Compare commits
5 Commits
f8ab913941
...
075b1ff967
Author | SHA1 | Date |
---|---|---|
Nathan van Doorn | 075b1ff967 | |
Nathan van Doorn | 9fcb0cfad1 | |
Nathan van Doorn | 5e34efac9d | |
Nathan van Doorn | 30f97c74b5 | |
Nathan van Doorn | 2fb3f631d4 |
10
README.md
10
README.md
|
@ -21,7 +21,7 @@ MicroSD card as boot and OS.
|
|||
|
||||
### Second milestone
|
||||
|
||||
- [ ] Samba for easy file access from Windows
|
||||
- [X] Samba for easy file access from Windows
|
||||
- [ ] NFS for easy file access from Linux
|
||||
|
||||
### Third milestone
|
||||
|
@ -29,6 +29,14 @@ MicroSD card as boot and OS.
|
|||
- [ ] Torrent client web control interface available over LAN
|
||||
- [ ] Torrent client downloads over VPN
|
||||
|
||||
## Non-declarative things
|
||||
|
||||
You need to add accounts for the `samba`. It doesn't use the Linux passwords.
|
||||
|
||||
```
|
||||
sudo smbpasswd -a $username
|
||||
```
|
||||
|
||||
## Building
|
||||
|
||||
To build the SD image:
|
||||
|
|
49
flake.nix
49
flake.nix
|
@ -13,13 +13,19 @@
|
|||
};
|
||||
# Configuration of individual users
|
||||
nixosModules.users = {...}: {
|
||||
users.users.taneb = {
|
||||
isNormalUser = true;
|
||||
extraGroups = [ "wheel" ];
|
||||
openssh.authorizedKeys.keys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIV9ymP4tpq11a8wfUvn8eEEwAPvZZSPZTbASLh7YxOw nvd1234@gmail.com"
|
||||
];
|
||||
hashedPassword = "$y$j9T$9pxQ4Zj7OirGMmgclhUb0/$YCfaYmIaaHRrkqiqdNbQSlJ7puX8bGrMCLavq6Pe1e3";
|
||||
users.users = {
|
||||
taneb = {
|
||||
isNormalUser = true;
|
||||
extraGroups = [ "wheel" ];
|
||||
openssh.authorizedKeys.keys = [
|
||||
"ssh-ed25519 AAAAC3NzaC1lZDI1NTE5AAAAIIV9ymP4tpq11a8wfUvn8eEEwAPvZZSPZTbASLh7YxOw nvd1234@gmail.com"
|
||||
];
|
||||
hashedPassword = "$y$j9T$9pxQ4Zj7OirGMmgclhUb0/$YCfaYmIaaHRrkqiqdNbQSlJ7puX8bGrMCLavq6Pe1e3";
|
||||
};
|
||||
nairis = {
|
||||
isNormalUser = true;
|
||||
hashedPassword = "$y$j9T$luA6OU3OWVXbJc6DZM4Fx1$nTc89zTdKgozwR5kZQglbWaCkOFtmNZcpO4WCcYYPZC";
|
||||
};
|
||||
};
|
||||
users.mutableUsers = false;
|
||||
};
|
||||
|
@ -41,11 +47,31 @@
|
|||
nixosModules.plex = {...}: {
|
||||
services.plex = {
|
||||
enable = true;
|
||||
dataDir = "/storage/data";
|
||||
openFirewall = true;
|
||||
dataDir = "/storage/data";
|
||||
openFirewall = true;
|
||||
};
|
||||
nixpkgs.config.allowUnfree = true;
|
||||
};
|
||||
nixosModules.samba = {...}: {
|
||||
services.samba = {
|
||||
enable = true;
|
||||
openFirewall = true;
|
||||
shares = {
|
||||
chopper = {
|
||||
path = "/storage/media";
|
||||
browseable = "yes";
|
||||
"read only" = "no";
|
||||
"guest ok" = "no";
|
||||
"inherit permissions" = "yes";
|
||||
"create mask" = "0666";
|
||||
};
|
||||
};
|
||||
};
|
||||
services.samba-wsdd = {
|
||||
enable = true;
|
||||
openFirewall = true;
|
||||
};
|
||||
};
|
||||
nixosConfigurations.chopper = nixpkgs.lib.nixosSystem {
|
||||
system = "aarch64-linux";
|
||||
modules = [
|
||||
|
@ -53,8 +79,9 @@
|
|||
self.nixosModules.base
|
||||
self.nixosModules.users
|
||||
self.nixosModules.ssh
|
||||
self.nixosModules.zfs
|
||||
self.nixosModules.plex
|
||||
self.nixosModules.zfs
|
||||
self.nixosModules.plex
|
||||
self.nixosModules.samba
|
||||
];
|
||||
};
|
||||
};
|
||||
|
|
Loading…
Reference in New Issue