{ config, lib, pkgs, ... }:

let cfg = config.services.backup;
in {
  options.services.backup = {
    enable = lib.mkEnableOption "backup";

    offsite = lib.mkOption {
      type = with lib.types; listOf str;
      default = [ ];
      description = "Offsite backup hostnames.";
    };

    paths = lib.mkOption {
      type = with lib.types; listOf str;
      default = [ ];
      description = "Extra paths to include in backup.";
    };

    exclude = lib.mkOption {
      type = with lib.types; listOf str;
      default = [ ];
      description = "Extra paths to exclude in backup.";
    };

    backup_at = lib.mkOption {
      type = lib.types.int;
      default = 2;
      description = "Time to run backup.";
    };
  };

  config = {
    assertions = [
      {
        assertion = cfg.paths != [ ] -> cfg.enable;
        message = "Configuring backup services.backup.paths without enabling services.backup.enable is useless!";
      }
      {
        assertion = cfg.backup_at < 24;
        message = "Backup time must be less than 24 hours!";
      }
    ];

    services = {
      postgresqlBackup = {
        inherit (config.services.postgresql) enable;
        backupAll = true;
        startAt = "*-*-* ${lib.fixedWidthString 2 "0" (toString cfg.backup_at)}:00:00";
      };

      restic.backups =
        let
          commonOpts = {
            initialize = true;
            extraBackupArgs = [ "--exclude-file=${pkgs.writeText "restic-exclude-file" (lib.concatMapStrings (x: x + "\n") cfg.exclude)}" ];
            pruneOpts = [ "--group-by host" "--keep-daily 7" "--keep-weekly 4" "--keep-monthly 12" ];
            passwordFile = config.sops.secrets."restic/password".path;
            paths = [
              "/etc/group"
              "/etc/machine-id"
              "/etc/passwd"
              "/etc/shadow"
              "/etc/ssh/ssh_host_ecdsa_key"
              "/etc/ssh/ssh_host_ecdsa_key.pub"
              "/etc/ssh/ssh_host_ed25519_key"
              "/etc/ssh/ssh_host_ed25519_key.pub"
              "/etc/ssh/ssh_host_rsa_key"
              "/etc/ssh/ssh_host_rsa_key.pub"
              "/etc/subgid"
              "/etc/subuid"
              "/var/lib/nixos/"
            ] ++ cfg.paths
            ++ lib.optional config.services.postgresql.enable "/var/backup/postgresql/"
            ++ lib.optional config.services.mysql.enable "/var/lib/mysql/"
            ++ lib.optional config.services.gitea.enable "/var/lib/gitea/"
            ++ lib.optional (config.security.acme.certs != { }) "/var/lib/acme/"
            ++ lib.optional config.security.dhparams.enable "/var/lib/dhparams/"
            ++ lib.optional config.mailserver.enable config.mailserver.mailDirectory;

            exclude = lib.mkIf config.services.gitea.enable [
              "/var/lib/gitea/data/indexers/"
              "/var/lib/gitea/data/repo-archive"
              "/var/lib/gitea/data/queues"
              "/var/lib/gitea/data/tmp/"
            ];

            timerConfig = {
              OnCalendar = "*-*-* ${lib.fixedWidthString 2 "0" (toString cfg.backup_at)}:30:00";
              RandomizedDelaySec = "5m";
            };
          };
        in
        lib.mkIf cfg.enable {
          local = commonOpts // { repository = "/var/backup"; };
          offsite = lib.mkIf (cfg.offsite != [ ]) commonOpts // { repository = "sftp://offsite/${config.networking.hostName}"; };
        };
    };

    sops.secrets = lib.mkIf (cfg.enable && cfg.offsite != [ ]) {
      "restic/offsite/private" = {
        owner = "root";
        path = "/root/.ssh/id_offsite-backup";
        sopsFile = ./backup.yaml;
      };

      "restic/offsite/public" = {
        owner = "root";
        path = "/root/.ssh/id_offsite-backup.pub";
        sopsFile = ./backup.yaml;
      };

      "restic/offsite/ssh-config" = {
        owner = "root";
        path = "/root/.ssh/config";
        sopsFile = ./backup.yaml;
      };
    } // lib.mkIf cfg.enable { "restic/password".owner = "root"; };

    system.activationScripts.linkResticSSHConfigIntoVirtioFS = lib.mkIf (cfg.enable && cfg.offsite != [ ]) ''
      echo "Linking restic ssh config..."
      mkdir -m700 -p /home/root/.ssh/
      ln -fs {,/home}/root/.ssh/id_offsite-backup
      ln -fs {,/home}/root/.ssh/id_offsite-backup.pub
      ln -fs {,/home}/root/.ssh/config
    '';

    systemd = lib.mkIf cfg.enable {
      timers = lib.mkIf config.services.postgresqlBackup.enable { postgresqlBackup.timerConfig.RandomizedDelaySec = "5m"; };
      services = {
        restic-backups-local.serviceConfig.Environment = "RESTIC_PROGRESS_FPS=0.016666";
        restic-backups-offsite.serviceConfig.Environment = lib.mkIf (cfg.offsite != [ ]) "RESTIC_PROGRESS_FPS=0.016666";
      };
    };
  };
}