Merge pull request #16 from wi11-holdsworth/enhancement/15
Create service-agnostic borgbackup helper function
This commit is contained in:
commit
15cca7eae5
5 changed files with 121 additions and 79 deletions
75
modules/nixos/backup.nix
Normal file
75
modules/nixos/backup.nix
Normal file
|
|
@ -0,0 +1,75 @@
|
|||
service: servicecfg:
|
||||
{
|
||||
# keep-sorted start
|
||||
pkgs,
|
||||
config,
|
||||
lib,
|
||||
# keep-sorted end
|
||||
}:
|
||||
let
|
||||
notify =
|
||||
{
|
||||
tag,
|
||||
msg,
|
||||
location,
|
||||
}:
|
||||
''
|
||||
${pkgs.curl}/bin/curl \
|
||||
-H "X-Tags: ${tag},BorgBackup,Server,${location}" \
|
||||
-d "${msg}" \
|
||||
${config.services.ntfy-sh.settings.base-url}/backups
|
||||
'';
|
||||
notifySuccess =
|
||||
context:
|
||||
notify {
|
||||
tag = "tada";
|
||||
msg = "Backup succeeded";
|
||||
location = "${context}/${service}";
|
||||
};
|
||||
notifyFailure =
|
||||
context:
|
||||
notify {
|
||||
tag = "rotating_light";
|
||||
msg = "Backup failed, check logs";
|
||||
location = "${context}/${service}";
|
||||
};
|
||||
job =
|
||||
context: contextcfg:
|
||||
lib.nameValuePair "${context}-${service}" (
|
||||
{
|
||||
compression = "auto,zstd";
|
||||
startAt = "*-*-* 04:00:00 Australia/Melbourne";
|
||||
prune.keep = {
|
||||
daily = 7;
|
||||
weekly = 4;
|
||||
monthly = 6;
|
||||
};
|
||||
postHook = ''
|
||||
if [ $exitStatus -eq 0 ]; then
|
||||
${notifySuccess context}
|
||||
else
|
||||
${notifyFailure context}
|
||||
fi
|
||||
'';
|
||||
}
|
||||
// contextcfg
|
||||
// servicecfg
|
||||
);
|
||||
in
|
||||
builtins.listToAttrs [
|
||||
(job "onsite" {
|
||||
repo = "/backup/repo";
|
||||
encryption = {
|
||||
mode = "repokey-blake2";
|
||||
passCommand = "cat ${config.age.secrets.borgbackup-server-onsite.path}";
|
||||
};
|
||||
})
|
||||
(job "offsite" {
|
||||
repo = "vuc5c3xq@vuc5c3xq.repo.borgbase.com:repo";
|
||||
encryption = {
|
||||
mode = "repokey-blake2";
|
||||
passCommand = "cat ${config.age.secrets.borgbackup-server-offsite.path}";
|
||||
};
|
||||
environment.BORG_RSH = "ssh -i /home/srv/.ssh/id_ed25519";
|
||||
})
|
||||
]
|
||||
|
|
@ -1,4 +1,9 @@
|
|||
{ config, lib, ... }:
|
||||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}:
|
||||
let
|
||||
feature = "server";
|
||||
in
|
||||
|
|
@ -26,6 +31,17 @@ in
|
|||
# keep-sorted end
|
||||
|
||||
users.groups.media = { };
|
||||
|
||||
services.borgbackup.jobs =
|
||||
import ../backup.nix "srv"
|
||||
{
|
||||
paths = [ "/srv" ];
|
||||
}
|
||||
{
|
||||
inherit config;
|
||||
inherit lib;
|
||||
inherit pkgs;
|
||||
};
|
||||
};
|
||||
|
||||
imports = [ ];
|
||||
|
|
|
|||
|
|
@ -1,87 +1,13 @@
|
|||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
...
|
||||
}:
|
||||
let
|
||||
feature = "borgbackup-srv";
|
||||
|
||||
secret = "borgbackup";
|
||||
notify =
|
||||
{
|
||||
tag,
|
||||
msg,
|
||||
location,
|
||||
}:
|
||||
''
|
||||
${pkgs.curl}/bin/curl -H "X-Tags: ${tag},BorgBackup,Server,${location}" -d "${msg}" ${config.services.ntfy-sh.settings.base-url}/backups
|
||||
'';
|
||||
notifySuccess =
|
||||
location:
|
||||
notify {
|
||||
tag = "tada";
|
||||
msg = "Backup succeeded";
|
||||
inherit location;
|
||||
};
|
||||
notifyFailure =
|
||||
location:
|
||||
notify {
|
||||
tag = "rotating_light";
|
||||
msg = "Backup failed, check logs";
|
||||
inherit location;
|
||||
};
|
||||
|
||||
in
|
||||
{
|
||||
config = lib.mkIf config.${feature}.enable {
|
||||
services.borgbackup.jobs =
|
||||
let
|
||||
srv = location: {
|
||||
paths = [
|
||||
"/srv"
|
||||
"/home/srv/.config/syncthing"
|
||||
"/home/srv/Sync"
|
||||
];
|
||||
|
||||
compression = "auto,zstd";
|
||||
|
||||
startAt = "*-*-* 04:00:00 Australia/Melbourne";
|
||||
|
||||
prune.keep = {
|
||||
daily = 7;
|
||||
weekly = 4;
|
||||
monthly = 6;
|
||||
};
|
||||
|
||||
postHook = ''
|
||||
if [ $exitStatus -eq 0 ]; then
|
||||
${notifySuccess location}
|
||||
else
|
||||
${notifyFailure location}
|
||||
fi
|
||||
'';
|
||||
};
|
||||
|
||||
in
|
||||
{
|
||||
onsite = srv "onsite" // {
|
||||
repo = "/backup/repo";
|
||||
|
||||
encryption.mode = "repokey-blake2";
|
||||
encryption.passCommand = "cat ${config.age.secrets.borgbackup-server-onsite.path}";
|
||||
};
|
||||
|
||||
offsite = srv "offsite" // {
|
||||
repo = "vuc5c3xq@vuc5c3xq.repo.borgbase.com:repo";
|
||||
|
||||
encryption.mode = "repokey-blake2";
|
||||
encryption.passCommand = "cat ${config.age.secrets.borgbackup-server-offsite.path}";
|
||||
|
||||
environment.BORG_RSH = "ssh -i /home/srv/.ssh/id_ed25519";
|
||||
};
|
||||
};
|
||||
|
||||
# onsite drive
|
||||
services.udisks2.enable = true;
|
||||
|
||||
|
|
@ -92,11 +18,11 @@ in
|
|||
|
||||
# secrets
|
||||
age.secrets = {
|
||||
"${secret}-server-onsite" = {
|
||||
file = ../../../secrets/${secret}-server-onsite.age;
|
||||
"borgbackup-server-onsite" = {
|
||||
file = ../../../secrets/borgbackup-server-onsite.age;
|
||||
};
|
||||
"${secret}-server-offsite" = {
|
||||
file = ../../../secrets/${secret}-server-offsite.age;
|
||||
"borgbackup-server-offsite" = {
|
||||
file = ../../../secrets/borgbackup-server-offsite.age;
|
||||
};
|
||||
};
|
||||
};
|
||||
|
|
|
|||
|
|
@ -1,6 +1,7 @@
|
|||
{
|
||||
config,
|
||||
lib,
|
||||
pkgs,
|
||||
userName,
|
||||
hostName,
|
||||
...
|
||||
|
|
@ -62,6 +63,27 @@ in
|
|||
};
|
||||
};
|
||||
|
||||
# backup
|
||||
borgbackup.jobs =
|
||||
# we only need one syncthing host to be backed up
|
||||
# choose server because borgbackup is the most fleshed out
|
||||
# on srv currently
|
||||
if userName == "srv" then
|
||||
import ../backup.nix feature
|
||||
{
|
||||
paths = [
|
||||
"/home/srv/.config/syncthing"
|
||||
"/home/srv/Sync"
|
||||
];
|
||||
}
|
||||
{
|
||||
inherit config;
|
||||
inherit lib;
|
||||
inherit pkgs;
|
||||
}
|
||||
else
|
||||
null;
|
||||
|
||||
# reverse proxy
|
||||
nginx = {
|
||||
virtualHosts."${feature}.fi33.buzz" = {
|
||||
|
|
|
|||
|
|
@ -15,6 +15,9 @@ in
|
|||
enable = true;
|
||||
};
|
||||
|
||||
# backup
|
||||
borgbackup.jobs = feature { };
|
||||
|
||||
# reverse proxy
|
||||
nginx.virtualHosts."${feature}.fi33.buzz" = {
|
||||
forceSSL = true;
|
||||
|
|
|
|||
Loading…
Add table
Add a link
Reference in a new issue