diff options
-rw-r--r-- | modules/pgbackrest.nix | 3 |
1 files changed, 2 insertions, 1 deletions
diff --git a/modules/pgbackrest.nix b/modules/pgbackrest.nix index 493ba4c5..d4a4f9d6 100644 --- a/modules/pgbackrest.nix +++ b/modules/pgbackrest.nix | |||
@@ -143,13 +143,14 @@ in { | |||
143 | environment.systemPackages = [ cfg.package ]; | 143 | environment.systemPackages = [ cfg.package ]; |
144 | 144 | ||
145 | services.postgresql.settings = mkIf cfg.configurePostgresql.enable { | 145 | services.postgresql.settings = mkIf cfg.configurePostgresql.enable { |
146 | archive_command = "${cfg.package}/bin/pgbackrest --stanza ${escapeSystemdExecArg cfg.configurePostgresql.stanza} archive-push %p"; | 146 | archive_command = "pgbackrest --stanza ${cfg.configurePostgresql.stanza} archive-push %p"; |
147 | archive_mode = true; | 147 | archive_mode = true; |
148 | max_wal_senders = mkDefault 3; | 148 | max_wal_senders = mkDefault 3; |
149 | wal_level = "replica"; | 149 | wal_level = "replica"; |
150 | }; | 150 | }; |
151 | 151 | ||
152 | systemd.services = { | 152 | systemd.services = { |
153 | postgresql.path = mkIf cfg.configurePostgresql.enable [ cfg.package ]; | ||
153 | pgbackrest-tls-server = mkIf cfg.tlsServer.enable { | 154 | pgbackrest-tls-server = mkIf cfg.tlsServer.enable { |
154 | description = "pgBackRest TLS-Server"; | 155 | description = "pgBackRest TLS-Server"; |
155 | wantedBy = [ "multi-user.target" ]; | 156 | wantedBy = [ "multi-user.target" ]; |