#!/bin/bash -x set -eE -o pipefail trap 'echo "$0:$LINENO:error: \"$BASH_COMMAND\" returned $?"' ERR # # fai's setup-storage won't do btrfs on luks, # # so we do it ourself :) skiptask partition || ! type skiptask # for running not in fai #### begin configuration bootn=3 rootn=1 swapn=2 bios_grubn=4 boot_mib=1500 ##### end configuration if ifclass REPARTITION;then partition=true # force a full wipe else partition=false # change to true to force a full wipe fi lastn=$bios_grubn hds=() ssds=() cd /sys/block for disk in [sv]d[a-z]; do case $(cat $disk/queue/rotational) in 0) ssds+=(/dev/$disk) ;; 1) hds+=(/dev/$disk) ;; *) echo "$0: error: unknown /sys/block/$disk/queue/rotational: \ $(cat $disk/queue/rotational)"; exit 1 ;; esac done # install all ssds, or if there are none, all hdds if (( ${#ssds[@]} > 0 )); then devs=( ${ssds[@]} ) else devs=( ${hds[@]} ) fi if [[ ! $DISTRO ]]; then if ifclass STABLE; then DISTRO=debianjessie else DISTRO=debiantesting fi fi bpart() { # btrfs a partition dev_n=$1 case ${#@} in [1-3]) mkfs.btrfs -f $@ ;; [4-9]*|[1-3]?*) mkfs.btrfs -f -m raid10 -d raid10 $@ ;; esac } first_boot_dev=${devs[0]}$bootn crypt_devs=() # somewhat crude detection of whether to partition for dev in ${devs[@]}; do crypt_devs+=( /dev/mapper/crypt_dev_${dev#/dev/} ) x=($dev[0-9]) [[ ${#x[@]} == ${lastn} ]] || partition=true for (( i=1; i <= $lastn; i++ )); do [[ -e ${dev}$i ]] || partition=true done for part in $dev$rootn $dev$bootn; do # type tells us it's not totally blank blkid | grep "^${part}:.*TYPE=" &>/dev/null || partition=true done done # keyfiles generated like: # head -c 2048 /dev/urandom | od | s dd of=/q/root/luks/host-demohost luks_dir=${LUKS_DIR:-/var/lib/fai/config/distro-install-common/luks} if ifclass tp; then lukspw=$(cat $luks_dir/traci) else lukspw=$(cat $luks_dir/ian) fi if ifclass demohost; then lukspw=x fi crypt=${crypt_devs[0]}$rootn bios_grub_end=4 # 1.5 x based on https://access.redhat.com/documentation/en-US/Red_Hat_Enterprise_Linux/7/html/Installation_Guide/sect-disk-partitioning-setup-x86.html#sect-custom-partitioning-x86 swap_mib=$(( $(grep ^MemTotal: /proc/meminfo | \ awk '{print $2}') * 3/(${#devs[@]} * 2 ) / 1024 )) # parted will round up the disk size. Do -1 so we can have # fully 1MiB unit partitions for easy resizing of the last partition. # Otherwise we would pass in -0 for the end argument for the last partition. disk_mib=$(( $(parted -m ${devs[0]} unit MiB print | \ sed -nr "s#^${devs[0]}:([0-9]+).*#\1#p") - 1)) root_end=$(( disk_mib - swap_mib - boot_mib / ${#devs[@]} )) swap_end=$(( root_end + swap_mib)) mkdir -p /tmp/fai shopt -s nullglob if $partition; then for dev in ${devs[@]}; do for x in $dev[0-9]; do count_down=10 # wipefs has failed, manual run works, google suggests timing issue while ! wipefs -a $x; do sleep 2 count_down=$((count_down - 1)) (( count_down > 0 )) || exit 1 done done done for dev in ${devs[@]}; do parted -s $dev mklabel gpt # gpt ubuntu cloud image uses ~4. fai uses 1 MiB. # I read something in the parted manual saying cheap flash media # likes to start at 4. # MiB because parted complains about alignment otherwise. pcmd="parted -a optimal -s -- $dev" $pcmd mkpart primary "ext3" 4MiB ${root_end}MiB $pcmd mkpart primary "linux-swap" ${root_end}MiB ${swap_end}MiB $pcmd mkpart primary "" ${swap_end}MiB ${disk_mib}MiB $pcmd mkpart primary "" 1MiB 4MiB $pcmd set $bios_grubn bios_grub on $pcmd set $bootn boot on # generally not needed on modern systems # the mkfs failed randomly on a vm, so I threw a sleep in here. sleep .1 luks_dev=$dev$rootn yes YES | cryptsetup luksFormat $luks_dev $luks_dir/host-$HOSTNAME \ -c aes-cbc-essiv:sha256 -s 256 || [[ $? == 141 ]] yes "$lukspw" | \ cryptsetup luksAddKey --key-file $luks_dir/host-$HOSTNAME \ $luks_dev || [[ $? == 141 ]] # background: Keyfile and password are treated just # like 2 ways to input a passphrase, so we don't actually need to have # different contents of keyfile and passphrase, but it makes some # security sense to a really big randomly generated passphrase # as much as possible, so we have both. # # This would remove the keyfile. # yes 'test' | cryptsetup luksRemoveKey /dev/... \ # /key/file || [[ $? == 141 ]] cryptsetup luksOpen $luks_dev crypt_dev_${luks_dev##/dev/} \ --key-file $luks_dir/host-$HOSTNAME done bpart ${crypt_devs[@]/%/$rootn} bpart ${devs[@]/%/$bootn} else for dev in ${devs[@]}; do cryptsetup luksOpen $dev$rootn crypt_dev_${dev##/dev/}$rootn \ --key-file $luks_dir/host-$HOSTNAME || [[ $? == 141 ]] done sleep 1 fi mount -o subvolid=0 $crypt /mnt # systemd creates subvolumes we want to delete. s=($(btrfs subvolume list --sort=-path /mnt | sed -rn "s#^.*path\s*(root_$DISTRO/\S+)\s*\$#\1#p")) for subvol in ${s[@]}; do btrfs subvolume delete /mnt/$subvol; done btrfs subvolume set-default 0 /mnt [[ ! -e /mnt/root_$DISTRO ]] || btrfs subvolume delete /mnt/root_$DISTRO ## create subvols ## cd /mnt for x in q home_$DISTRO root_$DISTRO; do btrfs subvolume list . | grep "$x$" >/dev/null || btrfs subvolume create $x chown root:1000 q done mkdir -p /mnt/root_$DISTRO/boot for x in root/a q/a; do mkdir -p $x chown 1000:1000 $x chmod 755 $x done # could set default like this, but no reason to. # btrfs subvolume set-default \ # $(btrfs subvolume list . | grep "root_$DISTRO$" | awk '{print $2}') . chattr -Rf +C root_$DISTRO cd / umount /mnt mount -o subvolid=0 $first_boot_dev /mnt cd /mnt btrfs subvolume set-default 0 /mnt [[ ! -e /mnt/boot_$DISTRO ]] || btrfs subvolume delete /mnt/boot_$DISTRO btrfs subvolume create boot_$DISTRO cd / umount /mnt ## end create subvols ## cat > /tmp/fai/fstab <>/tmp/fai/crypttab <> /tmp/fai/fstab </tmp/fai/disk_var.sh <