summaryrefslogtreecommitdiff
path: root/pcr/plymouth/plymouth.encrypt_install
diff options
context:
space:
mode:
authorDavid P <megver83@openmailbox.org>2017-03-22 11:10:24 -0300
committerDavid P <megver83@openmailbox.org>2017-03-22 11:10:24 -0300
commit8222e4f10d701a4a52c62f95de3573d1c904d249 (patch)
tree386b9a4a93d0502a0f4759c8296d1996490250a8 /pcr/plymouth/plymouth.encrypt_install
parent62526bc1720fdacef644e905ba4a3bd2200e512f (diff)
downloadabslibre-8222e4f10d701a4a52c62f95de3573d1c904d249.tar.gz
abslibre-8222e4f10d701a4a52c62f95de3573d1c904d249.tar.bz2
abslibre-8222e4f10d701a4a52c62f95de3573d1c904d249.zip
Added plymouth
Diffstat (limited to 'pcr/plymouth/plymouth.encrypt_install')
-rw-r--r--pcr/plymouth/plymouth.encrypt_install49
1 files changed, 49 insertions, 0 deletions
diff --git a/pcr/plymouth/plymouth.encrypt_install b/pcr/plymouth/plymouth.encrypt_install
new file mode 100644
index 000000000..5258a0b2d
--- /dev/null
+++ b/pcr/plymouth/plymouth.encrypt_install
@@ -0,0 +1,49 @@
+#!/bin/bash
+
+build() {
+ local mod
+
+ add_module dm-crypt
+ if [[ $CRYPTO_MODULES ]]; then
+ for mod in $CRYPTO_MODULES; do
+ add_module "$mod"
+ done
+ else
+ add_all_modules '/crypto/'
+ fi
+
+ add_binary "cryptsetup"
+ add_binary "dmsetup"
+ add_file "/usr/lib/udev/rules.d/10-dm.rules"
+ add_file "/usr/lib/udev/rules.d/13-dm-disk.rules"
+ add_file "/usr/lib/udev/rules.d/95-dm-notify.rules"
+ add_file "/usr/lib/initcpio/udev/11-dm-initramfs.rules" "/usr/lib/udev/rules.d/11-dm-initramfs.rules"
+ add_binary "/usr/lib/plymouth/label.so"
+ add_binary "/usr/lib/plymouth/text.so"
+ add_file "/usr/share/fonts/TTF/DejaVuSans.ttf"
+ add_file "/etc/fonts/fonts.conf"
+ add_file "/etc/fonts/conf.d/60-latin.conf"
+
+ add_runscript
+}
+
+help() {
+ cat <<HELPEOF
+This hook allows for an encrypted root device. Users should specify the device
+to be unlocked using 'cryptdevice=device:dmname' on the kernel command line,
+where 'device' is the path to the raw device, and 'dmname' is the name given to
+the device after unlocking, and will be available as /dev/mapper/dmname.
+
+For unlocking via keyfile, 'cryptkey=device:fstype:path' should be specified on
+the kernel cmdline, where 'device' represents the raw block device where the key
+exists, 'fstype' is the filesystem type of 'device' (or auto), and 'path' is
+the absolute path of the keyfile within the device.
+
+Without specifying a keyfile, you will be prompted for the password at runtime.
+This means you must have a keyboard available to input it, and you may need
+the keymap hook as well to ensure that the keyboard is using the layout you
+expect.
+HELPEOF
+}
+
+# vim: set ft=sh ts=4 sw=4 et: