mirror of
https://github.com/starr-dusT/dotfiles.git
synced 2025-05-18 18:36:05 -07:00
Compare commits
7 Commits
145678ae78
...
a9bd38f54f
Author | SHA1 | Date | |
---|---|---|---|
a9bd38f54f | |||
2422903f7a | |||
4f3f1c8588 | |||
4b6673ce8f | |||
78230b35a1 | |||
51e2913d6f | |||
e6ccd78690 |
@ -1,10 +1,18 @@
|
|||||||
source_directories:
|
source_directories:
|
||||||
- /engi/backup # Static files and service dumps
|
- /engi/backup # Static files and service dumps
|
||||||
#- /home/tstarr/Sync # Syncthing files
|
- /var/lib/nextcloud # nextcloud files (besides sql dump)
|
||||||
|
- /home/tstarr/sync # Syncthing backups
|
||||||
|
|
||||||
before_backup:
|
before_backup:
|
||||||
- "tree /engi > /engi/backup/tree.txt"
|
- "tree /engi > /engi/backup/tree.txt"
|
||||||
- sudo -u gitea backup-dump-gitea
|
- sudo -u gitea dump-gitea
|
||||||
|
- sudo -u nextcloud dump-nextcloud
|
||||||
|
- sudo -u miniflux dump-miniflux
|
||||||
|
- nextcloud-occ maintenance:mode --on
|
||||||
|
|
||||||
|
after_backup:
|
||||||
|
- restore-docker-containers
|
||||||
|
- nextcloud-occ maintenance:mode --off
|
||||||
|
|
||||||
archive_name_format: 'torus_bulk.borg-{now}'
|
archive_name_format: 'torus_bulk.borg-{now}'
|
||||||
|
|
||||||
|
@ -41,6 +41,7 @@
|
|||||||
certPath = ../../secrets/syncthing/bulwark/cert.pem.age;
|
certPath = ../../secrets/syncthing/bulwark/cert.pem.age;
|
||||||
devices = {
|
devices = {
|
||||||
"kestrel" = { id = "5WWL4FE-ARZ4FHP-J33HQCH-CZKEXLN-2RAY4KW-PDI754F-3HVPZYI-VC3ESAF"; };
|
"kestrel" = { id = "5WWL4FE-ARZ4FHP-J33HQCH-CZKEXLN-2RAY4KW-PDI754F-3HVPZYI-VC3ESAF"; };
|
||||||
|
"torus" = { id = "ZVABUCA-3SA5QKR-OZSCIS5-RDAHR2V-D4R4NFK-ZBYOKDP-6HQUG2M-BNL3DAO"; };
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
@ -36,7 +36,6 @@
|
|||||||
desktop = {
|
desktop = {
|
||||||
enable = true;
|
enable = true;
|
||||||
gnome.enable = true;
|
gnome.enable = true;
|
||||||
peripherals.enable = true;
|
|
||||||
};
|
};
|
||||||
devel = {
|
devel = {
|
||||||
engineering.enable = true;
|
engineering.enable = true;
|
||||||
@ -63,6 +62,7 @@
|
|||||||
certPath = ../../secrets/syncthing/kestrel/cert.pem.age;
|
certPath = ../../secrets/syncthing/kestrel/cert.pem.age;
|
||||||
devices = {
|
devices = {
|
||||||
"bulwark" = { id = "YKPOWTQ-XMXG3SD-XKLPVEC-H4SO345-2ZZQK65-EBISRED-ISKCFMQ-T74P6Q5"; };
|
"bulwark" = { id = "YKPOWTQ-XMXG3SD-XKLPVEC-H4SO345-2ZZQK65-EBISRED-ISKCFMQ-T74P6Q5"; };
|
||||||
|
"torus" = { id = "ZVABUCA-3SA5QKR-OZSCIS5-RDAHR2V-D4R4NFK-ZBYOKDP-6HQUG2M-BNL3DAO"; };
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
@ -102,6 +102,15 @@
|
|||||||
};
|
};
|
||||||
services = {
|
services = {
|
||||||
ssh.enable = true;
|
ssh.enable = true;
|
||||||
|
syncthing = {
|
||||||
|
enable = true;
|
||||||
|
keyPath = ../../secrets/syncthing/torus/key.pem.age;
|
||||||
|
certPath = ../../secrets/syncthing/torus/cert.pem.age;
|
||||||
|
devices = {
|
||||||
|
"bulwark" = { id = "YKPOWTQ-XMXG3SD-XKLPVEC-H4SO345-2ZZQK65-EBISRED-ISKCFMQ-T74P6Q5"; };
|
||||||
|
"kestrel" = { id = "5WWL4FE-ARZ4FHP-J33HQCH-CZKEXLN-2RAY4KW-PDI754F-3HVPZYI-VC3ESAF"; };
|
||||||
|
};
|
||||||
|
};
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
@ -11,7 +11,7 @@ in {
|
|||||||
];
|
];
|
||||||
|
|
||||||
environment.systemPackages = [
|
environment.systemPackages = [
|
||||||
(pkgs.writeScriptBin "backup-dump-gitea" ''
|
(pkgs.writeScriptBin "dump-gitea" ''
|
||||||
#!/bin/sh
|
#!/bin/sh
|
||||||
cd ${dumpFolder}
|
cd ${dumpFolder}
|
||||||
[ -e gitea-dump.zip ] && rm gitea-dump.zip
|
[ -e gitea-dump.zip ] && rm gitea-dump.zip
|
||||||
|
@ -1,7 +1,24 @@
|
|||||||
{ config, lib, pkgs, user, ... }:
|
{ config, lib, pkgs, user, ... }:
|
||||||
{
|
let
|
||||||
|
dumpFolder = "/engi/backup/dumps/nextcloud";
|
||||||
|
domain = "cloud.tstarr.us";
|
||||||
|
in {
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
cron
|
cron
|
||||||
|
zip
|
||||||
|
rsync
|
||||||
|
(pkgs.writeScriptBin "dump-nextcloud" ''
|
||||||
|
#!/bin/sh
|
||||||
|
cd ${dumpFolder}
|
||||||
|
[ -e nextcloud-sql ] && rm nextcloud-sql
|
||||||
|
nextcloud-occ maintenance:mode --on
|
||||||
|
mysqldump --single-transaction nextcloud > ${dumpFolder}/nextcloud-sql
|
||||||
|
nextcloud-occ maintenance:mode --off
|
||||||
|
'')
|
||||||
|
];
|
||||||
|
|
||||||
|
systemd.tmpfiles.rules = [
|
||||||
|
"d ${dumpFolder} 0775 nextcloud nextcloud -"
|
||||||
];
|
];
|
||||||
|
|
||||||
# nextcloud secrets
|
# nextcloud secrets
|
||||||
@ -13,7 +30,7 @@
|
|||||||
|
|
||||||
services = {
|
services = {
|
||||||
nginx.virtualHosts = {
|
nginx.virtualHosts = {
|
||||||
"cloud.tstarr.us" = {
|
"${domain}" = {
|
||||||
forceSSL = true;
|
forceSSL = true;
|
||||||
enableACME = true;
|
enableACME = true;
|
||||||
};
|
};
|
||||||
@ -21,7 +38,7 @@
|
|||||||
|
|
||||||
nextcloud = {
|
nextcloud = {
|
||||||
enable = true;
|
enable = true;
|
||||||
hostName = "cloud.tstarr.us";
|
hostName = "${domain}";
|
||||||
|
|
||||||
# Need to manually increment with every major upgrade.
|
# Need to manually increment with every major upgrade.
|
||||||
package = pkgs.nextcloud29;
|
package = pkgs.nextcloud29;
|
||||||
|
@ -1,8 +1,22 @@
|
|||||||
{ config, lib, pkgs, user, ... }:
|
{ config, lib, pkgs, user, ... }:
|
||||||
let
|
let
|
||||||
domain = "rssbridge.tstarr.us";
|
domain = "rssbridge.tstarr.us";
|
||||||
|
dumpFolder = "/engi/backup/dumps/miniflux";
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
|
systemd.tmpfiles.rules = [
|
||||||
|
"d ${dumpFolder} 0775 miniflux miniflux -"
|
||||||
|
];
|
||||||
|
|
||||||
|
environment.systemPackages = [
|
||||||
|
(pkgs.writeScriptBin "dump-miniflux" ''
|
||||||
|
#!/bin/sh
|
||||||
|
cd ${dumpFolder}
|
||||||
|
[ -e miniflux-sql ] && rm miniflux-sql
|
||||||
|
pg_dump miniflux > ${dumpFolder}/miniflux-sql
|
||||||
|
'')
|
||||||
|
];
|
||||||
|
|
||||||
services.postgresql = {
|
services.postgresql = {
|
||||||
enable = true;
|
enable = true;
|
||||||
authentication = pkgs.lib.mkOverride 10 ''
|
authentication = pkgs.lib.mkOverride 10 ''
|
||||||
|
@ -24,5 +24,7 @@ in
|
|||||||
"syncthing/kestrel/cert.pem.age".publicKeys = systems;
|
"syncthing/kestrel/cert.pem.age".publicKeys = systems;
|
||||||
"syncthing/bulwark/key.pem.age".publicKeys = systems;
|
"syncthing/bulwark/key.pem.age".publicKeys = systems;
|
||||||
"syncthing/bulwark/cert.pem.age".publicKeys = systems;
|
"syncthing/bulwark/cert.pem.age".publicKeys = systems;
|
||||||
|
"syncthing/torus/key.pem.age".publicKeys = systems;
|
||||||
|
"syncthing/torus/cert.pem.age".publicKeys = systems;
|
||||||
}
|
}
|
||||||
|
|
||||||
|
BIN
provision/secrets/syncthing/torus/cert.pem.age
Normal file
BIN
provision/secrets/syncthing/torus/cert.pem.age
Normal file
Binary file not shown.
BIN
provision/secrets/syncthing/torus/key.pem.age
Normal file
BIN
provision/secrets/syncthing/torus/key.pem.age
Normal file
Binary file not shown.
Loading…
x
Reference in New Issue
Block a user