04:16:46 +00:00
};
meta.maintainers = with lib.maintainers; [ srhb ma27 thehedgeh0g ];
2017-10-18 04:16:46 +00:00
}