nix-config/hosts/cirrostratus/restic.nix

61 lines
1.4 KiB
Nix
Raw Permalink Normal View History

{
inputs,
config,
pkgs,
lib,
...
}: let
port = "8090";
in {
services.restic.server = lib.mkIf (inputs ? nix-secrets) {
enable = true;
appendOnly = true;
dataDir = "/backup/restic";
listenAddress = "127.0.0.1:${port}";
};
services.nginx.virtualHosts."restic.venberg.xyz" = {
enableACME = true;
forceSSL = true;
locations."/" = {
proxyPass = "http://localhost:${port}";
};
};
sops = lib.mkIf (inputs ? nix-secrets) {
secrets.restic-server-credentials = {
sopsFile = "${inputs.nix-secrets}/restic-server";
format = "binary";
path = "/backup/restic/.htpasswd";
2024-10-21 16:06:30 +02:00
owner = "restic";
};
2024-10-18 15:21:37 +02:00
secrets.restic-url = {
sopsFile = "${inputs.nix-secrets}/restic-client.yaml";
owner = config.host.user;
};
secrets.restic-password = {
sopsFile = "${inputs.nix-secrets}/restic-client.yaml";
owner = config.host.user;
};
};
2024-10-18 15:21:37 +02:00
environment.systemPackages = with pkgs; [
restic
];
2024-10-18 15:21:37 +02:00
services.restic.backups = lib.mkIf (inputs ? nix-secrets) {
remote = {
repositoryFile = config.sops.secrets.restic-url.path;
passwordFile = config.sops.secrets.restic-password.path;
initialize = true;
paths = [
"/storage/syncthing"
2024-10-19 22:08:48 +02:00
"/storage/factorio"
2024-10-18 15:21:37 +02:00
];
timerConfig = {
OnCalendar = "daily";
Persistent = true;
RandomizedDelaySec = "4h";
};
};
};
}