Loading nixos/modules/services/matrix/conduit.nix +24 −1 Original line number Diff line number Diff line Loading @@ -11,7 +11,10 @@ let configFile = format.generate "conduit.toml" cfg.settings; in { meta.maintainers = with lib.maintainers; [ pstn ]; meta.maintainers = with lib.maintainers; [ pstn SchweGELBin ]; options.services.matrix-conduit = { enable = lib.mkEnableOption "matrix-conduit"; Loading @@ -26,6 +29,22 @@ in package = lib.mkPackageOption pkgs "matrix-conduit" { }; secretFile = lib.mkOption { type = lib.types.nullOr lib.types.path; default = null; example = "/run/secrets/matrix-conduit.env"; description = '' Path to a file containing sensitive environment as described in {manpage}`systemd.exec(5). Some variables that can be considered secrets are: - CONDUIT_JWT_SECRET: The secret used to enable JWT login. Without it a 400 error will be returned. - CONDUIT_TURN_SECRET: The TURN secret ''; }; settings = lib.mkOption { type = lib.types.submodule { freeformType = format.type; Loading Loading @@ -112,6 +131,7 @@ in <https://docs.conduit.rs/configuration.html> for details on supported values. Note that database_path can not be edited because the service's reliance on systemd StateDir. For secrets use the `secretFile` option instead. ''; }; }; Loading Loading @@ -158,6 +178,9 @@ in Restart = "on-failure"; RestartSec = 10; UMask = "077"; } // lib.optionalAttrs (cfg.secretFile != null) { EnvironmentFile = cfg.secretFile; }; unitConfig = { StartLimitBurst = 5; Loading Loading
nixos/modules/services/matrix/conduit.nix +24 −1 Original line number Diff line number Diff line Loading @@ -11,7 +11,10 @@ let configFile = format.generate "conduit.toml" cfg.settings; in { meta.maintainers = with lib.maintainers; [ pstn ]; meta.maintainers = with lib.maintainers; [ pstn SchweGELBin ]; options.services.matrix-conduit = { enable = lib.mkEnableOption "matrix-conduit"; Loading @@ -26,6 +29,22 @@ in package = lib.mkPackageOption pkgs "matrix-conduit" { }; secretFile = lib.mkOption { type = lib.types.nullOr lib.types.path; default = null; example = "/run/secrets/matrix-conduit.env"; description = '' Path to a file containing sensitive environment as described in {manpage}`systemd.exec(5). Some variables that can be considered secrets are: - CONDUIT_JWT_SECRET: The secret used to enable JWT login. Without it a 400 error will be returned. - CONDUIT_TURN_SECRET: The TURN secret ''; }; settings = lib.mkOption { type = lib.types.submodule { freeformType = format.type; Loading Loading @@ -112,6 +131,7 @@ in <https://docs.conduit.rs/configuration.html> for details on supported values. Note that database_path can not be edited because the service's reliance on systemd StateDir. For secrets use the `secretFile` option instead. ''; }; }; Loading Loading @@ -158,6 +178,9 @@ in Restart = "on-failure"; RestartSec = 10; UMask = "077"; } // lib.optionalAttrs (cfg.secretFile != null) { EnvironmentFile = cfg.secretFile; }; unitConfig = { StartLimitBurst = 5; Loading