mirror of https://schlomp.space/tastytea/hashboot
Update Arch instructions
parent
b2a7dd0959
commit
be684bb473
|
@ -1,51 +1,67 @@
|
||||||
# Install hashboot on Arch Linux
|
# Install hashboot on Arch Linux
|
||||||
## Clone repository
|
## Setting up hashboot
|
||||||
First, clone the git repository:
|
|
||||||
|
|
||||||
`git clone https://github.com/tastytea/hashboot.git`
|
1. Clone the git repository and enter the directory:
|
||||||
|
|
||||||
Then distribute the files to the proper path on your drive.
|
`git clone https://github.com/tastytea/hashboot.git && cd hashboot`
|
||||||
|
|
||||||
- the hashboot script should go to /usr/bin
|
2. Distribute the files to the proper paths:
|
||||||
- everything in /init/systemd should go to /etc/systemd/system
|
|
||||||
|
|
||||||
Then make the hashboot script executable with the command:
|
PLEASE NOTE: it's important to know that when using symlinks it's important to NOT delete the original files. DO NOT DELETE THE HASHBOOT GIT FOLDER. If you move the hashboot git folder, you will need to re-link the files before the next boot. The *advantage* to using symlinks is that if the hashboot code on Github is updated, you can pull the changes and not have to re-copy the files.
|
||||||
|
|
||||||
|
If you don't want to use links and therefore want to be able to safely delete the hashboot git folder, replace `ln -sf` with `cp`.
|
||||||
|
|
||||||
|
1. `sudo ln -sf $(readlink -f hashboot) /usr/bin/hashboot`
|
||||||
|
2. `sudo ln -sf $(readlink -f init/systemd/emergency.service) /etc/systemd/system/emergency.service`
|
||||||
|
3. `sudo ln -sf $(readlink -f init/systemd/emergency.target) /etc/systemd/system/emergency.target`
|
||||||
|
4. `sudo ln -sf $(readlink -f init/systemd/hashboot.service) /etc/systemd/system/hashboot.service`
|
||||||
|
|
||||||
|
3. Make the hashboot script executable:
|
||||||
|
|
||||||
`sudo chmod a+x /usr/bin/hashboot`
|
`sudo chmod a+x /usr/bin/hashboot`
|
||||||
|
|
||||||
Then run this command once to generate the configuration file and initial files:
|
4. Generate the configuration file and initial files:
|
||||||
|
|
||||||
`sudo hashboot index`
|
`sudo hashboot index`
|
||||||
|
|
||||||
## Setting up systemd
|
## Setting up systemd
|
||||||
Run the command:
|
Start the hashboot service on boot:
|
||||||
|
|
||||||
`systemctl enable hashboot.service`
|
`sudo systemctl enable hashboot.service`
|
||||||
|
|
||||||
## Setting up the post-install kernel hook
|
## Setting up the pacman hook
|
||||||
Pacman uses [alpm hooks](https://www.archlinux.org/pacman/alpm-hooks.5.html) to facilitate triggering an operation after a file or package has been modified by pacman. The system hooks are stored in the `/usr/share/libalpm/hooks` directory.
|
You may need to first create the hook folder:
|
||||||
|
|
||||||
Since `hashboot index` should be run after every kernel update (and after all other post-install actions have completed), create the file `zzz-hashboot.hook` in `/usr/share/libalpm/hooks` and give it the following contents:
|
`sudo mkdir -p /etc/pacman.d/hooks`
|
||||||
|
|
||||||
|
Then make the hashboot hook file:
|
||||||
|
|
||||||
|
`sudo nano /etc/pacman.d/hooks/99-hashboot.hook`
|
||||||
|
|
||||||
|
It's important to prefix the file with "99-" because pacman will execute hooks in alphabetical order, and hashboot should be among the last to be executed. Likewise, it's important to suffix the file with ".hook" or pacman won't think it's an alpm hook.
|
||||||
|
|
||||||
|
Give it the following contents:
|
||||||
|
|
||||||
```
|
```
|
||||||
[Trigger]
|
[Trigger]
|
||||||
Operation = Install
|
Operation = Install
|
||||||
Operation = Upgrade
|
Operation = Upgrade
|
||||||
|
Operation = Remove
|
||||||
Type = Package
|
Type = Package
|
||||||
Target = linux
|
Target = *
|
||||||
|
|
||||||
[Action]
|
[Action]
|
||||||
Description = Generating hashboot checksums of MBR and /boot...
|
Description = Regenerating hashboot checksums...
|
||||||
When = PostTransaction
|
When = PostTransaction
|
||||||
Exec = /usr/bin/hashboot index
|
Exec = /usr/bin/hashboot index
|
||||||
```
|
```
|
||||||
|
|
||||||
Now when you update the kernel, hashboot will generate new files.
|
Now when you install, upgrade, or remove any package, hashboot will generate new files.
|
||||||
|
|
||||||
## Making sure hashboot runs at boot
|
## Making sure hashboot runs at boot
|
||||||
Immediately after booting, you can view the status of the hashboot service with the command
|
Immediately after booting, you can view the status of the hashboot service with the command
|
||||||
|
|
||||||
`systemctl status hashboot.service`
|
`sudo systemctl status hashboot.service`
|
||||||
|
|
||||||
It should print something like:
|
It should print something like:
|
||||||
|
|
||||||
|
@ -60,3 +76,12 @@ May 12 09:27:47 hostname systemd[1]: Starting Check for changes made to the boot
|
||||||
May 12 09:27:48 hostname systemd[1]: hashboot.service: Succeeded.
|
May 12 09:27:48 hostname systemd[1]: hashboot.service: Succeeded.
|
||||||
May 12 09:27:48 hostname systemd[1]: Started Check for changes made to the boot partition since shutting down.
|
May 12 09:27:48 hostname systemd[1]: Started Check for changes made to the boot partition since shutting down.
|
||||||
```
|
```
|
||||||
|
|
||||||
|
systemd prints the hashboot file as residing in `/sbin`, but that's because in Arch Linux (and many other distributions), `/bin` and `/sbin` are both symlinks to `/usr/bin`. You can verify this with `ls -l /sbin`.
|
||||||
|
|
||||||
|
## Notes on pacman hooks
|
||||||
|
Pacman uses [alpm hooks](https://www.archlinux.org/pacman/alpm-hooks.5.html) to facilitate triggering an operation after a file or package has been modified by pacman. System hooks are stored in the `/usr/share/libalpm/hooks` directory, but user hooks are stored in `/etc/pacman.d/hooks` (the directory might not be present on an unmodified Arch installation).
|
||||||
|
|
||||||
|
`hashboot index` *should* be ran after any modification to `/boot`. However, pacman will not trigger a hook that should be triggered if files are modified in `/boot` if the files modified in `/boot` are only modified in a separate hook and not by pacman itself; that is, if the initramfs is modified by a prior hook, a hashboot hook that should be triggered if files are modified in `/boot` is not properly triggered.
|
||||||
|
|
||||||
|
Furthermore, upgrading a package like `btrfs-progs` can trigger an initramfs update. It would be possible to watch the linux modules folders (`/usr/lib/modules/*`), but libalpm does not search for changes in subfolders, and the kernel module folders are hardcoded to the kernel version (e.g. `/usr/lib/modules/5.1.9-arch1-1-ARCH/`), and change with each kernel update. Therefore, it is safest to generate a new hashboot index every time any package is installed, upgraded, or removed.
|
||||||
|
|
Loading…
Reference in New Issue