Sorry for pushing that again, but i am a bit confused, after i spend some time with that. I was attracted to learn how it works.
Code:
if [ -x /sbin/cryptsetup -a -n "${LUKSLIST_DEFERRED}" ];
Why does the test for /sbin/cryptsetup make use of parameters, parameters that are not available for the cryptsetup i have here? -a is at least unknown for the cryptsetup version, that is available when the system is up.
Another point i saw is:
Code:
KEYPART=$(echo $LUKSKEY |cut -f1 -d:)
LUKSPATH="/mountkey$(echo $LUKSKEY |cut -f2 -d:)"
# Catch possible mount failure:
if blkid -t TYPE=vfat $KEYPART 1>/dev/null 2>&1 ; then
MOUNTOPTS="-t vfat -o shortname=mixed"
else
MOUNTOPTS="-t auto"
fi
I can do anything, the return value of blkid is always 2 (with the blkid version available when the system is up). So this does not work for me. Currently this leads to the problem that my ext4 formatted stick partition is tried to be mounted as vfat. (The stick has two partitions, one is vfat, the other one ext4)
And a last thing is: The command
Code:
/sbin/cryptsetup isLuks ${LUKSDEV} 1>/dev/null 2>/dev/null
Forces udev to dump information on tty0. This leads to the problem that the udev message is written after "cryptsetup luksOpen" asks me for the passphrase. On my system, the output looks like that
Code:
Unlocking Luks encrypted device '/dev/mapper/vg-root' as luks mapped device 'crypt-vg-root'
Enter passphrase for /dev/mapper/crypt-vg-root: udevd-work[1009]: device node '/dev/mapper/vg-root' already exists, link to '/dev/mapper/vg-root' will not overwrite it
This is not really a problem for myself, but users, who did not setup the system by there self, could be confused because boot does not continue and there is only a message, that has nothing to do with the passphrase.
Maybe the forum is not the best place for it, but before i write an email to pv, i think it is better to discuss that here.