Send patches - preferably formatted by git format-patch - to patches at archlinux32 dot org.
summaryrefslogtreecommitdiff
path: root/archinstall
diff options
context:
space:
mode:
authorcodefiles <11915375+codefiles@users.noreply.github.com>2023-09-16 17:30:46 -0400
committerGitHub <noreply@github.com>2023-09-17 07:30:46 +1000
commitc9e2027725a75f08cee51e1fe02af93650d9c340 (patch)
tree30f4f95ef678f131efd17ab6f0c93a599e3bd577 /archinstall
parent2cc0d64619671fbc91a5f3a090c7c239be1d8a84 (diff)
Fix encryption debug message in `_add_efistub_bootloader()` (#1991)
Diffstat (limited to 'archinstall')
-rw-r--r--archinstall/lib/installer.py4
1 files changed, 2 insertions, 2 deletions
diff --git a/archinstall/lib/installer.py b/archinstall/lib/installer.py
index 4e6e9603..d010e8a1 100644
--- a/archinstall/lib/installer.py
+++ b/archinstall/lib/installer.py
@@ -1073,10 +1073,10 @@ TIMEOUT=5
if root_partition in self._disk_encryption.partitions:
# TODO: We need to detect if the encrypted device is a whole disk encryption,
# or simply a partition encryption. Right now we assume it's a partition (and we always have)
- debug(f'Identifying root partition by PARTUUID: {root_partition.partuuid}')
+ debug(f'Root partition is an encrypted device identifying by PARTUUID: {root_partition.partuuid}')
kernel_parameters.append(f'cryptdevice=PARTUUID={root_partition.partuuid}:luksdev root=/dev/mapper/luksdev rw rootfstype={root_partition.safe_fs_type.value} {" ".join(self._kernel_params)}')
else:
- debug(f'Root partition is an encrypted device identifying by PARTUUID: {root_partition.partuuid}')
+ debug(f'Identifying root partition by PARTUUID: {root_partition.partuuid}')
kernel_parameters.append(f'root=PARTUUID={root_partition.partuuid} rw rootfstype={root_partition.safe_fs_type.value} {" ".join(self._kernel_params)}')
parent_dev_path = disk.device_handler.get_parent_device_path(boot_partition.safe_dev_path)