sh/bash/rescue-ovh.sh
2024-11-11 17:59:03 +01:00

127 lines
2.7 KiB
Bash

rescue_ovh_wipe_vle2_0_init() {
local device="/dev/sdb"
local passphrase
local unit="mib"
# read passphrase
printf "PassPhrase: "
read -r -s passphrase
# warn
lsblk
printf "%s" "WIPE ${device} /?\\ OR CANCEL /!\\"
read -r
#
parted "${device}" \
--script \
mktable gpt
#
parted "${device}" \
unit "${unit}" \
mkpart "crypt" 4610 40960
#
parted "${device}" \
unit "${unit}" \
mkpart "boot" 514 4610
#
parted "${device}" \
unit "${unit}" \
mkpart "esp" 2 514
parted "${device}" \
set 3 esp on
#
parted "${device}" \
unit "${unit}" \
mkpart bios 1 2
parted "${device}" \
set 4 bios_grub on
# bios / wipe
dd if="/dev/zero" of="${device}4"
# esp / wipe
dd if="/dev/zero" of="${device}3" bs="1M"
# esp / format
mkfs.vfat \
-F 32 \
-S 4096 \
-i "00000001" \
-n "esp" \
"${device}3"
# esp / mount
mkdir --parents "/media/esp"
mount "${device}3" "/media/esp"
# boot / wipe
dd status="progress" if="/dev/zero" of="${device}2" bs="1G" count=1
# boot / format
mkfs.btrfs --force \
--checksum "sha256" \
--label "boot" \
--uuid "00000000-0000-0000-0000-00000000000b" \
"${device}2"
# boot / mount
mkdir --parents "/media/boot"
mount --options "autodefrag,compress-force=zstd" \
"${device}2" "/media/boot"
# crypt / wipe
dd status="progress" if="/dev/zero" of="${device}1" bs="1G" count=1
# crypt / encrypt
echo "${passphrase}" |
cryptsetup \
--verbose \
--batch-mode \
--type "luks2" \
--pbkdf "argon2id" \
--cipher "aes-xts-plain64" \
--iter-time 4096 \
--key-size 512 \
--hash "sha512" \
--use-random \
luksFormat \
"${device}1"
# crypt / open
echo "${passphrase}" |
cryptsetup luksOpen "${device}1" "crypt"
}
rescue_ovh_wipe_vle2_1_zero() {
# crypt / zero
dd status="progress" if="/dev/zero" of="/dev/mapper/crypt" bs="1G"
}
rescue_ovh_wipe_vle2_2_make() {
local passphrase
# crypt / close
cryptsetup luksClose "crypt"
# read passphrase
printf "PassPhrase: "
read -r -s passphrase
# crypt / encrypt
echo "${passphrase}" |
cryptsetup \
--verbose \
--batch-mode \
--type "luks2" \
--pbkdf "argon2id" \
--cipher "aes-xts-plain64" \
--iter-time 4096 \
--key-size 512 \
--hash "sha512" \
--use-random \
luksFormat \
"${device}1"
# crypt / open
echo "${passphrase}" |
cryptsetup luksOpen "${device}1" "crypt"
# crypt / format
mkfs.btrfs --force \
--checksum "sha256" \
--label "crypt" \
--uuid "00000000-0000-0000-0000-00000000000c" \
"${device}1"
# crypt / mount
mkdir --parents "/media/crypt"
mount --options "autodefrag,compress-force=zstd" \
"${device}1" "/media/crypt"
# crypt / swap
btrfs filesystem mkswapfile \
--size "4g" \
--uuid "00000000-0000-0000-0000-000000000005" \
"/media/crypt/swap"
}