diff --git a/docs/alpine-desktop-setup/installation.md b/docs/alpine-desktop-setup/installation.md index 3be50d2..d99b6ab 100644 --- a/docs/alpine-desktop-setup/installation.md +++ b/docs/alpine-desktop-setup/installation.md @@ -89,7 +89,7 @@ To: And configure `/etc/kernel-hooks.d/secureboot.conf` for cmdline and secureboot. ``` -cmdline="rw rd.luks.name==root root=/dev/vg1/root{n} modules=ext4 quiet splash rd.lvm.vg=vg1" +cmdline="rw rd.luks.name==luks root=/dev/vg1/root{n} modules=ext4 quiet splash rd.lvm.vg=vg1" signing_cert="/usr/share/secureboot/keys/db/db.pem" signing_key="/usr/share/secureboot/keys/db/db.key" @@ -102,7 +102,7 @@ output_name="alpine-linux-{flavor}.efi" Here `` has to be replaced with the uuid of the partition which contains our volume group: ``` -# blkid -o value -s UUID /dev/ >> /etc/kernel-hooks.d/secureboot.conf +# blkid /dev/ >> /etc/kernel-hooks.d/secureboot.conf ``` All that's left for booting is secureboot which `sbctl` will be used for to create keys, and sign some executables with. diff --git a/docs/alpine-desktop-setup/provisioning.md b/docs/alpine-desktop-setup/provisioning.md index 78aeed5..e574986 100644 --- a/docs/alpine-desktop-setup/provisioning.md +++ b/docs/alpine-desktop-setup/provisioning.md @@ -31,14 +31,14 @@ Then to create the filesystem on the efi partition. And the encrypted filesystem on the root partition. ``` -# cryptsetup luksFormat /dev/ --type luks2 --label luks -# cryptsetup open --type luks /dev/ pv1 +# cryptsetup luksFormat /dev/ --type luks2 +# cryptsetup open --type luks /dev/ luks ``` Now to create a new LVM volume group: ``` -# vgcreate vg1 /dev/mapper/pv1 +# vgcreate vg1 /dev/mapper/luks ``` To create partitions inside the volume group: @@ -61,4 +61,4 @@ for i in root{n} var{n} tmp{n} nix{n} home{n}; do > done ``` -Other filesystems can also be used but `ext4` is the standard for most Linux distrobutions. \ No newline at end of file +Other filesystems can also be used but `ext4` is the standard for most Linux distrobutions.