2022-08-29 22:46:11 +03:00
< details >
< summary > Table of contents< / summary >
- [VoidLinuxInstaller script ](#voidlinuxinstaller-script )
- [Some fancy screenshots ](#some-fancy-screenshots )
- [How to run it? ](#how-to-run-it )
- [How does it work ](#how-does-it-work )
- [Suggested partition layout ](#suggested-partition-layout )
- [Final partitioning result ](#final-partitioning-result )
2022-08-31 15:09:25 +03:00
- [Follow up for `@snapshots` subvolume ](#follow-up-for-snapshots-subvolume )
2022-09-04 00:10:31 +03:00
- [How to unlock encrypted partition in GRUB2 ](#how-to-unlock-encrypted-partition-in-grub2 )
2022-08-29 22:46:11 +03:00
- [What to do if system breaks? ](#what-to-do-if-system-breaks )
- [How to add more space with a new drive with LVM ](#how-to-add-more-space-with-a-new-drive-with-lvm )
2022-08-31 15:09:25 +03:00
- [Notes ](#notes )
- [Resources ](#resources )
2022-08-29 22:46:11 +03:00
< / details >
2022-07-05 21:42:36 +03:00
# VoidLinuxInstaller script
2022-07-18 17:21:23 +03:00
The **VoidLinuxInstaller script** is an attempt to make [my gist ](https://gist.github.com/Le0xFF/ff0e3670c06def675bb6920fe8dd64a3 ) an interactive bash script.
2022-07-05 21:42:36 +03:00
2023-07-30 19:23:37 +03:00
The script is now a much more interactive one, with a hopefully proper menu.
The last version of the old one can always be found at the following [link ](https://raw.githubusercontent.com/Le0xFF/VoidLinuxInstaller/74ad30e21227d3a1da6b4fb4387e55c3109c6eed/vli.sh ).
2022-07-18 17:21:23 +03:00
As stated in the gist, this script provides:
2022-08-28 17:01:33 +03:00
- Optional Full Disk Encryption (including `/boot` ) with LUKS1/2;
2022-08-07 18:45:03 +03:00
- Optional Logic Volume Management (LVM);
- BTRFS as filesystem;
2022-08-28 17:01:33 +03:00
- EFISTUB (LUKS1/2) or GRUB2 (LUKS1 only due to [limitations ](https://savannah.gnu.org/bugs/?55093 ) for encrypted `/boot` ) as bootloader;
2022-08-09 22:50:21 +03:00
- Optional swapfile enabling also [zswap ](https://fedoraproject.org/wiki/Zswap ) (swap is needed if you plan to use hibernation);
2022-08-21 18:39:04 +03:00
- Enable trim if the selected drive supports it.
2022-07-05 21:42:36 +03:00
2022-07-20 22:13:42 +03:00
To know how the script works in details, please jump to the [How does it work? ](#how-does-it-work ) section!
To know how to run the script, please jump to the [How to run it? ](#how-to-run-it ) section!
2022-07-18 17:26:34 +03:00
2023-07-30 19:23:37 +03:00
This script comes from my need to automate my gist as much as I can, and also as a way to learn Bash scripting as well.
*This is my first Bash script ever created so bugs, errors and really ugly code are expected!*
2022-07-18 17:26:34 +03:00
I've tried this script a lot with virtual machines and following every step always brought me to a functional system, so there should be no problem from this point of view!
2022-07-18 17:21:23 +03:00
Pull requests are absolutely welcome!
2022-07-20 22:13:42 +03:00
< br >
2022-08-29 22:46:11 +03:00
## Some fancy screenshots
2023-07-30 19:23:37 +03:00
![ScriptScreenshot_0 ](imgs/ScriptScreenshot_0.png )
![ScriptScreenshot_1 ](imgs/ScriptScreenshot_1.png )
2022-08-29 22:46:11 +03:00
< br >
2022-07-20 22:13:42 +03:00
## How to run it?
2022-07-18 17:51:24 +03:00
2022-07-23 18:26:24 +03:00
First update `xbps` package:
``` bash
2022-08-28 21:17:56 +03:00
xbps-install -Suvy xbps
2022-07-23 18:26:24 +03:00
```
then install `wget` or `curl` package:
``` bash
# For wget
2022-08-28 21:17:56 +03:00
xbps-install -Suvy wget
2022-07-23 18:26:24 +03:00
# For curl
2022-08-28 21:17:56 +03:00
xbps-install -Suvy curl
2022-07-23 18:26:24 +03:00
```
2022-07-27 17:40:15 +03:00
then download the needed file:
2022-07-18 17:51:24 +03:00
``` bash
2022-07-27 17:40:15 +03:00
# For wget
2022-07-25 22:04:34 +03:00
wget https://raw.githubusercontent.com/Le0xFF/VoidLinuxInstaller/main/vli.sh -O $HOME/vli.sh
2022-07-18 17:51:24 +03:00
2022-07-27 17:40:15 +03:00
# For curl
2022-07-25 22:04:34 +03:00
curl -o $HOME/vli.sh https://raw.githubusercontent.com/Le0xFF/VoidLinuxInstaller/main/vli.sh
2022-07-18 17:51:24 +03:00
```
2022-07-19 00:12:20 +03:00
then make it executable:
2022-07-18 17:51:24 +03:00
``` bash
2022-07-25 22:04:34 +03:00
chmod +x $HOME/vli.sh
2022-07-18 17:51:24 +03:00
```
and finally run it:
``` bash
2022-07-25 22:04:34 +03:00
bash $HOME/vli.sh
2022-07-18 17:51:24 +03:00
```
2022-07-20 22:13:42 +03:00
< br >
## How does it work?
2023-08-04 13:43:15 +03:00
The script requires internet connection, because xbps packages must be downloaded for the chroot method to work.
2023-07-30 19:23:37 +03:00
Here is documented how the script works in details. With It will:
2022-07-20 22:13:42 +03:00
1. prompt the user to eventually change their keyboard layout from a list of all the different available layouts.
2. check internet connection and eventually guide the user to connect to the internet;
3. wipe a user choosen drive and that drive will be the one also selected for partitioning;
4. partition a user choosen drive:
- if the previous drive was not the right one, it will ask the user if they want to change it eventually;
- check the [Suggested partition layout ](#suggested-partition-layout ) to follow the script workflow;
2022-08-26 15:32:49 +03:00
5. ask user if they want to encrypt a partition for Full Disk Encryption:
2022-07-20 22:13:42 +03:00
- it will ask for a mountpoint name, so that the encrypted partition will be mounted as
`/dev/mapper/<encrypted_name>` ;
2022-08-26 15:32:49 +03:00
6. ask user if they want to apply Logical Volume Management to the previous encrypted partition, to have the flexibility to resize `/` and to add more space in the future without reformatting the whole system:
2022-07-20 22:13:42 +03:00
- it will ask for a Volume Group name, so that will be mounted as
2022-07-26 23:26:09 +03:00
`/dev/mapper/<vg_name>` ;
2022-07-26 22:35:42 +03:00
- it will ask for a Logical Volume name for **root** partition and its size will be the previously selected partition, so that will be mounted as
2022-07-26 23:26:09 +03:00
`/dev/mapper/<vg_name>-<lv_root_name>` ;
2022-07-20 22:13:42 +03:00
- check the [Final partitioning result ](#final-partitioning-result ) to get an overview of what the outcome will be;
7. Formatting partitions to proper filesystems:
- it will prompt user to select which partition to use as **boot** partition and to choose its label; it will be formatted as FAT32 and mounted as
`/boot/efi` ;
2022-07-26 22:35:42 +03:00
- it will prompt user to select a label for the **root** logical volume, that will be formatted as BTRFS;
2022-07-23 17:32:21 +03:00
8. create BTRFS subvolumes with specific fstab mount options; if user wants to change them, please edit the script looking for `create_btrfs_subvolumes` function ([BTRFS mount options official documentation](https://btrfs.readthedocs.io/en/latest/btrfs-man5.html#mount-options)):
2022-07-20 22:13:42 +03:00
- **BTRFS mounting options**:
2022-07-26 22:35:42 +03:00
* `rw,noatime,discard=async,compress-force=zstd,space_cache=v2,commit=120`
2022-07-20 22:13:42 +03:00
- **BTRFS subvolumes that will be created**:
* `/@`
2022-07-26 22:35:42 +03:00
* `/@home`
2022-07-20 22:13:42 +03:00
* `/@snapshots`
* `/var/cache/xbps`
* `/var/tmp`
* `/var/log`
9. install base system:
- It will ask user to choose between `x86_64` and `x86_64-musl` ;
10. chroot:
* set *root* password and `/` permissions;
* create proper `/etc/fstab` file;
2022-09-01 15:49:59 +03:00
* if encryption was choosen, generate random key to avoid typing password two times at boot;
2022-07-20 22:13:42 +03:00
* create proper dracut configuration and initramfs;
2022-08-09 22:45:10 +03:00
* optionally create a swapfile and enable zswap;
2022-08-26 11:42:24 +03:00
* install any additional package;
2022-08-26 13:09:19 +03:00
* enable or disable available services;
2022-08-28 17:01:33 +03:00
* ask user which bootloader to install: EFISTUB or GRUB2;
2022-08-26 11:42:24 +03:00
* create new users and configure them;
2022-09-01 10:05:14 +03:00
* git clone [void-packages ](https://github.com/void-linux/void-packages ) or a custom public repository for selected users (it's not possible to `binary-bootstrap` because `xbps-src` can't do that while being already in a chrooted environment; see related issues: [#30496 ](https://github.com/void-linux/void-packages/issues/30496#issuecomment-826537866 ), [#35018 ](https://github.com/void-linux/void-packages/issues/35018 ), [#35410 ](https://github.com/void-linux/void-packages/issues/35410 ))
2022-09-04 00:10:31 +03:00
* choose timezone, keyboard layout integrating it eventually even in GRUB2, locale, hostname and default shell for root user;
2022-08-26 13:09:19 +03:00
* configure AppArmor and reconfigure every package.
2022-07-20 22:13:42 +03:00
### Suggested partition layout
To have a smooth script workflow, the following is the suggested disk layout:
- GPT as disk label type for UEFI systems, also because this script will only works on UEFI systems;
2022-08-28 17:01:33 +03:00
- Less than 1 GB for bootable EFI partition, as first partition and as EFI System type;
- Rest of the disk for the Volume Group, where encryption and LVM will eventually be applied, as second partition as Linux filesystem.
2022-07-20 22:13:42 +03:00
2022-08-28 17:03:02 +03:00
These two will be physical partition.
2022-07-26 22:35:42 +03:00
You don't need to create a `/home` partition because BTRFS subvolumes will take care of that.
2022-07-20 22:13:42 +03:00
### Final partitioning result
2022-09-01 15:49:59 +03:00
Following the script, at the very end your drive will end up being like the following, if you chose LUKS, LVM and GRUB2 as bootloader:
2022-07-20 22:13:42 +03:00
``` bash
2022-07-26 23:26:09 +03:00
/dev/nvme0n1 259:0 0 953,9G 0 disk
├─/dev/nvme0n1p1 259:1 0 1G 0 part /boot/efi
└─/dev/nvme0n1p2 259:2 0 942,9G 0 part
└─/dev/mapper/< encrypted_name > 254:0 0 942,9G 0 crypt
└─/dev/mapper/< vg_name > -< lv_root_name > 254:1 0 942,9G 0 lvm /.snapshots
2023-08-04 13:43:15 +03:00
/var/log
2022-07-26 23:26:09 +03:00
/home
/
2022-07-26 22:35:42 +03:00
```
2022-07-26 23:19:44 +03:00
> Note: `/.snapshots` will be available after following the [Follow up for `@snapshots` subvolume](#follow-up-for-snapshots-subvolume) section.
2022-07-26 22:35:42 +03:00
2022-08-31 15:09:25 +03:00
### Follow up for `@snapshots` subvolume
2022-07-26 22:35:42 +03:00
With this script, the `@snapshots` subvolume will be created, but not the `/.snapshots` folder. This is done to avoid stupid snapper issues when trying to create a configuration for `/` .
2022-07-26 23:32:23 +03:00
So after installing `snapper` from Void Linux's repositories and after creating a configuration for `/` , you have to delete the subvolume that snapper will automatically create. After that create the `/.snapshots` folder and then uncomment the relative line from `/etc/fstab` :
2022-07-26 22:35:42 +03:00
``` bash
# run these commands as root
2022-07-26 23:32:23 +03:00
snapper -c root create-config /
2022-07-26 22:35:42 +03:00
btrfs subvolume delete /.snapshots
mkdir /.snapshots
2022-07-30 20:41:38 +03:00
sed -i '/@snapshots/s/^#//' /etc/fstab
2022-07-26 22:35:42 +03:00
reboot
```
> Source: [Arch Wiki](https://wiki.archlinux.org/title/Snapper#Configuration_of_snapper_and_mount_point)
< br >
2022-09-04 00:10:31 +03:00
## How to unlock encrypted partition in GRUB2
In case a wrong password was put in GRUB2, a shell will be dropped.
In order to boot the system, the encrypted partition have to be unlocked and the right GRUB configuration file must be loaded.
### GRUB2 standard keyboard layout
If a custom keyboard layout was **not** choosen, the following commands must be put in GRUB2 shell:
``` bash
# unlock all the encrypted partitions
cryptomount -a
# input your password, then insert module normal and run it
insmod normal
normal
```
### GRUB2 custom keyboard layout
If a custom keyboard layout was choosen, the following commands must be put in GRUB2 shell:
``` bash
# unlock all the encrypted partitions
cryptomount -a
# input your password and if LVM was used, then
set root=(lvm/< vg_name > -< lv_root_name > )/@
# if LVM was not used, then (<uuid> is the same printed on screen; you can also use (crypto#), where # is where your system is, typically 0)
set root=(cryptouuid/< uuid > )/@
# finally load main GRUB2 configuration file
set prefix=$root/boot/grub
configfile $prefix/grub.cfg
```
< br >
2022-07-27 17:30:45 +03:00
## What to do if system breaks?
2022-07-26 22:35:42 +03:00
In case anything will break, you will just have to delete the `@` subvolume, create it again and reinstall your distro. `/home` folder won't be affected in any way.
In details, after booting a LiveCD, mount the encrypted partition:
``` bash
2022-07-26 23:26:09 +03:00
cryptsetup open /dev/nvme0n1p2 < encrypted_name >
2022-07-26 22:35:42 +03:00
```
Scan for Volume Groups and then enable the one you need:
``` bash
vgscan
2022-07-26 23:26:09 +03:00
vgchange -ay < vg_name >
2022-07-26 22:35:42 +03:00
```
Mount the true btrfs root by its subvol or by its subvolid:
``` bash
# by subvol
2022-07-26 23:26:09 +03:00
mount -o subvol=/ /dev/mapper/< vg_name > -< lv_root_name > /mnt
2022-07-26 22:35:42 +03:00
# or by subvolid
2022-07-26 23:26:09 +03:00
mount -o subvolid=0 /dev/mapper/< vg_name > -< lv_root_name > /mnt
2022-07-26 22:35:42 +03:00
```
After that if you do an `ls /mnt/` you will see all the subvolume previously created.
2022-07-27 17:38:43 +03:00
Now you must delete **ONLY** the `@` subvolume and finally unmount `/mnt` :
2022-07-26 22:35:42 +03:00
``` bash
btrfs subvolume delete /mnt/@
umount /mnt
```
You now have to reinstall Void Linux manually (the script is not programmed to help you this time). For this you can follow the [original gist ](https://gist.github.com/Le0xFF/ff0e3670c06def675bb6920fe8dd64a3 ) and start again from *Mount partitions and create btrfs subvolumes* instruction, without creating the `@home` subvolume.
When the package reconfiguration is finished, you have to create a user with the same name of the one you created before, possibly adding it to the same groups as before, but you can do it later too.
2022-07-27 17:37:30 +03:00
**Don't add the `-m` flag or your original home folder will be destroyed**:
2022-07-26 22:35:42 +03:00
``` bash
useradd -G wheel < same_user >
passwd < same_user >
```
This is not necessary because adding the same user will automatically change the home folder permission, but just in case:
``` bash
chown -R < same_user > :< same_user > /home/< same_user >
2022-07-20 22:13:42 +03:00
```
< br >
2022-07-27 17:30:45 +03:00
## How to add more space with a new drive with LVM
> Probably the following could also be done from a running system, but maybe it's better to boot a LiveCD just in case.
First a new physical drive must be added to the system. This drive in the following example will be called `/dev/sda` .
After booting a LiveCD, mount the encrypted partition:
``` bash
cryptsetup open /dev/nvme0n1p2 < encrypted_name >
```
Scan for Volume Groups and then enable the one you need:
``` bash
vgscan
vgchange -ay < vg_name >
```
Scan for Logical Volumes and then enable the one you need:
``` bash
lvscan
lvchange -ay < vg_name > /< lv_root_name >
```
Then a new Physical Volume for the new drive must be created:
``` bash
pvcreate /dev/sda
```
After that it must be added to the existing Logical Volume:
``` bash
vgextend < lv_root_name > /dev/sda
```
Then the Logical Volume must be extended to cover the new free space:
``` bash
lvm lvextend -l +100%FREE < vg_name > /< lv_root_name >
```
Finally also the BTRFS filesystem must be extended to cover all the free space; to do that, the BTRFS partition must be mounted:
``` bash
mount -t btrfs /dev/mapper/< vg_name > -< lv_root_name > /mnt/
btrfs filesystem resize max /mnt/
```
< br >
2022-08-31 15:09:25 +03:00
# Notes
2022-07-18 17:21:23 +03:00
2022-07-21 19:24:58 +03:00
- To speed up decryption at boot you could lower the number of iteration for each key as described on the [Arch Wiki ](https://wiki.archlinux.org/title/GRUB/Tips_and_tricks#Speeding_up_LUKS_decryption_in_GRUB ), but keep in mind that this comes with its own security concerns.
2022-07-05 21:42:36 +03:00
2022-07-20 22:13:42 +03:00
< br >
2022-08-31 15:09:25 +03:00
# Resources
2022-07-05 21:42:36 +03:00
2022-07-21 19:24:58 +03:00
> **[1]** https://tldp.org/LDP/Bash-Beginners-Guide/html/index.html
> **[2]** https://gist.github.com/tobi-wan-kenobi/bff3af81eac27e210e1dc88ba660596e
> **[3]** https://gist.github.com/gbrlsnchs/9c9dc55cd0beb26e141ee3ea59f26e21
> **[4]** https://unixsheikh.com/tutorials/real-full-disk-encryption-using-grub-on-void-linux-for-bios.html
2022-09-04 00:16:20 +03:00
> **[5]** https://wiki.archlinux.org/title/GRUB/Tips_and_tricks#Manual_configuration_of_core_image_for_early_boot
> **[6]** https://cryptsetup-team.pages.debian.net/cryptsetup/encrypted-boot.html#using-a-custom-keyboard-layout