GET https://kbin.spritesserver.nl/m/guix@lemmy.ml/t/26622/How-to-luks-encrypt-raid-drive/top

Security

Token

There is no security token.

Firewall

main Name
Security enabled
Stateless

Configuration

Key Value
provider security.user.provider.concrete.app_user_provider
context main
entry_point App\Security\KbinAuthenticator
user_checker App\Security\UserChecker
access_denied_handler (none)
access_denied_url (none)
authenticators
[
  "two_factor"
  "remember_me"
  "App\Security\KbinAuthenticator"
  "App\Security\FacebookAuthenticator"
  "App\Security\GoogleAuthenticator"
  "App\Security\GithubAuthenticator"
  "App\Security\KeycloakAuthenticator"
]

Listeners

Listener Duration Response
Symfony\Component\Security\Http\Firewall\ChannelListener {#723
  -map: Symfony\Component\Security\Http\AccessMap {#722 …}
  -logger: Monolog\Logger {#783 …}
  -httpPort: 80
  -httpsPort: 443
}
0.00 ms (none)
Symfony\Component\Security\Http\Firewall\ContextListener {#706
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\TokenStorage {#1017 …}
  -sessionKey: "_security_main"
  -logger: Monolog\Logger {#783 …}
  -userProviders: Symfony\Component\DependencyInjection\Argument\RewindableGenerator {#705 …}
  -dispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …}
  -registered: false
  -trustResolver: Scheb\TwoFactorBundle\Security\Authentication\AuthenticationTrustResolver {#780 …}
  -sessionTrackerEnabler: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage::enableUsageTracking(): void {#703 …}
}
0.22 ms (none)
Symfony\Component\Security\Http\Firewall\AuthenticatorManagerListener {#584
  -authenticatorManager: Symfony\Component\Security\Http\Authentication\AuthenticatorManager {#595 …}
}
0.00 ms (none)
Scheb\TwoFactorBundle\Security\Http\Firewall\TwoFactorAccessListener {#582
  -twoFactorFirewallConfig: Scheb\TwoFactorBundle\Security\TwoFactor\TwoFactorFirewallConfig {#842 …}
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -twoFactorAccessDecider: Scheb\TwoFactorBundle\Security\Authorization\TwoFactorAccessDecider {#581 …}
}
0.05 ms (none)
Symfony\Component\Security\Http\Firewall\AccessListener {#579
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -accessDecisionManager: Symfony\Component\Security\Core\Authorization\TraceableAccessDecisionManager {#937 …}
  -map: Symfony\Component\Security\Http\AccessMap {#722 …}
}
0.00 ms (none)
Symfony\Component\Security\Http\Firewall\LogoutListener {#786
  -tokenStorage: Symfony\Component\Security\Core\Authentication\Token\Storage\UsageTrackingTokenStorage {#1018 …}
  -options: [
    "csrf_parameter" => "_csrf_token"
    "csrf_token_id" => "logout"
    "logout_path" => "app_logout"
  ]
  -httpUtils: Symfony\Component\Security\Http\HttpUtils {#841 …}
  -csrfTokenManager: Symfony\Component\Security\Csrf\CsrfTokenManager {#1015 …}
  -eventDispatcher: Symfony\Component\EventDispatcher\Debug\TraceableEventDispatcher {#747 …}
}
0.00 ms (none)

Authenticators

No authenticators have been recorded. Check previous profiles on your authentication endpoint.

Access Decision

affirmative Strategy
# Voter class
1
"Symfony\Component\Security\Core\Authorization\Voter\AuthenticatedVoter"
2
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
3
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
4
"Symfony\Component\Security\Core\Authorization\Voter\ExpressionVoter"
5
"App\Security\Voter\EntryCommentVoter"
6
"App\Security\Voter\EntryVoter"
7
"App\Security\Voter\MagazineVoter"
8
"App\Security\Voter\MessageThreadVoter"
9
"App\Security\Voter\MessageVoter"
10
"App\Security\Voter\NotificationVoter"
11
"App\Security\Voter\OAuth2UserConsentVoter"
12
"App\Security\Voter\PostCommentVoter"
13
"App\Security\Voter\PostVoter"
14
"App\Security\Voter\UserVoter"

Access decision log

# Result Attributes Object
1 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
2 DENIED moderate
App\Entity\Entry {#1796
  +user: Proxies\__CG__\App\Entity\User {#1896 …}
  +magazine: App\Entity\Magazine {#266
    +icon: null
    +name: "guix@lemmy.ml"
    +title: "guix"
    +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
    +rules: null
    +subscriptionsCount: 1
    +entryCount: 10
    +entryCommentCount: 8
    +postCount: 0
    +postCommentCount: 0
    +isAdult: false
    +customCss: null
    +lastActive: DateTime @1727743868 {#276
      date: 2024-10-01 02:51:08.0 +02:00
    }
    +markedForDeletionAt: null
    +tags: null
    +moderators: Doctrine\ORM\PersistentCollection {#254 …}
    +ownershipRequests: Doctrine\ORM\PersistentCollection {#250 …}
    +moderatorRequests: Doctrine\ORM\PersistentCollection {#239 …}
    +entries: Doctrine\ORM\PersistentCollection {#197 …}
    +posts: Doctrine\ORM\PersistentCollection {#155 …}
    +subscriptions: Doctrine\ORM\PersistentCollection {#217 …}
    +bans: Doctrine\ORM\PersistentCollection {#134 …}
    +reports: Doctrine\ORM\PersistentCollection {#120 …}
    +badges: Doctrine\ORM\PersistentCollection {#98 …}
    +logs: Doctrine\ORM\PersistentCollection {#88 …}
    +awards: Doctrine\ORM\PersistentCollection {#77 …}
    +categories: Doctrine\ORM\PersistentCollection {#64 …}
    -id: 118
    +apId: "guix@lemmy.ml"
    +apProfileId: "https://lemmy.ml/c/guix"
    +apPublicUrl: "https://lemmy.ml/c/guix"
    +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
    +apInboxUrl: "https://lemmy.ml/inbox"
    +apDomain: "lemmy.ml"
    +apPreferredUsername: "guix"
    +apDiscoverable: true
    +apManuallyApprovesFollowers: null
    +privateKey: null
    +publicKey: null
    +apFetchedAt: DateTime @1703436704 {#270
      date: 2023-12-24 17:51:44.0 +01:00
    }
    +apDeletedAt: null
    +apTimeoutAt: null
    +visibility: "visible             "
    +createdAt: DateTimeImmutable @1703436703 {#272
      date: 2023-12-24 17:51:43.0 +01:00
    }
  }
  +image: null
  +domain: Proxies\__CG__\App\Entity\Domain {#1888 …}
  +slug: "How-to-luks-encrypt-raid-drive"
  +title: "How to luks encrypt raid drive?"
  +url: null
  +body: """
    Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
    \n
    So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
    \n
    ---\n
    \n
    In my system config file I added a raid drive like so:\n
    \n
    ```\n
    \n
    <span style="color:#323232;">(mapped-devices (list (mapped-device\n
    </span><span style="color:#323232;">                                     (source (uuid\n
    </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
    </span><span style="color:#323232;">                                     (target "guix")\n
    </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
    </span><span style="color:#323232;">\n
    </span><span style="color:#323232;">                                  (mapped-device\n
    </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
    </span><span style="color:#323232;">                                     (target "/dev/md0")\n
    </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
    </span><span style="color:#323232;">\n
    </span><span style="color:#323232;">(file-systems (cons* (file-system\n
    </span><span style="color:#323232;">                                  (mount-point "/")\n
    </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
    </span><span style="color:#323232;">                                  (type "ext4")\n
    </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
    </span><span style="color:#323232;">\n
    </span><span style="color:#323232;">                               (file-system\n
    </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
    </span><span style="color:#323232;">                                  (device "/dev/md0")\n
    </span><span style="color:#323232;">                                  (type "ext4")\n
    </span><span style="color:#323232;">                                  (mount? #f)\n
    </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
    </span>\n
    ```\n
    \n
    I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
    \n
    ```\n
    \n
    <span style="color:#323232;">(mapped-device\n
    </span><span style="color:#323232;">   (source (uuid\n
    </span><span style="color:#323232;">                {raid uuid}))\n
    </span><span style="color:#323232;">                (target "/dev/md0")\n
    </span><span style="color:#323232;">                (type luks-device-mapping))\n
    </span>\n
    ```\n
    \n
    and then pass that as a dependency to the raid file system object?\n
    \n
    Thanks
    """
  +type: "article"
  +lang: "en"
  +isOc: false
  +hasEmbed: false
  +commentCount: 6
  +favouriteCount: 7
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1711060515 {#1799
    date: 2024-03-21 23:35:15.0 +01:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#1887 …}
  +votes: Doctrine\ORM\PersistentCollection {#1950 …}
  +reports: Doctrine\ORM\PersistentCollection {#2425 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1903 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1898 …}
  +badges: Doctrine\ORM\PersistentCollection {#1904 …}
  +children: []
  -id: 26622
  -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
  -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1704181768
  +visibility: "visible             "
  +apId: "https://reddthat.com/post/11036859"
  +editedAt: DateTimeImmutable @1712607909 {#59
    date: 2024-04-08 22:25:09.0 +02:00
  }
  +createdAt: DateTimeImmutable @1704144268 {#1831
    date: 2024-01-01 22:24:28.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
3 DENIED edit
App\Entity\Entry {#1796
  +user: Proxies\__CG__\App\Entity\User {#1896 …}
  +magazine: App\Entity\Magazine {#266
    +icon: null
    +name: "guix@lemmy.ml"
    +title: "guix"
    +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
    +rules: null
    +subscriptionsCount: 1
    +entryCount: 10
    +entryCommentCount: 8
    +postCount: 0
    +postCommentCount: 0
    +isAdult: false
    +customCss: null
    +lastActive: DateTime @1727743868 {#276
      date: 2024-10-01 02:51:08.0 +02:00
    }
    +markedForDeletionAt: null
    +tags: null
    +moderators: Doctrine\ORM\PersistentCollection {#254 …}
    +ownershipRequests: Doctrine\ORM\PersistentCollection {#250 …}
    +moderatorRequests: Doctrine\ORM\PersistentCollection {#239 …}
    +entries: Doctrine\ORM\PersistentCollection {#197 …}
    +posts: Doctrine\ORM\PersistentCollection {#155 …}
    +subscriptions: Doctrine\ORM\PersistentCollection {#217 …}
    +bans: Doctrine\ORM\PersistentCollection {#134 …}
    +reports: Doctrine\ORM\PersistentCollection {#120 …}
    +badges: Doctrine\ORM\PersistentCollection {#98 …}
    +logs: Doctrine\ORM\PersistentCollection {#88 …}
    +awards: Doctrine\ORM\PersistentCollection {#77 …}
    +categories: Doctrine\ORM\PersistentCollection {#64 …}
    -id: 118
    +apId: "guix@lemmy.ml"
    +apProfileId: "https://lemmy.ml/c/guix"
    +apPublicUrl: "https://lemmy.ml/c/guix"
    +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
    +apInboxUrl: "https://lemmy.ml/inbox"
    +apDomain: "lemmy.ml"
    +apPreferredUsername: "guix"
    +apDiscoverable: true
    +apManuallyApprovesFollowers: null
    +privateKey: null
    +publicKey: null
    +apFetchedAt: DateTime @1703436704 {#270
      date: 2023-12-24 17:51:44.0 +01:00
    }
    +apDeletedAt: null
    +apTimeoutAt: null
    +visibility: "visible             "
    +createdAt: DateTimeImmutable @1703436703 {#272
      date: 2023-12-24 17:51:43.0 +01:00
    }
  }
  +image: null
  +domain: Proxies\__CG__\App\Entity\Domain {#1888 …}
  +slug: "How-to-luks-encrypt-raid-drive"
  +title: "How to luks encrypt raid drive?"
  +url: null
  +body: """
    Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
    \n
    So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
    \n
    ---\n
    \n
    In my system config file I added a raid drive like so:\n
    \n
    ```\n
    \n
    <span style="color:#323232;">(mapped-devices (list (mapped-device\n
    </span><span style="color:#323232;">                                     (source (uuid\n
    </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
    </span><span style="color:#323232;">                                     (target "guix")\n
    </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
    </span><span style="color:#323232;">\n
    </span><span style="color:#323232;">                                  (mapped-device\n
    </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
    </span><span style="color:#323232;">                                     (target "/dev/md0")\n
    </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
    </span><span style="color:#323232;">\n
    </span><span style="color:#323232;">(file-systems (cons* (file-system\n
    </span><span style="color:#323232;">                                  (mount-point "/")\n
    </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
    </span><span style="color:#323232;">                                  (type "ext4")\n
    </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
    </span><span style="color:#323232;">\n
    </span><span style="color:#323232;">                               (file-system\n
    </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
    </span><span style="color:#323232;">                                  (device "/dev/md0")\n
    </span><span style="color:#323232;">                                  (type "ext4")\n
    </span><span style="color:#323232;">                                  (mount? #f)\n
    </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
    </span>\n
    ```\n
    \n
    I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
    \n
    ```\n
    \n
    <span style="color:#323232;">(mapped-device\n
    </span><span style="color:#323232;">   (source (uuid\n
    </span><span style="color:#323232;">                {raid uuid}))\n
    </span><span style="color:#323232;">                (target "/dev/md0")\n
    </span><span style="color:#323232;">                (type luks-device-mapping))\n
    </span>\n
    ```\n
    \n
    and then pass that as a dependency to the raid file system object?\n
    \n
    Thanks
    """
  +type: "article"
  +lang: "en"
  +isOc: false
  +hasEmbed: false
  +commentCount: 6
  +favouriteCount: 7
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1711060515 {#1799
    date: 2024-03-21 23:35:15.0 +01:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#1887 …}
  +votes: Doctrine\ORM\PersistentCollection {#1950 …}
  +reports: Doctrine\ORM\PersistentCollection {#2425 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1903 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1898 …}
  +badges: Doctrine\ORM\PersistentCollection {#1904 …}
  +children: []
  -id: 26622
  -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
  -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1704181768
  +visibility: "visible             "
  +apId: "https://reddthat.com/post/11036859"
  +editedAt: DateTimeImmutable @1712607909 {#59
    date: 2024-04-08 22:25:09.0 +02:00
  }
  +createdAt: DateTimeImmutable @1704144268 {#1831
    date: 2024-01-01 22:24:28.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
4 DENIED moderate
App\Entity\Entry {#1796
  +user: Proxies\__CG__\App\Entity\User {#1896 …}
  +magazine: App\Entity\Magazine {#266
    +icon: null
    +name: "guix@lemmy.ml"
    +title: "guix"
    +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
    +rules: null
    +subscriptionsCount: 1
    +entryCount: 10
    +entryCommentCount: 8
    +postCount: 0
    +postCommentCount: 0
    +isAdult: false
    +customCss: null
    +lastActive: DateTime @1727743868 {#276
      date: 2024-10-01 02:51:08.0 +02:00
    }
    +markedForDeletionAt: null
    +tags: null
    +moderators: Doctrine\ORM\PersistentCollection {#254 …}
    +ownershipRequests: Doctrine\ORM\PersistentCollection {#250 …}
    +moderatorRequests: Doctrine\ORM\PersistentCollection {#239 …}
    +entries: Doctrine\ORM\PersistentCollection {#197 …}
    +posts: Doctrine\ORM\PersistentCollection {#155 …}
    +subscriptions: Doctrine\ORM\PersistentCollection {#217 …}
    +bans: Doctrine\ORM\PersistentCollection {#134 …}
    +reports: Doctrine\ORM\PersistentCollection {#120 …}
    +badges: Doctrine\ORM\PersistentCollection {#98 …}
    +logs: Doctrine\ORM\PersistentCollection {#88 …}
    +awards: Doctrine\ORM\PersistentCollection {#77 …}
    +categories: Doctrine\ORM\PersistentCollection {#64 …}
    -id: 118
    +apId: "guix@lemmy.ml"
    +apProfileId: "https://lemmy.ml/c/guix"
    +apPublicUrl: "https://lemmy.ml/c/guix"
    +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
    +apInboxUrl: "https://lemmy.ml/inbox"
    +apDomain: "lemmy.ml"
    +apPreferredUsername: "guix"
    +apDiscoverable: true
    +apManuallyApprovesFollowers: null
    +privateKey: null
    +publicKey: null
    +apFetchedAt: DateTime @1703436704 {#270
      date: 2023-12-24 17:51:44.0 +01:00
    }
    +apDeletedAt: null
    +apTimeoutAt: null
    +visibility: "visible             "
    +createdAt: DateTimeImmutable @1703436703 {#272
      date: 2023-12-24 17:51:43.0 +01:00
    }
  }
  +image: null
  +domain: Proxies\__CG__\App\Entity\Domain {#1888 …}
  +slug: "How-to-luks-encrypt-raid-drive"
  +title: "How to luks encrypt raid drive?"
  +url: null
  +body: """
    Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
    \n
    So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
    \n
    ---\n
    \n
    In my system config file I added a raid drive like so:\n
    \n
    ```\n
    \n
    <span style="color:#323232;">(mapped-devices (list (mapped-device\n
    </span><span style="color:#323232;">                                     (source (uuid\n
    </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
    </span><span style="color:#323232;">                                     (target "guix")\n
    </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
    </span><span style="color:#323232;">\n
    </span><span style="color:#323232;">                                  (mapped-device\n
    </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
    </span><span style="color:#323232;">                                     (target "/dev/md0")\n
    </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
    </span><span style="color:#323232;">\n
    </span><span style="color:#323232;">(file-systems (cons* (file-system\n
    </span><span style="color:#323232;">                                  (mount-point "/")\n
    </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
    </span><span style="color:#323232;">                                  (type "ext4")\n
    </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
    </span><span style="color:#323232;">\n
    </span><span style="color:#323232;">                               (file-system\n
    </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
    </span><span style="color:#323232;">                                  (device "/dev/md0")\n
    </span><span style="color:#323232;">                                  (type "ext4")\n
    </span><span style="color:#323232;">                                  (mount? #f)\n
    </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
    </span>\n
    ```\n
    \n
    I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
    \n
    ```\n
    \n
    <span style="color:#323232;">(mapped-device\n
    </span><span style="color:#323232;">   (source (uuid\n
    </span><span style="color:#323232;">                {raid uuid}))\n
    </span><span style="color:#323232;">                (target "/dev/md0")\n
    </span><span style="color:#323232;">                (type luks-device-mapping))\n
    </span>\n
    ```\n
    \n
    and then pass that as a dependency to the raid file system object?\n
    \n
    Thanks
    """
  +type: "article"
  +lang: "en"
  +isOc: false
  +hasEmbed: false
  +commentCount: 6
  +favouriteCount: 7
  +score: 0
  +isAdult: false
  +sticky: false
  +lastActive: DateTime @1711060515 {#1799
    date: 2024-03-21 23:35:15.0 +01:00
  }
  +ip: null
  +adaAmount: 0
  +tags: null
  +mentions: null
  +comments: Doctrine\ORM\PersistentCollection {#1887 …}
  +votes: Doctrine\ORM\PersistentCollection {#1950 …}
  +reports: Doctrine\ORM\PersistentCollection {#2425 …}
  +favourites: Doctrine\ORM\PersistentCollection {#1903 …}
  +notifications: Doctrine\ORM\PersistentCollection {#1898 …}
  +badges: Doctrine\ORM\PersistentCollection {#1904 …}
  +children: []
  -id: 26622
  -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
  -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
  +cross: false
  +upVotes: 0
  +downVotes: 0
  +ranking: 1704181768
  +visibility: "visible             "
  +apId: "https://reddthat.com/post/11036859"
  +editedAt: DateTimeImmutable @1712607909 {#59
    date: 2024-04-08 22:25:09.0 +02:00
  }
  +createdAt: DateTimeImmutable @1704144268 {#1831
    date: 2024-01-01 22:24:28.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS DENIED
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
5 DENIED ROLE_USER
null
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"Symfony\Component\Security\Core\Authorization\Voter\RoleHierarchyVoter"
ACCESS DENIED
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
6 DENIED moderate
App\Entity\EntryComment {#4009
  +user: App\Entity\User {#3958 …}
  +entry: App\Entity\Entry {#1796
    +user: Proxies\__CG__\App\Entity\User {#1896 …}
    +magazine: App\Entity\Magazine {#266
      +icon: null
      +name: "guix@lemmy.ml"
      +title: "guix"
      +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 10
      +entryCommentCount: 8
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1727743868 {#276
        date: 2024-10-01 02:51:08.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#254 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#250 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#239 …}
      +entries: Doctrine\ORM\PersistentCollection {#197 …}
      +posts: Doctrine\ORM\PersistentCollection {#155 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#217 …}
      +bans: Doctrine\ORM\PersistentCollection {#134 …}
      +reports: Doctrine\ORM\PersistentCollection {#120 …}
      +badges: Doctrine\ORM\PersistentCollection {#98 …}
      +logs: Doctrine\ORM\PersistentCollection {#88 …}
      +awards: Doctrine\ORM\PersistentCollection {#77 …}
      +categories: Doctrine\ORM\PersistentCollection {#64 …}
      -id: 118
      +apId: "guix@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/guix"
      +apPublicUrl: "https://lemmy.ml/c/guix"
      +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "guix"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703436704 {#270
        date: 2023-12-24 17:51:44.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703436703 {#272
        date: 2023-12-24 17:51:43.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1888 …}
    +slug: "How-to-luks-encrypt-raid-drive"
    +title: "How to luks encrypt raid drive?"
    +url: null
    +body: """
      Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
      \n
      So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
      \n
      ---\n
      \n
      In my system config file I added a raid drive like so:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-devices (list (mapped-device\n
      </span><span style="color:#323232;">                                     (source (uuid\n
      </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
      </span><span style="color:#323232;">                                     (target "guix")\n
      </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                                  (mapped-device\n
      </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
      </span><span style="color:#323232;">                                     (target "/dev/md0")\n
      </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">(file-systems (cons* (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/")\n
      </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                               (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
      </span><span style="color:#323232;">                                  (device "/dev/md0")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (mount? #f)\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
      </span>\n
      ```\n
      \n
      I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-device\n
      </span><span style="color:#323232;">   (source (uuid\n
      </span><span style="color:#323232;">                {raid uuid}))\n
      </span><span style="color:#323232;">                (target "/dev/md0")\n
      </span><span style="color:#323232;">                (type luks-device-mapping))\n
      </span>\n
      ```\n
      \n
      and then pass that as a dependency to the raid file system object?\n
      \n
      Thanks
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 6
    +favouriteCount: 7
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1711060515 {#1799
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1887 …}
    +votes: Doctrine\ORM\PersistentCollection {#1950 …}
    +reports: Doctrine\ORM\PersistentCollection {#2425 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1903 …}
    +notifications: Doctrine\ORM\PersistentCollection {#1898 …}
    +badges: Doctrine\ORM\PersistentCollection {#1904 …}
    +children: []
    -id: 26622
    -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
    -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704181768
    +visibility: "visible             "
    +apId: "https://reddthat.com/post/11036859"
    +editedAt: DateTimeImmutable @1712607909 {#59
      date: 2024-04-08 22:25:09.0 +02:00
    }
    +createdAt: DateTimeImmutable @1704144268 {#1831
      date: 2024-01-01 22:24:28.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: "You sure you want to use LUKS? It has a specific format that can be probed for almost like a known plain text."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1711060515 {#4018
    date: 2024-03-21 23:35:15.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@HulkSmashBurgers@reddthat.com"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4007 …}
  +nested: Doctrine\ORM\PersistentCollection {#4005 …}
  +votes: Doctrine\ORM\PersistentCollection {#4003 …}
  +reports: Doctrine\ORM\PersistentCollection {#4001 …}
  +favourites: Doctrine\ORM\PersistentCollection {#3969 …}
  +notifications: Doctrine\ORM\PersistentCollection {#3973 …}
  -id: 271876
  -bodyTs: "'almost':18 'format':12 'known':21 'like':19 'luk':7 'plain':22 'probe':16 'specif':11 'sure':2 'text':23 'use':6 'want':4"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://sh.itjust.works/comment/6990747"
  +editedAt: null
  +createdAt: DateTimeImmutable @1704145891 {#3950
    date: 2024-01-01 22:51:31.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
7 DENIED edit
App\Entity\EntryComment {#4009
  +user: App\Entity\User {#3958 …}
  +entry: App\Entity\Entry {#1796
    +user: Proxies\__CG__\App\Entity\User {#1896 …}
    +magazine: App\Entity\Magazine {#266
      +icon: null
      +name: "guix@lemmy.ml"
      +title: "guix"
      +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 10
      +entryCommentCount: 8
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1727743868 {#276
        date: 2024-10-01 02:51:08.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#254 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#250 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#239 …}
      +entries: Doctrine\ORM\PersistentCollection {#197 …}
      +posts: Doctrine\ORM\PersistentCollection {#155 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#217 …}
      +bans: Doctrine\ORM\PersistentCollection {#134 …}
      +reports: Doctrine\ORM\PersistentCollection {#120 …}
      +badges: Doctrine\ORM\PersistentCollection {#98 …}
      +logs: Doctrine\ORM\PersistentCollection {#88 …}
      +awards: Doctrine\ORM\PersistentCollection {#77 …}
      +categories: Doctrine\ORM\PersistentCollection {#64 …}
      -id: 118
      +apId: "guix@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/guix"
      +apPublicUrl: "https://lemmy.ml/c/guix"
      +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "guix"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703436704 {#270
        date: 2023-12-24 17:51:44.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703436703 {#272
        date: 2023-12-24 17:51:43.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1888 …}
    +slug: "How-to-luks-encrypt-raid-drive"
    +title: "How to luks encrypt raid drive?"
    +url: null
    +body: """
      Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
      \n
      So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
      \n
      ---\n
      \n
      In my system config file I added a raid drive like so:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-devices (list (mapped-device\n
      </span><span style="color:#323232;">                                     (source (uuid\n
      </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
      </span><span style="color:#323232;">                                     (target "guix")\n
      </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                                  (mapped-device\n
      </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
      </span><span style="color:#323232;">                                     (target "/dev/md0")\n
      </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">(file-systems (cons* (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/")\n
      </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                               (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
      </span><span style="color:#323232;">                                  (device "/dev/md0")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (mount? #f)\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
      </span>\n
      ```\n
      \n
      I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-device\n
      </span><span style="color:#323232;">   (source (uuid\n
      </span><span style="color:#323232;">                {raid uuid}))\n
      </span><span style="color:#323232;">                (target "/dev/md0")\n
      </span><span style="color:#323232;">                (type luks-device-mapping))\n
      </span>\n
      ```\n
      \n
      and then pass that as a dependency to the raid file system object?\n
      \n
      Thanks
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 6
    +favouriteCount: 7
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1711060515 {#1799
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1887 …}
    +votes: Doctrine\ORM\PersistentCollection {#1950 …}
    +reports: Doctrine\ORM\PersistentCollection {#2425 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1903 …}
    +notifications: Doctrine\ORM\PersistentCollection {#1898 …}
    +badges: Doctrine\ORM\PersistentCollection {#1904 …}
    +children: []
    -id: 26622
    -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
    -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704181768
    +visibility: "visible             "
    +apId: "https://reddthat.com/post/11036859"
    +editedAt: DateTimeImmutable @1712607909 {#59
      date: 2024-04-08 22:25:09.0 +02:00
    }
    +createdAt: DateTimeImmutable @1704144268 {#1831
      date: 2024-01-01 22:24:28.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: "You sure you want to use LUKS? It has a specific format that can be probed for almost like a known plain text."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1711060515 {#4018
    date: 2024-03-21 23:35:15.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@HulkSmashBurgers@reddthat.com"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4007 …}
  +nested: Doctrine\ORM\PersistentCollection {#4005 …}
  +votes: Doctrine\ORM\PersistentCollection {#4003 …}
  +reports: Doctrine\ORM\PersistentCollection {#4001 …}
  +favourites: Doctrine\ORM\PersistentCollection {#3969 …}
  +notifications: Doctrine\ORM\PersistentCollection {#3973 …}
  -id: 271876
  -bodyTs: "'almost':18 'format':12 'known':21 'like':19 'luk':7 'plain':22 'probe':16 'specif':11 'sure':2 'text':23 'use':6 'want':4"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://sh.itjust.works/comment/6990747"
  +editedAt: null
  +createdAt: DateTimeImmutable @1704145891 {#3950
    date: 2024-01-01 22:51:31.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
8 DENIED moderate
App\Entity\EntryComment {#4009
  +user: App\Entity\User {#3958 …}
  +entry: App\Entity\Entry {#1796
    +user: Proxies\__CG__\App\Entity\User {#1896 …}
    +magazine: App\Entity\Magazine {#266
      +icon: null
      +name: "guix@lemmy.ml"
      +title: "guix"
      +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
      +rules: null
      +subscriptionsCount: 1
      +entryCount: 10
      +entryCommentCount: 8
      +postCount: 0
      +postCommentCount: 0
      +isAdult: false
      +customCss: null
      +lastActive: DateTime @1727743868 {#276
        date: 2024-10-01 02:51:08.0 +02:00
      }
      +markedForDeletionAt: null
      +tags: null
      +moderators: Doctrine\ORM\PersistentCollection {#254 …}
      +ownershipRequests: Doctrine\ORM\PersistentCollection {#250 …}
      +moderatorRequests: Doctrine\ORM\PersistentCollection {#239 …}
      +entries: Doctrine\ORM\PersistentCollection {#197 …}
      +posts: Doctrine\ORM\PersistentCollection {#155 …}
      +subscriptions: Doctrine\ORM\PersistentCollection {#217 …}
      +bans: Doctrine\ORM\PersistentCollection {#134 …}
      +reports: Doctrine\ORM\PersistentCollection {#120 …}
      +badges: Doctrine\ORM\PersistentCollection {#98 …}
      +logs: Doctrine\ORM\PersistentCollection {#88 …}
      +awards: Doctrine\ORM\PersistentCollection {#77 …}
      +categories: Doctrine\ORM\PersistentCollection {#64 …}
      -id: 118
      +apId: "guix@lemmy.ml"
      +apProfileId: "https://lemmy.ml/c/guix"
      +apPublicUrl: "https://lemmy.ml/c/guix"
      +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
      +apInboxUrl: "https://lemmy.ml/inbox"
      +apDomain: "lemmy.ml"
      +apPreferredUsername: "guix"
      +apDiscoverable: true
      +apManuallyApprovesFollowers: null
      +privateKey: null
      +publicKey: null
      +apFetchedAt: DateTime @1703436704 {#270
        date: 2023-12-24 17:51:44.0 +01:00
      }
      +apDeletedAt: null
      +apTimeoutAt: null
      +visibility: "visible             "
      +createdAt: DateTimeImmutable @1703436703 {#272
        date: 2023-12-24 17:51:43.0 +01:00
      }
    }
    +image: null
    +domain: Proxies\__CG__\App\Entity\Domain {#1888 …}
    +slug: "How-to-luks-encrypt-raid-drive"
    +title: "How to luks encrypt raid drive?"
    +url: null
    +body: """
      Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
      \n
      So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
      \n
      ---\n
      \n
      In my system config file I added a raid drive like so:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-devices (list (mapped-device\n
      </span><span style="color:#323232;">                                     (source (uuid\n
      </span><span style="color:#323232;">                                                  "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
      </span><span style="color:#323232;">                                     (target "guix")\n
      </span><span style="color:#323232;">                                     (type luks-device-mapping))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                                  (mapped-device\n
      </span><span style="color:#323232;">                                     (source (list "/dev/sdb1" "/dev/sdc1"))\n
      </span><span style="color:#323232;">                                     (target "/dev/md0")\n
      </span><span style="color:#323232;">                                     (type raid-device-mapping))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">(file-systems (cons* (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/")\n
      </span><span style="color:#323232;">                                  (device "/dev/mapper/guix")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 0))))\n
      </span><span style="color:#323232;">\n
      </span><span style="color:#323232;">                               (file-system\n
      </span><span style="color:#323232;">                                  (mount-point "/mnt/nas")\n
      </span><span style="color:#323232;">                                  (device "/dev/md0")\n
      </span><span style="color:#323232;">                                  (type "ext4")\n
      </span><span style="color:#323232;">                                  (mount? #f)\n
      </span><span style="color:#323232;">                                  (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
      </span>\n
      ```\n
      \n
      I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
      \n
      ```\n
      \n
      <span style="color:#323232;">(mapped-device\n
      </span><span style="color:#323232;">   (source (uuid\n
      </span><span style="color:#323232;">                {raid uuid}))\n
      </span><span style="color:#323232;">                (target "/dev/md0")\n
      </span><span style="color:#323232;">                (type luks-device-mapping))\n
      </span>\n
      ```\n
      \n
      and then pass that as a dependency to the raid file system object?\n
      \n
      Thanks
      """
    +type: "article"
    +lang: "en"
    +isOc: false
    +hasEmbed: false
    +commentCount: 6
    +favouriteCount: 7
    +score: 0
    +isAdult: false
    +sticky: false
    +lastActive: DateTime @1711060515 {#1799
      date: 2024-03-21 23:35:15.0 +01:00
    }
    +ip: null
    +adaAmount: 0
    +tags: null
    +mentions: null
    +comments: Doctrine\ORM\PersistentCollection {#1887 …}
    +votes: Doctrine\ORM\PersistentCollection {#1950 …}
    +reports: Doctrine\ORM\PersistentCollection {#2425 …}
    +favourites: Doctrine\ORM\PersistentCollection {#1903 …}
    +notifications: Doctrine\ORM\PersistentCollection {#1898 …}
    +badges: Doctrine\ORM\PersistentCollection {#1904 …}
    +children: []
    -id: 26622
    -titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
    -bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
    +cross: false
    +upVotes: 0
    +downVotes: 0
    +ranking: 1704181768
    +visibility: "visible             "
    +apId: "https://reddthat.com/post/11036859"
    +editedAt: DateTimeImmutable @1712607909 {#59
      date: 2024-04-08 22:25:09.0 +02:00
    }
    +createdAt: DateTimeImmutable @1704144268 {#1831
      date: 2024-01-01 22:24:28.0 +01:00
    }
  }
  +magazine: App\Entity\Magazine {#266}
  +image: null
  +parent: null
  +root: null
  +body: "You sure you want to use LUKS? It has a specific format that can be probed for almost like a known plain text."
  +lang: "en"
  +isAdult: false
  +favouriteCount: 1
  +score: 0
  +lastActive: DateTime @1711060515 {#4018
    date: 2024-03-21 23:35:15.0 +01:00
  }
  +ip: null
  +tags: null
  +mentions: [
    "@HulkSmashBurgers@reddthat.com"
  ]
  +children: Doctrine\ORM\PersistentCollection {#4007 …}
  +nested: Doctrine\ORM\PersistentCollection {#4005 …}
  +votes: Doctrine\ORM\PersistentCollection {#4003 …}
  +reports: Doctrine\ORM\PersistentCollection {#4001 …}
  +favourites: Doctrine\ORM\PersistentCollection {#3969 …}
  +notifications: Doctrine\ORM\PersistentCollection {#3973 …}
  -id: 271876
  -bodyTs: "'almost':18 'format':12 'known':21 'like':19 'luk':7 'plain':22 'probe':16 'specif':11 'sure':2 'text':23 'use':6 'want':4"
  +ranking: 0
  +commentCount: 0
  +upVotes: 0
  +downVotes: 0
  +visibility: "visible             "
  +apId: "https://sh.itjust.works/comment/6990747"
  +editedAt: null
  +createdAt: DateTimeImmutable @1704145891 {#3950
    date: 2024-01-01 22:51:31.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS DENIED
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details
9 DENIED edit
App\Entity\Magazine {#266
  +icon: null
  +name: "guix@lemmy.ml"
  +title: "guix"
  +description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
  +rules: null
  +subscriptionsCount: 1
  +entryCount: 10
  +entryCommentCount: 8
  +postCount: 0
  +postCommentCount: 0
  +isAdult: false
  +customCss: null
  +lastActive: DateTime @1727743868 {#276
    date: 2024-10-01 02:51:08.0 +02:00
  }
  +markedForDeletionAt: null
  +tags: null
  +moderators: Doctrine\ORM\PersistentCollection {#254 …}
  +ownershipRequests: Doctrine\ORM\PersistentCollection {#250 …}
  +moderatorRequests: Doctrine\ORM\PersistentCollection {#239 …}
  +entries: Doctrine\ORM\PersistentCollection {#197 …}
  +posts: Doctrine\ORM\PersistentCollection {#155 …}
  +subscriptions: Doctrine\ORM\PersistentCollection {#217 …}
  +bans: Doctrine\ORM\PersistentCollection {#134 …}
  +reports: Doctrine\ORM\PersistentCollection {#120 …}
  +badges: Doctrine\ORM\PersistentCollection {#98 …}
  +logs: Doctrine\ORM\PersistentCollection {#88 …}
  +awards: Doctrine\ORM\PersistentCollection {#77 …}
  +categories: Doctrine\ORM\PersistentCollection {#64 …}
  -id: 118
  +apId: "guix@lemmy.ml"
  +apProfileId: "https://lemmy.ml/c/guix"
  +apPublicUrl: "https://lemmy.ml/c/guix"
  +apFollowersUrl: "https://lemmy.ml/c/guix/followers"
  +apInboxUrl: "https://lemmy.ml/inbox"
  +apDomain: "lemmy.ml"
  +apPreferredUsername: "guix"
  +apDiscoverable: true
  +apManuallyApprovesFollowers: null
  +privateKey: null
  +publicKey: null
  +apFetchedAt: DateTime @1703436704 {#270
    date: 2023-12-24 17:51:44.0 +01:00
  }
  +apDeletedAt: null
  +apTimeoutAt: null
  +visibility: "visible             "
  +createdAt: DateTimeImmutable @1703436703 {#272
    date: 2023-12-24 17:51:43.0 +01:00
  }
}
"Scheb\TwoFactorBundle\Security\Authorization\Voter\TwoFactorInProgressVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\EntryVoter"
ACCESS ABSTAIN
"App\Security\Voter\MagazineVoter"
ACCESS DENIED
"App\Security\Voter\MessageThreadVoter"
ACCESS ABSTAIN
"App\Security\Voter\MessageVoter"
ACCESS ABSTAIN
"App\Security\Voter\NotificationVoter"
ACCESS ABSTAIN
"App\Security\Voter\OAuth2UserConsentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostCommentVoter"
ACCESS ABSTAIN
"App\Security\Voter\PostVoter"
ACCESS ABSTAIN
"App\Security\Voter\UserVoter"
ACCESS ABSTAIN
Show voter details