4 perl
-pne 's%(?:(COMP_CONFIGURE_HINTS|COMP_TAR_INTERNAL_PATHS)=1?)%${1}=1%' -i "$PWD/root/etc/sysconfig/bash-completion"
7 #XXX: moved to a user systemd service
8 #perl -pne 's%(?:(START_GPGAGENT|START_GPGAGENT_SH)=(?:"?(no|yes)"?)?)%${1}="no"%' -i "$PWD/root/etc/sysconfig/gnupg2"
11 cat << EOF > "$PWD/root/etc/vconsole.conf"
15 cat << EOF > "$PWD/root/etc/locale.conf"
16 LANGUAGE=$LOCALE:${LOCALE_ALT}
21 cat << EOF > "$PWD/root/etc/sysconfig/network"
27 cat << EOF > "$PWD/root/etc/hostname"
32 cat << EOF > "$PWD/root/etc/machine-info"
37 #XXX: we remove mask from address
38 cat << EOF > "$PWD/root/etc/hosts"
41 ${NETADDRESS4%/*} ${NETHOSTNAME} ${NETALIAS}
42 ${NETADDRESS6%/*} ${NETHOSTNAME} ${NETALIAS}
46 perl
-pne 's%listen-on port 53 \{ .+; \};%listen-on port 53 { 127.0.0.1; };%' -i "$PWD/root/etc/named.conf"
47 perl
-pne 's%listen-on-v6 port 53 \{ .+; \};%listen-on-v6 port 53 { ::1; };%' -i "$PWD/root/etc/named.conf"
50 mkdir -p "$PWD/root/etc/systemd/network"
51 if [ ! -z "${NETCONFIG}" -a "${NETCONFIG}" = 'static' ]; then
52 cat << EOF > "$PWD/root/etc/systemd/network/${NETMAC}.network"
58 Address=${NETADDRESS4}
59 Address=${NETADDRESS6}
63 Destination=${NETGATEWAY4}
67 Gateway=${NETGATEWAY4}
70 Destination=${NETGATEWAY6}
74 Gateway=${NETGATEWAY6}
77 cat << EOF > "$PWD/root/etc/systemd/network/${NETMAC}.network"
87 mkdir -p "$PWD/root/var/lib/mysql"
90 mkdir -p "$PWD/root/var/spool/mail"
93 cat << EOF > "$PWD/root/etc/fstab"
94 UUID=${BOOTUUID} /boot ext3 defaults,noatime 1 2
95 UUID=${DATAUUID} / btrfs subvol=/slash,defaults,relatime 1 1
96 UUID=${SWAPAUUID} none swap sw 0 0
97 UUID=${SWAPBUUID} none swap sw 0 0
98 UUID=${DATAUUID} /home btrfs subvol=/home,defaults,relatime 1 1
99 UUID=${DATAUUID} /var/lib/mysql btrfs subvol=/mysql,defaults,relatime 1 1
100 UUID=${DATAUUID} /var/spool/mail btrfs subvol=/mail,defaults,relatime 1 1
101 proc /proc proc defaults 0 0
105 #XXX: Don't forget to add option nofail,noauto for every devices requiring manual unlocking
106 cat << EOF > "$PWD/root/etc/crypttab"
107 ${DATANAME} UUID=${LUKSDATAUUID}
111 ln -fs "/run/systemd/resolve/resolv.conf" "$PWD/root/etc/resolv.conf"
112 #Disable LLMNR, enable localhost
113 perl
-pne 's/^#LLMNR=yes$/LLMNR=no/;s/^#DNS=/DNS=127.0.0.1/' -i "$PWD/root/etc/systemd/resolved.conf"
116 rm -f "$PWD/root/etc/resolvconf/run/enable-updates"
119 cat << EOF >> "$PWD/root/etc/mdadm.conf"
124 echo -n "$ROOTPASS" | chroot
$PWD/root passwd root
--stdin
125 chroot
$PWD/root adduser
-m "$USERLOGIN"
126 echo -n "$USERPASS" | chroot
$PWD/root passwd
"$USERLOGIN" --stdin
129 perl
-pne 's/^GRUB_TIMEOUT=[0-9]+$/GRUB_TIMEOUT=1/' -i $PWD/root
/etc
/default
/grub
132 cat << EOF >> $PWD/root/etc/shorewall/zones
135 cat << EOF >> $PWD/root/etc/shorewall/policy
140 cat << EOF >> $PWD/root/etc/shorewall/rules
143 cat << EOF > $PWD/root/etc/shorewall/rules.drakx
144 ACCEPT net fw udp 68,6700:7000 -
145 ACCEPT net fw icmp 8 -
146 ACCEPT net fw tcp 20,21,22,80,443,6700:7000 -
150 cat << EOF >> $PWD/root/etc/shorewall6/zones
153 cat << EOF >> $PWD/root/etc/shorewall6/policy
158 cat << EOF >> $PWD/root/etc/shorewall6/rules
161 cat << EOF > $PWD/root/etc/shorewall6/rules.drakx
162 ACCEPT net fw udp 546,6700:7000 -
163 ACCEPT net fw icmp 128 -
164 ACCEPT net fw tcp 20,21,22,80,443,546,6700:7000 -
167 # Disable old services
168 # Strip WantedBy=multi-user.target in [Install] section of lm_sensors.service ?
169 for s
in lm_sensors network network
-auth network
-up resolvconf smartd
; do
170 if [ -f "$PWD/root/etc/rc.d/init.d/$s" -a -x "$PWD/root/etc/rc.d/init.d/$s" ]; then
171 chroot
$PWD/root
/usr
/lib
/systemd
/systemd
-sysv-install disable
$s
173 if [ -f "$PWD/root/etc/systemd/system/multi-user.target.wants/${s}.service" ]; then
174 rm -f "$PWD/root/etc/systemd/system/multi-user.target.wants/${s}.service"
178 # Extract last kernel version
179 KVER
=`chroot $PWD/root rpm -qa | perl -pne '/kernel-server-latest/||undef $_;s%^kernel-(server)-latest-([^-]+)-(.+)$%\2-\1-\3%'`
180 #XXX: we do not regenerate initrd here, it will be generated at image build step
181 rm -f "$PWD/root/boot/initrd-${KVER}.img"
183 # Check rc.local state
184 if [ -f "$PWD/root/etc/rc.d/rc.local" ]; then
185 echo "$PWD/root/etc/rc.d/rc.local not empty"
189 # First boot startup script
190 #XXX: regenerate initrd after first successfull boot to strip from useless modules
191 touch "$PWD/root/etc/rc.d/rc.local"
192 chmod a
+x
"$PWD/root/etc/rc.d/rc.local"
193 cat << EOF > "$PWD/root/etc/rc.d/rc.local"
195 . /etc/init.d/functions
198 gprintf "Disabling lm_sensors.service: "
199 /usr/bin/systemctl disable lm_sensors.service
200 [ \$? -eq 0 ] && success || failure
202 gprintf "Stopping lm_sensors.service: "
203 /usr/bin/systemctl stop lm_sensors.service
204 [ \$? -eq 0 ] && success || failure
206 gprintf "Generating initrd: "
207 /usr/sbin/mkinitrd -f -v /boot/initrd-${KVER}.img ${KVER}
208 [ \$? -eq 0 ] && success || failure
214 echo "Usage: \$0 start" >&2
221 chroot
"$PWD/root" msec
-f webserver
224 perl
-pne "my \$m='${MAIL}'; s%^(root:[\\t\\s]+)postfix\$%\\1\$m%" -i "$PWD/root/etc/postfix/aliases"
227 chroot
"$PWD/root" /usr
/sbin
/sshd
-keygen
230 #XXX: forced because msec decides otherwise
231 perl
-pne 's%^PermitRootLogin .*%PermitRootLogin yes%' -i "$PWD/root/etc/ssh/sshd_config"
233 # Prevent btmp warning
234 cat << EOF > "$PWD/root/etc/tmpfiles.d/var.conf"
235 # See tmpfiles.d(5) for details
237 # Prevent msec warning about enforcing permissions
238 f /var/log/btmp 0600 root utmp -
242 if [ -e "$HOME/.ssh/id_rsa.pub" -o -e "$HOME/.ssh/id_ed25519.pub" ]; then
243 mkdir -m 0700 "$PWD/root/root/.ssh"
244 touch "$PWD/root/root/.ssh/authorized_keys"
245 chmod u
=rw
,go
=r
"$PWD/root/root/.ssh/authorized_keys"
247 # Add rsa key if available
248 if [ -e "$HOME/.ssh/id_rsa.pub" ]; then
249 cat "$HOME/.ssh/id_rsa.pub" >> "$PWD/root/root/.ssh/authorized_keys"
252 # Add ed25519 key if available
253 if [ -e "$HOME/.ssh/id_ed25519.pub" ]; then
254 cat "$HOME/.ssh/id_ed25519.pub" >> "$PWD/root/root/.ssh/authorized_keys"
258 #TODO ntp /etc/systemd/timesyncd.conf
260 # Force enable systemd-networkd.service
261 chroot
"$PWD/root" /usr
/bin
/systemctl
enable systemd
-networkd.service
263 # Force enable systemd-resolved.service
264 chroot
"$PWD/root" /usr
/bin
/systemctl
enable systemd
-resolved.service
266 # Cleanup tmp and run
267 rm -fr $PWD/root
/tmp
/* $PWD/root
/run
/*