-
-
Notifications
You must be signed in to change notification settings - Fork 192
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[nixosTest] Luks causes: KDSKBMODE: Inappropriate ioctl for device
#700
Comments
related: #501 possible dup. noted: both issues uses impermanence. |
Update: Issue persists without impermanence. Issue persists without ZFS. The blame may lay on the file-descriptor used for passing credentials in LUKS |
I can confirm that |
Added back encrypted zfs and zfs appears to not cause |
KDSKBMODE: Inappropriate ioctl for device
KDSKBMODE: Inappropriate ioctl for device
Test also appears to break during the first boot if |
seems to be our main suspect. passwordFile = "/tmp/luks-secret.key";
initrdUnlock = true; during the second phase, we may need to use a keyfile as a work around. |
boot.initrd.secrets = {
"/crypto_keyfile.bin" = ./snakeoil.txt;
};
boot.initrd.luks.devices.luksroot = {
# device = "/dev/disk/by-partlabel/disk-sda-luksroot";
keyFile = "/crypto_keyfile.bin";
};
initrd secrets are failing to copy. Reason inconclusive, subject of investigation
|
Solution boot.initrd.preDeviceCommands = ''
echo -n "TEST!" > /crypto_keyfile.bin
'';
# boot.initrd.secrets = {
# "/crypto_keyfile.bin" = ./snakeoil.txt;
# };
boot.initrd.luks.devices.luksroot = {
# device = "/dev/disk/by-partlabel/disk-sda-luksroot";
keyFile = "/crypto_keyfile.bin";
}; |
We should move forward by passing the required options as overwrites into
add advisory on the process of using encryption in test environments, It is also important to note the use of |
We currently don't have support for secrets in nixos vm tests. Is it this what you are running? |
KDSKBMODE: Inappropriate ioctl for device
KDSKBMODE: Inappropriate ioctl for device
I am currently debugging the use of secrets in test environments. I suppose that's why its been a bit painful to get working. Thank you for your reply. This issue was created with the inclusion of To clearify for later readers. Reference to |
Whenever I run
nixosConfigurations.<<machine>>.installScript.driverInteractive
The test successfully finishes the first boot, during the second boot phase, I receive & hang on.
Optimistically, when Ctrl-C is sent. I receive
The text was updated successfully, but these errors were encountered: