#!/bin/bash # Varidate whether script is executed as sourced or not (return 0 2>/dev/null) && sourced=1 || sourced=0 if [ $sourced -eq 0 ] ; then cat <&2 ***** ERROR : Must execute as source ***** Execute as following : source ubuntu-kaiten-yaki.sh Installation terminated. HEREDOC exit # use "exit" instead of "return", if not "sourced" execusion fi # "sourced" validation # Load configuration parameter source config.sh # ******************************************************************************* # Confirmation and Passphrase setting # ******************************************************************************* # Distribution check uname -a | grep void -i > /dev/null if [ $? -eq 1 ] ; then # "Void" is not found in the OS name. echo "*********************************************************************************" uname -a cat <&2 Installation terminated. HEREDOC return fi # if YES fi # "Void" is not found in the OS name. # Sanity check for volume group name echo ${VGNAME} | grep "-" -i > /dev/null if [ $? -eq 0 ] ; then # "-" is found in the volume group name. cat <&2 ***** ERROR : VGNAME is "${VGNAME}" ***** THe "-" is not allowed in the volume name. Check passphrase and config.txt Installation terminated. HEREDOC return fi # "-" is found in the volume group name. # Sanity check for root volume name echo ${LVROOTNAME} | grep "-" -i > /dev/null if [ $? -eq 0 ] ; then # "-" is found in the volume name. cat <&2 ***** ERROR : LVROOTNAME is "${LVROOTNAME}" ***** THe "-" is not allowed in the volume name. Check passphrase and config.txt Installation terminated. HEREDOC return fi # "-" is found in the volume name. # Sanity check for swap volume name echo ${LVSWAPNAME} | grep "-" -i > /dev/null if [ $? -eq 0 ] ; then # "-" is found in the volume name. cat <&2 ***** ERROR : LVSWAPNAME is "${LVSWAPNAME}" ***** THe "-" is not allowed in the volume name. Check passphrase and config.txt Installation terminated. HEREDOC return fi # "-" is found in the volume name. # For surre ask the config.sh is edited cat <&2 Installation terminated. HEREDOC return fi # if YES # For sure ask ready to erase. if [ ${ERASEALL} -eq 1 ] ; then echo "Are you sure you want to erase entire ${DEV}? [Y/N]" read YESNO if [ ${YESNO} != "Y" -a ${YESNO} != "y" ] ; then cat <&2 Check config.sh. The variable ERASEALL is ${ERASEALL}. Installation terminated. HEREDOC return fi # if YES fi # if erase all # ----- Set Passphrase ----- # Input passphrase echo "Type passphrase for the disk encryption." read -sr PASSPHRASE export PASSPHRASE echo "Type passphrase again, to confirm." read -sr PASSPHRASE_C # Validate whether both are indentical or not if [ ${PASSPHRASE} != ${PASSPHRASE_C} ] ; then cat <&2 ***** ERROR : Passphrase doesn't match ***** Installation terminated. HEREDOC return fi # passphrase validation # Install essential packages. xbps-install -y -Su xbps gptfdisk xterm # ******************************************************************************* # Pre-install stage # ******************************************************************************* # ----- Erase entire disk, create partitions, format them and encrypt the LUKS partition ----- if [ ${ERASEALL} -eq 1 ] ; then # Assign specified space and rest of disk to the EFI and LUKS partition, respectively. if [ ${ISEFI} -eq 1 ] ; then # Zap existing partition table and create new GPT echo "...Initialize ${DEV} with GPT." sgdisk --zap-all "${DEV}" # Create EFI partition and format it echo "...Create an EFI partition on ${DEV}." sgdisk --new=${EFIPARTITION}:0:+${EFISIZE} --change-name=${EFIPARTITION}:"EFI System" --typecode=${EFIPARTITION}:ef00 "${DEV}" echo "...Format the EFI parttion." mkfs.vfat -F 32 -n EFI-SP "${DEV}${EFIPARTITION}" # Create Linux partition echo "...Create a Linux partition on ${DEV}." sgdisk --new=${CRYPTPARTITION}:0:0 --change-name=${CRYPTPARTITION}:"Linux LUKS" --typecode=${CRYPTPARTITION}:8309 "${DEV}" # Then print them sgdisk --print "${DEV}" else # Zap existing partition table echo "...Erase partition table of ${DEV}." dd if=/dev/zero of=${DEV} bs=512 count=1 # Create MBR and allocate max storage for Linux partition echo "...Create a Linux partition on ${DEV} with MBR." sfdisk ${DEV} <&2 ***** ERROR : Cannot open LUKS volume "${CRYPTPARTNAME}" on ${DEV}${CRYPTPARTITION}. ***** Check passphrase and config.txt Installation terminated. HEREDOC return fi # if crypt volume is unable to open # ----- Configure the LVM in LUKS volume ----- # Check volume group ${VGNAME} exist or not vgdisplay -s ${VGNAME} &> /dev/null if [ $? -eq 0 ] ; then # is return value 0? ( exist ?) echo "...Volume group ${VGNAME} already exist. Skipped to create. No problem." else echo "...Initialize a physical volume on \"${CRYPTPARTNAME}\"" pvcreate /dev/mapper/${CRYPTPARTNAME} echo "...And then create Volume group \"${VGNAME}\"." vgcreate ${VGNAME} /dev/mapper/${CRYPTPARTNAME} fi # if /dev/volume-groupt not exist # Create a SWAP Logical Volume on VG, if it doesn't exist if [ -e /dev/mapper/${VGNAME}-${LVSWAPNAME} ] ; then echo "...Swap volume already exist. Skipped to create. No problem." else echo "...Create logical volume \"${LVSWAPNAME}\" on \"${VGNAME}\"." lvcreate -L ${LVSWAPSIZE} -n ${LVSWAPNAME} ${VGNAME} fi # if /dev/mapper/swap volume already exit. # Create a ROOT Logical Volume on VG. if [ -e /dev/mapper/${VGNAME}-${LVROOTNAME} ] ; then cat <&2 ***** ERROR : Logical volume "${VGNAME}-${LVROOTNAME}" already exists. ***** Check LVROOTNAME environment variable in config.txt. Installation terminated. HEREDOC return else echo "...Create logical volume \"${LVROOTNAME}\" on \"${VGNAME}\"." lvcreate -l ${LVROOTSIZE} -n ${LVROOTNAME} ${VGNAME} fi # if the root volun already exist # ADD "rd.auto=1 cryptdevice=/dev/sda2:${LUKS_NAME} root=/dev/mapper/${VGNAME}-${ROOTNAME}" to GRUB. # This is magical part. I have not understood why this is required. # Anyway, without this modification, Void Linux doesn't boot. # Refer https://wiki.voidlinux.org/Install_LVM_LUKS#Installation_using_void-installer echo "...Modify /etc/default/grub." sed -i "s#loglevel=4#loglevel=4 rd.auto=1 cryptdevice=/dev/sda2:${LUKS_NAME} root=/dev/mapper/${VGNAME}-${LVROOTNAME}#" /etc/default/grub # ******************************************************************************* # Para-install stage # ******************************************************************************* cat < /dev/null # ps return 0 if process exists. if [ $? -ne 0 ] ; then # If not exists cat <&2 The void-installer terminated unexpectedly. Installation process terminated. HEREDOC return fi done # Perhaps, too neuvous. Wait 1 more sectond to avoid the rece condition. sleep 1 # 1sec. # Make target GRUB aware to the crypt partition # This must do it after start of the file copy by void-installer, but before the end of the file copy. echo "...Add GRUB_ENABLE_CRYPTODISK entry to /mnt/target/etc/default/grub " echo "GRUB_ENABLE_CRYPTODISK=y" >> /mnt/target/etc/default/grub # And then, wait for the end of void-installer process echo "...Waiting for the end of void-installer." wait $voidinstaller_pid # ******************************************************************************* # Post-install stage # ******************************************************************************* ## Mount the target file system # /mnt/target is created by the void-installer echo "...Mount /dev/mapper/${VGNAME}-${LVROOTNAME} on /mnt/target." mount /dev/mapper/${VGNAME}-${LVROOTNAME} /mnt/target # And mount other directories echo "...Mount all other dirs." for n in proc sys dev etc/resolv.conf; do mount --rbind "/$n" "/mnt/target/$n"; done # Change root and create the keyfile and ramfs image for Linux kernel. echo "...Chroot to /target." cat <> /etc/crypttab echo "...Register key file to the ramfs" echo 'install_items+=" /etc/luks/boot_os.keyfile /etc/crypttab " ' > /etc/dracut.conf.d/10-crypt.conf # Finally, update the ramfs initial image with the key file. echo "...Upadte initramfs." xbps-reconfigure -fa echo "...grub-mkconfig." grub-mkconfig -o /boot/grub/grub.cfg echo "...update-grub." update-grub # Leave chroot HEREDOC # Unmount all echo "...Unmount all." umount -R /mnt/target # Finishing message cat <