51 lines
1.7 KiB
Nix
51 lines
1.7 KiB
Nix
# mounts the samba share on s0 over tailscale
|
|
|
|
{ config, lib, pkgs, ... }:
|
|
|
|
let
|
|
cfg = config.services.mount-samba;
|
|
|
|
# prevents hanging on network split and other similar niceties to ensure a stable connection
|
|
network_opts = "nostrictsync,cache=strict,handlecache,handletimeout=30000,rwpidforward,mapposix,soft,resilienthandles,echo_interval=10,noblocksend,fsc";
|
|
|
|
systemd_opts = "x-systemd.automount,noauto,x-systemd.idle-timeout=60,x-systemd.device-timeout=5s,x-systemd.mount-timeout=5s";
|
|
user_opts = "uid=${toString config.users.users.googlebot.uid},file_mode=0660,dir_mode=0770,user";
|
|
auth_opts = "sec=ntlmv2i,credentials=/run/agenix/smb-secrets";
|
|
version_opts = "vers=3.1.1";
|
|
|
|
public_user_opts = "gid=${toString config.users.groups.users.gid}";
|
|
|
|
opts = "${systemd_opts},${network_opts},${user_opts},${version_opts},${auth_opts}";
|
|
in
|
|
{
|
|
options.services.mount-samba = {
|
|
enable = lib.mkEnableOption "enable mounting samba shares";
|
|
};
|
|
|
|
config = lib.mkIf (cfg.enable && config.services.tailscale.enable) {
|
|
fileSystems."/mnt/public" = {
|
|
device = "//s0.koi-bebop.ts.net/public";
|
|
fsType = "cifs";
|
|
options = [ "${opts},${public_user_opts}" ];
|
|
};
|
|
|
|
fileSystems."/mnt/private" = {
|
|
device = "//s0.koi-bebop.ts.net/googlebot";
|
|
fsType = "cifs";
|
|
options = [ opts ];
|
|
};
|
|
|
|
age.secrets.smb-secrets.file = ../../secrets/smb-secrets.age;
|
|
|
|
environment.shellAliases = {
|
|
# remount storage
|
|
remount_public = "sudo systemctl restart mnt-public.mount";
|
|
remount_private = "sudo systemctl restart mnt-private.mount";
|
|
|
|
# Encrypted Vault
|
|
vault_unlock = "${pkgs.gocryptfs}/bin/gocryptfs /mnt/private/.vault/ /mnt/vault/";
|
|
vault_lock = "umount /mnt/vault/";
|
|
};
|
|
};
|
|
}
|