mirror of
https://github.com/NixOS/nixpkgs.git
synced 2024-11-15 14:26:33 +01:00
6afb255d97
these changes were generated with nixq 0.0.2, by running nixq ">> lib.mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> mdDoc[remove] Argument[keep]" --batchmode nixos/**.nix nixq ">> Inherit >> mdDoc[remove]" --batchmode nixos/**.nix two mentions of the mdDoc function remain in nixos/, both of which are inside of comments. Since lib.mdDoc is already defined as just id, this commit is a no-op as far as Nix (and the built manual) is concerned.
190 lines
6.3 KiB
Nix
190 lines
6.3 KiB
Nix
{ config, lib, pkgs, ... }:
|
|
|
|
with lib;
|
|
let
|
|
cfg = config.services.duplicity;
|
|
|
|
stateDirectory = "/var/lib/duplicity";
|
|
|
|
localTarget =
|
|
if hasPrefix "file://" cfg.targetUrl
|
|
then removePrefix "file://" cfg.targetUrl else null;
|
|
|
|
in
|
|
{
|
|
options.services.duplicity = {
|
|
enable = mkEnableOption "backups with duplicity";
|
|
|
|
root = mkOption {
|
|
type = types.path;
|
|
default = "/";
|
|
description = ''
|
|
Root directory to backup.
|
|
'';
|
|
};
|
|
|
|
include = mkOption {
|
|
type = types.listOf types.str;
|
|
default = [ ];
|
|
example = [ "/home" ];
|
|
description = ''
|
|
List of paths to include into the backups. See the FILE SELECTION
|
|
section in {manpage}`duplicity(1)` for details on the syntax.
|
|
'';
|
|
};
|
|
|
|
exclude = mkOption {
|
|
type = types.listOf types.str;
|
|
default = [ ];
|
|
description = ''
|
|
List of paths to exclude from backups. See the FILE SELECTION section in
|
|
{manpage}`duplicity(1)` for details on the syntax.
|
|
'';
|
|
};
|
|
|
|
targetUrl = mkOption {
|
|
type = types.str;
|
|
example = "s3://host:port/prefix";
|
|
description = ''
|
|
Target url to backup to. See the URL FORMAT section in
|
|
{manpage}`duplicity(1)` for supported urls.
|
|
'';
|
|
};
|
|
|
|
secretFile = mkOption {
|
|
type = types.nullOr types.path;
|
|
default = null;
|
|
description = ''
|
|
Path of a file containing secrets (gpg passphrase, access key...) in
|
|
the format of EnvironmentFile as described by
|
|
{manpage}`systemd.exec(5)`. For example:
|
|
```
|
|
PASSPHRASE=«...»
|
|
AWS_ACCESS_KEY_ID=«...»
|
|
AWS_SECRET_ACCESS_KEY=«...»
|
|
```
|
|
'';
|
|
};
|
|
|
|
frequency = mkOption {
|
|
type = types.nullOr types.str;
|
|
default = "daily";
|
|
description = ''
|
|
Run duplicity with the given frequency (see
|
|
{manpage}`systemd.time(7)` for the format).
|
|
If null, do not run automatically.
|
|
'';
|
|
};
|
|
|
|
extraFlags = mkOption {
|
|
type = types.listOf types.str;
|
|
default = [ ];
|
|
example = [ "--backend-retry-delay" "100" ];
|
|
description = ''
|
|
Extra command-line flags passed to duplicity. See
|
|
{manpage}`duplicity(1)`.
|
|
'';
|
|
};
|
|
|
|
fullIfOlderThan = mkOption {
|
|
type = types.str;
|
|
default = "never";
|
|
example = "1M";
|
|
description = ''
|
|
If `"never"` (the default) always do incremental
|
|
backups (the first backup will be a full backup, of course). If
|
|
`"always"` always do full backups. Otherwise, this
|
|
must be a string representing a duration. Full backups will be made
|
|
when the latest full backup is older than this duration. If this is not
|
|
the case, an incremental backup is performed.
|
|
'';
|
|
};
|
|
|
|
cleanup = {
|
|
maxAge = mkOption {
|
|
type = types.nullOr types.str;
|
|
default = null;
|
|
example = "6M";
|
|
description = ''
|
|
If non-null, delete all backup sets older than the given time. Old backup sets
|
|
will not be deleted if backup sets newer than time depend on them.
|
|
'';
|
|
};
|
|
maxFull = mkOption {
|
|
type = types.nullOr types.int;
|
|
default = null;
|
|
example = 2;
|
|
description = ''
|
|
If non-null, delete all backups sets that are older than the count:th last full
|
|
backup (in other words, keep the last count full backups and
|
|
associated incremental sets).
|
|
'';
|
|
};
|
|
maxIncr = mkOption {
|
|
type = types.nullOr types.int;
|
|
default = null;
|
|
example = 1;
|
|
description = ''
|
|
If non-null, delete incremental sets of all backups sets that are
|
|
older than the count:th last full backup (in other words, keep only
|
|
old full backups and not their increments).
|
|
'';
|
|
};
|
|
};
|
|
};
|
|
|
|
config = mkIf cfg.enable {
|
|
systemd = {
|
|
services.duplicity = {
|
|
description = "backup files with duplicity";
|
|
|
|
environment.HOME = stateDirectory;
|
|
|
|
script =
|
|
let
|
|
target = escapeShellArg cfg.targetUrl;
|
|
extra = escapeShellArgs ([ "--archive-dir" stateDirectory ] ++ cfg.extraFlags);
|
|
dup = "${pkgs.duplicity}/bin/duplicity";
|
|
in
|
|
''
|
|
set -x
|
|
${dup} cleanup ${target} --force ${extra}
|
|
${lib.optionalString (cfg.cleanup.maxAge != null) "${dup} remove-older-than ${lib.escapeShellArg cfg.cleanup.maxAge} ${target} --force ${extra}"}
|
|
${lib.optionalString (cfg.cleanup.maxFull != null) "${dup} remove-all-but-n-full ${toString cfg.cleanup.maxFull} ${target} --force ${extra}"}
|
|
${lib.optionalString (cfg.cleanup.maxIncr != null) "${dup} remove-all-inc-of-but-n-full ${toString cfg.cleanup.maxIncr} ${target} --force ${extra}"}
|
|
exec ${dup} ${if cfg.fullIfOlderThan == "always" then "full" else "incr"} ${lib.escapeShellArgs (
|
|
[ cfg.root cfg.targetUrl ]
|
|
++ concatMap (p: [ "--include" p ]) cfg.include
|
|
++ concatMap (p: [ "--exclude" p ]) cfg.exclude
|
|
++ (lib.optionals (cfg.fullIfOlderThan != "never" && cfg.fullIfOlderThan != "always") [ "--full-if-older-than" cfg.fullIfOlderThan ])
|
|
)} ${extra}
|
|
'';
|
|
serviceConfig = {
|
|
PrivateTmp = true;
|
|
ProtectSystem = "strict";
|
|
ProtectHome = "read-only";
|
|
StateDirectory = baseNameOf stateDirectory;
|
|
} // optionalAttrs (localTarget != null) {
|
|
ReadWritePaths = localTarget;
|
|
} // optionalAttrs (cfg.secretFile != null) {
|
|
EnvironmentFile = cfg.secretFile;
|
|
};
|
|
} // optionalAttrs (cfg.frequency != null) {
|
|
startAt = cfg.frequency;
|
|
};
|
|
|
|
tmpfiles.rules = optional (localTarget != null) "d ${localTarget} 0700 root root -";
|
|
};
|
|
|
|
assertions = singleton {
|
|
# Duplicity will fail if the last file selection option is an include. It
|
|
# is not always possible to detect but this simple case can be caught.
|
|
assertion = cfg.include != [ ] -> cfg.exclude != [ ] || cfg.extraFlags != [ ];
|
|
message = ''
|
|
Duplicity will fail if you only specify included paths ("Because the
|
|
default is to include all files, the expression is redundant. Exiting
|
|
because this probably isn't what you meant.")
|
|
'';
|
|
};
|
|
};
|
|
}
|