34 lines
1015 B
Nix
34 lines
1015 B
Nix
|
{ config, pkgs, lib, ... }:
|
||
|
let
|
||
|
resticPort = 8010;
|
||
|
fqdn = "restic.ataraxiadev.com";
|
||
|
certFile = "${config.security.acme.certs.${fqdn}.directory}/fullchain.pem";
|
||
|
keyFile = "${config.security.acme.certs.${fqdn}.directory}/key.pem";
|
||
|
in {
|
||
|
secrets.restic-htpasswd = {
|
||
|
services = [ "restic-rest-server.service" ];
|
||
|
owner = "restic:restic";
|
||
|
};
|
||
|
|
||
|
security.acme.certs.${fqdn} = {
|
||
|
webroot = "/var/lib/acme/acme-challenge";
|
||
|
postRun = "systemctl reload restic-rest-server";
|
||
|
group = "restic";
|
||
|
};
|
||
|
|
||
|
networking.firewall.allowedTCPPorts = [ resticPort ];
|
||
|
networking.firewall.allowPing = true;
|
||
|
services.restic.server = {
|
||
|
enable = true;
|
||
|
dataDir = "/media/nas/backups/restic";
|
||
|
listenAddress = ":${toString resticPort}";
|
||
|
# appendOnly = true;
|
||
|
privateRepos = true;
|
||
|
prometheus = true;
|
||
|
extraFlags = [
|
||
|
"--prometheus-no-auth"
|
||
|
"--htpasswd-file=${config.secrets.restic-htpasswd.decrypted}"
|
||
|
"--tls" "--tls-cert=${certFile}" "--tls-key=${keyFile}"
|
||
|
];
|
||
|
};
|
||
|
}
|