mirror of
https://github.com/nix-community/disko
synced 2024-11-10 06:14:14 +00:00
Support optional keyfile for luks encrypted partitions
If the keyfile attribute is not present it will omit any keyfile luks configuration and instead will make the user be prompted for any passphrases.
This commit is contained in:
parent
9bca66ca7d
commit
e1927693e3
1 changed files with 3 additions and 3 deletions
|
@ -76,8 +76,8 @@ let {
|
|||
'';
|
||||
|
||||
create.luks = q: x: ''
|
||||
cryptsetup -q luksFormat ${q.device} ${x.keyfile} ${toString (x.extraArgs or [])}
|
||||
cryptsetup luksOpen ${q.device} ${x.name} --key-file ${x.keyfile}
|
||||
cryptsetup -q luksFormat ${q.device} ${if builtins.hasAttr "keyfile" x then x.keyfile else ""} ${toString (x.extraArgs or [])}
|
||||
cryptsetup luksOpen ${q.device} ${x.name} ${if builtins.hasAttr "keyfile" x then "--key-file " + x.keyfile else ""}
|
||||
${create-f { device = "/dev/mapper/${x.name}"; } x.content}
|
||||
'';
|
||||
|
||||
|
@ -141,7 +141,7 @@ let {
|
|||
recursiveUpdate
|
||||
(mount-f { device = "/dev/mapper/${x.name}"; } x.content)
|
||||
{luks.${q.device} = ''
|
||||
cryptsetup luksOpen ${q.device} ${x.name} --key-file ${x.keyfile}
|
||||
cryptsetup luksOpen ${q.device} ${x.name} ${if builtins.hasAttr "keyfile" x then "--key-file " + x.keyfile else ""}
|
||||
'';}
|
||||
);
|
||||
|
||||
|
|
Loading…
Reference in a new issue