!coeAONBrWyDJnYMbMi:nixos.org

NixOS System Operations

564 Members
About system administration for running NixOS systems in production. Declaratively manage your operations. | Room recommendations: #networking:nixos.org153 Servers

Load older messages


SenderMessageTime
25 Mar 2024
@elvishjerricco:matrix.orgElvishJerriccostage* 200:30:58
@elvishjerricco:matrix.orgElvishJerricco conr: Don't create /etc/crypttab. Just use the environment.etc option to have nixos create it. 00:31:22
@conr:mozilla.orgconrright stage 200:31:23
@conr:mozilla.orgconrok then add each value manually after?00:32:08
@conr:mozilla.orgconr * ok then add each disk manually after?00:32:16
@elvishjerricco:matrix.orgElvishJerricco
environment.etc.crypttab.text = ''
  cryptssd1 /dev/disk/by-uuid/asdfasdf /dev/mapper/cryptkey keyfile-size=8192
  cryptssd2 /dev/disk/by-uuid/wxyzwxya /dev/mapper/cryptkey keyfile-size=8192
'';
00:32:56
@elvishjerricco:matrix.orgElvishJerricco you don't need to edit /etc/crypttab at all. Just have nixos manage it like that 00:33:07
@conr:mozilla.orgconrooo i like it00:33:14
@conr:mozilla.orgconrWorked on the first try!00:49:02
@conr:mozilla.orgconr how to i make this work recursively? systemd.tmpfiles.rules = [ "d /mnt/data1 0755 conor users" ]; 01:28:26
@elvishjerricco:matrix.orgElvishJerricco conr: You can follow that line with another one like Z /mnt/data1 0755 conor users to recursively set the mode and ownership of a directory 01:32:53
@conr:mozilla.orgconr
In reply to @elvishjerricco:matrix.org
conr: You can follow that line with another one like Z /mnt/data1 0755 conor users to recursively set the mode and ownership of a directory

so like

systemd.tmpfiles.rules = [ 
"d /mnt/data1 0755 conor users" 
"Z /mnt/data1 0755 conor users" 
];
01:38:05
@elvishjerricco:matrix.orgElvishJerriccoI think that would work yea01:38:26
@conr:mozilla.orgconrworks01:43:29
@conr:mozilla.orgconr so for lanzaboote, do i need the niv folder forever? 01:45:10
@conr:mozilla.orgconrlike commit it to my repo?01:45:25
@conr:mozilla.orgconr * so for lanzaboote, do i need the niv nix folder forever? 01:45:43
@conr:mozilla.orgconrmaybe i need to integrate it with my flake?01:50:22
@conr:mozilla.orgconri'll ask secure-boot01:50:55
@ttamttam:matrix.orgttamttam joined the room.01:58:40
@conr:mozilla.orgconr left the room.03:24:13
@nazarewk:matrix.orgnazarewk joined the room.19:46:09
@ma27:nicht-so.sexyma27 joined the room.19:53:42
@alexou:femtodata.comAlex Ou joined the room.20:08:57
@konrad-thorson:matrix.orgkonrad-thorson joined the room.20:12:53
@konrad-thorson:matrix.orgkonrad-thorsonHowdy20:13:13
@konrad-thorson:matrix.orgkonrad-thorsonI'm playing with an idea and would appreciate some feedback from people that understand Nix OS better than I do. Basically I want to make a NixOS.img operating system installer that includes IPFS. Once the ipfs node starts following a pin set of nix packages then install from ipfs, but also run the binaries from the ipfs file store. For me this is an 'art project' involving computing and the idea of https://en.wikipedia.org/wiki/Ship_of_Theseus Nix seems perfect for configuration of the software side of things.20:14:46
26 Mar 2024
@mg:maximiliangaedig.comMaximilian Gaedig ⚡️ joined the room.15:09:51
27 Mar 2024
Room Avatar Renderer.13:39:52
26 Mar 2024
@alexou:femtodata.comAlex Ou konrad-thorson: I'm not familiar with ipfs, but as far as a custom installer with your own packages and configs, here's an example of an installer that has an option to configure tailscale, would be easy to set up some more systemd services to start binaries. Not sure if you meant you wanted the installer to install and then run stuff, or for the installer instance to run stuff (the example shows more the latter, but you could configure the installed flake to do the former) https://github.com/femtodata/nixos-flake-installer 16:07:55

There are no newer messages yet.


Back to Room ListRoom Version: 10