Compare commits

..

No commits in common. "419d2e8cd7aad4e12b4efbc0cba10d45af0a16e5" and "2e4f1d5dfa740561989df342e62114cb8c3065d3" have entirely different histories.

6 changed files with 25 additions and 62 deletions

24
flake.lock generated
View File

@ -180,11 +180,11 @@
] ]
}, },
"locked": { "locked": {
"lastModified": 1729414726, "lastModified": 1729260213,
"narHash": "sha256-Dtmm1OU8Ymiy9hVWn/a2B8DhRYo9Eoyx9veERdOBR4o=", "narHash": "sha256-jAvHoU/1y/yCuXzr2fNF+q6uKmr8Jj2xgAisK4QB9to=",
"owner": "nix-community", "owner": "nix-community",
"repo": "home-manager", "repo": "home-manager",
"rev": "fe56302339bb28e3471632379d733547caec8103", "rev": "09a0c0c02953318bf94425738c7061ffdc4cba75",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -322,11 +322,11 @@
}, },
"nixos-hardware": { "nixos-hardware": {
"locked": { "locked": {
"lastModified": 1729333370, "lastModified": 1728729581,
"narHash": "sha256-NU+tYe3QWzDNpB8RagpqR3hNQXn4BNuBd7ZGosMHLL8=", "narHash": "sha256-oazkQ/z7r43YkDLLQdMg8oIB3CwWNb+2ZrYOxtLEWTQ=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixos-hardware", "repo": "nixos-hardware",
"rev": "38279034170b1e2929b2be33bdaedbf14a57bfeb", "rev": "a8dd1b21995964b115b1e3ec639dd6ce24ab9806",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -338,11 +338,11 @@
}, },
"nixpkgs": { "nixpkgs": {
"locked": { "locked": {
"lastModified": 1729181673, "lastModified": 1729044727,
"narHash": "sha256-LDiPhQ3l+fBjRATNtnuDZsBS7hqoBtPkKBkhpoBHv3I=", "narHash": "sha256-GKJjtPY+SXfLF/yTN7M2cAnQB6RERFKnQhD8UvPSf3M=",
"owner": "NixOS", "owner": "NixOS",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "4eb33fe664af7b41a4c446f87d20c9a0a6321fa3", "rev": "dc2e0028d274394f73653c7c90cc63edbb696be1",
"type": "github" "type": "github"
}, },
"original": { "original": {
@ -370,11 +370,11 @@
}, },
"nixpkgs-unstable": { "nixpkgs-unstable": {
"locked": { "locked": {
"lastModified": 1729256560, "lastModified": 1728888510,
"narHash": "sha256-/uilDXvCIEs3C9l73JTACm4quuHUsIHcns1c+cHUJwA=", "narHash": "sha256-nsNdSldaAyu6PE3YUA+YQLqUDJh+gRbBooMMekZJwvI=",
"owner": "nixos", "owner": "nixos",
"repo": "nixpkgs", "repo": "nixpkgs",
"rev": "4c2fcb090b1f3e5b47eaa7bd33913b574a11e0a0", "rev": "a3c0b3b21515f74fd2665903d4ce6bc4dc81c77c",
"type": "github" "type": "github"
}, },
"original": { "original": {

View File

@ -87,9 +87,9 @@
}; };
}; };
systemd.timers = { systemd.services = {
btrbk-bak = { btrbk-bak = {
requires = [ "network-online.target" ]; after = [ "network.target" ];
}; };
}; };

View File

@ -82,7 +82,7 @@
userServices = true; userServices = true;
}; };
}; };
#tailscale.enable = true; tailscale.enable = true;
}; };

View File

@ -32,7 +32,7 @@
}; };
kernelModules = [ "kvm-intel" ]; kernelModules = [ "kvm-intel" ];
kernelParams = [ "luks.options=fido2-device=auto" "sysrq_always_enabled=1" "pcie_aspm=force" ]; kernelParams = [ "luks.options=fido2-device=auto" "sysrq_always_enabled=1" ];
extraModprobeConfig = '' extraModprobeConfig = ''
options i915 enable_guc=3 options i915 enable_guc=3
''; '';
@ -42,10 +42,10 @@
zramSwap.enable = true; zramSwap.enable = true;
# powerManagement = { powerManagement = {
# powerDownCommands = "${pkgs.kmod}/bin/rmmod intel_lpss_pci"; powerDownCommands = "${pkgs.kmod}/bin/rmmod intel_lpss_pci";
# resumeCommands = "${pkgs.kmod}/bin/modprobe intel_lpss_pci"; resumeCommands = "${pkgs.kmod}/bin/modprobe intel_lpss_pci";
# }; };
services = { services = {
@ -96,7 +96,7 @@
snapshot_preserve_min = "all"; snapshot_preserve_min = "all";
target_preserve_min = "no"; target_preserve_min = "no";
target_preserve = "2m 4w 3d"; target_preserve = "2m 4w";
ssh_identity = "/etc/btrbk/ssh/id_ed25519_btrbk_nas"; ssh_identity = "/etc/btrbk/ssh/id_ed25519_btrbk_nas";
ssh_user = "btrbk"; ssh_user = "btrbk";
@ -115,9 +115,9 @@
}; };
}; };
systemd.timers = { systemd.services = {
btrbk-bak = { btrbk-bak = {
requires = [ "network-online.target" ]; after = [ "network.target" ];
}; };
}; };
@ -214,7 +214,7 @@
#defaultGateway = "192.168.0.1"; #defaultGateway = "192.168.0.1";
#nameservers = [ "192.168.0.4" ]; #nameservers = [ "192.168.0.4" ];
firewall = { firewall = {
#checkReversePath = false; checkReversePath = false;
enable = true; enable = true;
allowedUDPPorts = [ 24727 51820 ]; allowedUDPPorts = [ 24727 51820 ];
allowedTCPPorts = [ 24727 ]; allowedTCPPorts = [ 24727 ];

View File

@ -108,10 +108,6 @@
target = "/mnt/nas/Backups/Lifebook"; target = "/mnt/nas/Backups/Lifebook";
snapshot_dir = "@snapshots/@lifebook"; snapshot_dir = "@snapshots/@lifebook";
}; };
# "@steamdeck/@home" = {
# target = "/mnt/nas/Backups/Steamdeck";
# snapshot_dir = "@snapshots/@steamdeck";
# };
}; };
}; };
}; };
@ -134,7 +130,7 @@
systemd.services = { systemd.services = {
btrbk-bak = { btrbk-bak = {
requires = [ "network-online.target" ]; after = [ "network.target" ];
}; };
}; };

View File

@ -74,42 +74,9 @@
}; };
}; };
}; };
# bak = {
# onCalendar = "daily";
# settings = {
# stream_buffer = "256m";
# stream_compress = "lz4";
# incremental = "yes";
# snapshot_create = "no";
# snapshot_dir = "@snapshots";
# timestamp_format = "long";
#
# snapshot_preserve_min = "all";
# target_preserve_min = "no";
# target_preserve = "2m 4w 3d";
#
# ssh_identity = "/etc/btrbk/ssh/id_ed25519_btrbk_nas";
# ssh_user = "btrbk";
#
# volume = {
# "/mnt/snapshots/root" = {
# subvolume = {
# "@home" = {};
# };
# target = "ssh://jupiter.home.opel-online.de:2220/mnt/snapshots/Mars/@snapshots/@steamdeck";
# };
# };
# };
# };
}; };
}; };
}; };
#
# systemd.timers = {
# btrbk-bak = {
# requires = [ "network-online.target" ];
# };
# };
fileSystems."/" = fileSystems."/" =
{ device = "/dev/mapper/crypted"; { device = "/dev/mapper/crypted";