From 44e99fa41a7f5601bf0040587d3eb0a32ae25e95 Mon Sep 17 00:00:00 2001 From: Julien Malka Date: Mon, 6 Nov 2023 10:21:14 +0100 Subject: [PATCH] modules: delete ferretdb --- modules/ferretdb/default.nix | 79 ------------------------------------ 1 file changed, 79 deletions(-) delete mode 100644 modules/ferretdb/default.nix diff --git a/modules/ferretdb/default.nix b/modules/ferretdb/default.nix deleted file mode 100644 index 5b2cc59..0000000 --- a/modules/ferretdb/default.nix +++ /dev/null @@ -1,79 +0,0 @@ -{ config, pkgs, lib, ... }: - -with lib; - -let - cfg = config.services.ferretdb; -in -{ - - meta.maintainers = with lib.maintainers; [ julienmalka camillemndn ]; - - options = { - services.ferretdb = { - enable = mkEnableOption "FerretDB, an Open Source MongoDB alternative."; - - package = mkOption { - type = types.package; - example = literalExpression "pkgs.ferretdb"; - default = pkgs.ferretdb; - defaultText = "pkgs.ferretdb"; - description = "FerretDB package to use."; - }; - - settings = lib.mkOption { - type = - lib.types.submodule { freeformType = with lib.types; attrsOf str; }; - example = { - FERRETDB_LOG_LEVEL = "warn"; - FERRETDB_MODE = "normal"; - }; - description = '' - Additional configuration for FerretDB, see - - for supported values. - ''; - }; - }; - }; - - config = mkIf cfg.enable - { - - services.ferretdb.settings = { - FERRETDB_HANDLER = lib.mkDefault "sqlite"; - FERRETDB_SQLITE_URL = lib.mkDefault "file:/var/lib/ferretdb/"; - }; - - systemd.services.ferretdb = { - description = "FerretDB"; - after = [ "network.target" ]; - wantedBy = [ "multi-user.target" ]; - environment = cfg.settings; - serviceConfig = { - Type = "simple"; - StateDirectory = "ferretdb"; - WorkingDirectory = "/var/lib/ferretdb"; - ExecStart = "${cfg.package}/bin/ferretdb"; - Restart = "on-failure"; - ProtectHome = true; - ProtectSystem = "strict"; - PrivateTmp = true; - PrivateDevices = true; - ProtectHostname = true; - ProtectClock = true; - ProtectKernelTunables = true; - ProtectKernelModules = true; - ProtectKernelLogs = true; - ProtectControlGroups = true; - NoNewPrivileges = true; - RestrictRealtime = true; - RestrictSUIDSGID = true; - RemoveIPC = true; - PrivateMounts = true; - DynamicUser = true; - }; - }; - }; -} -