sh/bash/rescue-ovh.sh

134 lines
2.8 KiB
Bash
Raw Normal View History

2024-11-11 15:48:26 +00:00
rescue_ovh_wipe_vle2_0_init() {
2024-11-11 14:40:04 +00:00
local device="/dev/sdb"
local passphrase
2024-11-11 11:32:13 +00:00
local unit="mib"
2024-11-11 14:40:04 +00:00
# read passphrase
printf "PassPhrase: "
read -r -s passphrase
2024-11-11 15:37:27 +00:00
# warn
2024-11-11 11:32:13 +00:00
lsblk
printf "%s" "WIPE ${device} /?\\ OR CANCEL /!\\"
read -r
#
2024-11-11 16:21:21 +00:00
parted "${device}" \
--script \
mktable gpt
2024-11-11 11:32:13 +00:00
#
2024-11-11 16:21:21 +00:00
parted "${device}" \
unit "${unit}" \
mkpart "crypt" 4610 40960
2024-11-11 11:32:13 +00:00
#
2024-11-11 16:21:21 +00:00
parted "${device}" \
unit "${unit}" \
mkpart "boot" 514 4610
2024-11-11 11:32:13 +00:00
#
2024-11-11 16:21:21 +00:00
parted "${device}" \
unit "${unit}" \
mkpart "esp" 2 514
parted "${device}" \
set 3 esp on
2024-11-11 11:32:13 +00:00
#
2024-11-11 16:21:21 +00:00
parted "${device}" \
unit "${unit}" \
mkpart bios 1 2
parted "${device}" \
set 4 bios_grub on
2024-11-11 15:37:27 +00:00
# bios / wipe
2024-11-11 14:40:04 +00:00
dd if="/dev/zero" of="${device}4"
2024-11-11 15:37:27 +00:00
# esp / wipe
dd if="/dev/zero" of="${device}3" bs="1M"
# esp / format
mkfs.vfat \
-F 32 \
-S 4096 \
-i "00000001" \
-n "esp" \
"${device}3"
# esp / mount
mkdir --parents "/media/esp"
mount "${device}3" "/media/esp"
# boot / wipe
dd status="progress" if="/dev/zero" of="${device}2" bs="1G" count=1
# boot / format
mkfs.btrfs --force \
2024-11-11 15:38:48 +00:00
--checksum "sha256" \
--label "boot" \
--uuid "00000000-0000-0000-0000-00000000000b" \
"${device}2"
2024-11-11 15:37:27 +00:00
# boot / mount
mkdir --parents "/media/boot"
mount --options "autodefrag,compress-force=zstd" \
"${device}2" "/media/boot"
# crypt / wipe
dd status="progress" if="/dev/zero" of="${device}1" bs="1G" count=1
# crypt / encrypt
2024-11-11 11:37:07 +00:00
echo "${passphrase}" |
cryptsetup \
--verbose \
--batch-mode \
--type "luks2" \
--pbkdf "argon2id" \
--cipher "aes-xts-plain64" \
2024-11-11 15:37:27 +00:00
--iter-time 4096 \
2024-11-11 11:37:07 +00:00
--key-size 512 \
--hash "sha512" \
--use-random \
luksFormat \
2024-11-11 14:40:04 +00:00
"${device}1"
2024-11-11 15:37:27 +00:00
# crypt / open
2024-11-11 11:37:07 +00:00
echo "${passphrase}" |
2024-11-11 14:40:04 +00:00
cryptsetup luksOpen "${device}1" "crypt"
2024-11-11 15:37:27 +00:00
}
2024-11-11 15:48:26 +00:00
rescue_ovh_wipe_vle2_1_zero() {
2024-11-11 15:37:27 +00:00
# crypt / zero
dd status="progress" if="/dev/zero" of="/dev/mapper/crypt" bs="1G"
}
2024-11-11 15:48:26 +00:00
rescue_ovh_wipe_vle2_2_make() {
2024-11-11 15:37:27 +00:00
local passphrase
# crypt / close
2024-11-11 11:32:13 +00:00
cryptsetup luksClose "crypt"
2024-11-11 15:37:27 +00:00
# read passphrase
printf "PassPhrase: "
read -r -s passphrase
# crypt / encrypt
echo "${passphrase}" |
cryptsetup \
--verbose \
--batch-mode \
--type "luks2" \
--pbkdf "argon2id" \
--cipher "aes-xts-plain64" \
--iter-time 4096 \
--key-size 512 \
--hash "sha512" \
--use-random \
luksFormat \
"${device}1"
# crypt / open
echo "${passphrase}" |
cryptsetup luksOpen "${device}1" "crypt"
# crypt / format
mkfs.btrfs --force \
2024-11-11 15:38:48 +00:00
--checksum "sha256" \
--label "crypt" \
--uuid "00000000-0000-0000-0000-00000000000c" \
"${device}1"
2024-11-11 15:37:27 +00:00
# crypt / mount
mkdir --parents "/media/crypt"
mount --options "autodefrag,compress-force=zstd" \
"${device}1" "/media/crypt"
# crypt / swap
btrfs filesystem mkswapfile \
2024-11-11 15:38:48 +00:00
--size "4g" \
--uuid "00000000-0000-0000-0000-000000000005" \
"/media/crypt/swap"
2024-11-11 15:37:27 +00:00
}
2024-11-11 15:48:26 +00:00
rescue_ovh_wipe_vle2_3_close() {
2024-11-11 15:37:27 +00:00
umount "/media/boot"
umount "/media/crypt" &&
cryptsetup luksClose "crypt"
2023-05-13 00:26:42 +00:00
}