Installation of minimal Crux 3.5 Gnu\Linux system, with selected packages from core, opt and contrib ports. Process of installation documented can be executed from iso or from existing gnu\linux installation. Read Hand book 3.5, .
If you are booting from crux iso and is not your keyboard layout of choice run;
# loadkeys dvorak
Visit crux download page for more notes before downloading iso. Script setup-iso.sh downloads iso from master repo and checks md5sum.
$ curl -k -O https://serverop.de/crux/crux-3.5/iso/crux-3.5.iso $ curl -k -O https://serverop.de/crux/crux-3.5/iso/crux-3.5.md5 $ md5sum crux-3.5.iso eb0c9b75322ba240f229ec9834feddfd crux-3.5.iso
Prepare disk or target location where new system will be installed. Following steps describe how to create efi system or msdos. Systems with bios_boot(msdos) only require boot partition in the beginning of the disk, use ext4 file system. For more information about gpt partitions table read devil-detail grub2 on gpt. Script setup-target.sh help to create partitions scripts.
Set unit size to use;
(parted) unit mib
If the system don't support efi, on bios_boot systems;
(parted) mklabel msdos
Boot partition. Partition with 1G provide room for kernels and bootable iso's that can be directly boot from grub (without root partition). Partition size ~1G;
(parted) mkpart primary ext4 2 1132 (parted) set 1 boot on
On systems that support efi;
(parted) mklabel gpt
Partition used by grub boot loader. Partition size 2M;
mkpart primary 2 4 name 1 grub set 1 bios_grub on
EFI System Partition, ESP type EF00. Partition with between 500M and 100M is recommended for standard installations. Partition size 128M;
(parted) mkpart ESP fat32 4 132 (parted) name 2 efi (parted) set 2 boot on
Boot partition. Partition with 1G provide room for kernels and bootable iso's that can be directly boot from grub (without root partition). Partition size ~1G;
(parted) mkpart primary ext4 132 1132 (parted) name 3 boot
There are different ways to achieve disk encryption, the method described uses cryptosetup to create cryptodevice with lvm inside containing root and other partitions such as; var, usr, swap and home.
# modprobe dm-crypt # parted (parted) mkpart primary 1132 100%
Create encrypted block for lvm, partition layout of efi and bios boot systems is different.
On bios_boot systems partition should be 2;
(parted) set 2 lvm on # cryptsetup luksFormat /dev/sda2 # cryptsetup luksOpen /dev/sda2 cryptlvm
On efi systems partition should be number 4;
(parted) set 4 lvm on # cryptsetup luksFormat /dev/sda4 # cryptsetup luksOpen /dev/sda4 cryptlvm
Create physical group and volume group;
# pvcreate /dev/mapper/cryptlvm # vgcreate vg_system /dev/mapper/cryptlvm
Core collection installation on root partition uses approximately 2G. Partition with 8G-20G is recommended for a server or desktop with dedicated ports partition or using only compiled packages. Partition size 20G;
# lvcreate -L 20G -n lv_root vg_system
Var partition is recommended 1G-5G depending on how system is configured. Partition size 2G;
# lvcreate -L 2G -n lv_var vg_system
Swap partition general advice is to have the same size as memory ram, ports system will be configured to build on ram. To build firefox is necessary at least 34G. Partition size 4G;
# lvcreate -L 4G -n lv_swap vg_system
On desktop fill the rest of disk space while on server this partition can be replaced with /srv. Fill the rest of disk space;
# lvcreate -L 120G -n lv_home vg_system
$ sudo mkfs.fat -F 32 /dev/sda2 $ sudo mkfs.ext4 /dev/sda3 $ sudo mkfs.ext4 /dev/vg_system/lv_root $ sudo mkfs.ext4 /dev/vg_system/lv_var $ sudo mkswap /dev/vg_system/lv_swap $ sudo mkfs.ext4 /dev/vg_system/lv_home
From now on script setup-target.sh create file systems, install-core.sh install core packages and setup-core.sh configure host metadata and setup ports;
Export target root partition;
$ export BLK_ROOT=/dev/vg_system/lv_root
Export target root directory you want to install;
$ export CHROOT=/mnt
If you are installing to a directory and not partitions you don't need to mount;
$ sudo mount $BLK_ROOT $CHROOT
Create follow directories;
$ sudo mkdir -p $CHROOT/boot $ sudo mkdir -p $CHROOT/var $ sudo mkdir -p $CHROOT/usr $ sudo mkdir -p $CHROOT/media $ sudo mkdir -p $CHROOT/home $ sudo mkdir -p $CHROOT/dev $ sudo mkdir -p $CHROOT/tmp $ sudo mkdir -p $CHROOT/proc $ sudo mkdir -p $CHROOT/sys
If partition layout is different or target is a directory is not necessary to mount, create only the directories;
$ sudo mount $BLK_BOOT $CHROOT/boot $ sudo mkdir -p $CHROOT/boot/efi $ sudo mount $BLK_EFI $CHROOT/boot/efi $ sudo mount $BLK_VAR $CHROOT/var $ sudo mkdir -p $CHROOT/var/lib/pkg $ sudo mount $BLK_HOME $CHROOT/home
Activate Chroot;
$ sudo mount --bind /dev $CHROOT/dev $ sudo mount -vt devpts devpts $CHROOT/dev/pts $ sudo mount -vt tmpfs shm $CHROOT/dev/shm $ sudo mount -vt proc proc $CHROOT/proc $ sudo mount -vt sysfs sysfs $CHROOT/sys
Mount iso or copy packages to target /mnt directory;
# modprobe isofs # modprobe loop # mount -o loop crux-3.5.iso $CHROOT/media
Create file $CHROOT/core.lst containing list of binary packages present in $CHROOT/media/crux/core/;
$ sudo for p in $CHROOT/media/crux/core/*; do echo $p << $CHROOT/core.lst; done
Install temporary pkgadd on $CHROOT;
$ sudo tar xf /media/crux/core/pkgutils#5.40-1.pkg.tar.xz usr/bin/pkgadd -O > $CHROOT/pkgadd $ sudo chmod +x $CHROOT/pkgadd
Edit $CHROOT/core.lst with your preferences, you can remove or add packages from opt collection. Remove lilo if you want grub.
Create package database, it will contain a list of installed packages files.
$ sudo touch $CHROOT/var/lib/pkg/db
Install all packages listed in $CHROOT/core.lst;
$ su # cd $CHROOT while read line; do printf "Installing $line;\n" $CHROOT/pkgadd -f -r $CHROOT $line done < core.lst
Install additional ports like wireless-tools, grub2 and fakeroot;
cp $CHROOT/media/crux/opt/* $CHROOT/usr/ports/packages cp $CHROOT/media/crux/xorg/* $CHROOT/usr/ports/packages
# chroot $CHROOT /bin/bash
pkgadd /usr/ports/packages/fakeroot#* pkgadd /usr/ports/packages/dbus#* pkgadd /usr/ports/packages/expat#* pkgadd /usr/ports/packages/libnl#* pkgadd /usr/ports/packages/libpng#* pkgadd /usr/ports/packages/freetype#* pkgadd /usr/ports/packages/libffi#* pkgadd /usr/ports/packages/sqlite3#* pkgadd /usr/ports/packages/python#* pkgadd /usr/ports/packages/glib#* pkgadd /usr/ports/packages/grub2#* pkgadd /usr/ports/packages/grub2-efi#* pkgadd /usr/ports/packages/wireless-tools#* pkgadd /usr/ports/packages/wpa_supplicant#* pkgadd /usr/ports/packages/lvm2#* pkgadd /usr/ports/packages/mdadm#* pkgadd /usr/ports/packages/efivar#* pkgadd /usr/ports/packages/efibootmgr#* pkgadd /usr/ports/packages/dosfstools#* pkgadd /usr/ports/packages/ported#* pkgadd /usr/ports/packages/libgcrypt#* pkgadd /usr/ports/packages/cryptsetup#* pkgadd /usr/ports/packages/popt#* pkgadd /usr/ports/packages/libgpg-error#* pkgadd /usr/ports/packages/libevent#* pkgadd /usr/ports/packages/libtirpc#* pkgadd /usr/ports/packages/git#* pkgadd /usr/ports/packages/tmux#* pkgadd /usr/ports/packages/prt-utils#* pkgadd /usr/ports/packages/elfutils#*
# exit
$ sudo rm $CHROOT/pkgadd $ sudo rm $CHROOT/core.lst
Create port collection;
$ sudo mkdir $CHROOT/usr/ports/machine-ports
Copy ports from doc/core/ports;
$ sudo cp -r ports/* $CHROOT/usr/ports/machine-ports/
$ sudo cp /etc/resolv.conf $CHROOT/etc
$ sudo cp $CHROOT/media/crux/handbook.txt $CHROOT/home/root/
Copy skeletons from doc/core/conf;
$ sudo cp -R conf/skel $CHROOT/etc/Core OS Index
This is part of the Tribu System Documentation. Copyright (C) 2020 Tribu Team. See the file Gnu Free Documentation License for copying conditions.