Compare commits

..

33 commits

Author SHA1 Message Date
Bruno BELANYI 2c1a7d16c7 WIP: add notes for missing persistence/backup
Some checks failed
ci/woodpecker/push/check Pipeline failed
TODO:
* Do home-manager
* Look at for more inspiration github.com:nix-community/impermanence/pull/108
* Common files github.com:nix-community/impermanence/issues/10
* Useful config: github.com:chayleaf/dotfiles/blob/f77271b249e0c08368573c22a5c34f0737d3a766/system/modules/impermanence.nix
2024-11-28 21:56:30 +00:00
Bruno BELANYI 95a42b4339 nixos: services: vikunja: persist data 2024-11-28 21:53:26 +00:00
Bruno BELANYI a2581f4e89 nixos: services: transmission: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 84f5a89c31 nixos: services: tandoor-recipes: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 4938148255 nixos: services: sabnzbd: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI f87ac5cb05 nixos: services: rss-bridge: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 71facb854e nixos: services: quassel: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI dd3dc6e044 nixos: services: podgrab: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 33437c715f nixos: services: pyload: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 5c916f9cfb nixos: services: postgresql-backup: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI dd713103a2 nixos: services: postgresql: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 4ed5355218 nixos: services: pirate: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 7b7a0ff031 nixos: services: pdf-edit: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI a9d8ea0a41 nixos: services: paperless: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 2ea28217be nixos: services: nextcloud: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 4cfcddaa35 nixos: services: nginx: persist SSL certificates 2024-11-28 21:51:17 +00:00
Bruno BELANYI b04168267d nixos: services: navidrome: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 6ef920766d nixos: services: monitoring: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI a3d3a34ef0 nixos: services: mealie: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 26ddf69e6f nixos: services: matrix: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 1438ca7d19 nixos: services: lohr: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 0ee74d3602 nixos: services: komga: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 4a078034b5 nixos: services: jellyfin: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 14ba93bc4f nixos: services: indexers: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 0abfe44816 nixos: services: grocy: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 9f299c62de nixos: services: gitea: persist repositories 2024-11-28 21:51:17 +00:00
Bruno BELANYI a46162d2d5 nixos: services: forgejo: persist repositories 2024-11-28 21:51:17 +00:00
Bruno BELANYI 0e552ece29 nixos: services: flood: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI ad3b8a57e8 nixos: services: fail2ban: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 2f48ef0cdb nixos: services: calibre-web: persist library 2024-11-28 21:51:17 +00:00
Bruno BELANYI 84e514b44d nixos: services: blog: persist website data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 16bdd18646 nixos: services: audiobookshelf: persist data 2024-11-28 21:51:17 +00:00
Bruno BELANYI 06877dad95 nixos: services: aria: persist data 2024-11-28 21:51:17 +00:00
13 changed files with 65 additions and 22 deletions

View file

@ -69,7 +69,10 @@ in
};
};
# FIXME: persistence?
my.system.persist.directories = [
cfg.downloadDir
config.users.users.aria2.home
];
# NOTE: unfortunately aria2 does not log connection failures for fail2ban
};

View file

@ -34,7 +34,9 @@ in
};
};
# FIXME: persistence?
my.system.persist.directories = [
"/var/lib/${config.services.audiobookshelf.dataDir}"
];
services.fail2ban.jails = {
audiobookshelf = ''

View file

@ -34,6 +34,8 @@ in
};
};
# FIXME: persistence?
my.system.persist.directories = [
"/var/lib/${config.systemd.services.fail2ban.serviceConfig.StateDirectory}"
];
};
}

View file

@ -28,7 +28,9 @@ in
};
};
# FIXME: persistence?
my.system.persist.directories = [
"/var/lib/${config.systemd.services.flood.serviceConfig.StateDirectory}"
];
# NOTE: unfortunately flood does not log connection failures for fail2ban
};

View file

@ -37,8 +37,15 @@ in
useACMEHost = config.networking.domain;
};
# FIXME: backup
# FIXME: persistence
my.services.backup = {
paths = [
config.services.grocy.dataDir
];
};
my.system.persist.directories = [
config.services.grocy.dataDir
];
# NOTE: unfortunately grocy does not log connection failures for fail2ban
};

View file

@ -36,7 +36,9 @@ in
};
};
# FIXME: persistence?
my.system.persist.directories = [
config.services.komga.stateDir
];
services.fail2ban.jails = {
komga = ''

View file

@ -72,8 +72,15 @@ in
};
};
# FIXME: backup
# FIXME: persistence
my.services.backup = {
paths = [
"/var/lib/${config.systemd.services.mealie.serviceConfig.StateDirectory}"
];
};
my.system.persist.directories = [
"/var/lib/${config.systemd.services.mealie.serviceConfig.StateDirectory}"
];
services.fail2ban.jails = {
mealie = ''

View file

@ -49,9 +49,6 @@ in
};
};
# FIXME: backup
# FIXME: persistence
services.fail2ban.jails = {
miniflux = ''
enabled = true

View file

@ -54,7 +54,9 @@ in
};
};
# FIXME: persistence?
my.system.persist.directories = [
"/var/lib/${systemd.services.stirling-pdf.serviceConfig.StateDirectory}"
];
services.fail2ban.jails = {
stirling-pdf = ''

View file

@ -53,8 +53,10 @@ in
};
};
# FIXME: backup
# FIXME: persistence
my.system.persist.directories = [
cfg.downloadDirectory
"/var/lib/${config.systemd.services.pyload.StateDirectory}"
];
services.fail2ban.jails = {
pyload = ''

View file

@ -20,10 +20,15 @@ let
group = "media";
};
# Thankfully those old style services all define users with homes
my.system.persist.directories = [
config.users.user.${service}.home
];
my.system.persist.directories =
let
# Bazarr breaks the mold unfortunately
dataDir =
if service != "bazarr"
then config.services.${service}.dataDir
else config.users.user.${service}.home;
in
[ dataDir ];
};
mkRedirection = service: {

View file

@ -83,8 +83,18 @@ in
};
};
# FIXME: backup
# FIXME: persistence
my.services.backup = {
paths = [
"/var/lib/${config.systemd.services.tandoor-recipes.StateDirectory}"
config.systemd.services.tandoor-recipes.environment.MEDIA_ROOT
];
};
my.system.persist.directories = [
"/var/lib/${config.systemd.services.tandoor-recipes.StateDirectory}"
config.systemd.services.tandoor-recipes.environment.MEDIA_ROOT
];
# NOTE: unfortunately tandoor-recipes does not log connection failures for fail2ban
};

View file

@ -100,7 +100,9 @@ in
];
};
# FIXME: persistence
my.system.persist.directories = [
config.services.vikunja.settings.files.basepath
];
# NOTE: unfortunately vikunja does not log connection failures for fail2ban
};