diff --git a/hosts/idols_ai/cifs-mount.nix b/hosts/idols_ai/cifs-mount.nix index b94485e9..789887a3 100644 --- a/hosts/idols_ai/cifs-mount.nix +++ b/hosts/idols_ai/cifs-mount.nix @@ -9,10 +9,9 @@ fsType = "cifs"; options = [ # https://www.freedesktop.org/software/systemd/man/latest/systemd.mount.html - "nofail,_netdev,x-systemd.device-timeout=5s,x-systemd.mount-timeout=5s" + "nofail,_netdev" "uid=1000,gid=100,dir_mode=0755,file_mode=0755" "vers=3.0,credentials=${config.age.secrets.smb-credentials.path}" ]; - depends = ["/persistent" "/boot" "/swap/swapfile"]; }; } diff --git a/hosts/idols_ai/hardware-configuration.nix b/hosts/idols_ai/hardware-configuration.nix index 26b6aaec..860c07e6 100644 --- a/hosts/idols_ai/hardware-configuration.nix +++ b/hosts/idols_ai/hardware-configuration.nix @@ -46,7 +46,7 @@ boot.initrd = { # unlocked luks devices via a keyfile or prompt a passphrase. luks.devices."crypted-nixos" = { - # NOTE: DO NOT use device name here(like /dev/sda, /dev/nvme0n1p2, etc), use the UUID instead. + # NOTE: DO NOT use device name here(like /dev/sda, /dev/nvme0n1p2, etc), use UUID instead. # https://github.com/ryan4yin/nix-config/issues/43 device = "/dev/disk/by-uuid/a21ca82a-9ee6-4e5c-9d3f-a93e84e4e0f4"; # the keyfile(or device partition) that should be used as the decryption key for the encrypted device. @@ -119,7 +119,7 @@ }; fileSystems."/boot" = { - device = "/dev/nvme0n1p1"; + device = "/dev/disk/by-uuid/90FB-9F88"; fsType = "vfat"; };