···316316 # installer. This ensures the target disk (/dev/vda) is
317317 # the same during and after installation.
318318 virtualisation.emptyDiskImages = [ 512 ];
319319- virtualisation.bootDevice =
319319+ virtualisation.rootDevice =
320320 if grubVersion == 1 then "/dev/disk/by-id/scsi-0QEMU_QEMU_HARDDISK_drive2" else "/dev/vdb";
321321+ virtualisation.bootLoaderDevice = "/dev/vda";
321322 virtualisation.qemu.diskInterface =
322323 if grubVersion == 1 then "scsi" else "virtio";
323324
+4-4
nixos/tests/luks.nix
···1818 boot-luks.configuration = {
1919 boot.initrd.luks.devices = lib.mkVMOverride {
2020 # We have two disks and only type one password - key reuse is in place
2121- cryptroot.device = "/dev/vdc";
2222- cryptroot2.device = "/dev/vdd";
2121+ cryptroot.device = "/dev/vdb";
2222+ cryptroot2.device = "/dev/vdc";
2323 };
2424- virtualisation.bootDevice = "/dev/mapper/cryptroot";
2424+ virtualisation.rootDevice = "/dev/mapper/cryptroot";
2525 };
2626 boot-luks-custom-keymap.configuration = lib.mkMerge [
2727 boot-luks.configuration
···3737 testScript = ''
3838 # Create encrypted volume
3939 machine.wait_for_unit("multi-user.target")
4040+ machine.succeed("echo -n supersecret | cryptsetup luksFormat -q --iter-time=1 /dev/vdb -")
4041 machine.succeed("echo -n supersecret | cryptsetup luksFormat -q --iter-time=1 /dev/vdc -")
4141- machine.succeed("echo -n supersecret | cryptsetup luksFormat -q --iter-time=1 /dev/vdd -")
42424343 # Boot from the encrypted disk
4444 machine.succeed("bootctl set-default nixos-generation-1-specialisation-boot-luks.conf")