added nasty config files

This commit is contained in:
mc-fucker 2025-06-06 10:18:17 +02:00
parent 61e0d17ed1
commit 41de261af0
4 changed files with 92 additions and 87 deletions

View file

@ -16,9 +16,11 @@
./modules/navidrome.nix ./modules/navidrome.nix
./modules/feishin.nix ./modules/feishin.nix
./modules/tvproxy.nix ./modules/tvproxy.nix
./modules/calibre-web.nix #./modules/calibre-web.nix
./modules/borg.nix ./modules/borg.nix
./modules/nctest.nix ./modules/nctest.nix
./modules/encode
./modules/lancache.nix
]; ];
system.autoUpgrade = { system.autoUpgrade = {
@ -28,13 +30,15 @@
sops.secrets."authentik/proxy/nasty" = {}; sops.secrets."authentik/proxy/nasty" = {};
services.authentik-proxy.token = builtins.readFile config.sops.secrets."authentik/proxy/nasty".path; services.authentik-proxy.token = builtins.readFile config.sops.secrets."authentik/proxy/nasty".path;
services.nginx.defaultListen = [ { addr = "192.168.178.2"; } ]; # to not occupy the port for the lancache ip
environment.systemPackages = with pkgs; [ environment.systemPackages = with pkgs; [
mediainfo mediainfo
mergerfs mergerfs
mergerfs-tools mergerfs-tools
filezilla filezilla
firefox firefox
ffmpeg_6-full ffmpeg_7-full
_7zz _7zz
]; ];
@ -42,7 +46,7 @@
users.users.mc-fucker.extraGroups = [ "render" ]; users.users.mc-fucker.extraGroups = [ "render" ];
zramSwap.memoryPercent = 50; zramSwap.memoryPercent = 100;
programs.atop.netatop.enable = false; programs.atop.netatop.enable = false;
programs.java.enable = true; programs.java.enable = true;

View file

@ -19,6 +19,9 @@
boot.loader.efi.efiSysMountPoint = "/boot/efi"; boot.loader.efi.efiSysMountPoint = "/boot/efi";
boot.loader.systemd-boot.enable = true; boot.loader.systemd-boot.enable = true;
boot.kernelPackages = pkgs.linuxPackages_latest; boot.kernelPackages = pkgs.linuxPackages_latest;
boot.kernel.sysctl = {
"kernel.hung_task_timeout_secs" = 600;
};
boot.extraModprobeConfig = '' boot.extraModprobeConfig = ''
options usb-storage quirks=174c:1356:u options usb-storage quirks=174c:1356:u
@ -55,9 +58,17 @@
# (the default) this is the recommended approach. When using systemd-networkd it's # (the default) this is the recommended approach. When using systemd-networkd it's
# still possible to use this option, but it's recommended to use it in conjunction # still possible to use this option, but it's recommended to use it in conjunction
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`. # with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
networking.useDHCP = lib.mkDefault true; #networking.useDHCP = lib.mkDefault true;
# networking.interfaces.enp86s0.useDHCP = lib.mkDefault true; # networking.interfaces.enp86s0.useDHCP = lib.mkDefault true;
# networking.interfaces.wlo1.useDHCP = lib.mkDefault true; # networking.interfaces.wlo1.useDHCP = lib.mkDefault true;
networking.interfaces.enp86s0 = {
useDHCP = true;
ipv4.addresses = [
{ address = "192.168.178.53";
prefixLength = 24;
}
];
};
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux"; nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
powerManagement.cpuFreqGovernor = lib.mkDefault "powersave"; powerManagement.cpuFreqGovernor = lib.mkDefault "powersave";

View file

@ -2,14 +2,12 @@
{ {
users.groups = { users.groups = {
dummesos = { gid = 1100; }; dummesos = { gid = 1100; };
juju = { gid = 1101; };
}; };
users.users = { users.users = {
dummesos = { dummesos = { uid = 1100; isSystemUser = true; group = "dummesos";};
uid = 1100; juju = { uid = 1101; isSystemUser = true; group = "juju";};
isSystemUser = true;
group = "dummesos";
};
}; };
services.samba-wsdd = { services.samba-wsdd = {
@ -46,10 +44,6 @@
path = "/mnt/mergerfs/media/Serien"; path = "/mnt/mergerfs/media/Serien";
"guest ok" = "yes"; "guest ok" = "yes";
}; };
#"software" = {
# path = "/mnt/mergerfs/media/software";
# "guest ok" = "yes";
#};
}; };
}; };

View file

@ -6,7 +6,57 @@ let
in in
{ {
#systemd.timers."snapraid-sync".enable = false; #temporarily #systemd.timers."snapraid-sync".enable = false; #temporarily
#services.snapraid = { services.snapraid = {
enable = true;
scrub.plan = 5;
parityFiles = [
"/mnt/drives/43P0A00AFJDH/snapraid1.parity"
"/mnt/drives/53J0A016FJDH/snapraid2.parity"
];
dataDisks = {
d1 = "/mnt/drives/ZVV0688G";
d2 = "/mnt/drives/ZVV072JR";
d3 = "/mnt/drives/53F0A0SBFJDH";
d4 = "/mnt/drives/X2N0A0AZFJDH";
d5 = "/mnt/drives/53G0A2AXFJDH";
d6 = "/mnt/drives/92F0A079FJDH";
d7 = "/mnt/drives/X2N0A0AXFJDH";
d8 = "/mnt/drives/43P0A00FFJDH";
d9 = "/mnt/drives/ZA1D9307";
d10 = "/mnt/drives/1EJZN6MZ";
d11 = "/mnt/drives/1EKR513Z";
d12 = "/mnt/drives/1EKVK21Z";
};
contentFiles = [
"/mnt/snapraid1.content"
"/mnt/drives/43P0A00AFJDH/snapraid2.content"
"/mnt/drives/53J0A016FJDH/snapraid3.content"
];
exclude = excludes;
};
#imports = [ ./modules/snapraid.nix ];
#services.snapraidnew = {
# "8tb" = {
# arrayName = "8tb";
# enable = true;
# scrub.plan = 5;
# parityFiles = [
# "/mnt/drives/ZA1D9307/snapraid-8tb.parity"
# ];
# dataDisks = {
# d1 = "/mnt/drives/1EJZN6MZ";
# d2 = "/mnt/drives/1EKR513Z";
# d3 = "/mnt/drives/1EKVK21Z";
# };
# contentFiles = [
# "/mnt/snapraid-8tb1.content"
# "/mnt/drives/X2N0A0AZFJDH/snapraid-8tb2.content"
# ];
# exclude = excludes;
# };
# "18tb" = {
# enable = true; # enable = true;
# scrub.plan = 5; # scrub.plan = 5;
# parityFiles = [ # parityFiles = [
@ -15,73 +65,19 @@ in
# dataDisks = { # dataDisks = {
# d1 = "/mnt/drives/43P0A00AFJDH"; # d1 = "/mnt/drives/43P0A00AFJDH";
# d2 = "/mnt/drives/43P0A00FFJDH"; # d2 = "/mnt/drives/43P0A00FFJDH";
# d3 = "/mnt/drives/53F0A0SBFJDH"; # d3 = "/mnt/drives/92F0A079FJDH";
# d4 = "/mnt/drives/53G0A2AXFJDH"; # d4 = "/mnt/drives/X2N0A0AXFJDH";
# d5 = "/mnt/drives/53J0A016FJDH"; # d5 = "/mnt/drives/53J0A016FJDH";
# d6 = "/mnt/drives/92F0A079FJDH"; # d6 = "/mnt/drives/ZVV072JR";
# d7 = "/mnt/drives/X2N0A0AXFJDH"; # d7 = "/mnt/drives/ZVV0688G";
# #d3 = "/mnt/drives/1EKVK21Z";
# }; # };
# contentFiles = [ # contentFiles = [
# "/mnt/snapraid-18tb1.content" # "/mnt/snapraid-18tb1.content"
# "/mnt/snapraid-18tb2.content" # "/mnt/drives/ZA1D9307/snapraid-18tb2.content"
# #"/mnt/drives/43P0A00AFJDH/snapraid.content"
# #"/mnt/drives/43P0A00FFJDH/snapraid.content"
# #"/mnt/drives/53F0A0SBFJDH/snapraid.content"
# #"/mnt/drives/53G0A2AXFJDH/snapraid.content"
# #"/mnt/drives/53J0A016FJDH/snapraid.content"
# #"/mnt/drives/92F0A079FJDH/snapraid.content"
# #"/mnt/drives/X2N0A0AXFJDH/snapraid.content"
# #"/mnt/drives/1EKVK21Z/snapraid.content"
# ];
# exclude = [
# "/media/usenet/incomplete/"
# ]; # ];
# exclude = excludes;
# };
#}; #};
imports = [ ./modules/snapraid.nix ];
services.snapraidnew = {
"8tb" = {
arrayName = "8tb";
enable = true;
scrub.plan = 5;
parityFiles = [
"/mnt/drives/ZA1D9307/snapraid-8tb.parity"
];
dataDisks = {
d1 = "/mnt/drives/1EJZN6MZ";
d2 = "/mnt/drives/1EKR513Z";
d3 = "/mnt/drives/1EKVK21Z";
};
contentFiles = [
"/mnt/snapraid-8tb1.content"
"/mnt/drives/X2N0A0AZFJDH/snapraid-8tb2.content"
];
exclude = excludes;
};
"18tb" = {
enable = true;
scrub.plan = 5;
parityFiles = [
"/mnt/drives/X2N0A0AZFJDH/snapraid.parity"
];
dataDisks = {
d1 = "/mnt/drives/43P0A00AFJDH";
d2 = "/mnt/drives/43P0A00FFJDH";
d3 = "/mnt/drives/53F0A0SBFJDH";
d4 = "/mnt/drives/53G0A2AXFJDH";
d5 = "/mnt/drives/53J0A016FJDH";
d6 = "/mnt/drives/92F0A079FJDH";
d7 = "/mnt/drives/X2N0A0AXFJDH";
};
contentFiles = [
"/mnt/snapraid-18tb1.content"
"/mnt/drives/ZA1D9307/snapraid-18tb2.content"
];
exclude = excludes;
};
};
} }
# vim: set et ts=2 sw=2 ai: # vim: set et ts=2 sw=2 ai: