diff --git a/hosts/nixos/yveltal/configuration.nix b/hosts/nixos/yveltal/configuration.nix index 18de9ef..d5d622a 100644 --- a/hosts/nixos/yveltal/configuration.nix +++ b/hosts/nixos/yveltal/configuration.nix @@ -21,6 +21,7 @@ # home grown nixos modules system = { secure_boot.enable = true; + cifs_mounts.enable = true; ssh.enable = true; sops.enable = true; yubikey.enable = true; diff --git a/modules/system/cifs_mounts/default.nix b/modules/system/cifs_mounts/default.nix index 3533bb0..ed598b9 100644 --- a/modules/system/cifs_mounts/default.nix +++ b/modules/system/cifs_mounts/default.nix @@ -5,18 +5,20 @@ lib, ... }: let - cfg = config.system.flatpak; + cfg = config.system.cifs_mounts; sec = config.sops.secrets; in { - options.system.flatpak = { + options.system.cifs_mounts = { enable = lib.mkEnableOption "enables mounting holocron fileshare on the client side"; }; - environment.systemPackages = with pkgs; [ - cifs-utils - ]; config = lib.mkIf cfg.enable { + + environment.systemPackages = with pkgs; [ + cifs-utils + ]; + fileSystems."/media/holocron/blake" = { device = "//10.10.0.10/users/blake"; fsType = "cifs"; diff --git a/modules/system/default.nix b/modules/system/default.nix index 0d3c1ef..8da6742 100644 --- a/modules/system/default.nix +++ b/modules/system/default.nix @@ -17,6 +17,7 @@ ./graphics ./flatpak ./secure_boot + ./cifs_mounts ]; system.ssh.enable = lib.mkDefault true; diff --git a/secrets/secrets.yaml b/secrets/secrets.yaml index d82714e..f5b29a5 100644 --- a/secrets/secrets.yaml +++ b/secrets/secrets.yaml @@ -7,7 +7,7 @@ tailscale_authkey: ENC[AES256_GCM,data:SU0k3asrJd+WZ86VbC4w8TDJp+MqsbyagrzCfDcgT #ENC[AES256_GCM,data:bEbCic+ZDAA5ieNedCbiVbJrse17,iv:UwRYlis6NPB/RUcv+YnPxrGdbIcF4hrNiZt19YvWZNQ=,tag:m6PVlzPNnahX7X7KzMUj7A==,type:comment] borg_passwd: ENC[AES256_GCM,data:XOMJtr+DRs7xn5Iclc49iTzK9cFJyc/fSXJjhdKa9jdN,iv:YB8z7zNYjh6NpSxQb1TfPxAYUdzThdVfNZIe6tO5grA=,tag:bO6kZ3cLJDL4IQoWmGvRdg==,type:str] #ENC[AES256_GCM,data:ztRwuY0mTMDmwV5HqVR7Dmc+dCWcrVRtWZGEL1abE/WUcA==,iv:mmaWfHRiENJUGNhyUBFo1z7PdzVPH1OUZrVhkce6KV0=,tag:GKEvT0qkzTtimQXDueKPdw==,type:comment] -holocron_creds: ENC[AES256_GCM,data:8mD2pTAw21JuNbuKKaz5ldSt2BVNJTg4trn229uKmHOwkLEYRsLwCvBoAA==,iv:N6yDNWZ5xApos5uGPsgo3hEWJbV4AQAGeMvGQZEsTdo=,tag:0NAM0Rvo11SqNY9dH3H5Bg==,type:str] +holocron_creds: ENC[AES256_GCM,data:2QXtXrN5w0UFn70GZOsYFPdtPwjLcuUdtkEam5aZ83N6LEDqPWJi,iv:kUS9pq5CX19vqHumc6QjY+Xpd4N+Ge7oCcQYtMFh+WM=,tag:IUA1ZVThF91EdHrwmS624g==,type:str] #ENC[AES256_GCM,data:VdbMrwGKUKNJHw==,iv:OLwBh6KQXR/H8eRgp/hH8k3QfIkK/ydL735kx/dpc8E=,tag:N+v+ym6RMbvW4IckbiLK8Q==,type:comment] syncthing: gui_passwd: ENC[AES256_GCM,data:CicGIe5dT8lJVchCcE4wg3E8va3RYR8d53MISkE=,iv:8ziDDyQvU8ABaKKwYlcHmvm8Qybk4G+q5F0Ghqluu9w=,tag:YlyNPE04KD3detL1QUTrgQ==,type:str] @@ -62,7 +62,7 @@ sops: U0tmdFBuZnJES3piOTZNV0VKQmQ0eVUKCWRQ/flLzmpC64WyLoipklZBmrkpYiUg PRu+itNolpPTHm96pe+P93g2iP0wgekG0cX21wkiU2xaLF3dY2FEIA== -----END AGE ENCRYPTED FILE----- - lastmodified: "2025-11-12T01:06:25Z" - mac: ENC[AES256_GCM,data:a7jVTExWh/PFaCb0xdzlO5jAoGPzYiC+EQHRx8meTBy7lRvgKxiRKC/ND0Yffp4yx8aTsJrEdCXWnk/3VaDE/ko7LyI8v2EaP4n8IHs+1iD6iO6V9QZTDincCqJwVYCGzicGmgCHaSN/E6n8uowxkAX3hTSwe3E2q2UbJzuKVOc=,iv:GMMnTBIGBBi1ZFG5v02BaLHAQ3DWG7zOliGXsxBqE1w=,tag:Hm4KYzU6oEYLym2i9uo3XQ==,type:str] + lastmodified: "2025-11-12T01:24:51Z" + mac: ENC[AES256_GCM,data:KwgCPsLly0fnTyHyknvlpJ3++SjdF1gKhsQn8u39f1Z2LqiOOY0Jh+C3iZ3x/PF50JWB9FeXKZEf7Nn0Lp4iNritzubQFPSRMhf4aLSxG8HVlA0q4onxWXEFD/Zd+06Ntw1t0XczWD8AMTChR+m8s3mgpTyXzCRrZ6GCMPTFPl8=,iv:rKmgK3wUwYn+Yh1WV6sigP6xwikkVIMFyXQjhfUy8ZQ=,tag:l5G6GF6cIZpKGr2dcdE6Sg==,type:str] unencrypted_suffix: _unencrypted version: 3.11.0