2020-05-02 11:46:39 +02:00
|
|
|
#!/bin/bash
|
|
|
|
# shellcheck disable=SC2010 # ls | grep allowed
|
2020-05-15 10:41:44 +02:00
|
|
|
# shellcheck source=/dev/null # Deactivate SC1090
|
2020-05-19 11:10:06 +02:00
|
|
|
# shellcheck disable=SC2015 # Deactivate bools hints
|
|
|
|
# shellcheck disable=SC2154 # Deactivate not referenced link
|
2020-09-24 18:58:30 +02:00
|
|
|
# @see https://wiki.polaire.nl/doku.php?id=archlinux-raspberry-encrypted
|
2020-05-15 12:00:03 +02:00
|
|
|
source "$(dirname "$(readlink -f "${0}")")/base.sh" || (echo "Loading base.sh failed." && exit 1)
|
2020-05-02 11:46:39 +02:00
|
|
|
|
2020-05-15 10:19:58 +02:00
|
|
|
info "Setupscript for images started..."
|
2020-05-02 11:46:39 +02:00
|
|
|
|
|
|
|
info "Checking if root..."
|
|
|
|
if [ "$(id -u)" != "0" ];then
|
|
|
|
error "This script must be executed as root!"
|
|
|
|
fi
|
|
|
|
|
2020-05-15 14:10:24 +02:00
|
|
|
make_working_folder
|
2020-05-15 12:23:07 +02:00
|
|
|
|
2020-05-18 12:45:48 +02:00
|
|
|
info "Configure user..." &&
|
|
|
|
question "Please type in a valid working username:" && read -r origin_username &&
|
|
|
|
getent passwd "$origin_username" > /dev/null 2 || error "User $origin_username doesn't exist."
|
|
|
|
origin_user_home="/home/$origin_username/"
|
2020-05-02 11:46:39 +02:00
|
|
|
|
|
|
|
info "Image routine starts..."
|
|
|
|
image_folder="$origin_user_home""Images/";
|
|
|
|
info "The images will be stored in \"$image_folder\"."
|
|
|
|
if [ ! -d "$image_folder" ]; then
|
2020-05-18 12:45:48 +02:00
|
|
|
info "Folder \"$image_folder\" doesn't exist. It will be created now." &&
|
|
|
|
mkdir -v "$image_folder" ||
|
|
|
|
error
|
2020-05-02 11:46:39 +02:00
|
|
|
fi
|
|
|
|
|
2020-05-15 12:23:07 +02:00
|
|
|
set_device_path
|
2020-05-02 11:46:39 +02:00
|
|
|
|
2020-05-15 12:23:07 +02:00
|
|
|
if mount | grep -q "$device_path"
|
2020-05-02 11:46:39 +02:00
|
|
|
then
|
2020-05-15 12:23:07 +02:00
|
|
|
error "Device $device_path is allready mounted. Umount with \"umount $device_path*\"."
|
2020-05-02 11:46:39 +02:00
|
|
|
fi
|
|
|
|
|
2020-05-18 12:45:48 +02:00
|
|
|
info "Select which architecture type should be used..." &&
|
|
|
|
echo "1) arm " &&
|
|
|
|
echo "2) 64_bit" &&
|
|
|
|
question "Please type in the architecture type:" &&
|
|
|
|
read -r architecture ||
|
|
|
|
error
|
2020-05-02 11:46:39 +02:00
|
|
|
|
2020-05-18 12:45:48 +02:00
|
|
|
|
|
|
|
info "Select which operating system should be used..."
|
2020-05-02 11:46:39 +02:00
|
|
|
info "Available systems:"
|
2020-05-18 12:45:48 +02:00
|
|
|
if [ "$architecture" = "arm" ]
|
|
|
|
then
|
|
|
|
echo "1) arch"
|
|
|
|
echo "2) moode"
|
|
|
|
echo "3) retropie"
|
|
|
|
fi
|
|
|
|
if [ "$architecture" = "64_bit" ]
|
|
|
|
then
|
|
|
|
echo "1) manjaro"
|
|
|
|
fi
|
2020-05-02 11:46:39 +02:00
|
|
|
question "Please type in the os:" && read -r os
|
|
|
|
|
2020-05-18 12:45:48 +02:00
|
|
|
info "Select which version should be used..."
|
|
|
|
case "$architecture" in
|
|
|
|
"arm")
|
|
|
|
echo "Version for Raspberry Pi modell:"
|
|
|
|
echo "1) 1"
|
|
|
|
echo "2) 2"
|
|
|
|
echo "3) 3"
|
|
|
|
echo "4) 4"
|
|
|
|
;;
|
|
|
|
"64_bit")
|
|
|
|
case "$os" in
|
2020-05-18 21:01:18 +02:00
|
|
|
"manjaro")
|
2020-05-18 12:45:48 +02:00
|
|
|
echo "1) architect"
|
2020-05-19 10:31:18 +02:00
|
|
|
echo "1) gnome"
|
2020-05-18 12:45:48 +02:00
|
|
|
;;
|
|
|
|
*)
|
|
|
|
error "The os system \"$os\" is not supported yet for 64bit!"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
error "The architecture \"$architecture\" is not supported yet!"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
question "Please type in the version:" && read -r version
|
|
|
|
|
2020-05-02 11:46:39 +02:00
|
|
|
os_does_not_support_raspberry_version_error () {
|
|
|
|
error "$os for Raspberry Pi Version $version is not supported!";
|
|
|
|
}
|
|
|
|
|
|
|
|
case "$os" in
|
|
|
|
"arch")
|
2020-06-11 16:58:15 +02:00
|
|
|
question "Should the system be encrypted?(y/N)" && read -r encrypt_system
|
2020-05-02 11:46:39 +02:00
|
|
|
base_download_url="http://os.archlinuxarm.org/os/";
|
|
|
|
case "$version" in
|
|
|
|
"1")
|
|
|
|
imagename="ArchLinuxARM-rpi-latest.tar.gz"
|
|
|
|
;;
|
2020-05-21 19:22:14 +02:00
|
|
|
"2")
|
2020-05-02 11:46:39 +02:00
|
|
|
imagename="ArchLinuxARM-rpi-2-latest.tar.gz"
|
|
|
|
;;
|
2020-05-21 19:22:14 +02:00
|
|
|
"3")
|
|
|
|
imagename="ArchLinuxARM-rpi-3-latest.tar.gz"
|
|
|
|
;;
|
2020-05-02 11:46:39 +02:00
|
|
|
"4")
|
|
|
|
imagename="ArchLinuxARM-rpi-4-latest.tar.gz"
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
os_does_not_support_raspberry_version_error
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
;;
|
2020-05-18 12:45:48 +02:00
|
|
|
"manjaro")
|
|
|
|
case "$version" in
|
|
|
|
"architect")
|
2020-05-18 12:47:33 +02:00
|
|
|
image_checksum="6b1c2fce12f244c1e32212767a9d3af2cf8263b2"
|
2020-05-18 21:01:18 +02:00
|
|
|
base_download_url="https://osdn.net/frs/redir.php?m=dotsrc&f=%2Fstorage%2Fg%2Fm%2Fma%2Fmanjaro%2Farchitect%2F20.0%2F";
|
2020-05-18 12:45:48 +02:00
|
|
|
imagename="manjaro-architect-20.0-200426-linux56.iso"
|
2020-05-19 10:31:18 +02:00
|
|
|
;;
|
|
|
|
"gnome")
|
|
|
|
image_checksum="d16118207c546c18201703d80b6356b1522b47d0"
|
|
|
|
base_download_url="https://osdn.net/frs/redir.php?m=dotsrc&f=/storage/g/m/ma/manjaro/gnome/20.0.1/";
|
|
|
|
imagename="manjaro-gnome-20.0.1-200511-linux56.iso"
|
2020-05-18 12:45:48 +02:00
|
|
|
;;
|
|
|
|
*)
|
|
|
|
os_does_not_support_raspberry_version_error
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
;;
|
2020-05-02 11:46:39 +02:00
|
|
|
"moode")
|
|
|
|
image_checksum="185cbc9a4994534bb7a4bc2744c78197"
|
|
|
|
base_download_url="https://github.com/moode-player/moode/releases/download/r651prod/"
|
|
|
|
imagename="moode-r651-iso.zip";
|
|
|
|
;;
|
|
|
|
"retropie")
|
|
|
|
base_download_url="https://github.com/RetroPie/RetroPie-Setup/releases/download/4.6/";
|
|
|
|
case "$version" in
|
|
|
|
"1")
|
|
|
|
image_checksum="98b4205ad0248d378c6776e20c54e487"
|
|
|
|
imagename="retropie-buster-4.6-rpi1_zero.img.gz"
|
|
|
|
;;
|
|
|
|
|
|
|
|
"2" | "3")
|
|
|
|
image_checksum="2e082ef5fc2d7cf7d910494cf0f7185b"
|
|
|
|
imagename="retropie-buster-4.6-rpi2_rpi3.img.gz"
|
|
|
|
;;
|
|
|
|
|
|
|
|
"4")
|
|
|
|
image_checksum="9154d998cba5219ddf23de46d8845f6c"
|
|
|
|
imagename="retropie-buster-4.6-rpi4.img.gz"
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
os_does_not_support_raspberry_version_error
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
error "The operation system \"$os\" is not supported yet!"
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
|
|
|
|
info "Generating os-image..."
|
|
|
|
download_url="$base_download_url$imagename"
|
|
|
|
image_path="$image_folder$imagename"
|
|
|
|
|
2020-05-19 11:10:06 +02:00
|
|
|
question "Should the image download be forced?(y/N)" && read -r force_image_download
|
2020-05-02 11:46:39 +02:00
|
|
|
if [ "$force_image_download" = "y" ]
|
|
|
|
then
|
|
|
|
if [ -f "$image_path" ]
|
|
|
|
then
|
2020-05-18 21:01:18 +02:00
|
|
|
info "Removing image $image_path." &&
|
2020-05-02 11:46:39 +02:00
|
|
|
rm "$image_path" || error "Removing image \"$image_path\" failed."
|
|
|
|
else
|
|
|
|
info "Forcing download wasn't neccessary. File $image_path doesn't exist."
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
info "Start Download procedure..."
|
|
|
|
if [ -f "$image_path" ]
|
|
|
|
then
|
|
|
|
info "Image exist local. Download skipped."
|
|
|
|
else
|
|
|
|
info "Image \"$imagename\" doesn't exist under local path \"$image_path\"."
|
|
|
|
info "Image \"$imagename\" gets downloaded from \"$download_url\"..."
|
2020-05-18 21:01:18 +02:00
|
|
|
wget "$download_url" -O "$image_path" || error "Download from \"$download_url\" failed."
|
2020-05-02 11:46:39 +02:00
|
|
|
fi
|
|
|
|
|
|
|
|
info "Verifying image..."
|
|
|
|
if [[ -v image_checksum ]]
|
|
|
|
then
|
2020-05-25 14:46:52 +02:00
|
|
|
(info "Checking md5 checksum..." && echo "$image_checksum $image_path"| md5sum -c -) ||
|
|
|
|
(info "Checking sha1 checksum..." && echo "$image_checksum $image_path"| sha1sum -c -) ||
|
2020-05-18 12:45:48 +02:00
|
|
|
error "Verification failed. HINT: Force the download of the image."
|
2020-05-02 11:46:39 +02:00
|
|
|
else
|
|
|
|
warning "Verification is not possible. No checksum is defined."
|
|
|
|
fi
|
|
|
|
|
2020-05-15 14:10:24 +02:00
|
|
|
make_mount_folders
|
2020-05-02 11:46:39 +02:00
|
|
|
|
2020-05-15 13:37:14 +02:00
|
|
|
set_partition_paths
|
2020-05-02 11:46:39 +02:00
|
|
|
|
2020-05-25 14:46:52 +02:00
|
|
|
question "Should the image be transfered to $device_path?(y/N)" && read -r transfer_image
|
2020-05-02 11:46:39 +02:00
|
|
|
if [ "$transfer_image" = "y" ]
|
|
|
|
then
|
|
|
|
|
2020-09-26 17:12:13 +02:00
|
|
|
question "Should the partition table of $device_path be deleted?(y/N)" && read -r delete_partition_table
|
|
|
|
if [ "$delete_partition_table" = "y" ]
|
|
|
|
then
|
|
|
|
info "Deleting..." &&
|
|
|
|
wipefs -a "$device_path" || error
|
|
|
|
else
|
|
|
|
info "Skipping partition table deletion..."
|
|
|
|
fi
|
|
|
|
|
2020-05-20 12:47:30 +02:00
|
|
|
overwritte_device_with_zeros
|
2020-05-02 11:46:39 +02:00
|
|
|
|
|
|
|
info "Starting image transfer..."
|
2020-05-18 12:45:48 +02:00
|
|
|
if [ "$os" = "arch" ]
|
|
|
|
then
|
2020-06-11 16:58:15 +02:00
|
|
|
info "Deleting partition tables..." &&
|
|
|
|
wipefs -a "$device_path" || error
|
|
|
|
if [ "$encrypt_system" == "y" ]
|
|
|
|
then
|
|
|
|
info "Creating partitions for encrypted system..." &&
|
|
|
|
( echo "o" #Type o. This will clear out any partitions on the drive.
|
|
|
|
echo "p" #Type p to list partitions. There should be no partitions left
|
|
|
|
echo "n" #Type n,
|
|
|
|
echo "p" #then p for primary,
|
|
|
|
echo "1" #1 for the first partition on the drive,
|
|
|
|
echo "" #press ENTER to accept the default first sector,
|
|
|
|
echo "+300M" #then type +100M for the last sector.
|
|
|
|
echo "t" #Type t,
|
|
|
|
echo "c" #then c to set the first partition to type W95 FAT32 (LBA).
|
|
|
|
echo "n" #Type n,
|
|
|
|
echo "p" #then p for primary,
|
|
|
|
echo "2" #2 for the second partition on the drive,
|
|
|
|
echo "" #Default start sector
|
|
|
|
echo "+3G" #Endsector
|
|
|
|
echo "n" #Type n,
|
|
|
|
echo "p" #then p for primary,
|
|
|
|
echo "3" #2 for the second partition on the drive,
|
|
|
|
echo "" #Default start sector
|
|
|
|
echo "" #Default end sector
|
|
|
|
echo "w" #Write the partition table and exit by typing w.
|
|
|
|
)| fdisk "$device_path" || error
|
|
|
|
else
|
|
|
|
info "Creating partitions..." &&
|
|
|
|
( echo "o" #Type o. This will clear out any partitions on the drive.
|
|
|
|
echo "p" #Type p to list partitions. There should be no partitions left
|
|
|
|
echo "n" #Type n,
|
|
|
|
echo "p" #then p for primary,
|
|
|
|
echo "1" #1 for the first partition on the drive,
|
|
|
|
echo "" #Default start sector
|
|
|
|
echo "+100M" #then type +100M for the last sector.
|
|
|
|
echo "t" #Type t,
|
|
|
|
echo "c" #then c to set the first partition to type W95 FAT32 (LBA).
|
|
|
|
echo "n" #Type n,
|
|
|
|
echo "p" #then p for primary,
|
|
|
|
echo "2" #2 for the second partition on the drive,
|
|
|
|
echo "" #Default start sector
|
|
|
|
echo "" #Default end sector
|
|
|
|
echo "w" #Write the partition table and exit by typing w.
|
2020-06-11 20:19:31 +02:00
|
|
|
)| fdisk "$device_path" || error
|
2020-06-11 16:58:15 +02:00
|
|
|
fi
|
2020-05-02 11:46:39 +02:00
|
|
|
|
2020-05-18 12:45:48 +02:00
|
|
|
info "Format boot partition..." &&
|
2020-06-11 16:58:15 +02:00
|
|
|
mkfs.vfat "$boot_partition_path" || error
|
2020-05-02 11:46:39 +02:00
|
|
|
|
2020-05-18 12:45:48 +02:00
|
|
|
info "Format root partition..." &&
|
2020-06-11 16:58:15 +02:00
|
|
|
mkfs.ext4 "$root_partition_path" || error
|
2020-05-02 11:46:39 +02:00
|
|
|
|
|
|
|
mount_partitions;
|
|
|
|
|
2020-05-18 12:45:48 +02:00
|
|
|
info "Root files will be transfered to device..." &&
|
|
|
|
bsdtar -xpf "$image_path" -C "$root_mount_path" &&
|
|
|
|
sync ||
|
|
|
|
error
|
|
|
|
|
|
|
|
info "Boot files will be transfered to device..." &&
|
2020-06-08 17:45:11 +02:00
|
|
|
mv -v "$root_mount_path""boot/"* "$boot_mount_path" ||
|
2020-05-18 12:45:48 +02:00
|
|
|
error
|
2020-05-18 21:01:18 +02:00
|
|
|
elif [ "${image_path: -4}" = ".zip" ]
|
2020-05-18 12:45:48 +02:00
|
|
|
then
|
2020-05-18 21:01:18 +02:00
|
|
|
info "Transfering .zip file..." &&
|
2020-05-20 10:35:37 +02:00
|
|
|
unzip -p "$image_path" | sudo dd of="$device_path" bs="$OPTIMAL_BLOCKSIZE" conv=fsync status=progress || error "DD $image_path to $device_path failed." &&
|
2020-05-18 12:45:48 +02:00
|
|
|
sync ||
|
|
|
|
error
|
2020-05-18 21:01:18 +02:00
|
|
|
elif [ "${image_path: -3}" = ".gz" ]
|
2020-05-18 12:45:48 +02:00
|
|
|
then
|
2020-05-18 21:01:18 +02:00
|
|
|
info "Transfering .gz file..." &&
|
2020-05-20 10:35:37 +02:00
|
|
|
gunzip -c "$image_path" | sudo dd of="$device_path" bs="$OPTIMAL_BLOCKSIZE" conv=fsync status=progress &&
|
2020-05-18 12:45:48 +02:00
|
|
|
sync ||
|
|
|
|
error
|
2020-05-18 21:01:18 +02:00
|
|
|
elif [ "${image_path: -4}" = ".iso" ]
|
2020-05-18 12:45:48 +02:00
|
|
|
then
|
2020-05-18 21:01:18 +02:00
|
|
|
info "Transfering .iso file..." &&
|
2020-05-20 10:35:37 +02:00
|
|
|
sudo dd if="$image_path" of="$device_path" bs="$OPTIMAL_BLOCKSIZE" conv=fsync status=progress &&
|
2020-05-18 12:45:48 +02:00
|
|
|
sync ||
|
|
|
|
error
|
|
|
|
else
|
2020-05-02 11:46:39 +02:00
|
|
|
error "Image transfer for operation system \"$os\" is not supported yet!";
|
2020-05-18 12:45:48 +02:00
|
|
|
fi
|
2020-05-02 11:46:39 +02:00
|
|
|
else
|
|
|
|
info "Skipping image transfer..."
|
|
|
|
fi
|
|
|
|
|
|
|
|
info "Start regular mounting procedure..."
|
2020-06-11 21:22:10 +02:00
|
|
|
if mount | grep -q "$boot_partition_path"
|
2020-05-02 11:46:39 +02:00
|
|
|
then
|
2020-06-11 21:22:10 +02:00
|
|
|
info "$boot_partition_path is allready mounted..."
|
2020-05-02 11:46:39 +02:00
|
|
|
else
|
2020-06-11 21:22:10 +02:00
|
|
|
if mount | grep -q "$root_partition_path"
|
2020-06-08 17:45:11 +02:00
|
|
|
then
|
2020-06-11 21:22:10 +02:00
|
|
|
info "$root_partition_path is allready mounted..."
|
2020-06-08 17:45:11 +02:00
|
|
|
else
|
|
|
|
mount_partitions
|
|
|
|
fi
|
2020-05-02 11:46:39 +02:00
|
|
|
fi
|
|
|
|
|
|
|
|
info "Define target paths..."
|
|
|
|
target_home_path="$root_mount_path""home/";
|
|
|
|
target_username=$(ls "$target_home_path");
|
|
|
|
target_user_home_folder_path="$target_home_path$target_username/";
|
|
|
|
|
2020-05-18 12:45:48 +02:00
|
|
|
question "Should the ssh-key be copied to the image?(y/N)" && read -r copy_ssh_key
|
|
|
|
if [ "$copy_ssh_key" == "y" ]
|
2020-05-02 11:46:39 +02:00
|
|
|
then
|
2020-05-18 12:45:48 +02:00
|
|
|
info "Copy ssh key to target..."
|
|
|
|
target_user_ssh_folder_path="$target_user_home_folder_path"".ssh/"
|
|
|
|
target_authorized_keys="$target_user_ssh_folder_path""authorized_keys"
|
|
|
|
origin_user_rsa_pub="$origin_user_home"".ssh/id_rsa.pub";
|
|
|
|
if [ -f "$origin_user_rsa_pub" ]
|
|
|
|
then
|
2020-05-25 14:46:52 +02:00
|
|
|
mkdir -v "$target_user_ssh_folder_path" || warning "Folder \"$target_user_ssh_folder_path\" exists. Can't be created."
|
2020-05-18 12:45:48 +02:00
|
|
|
cat "$origin_user_rsa_pub" > "$target_authorized_keys" &&
|
|
|
|
target_authorized_keys_content=$(cat "$target_authorized_keys") &&
|
|
|
|
info "$target_authorized_keys contains the following: $target_authorized_keys_content" &&
|
|
|
|
chown -vR 1000 "$target_user_ssh_folder_path" &&
|
|
|
|
chmod -v 700 "$target_user_ssh_folder_path" &&
|
|
|
|
chmod -v 600 "$target_authorized_keys" ||
|
|
|
|
error
|
|
|
|
else
|
|
|
|
warning "The ssh key \"$origin_user_rsa_pub\" can't be copied to \"$target_authorized_keys\" because it doesn't exist."
|
|
|
|
fi
|
2020-05-02 11:46:39 +02:00
|
|
|
else
|
2020-05-18 12:45:48 +02:00
|
|
|
info "Skipped SSH-key copying.."
|
2020-05-02 11:46:39 +02:00
|
|
|
fi
|
2020-05-21 19:22:14 +02:00
|
|
|
|
2020-05-02 11:46:39 +02:00
|
|
|
info "Start chroot procedures..."
|
2020-05-15 14:10:24 +02:00
|
|
|
|
2020-05-21 19:22:14 +02:00
|
|
|
mount_chroot_binds
|
2020-05-02 11:46:39 +02:00
|
|
|
|
2020-05-21 19:22:14 +02:00
|
|
|
copy_qemu
|
2020-05-02 11:46:39 +02:00
|
|
|
|
2020-05-21 19:22:14 +02:00
|
|
|
copy_resolve_conf
|
2020-05-02 11:46:39 +02:00
|
|
|
|
2020-05-25 14:18:34 +02:00
|
|
|
question "Should the password of the standart user \"$target_username\" be changed?(y/N)" && read -r change_password
|
2020-05-18 12:45:48 +02:00
|
|
|
if [ "$change_password" == "y" ]
|
2020-05-02 11:46:39 +02:00
|
|
|
then
|
2020-05-18 12:45:48 +02:00
|
|
|
info "Changing passwords on target system..."
|
|
|
|
question "Type in new password: " && read -r password_1
|
|
|
|
question "Repeat new password\"$target_username\"" && read -r password_2
|
|
|
|
if [ "$password_1" = "$password_2" ]
|
|
|
|
then
|
|
|
|
(
|
|
|
|
echo "(
|
|
|
|
echo '$password_1'
|
|
|
|
echo '$password_1'
|
|
|
|
) | passwd $target_username"
|
|
|
|
echo "(
|
|
|
|
echo '$password_1'
|
|
|
|
echo '$password_1'
|
|
|
|
) | passwd"
|
2020-05-21 20:01:32 +02:00
|
|
|
) | chroot "$root_mount_path" /bin/bash || error
|
2020-05-18 12:45:48 +02:00
|
|
|
else
|
|
|
|
error "Passwords didn't match."
|
|
|
|
fi
|
2020-05-02 11:46:39 +02:00
|
|
|
else
|
2020-05-18 12:45:48 +02:00
|
|
|
info "Skipped password change..."
|
2020-05-02 11:46:39 +02:00
|
|
|
fi
|
2020-05-21 19:42:29 +02:00
|
|
|
|
2020-06-12 09:38:13 +02:00
|
|
|
hostname_path="$root_mount_path""etc/hostname"
|
2020-05-18 12:45:48 +02:00
|
|
|
question "Should the hostname be changed?(y/N)" && read -r change_hostname
|
|
|
|
if [ "$change_hostname" == "y" ]
|
|
|
|
then
|
2020-06-12 09:38:13 +02:00
|
|
|
question "Type in the hostname:" && read -r target_hostname;
|
|
|
|
echo "$target_hostname" > "$hostname_path" || error
|
2020-05-18 12:45:48 +02:00
|
|
|
else
|
2020-06-12 09:38:13 +02:00
|
|
|
target_hostname=$(cat "$hostname_path")
|
2020-05-18 12:45:48 +02:00
|
|
|
info "Skipped hostname change..."
|
|
|
|
fi
|
2020-06-12 09:38:13 +02:00
|
|
|
info "Used hostname is: $target_hostname"
|
2020-05-21 19:42:29 +02:00
|
|
|
|
2020-05-21 20:01:32 +02:00
|
|
|
question "Should the system be updated?(y/N)" && read -r update_system
|
2020-05-21 19:42:29 +02:00
|
|
|
if [ "$update_system" == "y" ]
|
|
|
|
then
|
2020-05-25 14:18:34 +02:00
|
|
|
info "Updating system..."
|
|
|
|
case "$os" in
|
|
|
|
"arch"|"manjaro")
|
|
|
|
(
|
|
|
|
echo "yes | pacman-key --init"
|
|
|
|
echo "yes | pacman-key --populate archlinuxarm"
|
2020-06-11 15:36:27 +02:00
|
|
|
echo "pacman --noconfirm -Syyu"
|
2020-05-25 14:18:34 +02:00
|
|
|
) | chroot "$root_mount_path" /bin/bash || error
|
|
|
|
;;
|
|
|
|
"moode"|"retropie")
|
|
|
|
(
|
|
|
|
echo "yes | apt update"
|
|
|
|
echo "yes | apt upgrade"
|
|
|
|
) | chroot "$root_mount_path" /bin/bash || error
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
warning "System update for operation system \"$os\" is not supported yet. Skipped."
|
|
|
|
;;
|
|
|
|
esac
|
2020-05-21 19:42:29 +02:00
|
|
|
fi
|
2020-05-21 20:01:32 +02:00
|
|
|
|
2020-05-25 13:40:03 +02:00
|
|
|
if [ "$encrypt_system" == "y" ]
|
|
|
|
then
|
2020-09-30 16:35:48 +02:00
|
|
|
# Adapted this instruction @see https://gist.github.com/gea0/4fc2be0cb7a74d0e7cc4322aed710d38
|
2020-06-12 09:30:45 +02:00
|
|
|
rescue_suffix=".$(date +%s).rescue"
|
2020-05-25 13:40:03 +02:00
|
|
|
search_hooks="HOOKS=(base udev autodetect modconf block filesystems keyboard fsck)"
|
|
|
|
replace_hooks="HOOKS=(base udev autodetect modconf block sleep netconf dropbear encryptssh filesystems keyboard fsck)"
|
|
|
|
mkinitcpio_path="/etc/mkinitcpio.conf"
|
2020-06-12 09:30:45 +02:00
|
|
|
mkinitcpio_rescue_path="$mkinitcpio_path$rescue_suffix"
|
2020-09-29 18:40:25 +02:00
|
|
|
search_modules="MODULES=()"
|
2020-05-25 13:40:03 +02:00
|
|
|
replace_modules="MODULES=(g_cdc usb_f_acm usb_f_ecm smsc95xx g_ether)"
|
2020-06-12 09:30:45 +02:00
|
|
|
root_mapper_path="/dev/mapper/root"
|
|
|
|
fstab_path="/mnt/etc/fstab"
|
|
|
|
fstab_rescue_path="$fstab_path$rescue_suffix"
|
|
|
|
crypttab_path="/mnt/etc/crypttab"
|
|
|
|
crypttab_rescue_path="$crypttab_path$rescue_suffix"
|
2020-06-11 20:19:31 +02:00
|
|
|
boot_txt_path="/boot/boot.txt"
|
2020-09-26 17:17:27 +02:00
|
|
|
boot_txt_rescue_path="$boot_txt_path$rescue_suffix"
|
2020-06-12 10:57:58 +02:00
|
|
|
boot_txt_delete_line=$(echo "part uuid \${devtype} \${devnum}:2 uuid" | sed -e 's/[]\/$*.^[]/\\&/g')
|
2020-06-12 09:48:46 +02:00
|
|
|
boot_txt_setenv_origin=$(echo "setenv bootargs console=ttyS1,115200 console=tty0 root=PARTUUID=\${uuid} rw rootwait smsc95xx.macaddr=\"\${usbethaddr}\"" | sed -e 's/[]\/$*.^[]/\\&/g')
|
2020-09-30 16:43:59 +02:00
|
|
|
boot_txt_setenv_replace=$(echo "setenv bootargs console=ttyS1,115200 console=tty0 ip=::::$target_hostname:eth0:dhcp cryptdevice=$encrypted_partition_path:root root=$root_mapper_path rw rootwait smsc95xx.macaddr=\"\${usbethaddr}\""| sed -e 's/[\/&]/\\&/g')
|
2020-05-25 13:40:03 +02:00
|
|
|
info "Setup encryption..." &&
|
2020-09-29 16:29:42 +02:00
|
|
|
question "Type in encryption password: " && read -r luks_password
|
|
|
|
question "Repeat encryption password:" && read -r luks_password_repeat
|
|
|
|
if [ "$luks_password" != "$luks_password_repeat" ]
|
|
|
|
then
|
|
|
|
error "Passwords didn't match."
|
|
|
|
fi
|
2020-05-25 13:40:03 +02:00
|
|
|
(
|
2020-09-26 17:43:49 +02:00
|
|
|
echo "pacman --noconfirm -S --needed $(get_packages "server/luks") &&"
|
|
|
|
echo "cp -v /home/$target_username/.ssh/authorized_keys /etc/dropbear/root_key &&"
|
|
|
|
echo "cp -v $mkinitcpio_path $mkinitcpio_rescue_path &&"
|
|
|
|
echo "sed -i 's/$search_modules/$replace_modules/g' $mkinitcpio_path &&"
|
|
|
|
echo "sed -i 's/$search_hooks/$replace_hooks/g' $mkinitcpio_path &&"
|
2020-09-29 18:09:44 +02:00
|
|
|
echo "echo \"Content of $mkinitcpio_path:\$(cat \"$mkinitcpio_path\")\" &&"
|
2020-09-30 15:49:36 +02:00
|
|
|
#Concerning mkinitcpio warning @see https://gist.github.com/imrvelj/c65cd5ca7f5505a65e59204f5a3f7a6d
|
2020-09-26 17:43:49 +02:00
|
|
|
echo "mkinitcpio -P &&"
|
2020-09-29 18:40:25 +02:00
|
|
|
echo "echo '$luks_password' | sudo cryptsetup -v luksFormat -c aes-xts-plain64 -s 512 -h sha512 --use-random -i 1000 $encrypted_partition_path &&"
|
2020-09-29 16:29:42 +02:00
|
|
|
echo "echo '$luks_password' | sudo cryptsetup -v luksOpen $encrypted_partition_path root &&"
|
2020-09-26 17:43:49 +02:00
|
|
|
echo "mkfs.ext4 $root_mapper_path &&"
|
|
|
|
echo "mount $root_mapper_path /mnt &&"
|
|
|
|
echo "rsync --info=progress2 -axHAX / /mnt/ &&"
|
|
|
|
echo "cp -v $fstab_path $fstab_rescue_path &&"
|
2020-09-26 19:09:07 +02:00
|
|
|
echo "echo $root_mapper_path' / ext4 defaults,noatime 0 1' >> $fstab_path &&"
|
2020-09-26 19:12:56 +02:00
|
|
|
echo "echo \"Content of $fstab_path:\$(cat \"$fstab_path\")\" &&"
|
2020-09-26 17:43:49 +02:00
|
|
|
echo "cp -v $crypttab_path $crypttab_rescue_path &&"
|
2020-09-26 19:18:08 +02:00
|
|
|
echo "echo 'root '$encrypted_partition_path' none luks' >> $crypttab_path &&"
|
2020-09-26 19:12:56 +02:00
|
|
|
echo "echo \"Content of $crypttab_path:\$(cat \"$crypttab_path\")\" &&"
|
2020-09-29 16:23:21 +02:00
|
|
|
#boot.txt just works with raspberry pi 3 @todo Needs to be implemented for arch raspbery pi 4
|
2020-09-26 17:43:49 +02:00
|
|
|
echo "cp -v $boot_txt_path $boot_txt_rescue_path &&"
|
2020-09-29 16:23:21 +02:00
|
|
|
echo "sed -i 's/$boot_txt_delete_line//g' $boot_txt_path &&"
|
|
|
|
echo "sed -i 's/$boot_txt_setenv_origin/$boot_txt_setenv_replace/g' $boot_txt_path &&"
|
2020-09-26 19:12:56 +02:00
|
|
|
echo "echo \"Content of $boot_txt_path:\$(cat \"$boot_txt_path\")\" &&"
|
2020-09-26 17:43:49 +02:00
|
|
|
echo "cd /boot/ && ./mkscr &&"
|
|
|
|
echo "umount $root_mapper_path &&"
|
2020-09-29 16:23:21 +02:00
|
|
|
echo "sudo cryptsetup -v luksClose root &&"
|
|
|
|
echo "exit || echo 'Error in chroot environment!' echo 'Trying to close decrypted root.'; sudo cryptsetup -v luksClose root"
|
2020-05-25 13:40:03 +02:00
|
|
|
) | chroot "$root_mount_path" /bin/bash || error
|
|
|
|
fi
|
|
|
|
|
2020-05-26 14:07:29 +02:00
|
|
|
question "Do you want to setup Wifi on the device?(y/N)" && read -r setup_wifi
|
|
|
|
if [ "$setup_wifi" = "y" ]
|
|
|
|
then
|
|
|
|
question "Please type in the ssid:" && read -r ssid
|
|
|
|
question "Please type in the psk:" && read -r psk
|
|
|
|
case "$os" in
|
|
|
|
"retropie")
|
|
|
|
wifi_file="$boot_mount_path""wifikeyfile.txt"
|
|
|
|
echo "ssid=\"$ssid\"" > "$wifi_file"
|
|
|
|
echo "psk=\"$psk\"" >> "$wifi_file"
|
|
|
|
;;
|
|
|
|
*)
|
|
|
|
warning "Wifi setting for operation system \"$os\" is not supported yet. Skipped."
|
|
|
|
;;
|
|
|
|
esac
|
|
|
|
fi
|
2020-05-02 11:46:39 +02:00
|
|
|
|
2020-05-25 14:18:34 +02:00
|
|
|
info "Running system specific procedures..."
|
|
|
|
if [ "$os" = "retropie" ]
|
|
|
|
then
|
2020-05-25 14:46:52 +02:00
|
|
|
question "Should the roms be copied to the system?(y/N)" && read -r copy_roms
|
2020-05-25 14:18:34 +02:00
|
|
|
if [ "$copy_roms" == "y" ]
|
|
|
|
then
|
|
|
|
target_roms_path="$target_user_home_folder_path""/RetroPie/roms/" &&
|
|
|
|
source_roms_path="$origin_user_home""Games/roms/" &&
|
|
|
|
info "Copy roms from $source_roms_path to $target_roms_path..."
|
|
|
|
cp -v "$source_roms_path" "$target_roms_path" &&
|
|
|
|
chown -vR 1000 "$target_roms_path" || error
|
|
|
|
fi
|
2020-05-25 14:46:52 +02:00
|
|
|
question "Should the RetroFlag specific procedures be executed?(y/N)" && read -r setup_retroflag
|
2020-05-25 14:18:34 +02:00
|
|
|
if [ "$setup_retroflag" == "y" ]
|
|
|
|
then
|
|
|
|
info "Executing RetroFlag specific procedures..." &&
|
|
|
|
(
|
|
|
|
echo 'wget -O - "https://raw.githubusercontent.com/RetroFlag/retroflag-picase/master/install_gpi.sh" | bash'
|
|
|
|
) | chroot "$root_mount_path" /bin/bash || error
|
|
|
|
fi
|
|
|
|
fi
|
2020-05-02 11:46:39 +02:00
|
|
|
|
|
|
|
destructor
|
|
|
|
success "Setup successfull :)" && exit 0
|