932f023499
fix(dmcrypt): increase version number
...
The version number was not increased with commit
4a4a9b0ddfc83ee816c5adc672f9716b2da20272.
2025-06-27 18:58:25 +00:00
4a4a9b0ddf
feat(dmcrypt): improve comment-based documentation
2025-06-27 18:44:31 +00:00
b8258a596f
feat(name)!: rename file "dmcrypt" to include new system name
...
Changing the system name technically changes the entire target of the
file, so classify as a breaking change.
2025-06-27 18:28:20 +00:00
dc734dfaa8
rebase: file "dmcrypt" "3.0.0-alpha.5" > "3.0.0"
2025-06-27 18:25:28 +00:00
46a263e3d4
feat(loc)!: switch system "aa000-0" name to "aa-00-00"
...
I have switched to a clearer naming convention for my systems. This
commit moves the directory and file locations to reflect that change.
2025-06-27 18:21:07 +00:00
26a2ee3b35
Update "Linux - Configuration" from version "6.1.31-inf-aa000-0-25.0.0.55" to "6.7.7-aa000-0-81.0.0"
2024-03-01 22:51:49 +00:00
4f3291f4ff
Wrap UUID values in quotation marks
2024-02-13 04:45:19 +00:00
b9d1059c00
Fix "Stable Diffusion - S1 - Outputs" mount point path
2024-02-13 04:40:44 +00:00
cdc63e3528
Add "Stable Diffusion - S1 - Outputs" filesystem
...
Mount security level S1 Stable Diffusion outputs read-only.
2024-02-13 04:38:23 +00:00
191ae147fd
Set nosuid
mount option on "/home/"
...
There is currently no reason to allow setting the setuid bit on files
located in "/home/". Only system files located on "/" require setuid
bits.
2024-02-13 04:34:37 +00:00
3992bd302d
Sort "/home/" mount options alphabetically
2024-02-13 04:33:41 +00:00
aa3d9afa01
Set "/home/" to automatically mount on boot
2024-02-13 04:32:24 +00:00
2cd0c35f1f
Explicitly set "/home/" filesystem type to NFS 4.0.
2024-02-13 04:31:19 +00:00
9f847c60ec
Update "/home/" remote location from "xa000.inferencium.net" to "xa000-1"
...
"/home/" now resides on a virtual machine running on system xa000-0,
with hostname xa000-1.
2024-02-13 04:29:08 +00:00
01d4c096fa
Move "/home/" to remote filesystems section
2024-02-13 04:27:33 +00:00
8fe5296f48
Add "/usr/local/src/compile/" filesystem
2024-02-13 04:26:16 +00:00
6ff0f06cc1
Sort "/var/tmp/portage/" mount options alphabetically
2024-02-13 04:24:13 +00:00
8aafa9f082
Set "/var/tmp/portage/" to automatically mount on boot
2024-02-13 04:22:56 +00:00
32b21b30b2
Explicitly disable sticky bits for "/var/tmp/portage/"
2024-02-13 04:21:12 +00:00
6d05455834
Increase "/var/tmp/portage/" capacity from 16 GiB to 32 GiB
2024-02-13 04:20:25 +00:00
a93e1d3071
Move "/var/tmp/portage/" to more logical position
2024-02-13 04:19:04 +00:00
443ef430f0
Add "/tmp/" filesystem
2024-02-13 04:17:06 +00:00
bcb34c2b6b
Add "/run/" filesystem
2024-02-13 04:15:11 +00:00
df9faddd17
Set "/" pass count to 0
...
Bcachefs does not require boot-time fsck by design, due to its
self-contained filesystem checking during mounting and usage.
2024-02-13 04:12:53 +00:00
2d670ddee8
Add rw
mount option to "/"
...
Make sure the root device is mounted as read-write.
2024-02-13 03:06:24 +00:00
447787d902
Add degraded
mount option to "/"
...
Bcachefs does not permit mounting degraded filesystems by default. This
is not desirable since at least 1 working device of a filesystem can
still be used and should not prevent mounting of the filesystem.
2024-02-13 03:04:57 +00:00
19bc218738
Switch "/" filesystem from Btrfs to Bcachefs
...
System aa000-0's root device has switched from Btrfs to Bcachefs.
2024-02-13 03:03:51 +00:00
ab6ffe04e4
Add nosuid
to "swap"
...
Prevent setting setuid bit on files within the swap device since it
holds no userspace executables.
2024-02-13 03:02:07 +00:00
4381e9860e
Add noexec
to "swap"
...
Swap holds nothing executable.
2024-02-13 03:00:56 +00:00
59ad636009
Add noatime
to "swap"
...
Access times are not required for swap; increase performance by
disabling access time functionality.
2024-02-13 02:59:03 +00:00
88a712570f
Set "swap" to automatically mount on boot
2024-02-13 02:58:27 +00:00
c7fe3a07bd
Move "swap" to bottom of local filesystems section
2024-02-13 02:57:35 +00:00
7ff2644343
Disable boot-time fsck on "/boot/"
2024-02-13 02:55:20 +00:00
d47ee10a87
Add nosuid
to "/boot/"
...
Prevent setting setuid bit on files within the boot device since it
holds no userspace executables.
2024-02-13 02:53:22 +00:00
e4ecfa03e1
Add noexec
to "/boot/"
...
Prevent execution on boot device since it holds no userspace
executables.
2024-02-13 02:51:45 +00:00
daf362fa21
Switch "/boot/" from partition UUID to filesystem UUID
2024-02-13 02:50:20 +00:00
ba9ac7f451
Switch to actual mount point names
2024-02-13 02:40:58 +00:00
4992fb2673
Add empty line to improve readability
2024-02-13 02:38:35 +00:00
b63bf70e4f
Improve pass count comment structure
2024-02-13 02:38:06 +00:00
72f8c1025d
Use full name for file title
2024-02-13 02:34:02 +00:00
f71039e860
Move version string above copyright and licensing information
2024-02-13 02:33:03 +00:00
d63c6e6cf8
Add device offset
...
Adding an offset allows using a pinned UUID for the device via the
pre-offset location on-device. The encryption occurs at the point of the
offset, preventing erasure of the UUID, allowing partition UUID to be
used as the target.
2024-02-13 02:24:12 +00:00
f1a6e2589a
Fix key size argument
...
`--size` is used for 512-byte sector count, limiting the usable space of
the encrypted device. Key size is controlled via `--key-size`.
2024-02-13 02:17:06 +00:00
2522dcdb59
Switch from device name to partition UUID
...
Using partition UUID is safer than device name as it prevents accidental
erasure of incorrect devices should the device names change.
2024-02-13 02:14:52 +00:00
0a462c791f
Wrap values in quotation marks
2024-02-13 02:13:38 +00:00
a59365241d
Move version string above copyright and licensing information
2024-02-13 02:11:03 +00:00
49746dfc34
Update package list
2023-10-15 11:15:26 +01:00
7fe2406b52
Switch to Semantic Versioning
2023-10-15 09:37:35 +01:00
56f1704f19
Remove duplicate C_SEC flags
2023-10-15 09:27:53 +01:00
33483a5138
Remove duplicate LD_SEC flags
2023-10-15 09:23:07 +01:00