depot/third_party/nixpkgs/nixos/modules/services/web-apps/cryptpad.nix
Default email 5e2a688410 Project import generated by Copybara.
GitOrigin-RevId: 5e2018f7b383aeca6824a30c0cd1978c9532a46a
2021-10-06 10:57:05 -03:00

54 lines
1.4 KiB
Nix

{ config, lib, pkgs, ... }:
with lib;
let
cfg = config.services.cryptpad;
in
{
options.services.cryptpad = {
enable = mkEnableOption "the Cryptpad service";
package = mkOption {
default = pkgs.cryptpad;
defaultText = literalExpression "pkgs.cryptpad";
type = types.package;
description = "
Cryptpad package to use.
";
};
configFile = mkOption {
type = types.path;
default = "${cfg.package}/lib/node_modules/cryptpad/config/config.example.js";
defaultText = literalExpression ''"''${package}/lib/node_modules/cryptpad/config/config.example.js"'';
description = ''
Path to the JavaScript configuration file.
See <link
xlink:href="https://github.com/xwiki-labs/cryptpad/blob/master/config/config.example.js"/>
for a configuration example.
'';
};
};
config = mkIf cfg.enable {
systemd.services.cryptpad = {
description = "Cryptpad Service";
wantedBy = [ "multi-user.target" ];
after = [ "networking.target" ];
serviceConfig = {
DynamicUser = true;
Environment = [
"CRYPTPAD_CONFIG=${cfg.configFile}"
"HOME=%S/cryptpad"
];
ExecStart = "${cfg.package}/bin/cryptpad";
PrivateTmp = true;
Restart = "always";
StateDirectory = "cryptpad";
WorkingDirectory = "%S/cryptpad";
};
};
};
}