dotfiles/systems/laptop/config/filesystem.nix

71 lines
1.8 KiB
Nix
Raw Normal View History

2024-10-06 15:25:05 -05:00
{
flake,
config,
...
}: let
2024-11-03 17:52:55 -06:00
inherit (flake.config.people) user0 user1;
2024-11-10 01:29:37 -06:00
inherit (flake.config.machines.devices) laptop synology server;
2024-11-04 20:49:43 -06:00
inherit (flake.config.services.instances) samba;
2024-10-06 15:25:05 -05:00
2024-10-09 23:26:43 -05:00
synologySecrets = config.sops.secrets."network/synology".path;
serverSecrets = config.sops.secrets."network/server".path;
2024-10-06 15:25:05 -05:00
in {
fileSystems = let
synologyDrives = [
"folder0"
"folder1"
"folder2"
2024-10-06 15:25:05 -05:00
];
sambaDrives = [
"samba0"
];
synologyMounts = synologyDrive: {
2024-11-10 01:29:37 -06:00
name = "${synology.${synologyDrive}.mount}";
2024-10-06 15:25:05 -05:00
value = {
2024-11-10 01:29:37 -06:00
device = synology.${synologyDrive}.device;
2024-10-06 15:25:05 -05:00
fsType = "cifs";
options =
2024-11-10 01:29:37 -06:00
synology.${synologyDrive}.options
++ ["credentials=${synologySecrets}"];
2024-10-06 15:25:05 -05:00
};
};
sambaMounts = sambaDrive: {
name = "${server.${sambaDrive}.mount}/${samba.paths.path1}";
2024-10-06 15:25:05 -05:00
value = {
device = "${server.${sambaDrive}.device}/${samba.paths.path1}";
2024-10-06 15:25:05 -05:00
fsType = "cifs";
options =
server.${sambaDrive}.options
++ ["credentials=${serverSecrets}"];
2024-10-06 15:25:05 -05:00
};
};
in
{
"/" = {
2024-10-12 14:14:47 -05:00
device = "/dev/disk/by-uuid/aae33e00-125e-4f1c-b9aa-9fc512335b7f";
2024-10-06 15:25:05 -05:00
fsType = "ext4";
};
"/boot" = {
2024-10-12 14:14:47 -05:00
device = "/dev/disk/by-uuid/C506-9E18";
2024-10-06 15:25:05 -05:00
fsType = "vfat";
options = laptop.boot.options;
};
}
// (builtins.listToAttrs (map synologyMounts synologyDrives))
// (builtins.listToAttrs (map sambaMounts sambaDrives));
swapDevices = [
2024-10-12 14:14:47 -05:00
{device = "/dev/disk/by-uuid/68d6072a-e21b-4d11-88fd-22c5b9932a50";}
2024-10-06 15:25:05 -05:00
];
systemd.tmpfiles.rules = [
"Z ${config.home-manager.users.${user0}.home.homeDirectory} 0755 ${user0} users -"
"Z ${config.home-manager.users.${user1}.home.homeDirectory} 0755 ${user1} users -"
];
services.udisks2.enable = true;
}