diff --git a/hosts/i001/hardware-mounts.nix b/hosts/i001/hardware-mounts.nix index d4baecb0..64d8da01 100644 --- a/hosts/i001/hardware-mounts.nix +++ b/hosts/i001/hardware-mounts.nix @@ -89,7 +89,6 @@ in # PRIMARY unencrypt boot.initrd.systemd.enable = true; - boot.initrd.systemd.storePaths = [ pkgs.keyutils ]; boot.supportedFilesystems = [ "bcachefs" "vfat" @@ -97,9 +96,7 @@ in systemd.services = { # NOTE that neededForBoot fs's dont end up in this list - # "unlock-bcachefs-${escapeSystemdPath "/"}".enable = false; "unlock-bcachefs-${escapeSystemdPath "/.old_roots"}".enable = false; - # "unlock-bcachefs-${escapeSystemdPath "/nix"}".enable = false; "unlock-bcachefs-${escapeSystemdPath "/.snapshots"}".enable = false; "unlock-bcachefs-${escapeSystemdPath "/.swap"}".enable = false; "unlock-bcachefs-${escapeSystemdPath "/persist"}".enable = false; @@ -108,13 +105,8 @@ in # 1. Disable the automatically generated unlock services boot.initrd.systemd.services = { "unlock-bcachefs-${escapeSystemdPath "/sysroot"}".enable = false; # special always on one - # the module creates services named unlock-bcachefs- "unlock-bcachefs-${escapeSystemdPath "/"}".enable = false; - # "unlock-bcachefs-${escapeSystemdPath "/.old_roots"}".enable = false; "unlock-bcachefs-${escapeSystemdPath "/nix"}".enable = false; - # "unlock-bcachefs-${escapeSystemdPath "/.snapshots"}".enable = false; - # "unlock-bcachefs-${escapeSystemdPath "/.swap"}".enable = false; - # "unlock-bcachefs-${escapeSystemdPath "/persist"}".enable = false; # 2. Your single custom unlock unit unlock-bcachefs-custom = {