HulkSmashBurgers

joined 2 years ago

For the snorkeling duh.

Me too. I haven't been to a show in 10-ish years. Don't miss it at all.

[–] HulkSmashBurgers@reddthat.com 84 points 1 day ago (1 children)

Using their beloved rebel flag as the noose is the cherry on top.

Who knew fucking couches makes you autistic.

[–] HulkSmashBurgers@reddthat.com 20 points 4 days ago (2 children)

Democracy sustains capitalism. Capitalism thrives in a democracy

Exactly what a neoliberal would say.

[–] HulkSmashBurgers@reddthat.com 5 points 1 week ago (1 children)

Yeah Schmucker has got to go.

It should have orange fur.

[–] HulkSmashBurgers@reddthat.com 10 points 1 week ago (2 children)

Senate is a safer bet, and Shmucker needs to go.

Never Play Defense is the alt right playbook

https://m.youtube.com/watch?v=wmVkJvieaOA

keepassX + syncthing is what use.

[–] HulkSmashBurgers@reddthat.com 19 points 1 week ago (1 children)

What's the crime? Oh right there isn't one and this administration is just making shit up at this point.

 

Just finished watching this. I liked it!

 

Is there a way to export data from the app (saved posts, etc.)? Thanks.

 

Protonvpn has some instructions to connect via openvpn:

https://protonvpn.com/support/linux-openvpn/

Where I'm stuck is step 3, where the guide has you download a dns update script into /etc/openvpn.

Openvpn doesn't reside in /etc so I'm not sure how to handle that. Any advice? Thanks.

 

If this ever gets to the point where I can use this by paying cash for access (and not having to deal with cryptocurrency) I would totally give it a try.

1
submitted 2 years ago* (last edited 2 years ago) by HulkSmashBurgers@reddthat.com to c/guix@lemmy.ml
 

Edit: Turns out for what I'm trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.

So I luks encrypted the raid and call a script to open the vault and mount it when I need to.


In my system config file I added a raid drive like so:

(mapped-devices (list (mapped-device
                                     (source (uuid
                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))
                                     (target "guix")
                                     (type luks-device-mapping))

                                  (mapped-device
                                     (source (list "/dev/sdb1" "/dev/sdc1"))
                                     (target "/dev/md0")
                                     (type raid-device-mapping))))

(file-systems (cons* (file-system
                                  (mount-point "/")
                                  (device "/dev/mapper/guix")
                                  (type "ext4")
                                  (dependencies (list (list-ref mapped-devices 0))))

                               (file-system
                                  (mount-point "/mnt/nas")
                                  (device "/dev/md0")
                                  (type "ext4")
                                  (mount? #f)
                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))

I'd now like to luks encrypt the raid drive but I'm not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and "/dev/md0" as the target:

(mapped-device
   (source (uuid
                {raid uuid}))
                (target "/dev/md0")
                (type luks-device-mapping))

and then pass that as a dependency to the raid file system object?

Thanks

view more: next ›