From d08d795adfda8a51a61f7f335543b43d005a66b7 Mon Sep 17 00:00:00 2001 From: Christoph Urlacher Date: Thu, 19 Mar 2026 23:57:32 +0100 Subject: [PATCH] System/Nixinator: Add two additional disks to system (disko, luks) --- home/homemodules/yazi/specialDirectories.nix | 1 + system/nixinator/disks.nix | 96 ++++++++++++++++++++ 2 files changed, 97 insertions(+) diff --git a/home/homemodules/yazi/specialDirectories.nix b/home/homemodules/yazi/specialDirectories.nix index 2868d35a..235972ed 100644 --- a/home/homemodules/yazi/specialDirectories.nix +++ b/home/homemodules/yazi/specialDirectories.nix @@ -18,6 +18,7 @@ in [ (mkIcon "Public" "󰒗") (mkIcon "Restic" "󰁯") (mkIcon "Shows" "󰿎") + (mkIcon "SSD" "󰉉") (mkIcon "Unity" "󰚯") (mkIcon "Videos" "") ] diff --git a/system/nixinator/disks.nix b/system/nixinator/disks.nix index d25fa0c6..50ffd19d 100644 --- a/system/nixinator/disks.nix +++ b/system/nixinator/disks.nix @@ -91,6 +91,102 @@ }; }; }; + + games = { + type = "disk"; + device = "/dev/disk/by-id/nvme-WD_BLACK_SN850X_2000GB_231623802252"; + content = { + type = "gpt"; + partitions = { + luks = { + label = "LUKS_GAMES"; + size = "100%"; + content = { + type = "luks"; + name = "crypted_games"; + + extraOpenArgs = [ + "--perf-no_read_workqueue" + "--perf-no_write_workqueue" + ]; + + settings = { + allowDiscards = true; + crypttabExtraOpts = ["fido2-device=auto" "token-timeout=10" "tries=5"]; + + # Disable for interactive password entry + # This is contained on the main disk, so by unlocking the main disk with the password, + # the second disk can unlock automatically + keyFile = "/persist/home/christoph/.secrets/luks.keyfile"; + fallbackToPassword = false; + }; + + content = { + type = "btrfs"; + extraArgs = ["-L" "GAMES" "-f"]; + subvolumes = { + "data" = { + mountpoint = "/home/christoph/Games"; + mountOptions = [ + "compress=zstd" + "noatime" + ]; + }; + }; + }; + }; + }; + }; + }; + }; + + ssd = { + type = "disk"; + device = "/dev/disk/by-id/nvme-eui.00253857019ebd67"; + content = { + type = "gpt"; + partitions = { + luks = { + label = "LUKS_SSD"; + size = "100%"; + content = { + type = "luks"; + name = "crypted_ssd"; + + extraOpenArgs = [ + "--perf-no_read_workqueue" + "--perf-no_write_workqueue" + ]; + + settings = { + allowDiscards = true; + crypttabExtraOpts = ["fido2-device=auto" "token-timeout=10" "tries=5"]; + + # Disable for interactive password entry + # This is contained on the main disk, so by unlocking the main disk with the password, + # the second disk can unlock automatically + keyFile = "/persist/home/christoph/.secrets/luks.keyfile"; + fallbackToPassword = false; + }; + + content = { + type = "btrfs"; + extraArgs = ["-L" "SSD" "-f"]; + subvolumes = { + "data" = { + mountpoint = "/home/christoph/SSD"; + mountOptions = [ + "compress=zstd" + "noatime" + ]; + }; + }; + }; + }; + }; + }; + }; + }; }; };