···
+
{ config, lib, pkgs, ... }:
+
cfg = config.services.etesync-dav;
+
options.services.etesync-dav = {
+
enable = mkEnableOption "etesync-dav";
+
description = "The server host address.";
+
description = "The server host port.";
+
default = "https://api.etesync.com/";
+
description = "The url to the etesync API.";
+
openFirewall = mkOption {
+
description = "Whether to open the firewall for the specified port.";
+
sslCertificate = mkOption {
+
type = types.nullOr types.path;
+
example = "/var/etesync.crt";
+
Path to server SSL certificate. It will be copied into
+
etesync-dav's data directory.
+
sslCertificateKey = mkOption {
+
type = types.nullOr types.path;
+
example = "/var/etesync.key";
+
Path to server SSL certificate key. It will be copied into
+
etesync-dav's data directory.
+
config = mkIf cfg.enable {
+
networking.firewall.allowedTCPPorts = mkIf cfg.openFirewall [ cfg.port ];
+
systemd.services.etesync-dav = {
+
description = "etesync-dav - A CalDAV and CardDAV adapter for EteSync";
+
after = [ "network-online.target" ];
+
wantedBy = [ "multi-user.target" ];
+
path = [ pkgs.etesync-dav ];
+
ETESYNC_LISTEN_ADDRESS = cfg.host;
+
ETESYNC_LISTEN_PORT = toString cfg.port;
+
ETESYNC_URL = cfg.apiUrl;
+
ETESYNC_DATA_DIR = "/var/lib/etesync-dav";
+
StateDirectory = "etesync-dav";
+
ExecStart = "${pkgs.etesync-dav}/bin/etesync-dav";
+
ExecStartPre = mkIf (cfg.sslCertificate != null || cfg.sslCertificateKey != null) (
+
pkgs.writers.writeBash "etesync-dav-copy-keys" ''
+
${optionalString (cfg.sslCertificate != null) ''
+
cp ${toString cfg.sslCertificate} $STATE_DIRECTORY/etesync.crt
+
${optionalString (cfg.sslCertificateKey != null) ''
+
cp ${toString cfg.sslCertificateKey} $STATE_DIRECTORY/etesync.key
+
Restart = "on-failure";
+
RestartSec = "30min 1s";