set -eE -o pipefail
trap 'echo "$0:$LINENO:error: \"$BASH_COMMAND\" returned $?" >&2' ERR
-# for calling outside of FAI, first
-# - source /a/bin/fai-wrapper
+# for calling outside of FAI:
+# # need to redep and set that location so that we get luks keys
+# export FAI=/srv/fai/config
+# fai-redep
+# source /b/fai/fai-wrapper
# - set any appropriate classes with: fai-setclass OPT1... which sets CLASS_OPT1=true...
# or run eval-fai-classfile FILE
#
# https://wiki.archlinux.org/index.php/GRUB
bios_grubn=5
lastn=$bios_grubn
-# this is larger than needed for several /boot subvols,
-# becuase I keep a minimal debian install on it, for
-# recovery needs, and for doing pxe-kexec.
-boot_mib=10000
+
##### end configuration
exit 1
fi
-
+boot_space=0
first=false
boot_devs=()
for dev in ${devs[@]}; do
done
$bad_disk || boot_devs+=($(bootdev))
else
+ boot_space=$(( boot_space + $(parted -m $dev unit MiB print | \
+ sed -nr "s#^/dev/[^:]+:([0-9]+).*#\1#p") - 1))
boot_devs+=($(bootdev))
fi
if [[ $boot_devs && $first ]]; then
raid_level=1
else
raid_level=10
- # need double the space if we are raid 10, and then
- # might as well give some extra.
- boot_mib=$((boot_mib * 3))
fi
+### Begin calculate boot partition space
+# due to raid duplication
+case $raid_level in
+ 1*) boot_space=$(( boot_space / 2 )) ;;
+esac
+if (( boot_space > 60000 )); then
+ # this is larger than needed for several /boot subvols,
+ # becuase I keep a minimal debian install on it for
+ # recovery needs and for doing pxe-kexec.
+ boot_mib=10000
+elif (( boot_space > 30000 )); then
+ boot_mib=$(( 5000 + (boot_space - 30000) / 2 ))
+else
+ # Small vms don't have room for /boot recovery. With 3 kernels
+ # installed, i'm using 132M on t8, so this seems like plenty of
+ # room. note: rhel 8 recomments 1g for /boot.
+ boot_mib=500
+ #
+fi
+case $raid_level in
+ 1*) boot_mib=$(( boot_mib * 2 )) ;;
+esac
+### end calculate boot partition space
+
if [[ ! $DISTRO ]]; then
}
-# keyfiles generated like:
-# head -c 2048 /dev/urandom | od | s dd of=/q/root/luks/host-demohost
-luks_dir=${LUKS_DIR:-/var/lib/fai/config/distro-install-common/luks}
+# see README for docs about how to create these
+luks_dir=$FAI/distro-install-common/luks
luks_file=$luks_dir/host-$HOSTNAME
# # note, corresponding changes in /b/ds/keyscript-{on,off}
if ifclass tpnew; then
lukspw=$(cat $luks_dir/traci)
-elif ifclass BUSTER_LINODE; then
- lukspw=$(cat $luks_dir/li)
elif ifclass ziva; then
lukspw=$(cat $luks_dir/ziva)
elif ifclass demohost; then
lukspw=x
+elif [[ -e $luks_dir/$HOSTNAME ]]; then
+ lukspw=$(cat $luks_dir/$HOSTNAME)
else
lukspw=$(cat $luks_dir/iank)
fi
bpart ${boot_devs[@]}
else
for dev in ${devs[@]}; do
- mkfs.ext2 $(grub_extdev)
+ if [[ -e /a/bin/fai/fai-wrapper && -e /dev/mapper/$(root-cryptname) ]]; then
+ continue
+ fi
cryptsetup luksOpen $(rootdev) $(root-cryptname) \
--key-file $luks_file
done
btrfs subvolume create root_$DISTRO
- mkdir -p /mnt/root_$DISTRO/boot
# could set default subvol like this, but no reason to.
# btrfs subvolume set-default \
# $(btrfs subvolume list . | grep "root_$DISTRO$" | awk '{print $2}') .
else
# note, fai creates the mountpoints listed here
cat > /tmp/fai/fstab <<EOF
-$first_root_crypt / btrfs noatime,subvol=root_$DISTRO 0 0
-$first_root_crypt /mnt/root btrfs noatime,subvolid=0 0 0
-$first_boot_dev /boot btrfs noatime,subvol=$boot_vol 0 0
+$first_root_crypt / btrfs noatime,subvol=root_$DISTRO 0 0
+$first_root_crypt /mnt/root btrfs nofail,noatime,subvolid=0 0 0
+$first_boot_dev /boot btrfs nofail,noatime,subvol=$boot_vol 0 0
+$first_boot_dev /mnt/boot btrfs nofail,noatime,subvolid=0 0 0
EOF
swaps=()
for dev in ${devs[@]}; do
swaps+=($(swap-cryptname))
cat >>/tmp/fai/crypttab <<EOF
-$(root-cryptname) $(rootdev) none keyscript=decrypt_keyctl,discard,luks,initramfs
+$(root-cryptname) $(rootdev) none keyscript=/root/keyscript,discard,luks,initramfs
$(swap-cryptname) $(swapdev) /dev/urandom swap,cipher=aes-xts-plain64,size=256,hash=ripemd160
EOF
cat >> /tmp/fai/fstab <<EOF
-$(swap-cryptdev) none swap sw 0 0
+$(swap-cryptdev) none swap nofail,sw 0 0
EOF
done