Created
April 1, 2015 21:58
-
-
Save mariodpros/3129b40038be5fbca0e4 to your computer and use it in GitHub Desktop.
/etc/initramfs-tools/hooks/crypt_unlock.sh
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#!/bin/sh | |
# https://stinkyparkia.wordpress.com/2014/10/14/remote-unlocking-luks-encrypted-lvm-using-dropbear-ssh-in-ubuntu-server-14-04-1-with-static-ipst/ | |
PREREQ="dropbear" | |
prereqs() { | |
echo "$PREREQ" | |
} | |
case "$1" in | |
prereqs) | |
prereqs | |
exit 0 | |
;; | |
esac | |
. "${CONFDIR}/initramfs.conf" | |
. /usr/share/initramfs-tools/hook-functions | |
if [ "${DROPBEAR}" != "n" ] && [ -r "/etc/crypttab" ] ; then | |
cat > "${DESTDIR}/bin/unlock" << EOF | |
#!/bin/sh | |
if PATH=/lib/unlock:/bin:/sbin /scripts/local-top/cryptroot; then | |
kill \`ps | grep cryptroot | grep -v "grep" | awk '{print \$1}'\` | |
# following line kill the remote shell right after the passphrase has | |
# been entered. | |
kill -9 \`ps | grep "\-sh" | grep -v "grep" | awk '{print \$1}'\` | |
exit 0 | |
fi | |
exit 1 | |
EOF | |
chmod 755 "${DESTDIR}/bin/unlock" | |
mkdir -p "${DESTDIR}/lib/unlock" | |
cat > "${DESTDIR}/lib/unlock/plymouth" << EOF | |
#!/bin/sh | |
[ "\$1" == "--ping" ] && exit 1 | |
/bin/plymouth "\$@" | |
EOF | |
chmod 755 "${DESTDIR}/lib/unlock/plymouth" | |
echo To unlock root-partition run "unlock" >> ${DESTDIR}/etc/motd | |
fi |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment