nixos-config/modules/restic.nix

105 lines
2.9 KiB
Nix
Raw Normal View History

2020-12-05 14:19:34 +01:00
{ pkgs, config, lib, options, ... }:
2020-08-22 17:44:39 +02:00
let
2020-12-05 14:19:34 +01:00
cfg = config.sbruder.restic;
2020-10-17 09:58:44 +02:00
name = "${config.networking.hostName}-system";
repository = "s3:https://s3.eu-central-1.wasabisys.com/sbruder-restic";
2020-08-22 17:44:39 +02:00
excludes = [
2020-12-21 13:08:22 +01:00
# Caches
2020-08-22 17:44:39 +02:00
"/home/*/Downloads/"
"/home/*/.cache/"
"/home/*/**/cache/"
2020-12-21 13:08:22 +01:00
"/home/*/.local/share/Trash" # some gui applications use it
"/data/cache/"
2020-08-22 17:44:39 +02:00
# Rust
"/home/*/**/target/debug/"
"/home/*/**/target/doc/"
"/home/*/**/target/release/"
"/home/*/**/target/rls/"
"/home/*/**/target/tarpaulin/"
"/home/*/**/target/wasm32-unknown-unknown/"
"/home/*/.rustup/toolchains/"
"/home/*/.cargo"
2020-12-21 13:08:22 +01:00
# Misc
2020-08-22 17:44:39 +02:00
"/home/*/mount"
2020-12-21 13:08:22 +01:00
# Docker (state should be kept somewhere else)
2020-08-22 17:44:39 +02:00
"/var/lib/docker/"
] ++ cfg.extraExcludes;
2020-08-22 17:44:39 +02:00
excludesFile = pkgs.writeText "exludes.txt" (builtins.concatStringsSep "\n" excludes);
# script to use restic as user without dealing with authentication
authScript = pkgs.writeShellScriptBin "restic-auth" ''
. <(pass nixos/machines/${config.networking.hostName}/restic-s3 | sed 's/^/export /')
2020-12-22 19:09:36 +01:00
${pkgs.unstable.restic}/bin/restic \
--password-command="pass nixos/machines/${config.networking.hostName}/restic-password" \
--repo "${repository}" \
$@
'';
2020-08-22 17:44:39 +02:00
in
{
2020-12-05 14:19:34 +01:00
options.sbruder.restic = {
enable = lib.mkEnableOption "restic";
2020-12-21 12:33:46 +01:00
timerConfig = lib.recursiveUpdate
((builtins.elemAt
(builtins.elemAt
options.services.restic.backups.type.getSubModules
0
).imports
0)
{ name = ""; }).options.timerConfig
{
default = {
OnCalendar = "20:00";
RandomizedDelaySec = "2h";
2020-12-05 14:19:34 +01:00
};
2020-12-21 12:33:46 +01:00
};
extraPaths = lib.mkOption {
type = lib.types.listOf lib.types.str;
default = [ ];
example = [ "/data" ];
};
extraExcludes = lib.mkOption {
type = lib.types.listOf lib.types.str;
default = [ ];
};
2020-08-22 17:44:39 +02:00
};
2020-10-17 09:58:44 +02:00
2020-12-22 19:09:36 +01:00
# custom module
disabledModules = [ "services/backup/restic.nix" ];
imports = [ (import /home/simon/src/nixpkgs/nixos/modules/services/backup/restic.nix { inherit config lib; pkgs = pkgs.unstable; }) ];
2020-12-05 14:19:34 +01:00
config = lib.mkIf cfg.enable {
services.restic.backups."${name}" = {
2020-12-22 19:09:36 +01:00
# FIXME: replace with secret once repository uses rest server
repositoryFile = (pkgs.writeText "restic-repository" repository);
passwordFile = toString <secrets/restic-password>;
s3CredentialsFile = toString <secrets/restic-s3>;
paths = [
"/home"
"/srv"
"/var"
] ++ cfg.extraPaths;
2020-12-05 14:19:34 +01:00
initialize = true;
extraBackupArgs = [
"--exclude-caches"
"--exclude-file=${excludesFile}"
"--verbose"
];
timerConfig = cfg.timerConfig;
};
systemd.services."restic-backups-${name}".serviceConfig = {
"Nice" = 10;
"IOSchedulingClass" = "best-effort";
"IOSchedulingPriority" = 7;
};
environment.systemPackages = [
authScript
];
2020-10-17 09:58:44 +02:00
};
2020-08-22 17:44:39 +02:00
}