diff options
author | David P <megver83@openmailbox.org> | 2017-03-22 11:16:44 -0300 |
---|---|---|
committer | David P <megver83@openmailbox.org> | 2017-03-22 11:16:44 -0300 |
commit | ede2e3a6d5cd78a6b5291afc47d515301023e7cb (patch) | |
tree | ff0c77aabadff2eae758292f23990a75e1db41e7 /pcr/plymouth-nosystemd/plymouth.encrypt_install | |
parent | 8222e4f10d701a4a52c62f95de3573d1c904d249 (diff) | |
download | abslibre-ede2e3a6d5cd78a6b5291afc47d515301023e7cb.tar.gz abslibre-ede2e3a6d5cd78a6b5291afc47d515301023e7cb.tar.bz2 abslibre-ede2e3a6d5cd78a6b5291afc47d515301023e7cb.zip |
Added plymouth-nosystemd
Diffstat (limited to 'pcr/plymouth-nosystemd/plymouth.encrypt_install')
-rw-r--r-- | pcr/plymouth-nosystemd/plymouth.encrypt_install | 49 |
1 files changed, 49 insertions, 0 deletions
diff --git a/pcr/plymouth-nosystemd/plymouth.encrypt_install b/pcr/plymouth-nosystemd/plymouth.encrypt_install new file mode 100644 index 000000000..5258a0b2d --- /dev/null +++ b/pcr/plymouth-nosystemd/plymouth.encrypt_install @@ -0,0 +1,49 @@ +#!/bin/bash + +build() { + local mod + + add_module dm-crypt + if [[ $CRYPTO_MODULES ]]; then + for mod in $CRYPTO_MODULES; do + add_module "$mod" + done + else + add_all_modules '/crypto/' + fi + + add_binary "cryptsetup" + add_binary "dmsetup" + add_file "/usr/lib/udev/rules.d/10-dm.rules" + add_file "/usr/lib/udev/rules.d/13-dm-disk.rules" + add_file "/usr/lib/udev/rules.d/95-dm-notify.rules" + add_file "/usr/lib/initcpio/udev/11-dm-initramfs.rules" "/usr/lib/udev/rules.d/11-dm-initramfs.rules" + add_binary "/usr/lib/plymouth/label.so" + add_binary "/usr/lib/plymouth/text.so" + add_file "/usr/share/fonts/TTF/DejaVuSans.ttf" + add_file "/etc/fonts/fonts.conf" + add_file "/etc/fonts/conf.d/60-latin.conf" + + add_runscript +} + +help() { + cat <<HELPEOF +This hook allows for an encrypted root device. Users should specify the device +to be unlocked using 'cryptdevice=device:dmname' on the kernel command line, +where 'device' is the path to the raw device, and 'dmname' is the name given to +the device after unlocking, and will be available as /dev/mapper/dmname. + +For unlocking via keyfile, 'cryptkey=device:fstype:path' should be specified on +the kernel cmdline, where 'device' represents the raw block device where the key +exists, 'fstype' is the filesystem type of 'device' (or auto), and 'path' is +the absolute path of the keyfile within the device. + +Without specifying a keyfile, you will be prompted for the password at runtime. +This means you must have a keyboard available to input it, and you may need +the keymap hook as well to ensure that the keyboard is using the layout you +expect. +HELPEOF +} + +# vim: set ft=sh ts=4 sw=4 et: |