]> git.immae.eu Git - perso/Immae/Config/Nix.git/commitdiff
Remove duply-backup
authorIsmaël Bouya <ismael.bouya@normalesup.org>
Fri, 22 Oct 2021 18:55:31 +0000 (20:55 +0200)
committerIsmaël Bouya <ismael.bouya@normalesup.org>
Fri, 22 Oct 2021 23:45:07 +0000 (01:45 +0200)
50 files changed:
modules/private/buildbot/default.nix
modules/private/certificates.nix
modules/private/ftp.nix
modules/private/gitolite/default.nix
modules/private/irc.nix
modules/private/mail/default.nix
modules/private/mail/dovecot.nix
modules/private/mail/postfix.nix
modules/private/mail/rspamd.nix
modules/private/mail/sympa.nix
modules/private/monitoring/default.nix
modules/private/monitoring/objects_monitoring-1.nix
modules/private/mpd.nix
modules/private/pub/default.nix
modules/private/system.nix
modules/private/system/eldiron.nix
modules/private/tasks/default.nix
modules/private/websites/chloe/integration.nix
modules/private/websites/chloe/production.nix
modules/private/websites/connexionswing/integration.nix
modules/private/websites/connexionswing/production.nix
modules/private/websites/default.nix
modules/private/websites/emilia/moodle.nix
modules/private/websites/florian/app.nix
modules/private/websites/immae/temp.nix
modules/private/websites/isabelle/aten_integration.nix
modules/private/websites/isabelle/aten_production.nix
modules/private/websites/isabelle/iridologie.nix
modules/private/websites/ludivine/integration.nix
modules/private/websites/ludivine/production.nix
modules/private/websites/piedsjaloux/integration.nix
modules/private/websites/piedsjaloux/production.nix
modules/private/websites/richie/production.nix
modules/private/websites/syden/peertube.nix
modules/private/websites/tools/diaspora/default.nix
modules/private/websites/tools/ether/default.nix
modules/private/websites/tools/mail/default.nix
modules/private/websites/tools/mastodon/default.nix
modules/private/websites/tools/mgoblin/default.nix
modules/private/websites/tools/peertube/default.nix
modules/private/websites/tools/tools/default.nix
modules/private/websites/tools/tools/dokuwiki.nix
modules/private/websites/tools/tools/grocy.nix
modules/private/websites/tools/tools/kanboard.nix
modules/private/websites/tools/tools/phpbb.nix
modules/private/websites/tools/tools/rompr.nix
modules/private/websites/tools/tools/shaarli.nix
modules/private/websites/tools/tools/ttrss.nix
modules/private/websites/tools/tools/wallabag.nix
modules/webapps/webstats/default.nix

index dc8a0d241bac99a294ba2e53df084cd991c7de5c..ec28b632d799b7ad6822fafd89e54e8dfa36d15f 100644 (file)
@@ -24,10 +24,6 @@ in
   };
 
   config = lib.mkIf config.myServices.buildbot.enable {
-    services.duplyBackup.profiles.buildbot = {
-      rootDir = varDir;
-      remotes = [ "eriomem" "ovh" ];
-    };
     ids.uids.buildbot = config.myEnv.buildbot.user.uid;
     ids.gids.buildbot = config.myEnv.buildbot.user.gid;
 
index c568783b622c17ecb32ca43257070e6daaa3d50e..1881ac8d498fda5bf7c223ceb3f9b5c87f5063aa 100644 (file)
@@ -24,9 +24,6 @@
   };
 
   config = lib.mkIf config.myServices.certificates.enable {
-    services.duplyBackup.profiles.system.excludeFile = ''
-      + ${config.myServices.certificates.webroot}
-      '';
     services.nginx = {
       recommendedTlsSettings = true;
       virtualHosts = {
index 111d6bccbadd237ae62af92746d3d2cfd8d57938..f87ce442c63d9720ef78700be6c04a607f4c4cb6 100644 (file)
@@ -30,10 +30,6 @@ in
   };
 
   config = lib.mkIf config.myServices.ftp.enable {
-    services.duplyBackup.profiles.ftp = {
-      rootDir = "/var/lib/ftp";
-      remotes = [ "eriomem" "ovh" ];
-    };
     security.acme.certs."ftp" = config.myServices.certificates.certConfig // {
       domain = "eldiron.immae.eu";
       postRun = (lib.optionalString pure-ftpd-enabled ''
index 20d2cd5f32441244c7dabb3c1fb763965b6e7d78..6a7473430c7eaed00258914bc52163ec179f04ed 100644 (file)
@@ -15,10 +15,6 @@ in {
       snippet = builtins.readFile ./ldap_gitolite.sh;
       dependencies = [ pkgs.gitolite ];
     }];
-    services.duplyBackup.profiles.gitolite = {
-      rootDir = cfg.gitoliteDir;
-      remotes = [ "eriomem" "ovh" ];
-    };
     networking.firewall.allowedTCPPorts = [ 9418 ];
 
     secrets.keys."gitolite/ldap_password" = {
index 9871508041f870238e569316a051a689eaaedb36..bc0bfb4d4ba704eaa44194a03dae3f1dca3b61c5 100644 (file)
@@ -17,9 +17,6 @@ in
   };
 
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.irc = {
-      rootDir = "/var/lib/bitlbee";
-    };
     security.acme.certs."irc" = config.myServices.ircCerts // {
       domain = "irc.immae.eu";
       postRun = ''
index fd6d638a843e7fa08e8073d0e5d89227d826b231..2d405c6ef5647ec28349fc0159395c74e5489a3e 100644 (file)
         mxs = map (zone: "${config.hostEnv.mx.subdomain}.${zone.name}") zonesWithMx;
       in builtins.listToAttrs (map (mx: lib.attrsets.nameValuePair mx null) mxs);
     };
-    services.duplyBackup.profiles = {
-      mail = {
-        remotes = [ "eriomem" "ovh" ];
-        rootDir = "/var/lib";
-        excludeFile = lib.mkAfter ''
-          + /var/lib/vhost
-          - /var/lib
-          '';
-      };
-    };
     systemd.slices.mail = {
       description = "Mail slice";
     };
index 0ef3467ad66ad607ad1254cde8610e07a2dc2ed5..b6fdc026efcd8a66d2e22f27c92de69d52ce78ed 100644 (file)
@@ -14,10 +14,6 @@ in
 {
   config = lib.mkIf config.myServices.mail.enable {
     systemd.services.dovecot2.serviceConfig.Slice = "mail.slice";
-    services.duplyBackup.profiles.mail.excludeFile = ''
-      + /var/lib/dhparams
-      + /var/lib/dovecot
-      '';
     secrets.keys."dovecot/ldap" = {
       user = config.services.dovecot2.user;
       group = config.services.dovecot2.group;
index 054b93effc5665f76ab072032aa055093cf4abfb..ae98a8a8c82e0d5d0ba2f20b4eae4cc442a0ee93 100644 (file)
@@ -1,9 +1,6 @@
 { lib, pkgs, config, nodes, ... }:
 {
   config = lib.mkIf config.myServices.mail.enable {
-    services.duplyBackup.profiles.mail.excludeFile = ''
-      + /var/lib/postfix
-      '';
     secrets.keys = {
       "postfix/mysql_alias_maps" = {
         user = config.services.postfix.user;
index a20135a273a6204fe661b1b7beeb992cfd1bfc15..05f13006732865b0b717529a15162e1fbb618e8b 100644 (file)
@@ -11,9 +11,6 @@
       '';
   };
   config = lib.mkIf config.myServices.mail.enable {
-    services.duplyBackup.profiles.mail.excludeFile = ''
-      + /var/lib/rspamd
-      '';
     services.cron.systemCronJobs = let
       cron_script = pkgs.runCommand "cron_script" {
         buildInputs = [ pkgs.makeWrapper ];
index 920daa985e11bb2f1b56d163c9e7c874f6ef6b4c..0626ac0c4611f24f8cae211975eb5de5b8cefd87 100644 (file)
@@ -15,9 +15,6 @@ in
         }
       ];
     };
-    services.duplyBackup.profiles.sympa = {
-      rootDir = "/var/lib/sympa";
-    };
     services.websites.env.tools.vhostConfs.mail = {
       extraConfig = lib.mkAfter [
         ''
index bdb5c93183d67bd4fa05e1b8cb10f3ceeaf27e09..0783c2ff33be9ee5fcfe1201c6cc8fd0a2af307c 100644 (file)
@@ -174,9 +174,6 @@ in
       };
     };
 
-    services.duplyBackup.profiles.monitoring = {
-      rootDir = config.services.naemon.varDir;
-    };
     security.sudo.extraRules = let
       pluginsSudo = lib.lists.remove null (lib.attrsets.mapAttrsToList (k: v:
         if (v ? sudo)
index 0e7d9dfd1205e491d3d17d09ac5e02be8a679564..563be167657b63d6ceadadb2f09baf8e21da6923 100644 (file)
@@ -1,26 +1,4 @@
 { config, pkgs, nodes, hostFQDN, emailCheck, lib, ... }:
-let
-  to_resource = func: cfg: lib.flatten (lib.optionals cfg.enable (lib.mapAttrsToList func cfg.profiles));
-  to_backup_age_dependency = name: profile: map (remote:
-    {
-      dependent_host_name = "eldiron.immae.eu";
-      host_name           = "eldiron.immae.eu";
-      dependent_service_description = "${remote} backup for ${name} is not too old";
-      service_description = "${remote} backup is up and not full";
-      execution_failure_criteria = "u";
-      notification_failure_criteria = "u";
-    }) profile.remotes;
-  to_backup_age = name: profile: map (remote:
-    {
-      service_description = "${remote} backup for ${name} is not too old";
-      host_name = "eldiron.immae.eu";
-      use = "external-service";
-      check_command = ["check_backup_${remote}_age" name];
-
-      check_interval = "120";
-      notification_interval = "1440";
-    }) profile.remotes;
-in
 {
   activatedPlugins = [ "dns" "ftp" "git" "http" "imap" "ovh" "tcp" ];
   host = {
@@ -718,7 +696,7 @@ in
       check_command = [ "check_https" "origny.tiboqorl.fr" "/" "<title>Home Assistant" ];
       _webstatus_namespace = "tiboqorl";
     }
-  ] ++ to_resource to_backup_age nodes.eldiron.config.services.duplyBackup;
+  ];
   contact = {
     telio-tortay = config.myEnv.monitoring.contacts.telio-tortay // {
       use = "generic-contact";
@@ -733,5 +711,4 @@ in
     telio-tortay = { alias = "Telio Tortay"; members = "immae"; };
     tiboqorl = { alias = "Tiboqorl"; members = "immae"; };
   };
-  servicedependency = to_resource to_backup_age_dependency nodes.eldiron.config.services.duplyBackup;
 }
index 7fa8fe9d09a62b73691729ad7ca8f2f5269f2e23..640b0015f6078fc47fbf152abf005358c73f59f2 100644 (file)
@@ -2,9 +2,6 @@
 {
   options.myServices.mpd.enable = lib.mkEnableOption "enable MPD";
   config = lib.mkIf config.myServices.mpd.enable {
-    services.duplyBackup.profiles.mpd = {
-      rootDir = "/var/lib/mpd";
-    };
     secrets.keys = {
       "mpd" = {
         permissions = "0400";
index 18c146baeca7ac80afbc12a2ba14499892276109..c4195306c6a53453f72edd1357b103507e66046a 100644 (file)
       snippet = builtins.readFile ./ldap_pub.sh;
       dependencies = [ pkgs.coreutils ];
     }];
-    services.duplyBackup.profiles.pub = {
-      rootDir = "/var/lib/pub";
-      remotes = [ "eriomem" "ovh" ];
-    };
     users.users.pub = let
       restrict = pkgs.runCommand "restrict" {
         file = ./restrict;
index 8be7368d8d4a2e306f8307c691948062feeb0962..5f3d79e2850b727a88bcfba235e2a5f887cc8f7e 100644 (file)
 
     services.openssh.enable = true;
 
-    services.duplyBackup.profiles.system = {
-      rootDir = "/var/lib";
-      excludeFile = lib.mkAfter ''
-        + /var/lib/nixos
-        + /var/lib/udev
-        + /var/lib/udisks2
-        + /var/lib/systemd
-        + /var/lib/private/systemd
-        - /var/lib
-        '';
-    };
     nixpkgs.overlays = builtins.attrValues (import ../../overlays) ++ [
       (self: super: {
         postgresql = self.postgresql_pam;
index 39cf86ae640ae147038df708028c60f5bdd00895..8b2784d0d315ce87d0b1fbfe546f6689854e55ce 100644 (file)
   myServices.ejabberd.enable = true;
   myServices.vpn.enable = true;
   myServices.ftp.enable = true;
-  services.duplyBackup.enable = false;
-  services.duplyBackup.profiles.oldies.rootDir = "/var/lib/oldies";
 
   services.netdata.enable = true;
   services.netdata.config.global."memory mode" = "none";
index 26112dd01f81c16f579f356a30eb66ae91df6321..64802550ac73a8e9591a1d76dd414daba66d1715 100644 (file)
@@ -86,15 +86,6 @@ in {
   };
 
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.tasks = {
-      rootDir = "/var/lib";
-      excludeFile = ''
-        + /var/lib/taskserver
-        + /var/lib/taskwarrior-web
-        - /var/lib
-        '';
-    };
-
     secrets.keys = {
       "webapps/tools-taskwarrior-web" = {
         user = "wwwrun";
index aedf3a5f0b145a2afefde062df4bed22f4517ba5..4dc4bf3ffdc6b44f72722f6982f27ad18e8dd44b 100644 (file)
@@ -10,7 +10,6 @@ in {
   options.myServices.websites.chloe.integration.enable = lib.mkEnableOption "enable Chloe's website in integration";
 
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.chloe_integration.rootDir = app.varDir;
     secrets.keys."websites/chloe/integration" = {
       user = apacheUser;
       group = apacheGroup;
index c3a5732cd8d9f45013c1aa397614ba609d9423c9..211232cf2dd4d08a2dbe5f80459fa3af49166819 100644 (file)
@@ -13,8 +13,6 @@ in {
   options.myServices.websites.chloe.production.enable = lib.mkEnableOption "enable Chloe's website in production";
 
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.chloe_production.rootDir = app.varDir;
-    services.duplyBackup.profiles.chloe_production.remotes = ["eriomem" "ovh"];
     secrets.keys."websites/chloe/production" = {
       user = apacheUser;
       group = apacheGroup;
index fe0e4d93c6a9e1396d369669caed4a0bdee7cac7..c1165b8b846e82cd237d189e388364661643210d 100644 (file)
@@ -9,7 +9,6 @@ in {
   options.myServices.websites.connexionswing.integration.enable = lib.mkEnableOption "enable Connexionswing's website in integration";
 
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.connexionswing_integration.rootDir = app.varDir;
     services.phpApplication.apps.connexionswing_integration = {
       websiteEnv = "integration";
       httpdUser = config.services.httpd.Inte.user;
index 144093aeef9719edd132e2bf074dffe43b1925a2..4b0407f4959ab64201b016f80feeba8b5b6e027c 100644 (file)
@@ -13,8 +13,6 @@ in {
   options.myServices.websites.connexionswing.production.enable = lib.mkEnableOption "enable Connexionswing's website in production";
 
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.connexionswing_production.rootDir = app.varDir;
-    services.duplyBackup.profiles.connexionswing_production.remotes = ["eriomem" "ovh"];
     services.webstats.sites = [ { name = "connexionswing.com"; } ];
     services.phpApplication.apps.connexionswing_production = {
       websiteEnv = "production";
index 08c9d7907602a2d0866d561c8d0f4968a8799c1a..7aac7b879d72b08e8969ba97e25a8a8f45c2b194 100644 (file)
@@ -102,10 +102,6 @@ in
   options.myServices.websites.enable = lib.mkEnableOption "enable websites";
 
   config = lib.mkIf config.myServices.websites.enable {
-    services.duplyBackup.profiles.php = {
-      rootDir = "/var/lib/php";
-      remotes = [ "eriomem" "ovh" ];
-    };
     users.users.wwwrun.extraGroups = [ "keys" ];
     networking.firewall.allowedTCPPorts = [ 80 443 ];
 
index f943502b8f835d29ddb2f0f23d709860db208c01..779c46004fd6abd4d1e6b5316cc3ab182036da84 100644 (file)
@@ -43,7 +43,6 @@ in {
   options.myServices.websites.emilia.moodle.enable = lib.mkEnableOption "enable Emilia's website";
 
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.emilia_moodle.rootDir = varDir;
     system.activationScripts.emilia_moodle = ''
       install -m 0755 -o ${apacheUser} -g ${apacheGroup} -d ${varDir}
       '';
index 27810a59e8de9726e39d8c6dada1e9106186c7fb..2df344f84def0319601ac7e72c90d267e013dadd 100644 (file)
@@ -9,7 +9,6 @@ in {
   options.myServices.websites.florian.app.enable = lib.mkEnableOption "enable Florian's app in integration";
 
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.florian_app.rootDir = app.varDir;
     services.phpApplication.apps.florian_app = {
       websiteEnv = "integration";
       httpdUser = config.services.httpd.Inte.user;
index 61ed9cf4195fa9d1f6fb4d7593ae040486ef4997..19aef1a5acfdfcd48c0d88d259f39d51d114446b 100644 (file)
@@ -7,8 +7,6 @@ in {
   options.myServices.websites.immae.temp.enable = lib.mkEnableOption "enable Temp' website";
 
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.immae_temp.rootDir = varDir;
-    services.duplyBackup.profiles.immae_temp_surfer.rootDir = "/var/lib/surfer";
     services.websites.env.production.vhostConfs.immae_temp = {
       certName    = "immae";
       addToCerts  = true;
index 288f20d04fa324564360458fbf12ccf80e014e6c..215038e182336e97a16d900d742362d553ef43be 100644 (file)
@@ -8,7 +8,6 @@ in {
   options.myServices.websites.isabelle.aten_integration.enable = lib.mkEnableOption "enable Aten's website in integration";
 
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.isabelle_aten_integration.rootDir = app.varDir;
     services.phpApplication.apps.isabelle_aten_integration = {
       websiteEnv = "integration";
       httpdUser = config.services.httpd.Inte.user;
index 6a04710173c62db6a61a621f342ba28bf1c92188..928a8153b4ef348e8d95f20da0942b4a65de1d05 100644 (file)
@@ -12,8 +12,6 @@ in {
   options.myServices.websites.isabelle.aten_production.enable = lib.mkEnableOption "enable Aten's website in production";
 
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.isabelle_aten_production.rootDir = app.varDir;
-    services.duplyBackup.profiles.isabelle_aten_production.remotes = ["eriomem" "ovh"];
     services.webstats.sites = [ { name = "aten.pro"; } ];
     services.phpApplication.apps.isabelle_aten_production = {
       websiteEnv = "production";
index 88521fc9647cda6948050b4605e5012e8b9bd9cc..cd733c1d28c1f284e1a0e80a1864b547669f5374 100644 (file)
@@ -15,8 +15,6 @@ in {
   options.myServices.websites.isabelle.iridologie.enable = lib.mkEnableOption "enable Iridologie's website";
 
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.isabelle_iridologie.rootDir = app.varDir;
-    services.duplyBackup.profiles.isabelle_iridologie.remotes = ["eriomem" "ovh"];
     secrets.keys."websites/isabelle/iridologie" = {
       user = apacheUser;
       group = apacheGroup;
index d04295d433b0ff297e4d2f5deff89790a2b223c3..c0cbbef77caa60201159ae43cf2a385a708b0f9a 100644 (file)
@@ -8,7 +8,6 @@ in {
   options.myServices.websites.ludivine.integration.enable = lib.mkEnableOption "enable Ludivine's website in integration";
 
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.ludivine_integration.rootDir = app.varDir;
     services.phpApplication.apps.ludivine_integration = {
       websiteEnv = "integration";
       httpdUser = config.services.httpd.Inte.user;
index 09bb3dc2b40967cb53e8e3f35469723ca4f6d473..7a18b882fac6a4329262a782a755a47410203151 100644 (file)
@@ -13,8 +13,6 @@ in {
   options.myServices.websites.ludivine.production.enable = lib.mkEnableOption "enable Ludivine's website in production";
 
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.ludivine_production.rootDir = app.varDir;
-    services.duplyBackup.profiles.ludivine_production.remotes = ["eriomem" "ovh"];
     services.webstats.sites = [ { name = "ludivinecassal.com"; } ];
     services.phpApplication.apps.ludivine_production = {
       websiteEnv = "production";
index 64d577ec98fbbd60312317a96c639cc5fd871cc8..d103ad7a56f5d481b8c2d983e6fa2953c46da6e5 100644 (file)
@@ -9,7 +9,6 @@ in {
   options.myServices.websites.piedsjaloux.integration.enable = lib.mkEnableOption "enable PiedsJaloux's website in integration";
 
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.piedsjaloux_integration.rootDir = app.varDir;
     services.phpApplication.apps.piedsjaloux_integration = {
       websiteEnv = "integration";
       httpdUser = config.services.httpd.Inte.user;
index 118846d679f3874734cb21e8f4657ef304f648ac..422c7f091783f37716a69b3f748e9544ee54c466 100644 (file)
@@ -14,8 +14,6 @@ in {
   options.myServices.websites.piedsjaloux.production.enable = lib.mkEnableOption "enable PiedsJaloux's website in production";
 
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.piedsjaloux_production.rootDir = app.varDir;
-    services.duplyBackup.profiles.piedsjaloux_production.remotes = ["eriomem" "ovh"];
     services.webstats.sites = [ { name = "piedsjaloux.fr"; } ];
     services.phpApplication.apps.piedsjaloux_production = {
       websiteEnv = "production";
index e95df300cf94db8a8b1faaca8a2afc49695a7ff7..a548cff21a4d8117adc5f954c01c34c4ca52f309 100644 (file)
@@ -24,8 +24,6 @@ in
 {
   options.myServices.websites.richie.production.enable = lib.mkEnableOption "enable Richie's website";
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.richie_production.rootDir = vardir;
-    services.duplyBackup.profiles.richie_production.remotes = ["eriomem" "ovh"];
     services.webstats.sites = [ { name = "europe-richie.org"; } ];
 
     secrets.keys."websites/richie/production" = {
index 4036eac720a41ea5d205bd914946e3015f1f05cc..64d4a5d8c3e371735e69d88301cebb2da10cc7d7 100644 (file)
@@ -10,10 +10,6 @@ in
   options.myServices.websites.syden.peertube.enable = lib.mkEnableOption "enable Syden's website";
 
   config = lib.mkIf scfg.enable {
-    services.duplyBackup.profiles.syden_peertube = {
-      rootDir = dataDir;
-      remotes = ["eriomem" "ovh"];
-    };
     users.users.peertube = {
       uid = config.ids.uids.peertube;
       group = "peertube";
index 9afd5b99ff83c473d4f3e1a2f944834e29fe44c0..3a115ed1f82e7bc076dc6ae4da3adca695012af5 100644 (file)
@@ -10,10 +10,6 @@ in {
   };
 
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.diaspora = {
-      rootDir = dcfg.dataDir;
-      remotes = [ "eriomem" "ovh" ];
-    };
     users.users.diaspora.extraGroups = [ "keys" ];
 
     secrets.keys = {
index d5c65a94d742af82cb9230cebeb812da0b33860e..0539095e11e7c165b57d39272e25f754685f2381 100644 (file)
@@ -12,9 +12,6 @@ in {
   };
 
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.etherpad-lite = {
-      rootDir = "/var/lib/private/etherpad-lite";
-    };
     secrets.keys = {
       "webapps/tools-etherpad-apikey" = {
         permissions = "0400";
index 7bc3d2ded3b1cac1d41c16dcce4304401e6e8ffc..390f7adb98dd37fcd11f23ededa22ee028b515f7 100644 (file)
@@ -21,10 +21,6 @@ in
   ];
 
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.mail.excludeFile = ''
-      + ${rainloop.varDir}
-      + ${roundcubemail.varDir}
-      '';
     secrets.keys = roundcubemail.keys;
 
     services.websites.env.tools.modules =
index 3512cf177471048cf6a3a6cb8f4e27b60907aa18..173a4b841b14e649dd802ad188322950e25dcb7f 100644 (file)
@@ -10,9 +10,6 @@ in {
   };
 
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.mastodon = {
-      rootDir = mcfg.dataDir;
-    };
     secrets.keys."webapps/tools-mastodon" = {
       user = "mastodon";
       group = "mastodon";
index f6cba4a611e6ff7db7080b7f852106fa5b2c89b5..1e5f5a0b8e501ca15425c85b2f530e076fb85579 100644 (file)
@@ -9,9 +9,6 @@ in {
   };
 
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.mgoblin = {
-      rootDir = mcfg.dataDir;
-    };
     secrets.keys."webapps/tools-mediagoblin" = {
       user = "mediagoblin";
       group = "mediagoblin";
index daeeb1fef898435b3936ca7220e688abae00be65..68c992f64ff7fe65b1566845d98ab0e9b426108c 100644 (file)
@@ -9,9 +9,6 @@ in {
   };
 
   config = lib.mkIf cfg.enable {
-    services.duplyBackup.profiles.peertube = {
-      rootDir = pcfg.dataDir;
-    };
     services.peertube = {
       enable = true;
       configFile = config.secrets.fullPaths."webapps/tools-peertube";
index 90524739900ac75a640351f261eb524604e449c4..77d6323a140c2075bf8fb524782ffac1f9899402 100644 (file)
@@ -90,17 +90,6 @@ in {
       // csp-reports.keys
       // webhooks.keys;
 
-    services.duplyBackup.profiles = {
-      dokuwiki = dokuwiki.backups;
-      grocy = grocy.backups;
-      kanboard = kanboard.backups;
-      rompr = rompr.backups;
-      shaarli = shaarli.backups;
-      ttrss = ttrss.backups;
-      wallabag = wallabag.backups;
-      phpbb = phpbb.backups;
-    };
-
     services.websites.env.tools.modules =
       [ "proxy_fcgi" ]
       ++ adminer.apache.modules
index 1bcd852511d3ef1d41e774a85d9fc76ebf9145e1..aee495ac3fb3af170cc12d9bd5acf4d79be19452 100644 (file)
@@ -1,9 +1,5 @@
 { lib, stdenv, dokuwiki, dokuwiki-plugins }:
 rec {
-  backups = {
-    rootDir = varDir;
-    remotes = [ "eriomem" "ovh" ];
-  };
   varDir = "/var/lib/dokuwiki";
   activationScript = {
     deps = [ "wrappers" ];
index 3c33170a4c8200b5c746ecb4faeaed8caa40945f..3c45261371c6dcd61f07f976eb2b47f8f881832f 100644 (file)
@@ -1,8 +1,5 @@
 { lib, stdenv, grocy }:
 rec {
-  backups = {
-    rootDir = varDir;
-  };
   varDir = "/var/lib/grocy";
   activationScript = {
     deps = [ "wrappers" ];
index 54bbe017738ec275da3dbbb4bcf8551a396ba134..4809a42660e4ffc9a8ceea69b2d573dc92f2e6fb 100644 (file)
@@ -1,8 +1,5 @@
 { env, kanboard, config }:
 rec {
-  backups = {
-    rootDir = varDir;
-  };
   varDir = "/var/lib/kanboard";
   activationScript = {
     deps = [ "wrappers" ];
index e341a647e2b7688e8820743b39e5f9ff03560a0c..77845c33ce67796f517d73f0fee744be2055cb33 100644 (file)
@@ -1,8 +1,5 @@
 { lib, phpbb, gnused }:
 rec {
-  backups = {
-    rootDir = varDir;
-  };
   varDir = "/var/lib/phpbb";
   activationScript = {
     deps = [ "wrappers" ];
index 9765df5b3e535a8e5e0a9c9ffe20006da052c460..e80d6b2c10bf470a15c41a18aea1204319bc2259 100644 (file)
@@ -1,8 +1,5 @@
 { lib, env, rompr }:
 rec {
-  backups = {
-    rootDir = varDir;
-  };
   varDir = "/var/lib/rompr";
   activationScript = ''
     install -m 0755 -o ${apache.user} -g ${apache.group} -d ${varDir} \
index f63c7220269e2053bfe0163e73cfb3f7fdcab39b..d128465b8bc33c87872afd73fe3a3c3a5fdee6af 100644 (file)
@@ -2,10 +2,6 @@
 let
   varDir = "/var/lib/shaarli";
 in rec {
-  backups = {
-    rootDir = varDir;
-    remotes = [ "eriomem" "ovh" ];
-  };
   activationScript = ''
     install -m 0755 -o ${apache.user} -g ${apache.group} -d ${varDir} \
       ${varDir}/cache ${varDir}/pagecache ${varDir}/tmp ${varDir}/data \
index bee26c8e92e7abcf9d552b573e86656d2e7a1167..1dc99ed0446bd9491c1248e866d191b526316d86 100644 (file)
@@ -1,8 +1,5 @@
 { php, env, ttrss, ttrss-plugins, config }:
 rec {
-  backups = {
-    rootDir = varDir;
-  };
   varDir = "/var/lib/ttrss";
   activationScript = {
     deps = [ "wrappers" ];
index ceb061f96c7fcb112b3328bd6bb48d5c69b85419..0ebdb0ba3aea5bec0eaab98743397209df6d9530 100644 (file)
@@ -1,9 +1,5 @@
 { env, wallabag, mylibs, config }:
 rec {
-  backups = {
-    rootDir = varDir;
-    remotes = [ "eriomem" "ovh" ];
-  };
   varDir = "/var/lib/wallabag";
   keys."webapps/tools-wallabag" = {
     user = apache.user;
index 7a2774112f545a8f7b4f863c24b7f12dbee849f6..e873af2b0aa0db194bcd75a3743161a6d360a0f8 100644 (file)
@@ -37,9 +37,6 @@ in {
   };
 
   config = lib.mkIf (builtins.length cfg.sites > 0) {
-    services.duplyBackup.profiles.goaccess = {
-      rootDir = cfg.dataDir;
-    };
     users.users.root.packages = [
       pkgs.goaccess
     ];