82 lines
3.8 KiB
Plaintext
82 lines
3.8 KiB
Plaintext
packages() {
|
|
addpkg base-system lvm2 cryptsetup htop wireguard-tools sudo neovim xtools
|
|
}
|
|
|
|
config() {
|
|
chown root:root /
|
|
chmod 755 /
|
|
echo ${HOSTNAME} > /etc/hostname
|
|
ln -sf "/usr/share/zoneinfo/${timezone}" /etc/localtime
|
|
sed -i "s/#HOSTNAME=\"void-live\"/HOSTNAME=${HOSTNAME}/g" /etc/rc.conf
|
|
sed -i "s/Europe\/Madrid/${timezone//\//\\/}/" /etc/rc.conf
|
|
sed -i "/HARDWARECLOCK/s/^#//g" /etc/rc.conf
|
|
sed -i "/FONT=/s/^#//g" /etc/rc.conf
|
|
|
|
echo "LANG=en_US.UTF-8" > /etc/locale.conf
|
|
echo "en_US.UTF-8 UTF-8" >> /etc/default/libc-locales
|
|
if ! [ "$LANGUAGE" == "en" ]; then
|
|
echo "${L1}.UTF-8 UTF-8" >> /etc/default/libc-locales
|
|
fi
|
|
xbps-reconfigure -f glibc-locales
|
|
|
|
if [ "${ENC}" == "1" ]; then
|
|
echo "GRUB_ENABLE_CRYPTODISK=y" >> /etc/default/grub
|
|
else
|
|
echo "#GRUB_ENABLE_CRYPTODISK=y" >> /etc/default/grub
|
|
fi
|
|
|
|
cat <<EOF > /etc/fstab
|
|
tmpfs /tmp tmpfs defaults,nosuid,nodev 0 0
|
|
/dev/mapper/vg_${TARGETNAME_UNDERSCORE}-root / btrfs defaults,subvol=root 0 0
|
|
/dev/mapper/vg_${TARGETNAME_UNDERSCORE}-root /home btrfs defaults,subvol=home 0 0
|
|
/dev/mapper/vg_${TARGETNAME_UNDERSCORE}-swap swap swap defaults 0 0
|
|
EOF
|
|
|
|
if [ "$EFI" == "1" ]; then
|
|
uuid=$(blkid -o value -s UUID ${TARGET_PHY_ID}-part1)
|
|
echo "UUID=${uuid} /boot/efi vfat defaults 0 0" >> /etc/fstab
|
|
echo "efivarfs /sys/firmware/efi/efivars efivarfs defaults 0 0" >> /etc/fstab
|
|
fi
|
|
|
|
uuid=$(blkid -o value -s UUID ${TARGET_PHY_ID}-part${TARGET_PART})
|
|
sed -i "/^GRUB_CMDLINE_LINUX_DEFAULT/s/=\"/=\"rd.luks.uuid=${uuid} /" /etc/default/grub
|
|
sed -i "/^GRUB_CMDLINE_LINUX_DEFAULT/s/=\"/=\"rd.lvm.vg=vg_${TARGETNAME_UNDERSCORE} /" /etc/default/grub
|
|
|
|
|
|
if [ "$ENCRYPTION_STYLE" == "a" ] || [ "$ENCRYPTION_STYLE" == "d" ]; then
|
|
dd bs=1 count=64 if=/dev/urandom of=/boot/volume.key
|
|
echo -n $pass | cryptsetup luksAddKey $TARGET_PHY_ID-part${TARGET_PART} /boot/volume.key
|
|
chmod 000 /boot/volume.key
|
|
chmod -R g-rwx,o-rwx /boot
|
|
echo "luks_${TARGETNAME_UNDERSCORE} $TARGET_PHY_ID-part${TARGET_PART} /boot/volume.key luks" >> /etc/crypttab
|
|
echo "install_items+=\" /boot/volume.key /etc/crypttab \"" > /etc/dracut.conf.d/10-crypt.conf
|
|
fi
|
|
|
|
if [ "$ENC" == "1" ]; then
|
|
echo "echo \"Disk pw is \'${pass}\'\"" > /etc/runit/core-services/99-changepwdisk.sh
|
|
echo "read -p \"Change PW for disk? y/n \" answer" >> /etc/runit/core-services/99-changepwdisk.sh
|
|
echo "if [ \"\${answer}\" = \"y\" ]; then" >> /etc/runit/core-services/99-changepwdisk.sh
|
|
echo " while ! cryptsetup luksChangeKey /dev/disk/by-uuid/${cfg[partuuid]}; do" >> /etc/runit/core-services/99-changepwdisk.sh
|
|
echo " echo \"Again, please\"" >> /etc/runit/core-services/99-changepwdisk.sh
|
|
echo " done" >> /etc/runit/core-services/99-changepwdisk.sh
|
|
echo " rm -rf /etc/runit/core-services/99-changepwdisk.sh" >> /etc/runit/core-services/99-changepwdisk.sh
|
|
echo "fi" >> /etc/runit/core-services/99-changepwdisk.sh
|
|
fi
|
|
|
|
useradd -G wheel -m -s /usr/bin/bash -c "${USERNAME}" "${USERNAME}"
|
|
echo -e "${pass}\n${pass}" | passwd "${USERNAME}"
|
|
|
|
passwd -dl root
|
|
|
|
echo "echo \"User pw is \'${pass}\'\"" > /etc/runit/core-services/99-changepwuser.sh
|
|
echo "echo \"You should change it before login\"" > /etc/runit/core-services/99-changepwuser.sh
|
|
echo "read -p \"Change PW for ${USERNAME}? y/n \" answer" >> /etc/runit/core-services/99-changepwuser.sh
|
|
echo "if [ \"\${answer}\" = \"y\" ]; then" >> /etc/runit/core-services/99-changepwuser.sh
|
|
echo " while ! passwd ${USERNAME}; do" >> /etc/runit/core-services/99-changepwuser.sh
|
|
echo " echo \"Again, please\"" >> /etc/runit/core-services/99-changepwuser.sh
|
|
echo " done" >> /etc/runit/core-services/99-changepwuser.sh
|
|
echo " rm -rf /etc/runit/core-services/99-changepwuser.sh" >> /etc/runit/core-services/99-changepwuser.sh
|
|
echo "fi" >> /etc/runit/core-services/99-changepwuser.sh
|
|
|
|
|
|
} |