# RAID1: forces raid1 filesystem.
mkroot2=false
-case $1 in
- mkroot2)
- mkroot2=true
- ;;
- *)
- echo "$0: error: unsupported arg: $1" >&2
- exit 1
- ;;
-esac
-
+if [[ $1 ]]; then
+ case $1 in
+ mkroot2)
+ mkroot2=true
+ ;;
+ *)
+ echo "$0: error: unsupported arg: $1" >&2
+ exit 1
+ ;;
+ esac
+fi
if [[ $SPECIAL_DISK ]]; then
# cryptsetup luksAddKey --pbkdf pbkdf2
# then remove the new format keys with cryptsetup luksRemoveKey
# then cryptsetup convert DEV --type luks1, then readd old keys and remove temp.
- yes YES | cryptsetup luksFormat $luksdev $luks_file \
- --type luks1 -c aes-cbc-essiv:sha256 -s 256 || [[ $? == 141 ]]
+ yes YES | cryptsetup luksFormat $luksdev $luks_file || [[ $? == 141 ]]
yes "$lukspw" | \
cryptsetup luksAddKey --key-file $luks_file \
$luksdev || [[ $? == 141 ]]
# recovery needs and for doing pxe-kexec.
boot_mib=10000
root2_mib=200000
- boot2_mib=500
-elif (( boot_space > 30000 )); then
+ boot2_mib=2000
+elif (( boot_spa_ce > 30000 )); then
boot_mib=$(( 5000 + (boot_space - 30000) / 2 ))
root2_mib=100
boot2_mib=100
done
shopt -s nullglob
+# We write to these files instead of just /etc/fstab, /etc/crypttab,
+# because these are filesystems created after our current root, and so
+# this allows us to update other root filesystems too.
rm -f /mnt/root/root2-{fs,crypt}tab
if $mkroot2; then
if $partition; then