alpine: maintenance mode

This commit is contained in:
Tristan 2025-06-01 14:21:46 +01:00
parent ae83324d9b
commit e5c16d34c6
3 changed files with 15 additions and 14 deletions

View file

@ -85,19 +85,19 @@
./hardware/alpine.nix ./hardware/alpine.nix
./nixos/services/anki.nix ./nixos/services/anki.nix
./nixos/services/forgejo.nix ./nixos/services/forgejo.nix
./nixos/services/vaultwarden.nix # ./nixos/services/vaultwarden.nix
./nixos/services/jellyfin.nix # ./nixos/services/jellyfin.nix
./nixos/services/prometheus.nix ./nixos/services/prometheus.nix
./nixos/services/grafana.nix ./nixos/services/grafana.nix
./nixos/services/loki.nix ./nixos/services/loki.nix
./nixos/services/synapse/. # ./nixos/services/synapse/.
./nixos/services/mautrix/whatsapp.nix # ./nixos/services/mautrix/whatsapp.nix
./nixos/services/mautrix/signal.nix # ./nixos/services/mautrix/signal.nix
./nixos/services/nextcloud.nix # ./nixos/services/nextcloud.nix
./nixos/services/ntfy.nix ./nixos/services/ntfy.nix
./nixos/services/authentik.nix ./nixos/services/authentik.nix
./nixos/services/monero.nix # ./nixos/services/monero.nix
./nixos/services/arr.nix # ./nixos/services/arr.nix
]; ];
}; };

View file

@ -29,21 +29,25 @@ in {
}; };
fileSystems."/mnt/disk1" = { fileSystems."/mnt/disk1" = {
enable = false;
device = "/dev/disk/by-uuid/caba0b6c-00d2-495a-8c04-67ea584f1a63"; device = "/dev/disk/by-uuid/caba0b6c-00d2-495a-8c04-67ea584f1a63";
fsType = "ext4"; fsType = "ext4";
}; };
fileSystems."/mnt/disk2" = { fileSystems."/mnt/disk2" = {
enable = false;
device = "/dev/disk/by-uuid/e3828580-625e-4f93-974f-9c7fed99dee2"; device = "/dev/disk/by-uuid/e3828580-625e-4f93-974f-9c7fed99dee2";
fsType = "ext4"; fsType = "ext4";
}; };
fileSystems."/mnt/disk3" = { fileSystems."/mnt/disk3" = {
enable = false;
device = "/dev/disk/by-uuid/28f15a05-d550-4a41-a951-244af6140831"; device = "/dev/disk/by-uuid/28f15a05-d550-4a41-a951-244af6140831";
fsType = "ext4"; fsType = "ext4";
}; };
fileSystems."/mnt/parity1" = { fileSystems."/mnt/parity1" = {
enable = false;
device = "/dev/disk/by-uuid/09fc062c-1a61-4e1b-802c-60f7178bc713"; device = "/dev/disk/by-uuid/09fc062c-1a61-4e1b-802c-60f7178bc713";
fsType = "ext4"; fsType = "ext4";
}; };
@ -55,6 +59,7 @@ in {
]; ];
fileSystems."/mnt/storage" = { fileSystems."/mnt/storage" = {
enable = false;
device = "/mnt/disk1:/mnt/disk2:/mnt/disk3"; device = "/mnt/disk1:/mnt/disk2:/mnt/disk3";
fsType = "fuse.mergerfs"; fsType = "fuse.mergerfs";
depends = ["/mnt/disk1" "/mnt/disk2" "/mnt/disk3"]; depends = ["/mnt/disk1" "/mnt/disk2" "/mnt/disk3"];
@ -93,7 +98,7 @@ in {
networking.networkmanager.insertNameservers = ["1.1.1.1" "1.0.0.1"]; networking.networkmanager.insertNameservers = ["1.1.1.1" "1.0.0.1"];
services.snapraid = { services.snapraid = {
enable = true; enable = false;
contentFiles = [ contentFiles = [
"/mnt/disk1/SnapRAID.content" "/mnt/disk1/SnapRAID.content"
"/mnt/disk2/SnapRAID.content" "/mnt/disk2/SnapRAID.content"
@ -160,10 +165,6 @@ in {
domains = ["@" "*"]; domains = ["@" "*"];
}; };
services.mpd = {
musicDirectory = "/mnt/storage/media/Music";
};
services.grafana.settings.server = { services.grafana.settings.server = {
http_port = 3001; # forgejo and grafana default to 3000 http_port = 3001; # forgejo and grafana default to 3000
}; };

View file

@ -4,7 +4,7 @@
in { in {
services.vaultwarden = { services.vaultwarden = {
enable = true; enable = true;
backupDir = "/mnt/storage/backups/vaultwarden"; # backupDir = "/mnt/storage/backups/vaultwarden";
}; };
services.nginx.virtualHosts.${domain} = { services.nginx.virtualHosts.${domain} = {
forceSSL = true; forceSSL = true;