read bash?
Auke Kok
sofar at foo-projects.org
Sun Feb 11 21:17:41 CET 2007
Jan Eidtmann wrote:
> On Tue, Jan 30, 2007 at 17:57:26 -0800
> Auke Kok <sofar at foo-projects.org> wrote:
>> Moritz Heiber wrote:
>>> On Tue, 30 Jan 2007 12:36:01 +0100
>>> Jan Eidtmann <cmak at lunar-linux.org> wrote:
>>>
>>>> i just want to make lunar better and all i get is your
>>>> BS...of course ive heard what you say...but im not
>>>> satisfied with that. i want this support. you didnt say
>>>> that you dont ever want to support such things. all you
>>>> said is i _could_ stop. but why? because you failed? you
>>>> even tried to implement the same thing... and failed, is
>>>> that my fault? no. is it bash's fault? no.
>>> Man, you're really going for it now.
>>>
>>> I'm not going to get stuck in this. You aren't worth it.
>>>
>>> Good luck duplicating work that has been done already.
>> this is completely irrelevant to Jan wanting to get something to work for
>> himself. You're completely bullying him here. There is no need to get personal,
>> and frankly I'm disturbed by that a bit.
>>
>> Jan, I really thought that only apps from shadow could prompt from a password.
>> It turns out that that's wrong and I would discourage from using 'read' in
>> startup scripts at all myself due to obvious security concerns.
>>
>> Otherwise, show me the script that fails and perhaps run it with -x so we can
>> take a look at the code you're trying.
>>
>
> thx to wodkahexe it works now. adding <&1 after the command
> let the command get the std input back, even in a while
> read.
>
> anyway, this is pretty simple, but its a start. i think its
> bad because its not very generic. it works for the new
> dm-crypt target only (no loopback). also encrypted root is
> not supported.
>
> on the other hand, its just a small change to our mount
> script that doesnt get in your way but adds support for
> state-of-the-art filesystem encryption. :)
>
> what this patch does:
>
> * unlock dm-crypt devices before we parse fstab. this way
> one can use fstab for encrypted volumes. devices which are
> to unlock at boottime are kept in the new /etc/crypttab:
> # device mapping
> /dev/sda6 sda6-c
>
> to mount the unlocked filesystem you add it to your fstab
> as normal but with just a slightly different device path:
> /dev/mapper/sda6-c /root xfs defaults 0 2
>
> * if the user has a lvm package installed it scans discs
> for volume groups and activates them
I'm OK with the general idea, however I would like to see a separate LVM init.d
script (installed through the LVM2 module) that handles the lvm code before
mount does. That way we have a pluggable system and offload some logic to a new
script in a safe place. It would be a lot cleaner as well.
Do you think that might be feasable? Can you give it a try to make such a thing?
It should be very simple of course...
Auke
More information about the Lunar-dev
mailing list