summaryrefslogtreecommitdiffstats
path: root/abs/core/plymouth/encrypt_install
diff options
context:
space:
mode:
authorBritney Fransen <brfransen@gmail.com>2013-12-04 18:04:47 (GMT)
committerBritney Fransen <brfransen@gmail.com>2013-12-04 18:04:47 (GMT)
commit64a523b563e3cd7bb2a640c23267f2cf91d3bacc (patch)
tree437ed9a2d61f559260d72246a2127e50fb8c164b /abs/core/plymouth/encrypt_install
parentd5370e5d6fe083e14866c5b5d1728fea4f9879bc (diff)
downloadlinhes_pkgbuild-64a523b563e3cd7bb2a640c23267f2cf91d3bacc.zip
linhes_pkgbuild-64a523b563e3cd7bb2a640c23267f2cf91d3bacc.tar.gz
linhes_pkgbuild-64a523b563e3cd7bb2a640c23267f2cf91d3bacc.tar.bz2
plymouth, plymouth-theme-linhes: update and kill some bugs
LinHES-config: change splash detection
Diffstat (limited to 'abs/core/plymouth/encrypt_install')
-rw-r--r--abs/core/plymouth/encrypt_install49
1 files changed, 49 insertions, 0 deletions
diff --git a/abs/core/plymouth/encrypt_install b/abs/core/plymouth/encrypt_install
new file mode 100644
index 0000000..5258a0b
--- /dev/null
+++ b/abs/core/plymouth/encrypt_install
@@ -0,0 +1,49 @@
+#!/bin/bash
+
+build() {
+ local mod
+
+ add_module dm-crypt
+ if [[ $CRYPTO_MODULES ]]; then
+ for mod in $CRYPTO_MODULES; do
+ add_module "$mod"
+ done
+ else
+ add_all_modules '/crypto/'
+ fi
+
+ add_binary "cryptsetup"
+ add_binary "dmsetup"
+ add_file "/usr/lib/udev/rules.d/10-dm.rules"
+ add_file "/usr/lib/udev/rules.d/13-dm-disk.rules"
+ add_file "/usr/lib/udev/rules.d/95-dm-notify.rules"
+ add_file "/usr/lib/initcpio/udev/11-dm-initramfs.rules" "/usr/lib/udev/rules.d/11-dm-initramfs.rules"
+ add_binary "/usr/lib/plymouth/label.so"
+ add_binary "/usr/lib/plymouth/text.so"
+ add_file "/usr/share/fonts/TTF/DejaVuSans.ttf"
+ add_file "/etc/fonts/fonts.conf"
+ add_file "/etc/fonts/conf.d/60-latin.conf"
+
+ add_runscript
+}
+
+help() {
+ cat <<HELPEOF
+This hook allows for an encrypted root device. Users should specify the device
+to be unlocked using 'cryptdevice=device:dmname' on the kernel command line,
+where 'device' is the path to the raw device, and 'dmname' is the name given to
+the device after unlocking, and will be available as /dev/mapper/dmname.
+
+For unlocking via keyfile, 'cryptkey=device:fstype:path' should be specified on
+the kernel cmdline, where 'device' represents the raw block device where the key
+exists, 'fstype' is the filesystem type of 'device' (or auto), and 'path' is
+the absolute path of the keyfile within the device.
+
+Without specifying a keyfile, you will be prompted for the password at runtime.
+This means you must have a keyboard available to input it, and you may need
+the keymap hook as well to ensure that the keyboard is using the layout you
+expect.
+HELPEOF
+}
+
+# vim: set ft=sh ts=4 sw=4 et: