diff --git a/flake.nix b/flake.nix index 0edf2af..96f65e8 100644 --- a/flake.nix +++ b/flake.nix @@ -21,11 +21,11 @@ "ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIV9ymP4tpq11a8wfUvn8eEEwAPvZZSPZTbASLh7YxOw nvd1234@gmail.com" ]; hashedPassword = "$y$j9T$9pxQ4Zj7OirGMmgclhUb0/$YCfaYmIaaHRrkqiqdNbQSlJ7puX8bGrMCLavq6Pe1e3"; - }; - nairis = { - isNormalUser = true; - hashedPassword = "$y$j9T$luA6OU3OWVXbJc6DZM4Fx1$nTc89zTdKgozwR5kZQglbWaCkOFtmNZcpO4WCcYYPZC"; - }; + }; + nairis = { + isNormalUser = true; + hashedPassword = "$y$j9T$luA6OU3OWVXbJc6DZM4Fx1$nTc89zTdKgozwR5kZQglbWaCkOFtmNZcpO4WCcYYPZC"; + }; }; users.mutableUsers = false; }; @@ -47,11 +47,31 @@ nixosModules.plex = {...}: { services.plex = { enable = true; - dataDir = "/storage/data"; - openFirewall = true; + dataDir = "/storage/data"; + openFirewall = true; }; nixpkgs.config.allowUnfree = true; }; + nixosModules.samba = {...}: { + services.samba = { + enable = true; + openFirewall = true; + shares = { + chopper = { + path = "/storage/media"; + browseable = "yes"; + "read only" = "no"; + "guest ok" = "no"; + "inherit permissions" = "yes"; + "create mask" = "0666"; + }; + }; + }; + services.samba-wsdd = { + enable = true; + openFirewall = true; + }; + }; nixosConfigurations.chopper = nixpkgs.lib.nixosSystem { system = "aarch64-linux"; modules = [ @@ -59,8 +79,9 @@ self.nixosModules.base self.nixosModules.users self.nixosModules.ssh - self.nixosModules.zfs - self.nixosModules.plex + self.nixosModules.zfs + self.nixosModules.plex + self.nixosModules.samba ]; }; };