From f52ec4e22018535fa61bfcef44888fd4d7d9a54d Mon Sep 17 00:00:00 2001 From: James Bunton Date: Fri, 22 Feb 2019 14:10:18 +1100 Subject: [PATCH] reboot-no-passphrase: moved to linux-config repo alongside systemd service --- reboot-no-passphrase | 41 ----------------------------------------- 1 file changed, 41 deletions(-) delete mode 100755 reboot-no-passphrase diff --git a/reboot-no-passphrase b/reboot-no-passphrase deleted file mode 100755 index 5069c98..0000000 --- a/reboot-no-passphrase +++ /dev/null @@ -1,41 +0,0 @@ -#!/bin/bash - -# When using the Arch Linux mkinitcpio encrypt if the file /crypto_keyfile.bin -# exists in the initramfs then it will be used to attempt unlocking. -# 1. dd if=/dev/urandom of=/crypto_keyfile.bin bs=1 count=512 -# 2. Add /crypto_keyfile.bin to FILES in /etc/mkinitcpio.conf -# 3. mkinitcpio -p linux -# 4. Enable the disable-crypto_keyfiles@.service -# 5. Run this script when you want to reboot without a passphrase - - -crypto_keyfile="/crypto_keyfile.bin" -reboot_cmd="${1:-sudo reboot}" - -if [ ! -f "$crypto_keyfile" ]; then - echo "Failed to find $crypto_keyfile" - exit 1 -fi - -found_devices="" -for disk_uuid in $(ls /etc/systemd/system/basic.target.wants/disable-crypto_keyfile@*.service | cut -d'@' -f2 | cut -d. -f1); do - found=1 - found_devices="${found_devices} /dev/disk/by-uuid/${disk_uuid}" -done - -if [ -z "$found_devices" ]; then - echo "Failed to find your encrypted device. You must have disable-crypto_keyfile@.service enabled." - exit 1 -fi - -echo -n "Enter password for devices: " -read -r -s pw -echo "" -for device_filename in $found_devices; do - echo "Adding key to $device_filename" - sudo cryptsetup luksAddKey "$device_filename" "$crypto_keyfile" --key-slot 7 <