X-Git-Url: https://git.grml.org/?p=grml-debootstrap.git;a=blobdiff_plain;f=chroot-script;h=bc933531be275fa5f8f0a9fc2107be50c2f55d1f;hp=40fa486524433f79b45d3a9f46fb9a856b607647;hb=139f1a82802a0cbef7f231b0fae51f9357a7f518;hpb=a6e66feca9403ad2a5846fdfa989bb9f170fd72f diff --git a/chroot-script b/chroot-script index 40fa486..bc93353 100644 --- a/chroot-script +++ b/chroot-script @@ -4,7 +4,7 @@ # Authors: grml-team (grml.org), (c) Michael Prokop # Bug-Reports: see http://grml.org/bugs/ # License: This file is licensed under the GPL v2. -# Latest change: Mon Apr 16 14:48:41 CEST 2007 [mika] +# Latest change: Mon Apr 23 12:02:03 CEST 2007 [mika] ################################################################################ set -e # exit on any error @@ -14,6 +14,8 @@ set -e # exit on any error [ -r /proc/1 ] || mount -t proc none /proc +# variable checks {{{ + # use aptitude only if it's available if [ -x /usr/bin/aptitude ] ; then APTINSTALL='aptitude -y install ' @@ -23,7 +25,6 @@ else APTUPDATE='apt-get update' fi -# variable checks {{{ if [ -z "$STAGES" ] ; then STAGES='/etc/debootstrap/stages' [ -d "$STAGES" ] || mkdir -p "$STAGES" @@ -36,7 +37,7 @@ stage() { echo "$2" > "$STAGES/$1" return 0 elif grep -q done "$STAGES/$1" 2>/dev/null ; then - echo "Notice: stage $1 has been executed already, skipping execution therefore.">&2 + echo "[*] Notice: stage $1 has been executed already, skipping execution therefore.">&2 return 1 fi } @@ -53,7 +54,37 @@ chrootmirror() { # set up grml repository {{{ grmlrepos() { if [ -n "$GRMLREPOS" ] ; then - echo 'deb http://grml.org/repos/ ./' >> /etc/apt/sources.list + cat >> /etc/apt/sources.list << EOF + +# grml: stable repository: + deb http://deb.grml.org/ grml-stable main + deb-src http://deb.grml.org/ grml-stable main + +# grml: testing/development repository: + deb http://deb.grml.org/ grml-testing main + deb-src http://deb.grml.org/ grml-testing main + +EOF + # make sure we have the keys available for aptitude + gpg --keyserver subkeys.pgp.net --recv-keys F61E2E7CECDEA787 + gpg --export F61E2E7CECDEA787 | apt-key add - || /bin/true # not yet sure + # why it's necessary, sometimes we get an error even though it works [mika] + + # make sure we install packages from grml's pool only if not available + # from Debian! + if ! grep -q grml /etc/apt/preferences 2>/dev/null ; then + cat >> /etc/apt/preferences << EOF +// debian pool (default): +Package: * +Pin: release o=Debian +Pin-Priority: 996 + +// main grml-repository: +Package: * +Pin: origin deb.grml.org +Pin-Priority: 991 +EOF + fi fi } # }}} @@ -89,13 +120,26 @@ packages() { exit 1 else $APTUPDATE - $APTINSTALL $(cat /etc/debootstrap/packages) $GRMLPACKAGES + DEBIAN_FRONTEND=$DEBIAN_FRONTEND $APTINSTALL $(cat /etc/debootstrap/packages) $GRMLPACKAGES fi fi } # }}} -# sarge specific stuff: mkinitrd {{{ +# install extra packages {{{ +extrapackages() { + if [ "$EXTRAPACKAGES" = 'yes' ] ; then + PACKAGELIST=$(find /etc/debootstrap/extrapackages -type f -name '*.deb') + if [ -n "$PACKAGELIST" ]; then + dpkg -i $PACKAGELIST + # run apt again to resolve any deps + DEBIAN_FRONTEND=$DEBIAN_FRONTEND $APTINSTALL + fi + fi +} +# }}} + +# sarge specific stuff: mkinitrd {{{ mkinitrd() { if [ "$RELEASE" = 'sarge' ] ; then sed -i "s#ROOT=probe#ROOT=$TARGET#" /etc/mkinitrd/mkinitrd.conf @@ -121,7 +165,7 @@ kernel() { else KERNELPACKAGES="linux-image-$KERNEL linux-headers-$KERNEL" fi - $APTINSTALL $KERNELPACKAGES + DEBIAN_FRONTEND=$DEBIAN_FRONTEND $APTINSTALL $KERNELPACKAGES fi } # }}} @@ -139,14 +183,79 @@ reconfigure() { # }}} # set password of user root {{{ +setpassword() { +# Set a password, via chpasswd. +# Use perl rather than echo, to avoid the password +# showing in the process table. (However, this is normally +# only called when first booting the system, when root has no +# password at all, so that should be an unnecessary precaution). +# +# Pass in three arguments: the user, the password, and 'true' if the +# password has been pre-crypted (by preseeding). +# +# Taken from /var/lib/dpkg/info/passwd.config + SETPASSWD_PW="$2" + export SETPASSWD_PW + + # This is very annoying. chpasswd cannot handle generating md5 + # passwords as it is not PAM-aware. Thus, I have to work around + # that by crypting the password myself if md5 is used. + USE_MD5=1 + export USE_MD5 + + if [ "$3" = true ]; then + PRECRYPTED=1 + else + PRECRYPTED='' + fi + export PRECRYPTED + LC_ALL=C LANGUAGE=C LANG=C perl -e ' + sub CreateCryptSalt { + my $md5 = shift; + + my @valid = split(//, "./0123456789abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ"); + my ($in, $out); + + my $cryptsaltlen = ($md5 ? 8 : 2); + + open (F, "/dev/null 2>/dev/null || true umount /proc 1>/dev/null 2>/dev/null || true umount /proc 1>/dev/null 2>/dev/null || true @@ -297,24 +408,13 @@ finalize() { # }}} # execute the functions {{{ - stage chrootmirror && chrootmirror && stage chrootmirror done - stage grmlrepos && grmlrepos && stage grmlrepos done - stage kernelimg_conf && kernelimg_conf && stage kernelimg_conf done - stage makedev && makedev && stage makedev done - stage packages && packages && stage packages done - stage mkinitrd && mkinitrd && stage mkinitrd done - stage kernel && kernel && stage kernel done - stage reconfigure && reconfigure && stage reconfigure done - stage passwords && passwords && stage passwords done - stage hosts && hosts && stage hosts done - stage interfaces && interfaces && stage interfaces done - stage timezone && timezone && stage timezone done - stage fstab && fstab && stage fstab done - stage hostname && hostname && stage hostname done - stage initrd && initrd && stage initrd done - stage grub && grub && stage grub done - stage services && services && stage services done - stage finalize && finalize && stage finalize done + for i in chrootmirror grmlrepos kernelimg_conf makedev packages extrapackages \ + mkinitrd kernel reconfigure hosts interfaces timezone fstab hostname \ + initrd grub passwords services finalize ; do + if stage $i ; then + $i && stage $i done || exit 1 + fi + done # }}} # finally exit the chroot {{{