Compare commits

..

33 commits

Author SHA1 Message Date
Bruno BELANYI 2c1a7d16c7 WIP: add notes for missing persistence/backup
Some checks failed
ci/woodpecker/push/check Pipeline failed
TODO:
* Do home-manager
* Look at for more inspiration github.com:nix-community/impermanence/pull/108
* Common files github.com:nix-community/impermanence/issues/10
* Useful config: github.com:chayleaf/dotfiles/blob/f77271b249e0c08368573c22a5c34f0737d3a766/system/modules/impermanence.nix
2024-11-28 21:56:30 +00:00
Bruno BELANYI 95a42b4339 nixos: services: vikunja: persist data 2024-11-28 21:53:26 +00:00
Bruno BELANYI a2581f4e89 nixos: services: transmission: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 84f5a89c31 nixos: services: tandoor-recipes: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 4938148255 nixos: services: sabnzbd: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI f87ac5cb05 nixos: services: rss-bridge: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 71facb854e nixos: services: quassel: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI dd3dc6e044 nixos: services: podgrab: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 33437c715f nixos: services: pyload: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 5c916f9cfb nixos: services: postgresql-backup: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI dd713103a2 nixos: services: postgresql: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 4ed5355218 nixos: services: pirate: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 7b7a0ff031 nixos: services: pdf-edit: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI a9d8ea0a41 nixos: services: paperless: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 2ea28217be nixos: services: nextcloud: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 4cfcddaa35 nixos: services: nginx: persist SSL certificates 2024-11-28 21:51:17 +00:00
Bruno BELANYI b04168267d nixos: services: navidrome: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 6ef920766d nixos: services: monitoring: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI a3d3a34ef0 nixos: services: mealie: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 26ddf69e6f nixos: services: matrix: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 1438ca7d19 nixos: services: lohr: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 0ee74d3602 nixos: services: komga: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 4a078034b5 nixos: services: jellyfin: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 14ba93bc4f nixos: services: indexers: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 0abfe44816 nixos: services: grocy: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 9f299c62de nixos: services: gitea: persist repositories 2024-11-28 21:51:17 +00:00
Bruno BELANYI a46162d2d5 nixos: services: forgejo: persist repositories 2024-11-28 21:51:17 +00:00
Bruno BELANYI 0e552ece29 nixos: services: flood: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI ad3b8a57e8 nixos: services: fail2ban: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 2f48ef0cdb nixos: services: calibre-web: persist library 2024-11-28 21:51:17 +00:00
Bruno BELANYI 84e514b44d nixos: services: blog: persist website data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 16bdd18646 nixos: services: audiobookshelf: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 06877dad95 nixos: services: aria: persist data 2024-11-28 21:51:17 +00:00
13 changed files with 65 additions and 22 deletions

View file

@ -69,7 +69,10 @@ in
}; };
}; };
# FIXME: persistence? my.system.persist.directories = [
cfg.downloadDir
config.users.users.aria2.home
];
# NOTE: unfortunately aria2 does not log connection failures for fail2ban # NOTE: unfortunately aria2 does not log connection failures for fail2ban
}; };

View file

@ -34,7 +34,9 @@ in
}; };
}; };
# FIXME: persistence? my.system.persist.directories = [
"/var/lib/${config.services.audiobookshelf.dataDir}"
];
services.fail2ban.jails = { services.fail2ban.jails = {
audiobookshelf = '' audiobookshelf = ''

View file

@ -34,6 +34,8 @@ in
}; };
}; };
# FIXME: persistence? my.system.persist.directories = [
"/var/lib/${config.systemd.services.fail2ban.serviceConfig.StateDirectory}"
];
}; };
} }

View file

@ -28,7 +28,9 @@ in
}; };
}; };
# FIXME: persistence? my.system.persist.directories = [
"/var/lib/${config.systemd.services.flood.serviceConfig.StateDirectory}"
];
# NOTE: unfortunately flood does not log connection failures for fail2ban # NOTE: unfortunately flood does not log connection failures for fail2ban
}; };

View file

@ -37,8 +37,15 @@ in
useACMEHost = config.networking.domain; useACMEHost = config.networking.domain;
}; };
# FIXME: backup my.services.backup = {
# FIXME: persistence paths = [
config.services.grocy.dataDir
];
};
my.system.persist.directories = [
config.services.grocy.dataDir
];
# NOTE: unfortunately grocy does not log connection failures for fail2ban # NOTE: unfortunately grocy does not log connection failures for fail2ban
}; };

View file

@ -36,7 +36,9 @@ in
}; };
}; };
# FIXME: persistence? my.system.persist.directories = [
config.services.komga.stateDir
];
services.fail2ban.jails = { services.fail2ban.jails = {
komga = '' komga = ''

View file

@ -72,8 +72,15 @@ in
}; };
}; };
# FIXME: backup my.services.backup = {
# FIXME: persistence paths = [
"/var/lib/${config.systemd.services.mealie.serviceConfig.StateDirectory}"
];
};
my.system.persist.directories = [
"/var/lib/${config.systemd.services.mealie.serviceConfig.StateDirectory}"
];
services.fail2ban.jails = { services.fail2ban.jails = {
mealie = '' mealie = ''

View file

@ -49,9 +49,6 @@ in
}; };
}; };
# FIXME: backup
# FIXME: persistence
services.fail2ban.jails = { services.fail2ban.jails = {
miniflux = '' miniflux = ''
enabled = true enabled = true

View file

@ -54,7 +54,9 @@ in
}; };
}; };
# FIXME: persistence? my.system.persist.directories = [
"/var/lib/${systemd.services.stirling-pdf.serviceConfig.StateDirectory}"
];
services.fail2ban.jails = { services.fail2ban.jails = {
stirling-pdf = '' stirling-pdf = ''

View file

@ -53,8 +53,10 @@ in
}; };
}; };
# FIXME: backup my.system.persist.directories = [
# FIXME: persistence cfg.downloadDirectory
"/var/lib/${config.systemd.services.pyload.StateDirectory}"
];
services.fail2ban.jails = { services.fail2ban.jails = {
pyload = '' pyload = ''

View file

@ -20,10 +20,15 @@ let
group = "media"; group = "media";
}; };
# Thankfully those old style services all define users with homes my.system.persist.directories =
my.system.persist.directories = [ let
config.users.user.${service}.home # Bazarr breaks the mold unfortunately
]; dataDir =
if service != "bazarr"
then config.services.${service}.dataDir
else config.users.user.${service}.home;
in
[ dataDir ];
}; };
mkRedirection = service: { mkRedirection = service: {

View file

@ -83,8 +83,18 @@ in
}; };
}; };
# FIXME: backup my.services.backup = {
# FIXME: persistence paths = [
"/var/lib/${config.systemd.services.tandoor-recipes.StateDirectory}"
config.systemd.services.tandoor-recipes.environment.MEDIA_ROOT
];
};
my.system.persist.directories = [
"/var/lib/${config.systemd.services.tandoor-recipes.StateDirectory}"
config.systemd.services.tandoor-recipes.environment.MEDIA_ROOT
];
# NOTE: unfortunately tandoor-recipes does not log connection failures for fail2ban # NOTE: unfortunately tandoor-recipes does not log connection failures for fail2ban
}; };

View file

@ -100,7 +100,9 @@ in
]; ];
}; };
# FIXME: persistence my.system.persist.directories = [
config.services.vikunja.settings.files.basepath
];
# NOTE: unfortunately vikunja does not log connection failures for fail2ban # NOTE: unfortunately vikunja does not log connection failures for fail2ban
}; };