Re: [Nix-dev] Encrypted root: LUKS over LVM

2015-01-15 Thread Daniel Bergey
I run LVM over LUKS, but I don't understand the problem Nikita is having. My config is at[1] if that's helpful. I created the LUKS partition & LVM groups a few years ago, before I was using Nix, and I don't have useful notes about how I did it. Daniel Footnotes: [1] https://github.com/bergey/

Re: [Nix-dev] Encrypted root: LUKS over LVM

2015-01-14 Thread Jeff Johnson
I just installed NixOS on a couple machines this week, and set them both up this way. I remember seeing that error, but not exactly how I fixed it--sorry, should have taken note! One thing I remember changing is the preLVM. The wiki says to have it there but that didn't work for me. I removed it an

Re: [Nix-dev] Encrypted root: LUKS over LVM

2015-01-14 Thread James Cook
Sorry, still no idea. I'm using LUKS but not with LVM, and I don't have this problem. Is anyone else using LVM over LUKS? Is there something strange about Nikit's configuration? Maybe there is some way to record all the commands that are run on boot and figure out which nixos expressions are respo

Re: [Nix-dev] Encrypted root: LUKS over LVM

2015-01-11 Thread Nikita Karetnikov
# Do not modify this file! It was generated by ‘nixos-generate-config’ # and may be overwritten by future invocations. Please make changes # to /etc/nixos/configuration.nix instead. { config, pkgs, ... }: { imports = [ ]; boot.initrd.availableKernelModules = [ "uhci_hcd" "ehci_pci"

Re: [Nix-dev] Encrypted root: LUKS over LVM

2015-01-09 Thread James Cook
It looks like nixos is trying to run fsck after mounting the filesystem (somehow I missed this when I looked at your e-mail before). I don't know what would cause this. Can you send us your hardware-configuration.nix? James On 6 January 2015 at 23:47, Nikita Karetnikov wrote: >> That's odd. Do

Re: [Nix-dev] Encrypted root: LUKS over LVM

2015-01-07 Thread Nikita Karetnikov
> That's odd. Do you have any idea why e2fsck is failing? Nope. > What happens if you run e2fsck -n /dev/main/main after booting? # e2fsck -n /dev/main/main e2fsck 1.42.12 (29-Aug-2014) Warning! /dev/main/main is mounted. Warning: skipping journal recovery because doing a read-only filesystem c

Re: [Nix-dev] Encrypted root: LUKS over LVM

2015-01-06 Thread James Cook
That's odd. Do you have any idea why e2fsck is failing? What happens if you run e2fsck -n /dev/main/main after booting? James On 6 January 2015 at 14:10, Nikita Karetnikov wrote: > I forgot to say that adding ‘noCheck = true;’ doesn’t seem to work. > > ___

Re: [Nix-dev] Encrypted root: LUKS over LVM

2015-01-06 Thread Nikita Karetnikov
I forgot to say that adding ‘noCheck = true;’ doesn’t seem to work. pgpUuN3EzDKAd.pgp Description: PGP signature ___ nix-dev mailing list nix-dev@lists.science.uu.nl http://lists.science.uu.nl/mailman/listinfo/nix-dev

Re: [Nix-dev] Encrypted root: LUKS over LVM

2015-01-06 Thread Nikita Karetnikov
> Yes, as James says, you should really mount /mnt first. Mounting /mnt after > /mnt/boot means that /mnt/boot is seen empty. Thanks, this made it work. After changing “/dev/mapper/main” to “/dev/main/main” in the config file, I was able to boot. But now the following message appears during the

Re: [Nix-dev] Encrypted root: LUKS over LVM

2015-01-04 Thread Luca Bruno
Yes, as James says, you should really mount /mnt first. Mounting /mnt after /mnt/boot means that /mnt/boot is seen empty. On Sun, Jan 4, 2015 at 10:35 PM, James Cook wrote: > On 4 January 2015 at 12:04, Nikita Karetnikov > wrote: > > I’m trying to configure NixOS with LUKS over LVM as described

Re: [Nix-dev] Encrypted root: LUKS over LVM

2015-01-04 Thread James Cook
On 4 January 2015 at 12:04, Nikita Karetnikov wrote: > I’m trying to configure NixOS with LUKS over LVM as described in [1]. > After partitioning the disk (see ‘partition-table.sfdisk’), I did the > following: > > # mkfs.ext3 /dev/sda1 > # cryptsetup luksFormat -i 5000 /dev/sda2 > # cryptsetup luk

[Nix-dev] Encrypted root: LUKS over LVM

2015-01-04 Thread Nikita Karetnikov
I’m trying to configure NixOS with LUKS over LVM as described in [1]. After partitioning the disk (see ‘partition-table.sfdisk’), I did the following: # mkfs.ext3 /dev/sda1 # cryptsetup luksFormat -i 5000 /dev/sda2 # cryptsetup luksOpen /dev/sda2 main # pvcreate /dev/mapper/main # vgcreate main /d