HulkSmashBurgers

joined 2 years ago
[–] [email protected] 9 points 1 day ago

Big fat zero for me.

[–] [email protected] 14 points 1 day ago

Hey fElon, fuck you in the neck!

[–] [email protected] 87 points 2 days ago (1 children)

This needs to become the norm.

[–] [email protected] 2 points 4 days ago

Nah that's a bean.

[–] [email protected] 25 points 4 days ago

What a fucking chode that guy is.

[–] [email protected] 5 points 4 days ago

I'm not at all surprised he'll try, and if the courts don't stop him, the 2nd amendment allows us to explore other options.

[–] [email protected] 40 points 4 days ago (1 children)

I think a big part of the problem is the media sanewashes him so a lot of people don't see the crazy.

[–] [email protected] 15 points 4 days ago (2 children)

Yeah pretty sure him anj his doge pack have broken some federal laws in the last couple months but they'll never go to jail for it.

[–] [email protected] 29 points 4 days ago

Boo hoo poor wittle musky

[–] [email protected] 35 points 5 days ago (1 children)

It needs to become a mass movement or it's game over for 'murca.

[–] [email protected] 3 points 6 days ago

Republican cruelty knows no bounds.

[–] [email protected] 13 points 1 week ago

MTG is an awful person.

 

Is there a way to export data from the app (saved posts, etc.)? Thanks.

 

Protonvpn has some instructions to connect via openvpn:

https://protonvpn.com/support/linux-openvpn/

Where I'm stuck is step 3, where the guide has you download a dns update script into /etc/openvpn.

Openvpn doesn't reside in /etc so I'm not sure how to handle that. Any advice? Thanks.

1
submitted 1 year ago* (last edited 1 year ago) by [email protected] to c/[email protected]
 

Edit: Turns out for what I'm trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.

So I luks encrypted the raid and call a script to open the vault and mount it when I need to.


In my system config file I added a raid drive like so:

(mapped-devices (list (mapped-device
                                     (source (uuid
                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))
                                     (target "guix")
                                     (type luks-device-mapping))

                                  (mapped-device
                                     (source (list "/dev/sdb1" "/dev/sdc1"))
                                     (target "/dev/md0")
                                     (type raid-device-mapping))))

(file-systems (cons* (file-system
                                  (mount-point "/")
                                  (device "/dev/mapper/guix")
                                  (type "ext4")
                                  (dependencies (list (list-ref mapped-devices 0))))

                               (file-system
                                  (mount-point "/mnt/nas")
                                  (device "/dev/md0")
                                  (type "ext4")
                                  (mount? #f)
                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))

I'd now like to luks encrypt the raid drive but I'm not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and "/dev/md0" as the target:

(mapped-device
   (source (uuid
                {raid uuid}))
                (target "/dev/md0")
                (type luks-device-mapping))

and then pass that as a dependency to the raid file system object?

Thanks

view more: next ›