Will Fancher
cca22054c0
systemd-stage-1: Add assertions for unsupported options.
2023-10-30 12:15:58 +01:00
Will Fancher
99a47a5e35
systemd-stage-1: Enable more encrypted installer tests
2023-10-23 17:40:34 -04:00
pennae
b115622f4b
nixos/tasks: invariant option docs MD conversions
2022-07-24 13:01:47 +02:00
Ben Siraphob
1c2a2b0a08
treewide: fold -> foldr
2021-01-26 10:57:07 +07:00
rnhmjoj
20d491a317
treewide: completely remove types.loaOf
2020-09-02 00:42:50 +02:00
Keshav Kini
5e86bba082
nixos/boot: some documentation improvements
...
- Give a more accurate description of how fileSystems.<name/>.neededForBoot
works
- Give a more detailed description of how fileSystems.<name/>.encrypted.keyFile
works
2020-07-29 14:39:21 -07:00
Benjamin Herr
0f5acc5ebe
silence warning from #63103 in encrypted-devices.nix
2020-02-18 20:58:40 -08:00
Pierre Bourdon
3674bdf204
nixos/tasks/encrypted-devices: fix regression from #54637
...
27982b408e
introduced a bug when
refactoring the encrypted-devices module, causing some encrypted
filesystem options to not be recognized anymore.
See e.g. https://hydra.nixos.org/build/88145490
2019-02-02 17:31:31 +01:00
danbst
27982b408e
types.optionSet: deprecate and remove last usages
2019-01-31 00:41:10 +02:00
volth
87f5930c3f
[bot]: remove unreferenced code
2018-07-20 18:48:37 +00:00
lassulus
77be4d91f7
encrypted devices: provide working example
2017-10-16 17:46:46 +02:00
lassulus
f804a8ff98
encrypted devices: don't override default cryptoModules
2017-10-16 17:46:06 +02:00
Rok Garbas
748ef34f09
assertion should check for encrypted.label of the defined fileSystem
2017-09-29 19:55:28 +02:00
Silvan Mosberger
eca23233b2
encrypted devices: add label set assertion ( #29651 )
2017-09-23 19:02:16 +01:00
André-Patrick Bubel
2000fba561
nixos/fileystems: Fix boot fails with encrypted fs
...
Boot fails when a keyfile is configured for all encrypted filesystems
and no other luks devices are configured. This is because luks support is only
enabled in the initrd, when boot.initrd.luks.devices has entries. When a
fileystem has a keyfile configured though, it is setup by a custom
command, not by boot.initrd.luks.
This commit adds an internal config flag to enable luks support in the
initrd file, even if there are no luks devices configured.
2017-09-14 05:27:41 +02:00
Jan Malakhovski
65d26c4dc1
nixos: apply toposort to fileSystems to support bind and move mounts
...
And use new `config.system.build.fileSystems` property everywhere.
2016-08-23 18:14:05 +00:00
Kovacsics Robert (NixOS)
912f60c1e7
Revert part of #9982 to be in line with #9925
...
When creating PR #9982 , I undid a line of PR #9925 , that was some
cleanups and fixes, so this undoes that damage.
2015-11-26 14:40:31 +00:00
Kovacsics Robert (NixOS)
70fd4b4b02
encrypted-devices service: Fix keyed mount, clarify descriptions.
...
Not enough arguments were supplied to cryptsetup when a key-file was
specified. Also don't try to unlock keyedEncDevs with a password.
2015-09-22 09:49:28 +01:00
Jan Malakhovski
6eadb16022
nixos: fix some types
2015-09-18 18:48:50 +00:00
Shea Levy
b3cfb9084b
Get all lib functions from lib, not pkgs.lib, in modules
2014-07-02 12:28:18 -04:00
Bjørn Forsman
4def9a762f
nixos: add some missing '.' in option descriptions
2014-06-24 21:25:11 +02:00
Edward Tjörnhammar
22f73bfd85
Enable encrypted backing devices in fileystem configurations
2014-04-26 23:26:23 +02:00