@@ -10,19 +10,39 @@ set -euo pipefail
1010# //////////////////////////////////////////////////////////////
1111# // //
1212# // Script, 2020 //
13- # // Created: 21, November , 2020 //
14- # // Modified: 21, November , 2020 //
13+ # // Created: 20, June , 2020 //
14+ # // Modified: 16, July , 2020 //
1515# // file: - //
1616# // - //
1717# // Source: - //
1818# // OS: ALL //
1919# // CPU: ALL //
2020# // //
2121# //////////////////////////////////////////////////////////////
22- if (( $# < 3 )) ; then
23- sudo cryptsetup -v --type luks --cipher aes-xts-plain64 --key-size 512 --hash sha512 --iter-time 2000 --use-urandom --verify-passphrase luksFormat --label=$2 $1
24- sudo cryptsetup luksOpen $1 test
25- sudo mkfs.btrfs /dev/mapper/test
26- sudo mkfs.btrfs -f --label $2 /dev/mapper/test
27- sudo cryptsetup luksClose test
22+
23+ if [[ " $EUID " = 0 ]]; then
24+ echo " (1) already root"
25+ else
26+ sudo -k # make sure to ask for password on next sudo
27+ if sudo true ; then
28+ echo " (2) correct password"
29+ else
30+ echo " (3) wrong password"
31+ exit 1
32+ fi
33+ fi
34+
35+ if (( $# == 2 )) ; then
36+ UUID=$( uuidgen)
37+ echo " UUID: ${UUID} "
38+ sudo cryptsetup -v --type luks --cipher aes-xts-plain64 --key-size 512 --hash sha512 --iter-time 1000 --use-urandom --verify-passphrase luksFormat --label=$2 $1
39+ sudo cryptsetup luksOpen $1 ${UUID}
40+ sudo mkfs.btrfs /dev/mapper/${UUID}
41+ sudo mkfs.btrfs -f --label $2 /dev/mapper/${UUID}
42+ sudo cryptsetup luksClose ${UUID}
43+ echo " Partition: OK"
44+ echo " Now you can unplug, replug device and use it :) "
45+ else
46+ echo " Usage: ${0##*/ } <Device> <Label>"
47+ exit 1
2848fi
0 commit comments