 3674bdf204
			
		
	
	
		3674bdf204
		
			
		
	
	
	
	
		
			
			27982b408e465554b8831f492362bc87ed0ec02a introduced a bug when refactoring the encrypted-devices module, causing some encrypted filesystem options to not be recognized anymore. See e.g. https://hydra.nixos.org/build/88145490
		
			
				
	
	
		
			77 lines
		
	
	
		
			2.3 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			77 lines
		
	
	
		
			2.3 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
| { config, lib, ... }:
 | |
| 
 | |
| with lib;
 | |
| 
 | |
| let
 | |
|   fileSystems = config.system.build.fileSystems ++ config.swapDevices;
 | |
|   encDevs = filter (dev: dev.encrypted.enable) fileSystems;
 | |
|   keyedEncDevs = filter (dev: dev.encrypted.keyFile != null) encDevs;
 | |
|   keylessEncDevs = filter (dev: dev.encrypted.keyFile == null) encDevs;
 | |
|   anyEncrypted =
 | |
|     fold (j: v: v || j.encrypted.enable) false encDevs;
 | |
| 
 | |
|   encryptedFSOptions = {
 | |
| 
 | |
|     options.encrypted = {
 | |
|       enable = mkOption {
 | |
|         default = false;
 | |
|         type = types.bool;
 | |
|         description = "The block device is backed by an encrypted one, adds this device as a initrd luks entry.";
 | |
|       };
 | |
| 
 | |
|       blkDev = mkOption {
 | |
|         default = null;
 | |
|         example = "/dev/sda1";
 | |
|         type = types.nullOr types.str;
 | |
|         description = "Location of the backing encrypted device.";
 | |
|       };
 | |
| 
 | |
|       label = mkOption {
 | |
|         default = null;
 | |
|         example = "rootfs";
 | |
|         type = types.nullOr types.str;
 | |
|         description = "Label of the unlocked encrypted device. Set <literal>fileSystems.<name?>.device</literal> to <literal>/dev/mapper/<label></literal> to mount the unlocked device.";
 | |
|       };
 | |
| 
 | |
|       keyFile = mkOption {
 | |
|         default = null;
 | |
|         example = "/mnt-root/root/.swapkey";
 | |
|         type = types.nullOr types.str;
 | |
|         description = "File system location of keyfile. This unlocks the drive after the root has been mounted to <literal>/mnt-root</literal>.";
 | |
|       };
 | |
|     };
 | |
|   };
 | |
| in
 | |
| 
 | |
| {
 | |
| 
 | |
|   options = {
 | |
|     fileSystems = mkOption {
 | |
|       type = with lib.types; loaOf (submodule encryptedFSOptions);
 | |
|     };
 | |
|     swapDevices = mkOption {
 | |
|       type = with lib.types; listOf (submodule encryptedFSOptions);
 | |
|     };
 | |
|   };
 | |
| 
 | |
|   config = mkIf anyEncrypted {
 | |
|     assertions = map (dev: {
 | |
|       assertion = dev.encrypted.label != null;
 | |
|       message = ''
 | |
|         The filesystem for ${dev.mountPoint} has encrypted.enable set to true, but no encrypted.label set
 | |
|       '';
 | |
|     }) encDevs;
 | |
| 
 | |
|     boot.initrd = {
 | |
|       luks = {
 | |
|         devices =
 | |
|           map (dev: { name = dev.encrypted.label; device = dev.encrypted.blkDev; } ) keylessEncDevs;
 | |
|         forceLuksSupportInInitrd = true;
 | |
|       };
 | |
|       postMountCommands =
 | |
|         concatMapStrings (dev: "cryptsetup luksOpen --key-file ${dev.encrypted.keyFile} ${dev.encrypted.blkDev} ${dev.encrypted.label};\n") keyedEncDevs;
 | |
|     };
 | |
|   };
 | |
| }
 | |
| 
 |