aboutsummaryrefslogtreecommitdiffstats
path: root/partition.sh
diff options
context:
space:
mode:
Diffstat (limited to 'partition.sh')
-rwxr-xr-xpartition.sh118
1 files changed, 118 insertions, 0 deletions
diff --git a/partition.sh b/partition.sh
new file mode 100755
index 0000000..1618aec
--- /dev/null
+++ b/partition.sh
@@ -0,0 +1,118 @@
+#!/bin/sh
+
+set -ue
+
+. /lib/fripost-partman/base.sh
+
+dev=/dev/sda
+fripost_wipe $dev
+
+grain=$(( 256*32 ))
+offset=`cat /sys/block/${dev#/dev/}/alignment_offset`
+bs=`cat /sys/block/${dev#/dev/}/queue/physical_block_size`
+
+if [ $offset -eq 0 ]; then
+ offset=64
+else
+ offset=$(( $offset / $bs ))
+fi
+
+parted -sm $dev mklabel gpt
+# All offset2's must be multiple of 256*32 = 8192
+if [ -d /proc/efi ] || [ -d /sys/firmware/efi ]; then
+ offset2=$(( 256 * 1024**2 / $bs ))
+ offset2=$(( $offset2 - $offset2 % $grain ))
+ parted -a minimal -sm $dev mkpart uefi ${offset}s $(( $offset2 - 1 ))s
+ offset=$offset2
+ offset2=$(( $offset + 64 * 1024**2 / $bs ))
+ offset2=$(( $offset2 - $offset2 % $grain ))
+ parted -a minimal -sm $dev mkpart boot ${offset}s $(( $offset2 - 1))s
+ parted -sm $dev set 1 boot on
+else
+ offset2=$(( 64 * 1024**2 / $bs ))
+ parted -a minimal -sm $dev mkpart boot ${offset}s $(( $offset2 - 1))s
+fi
+offset=$offset2
+offset2=$(( `cat /sys/block/${dev#/dev/}/size` - 1 ))
+offset2=$(( $offset2 - $offset2 % $grain ))
+parted -a optimal -sm $dev mkpart system ${offset}s $(( $offset2 - 1))s
+system=${dev}$(parted -sm $dev p | grep -m 1 '^[1-9][0-9]*:.*:system:[^:]*;$' | sed 's/:.*//')
+parted -sm $dev align-check opt ${system#$dev}
+#parted -sm $dev set ${system#$dev} lvm on
+
+# Choose the key length and digest depending on the architecture
+# we're on; we use AES128 and SHA-256 on 32-bits platforms, and
+# AES256 and SHA-512 on 64-bits platforms.
+arch=$(uname -m)
+if [ x"$arch" = x"x86_64" ]; then
+ keysize=256
+ hash=sha512
+elif [ x"$arch" = x"i386" -o x"$arch" = x"i686" ]; then
+ keysize=128
+ hash=sha256
+fi
+# Note: XTS requires the key size to be doubled.
+fripost_encrypt $system system_crypt \
+ --align-payload $grain \
+ --cipher aes-xts-plain64 --key-size $(( $keysize * 2 )) --hash $hash \
+ --iter-time 5000 --use-random
+
+
+pvcreate -ff -y /dev/mapper/system_crypt
+vgcreate eilift /dev/mapper/system_crypt
+
+lvcreate -L 5G -n root eilift
+lvcreate -L 1G -n swap eilift
+lvcreate -l 100%FREE -n home eilift
+vgchange -ay eilift
+
+mkfs.ext2 /dev/sda1
+mkfs.ext4 /dev/eilift/root
+mkfs.ext4 /dev/eilift/home
+
+mkdir -p /target/proc
+mkdir -p /target/cdrom
+
+cat > /tmp/fstab <<EOF
+# /etc/fstab: static file system information.
+#
+# <file system> <mount point> <type> <options> <dump> <pass>
+proc /proc proc defaults 0 0
+# TODO: ^ is that needed?
+/dev/cdrom /cdrom iso9660,udf ro,user,noauto 0 0
+# TODO: ^ remove
+EOF
+mkdir -p /target/
+mount -t ext4 /dev/eilift/root /target/
+echo /dev/eilift/root / ext4 noatime,errors=remount-ro 0 1 >> /tmp/fstab
+mkdir -p /target/home
+mount -t ext4 /dev/eilift/home /target/home/
+echo /dev/eilift/home /home/ ext4 noatime 0 2 >> /tmp/fstab
+mkdir -p /target/boot
+mount -t ext2 /dev/sda1 /target/boot/
+echo /dev/sda1 /boot/ ext2 noatime 0 2 >> /tmp/fstab
+
+mkswap /dev/eilift/swap
+swapon /dev/eilift/swap
+echo "/dev/eilift/swap none swap sw 0 0" >> /tmp/fstab
+
+mkdir -p /target/etc
+cp /tmp/fstab /target/etc/fstab
+
+# functions:
+# parted
+# - aligned ([+]256MB)
+# cryptsetup ...
+# - set up SSH daemon
+# - /sbin/cryptsetup -q ... --key-file="$keyfile" luksFormat $system
+# - /sbin/cryptsetup -q --key-file="$keyfile" luksOpen $system system_crypt
+# pvcreate
+# vgcreate
+# vgchange
+# mkfs -t type [fs-options] device
+# mount -t vfstype [-o options] device dir
+# - create mountpoint
+# - add entry to fstab
+# - mount
+
+#+ logs!