forked from pub-solar/os
x-os: prepare booting from unencrypted /boot partition
This commit is contained in:
parent
d35fc6d8ae
commit
56ab7a1d28
|
@ -3,40 +3,19 @@
|
||||||
let
|
let
|
||||||
cfg = config.pub-solar.x-os;
|
cfg = config.pub-solar.x-os;
|
||||||
in
|
in
|
||||||
with lib; {
|
{
|
||||||
options = {
|
|
||||||
pub-solar.x-os.keyfile = mkOption {
|
|
||||||
type = types.str;
|
|
||||||
description = "Keyfile location";
|
|
||||||
};
|
|
||||||
};
|
|
||||||
|
|
||||||
config = {
|
config = {
|
||||||
# Enable plymouth for better experience of booting
|
# Enable plymouth for better experience of booting
|
||||||
boot.plymouth.enable = true;
|
boot.plymouth.enable = true;
|
||||||
|
|
||||||
# Use Keyfile to unlock the root partition to avoid keying in twice.
|
# Mount / luks device in initrd
|
||||||
# Allow fstrim to work on it.
|
# Allow fstrim to work on it.
|
||||||
boot.initrd = {
|
boot.initrd = {
|
||||||
secrets = { "/keyfile.bin" = cfg.keyfile; };
|
|
||||||
luks.devices."cryptroot" = {
|
luks.devices."cryptroot" = {
|
||||||
keyFile = "/keyfile.bin";
|
|
||||||
allowDiscards = true;
|
allowDiscards = true;
|
||||||
fallbackToPassword = true;
|
|
||||||
};
|
};
|
||||||
};
|
};
|
||||||
|
|
||||||
# Use GRUB with encrypted /boot under EFI env.
|
boot.loader.systemd-boot.enable = true;
|
||||||
boot.loader = {
|
|
||||||
efi.efiSysMountPoint = "/boot/efi";
|
|
||||||
|
|
||||||
grub = {
|
|
||||||
enable = true;
|
|
||||||
version = 2;
|
|
||||||
device = "nodev";
|
|
||||||
efiSupport = true;
|
|
||||||
enableCryptodisk = true;
|
|
||||||
};
|
|
||||||
};
|
|
||||||
};
|
};
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue