| 31 May 2023 |
| Copa Dium joined the room. | 10:43:23 |
Copa Dium | I'm not sure what I'm doing wrong, but since I switched to initrd.systemd.enable I don't get a password prompt when using ZFS on luks. The service is just waiting for 1m30 and then I get an emergency shell. Is there something I have to configure manually? | 10:45:34 |
@lily:lily.flowers | In reply to @copadium:matrix.org I'm not sure what I'm doing wrong, but since I switched to initrd.systemd.enable I don't get a password prompt when using ZFS on luks. The service is just waiting for 1m30 and then I get an emergency shell. Is there something I have to configure manually? How did you configure luks? Is your config publicly available on github or anything? | 10:46:46 |
@lily:lily.flowers | (It should figure it out from the boot.initrd.luks settings, or whatever they are called) | 10:47:04 |
Copa Dium | It's not public but I used disko to configure it. | 10:47:07 |
@lily:lily.flowers | I meant nixos config for luks | 10:47:26 |
Copa Dium | Yeah disko does that too, my boot.initrd.luks is defined | 10:48:24 |
Copa Dium | Systemd also has a job waiting on the device, but there just is no prompt | 10:48:46 |
Copa Dium | This is what disko generated:
nix-repl> myhost.config.boot.initrd.luks.devices.encryptedpool
{ allowDiscards = true; bypassWorkqueues = false; crypttabExtraOpts = [ ... ]; device = "/dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_34163169-part3"; fallbackToPassword = false; fido2 = { ... }; gpgCard = null; header = null; keyFile = null; keyFileOffset = null; keyFileSize = null; keyFileTimeout = null; name = "enc-rpool"; postOpenCommands = ""; preLVM = true; preOpenCommands = ""; tryEmptyPassphrase = false; yubikey = null; }
| 10:50:14 |
Copa Dium | * This is what disko generated:
nix-repl> myhost.config.boot.initrd.luks.devices.encryptedpool
{ allowDiscards = true; bypassWorkqueues = false; crypttabExtraOpts = [ ... ]; device = "/dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_34163169-part3"; fallbackToPassword = false; fido2 = { ... }; gpgCard = null; header = null; keyFile = null; keyFileOffset = null; keyFileSize = null; keyFileTimeout = null; name = "encryptedpool"; postOpenCommands = ""; preLVM = true; preOpenCommands = ""; tryEmptyPassphrase = false; yubikey = null; }
| 10:50:33 |
@lily:lily.flowers | Can you share the file at config.boot.initrd.systemd.contents."/etc/crypttab".source? | 10:51:38 |
Copa Dium | Sure, it contains just this one line:
encryptedpool /dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_34163169-part3 - discard
| 10:52:34 |