From: Ian Kelling Date: Sun, 24 Jan 2016 07:42:30 +0000 (-0800) Subject: scrap mdadm, various fixes X-Git-Url: https://iankelling.org/git/?a=commitdiff_plain;h=ce5290b5a6eee95cc59b5c1651d73a224c3d5bbd;p=automated-distro-installer scrap mdadm, various fixes --- diff --git a/fai-revm b/fai-revm index 3b3e003..af8bc36 100755 --- a/fai-revm +++ b/fai-revm @@ -6,6 +6,9 @@ set -eE -o pipefail trap 'echo "$0:$LINENO:error: \"$BASH_COMMAND\" returned $?"' ERR +new_disk=false +[[ ! $1 ]] || new_disk=true + cd "${BASH_SOURCE%/*}" ./fai-redep @@ -13,7 +16,9 @@ cd "${BASH_SOURCE%/*}" s virshrm demohost ||: for f in /var/lib/libvirt/images/demohost{,b}; do - [[ -e $f ]] || s qemu-img create -o preallocation=metadata -f qcow2 $f 30G + if $new_disk || [[ ! -e $f ]]; then + s qemu-img create -o preallocation=metadata -f qcow2 $f 30G + fi done # osinfo-query os | gr jessie s virt-install --os-variant debian8 --cpu host -n demohost --pxe -r 2048 --vcpus 1 \ diff --git a/fai/config/class/50-host-classes b/fai/config/class/50-host-classes index f0bbd9d..b39132a 100755 --- a/fai/config/class/50-host-classes +++ b/fai/config/class/50-host-classes @@ -8,7 +8,7 @@ # use a list of classes for our demo machine case $HOSTNAME in demohost) - echo "FAIBASE DEBIAN DESKTOP STABLE" ;; + echo "FAIBASE DEBIAN DESKTOP STABLE TWO_DISK" ;; x2) echo "FAIBASE DEBIAN DESKTOP ONE_DISK" ;; tp) diff --git a/fai/config/files/etc/apt/sources.list/DEFAULT b/fai/config/files/etc/apt/sources.list/DEFAULT index feba838..2877f34 100644 --- a/fai/config/files/etc/apt/sources.list/DEFAULT +++ b/fai/config/files/etc/apt/sources.list/DEFAULT @@ -1,9 +1,9 @@ deb http://httpredir.debian.org/debian testing main -deb-src http://httpredir.debian.org/debian testing main +deb-src http://http.us.debian.org/debian testing main deb http://security.debian.org/ testing/updates main deb-src http://security.debian.org/ testing/updates main # jessie-updates, previously known as 'volatile' deb http://httpredir.debian.org/debian testing-updates main -deb-src http://httpredir.debian.org/debian testing-updates main +deb-src http://http.us.debian.org/debian testing-updates main diff --git a/fai/config/hooks/instsoft.DEFAULT b/fai/config/hooks/instsoft.DEFAULT index 1879648..ab6e213 100755 --- a/fai/config/hooks/instsoft.DEFAULT +++ b/fai/config/hooks/instsoft.DEFAULT @@ -5,19 +5,41 @@ if ifclass VM && ! ifclass demohost; then exit 0 fi +keyfile=/var/lib/fai/config/distro-install-common/luks/host-$HOSTNAME f=$target/root/keyscript cat > $f <$f <<'EOF' +#!/bin/sh +if ! [ -e /tmp/key ]; then + stty -echo + read pass + printf '%s' "$pass" > /tmp/key +fi +cat /tmp/key +EOF chmod +x $f + if ifclass tp; then d=$target/root/shadow mkdir -p $d ls -la /var/lib/fai/config/distro-install-common - cp /var/lib/fai/config/distro-install-common/traci{-simple} $d + cp /var/lib/fai/config/distro-install-common/traci{,-simple} $d fi diff --git a/fai/config/hooks/partition.DEFAULT b/fai/config/hooks/partition.DEFAULT index e3cd178..e2a32ca 100755 --- a/fai/config/hooks/partition.DEFAULT +++ b/fai/config/hooks/partition.DEFAULT @@ -6,35 +6,45 @@ trap 'echo "$0:$LINENO:error: \"$BASH_COMMAND\" returned $?"' ERR # # fai's setup-storage won't do btrfs on luks, # # so we do it ourself :) -partition=false - - -letters=(a) +#### begin configuration if ifclass VM; then - d=/dev/vd + d=vd else - d=/dev/sd + d=sd fi + if ifclass TWO_DISK; then - skiptask partition - devs=(${d}{a,b}) - [[ -e /dev/md127 ]] || partition=true + letters=(a b) elif ifclass ONE_DISK; then - skiptask partition - devs=(${d}a) + letters=(a) else exit fi +##### end configuration +skiptask partition +devs=(${letters[@]/#//dev/${d}}) +crypt_devs=(${letters[@]/#//dev/mapper/crypt_dev_${d}}) + +# we can set this manually to force partitioning +#partition=false -# somewhat crude detection of wehter to partition +# somewhat crude detection of whether to partition for dev in ${devs[@]}; do + x=($dev[0-9]) + [[ ${#x[@]} == 4 ]] || partition=true for part in ${dev}{1,2,3,4}; do [[ -e $part ]] || partition=true done + # type tells us it's not totally blank + for part in ${dev}{1,3}; do + blkid | grep "^$part:.*TYPE=" &>/dev/null || partition=true + done done +partition=true # override temporarily + # keyfiles generated like: # head -c 2048 /dev/urandom | od | s dd of=/q/root/luks/host-demohost luks_dir=/var/lib/fai/config/distro-install-common/luks @@ -43,25 +53,18 @@ if ifclass tp; then else lukspw=$(cat $luks_dir/ian) fi +if ifclass demohost; then + lukspw=x +fi boot_end=504 -! ifclass tp || letters=(a b) - -md() { ((${#letters[@]} > 1)); } - -if md; then - # if partition with md0, then reboot into the installer, - # it becomes md127. So might as well start with 127 for simplicity. - crypt=md127 -else - crypt=${d##/dev/}a3 -fi +crypt=/dev/mapper/crypt_dev_${d##/dev/}a3 # 1.5 x based on https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Installation_Guide/sect-disk-partitioning-setup-x86.html#sect-custom-partitioning-x86 -swap_end=$(( $(grep ^MemTotal: /proc/meminfo| awk '{print $2}') * 3/(${#letters[@]} * 2 ) / 1000 + boot_end ))MiB +swap_end=$(( $(grep ^MemTotal: /proc/meminfo| awk '{print $2}') * 3/(${#devs[@]} * 2 ) / 1000 + boot_end )) create_subvols() { cd /mnt @@ -78,48 +81,59 @@ shopt -s nullglob if $partition; then mkdir -p /tmp/fai for dev in ${devs[@]}; do - for x in /dev/md*; do [[ -d $x ]] || mdadm --stop $x; done for x in $dev[0-9]; do wipefs -a $x; done parted -s $dev mklabel gpt # gpt ubuntu cloud image uses ~4. fai uses 1 MiB. ehh, i'll do 4. # also, using MB instead of MiB causes complains about alignment. parted -s $dev mkpart primary "ext3" 4MB ${boot_end}MiB parted -s $dev set 1 boot on - parted -s $dev mkpart primary "linux-swap" ${boot_end}MiB $swap_end - parted -s -- $dev mkpart primary "" $swap_end -0 - parted -s $dev set 3 raid on + parted -s $dev mkpart primary "linux-swap" ${boot_end}MiB ${swap_end}MiB + parted -s -- $dev mkpart primary "" ${swap_end}MiB -0 parted -s $dev mkpart primary "" 1MiB 4MiB parted -s $dev set 4 bios_grub on # the mkfs failed randomly on a vm, so I threw a sleep in here. sleep .1 mkfs.ext4 -F ${dev}1 + # 3 is device which simply holds a key for the 4's, + # so we can unlock multi-device btrfs fs with 1 manually entered passphrase. + # + # Background: It's of course possible modify the initramfs to + # put the input from a passphrase prompt into a variable and use + # it to unlock multiple devices, but that would require figuring + # more things out. + # + for luks_dev in ${dev}3; do + yes YES | cryptsetup luksFormat $luks_dev $luks_dir/host-$HOSTNAME \ + -c aes-cbc-essiv:sha256 -s 256 || [[ $? == 141 ]] + yes "$lukspw" | \ + cryptsetup luksAddKey --key-file $luks_dir/host-$HOSTNAME \ + $luks_dev || [[ $? == 141 ]] + # background: Keyfile and password are treated just + # like 2 ways to input a passphrase, so we don't actually need to have + # different contents of keyfile and passphrase, but it makes some + # security sense to a really big randomly generated passphrase + # as much as possible, so we have both. + # + # This would remove the keyfile. + # yes 'test' | cryptsetup luksRemoveKey /dev/... \ + # /key/file || [[ $? == 141 ]] + + cryptsetup luksOpen $luks_dev crypt_dev_${luks_dev##/dev/} \ + --key-file $luks_dir/host-$HOSTNAME + done done - if md; then - yes | mdadm --create /dev/$crypt --level=raid0 --force --run \ - --raid-devices=${#devs[@]} ${devs[@]/%/3} || [[ $? == 141 ]] - fi - - yes YES | cryptsetup luksFormat /dev/$crypt $luks_dir/host-$HOSTNAME \ - -c aes-cbc-essiv:sha256 -s 256 || [[ $? == 141 ]] - yes "$lukspw" cryptsetup luksAddKey --key-file \ - $luks_dir/host-$HOSTNAME /dev/$crypt || [[ $? == 141 ]] - # this would remove the keyfile. we will do that manually later. - # yes 'test' | cryptsetup luksRemoveKey /dev/... \ - # /key/file || [[ $? == 141 ]] - cryptsetup luksOpen /dev/$crypt crypt_dev_$crypt --key-file \ - $luks_dir/host-$HOSTNAME + mkfs.btrfs -f ${crypt_devs[@]/%/3} parted ${devs[0]} set 1 boot on - mkfs.btrfs -f /dev/mapper/crypt_dev_$crypt - mount /dev/mapper/crypt_dev_$crypt /mnt + mount $crypt /mnt create_subvols else for dev in ${devs[@]}; do mkfs.ext4 -F ${dev}1 + cryptsetup luksOpen ${dev}3 crypt_dev_${dev##/dev/}3 \ + --key-file $luks_dir/host-$HOSTNAME || [[ $? == 141 ]] done - yes "$lukspw" | \ - cryptsetup luksOpen /dev/$crypt crypt_dev_$crypt || [[ $? == 141 ]] sleep 1 - mount -o subvolid=0 /dev/mapper/crypt_dev_$crypt /mnt + mount -o subvolid=0 $crypt /mnt # systemd creates subvolumes we want to delete. s=($(btrfs subvolume list --sort=-path /mnt | sed -rn 's#^.*path\s*(root/\S+)\s*$#\1#p')) @@ -129,27 +143,30 @@ else create_subvols fi -cat > /tmp/fai/crypttab <>/tmp/fai/crypttab <> /tmp/fai/crypttab <>/tmp/fai/crypttab < /tmp/fai/fstab </tmp/fai/disk_var.sh <