73 Commits

Author SHA1 Message Date
932f023499
fix(dmcrypt): increase version number
The version number was not increased with commit
4a4a9b0ddfc83ee816c5adc672f9716b2da20272.
2025-06-27 18:58:25 +00:00
4a4a9b0ddf
feat(dmcrypt): improve comment-based documentation 2025-06-27 18:44:31 +00:00
b8258a596f
feat(name)!: rename file "dmcrypt" to include new system name
Changing the system name technically changes the entire target of the
file, so classify as a breaking change.
2025-06-27 18:28:20 +00:00
dc734dfaa8
rebase: file "dmcrypt" "3.0.0-alpha.5" > "3.0.0" 2025-06-27 18:25:28 +00:00
46a263e3d4
feat(loc)!: switch system "aa000-0" name to "aa-00-00"
I have switched to a clearer naming convention for my systems. This
commit moves the directory and file locations to reflect that change.
2025-06-27 18:21:07 +00:00
26a2ee3b35
Update "Linux - Configuration" from version "6.1.31-inf-aa000-0-25.0.0.55" to "6.7.7-aa000-0-81.0.0" 2024-03-01 22:51:49 +00:00
4f3291f4ff
Wrap UUID values in quotation marks 2024-02-13 04:45:19 +00:00
b9d1059c00
Fix "Stable Diffusion - S1 - Outputs" mount point path 2024-02-13 04:40:44 +00:00
cdc63e3528
Add "Stable Diffusion - S1 - Outputs" filesystem
Mount security level S1 Stable Diffusion outputs read-only.
2024-02-13 04:38:23 +00:00
191ae147fd
Set nosuid mount option on "/home/"
There is currently no reason to allow setting the setuid bit on files
located in "/home/". Only system files located on "/" require setuid
bits.
2024-02-13 04:34:37 +00:00
3992bd302d
Sort "/home/" mount options alphabetically 2024-02-13 04:33:41 +00:00
aa3d9afa01
Set "/home/" to automatically mount on boot 2024-02-13 04:32:24 +00:00
2cd0c35f1f
Explicitly set "/home/" filesystem type to NFS 4.0. 2024-02-13 04:31:19 +00:00
9f847c60ec
Update "/home/" remote location from "xa000.inferencium.net" to "xa000-1"
"/home/" now resides on a virtual machine running on system xa000-0,
with hostname xa000-1.
2024-02-13 04:29:08 +00:00
01d4c096fa
Move "/home/" to remote filesystems section 2024-02-13 04:27:33 +00:00
8fe5296f48
Add "/usr/local/src/compile/" filesystem 2024-02-13 04:26:16 +00:00
6ff0f06cc1
Sort "/var/tmp/portage/" mount options alphabetically 2024-02-13 04:24:13 +00:00
8aafa9f082
Set "/var/tmp/portage/" to automatically mount on boot 2024-02-13 04:22:56 +00:00
32b21b30b2
Explicitly disable sticky bits for "/var/tmp/portage/" 2024-02-13 04:21:12 +00:00
6d05455834
Increase "/var/tmp/portage/" capacity from 16 GiB to 32 GiB 2024-02-13 04:20:25 +00:00
a93e1d3071
Move "/var/tmp/portage/" to more logical position 2024-02-13 04:19:04 +00:00
443ef430f0
Add "/tmp/" filesystem 2024-02-13 04:17:06 +00:00
bcb34c2b6b
Add "/run/" filesystem 2024-02-13 04:15:11 +00:00
df9faddd17
Set "/" pass count to 0
Bcachefs does not require boot-time fsck by design, due to its
self-contained filesystem checking during mounting and usage.
2024-02-13 04:12:53 +00:00
2d670ddee8
Add rw mount option to "/"
Make sure the root device is mounted as read-write.
2024-02-13 03:06:24 +00:00
447787d902
Add degraded mount option to "/"
Bcachefs does not permit mounting degraded filesystems by default. This
is not desirable since at least 1 working device of a filesystem can
still be used and should not prevent mounting of the filesystem.
2024-02-13 03:04:57 +00:00
19bc218738
Switch "/" filesystem from Btrfs to Bcachefs
System aa000-0's root device has switched from Btrfs to Bcachefs.
2024-02-13 03:03:51 +00:00
ab6ffe04e4
Add nosuid to "swap"
Prevent setting setuid bit on files within the swap device since it
holds no userspace executables.
2024-02-13 03:02:07 +00:00
4381e9860e
Add noexec to "swap"
Swap holds nothing executable.
2024-02-13 03:00:56 +00:00
59ad636009
Add noatime to "swap"
Access times are not required for swap; increase performance by
disabling access time functionality.
2024-02-13 02:59:03 +00:00
88a712570f
Set "swap" to automatically mount on boot 2024-02-13 02:58:27 +00:00
c7fe3a07bd
Move "swap" to bottom of local filesystems section 2024-02-13 02:57:35 +00:00
7ff2644343
Disable boot-time fsck on "/boot/" 2024-02-13 02:55:20 +00:00
d47ee10a87
Add nosuid to "/boot/"
Prevent setting setuid bit on files within the boot device since it
holds no userspace executables.
2024-02-13 02:53:22 +00:00
e4ecfa03e1
Add noexec to "/boot/"
Prevent execution on boot device since it holds no userspace
executables.
2024-02-13 02:51:45 +00:00
daf362fa21
Switch "/boot/" from partition UUID to filesystem UUID 2024-02-13 02:50:20 +00:00
ba9ac7f451
Switch to actual mount point names 2024-02-13 02:40:58 +00:00
4992fb2673
Add empty line to improve readability 2024-02-13 02:38:35 +00:00
b63bf70e4f
Improve pass count comment structure 2024-02-13 02:38:06 +00:00
72f8c1025d
Use full name for file title 2024-02-13 02:34:02 +00:00
f71039e860
Move version string above copyright and licensing information 2024-02-13 02:33:03 +00:00
d63c6e6cf8
Add device offset
Adding an offset allows using a pinned UUID for the device via the
pre-offset location on-device. The encryption occurs at the point of the
offset, preventing erasure of the UUID, allowing partition UUID to be
used as the target.
2024-02-13 02:24:12 +00:00
f1a6e2589a
Fix key size argument
`--size` is used for 512-byte sector count, limiting the usable space of
the encrypted device. Key size is controlled via `--key-size`.
2024-02-13 02:17:06 +00:00
2522dcdb59
Switch from device name to partition UUID
Using partition UUID is safer than device name as it prevents accidental
erasure of incorrect devices should the device names change.
2024-02-13 02:14:52 +00:00
0a462c791f
Wrap values in quotation marks 2024-02-13 02:13:38 +00:00
a59365241d
Move version string above copyright and licensing information 2024-02-13 02:11:03 +00:00
49746dfc34
Update package list 2023-10-15 11:15:26 +01:00
7fe2406b52
Switch to Semantic Versioning 2023-10-15 09:37:35 +01:00
56f1704f19
Remove duplicate C_SEC flags 2023-10-15 09:27:53 +01:00
33483a5138
Remove duplicate LD_SEC flags 2023-10-15 09:23:07 +01:00