Primary -> tank for zfs pool
All checks were successful
Lint / lint (push) Successful in 21s

This commit is contained in:
Gabriel Simmer 2023-12-02 20:56:08 +00:00
parent b6c0175bf3
commit 0d3dda6646
Signed by: arch
SSH key fingerprint: SHA256:m3OEcdtrnBpMX+2BDGh/byv3hrCekCLzDYMdvGEKPPQ
2 changed files with 20 additions and 31 deletions

View file

@ -43,7 +43,7 @@
}; };
supportedFilesystems = ["zfs"]; supportedFilesystems = ["zfs"];
kernelModules = [ "coretemp" "kvm-amd" "it87" ]; kernelModules = [ "coretemp" "kvm-amd" "it87" ];
zfs.extraPools = ["Primary"]; zfs.extraPools = ["tank"];
}; };
services = { services = {
@ -84,11 +84,11 @@
environmentFile = config.age.secrets.restic-b2-credentials.path; environmentFile = config.age.secrets.restic-b2-credentials.path;
repository = "s3:s3.us-west-000.backblazeb2.com/gsimmer-backup"; repository = "s3:s3.us-west-000.backblazeb2.com/gsimmer-backup";
paths = [ paths = [
"/Primary/gabriel/projects" "/tank/gabriel/projects"
"/Primary/gabriel/org" "/tank/gabriel/org"
"/Primary/gabriel/Backup/Pictures" "/tank/gsimmer/Backup/Pictures"
"/Primary/gabriel/Photos" "/tank/gsimmer/Photos"
"/Primary/shared" "/tank/shared"
]; ];
timerConfig = { timerConfig = {
OnCalendar = "daily"; OnCalendar = "daily";
@ -115,8 +115,8 @@
environmentFile = config.age.secrets.restic-b2-credentials.path; environmentFile = config.age.secrets.restic-b2-credentials.path;
repository = "s3:s3.us-west-000.backblazeb2.com/bsimmer-backup"; repository = "s3:s3.us-west-000.backblazeb2.com/bsimmer-backup";
paths = [ paths = [
"\"/Primary/becki/VRChat\ Avatars\"" "\"/tank/becki/VRChat\ Avatars\""
"/Primary/becki/Pictures" "/tank/becki/Pictures"
]; ];
timerConfig = { timerConfig = {
OnCalendar = "daily"; OnCalendar = "daily";
@ -144,8 +144,8 @@
environmentFile = config.age.secrets.restic-b2-credentials.path; environmentFile = config.age.secrets.restic-b2-credentials.path;
repository = "s3:s3.us-west-000.backblazeb2.com/gsimmer-app-backup"; repository = "s3:s3.us-west-000.backblazeb2.com/gsimmer-app-backup";
paths = [ paths = [
"/Primary/k3scluster" "/tank/k3scluster"
"/Primary/gitea" "/tank/forgejo"
]; ];
timerConfig = { timerConfig = {
OnCalendar = "daily"; OnCalendar = "daily";
@ -175,7 +175,7 @@
overrideDevices = false; overrideDevices = false;
overrideFolders = false; overrideFolders = false;
user = "gsimmer"; user = "gsimmer";
dataDir = "/Primary/gabriel"; dataDir = "/tank/gsimmer";
guiAddress = "100.116.48.47:8384"; guiAddress = "100.116.48.47:8384";
}; };
prometheus.exporters = { prometheus.exporters = {
@ -237,7 +237,7 @@
''; '';
shares = { shares = {
media = { media = {
path = "/Primary/media"; path = "/tank/media";
browseable = "yes"; browseable = "yes";
"read only" = "no"; "read only" = "no";
"guest ok" = "yes"; "guest ok" = "yes";
@ -245,7 +245,7 @@
"directory mask" = "0755"; "directory mask" = "0755";
}; };
becki = { becki = {
path = "/Primary/becki"; path = "/tank/becki";
browseable = "yes"; browseable = "yes";
"read only" = "no"; "read only" = "no";
"guest ok" = "no"; "guest ok" = "no";
@ -254,7 +254,7 @@
"admin users" = "becki"; "admin users" = "becki";
}; };
shared = { shared = {
path = "/Primary/shared"; path = "/tank/shared";
browseable = "yes"; browseable = "yes";
"read only" = "no"; "read only" = "no";
"guest ok" = "no"; "guest ok" = "no";
@ -262,7 +262,7 @@
"directory mask" = "0755"; "directory mask" = "0755";
}; };
gabriel = { gabriel = {
path = "/Primary/gabriel"; path = "/tank/gsimmer";
browseable = "yes"; browseable = "yes";
"read only" = "no"; "read only" = "no";
"guest ok" = "no"; "guest ok" = "no";
@ -350,7 +350,7 @@
}; };
gitea = { gitea = {
enable = true; enable = true;
stateDir = "/Primary/gitea"; stateDir = "/tank/forgejo";
package = pkgs.forgejo; package = pkgs.forgejo;
settings = { settings = {
DEFAULT = { DEFAULT = {
@ -506,7 +506,7 @@
gsimmer = { gsimmer = {
shell = pkgs.fish; shell = pkgs.fish;
isNormalUser = true; isNormalUser = true;
home = "/Primary/gabriel"; home = "/tank/gsimmer";
extraGroups = [ "wheel" "libvirtd" "qemu-libvirtd" ]; extraGroups = [ "wheel" "libvirtd" "qemu-libvirtd" ];
openssh.authorizedKeys.keys = let openssh.authorizedKeys.keys = let
authorizedKeys = pkgs.fetchurl { authorizedKeys = pkgs.fetchurl {
@ -519,7 +519,7 @@
becki = { becki = {
shell = pkgs.fish; shell = pkgs.fish;
isNormalUser = true; isNormalUser = true;
home = "/Primary/becki"; home = "/tank/becki";
}; };
root.openssh.authorizedKeys.keys = let root.openssh.authorizedKeys.keys = let
authorizedKeys = pkgs.fetchurl { authorizedKeys = pkgs.fetchurl {

View file

@ -2,7 +2,7 @@
{ {
home.username = "gsimmer"; home.username = "gsimmer";
home.homeDirectory = "/Primary/gabriel"; home.homeDirectory = "/tank/gsimmer";
nixpkgs.config.allowUnfree = true; nixpkgs.config.allowUnfree = true;
@ -33,17 +33,6 @@ if test "$TERM" = "dumb"
function fish_title; end function fish_title; end
end end
''; '';
plugins = [
{
name = "z";
src = pkgs.fetchFromGitHub {
owner = "jethrokuan";
repo = "z";
rev = "e0e1b9dfdba362f8ab1ae8c1afc7ccf62b89f7eb";
sha256 = "0dbnir6jbwjpjalz14snzd3cgdysgcs3raznsijd6savad3qhijc";
};
}
];
}; };
programs.direnv = { programs.direnv = {
@ -60,7 +49,7 @@ end
enable = true; enable = true;
}; };
home.packages = with pkgs; [ ]; home.packages = with pkgs; [ atuin ];
# This value determines the Home Manager release that your # This value determines the Home Manager release that your
# configuration is compatible with. This helps avoid breakage # configuration is compatible with. This helps avoid breakage