mirror of
https://github.com/nix-community/home-manager.git
synced 2024-12-14 11:57:55 +00:00
rclone: add module
Rclone is a command-line program to manage files on cloud storage, it also featrues support for FUSE mounts. "Users call rclone *"The Swiss army knife of cloud storage"* and *"Technology indistinguishable from magic"*" - https://rclone.org/ This module manages the configuration of rclone remotes.
This commit is contained in:
parent
8e84db46f1
commit
63092c815b
9 changed files with 287 additions and 0 deletions
|
@ -207,6 +207,7 @@ let
|
|||
./programs/qutebrowser.nix
|
||||
./programs/ranger.nix
|
||||
./programs/rbw.nix
|
||||
./programs/rclone.nix
|
||||
./programs/readline.nix
|
||||
./programs/rio.nix
|
||||
./programs/ripgrep.nix
|
||||
|
|
142
modules/programs/rclone.nix
Normal file
142
modules/programs/rclone.nix
Normal file
|
@ -0,0 +1,142 @@
|
|||
{ config, lib, pkgs, ... }:
|
||||
|
||||
let
|
||||
|
||||
cfg = config.programs.rclone;
|
||||
iniFormat = pkgs.formats.ini { };
|
||||
|
||||
in {
|
||||
options = {
|
||||
programs.rclone = {
|
||||
enable = lib.mkEnableOption "rclone";
|
||||
|
||||
package = lib.mkPackageOption pkgs "rclone" { };
|
||||
|
||||
remotes = lib.mkOption {
|
||||
type = lib.types.attrsOf (lib.types.submodule {
|
||||
options = {
|
||||
config = lib.mkOption {
|
||||
type = with lib.types;
|
||||
attrsOf (nullOr (oneOf [ bool int float str ]));
|
||||
default = { };
|
||||
description = ''
|
||||
Regular configuration options as described in rclone's documentation
|
||||
<https://rclone.org/docs/>. When specifying options follow the formatting
|
||||
process outlined here <https://rclone.org/docs/#config-config-file>, namley:
|
||||
- Remove the leading double-dash (--) from the rclone option name
|
||||
- Replace hyphens (-) with underscores (_)
|
||||
- Convert to lowercase
|
||||
- Use the resulting string as your configuration key
|
||||
|
||||
For example, the rclone option "--mega-hard-delete" would use "hard_delete"
|
||||
as the config key.
|
||||
|
||||
Security Note: Always use the {option}`secrets` option for sensitive data
|
||||
instead of the {option}`config` option to prevent exposing credentials to
|
||||
the world-readable Nix store.
|
||||
'';
|
||||
example = lib.literalExpression ''
|
||||
{
|
||||
type = "mega"; # Required - specifies the remote type
|
||||
user = "you@example.com";
|
||||
hard_delete = true;
|
||||
}'';
|
||||
};
|
||||
|
||||
secrets = lib.mkOption {
|
||||
type = with lib.types; attrsOf str;
|
||||
default = { };
|
||||
description = ''
|
||||
Sensitive configuration values such as passwords, API keys, and tokens. These
|
||||
must be provided as file paths to the secrets, which will be read at activation
|
||||
time.
|
||||
|
||||
Note: If using secret management solutions like agenix or sops-nix with
|
||||
home-manager, you need to ensure their services are activated before switching
|
||||
to this home-manager generation. Consider setting
|
||||
{option}`systemd.user.startServices` to `"sd-switch"` for automatic service
|
||||
startup.
|
||||
'';
|
||||
example = lib.literalExpression ''
|
||||
{
|
||||
password = "/run/secrets/password";
|
||||
api_key = config.age.secrets.api-key.path;
|
||||
}'';
|
||||
};
|
||||
};
|
||||
});
|
||||
default = { };
|
||||
description = ''
|
||||
An attribute set of remote configurations. Each remote consists of regular
|
||||
configuration options and optional secrets.
|
||||
|
||||
See <https://rclone.org/docs/> for more information on configuring specific
|
||||
remotes.
|
||||
'';
|
||||
example = lib.literalExpression ''
|
||||
{
|
||||
b2 = {
|
||||
config = {
|
||||
type = "b2";
|
||||
hard_delete = true;
|
||||
};
|
||||
secrets = {
|
||||
# using sops
|
||||
account = config.sops.secrets.b2-acc-id.path;
|
||||
# using agenix
|
||||
key = config.age.secrets.b2-key.path;
|
||||
};
|
||||
};
|
||||
|
||||
server.config = {
|
||||
type = "sftp";
|
||||
host = "server";
|
||||
user = "backup";
|
||||
key_file = "''${home.homeDirectory}/.ssh/id_ed25519";
|
||||
};
|
||||
}'';
|
||||
};
|
||||
|
||||
writeAfter = lib.mkOption {
|
||||
type = lib.types.str;
|
||||
default = "reloadSystemd";
|
||||
description = ''
|
||||
Controls when the rclone configuration is written during Home Manager activation.
|
||||
You should not need to change this unless you have very specific activation order
|
||||
requirements.
|
||||
'';
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
config = lib.mkIf cfg.enable {
|
||||
home = {
|
||||
packages = [ cfg.package ];
|
||||
|
||||
activation.createRcloneConfig = let
|
||||
safeConfig = lib.pipe cfg.remotes [
|
||||
(lib.mapAttrs (_: v: v.config))
|
||||
(iniFormat.generate "rclone.conf@pre-secrets")
|
||||
];
|
||||
|
||||
# https://github.com/rclone/rclone/issues/8190
|
||||
injectSecret = remote:
|
||||
lib.mapAttrsToList (secret: secretFile: ''
|
||||
${lib.getExe cfg.package} config update \
|
||||
${remote.name} config_refresh_token=false \
|
||||
${secret} $(cat ${secretFile}) \
|
||||
--quiet > /dev/null
|
||||
'') remote.value.secrets or { };
|
||||
|
||||
injectAllSecrets = lib.concatMap injectSecret
|
||||
(lib.mapAttrsToList lib.nameValuePair cfg.remotes);
|
||||
in lib.mkIf (cfg.remotes != { })
|
||||
(lib.hm.dag.entryAfter [ "writeBoundary" cfg.writeAfter ] ''
|
||||
run install $VERBOSE_ARG -D -m600 ${safeConfig} "${config.xdg.configHome}/rclone/rclone.conf"
|
||||
${lib.concatLines injectAllSecrets}
|
||||
'');
|
||||
};
|
||||
};
|
||||
|
||||
meta.maintainers = with lib.hm.maintainers; [ jess ];
|
||||
}
|
|
@ -12,6 +12,7 @@ let
|
|||
tests = {
|
||||
kitty = runTest ./standalone/kitty.nix;
|
||||
nixos-basics = runTest ./nixos/basics.nix;
|
||||
rclone = runTest ./standalone/rclone;
|
||||
standalone-flake-basics = runTest ./standalone/flake-basics.nix;
|
||||
standalone-standard-basics = runTest ./standalone/standard-basics.nix;
|
||||
};
|
||||
|
|
91
tests/integration/standalone/rclone/default.nix
Normal file
91
tests/integration/standalone/rclone/default.nix
Normal file
|
@ -0,0 +1,91 @@
|
|||
{ pkgs, ... }:
|
||||
|
||||
{
|
||||
name = "rclone";
|
||||
|
||||
nodes.machine = { ... }: {
|
||||
imports = [ "${pkgs.path}/nixos/modules/installer/cd-dvd/channel.nix" ];
|
||||
virtualisation.memorySize = 2048;
|
||||
users.users.alice = {
|
||||
isNormalUser = true;
|
||||
description = "Alice Foobar";
|
||||
password = "foobar";
|
||||
uid = 1000;
|
||||
};
|
||||
};
|
||||
|
||||
testScript = ''
|
||||
start_all()
|
||||
machine.wait_for_unit("network.target")
|
||||
machine.wait_for_unit("multi-user.target")
|
||||
|
||||
home_manager = "${../../../..}"
|
||||
|
||||
def login_as_alice():
|
||||
machine.wait_until_tty_matches("1", "login: ")
|
||||
machine.send_chars("alice\n")
|
||||
machine.wait_until_tty_matches("1", "Password: ")
|
||||
machine.send_chars("foobar\n")
|
||||
machine.wait_until_tty_matches("1", "alice\\@machine")
|
||||
|
||||
def logout_alice():
|
||||
machine.send_chars("exit\n")
|
||||
|
||||
def alice_cmd(cmd):
|
||||
return f"su -l alice --shell /bin/sh -c $'export XDG_RUNTIME_DIR=/run/user/$UID ; {cmd}'"
|
||||
|
||||
def succeed_as_alice(*cmds):
|
||||
return machine.succeed(*map(alice_cmd,cmds))
|
||||
|
||||
def fail_as_alice(*cmds):
|
||||
return machine.fail(*map(alice_cmd,cmds))
|
||||
|
||||
# Create a persistent login so that Alice has a systemd session.
|
||||
login_as_alice()
|
||||
|
||||
# Set up a home-manager channel.
|
||||
succeed_as_alice(" ; ".join([
|
||||
"mkdir -p /home/alice/.nix-defexpr/channels",
|
||||
f"ln -s {home_manager} /home/alice/.nix-defexpr/channels/home-manager"
|
||||
]))
|
||||
|
||||
with subtest("Home Manager installation"):
|
||||
succeed_as_alice("nix-shell \"<home-manager>\" -A install")
|
||||
|
||||
succeed_as_alice("cp ${
|
||||
./home.nix
|
||||
} /home/alice/.config/home-manager/home.nix")
|
||||
|
||||
with subtest("Generate with no secrets"):
|
||||
succeed_as_alice("install -m644 ${
|
||||
./no-secrets.nix
|
||||
} /home/alice/.config/home-manager/test-remote.nix")
|
||||
|
||||
actual = succeed_as_alice("home-manager switch")
|
||||
expected = "Activating createRcloneConfig"
|
||||
assert expected in actual, \
|
||||
f"expected home-manager switch to contain {expected}, but got {actual}"
|
||||
|
||||
succeed_as_alice("diff -u ${
|
||||
./no-secrets.conf
|
||||
} /home/alice/.config/rclone/rclone.conf")
|
||||
|
||||
with subtest("Generate with secrets from store"):
|
||||
succeed_as_alice("install -m644 ${
|
||||
./with-secrets-in-store.nix
|
||||
} /home/alice/.config/home-manager/test-remote.nix")
|
||||
|
||||
actual = succeed_as_alice("home-manager switch")
|
||||
expected = "Activating createRcloneConfig"
|
||||
assert expected in actual, \
|
||||
f"expected home-manager switch to contain {expected}, but got {actual}"
|
||||
|
||||
succeed_as_alice("diff -u ${
|
||||
./with-secrets-in-store.conf
|
||||
} /home/alice/.config/rclone/rclone.conf")
|
||||
|
||||
# TODO: verify correct activation order with the agenix and sops hm modules
|
||||
|
||||
logout_alice()
|
||||
'';
|
||||
}
|
13
tests/integration/standalone/rclone/home.nix
Normal file
13
tests/integration/standalone/rclone/home.nix
Normal file
|
@ -0,0 +1,13 @@
|
|||
{
|
||||
imports = [ ./test-remote.nix ];
|
||||
|
||||
home.username = "alice";
|
||||
home.homeDirectory = "/home/alice";
|
||||
|
||||
home.stateVersion = "24.05"; # Please read the comment before changing.
|
||||
|
||||
# Let Home Manager install and manage itself.
|
||||
programs.home-manager.enable = true;
|
||||
|
||||
programs.rclone.enable = true;
|
||||
}
|
5
tests/integration/standalone/rclone/no-secrets.conf
Normal file
5
tests/integration/standalone/rclone/no-secrets.conf
Normal file
|
@ -0,0 +1,5 @@
|
|||
[alices-cool-remote]
|
||||
host=backup-server
|
||||
key_file=/key/path/foo
|
||||
type=sftp
|
||||
user=alice
|
10
tests/integration/standalone/rclone/no-secrets.nix
Normal file
10
tests/integration/standalone/rclone/no-secrets.nix
Normal file
|
@ -0,0 +1,10 @@
|
|||
{
|
||||
programs.rclone.remotes = {
|
||||
alices-cool-remote.config = {
|
||||
type = "sftp";
|
||||
host = "backup-server";
|
||||
user = "alice";
|
||||
key_file = "/key/path/foo";
|
||||
};
|
||||
};
|
||||
}
|
|
@ -0,0 +1,6 @@
|
|||
[alices-cool-remote-v2]
|
||||
hard_delete = true
|
||||
type = b2
|
||||
account = super-secret-account-id
|
||||
key = api-key-from-file
|
||||
|
|
@ -0,0 +1,18 @@
|
|||
{ pkgs, ... }: {
|
||||
programs.rclone.remotes = {
|
||||
alices-cool-remote-v2 = {
|
||||
config = {
|
||||
type = "b2";
|
||||
hard_delete = true;
|
||||
};
|
||||
secrets = {
|
||||
account = "${pkgs.writeText "acc" ''
|
||||
super-secret-account-id
|
||||
''}";
|
||||
key = "${pkgs.writeText "key" ''
|
||||
api-key-from-file
|
||||
''}";
|
||||
};
|
||||
};
|
||||
};
|
||||
}
|
Loading…
Reference in a new issue