Simon Bruder
816004e80b
This implements a crude mechanism for signalling my router to add the packets to its own qdisc. The way in which this is implemented with nftables is hacky because of NixOS’ limitations on build-time checking (which obviously can’t know about the existence of cgroups on the target).
159 lines
4.6 KiB
Nix
159 lines
4.6 KiB
Nix
{ pkgs, config, lib, ... }:
|
||
let
|
||
cfg = config.sbruder.restic.system;
|
||
|
||
sftpTarget = "u313368-sub4@u313368-sub4.your-storagebox.de";
|
||
sftpPort = 23;
|
||
repository = "sftp://${sftpTarget}:${toString sftpPort}/personal";
|
||
excludes = [
|
||
# Caches
|
||
"/home/*/Downloads/"
|
||
"/home/*/.cache/"
|
||
"/home/*/**/cache/"
|
||
"/home/*/.local/share/Trash" # some gui applications use it
|
||
"/root/.cache"
|
||
"/data/cache/"
|
||
"/var/cache/"
|
||
|
||
# Rust
|
||
"/home/*/.rustup/toolchains/"
|
||
"/home/*/.cargo"
|
||
|
||
# Misc
|
||
"/home/*/mount"
|
||
"/home/*/mounts"
|
||
|
||
# Docker (state should be kept somewhere else)
|
||
"/var/lib/docker/"
|
||
|
||
# Static configuration (generated from this repository)
|
||
"/etc/static/"
|
||
] ++ cfg.extraExcludes;
|
||
excludesFile = pkgs.writeText "excludes.txt" (lib.concatStringsSep "\n" excludes);
|
||
|
||
# script to use restic as user without dealing with authentication
|
||
authScript = pkgs.writeShellScriptBin "restic-auth" ''
|
||
${pkgs.restic}/bin/restic \
|
||
--password-command="pass data/backup/restic-nixos" \
|
||
--repo "${repository}" \
|
||
$@
|
||
'';
|
||
|
||
# HACK: NixOS’ nftables implementation runs nft -c inside the build sandbox,
|
||
# where the target host’s cgroups are not available,
|
||
# and therefore fails.
|
||
# This is there to allow my home router to put backup traffic into the right qdisc,
|
||
# as the ip address and port are also used for other things.
|
||
# This is somewhat of an abuse of the DSCP mark.
|
||
qosRules = pkgs.writeText "restic-qos.nft" ''
|
||
table inet restic
|
||
delete table inet restic
|
||
|
||
table inet restic {
|
||
chain output {
|
||
type filter hook output priority mangle
|
||
ip version 4 socket cgroupv2 level 1 "restic.slice" ip dscp set af12 return
|
||
ip6 version 6 socket cgroupv2 level 1 "restic.slice" ip6 dscp set af12 return
|
||
}
|
||
}
|
||
'';
|
||
in
|
||
{
|
||
options.sbruder.restic.system = {
|
||
enable = lib.mkEnableOption "restic";
|
||
timerConfig = lib.mkOption {
|
||
type = with lib.types; attrsOf str;
|
||
default = {
|
||
OnCalendar = "18:00";
|
||
RandomizedDelaySec = "2h";
|
||
};
|
||
};
|
||
extraPaths = lib.mkOption {
|
||
type = lib.types.listOf lib.types.str;
|
||
default = [ ];
|
||
example = [ "/data" ];
|
||
};
|
||
extraExcludes = lib.mkOption {
|
||
type = lib.types.listOf lib.types.str;
|
||
default = [ ];
|
||
};
|
||
uploadLimit = lib.mkOption {
|
||
type = lib.types.nullOr lib.types.int;
|
||
default = null;
|
||
};
|
||
qos = (lib.mkEnableOption "QoS marking (DSCP AF12) of outgoing packets") // { default = !(lib.isNull cfg.uploadLimit); };
|
||
prune = lib.mkEnableOption "pruning";
|
||
};
|
||
|
||
config = lib.mkIf cfg.enable {
|
||
sops.secrets = {
|
||
restic-password = { };
|
||
restic-repository = { };
|
||
} // lib.optionalAttrs cfg.prune {
|
||
restic-ssh-key = {
|
||
sopsFile = ../../machines/${config.networking.hostName}/secrets.yaml;
|
||
};
|
||
};
|
||
|
||
services.restic.backups.system = {
|
||
inherit (cfg) timerConfig;
|
||
repositoryFile = config.sops.secrets.restic-repository.path;
|
||
passwordFile = config.sops.secrets.restic-password.path;
|
||
paths = [
|
||
"/etc"
|
||
"/home"
|
||
"/root"
|
||
"/srv"
|
||
"/var"
|
||
] ++ cfg.extraPaths;
|
||
extraBackupArgs = [
|
||
"--compression auto"
|
||
"--exclude-caches"
|
||
"--exclude-file=${excludesFile}"
|
||
"--tag system"
|
||
"--verbose"
|
||
] ++ lib.optional (cfg.uploadLimit != null) "--limit-upload=${toString cfg.uploadLimit}";
|
||
};
|
||
|
||
systemd.services."restic-backups-system".serviceConfig = {
|
||
"Nice" = 10;
|
||
"IOSchedulingClass" = "best-effort";
|
||
"IOSchedulingPriority" = 7;
|
||
ExecStartPre = [
|
||
"${pkgs.nftables}/bin/nft -f ${qosRules}"
|
||
];
|
||
ExecStopPost = [
|
||
"${pkgs.nftables}/bin/nft delete table inet restic"
|
||
];
|
||
Slice = "restic.slice";
|
||
};
|
||
|
||
services.restic.backups.system-prune = lib.mkIf cfg.prune {
|
||
inherit repository;
|
||
passwordFile = config.sops.secrets.restic-password.path;
|
||
timerConfig = {
|
||
OnCalendar = "*-1/2-07 03:00:00";
|
||
RandomizedDelaySec = "4h";
|
||
};
|
||
paths = [ ];
|
||
extraOptions = [
|
||
"-o"
|
||
"sftp.command='ssh -i ${config.sops.secrets.restic-ssh-key.path} -p ${toString sftpPort} ${sftpTarget} -s sftp'"
|
||
];
|
||
pruneOpts = [
|
||
"--compression auto"
|
||
"--keep-daily 7"
|
||
"--keep-monthly 12"
|
||
"--keep-weekly 5"
|
||
"--keep-yearly 10"
|
||
"--tag system"
|
||
"--verbose"
|
||
] ++ lib.optional (cfg.uploadLimit != null) "--limit-upload=${toString cfg.uploadLimit}";
|
||
};
|
||
|
||
environment.systemPackages = [
|
||
authScript
|
||
];
|
||
};
|
||
}
|