summaryrefslogtreecommitdiff
path: root/scripts/live-helpers
AgeCommit message (Collapse)Author
2012-04-05Refactor live-boot argument parser from live into live-helpers.Tails developers
This will be useful for making it possible to enable persistent during user-space.
2012-04-01Close unused LUKS devices in all cases.Tails developers
Previously LUKS partitions whose fs had the incorrect partition label would be left open when using persistent-storage=partition.
2012-04-01Use same device backing path as used in other places.Tails developers
2012-04-01Accept using several persistent media with custom-ov label.Tails developers
We didn't want this before with live-{rw,sn} and home-{rw,sn} style persistence, so this was just a left-over. But we still can only allow one each of root-ov, root-sn and home-sn.
2012-04-01Refactor persistent custom mounting from live into live-helpers.Tails developers
This will be useful for making it possible to enable persistent during user-space.
2012-04-01Correcting syntax when using if constructs in links_files().Daniel Baumann
2012-04-01Fix mask usage in links_files().Tails developers
2012-04-01Make union mounting more sensible and robust.Tails developers
...except that they're broken! But we're getting to that.
2012-04-01Workaround busybox's inability to detect symlinks with [ -e ].Tails developers
link_files() won't remove symlinks at the destination, which could cause trouble.
2012-04-01Refactor union mounting into its own function.Tails developers
2012-04-01Optionally symlink files from persistent source instead of mount it.Tails developers
This is done by passing the option "linkfiles" to a live.persist entry. That option is very useful when you only want certain files to be persistent, not the whole directory they are in, like dot-files in $home.
2011-11-24Adding workaround for a busybox bug with grep -w.Tails developers
See: https://bugs.busybox.net/show_bug.cgi?id=4520
2011-11-24Making persistent-read-only work for live-rw overlays.Tails developers
2011-11-24Changing persistent-encryption to accept a list TYPE... instead.Tails developers
The comma-separated list TYPE... specifies which types of encryption to allow for persistent media, and whether to allow plaintext media. The possible TYPEs are the old {none, luks}, with default "none". The only change is that this allow plaintext and encrypted media to be used simultaneously.
2011-11-24Disabling persistent-encryption=luks if dependencies are unavailable.Tails developers
Current dependencies are dm-crypt, cryptsetup and askpass.
2011-11-24Fixing a "sh: bad number" when $offset is not passed to setup_loop().Tails developers
2011-11-24Refactoring overlay and snapshot scanning code.Tails developers
Both overlays and snapshots are now scanned at the same time, and each device is only mounted once. Passphrases for LUKS volumes are only asked for once, and unused ones are closed. Also, snapshot files on encrypted partitions are now supported.
2011-11-24Making use of is_supported_fs in find_cow_devices (like in find_files).Tails developers
2011-11-24Refactoring device scanning in find_{cow_device,files}.Tails developers
2011-11-24Clarifying what happens when you don't retry decrypting a device.Tails developers
2011-11-24Fixing an incorrectly redirected newline.Tails developers
Since this newline was written to stdout it both messed up the the display of errors while entering a LUKS passphrase, and caused find_cow_device to return a bad string under certain circumstances. Example: You have home-rw on /dev/sdX1. You'll first be asked for passphrase for "live-rw on /dev/sdX1", which you skip (a newline has been written to stdout now). Then you're asked for "home-rw on /dev/sdX1", which is what you want so you enter it. Thanks to the spurious newline find_cow_device returns "\n/dev/loopY", which breaks some tests later.
2011-11-24Adding persistent-storage=TYPE...Tails developers
The comma-separated list TYPE... specifies which types of persistent storage to use. Current possible TYPEs are {file, filesystem}. For instance, persistent-storage=filesystem is equivalent to the old persistent=nofiles, but persistent-storage=file allows to look for only files, which wasn't possible before. The default is to look for both, i.e. persistent-storage=filesystem,file.
2011-11-24Making sure dm-crypt is loaded when dealing with LUKS devices.Tails developers
2011-11-24Making persistent-encryption=luks strict.Tails developers
When specified we completely ignore unencrypted media when probing for persistent media.
2011-11-24Adding persistent-encryption={none|luks}.Tails developers
This is the way to control whether to use encrypted persistent media, instead of the (from this commit on) obsolete persistent=cryptsetup.
2011-09-07Factorizing loops on removable/non-removable devices.Tails developers
The already duplicated code will be needed a few more times for the upcoming persistent-media={removable,removable-usb} boot option. Copy/pasting it a few more times seems the wrong way to go, hence this factorization. Depending on the place they are used, the newly introduced functions must return a list of devices named either /sys/block/* or /dev/*. Their first parameter therefore specifies the wanted output format (default is /dev/* as it is the most often used).
2011-09-07Adding a white_listed_devices parameter to find_cow_device and find_files.Tails developers
This will be needed for the upcoming persistent-media={removable,removable-usb} boot option.
2011-03-09Logging to /var/log/live-boot.log instead of /var/log/live.log for future ↵Daniel Baumann
consistency with live-config.
2011-03-09Enhancing devices search ordering.T(A)ILS developers
E.g. prefer mounting /dev/sdb1 rather than /dev/sdb. The isohybrid feature makes both valid devices for being searched for a live filesystem image. Previous code mounted /dev/sdb on /live/image which makes it hard to create a second partition on the USB stick. This brings the need to explicitly check whether the full device is in the blacklist before even considering its subdevices: the previous blacklist checking code worked because the full device was always considered before its subdevices, which is not true anymore.
2011-03-09Fixing overzealous blacklist usage.T(A)ILS developers
Previous blacklist checking was a bit overzealous: e.g. if /dev/sdb1 was blacklisted (e.g. because it would contain the system-wide persistence COW device), any other device whose name contains the blacklist one, such as /dev/sdb11, was also be blacklisted.
2011-03-09Adding debian version 3.0~a1-1.Daniel Baumann
2011-03-09Fixing overzealous blacklist usage.T(A)ILS developers
Previous blacklist checking was a bit overzealous: e.g. if /dev/sdb1 was blacklisted (e.g. because it would contain the system-wide persistence COW device), any other device whose name contains the blacklist one, such as /dev/sdb11, was also be blacklisted.
2011-03-09Adding debian version 2.0~a1-1.Daniel Baumann
2011-03-09Do not leak modprobe options to avoid booting errors with kernel options ↵Michael Prokop
like libata.dma=0.
2011-03-09Adding proper code comments about vol_id removal.Daniel Baumann
2011-03-09Merging casper 1.174.Daniel Baumann
2011-03-09Removing etch compatibility.Daniel Baumann
2011-03-09Don't panic with persistency when we can't correctly mount the filesystem ↵Daniel Baumann
(Closes: #565456).
2011-03-09Switch from vol_id to blkid if using udev >=146-1 (Closes: #555529).Michael Prokop
2011-03-09Avoid the use of fstype in a running live system, as it's a executable and ↵Michael Prokop
not a shell function and causes problems for example within live-snapshot.
2011-03-09Looking for persistency partitions on luks devices only if we boot with ↵Daniel Baumann
persistent=cryptsetup. In order to determine if a encrypted partition contains a persistent partition for live-initramfs, we do have to open it and look into it. Open means, that the user has to provide the passphase (or key). A user booting a *default* debian-live system on a machine that has cryptesetup encrypted partitions should not be bothered by *default* to enter all his passphrases during the boot process. Also, encrypted persistency is only usefull when the user knows about it (= the passphrase to access it). Therefore, it's better to by default ignore persistency on luks devices.
2011-03-09persistent=nofiles fix (Closes: 522383).Marco Amadori
Thanks to Rui Miguel Bernardo <rui.bernardo.pt@gmail.com> for the report and for spotting the bug.
2011-03-09Adding missing pipe in cryptsetup call for persistency on luks partitions.Daniel Baumann
2011-03-09Correcting cryptsetup calls for persistency on luks.Daniel Baumann
2011-03-09Fixing possible invalid results from function where_is_mounted by returning ↵Luigi Capriotti
more than one line inwhere_is_mounted();.
2011-03-09Two return code consistency fix.Marco Amadori
2011-03-09Initial commit for having support for persistency on luks.Daniel Baumann
2011-03-09Applying patch from Michael Prokop <mika@grml.org> to support udev >= 0.140.Daniel Baumann
2011-03-09Adding ext4 support.Daniel Baumann
2011-03-09Adding patch from Thierry Walrant <debian.tgc@walrant.net> to allow setting ↵Daniel Baumann
a path for the persistence files through persistent-path boot parameter (Closes: #512661).