nixos/modules/services/restic-server/default.nix
2024-02-02 13:45:05 +01:00

91 lines
2.1 KiB
Nix

{
config,
inputs,
lib,
pkgs,
...
}:
let
cfg = config.services.az-restic-server;
in
{
options = {
services.az-restic-server = {
enable = lib.mkEnableOption "Enable a restic server.";
repository = lib.mkOption {
type = lib.types.path;
description = "The directory where your backups get stored.";
default = "/var/lib/restic-server";
};
};
};
config = lib.mkIf cfg.enable {
services.az-telegram-notifications.enable = true;
age.secrets.resticKey = {
file = "${inputs.self}/scrts/restic.key.age";
mode = "440";
owner = "restic";
group = "restic";
};
environment.systemPackages = with pkgs; [ restic ];
fileSystems."${cfg.repository}" = {
device = "10.7.89.108:restic-server";
fsType = "nfs";
options = [
"noatime"
"hard"
"nfsvers=4.0"
];
};
services.restic.server = {
enable = true;
dataDir = cfg.repository;
extraFlags = [ "--no-auth" ];
};
networking.firewall.allowedTCPPorts = [ 8000 ];
systemd.services.restic-prune = {
serviceConfig = {
Type = "oneshot";
User = "restic";
};
onFailure = [ "unit-status-telegram@%n.service" ];
script = ''
${pkgs.restic}/bin/restic \
--repo ${cfg.repository} \
--password-file ${config.age.secrets.resticKey.path} \
prune \
'';
};
systemd.timers.restic-prune = {
wantedBy = [ "timers.target" ];
partOf = [ "restic-prune.service" ];
timerConfig.OnCalendar = [ "*-*-* 08:00:00" ];
};
systemd.services.restic-check = {
serviceConfig = {
Type = "oneshot";
User = "restic";
};
onFailure = [ "unit-status-telegram@%n.service" ];
script = ''
${pkgs.restic}/bin/restic \
--repo ${cfg.repository} \
--password-file ${config.age.secrets.resticKey.path} \
check \
'';
};
systemd.timers.restic-check = {
wantedBy = [ "timers.target" ];
partOf = [ "restic-check.service" ];
timerConfig.OnCalendar = [ "*-*-* 07:00:00" ];
};
};
}