mail2-nixos-config/borgbackup.nix

64 lines
1.8 KiB
Nix
Raw Normal View History

2019-06-15 10:33:12 +02:00
{ pkgs, ... }:
2019-06-15 10:27:05 +02:00
let
borgPassCommand = pkgs.writeScript "borgPassCommand" ''
2019-06-15 10:33:12 +02:00
#!${pkgs.stdenv.shell}
2019-06-15 10:27:05 +02:00
set -euo pipefail
# Make sure everything but the password ends up on stderr
exec 3>&1 >&2
mkdir -p /var/lib/borgbackup
chown root:root /var/lib/borgbackup
chmod 700 /var/lib/borgbackup
if [ ! -s /var/lib/borgbackup/sshkey ]; then
${pkgs.openssh}/bin/ssh-keygen -t rsa -b 4096 -N "" -f /var/lib/borgbackup/sshkey
fi
if [ ! -s /var/lib/borgbackup/repokey ]; then
head -c 1024 /dev/urandom | base64 > /var/lib/borgbackup/repokey
chmod 400 /var/lib/borgbackup/repokey
fi
# Password needs to go into fd 3 as that is the real stdout
cat /var/lib/borgbackup/repokey >&3
'';
in
{
services.borgbackup.jobs.postfixadmin = {
readWritePaths = [ "/var/lib/borgbackup" ];
paths = "/var/lib/postfixadmin";
exclude = [ ];
2019-06-15 11:23:51 +02:00
repo = "mail2@host01.hamburg.freifunk.net:postfixadmin";
2019-06-15 10:27:05 +02:00
prune.keep = {
within = "2d";
daily = 7;
weekly = 2;
};
encryption = {
mode = "repokey";
2019-06-15 10:33:12 +02:00
passCommand = "${borgPassCommand}";
2019-06-15 10:27:05 +02:00
};
2019-06-15 10:43:01 +02:00
environment = {
BORG_RSH = "${pkgs.openssh}/bin/ssh -i /var/lib/borgbackup/sshkey";
};
2019-06-15 10:27:05 +02:00
compression = "auto,lz4";
startAt = "hourly";
};
2019-06-15 11:32:15 +02:00
services.borgbackup.jobs.maildata = {
readWritePaths = [ "/var/lib/borgbackup" ];
paths = "/srv/vmail";
exclude = [ ];
repo = "mail2@host01.hamburg.freifunk.net:maildata";
prune.keep = {
daily = 7;
weekly = 2;
};
encryption = {
mode = "repokey";
passCommand = "${borgPassCommand}";
};
environment = {
BORG_RSH = "${pkgs.openssh}/bin/ssh -i /var/lib/borgbackup/sshkey";
};
compression = "auto,lz4";
startAt = "daily";
};
2019-06-15 10:27:05 +02:00
}