# Authors: grml-team (grml.org), (c) Michael Prokop <mika@grml.org>
# Bug-Reports: see http://grml.org/bugs/
# License: This file is licensed under the GPL v2.
-# Latest change: Mon Apr 23 11:12:58 CEST 2007 [mika]
################################################################################
set -e # exit on any error
. /etc/debootstrap/config || exit 1
. /etc/debootstrap/variables || exit 1
-[ -r /proc/1 ] || mount -t proc none /proc
+[ -r /proc/1 ] || mount -t proc none /proc
# variable checks {{{
# use aptitude only if it's available
if [ -x /usr/bin/aptitude ] ; then
- APTINSTALL='aptitude -y install '
+ APTINSTALL="aptitude -y --without-recommends install $DPKG_OPTIONS"
APTUPDATE='aptitude update'
else
- APTINSTALL='apt-get --force-yes -y install'
+ APTINSTALL="apt-get --force-yes -y install $DPKG_OPTIONS"
APTUPDATE='apt-get update'
fi
echo "$2" > "$STAGES/$1"
return 0
elif grep -q done "$STAGES/$1" 2>/dev/null ; then
- echo "[*] Notice: stage $1 has been executed already, skipping execution therefore.">&2
+ echo " [*] Notice: stage $1 has been executed already, skipping execution therefore.">&2
return 1
fi
+ echo " Executing stage ${1}"
+ return 0
}
# }}}
# define chroot mirror {{{
chrootmirror() {
- if [ -n "$CHROOTMIRROR" ] ; then
- echo "deb $CHROOTMIRROR $RELEASE main contrib non-free" > /etc/apt/sources.list
+ [ -n "$KEEP_SRC_LIST" ] && return
+ [ -z "$COMPONENTS" ] && COMPONENTS='main contrib non-free'
+
+ if [ -n "$ISO" ] ; then
+ echo "deb $ISO $RELEASE $COMPONENTS" > /etc/apt/sources.list
+ [ -n "$MIRROR" ] && echo "deb $MIRROR $RELEASE $COMPONENTS" >> /etc/apt/sources.list || true
+ else
+ if [ -n "$MIRROR" ] ; then
+ echo "deb $MIRROR $RELEASE $COMPONENTS" > /etc/apt/sources.list
+ fi
fi
}
# }}}
# set up grml repository {{{
grmlrepos() {
if [ -n "$GRMLREPOS" ] ; then
- cat >> /etc/apt/sources.list << EOF
+ # user might have provided their own apt sources.list
+ if ! grep -q grml /etc/apt/sources.list 2>/dev/null ; then
+ cat >> /etc/apt/sources.list << EOF
# grml: stable repository:
deb http://deb.grml.org/ grml-stable main
deb-src http://deb.grml.org/ grml-testing main
EOF
+ fi
+
# make sure we have the keys available for aptitude
gpg --keyserver subkeys.pgp.net --recv-keys F61E2E7CECDEA787
- gpg --export F61E2E7CECDEA787 | apt-key add - || /bin/true # not yet sure
+ gpg --export F61E2E7CECDEA787 | apt-key add - || true # not yet sure
# why it's necessary, sometimes we get an error even though it works [mika]
+
+ # make sure we install packages from grml's pool only if not available
+ # from Debian!
+ if ! grep -q grml /etc/apt/preferences 2>/dev/null ; then
+ cat >> /etc/apt/preferences << EOF
+// debian pool (default):
+Package: *
+Pin: release o=Debian
+Pin-Priority: 996
+
+// main grml-repository:
+Package: *
+Pin: origin deb.grml.org
+Pin-Priority: 991
+EOF
+ fi
fi
}
# }}}
}
# }}}
-# create default devices {{{
-makedev() {
- if ! [ -r /dev/hda20 ] ; then
- echo "Creating generic devices in /dev - this might take a while..."
- cd /dev && MAKEDEV generic
+# make sure services do not start up {{{
+install_policy_rcd() {
+ if ! [ -r /usr/sbin/policy-rc.d ] ; then
+ export POLICYRCD=1
+ cat > /usr/sbin/policy-rc.d << EOF
+#!/bin/sh
+exit 101
+EOF
+ chmod 775 /usr/sbin/policy-rc.d
fi
}
# }}}
+# remove now useless apt cache {{{
+remove_apt_cache() {
+ apt-get clean
+}
+# }}}
+
# install additional packages {{{
packages() {
+ # Pre-seed the debconf database with answers. Each question will be marked
+ # as seen to prevent debconf from asking the question interactively.
+ [ -f /etc/debootstrap/debconf-selections ] && {
+ echo "Preseeding the debconf database, some lines might be skipped..."
+ cat /etc/debootstrap/debconf-selections | debconf-set-selections
+ }
+
if [ "$PACKAGES" = 'yes' ] ; then
if ! [ -r /etc/debootstrap/packages ] ; then
echo "Error: /etc/debootstrap/packages not found, exiting."
exit 1
else
$APTUPDATE
- DEBIAN_FRONTEND=$DEBIAN_FRONTEND $APTINSTALL $(cat /etc/debootstrap/packages) $GRMLPACKAGES
+ DEBIAN_FRONTEND=$DEBIAN_FRONTEND $APTINSTALL $(grep -v '^#' /etc/debootstrap/packages) $GRMLPACKAGES
fi
fi
}
}
# }}}
-# sarge specific stuff: mkinitrd {{{
-mkinitrd() {
- if [ "$RELEASE" = 'sarge' ] ; then
- sed -i "s#ROOT=probe#ROOT=$TARGET#" /etc/mkinitrd/mkinitrd.conf
- fi
-}
-# }}}
-
# install kernel packages {{{
kernel() {
# do not override $KERNEL if set via config file
if [ -n "$KERNEL" ] ; then
$APTUPDATE
- if [ "$RELEASE" = 'sarge' ] ; then
- KERNELPACKAGES="kernel-image-$KERNEL kernel-headers-$KERNEL"
- else
- KERNELPACKAGES="linux-image-$KERNEL linux-headers-$KERNEL"
- fi
- DEBIAN_FRONTEND=$DEBIAN_FRONTEND $APTINSTALL $KERNELPACKAGES
+ # note: install busybox to be able to debug initramfs
+ KERNELPACKAGES="linux-image-$KERNEL linux-headers-$KERNEL busybox"
+ DEBIAN_FRONTEND=$DEBIAN_FRONTEND $APTINSTALL $KERNELPACKAGES
fi
}
# }}}
# }}}
# set password of user root {{{
-setpassword() {
-# Set a password, via chpasswd.
-# Use perl rather than echo, to avoid the password
-# showing in the process table. (However, this is normally
-# only called when first booting the system, when root has no
-# password at all, so that should be an unnecessary precaution).
-#
-# Pass in three arguments: the user, the password, and 'true' if the
-# password has been pre-crypted (by preseeding).
-#
-# Taken from /var/lib/dpkg/info/passwd.config
- SETPASSWD_PW="$2"
- export SETPASSWD_PW
-
- # This is very annoying. chpasswd cannot handle generating md5
- # passwords as it is not PAM-aware. Thus, I have to work around
- # that by crypting the password myself if md5 is used.
- USE_MD5=1
- export USE_MD5
-
- if [ "$3" = true ]; then
- PRECRYPTED=1
- else
- PRECRYPTED=''
- fi
- export PRECRYPTED
- LC_ALL=C LANGUAGE=C LANG=C perl -e '
- sub CreateCryptSalt {
- my $md5 = shift;
-
- my @valid = split(//, "./0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ");
- my ($in, $out);
-
- my $cryptsaltlen = ($md5 ? 8 : 2);
-
- open (F, "</dev/urandom") || die "No /dev/urandom found!";
- foreach (1..$cryptsaltlen) {
- read(F, $in, 1);
- $out .= $valid[ord($in) % ($#valid + 1)];
- }
- close F;
- return ($md5 ? "\$1\$$out\$" : $out);
- }
-
- open(P,"| chpasswd -e");
- if ($ENV{PRECRYPTED}) {
- print P shift().":$ENV{SETPASSWD_PW}\n";
- } else {
- print P shift().":".
- crypt($ENV{SETPASSWD_PW}, CreateCryptSalt($ENV{USE_MD5})).
- "\n";
- }
- close P;
- ' "$1"
- SETPASSWD_PW=''
- USE_MD5=''
- PRECRYPTED=''
-}
-
-passwords() {
+passwords()
+{
echo "Activating shadow passwords."
shadowconfig on
+ CHPASSWD_OPTION=
+ if chpasswd --help 2>&1 | grep -q -- '-m,' ; then
+ CHPASSWD_OPTION='-m'
+ fi
+
+
if [ -n "$ROOTPASSWORD" ] ; then
- setpassword root "$ROOTPASSWD" false
- export ROOTPASSWD=''
+ echo root:"$ROOTPASSWORD" | chpasswd $CHPASSWD_OPTION
+ export ROOTPASSWORD=''
else
+ a='1'
+ b='2'
echo "Setting password for user root:"
- set +e # do not exit if passwd returns error due to missmatching passwords
- passwd
- echo ""
- set -e # restore default behaviour again
+ while [ "$a" != "$b" ] ; do
+ echo -n "Enter new UNIX password for user root: "
+ read -s a
+ echo
+ echo -n "Retype new UNIX password for user root: "
+ read -s b
+ echo
+ if [ "$a" != "$b" ] ; then
+ echo "Sorry, passwords do not match. Retry."
+ a='1'
+ b='2'
+ else
+ echo root:"$a" | chpasswd $CHPASSWD_OPTION
+ unset a
+ unset b
+ fi
+ done
fi
}
# }}}
# set up /etc/hosts {{{
hosts() {
- if ! [ -f /etc/hosts ] ; then
- echo "Setting up /etc/hosts"
- echo "127.0.0.1 localhost $HOSTNAME" > /etc/hosts
+ if [ -f /etc/hosts ] ; then
+ sed -i "s#127.0.0.1 .*#127.0.0.1 localhost $HOSTNAME#" /etc/hosts
+ [ -n "$HOSTNAME" ] && sed -i "s/grml/$HOSTNAME/g" /etc/hosts
+ else
+ cat > /etc/hosts << EOF
+127.0.0.1 localhost $HOSTNAME
+
+#127.0.0.1 localhost
+#127.0.1.1 $HOSTNAME.example.org $HOSTNAME
+
+# The following lines are desirable for IPv6 capable hosts
+#::1 ip6-localhost ip6-loopback $HOSTNAME
+::1 ip6-localhost ip6-loopback
+fe00::0 ip6-localnet
+ff00::0 ip6-mcastprefix
+ff02::1 ip6-allnodes
+ff02::2 ip6-allrouters
+ff02::3 ip6-allhosts
+EOF
fi
}
# }}}
# set up /etc/network/interfaces {{{
interfaces() {
- if ! [ -f /etc/network/interfaces ] ; then
+ if ! [ -r /etc/network/interfaces ] || ! grep -q "auto lo" /etc/network/interfaces ; then
echo "Setting up /etc/network/interfaces"
cat >> /etc/network/interfaces << EOF
+
+# loopback device:
iface lo inet loopback
-iface eth0 inet dhcp
auto lo
-auto eth0
+
+# eth0:
+# iface eth0 inet dhcp
+# auto eth0
+
EOF
fi
}
# helper function for fstab() {{{
createfstab(){
echo "Setting up /etc/fstab"
-cat > /etc/fstab << EOF
-$TARGET / auto defaults,errors=remount-ro 0 1
-/sys /sys sysfs rw,nosuid,nodev,noexec 0 0
-proc /proc proc defaults 0 0
-/dev/cdrom /mnt/cdrom0 iso9660 ro,user,noauto 0 0
+if [ -n "$TARGET_UUID" ] ; then
+ echo "/dev/disk/by-uuid/${TARGET_UUID} / auto defaults,errors=remount-ro 0 1" > /etc/fstab
+else
+ echo "${TARGET} / auto defaults,errors=remount-ro 0 1" > /etc/fstab
+fi
+
+cat >> /etc/fstab << EOF
+proc /proc proc defaults 0 0
+/sys /sys sysfs noauto,rw,nosuid,nodev,noexec 0 0
+/dev/cdrom /mnt/cdrom0 iso9660 ro,user,noauto 0 0
# some other examples:
-# /dev/sda2 none swap sw 0 0
+# /dev/sda2 none swap sw,pri=0 0 0
# /dev/hda1 /Grml ext3 dev,suid,user,noauto 0 2
# //1.2.3.4/pub /smb/pub smbfs defaults,user,noauto,uid=grml,gid=grml 0 0
# linux:/pub /beer nfs defaults 0 0
# tmpfs /tmp tmpfs size=300M 0 0
+# /dev/sda5 none swap sw 0 0
EOF
}
# }}}
if [ -n "$HOSTNAME" ] ; then
echo "Setting hostname to ${HOSTNAME}."
echo "$HOSTNAME" > /etc/hostname
+
+ # adjust postfix configuration
+ if [ -r /etc/postfix/main.cf ] ; then
+ # adjust hostname related options:
+ sed -i "s/grml/$HOSTNAME/g" /etc/postfix/main.cf
+
+ # listen on loopback interface only:
+ sed -i "s/^inet_interfaces = .*/inet_interfaces = loopback-only/" /etc/postfix/main.cf
+ grep -q inet_interfaces /etc/postfix/main.cf || echo 'inet_interfaces = loopback-only' >> /etc/postfix/main.cf
+ fi
fi
}
# }}}
# generate initrd/initramfs {{{
initrd() {
# assume the first available kernel as our main kernel
- KERNELIMG=$(ls -1 /boot/vmlinuz-* | head -1)
+ KERNELIMG=$(ls -1 /boot/vmlinuz-* 2>/dev/null | head -1)
+ if [ -z "$KERNELIMG" ] ; then
+ echo 'No kernel image found, skipping initrd stuff.'>&2
+ return
+ fi
+
KERNELVER=${KERNELIMG#/boot/vmlinuz-}
# generate initrd
if [ -n "$INITRD" ] ; then
- if [ "$RELEASE" = 'sarge' ] ; then
- echo "Release sarge detected, will not create an initrd."
- else
- echo "Generating initrd."
- update-initramfs -c -t -k $KERNELVER
- if [ -f "/boot/initrd.img-$KERNELVER" ] ; then
- GRUBINITRD="initrd /boot/initrd.img-$KERNELVER"
- LILOINITRD=" initrd=/boot/initrd.img-$KERNELVER"
- fi
- fi
+ echo "Generating initrd."
+ update-initramfs -c -t -k $KERNELVER
fi
}
# }}}
# grub configuration/installation {{{
-grub() {
- if [ -z "$GROOT" ] ; then
- echo "Warning: \$GROOT is not defined, will not adjust grub configuration therefore."
+grub_config() {
+ if [ -z "$GRUB" ] ; then
+ echo "Warning: \$GRUB is not defined, will not adjust grub configuration therefore."
else
- echo "Adjusting grub configuration for use on ${GROOT}."
-
- # copy stage-files to /boot/grub/
- [ -d /boot/grub/ ] || mkdir /boot/grub
- # i386 specific:
- [ -d /usr/lib/grub/i386-pc ] && cp /usr/lib/grub/i386-pc/* /boot/grub/
- # amd64 specific:
- [ -d /usr/lib/grub/x86_64-pc ] && cp /usr/lib/grub/x86_64-pc/* /boot/grub/
- # sarge ships grub files in another directory
- [ "$RELEASE" = 'sarge' ] && cp /lib/grub/i386-pc/* /boot/grub/
+ echo "Adjusting grub configuration for use on ${GRUB}."
# finally install grub
if [ -x /usr/sbin/update-grub ] ; then
else
UPDATEGRUB='/sbin/update-grub'
fi
- $UPDATEGRUB -y
- if [ -f /boot/grub/menu.lst ] ; then
- sed -i "s/^# groot=.*/# groot=(${GROOT})/g" /boot/grub/menu.lst
- sed -i "s|^# kopt=root=.*|# kopt=root=${TARGET} ro ${BOOT_APPEND}|g" /boot/grub/menu.lst
- # not sure why savedefault does not work for me; any ideas?
- sed -i "s/^savedefault.*/# &/g" /boot/grub/menu.lst
- $UPDATEGRUB -y
- fi
+
+ # grub2:
+ $UPDATEGRUB
fi
}
# }}}
+# execute all scripts present in /etc/debootstrap/chroot-scripts/ {{{
+custom_scripts() {
+ [ -d /etc/debootstrap/chroot-scripts/ ] || return 0
+
+ for script in /etc/debootstrap/chroot-scripts/* ; do
+ echo "Executing script $script"
+ $script && echo "done" || echo "failed"
+ done
+}
+# }}}
+
# make sure we don't have any running processes left {{{
services() {
for service in ssh mdadm mdadm-raid ; do
- [ -x "/etc/init.d/$service" ] && "/etc/init.d/$service" stop
+ if [ -x /etc/init.d/"$service" ] ; then
+ /etc/init.d/"$service" stop || true
+ fi
done
}
# }}}
finalize() {
# make sure we don't leave any sensible data
rm -f /etc/debootstrap/variables
+ [ -n "$POLICYRCD" ] && rm -f /usr/sbin/policy-rc.d
umount -a 1>/dev/null 2>/dev/null || true
umount /proc 1>/dev/null 2>/dev/null || true
umount /proc 1>/dev/null 2>/dev/null || true
}
# }}}
+# signal handler {{{
+signal_handler() {
+ finalize
+ [ -n "$1" ] && EXIT="$1" || EXIT="1"
+ exit "$EXIT"
+}
+# }}}
+
+# set signal handler {{{
+trap signal_handler HUP INT QUIT TERM
+# }}}
+
# execute the functions {{{
- for i in chrootmirror grmlrepos kernelimg_conf makedev packages extrapackages \
- mkinitrd kernel reconfigure hosts interfaces timezone fstab hostname \
- initrd grub passwords services finalize ; do
- if stage $i ; then
+
+ # always execute install_policy_rcd
+ install_policy_rcd
+
+ for i in chrootmirror grmlrepos kernelimg_conf \
+ remove_apt_cache kernel packages extrapackages reconfigure hosts interfaces \
+ timezone fstab hostname initrd grub_config passwords custom_scripts \
+ services ; do
+ if stage $i ; then
$i && stage $i done || exit 1
- fi
+ fi
done
+ # always execute the finalize stage:
+ finalize
# }}}
# finally exit the chroot {{{