Compare commits

..

No commits in common. "075b1ff9677580c8f68f434746c38025c6665c90" and "f8ab913941b6b8361e202217a1fe2590b8aac47e" have entirely different histories.

2 changed files with 12 additions and 47 deletions

View File

@ -21,7 +21,7 @@ MicroSD card as boot and OS.
### Second milestone
- [X] Samba for easy file access from Windows
- [ ] Samba for easy file access from Windows
- [ ] NFS for easy file access from Linux
### Third milestone
@ -29,14 +29,6 @@ MicroSD card as boot and OS.
- [ ] Torrent client web control interface available over LAN
- [ ] Torrent client downloads over VPN
## Non-declarative things
You need to add accounts for the `samba`. It doesn't use the Linux passwords.
```
sudo smbpasswd -a $username
```
## Building
To build the SD image:

View File

@ -13,19 +13,13 @@
};
# Configuration of individual users
nixosModules.users = {...}: {
users.users = {
taneb = {
isNormalUser = true;
extraGroups = [ "wheel" ];
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIV9ymP4tpq11a8wfUvn8eEEwAPvZZSPZTbASLh7YxOw nvd1234@gmail.com"
];
hashedPassword = "$y$j9T$9pxQ4Zj7OirGMmgclhUb0/$YCfaYmIaaHRrkqiqdNbQSlJ7puX8bGrMCLavq6Pe1e3";
};
nairis = {
isNormalUser = true;
hashedPassword = "$y$j9T$luA6OU3OWVXbJc6DZM4Fx1$nTc89zTdKgozwR5kZQglbWaCkOFtmNZcpO4WCcYYPZC";
};
users.users.taneb = {
isNormalUser = true;
extraGroups = [ "wheel" ];
openssh.authorizedKeys.keys = [
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIV9ymP4tpq11a8wfUvn8eEEwAPvZZSPZTbASLh7YxOw nvd1234@gmail.com"
];
hashedPassword = "$y$j9T$9pxQ4Zj7OirGMmgclhUb0/$YCfaYmIaaHRrkqiqdNbQSlJ7puX8bGrMCLavq6Pe1e3";
};
users.mutableUsers = false;
};
@ -47,31 +41,11 @@
nixosModules.plex = {...}: {
services.plex = {
enable = true;
dataDir = "/storage/data";
openFirewall = true;
dataDir = "/storage/data";
openFirewall = true;
};
nixpkgs.config.allowUnfree = true;
};
nixosModules.samba = {...}: {
services.samba = {
enable = true;
openFirewall = true;
shares = {
chopper = {
path = "/storage/media";
browseable = "yes";
"read only" = "no";
"guest ok" = "no";
"inherit permissions" = "yes";
"create mask" = "0666";
};
};
};
services.samba-wsdd = {
enable = true;
openFirewall = true;
};
};
nixosConfigurations.chopper = nixpkgs.lib.nixosSystem {
system = "aarch64-linux";
modules = [
@ -79,9 +53,8 @@
self.nixosModules.base
self.nixosModules.users
self.nixosModules.ssh
self.nixosModules.zfs
self.nixosModules.plex
self.nixosModules.samba
self.nixosModules.zfs
self.nixosModules.plex
];
};
};