X-Git-Url: https://iankelling.org/git/?a=blobdiff_plain;f=fai%2Fconfig%2Fhooks%2Fpartition.DEFAULT;h=2db69b348b33f8f8e2c99c66112056f443f54b89;hb=bdcc37dee90597b4a65c2ae24b9fc26f15adfc11;hp=e3cd178e173f0970e73d50de27b656d80e07e29c;hpb=a129832a849aa87163b866982c214bbdd7314a52;p=automated-distro-installer diff --git a/fai/config/hooks/partition.DEFAULT b/fai/config/hooks/partition.DEFAULT index e3cd178..2db69b3 100755 --- a/fai/config/hooks/partition.DEFAULT +++ b/fai/config/hooks/partition.DEFAULT @@ -1,156 +1,446 @@ #!/bin/bash -x +# Copyright (C) 2016 Ian Kelling + +# This program is free software; you can redistribute it and/or +# modify it under the terms of the GNU General Public License +# as published by the Free Software Foundation; either version 2 +# of the License, or (at your option) any later version. + +# This program is distributed in the hope that it will be useful, +# but WITHOUT ANY WARRANTY; without even the implied warranty of +# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the +# GNU General Public License for more details. + +# You should have received a copy of the GNU General Public License +# along with this program; if not, write to the Free Software +# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. set -eE -o pipefail -trap 'echo "$0:$LINENO:error: \"$BASH_COMMAND\" returned $?"' ERR +trap 'echo "$0:$LINENO:error: \"$BASH_COMMAND\" returned $?" >&2' ERR # # fai's setup-storage won't do btrfs on luks, # # so we do it ourself :) +# inspiration taken from files in fai-setup-storage package + + +skiptask partition || ! type skiptask # for running not in fai + +#### begin configuration -partition=false +rootn=1 +swapn=2 +bootn=3 +# ext partition so grub can write persistent variables, +# so it can do a one time boot. grub can't write to +# btrfs or any cow fs because it's more +# more complicated to do and they don't want to. +grub_extn=4 +# bios boot partition, +# https://wiki.archlinux.org/index.php/GRUB +bios_grubn=5 +lastn=$bios_grubn +# this is larger than needed for several /boot subvols, +# becuase I keep a minimal debian install on it, for +# recovery needs, and for doing pxe-kexec. +boot_mib=10000 -letters=(a) +##### end configuration + + +add-part() { # add partition suffix to $dev + local d ret + if [[ $# == 1 ]]; then + d=$dev + part=$1 + else + d=$1 + part=$2 + fi + if [[ $d == /dev/disk/by-id/* ]]; then + ret=$d-part$part + else + ret=$d$part + fi + echo $ret +} + +bootdev() { add-part $@ $bootn; } +rootdev() { add-part $@ $rootn; } +swapdev() { add-part $@ $swapn; } +grub_extdev() { add-part $@ $grub_extn; } +bios_grubdev() { add-part $@ $bios_grubn; } -if ifclass VM; then - d=/dev/vd +crypt-dev() { echo /dev/mapper/crypt_dev_${1##*/}; } +crypt-name() { echo crypt_dev_${1##*/}; } +root-cryptdev() { crypt-dev $(rootdev $@); } +swap-cryptdev() { crypt-dev $(swapdev $@); } +root-cryptname() { crypt-name $(rootdev $@); } +swap-cryptname() { crypt-name $(swapdev $@); } + + +##### end function defs + +if ifclass REPARTITION;then + partition=true # force a full wipe else - d=/dev/sd + partition=false # change to true to force a full wipe fi -if ifclass TWO_DISK; then - skiptask partition - devs=(${d}{a,b}) - [[ -e /dev/md127 ]] || partition=true -elif ifclass ONE_DISK; then - skiptask partition - devs=(${d}a) + + +hdds=() +ssds=() +cd /sys/block +for disk in [sv]d[a-z]; do + case $(cat $disk/queue/rotational) in + 0) ssds+=(/dev/$disk) ;; + 1) hdds+=(/dev/$disk) ;; + *) echo "$0: error: unknown /sys/block/$disk/queue/rotational: \ +$(cat $disk/queue/rotational)"; exit 1 ;; + esac +done + +# install all ssds, or if there are none, all hdds +if ! ifclass ROTATIONAL && (( ${#ssds[@]} > 0 )); then + short_devs=( ${ssds[@]} ) else - exit + short_devs=( ${hdds[@]} ) fi -# somewhat crude detection of wehter to partition -for dev in ${devs[@]}; do - for part in ${dev}{1,2,3,4}; do - [[ -e $part ]] || partition=true +# check if the partitions exist have the right filesystems +#blkid="$(blkid -s TYPE)" +for dev in ${short_devs[@]}; do + if $partition; then break; fi + y=$(readlink -f $dev) + arr=($y[0-9]) + [[ ${#arr[@]} == "${lastn}" ]] || partition=true + for (( i=1; i <= lastn; i++ )); do + [[ -e ${dev}$i ]] || partition=true done + # On one system, blkid is missing some partitions. + # maybe we need a flag, like FUZZY_BLKID or something, so we + # can check that at least some exist. + # for x in "`rootdev`: TYPE=\"crypto_LUKS\"" "`bootdev`: TYPE=\"btrfs\""; do + # echo "$blkid" | grep -Fx "$x" &>/dev/null || partition=true + # done done -# keyfiles generated like: -# head -c 2048 /dev/urandom | od | s dd of=/q/root/luks/host-demohost -luks_dir=/var/lib/fai/config/distro-install-common/luks -if ifclass tp; then - lukspw=$(cat $luks_dir/traci) -else - lukspw=$(cat $luks_dir/ian) +if $partition && ifclass PARTITION_PROMPT; then + echo "Press any key except ctrl-c to continue and partition these drives:" + echo " ${short_devs[*]}" + read -r fi -boot_end=504 +devs=() +shopt -s extglob +for short_dev in ${short_devs[@]}; do + devs+=($(devbyid $short_dev)) +done -! ifclass tp || letters=(a b) -md() { ((${#letters[@]} > 1)); } +first=false +boot_devs=() +for dev in ${devs[@]}; do + if ifclass frodo; then + # I ran into a machine where the bios doesn't know about some disks, + # so 1st stage of grub also doesn't know about them. + # Also, grub does not support mounting degraded btrfs as far as + # I can tell with some googling. + # From within an arch install env, I could detect them by noting + # their partitions were mixed with the next disk in /dev/disk/by-path, + # and I have mixed model disks, and I could see the 8 models which showed + # up in the bios, and thus see which 2 models were missing. + # hdparm -I /dev/sdh will give model info in linux. + # However, in fai on jessie, /dev/disk/by-path dir doesn't exist, + # and I don't see another way, so I'm hardcoding them. + # We still put grub on them and partition them the same, for uniformity + # and in case they get moved to a system that can recognize them, + # we just exclude them from the boot filesystem. + cd /dev/disk/by-id/ + bad_disk=false + for id in ata-TOSHIBA_MD04ACA500_8539K4TQFS9A \ + ata-TOSHIBA_MD04ACA500_Y5IFK6IJFS9A; do + if [[ $(readlink -f $id) == "$(readlink -f $dev)" ]]; then + bad_disk=true + break + fi + done + $bad_disk || boot_devs+=(`bootdev`) + else + boot_devs+=(`bootdev`) + fi + if [[ $boot_devs && $first ]]; then + first_grub_extdev=`grub_extdev` + first=false + fi +done -if md; then - # if partition with md0, then reboot into the installer, - # it becomes md127. So might as well start with 127 for simplicity. - crypt=md127 +if ifclass RAID0 || (( ${#boot_devs[@]} < 4 )); then + raid_level=0 else - crypt=${d##/dev/}a3 + raid_level=10 + # need double the space if we are raid 10, and then + # might as well give some extra. + boot_mib=$((boot_mib * 3)) fi -# 1.5 x based on https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Installation_Guide/sect-disk-partitioning-setup-x86.html#sect-custom-partitioning-x86 -swap_end=$(( $(grep ^MemTotal: /proc/meminfo| awk '{print $2}') * 3/(${#letters[@]} * 2 ) / 1000 + boot_end ))MiB +if [[ ! $DISTRO ]]; then + if ifclass VOL_STABLE_BOOTSTRAP; then + DISTRO=debianstable_bootstrap + elif ifclass VOL_STRETCH; then + DISTRO=debiantesting + elif ifclass VOL_STABLE; then + DISTRO=debianstable + elif ifclass VOL_XENIAL; then + DISTRO=ubuntuxenial + elif ifclass VOL_BELENOS; then + DISTRO=trisquelbelenos + else + echo "PARTITIONER ERROR: no distro class/var set" >&2 + exit 1 + fi +fi +first_boot_dev=${boot_devs[0]} -create_subvols() { - cd /mnt - for x in a home root; do - btrfs subvolume list . | grep "$x$" >/dev/null || btrfs subvolume create $x - done - btrfs subvolume set-default \ - $(btrfs subvolume list . | grep 'root$' | awk '{print $2}') . - cd / - umount /mnt + +bpart() { # btrfs a partition + case $raid_level in + 0) mkfs.btrfs -f $@ ;; + 10) mkfs.btrfs -f -m raid10 -d raid10 $@ ;; + esac } + +# keyfiles generated like: +# head -c 2048 /dev/urandom | od | s dd of=/q/root/luks/host-demohost +luks_dir=${LUKS_DIR:-/var/lib/fai/config/distro-install-common/luks} + +if [[ ! -e $luks_dir/host-$HOSTNAME ]]; then + echo "$0: error: no key for hostname at $luks_dir/host-$HOSTNAME" >&2 + exit 1 +fi + +if ifclass tp; then + lukspw=$(cat $luks_dir/traci) +else + lukspw=$(cat $luks_dir/ian) +fi +if ifclass demohost; then + lukspw=x +fi + + +first_root_crypt=$(root-cryptdev ${devs[0]}) + +# 1.5 x based on https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Installation_Guide/sect-disk-partitioning-setup-x86.html#sect-custom-partitioning-x86 +swap_mib=$(( $(grep ^MemTotal: /proc/meminfo | \ + awk '{print $2}') * 3/(${#devs[@]} * 2 ) / 1024 )) + +mkdir -p /tmp/fai +root_devs=() +for dev in ${devs[@]}; do + root_devs+=(`rootdev`) +done shopt -s nullglob if $partition; then - mkdir -p /tmp/fai for dev in ${devs[@]}; do - for x in /dev/md*; do [[ -d $x ]] || mdadm --stop $x; done - for x in $dev[0-9]; do wipefs -a $x; done - parted -s $dev mklabel gpt - # gpt ubuntu cloud image uses ~4. fai uses 1 MiB. ehh, i'll do 4. - # also, using MB instead of MiB causes complains about alignment. - parted -s $dev mkpart primary "ext3" 4MB ${boot_end}MiB - parted -s $dev set 1 boot on - parted -s $dev mkpart primary "linux-swap" ${boot_end}MiB $swap_end - parted -s -- $dev mkpart primary "" $swap_end -0 - parted -s $dev set 3 raid on - parted -s $dev mkpart primary "" 1MiB 4MiB - parted -s $dev set 4 bios_grub on - # the mkfs failed randomly on a vm, so I threw a sleep in here. - sleep .1 - mkfs.ext4 -F ${dev}1 + # if we repartition to the same as an old partition, + # we don't want any old fses hanging around. + for (( i=1; i <= lastn; i++ )); do + x=$(add-part $dev $i) + [[ -e $x ]] || continue + count_down=10 + # wipefs has failed, manual run works, google suggests timing issue + while ! wipefs -a $x; do + sleep 2 + count_down=$((count_down - 1)) + (( count_down > 0 )) || exit 1 + done + done done - if md; then - yes | mdadm --create /dev/$crypt --level=raid0 --force --run \ - --raid-devices=${#devs[@]} ${devs[@]/%/3} || [[ $? == 141 ]] - fi + for dev in ${devs[@]}; do + # parted will round up the disk size. Do -1 so we can have + # fully 1MiB unit partitions for easy resizing of the last partition. + # Otherwise we would pass in -0 for the end argument for the last partition. + # + # parted print error output is expected. example: + # Error: /dev/vda: unrecognised disk label + disk_mib=$(( $(parted -m $dev unit MiB print | \ + sed -nr "s#^/dev/[^:]+:([0-9]+).*#\1#p") - 1)) + root_end=$(( disk_mib - swap_mib - boot_mib / ${#boot_devs[@]} )) + swap_end=$(( root_end + swap_mib)) - yes YES | cryptsetup luksFormat /dev/$crypt $luks_dir/host-$HOSTNAME \ - -c aes-cbc-essiv:sha256 -s 256 || [[ $? == 141 ]] - yes "$lukspw" cryptsetup luksAddKey --key-file \ - $luks_dir/host-$HOSTNAME /dev/$crypt || [[ $? == 141 ]] - # this would remove the keyfile. we will do that manually later. - # yes 'test' | cryptsetup luksRemoveKey /dev/... \ - # /key/file || [[ $? == 141 ]] - cryptsetup luksOpen /dev/$crypt crypt_dev_$crypt --key-file \ - $luks_dir/host-$HOSTNAME - parted ${devs[0]} set 1 boot on - mkfs.btrfs -f /dev/mapper/crypt_dev_$crypt - mount /dev/mapper/crypt_dev_$crypt /mnt - create_subvols + parted -s $dev mklabel gpt + # MiB because parted complains about alignment otherwise. + pcmd="parted -a optimal -s -- $dev" + $pcmd mkpart primary "ext3" 12MiB ${root_end}MiB + $pcmd mkpart primary "linux-swap" ${root_end}MiB ${swap_end}MiB + $pcmd mkpart primary "" ${swap_end}MiB ${disk_mib}MiB + # i only need a few k, but googling min size, + # I found someone saying that gparted required + # required at least 8 because of their hard drive cylinder size. + # And 8 is still very tiny. + $pcmd mkpart primary "ext2" 4MiB 12MiB + # gpt ubuntu cloud image uses ~4 mb for this partition. fai uses 1 MiB. + # so, I use 3, whatever. + # note: parted manual saying cheap flash media + # should to start at 4. + $pcmd mkpart primary "" 1MiB 4MiB + $pcmd set $bios_grubn bios_grub on + $pcmd set $bootn boot on # generally not needed on modern systems + # the mkfs failed before on a vm, which prompted me to add + # sleep .1 + # then it failed again on a physical machine + # with: + # Device /dev/disk/by-id/foo doesn't exist or access denied, + # so I added a wait until it existed. + # Then I added the mkfs.ext2, which claimed to succeed, + # but then couldn't be found upon reboot. In that case we didn't + # wait at all. So I've added a 3 second minimum wait. + sleep 3 + secs=0 + while [[ ! -e `rootdev` ]] && (( secs < 10 )); do + sleep 1 + secs=$((secs +1)) + done + # Holds just a single file, rarely written, so + # use ext2, like was often used for the /boot partition. + # This exists because grub can only persist data to a non-cow fs. + # And we use persisting a var in grub to do a one time boot. + # We could pass the data on the kernel command line and persist it + # to grubenv after booting, but that relies on the boot always succeeding. + # This is just a bit more robust, and it could work for booting + # into ipxe which can't persist data, if we ever got that working. + mkfs.ext2 `grub_extdev` + yes YES | cryptsetup luksFormat `rootdev` $luks_dir/host-$HOSTNAME \ + -c aes-cbc-essiv:sha256 -s 256 || [[ $? == 141 ]] + yes "$lukspw" | \ + cryptsetup luksAddKey --key-file $luks_dir/host-$HOSTNAME \ + `rootdev` || [[ $? == 141 ]] + # background: Keyfile and password are treated just + # like 2 ways to input a passphrase, so we don't actually need to have + # different contents of keyfile and passphrase, but it makes some + # security sense to a really big randomly generated passphrase + # as much as possible, so we have both. + # + # This would remove the keyfile. + # yes 'test' | cryptsetup luksRemoveKey /dev/... \ + # /key/file || [[ $? == 141 ]] + + cryptsetup luksOpen `rootdev` `root-cryptname` \ + --key-file $luks_dir/host-$HOSTNAME + done + ls -la /dev/btrfs-control # this was probably for debugging... + sleep 1 + bpart $(for dev in ${devs[@]}; do root-cryptdev; done) + bpart ${boot_devs[@]} else for dev in ${devs[@]}; do - mkfs.ext4 -F ${dev}1 + mkfs.ext2 `grub_extdev` + cryptsetup luksOpen `rootdev` `root-cryptname` \ + --key-file $luks_dir/host-$HOSTNAME done - yes "$lukspw" | \ - cryptsetup luksOpen /dev/$crypt crypt_dev_$crypt || [[ $? == 141 ]] sleep 1 - mount -o subvolid=0 /dev/mapper/crypt_dev_$crypt /mnt +fi + + +if [[ $DISTRO != debianstable_bootstrap ]]; then + # bootstrap distro doesn't use separate encrypted root. + mount -o subvolid=0 $first_root_crypt /mnt # systemd creates subvolumes we want to delete. s=($(btrfs subvolume list --sort=-path /mnt | - sed -rn 's#^.*path\s*(root/\S+)\s*$#\1#p')) + sed -rn "s#^.*path\s*(root_$DISTRO/\S+)\s*\$#\1#p")) for subvol in ${s[@]}; do btrfs subvolume delete /mnt/$subvol; done btrfs subvolume set-default 0 /mnt - btrfs subvolume delete /mnt/root - create_subvols + [[ ! -e /mnt/root_$DISTRO ]] || btrfs subvolume delete /mnt/root_$DISTRO + + ## create subvols ## + cd /mnt + + btrfs subvolume create root_$DISTRO + + mkdir -p /mnt/root_$DISTRO/boot + # could set default subvol like this, but no reason to. + # btrfs subvolume set-default \ + # $(btrfs subvolume list . | grep "root_$DISTRO$" | awk '{print $2}') . + + # no cow on the root filesystem. it's setup is fully scripted, + # if it's messed up, we will just recreated it, + # and we can get better perf with this. + # I can't remember exactly why, but this is preferable to mounting with + # -o nodatacow, I think because subvolumes inherit that. + chattr -Rf +C root_$DISTRO + cd / + umount /mnt fi -cat > /tmp/fai/crypttab <> /tmp/fai/crypttab < /tmp/fai/fstab < /tmp/fai/fstab </tmp/fai/disk_var.sh < /tmp/fai/fstab <>/tmp/fai/crypttab <> /tmp/fai/fstab </tmp/fai/disk_var.sh </tmp/fai/disk_var.sh <