I'm not sure what vaultlocker is. trigger might be appropriate together with a '--settle' flag, if/where available.
instead of manually opening things, i'd expect crypttab to be adjusted with `systemctl daemon-reload` re-run to regenerated systemd-cryptsetup@ units and "open" the encrytped device using systemd-cryptsetup@ instance unit.... However that might be "too" systemd specific for vaultcrypt upstream... If one injects uuid onto a drive, it might not generate any kernel udev events for udevd to react to and create/update symlinks. It would be nice to have an interleaved log of udev events from udevadm monitor, to see if there are any events emitted after "format" action is done. If there are none, then vaultlocker needs to be fixed to trigger things. ** Also affects: systemd (Ubuntu) Importance: Undecided Status: New ** Changed in: cryptsetup (Ubuntu) Status: New => Incomplete ** Changed in: systemd (Ubuntu) Status: New => Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1780332 Title: vaultlocker does not ensure that udev is triggered to create /dev/disk /by-uuid/<uuid-in-luks-header> symlink and fails To manage notifications about this bug go to: https://bugs.launchpad.net/vaultlocker/+bug/1780332/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs