2021-05-30 14:00:00 +02:00
|
|
|
{ config, pkgs, lib, ... }:
|
|
|
|
let
|
2022-05-11 23:51:24 +02:00
|
|
|
inherit (lib)
|
|
|
|
concatMapStringsSep
|
|
|
|
concatStringsSep
|
|
|
|
filterAttrs
|
|
|
|
flatten
|
|
|
|
isAttrs
|
|
|
|
isString
|
|
|
|
literalExpression
|
|
|
|
mapAttrs'
|
|
|
|
mapAttrsToList
|
|
|
|
mkIf
|
|
|
|
mkOption
|
|
|
|
optionalString
|
|
|
|
partition
|
|
|
|
typeOf
|
|
|
|
types
|
|
|
|
;
|
|
|
|
|
2021-05-30 14:00:00 +02:00
|
|
|
cfg = config.services.btrbk;
|
|
|
|
sshEnabled = cfg.sshAccess != [ ];
|
|
|
|
serviceEnabled = cfg.instances != { };
|
|
|
|
attr2Lines = attr:
|
|
|
|
let
|
2022-05-11 23:51:24 +02:00
|
|
|
pairs = mapAttrsToList (name: value: { inherit name value; }) attr;
|
2021-05-30 14:00:00 +02:00
|
|
|
isSubsection = value:
|
2022-05-11 23:51:24 +02:00
|
|
|
if isAttrs value then true
|
|
|
|
else if isString value then false
|
|
|
|
else throw "invalid type in btrbk config ${typeOf value}";
|
|
|
|
sortedPairs = partition (x: isSubsection x.value) pairs;
|
2021-05-30 14:00:00 +02:00
|
|
|
in
|
2022-05-11 23:51:24 +02:00
|
|
|
flatten (
|
2021-05-30 14:00:00 +02:00
|
|
|
# non subsections go first
|
|
|
|
(
|
|
|
|
map (pair: [ "${pair.name} ${pair.value}" ]) sortedPairs.wrong
|
|
|
|
)
|
|
|
|
++ # subsections go last
|
|
|
|
(
|
|
|
|
map
|
|
|
|
(
|
|
|
|
pair:
|
2022-05-11 23:51:24 +02:00
|
|
|
mapAttrsToList
|
2021-05-30 14:00:00 +02:00
|
|
|
(
|
|
|
|
childname: value:
|
|
|
|
[ "${pair.name} ${childname}" ] ++ (map (x: " " + x) (attr2Lines value))
|
|
|
|
)
|
|
|
|
pair.value
|
|
|
|
)
|
|
|
|
sortedPairs.right
|
|
|
|
)
|
|
|
|
)
|
|
|
|
;
|
|
|
|
addDefaults = settings: { backend = "btrfs-progs-sudo"; } // settings;
|
2022-05-11 23:51:24 +02:00
|
|
|
mkConfigFile = settings: concatStringsSep "\n" (attr2Lines (addDefaults settings));
|
2021-05-30 14:00:00 +02:00
|
|
|
mkTestedConfigFile = name: settings:
|
|
|
|
let
|
|
|
|
configFile = pkgs.writeText "btrbk-${name}.conf" (mkConfigFile settings);
|
|
|
|
in
|
|
|
|
pkgs.runCommand "btrbk-${name}-tested.conf" { } ''
|
|
|
|
mkdir foo
|
|
|
|
cp ${configFile} $out
|
|
|
|
if (set +o pipefail; ${pkgs.btrbk}/bin/btrbk -c $out ls foo 2>&1 | grep $out);
|
|
|
|
then
|
|
|
|
echo btrbk configuration is invalid
|
|
|
|
cat $out
|
|
|
|
exit 1
|
|
|
|
fi;
|
|
|
|
'';
|
|
|
|
in
|
|
|
|
{
|
2022-03-19 16:51:32 +01:00
|
|
|
meta.maintainers = with lib.maintainers; [ oxalica ];
|
|
|
|
|
2021-05-30 14:00:00 +02:00
|
|
|
options = {
|
|
|
|
services.btrbk = {
|
2022-05-11 23:51:24 +02:00
|
|
|
extraPackages = mkOption {
|
2022-07-28 23:19:15 +02:00
|
|
|
description = lib.mdDoc "Extra packages for btrbk, like compression utilities for `stream_compress`";
|
2022-05-11 23:51:24 +02:00
|
|
|
type = types.listOf types.package;
|
2021-05-30 14:00:00 +02:00
|
|
|
default = [ ];
|
2022-05-11 23:51:24 +02:00
|
|
|
example = literalExpression "[ pkgs.xz ]";
|
2021-05-30 14:00:00 +02:00
|
|
|
};
|
2022-05-11 23:51:24 +02:00
|
|
|
niceness = mkOption {
|
2022-07-28 23:19:15 +02:00
|
|
|
description = lib.mdDoc "Niceness for local instances of btrbk. Also applies to remote ones connecting via ssh when positive.";
|
2022-05-11 23:51:24 +02:00
|
|
|
type = types.ints.between (-20) 19;
|
2021-05-30 14:00:00 +02:00
|
|
|
default = 10;
|
|
|
|
};
|
2022-05-11 23:51:24 +02:00
|
|
|
ioSchedulingClass = mkOption {
|
2022-07-28 23:19:15 +02:00
|
|
|
description = lib.mdDoc "IO scheduling class for btrbk (see ionice(1) for a quick description). Applies to local instances, and remote ones connecting by ssh if set to idle.";
|
2022-05-11 23:51:24 +02:00
|
|
|
type = types.enum [ "idle" "best-effort" "realtime" ];
|
2021-05-30 14:00:00 +02:00
|
|
|
default = "best-effort";
|
|
|
|
};
|
2022-05-11 23:51:24 +02:00
|
|
|
instances = mkOption {
|
2022-07-28 23:19:15 +02:00
|
|
|
description = lib.mdDoc "Set of btrbk instances. The instance named `btrbk` is the default one.";
|
2022-05-11 23:51:24 +02:00
|
|
|
type = with types;
|
2021-05-30 14:00:00 +02:00
|
|
|
attrsOf (
|
|
|
|
submodule {
|
|
|
|
options = {
|
2022-05-11 23:51:24 +02:00
|
|
|
onCalendar = mkOption {
|
|
|
|
type = types.nullOr types.str;
|
2021-05-30 14:00:00 +02:00
|
|
|
default = "daily";
|
2022-07-28 23:19:15 +02:00
|
|
|
description = lib.mdDoc ''
|
2022-03-19 16:51:32 +01:00
|
|
|
How often this btrbk instance is started. See systemd.time(7) for more information about the format.
|
|
|
|
Setting it to null disables the timer, thus this instance can only be started manually.
|
|
|
|
'';
|
2021-05-30 14:00:00 +02:00
|
|
|
};
|
2022-05-11 23:51:24 +02:00
|
|
|
settings = mkOption {
|
|
|
|
type = let t = types.attrsOf (types.either types.str (t // { description = "instances of this type recursively"; })); in t;
|
2021-05-30 14:00:00 +02:00
|
|
|
default = { };
|
|
|
|
example = {
|
|
|
|
snapshot_preserve_min = "2d";
|
|
|
|
snapshot_preserve = "14d";
|
|
|
|
volume = {
|
|
|
|
"/mnt/btr_pool" = {
|
|
|
|
target = "/mnt/btr_backup/mylaptop";
|
|
|
|
subvolume = {
|
|
|
|
"rootfs" = { };
|
|
|
|
"home" = { snapshot_create = "always"; };
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
2022-07-28 23:19:15 +02:00
|
|
|
description = lib.mdDoc "configuration options for btrbk. Nested attrsets translate to subsections.";
|
2021-05-30 14:00:00 +02:00
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|
|
|
|
);
|
|
|
|
default = { };
|
|
|
|
};
|
2022-05-11 23:51:24 +02:00
|
|
|
sshAccess = mkOption {
|
2022-07-28 23:19:15 +02:00
|
|
|
description = lib.mdDoc "SSH keys that should be able to make or push snapshots on this system remotely with btrbk";
|
2022-05-11 23:51:24 +02:00
|
|
|
type = with types; listOf (
|
2021-05-30 14:00:00 +02:00
|
|
|
submodule {
|
|
|
|
options = {
|
2022-05-11 23:51:24 +02:00
|
|
|
key = mkOption {
|
2021-05-30 14:00:00 +02:00
|
|
|
type = str;
|
2022-07-28 23:19:15 +02:00
|
|
|
description = lib.mdDoc "SSH public key allowed to login as user `btrbk` to run remote backups.";
|
2021-05-30 14:00:00 +02:00
|
|
|
};
|
2022-05-11 23:51:24 +02:00
|
|
|
roles = mkOption {
|
2021-05-30 14:00:00 +02:00
|
|
|
type = listOf (enum [ "info" "source" "target" "delete" "snapshot" "send" "receive" ]);
|
|
|
|
example = [ "source" "info" "send" ];
|
2022-07-28 23:19:15 +02:00
|
|
|
description = lib.mdDoc "What actions can be performed with this SSH key. See ssh_filter_btrbk(1) for details";
|
2021-05-30 14:00:00 +02:00
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|
|
|
|
);
|
|
|
|
default = [ ];
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
|
|
|
};
|
2022-05-11 23:51:24 +02:00
|
|
|
config = mkIf (sshEnabled || serviceEnabled) {
|
2021-05-30 14:00:00 +02:00
|
|
|
environment.systemPackages = [ pkgs.btrbk ] ++ cfg.extraPackages;
|
|
|
|
security.sudo.extraRules = [
|
|
|
|
{
|
|
|
|
users = [ "btrbk" ];
|
|
|
|
commands = [
|
|
|
|
{ command = "${pkgs.btrfs-progs}/bin/btrfs"; options = [ "NOPASSWD" ]; }
|
|
|
|
{ command = "${pkgs.coreutils}/bin/mkdir"; options = [ "NOPASSWD" ]; }
|
|
|
|
{ command = "${pkgs.coreutils}/bin/readlink"; options = [ "NOPASSWD" ]; }
|
|
|
|
# for ssh, they are not the same than the one hard coded in ${pkgs.btrbk}
|
|
|
|
{ command = "/run/current-system/bin/btrfs"; options = [ "NOPASSWD" ]; }
|
|
|
|
{ command = "/run/current-system/sw/bin/mkdir"; options = [ "NOPASSWD" ]; }
|
|
|
|
{ command = "/run/current-system/sw/bin/readlink"; options = [ "NOPASSWD" ]; }
|
|
|
|
];
|
|
|
|
}
|
|
|
|
];
|
|
|
|
users.users.btrbk = {
|
|
|
|
isSystemUser = true;
|
|
|
|
# ssh needs a home directory
|
|
|
|
home = "/var/lib/btrbk";
|
|
|
|
createHome = true;
|
|
|
|
shell = "${pkgs.bash}/bin/bash";
|
|
|
|
group = "btrbk";
|
|
|
|
openssh.authorizedKeys.keys = map
|
|
|
|
(
|
|
|
|
v:
|
|
|
|
let
|
2022-05-11 23:51:24 +02:00
|
|
|
options = concatMapStringsSep " " (x: "--" + x) v.roles;
|
2021-05-30 14:00:00 +02:00
|
|
|
ioniceClass = {
|
|
|
|
"idle" = 3;
|
|
|
|
"best-effort" = 2;
|
|
|
|
"realtime" = 1;
|
|
|
|
}.${cfg.ioSchedulingClass};
|
|
|
|
in
|
2022-05-11 23:51:24 +02:00
|
|
|
''command="${pkgs.util-linux}/bin/ionice -t -c ${toString ioniceClass} ${optionalString (cfg.niceness >= 1) "${pkgs.coreutils}/bin/nice -n ${toString cfg.niceness}"} ${pkgs.btrbk}/share/btrbk/scripts/ssh_filter_btrbk.sh --sudo ${options}" ${v.key}''
|
2021-05-30 14:00:00 +02:00
|
|
|
)
|
|
|
|
cfg.sshAccess;
|
|
|
|
};
|
|
|
|
users.groups.btrbk = { };
|
|
|
|
systemd.tmpfiles.rules = [
|
|
|
|
"d /var/lib/btrbk 0750 btrbk btrbk"
|
|
|
|
"d /var/lib/btrbk/.ssh 0700 btrbk btrbk"
|
|
|
|
"f /var/lib/btrbk/.ssh/config 0700 btrbk btrbk - StrictHostKeyChecking=accept-new"
|
|
|
|
];
|
2022-05-11 23:51:24 +02:00
|
|
|
environment.etc = mapAttrs'
|
2021-05-30 14:00:00 +02:00
|
|
|
(
|
|
|
|
name: instance: {
|
|
|
|
name = "btrbk/${name}.conf";
|
|
|
|
value.source = mkTestedConfigFile name instance.settings;
|
|
|
|
}
|
|
|
|
)
|
|
|
|
cfg.instances;
|
2022-05-11 23:51:24 +02:00
|
|
|
systemd.services = mapAttrs'
|
2021-05-30 14:00:00 +02:00
|
|
|
(
|
|
|
|
name: _: {
|
|
|
|
name = "btrbk-${name}";
|
|
|
|
value = {
|
|
|
|
description = "Takes BTRFS snapshots and maintains retention policies.";
|
|
|
|
unitConfig.Documentation = "man:btrbk(1)";
|
|
|
|
path = [ "/run/wrappers" ] ++ cfg.extraPackages;
|
|
|
|
serviceConfig = {
|
|
|
|
User = "btrbk";
|
|
|
|
Group = "btrbk";
|
|
|
|
Type = "oneshot";
|
|
|
|
ExecStart = "${pkgs.btrbk}/bin/btrbk -c /etc/btrbk/${name}.conf run";
|
|
|
|
Nice = cfg.niceness;
|
|
|
|
IOSchedulingClass = cfg.ioSchedulingClass;
|
|
|
|
StateDirectory = "btrbk";
|
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|
|
|
|
)
|
|
|
|
cfg.instances;
|
|
|
|
|
2022-05-11 23:51:24 +02:00
|
|
|
systemd.timers = mapAttrs'
|
2021-05-30 14:00:00 +02:00
|
|
|
(
|
|
|
|
name: instance: {
|
|
|
|
name = "btrbk-${name}";
|
|
|
|
value = {
|
|
|
|
description = "Timer to take BTRFS snapshots and maintain retention policies.";
|
|
|
|
wantedBy = [ "timers.target" ];
|
|
|
|
timerConfig = {
|
|
|
|
OnCalendar = instance.onCalendar;
|
|
|
|
AccuracySec = "10min";
|
|
|
|
Persistent = true;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
}
|
|
|
|
)
|
2022-05-11 23:51:24 +02:00
|
|
|
(filterAttrs (name: instance: instance.onCalendar != null)
|
2022-03-19 16:51:32 +01:00
|
|
|
cfg.instances);
|
2021-05-30 14:00:00 +02:00
|
|
|
};
|
|
|
|
|
|
|
|
}
|