Notificaciones
Eliminar todas

[Resuelto] CRYPTSETUP  


Nadine Rokach
Respuestas: 2
Registrado
(@nadinerokach)
Nuevo(a) Integrante
Registrado: hace 1 año

Processing triggers for initramfs-tools (0.130) ...
update-initramfs: Generating /boot/initrd.img-4.20.0-042000-lowlatency
WARNING: Setting CRYPTSETUP in /etc/initramfs-tools/initramfs.conf is deprecated and will stop working in the future. Use /etc/cryptsetup-initramfs/conf-hook instead.
I: The initramfs will attempt to resume from /dev/sda2
I: (UUID=f83cb128-f058-40f8-b8c0-ff1769a661e3)
I: Set the RESUME variable to override this.

Respuesta
3 Respuestas
1 Respuesta
Fábio Reis
Registrado
(@fabioreis)
Registrado: hace 3 semanas

Nuevo(a) Integrante
Respuestas: 2

@nadinerokach

olução:

Edite o arquivo /etc/cryptsetup-initramfs/conf-hook.

Descomente o parãmetro #CRYPTSETUP= e coloque o valor y, ficando desta forma:

#
# Configuration file for the cryptroot initramfs hook.
#

#
# CRYPTSETUP: [ y | n ]
#
# Add cryptsetup and its dependencies to the initramfs image, regardless
# of _this_ machine configuration. By default, they're only added when
# a device is detected that needs to be unlocked at initramfs stage
# (such as root or resume devices or ones with explicit 'initramfs' flag
# in /etc/crypttab).
# Note: Honoring this setting will be deprecated in the future. Please
# uninstall the 'cryptsetup-initramfs' package if you don't want the
# cryptsetup initramfs integration.
#

CRYPTSETUP=y

#
# KEYFILE_PATTERN: ...
#
# The value of this variable is interpreted as a shell pattern.
# Matching key files from the crypttab(5) are included in the initramfs
# image. The associated devices can then be unlocked without manual
# intervention. (For instance if /etc/crypttab lists two key files
# /etc/keys/{root,swap}.key, you can set KEYFILE_PATTERN="/etc/keys/*.key"
# to add them to the initrd.)
#
# If KEYFILE_PATTERN if null or unset (default) then no key file is
# copied to the initramfs image.
#
# WARNING: If the initramfs image is to include private key material,
# you'll want to create it with a restrictive umask in order to keep
# non-privileged users at bay. For instance, set UMASK=0077 in
# /etc/initramfs-tools/initramfs.conf

Após tudo isso, execute novamente o command: 

update-initramfs -u

E seja Feliz com seu deepin/debian.

Respuesta
Don Azorin
Respuestas: 2
Registrado
(@don-azorin)
Nuevo(a) Integrante
Registrado: hace 2 años

La comunidad de PureOS dio esta respuesta. Simple pero útil:

It shouldn’t cause any troubles, you can try adding "CRYPTSETUP=y" in /etc/cryptsetup-initramfs/conf-hook and see if it will help.

Y si aún tuvieras líos, te dejo el enlace para que consultes esta wiki:

https://tracker.pureos.net/w/troubleshooting/cryptsetup_setting_deprecated/

Respuesta
Fábio Reis
Respuestas: 2
Registrado
(@fabioreis)
Nuevo(a) Integrante
Registrado: hace 3 semanas

Solução:

Edite o arquivo /etc/cryptsetup-initramfs/conf-hook.

Descomente o parãmetro #CRYPTSETUP= e coloque o valor y, ficando desta forma:

#
# Configuration file for the cryptroot initramfs hook.
#

#
# CRYPTSETUP: [ y | n ]
#
# Add cryptsetup and its dependencies to the initramfs image, regardless
# of _this_ machine configuration. By default, they're only added when
# a device is detected that needs to be unlocked at initramfs stage
# (such as root or resume devices or ones with explicit 'initramfs' flag
# in /etc/crypttab).
# Note: Honoring this setting will be deprecated in the future. Please
# uninstall the 'cryptsetup-initramfs' package if you don't want the
# cryptsetup initramfs integration.
#

CRYPTSETUP=y

#
# KEYFILE_PATTERN: ...
#
# The value of this variable is interpreted as a shell pattern.
# Matching key files from the crypttab(5) are included in the initramfs
# image. The associated devices can then be unlocked without manual
# intervention. (For instance if /etc/crypttab lists two key files
# /etc/keys/{root,swap}.key, you can set KEYFILE_PATTERN="/etc/keys/*.key"
# to add them to the initrd.)
#
# If KEYFILE_PATTERN if null or unset (default) then no key file is
# copied to the initramfs image.
#
# WARNING: If the initramfs image is to include private key material,
# you'll want to create it with a restrictive umask in order to keep
# non-privileged users at bay. For instance, set UMASK=0077 in
# /etc/initramfs-tools/initramfs.conf
#

Após tudo isso, execute novamente o command: 

update-initramfs -u

E seja Feliz com seu deepin/debian.

Respuesta
Comparte: