mirror of
https://github.com/SebastianStork/nixos-config.git
synced 2026-01-22 04:34:25 +01:00
Modularize the backup configuration
This commit is contained in:
parent
e333333914
commit
40a8ba846a
4 changed files with 101 additions and 88 deletions
|
|
@ -66,10 +66,7 @@ in
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
imports = [
|
imports = [ self.nixosModules.default ];
|
||||||
"${self}/modules/system/sops.nix"
|
|
||||||
"${self}/modules/system/tailscale.nix"
|
|
||||||
];
|
|
||||||
|
|
||||||
system = {
|
system = {
|
||||||
inherit stateVersion;
|
inherit stateVersion;
|
||||||
|
|
|
||||||
|
|
@ -6,49 +6,26 @@
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
sops.secrets = {
|
systemd.tmpfiles.rules = [ "d ${dataDir}/backup 700 nextcloud nextcloud -" ];
|
||||||
"restic/environment" = {
|
|
||||||
owner = config.users.users.nextcloud.name;
|
|
||||||
inherit (config.users.users.nextcloud) group;
|
|
||||||
};
|
|
||||||
"restic/password" = {
|
|
||||||
owner = config.users.users.nextcloud.name;
|
|
||||||
inherit (config.users.users.nextcloud) group;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
systemd.tmpfiles.rules = [
|
myConfig.resticBackup.nextcloud = {
|
||||||
"d ${dataDir}/backup 700 nextcloud nextcloud -"
|
enable = true;
|
||||||
"d /var/cache/restic-backups-nextcloud 700 nextcloud nextcloud -"
|
|
||||||
];
|
|
||||||
|
|
||||||
services.restic.backups.nextcloud = {
|
|
||||||
initialize = true;
|
|
||||||
user = config.users.users.nextcloud.name;
|
user = config.users.users.nextcloud.name;
|
||||||
|
|
||||||
repository = "s3:https://s3.eu-central-003.backblazeb2.com/stork-atlas/nextcloud";
|
extraConfig = {
|
||||||
environmentFile = config.sops.secrets."restic/environment".path;
|
backupPrepareCommand = ''
|
||||||
passwordFile = config.sops.secrets."restic/password".path;
|
${lib.getExe' config.services.nextcloud.occ "nextcloud-occ"} maintenance:mode --on
|
||||||
|
${lib.getExe' config.services.postgresql.package "pg_dump"} nextcloud --format=custom --file=${dataDir}/backup/db.dump
|
||||||
pruneOpts = [
|
'';
|
||||||
"--keep-daily 7"
|
backupCleanupCommand = ''
|
||||||
"--keep-weekly 5"
|
${lib.getExe' config.services.nextcloud.occ "nextcloud-occ"} maintenance:mode --off
|
||||||
"--keep-monthly 6"
|
'';
|
||||||
"--keep-yearly 1"
|
paths = [
|
||||||
];
|
"${dataDir}/home/data"
|
||||||
|
"${dataDir}/home/config/config.php"
|
||||||
backupPrepareCommand = ''
|
"${dataDir}/backup"
|
||||||
${lib.getExe' config.services.nextcloud.occ "nextcloud-occ"} maintenance:mode --on
|
];
|
||||||
${lib.getExe' config.services.postgresql.package "pg_dump"} nextcloud --format=custom --file=${dataDir}/backup/db.dump
|
};
|
||||||
'';
|
|
||||||
backupCleanupCommand = ''
|
|
||||||
${lib.getExe' config.services.nextcloud.occ "nextcloud-occ"} maintenance:mode --off
|
|
||||||
'';
|
|
||||||
paths = [
|
|
||||||
"${dataDir}/home/data"
|
|
||||||
"${dataDir}/home/config/config.php"
|
|
||||||
"${dataDir}/backup"
|
|
||||||
];
|
|
||||||
};
|
};
|
||||||
|
|
||||||
environment.systemPackages = [
|
environment.systemPackages = [
|
||||||
|
|
|
||||||
|
|
@ -6,52 +6,30 @@
|
||||||
...
|
...
|
||||||
}:
|
}:
|
||||||
{
|
{
|
||||||
sops.secrets = {
|
systemd.tmpfiles.rules = [ "d ${dataDir}/backup 700 paperless paperless -" ];
|
||||||
"restic/environment" = {
|
|
||||||
owner = config.users.users.paperless.name;
|
|
||||||
inherit (config.users.users.paperless) group;
|
|
||||||
};
|
|
||||||
"restic/password" = {
|
|
||||||
owner = config.users.users.paperless.name;
|
|
||||||
inherit (config.users.users.paperless) group;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
systemd.tmpfiles.rules = [
|
|
||||||
"d ${dataDir}/backup 700 paperless paperless -"
|
|
||||||
"d /var/cache/restic-backups-paperless 700 paperless paperless -"
|
|
||||||
];
|
|
||||||
|
|
||||||
services.restic.backups.paperless = {
|
|
||||||
initialize = true;
|
|
||||||
inherit (config.services.paperless) user;
|
|
||||||
|
|
||||||
repository = "s3:https://s3.eu-central-003.backblazeb2.com/stork-atlas/paperless";
|
|
||||||
environmentFile = config.sops.secrets."restic/environment".path;
|
|
||||||
passwordFile = config.sops.secrets."restic/password".path;
|
|
||||||
|
|
||||||
pruneOpts = [
|
|
||||||
"--keep-daily 7"
|
|
||||||
"--keep-weekly 5"
|
|
||||||
"--keep-monthly 6"
|
|
||||||
"--keep-yearly 1"
|
|
||||||
];
|
|
||||||
|
|
||||||
backupPrepareCommand = ''
|
|
||||||
${dataDir}/paperless-manage document_exporter ${dataDir}/backup ${
|
|
||||||
lib.concatStringsSep " " [
|
|
||||||
"--compare-checksums"
|
|
||||||
"--delete"
|
|
||||||
"--split-manifest"
|
|
||||||
"--use-filename-format"
|
|
||||||
"--no-progress-bar"
|
|
||||||
]
|
|
||||||
}
|
|
||||||
'';
|
|
||||||
paths = [ "${dataDir}/backup" ];
|
|
||||||
};
|
|
||||||
|
|
||||||
users.users.paperless.extraGroups = [ "redis-paperless" ];
|
users.users.paperless.extraGroups = [ "redis-paperless" ];
|
||||||
|
|
||||||
|
myConfig.resticBackup.paperless = {
|
||||||
|
enable = true;
|
||||||
|
user = config.users.users.paperless.name;
|
||||||
|
|
||||||
|
extraConfig = {
|
||||||
|
backupPrepareCommand = ''
|
||||||
|
${dataDir}/paperless-manage document_exporter ${dataDir}/backup ${
|
||||||
|
lib.concatStringsSep " " [
|
||||||
|
"--compare-checksums"
|
||||||
|
"--delete"
|
||||||
|
"--split-manifest"
|
||||||
|
"--use-filename-format"
|
||||||
|
"--no-progress-bar"
|
||||||
|
]
|
||||||
|
}
|
||||||
|
'';
|
||||||
|
paths = [ "${dataDir}/backup" ];
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
environment.systemPackages = [
|
environment.systemPackages = [
|
||||||
(pkgs.writeShellApplication {
|
(pkgs.writeShellApplication {
|
||||||
name = "paperless-restore";
|
name = "paperless-restore";
|
||||||
|
|
|
||||||
61
modules/system/restic-backup.nix
Normal file
61
modules/system/restic-backup.nix
Normal file
|
|
@ -0,0 +1,61 @@
|
||||||
|
{ config, lib, ... }:
|
||||||
|
let
|
||||||
|
cfg = lib.filterAttrs (_: value: value.enable) config.myConfig.resticBackup;
|
||||||
|
in
|
||||||
|
{
|
||||||
|
options.myConfig.resticBackup = lib.mkOption {
|
||||||
|
type = lib.types.attrsOf (
|
||||||
|
lib.types.submodule {
|
||||||
|
options = {
|
||||||
|
enable = lib.mkEnableOption "";
|
||||||
|
user = lib.mkOption {
|
||||||
|
type = lib.types.str;
|
||||||
|
default = config.users.users.root.name;
|
||||||
|
};
|
||||||
|
extraConfig = lib.mkOption {
|
||||||
|
type = lib.types.attrsOf lib.types.anything;
|
||||||
|
default = { };
|
||||||
|
};
|
||||||
|
};
|
||||||
|
}
|
||||||
|
);
|
||||||
|
default = { };
|
||||||
|
};
|
||||||
|
|
||||||
|
config = lib.mkIf (cfg != { }) {
|
||||||
|
systemd.tmpfiles.rules = lib.mapAttrsToList (
|
||||||
|
name: value: "d /var/cache/restic-backups-${name} 700 ${value.user} ${value.user} -"
|
||||||
|
) cfg;
|
||||||
|
|
||||||
|
users.groups.restic.members = lib.mapAttrsToList (_: value: value.user) cfg;
|
||||||
|
|
||||||
|
sops.secrets = {
|
||||||
|
"restic/environment" = {
|
||||||
|
mode = "440";
|
||||||
|
group = config.users.groups.restic.name;
|
||||||
|
};
|
||||||
|
"restic/password" = {
|
||||||
|
mode = "440";
|
||||||
|
group = config.users.groups.restic.name;
|
||||||
|
};
|
||||||
|
};
|
||||||
|
|
||||||
|
services.restic.backups = lib.mapAttrs (
|
||||||
|
name: value:
|
||||||
|
{
|
||||||
|
inherit (value) user;
|
||||||
|
initialize = true;
|
||||||
|
repository = "s3:https://s3.eu-central-003.backblazeb2.com/stork-atlas/${name}";
|
||||||
|
environmentFile = config.sops.secrets."restic/environment".path;
|
||||||
|
passwordFile = config.sops.secrets."restic/password".path;
|
||||||
|
pruneOpts = [
|
||||||
|
"--keep-daily 7"
|
||||||
|
"--keep-weekly 5"
|
||||||
|
"--keep-monthly 6"
|
||||||
|
"--keep-yearly 1"
|
||||||
|
];
|
||||||
|
}
|
||||||
|
// value.extraConfig
|
||||||
|
) cfg;
|
||||||
|
};
|
||||||
|
}
|
||||||
Loading…
Add table
Add a link
Reference in a new issue