Easiest is probably to put 'em both in a VG and have a single LUKS+btrfs LV, but I’d prefer the information that there are two drives to propagate to the FS level.
Anw! It turns out that searching for “encrypted btrfs root add disk” yielded a bunch more results. This person got through all the bits I’m worried about, but had to enter their password twice:
Two apparent successes that I can’t grasp enough to confidently apply:
Obv this is far, far easier with separate /boot, but I remember that doing that on Tumbleweed means no boot-to-snapshot. Hrm.
Do not use GRUB if your rootfs is split across 2+ disks and those aren’t on a single VG. It will fail to boot. systemd-boot works fine.
On that note: since sdbootutil shifts the kernel + initramfs into /boot/efi, LUKS unlocking would be done in userspace and thus have password reuse - hallelujah!
Hey there ! So, I’ve read your topic (after receiving a notification for the link) and I can give you a bit more information:
I wanted to avoid using the TPM altogether because it’s not something I want to trust (even with the rights PCR): that’s a personal opinion, but I do feel that using a prompter password at boot to unlock the disk is safer.
My setup is this one on your list:
password LUKS + systemd-boot + autologin + kwallet password passthrough (highly recommended if you have 2+ disks)
I do use systemd, I have the prompt that is asked by plymouth (it is acceptable in terms of design) and I have SDDM with autologin enabled. I only type my password once at boot, the session wallet is opened automatically.