Replace fragile environment.etc.crypttab.text with boot.initrd.luks.devices for the second SSD, matching the pattern used for the root drive. Co-Authored-By: Claude Opus 4.6 (1M context) <noreply@anthropic.com>
47 lines
1.3 KiB
Nix
47 lines
1.3 KiB
Nix
# to /etc/nixos/configuration.nix instead.
|
|
{ config, lib, pkgs, modulesPath, ... }:
|
|
|
|
{
|
|
imports =
|
|
[ (modulesPath + "/installer/scan/not-detected.nix")
|
|
];
|
|
|
|
boot.initrd.availableKernelModules = [ "nvme" "xhci_pci" "thunderbolt" "usbhid" "usb_storage" "sd_mod" ];
|
|
boot.initrd.kernelModules = [ ];
|
|
boot.kernelModules = [ "kvm-amd" ];
|
|
boot.extraModulePackages = [ ];
|
|
|
|
boot.initrd.luks.fido2Support = true;
|
|
|
|
boot.initrd.luks.devices."luks-922e2c13-35bc-40de-a829-716b9368e4a7" = {
|
|
device = "/dev/disk/by-uuid/922e2c13-35bc-40de-a829-716b9368e4a7";
|
|
#fido2.credential = "<credential-hex-string>";
|
|
#fido2.passwordLess = true;
|
|
};
|
|
|
|
fileSystems."/" =
|
|
{ device = "/dev/mapper/luks-922e2c13-35bc-40de-a829-716b9368e4a7";
|
|
fsType = "ext4";
|
|
};
|
|
|
|
fileSystems."/boot" =
|
|
{ device = "/dev/disk/by-uuid/9BAD-52AA";
|
|
fsType = "vfat";
|
|
options = [ "fmask=0077" "dmask=0077" ];
|
|
};
|
|
|
|
boot.initrd.luks.devices."home-crypt" = {
|
|
device = "/dev/disk/by-uuid/edfdcdf4-083a-4826-a1f8-9670545e0bc5";
|
|
};
|
|
|
|
fileSystems."/home" = {
|
|
device = "/dev/mapper/home-crypt";
|
|
fsType = "ext4";
|
|
};
|
|
|
|
swapDevices = [ ];
|
|
|
|
nixpkgs.hostPlatform = lib.mkDefault "x86_64-linux";
|
|
hardware.cpu.amd.updateMicrocode = lib.mkDefault config.hardware.enableRedistributableFirmware;
|
|
}
|