V8.00.000.2025.06.17
All checks were successful
🛡️ Shell Script Linting / 🛡️ Shell Script Linting (push) Successful in 1m50s

Signed-off-by: Marc S. Weidner <msw@coresecret.dev>
This commit is contained in:
2025-10-14 18:20:29 +01:00
parent 087b104924
commit 4e6f4b7447
8 changed files with 130 additions and 79 deletions

View File

@@ -148,6 +148,8 @@ EOF
iface ${VAR_FINAL_NIC} inet6 static iface ${VAR_FINAL_NIC} inet6 static
address ${VAR_FINAL_IPV6_CIDR} address ${VAR_FINAL_IPV6_CIDR}
gateway ${VAR_FINAL_IPV6_GW} gateway ${VAR_FINAL_IPV6_GW}
### Optional harden, no RA on static v6
pre-up sysctl -w net.ipv6.conf.ens3.accept_ra=0
EOF EOF
do_log "info" "file_only" "4300() IPv6 on the primary NIC: '${VAR_FINAL_NIC}' configured statically." do_log "info" "file_only" "4300() IPv6 on the primary NIC: '${VAR_FINAL_NIC}' configured statically."
@@ -168,9 +170,6 @@ EOF
insert_header "${TARGET}/etc/dhcpcd.conf" insert_header "${TARGET}/etc/dhcpcd.conf"
insert_comments "${TARGET}/etc/dhcpcd.conf" insert_comments "${TARGET}/etc/dhcpcd.conf"
cat << 'EOF' >> "${TARGET}/etc/dhcpcd.conf" cat << 'EOF' >> "${TARGET}/etc/dhcpcd.conf"
### Global IPv6 Options
noipv6rs
### No Global APIPA-Fallback. ### No Global APIPA-Fallback.
noipv4ll noipv4ll
@@ -219,6 +218,11 @@ EOF
fi fi
if [[ "${VAR_LINK_IPV6}" == "true" && -n "${network_static_ipv6address}" ]]; then
echo " noipv6rs" >> "${TARGET}/etc/dhcpcd.conf"
fi
### Footer (always). ### Footer (always).
echo '' >> "${TARGET}/etc/dhcpcd.conf" echo '' >> "${TARGET}/etc/dhcpcd.conf"
echo '# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=conf' >> "${TARGET}/etc/dhcpcd.conf" echo '# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=conf' >> "${TARGET}/etc/dhcpcd.conf"

View File

@@ -26,46 +26,79 @@ dropbear_initramfs() {
### Declare Arrays, HashMaps, and Variables. ### Declare Arrays, HashMaps, and Variables.
declare var_file="" declare var_file=""
declare -r var_logfile="/root/.ciss/cdi/log/4311_dropbear_initramfs.log" declare -r var_logfile="/root/.ciss/cdi/log/4311_dropbear_initramfs.log"
declare var_target="${TARGET}"
chroot_logger "${TARGET}${var_logfile}" ### Check for TARGET / RECOVERY.
[[ "${VAR_RUN_RECOVERY}" == "true" ]] && var_target="${RECOVERY}"
chroot_script "${TARGET}" " chroot_logger "${var_target}${var_logfile}"
chroot_script "${var_target}" "
export INITRD=No export INITRD=No
apt-get install -y --no-install-recommends --no-install-suggests dropbear-initramfs dropbear-bin 2>&1 | tee -a ${var_logfile} apt-get install -y --no-install-recommends --no-install-suggests dropbear-initramfs dropbear-bin 2>&1 | tee -a ${var_logfile}
" "
chroot_script "${TARGET}" " chroot_script "${var_target}" "
export INITRD=No export INITRD=No
apt-get purge -y dropbear dropbear-run || true apt-get purge -y dropbear dropbear-run || true
" "
chroot_script "${TARGET}" " chroot_script "${var_target}" "
export INITRD=No export INITRD=No
apt-get install -y --no-install-recommends --no-install-suggests gpgv 2>&1 | tee -a ${var_logfile} apt-get install -y --no-install-recommends --no-install-suggests gpgv 2>&1 | tee -a ${var_logfile}
" "
chroot_script "${TARGET}" " chroot_script "${var_target}" "
export INITRD=No export INITRD=No
apt-mark hold dropbear dropbear-initramfs 2>&1 | tee -a ${var_logfile} apt-mark hold dropbear dropbear-initramfs 2>&1 | tee -a ${var_logfile}
" "
mv "${TARGET}/usr/sbin/dropbear" "${TARGET}/usr/sbin/dropbear.trixie" mv "${var_target}/usr/sbin/dropbear" "${var_target}/usr/sbin/dropbear.trixie"
install -D -m 0755 -o root -g root "${DIR_TMP}/build/dropbear-2025.88/dropbear" "${TARGET}/usr/sbin/" install -D -m 0755 -o root -g root "${DIR_TMP}/build/dropbear-2025.88/dropbear" "${var_target}/usr/sbin/"
do_log "debug" "file_only" "4311() Installation [dropbear] successful." do_log "debug" "file_only" "4311() Installation [dropbear] successful."
for var_file in dbclient dropbearconvert dropbearkey; do for var_file in dbclient dropbearconvert dropbearkey; do
mv "${TARGET}/usr/bin/${var_file}" "${TARGET}/usr/bin/${var_file}.trixie" mv "${var_target}/usr/bin/${var_file}" "${var_target}/usr/bin/${var_file}.trixie"
install -D -m 0755 -o root -g root "${DIR_TMP}/build/dropbear-2025.88/${var_file}" "${TARGET}/usr/bin/" install -D -m 0755 -o root -g root "${DIR_TMP}/build/dropbear-2025.88/${var_file}" "${var_target}/usr/bin/"
do_log "debug" "file_only" "4311() Installation [${var_file}] successful." do_log "debug" "file_only" "4311() Installation [${var_file}] successful."
done done
mkdir -p "${var_target}/etc/initramfs-tools/scripts/init-bottom"
insert_header "${TARGET}/etc/apt/preferences.d/99-mask-dropbear" cat << 'EOF' >| "${var_target}/etc/initramfs-tools/scripts/init-bottom/zzzz-dropbear-kill"
insert_comments "${TARGET}/etc/apt/preferences.d/99-mask-dropbear" #!/bin/sh
cat << 'EOF' >> "${TARGET}/etc/apt/preferences.d/99-mask-dropbear"
PREREQ=""
prereqs() { echo "${PREREQ}"; }
# shellcheck disable=SC2249
case "${1}" in
prereqs) prereqs; exit 0 ;;
esac
### Stop dropbear shipped in the initramfs after root pivot.
[ -x /bin/pidof ] || exit 0
P=$(/bin/pidof dropbear 2>/dev/null) || true
[ -n "${P}" ] || exit 0
/bin/kill -TERM "${P}" 2>/dev/null || true
/bin/sleep 1
/bin/kill -KILL "${P}" 2>/dev/null || true
exit 0
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh
EOF
chmod 0755 "${var_target}/etc/initramfs-tools/scripts/init-bottom/zzzz-dropbear-kill"
insert_header "${var_target}/etc/apt/preferences.d/99-mask-dropbear"
insert_comments "${var_target}/etc/apt/preferences.d/99-mask-dropbear"
cat << 'EOF' >> "${var_target}/etc/apt/preferences.d/99-mask-dropbear"
# Never install the dropbear daemon package at all. # Never install the dropbear daemon package at all.
Package: dropbear Package: dropbear
Pin: release * Pin: release *
@@ -74,9 +107,9 @@ Pin-Priority: -1
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=conf # vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=conf
EOF EOF
insert_header "${TARGET}/etc/apt/preferences.d/99-mask-dropbear-initramfs" insert_header "${var_target}/etc/apt/preferences.d/99-mask-dropbear-initramfs"
insert_comments "${TARGET}/etc/apt/preferences.d/99-mask-dropbear-initramfs" insert_comments "${var_target}/etc/apt/preferences.d/99-mask-dropbear-initramfs"
cat << 'EOF' >> "${TARGET}/etc/apt/preferences.d/99-mask-dropbear-initramfs" cat << 'EOF' >> "${var_target}/etc/apt/preferences.d/99-mask-dropbear-initramfs"
# Keep the currently installed initramfs integration; never upgrade it. # Keep the currently installed initramfs integration; never upgrade it.
Package: dropbear-initramfs Package: dropbear-initramfs
Pin: release * Pin: release *
@@ -85,7 +118,7 @@ Pin-Priority: -1
# vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=conf # vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=conf
EOF EOF
chroot_script "${TARGET}" "systemctl mask dropbear.service dropbear.socket" chroot_script "${var_target}" "systemctl mask dropbear.service dropbear.socket"
do_log "info" "file_only" "4311() Masked: [dropbear.service dropbear.socket]" do_log "info" "file_only" "4311() Masked: [dropbear.service dropbear.socket]"
guard_dir && return 0 guard_dir && return 0

View File

@@ -15,16 +15,20 @@ guard_sourcing
####################################### #######################################
# Setup ssh server. # Setup ssh server.
# Globals: # Globals:
# RECOVERY
# TARGET # TARGET
# VAR_DROPBEAR # VAR_DROPBEAR
# VAR_FINAL_FQDN # VAR_FINAL_FQDN
# VAR_FINAL_IPV4 # VAR_FINAL_IPV4
# VAR_FINAL_IPV6 # VAR_FINAL_IPV6
# VAR_FINAL_NIC # VAR_FINAL_NIC
# VAR_LINK_IPV6
# VAR_RUN_RECOVERY
# VAR_SETUP_PATH # VAR_SETUP_PATH
# VAR_SSH_CA # VAR_SSH_CA
# VAR_SSH_PORT # VAR_SSH_PORT
# VAR_USER_MAX # VAR_USER_MAX
# network_static_ipv6address
# Arguments: # Arguments:
# None # None
# Returns: # Returns:
@@ -35,30 +39,41 @@ installation_ssh() {
declare -a ary_user=() declare -a ary_user=()
declare -i i=0 declare -i i=0
declare var_auth="" var_name="" var_ca="" var_pub="" declare var_auth="" var_name="" var_ca="" var_pub=""
declare var_target="${TARGET}"
chroot_exec "${TARGET}" apt-get install -y --no-install-recommends --no-install-suggests ssh ### Check for TARGET / RECOVERY.
[[ "${VAR_RUN_RECOVERY}" == "true" ]] && var_target="${RECOVERY}"
mkdir -p "${TARGET}/etc/systemd/system/ssh.service.d" chroot_exec "${var_target}" apt-get install -y --no-install-recommends --no-install-suggests ssh
mkdir -p "${var_target}/etc/systemd/system/ssh.service.d"
if [[ "${VAR_LINK_IPV6}" == "true" && -n "${network_static_ipv6address}" ]]; then
# shellcheck disable=SC2312 # shellcheck disable=SC2312
cat << EOF >> "${TARGET}/etc/systemd/system/ssh.service.d/override.conf" cat << EOF >| "${var_target}/etc/systemd/system/ssh.service.d/override.conf"
[Unit] [Unit]
Wants=network-online.target After=ifup@${VAR_FINAL_NIC}.service network.target
After=network-online.target Wants=ifup@${VAR_FINAL_NIC}.service
[Service] [Service]
# Wait until v4 *and* v6 global addresses exist on ens3 ### Block until the exact v6 address is present and not tentative
ExecStartPre=/bin/sh -c 'for i in $(seq 1 60); do \ ExecStartPre=/bin/sh -c '\
ip -4 addr show dev ens3 scope global | grep -q "inet " && \ var_ip="${VAR_FINAL_IPV6}"; \
ip -6 addr show dev ens3 scope global | grep -q "inet6 " && exit 0; \ for i in $(seq 1 60); do \
sleep 1; \ ip -6 addr show dev ens3 tentative | grep -q "inet6" && { sleep 0.5; continue; }; \
done; exit 1' ip -6 addr show dev ens3 scope global | grep -q "\${var_ip}/" && exit 0; \
sleep 0.5; \
done; \
echo "IPv6 address ${var_ip} not ready"; exit 1'
TimeoutStartSec=32s
Restart=on-failure Restart=on-failure
RestartSec=3s RestartSec=2s
EOF EOF
fi
install -D -m 0644 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/banner" "${TARGET}/etc/" install -D -m 0644 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/banner" "${var_target}/etc/"
install -D -m 0644 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/motd" "${TARGET}/etc/" install -D -m 0644 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/motd" "${var_target}/etc/"
do_log "info" "file_only" "4420() Installed SSH '/etc/banner' and '/etc/motd'." do_log "info" "file_only" "4420() Installed SSH '/etc/banner' and '/etc/motd'."
### Only process those for which both *_name and *_authentication_access_ssh are set. ### Only process those for which both *_name and *_authentication_access_ssh are set.
@@ -71,85 +86,85 @@ EOF
fi fi
done done
rm -rf "${TARGET}"/etc/ssh/ssh_host_*key* rm -rf "${var_target}"/etc/ssh/ssh_host_*key*
if [[ -f "${TARGET}/etc/dropbear/initramfs/dropbear_ed25519_host_key" ]]; then if [[ -f "${var_target}/etc/dropbear/initramfs/dropbear_ed25519_host_key" ]]; then
chroot_script "${TARGET}" " chroot_script "${var_target}" "
dropbearconvert dropbear openssh /etc/dropbear/initramfs/dropbear_ed25519_host_key /etc/ssh/ssh_host_ed25519_key" dropbearconvert dropbear openssh /etc/dropbear/initramfs/dropbear_ed25519_host_key /etc/ssh/ssh_host_ed25519_key"
chroot_script "${TARGET}" " chroot_script "${var_target}" "
dropbearconvert dropbear openssh /etc/dropbear/initramfs/dropbear_rsa_host_key /etc/ssh/ssh_host_rsa_key" dropbearconvert dropbear openssh /etc/dropbear/initramfs/dropbear_rsa_host_key /etc/ssh/ssh_host_rsa_key"
chroot_script "${TARGET}" " chroot_script "${var_target}" "
dropbearkey -y -f /etc/dropbear/initramfs/dropbear_ed25519_host_key /etc/ssh/ssh_host_ed25519_key.pub" dropbearkey -y -f /etc/dropbear/initramfs/dropbear_ed25519_host_key /etc/ssh/ssh_host_ed25519_key.pub"
chroot_script "${TARGET}" " chroot_script "${var_target}" "
dropbearkey -y -f /etc/dropbear/initramfs/dropbear_rsa_host_key /etc/ssh/ssh_host_rsa_key.pub" dropbearkey -y -f /etc/dropbear/initramfs/dropbear_rsa_host_key /etc/ssh/ssh_host_rsa_key.pub"
else else
# shellcheck disable=SC2312 # shellcheck disable=SC2312
chroot_exec "${TARGET}" ssh-keygen -o -N "" -t ed25519 -f /etc/ssh/ssh_host_ed25519_key -C "root@${VAR_FINAL_FQDN}-$(date -I)" chroot_exec "${var_target}" ssh-keygen -o -N "" -t ed25519 -f /etc/ssh/ssh_host_ed25519_key -C "root@${VAR_FINAL_FQDN}-$(date -I)"
# shellcheck disable=SC2312 # shellcheck disable=SC2312
chroot_exec "${TARGET}" ssh-keygen -o -N "" -t rsa -b 4096 -f /etc/ssh/ssh_host_rsa_key -C "root@${VAR_FINAL_FQDN}-$(date -I)" chroot_exec "${var_target}" ssh-keygen -o -N "" -t rsa -b 4096 -f /etc/ssh/ssh_host_rsa_key -C "root@${VAR_FINAL_FQDN}-$(date -I)"
fi fi
mkdir -p "${TARGET}/root/.ciss/cdi/backup/etc/ssh" mkdir -p "${var_target}/root/.ciss/cdi/backup/etc/ssh"
cp "${TARGET}/etc/ssh/sshd_config" "${TARGET}/root/.ciss/cdi/backup/etc/ssh/sshd_config.bak" cp "${var_target}/etc/ssh/sshd_config" "${var_target}/root/.ciss/cdi/backup/etc/ssh/sshd_config.bak"
cp "${TARGET}/etc/ssh/ssh_config" "${TARGET}/root/.ciss/cdi/backup/etc/ssh/ssh_config.bak" cp "${var_target}/etc/ssh/ssh_config" "${var_target}/root/.ciss/cdi/backup/etc/ssh/ssh_config.bak"
rm -f "${TARGET}/etc/ssh/sshd_config" rm -f "${var_target}/etc/ssh/sshd_config"
install -D -m 0600 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/ssh/sshd_config" "${TARGET}/etc/ssh/sshd_config" install -D -m 0600 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/ssh/sshd_config" "${var_target}/etc/ssh/sshd_config"
chmod 0600 "${TARGET}/etc/ssh/ssh_config" chmod 0600 "${var_target}/etc/ssh/ssh_config"
insert_comments "${TARGET}/etc/ssh/sshd_config" insert_comments "${var_target}/etc/ssh/sshd_config"
# shellcheck disable=SC2153 # shellcheck disable=SC2153
sed -i -E "s|^[[:space:]]*ListenAddressIPV4[[:space:]]+.*$|$(printf '%-29s%s' 'ListenAddress' "${VAR_FINAL_IPV4}")|" "${TARGET}/etc/ssh/sshd_config" sed -i -E "s|^[[:space:]]*ListenAddressIPV4[[:space:]]+.*$|$(printf '%-29s%s' 'ListenAddress' "${VAR_FINAL_IPV4}")|" "${var_target}/etc/ssh/sshd_config"
if [[ -n "${VAR_FINAL_IPV6}" ]]; then if [[ -n "${VAR_FINAL_IPV6}" ]]; then
sed -i -E "s|^[[:space:]]*ListenAddressIPV6[[:space:]]+.*$|$(printf '%-29s%s' 'ListenAddress' "${VAR_FINAL_IPV6}")|" "${TARGET}/etc/ssh/sshd_config" sed -i -E "s|^[[:space:]]*ListenAddressIPV6[[:space:]]+.*$|$(printf '%-29s%s' 'ListenAddress' "${VAR_FINAL_IPV6}")|" "${var_target}/etc/ssh/sshd_config"
else else
sed -i "/^[[:space:]]*ListenAddressIPV6[[:space:]]*/d" "${TARGET}/etc/ssh/sshd_config" sed -i "/^[[:space:]]*ListenAddressIPV6[[:space:]]*/d" "${var_target}/etc/ssh/sshd_config"
fi fi
sed -i -E "s|^[[:space:]]*Port[[:space:]]+.*$|$(printf '%-29s%s' 'Port' "${VAR_SSH_PORT}")|" "${TARGET}/etc/ssh/sshd_config" sed -i -E "s|^[[:space:]]*Port[[:space:]]+.*$|$(printf '%-29s%s' 'Port' "${VAR_SSH_PORT}")|" "${var_target}/etc/ssh/sshd_config"
if (( ${#ary_user[@]} > 0 )); then if (( ${#ary_user[@]} > 0 )); then
sed -i -E "s|^\s*AllowUsers\s+.*$|$(printf '%-29s%s' 'AllowUsers' "root ${ary_user[*]}")|" "${TARGET}/etc/ssh/sshd_config" sed -i -E "s|^\s*AllowUsers\s+.*$|$(printf '%-29s%s' 'AllowUsers' "root ${ary_user[*]}")|" "${var_target}/etc/ssh/sshd_config"
fi fi
if [[ -n "${VAR_SSH_CA}" ]]; then if [[ -n "${VAR_SSH_CA}" ]]; then
var_ca="${VAR_SSH_CA##*/}" var_ca="${VAR_SSH_CA##*/}"
install -D -m 0644 -o root -g root "${VAR_SETUP_PATH}${VAR_SSH_CA}" "${TARGET}/etc/ssh/" install -D -m 0644 -o root -g root "${VAR_SETUP_PATH}${VAR_SSH_CA}" "${var_target}/etc/ssh/"
sed -i -E "s|^\s*TrustedUserCAKeys\s+.*$|$(printf '%-29s%s' 'TrustedUserCAKeys' "/etc/ssh/${var_ca}")|" "${TARGET}/etc/ssh/sshd_config" sed -i -E "s|^\s*TrustedUserCAKeys\s+.*$|$(printf '%-29s%s' 'TrustedUserCAKeys' "/etc/ssh/${var_ca}")|" "${var_target}/etc/ssh/sshd_config"
fi fi
### Preparing the test environment in chroot. ### Preparing the test environment in chroot.
chroot_exec "${TARGET}" install -d -o root -g root -m 0755 /run/sshd chroot_exec "${var_target}" install -d -o root -g root -m 0755 /run/sshd
### Syntax test (hard). ### Syntax test (hard).
if ! chroot_script "${TARGET}" "sshd -t -f /etc/ssh/sshd_config"; then if ! chroot_script "${var_target}" "sshd -t -f /etc/ssh/sshd_config"; then
do_log "emergency" "file_only" "4420() [sshd -t -f /etc/ssh/sshd_config] failed." do_log "emergency" "file_only" "4420() [sshd -t -f /etc/ssh/sshd_config] failed."
return "${ERR_CONF_VALIDATION}" return "${ERR_CONF_VALIDATION}"
fi fi
### Effective configuration (soft, purely informative). ### Effective configuration (soft, purely informative).
if ! chroot_script "${TARGET}" "sshd -T -f /etc/ssh/sshd_config >| /root/.ciss/cdi/log/sshd_config.log"; then if ! chroot_script "${var_target}" "sshd -T -f /etc/ssh/sshd_config >| /root/.ciss/cdi/log/sshd_config.log"; then
do_log "warn" "file_only" "4420() [sshd -T -f /etc/ssh/sshd_config] failed. Likely env. Continuing." do_log "warn" "file_only" "4420() [sshd -T -f /etc/ssh/sshd_config] failed. Likely env. Continuing."
fi fi
chroot_script "${TARGET}" "ssh-keygen -r ${VAR_FINAL_FQDN}. >| /root/.ciss/cdi/log/SSHFP.log" chroot_script "${var_target}" "ssh-keygen -r ${VAR_FINAL_FQDN}. >| /root/.ciss/cdi/log/SSHFP.log"
if [[ "${VAR_DROPBEAR}" == "true" ]]; then if [[ "${VAR_DROPBEAR}" == "true" ]]; then
printf "### Dropbear SSHFP RR: \n" >> "${TARGET}/root/.ciss/cdi/log/SSHFP.log" printf "### Dropbear SSHFP RR: \n" >> "${var_target}/root/.ciss/cdi/log/SSHFP.log"
for var_pub in "${TARGET}"/etc/dropbear/initramfs/dropbear*.pub; do for var_pub in "${var_target}"/etc/dropbear/initramfs/dropbear*.pub; do
chroot_script "${TARGET}" "ssh-keygen -E sha256 -r ${VAR_FINAL_FQDN}. -f ${var_pub#/target} >> /root/.ciss/cdi/log/SSHFP.log" chroot_script "${var_target}" "ssh-keygen -E sha256 -r ${VAR_FINAL_FQDN}. -f ${var_pub#/target} >> /root/.ciss/cdi/log/SSHFP.log"
done done
@@ -160,9 +175,9 @@ EOF
# environment variables: TMOUT # # environment variables: TMOUT #
# TMOUT=14400 ensures that users are automatically logged out after 4 hours of inactivity.# # TMOUT=14400 ensures that users are automatically logged out after 4 hours of inactivity.#
########################################################################################### ###########################################################################################
insert_header "${TARGET}/etc/profile.d/idle-users.sh" insert_header "${var_target}/etc/profile.d/idle-users.sh"
insert_comments "${TARGET}/etc/profile.d/idle-users.sh" insert_comments "${var_target}/etc/profile.d/idle-users.sh"
cat << EOF >> "${TARGET}/etc/profile.d/idle-users.sh" cat << EOF >> "${var_target}/etc/profile.d/idle-users.sh"
case $- in case $- in
*i*) *i*)
TMOUT=14400 TMOUT=14400

View File

@@ -68,6 +68,12 @@ accounts_setup() {
install -m 0600 -o root -g root /dev/null "${var_target}/root/.ssh/authorized_keys" install -m 0600 -o root -g root /dev/null "${var_target}/root/.ssh/authorized_keys"
install -m 0600 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/skel/.bashrc" "${var_target}/root/" install -m 0600 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/skel/.bashrc" "${var_target}/root/"
install -m 0600 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/skel/.ciss/theme_eza_ciss.yml" "${var_target}/root/.ciss/" install -m 0600 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/skel/.ciss/theme_eza_ciss.yml" "${var_target}/root/.ciss/"
install -m 0600 -o root -g root "${VAR_SETUP_PATH}/includes/target/root/.ciss/alias" "${var_target}/root/.ciss/"
install -m 0700 -o root -g root "${VAR_SETUP_PATH}/includes/target/etc/skel/.ciss/check_chrony.sh" "${var_target}/root/.ciss/"
install -m 0700 -o root -g root "${VAR_SETUP_PATH}/includes/target/root/.ciss/clean_logout.sh" "${var_target}/root/.ciss/"
install -m 0600 -o root -g root "${VAR_SETUP_PATH}/includes/target/root/.ciss/f2bchk" "${var_target}/root/.ciss/"
install -m 0600 -o root -g root "${VAR_SETUP_PATH}/includes/target/root/.ciss/scan_libwrap" "${var_target}/root/.ciss/"
install -m 0600 -o root -g root "${VAR_SETUP_PATH}/includes/target/root/.ciss/shortcuts" "${var_target}/root/.ciss/"
if [[ "${user_root_shell}" == "/bin/zsh" ]]; then if [[ "${user_root_shell}" == "/bin/zsh" ]]; then
@@ -102,9 +108,6 @@ accounts_setup() {
fi fi
fi fi
install -m 0600 -o root -g root "${VAR_SETUP_PATH}/includes/target/root/.ciss/alias" "${var_target}/root/.ciss/"
install -m 0700 -o root -g root "${VAR_SETUP_PATH}/includes/target/root/.ciss/clean_logout.sh" "${var_target}/root/.ciss/"
install -m 0600 -o root -g root "${VAR_SETUP_PATH}/includes/target/root/.ciss/shortcuts" "${var_target}/root/.ciss/"
### To be able to copy/paste from vim, one needs to create a '.vimrc' with the following content: ### To be able to copy/paste from vim, one needs to create a '.vimrc' with the following content:
echo 'set clipboard=unnamed' >| "${var_target}/root/.vimrc" echo 'set clipboard=unnamed' >| "${var_target}/root/.vimrc"
@@ -202,7 +205,7 @@ EOF
;; ;;
true) true)
chroot_script "${var_target}" "printf '%s:%s\n' root '${var_password}' | /usr/sbin/chpasswd -e" chroot_script "${var_target}" "printf '%s:%s\n' 'root' '${var_password}' | /usr/sbin/chpasswd -e"
#chroot_script "${var_target}" "/usr/sbin/usermod -p '${user_root_password}' root" #chroot_script "${var_target}" "/usr/sbin/usermod -p '${user_root_password}' root"
do_log "info" "file_only" "4520() User: 'root' password access: [true]" do_log "info" "file_only" "4520() User: 'root' password access: [true]"
;; ;;

View File

@@ -17,6 +17,7 @@ printf "\e[95mStarting: [/etc/initramfs-tools/hooks/9999-custom-initramfs.sh] \n
PREREQ="" PREREQ=""
prereqs() { echo "${PREREQ}"; } prereqs() { echo "${PREREQ}"; }
# shellcheck disable=SC2249
case "${1}" in case "${1}" in
prereqs) prereqs; exit 0 ;; prereqs) prereqs; exit 0 ;;
esac esac

View File

@@ -23,6 +23,7 @@ export PATH
trap ' "${SHELL}" "${HOME}/.ciss/clean_logout.sh" ' EXIT trap ' "${SHELL}" "${HOME}/.ciss/clean_logout.sh" ' EXIT
. "${HOME}/.ciss/alias" . "${HOME}/.ciss/alias"
. "${HOME}/.ciss/check_chrony.sh"
. "${HOME}/.ciss/f2bchk.sh" . "${HOME}/.ciss/f2bchk.sh"
. "${HOME}/.ciss/scan_libwrap" . "${HOME}/.ciss/scan_libwrap"
. "${HOME}/.ciss/shortcuts" . "${HOME}/.ciss/shortcuts"
@@ -114,13 +115,6 @@ alias cp='cp -iv'
alias mv='mv -iv' alias mv='mv -iv'
alias rm='rm -iv' alias rm='rm -iv'
### Welcome message after login.
#printf "\n"
#printf "\e[91m🔐 Coresecret Channel Established. \e[0m\n"
#printf "\e[92m✅ Welcome back\e[0m"; printf "\e[95m '%s' \e[0m" "${USER}"; printf "\e[92m! Type\e[0m"; printf "\e[95m 'celp'\e[0m"; printf "\e[92m for shortcuts. \e[0m\n"
#printf "\n"
#printf "\n"
printf "\n" printf "\n"
printf "%b🔐 Coresecret Channel Established. %b%b" "${CRED}" "${CRES}" "${NL}" printf "%b🔐 Coresecret Channel Established. %b%b" "${CRED}" "${CRES}" "${NL}"
printf "%b✅ Welcome back %b" "${CGRE}" "${CRES}" printf "%b✅ Welcome back %b" "${CGRE}" "${CRES}"

View File

@@ -122,6 +122,7 @@ source ${ZSH}/oh-my-zsh.sh
trap ' "${SHELL}" "${HOME}/.ciss/clean_logout.sh" ' EXIT trap ' "${SHELL}" "${HOME}/.ciss/clean_logout.sh" ' EXIT
. "${HOME}/.ciss/alias" . "${HOME}/.ciss/alias"
. "${HOME}/.ciss/check_chrony.sh" . "${HOME}/.ciss/check_chrony.sh"
. "${HOME}/.ciss/f2bchk"
. "${HOME}/.ciss/shortcuts" . "${HOME}/.ciss/shortcuts"
. "${HOME}/.ciss/scan_libwrap" . "${HOME}/.ciss/scan_libwrap"
. /usr/share/doc/fzf/examples/key-bindings.zsh . /usr/share/doc/fzf/examples/key-bindings.zsh