mirror of
https://github.com/nix-community/home-manager.git
synced 2025-12-15 21:41:09 +01:00
rclone: add module
Rclone is a command-line program to manage files on cloud storage, it also featrues support for FUSE mounts. "Users call rclone *"The Swiss army knife of cloud storage"* and *"Technology indistinguishable from magic"*" - https://rclone.org/ This module manages the configuration of rclone remotes.
This commit is contained in:
parent
66f565db48
commit
eb5d59dac9
9 changed files with 287 additions and 0 deletions
|
|
@ -217,6 +217,7 @@ let
|
|||
./programs/qutebrowser.nix
|
||||
./programs/ranger.nix
|
||||
./programs/rbw.nix
|
||||
./programs/rclone.nix
|
||||
./programs/readline.nix
|
||||
./programs/rio.nix
|
||||
./programs/ripgrep.nix
|
||||
|
|
|
|||
142
modules/programs/rclone.nix
Normal file
142
modules/programs/rclone.nix
Normal file
|
|
@ -0,0 +1,142 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
let
|
||||
|
||||
cfg = config.programs.rclone;
|
||||
iniFormat = pkgs.formats.ini { };
|
||||
|
||||
in {
|
||||
options = {
|
||||
programs.rclone = {
|
||||
enable = lib.mkEnableOption "rclone";
|
||||
|
||||
package = lib.mkPackageOption pkgs "rclone" { };
|
||||
|
||||
remotes = lib.mkOption {
|
||||
type = lib.types.attrsOf (lib.types.submodule {
|
||||
options = {
|
||||
config = lib.mkOption {
|
||||
type = with lib.types;
|
||||
attrsOf (nullOr (oneOf [ bool int float str ]));
|
||||
default = { };
|
||||
description = ''
|
||||
Regular configuration options as described in rclone's documentation
|
||||
<https://rclone.org/docs/>. When specifying options follow the formatting
|
||||
process outlined here <https://rclone.org/docs/#config-config-file>, namley:
|
||||
- Remove the leading double-dash (--) from the rclone option name
|
||||
- Replace hyphens (-) with underscores (_)
|
||||
- Convert to lowercase
|
||||
- Use the resulting string as your configuration key
|
||||
|
||||
For example, the rclone option "--mega-hard-delete" would use "hard_delete"
|
||||
as the config key.
|
||||
|
||||
Security Note: Always use the {option}`secrets` option for sensitive data
|
||||
instead of the {option}`config` option to prevent exposing credentials to
|
||||
the world-readable Nix store.
|
||||
'';
|
||||
example = lib.literalExpression ''
|
||||
{
|
||||
type = "mega"; # Required - specifies the remote type
|
||||
user = "you@example.com";
|
||||
hard_delete = true;
|
||||
}'';
|
||||
};
|
||||
|
||||
secrets = lib.mkOption {
|
||||
type = with lib.types; attrsOf str;
|
||||
default = { };
|
||||
description = ''
|
||||
Sensitive configuration values such as passwords, API keys, and tokens. These
|
||||
must be provided as file paths to the secrets, which will be read at activation
|
||||
time.
|
||||
|
||||
Note: If using secret management solutions like agenix or sops-nix with
|
||||
home-manager, you need to ensure their services are activated before switching
|
||||
to this home-manager generation. Consider setting
|
||||
{option}`systemd.user.startServices` to `"sd-switch"` for automatic service
|
||||
startup.
|
||||
'';
|
||||
example = lib.literalExpression ''
|
||||
{
|
||||
password = "/run/secrets/password";
|
||||
api_key = config.age.secrets.api-key.path;
|
||||
}'';
|
||||
};
|
||||
};
|
||||
});
|
||||
default = { };
|
||||
description = ''
|
||||
An attribute set of remote configurations. Each remote consists of regular
|
||||
configuration options and optional secrets.
|
||||
|
||||
See <https://rclone.org/docs/> for more information on configuring specific
|
||||
remotes.
|
||||
'';
|
||||
example = lib.literalExpression ''
|
||||
{
|
||||
b2 = {
|
||||
config = {
|
||||
type = "b2";
|
||||
hard_delete = true;
|
||||
};
|
||||
secrets = {
|
||||
# using sops
|
||||
account = config.sops.secrets.b2-acc-id.path;
|
||||
# using agenix
|
||||
key = config.age.secrets.b2-key.path;
|
||||
};
|
||||
};
|
||||
|
||||
server.config = {
|
||||
type = "sftp";
|
||||
host = "server";
|
||||
user = "backup";
|
||||
key_file = "''${home.homeDirectory}/.ssh/id_ed25519";
|
||||
};
|
||||
}'';
|
||||
};
|
||||
|
||||
writeAfter = lib.mkOption {
|
||||
type = lib.types.str;
|
||||
default = "reloadSystemd";
|
||||
description = ''
|
||||
Controls when the rclone configuration is written during Home Manager activation.
|
||||
You should not need to change this unless you have very specific activation order
|
||||
requirements.
|
||||
'';
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
config = lib.mkIf cfg.enable {
|
||||
home = {
|
||||
packages = [ cfg.package ];
|
||||
|
||||
activation.createRcloneConfig = let
|
||||
safeConfig = lib.pipe cfg.remotes [
|
||||
(lib.mapAttrs (_: v: v.config))
|
||||
(iniFormat.generate "rclone.conf@pre-secrets")
|
||||
];
|
||||
|
||||
# https://github.com/rclone/rclone/issues/8190
|
||||
injectSecret = remote:
|
||||
lib.mapAttrsToList (secret: secretFile: ''
|
||||
${lib.getExe cfg.package} config update \
|
||||
${remote.name} config_refresh_token=false \
|
||||
${secret} $(cat ${secretFile}) \
|
||||
--quiet > /dev/null
|
||||
'') remote.value.secrets or { };
|
||||
|
||||
injectAllSecrets = lib.concatMap injectSecret
|
||||
(lib.mapAttrsToList lib.nameValuePair cfg.remotes);
|
||||
in lib.mkIf (cfg.remotes != { })
|
||||
(lib.hm.dag.entryAfter [ "writeBoundary" cfg.writeAfter ] ''
|
||||
run install $VERBOSE_ARG -D -m600 ${safeConfig} "${config.xdg.configHome}/rclone/rclone.conf"
|
||||
${lib.concatLines injectAllSecrets}
|
||||
'');
|
||||
};
|
||||
};
|
||||
|
||||
meta.maintainers = with lib.hm.maintainers; [ jess ];
|
||||
}
|
||||
Loading…
Add table
Add a link
Reference in a new issue