3 Commits

Author SHA1 Message Date
7173c81006 remove nix-serve
Some checks failed
/ perform flake analysis (push) Successful in 36s
/ build hive configuration (push) Failing after 20m11s
2026-01-11 21:36:01 +01:00
b5c6c781c1 remove secrets
Some checks failed
/ perform flake analysis (push) Successful in 36s
/ build hive configuration (push) Failing after 1m11s
2026-01-11 21:32:59 +01:00
fd20c8ff2d add whisparr
Some checks failed
/ perform flake analysis (push) Successful in 37s
/ build hive configuration (push) Failing after 1m19s
2026-01-11 21:28:18 +01:00
5 changed files with 34 additions and 26 deletions

View File

@@ -65,26 +65,6 @@
); );
in in
{ {
nixosConfigurations = {
sin = nixpkgs.lib.nixosSystem {
system = "x86_64-linux";
modules = [
disko.nixosModules.disko
agenix.nixosModules.default
./hosts/sin/configuration.nix
./hosts/sin/hardware-configuration.nix
]
++ [
# modules
./modules/gitea/sin
];
specialArgs = {
inherit inputs;
};
};
};
colmenaHive = colmena.lib.makeHive { colmenaHive = colmena.lib.makeHive {
meta = { meta = {
nixpkgs = import nixpkgs { nixpkgs = import nixpkgs {
@@ -138,7 +118,6 @@
]; ];
deployment.targetHost = "192.168.1.14"; deployment.targetHost = "192.168.1.14";
deployment.allowLocalDeployment = true;
}; };
}; };
devShells = forEachSupportedSystem ( devShells = forEachSupportedSystem (

View File

@@ -93,7 +93,10 @@ in
lidarr = { lidarr = {
enable = true; enable = true;
openFirewall = true; openFirewall = true;
package = unstable.lidarr; };
whisparr = {
enable = true;
openFirewall = true;
}; };
jellyseerr = { jellyseerr = {

View File

@@ -50,17 +50,39 @@
}; };
}; };
data = { data1 = {
type = "disk"; type = "disk";
device = "/dev/sda"; device = "/dev/sda";
content = { content = {
type = "gpt"; type = "gpt";
partitions = { partitions = {
crypt_p = { crypt_p1 = {
size = "100%"; size = "100%";
content = { content = {
type = "luks"; type = "luks";
name = "p_data"; name = "p_data1"; # device-mapper name when decrypted
# Remove settings.keyFile if you want to use interactive password entry
settings = {
allowDiscards = true;
keyFile = "/dev/disk/by-uuid/2021-07-11-12-33-27-00";
keyFileSize = 4096;
};
};
};
};
};
};
data2 = {
type = "disk";
device = "/dev/sdb";
content = {
type = "gpt";
partitions = {
crypt_p2 = {
size = "100%";
content = {
type = "luks";
name = "p_data2";
# Remove settings.keyFile if you want to use interactive password entry # Remove settings.keyFile if you want to use interactive password entry
settings = { settings = {
allowDiscards = true; allowDiscards = true;
@@ -69,6 +91,10 @@
}; };
content = { content = {
type = "btrfs"; type = "btrfs";
extraArgs = [
"-d raid0"
"/dev/mapper/p_data1" # Use decrypted mapped device, same name as defined in disk1
];
subvolumes = { subvolumes = {
"/" = { "/" = {
mountpoint = "/mnt/fs"; mountpoint = "/mnt/fs";

View File

@@ -20,7 +20,6 @@ in
# ./cybercoffee # ./cybercoffee
./ollama.nix ./ollama.nix
./minecraft.nix ./minecraft.nix
./nix-serve.nix
]; ];
# Use the systemd-boot EFI boot loader. # Use the systemd-boot EFI boot loader.

View File

@@ -44,6 +44,7 @@ in
// mkStarr "jellyseerr.shobu.fr" "5055" // mkStarr "jellyseerr.shobu.fr" "5055"
// mkStarr "fileshelter.shobu.fr" "5091" // mkStarr "fileshelter.shobu.fr" "5091"
// mkStarr "lidarr.shobu.fr" "8686" // mkStarr "lidarr.shobu.fr" "8686"
// mkStarr "whisparr.shobu.fr" "6969"
// mkStarr "transmission.shobu.fr" "9091" // mkStarr "transmission.shobu.fr" "9091"
// mkStarr "zimablade-admin.shobu.fr" "61208" // mkStarr "zimablade-admin.shobu.fr" "61208"
// { // {