| 18 Dec 2023 |
matthewcroughan | So you have to have a good, documented reason to assume it will modify the state | 19:08:05 |
matthewcroughan | You can always look at the activation script to see these things, and to see if it's going to modify anything | 19:12:37 |
Julia DeMille | ah yeah, i guess that makes sense guess my confusion came from most options Just Making It Be, but this being state it would affect, instead of configuration | 19:40:58 |
Julia DeMille | * ah yeah, i guess that makes sense
i think my confusion came from most options Just Making It Be, but this being state it would affect, instead of configuration | 19:50:56 |
| 21 Dec 2023 |
| realmchad joined the room. | 08:00:46 |
zonnebloem | I've got zfs mirror working using grub.
boot.loader.systemd-boot.enable = false;
boot.loader.grub.enable = true;
boot.loader.grub.efiSupport = true;
boot.loader.efi.canTouchEfiVariables = true;
boot.loader.grub.devices = lib.mkForce [ ]; # disko adds /boot here, we want /boot0 /boot1
boot.loader.grub.mirroredBoots = lib.imap0 (dindex: d: { path = "/boot${toString dindex}"; devices = [ "${d}" ]; }) cfg.disks;
| 21:25:10 |
zonnebloem | * I've got zfs mirror working using grub.
boot.loader.systemd-boot.enable = false;
boot.loader.grub.enable = true;
boot.loader.grub.efiSupport = true;
boot.loader.efi.canTouchEfiVariables = true;
boot.loader.grub.devices = lib.mkForce [ ]; # disko adds /boot here, we want /boot0 /boot1
boot.loader.grub.mirroredBoots = lib.imap0 (dindex: d: { path = "/boot${toString dindex}"; devices = [ "${d}" ]; }) cfg.disks;
Is anyone using it with systemd?
| 21:25:31 |
zonnebloem | * I've got zfs mirror working using grub.
boot.loader.systemd-boot.enable = false;
boot.loader.grub.enable = true;
boot.loader.grub.efiSupport = true;
boot.loader.efi.canTouchEfiVariables = true;
boot.loader.grub.devices = lib.mkForce [ ]; # disko adds /boot here, we want /boot0 /boot1
boot.loader.grub.mirroredBoots = lib.imap0 (dindex: d: { path = "/boot${toString dindex}"; devices = [ "${d}" ]; }) cfg.disks;
Is anyone using it with systemd? Eventually I want mirrored luks zfs, which can be unlocked remotely.
| 21:26:52 |
| 22 Dec 2023 |
zonnebloem | Using grub I can do single disk luks. or I can do mirrored disks without luks.
mirrored luks doesn't work. It asks for the password for each disk and then fails. | 02:02:39 |
zonnebloem | Redacted or Malformed Event | 21:40:21 |
zonnebloem | In reply to @zonnebloem:matrix.org Using grub I can do single disk luks. or I can do mirrored disks without luks. mirrored luks doesn't work. It asks for the password for each disk and then fails. + lsblk -a -f
NAME FSTYPE FSVER LABEL UUID FSAVAIL FSUSE% MOUNTPOINTS
loop0 squashfs 4.0 0 100% /nix/.ro-store
loop1
loop2
loop3
loop4
loop5
loop6
loop7
sda
sdb
sdc iso9660 Joliet Extension nixos-live 1980-01-01-00-00-00-00
├─sdc1 iso9660 Joliet Extension nixos-live 1980-01-01-00-00-00-00 0 100% /iso
└─sdc2 vfat FAT12 EFIBOOT 1234-5678
++ mktemp -d
+ disko_devices_dir=/tmp/tmp.wbWOabczAS
+ trap 'rm -rf "$disko_devices_dir"' EXIT
+ mkdir -p /tmp/tmp.wbWOabczAS
+ device=/dev/disk/by-id/ata-xxxxx_123456789AAA
+ imageSize=2G
+ name=mainAAA
+ type=disk
+ device=/dev/disk/by-id/ata-xxxxx_123456789AAA
+ type=gpt
+ sgdisk --set-alignment=2048 --align-end --new=1:0:+1G --change-name=1:disk-mainAAA-ESP --typecode=1:EF00 /dev/disk/by-id/ata-xxxxx_123456789AAA
Creating new GPT entries in memory.
The operation has completed successfully.
+ partprobe /dev/disk/by-id/ata-xxxxx_123456789AAA
+ udevadm trigger --subsystem-match=block
+ udevadm settle
+ device=/dev/disk/by-partlabel/disk-mainAAA-ESP
+ extraArgs=()
+ declare -a extraArgs
+ format=vfat
+ mountOptions=('nofail')
+ declare -a mountOptions
+ mountpoint=/boot1
+ type=filesystem
+ mkfs.vfat /dev/disk/by-partlabel/disk-mainAAA-ESP
mkfs.fat 4.2 (2021-01-31)
+ sgdisk --set-alignment=2048 --align-end --new=2:0:+1M --change-name=2:disk-mainAAA-boot --typecode=2:EF02 /dev/disk/by-id/ata-xxxxx_123456789AAA
The operation has completed successfully.
+ partprobe /dev/disk/by-id/ata-xxxxx_123456789AAA
+ udevadm trigger --subsystem-match=block
+ udevadm settle
+ sgdisk --set-alignment=2048 --align-end --new=3:0:-0 --change-name=3:disk-mainAAA-luks --typecode=3:8300 /dev/disk/by-id/ata-xxxxx_123456789AAA
The operation has completed successfully.
+ partprobe /dev/disk/by-id/ata-xxxxx_123456789AAA
+ udevadm trigger --subsystem-match=block
+ udevadm settle
Enter password for /dev/disk/by-partlabel/disk-mainAAA-luks:
+ additionalKeyFiles=()
+ declare -a additionalKeyFiles
+ askPassword=1
+ device=/dev/disk/by-partlabel/disk-mainAAA-luks
+ extraFormatArgs=()
+ declare -a extraFormatArgs
+ extraOpenArgs=()
+ declare -a extraOpenArgs
+ initrdUnlock=1
+ keyFile=
+ name=crypted
+ passwordFile=
+ settings=()
+ declare -A settings
+ type=luks
+ set +x
mypassword
Enter password for /dev/disk/by-partlabel/disk-mainAAA-luks again to be safe:
mypassword
+ cryptsetup -q luksFormat /dev/disk/by-partlabel/disk-mainAAA-luks --key-file /dev/fd/63
++ set +x
+ cryptsetup open /dev/disk/by-partlabel/disk-mainAAA-luks crypted --key-file /dev/fd/63
++ set +x
+ device=/dev/mapper/crypted
+ pool=rpool
+ type=zfs
+ echo /dev/mapper/crypted
+ device=/dev/disk/by-id/ata-xxxxx_123456789BBB
+ imageSize=2G
+ name=mainBBB
+ type=disk
+ device=/dev/disk/by-id/ata-xxxxx_123456789BBB
+ type=gpt
+ sgdisk --set-alignment=2048 --align-end --new=1:0:+1G --change-name=1:disk-mainBBB-ESP --typecode=1:EF00 /dev/disk/by-id/ata-xxxxx_123456789BBB
Creating new GPT entries in memory.
The operation has completed successfully.
+ partprobe /dev/disk/by-id/ata-xxxxx_123456789BBB
+ udevadm trigger --subsystem-match=block
+ udevadm settle
+ device=/dev/disk/by-partlabel/disk-mainBBB-ESP
+ extraArgs=()
+ declare -a extraArgs
+ format=vfat
+ mountOptions=('nofail')
+ declare -a mountOptions
+ mountpoint=/boot0
+ type=filesystem
+ mkfs.vfat /dev/disk/by-partlabel/disk-mainBBB-ESP
mkfs.fat 4.2 (2021-01-31)
+ sgdisk --set-alignment=2048 --align-end --new=2:0:+1M --change-name=2:disk-mainBBB-boot --typecode=2:EF02 /dev/disk/by-id/ata-xxxxx_123456789BBB
The operation has completed successfully.
+ partprobe /dev/disk/by-id/ata-xxxxx_123456789BBB
+ udevadm trigger --subsystem-match=block
+ udevadm settle
+ sgdisk --set-alignment=2048 --align-end --new=3:0:-0 --change-name=3:disk-mainBBB-luks --typecode=3:8300 /dev/disk/by-id/ata-xxxxx_123456789BBB
The operation has completed successfully.
+ partprobe /dev/disk/by-id/ata-xxxxx_123456789BBB
+ udevadm trigger --subsystem-match=block
+ udevadm settle
Enter password for /dev/disk/by-partlabel/disk-mainBBB-luks:
+ additionalKeyFiles=()
+ declare -a additionalKeyFiles
+ askPassword=1
+ device=/dev/disk/by-partlabel/disk-mainBBB-luks
+ extraFormatArgs=()
+ declare -a extraFormatArgs
+ extraOpenArgs=()
+ declare -a extraOpenArgs
+ initrdUnlock=1
+ keyFile=
+ name=crypted
+ passwordFile=
+ settings=()
+ declare -A settings
+ type=luks
+ set +x
mypassword
Enter password for /dev/disk/by-partlabel/disk-mainBBB-luks again to be safe:
mypassword
+ cryptsetup -q luksFormat /dev/disk/by-partlabel/disk-mainBBB-luks --key-file /dev/fd/63
++ set +x
+ cryptsetup open /dev/disk/by-partlabel/disk-mainBBB-luks crypted --key-file /dev/fd/63
++ set +x
Device crypted already exists.
+ rm -rf /tmp/tmp.wbWOabczAS
| 21:41:27 |
zonnebloem | is mirrored luks+zfs supported or should we use mirrored native+zfs? | 21:42:38 |
| 23 Dec 2023 |
zonnebloem | It's working now, I had to name the crypted partition differently than the first | 00:14:25 |
Raj | Quick Q about this PR implementing subvolumes for bcachefs: https://github.com/nix-community/disko/pull/449
Which unreleased NixOS commits does this depend on and does anyone have any idea when it might be merged? | 11:23:03 |
raitobezarius | I need to refactor | 11:27:35 |
raitobezarius | It doesn't rely on unreleased nixpkgs anymore iirc | 11:27:55 |
Raj | Awesome, thanks! Setting up a new machine soon and I thought I'd try out bcachefs since it'll be in 6.7 :D | 11:34:34 |
raitobezarius | You'd have to wait 7 January for stable release :) | 11:50:59 |
| raitobezarius changed their display name from raitobezarius to raitobezarius (DECT 2128). | 22:21:47 |
| 25 Dec 2023 |
| lassulus changed their display name from lassulus to lassulus (8587). | 22:42:01 |
| 26 Dec 2023 |
| matthewcroughan changed their display name from matthewcroughan - nix.how to matthewcroughan - Linux 6.7 When. | 16:49:01 |
| 27 Dec 2023 |
| Mic92 changed their display name from Mic92 | Unable to decrypt message to Mic92 (DECT: 7934). | 14:31:11 |
| 28 Dec 2023 |
| jopejoe1 (4094@39c3) changed their display name from jopejoe1 to jopejoe1 [4094]. | 18:08:57 |
| 30 Dec 2023 |
| lassulus changed their display name from lassulus (8587) to lassulus. | 19:30:42 |
| raitobezarius changed their display name from raitobezarius (DECT 2128) to raitobezarius. | 19:52:13 |
| jopejoe1 (4094@39c3) changed their display name from jopejoe1 [4094] to jopejoe1. | 22:04:41 |
| 31 Dec 2023 |
| Mic92 changed their display name from Mic92 (DECT: 7934) to Mic92. | 16:13:07 |
| Philip Taron (UTC-8) changed their display name from Philip Taron to Philip Taron (UTC-8). | 18:10:43 |
| 2 Jan 2024 |
| @5m5z3q888q5prxkg:chat.lightnovel-dungeon.de joined the room. | 06:07:13 |
@5m5z3q888q5prxkg:chat.lightnovel-dungeon.de | Referencing https://github.com/nix-community/disko/issues/490#issue-2062070505 | 08:07:52 |