X-Git-Url: https://git.grml.org/?p=grml-debootstrap.git;a=blobdiff_plain;f=chroot-script;h=21f4e05293a82c36843a9a3d6f7ad2d554de57ed;hp=bc933531be275fa5f8f0a9fc2107be50c2f55d1f;hb=45913e62e4f5378eb6f3f89b88e1c0e70470455c;hpb=4fdbdbc3bccf62350c5fee4683ab9e701ca001f1 diff --git a/chroot-script b/chroot-script old mode 100644 new mode 100755 index bc93353..21f4e05 --- a/chroot-script +++ b/chroot-script @@ -4,7 +4,6 @@ # Authors: grml-team (grml.org), (c) Michael Prokop # Bug-Reports: see http://grml.org/bugs/ # License: This file is licensed under the GPL v2. -# Latest change: Mon Apr 23 12:02:03 CEST 2007 [mika] ################################################################################ set -e # exit on any error @@ -12,16 +11,16 @@ set -e # exit on any error . /etc/debootstrap/config || exit 1 . /etc/debootstrap/variables || exit 1 -[ -r /proc/1 ] || mount -t proc none /proc +[ -r /proc/1 ] || mount -t proc none /proc # variable checks {{{ # use aptitude only if it's available if [ -x /usr/bin/aptitude ] ; then - APTINSTALL='aptitude -y install ' + APTINSTALL="aptitude -y --without-recommends install $DPKG_OPTIONS" APTUPDATE='aptitude update' else - APTINSTALL='apt-get --force-yes -y install' + APTINSTALL="apt-get --force-yes -y install $DPKG_OPTIONS" APTUPDATE='apt-get update' fi @@ -37,16 +36,35 @@ stage() { echo "$2" > "$STAGES/$1" return 0 elif grep -q done "$STAGES/$1" 2>/dev/null ; then - echo "[*] Notice: stage $1 has been executed already, skipping execution therefore.">&2 + echo " [*] Notice: stage $1 has been executed already, skipping execution therefore.">&2 return 1 fi + echo " Executing stage ${1}" + return 0 +} + +askpass() { + # read -s emulation for dash. result is in $resp. + set -o noglob + stty -echo + read resp + stty echo + set +o noglob } # }}} # define chroot mirror {{{ chrootmirror() { - if [ -n "$CHROOTMIRROR" ] ; then - echo "deb $CHROOTMIRROR $RELEASE main contrib non-free" > /etc/apt/sources.list + [ -n "$KEEP_SRC_LIST" ] && return + [ -z "$COMPONENTS" ] && COMPONENTS='main contrib non-free' + + if [ -n "$ISO" ] ; then + echo "deb $ISO $RELEASE $COMPONENTS" > /etc/apt/sources.list + [ -n "$MIRROR" ] && echo "deb $MIRROR $RELEASE $COMPONENTS" >> /etc/apt/sources.list || true + else + if [ -n "$MIRROR" ] ; then + echo "deb $MIRROR $RELEASE $COMPONENTS" > /etc/apt/sources.list + fi fi } # }}} @@ -54,7 +72,9 @@ chrootmirror() { # set up grml repository {{{ grmlrepos() { if [ -n "$GRMLREPOS" ] ; then - cat >> /etc/apt/sources.list << EOF + # user might have provided their own apt sources.list + if ! grep -q grml /etc/apt/sources.list.d/grml.list 2>/dev/null ; then + cat >> /etc/apt/sources.list.d/grml.list << EOF # grml: stable repository: deb http://deb.grml.org/ grml-stable main @@ -65,10 +85,17 @@ grmlrepos() { deb-src http://deb.grml.org/ grml-testing main EOF - # make sure we have the keys available for aptitude - gpg --keyserver subkeys.pgp.net --recv-keys F61E2E7CECDEA787 - gpg --export F61E2E7CECDEA787 | apt-key add - || /bin/true # not yet sure - # why it's necessary, sometimes we get an error even though it works [mika] + fi + + if apt-get update ; then + apt-get -y --allow-unauthenticated install grml-debian-keyring + apt-get update + else + # make sure we have the keys available for aptitude + gpg --keyserver subkeys.pgp.net --recv-keys F61E2E7CECDEA787 + gpg --export F61E2E7CECDEA787 | apt-key add - || true # not yet sure + # why it's necessary, sometimes we get an error even though it works [mika] + fi # make sure we install packages from grml's pool only if not available # from Debian! @@ -103,24 +130,46 @@ EOF } # }}} -# create default devices {{{ -makedev() { - if ! [ -r /dev/hda20 ] ; then - echo "Creating generic devices in /dev - this might take a while..." - cd /dev && MAKEDEV generic +# make sure services do not start up {{{ +install_policy_rcd() { + if ! [ -r /usr/sbin/policy-rc.d ] ; then + export POLICYRCD=1 + cat > /usr/sbin/policy-rc.d << EOF +#!/bin/sh +exit 101 +EOF + chmod 775 /usr/sbin/policy-rc.d + fi +} +# }}} + +# remove now useless apt cache {{{ +remove_apt_cache() { + if [ "$RM_APTCACHE" = 'yes' ] ; then + echo "Cleaning apt cache." + apt-get clean + else + echo "Not cleaning apt cache as \$RM_APTCACHE is unset." fi } # }}} # install additional packages {{{ packages() { + # Pre-seed the debconf database with answers. Each question will be marked + # as seen to prevent debconf from asking the question interactively. + [ -f /etc/debootstrap/debconf-selections ] && { + echo "Preseeding the debconf database, some lines might be skipped..." + cat /etc/debootstrap/debconf-selections | debconf-set-selections + } + if [ "$PACKAGES" = 'yes' ] ; then if ! [ -r /etc/debootstrap/packages ] ; then echo "Error: /etc/debootstrap/packages not found, exiting." exit 1 else $APTUPDATE - DEBIAN_FRONTEND=$DEBIAN_FRONTEND $APTINSTALL $(cat /etc/debootstrap/packages) $GRMLPACKAGES + DEBIAN_FRONTEND=$DEBIAN_FRONTEND $APTINSTALL $(grep -v '^#' /etc/debootstrap/packages) $GRMLPACKAGES fi fi } @@ -139,14 +188,6 @@ extrapackages() { } # }}} -# sarge specific stuff: mkinitrd {{{ -mkinitrd() { - if [ "$RELEASE" = 'sarge' ] ; then - sed -i "s#ROOT=probe#ROOT=$TARGET#" /etc/mkinitrd/mkinitrd.conf - fi -} -# }}} - # install kernel packages {{{ kernel() { # do not override $KERNEL if set via config file @@ -160,12 +201,9 @@ kernel() { if [ -n "$KERNEL" ] ; then $APTUPDATE - if [ "$RELEASE" = 'sarge' ] ; then - KERNELPACKAGES="kernel-image-$KERNEL kernel-headers-$KERNEL" - else - KERNELPACKAGES="linux-image-$KERNEL linux-headers-$KERNEL" - fi - DEBIAN_FRONTEND=$DEBIAN_FRONTEND $APTINSTALL $KERNELPACKAGES + # note: install busybox to be able to debug initramfs + KERNELPACKAGES="linux-image-$KERNEL linux-headers-$KERNEL busybox" + DEBIAN_FRONTEND=$DEBIAN_FRONTEND $APTINSTALL $KERNELPACKAGES fi } # }}} @@ -183,100 +221,88 @@ reconfigure() { # }}} # set password of user root {{{ -setpassword() { -# Set a password, via chpasswd. -# Use perl rather than echo, to avoid the password -# showing in the process table. (However, this is normally -# only called when first booting the system, when root has no -# password at all, so that should be an unnecessary precaution). -# -# Pass in three arguments: the user, the password, and 'true' if the -# password has been pre-crypted (by preseeding). -# -# Taken from /var/lib/dpkg/info/passwd.config - SETPASSWD_PW="$2" - export SETPASSWD_PW - - # This is very annoying. chpasswd cannot handle generating md5 - # passwords as it is not PAM-aware. Thus, I have to work around - # that by crypting the password myself if md5 is used. - USE_MD5=1 - export USE_MD5 - - if [ "$3" = true ]; then - PRECRYPTED=1 - else - PRECRYPTED='' - fi - export PRECRYPTED - LC_ALL=C LANGUAGE=C LANG=C perl -e ' - sub CreateCryptSalt { - my $md5 = shift; - - my @valid = split(//, "./0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ"); - my ($in, $out); - - my $cryptsaltlen = ($md5 ? 8 : 2); - - open (F, "&1 | grep -q -- '-m,' ; then + CHPASSWD_OPTION='-m' + fi + + if [ -n "$ROOTPASSWORD" ] ; then - setpassword root "$ROOTPASSWD" false - export ROOTPASSWD='' + echo root:"$ROOTPASSWORD" | chpasswd $CHPASSWD_OPTION + export ROOTPASSWORD='' else + a='1' + b='2' echo "Setting password for user root:" - set +e # do not exit if passwd returns error due to missmatching passwords - passwd - echo "" - set -e # restore default behaviour again + while [ "$a" != "$b" ] ; do + echo -n "Enter new UNIX password for user root: " + askpass + a="$resp" + unset resp + echo + echo -n "Retype new UNIX password for user root: " + askpass + b="$resp" + unset resp + echo + if [ "$a" != "$b" ] ; then + echo "Sorry, passwords do not match. Retry." + a='1' + b='2' + else + echo root:"$a" | chpasswd $CHPASSWD_OPTION + unset a + unset b + fi + done fi } # }}} # set up /etc/hosts {{{ hosts() { - if ! [ -f /etc/hosts ] ; then - echo "Setting up /etc/hosts" - echo "127.0.0.1 localhost $HOSTNAME" > /etc/hosts + if [ -f /etc/hosts ] ; then + sed -i "s#127.0.0.1 .*#127.0.0.1 localhost $HOSTNAME#" /etc/hosts + [ -n "$HOSTNAME" ] && sed -i "s/grml/$HOSTNAME/g" /etc/hosts + else + cat > /etc/hosts << EOF +127.0.0.1 localhost $HOSTNAME + +#127.0.0.1 localhost +#127.0.1.1 $HOSTNAME.example.org $HOSTNAME + +# The following lines are desirable for IPv6 capable hosts +#::1 ip6-localhost ip6-loopback $HOSTNAME +::1 ip6-localhost ip6-loopback +fe00::0 ip6-localnet +ff00::0 ip6-mcastprefix +ff02::1 ip6-allnodes +ff02::2 ip6-allrouters +ff02::3 ip6-allhosts +EOF fi } # }}} # set up /etc/network/interfaces {{{ interfaces() { - if ! [ -f /etc/network/interfaces ] ; then + if ! [ -r /etc/network/interfaces ] || ! grep -q "auto lo" /etc/network/interfaces ; then echo "Setting up /etc/network/interfaces" cat >> /etc/network/interfaces << EOF + +# loopback device: iface lo inet loopback -iface eth0 inet dhcp auto lo -auto eth0 + +# eth0: +# iface eth0 inet dhcp +# auto eth0 + EOF fi } @@ -294,17 +320,23 @@ timezone() { # helper function for fstab() {{{ createfstab(){ echo "Setting up /etc/fstab" -cat > /etc/fstab << EOF -$TARGET / auto defaults,errors=remount-ro 0 1 -/sys /sys sysfs rw,nosuid,nodev,noexec 0 0 -proc /proc proc defaults 0 0 -/dev/cdrom /mnt/cdrom0 iso9660 ro,user,noauto 0 0 +if [ -n "$TARGET_UUID" ] ; then + echo "/dev/disk/by-uuid/${TARGET_UUID} / auto defaults,errors=remount-ro 0 1" > /etc/fstab +else + echo "${TARGET} / auto defaults,errors=remount-ro 0 1" > /etc/fstab +fi + +cat >> /etc/fstab << EOF +proc /proc proc defaults 0 0 +/sys /sys sysfs noauto,rw,nosuid,nodev,noexec 0 0 +/dev/cdrom /mnt/cdrom0 iso9660 ro,user,noauto 0 0 # some other examples: -# /dev/sda2 none swap sw 0 0 +# /dev/sda2 none swap sw,pri=0 0 0 # /dev/hda1 /Grml ext3 dev,suid,user,noauto 0 2 # //1.2.3.4/pub /smb/pub smbfs defaults,user,noauto,uid=grml,gid=grml 0 0 # linux:/pub /beer nfs defaults 0 0 # tmpfs /tmp tmpfs size=300M 0 0 +# /dev/sda5 none swap sw 0 0 EOF } # }}} @@ -328,6 +360,16 @@ hostname() { if [ -n "$HOSTNAME" ] ; then echo "Setting hostname to ${HOSTNAME}." echo "$HOSTNAME" > /etc/hostname + + # adjust postfix configuration + if [ -r /etc/postfix/main.cf ] ; then + # adjust hostname related options: + sed -i "s/grml/$HOSTNAME/g" /etc/postfix/main.cf + + # listen on loopback interface only: + sed -i "s/^inet_interfaces = .*/inet_interfaces = loopback-only/" /etc/postfix/main.cf + grep -q inet_interfaces /etc/postfix/main.cf || echo 'inet_interfaces = loopback-only' >> /etc/postfix/main.cf + fi fi } # }}} @@ -335,86 +377,121 @@ hostname() { # generate initrd/initramfs {{{ initrd() { # assume the first available kernel as our main kernel - KERNELIMG=$(ls -1 /boot/vmlinuz-* | head -1) + KERNELIMG=$(ls -1 /boot/vmlinuz-* 2>/dev/null | head -1) + if [ -z "$KERNELIMG" ] ; then + echo 'No kernel image found, skipping initrd stuff.'>&2 + return + fi + KERNELVER=${KERNELIMG#/boot/vmlinuz-} # generate initrd if [ -n "$INITRD" ] ; then - if [ "$RELEASE" = 'sarge' ] ; then - echo "Release sarge detected, will not create an initrd." - else - echo "Generating initrd." - update-initramfs -c -t -k $KERNELVER - if [ -f "/boot/initrd.img-$KERNELVER" ] ; then - GRUBINITRD="initrd /boot/initrd.img-$KERNELVER" - LILOINITRD=" initrd=/boot/initrd.img-$KERNELVER" - fi - fi + echo "Generating initrd." + update-initramfs -c -t -k $KERNELVER fi } # }}} # grub configuration/installation {{{ -grub() { - if [ -z "$GROOT" ] ; then - echo "Warning: \$GROOT is not defined, will not adjust grub configuration therefore." +grub_install() { + + if [ -z "$GRUB" ] ; then + echo "Notice: \$GRUB not defined, will not install grub therefore." + return 0 + fi + + if ! [ -x "$(which grub-install)" ] ; then + echo "Error: grub-install not available. (Error while installing grub package?)" >&2 + return 1 + fi + + if [ -n "$SELECTED_PARTITIONS" ] ; then # using sw-raid + for device in $SELECTED_PARTITIONS ; do + GRUB="${device%%[0-9]}" + echo "Installing grub on ${GRUB}:" + grub-install --no-floppy "$GRUB" + done else - echo "Adjusting grub configuration for use on ${GROOT}." - - # copy stage-files to /boot/grub/ - [ -d /boot/grub/ ] || mkdir /boot/grub - # i386 specific: - [ -d /usr/lib/grub/i386-pc ] && cp /usr/lib/grub/i386-pc/* /boot/grub/ - # amd64 specific: - [ -d /usr/lib/grub/x86_64-pc ] && cp /usr/lib/grub/x86_64-pc/* /boot/grub/ - # sarge ships grub files in another directory - [ "$RELEASE" = 'sarge' ] && cp /lib/grub/i386-pc/* /boot/grub/ - - # finally install grub - if [ -x /usr/sbin/update-grub ] ; then - UPDATEGRUB='/usr/sbin/update-grub' - else - UPDATEGRUB='/sbin/update-grub' - fi - $UPDATEGRUB -y - if [ -f /boot/grub/menu.lst ] ; then - sed -i "s/^# groot=.*/# groot=(${GROOT})/g" /boot/grub/menu.lst - sed -i "s|^# kopt=root=.*|# kopt=root=${TARGET} ro ${BOOT_APPEND}|g" /boot/grub/menu.lst - # not sure why savedefault does not work for me; any ideas? - sed -i "s/^savedefault.*/# &/g" /boot/grub/menu.lst - $UPDATEGRUB -y - fi + echo "Installing grub on ${GRUB}:" + grub-install --no-floppy "$GRUB" fi + + echo "Adjusting grub configuration for use on ${GRUB}." + + # finally install grub + if [ -x /usr/sbin/update-grub ] ; then + UPDATEGRUB='/usr/sbin/update-grub' + elif [ -x /sbin/update-grub ] ; then + UPDATEGRUB='/sbin/update-grub' + else + echo "Error: update-grub not available, can not execute it." >&2 + return 1 + fi + + $UPDATEGRUB +} +# }}} + +# execute all scripts present in /etc/debootstrap/chroot-scripts/ {{{ +custom_scripts() { + [ -d /etc/debootstrap/chroot-scripts/ ] || return 0 + + for script in /etc/debootstrap/chroot-scripts/* ; do + echo "Executing script $script" + $script && echo "done" || echo "failed" + done } # }}} # make sure we don't have any running processes left {{{ services() { for service in ssh mdadm mdadm-raid ; do - [ -x "/etc/init.d/$service" ] && "/etc/init.d/$service" stop + if [ -x /etc/init.d/"$service" ] ; then + /etc/init.d/"$service" stop || true + fi done } # }}} -# unmount all filesystems in chroot, make sure nothing is left {{{ +# unmount /proc and make sure nothing is left {{{ finalize() { # make sure we don't leave any sensible data rm -f /etc/debootstrap/variables - umount -a 1>/dev/null 2>/dev/null || true - umount /proc 1>/dev/null 2>/dev/null || true - umount /proc 1>/dev/null 2>/dev/null || true - umount -a 1>/dev/null 2>/dev/null || true + + [ -n "$POLICYRCD" ] && rm -f /usr/sbin/policy-rc.d + + umount /proc >/dev/null 2>/dev/null || true } # }}} +# signal handler {{{ +signal_handler() { + finalize + [ -n "$1" ] && EXIT="$1" || EXIT="1" + exit "$EXIT" +} +# }}} + +# set signal handler {{{ +trap signal_handler HUP INT QUIT TERM +# }}} + # execute the functions {{{ - for i in chrootmirror grmlrepos kernelimg_conf makedev packages extrapackages \ - mkinitrd kernel reconfigure hosts interfaces timezone fstab hostname \ - initrd grub passwords services finalize ; do - if stage $i ; then + + # always execute install_policy_rcd + install_policy_rcd + + for i in chrootmirror grmlrepos kernelimg_conf \ + kernel packages extrapackages reconfigure hosts interfaces \ + timezone fstab hostname initrd grub_install passwords \ + custom_scripts remove_apt_cache services ; do + if stage $i ; then $i && stage $i done || exit 1 - fi + fi done + # always execute the finalize stage: + finalize # }}} # finally exit the chroot {{{