Hello team,
the first tech preview for Calamares 2.3 is out now. I call it alpha1, so keep
in mind it has many rough edges and unfinished bits. This is the first
milestone on our way to 2.3, with a heavy focus on LUKS encryption support.
What (probably) works
=====================
Installing a LUKS-encrypted system, when doing an Erase-autoinstall (i.e. full
disk autopartitioning). You'll need KPMcore master (as of today), cryptsetup
on your live and target system, GRUB2, and the new luksbootkeyfile module. The
latter needs to be added to settings.conf in the exec section, before
mkinitcpiocfg but after mount. The LUKS feature relies on changes in the
official mkinicpiocfg, mount, grubcfg and bootloader modules, so if you're
shipping custom solutions in their place you'll need to adapt them for the
occasion.
What doesn't
============
Anything beyond what's described above. The first ever working encrypted
Calamares install was done two hours ago, so it's all very much untested.
Known issues include the swap partition slowing down boot because there's no
crypttab file to unlock it.
Tarball:
https://calamares.io/downloads/calamares-2.3-alpha1.tar.gz
SHA1: d2955cea7c178087d275051ce90b69e6da2f6d2d
MD5: 3b4ac32e6f5bbd16e240c44f1859790a
Happy testing :)
Cheers,
--
Teo Mrnjavac
http://teom.org |
t...@kde.org