};
config = lib.mkIf cfg.enable {
- services.duplyBackup.profiles.tasks = {
- rootDir = "/var/lib";
- excludeFile = ''
- + /var/lib/taskserver
- + /var/lib/taskwarrior-web
- - /var/lib
- '';
- };
-
- secrets.keys = [
- {
- dest = "webapps/tools-taskwarrior-web";
+ secrets.keys = {
+ "webapps/tools-taskwarrior-web" = {
user = "wwwrun";
group = "wwwrun";
permissions = "0400";
SetEnv TASKD_LDAP_BASE "${env.ldap.base}"
SetEnv TASKD_LDAP_FILTER "${env.ldap.filter}"
'';
- }
- ] ++ (lib.mapAttrsToList (name: userConfig: {
- dest = "webapps/tools-taskwarrior/${name}-taskrc";
+ };
+ } // (lib.mapAttrs' (name: userConfig: lib.nameValuePair "webapps/tools-taskwarrior/${name}-taskrc" {
inherit user group;
permissions = "0400";
text = let
certName = "eldiron";
addToCerts = true;
hosts = [ "task.immae.eu" ];
- root = "/run/current-system/webapps/_task";
+ root = ./www;
extraConfig = [ ''
- <Directory /run/current-system/webapps/_task>
+ <Directory ${./www}>
DirectoryIndex index.php
Use LDAPConnect
Require ldap-group cn=users,cn=taskwarrior,ou=services,dc=immae,dc=eu
};
};
- services.websites.webappDirs._task = ./www;
-
security.acme.certs."task" = config.myServices.certificates.certConfig // {
inherit user group;
domain = fqdn;