#!/bin/bash # Copyright (C) 2016 Ian Kelling # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License # as published by the Free Software Foundation; either version 2 # of the License, or (at your option) any later version. # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. set -eE -o pipefail trap 'echo "$0:$LINENO:error: \"$BASH_COMMAND\" returned $?" >&2' ERR usage() { cat <&2; usage 1 ;; esac ;; m) mac=$OPTARG ;; *) echo "$0: Internal error! unexpected args: $*" >&2 ; usage 1 ;; esac done shift "$((OPTIND-1))" # Discard the options and sentinel -- if [[ ! $mac ]] && ! $test && $secrets; then # if we wanted to increment it #mac=${mac:0: -1}$((${mac: -1} + 2)) mac=${rwmac[$rmac]} fi if (( $# != 0 )); then usage 1 fi macpre=${mac:0: -1} macsuf=${mac: -1} p_updated=false pmirror() { if $p_updated; then return fi # background: upgrading all packages is not recommended because it # doesn't go into the firmware. build new firmware if you want # lots of upgrades. I think /tmp/opkg-lists is a pre openwrt 14 location. f=(/var/opkg-lists/*) if ! (( $(date -r $f +%s) + 60*60*24 > $(date +%s) )); then if ! opkg update; then echo "$0: warning: opkg update failed" >&2 fi p_updated=true fi } pi() { to_install=() for p in "$@"; do pname=${p##*/} pname=${pname%%_*} if [[ ! $(opkg list-installed "$pname") ]]; then to_install+=($p) pmirror fi done if [[ $to_install ]]; then opkg install ${to_install[@]} fi } v() { printf "+ %s\n" "$*" "$@" } ######### uci example:####### # # https://wiki.openwrt.org/doc/uci # wan_index=$(uci show firewall | sed -rn 's/firewall\.@zone\[([0-9])+\]\.name=wan/\1/p') # wan="firewall.@zone[$wan_index]" # if [[ $(uci get firewall.@forwarding[0].dest) != $forward_dest ]]; then # # default is wan # v uci set firewall.@forwarding[0].dest=$forward_dest # uci commit firewall # firewall_restart=true # fi ####### end uci example ##### uset() { printf "+ uset %s\n" "$*" local key="$1" local val="$2" local service="${key%%.*}" restart_var=${service}_restart if [[ ! ${!restart_var} ]]; then eval $restart_var=false fi if [[ $(uci get "$key") != "$val" ]]; then v uci set "$key"="$val" uci commit $service eval $restart_var=true fi } udel() { printf "+ udel %s\n" "$*" local key="$1" local val="$2" local service="${key%%.*}" restart_var=${service}_restart if [[ ! ${!restart_var} ]]; then eval $restart_var=false fi if uci get "$key" &>/dev/null; then v uci set "$key"="$val" uci commit $service eval $restart_var=true fi } ### network config ### lan=10.0.0.0 if $test; then lan=10.1.0.0 elif [[ $hostname == cmc ]]; then lan=10.2.0.0 fi if $test; then ssid="gnuv3" elif $secrets; then ssid=${rssid[$rmac]} fi : ${ssid:=librecmc} if $secrets; then key=${rkey[$rmac]} fi : ${key:=pictionary49} mask=255.255.0.0 cidr=16 l=${lan%.0} passwd -l root ||: #already locked fails sed -ibak '/^root:/d' /etc/shadow # /root/router created by manually running passwd then copying the resulting # line. We have no mkpasswd on wrt/librecmc, then we scp it in. cat /root/router >>/etc/shadow # otherwise, serial console gets root login with no password uset system.@system[0].ttylogin 1 cat >/usr/bin/archlike-pxe-mount <<'EOFOUTER' #!/bin/bash # symlinks are collapsed for nfs mount points, so use a bind mount. # tried putting this in /etc/config/fstab, # then doing block mount, it didn't work. This doesn't persist across reboots, # todo: figure that out rm -f /etc/fstab for d in /run/{arch,parabola}iso/bootmnt; do cat >>/etc/fstab </dev/null || mount $d done /etc/init.d/nfsd restart EOFOUTER chmod +x /usr/bin/archlike-pxe-mount sed -i '/^root:/s,/bin/ash$,/bin/bash,' /etc/passwd uset dropbear.@dropbear[0].PasswordAuth 0 uset dropbear.@dropbear[0].RootPasswordAuth 0 uset dropbear.@dropbear[0].Port 2220 if ! cmp -s /root/dropbear_rsa_host_key /etc/dropbear/dropbear_rsa_host_key; then cp /root/dropbear_rsa_host_key /etc/dropbear/dropbear_rsa_host_key dropbear_restart=true fi if $dropbear_restart; then v /etc/init.d/dropbear restart fi uset network.lan.ipaddr $l.$lanip uset network.lan.netmask $mask if $dev2; then uset network.lan.gateway $l.1 uset network.wan.proto none uset network.wan6.proto none /etc/init.d/dnsmasq stop /etc/init.d/dnsmasq disable /etc/init.d/odhcpd stop /etc/init.d/odhcpd disable rm -f /etc/resolv.conf cat >/etc/resolv.conf <<'EOF' nameserver 8.8.8.8 nameserver 8.8.4.4 EOF # things i tried to keep dnsmasq running but not enabled except local dns, # but it didnt work right and i dont need it anyways. # uset dhcp.wan.ignore $dev2 # default is false # uset dhcp.lan.ignore $dev2 # default is false # uset dhcp.@dnsmasq[0].interface lo # uset dhcp.@dnsmasq[0].localuse 0 # uset dhcp.@dnsmasq[0].resolvfile /etc/dnsmasq.conf # uset dhcp.@dnsmasq[0].noresolv 1 # todo: populate /etc/resolv.conf with a static value else # these are the defaults uset network.lan.gateway '' uset network.wan.proto dhcp uset network.wan6.proto dhcpv6 /etc/init.d/dnsmasq start # todo: figure out why this returns 1 /etc/init.d/dnsmasq enable ||: /etc/init.d/odhcpd start /etc/init.d/odhcpd enable fi wireless_restart=false for x in 0 1; do uset wireless.default_radio$x.ssid "$ssid" uset wireless.default_radio$x.key $key uset wireless.default_radio$x.encryption psk2 if [[ $mac ]]; then uset wireless.default_radio$x.macaddr $macpre$((macsuf + 2*x)) fi # secondary device has wireless disabled uset wireless.radio$x.disabled $dev2 done if $wireless_restart; then v wifi fi # usb, screen, relay are for libremanage # rsync is for brc v pi kmod-usb-storage block-mount kmod-fs-ext4 nfs-kernel-server \ tcpdump openvpn-openssl adblock libusb-compat /root/relay_1.0-1_mips_24kc.ipk \ screen kmod-usb-serial-cp210x kmod-usb-serial-ftdi rsync cat >/etc/libremanage.conf </dev/null; then # cant mix cedit plus uci echo | cedit /etc/config/firewall ||: uci add_list firewall.@zone[1].network=wg0 uci commit firewall firewall-cedit ||: firewall_restart=true fi v cedit /etc/hosts </etc/crontabs/root <<'EOF' 0 06 * * * /etc/init.d/adblock reload EOF # useful: http://wiki.openwrt.org/doc/howto/dhcp.dnsmasq # sometimes /mnt/usb fails, cuz it's just a flash drive, # so make sure we have this dir or else dnsmasq will fail # to start. mkdir -p /mnt/usb/tftpboot v cedit /etc/dnsmasq.conf < # default dhcp range is 100-150 # bottom port, iPXE (PCI 03:00.0) in seabios boot menu dhcp-host=c8:60:00:31:6b:75,set:kd,$l.2,kd # top port, iPXE (PCI 04:00.0) in seabios boot menu #dhcp-host=c8:60:00:2b:15:07,set:kd,$l.2,kd dhcp-host=00:26:18:97:bb:16,set:frodo,$l.3,frodo # 4 is reserved for a staticly configured host. # old x2 with bad fan #dhcp-host=00:1f:16:16:39:24,set:x2,$l.5,x2 dhcp-host=f0:de:f1:81:ec:88,set:x2,$l.5,x2 # This is so fai can have an explicit name to use for testing, # or else any random machine which did a pxe boot would get # reformatted. The mac is from doing a virt-install, cancelling it, # and copying the generated mac, so it should be randomish. dhcp-host=52:54:00:9c:ef:ad,set:demohost,$l.6,demohost dhcp-host=00:1f:16:14:01:d8,set:tp,$l.7,x3 dhcp-host=80:fa:5b:1c:6e:cf,set:tp,$l.8,tp # faiserver vm dhcp-host=52:54:00:56:09:f9,set:faiserver,$l.15,faiserver # This is the ip it picks by default if dhcp fails, # so might as well use it. # hostname is the name it uses according to telnet dhcp-host=b4:75:0e:94:29:ca,set:switch9429ca,$l.251,switch9429ca # template # dhcp-host=,$l., # Just leave the tftp server up even if we aren't doing pxe boot. # It has no sensitive info. enable-tftp=br-lan tftp-root=/mnt/usb/tftpboot dhcp-optsfile=/etc/dnsmasq-dhcpopts.conf EOF if $dnsmasq_restart && ! $dev2; then v /etc/init.d/dnsmasq restart fi if $firewall_restart; then v /etc/init.d/firewall restart fi # todo: we should catch errors and still run this if needed if $network_restart; then reboot fi exit 0