{ config, lib, pkgs, ... }: with config.krebs.lib; let out = { options.krebs.backup = api; config = lib.mkIf cfg.enable imp; }; cfg = config.krebs.backup; api = { enable = mkEnableOption "krebs.backup" // { default = true; }; plans = mkOption { default = {}; type = types.attrsOf (types.submodule ({ config, ... }: { options = { enable = mkEnableOption "krebs.backup.${config.name}" // { default = true; }; method = mkOption { type = types.enum ["pull" "push"]; }; name = mkOption { type = types.str; default = config._module.args.name; }; src = mkOption { type = types.krebs.file-location; }; dst = mkOption { type = types.krebs.file-location; }; startAt = mkOption { default = "hourly"; type = with types; nullOr str; # TODO systemd.time(7)'s calendar event }; snapshots = mkOption { default = { hourly = { format = "%Y-%m-%dT%H"; retain = 4; }; daily = { format = "%Y-%m-%d"; retain = 7; }; weekly = { format = "%YW%W"; retain = 4; }; monthly = { format = "%Y-%m"; retain = 12; }; yearly = { format = "%Y"; }; }; type = types.attrsOf (types.submodule { options = { format = mkOption { type = types.str; # TODO date's +FORMAT }; retain = mkOption { type = types.nullOr types.int; default = null; # null = retain all snapshots }; }; }); }; }; })); }; }; imp = { krebs.on-failure.plans = listToAttrs (map (plan: nameValuePair "backup.${plan.name}" { }) (filter (plan: build-host-is "pull" "dst" plan || build-host-is "push" "src" plan) enabled-plans)); systemd.services = listToAttrs (map (plan: nameValuePair "backup.${plan.name}" { # TODO if there is plan.user, then use its privkey # TODO push destination users need a similar path path = with pkgs; [ coreutils gnused openssh rsync utillinux ]; serviceConfig = rec { ExecStart = start plan; SyslogIdentifier = ExecStart.name; Type = "oneshot"; }; startAt = mkIf (plan.startAt != null) plan.startAt; }) (filter (plan: build-host-is "pull" "dst" plan || build-host-is "push" "src" plan) enabled-plans)); users.groups.backup.gid = genid "backup"; users.users.root.openssh.authorizedKeys.keys = map (plan: getAttr plan.method { push = plan.src.host.ssh.pubkey; pull = plan.dst.host.ssh.pubkey; }) (filter (plan: build-host-is "pull" "src" plan || build-host-is "push" "dst" plan) enabled-plans); }; enabled-plans = filter (getAttr "enable") (attrValues cfg.plans); build-host-is = method: side: plan: plan.method == method && config.krebs.build.host.name == plan.${side}.host.name; start = plan: pkgs.writeScript "backup.${plan.name}" '' #! ${pkgs.bash}/bin/bash set -efu ${getAttr plan.method { push = '' identity=${shell.escape plan.src.host.ssh.privkey.path} src_path=${shell.escape plan.src.path} src=$src_path dst_user=root dst_host=$(${fastest-address plan.dst.host}) dst_port=$(${network-ssh-port plan.dst.host "$dst_host"}) dst_path=${shell.escape plan.dst.path} dst=$dst_user@$dst_host:$dst_path echo "update snapshot: current; $src -> $dst" >&2 dst_exec() { exec ssh -F /dev/null \ -i "$identity" \ -p $dst_port \ "$dst_user@$dst_host" \ -T "exec$(printf ' %q' "$@")" } rsh="ssh -F /dev/null -i $identity -p $dst_port" local_rsync() { rsync "$@" } remote_rsync=${shell.escape (concatStringsSep " && " [ "mkdir -m 0700 -p ${shell.escape plan.dst.path}/current" "exec flock -n ${shell.escape plan.dst.path} rsync" ])} ''; pull = '' identity=${shell.escape plan.dst.host.ssh.privkey.path} src_user=root src_host=$(${fastest-address plan.src.host}) src_port=$(${network-ssh-port plan.src.host "$src_host"}) src_path=${shell.escape plan.src.path} src=$src_user@$src_host:$src_path dst_path=${shell.escape plan.dst.path} dst=$dst_path echo "update snapshot: current; $dst <- $src" >&2 dst_exec() { exec "$@" } rsh="ssh -F /dev/null -i $identity -p $src_port" local_rsync() { mkdir -m 0700 -p ${shell.escape plan.dst.path}/current flock -n ${shell.escape plan.dst.path} rsync "$@" } remote_rsync=rsync ''; }} start_date=$(date +%s) local_rsync >&2 \ -aAXF --delete \ --rsh="$rsh" \ --rsync-path="$remote_rsync" \ --link-dest="$dst_path/current" \ "$src/" \ "$dst/.partial" dst_exec env \ dst_path="$dst_path" \ start_date="$start_date" \ flock -n "$dst_path" \ /bin/sh < ${toFile "backup.${plan.name}.take-snapshots" '' set -efu : $dst_path $start_date mv "$dst_path/current" "$dst_path/.previous" mv "$dst_path/.partial" "$dst_path/current" rm -fR "$dst_path/.previous" echo >&2 snapshot() {( : $ns $format $retain name=$(date --date="@$start_date" +"$format") if ! test -e "$dst_path/$ns/$name"; then echo >&2 "create snapshot: $ns/$name" mkdir -m 0700 -p "$dst_path/$ns" rsync >&2 \ -aAXF --delete \ --link-dest="$dst_path/current" \ "$dst_path/current/" \ "$dst_path/$ns/.partial.$name" mv "$dst_path/$ns/.partial.$name" "$dst_path/$ns/$name" echo >&2 fi case $retain in ([0-9]*) delete_from=$(($retain + 1)) ls -r "$dst_path/$ns" \ | sed -n "$delete_from,\$p" \ | while read old_name; do echo >&2 "delete snapshot: $ns/$old_name" rm -fR "$dst_path/$ns/$old_name" done ;; (ALL) : ;; esac )} ${concatStringsSep "\n" (mapAttrsToList (ns: { format, retain, ... }: toString (map shell.escape [ "ns=${ns}" "format=${format}" "retain=${if retain == null then "ALL" else toString retain}" "snapshot" ])) plan.snapshots)} ''} ''; # XXX Is one ping enough to determine fastest address? fastest-address = host: '' { ${pkgs.fping}/bin/fping &2 exit 1 esac ''; in out # TODO ionice # TODO mail on failed push, pull # TODO mail on missing push # TODO don't cancel plans on activation # also, don't hang while deploying at: # starting the following units: backup.wu-home-xu.push.service, backup.wu-home-xu.push.timer # TODO make sure /bku is properly mounted # TODO make sure that secure hosts cannot backup to insecure ones # TODO optionally only backup when src and dst are near enough :) # TODO try using btrfs for snapshots (configurable) # TODO warn if partial snapshots are found # TODO warn if unknown stuff is found in dst path