HulkSmashBurgers

joined 2 years ago
[–] HulkSmashBurgers@reddthat.com 8 points 18 hours ago

Also, dems should demand epstein files be released to prevent a shutdown.

[–] HulkSmashBurgers@reddthat.com 7 points 18 hours ago

Rapist, child rapist.

More like vulture capitalist.

[–] HulkSmashBurgers@reddthat.com 1 points 1 day ago* (last edited 1 day ago)

Chourico & baked beans 🤤😊

Love that the Guix logo is included!

For the snorkeling duh.

Me too. I haven't been to a show in 10-ish years. Don't miss it at all.

[–] HulkSmashBurgers@reddthat.com 87 points 3 days ago (1 children)

Using their beloved rebel flag as the noose is the cherry on top.

Who knew fucking couches makes you autistic.

[–] HulkSmashBurgers@reddthat.com 20 points 6 days ago (2 children)

Democracy sustains capitalism. Capitalism thrives in a democracy

Exactly what a neoliberal would say.

[–] HulkSmashBurgers@reddthat.com 5 points 1 week ago (1 children)

Yeah Schmucker has got to go.

It should have orange fur.

 

Just finished watching this. I liked it!

 

Is there a way to export data from the app (saved posts, etc.)? Thanks.

 

Protonvpn has some instructions to connect via openvpn:

https://protonvpn.com/support/linux-openvpn/

Where I'm stuck is step 3, where the guide has you download a dns update script into /etc/openvpn.

Openvpn doesn't reside in /etc so I'm not sure how to handle that. Any advice? Thanks.

 

If this ever gets to the point where I can use this by paying cash for access (and not having to deal with cryptocurrency) I would totally give it a try.

1
submitted 2 years ago* (last edited 2 years ago) by HulkSmashBurgers@reddthat.com to c/guix@lemmy.ml
 

Edit: Turns out for what I'm trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.

So I luks encrypted the raid and call a script to open the vault and mount it when I need to.


In my system config file I added a raid drive like so:

(mapped-devices (list (mapped-device
                                     (source (uuid
                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))
                                     (target "guix")
                                     (type luks-device-mapping))

                                  (mapped-device
                                     (source (list "/dev/sdb1" "/dev/sdc1"))
                                     (target "/dev/md0")
                                     (type raid-device-mapping))))

(file-systems (cons* (file-system
                                  (mount-point "/")
                                  (device "/dev/mapper/guix")
                                  (type "ext4")
                                  (dependencies (list (list-ref mapped-devices 0))))

                               (file-system
                                  (mount-point "/mnt/nas")
                                  (device "/dev/md0")
                                  (type "ext4")
                                  (mount? #f)
                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))

I'd now like to luks encrypt the raid drive but I'm not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and "/dev/md0" as the target:

(mapped-device
   (source (uuid
                {raid uuid}))
                (target "/dev/md0")
                (type luks-device-mapping))

and then pass that as a dependency to the raid file system object?

Thanks

view more: next ›