X-Git-Url: https://git.immae.eu/?a=blobdiff_plain;f=modules%2Fprivate%2Ftasks%2Fdefault.nix;h=087885d837efa8f0522f75348612f7e500475bea;hb=120bcf4d3927f4a0d07513bc54ea5b5fb9b7d809;hp=ac2aa2184074baf8f76f60e52820da7076241c9b;hpb=4c4652aabf2cb3ac8b40f2856eca07a1df9c27e0;p=perso%2FImmae%2FConfig%2FNix.git diff --git a/modules/private/tasks/default.nix b/modules/private/tasks/default.nix index ac2aa21..087885d 100644 --- a/modules/private/tasks/default.nix +++ b/modules/private/tasks/default.nix @@ -86,15 +86,28 @@ in { }; config = lib.mkIf cfg.enable { - services.duplyBackup.profiles.tasks = { - rootDir = "/var/lib"; - excludeFile = '' - + /var/lib/taskserver - + /var/lib/taskwarrior-web - - /var/lib - ''; + myServices.chatonsProperties.services.taskwarrior = { + file.datetime = "2022-08-22T00:00:00"; + service = { + name = "Taskwarrior"; + description = "Taskwarrior is Free and Open Source Software that manages your TODO list from the command line. Web interface and synchronization server"; + website = "https://task.immae.eu/"; + logo = "https://taskwarrior.org/favicon.ico"; + status.level = "OK"; + status.description = "OK"; + registration."" = ["MEMBER" "CLIENT"]; + registration.load = "OPEN"; + install.type = "PACKAGE"; + }; + software = { + name = "Taskwarrior"; + website = "https://taskwarrior.org/"; + license.url = "https://github.com/GothenburgBitFactory/taskwarrior/blob/develop/LICENSE"; + license.name = "MIT License"; + version = pkgs.webapps.taskwarrior-web.version; + source.url = "https://taskwarrior.org/download/"; + }; }; - secrets.keys = { "webapps/tools-taskwarrior-web" = { user = "wwwrun"; @@ -165,9 +178,9 @@ in { certName = "eldiron"; addToCerts = true; hosts = [ "task.immae.eu" ]; - root = "/run/current-system/webapps/_task"; + root = ./www; extraConfig = [ '' - + DirectoryIndex index.php Use LDAPConnect Require ldap-group cn=users,cn=taskwarrior,ou=services,dc=immae,dc=eu @@ -243,10 +256,8 @@ in { }; }; - services.websites.webappDirs._task = ./www; - security.acme.certs."task" = config.myServices.certificates.certConfig // { - inherit user group; + inherit group; domain = fqdn; postRun = '' systemctl restart taskserver.service