From eaae8c84b8c945e1fa7ab1fe4bcf4696d3850bab Mon Sep 17 00:00:00 2001 From: Suikan <26223147+suikan4github@users.noreply.github.com> Date: Thu, 1 Jul 2021 15:18:29 +0900 Subject: [PATCH] Removed archive --- archive/ubuntu/1-pre-install.sh | 233 -------------------------- archive/ubuntu/2-para-install.sh | 38 ----- archive/ubuntu/3-post-install.sh | 66 -------- archive/voidlinux/1-pre-install.sh | 242 ---------------------------- archive/voidlinux/2-para-install.sh | 38 ----- archive/voidlinux/3-post-install.sh | 73 --------- 6 files changed, 690 deletions(-) delete mode 100644 archive/ubuntu/1-pre-install.sh delete mode 100644 archive/ubuntu/2-para-install.sh delete mode 100644 archive/ubuntu/3-post-install.sh delete mode 100644 archive/voidlinux/1-pre-install.sh delete mode 100644 archive/voidlinux/2-para-install.sh delete mode 100644 archive/voidlinux/3-post-install.sh diff --git a/archive/ubuntu/1-pre-install.sh b/archive/ubuntu/1-pre-install.sh deleted file mode 100644 index 921334b..0000000 --- a/archive/ubuntu/1-pre-install.sh +++ /dev/null @@ -1,233 +0,0 @@ -#!/bin/bash - -# Storage device to install the linux. -export DEV="/dev/sda" - -# Whether you want to erase all contents of the storage device or not. -# 1 : Yes, I want to erase all. -# 0 : No, I don't. I want to add to the existing LUKS volume. -export ERASEALL=1 - -# Logical Volume name for your Linux installation. Keep it unique from other distribution. -export LVROOTNAME="ubuntu" - -# Logical volume size of the Linux installation. -# 30% mean, new logical volume will use 30% of the free space in the LVM volume group. -# For example, assume the free space is 100GB, and LVROOTSIZE is 30%FREE. Script will create 30GB logical volume. -export LVROOTSIZE="50%FREE" - -# Set the size of EFI partition and swap partition. The unit is Byte. you can use M,G... notation. -export EFISIZE="100M" -export LVSWAPSIZE="8G" - -# Usually, these names can be left untouched. -# If you change, keep them consistent through all instllation in your system. -export CRYPTPARTNAME="luks_volume" -export VGNAME="vg1" -export LVSWAPNAME="swap" - -# ********************** DO NOT edit following lines ****************************** - -# Detect firmware type. 1 : EFI, 0 : BIOS -if [ -d /sys/firmware/efi ]; then -export ISEFI=1 # Yes, EFI -else -export ISEFI=0 # No, BIOS -fi # is EFI firmaare? - -# Set partition number based on the firmware type -if [ ${ISEFI} -eq 1 ] ; then -# EFI firmware -export EFIPARTITION=1 -export CRYPTPARTITION=2 -else -# BIOS firmware -export CRYPTPARTITION=1 -fi # EFI firmware - - -# Varidate whether script is executed as sourced or not -(return 0 2>/dev/null) && sourced=1 || sourced=0 -if [ $sourced -eq 0 ] ; then - cat <&2 -***** ERROR : Must execute as source ***** -Execute as following : -source 1-pre-install.sh - -Installation terminated. -HEREDOC - exit # use "exit" instead of "return", if not "sourced" execusion -fi # "sourced" validation - - - -# ----- Confirmations ----- -# Distribution check -uname -a | grep ubuntu -i > /dev/null -if [ $? -eq 1 ] ; then # "Ubuntu" is not found in the OS name. - echo "*********************************************************************************" - uname -a - cat <&2 - -Installation terminated. -HEREDOC - return - fi # if YES - -fi # "Ubuntu" is not found in the OS name. - -# For surre ask the config.sh is edited -echo "Did you edit config.sys? Are you ready to install? [Y/N]" -read YESNO -if [ ${YESNO} != "Y" -a ${YESNO} != "y" ] ; then - cat <&2 - -Installation terminated. -HEREDOC - return -fi # if YES - -# For sure ask ready to erase. -if [ ${ERASEALL} -eq 1 ] ; then - echo "Are you sure you want to erase entire ${DEV}? [Y/N]" - read YESNO - if [ ${YESNO} != "Y" -a ${YESNO} != "y" ] ; then - cat <&2 -Check config.sh. The variable ERASEALL is ${ERASEALL}. - -Installation terminated. -HEREDOC - return - fi # if YES -fi # if erase all - -# ----- Set Passphrase ----- -# Input passphrase -echo "Type passphrase for the disk encryption." -read -sr PASSPHRASE -export PASSPHRASE - -echo "Type passphrase again, to confirm." -read -sr PASSPHRASE_C - -# Validate whether both are indentical or not -if [ ${PASSPHRASE} != ${PASSPHRASE_C} ] ; then - cat <&2 -***** ERROR : Passphrase doesn't match ***** -Installation terminated. -HEREDOC - return -fi # passphrase validation - - -# ----- Erase entire disk, create partitions, format them and encrypt the LUKS partition ----- -if [ ${ERASEALL} -eq 1 ] ; then - - # Assign specified space and rest of disk to the EFI and LUKS partition, respectively. - if [ ${ISEFI} -eq 1 ] ; then - # Zap existing partition table and create new GPT - echo "...Initialize ${DEV} with GPT." - sgdisk --zap-all "${DEV}" - # Create EFI partition and format it - echo "...Create an EFI partition on ${DEV}." - sgdisk --new=${EFIPARTITION}:0:+${EFISIZE} --change-name=${EFIPARTITION}:"EFI System" --typecode=${EFIPARTITION}:ef00 "${DEV}" - echo "...Format the EFI parttion." - mkfs.vfat -F 32 -n EFI-SP "${DEV}${EFIPARTITION}" - # Create Linux partition - echo "...Create a Linux partition on ${DEV}." - sgdisk --new=${CRYPTPARTITION}:0:0 --change-name=${CRYPTPARTITION}:"Linux LUKS" --typecode=${CRYPTPARTITION}:8309 "${DEV}" - # Then print them - sgdisk --print "${DEV}" - else - # Zap existing partition table - echo "...Erase partition table of ${DEV}." - dd if=/dev/zero of=${DEV} bs=512 count=1 - # Create MBR and allocate max storage for Linux partition - echo "...Create a Linux partition on ${DEV} with MBR." - sfdisk ${DEV} <&2 -***** ERROR : Cannot open LUKS volume "${CRYPTPARTNAME}" on ${DEV}${CRYPTPARTITION}. ***** -Check passphrase and config.txt - -Installation terminated. -HEREDOC - return -fi # if crypt volume is unable to open - -# ----- Configure the LVM in LUKS volume ----- -# Check volume group ${VGNAME} exist or not -vgdisplay -s ${VGNAME} &> /dev/null -if [ $? -eq 0 ] ; then # is return value 0? ( exist ?) - echo "...Volume group ${VGNAME} already exist. Skipped to create. No problem." -else - echo "...Initialize a physical volume on \"${CRYPTPARTNAME}\"" - pvcreate /dev/mapper/${CRYPTPARTNAME} - echo "...And then create Volume group \"${VGNAME}\"." - vgcreate ${VGNAME} /dev/mapper/${CRYPTPARTNAME} -fi # if /dev/volume-groupt not exist - -# Create a SWAP Logical Volume on VG, if it doesn't exist -if [ -e /dev/mapper/${VGNAME}-${LVSWAPNAME} ] ; then - echo "...Swap volume already exist. Skipped to create. No problem." -else - echo "...Create logical volume \"${LVSWAPNAME}\" on \"${VGNAME}\"." - lvcreate -L ${LVSWAPSIZE} -n ${LVSWAPNAME} ${VGNAME} -fi # if /dev/mapper/swap volume already exit. - -# Create a ROOT Logical Volume on VG. -if [ -e /dev/mapper/${VGNAME}-${LVROOTNAME} ] ; then - cat <&2 -***** ERROR : Logical volume "${VGNAME}-${LVROOTNAME}" already exists. ***** -Check LVROOTNAME environment variable in config.txt. - -Installation terminated. -HEREDOC - return -else - echo "...Create logical volume \"${LVROOTNAME}\" on \"${VGNAME}\"." - lvcreate -l ${LVROOTSIZE} -n ${LVROOTNAME} ${VGNAME} -fi # if the root volun already exist - -# Finishing message -if [ ${ISEFI} -eq 1 ] ; then - cat </dev/null) && sourced=1 || sourced=0 -if [ $sourced -eq 0 ] ; then - cat <&2 -***** ERROR : Must execute as source ***** -Execute as following : -source 2-para-install.sh - -Installation terminated. -HEREDOC - exit # use "exit" instead of "return", if not "sourced" execusion -fi # "sourced" validation - - -# Check whether grub configuration file is ready to write -if [ ! -e /target/etc/default/grub ] ; then - cat <&2 -***** ERROR : The /target/etc/default/grub is not ready. ***** -Perhaps, too early to execute this script. - -Installation terminated. -HEREDOC - return -fi # if grub file exists - -# Make target GRUB aware to the crypt partition -echo "...Add GRUB_ENABLE_CRYPTODISK entry to /target/etc/default/grub " -echo "GRUB_ENABLE_CRYPTODISK=y" >> /target/etc/default/grub - -# Finishing message -cat </dev/null) && sourced=1 || sourced=0 -if [ $sourced -eq 0 ] ; then - cat <&2 -***** ERROR : Must execute as source ***** -Execute as following : -source 3-post-install.sh - -Installation terminated. -HEREDOC - exit # use "exit" instead of "return", if not "sourced" execusion -fi # "sourced" validation - -## Mount the target file system -# /target is created by the Ubiquity installer -echo "...Mount /dev/mapper/${VGNAME}-${LVROOTNAME} on /target." -mount /dev/mapper/${VGNAME}-${LVROOTNAME} /target - -# And mount other directories -echo "...Mount all other dirs." -for n in proc sys dev etc/resolv.conf; do mount --rbind "/$n" "/target/$n"; done - -# Change root and create the keyfile and ramfs image for Linux kernel. -echo "...Chroot to /target." -cat <> /etc/cryptsetup-initramfs/conf-hook -echo "UMASK=0077" >> /etc/initramfs-tools/initramfs.conf - -# Prepare a key file to embed in to the ramfs. -echo "...Prepair key file." -mkdir /etc/luks -dd if=/dev/urandom of=/etc/luks/boot_os.keyfile bs=4096 count=1 status=none -chmod u=rx,go-rwx /etc/luks -chmod u=r,go-rwx /etc/luks/boot_os.keyfile - -# Add a key to the key file. Use the passphrase in the environment variable. -echo "...Add a key to the key file." -printf %s "${PASSPHRASE}" | cryptsetup luksAddKey -d - "${DEV}${CRYPTPARTITION}" /etc/luks/boot_os.keyfile - -# Add the LUKS volume information to /etc/crypttab to decrypt by kernel. -echo "...Add LUKS volume info to /etc/crypttab." -echo "${CRYPTPARTNAME} UUID=$(blkid -s UUID -o value ${DEV}${CRYPTPARTITION}) /etc/luks/boot_os.keyfile luks,discard" >> /etc/crypttab - -# Finally, update the ramfs initial image with the key file. -echo "...Upadte initramfs." -update-initramfs -uk all - -# Leave chroot -exit -HEREDOC - -# Finishing message -cat </dev/null) && sourced=1 || sourced=0 -if [ $sourced -eq 0 ] ; then - cat <&2 -***** ERROR : Must execute as source ***** -Execute as following : -source 1-pre-install.sh - -Installation terminated. -HEREDOC - exit # use "exit" instead of "return", if not "sourced" execusion -fi # "sourced" validation - - - -# ----- Confirmations ----- -# Distribution check -uname -a | grep void -i > /dev/null -if [ $? -eq 1 ] ; then # "Void" is not found in the OS name. - echo "*********************************************************************************" - uname -a - cat <&2 - -Installation terminated. -HEREDOC - return - fi # if YES - -fi # "Void" is not found in the OS name. - -# For surre ask the config.sh is edited -echo "Did you edit config.sys? Are you ready to install? [Y/N]" -read YESNO -if [ ${YESNO} != "Y" -a ${YESNO} != "y" ] ; then - cat <&2 - -Installation terminated. -HEREDOC - return -fi # if YES - -# For sure ask ready to erase. -if [ ${ERASEALL} -eq 1 ] ; then - echo "Are you sure you want to erase entire ${DEV}? [Y/N]" - read YESNO - if [ ${YESNO} != "Y" -a ${YESNO} != "y" ] ; then - cat <&2 -Check config.sh. The variable ERASEALL is ${ERASEALL}. - -Installation terminated. -HEREDOC - return - fi # if YES -fi # if erase all - -# Install essential packages. -xbps-install -y gptfdisk - -# ----- Set Passphrase ----- -# Input passphrase -echo "Type passphrase for the disk encryption." -read -sr PASSPHRASE -export PASSPHRASE - -echo "Type passphrase again, to confirm." -read -sr PASSPHRASE_C - -# Validate whether both are indentical or not -if [ ${PASSPHRASE} != ${PASSPHRASE_C} ] ; then - cat <&2 -***** ERROR : Passphrase doesn't match ***** -Installation terminated. -HEREDOC - return -fi # passphrase validation - - -# ----- Erase entire disk, create partitions, format them and encrypt the LUKS partition ----- -if [ ${ERASEALL} -eq 1 ] ; then - - # Assign specified space and rest of disk to the EFI and LUKS partition, respectively. - if [ ${ISEFI} -eq 1 ] ; then - # Zap existing partition table and create new GPT - echo "...Initialize ${DEV} with GPT." - sgdisk --zap-all "${DEV}" - # Create EFI partition and format it - echo "...Create an EFI partition on ${DEV}." - sgdisk --new=${EFIPARTITION}:0:+${EFISIZE} --change-name=${EFIPARTITION}:"EFI System" --typecode=${EFIPARTITION}:ef00 "${DEV}" - echo "...Format the EFI parttion." - mkfs.vfat -F 32 -n EFI-SP "${DEV}${EFIPARTITION}" - # Create Linux partition - echo "...Create a Linux partition on ${DEV}." - sgdisk --new=${CRYPTPARTITION}:0:0 --change-name=${CRYPTPARTITION}:"Linux LUKS" --typecode=${CRYPTPARTITION}:8309 "${DEV}" - # Then print them - sgdisk --print "${DEV}" - else - # Zap existing partition table - echo "...Erase partition table of ${DEV}." - dd if=/dev/zero of=${DEV} bs=512 count=1 - # Create MBR and allocate max storage for Linux partition - echo "...Create a Linux partition on ${DEV} with MBR." - sfdisk ${DEV} <&2 -***** ERROR : Cannot open LUKS volume "${CRYPTPARTNAME}" on ${DEV}${CRYPTPARTITION}. ***** -Check passphrase and config.txt - -Installation terminated. -HEREDOC - return -fi # if crypt volume is unable to open - -# ----- Configure the LVM in LUKS volume ----- -# Check volume group ${VGNAME} exist or not -vgdisplay -s ${VGNAME} &> /dev/null -if [ $? -eq 0 ] ; then # is return value 0? ( exist ?) - echo "...Volume group ${VGNAME} already exist. Skipped to create. No problem." -else - echo "...Initialize a physical volume on \"${CRYPTPARTNAME}\"" - pvcreate /dev/mapper/${CRYPTPARTNAME} - echo "...And then create Volume group \"${VGNAME}\"." - vgcreate ${VGNAME} /dev/mapper/${CRYPTPARTNAME} -fi # if /dev/volume-groupt not exist - -# Create a SWAP Logical Volume on VG, if it doesn't exist -if [ -e /dev/mapper/${VGNAME}-${LVSWAPNAME} ] ; then - echo "...Swap volume already exist. Skipped to create. No problem." -else - echo "...Create logical volume \"${LVSWAPNAME}\" on \"${VGNAME}\"." - lvcreate -L ${LVSWAPSIZE} -n ${LVSWAPNAME} ${VGNAME} -fi # if /dev/mapper/swap volume already exit. - -# Create a ROOT Logical Volume on VG. -if [ -e /dev/mapper/${VGNAME}-${LVROOTNAME} ] ; then - cat <&2 -***** ERROR : Logical volume "${VGNAME}-${LVROOTNAME}" already exists. ***** -Check LVROOTNAME environment variable in config.txt. - -Installation terminated. -HEREDOC - return -else - echo "...Create logical volume \"${LVROOTNAME}\" on \"${VGNAME}\"." - lvcreate -l ${LVROOTSIZE} -n ${LVROOTNAME} ${VGNAME} -fi # if the root volun already exist - -# ADD "rd.auto=1 cryptdevice=/dev/sda2:${LUKS_NAME} root=/dev/mapper/${VGNAME}-${ROOTNAME}" to GRUB. -# This is magical part. I have not understood why this is required. -# Refer https://wiki.voidlinux.org/Install_LVM_LUKS#Installation_using_void-installer -echo "...Modify /etc/default/grub." -sed -i "s#loglevel=4#loglevel=4 rd.auto=1 cryptdevice=/dev/sda2:${LUKS_NAME} root=/dev/mapper/${VGNAME}-${LVROOTNAME}#" /etc/default/grub - -# Finishing message -if [ ${ISEFI} -eq 1 ] ; then - cat </dev/null) && sourced=1 || sourced=0 -if [ $sourced -eq 0 ] ; then - cat <&2 -***** ERROR : Must execute as source ***** -Execute as following : -source 2-para-install.sh - -Installation terminated. -HEREDOC - exit # use "exit" instead of "return", if not "sourced" execusion -fi # "sourced" validation - - -# Check whether grub configuration file is ready to write -if [ ! -e /mnt/target/etc/default/grub ] ; then - cat <&2 -***** ERROR : The /mnt/target/etc/default/grub is not ready. ***** -Perhaps, too early to execute this script. - -Installation terminated. -HEREDOC - return -fi # if grub file exists - -# Make target GRUB aware to the crypt partition -echo "...Add GRUB_ENABLE_CRYPTODISK entry to /mnt/target/etc/default/grub " -echo "GRUB_ENABLE_CRYPTODISK=y" >> /mnt/target/etc/default/grub - -# Finishing message -cat </dev/null) && sourced=1 || sourced=0 -if [ $sourced -eq 0 ] ; then - cat <&2 -***** ERROR : Must execute as source ***** -Execute as following : -source 3-post-install.sh - -Installation terminated. -HEREDOC - exit # use "exit" instead of "return", if not "sourced" execusion -fi # "sourced" validation - -## Mount the target file system -# /target is created by the Ubiquity installer -echo "...Mount /dev/mapper/${VGNAME}-${LVROOTNAME} on /mnt/target." -mount /dev/mapper/${VGNAME}-${LVROOTNAME} /mnt/target - -# And mount other directories -echo "...Mount all other dirs." -for n in proc sys dev etc/resolv.conf; do mount --rbind "/$n" "/mnt/target/$n"; done - -# Change root and create the keyfile and ramfs image for Linux kernel. -echo "...Chroot to /target." -cat <> /etc/crypttab - -echo "...Register key file to the ramfs" -echo 'install_items+=" /etc/luks/boot_os.keyfile /etc/crypttab " ' > /etc/dracut.conf.d/10-crypt.conf - -# Finally, update the ramfs initial image with the key file. -echo "...Upadte initramfs." -xbps-reconfigure -fa -echo "...grub-mkconfig." -grub-mkconfig -o /boot/grub/grub.cfg -echo "...update-grub." -update-grub - -# Leave chroot -HEREDOC - -# Unmount all -echo "...Unmount all." -umount -R /mnt/target - -# Finishing message -cat <