nixos-config/system/all/restic.nix
2020-04-30 02:23:56 +02:00

69 lines
1.7 KiB
Nix

{ config, lib, ... }: {
options = {
backup.all.restic.dirs = lib.mkOption {
default = [ ];
type = with lib.types; listOf str;
};
};
config = let
servers = [
"porani.insecure"
"workhorse.private"
"workout.private"
"pepe.private"
];
dirs = config.backup.all.restic.dirs;
setup = server: {
enable = lib.mkDefault true;
passwordFile = toString <secrets/backup/restic-repo>;
repo = "sftp::remote/remote-${config.networking.hostName}";
requires = [ ];
extraArguments = [
"sftp.command='ssh backup@${server} -i ${
toString <secrets/backup/sftp-user_rsa>
} -s sftp'"
];
initialize = true;
timerConfig = {
OnCalendar = "daily";
Persistent = "true";
};
dirs = dirs;
};
hostname = config.networking.hostName;
infoEntry = server: {
restic = {
folders = dirs;
from = hostname;
to = {
server = server;
repo = config.backup.services.restic."on-${server}".repo;
};
enable = config.backup.services.restic."on-${server}".enable;
};
};
in {
backup.services.restic = lib.zipAttrsWith (name: vals: lib.head vals)
(map (server: { "on-${server}" = setup server; }) servers);
systemd.services = let
timeoutConfig = server: {
name = "backup.on-${server}";
value = { serviceConfig.TimeoutSec = 30 * 60; };
};
in builtins.listToAttrs (map timeoutConfig servers);
environment.etc."info/restic-${hostname}.json" = {
enable = true;
text = builtins.toJSON (map infoEntry servers);
};
};
}