summary refs log tree commit diff
path: root/modules/system/boot/luksroot.nix
diff options
context:
space:
mode:
authorEelco Dolstra <eelco.dolstra@logicblox.com>2013-07-23 18:56:12 +0200
committerEelco Dolstra <eelco.dolstra@logicblox.com>2013-07-23 22:18:25 +0200
commit8dc09be07bb94c5d3ce7baeef9c690868a0c0461 (patch)
tree44136eb0421292d18ed6911637beda7f9161286b /modules/system/boot/luksroot.nix
parent462e4255fa3238f8766f5a11b461d2c78bbbf3ff (diff)
downloadnixpkgs-8dc09be07bb94c5d3ce7baeef9c690868a0c0461.tar
nixpkgs-8dc09be07bb94c5d3ce7baeef9c690868a0c0461.tar.gz
nixpkgs-8dc09be07bb94c5d3ce7baeef9c690868a0c0461.tar.bz2
nixpkgs-8dc09be07bb94c5d3ce7baeef9c690868a0c0461.tar.lz
nixpkgs-8dc09be07bb94c5d3ce7baeef9c690868a0c0461.tar.xz
nixpkgs-8dc09be07bb94c5d3ce7baeef9c690868a0c0461.tar.zst
nixpkgs-8dc09be07bb94c5d3ce7baeef9c690868a0c0461.zip
Fix indentation / tabs
Diffstat (limited to 'modules/system/boot/luksroot.nix')
-rw-r--r--modules/system/boot/luksroot.nix26
1 files changed, 13 insertions, 13 deletions
diff --git a/modules/system/boot/luksroot.nix b/modules/system/boot/luksroot.nix
index 8f48bba880b..b9c44ae7078 100644
--- a/modules/system/boot/luksroot.nix
+++ b/modules/system/boot/luksroot.nix
@@ -1,4 +1,4 @@
-{pkgs, config, ...}:
+{ config, pkgs, ... }:
 
 with pkgs.lib;
 
@@ -52,23 +52,23 @@ in
     boot.initrd.luks.mitigateDMAAttacks = mkOption {
       default = true;
       description = ''
-	Unless enabled, encryption keys can be easily recovered by an attacker with physical
-	access to any machine with PCMCIA, ExpressCard, ThunderBolt or FireWire port.
-	More information: http://en.wikipedia.org/wiki/DMA_attack
+        Unless enabled, encryption keys can be easily recovered by an attacker with physical
+        access to any machine with PCMCIA, ExpressCard, ThunderBolt or FireWire port.
+        More information: http://en.wikipedia.org/wiki/DMA_attack
 
-	This option blacklists FireWire drivers, but doesn't remove them. You can manually
-	load the drivers if you need to use a FireWire device, but don't forget to unload them!
+        This option blacklists FireWire drivers, but doesn't remove them. You can manually
+        load the drivers if you need to use a FireWire device, but don't forget to unload them!
       '';
     };
 
     boot.initrd.luks.cryptoModules = mkOption {
-      default = [ "aes" "aes_generic" "aes_x86_64" "aes_i586" "blowfish" "twofish" "serpent" "cbc" "xts" "lrw" "sha256" 
-"sha1" 
-"sha2" 
-];
+      default =
+        [ "aes" "aes_generic" "aes_x86_64" "aes_i586" "blowfish" "twofish"
+          "serpent" "cbc" "xts" "lrw" "sha256" "sha1" "sha2"
+        ];
       description = ''
-	A list of cryptographic kernel modules needed to decrypt the root device(s).
-	The default includes all common modules.
+        A list of cryptographic kernel modules needed to decrypt the root device(s).
+        The default includes all common modules.
       '';
     };
 
@@ -151,7 +151,7 @@ in
       ["firewire_ohci" "firewire_core" "firewire_sbp2"];
 
     # Some modules that may be needed for mounting anything ciphered
-    boot.initrd.kernelModules = [ "dm_mod" "dm_crypt" "cryptd" ] ++ luks.cryptoModules; 
+    boot.initrd.kernelModules = [ "dm_mod" "dm_crypt" "cryptd" ] ++ luks.cryptoModules;
 
     # copy the cryptsetup binary and it's dependencies
     boot.initrd.extraUtilsCommands = ''