!PSmBFWNKoXmlQBzUQf:helsinki-systems.de

Stage 1 systemd

78 Members
systemd in NixOs's stage 1, replacing the current bash tooling https://github.com/NixOS/nixpkgs/projects/5126 Servers

You have reached the beginning of time (for this room).


SenderMessageTime
29 May 2023
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgSo if the hardware doesn't have a persistent MAC address, then udev probably generates a MAC address based on stuff like the machine-id or something, which we don't currently add to the initrd18:21:11
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgso without a machine-id, I bet it becomes random18:21:19
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgbut18:21:21
@elvishjerricco:matrix.org@elvishjerricco:matrix.org My impression is that it's very odd if your hardware doesn't have a persistent MAC address 18:21:36
@elvishjerricco:matrix.org@elvishjerricco:matrix.org so it should just be using that 18:21:41
@winterqt:nixos.devWinter (she/her)
In reply to @elvishjerricco:matrix.org
My impression is that it's very odd if your hardware doesn't have a persistent MAC address
it almost definitely does, yeah.
18:26:18
@winterqt:nixos.devWinter (she/her)
In reply to @elvishjerricco:matrix.org
My impression is that it's very odd if your hardware doesn't have a persistent MAC address
* it almost definitely does have one, yeah.
18:26:43
@winterqt:nixos.devWinter (she/her)especially since udhcpc uses a persistent one18:27:19
@winterqt:nixos.devWinter (she/her)is this worth opening an issue about, so at least it's recorded?18:31:22
@winterqt:nixos.devWinter (she/her)can't think of what the issue would be configuration-wise.18:31:29
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgProbably18:31:56
@elvishjerricco:matrix.org@elvishjerricco:matrix.orgwe should probably try to create a nixos test to reproduce the problem18:32:34
@uep:matrix.org@uep:matrix.org"and if it is used by the kernel" seems like one possible path of investigation22:26:15
31 May 2023
@copadium:matrix.orgCopa Dium joined the room.10:43:23
@copadium:matrix.orgCopa DiumI'm not sure what I'm doing wrong, but since I switched to initrd.systemd.enable I don't get a password prompt when using ZFS on luks. The service is just waiting for 1m30 and then I get an emergency shell. Is there something I have to configure manually?10:45:34
@lily:lily.flowers@lily:lily.flowers
In reply to @copadium:matrix.org
I'm not sure what I'm doing wrong, but since I switched to initrd.systemd.enable I don't get a password prompt when using ZFS on luks. The service is just waiting for 1m30 and then I get an emergency shell. Is there something I have to configure manually?
How did you configure luks? Is your config publicly available on github or anything?
10:46:46
@lily:lily.flowers@lily:lily.flowers (It should figure it out from the boot.initrd.luks settings, or whatever they are called) 10:47:04
@copadium:matrix.orgCopa DiumIt's not public but I used disko to configure it.10:47:07
@lily:lily.flowers@lily:lily.flowersI meant nixos config for luks10:47:26
@copadium:matrix.orgCopa DiumYeah disko does that too, my boot.initrd.luks is defined10:48:24
@copadium:matrix.orgCopa DiumSystemd also has a job waiting on the device, but there just is no prompt10:48:46
@copadium:matrix.orgCopa Dium

This is what disko generated:

nix-repl> myhost.config.boot.initrd.luks.devices.encryptedpool
{ allowDiscards = true; bypassWorkqueues = false; crypttabExtraOpts = [ ... ]; device = "/dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_34163169-part3"; fallbackToPassword = false; fido2 = { ... }; gpgCard = null; header = null; keyFile = null; keyFileOffset = null; keyFileSize = null; keyFileTimeout = null; name = "enc-rpool"; postOpenCommands = ""; preLVM = true; preOpenCommands = ""; tryEmptyPassphrase = false; yubikey = null; }
10:50:14
@copadium:matrix.orgCopa Dium *

This is what disko generated:

nix-repl> myhost.config.boot.initrd.luks.devices.encryptedpool
{ allowDiscards = true; bypassWorkqueues = false; crypttabExtraOpts = [ ... ]; device = "/dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_34163169-part3"; fallbackToPassword = false; fido2 = { ... }; gpgCard = null; header = null; keyFile = null; keyFileOffset = null; keyFileSize = null; keyFileTimeout = null; name = "encryptedpool"; postOpenCommands = ""; preLVM = true; preOpenCommands = ""; tryEmptyPassphrase = false; yubikey = null; }
10:50:33

Show newer messages


Back to Room ListRoom Version: 6