try auto unlock

This commit is contained in:
RingOfStorms (Joshua Bell) 2025-12-13 16:42:11 -06:00
parent 4a9a8c8843
commit be9533faf4

View file

@ -69,15 +69,15 @@ in
# TODO how to auto unencrypt with options... # TODO how to auto unencrypt with options...
# - USB key # - USB key
# - TPM # - TPM
boot.initrd.availableKernelModules = [ "bcachefs" ]; # boot.initrd.availableKernelModules = [ "bcachefs" ];
boot.initrd.extraUtilsCommands = '' # boot.initrd.extraUtilsCommands = ''
copy_bin_and_libs ${pkgs.bcachefs-tools}/bin/bcachefs # copy_bin_and_libs ${pkgs.bcachefs-tools}/bin/bcachefs
''; # '';
#
# Method 1, prompt user for password on boot # # Method 1, prompt user for password on boot
boot.initrd.preDeviceCommands = '' # boot.initrd.preDeviceCommands = ''
${pkgs.bcachefs-tools}/bin/bcachefs unlock ${PRIMARY} # ${pkgs.bcachefs-tools}/bin/bcachefs unlock ${PRIMARY}
''; # '';
# # Run unlock before devices are scanned/mounted # # Run unlock before devices are scanned/mounted
# boot.initrd.preDeviceCommands = '' # boot.initrd.preDeviceCommands = ''
@ -93,6 +93,49 @@ in
# # Replace /dev/disk/by-uuid/XXXX with your actual device # # Replace /dev/disk/by-uuid/XXXX with your actual device
# echo "$PASSPHRASE" | ${pkgs.bcachefs-tools}/bin/bcachefs unlock /dev/disk/by-uuid/XXXX # echo "$PASSPHRASE" | ${pkgs.bcachefs-tools}/bin/bcachefs unlock /dev/disk/by-uuid/XXXX
# ''; # '';
boot.initrd.systemd.enable = true;
boot.supportedFilesystems = [
"bcachefs"
"vfat"
];
boot.initrd.systemd.services.unlock-primary = {
description = "Unlock bcachefs root with key";
wantedBy = [ "initrd-root-device.target" ];
before = [ "initrd-root-device.target" ];
unitConfig.DefaultDependencies = "no";
serviceConfig = {
Type = "oneshot";
# Wait for USB disk; you can refine this with udev-based Wants=/Requires=
ExecStart = pkgs.writeShellScript "bcachefs-unlock-initrd" ''
set -eu
echo "test" | ${pkgs.bcachefs-tools}/bin/bcachefs unlock ${PRIMARY}
exit 0
# echo "Waiting for USB key with label SECRETKEY..."
# for i in $(seq 1 20); do
# if [ -e /dev/disk/by-label/SECRETKEY ]; then
# break
# fi
# sleep 0.5
# done
#
# if [ ! -e /dev/disk/by-label/SECRETKEY ]; then
# echo "USB key not found; failing."
# exit 1
# fi
#
# mkdir -p /mnt-key
# mount -t vfat /dev/disk/by-label/SECRETKEY /mnt-key
#
# echo "Unlocking bcachefs..."
# ${pkgs.bcachefs-tools}/bin/bcachefs unlock \
# --keyfile /mnt-key/bcachefs.key \
# /dev/disk/by-uuid/YOUR_BCACHEFS_UUID
#
# umount /mnt-key
'';
};
};
# Reset root # Reset root
# TODO # TODO