added nasty config files
This commit is contained in:
parent
61e0d17ed1
commit
41de261af0
4 changed files with 92 additions and 87 deletions
|
|
@ -16,9 +16,11 @@
|
||||||
./modules/navidrome.nix
|
./modules/navidrome.nix
|
||||||
./modules/feishin.nix
|
./modules/feishin.nix
|
||||||
./modules/tvproxy.nix
|
./modules/tvproxy.nix
|
||||||
./modules/calibre-web.nix
|
#./modules/calibre-web.nix
|
||||||
./modules/borg.nix
|
./modules/borg.nix
|
||||||
./modules/nctest.nix
|
./modules/nctest.nix
|
||||||
|
./modules/encode
|
||||||
|
./modules/lancache.nix
|
||||||
];
|
];
|
||||||
|
|
||||||
system.autoUpgrade = {
|
system.autoUpgrade = {
|
||||||
|
|
@ -28,13 +30,15 @@
|
||||||
sops.secrets."authentik/proxy/nasty" = {};
|
sops.secrets."authentik/proxy/nasty" = {};
|
||||||
services.authentik-proxy.token = builtins.readFile config.sops.secrets."authentik/proxy/nasty".path;
|
services.authentik-proxy.token = builtins.readFile config.sops.secrets."authentik/proxy/nasty".path;
|
||||||
|
|
||||||
|
services.nginx.defaultListen = [ { addr = "192.168.178.2"; } ]; # to not occupy the port for the lancache ip
|
||||||
|
|
||||||
environment.systemPackages = with pkgs; [
|
environment.systemPackages = with pkgs; [
|
||||||
mediainfo
|
mediainfo
|
||||||
mergerfs
|
mergerfs
|
||||||
mergerfs-tools
|
mergerfs-tools
|
||||||
filezilla
|
filezilla
|
||||||
firefox
|
firefox
|
||||||
ffmpeg_6-full
|
ffmpeg_7-full
|
||||||
_7zz
|
_7zz
|
||||||
];
|
];
|
||||||
|
|
||||||
|
|
@ -42,7 +46,7 @@
|
||||||
|
|
||||||
users.users.mc-fucker.extraGroups = [ "render" ];
|
users.users.mc-fucker.extraGroups = [ "render" ];
|
||||||
|
|
||||||
zramSwap.memoryPercent = 50;
|
zramSwap.memoryPercent = 100;
|
||||||
|
|
||||||
programs.atop.netatop.enable = false;
|
programs.atop.netatop.enable = false;
|
||||||
programs.java.enable = true;
|
programs.java.enable = true;
|
||||||
|
|
|
||||||
|
|
@ -19,6 +19,9 @@
|
||||||
boot.loader.efi.efiSysMountPoint = "/boot/efi";
|
boot.loader.efi.efiSysMountPoint = "/boot/efi";
|
||||||
boot.loader.systemd-boot.enable = true;
|
boot.loader.systemd-boot.enable = true;
|
||||||
boot.kernelPackages = pkgs.linuxPackages_latest;
|
boot.kernelPackages = pkgs.linuxPackages_latest;
|
||||||
|
boot.kernel.sysctl = {
|
||||||
|
"kernel.hung_task_timeout_secs" = 600;
|
||||||
|
};
|
||||||
|
|
||||||
boot.extraModprobeConfig = ''
|
boot.extraModprobeConfig = ''
|
||||||
options usb-storage quirks=174c:1356:u
|
options usb-storage quirks=174c:1356:u
|
||||||
|
|
@ -55,9 +58,17 @@
|
||||||
# (the default) this is the recommended approach. When using systemd-networkd it's
|
# (the default) this is the recommended approach. When using systemd-networkd it's
|
||||||
# still possible to use this option, but it's recommended to use it in conjunction
|
# still possible to use this option, but it's recommended to use it in conjunction
|
||||||
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
# with explicit per-interface declarations with `networking.interfaces.<interface>.useDHCP`.
|
||||||
networking.useDHCP = lib.mkDefault true;
|
#networking.useDHCP = lib.mkDefault true;
|
||||||
# networking.interfaces.enp86s0.useDHCP = lib.mkDefault true;
|
# networking.interfaces.enp86s0.useDHCP = lib.mkDefault true;
|
||||||
# networking.interfaces.wlo1.useDHCP = lib.mkDefault true;
|
# networking.interfaces.wlo1.useDHCP = lib.mkDefault true;
|
||||||
|
networking.interfaces.enp86s0 = {
|
||||||
|
useDHCP = true;
|
||||||
|
ipv4.addresses = [
|
||||||
|
{ address = "192.168.178.53";
|
||||||
|
prefixLength = 24;
|
||||||
|
}
|
||||||
|
];
|
||||||
|
};
|
||||||
|
|
||||||
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
||||||
powerManagement.cpuFreqGovernor = lib.mkDefault "powersave";
|
powerManagement.cpuFreqGovernor = lib.mkDefault "powersave";
|
||||||
|
|
|
||||||
|
|
@ -2,14 +2,12 @@
|
||||||
{
|
{
|
||||||
users.groups = {
|
users.groups = {
|
||||||
dummesos = { gid = 1100; };
|
dummesos = { gid = 1100; };
|
||||||
|
juju = { gid = 1101; };
|
||||||
};
|
};
|
||||||
|
|
||||||
users.users = {
|
users.users = {
|
||||||
dummesos = {
|
dummesos = { uid = 1100; isSystemUser = true; group = "dummesos";};
|
||||||
uid = 1100;
|
juju = { uid = 1101; isSystemUser = true; group = "juju";};
|
||||||
isSystemUser = true;
|
|
||||||
group = "dummesos";
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
|
|
||||||
services.samba-wsdd = {
|
services.samba-wsdd = {
|
||||||
|
|
@ -46,10 +44,6 @@
|
||||||
path = "/mnt/mergerfs/media/Serien";
|
path = "/mnt/mergerfs/media/Serien";
|
||||||
"guest ok" = "yes";
|
"guest ok" = "yes";
|
||||||
};
|
};
|
||||||
#"software" = {
|
|
||||||
# path = "/mnt/mergerfs/media/software";
|
|
||||||
# "guest ok" = "yes";
|
|
||||||
#};
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
|
|
|
||||||
|
|
@ -6,7 +6,57 @@ let
|
||||||
in
|
in
|
||||||
{
|
{
|
||||||
#systemd.timers."snapraid-sync".enable = false; #temporarily
|
#systemd.timers."snapraid-sync".enable = false; #temporarily
|
||||||
#services.snapraid = {
|
services.snapraid = {
|
||||||
|
enable = true;
|
||||||
|
scrub.plan = 5;
|
||||||
|
parityFiles = [
|
||||||
|
"/mnt/drives/43P0A00AFJDH/snapraid1.parity"
|
||||||
|
"/mnt/drives/53J0A016FJDH/snapraid2.parity"
|
||||||
|
];
|
||||||
|
dataDisks = {
|
||||||
|
d1 = "/mnt/drives/ZVV0688G";
|
||||||
|
d2 = "/mnt/drives/ZVV072JR";
|
||||||
|
d3 = "/mnt/drives/53F0A0SBFJDH";
|
||||||
|
d4 = "/mnt/drives/X2N0A0AZFJDH";
|
||||||
|
d5 = "/mnt/drives/53G0A2AXFJDH";
|
||||||
|
d6 = "/mnt/drives/92F0A079FJDH";
|
||||||
|
d7 = "/mnt/drives/X2N0A0AXFJDH";
|
||||||
|
d8 = "/mnt/drives/43P0A00FFJDH";
|
||||||
|
d9 = "/mnt/drives/ZA1D9307";
|
||||||
|
d10 = "/mnt/drives/1EJZN6MZ";
|
||||||
|
d11 = "/mnt/drives/1EKR513Z";
|
||||||
|
d12 = "/mnt/drives/1EKVK21Z";
|
||||||
|
};
|
||||||
|
contentFiles = [
|
||||||
|
"/mnt/snapraid1.content"
|
||||||
|
"/mnt/drives/43P0A00AFJDH/snapraid2.content"
|
||||||
|
"/mnt/drives/53J0A016FJDH/snapraid3.content"
|
||||||
|
];
|
||||||
|
exclude = excludes;
|
||||||
|
};
|
||||||
|
|
||||||
|
#imports = [ ./modules/snapraid.nix ];
|
||||||
|
|
||||||
|
#services.snapraidnew = {
|
||||||
|
# "8tb" = {
|
||||||
|
# arrayName = "8tb";
|
||||||
|
# enable = true;
|
||||||
|
# scrub.plan = 5;
|
||||||
|
# parityFiles = [
|
||||||
|
# "/mnt/drives/ZA1D9307/snapraid-8tb.parity"
|
||||||
|
# ];
|
||||||
|
# dataDisks = {
|
||||||
|
# d1 = "/mnt/drives/1EJZN6MZ";
|
||||||
|
# d2 = "/mnt/drives/1EKR513Z";
|
||||||
|
# d3 = "/mnt/drives/1EKVK21Z";
|
||||||
|
# };
|
||||||
|
# contentFiles = [
|
||||||
|
# "/mnt/snapraid-8tb1.content"
|
||||||
|
# "/mnt/drives/X2N0A0AZFJDH/snapraid-8tb2.content"
|
||||||
|
# ];
|
||||||
|
# exclude = excludes;
|
||||||
|
# };
|
||||||
|
# "18tb" = {
|
||||||
# enable = true;
|
# enable = true;
|
||||||
# scrub.plan = 5;
|
# scrub.plan = 5;
|
||||||
# parityFiles = [
|
# parityFiles = [
|
||||||
|
|
@ -15,73 +65,19 @@ in
|
||||||
# dataDisks = {
|
# dataDisks = {
|
||||||
# d1 = "/mnt/drives/43P0A00AFJDH";
|
# d1 = "/mnt/drives/43P0A00AFJDH";
|
||||||
# d2 = "/mnt/drives/43P0A00FFJDH";
|
# d2 = "/mnt/drives/43P0A00FFJDH";
|
||||||
# d3 = "/mnt/drives/53F0A0SBFJDH";
|
# d3 = "/mnt/drives/92F0A079FJDH";
|
||||||
# d4 = "/mnt/drives/53G0A2AXFJDH";
|
# d4 = "/mnt/drives/X2N0A0AXFJDH";
|
||||||
# d5 = "/mnt/drives/53J0A016FJDH";
|
# d5 = "/mnt/drives/53J0A016FJDH";
|
||||||
# d6 = "/mnt/drives/92F0A079FJDH";
|
# d6 = "/mnt/drives/ZVV072JR";
|
||||||
# d7 = "/mnt/drives/X2N0A0AXFJDH";
|
# d7 = "/mnt/drives/ZVV0688G";
|
||||||
# #d3 = "/mnt/drives/1EKVK21Z";
|
|
||||||
# };
|
# };
|
||||||
# contentFiles = [
|
# contentFiles = [
|
||||||
# "/mnt/snapraid-18tb1.content"
|
# "/mnt/snapraid-18tb1.content"
|
||||||
# "/mnt/snapraid-18tb2.content"
|
# "/mnt/drives/ZA1D9307/snapraid-18tb2.content"
|
||||||
# #"/mnt/drives/43P0A00AFJDH/snapraid.content"
|
|
||||||
# #"/mnt/drives/43P0A00FFJDH/snapraid.content"
|
|
||||||
# #"/mnt/drives/53F0A0SBFJDH/snapraid.content"
|
|
||||||
# #"/mnt/drives/53G0A2AXFJDH/snapraid.content"
|
|
||||||
# #"/mnt/drives/53J0A016FJDH/snapraid.content"
|
|
||||||
# #"/mnt/drives/92F0A079FJDH/snapraid.content"
|
|
||||||
# #"/mnt/drives/X2N0A0AXFJDH/snapraid.content"
|
|
||||||
# #"/mnt/drives/1EKVK21Z/snapraid.content"
|
|
||||||
# ];
|
|
||||||
# exclude = [
|
|
||||||
# "/media/usenet/incomplete/"
|
|
||||||
# ];
|
# ];
|
||||||
|
# exclude = excludes;
|
||||||
|
# };
|
||||||
#};
|
#};
|
||||||
|
|
||||||
imports = [ ./modules/snapraid.nix ];
|
|
||||||
|
|
||||||
services.snapraidnew = {
|
|
||||||
"8tb" = {
|
|
||||||
arrayName = "8tb";
|
|
||||||
enable = true;
|
|
||||||
scrub.plan = 5;
|
|
||||||
parityFiles = [
|
|
||||||
"/mnt/drives/ZA1D9307/snapraid-8tb.parity"
|
|
||||||
];
|
|
||||||
dataDisks = {
|
|
||||||
d1 = "/mnt/drives/1EJZN6MZ";
|
|
||||||
d2 = "/mnt/drives/1EKR513Z";
|
|
||||||
d3 = "/mnt/drives/1EKVK21Z";
|
|
||||||
};
|
|
||||||
contentFiles = [
|
|
||||||
"/mnt/snapraid-8tb1.content"
|
|
||||||
"/mnt/drives/X2N0A0AZFJDH/snapraid-8tb2.content"
|
|
||||||
];
|
|
||||||
exclude = excludes;
|
|
||||||
};
|
|
||||||
"18tb" = {
|
|
||||||
enable = true;
|
|
||||||
scrub.plan = 5;
|
|
||||||
parityFiles = [
|
|
||||||
"/mnt/drives/X2N0A0AZFJDH/snapraid.parity"
|
|
||||||
];
|
|
||||||
dataDisks = {
|
|
||||||
d1 = "/mnt/drives/43P0A00AFJDH";
|
|
||||||
d2 = "/mnt/drives/43P0A00FFJDH";
|
|
||||||
d3 = "/mnt/drives/53F0A0SBFJDH";
|
|
||||||
d4 = "/mnt/drives/53G0A2AXFJDH";
|
|
||||||
d5 = "/mnt/drives/53J0A016FJDH";
|
|
||||||
d6 = "/mnt/drives/92F0A079FJDH";
|
|
||||||
d7 = "/mnt/drives/X2N0A0AXFJDH";
|
|
||||||
};
|
|
||||||
contentFiles = [
|
|
||||||
"/mnt/snapraid-18tb1.content"
|
|
||||||
"/mnt/drives/ZA1D9307/snapraid-18tb2.content"
|
|
||||||
];
|
|
||||||
exclude = excludes;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
}
|
}
|
||||||
# vim: set et ts=2 sw=2 ai:
|
# vim: set et ts=2 sw=2 ai:
|
||||||
|
|
|
||||||
Loading…
Add table
Reference in a new issue