|
|
|
#!/bin/bash
|
|
|
|
set -e
|
|
|
|
|
|
|
|
|
|
|
|
apt-get -y install mdadm cryptsetup debootstrap
|
|
|
|
|
|
|
|
# returns /dev/md0 as root device
|
|
|
|
# returns /dev/md1 as boot device
|
|
|
|
"./hardware/${1}/parted.sh" "$2"
|
|
|
|
|
|
|
|
# encrypt and unlock root device
|
|
|
|
echo -n 'Enter luks password: '
|
|
|
|
read -s md0pwd
|
|
|
|
echo #to indicate progress after password prompt
|
|
|
|
echo -n $md0pwd | cryptsetup -q luksFormat /dev/md0
|
|
|
|
echo -n $md0pwd | cryptsetup open --type luks /dev/md0 md0-unlocked
|
|
|
|
unset md0pwd
|
|
|
|
|
|
|
|
|
|
|
|
# format
|
|
|
|
|
|
|
|
chroot=/mnt/md0-unlocked
|
|
|
|
|
|
|
|
# root device
|
|
|
|
mkfs.btrfs /dev/mapper/md0-unlocked
|
|
|
|
mkdir /mnt/md0-unlocked
|
|
|
|
mount /dev/mapper/md0-unlocked /mnt/md0-unlocked
|
|
|
|
|
|
|
|
# boot device
|
|
|
|
mkfs.btrfs /dev/md1
|
|
|
|
mkdir "$chroot/boot"
|
|
|
|
mount /dev/md1 "$chroot/boot"
|
|
|
|
|
|
|
|
# esp device
|
|
|
|
mkfs.fat "hardware/${1}/esp"
|
|
|
|
mkdir "$chroot/boot/efi"
|
|
|
|
mount "hardware/${1}/esp" "$chroot/boot/efi"
|
|
|
|
|
|
|
|
|
|
|
|
# debootstrap
|
|
|
|
|
|
|
|
debootstrap --variant=minbase --arch=amd64 buster "$chroot" https://deb.debian.org/debian/
|
|
|
|
|
|
|
|
mount -t proc none "$chroot/proc"
|
|
|
|
mount -t sysfs none "$chroot/sys"
|
|
|
|
mount -o bind /dev "$chroot/dev"
|
|
|
|
|
|
|
|
|
|
|
|
# set hostname
|
|
|
|
echo "$2" > "$chroot/etc/hostname"
|
|
|
|
|
|
|
|
|
|
|
|
# create hardware-setup copy for post-debootstrap
|
|
|
|
mkdir "$chroot/hardware-setup"
|
|
|
|
cp -a * "$chroot/hardware-setup"
|
|
|
|
|
|
|
|
chroot "$chroot" /hardware-setup/post-debootstrap-installer.sh "$1"
|
|
|
|
|
|
|
|
rm -r "$chroot/hardware-setup"
|