Compare commits
No commits in common. "958f1e704240e07d200a01221834e2d428962640" and "9f8378df7560af987bbbdcce311d75eaf12d4795" have entirely different histories.
958f1e7042
...
9f8378df75
|
@ -1,21 +0,0 @@
|
|||
{ config, ... }:
|
||||
|
||||
{
|
||||
age.secrets.smb-secrets = {
|
||||
rekeyFile = ./smb-secrets.age;
|
||||
};
|
||||
|
||||
fileSystems."/home/sajenim/.backup" = {
|
||||
device = "//192.168.1.102/sajenim";
|
||||
fsType = "cifs";
|
||||
options = let
|
||||
automount_opts = "x-systemd.automount,noauto,x-systemd.idle-timeout=60,x-systemd.device-timeout=5s,x-systemd.mount-timeout=5s,user,users";
|
||||
|
||||
in ["${automount_opts},credentials=/etc/nixos/smb-secrets,uid=1000,gid=100"];
|
||||
};
|
||||
|
||||
environment.etc = {
|
||||
"nixos/smb-secrets".source = config.age.secrets.smb-secrets.path;
|
||||
};
|
||||
}
|
||||
|
|
@ -1,7 +0,0 @@
|
|||
age-encryption.org/v1
|
||||
-> piv-p256 hdSnGw AuXEhgAyxDSAP0HbRE1g0HOaEp9x76AD+681RMOReayb
|
||||
0fpWaqClsG3wrak0hnU+nB6Dpmdv11CgCl81P5CuwcQ
|
||||
-> q]sfNw0}-grease {sq
|
||||
V6m76C8Jvng8SPHoPvyocYo
|
||||
--- SaJq9U29eLJm6aM9OfiMlINa9rhZ1wy0ZtYU/U1D6BM
|
||||
y
Yºœ_;2&C5>ëjFÄjl^iàè¶p–â=Âh@(.<2E>0¼A†]®Zd¸,ë!Im¯6âå™à“˾=ãÈa
f
|
|
@ -1,13 +0,0 @@
|
|||
{ inputs, pkgs, ... }:
|
||||
|
||||
{
|
||||
imports = [
|
||||
inputs.home-manager.nixosModules.home-manager
|
||||
];
|
||||
users.users.spectre = {
|
||||
isNormalUser = true;
|
||||
shell = pkgs.zsh;
|
||||
hashedPassword = "$y$j9T$eCJ0MDPsx3tww9LP0LU8..$sE8u5keO7QNKNAR1t2R6GqsDzvGD0Xn9Fi3to14Gf9/";
|
||||
};
|
||||
users.mutableUsers = false;
|
||||
}
|
|
@ -4,7 +4,6 @@
|
|||
imports = [
|
||||
../common/global
|
||||
../common/users/sajenim
|
||||
../common/users/sajenim/samba
|
||||
../common/users/sajenim/steam
|
||||
../common/optional/key.nix
|
||||
|
||||
|
|
|
@ -4,7 +4,6 @@
|
|||
imports = [
|
||||
../common/global
|
||||
../common/users/sajenim
|
||||
../common/users/spectre
|
||||
../common/optional/wireguard
|
||||
|
||||
./services
|
||||
|
|
|
@ -35,12 +35,6 @@
|
|||
options = [ "subvol=containers" "compress=zstd" ];
|
||||
};
|
||||
|
||||
fileSystems."/srv/shares" = {
|
||||
device = "/dev/disk/by-label/data";
|
||||
fsType = "btrfs";
|
||||
options = [ "subvol=shares" "compress=zstd" ];
|
||||
};
|
||||
|
||||
fileSystems."/srv/backup" = {
|
||||
device = "/dev/disk/by-label/data";
|
||||
fsType = "btrfs";
|
||||
|
|
|
@ -8,12 +8,6 @@
|
|||
];
|
||||
encryption.mode = "none";
|
||||
repo = "/srv/backup/borg/containers";
|
||||
shares = {
|
||||
paths = [
|
||||
"/srv/shares"
|
||||
];
|
||||
encryption.mode = "none";
|
||||
repo = "/srv/backup/shares";
|
||||
compression = "auto,zstd";
|
||||
startAt = "daily";
|
||||
};
|
||||
|
|
|
@ -7,6 +7,5 @@
|
|||
./borgbackup.nix
|
||||
./forgejo.nix
|
||||
./mpd.nix
|
||||
./samba.nix
|
||||
];
|
||||
}
|
||||
|
|
|
@ -1,52 +0,0 @@
|
|||
{ ... }:
|
||||
|
||||
{
|
||||
services.samba = {
|
||||
enable = true;
|
||||
securityType = "user";
|
||||
openFirewall = true;
|
||||
extraConfig = ''
|
||||
workgroup = WORKGROUP
|
||||
server string = smbnix
|
||||
netbios name = smbnix
|
||||
security = user
|
||||
#use sendfile = yes
|
||||
#max protocol = smb2
|
||||
# note: localhost is the ipv6 localhost ::1
|
||||
hosts allow = 192.168.1.101 192.168.1.108 127.0.0.1 localhost
|
||||
hosts deny = 0.0.0.0/0
|
||||
guest account = nobody
|
||||
map to guest = bad user
|
||||
'';
|
||||
shares = {
|
||||
spectre = {
|
||||
path = "/srv/shares/spectre";
|
||||
browseable = "yes";
|
||||
"read only" = "no";
|
||||
"guest ok" = "no";
|
||||
"create mask" = "0644";
|
||||
"directory mask" = "0755";
|
||||
"force user" = "spectre";
|
||||
"force group" = "users";
|
||||
};
|
||||
sajenim = {
|
||||
path = "/srv/shares/sajenim";
|
||||
browseable = "yes";
|
||||
"read only" = "no";
|
||||
"guest ok" = "no";
|
||||
"create mask" = "0644";
|
||||
"directory mask" = "0755";
|
||||
"force user" = "sajenim";
|
||||
"force group" = "users";
|
||||
};
|
||||
};
|
||||
};
|
||||
|
||||
services.samba-wsdd = {
|
||||
enable = true;
|
||||
openFirewall = true;
|
||||
};
|
||||
|
||||
networking.firewall.enable = true;
|
||||
networking.firewall.allowPing = true;
|
||||
}
|
Loading…
Reference in a new issue