88 lines
		
	
	
		
			2.7 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
			
		
		
	
	
			88 lines
		
	
	
		
			2.7 KiB
		
	
	
	
		
			Nix
		
	
	
	
	
	
| { config, lib, ... }:
 | |
| 
 | |
| with lib;
 | |
| 
 | |
| let
 | |
|   fileSystems = config.system.build.fileSystems ++ config.swapDevices;
 | |
|   encDevs = filter (dev: dev.encrypted.enable) fileSystems;
 | |
|   keyedEncDevs = filter (dev: dev.encrypted.keyFile != null) encDevs;
 | |
|   keylessEncDevs = filter (dev: dev.encrypted.keyFile == null) encDevs;
 | |
|   anyEncrypted =
 | |
|     fold (j: v: v || j.encrypted.enable) false encDevs;
 | |
| 
 | |
|   encryptedFSOptions = {
 | |
| 
 | |
|     options.encrypted = {
 | |
|       enable = mkOption {
 | |
|         default = false;
 | |
|         type = types.bool;
 | |
|         description = "The block device is backed by an encrypted one, adds this device as a initrd luks entry.";
 | |
|       };
 | |
| 
 | |
|       blkDev = mkOption {
 | |
|         default = null;
 | |
|         example = "/dev/sda1";
 | |
|         type = types.nullOr types.str;
 | |
|         description = "Location of the backing encrypted device.";
 | |
|       };
 | |
| 
 | |
|       label = mkOption {
 | |
|         default = null;
 | |
|         example = "rootfs";
 | |
|         type = types.nullOr types.str;
 | |
|         description = "Label of the unlocked encrypted device. Set <literal>fileSystems.<name?>.device</literal> to <literal>/dev/mapper/<label></literal> to mount the unlocked device.";
 | |
|       };
 | |
| 
 | |
|       keyFile = mkOption {
 | |
|         default = null;
 | |
|         example = "/mnt-root/root/.swapkey";
 | |
|         type = types.nullOr types.str;
 | |
|         description = ''
 | |
|           Path to a keyfile used to unlock the backing encrypted
 | |
|           device. At the time this keyfile is accessed, the
 | |
|           <literal>neededForBoot</literal> filesystems (see
 | |
|           <literal>fileSystems.<name?>.neededForBoot</literal>)
 | |
|           will have been mounted under <literal>/mnt-root</literal>,
 | |
|           so the keyfile path should usually start with "/mnt-root/".
 | |
|         '';
 | |
|       };
 | |
|     };
 | |
|   };
 | |
| in
 | |
| 
 | |
| {
 | |
| 
 | |
|   options = {
 | |
|     fileSystems = mkOption {
 | |
|       type = with lib.types; attrsOf (submodule encryptedFSOptions);
 | |
|     };
 | |
|     swapDevices = mkOption {
 | |
|       type = with lib.types; listOf (submodule encryptedFSOptions);
 | |
|     };
 | |
|   };
 | |
| 
 | |
|   config = mkIf anyEncrypted {
 | |
|     assertions = map (dev: {
 | |
|       assertion = dev.encrypted.label != null;
 | |
|       message = ''
 | |
|         The filesystem for ${dev.mountPoint} has encrypted.enable set to true, but no encrypted.label set
 | |
|       '';
 | |
|     }) encDevs;
 | |
| 
 | |
|     boot.initrd = {
 | |
|       luks = {
 | |
|         devices =
 | |
|           builtins.listToAttrs (map (dev: {
 | |
|             name = dev.encrypted.label;
 | |
|             value = { device = dev.encrypted.blkDev; };
 | |
|           }) keylessEncDevs);
 | |
|         forceLuksSupportInInitrd = true;
 | |
|       };
 | |
|       postMountCommands =
 | |
|         concatMapStrings (dev:
 | |
|           "cryptsetup luksOpen --key-file ${dev.encrypted.keyFile} ${dev.encrypted.blkDev} ${dev.encrypted.label};\n"
 | |
|         ) keyedEncDevs;
 | |
|     };
 | |
|   };
 | |
| }
 | 
