Compare commits

...

9 Commits

4 changed files with 71 additions and 72 deletions

View File

@ -18,7 +18,15 @@
} }
{ {
block = "disk_space"; block = "disk_space";
path = "/"; path = "/nix";
info_type = "available";
interval = 20;
warning = 20.0;
alert = 10.0;
}
{
block = "disk_space";
path = "/home";
info_type = "available"; info_type = "available";
interval = 20; interval = 20;
warning = 20.0; warning = 20.0;

View File

@ -272,6 +272,12 @@
startAt = "daily"; startAt = "daily";
}; };
services.seafile = {
enable = true;
initialAdminPassword = "admin";
adminEmail = "asmir.abdulahovic" + "@" + "gmail.com";
};
/* /*
needed for sendmail mail functionality needed for sendmail mail functionality
*/ */

View File

@ -80,7 +80,7 @@
memtest86.enable = true; memtest86.enable = true;
}; };
readOnlyNixStore = true; readOnlyNixStore = true;
supportedFilesystems = ["btrfs"]; supportedFilesystems = ["f2fs" "xfs"];
tmp.useTmpfs = true; tmp.useTmpfs = true;
}; };
@ -105,7 +105,7 @@
networking = { networking = {
firewall = { firewall = {
enable = true; enable = true;
allowedTCPPorts = [80 443 51820]; allowedTCPPorts = [80 443 51820 8020];
}; };
hostName = "nixy"; hostName = "nixy";
@ -215,7 +215,9 @@
description = "wg network interface"; description = "wg network interface";
bindsTo = ["netns@wg.service"]; bindsTo = ["netns@wg.service"];
requires = ["network-online.target"]; requires = ["network-online.target"];
wants = ["dnscrypt-proxy2_proton.service"];
after = ["netns@wg.service"]; after = ["netns@wg.service"];
before = ["dnscrypt-proxy2_proton.service"];
serviceConfig = { serviceConfig = {
Type = "oneshot"; Type = "oneshot";
RemainAfterExit = true; RemainAfterExit = true;
@ -249,11 +251,9 @@
"network-online.target" "network-online.target"
"nss-lookup.target" "nss-lookup.target"
]; ];
before = [ before = ["nss-lookup.target"];
"nss-lookup.target"
];
after = ["wg_proton.service"]; after = ["wg_proton.service"];
bindsTo = ["netns@wg.service"]; partOf = ["wg_proton.service"];
serviceConfig = { serviceConfig = {
AmbientCapabilities = "CAP_NET_BIND_SERVICE"; AmbientCapabilities = "CAP_NET_BIND_SERVICE";
CacheDirectory = "dnscrypt-proxy"; CacheDirectory = "dnscrypt-proxy";
@ -305,7 +305,7 @@
services = { services = {
acpid.enable = true; acpid.enable = true;
btrfs.autoScrub.enable = true; btrfs.autoScrub.enable = false;
dbus.enable = true; dbus.enable = true;
fstrim.enable = true; fstrim.enable = true;
fwupd.enable = true; fwupd.enable = true;
@ -455,6 +455,23 @@
logind.extraConfig = '' logind.extraConfig = ''
KillUserProcesses=yes KillUserProcesses=yes
''; '';
seafile = {
enable = false;
initialAdminPassword = "admin";
adminEmail = "asmir.abdulahovic@gmail.com";
ccnetSettings = {
General = {
SERVICE_URL = "http://127.0.0.1:8020";
};
};
seafileSettings = {
fileserver = {
host = "0.0.0.0";
port = 8082;
};
};
};
}; };
fonts = { fonts = {
@ -492,7 +509,7 @@
virtualisation = { virtualisation = {
containers.storage.settings = { containers.storage.settings = {
storage = { storage = {
driver = lib.mkForce "btrfs"; #driver = lib.mkForce "btrfs";
graphroot = "/var/lib/containers/storage"; graphroot = "/var/lib/containers/storage";
runroot = "/run/containers/storage"; runroot = "/run/containers/storage";
}; };

View File

@ -1,77 +1,45 @@
# Do not modify this file! It was generated by nixos-generate-config # Do not modify this file! It was generated by nixos-generate-config
# and may be overwritten by future invocations. Please make changes # and may be overwritten by future invocations. Please make changes
# to /etc/nixos/configuration.nix instead. # to /etc/nixos/configuration.nix instead.
{ config, lib, pkgs, modulesPath, ... }:
{ {
config, imports =
lib, [ (modulesPath + "/installer/scan/not-detected.nix")
modulesPath, ];
...
}: {
imports = [
(modulesPath + "/installer/scan/not-detected.nix")
];
boot.initrd.availableKernelModules = ["nvme" "ehci_pci" "xhci_pci" "usb_storage" "sd_mod" "rtsx_pci_sdmmc"]; boot.initrd.availableKernelModules = [ "nvme" "ehci_pci" "xhci_pci" "uas" "usb_storage" "sd_mod" "rtsx_pci_sdmmc" ];
boot.initrd.kernelModules = []; boot.initrd.kernelModules = [ "dm-snapshot" ];
boot.kernelModules = ["kvm-amd" "amdgpu"]; boot.initrd.luks.devices."crypt_dev".device = "/dev/disk/by-uuid/e10821b9-5426-4f03-b716-1645a64fcd6a";
boot.extraModulePackages = []; boot.kernelModules = [ "kvm-amd" "amd-gpu" ];
boot.extraModulePackages = [ ];
fileSystems."/" = { fileSystems."/" =
device = "/dev/disk/by-uuid/f06ac545-07c1-4b2b-8c0b-eeac43892933"; { device = "/dev/disk/by-uuid/c461c971-54ca-4fb7-91e8-6ac70de53ef2";
fsType = "btrfs"; fsType = "xfs";
options = ["subvol=root" "compress=lzo" "noatime"]; };
};
boot.initrd.luks.devices."sys_enc".device = "/dev/disk/by-uuid/682d030d-189e-4b47-a60a-62cf1f3729d3"; fileSystems."/nix" =
{ device = "/dev/disk/by-uuid/6b8d9a11-3bc4-4c63-afd3-336975abe987";
fsType = "f2fs";
options = [ "atgc" "gc_merge" "lazytime" ];
};
fileSystems."/home" = { fileSystems."/home" =
device = "/dev/disk/by-uuid/f06ac545-07c1-4b2b-8c0b-eeac43892933"; { device = "/dev/disk/by-uuid/aeaa71ca-a439-4ef3-9ab8-db7ae8f59376";
fsType = "btrfs"; fsType = "xfs";
options = ["subvol=home" "compress=lzo" "noatime"]; };
};
fileSystems."/nix" = { fileSystems."/boot" =
device = "/dev/disk/by-uuid/f06ac545-07c1-4b2b-8c0b-eeac43892933"; { device = "/dev/disk/by-uuid/828E-F3C3";
fsType = "btrfs"; fsType = "vfat";
options = ["subvol=nix" "compress=lzo" "noatime"]; options = [ "fmask=0022" "dmask=0022" ];
}; };
fileSystems."/persist" = { swapDevices = [ ];
device = "/dev/disk/by-uuid/f06ac545-07c1-4b2b-8c0b-eeac43892933";
fsType = "btrfs";
options = ["subvol=persist" "compress=lzo" "noatime"];
};
fileSystems."/var/log" = {
device = "/dev/disk/by-uuid/f06ac545-07c1-4b2b-8c0b-eeac43892933";
fsType = "btrfs";
options = ["subvol=log" "compress=lzo" "noatime"];
};
fileSystems."/boot" = {
device = "/dev/disk/by-uuid/3F3E-9833";
fsType = "vfat";
};
fileSystems."/opt/xilinx" = {
device = "/dev/disk/by-uuid/f5c27ef2-8053-4d96-9f8f-c6a50d6193b9";
fsType = "erofs";
};
swapDevices = [
/*
{
device = "/dev/disk/by-uuid/ee1792c9-098b-40c1-b760-20def16ba67f";
encrypted = {
enable = true;
keyFile = "/mnt-root/swap.key";
label = "swap_encr";
blkDev = "/dev/disk/by-uuid/aee12e27-b45a-4291-be78-db0a903071b3";
};
}
*/
];
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware; hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
nix.settings.max-jobs = lib.mkDefault 8;
} }