I'm not sure what vaultlocker is.

trigger might be appropriate together with a '--settle' flag, if/where
available.

instead of manually opening things, i'd expect crypttab to be adjusted
with `systemctl daemon-reload` re-run to regenerated systemd-cryptsetup@
units and "open" the encrytped device using systemd-cryptsetup@ instance
unit.... However that might be "too" systemd specific for vaultcrypt
upstream...

If one injects uuid onto a drive, it might not generate any kernel udev
events for udevd to react to and create/update symlinks.

It would be nice to have an interleaved log of udev events from udevadm
monitor, to see if there are any events emitted after "format" action is
done. If there are none, then vaultlocker needs to be fixed to trigger
things.

** Also affects: systemd (Ubuntu)
   Importance: Undecided
       Status: New

** Changed in: cryptsetup (Ubuntu)
       Status: New => Incomplete

** Changed in: systemd (Ubuntu)
       Status: New => Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1780332

Title:
  vaultlocker does not ensure that udev is triggered to create /dev/disk
  /by-uuid/<uuid-in-luks-header> symlink and fails

To manage notifications about this bug go to:
https://bugs.launchpad.net/vaultlocker/+bug/1780332/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to