!DBFhtjpqmJNENpLDOv:nixos.org

NixOS systemd

619 Members
NixOS ❤️ systemd170 Servers

Load older messages


SenderMessageTime
30 Jan 2025
@eyjhb:eyjhb.dkeyJhb* When was it that systemd initrd would become the default in NixOS?11:25:44
@k900:0upti.meK900We were hoping for 24.1111:36:39
@k900:0upti.meK900But there's still a few weird bugs11:36:45
@k900:0upti.meK900 @ElvishJerricco knows more 11:36:48
@elvishjerricco:matrix.orgElvishJerriccoI had been hoping to get it enabled by default on unstable very early in the 24.11 cycle, so that it would be in 25.05 with a fair amount of real world testing by the broader nixos-unstable userbase, but life has very much been in the way of me accomplishing that so far11:38:45
@elvishjerricco:matrix.orgElvishJerriccothe main issue is that we don't have the ISO using it yet, because of highly obscure bugs that disproportionately affect the ISO (which I've been struggling to solve for a good while now)11:39:57
@elvishjerricco:matrix.orgElvishJerriccoThe other main thing is that LUKS devices often timeout waiting for a password when they shouldn't, which happens because nixos-generate-config does the wrong thing and uses the UUID link instead of the mapper link.11:41:02
@elvishjerricco:matrix.orgElvishJerriccothere's a number of other very minor odds and ends, but nothing serious enough to be a blocker IIRC11:41:34
@eyjhb:eyjhb.dkeyJhbIs there a tracking issue for all this?11:43:31
@eyjhb:eyjhb.dkeyJhb I somewhat want to upstream my LUKS GPG smartcard module as well, so that we don't have to drop support for boot.initrd.luks.devices.<name>.gpgCard as well 11:44:01
@elvishjerricco:matrix.orgElvishJerriccoThe main way I keep track of everything is in the github "project" https://github.com/orgs/NixOS/projects/6611:44:48
@elvishjerricco:matrix.orgElvishJerriccothough admittedly that doesn't track which ones I would consider blockers11:45:04
@elvishjerricco:matrix.orgElvishJerriccoAren't smartcards basically just a marketing term for pkcs#11? Because systemd-cryptenroll / systemd-cryptsetup do support pkcs#11 tokens11:46:05
@eyjhb:eyjhb.dkeyJhbYeah, I think we discussed this before. But basically, it's a Yubikey with a GPG key on it, so it won't enroll into cryptenroll11:47:43
@eyjhb:eyjhb.dkeyJhbSo systemd-cryptenroll, wouldn't support the current workflow11:48:09
@eyjhb:eyjhb.dkeyJhbI shouldn't have used the term smartcard, gpgCard? If that makes any more sense?11:48:37
@elvishjerricco:matrix.orgElvishJerriccoRight.... The correct solution would probably be to add support in systemd for it.11:48:44
@elvishjerricco:matrix.orgElvishJerricco* Right.... The correct solution would probably be to add support in upstream systemd for it.11:48:53
@elvishjerricco:matrix.orgElvishJerriccoOf course that's more difficult though, what with it being a C codebase and having more serious automated testing standards than nixos in general does.11:50:19
@elvishjerricco:matrix.orgElvishJerricco(IIRC; I might be wrong about the testing thing)11:50:59
@eyjhb:eyjhb.dkeyJhbI actually uploaded my jankness here https://gist.github.com/eyJhb/2152a51856b463da410a259970cd573e 11:52:42
@eyjhb:eyjhb.dkeyJhbYeah, I don't think I would be able to handle to upstream it to systemd. But maybe one could make an issue for it.11:52:59
@eyjhb:eyjhb.dkeyJhb* Yeah, I don't think I would be able to handle to upstream it to systemd. But maybe one could make a(n)/ issue for it.11:53:03
@eyjhb:eyjhb.dkeyJhb* Yeah, I don't think I would be able to handle to upstream it to systemd. But maybe one could make a(n)? issue for it.11:53:07
@eyjhb:eyjhb.dkeyJhb(keep in mind, this doesn't respect the current setup, at all, it would need to be modified)11:54:19
@elvishjerricco:matrix.orgElvishJerriccoThis is the sort of stuff I'm very hesitant about. The reason is a combination of this being a bespoke scheme that no one else in the world uses besides us and the fact that it's just a big pile of code that doesn't receive the same level of security review as upstream systemd.12:01:10
@elvishjerricco:matrix.orgElvishJerricco Like that's why I'm kinda unhappy with our clevis stuff. It'd be better if it was based on systemd credentials, just because systemd does handle those with quite a bit of care. But I tried to implement that a while ago and it was... a tad tricky so I haven't tried to finish it yet. 12:03:36
@eyjhb:eyjhb.dkeyJhbI fully understand that, and I have absolutely zero reason to push for the above. I'm happy if I can just run it myself. It's as you say, very niche12:10:31
@gdamjan:spodeli.orggdamjanwhich one is it exactly? I think all that have GPG support have pkcs too?13:12:16
@eyjhb:eyjhb.dkeyJhbYes, they have pkcs support (AFAIK), but that can't be used in my setup, as I have more than 1 yubikey, which have identical GPG keys on them. So I can use any of them, to unlock my system13:13:37

Show newer messages


Back to Room ListRoom Version: 6