!oNSIfazDqEcwhcOjSL:matrix.org

disko

352 Members
disko - declarative disk partitioning - https://github.com/nix-community/disko87 Servers

Load older messages


SenderMessageTime
20 May 2024
@matthewcroughan:defenestrate.itmatthewcroughanbut this part of the build never arrives unless I increase the memory size09:40:51
@matthewcroughan:defenestrate.itmatthewcroughan though the "Cannot allocate memory" errors come from cp.. actually. 09:41:18
@matthewcroughan:defenestrate.itmatthewcroughan The bootloader install is probably calling cp, 09:41:38
@matthewcroughan:defenestrate.itmatthewcroughan * The bootloader install is probably calling cp 09:41:40
@matthewcroughan:defenestrate.itmatthewcroughan
corpo-disko-images> + /nix/store/gc39rhvazg28s7y80c4c0a24x3hsv92p-postMountHook.sh
corpo-disko-images> + rm -rf /tmp/tmp.qOc2Qrmj2x
corpo-disko-images> warning: the group 'nixbld' specified in 'build-users-group' does not exist
corpo-disko-images> cp: cannot access '/nix/store/flqdgxi79hgv69k8vc1rdcxvn30m0i3r-perl5.38.2-HTTP-Cookies-6.10': Cannot allocate memory
corpo-disko-images> cp: cannot access '/nix/store/fzh5aadrdl76f7cn930ls979x6cgblyd-libsoup-2.74.3/share/locale/gl/LC_MESSAGES': Cannot allocate memory
09:41:58
21 May 2024
@bumperboat:matrix.orgbumperboat (UTC+7) changed their display name from bumperboat (UTC+8) to bumperboat (UTC+7).04:34:19
@matthewcroughan:defenestrate.itmatthewcroughan lassulus: any comments on https://github.com/nix-community/disko/pull/643 ? 11:31:00
@matthewcroughan:defenestrate.itmatthewcroughanI didn't really think it's worth setting up a boolean, since it passes all the tests and I can't yet imagine a use-case where you'd want to disable EFI, especially given that legacy types are not supported in disko properly anymore11:31:46
@tanja:catgirl.cloudTanja (☎️ 6920 at GPN22, she/her) joined the room.11:37:13
@matthewcroughan:defenestrate.itmatthewcroughanthanks for the merge :D11:42:14
22 May 2024
@aciceri:nixos.devzrsk joined the room.10:05:06
@aciceri:nixos.devzrsk

I'm interested into trying bcachefs with encryption using disko and I saw that there is a PR which is blocked because it should an abstraction for supporting multiple devices should be implemented before.
I also saw there is another PR for supporting subvolumes.
Would a PR where I try to integrate both the attempts together be appreciated? In terms of interface would you like something similar to the first proposal in this comment?

 disko.devices = {
    disk = {
      x = {
        type = "disk";
        device = "/dev/nvme0";
        content = {
          type = "gpt";
          content = {
            type = "bcachefs";
            label = "ssd.ssd1";
            pool = "rpool";
          };
        };
      };
      y = {
        type = "disk";
        device = "/dev/sda";
        content = {
          type = "bcachefs";
          label = "hdd.hdd1";
          pool = "rpool";
        };
      };
    };

    bcachefs_pool = {
      rpool = {
        type = "bcachefs_pool";
        mountpoint = "/";
        passwordFile = "secret.key";
        subvolumes = {
            "/home" = { };
            "/nix" = { };
            "/testpath" = { };
            "/testpath/subdir" = { };
          };
      };
    };
  };
10:06:36
@lassulus:lassul.uslassulusI answered in nixos-anywhere, but I can also answer here10:16:49
@lassulus:lassul.uslassulusI was a bit busy, I wil try to fix the multi disk stuff in general at some point. But not sure when I will have the time for that. I guess we could merge the encryption part without the multidisk part. I have no idea about subvolumes, but a new PR could be a good idea, just remind me every now and then to look at it :)10:17:18
@aciceri:nixos.devzrsk
In reply to @lassulus:lassul.us
I answered in nixos-anywhere, but I can also answer here
Oh I saw it too late, let's keep the discussion here then :)
Frankly I'm not particularly interested into subvolumes, which to my understanding are useful only for snapshots. I can try to rebase the first PR and see if everything works if you want.
10:28:31
@aciceri:nixos.devzrsk Nevermind, I don't think it can be easily rebased. It looks like in master you are using the filesystem type while the PR added a new custom type. 10:31:16
@aciceri:nixos.devzrsk Probably one could get encryption by simply setting extraArgs = [ "--encrypted" ] 10:32:15
@aciceri:nixos.devzrsk At least if you are interested into using a passphrase, I tried yesterday to imperatively format a disk with --encrypted and it interactively asked a passphrase 10:34:15
@aciceri:nixos.devzrskIf this works do you want that I change the example to make it use encryption/adding another example?10:35:27
@aciceri:nixos.devzrsk * If this works do you want that I change the example to make it use encryption/add another example?10:35:33
@lassulus:lassul.uslassulushmm, then the test would need some way to input the passphrase10:35:46
@lassulus:lassul.uslassulusmaybe we can add a passwordFile option?10:36:08
@aciceri:nixos.devzrskTo filesystem type?10:36:36
@lassulus:lassul.uslassulusto the bcachefs type I thought10:36:50
@aciceri:nixos.devzrsk In master there is no bcachefs type. It simply uses the filesystem type setting type = "bcachefs" 10:37:53
@lassulus:lassul.uslassulusah, yeah for encryption we probably need a custom type10:38:07
@aciceri:nixos.devzrskSo adding an extra type like in the first PR is ok for you?10:38:40
@aciceri:nixos.devzrskEven if it doesn't implement the multi devices scenario?10:39:16
@aciceri:nixos.devzrsk * To the filesystem type?10:39:41
@lassulus:lassul.uslassulusyes, that is ok for now10:39:45

Show newer messages


Back to Room ListRoom Version: 10