#!/bin/bash # SPDX-Version: 3.0 # SPDX-CreationInfo: 2025-06-17; WEIDNER, Marc S.; # SPDX-ExternalRef: GIT https://git.coresecret.dev/msw/CISS.debian.installer.git # SPDX-FileContributor: WEIDNER, Marc S.; Centurion Intelligence Consulting Agency # SPDX-FileCopyrightText: 2024-2025; WEIDNER, Marc S.; # SPDX-FileType: SOURCE # SPDX-License-Identifier: EUPL-1.2 OR LicenseRef-CCLA-1.0 # SPDX-LicenseComment: This file is part of the CISS.debian.installer.secure framework. # SPDX-PackageName: CISS.debian.installer # SPDX-Security-Contact: security@coresecret.eu guard_sourcing ####################################### # Use chroot_exec() for: # - Simple commands (e.g., dpkg, ln, mkdir, apt, etc.). # Use chroot_script() for: # - All shell scripts, redirects, pipes, conditions, loops, or subshells. # Use chroot_stdin() for: # - Long, multi-line payloads without argv/ARG_MAX pain. Use it to stream robust, quoting-safe scripts via stdin (bash -s). # Ideal for multi-line awk/sed edits, or any content that would otherwise suffer from nested quoting or size limits if # passed via -c. ####################################### ####################################### # Wrapper for executing commands in the desired chroot environment. # Globals: # BASH_SOURCE # TERM # Arguments: # 1: Target of the chroot environment. # 2: Commands and options and parameters to be executed in chroot. # Returns: # 0: on success # ERR_CHRT_COMMAND: on failure ####################################### chroot_exec() { ### Declare Arrays, HashMaps, and Variables. declare var_chroot_target="$1"; shift declare -a ary_chroot_command=("$@") declare -r var_default_path="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin" declare var_mod="${BASH_SOURCE[1]##*/}"; var_mod="${var_mod%%_*}()" ### Basic sanitation. if (( ${#ary_chroot_command[@]} == 0 )); then do_log "emergency" "file_only" "1080() Empty command passed to 'chroot_exec()'." return "${ERR_CHRT_COMMAND}" fi if ! chroot "${var_chroot_target}" /usr/bin/env -i PATH="${var_default_path}" which "${ary_chroot_command[0]}" &>/dev/null; then do_log "emergency" "file_only" "1080() Binary: '${ary_chroot_command[0]}' not found in target 'PATH=${var_default_path}'." do_log "emergency" "file_only" "1080() Command: [chroot ${var_chroot_target} /usr/bin/env -i PATH=${var_default_path} which ${ary_chroot_command[0]} &>/dev/null]." return "${ERR_CHRT_COMMAND}" fi ### Main wrapper. if ! chroot "${var_chroot_target}" /usr/bin/env -i \ HOME="/root" \ PATH="${var_default_path}" \ TERM="${TERM}" \ LANG="C.UTF-8" \ LC_ALL="C.UTF-8" \ DEBIAN_FRONTEND="noninteractive" \ APT_LISTCHANGES_FRONTEND="none" \ "${ary_chroot_command[@]}" then do_log "emergency" "file_only" "1080() Command of ${var_mod} [chroot ${var_chroot_target} /usr/bin/env -i HOME=/root PATH=${var_default_path} TERM=${TERM} LANG=C.UTF-8 LC_ALL=C.UTF-8 DEBIAN_FRONTEND=noninteractive APT_LISTCHANGES_FRONTEND=none ${ary_chroot_command[*]}] failed." return "${ERR_CHRT_COMMAND}" else do_log "info" "file_only" "1080() Command of ${var_mod} [chroot ${var_chroot_target} /usr/bin/env -i HOME=/root PATH=${var_default_path} TERM=${TERM} LANG=C.UTF-8 LC_ALL=C.UTF-8 DEBIAN_FRONTEND=noninteractive APT_LISTCHANGES_FRONTEND=none ${ary_chroot_command[*]}] successful." return 0 fi } ### Prevents accidental 'unset -f'. # shellcheck disable=SC2034 readonly -f chroot_exec ####################################### # Run a complete shell script line inside the chroot using the command 'bash -c'. # Globals: # BASH_SOURCE # TERM # VAR_CHROOT_DEBUG # VAR_DEBUG_TRACE # VAR_DEBUG_TRAP # VAR_IN_DIALOG_WR # Arguments: # 1: Target of the chroot environment # 2: Command string to execute inside a shell (quoted) # 3: Log level of command pipeline to be executed. # Returns: # 0: on success # ERR_CHRT_COMMAND: on failure ####################################### chroot_script() { ### Declare Arrays, HashMaps, and Variables. declare var_chroot_target="$1" declare var_chroot_script="$2" declare var_log_level_on_error="${3:-emergency}" declare -r var_default_path="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin" declare var_mod="${BASH_SOURCE[1]##*/}"; var_mod="${var_mod%%_*}()" ### Basic sanitation. if [[ -z "${var_chroot_script}" ]]; then do_log "emergency" "file_only" "1080() Empty command passed to 'chroot_script()'." return "${ERR_CHRT_COMMAND}" fi ### Main wrapper. if ! chroot "${var_chroot_target}" /usr/bin/env -i \ HOME="/root" \ PATH="${var_default_path}" \ TERM="${TERM}" \ LANG="C.UTF-8" \ LC_ALL="C.UTF-8" \ DEBIAN_FRONTEND="noninteractive" \ APT_LISTCHANGES_FRONTEND="none" \ /bin/bash -o errexit -o errtrace -o functrace -o nounset -o pipefail \ -O inherit_errexit -O failglob -O lastpipe -c "${var_chroot_script}" then do_log "${var_log_level_on_error}" "file_only" "1080() Command of ${var_mod} [chroot ${var_chroot_target} /usr/bin/env -i HOME=/root PATH=${var_default_path} TERM=${TERM} LANG=C.UTF-8 LC_ALL=C.UTF-8 DEBIAN_FRONTEND=noninteractive APT_LISTCHANGES_FRONTEND=none /bin/bash -c ${var_chroot_script}] failed." if [[ "${VAR_CHROOT_DEBUG}" == "true" ]]; then if [[ "${VAR_DEBUG_TRACE}" == "true" || "${VAR_DEBUG_TRAP}" == "true" ]]; then\ dump_vars_exiting fi case "${VAR_IN_DIALOG_WR}" in box ) dialog_box_cleaner ;; gauge ) dialog_gauge_cleaner ;; text ) dialog_text_cleaner ;; * ) : ;; esac do_log "emergency" "tty" "1080() Launching interactive debug shell in chroot: '${var_chroot_target}'." chroot "${var_chroot_target}" /bin/bash -l else return "${ERR_CHRT_COMMAND}" fi else do_log "info" "file_only" "1080() Command of ${var_mod} [chroot ${var_chroot_target} /usr/bin/env -i HOME=/root PATH=${var_default_path} TERM=${TERM} LANG=C.UTF-8 LC_ALL=C.UTF-8 DEBIAN_FRONTEND=noninteractive APT_LISTCHANGES_FRONTEND=none /bin/bash -c ${var_chroot_script}] successful." return 0 fi } ### Prevents accidental 'unset -f'. # shellcheck disable=SC2034 readonly -f chroot_script ####################################### # Run the installer-desired code incl. positional arguments via stdin (HEREDOC) inside the chroot with bash -s. # Globals: # BASH_SOURCE # TERM # VAR_CHROOT_DEBUG # VAR_DEBUG_TRACE # VAR_DEBUG_TRAP # VAR_IN_DIALOG_WR # Arguments: # 1: Target of chroot environment # 2: Command string to execute inside a shell (HEREDOC): # chroot_stdin "${TARGET}" "__payload__" -- "${ARG1}" "${ARG2}" ... <<'EOF' ... EOF # Returns: # 0: on success # ERR_CHRT_COMMAND: on failure ####################################### chroot_stdin() { ### Declare Arrays, HashMaps, and Variables. declare var_chroot_target="$1"; shift ### Consume 'TARGET'. declare payload_marker="$1"; shift ### Consume marker (e.g. "__payload__"). declare var_log_level_on_error="emergency" ### Default. declare var_default_path="/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin" declare var_mod="${BASH_SOURCE[1]##*/}"; var_mod="${var_mod%%_*}()" ### Optional third parameter as log level, else we expect a '--' sentinel next. if [[ "${1-}" != "--" && -n "${1-}" ]]; then var_log_level_on_error="$1" shift fi ### If a '--' sentinel is present, drop it; the rest are payload args. if [[ "${1-}" == "--" ]]; then shift fi ### Now: "$@" are exactly the arguments for the chroot payload ($1,$2,... inside bash -s) ### Basic sanitation if [[ -z "${payload_marker}" ]]; then do_log "emergency" "file_only" "1080() Empty command passed to 'chroot_script()'." return "${ERR_CHRT_COMMAND}" fi ### Main wrapper. if ! chroot "${var_chroot_target}" /usr/bin/env -i \ HOME="/root" \ PATH="${var_default_path}" \ TERM="${TERM}" \ LANG="C.UTF-8" \ LC_ALL="C.UTF-8" \ DEBIAN_FRONTEND="noninteractive" \ APT_LISTCHANGES_FRONTEND="none" \ /bin/bash -o errexit -o errtrace -o functrace -o nounset -o pipefail \ -O inherit_errexit -O failglob -O lastpipe -s -- "$@" then do_log "${var_log_level_on_error}" "file_only" "1080() Command of ${var_mod} [chroot ${var_chroot_target} /usr/bin/env -i HOME=/root PATH=${var_default_path} TERM=${TERM} LANG=C.UTF-8 LC_ALL=C.UTF-8 DEBIAN_FRONTEND=noninteractive APT_LISTCHANGES_FRONTEND=none /bin/bash -s] failed." if [[ "${VAR_CHROOT_DEBUG}" == "true" ]]; then if [[ "${VAR_DEBUG_TRACE}" == "true" || "${VAR_DEBUG_TRAP}" == "true" ]]; then dump_vars_exiting fi case "${VAR_IN_DIALOG_WR}" in box ) dialog_box_cleaner ;; gauge ) dialog_gauge_cleaner ;; text ) dialog_text_cleaner ;; * ) : ;; esac do_log "emergency" "tty" "1080() Launching interactive debug shell in chroot: '${var_chroot_target}'." chroot "${var_chroot_target}" /bin/bash -l else return "${ERR_CHRT_COMMAND}" fi else do_log "info" "file_only" "1080() Command of ${var_mod} [chroot ${var_chroot_target} /usr/bin/env -i HOME=/root PATH=${var_default_path} TERM=${TERM} LANG=C.UTF-8 LC_ALL=C.UTF-8 DEBIAN_FRONTEND=noninteractive APT_LISTCHANGES_FRONTEND=none /bin/bash -s] successful." return 0 fi } ### Prevents accidental 'unset -f'. # shellcheck disable=SC2034 readonly -f chroot_stdin # vim: number et ts=2 sw=2 sts=2 ai tw=128 ft=sh