Control: reassign -1 cryptsetup-initramfs
X-Debbugs-CC: Pásztor János <pasztor.ja...@it.ppke.hu>

I having doubts that your issue is due to a bug because of this:

> ...
> root@asgard ~ # more /etc/initramfs-tools/hooks/crypttab-fix.sh
> #!/bin/sh
> cp /etc/crypttab "${DESTDIR}/cryptroot/crypttab"
> exit 0
> ...

Why did you add this?  Did you notice that during update-initramfs
runs no cryptroot/crypttab file was placed into the initramfs?  If yes
then you should have investigated why not because it was indicative
that something in your setup was broken enough for
/usr/share/initramfs-tools/hooks/cryptroot to properly generate its
part of the initramfs.  FYI: That script does not simply copy
/etc/crypttab, but parses it and generates a sanitized version because
it relies on /scripts/local-block/lvm2 which does not work with UUIDs
(see #902943).  Sure enough your crypttab contains UUID= entries:

> -- /etc/crypttab
> 1Tnvme UUID=1cb8215e-4bb9-479b-ad06-36ae1b3fc957 none luks,discard
> 4Tsolid UUID=2c3dd479-7f24-4aa9-8850-ee5e970e7d32 none luks

Adding some kind of warning in a comment to the generated
cryptroot/crypttab to not manually edit or overwrite it sure would
have been helpful.  Or if that's not possible at least a brief README
file in the same directory.  One could even lint for this during
initramfs generation and emit a warning, e.g. with:

  grep -e '\(etc\|cryptroot\)/crypttab' /etc/initramfs-tools/hooks/*

Regards.

Reply via email to