Compare commits

..

22 commits

Author SHA1 Message Date
Bruno BELANYI f80d1684df WIP: add notes for missing persistence/backup
Some checks failed
ci/woodpecker/push/check Pipeline failed
TODO:
* Look at for more inspiration https://github.com/nix-community/impermanence/pull/108
* Do home-manager
* Common files https://github.com/nix-community/impermanence/issues/10
* Useful config: f77271b249/system/modules/impermanence.nix
2024-11-28 20:29:29 +00:00
Bruno BELANYI c2b38a9fcd nixos: services: quassel: persist data 2024-11-28 20:29:14 +00:00
Bruno BELANYI 775d7a44cd nixos: services: pirate: persist data 2024-11-28 20:29:14 +00:00
Bruno BELANYI 17255be516 nixos: services: monitoring: persist data 2024-11-28 20:29:14 +00:00
Bruno BELANYI 8aa4184eb9 nixos: services: nginx: persist SSL certificates 2024-11-28 20:29:14 +00:00
Bruno BELANYI 9bd98ec1b6 nixos: services: transmission: persist data 2024-11-28 20:29:14 +00:00
Bruno BELANYI 096fbac0b3 nixos: services: sabnzbd: persist data 2024-11-28 20:29:14 +00:00
Bruno BELANYI 324f7c56de nixos: services: rss-bridge: persist data 2024-11-28 20:29:14 +00:00
Bruno BELANYI e7683ddd9b nixos: services: podgrab: persist data 2024-11-28 20:29:14 +00:00
Bruno BELANYI 1fdfbe1faa nixos: services: nextcloud: persist data 2024-11-28 20:29:14 +00:00
Bruno BELANYI 4d3ef9ff43 nixos: services: navidrome: persist data 2024-11-28 20:29:14 +00:00
Bruno BELANYI 470ecbef1f nixos: services: lohr: persist data 2024-11-28 20:29:14 +00:00
Bruno BELANYI f92dbaba77 nixos: services: jellyfin: persist data 2024-11-28 20:29:14 +00:00
Bruno BELANYI 95dbbbcfc1 nixos: services: indexers: persist data 2024-11-28 20:29:14 +00:00
Bruno BELANYI 2d8cc9399d nixos: services: postgresql: persist data 2024-11-28 20:29:14 +00:00
Bruno BELANYI e7c3db73db nixos: services: postgresql-backup: persist data 2024-11-28 20:29:14 +00:00
Bruno BELANYI 4fd82e1c53 nixos: services: paperless: persist data 2024-11-28 20:29:14 +00:00
Bruno BELANYI e6dcd4120b nixos: services: matrix: persist data 2024-11-28 20:29:14 +00:00
Bruno BELANYI ad66b2706f nixos: services: forgejo: persist repositories 2024-11-28 20:29:14 +00:00
Bruno BELANYI 3de71fb498 nixos: services: gitea: persist repositories 2024-11-28 20:29:14 +00:00
Bruno BELANYI 908acab1b2 nixos: services: calibre-web: persist library 2024-11-28 20:29:14 +00:00
Bruno BELANYI 356399ced8 nixos: services: blog: persist website data 2024-11-28 20:29:14 +00:00
13 changed files with 22 additions and 65 deletions

View file

@ -69,10 +69,7 @@ in
};
};
my.system.persist.directories = [
cfg.downloadDir
config.users.users.aria2.home
];
# FIXME: persistence?
# NOTE: unfortunately aria2 does not log connection failures for fail2ban
};

View file

@ -34,9 +34,7 @@ in
};
};
my.system.persist.directories = [
"/var/lib/${config.services.audiobookshelf.dataDir}"
];
# FIXME: persistence?
services.fail2ban.jails = {
audiobookshelf = ''

View file

@ -34,8 +34,6 @@ in
};
};
my.system.persist.directories = [
"/var/lib/${config.systemd.services.fail2ban.serviceConfig.StateDirectory}"
];
# FIXME: persistence?
};
}

View file

@ -28,9 +28,7 @@ in
};
};
my.system.persist.directories = [
"/var/lib/${config.systemd.services.flood.serviceConfig.StateDirectory}"
];
# FIXME: persistence?
# NOTE: unfortunately flood does not log connection failures for fail2ban
};

View file

@ -37,15 +37,8 @@ in
useACMEHost = config.networking.domain;
};
my.services.backup = {
paths = [
config.services.grocy.dataDir
];
};
my.system.persist.directories = [
config.services.grocy.dataDir
];
# FIXME: backup
# FIXME: persistence
# NOTE: unfortunately grocy does not log connection failures for fail2ban
};

View file

@ -36,9 +36,7 @@ in
};
};
my.system.persist.directories = [
config.services.komga.stateDir
];
# FIXME: persistence?
services.fail2ban.jails = {
komga = ''

View file

@ -72,15 +72,8 @@ in
};
};
my.services.backup = {
paths = [
"/var/lib/${config.systemd.services.mealie.serviceConfig.StateDirectory}"
];
};
my.system.persist.directories = [
"/var/lib/${config.systemd.services.mealie.serviceConfig.StateDirectory}"
];
# FIXME: backup
# FIXME: persistence
services.fail2ban.jails = {
mealie = ''

View file

@ -49,6 +49,9 @@ in
};
};
# FIXME: backup
# FIXME: persistence
services.fail2ban.jails = {
miniflux = ''
enabled = true

View file

@ -54,9 +54,7 @@ in
};
};
my.system.persist.directories = [
"/var/lib/${systemd.services.stirling-pdf.serviceConfig.StateDirectory}"
];
# FIXME: persistence?
services.fail2ban.jails = {
stirling-pdf = ''

View file

@ -53,10 +53,8 @@ in
};
};
my.system.persist.directories = [
cfg.downloadDirectory
"/var/lib/${config.systemd.services.pyload.StateDirectory}"
];
# FIXME: backup
# FIXME: persistence
services.fail2ban.jails = {
pyload = ''

View file

@ -20,15 +20,10 @@ let
group = "media";
};
my.system.persist.directories =
let
# Bazarr breaks the mold unfortunately
dataDir =
if service != "bazarr"
then config.services.${service}.dataDir
else config.users.user.${service}.home;
in
[ dataDir ];
# Thankfully those old style services all define users with homes
my.system.persist.directories = [
config.users.user.${service}.home
];
};
mkRedirection = service: {

View file

@ -83,18 +83,8 @@ in
};
};
my.services.backup = {
paths = [
"/var/lib/${config.systemd.services.tandoor-recipes.StateDirectory}"
config.systemd.services.tandoor-recipes.environment.MEDIA_ROOT
];
};
my.system.persist.directories = [
"/var/lib/${config.systemd.services.tandoor-recipes.StateDirectory}"
config.systemd.services.tandoor-recipes.environment.MEDIA_ROOT
];
# FIXME: backup
# FIXME: persistence
# NOTE: unfortunately tandoor-recipes does not log connection failures for fail2ban
};

View file

@ -100,9 +100,7 @@ in
];
};
my.system.persist.directories = [
config.services.vikunja.settings.files.basepath
];
# FIXME: persistence
# NOTE: unfortunately vikunja does not log connection failures for fail2ban
};