2 |
DENIED
|
moderate
|
App\Entity\Entry {#1770
+user: Proxies\__CG__\App\Entity\User {#1959 …}
+magazine: App\Entity\Magazine {#316
+icon: null
+name: "guix@lemmy.ml"
+title: "guix"
+description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
+rules: null
+subscriptionsCount: 1
+entryCount: 10
+entryCommentCount: 8
+postCount: 0
+postCommentCount: 0
+isAdult: false
+customCss: null
+lastActive: DateTime @1727743868 {#326
date: 2024-10-01 02:51:08.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#304 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#300 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#289 …}
+entries: Doctrine\ORM\PersistentCollection {#247 …}
+posts: Doctrine\ORM\PersistentCollection {#205 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#267 …}
+bans: Doctrine\ORM\PersistentCollection {#184 …}
+reports: Doctrine\ORM\PersistentCollection {#170 …}
+badges: Doctrine\ORM\PersistentCollection {#148 …}
+logs: Doctrine\ORM\PersistentCollection {#138 …}
+awards: Doctrine\ORM\PersistentCollection {#127 …}
+categories: Doctrine\ORM\PersistentCollection {#114 …}
-id: 118
+apId: "guix@lemmy.ml"
+apProfileId: "https://lemmy.ml/c/guix"
+apPublicUrl: "https://lemmy.ml/c/guix"
+apFollowersUrl: "https://lemmy.ml/c/guix/followers"
+apInboxUrl: "https://lemmy.ml/inbox"
+apDomain: "lemmy.ml"
+apPreferredUsername: "guix"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1703436704 {#320
date: 2023-12-24 17:51:44.0 +01:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1703436703 {#319
date: 2023-12-24 17:51:43.0 +01:00
}
}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2418 …}
+slug: "How-to-luks-encrypt-raid-drive"
+title: "How to luks encrypt raid drive?"
+url: null
+body: """
Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
\n
So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
\n
---\n
\n
In my system config file I added a raid drive like so:\n
\n
```\n
\n
<span style="color:#323232;">(mapped-devices (list (mapped-device\n
</span><span style="color:#323232;"> (source (uuid\n
</span><span style="color:#323232;"> "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
</span><span style="color:#323232;"> (target "guix")\n
</span><span style="color:#323232;"> (type luks-device-mapping))\n
</span><span style="color:#323232;">\n
</span><span style="color:#323232;"> (mapped-device\n
</span><span style="color:#323232;"> (source (list "/dev/sdb1" "/dev/sdc1"))\n
</span><span style="color:#323232;"> (target "/dev/md0")\n
</span><span style="color:#323232;"> (type raid-device-mapping))))\n
</span><span style="color:#323232;">\n
</span><span style="color:#323232;">(file-systems (cons* (file-system\n
</span><span style="color:#323232;"> (mount-point "/")\n
</span><span style="color:#323232;"> (device "/dev/mapper/guix")\n
</span><span style="color:#323232;"> (type "ext4")\n
</span><span style="color:#323232;"> (dependencies (list (list-ref mapped-devices 0))))\n
</span><span style="color:#323232;">\n
</span><span style="color:#323232;"> (file-system\n
</span><span style="color:#323232;"> (mount-point "/mnt/nas")\n
</span><span style="color:#323232;"> (device "/dev/md0")\n
</span><span style="color:#323232;"> (type "ext4")\n
</span><span style="color:#323232;"> (mount? #f)\n
</span><span style="color:#323232;"> (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
</span>\n
```\n
\n
I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
\n
```\n
\n
<span style="color:#323232;">(mapped-device\n
</span><span style="color:#323232;"> (source (uuid\n
</span><span style="color:#323232;"> {raid uuid}))\n
</span><span style="color:#323232;"> (target "/dev/md0")\n
</span><span style="color:#323232;"> (type luks-device-mapping))\n
</span>\n
```\n
\n
and then pass that as a dependency to the raid file system object?\n
\n
Thanks
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 6
+favouriteCount: 7
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1711060515 {#1870
date: 2024-03-21 23:35:15.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2406 …}
+votes: Doctrine\ORM\PersistentCollection {#1972 …}
+reports: Doctrine\ORM\PersistentCollection {#1849 …}
+favourites: Doctrine\ORM\PersistentCollection {#1877 …}
+notifications: Doctrine\ORM\PersistentCollection {#1966 …}
+badges: Doctrine\ORM\PersistentCollection {#1934 …}
+children: []
-id: 26622
-titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
-bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704181768
+visibility: "visible "
+apId: "https://reddthat.com/post/11036859"
+editedAt: DateTimeImmutable @1712607909 {#118
date: 2024-04-08 22:25:09.0 +02:00
}
+createdAt: DateTimeImmutable @1704144268 {#1869
date: 2024-01-01 22:24:28.0 +01:00
}
} |
3 |
DENIED
|
edit
|
App\Entity\Entry {#1770
+user: Proxies\__CG__\App\Entity\User {#1959 …}
+magazine: App\Entity\Magazine {#316
+icon: null
+name: "guix@lemmy.ml"
+title: "guix"
+description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
+rules: null
+subscriptionsCount: 1
+entryCount: 10
+entryCommentCount: 8
+postCount: 0
+postCommentCount: 0
+isAdult: false
+customCss: null
+lastActive: DateTime @1727743868 {#326
date: 2024-10-01 02:51:08.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#304 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#300 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#289 …}
+entries: Doctrine\ORM\PersistentCollection {#247 …}
+posts: Doctrine\ORM\PersistentCollection {#205 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#267 …}
+bans: Doctrine\ORM\PersistentCollection {#184 …}
+reports: Doctrine\ORM\PersistentCollection {#170 …}
+badges: Doctrine\ORM\PersistentCollection {#148 …}
+logs: Doctrine\ORM\PersistentCollection {#138 …}
+awards: Doctrine\ORM\PersistentCollection {#127 …}
+categories: Doctrine\ORM\PersistentCollection {#114 …}
-id: 118
+apId: "guix@lemmy.ml"
+apProfileId: "https://lemmy.ml/c/guix"
+apPublicUrl: "https://lemmy.ml/c/guix"
+apFollowersUrl: "https://lemmy.ml/c/guix/followers"
+apInboxUrl: "https://lemmy.ml/inbox"
+apDomain: "lemmy.ml"
+apPreferredUsername: "guix"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1703436704 {#320
date: 2023-12-24 17:51:44.0 +01:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1703436703 {#319
date: 2023-12-24 17:51:43.0 +01:00
}
}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2418 …}
+slug: "How-to-luks-encrypt-raid-drive"
+title: "How to luks encrypt raid drive?"
+url: null
+body: """
Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
\n
So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
\n
---\n
\n
In my system config file I added a raid drive like so:\n
\n
```\n
\n
<span style="color:#323232;">(mapped-devices (list (mapped-device\n
</span><span style="color:#323232;"> (source (uuid\n
</span><span style="color:#323232;"> "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
</span><span style="color:#323232;"> (target "guix")\n
</span><span style="color:#323232;"> (type luks-device-mapping))\n
</span><span style="color:#323232;">\n
</span><span style="color:#323232;"> (mapped-device\n
</span><span style="color:#323232;"> (source (list "/dev/sdb1" "/dev/sdc1"))\n
</span><span style="color:#323232;"> (target "/dev/md0")\n
</span><span style="color:#323232;"> (type raid-device-mapping))))\n
</span><span style="color:#323232;">\n
</span><span style="color:#323232;">(file-systems (cons* (file-system\n
</span><span style="color:#323232;"> (mount-point "/")\n
</span><span style="color:#323232;"> (device "/dev/mapper/guix")\n
</span><span style="color:#323232;"> (type "ext4")\n
</span><span style="color:#323232;"> (dependencies (list (list-ref mapped-devices 0))))\n
</span><span style="color:#323232;">\n
</span><span style="color:#323232;"> (file-system\n
</span><span style="color:#323232;"> (mount-point "/mnt/nas")\n
</span><span style="color:#323232;"> (device "/dev/md0")\n
</span><span style="color:#323232;"> (type "ext4")\n
</span><span style="color:#323232;"> (mount? #f)\n
</span><span style="color:#323232;"> (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
</span>\n
```\n
\n
I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
\n
```\n
\n
<span style="color:#323232;">(mapped-device\n
</span><span style="color:#323232;"> (source (uuid\n
</span><span style="color:#323232;"> {raid uuid}))\n
</span><span style="color:#323232;"> (target "/dev/md0")\n
</span><span style="color:#323232;"> (type luks-device-mapping))\n
</span>\n
```\n
\n
and then pass that as a dependency to the raid file system object?\n
\n
Thanks
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 6
+favouriteCount: 7
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1711060515 {#1870
date: 2024-03-21 23:35:15.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2406 …}
+votes: Doctrine\ORM\PersistentCollection {#1972 …}
+reports: Doctrine\ORM\PersistentCollection {#1849 …}
+favourites: Doctrine\ORM\PersistentCollection {#1877 …}
+notifications: Doctrine\ORM\PersistentCollection {#1966 …}
+badges: Doctrine\ORM\PersistentCollection {#1934 …}
+children: []
-id: 26622
-titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
-bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704181768
+visibility: "visible "
+apId: "https://reddthat.com/post/11036859"
+editedAt: DateTimeImmutable @1712607909 {#118
date: 2024-04-08 22:25:09.0 +02:00
}
+createdAt: DateTimeImmutable @1704144268 {#1869
date: 2024-01-01 22:24:28.0 +01:00
}
} |
4 |
DENIED
|
moderate
|
App\Entity\Entry {#1770
+user: Proxies\__CG__\App\Entity\User {#1959 …}
+magazine: App\Entity\Magazine {#316
+icon: null
+name: "guix@lemmy.ml"
+title: "guix"
+description: "Guix is an advanced distribution of the GNU operating system developed by the GNU Project"
+rules: null
+subscriptionsCount: 1
+entryCount: 10
+entryCommentCount: 8
+postCount: 0
+postCommentCount: 0
+isAdult: false
+customCss: null
+lastActive: DateTime @1727743868 {#326
date: 2024-10-01 02:51:08.0 +02:00
}
+markedForDeletionAt: null
+tags: null
+moderators: Doctrine\ORM\PersistentCollection {#304 …}
+ownershipRequests: Doctrine\ORM\PersistentCollection {#300 …}
+moderatorRequests: Doctrine\ORM\PersistentCollection {#289 …}
+entries: Doctrine\ORM\PersistentCollection {#247 …}
+posts: Doctrine\ORM\PersistentCollection {#205 …}
+subscriptions: Doctrine\ORM\PersistentCollection {#267 …}
+bans: Doctrine\ORM\PersistentCollection {#184 …}
+reports: Doctrine\ORM\PersistentCollection {#170 …}
+badges: Doctrine\ORM\PersistentCollection {#148 …}
+logs: Doctrine\ORM\PersistentCollection {#138 …}
+awards: Doctrine\ORM\PersistentCollection {#127 …}
+categories: Doctrine\ORM\PersistentCollection {#114 …}
-id: 118
+apId: "guix@lemmy.ml"
+apProfileId: "https://lemmy.ml/c/guix"
+apPublicUrl: "https://lemmy.ml/c/guix"
+apFollowersUrl: "https://lemmy.ml/c/guix/followers"
+apInboxUrl: "https://lemmy.ml/inbox"
+apDomain: "lemmy.ml"
+apPreferredUsername: "guix"
+apDiscoverable: true
+apManuallyApprovesFollowers: null
+privateKey: null
+publicKey: null
+apFetchedAt: DateTime @1703436704 {#320
date: 2023-12-24 17:51:44.0 +01:00
}
+apDeletedAt: null
+apTimeoutAt: null
+visibility: "visible "
+createdAt: DateTimeImmutable @1703436703 {#319
date: 2023-12-24 17:51:43.0 +01:00
}
}
+image: null
+domain: Proxies\__CG__\App\Entity\Domain {#2418 …}
+slug: "How-to-luks-encrypt-raid-drive"
+title: "How to luks encrypt raid drive?"
+url: null
+body: """
Edit: Turns out for what I’m trying to do (mount luks encrypted raid after start up) only needs the device mapping for the raid drive and not a file-system object.\n
\n
So I luks encrypted the raid and call a script to open the vault and mount it when I need to.\n
\n
---\n
\n
In my system config file I added a raid drive like so:\n
\n
```\n
\n
<span style="color:#323232;">(mapped-devices (list (mapped-device\n
</span><span style="color:#323232;"> (source (uuid\n
</span><span style="color:#323232;"> "205e5caa-694f-4457-a2a1-8affa3536e75"))\n
</span><span style="color:#323232;"> (target "guix")\n
</span><span style="color:#323232;"> (type luks-device-mapping))\n
</span><span style="color:#323232;">\n
</span><span style="color:#323232;"> (mapped-device\n
</span><span style="color:#323232;"> (source (list "/dev/sdb1" "/dev/sdc1"))\n
</span><span style="color:#323232;"> (target "/dev/md0")\n
</span><span style="color:#323232;"> (type raid-device-mapping))))\n
</span><span style="color:#323232;">\n
</span><span style="color:#323232;">(file-systems (cons* (file-system\n
</span><span style="color:#323232;"> (mount-point "/")\n
</span><span style="color:#323232;"> (device "/dev/mapper/guix")\n
</span><span style="color:#323232;"> (type "ext4")\n
</span><span style="color:#323232;"> (dependencies (list (list-ref mapped-devices 0))))\n
</span><span style="color:#323232;">\n
</span><span style="color:#323232;"> (file-system\n
</span><span style="color:#323232;"> (mount-point "/mnt/nas")\n
</span><span style="color:#323232;"> (device "/dev/md0")\n
</span><span style="color:#323232;"> (type "ext4")\n
</span><span style="color:#323232;"> (mount? #f)\n
</span><span style="color:#323232;"> (dependencies (list (list-ref mapped-devices 1)))) %base-file-systems)))\n
</span>\n
```\n
\n
I’d now like to luks encrypt the raid drive but I’m not sure how to go about doing it. Do I simply make a another mapped-device object, specifying the raid drive uuid and “/dev/md0” as the target:\n
\n
```\n
\n
<span style="color:#323232;">(mapped-device\n
</span><span style="color:#323232;"> (source (uuid\n
</span><span style="color:#323232;"> {raid uuid}))\n
</span><span style="color:#323232;"> (target "/dev/md0")\n
</span><span style="color:#323232;"> (type luks-device-mapping))\n
</span>\n
```\n
\n
and then pass that as a dependency to the raid file system object?\n
\n
Thanks
"""
+type: "article"
+lang: "en"
+isOc: false
+hasEmbed: false
+commentCount: 6
+favouriteCount: 7
+score: 0
+isAdult: false
+sticky: false
+lastActive: DateTime @1711060515 {#1870
date: 2024-03-21 23:35:15.0 +01:00
}
+ip: null
+adaAmount: 0
+tags: null
+mentions: null
+comments: Doctrine\ORM\PersistentCollection {#2406 …}
+votes: Doctrine\ORM\PersistentCollection {#1972 …}
+reports: Doctrine\ORM\PersistentCollection {#1849 …}
+favourites: Doctrine\ORM\PersistentCollection {#1877 …}
+notifications: Doctrine\ORM\PersistentCollection {#1966 …}
+badges: Doctrine\ORM\PersistentCollection {#1934 …}
+children: []
-id: 26622
-titleTs: "'drive':6 'encrypt':4 'luk':3 'raid':5"
-bodyTs: "'/dev/mapper/guix':116 '/dev/md0':99,136,191,203 '/dev/sdb1':96 '/dev/sdc1':97 '/mnt/nas':134 '0':127 '1':149 '205e5':76 '4457':80 '694f':79 '8affa3536e75':83 'a2a1':82 'a2a1-8affa3536e75':81 'ad':61 'anoth':180 'base':151 'base-file-system':150 'caa':78 'caa-694f':77 'call':41 'con':108 'config':58 'd':155 'depend':119,141,215 'devic':21,69,73,89,93,103,115,126,135,148,183,197,207 'drive':26,64,163,188 'edit':1 'encrypt':13,37,160 'ext4':118,138 'f':140 'file':31,59,106,110,129,152,219 'file-system':30,105,109,128 'go':171 'guix':85 'like':65,157 'list':70,95,120,122,142,144 'list-ref':121,143 'luk':12,36,88,159,206 'luks-device-map':87,205 'm':7,166 'make':178 'map':22,68,72,90,92,104,125,147,182,196,208 'mapped-devic':67,71,91,124,146,181,195 'mount':11,49,113,132,139 'mount-point':112,131 'need':19,53 'object':33,184,221 'open':45 'pass':211 'point':114,133 'raid':14,25,39,63,102,162,187,200,218 'raid-device-map':101 'ref':123,145 'script':43 'simpli':177 'sourc':74,94,198 'specifi':185 'start':16 'sure':168 'system':32,57,107,111,130,153,220 'target':84,98,194,202 'thank':222 'tri':8 'turn':2 'type':86,100,117,137,204 'uuid':75,189,199,201 'vault':47"
+cross: false
+upVotes: 0
+downVotes: 0
+ranking: 1704181768
+visibility: "visible "
+apId: "https://reddthat.com/post/11036859"
+editedAt: DateTimeImmutable @1712607909 {#118
date: 2024-04-08 22:25:09.0 +02:00
}
+createdAt: DateTimeImmutable @1704144268 {#1869
date: 2024-01-01 22:24:28.0 +01:00
}
} |