!PSmBFWNKoXmlQBzUQf:helsinki-systems.de

Stage 1 systemd

81 Members
systemd in NixOs's stage 1, replacing the current bash tooling https://github.com/NixOS/nixpkgs/projects/5125 Servers

You have reached the beginning of time (for this room).


SenderMessageTime
31 May 2023
@copadium:matrix.orgCopa Dium joined the room.10:43:23
@copadium:matrix.orgCopa DiumI'm not sure what I'm doing wrong, but since I switched to initrd.systemd.enable I don't get a password prompt when using ZFS on luks. The service is just waiting for 1m30 and then I get an emergency shell. Is there something I have to configure manually?10:45:34
@lily:lily.flowers@lily:lily.flowers
In reply to @copadium:matrix.org
I'm not sure what I'm doing wrong, but since I switched to initrd.systemd.enable I don't get a password prompt when using ZFS on luks. The service is just waiting for 1m30 and then I get an emergency shell. Is there something I have to configure manually?
How did you configure luks? Is your config publicly available on github or anything?
10:46:46
@lily:lily.flowers@lily:lily.flowers (It should figure it out from the boot.initrd.luks settings, or whatever they are called) 10:47:04
@copadium:matrix.orgCopa DiumIt's not public but I used disko to configure it.10:47:07
@lily:lily.flowers@lily:lily.flowersI meant nixos config for luks10:47:26
@copadium:matrix.orgCopa DiumYeah disko does that too, my boot.initrd.luks is defined10:48:24
@copadium:matrix.orgCopa DiumSystemd also has a job waiting on the device, but there just is no prompt10:48:46
@copadium:matrix.orgCopa Dium

This is what disko generated:

nix-repl> myhost.config.boot.initrd.luks.devices.encryptedpool
{ allowDiscards = true; bypassWorkqueues = false; crypttabExtraOpts = [ ... ]; device = "/dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_34163169-part3"; fallbackToPassword = false; fido2 = { ... }; gpgCard = null; header = null; keyFile = null; keyFileOffset = null; keyFileSize = null; keyFileTimeout = null; name = "enc-rpool"; postOpenCommands = ""; preLVM = true; preOpenCommands = ""; tryEmptyPassphrase = false; yubikey = null; }
10:50:14
@copadium:matrix.orgCopa Dium *

This is what disko generated:

nix-repl> myhost.config.boot.initrd.luks.devices.encryptedpool
{ allowDiscards = true; bypassWorkqueues = false; crypttabExtraOpts = [ ... ]; device = "/dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_34163169-part3"; fallbackToPassword = false; fido2 = { ... }; gpgCard = null; header = null; keyFile = null; keyFileOffset = null; keyFileSize = null; keyFileTimeout = null; name = "encryptedpool"; postOpenCommands = ""; preLVM = true; preOpenCommands = ""; tryEmptyPassphrase = false; yubikey = null; }
10:50:33
@lily:lily.flowers@lily:lily.flowers Can you share the file at config.boot.initrd.systemd.contents."/etc/crypttab".source? 10:51:38
@copadium:matrix.orgCopa Dium

Sure, it contains just this one line:

encryptedpool /dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_34163169-part3 - discard
10:52:34

Show newer messages


Back to Room ListRoom Version: 6