610 lines
		
	
	
		
			19 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			610 lines
		
	
	
		
			19 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
| { config, lib, pkgs, ... }:
 | |
| 
 | |
| with lib;
 | |
| 
 | |
| let
 | |
|   cfg = config.services.gitea;
 | |
|   gitea = cfg.package;
 | |
|   pg = config.services.postgresql;
 | |
|   useMysql = cfg.database.type == "mysql";
 | |
|   usePostgresql = cfg.database.type == "postgres";
 | |
|   useSqlite = cfg.database.type == "sqlite3";
 | |
|   configFile = pkgs.writeText "app.ini" ''
 | |
|     APP_NAME = ${cfg.appName}
 | |
|     RUN_USER = ${cfg.user}
 | |
|     RUN_MODE = prod
 | |
| 
 | |
|     ${generators.toINI {} cfg.settings}
 | |
| 
 | |
|     ${optionalString (cfg.extraConfig != null) cfg.extraConfig}
 | |
|   '';
 | |
| in
 | |
| 
 | |
| {
 | |
|   options = {
 | |
|     services.gitea = {
 | |
|       enable = mkOption {
 | |
|         default = false;
 | |
|         type = types.bool;
 | |
|         description = "Enable Gitea Service.";
 | |
|       };
 | |
| 
 | |
|       package = mkOption {
 | |
|         default = pkgs.gitea;
 | |
|         type = types.package;
 | |
|         defaultText = "pkgs.gitea";
 | |
|         description = "gitea derivation to use";
 | |
|       };
 | |
| 
 | |
|       useWizard = mkOption {
 | |
|         default = false;
 | |
|         type = types.bool;
 | |
|         description = "Do not generate a configuration and use gitea' installation wizard instead. The first registered user will be administrator.";
 | |
|       };
 | |
| 
 | |
|       stateDir = mkOption {
 | |
|         default = "/var/lib/gitea";
 | |
|         type = types.str;
 | |
|         description = "gitea data directory.";
 | |
|       };
 | |
| 
 | |
|       log = {
 | |
|         rootPath = mkOption {
 | |
|           default = "${cfg.stateDir}/log";
 | |
|           type = types.str;
 | |
|           description = "Root path for log files.";
 | |
|         };
 | |
|         level = mkOption {
 | |
|           default = "Trace";
 | |
|           type = types.enum [ "Trace" "Debug" "Info" "Warn" "Error" "Critical" ];
 | |
|           description = "General log level.";
 | |
|         };
 | |
|       };
 | |
| 
 | |
|       user = mkOption {
 | |
|         type = types.str;
 | |
|         default = "gitea";
 | |
|         description = "User account under which gitea runs.";
 | |
|       };
 | |
| 
 | |
|       database = {
 | |
|         type = mkOption {
 | |
|           type = types.enum [ "sqlite3" "mysql" "postgres" ];
 | |
|           example = "mysql";
 | |
|           default = "sqlite3";
 | |
|           description = "Database engine to use.";
 | |
|         };
 | |
| 
 | |
|         host = mkOption {
 | |
|           type = types.str;
 | |
|           default = "127.0.0.1";
 | |
|           description = "Database host address.";
 | |
|         };
 | |
| 
 | |
|         port = mkOption {
 | |
|           type = types.int;
 | |
|           default = (if !usePostgresql then 3306 else pg.port);
 | |
|           description = "Database host port.";
 | |
|         };
 | |
| 
 | |
|         name = mkOption {
 | |
|           type = types.str;
 | |
|           default = "gitea";
 | |
|           description = "Database name.";
 | |
|         };
 | |
| 
 | |
|         user = mkOption {
 | |
|           type = types.str;
 | |
|           default = "gitea";
 | |
|           description = "Database user.";
 | |
|         };
 | |
| 
 | |
|         password = mkOption {
 | |
|           type = types.str;
 | |
|           default = "";
 | |
|           description = ''
 | |
|             The password corresponding to <option>database.user</option>.
 | |
|             Warning: this is stored in cleartext in the Nix store!
 | |
|             Use <option>database.passwordFile</option> instead.
 | |
|           '';
 | |
|         };
 | |
| 
 | |
|         passwordFile = mkOption {
 | |
|           type = types.nullOr types.path;
 | |
|           default = null;
 | |
|           example = "/run/keys/gitea-dbpassword";
 | |
|           description = ''
 | |
|             A file containing the password corresponding to
 | |
|             <option>database.user</option>.
 | |
|           '';
 | |
|         };
 | |
| 
 | |
|         socket = mkOption {
 | |
|           type = types.nullOr types.path;
 | |
|           default = if (cfg.database.createDatabase && usePostgresql) then "/run/postgresql" else if (cfg.database.createDatabase && useMysql) then "/run/mysqld/mysqld.sock" else null;
 | |
|           defaultText = "null";
 | |
|           example = "/run/mysqld/mysqld.sock";
 | |
|           description = "Path to the unix socket file to use for authentication.";
 | |
|         };
 | |
| 
 | |
|         path = mkOption {
 | |
|           type = types.str;
 | |
|           default = "${cfg.stateDir}/data/gitea.db";
 | |
|           description = "Path to the sqlite3 database file.";
 | |
|         };
 | |
| 
 | |
|         createDatabase = mkOption {
 | |
|           type = types.bool;
 | |
|           default = true;
 | |
|           description = "Whether to create a local database automatically.";
 | |
|         };
 | |
|       };
 | |
| 
 | |
|       dump = {
 | |
|         enable = mkOption {
 | |
|           type = types.bool;
 | |
|           default = false;
 | |
|           description = ''
 | |
|             Enable a timer that runs gitea dump to generate backup-files of the
 | |
|             current gitea database and repositories.
 | |
|           '';
 | |
|         };
 | |
| 
 | |
|         interval = mkOption {
 | |
|           type = types.str;
 | |
|           default = "04:31";
 | |
|           example = "hourly";
 | |
|           description = ''
 | |
|             Run a gitea dump at this interval. Runs by default at 04:31 every day.
 | |
| 
 | |
|             The format is described in
 | |
|             <citerefentry><refentrytitle>systemd.time</refentrytitle>
 | |
|             <manvolnum>7</manvolnum></citerefentry>.
 | |
|           '';
 | |
|         };
 | |
| 
 | |
|         backupDir = mkOption {
 | |
|           type = types.str;
 | |
|           default = "${cfg.stateDir}/dump";
 | |
|           description = "Path to the dump files.";
 | |
|         };
 | |
|       };
 | |
| 
 | |
|       ssh = {
 | |
|         enable = mkOption {
 | |
|           type = types.bool;
 | |
|           default = true;
 | |
|           description = "Enable external SSH feature.";
 | |
|         };
 | |
| 
 | |
|         clonePort = mkOption {
 | |
|           type = types.int;
 | |
|           default = 22;
 | |
|           example = 2222;
 | |
|           description = ''
 | |
|             SSH port displayed in clone URL.
 | |
|             The option is required to configure a service when the external visible port
 | |
|             differs from the local listening port i.e. if port forwarding is used.
 | |
|           '';
 | |
|         };
 | |
|       };
 | |
| 
 | |
|       lfs = {
 | |
|         enable = mkOption {
 | |
|           type = types.bool;
 | |
|           default = false;
 | |
|           description = "Enables git-lfs support.";
 | |
|         };
 | |
| 
 | |
|         contentDir = mkOption {
 | |
|           type = types.str;
 | |
|           default = "${cfg.stateDir}/data/lfs";
 | |
|           description = "Where to store LFS files.";
 | |
|         };
 | |
|       };
 | |
| 
 | |
|       appName = mkOption {
 | |
|         type = types.str;
 | |
|         default = "gitea: Gitea Service";
 | |
|         description = "Application name.";
 | |
|       };
 | |
| 
 | |
|       repositoryRoot = mkOption {
 | |
|         type = types.str;
 | |
|         default = "${cfg.stateDir}/repositories";
 | |
|         description = "Path to the git repositories.";
 | |
|       };
 | |
| 
 | |
|       domain = mkOption {
 | |
|         type = types.str;
 | |
|         default = "localhost";
 | |
|         description = "Domain name of your server.";
 | |
|       };
 | |
| 
 | |
|       rootUrl = mkOption {
 | |
|         type = types.str;
 | |
|         default = "http://localhost:3000/";
 | |
|         description = "Full public URL of gitea server.";
 | |
|       };
 | |
| 
 | |
|       httpAddress = mkOption {
 | |
|         type = types.str;
 | |
|         default = "0.0.0.0";
 | |
|         description = "HTTP listen address.";
 | |
|       };
 | |
| 
 | |
|       httpPort = mkOption {
 | |
|         type = types.int;
 | |
|         default = 3000;
 | |
|         description = "HTTP listen port.";
 | |
|       };
 | |
| 
 | |
|       enableUnixSocket = mkOption {
 | |
|         type = types.bool;
 | |
|         default = false;
 | |
|         description = "Configure Gitea to listen on a unix socket instead of the default TCP port.";
 | |
|       };
 | |
| 
 | |
|       cookieSecure = mkOption {
 | |
|         type = types.bool;
 | |
|         default = false;
 | |
|         description = ''
 | |
|           Marks session cookies as "secure" as a hint for browsers to only send
 | |
|           them via HTTPS. This option is recommend, if gitea is being served over HTTPS.
 | |
|         '';
 | |
|       };
 | |
| 
 | |
|       staticRootPath = mkOption {
 | |
|         type = types.str;
 | |
|         default = "${gitea.data}";
 | |
|         example = "/var/lib/gitea/data";
 | |
|         description = "Upper level of template and static files path.";
 | |
|       };
 | |
| 
 | |
|       mailerPasswordFile = mkOption {
 | |
|         type = types.nullOr types.str;
 | |
|         default = null;
 | |
|         example = "/var/lib/secrets/gitea/mailpw";
 | |
|         description = "Path to a file containing the SMTP password.";
 | |
|       };
 | |
| 
 | |
|       disableRegistration = mkEnableOption "the registration lock" // {
 | |
|         description = ''
 | |
|           By default any user can create an account on this <literal>gitea</literal> instance.
 | |
|           This can be disabled by using this option.
 | |
| 
 | |
|           <emphasis>Note:</emphasis> please keep in mind that this should be added after the initial
 | |
|           deploy unless <link linkend="opt-services.gitea.useWizard">services.gitea.useWizard</link>
 | |
|           is <literal>true</literal> as the first registered user will be the administrator if
 | |
|           no install wizard is used.
 | |
|         '';
 | |
|       };
 | |
| 
 | |
|       settings = mkOption {
 | |
|         type = with types; attrsOf (attrsOf (oneOf [ bool int str ]));
 | |
|         default = {};
 | |
|         description = ''
 | |
|           Gitea configuration. Refer to <link xlink:href="https://docs.gitea.io/en-us/config-cheat-sheet/"/>
 | |
|           for details on supported values.
 | |
|         '';
 | |
|         example = literalExample ''
 | |
|           {
 | |
|             "cron.sync_external_users" = {
 | |
|               RUN_AT_START = true;
 | |
|               SCHEDULE = "@every 24h";
 | |
|               UPDATE_EXISTING = true;
 | |
|             };
 | |
|             mailer = {
 | |
|               ENABLED = true;
 | |
|               MAILER_TYPE = "sendmail";
 | |
|               FROM = "do-not-reply@example.org";
 | |
|               SENDMAIL_PATH = "${pkgs.system-sendmail}/bin/sendmail";
 | |
|             };
 | |
|             other = {
 | |
|               SHOW_FOOTER_VERSION = false;
 | |
|             };
 | |
|           }
 | |
|         '';
 | |
|       };
 | |
| 
 | |
|       extraConfig = mkOption {
 | |
|         type = with types; nullOr str;
 | |
|         default = null;
 | |
|         description = "Configuration lines appended to the generated gitea configuration file.";
 | |
|       };
 | |
|     };
 | |
|   };
 | |
| 
 | |
|   config = mkIf cfg.enable {
 | |
|     assertions = [
 | |
|       { assertion = cfg.database.createDatabase -> cfg.database.user == cfg.user;
 | |
|         message = "services.gitea.database.user must match services.gitea.user if the database is to be automatically provisioned";
 | |
|       }
 | |
|     ];
 | |
| 
 | |
|     services.gitea.settings = {
 | |
|       database = mkMerge [
 | |
|         {
 | |
|           DB_TYPE = cfg.database.type;
 | |
|         }
 | |
|         (mkIf (useMysql || usePostgresql) {
 | |
|           HOST = if cfg.database.socket != null then cfg.database.socket else cfg.database.host + ":" + toString cfg.database.port;
 | |
|           NAME = cfg.database.name;
 | |
|           USER = cfg.database.user;
 | |
|           PASSWD = "#dbpass#";
 | |
|         })
 | |
|         (mkIf useSqlite {
 | |
|           PATH = cfg.database.path;
 | |
|         })
 | |
|         (mkIf usePostgresql {
 | |
|           SSL_MODE = "disable";
 | |
|         })
 | |
|       ];
 | |
| 
 | |
|       repository = {
 | |
|         ROOT = cfg.repositoryRoot;
 | |
|       };
 | |
| 
 | |
|       server = mkMerge [
 | |
|         {
 | |
|           DOMAIN = cfg.domain;
 | |
|           STATIC_ROOT_PATH = cfg.staticRootPath;
 | |
|           LFS_JWT_SECRET = "#jwtsecret#";
 | |
|           ROOT_URL = cfg.rootUrl;
 | |
|         }
 | |
|         (mkIf cfg.enableUnixSocket {
 | |
|           PROTOCOL = "unix";
 | |
|           HTTP_ADDR = "/run/gitea/gitea.sock";
 | |
|         })
 | |
|         (mkIf (!cfg.enableUnixSocket) {
 | |
|           HTTP_ADDR = cfg.httpAddress;
 | |
|           HTTP_PORT = cfg.httpPort;
 | |
|         })
 | |
|         (mkIf cfg.ssh.enable {
 | |
|           DISABLE_SSH = false;
 | |
|           SSH_PORT = cfg.ssh.clonePort;
 | |
|         })
 | |
|         (mkIf (!cfg.ssh.enable) {
 | |
|           DISABLE_SSH = true;
 | |
|         })
 | |
|         (mkIf cfg.lfs.enable {
 | |
|           LFS_START_SERVER = true;
 | |
|           LFS_CONTENT_PATH = cfg.lfs.contentDir;
 | |
|         })
 | |
| 
 | |
|       ];
 | |
| 
 | |
|       session = {
 | |
|         COOKIE_NAME = "session";
 | |
|         COOKIE_SECURE = cfg.cookieSecure;
 | |
|       };
 | |
| 
 | |
|       security = {
 | |
|         SECRET_KEY = "#secretkey#";
 | |
|         INSTALL_LOCK = true;
 | |
|       };
 | |
| 
 | |
|       log = {
 | |
|         ROOT_PATH = cfg.log.rootPath;
 | |
|         LEVEL = cfg.log.level;
 | |
|       };
 | |
| 
 | |
|       service = {
 | |
|         DISABLE_REGISTRATION = cfg.disableRegistration;
 | |
|       };
 | |
| 
 | |
|       mailer = mkIf (cfg.mailerPasswordFile != null) {
 | |
|         PASSWD = "#mailerpass#";
 | |
|       };
 | |
|     };
 | |
| 
 | |
|     services.postgresql = optionalAttrs (usePostgresql && cfg.database.createDatabase) {
 | |
|       enable = mkDefault true;
 | |
| 
 | |
|       ensureDatabases = [ cfg.database.name ];
 | |
|       ensureUsers = [
 | |
|         { name = cfg.database.user;
 | |
|           ensurePermissions = { "DATABASE ${cfg.database.name}" = "ALL PRIVILEGES"; };
 | |
|         }
 | |
|       ];
 | |
|     };
 | |
| 
 | |
|     services.mysql = optionalAttrs (useMysql && cfg.database.createDatabase) {
 | |
|       enable = mkDefault true;
 | |
|       package = mkDefault pkgs.mariadb;
 | |
| 
 | |
|       ensureDatabases = [ cfg.database.name ];
 | |
|       ensureUsers = [
 | |
|         { name = cfg.database.user;
 | |
|           ensurePermissions = { "${cfg.database.name}.*" = "ALL PRIVILEGES"; };
 | |
|         }
 | |
|       ];
 | |
|     };
 | |
| 
 | |
|     systemd.tmpfiles.rules = [
 | |
|       "d '${cfg.dump.backupDir}' 0750 ${cfg.user} gitea - -"
 | |
|       "z '${cfg.dump.backupDir}' 0750 ${cfg.user} gitea - -"
 | |
|       "Z '${cfg.dump.backupDir}' - ${cfg.user} gitea - -"
 | |
|       "d '${cfg.lfs.contentDir}' 0750 ${cfg.user} gitea - -"
 | |
|       "z '${cfg.lfs.contentDir}' 0750 ${cfg.user} gitea - -"
 | |
|       "Z '${cfg.lfs.contentDir}' - ${cfg.user} gitea - -"
 | |
|       "d '${cfg.repositoryRoot}' 0750 ${cfg.user} gitea - -"
 | |
|       "z '${cfg.repositoryRoot}' 0750 ${cfg.user} gitea - -"
 | |
|       "Z '${cfg.repositoryRoot}' - ${cfg.user} gitea - -"
 | |
|       "d '${cfg.stateDir}' 0750 ${cfg.user} gitea - -"
 | |
|       "d '${cfg.stateDir}/conf' 0750 ${cfg.user} gitea - -"
 | |
|       "d '${cfg.stateDir}/custom' 0750 ${cfg.user} gitea - -"
 | |
|       "d '${cfg.stateDir}/custom/conf' 0750 ${cfg.user} gitea - -"
 | |
|       "d '${cfg.stateDir}/log' 0750 ${cfg.user} gitea - -"
 | |
|       "z '${cfg.stateDir}' 0750 ${cfg.user} gitea - -"
 | |
|       "z '${cfg.stateDir}/.ssh' 0700 ${cfg.user} gitea - -"
 | |
|       "z '${cfg.stateDir}/conf' 0750 ${cfg.user} gitea - -"
 | |
|       "z '${cfg.stateDir}/custom' 0750 ${cfg.user} gitea - -"
 | |
|       "z '${cfg.stateDir}/custom/conf' 0750 ${cfg.user} gitea - -"
 | |
|       "z '${cfg.stateDir}/log' 0750 ${cfg.user} gitea - -"
 | |
|       "Z '${cfg.stateDir}' - ${cfg.user} gitea - -"
 | |
| 
 | |
|       # If we have a folder or symlink with gitea locales, remove it
 | |
|       # And symlink the current gitea locales in place
 | |
|       "L+ '${cfg.stateDir}/conf/locale' - - - - ${gitea.out}/locale"
 | |
|     ];
 | |
| 
 | |
|     systemd.services.gitea = {
 | |
|       description = "gitea";
 | |
|       after = [ "network.target" ] ++ lib.optional usePostgresql "postgresql.service" ++ lib.optional useMysql "mysql.service";
 | |
|       wantedBy = [ "multi-user.target" ];
 | |
|       path = [ gitea pkgs.gitAndTools.git ];
 | |
| 
 | |
|       preStart = let
 | |
|         runConfig = "${cfg.stateDir}/custom/conf/app.ini";
 | |
|         secretKey = "${cfg.stateDir}/custom/conf/secret_key";
 | |
|         jwtSecret = "${cfg.stateDir}/custom/conf/jwt_secret";
 | |
|       in ''
 | |
|         # copy custom configuration and generate a random secret key if needed
 | |
|         ${optionalString (cfg.useWizard == false) ''
 | |
|           cp -f ${configFile} ${runConfig}
 | |
| 
 | |
|           if [ ! -e ${secretKey} ]; then
 | |
|               ${gitea}/bin/gitea generate secret SECRET_KEY > ${secretKey}
 | |
|           fi
 | |
| 
 | |
|           if [ ! -e ${jwtSecret} ]; then
 | |
|               ${gitea}/bin/gitea generate secret LFS_JWT_SECRET > ${jwtSecret}
 | |
|           fi
 | |
| 
 | |
|           KEY="$(head -n1 ${secretKey})"
 | |
|           DBPASS="$(head -n1 ${cfg.database.passwordFile})"
 | |
|           JWTSECRET="$(head -n1 ${jwtSecret})"
 | |
|           ${if (cfg.mailerPasswordFile == null) then ''
 | |
|             MAILERPASSWORD="#mailerpass#"
 | |
|           '' else ''
 | |
|             MAILERPASSWORD="$(head -n1 ${cfg.mailerPasswordFile} || :)"
 | |
|           ''}
 | |
|           sed -e "s,#secretkey#,$KEY,g" \
 | |
|               -e "s,#dbpass#,$DBPASS,g" \
 | |
|               -e "s,#jwtsecret#,$JWTSECRET,g" \
 | |
|               -e "s,#mailerpass#,$MAILERPASSWORD,g" \
 | |
|               -i ${runConfig}
 | |
|           chmod 640 ${runConfig} ${secretKey} ${jwtSecret}
 | |
|         ''}
 | |
| 
 | |
|         # update all hooks' binary paths
 | |
|         HOOKS=$(find ${cfg.repositoryRoot} -mindepth 4 -maxdepth 6 -type f -wholename "*git/hooks/*")
 | |
|         if [ "$HOOKS" ]
 | |
|         then
 | |
|           sed -ri 's,/nix/store/[a-z0-9.-]+/bin/gitea,${gitea}/bin/gitea,g' $HOOKS
 | |
|           sed -ri 's,/nix/store/[a-z0-9.-]+/bin/env,${pkgs.coreutils}/bin/env,g' $HOOKS
 | |
|           sed -ri 's,/nix/store/[a-z0-9.-]+/bin/bash,${pkgs.bash}/bin/bash,g' $HOOKS
 | |
|           sed -ri 's,/nix/store/[a-z0-9.-]+/bin/perl,${pkgs.perl}/bin/perl,g' $HOOKS
 | |
|         fi
 | |
| 
 | |
|         # update command option in authorized_keys
 | |
|         if [ -r ${cfg.stateDir}/.ssh/authorized_keys ]
 | |
|         then
 | |
|           sed -ri 's,/nix/store/[a-z0-9.-]+/bin/gitea,${gitea}/bin/gitea,g' ${cfg.stateDir}/.ssh/authorized_keys
 | |
|         fi
 | |
|       '';
 | |
| 
 | |
|       serviceConfig = {
 | |
|         Type = "simple";
 | |
|         User = cfg.user;
 | |
|         Group = "gitea";
 | |
|         WorkingDirectory = cfg.stateDir;
 | |
|         ExecStart = "${gitea}/bin/gitea web --pid /run/gitea/gitea.pid";
 | |
|         Restart = "always";
 | |
|         # Runtime directory and mode
 | |
|         RuntimeDirectory = "gitea";
 | |
|         RuntimeDirectoryMode = "0755";
 | |
|         # Access write directories
 | |
|         ReadWritePaths = [ cfg.dump.backupDir cfg.repositoryRoot cfg.stateDir cfg.lfs.contentDir ];
 | |
|         UMask = "0027";
 | |
|         # Capabilities
 | |
|         CapabilityBoundingSet = "";
 | |
|         # Security
 | |
|         NoNewPrivileges = true;
 | |
|         # Sandboxing
 | |
|         ProtectSystem = "strict";
 | |
|         ProtectHome = true;
 | |
|         PrivateTmp = true;
 | |
|         PrivateDevices = true;
 | |
|         PrivateUsers = true;
 | |
|         ProtectHostname = true;
 | |
|         ProtectClock = true;
 | |
|         ProtectKernelTunables = true;
 | |
|         ProtectKernelModules = true;
 | |
|         ProtectKernelLogs = true;
 | |
|         ProtectControlGroups = true;
 | |
|         RestrictAddressFamilies = [ "AF_UNIX AF_INET AF_INET6" ];
 | |
|         LockPersonality = true;
 | |
|         MemoryDenyWriteExecute = true;
 | |
|         RestrictRealtime = true;
 | |
|         RestrictSUIDSGID = true;
 | |
|         PrivateMounts = true;
 | |
|         # System Call Filtering
 | |
|         SystemCallArchitectures = "native";
 | |
|         SystemCallFilter = "~@clock @cpu-emulation @debug @keyring @memlock @module @mount @obsolete @raw-io @reboot @resources @setuid @swap";
 | |
|       };
 | |
| 
 | |
|       environment = {
 | |
|         USER = cfg.user;
 | |
|         HOME = cfg.stateDir;
 | |
|         GITEA_WORK_DIR = cfg.stateDir;
 | |
|       };
 | |
|     };
 | |
| 
 | |
|     users.users = mkIf (cfg.user == "gitea") {
 | |
|       gitea = {
 | |
|         description = "Gitea Service";
 | |
|         home = cfg.stateDir;
 | |
|         useDefaultShell = true;
 | |
|         group = "gitea";
 | |
|         isSystemUser = true;
 | |
|       };
 | |
|     };
 | |
| 
 | |
|     users.groups.gitea = {};
 | |
| 
 | |
|     warnings =
 | |
|       optional (cfg.database.password != "") ''
 | |
|         config.services.gitea.database.password will be stored as plaintext in the Nix store. Use database.passwordFile instead.'' ++
 | |
|       optional (cfg.extraConfig != null) ''
 | |
|         services.gitea.`extraConfig` is deprecated, please use services.gitea.`settings`.
 | |
|       '';
 | |
| 
 | |
|     # Create database passwordFile default when password is configured.
 | |
|     services.gitea.database.passwordFile =
 | |
|       (mkDefault (toString (pkgs.writeTextFile {
 | |
|         name = "gitea-database-password";
 | |
|         text = cfg.database.password;
 | |
|       })));
 | |
| 
 | |
|     systemd.services.gitea-dump = mkIf cfg.dump.enable {
 | |
|        description = "gitea dump";
 | |
|        after = [ "gitea.service" ];
 | |
|        wantedBy = [ "default.target" ];
 | |
|        path = [ gitea ];
 | |
| 
 | |
|        environment = {
 | |
|          USER = cfg.user;
 | |
|          HOME = cfg.stateDir;
 | |
|          GITEA_WORK_DIR = cfg.stateDir;
 | |
|        };
 | |
| 
 | |
|        serviceConfig = {
 | |
|          Type = "oneshot";
 | |
|          User = cfg.user;
 | |
|          ExecStart = "${gitea}/bin/gitea dump";
 | |
|          WorkingDirectory = cfg.dump.backupDir;
 | |
|        };
 | |
|     };
 | |
| 
 | |
|     systemd.timers.gitea-dump = mkIf cfg.dump.enable {
 | |
|       description = "Update timer for gitea-dump";
 | |
|       partOf = [ "gitea-dump.service" ];
 | |
|       wantedBy = [ "timers.target" ];
 | |
|       timerConfig.OnCalendar = cfg.dump.interval;
 | |
|     };
 | |
|   };
 | |
|   meta.maintainers = with lib.maintainers; [ srhb ];
 | |
| }
 | 
