!oNSIfazDqEcwhcOjSL:matrix.org

disko

366 Members
disko - declarative disk partitioning - https://github.com/nix-community/disko93 Servers

Load older messages


SenderMessageTime
18 Dec 2023
@matthewcroughan:defenestrate.itmatthewcroughan So you have to have a good, documented reason to assume it will modify the state 19:08:05
@matthewcroughan:defenestrate.itmatthewcroughanYou can always look at the activation script to see these things, and to see if it's going to modify anything19:12:37
@jdemille:tchncs.deJulia DeMille ah yeah, i guess that makes sense
guess my confusion came from most options Just Making It Be, but this being state it would affect, instead of configuration
19:40:58
@jdemille:tchncs.deJulia DeMille * ah yeah, i guess that makes sense i think my confusion came from most options Just Making It Be, but this being state it would affect, instead of configuration19:50:56
21 Dec 2023
@realmchad:hackliberty.orgrealmchad joined the room.08:00:46
@zonnebloem:matrix.orgzonnebloem

I've got zfs mirror working using grub.

      boot.loader.systemd-boot.enable = false;
      boot.loader.grub.enable = true;
      boot.loader.grub.efiSupport = true;
      boot.loader.efi.canTouchEfiVariables = true;
      boot.loader.grub.devices = lib.mkForce [ ]; # disko adds /boot here, we want /boot0 /boot1
      boot.loader.grub.mirroredBoots = lib.imap0 (dindex: d: { path = "/boot${toString dindex}"; devices = [ "${d}" ]; }) cfg.disks;
21:25:10
@zonnebloem:matrix.orgzonnebloem *

I've got zfs mirror working using grub.

      boot.loader.systemd-boot.enable = false;
      boot.loader.grub.enable = true;
      boot.loader.grub.efiSupport = true;
      boot.loader.efi.canTouchEfiVariables = true;
      boot.loader.grub.devices = lib.mkForce [ ]; # disko adds /boot here, we want /boot0 /boot1
      boot.loader.grub.mirroredBoots = lib.imap0 (dindex: d: { path = "/boot${toString dindex}"; devices = [ "${d}" ]; }) cfg.disks;

Is anyone using it with systemd?

21:25:31
@zonnebloem:matrix.orgzonnebloem *

I've got zfs mirror working using grub.

      boot.loader.systemd-boot.enable = false;
      boot.loader.grub.enable = true;
      boot.loader.grub.efiSupport = true;
      boot.loader.efi.canTouchEfiVariables = true;
      boot.loader.grub.devices = lib.mkForce [ ]; # disko adds /boot here, we want /boot0 /boot1
      boot.loader.grub.mirroredBoots = lib.imap0 (dindex: d: { path = "/boot${toString dindex}"; devices = [ "${d}" ]; }) cfg.disks;

Is anyone using it with systemd?
Eventually I want mirrored luks zfs, which can be unlocked remotely.

21:26:52
22 Dec 2023
@zonnebloem:matrix.orgzonnebloemUsing grub I can do single disk luks. or I can do mirrored disks without luks. mirrored luks doesn't work. It asks for the password for each disk and then fails.02:02:39
@zonnebloem:matrix.orgzonnebloemRedacted or Malformed Event21:40:21
@zonnebloem:matrix.orgzonnebloem
In reply to @zonnebloem:matrix.org
Using grub I can do single disk luks. or I can do mirrored disks without luks.
mirrored luks doesn't work. It asks for the password for each disk and then fails.
+ lsblk -a -f
NAME   FSTYPE   FSVER            LABEL         UUID                                 FSAVAIL FSUSE% MOUNTPOINTS
loop0  squashfs 4.0                                                                       0   100% /nix/.ro-store
loop1                                                                                              
loop2                                                                                              
loop3                                                                                              
loop4                                                                                              
loop5                                                                                              
loop6                                                                                              
loop7                                                                                              
sda                                                                                                
sdb                                                                                                
sdc    iso9660  Joliet Extension nixos-live 1980-01-01-00-00-00-00                              
├─sdc1 iso9660  Joliet Extension nixos-live 1980-01-01-00-00-00-00                     0   100% /iso
└─sdc2 vfat     FAT12            EFIBOOT       1234-5678                                           
++ mktemp -d
+ disko_devices_dir=/tmp/tmp.wbWOabczAS
+ trap 'rm -rf "$disko_devices_dir"' EXIT
+ mkdir -p /tmp/tmp.wbWOabczAS
+ device=/dev/disk/by-id/ata-xxxxx_123456789AAA
+ imageSize=2G
+ name=mainAAA
+ type=disk
+ device=/dev/disk/by-id/ata-xxxxx_123456789AAA
+ type=gpt
+ sgdisk --set-alignment=2048 --align-end --new=1:0:+1G --change-name=1:disk-mainAAA-ESP --typecode=1:EF00 /dev/disk/by-id/ata-xxxxx_123456789AAA
Creating new GPT entries in memory.
The operation has completed successfully.
+ partprobe /dev/disk/by-id/ata-xxxxx_123456789AAA
+ udevadm trigger --subsystem-match=block
+ udevadm settle
+ device=/dev/disk/by-partlabel/disk-mainAAA-ESP
+ extraArgs=()
+ declare -a extraArgs
+ format=vfat
+ mountOptions=('nofail')
+ declare -a mountOptions
+ mountpoint=/boot1
+ type=filesystem
+ mkfs.vfat /dev/disk/by-partlabel/disk-mainAAA-ESP
mkfs.fat 4.2 (2021-01-31)
+ sgdisk --set-alignment=2048 --align-end --new=2:0:+1M --change-name=2:disk-mainAAA-boot --typecode=2:EF02 /dev/disk/by-id/ata-xxxxx_123456789AAA
The operation has completed successfully.
+ partprobe /dev/disk/by-id/ata-xxxxx_123456789AAA
+ udevadm trigger --subsystem-match=block
+ udevadm settle
+ sgdisk --set-alignment=2048 --align-end --new=3:0:-0 --change-name=3:disk-mainAAA-luks --typecode=3:8300 /dev/disk/by-id/ata-xxxxx_123456789AAA
The operation has completed successfully.
+ partprobe /dev/disk/by-id/ata-xxxxx_123456789AAA
+ udevadm trigger --subsystem-match=block
+ udevadm settle
Enter password for /dev/disk/by-partlabel/disk-mainAAA-luks: 
+ additionalKeyFiles=()
+ declare -a additionalKeyFiles
+ askPassword=1
+ device=/dev/disk/by-partlabel/disk-mainAAA-luks
+ extraFormatArgs=()
+ declare -a extraFormatArgs
+ extraOpenArgs=()
+ declare -a extraOpenArgs
+ initrdUnlock=1
+ keyFile=
+ name=crypted
+ passwordFile=
+ settings=()
+ declare -A settings
+ type=luks
+ set +x
mypassword
Enter password for /dev/disk/by-partlabel/disk-mainAAA-luks again to be safe: 
mypassword
+ cryptsetup -q luksFormat /dev/disk/by-partlabel/disk-mainAAA-luks --key-file /dev/fd/63
++ set +x
+ cryptsetup open /dev/disk/by-partlabel/disk-mainAAA-luks crypted --key-file /dev/fd/63
++ set +x
+ device=/dev/mapper/crypted
+ pool=rpool
+ type=zfs
+ echo /dev/mapper/crypted
+ device=/dev/disk/by-id/ata-xxxxx_123456789BBB
+ imageSize=2G
+ name=mainBBB
+ type=disk
+ device=/dev/disk/by-id/ata-xxxxx_123456789BBB
+ type=gpt
+ sgdisk --set-alignment=2048 --align-end --new=1:0:+1G --change-name=1:disk-mainBBB-ESP --typecode=1:EF00 /dev/disk/by-id/ata-xxxxx_123456789BBB
Creating new GPT entries in memory.
The operation has completed successfully.
+ partprobe /dev/disk/by-id/ata-xxxxx_123456789BBB
+ udevadm trigger --subsystem-match=block
+ udevadm settle
+ device=/dev/disk/by-partlabel/disk-mainBBB-ESP
+ extraArgs=()
+ declare -a extraArgs
+ format=vfat
+ mountOptions=('nofail')
+ declare -a mountOptions
+ mountpoint=/boot0
+ type=filesystem
+ mkfs.vfat /dev/disk/by-partlabel/disk-mainBBB-ESP
mkfs.fat 4.2 (2021-01-31)
+ sgdisk --set-alignment=2048 --align-end --new=2:0:+1M --change-name=2:disk-mainBBB-boot --typecode=2:EF02 /dev/disk/by-id/ata-xxxxx_123456789BBB
The operation has completed successfully.
+ partprobe /dev/disk/by-id/ata-xxxxx_123456789BBB
+ udevadm trigger --subsystem-match=block
+ udevadm settle
+ sgdisk --set-alignment=2048 --align-end --new=3:0:-0 --change-name=3:disk-mainBBB-luks --typecode=3:8300 /dev/disk/by-id/ata-xxxxx_123456789BBB
The operation has completed successfully.
+ partprobe /dev/disk/by-id/ata-xxxxx_123456789BBB
+ udevadm trigger --subsystem-match=block
+ udevadm settle
Enter password for /dev/disk/by-partlabel/disk-mainBBB-luks: 
+ additionalKeyFiles=()
+ declare -a additionalKeyFiles
+ askPassword=1
+ device=/dev/disk/by-partlabel/disk-mainBBB-luks
+ extraFormatArgs=()
+ declare -a extraFormatArgs
+ extraOpenArgs=()
+ declare -a extraOpenArgs
+ initrdUnlock=1
+ keyFile=
+ name=crypted
+ passwordFile=
+ settings=()
+ declare -A settings
+ type=luks
+ set +x
mypassword
Enter password for /dev/disk/by-partlabel/disk-mainBBB-luks again to be safe: 
mypassword
+ cryptsetup -q luksFormat /dev/disk/by-partlabel/disk-mainBBB-luks --key-file /dev/fd/63
++ set +x
+ cryptsetup open /dev/disk/by-partlabel/disk-mainBBB-luks crypted --key-file /dev/fd/63
++ set +x
Device crypted already exists.
+ rm -rf /tmp/tmp.wbWOabczAS
21:41:27
@zonnebloem:matrix.orgzonnebloemis mirrored luks+zfs supported or should we use mirrored native+zfs?21:42:38
23 Dec 2023
@zonnebloem:matrix.orgzonnebloemIt's working now, I had to name the crypted partition differently than the first00:14:25
@raj-magesh:matrix.orgRaj

Quick Q about this PR implementing subvolumes for bcachefs: https://github.com/nix-community/disko/pull/449

Which unreleased NixOS commits does this depend on and does anyone have any idea when it might be merged?

11:23:03
@raitobezarius:matrix.orgraitobezariusI need to refactor11:27:35
@raitobezarius:matrix.orgraitobezariusIt doesn't rely on unreleased nixpkgs anymore iirc11:27:55
@raj-magesh:matrix.orgRaj Awesome, thanks! Setting up a new machine soon and I thought I'd try out bcachefs since it'll be in 6.7 :D 11:34:34
@raitobezarius:matrix.orgraitobezariusYou'd have to wait 7 January for stable release :)11:50:59
@raitobezarius:matrix.orgraitobezarius changed their display name from raitobezarius to raitobezarius (DECT 2128).22:21:47
25 Dec 2023
@lassulus:lassul.uslassulus changed their display name from lassulus to lassulus (8587).22:42:01
26 Dec 2023
@matthewcroughan:defenestrate.itmatthewcroughan changed their display name from matthewcroughan - nix.how to matthewcroughan - Linux 6.7 When.16:49:01
27 Dec 2023
@joerg:thalheim.ioMic92 changed their display name from Mic92 | Unable to decrypt message to Mic92 (DECT: 7934).14:31:11
28 Dec 2023
@jopejoe1:matrix.orgjopejoe1 (4094@39c3) changed their display name from jopejoe1 to jopejoe1 [4094].18:08:57
30 Dec 2023
@lassulus:lassul.uslassulus changed their display name from lassulus (8587) to lassulus.19:30:42
@raitobezarius:matrix.orgraitobezarius changed their display name from raitobezarius (DECT 2128) to raitobezarius.19:52:13
@jopejoe1:matrix.orgjopejoe1 (4094@39c3) changed their display name from jopejoe1 [4094] to jopejoe1.22:04:41
31 Dec 2023
@joerg:thalheim.ioMic92 changed their display name from Mic92 (DECT: 7934) to Mic92.16:13:07
@philiptaron:matrix.orgPhilip Taron (UTC-8) changed their display name from Philip Taron to Philip Taron (UTC-8).18:10:43
2 Jan 2024
@5m5z3q888q5prxkg:chat.lightnovel-dungeon.de@5m5z3q888q5prxkg:chat.lightnovel-dungeon.de joined the room.06:07:13
@5m5z3q888q5prxkg:chat.lightnovel-dungeon.de@5m5z3q888q5prxkg:chat.lightnovel-dungeon.deReferencing https://github.com/nix-community/disko/issues/490#issue-206207050508:07:52

Show newer messages


Back to Room ListRoom Version: 10