From 76606ce4031f08e64937b22fab370550347066e7 Mon Sep 17 00:00:00 2001 From: P. J. McDermott Date: Sat, 13 Jan 2018 18:35:30 -0500 Subject: logi1: New host --- (limited to 'hosts/logi1/postinst') diff --git a/hosts/logi1/postinst b/hosts/logi1/postinst new file mode 100644 index 0000000..48981e5 --- /dev/null +++ b/hosts/logi1/postinst @@ -0,0 +1,170 @@ +#!/bin/sh + +# Make swap file and set vm.swappiness. +# mkswap needs to be given the full path to the swap file including the +# root file system's mount point, or else this false error happens: +# mkswap: error: /var/swap is mounted; will not make swapspace +fallocate -l 4GiB "${target}/var/swap" || return 1 # TODO: Increase +chmod 0600 "${target}/var/swap" || return 1 +mkswap "${target}/var/swap" || return 1 +printf 'vm.swappiness = 10\n' >"${target}/etc/sysctl.d/vm-swappiness.conf" + +# Hibernation. +root="UUID=$(blkid -o value -s UUID "${dev}1")" +offset="$(in_target filefrag -v /var/swap | sed -n ' + /physical_offset:/{ + n; + s/^[ 0-9.]*:[ 0-9.]*: *\([0-9][0-9]*\)...*$/\1/; + p; + q; + };')" +cmdline="quiet iommu=pt resume=${root} resume_offset=${offset}" +# TODO: cmdline="${cmdline} nouveau.config=NvBios=vbios.rom" +cp -p "${target}/etc/default/grub" "${target}/etc/default/grub.dist" +sed 's|^\(GRUB_CMDLINE_LINUX_DEFAULT\)=.*$|\1="'"${cmdline}"'"|;' \ + "${target}/etc/default/grub.dist" >"${target}/etc/default/grub" + +# Disable ast Linux driver module. +cat >"${target}/etc/modprobe.d/ast.conf" <<-EOF + blacklist ast + EOF + +# Set up fancontrol. +cat >"${target}/etc/modules" <<-EOF + w83795 + EOF +# TODO: /etc/fancontrol + +# Disable mpd service. +in_target update-rc.d mpd disable + +# Add "deb-src" line as well as backports and debug symbols archives. +cat >"${target}/etc/apt/sources.list" <<-EOF + deb http://deb.debian.org/debian stretch main + deb-src http://deb.debian.org/debian stretch main + EOF +cat >"${target}/etc/apt/sources.list.d/stretch-backports.list" <<-EOF + deb http://deb.debian.org/debian stretch-backports main + deb-src http://deb.debian.org/debian stretch-backports main + EOF +cat >"${target}/etc/apt/sources.list.d/stretch-debug.list" <<-EOF + deb http://deb.debian.org/debian-debug stretch-debug main + EOF +in_target apt-get update || return 1 +in_target apt-get -q -y install kicad/stretch-backports || return 1 +in_target apt-get -q -y install tor/stretch-backports torsocks || return 1 +in_target apt-get -q -y install libglib2.0-0-dbgsym libgtk-3-0-dbgsym || \ + return 1 + +# Set default x-www-browser. +in_target update-alternatives --set x-www-browser /usr/bin/midori + +# Purge systemd. +in_target apt-get -q -y purge libpam-systemd systemd || return 1 +in_target apt-get -q -y --purge autoremove || return 1 + +# Remove packages from APT cache. +in_target apt-get clean || return 1 + +# Add user to groups created by postinst_pkgs. +in_target adduser pj scanner || return 1 +in_target adduser pj wireshark || return 1 +in_target adduser pj sbuild || return 1 + +# Add udev rule for USBtinyISP(-compatible) programmers. +cat >"${target}/etc/udev/rules.d/10-usbtinyisp.rules" <<-EOF + SUBSYSTEM=="usb", ATTR{idVendor}=="1781", ATTR{idProduct}=="0c9f", MODE="0660", GROUP="adm" + EOF + +# Add udev rule for CH341A-based programmers. +cat >"${target}/etc/udev/rules.d/10-ch341a.rules" <<-EOF + SUBSYSTEM=="usb", ATTRS{idVendor}=="1a86", ATTRS{idProduct}=="5512", MODE="0666" + EOF + +# Install Vertex themes. +in_target apt-get -q -y install gnome-themes-standard gtk2-engines-murrine \ + libgtk-3-dev +in_target sudo -u pj sh <<-EOF + set -e + git clone https://github.com/horst3180/vertex-theme \ + /home/pj/src/vertex-theme/ + cd /home/pj/src/vertex-theme/ + ./autogen.sh --prefix=/home/pj/.local + make install + ln -s .local/share/themes/ /home/pj/.themes + EOF +[ ${?} -ne 0 ] && return 1 + +# Download wallpaper. +in_target sudo -u pj wget -O /home/pj/.wallpaper \ + http://product-files.libiquity.com/taurinus/boot-splash/x200/background.png + +# Use temporary configuation SSH key. +install -d -o 1000 -g 1000 -m 0700 "${target}/home/pj/.ssh" || return 1 +cat >"${target}/home/pj/.ssh/id_rsa" <<-EOF + -----BEGIN RSA PRIVATE KEY----- + MIICXAIBAAKBgQCzAF0zqeS2X0TuVOIxqMec3lMzZy/MHQswPP+BQkmc2D3YVb2x + px1YAAweQnfZ27pGJkDztStOtMQJeaOsnAVdm2NSe+hEdaKAOxf9p6t+F930HM/w + 1wkm1ddlsnCaaCipzGVOM77Q/brEItWvuq8G0+/fgN1o4pZzl4Bub/4D4QIDAQAB + AoGAS+wKnAAiXuv3m7LrIa75w2JVHcdVcZicB0DICnYoLNtXF+v+AlzkSE/009zT + YtccoeZVxEiCbuajA3XRY0PlzgGHTbsGn1BWqI9cjdXTiotnjzOH8zr3JiMZMWwf + hqwbtleP+yruNPHMxQ8dKVXv875NKJW+aArmQWtjeMOy/vECQQDdsvPJ4bUu8M7/ + MXqGtz8CJbrRp+ZMKUw0WuwSwTfHRs/Jp27mWf5+t/u+RN8WK/RRD8FHvz4azLhr + sNUFiE69AkEAzrI/DFBFOM5mUECujs2UvCCeWZiAi9QoJ7kDrrAkcG+hMalpNUU3 + SUZ76stBUk3hZNpc82aq0a0o8ac0VrBd9QJAB3nbYrlrxLN2J4Dhot1XEJl5HUzO + JU9XNITEZTWCzgODSkeNI9NxE5DcumPUKgk9aeZgHC1EyN6ScX87D76y+QJAL8DE + ii69X1toDeBzs7BRTYlnrCFsiWGRiWPYMvKk6IkRv6x5DwKXvEkZdexRghdWHHvK + f71Xd6u+yt2rXN/QRQJBALv6SwbokdXp5qKJV48QG452dSOT7FQEINnCsIeNUKP6 + 9YyaZxqLia6pEbEKTSRdztXaMqRsrmOG8E084sFg8DQ= + -----END RSA PRIVATE KEY----- + EOF +in_target chown pj:pj '/home/pj/.ssh/id_rsa' +in_target chmod 0600 '/home/pj/.ssh/id_rsa' + +# Set up SSH known hosts. +cat >"${target}/home/pj/.ssh/known_hosts" <<-EOF + |1|fypb7kn7NH0fqHGj9Xs/rdpO71s=|SCtg2BdMNB9zL5bAPYkJy1uiNSM= ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCXcG5BuZi4947D9WqY1L6CzaH4Qjw7YA7Dja+09y0nZjLVDd1saZCPkTjo1PEHxVCvSHvc0VmRqIZ2wUGtuqIlgGPMphCPAtdHN63YcNXqIhjEygLsaSZgy1Qz33YQF+YSANbeZQ4vnqiYr3C1IA7Cw4km/0s1BvP3t9yJf/iYODZqjVqUhqB4hzXJcBZHrgnM4LmPD4NH81fCqpwfRviNQNFAqd/aT1YTvgdn46HTVz7dV8ahW6SLXBTJZvO9dLAAKOPPZwuluaRphBqjPLC83zsihQ884SAH+AKcpN1ne73UZUuA1Gyk3HW+a/ngbzm1nmoeC0Sm1nNlTvC4WrLD + |1|z7it+otnWcn/98YKdeaBCXl+ug8=|NFRpdQZBMTAuWbUDAqXLptFR5Ao= ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABAQCXcG5BuZi4947D9WqY1L6CzaH4Qjw7YA7Dja+09y0nZjLVDd1saZCPkTjo1PEHxVCvSHvc0VmRqIZ2wUGtuqIlgGPMphCPAtdHN63YcNXqIhjEygLsaSZgy1Qz33YQF+YSANbeZQ4vnqiYr3C1IA7Cw4km/0s1BvP3t9yJf/iYODZqjVqUhqB4hzXJcBZHrgnM4LmPD4NH81fCqpwfRviNQNFAqd/aT1YTvgdn46HTVz7dV8ahW6SLXBTJZvO9dLAAKOPPZwuluaRphBqjPLC83zsihQ884SAH+AKcpN1ne73UZUuA1Gyk3HW+a/ngbzm1nmoeC0Sm1nNlTvC4WrLD + EOF +in_target chown pj:pj '/home/pj/.ssh/known_hosts' +in_target chmod 0600 '/home/pj/.ssh/known_hosts' + +# Bootstrap vcsh and mr. +rm -f "${target}/home/pj/.profile" "${target}/home/pj/.bashrc" \ + "${target}/home/pj/.bash_logout" +in_target sudo -u pj vcsh clone ssh://git@git.pehjota.net/dotfiles/mr.git mr \ + || return 1 +in_target sudo -u pj mr update || return 1 +in_target sudo -u pj /home/pj/bin/dfen claws-mail clipit fluxbox gpicview gimp \ + gtk kicad midori mpd mpv redshift roxterm xdg-user-dirs xscreensaver + +# Create XDG directories. +sed 's/#.*$//; /^$/d;' "${target}/home/pj/.config/user-dirs.dirs" | \ + while IFS='=' read var val; do + HOME='/home/pj' + eval "mkdir '${target}/'${val}" + done + +# Add empty folder list to prevent Claws Mail wizard from running. +cat >"${target}/home/pj/.claws-mail/folderlist.xml" <<-EOF + + + + + + + + EOF + +# Generate target's SSH keypair. +rm -f "${target}/home/pj/.ssh/id_rsa" "${target}/home/pj/.ssh/id_rsa.pub" || \ + return 1 +install -o 1000 -g 1000 -m 0600 '/home/pj/.ssh/id_rsa' \ + "${target}/home/pj/.ssh/id_rsa" || return 1 +install -o 1000 -g 1000 -m 0600 '/home/pj/.ssh/id_rsa.pub' \ + "${target}/home/pj/.ssh/id_rsa.pub" || return 1 +#in_target ssh-keygen -b 4096 -C pj@alsvid200 -t rsa -f /home/pj/.ssh/id_rsa \ +#