Compare commits

...

6 commits

Author SHA1 Message Date
fruchti 36eed4c3d2 Rupert: Install smartmontools 2025-04-07 09:27:50 +02:00
fruchti 79034afe61 Rupert: Delete some old comments 2025-04-07 09:17:21 +02:00
fruchti 567e13ec71 Rupert: Add beesd 2025-04-07 09:16:18 +02:00
fruchti 2d6a9d9876 Rupert: Configure BluRay playback 2025-04-07 09:15:57 +02:00
fruchti 84793a16c7 Nextcloud: Add trash file retention policy 2025-04-07 09:14:35 +02:00
fruchti f7fba79b6a Nextcloud: Don’t blacklist any files server-side
Attempt to synchronise .htaccess files. Doesn’t seem to work, though.
2025-04-07 09:13:58 +02:00
2 changed files with 30 additions and 8 deletions

View file

@ -17,6 +17,17 @@ in
# ./open-pgsql.nix
];
nixpkgs.overlays = [
(
self: super: {
libbluray = super.libbluray.override {
withAACS = true;
withBDplus = true;
};
}
)
];
boot.loader.systemd-boot.enable = true;
boot.loader.efi.canTouchEfiVariables = true;
boot.kernelParams = [ "acpi=force" "reboot=bios" ];
@ -60,6 +71,7 @@ in
environment.systemPackages = with pkgs; [
ntfsprogs
smartmontools
texlive.combined.scheme-full
ncmpcpp
];
@ -88,9 +100,6 @@ in
enableSSHSupport = true;
};
# List services that you want to enable:
# Enable the OpenSSH daemon.
services.openssh = {
enable = true;
settings = {
@ -107,11 +116,6 @@ in
4971 # BURP
];
# Copy the NixOS configuration file and link it from the resulting system
# (/run/current-system/configuration.nix). This is useful in case you
# accidentally delete configuration.nix.
# system.copySystemConfiguration = true;
system.autoUpgrade = {
enable = true;
allowReboot = true;
@ -135,6 +139,22 @@ in
};
};
};
services.beesd = {
filesystems = {
"data" = {
spec = "/data";
hashTableSizeMB = 1024;
verbosity = "alert";
};
"backup-disk" = {
spec = "/mnt/backup";
hashTableSizeMB = 1024;
verbosity = "alert";
};
};
};
# Dont start automatically
systemd.services."beesd@backup-disk".wantedBy = lib.mkForce [];
security.acme = {
defaults = {

View file

@ -14,6 +14,8 @@ in
((lib.toLower config.networking.hostName) + ".lan")
(lib.toLower config.networking.hostName)
];
blacklisted_files = [];
trashbin_retention_obligation = "auto, 14";
};
config = {
dbtype = "pgsql";