!PSmBFWNKoXmlQBzUQf:helsinki-systems.de

Stage 1 systemd

82 Members
systemd in NixOs's stage 1, replacing the current bash tooling https://github.com/NixOS/nixpkgs/projects/5126 Servers

Load older messages


SenderMessageTime
26 Apr 2023
@flokli:matrix.orgflokliIt makes sense to, let's say, initialize hardware as much as possible. It usually takes a while for it to power up, and the earlier it happens the better18:13:30
@flokli:matrix.orgflokliIt gets tricky when you also need to load some firmware, which isn't present at that time.18:13:49
@flokli:matrix.orgflokliIt should just try again loading that firmware later once available?18:14:17
@flokli:matrix.orgflokli Janne Heß: try checking your logs to see what kind of init your webcam does, im curious 18:14:47
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.de
In reply to @flokli:matrix.org
Janne Heß: try checking your logs to see what kind of init your webcam does, im curious
nothing special in the journal. just regular usb connection stuff
21:34:28
27 Apr 2023
@elvishjerricco:matrix.org@elvishjerricco:matrix.org
In reply to @janne.hess:helsinki-systems.de
I didn't to keep some backwards compat
So apparently it's a little more than that. All /dev/mapper/* symlinks come from LVM's rules, and that rules file does a couple things with the dmsetup command. So maybe we can't make it optional? Without that rules file, e.g. LUKS devices wouldn't show up in /dev/mapper/ like everyone expects
01:33:32
@elvishjerricco:matrix.org@elvishjerricco:matrix.org I'm not sure what happens without the dmsetup commands; I don't know if udev bails when a command fails, or if the results of that command are critical 01:34:39
28 Apr 2023
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgMy initrd is now maximally complicated. Two different LUKS volume, one TPM2 unlocked, both on ZFS zvols, one ZFS encryptionroot, custom ZFS import service, and networking with SSH and tailscale. I can't imagine the nightmare that would have been without systemd-initrd.04:12:38
@aktaboot:tchncs.de@aktaboot:tchncs.de
In reply to @elvishjerricco:matrix.org

My initrd is now maximally complicated. Two different LUKS volume, one TPM2 unlocked, both on ZFS zvols, one ZFS encryptionroot, custom ZFS import service, and networking with SSH and tailscale.

I can't imagine the nightmare that would have been without systemd-initrd.

may I ask whats your usecase for the networking part ?
07:14:55
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgTo unlock the the encrypted file system remotely over tailscale07:15:41
@uep:matrix.org@uep:matrix.orgI assume the LUKS-on-zvol are relatively small? basically key or config containers with relatively static filesystems, as a way of bootstrapping to the final zfs load-key?22:23:32
@uep:matrix.org@uep:matrix.org(for example, to run the ssh service out of)22:24:35
@elvishjerricco:matrix.org@elvishjerricco:matrix.org uep: Exactly. The first volume, the tpm2 locked one, contains my ssh host keys and tailscale state directory. That way I can log in remotely, and the presence of correct host keys informs me that the tpm is happy with the boot measurements. The second volume is unlocked manually and contains the zfs key file 22:24:41
@uep:matrix.org@uep:matrix.orgyup22:25:05
@uep:matrix.org@uep:matrix.orgwhy a second volume with file, rather than a passphrase directly, since you're logging in manually regardless?22:25:34
@uep:matrix.org@uep:matrix.org(would make perfect sense as a multi-factor case, but you can't currently mix them without even more customisation)22:26:18
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgto get all the other nice luks-y things. Like I want to have the second volume unlocked with tpm2+pin (currently having a bug with that one), with a recovery key backup slot.22:26:37
@uep:matrix.org@uep:matrix.orgseems like a great topic for a write-up, either once you get the kinks ironed out, or even including the ironing process22:28:00
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgthere's a bunch of stuff I need to write about :P I've been putting off writing a blog post about systemd-in-initrd for actual years lol22:28:31
@uep:matrix.org@uep:matrix.orgThis is The Way22:38:23
29 Apr 2023
@sigmasquadron:matrix.org@sigmasquadron:matrix.orgThis is The Way.00:24:02
@hexa:lossy.network@hexa:lossy.networkRedacted or Malformed Event10:20:12
@janne.hess:helsinki-systems.de@janne.hess:helsinki-systems.dec10:21:53
@aktaboot:tchncs.de@aktaboot:tchncs.de ElvishJerricco Is there a reason remove_old_entries is called on rebuild and not hooked to garbage collection ? 17:41:16
@aktaboot:tchncs.de@aktaboot:tchncs.de * ElvishJerricco Is there a reason systemd-boot remove_old_entries() is called on rebuild and not hooked to garbage collection ? 17:41:30
@elvishjerricco:matrix.org@elvishjerricco:matrix.org aktaboot: There's no such thing as "hooked to garbage collection" 17:41:48
@aktaboot:tchncs.de@aktaboot:tchncs.degarbage collection is only related to the nix store, but I guessed we could also delete older boot entries and kernel/initrd at garbage collection time as well17:42:52
@aktaboot:tchncs.de@aktaboot:tchncs.deI guess that's the only place where this can be handled differently since it's not tied to the nix-store directly17:44:14
@aktaboot:tchncs.de@aktaboot:tchncs.dethe problem I encountered was that efi partition was full, so I could not rebuild, and therefore I also could not empty the efi17:45:16
@aktaboot:tchncs.de@aktaboot:tchncs.de* the problem I encountered was that efi partition was full, so I could not rebuild, and therefore I also could not empty the efi with nix tooling17:45:22

Show newer messages


Back to Room ListRoom Version: 6