infra/nix/os/containers/backup.nix

143 lines
3.2 KiB
Nix
Raw Permalink Normal View History

2023-02-07 18:24:28 +01:00
{
config,
hostAddress,
localAddress,
subvolumes,
targetPathSuffix ? "",
autoStart ? false,
2024-11-15 10:17:56 +01:00
}:
let
passwords = import ../../variables/passwords.crypt.nix;
subvolumeParentDir = "/var/lib/container-volumes";
2024-11-15 10:17:56 +01:00
in
{
config =
{ pkgs, ... }:
{
system.stateVersion = "20.03"; # Did you read the comment?
2024-11-15 10:17:56 +01:00
imports = [ ../profiles/containers/configuration.nix ];
2024-11-15 10:17:56 +01:00
environment.systemPackages = with pkgs; [
btrfs-progs
btrbk
];
2024-11-15 10:17:56 +01:00
networking.firewall.enable = true;
2024-11-15 10:17:56 +01:00
systemd.services."bkp-sync" = {
enable = true;
description = "bkp-sync service";
2024-11-15 10:17:56 +01:00
serviceConfig = {
Type = "oneshot";
};
2019-02-17 10:03:08 +01:00
2024-11-15 10:17:56 +01:00
after = [ "bkp-run.service" ];
2024-11-15 10:17:56 +01:00
requires = [ "bkp-run.service" ];
2024-11-15 10:17:56 +01:00
path = with pkgs; [ utillinux ];
script = ''
set -x
true
'';
2024-11-15 10:17:56 +01:00
};
2024-11-15 10:17:56 +01:00
systemd.services."bkp-run" = {
enable = true;
description = "bkp-run";
serviceConfig = {
Type = "oneshot";
};
partOf = [ "bkp-sync.service" ];
path = with pkgs; [
btrfs-progs
btrbk
coreutils
];
script =
let
btrbkConf = pkgs.writeText "cfg" ''
timestamp_format long
ssh_identity ${passwords.storage.backupTarget.keyPath}
ssh_user ${passwords.storage.backupTarget.user}
ssh_compression no
backend_remote btrfs-progs-sudo
compat_remote busybox
btrfs_commit_delete each
snapshot_create onchange
snapshot_preserve_min latest
snapshot_preserve 7d 4w
target_preserve_min latest
target_preserve 7d 4w 12m *y
volume ${subvolumeParentDir}
target ${passwords.storage.backupTarget.target}/container-volumes/${targetPathSuffix}
${builtins.foldl' (sum: elem: sum + " subvolume " + elem + "\n") "" subvolumes}
'';
in
''
#! ${pkgs.bash}/bin/bash
set -Eeuxo pipefail
btrbk -c ${btrbkConf} --progress ''${@:-run}
'';
};
2024-11-15 10:17:56 +01:00
systemd.timers."bkp" = {
description = "Timer to trigger bkp periodically";
enable = true;
wantedBy = [
"timer.target"
"multi-user.target"
];
timerConfig = {
# Obtained using `systemd-analyze calendar "Wed 23:00"`
# OnCalendar = "Wed *-*-* 23:00:00";
OnStartupSec = "1m";
Unit = "bkp-sync.service";
OnUnitInactiveSec = "2h";
Persistent = "true";
};
};
};
inherit autoStart;
bindMounts = {
"${subvolumeParentDir}" = {
hostPath = subvolumeParentDir;
isReadOnly = false;
};
"/etc/secrets/" = {
hostPath = "/var/lib/container-volumes/backup/etc-secrets";
isReadOnly = true;
};
"/dev/fuse" = {
hostPath = "/dev/fuse";
isReadOnly = false;
};
};
2023-02-07 18:24:28 +01:00
allowedDevices = [
{
node = "/dev/fuse";
modifier = "rw";
}
];
2024-11-15 10:17:56 +01:00
extraFlags = [ "--resolv-conf=bind-host" ];
2022-10-31 11:04:38 +01:00
privateNetwork = true;
2024-11-15 10:17:56 +01:00
forwardPorts = [ ];
inherit hostAddress localAddress;
}