vinstaller/main.sh
2022-02-07 00:25:49 +01:00

145 lines
3.9 KiB
Bash

#!/bin/bash
main="/tmp/vinstall"
target="${main}/target"
pass="oem"
mkdir -p $target
. functions
target_phy_disk() {
header "Choose target disk"
local DISKS_DETAILS
local output
DISKS_DETAILS=$(lsblk -l -o KNAME,TYPE,SIZE,MODEL,WWN|grep disk)
echo "$DISKS_DETAILS"
input "which one?" "$(echo "$DISKS_DETAILS"|awk '{print $1}'|tr '\n' ' ')" "not found."
TARGET_PHY_DISK="/dev/${output}"
}
target_phy_id() {
local i
local f1
local f2
for i in $(find /dev/disk/by-id|grep -v part); do
if realpath "$i" | grep -q -i "$TARGET_PHY_DISK"; then
if echo "$i" | grep -q "wwn"; then
TARGET_PHY_WWN="$i"
f1=1
fi
if echo "$i" | grep -q -v "wwn"; then
TARGET_PHY_ID="$i"
f2=1
fi
fi
done
if [ "$f1" == "1" ] && [ "$f2" == "1" ]; then
return 0
else
err "no id found"
fi
}
use_efi() {
if test -e /sys/firmware/efi; then
EFI=1
else
EFI=0
fi
}
encryption_style() {
header "Choose encryption style"
echo "implemented:"
echo "a)keyfile in initramfs" #bios: 1 uefi: 2
echo "b)no encryption" #bios: 2 uefi: 2
echo "not implemented:"
echo "c)no keyfile (double pw enter)" #bios: 1 uefi: 2
echo "d)keyfile on usb" #bios: 1 uefi: ?
echo "e)unencrypted boot" #bios: 2 uefi: 2
input "how to encrypt?" "a b c d e" "wrong input"
ENCRYPTION_STYLE="$output"
}
hibernation() {
ramsize="$(($(getconf _PHYS_PAGES) * $(getconf PAGE_SIZE) / (1024 * 1024)))"
ramsize="$(awk "BEGIN { printf(\"%.0f\n\", ${ramsize}/1024); }")"
HIBERNATE=1
if [[ "${ramsize}" -lt "2" ]]; then
SWAPSIZE="$(( ramsize * 2 ))"
SWAPSIZE="$(( ramsize * 3 ))"
elif [[ "${ramsize}" -ge "2" ]] && [[ "${ramsize}" -lt "8" ]]; then
SWAPSIZE="${ramsize}"
SWAPSIZE="$(( ramsize * 2 ))"
elif [[ "${ramsize}" -ge "8" ]] && [[ "${ramsize}" -lt "16" ]]; then
SWAPSIZE="${ramsize}"
SWAPSIZE="$(awk "BEGIN { printf(\"%.0f\n\", ${ramsize}*1.5); }")"
elif [[ "${ramsize}" -ge "16" ]]; then
SWAPSIZE="4"
echo "hibernate not recommended, turning off"
HIBERNATE="0"
SWAPSIZE="4"
fi
}
do_partition() {
header "do partition"
start=1
if [ "$EFI" == "1" ]; then
parted -a optimal $TARGET_PHY_WWN mklabel gpt
size=500
parted -a optimal $TARGET_PHY_WWN unit mib mkpart EFI fat32 $start $(($start+$size))
start=$(($start+$size+1))
parted -a optimal $TARGET_PHY_WWN unit mib mkpart root $start -1s
mkfs.vfat -F32 $TARGET_PHY_WWN-part1
TARGET_PART="2"
else
parted -a optimal $TARGET_PHY_WWN mklabel msdos
TARGET_PART="1"
if [ "$ENCRYPTION_STYLE" == "b" ] || [ "$ENCRYPTION_STYLE" == "e" ]; then
size=2048
parted -a optimal $TARGET_PHY_WWN unit mib mkpart primary ext4 $start $(($start+$size))
start=$(( $start + $size + 1 ))
mkfs.btrfs $TARGET_PHY_WWN-part1
TARGET_PART="2"
fi
parted -a optimal $TARGET_PHY_WWN unit mib mkpart primary ext4 $start -1
fi
TARGETNAME=$(basename ${TARGET_PHY_WWN}-part${TARGET_PART})
echo -n $pass | cryptsetup luksFormat ${TARGET_PHY_WWN}-part${TARGET_PART} -d -
#echo -n $pass | sudo cryptsetup luksOpen /dev/sdc1 sdc1 -d -
echo -n $pass | cryptsetup luksOpen ${TARGET_PHY_WWN}-part${TARGET_PART} "luks-${TARGETNAME}" -d -
vgcreate vg-${TARGETNAME} /dev/mapper/luks-${TARGETNAME}
lvcreate --name swap -L ${SWAPSIZE}G vg-${TARGETNAME}
lvcreate --name root -l 100%FREE vg-${TARGETNAME}
mkswap /dev/mapper/vg-${TARGETNAME}-swap
mkfs.btrfs /dev/mapper/vg-${TARGETNAME}-root
mount /dev/mapper/vg-${TARGETNAME}-root $target
btrfs subvol create ${target}/root
btrfs subvol create ${target}/home
umount $target
mount /dev/mapper/vg-${TARGETNAME}-root $target -o subvol=root
if [ "$EFI" == "1" ]; then
mkdir -p ${target}/boot/efi
mount ${TARGET_PHY_WWN}-part1 ${target}/boot/efi
else
if [ "$ENCRYPTION_STYLE" == "b" ] || [ "$ENCRYPTION_STYLE" == "e" ]; then
mkdir -p ${target}/boot
mount ${TARGET_PHY_WWN}-part1 ${target}/boot
fi
fi
}
target_phy_disk
target_phy_id
use_efi
encryption_style
hibernation
#do_partition