summary refs log tree commit diff
path: root/nixos/modules/system/boot/luksroot.nix
Commit message (Collapse)AuthorAge
* nixos/luksroot: sync the crypt-storageHugo Lageneste2021-10-20
| | | | | Add a sync command just after writing to the /crypt-storage file in order to reduce the possibilities of corruption errors.
* nixos/doc: clean up defaults and examplesNaïm Favier2021-10-04
|
* modules/luksroot: add note about AE to allowDiscardsMarkus S. Wamser2021-07-01
|
* nixos/luksroot: add bypassWorkqueues (#118114)Naïm Favier2021-05-26
| | | https://wiki.archlinux.org/index.php/Dm-crypt/Specialties#Disable_workqueue_for_increased_solid_state_drive_(SSD)_performance
* boot.initrd.luks: fix case `Yubikey` -> `YubiKey`Ctem2021-02-08
|
* boot.initrd.luks: add reusePassphrases support for YubiKey 2FACtem2021-02-08
|
* fido2luks: 0.2.3 -> 0.2.15Anton Plotnikov2020-10-23
| | | | Also remove interactive flag from initrd, because of broken io.
* Merge pull request #96042 from rnhmjoj/loaOfWORLDofPEACE2020-09-02
|\ | | | | treewide: completely remove types.loaOf
| * treewide: completely remove types.loaOfrnhmjoj2020-09-02
| |
* | Merge pull request #86236 from ThibautMarty/fix-nullOr-typesLassulus2020-08-26
|\ \ | |/ |/| treewide: fix modules options types where the default is null
| * treewide: fix modules options types where the default is nullThibaut Marty2020-04-28
| | | | | | | | | | They can be caught with `nixos-option -r` on an empty ({...}:{}) NixOS configuration.
* | Merge pull request #85074 from Emantor/fix/boot_kernel_moduleFranz Pletz2020-07-11
|\ \ | | | | | | boot.initrd.luks: remove x86_64/i586 AES modules
| * | boot.initrd.luks: remove x86_64/i586 AES modulesRouven Czerwinski2020-04-12
| |/ | | | | | | | | | | | | | | | | | | | | | | | | | | Commit 1d2c3279311e4f03fcf164e1366f2fda9f4bfccf in the upstream kernel repository removed support for the scalar x86_64 and i586 AES assembly implementations, since the generic AES implementation generated by the compiler is faster for both platforms. Remove the modules from the cryptoModules list. This causes a regression for kernel versions >=5.4 which include the removal. This should have no negative impact on AES performance on older kernels since the generic implementation should be faster there as well since the implementation was hardly touched from its initial submission. Fixes #84842
* / boot.initrd.luks.devices: add preOpenCommands and postOpenCommandseyjhb2020-06-14
|/
* boot.initrd.luks: adding a warning when using FIDO2 with kernel ≤ 5.4Marek Mahut2020-01-22
|
* boot.initrd.luks: Adding FIDO2 supportMarek Mahut2020-01-22
|
* nixos/treewide: Move rename.nix imports to their respective modulesSilvan Mosberger2019-12-10
| | | | | | | | A centralized list for these renames is not good because: - It breaks disabledModules for modules that have a rename defined - Adding/removing renames for a module means having to find them in the central file - Merge conflicts due to multiple people editing the central file
* treewide: remove redundant quotesvolth2019-08-26
|
* cryptsetup: enable kernel crypto api support againFranz Pletz2019-06-07
| | | | | | | | This is needed for tcrypt and the benchmark subcommand. If enabled, it is also used to unlock LUKS2 volumes and therefore the kernel modules providing this feature need to be available in our initrd. Fixes #42163. #54019.
* nixos/luksroot: GPG Smartcard support for luks encrypted volumesMarkus Schmidl2019-05-12
|
* nixos/luksroot: create /run/cryptsetup (#60235)Edmund Wu2019-04-28
| | | | Needed since 2.0.0 Changed to /run/cryptsetup from /run/lock/cryptsetup in 2.0.1
* nixos/luksroot: Fix typo `Verifiying` -> `Verifying`Claudio Bley2019-01-08
|
* Revert "nixos/luksroot: Check whether the device already exists"Jörg Thalheim2018-12-02
| | | | | | This reverts commit 9cd4ce98bfc11292fbebc6b85d14bb386e82c9a8. This might be broken for some people: https://github.com/NixOS/nixpkgs/pull/50281#issuecomment-443516289
* nixos/luksroot: Check whether the device already existsJanne Heß2018-12-01
| | | | | | | The new reuse behaviour is cool and really useful but it breaks one of my use cases. When using kexec, I have a script which will unlock the disks in my initrd. However, do_open_passphrase will fail if the disk is already unlocked.
* nixos: initrd/luks: fix detection of devices by UUIDBen Wolsieffer2018-10-11
|
* nixos: initrd/luks: make script indentation consistentBen Wolsieffer2018-10-11
|
* nixos: initrd/luks: make uuid specified devices discoverableEdward Tjörnhammar2018-09-24
|
* reewide: Purge all uses `stdenv.system` and top-level `system`John Ericson2018-08-30
| | | | It is deprecated and will be removed after 18.09.
* nixos: initrd/luks: disable input echo for the whole stageJan Malakhovski2018-08-08
|
* nixos: initrd/luks: simplify Yubikey handling codeJan Malakhovski2018-08-08
| | | | | | | | | | | | From reading the source I'm pretty sure it doesn't support multiple Yubikeys, hence those options are useless. Also, I'm pretty sure nobody actually uses this feature, because enabling it causes extra utils' checks to fail (even before applying any patches of this branch). As I don't have the hardware to test this, I'm too lazy to fix the utils, but I did test that with extra utils checks commented out and Yubikey enabled the resulting script still passes the syntax check.
* nixos: initrd/luks: change passphrases handlingJan Malakhovski2018-08-08
| | | | | | | | | | | Also reuse common cryptsetup invocation subexpressions. - Passphrase reading is done via the shell now, not by cryptsetup. This way the same passphrase can be reused between cryptsetup invocations, which this module now tries to do by default (can be disabled). - Number of retries is now infinity, it makes no sense to make users reboot when they fail to type in their passphrase.
* nixos: initrd/luks: cleanup and generalize common shell expressionsJan Malakhovski2018-08-08
| | | | Also fix Yubikey timeout handling mess.
* luksroot: Add missing quote (#44639)Edmund Wu2018-08-07
|
* nixos/luksroot: Support keyfile offsetsJanne Heß2018-08-07
|
* modules/system/boot/luksroot: remove comment about input_leds for caps lockFlorian Klink2018-05-07
| | | | | Since f2a9f9aeab5016d28ab4bcf6da81924ceecdd676, we already load "input_leds", so this comment isn't useful anymore.
* Merge pull request #30416 from symphorien/luksnokeyFranz Pletz2018-03-05
|\ | | | | nixos/luksroot.nix: fallback to interactive password entry when no keyfile found
| * luksroot.nix: rename fallback to fallbackToPasswordSymphorien Gibol2017-12-14
| |
| * nixos/luksroot.nix: add option boot.initrd.luks.devices.<name?>.fallbackSymphorien Gibol2017-10-23
| | | | | | | | | | | | | | | | This option, if set to true, enables fallbacking to an interactive passphrase prompt when the specified keyFile is not found. The default is false, which is compatible with previous behavior and doesn't prevent unattended boot.
| * nixos/luksroot.nix: fallback to interactive password entry when no keyfile foundSymphorien Gibol2017-10-14
| |
* | attempt to fix #30940 more robustlyAristid Breitkreuz2018-02-26
| |
* | luksRoot: add the missing ECB dependency to fix XTS support, resolves #30940Evgeny Egorochkin2017-12-22
| |
* | boot.initrd.luks: add input_leds moduleFlorian Klink2017-12-19
|/ | | | | | | To get working caps lock lights already at stage 1, the input_leds module needs to be loaded. Closes #12456.
* nixos/fileystems: Fix boot fails with encrypted fsAndré-Patrick Bubel2017-09-14
| | | | | | | | | | | Boot fails when a keyfile is configured for all encrypted filesystems and no other luks devices are configured. This is because luks support is only enabled in the initrd, when boot.initrd.luks.devices has entries. When a fileystem has a keyfile configured though, it is setup by a custom command, not by boot.initrd.luks. This commit adds an internal config flag to enable luks support in the initrd file, even if there are no luks devices configured.
* luksroot: fix typoSilvan Mosberger2017-07-02
|
* nixos/luks: Silence killall complain about non-existing cryptsetup processesRickard Nilsson2017-05-16
|
* luksroot: Wait for the header (device) to appearMichael Weiss2017-04-05
| | | | | | | | | The LUKS header can be on another device (e.g. a USB stick). In my case it can take up to two seconds until the partition on my USB stick is available (i.e. the decryption fails without this patch). This will also remove some redundancy by providing the shell function `wait_target` and slightly improve the output (one "." per second and a success/failure indication after 10 seconds instead of always printing "ok").
* ykpers: consolidate into yubikey-personalizationBenjamin Staffin2017-03-11
| | | | Looks like this accidentally got packaged twice.
* luksroot module: optionSet -> submoduleEric Sagnes2016-09-13
|
* nixos/luksroot: Reference correct output of opensslTuomas Tynkkynen2016-08-04
|
* Revert "nixos stage-1: try to quit plymouth if started on failure"Nikolay Amiantov2016-07-17
| | | | | | | | This reverts commit c69c76ca7efecba24aba555c2a03f933997d1fd5. This patch was messed up during a rebase -- the commit title doesn't match what it really does at all (it is actually a broken attempt to get LUKS passphrase prompts in Plymouth).