nixos-config/modules/system/restic-backup.nix

89 lines
2.4 KiB
Nix

{
config,
pkgs,
lib,
...
}:
let
cfg = lib.filterAttrs (_: value: value.enable) config.myConfig.resticBackup;
in
{
options.myConfig.resticBackup = lib.mkOption {
type = lib.types.attrsOf (
lib.types.submodule {
options = {
enable = lib.mkEnableOption "";
user = lib.mkOption {
type = lib.types.str;
default = config.users.users.root.name;
};
healthchecks.enable = lib.mkEnableOption "";
extraConfig = lib.mkOption {
type = lib.types.attrsOf lib.types.anything;
default = { };
};
};
}
);
default = { };
};
config = lib.mkIf (cfg != { }) {
systemd.tmpfiles.rules = lib.mapAttrsToList (
name: value: "d /var/cache/restic-backups-${name} 700 ${value.user} ${value.user} -"
) cfg;
users.groups.restic.members = lib.mapAttrsToList (_: value: value.user) cfg;
sops.secrets =
let
resticPermissions = {
mode = "440";
group = config.users.groups.restic.name;
};
in
{
"restic/environment" = resticPermissions;
"restic/password" = resticPermissions;
"healthchecks-ping-key" = lib.mkIf (
(lib.filterAttrs (_: value: value.healthchecks.enable) cfg) != { }
) resticPermissions;
};
services.restic.backups = lib.mapAttrs (
name: value:
{
inherit (value) user;
initialize = true;
repository = "s3:https://s3.eu-central-003.backblazeb2.com/stork-atlas/${name}";
environmentFile = config.sops.secrets."restic/environment".path;
passwordFile = config.sops.secrets."restic/password".path;
pruneOpts = [
"--keep-daily 7"
"--keep-weekly 5"
"--keep-monthly 6"
"--keep-yearly 1"
];
}
// value.extraConfig
) cfg;
systemd.services = lib.mapAttrs' (
name: _:
lib.nameValuePair "restic-backups-${name}" (
let
ping = signal: ''
${lib.getExe pkgs.curl} -fsS -m 10 --retry 5 https://hc-ping.com/$(cat ${
config.sops.secrets."healthchecks-ping-key".path
})/${name}-backup/${signal}
'';
in
{
preStart = lib.mkBefore (ping "start");
postStop = lib.mkAfter (ping "0");
}
)
) (lib.filterAttrs (_: value: value.healthchecks.enable) cfg);
};
}