#!/bin/bash # Copyright (C) 2016 Ian Kelling # This program is free software; you can redistribute it and/or # modify it under the terms of the GNU General Public License # as published by the Free Software Foundation; either version 2 # of the License, or (at your option) any later version. # This program is distributed in the hope that it will be useful, # but WITHOUT ANY WARRANTY; without even the implied warranty of # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the # GNU General Public License for more details. # You should have received a copy of the GNU General Public License # along with this program; if not, write to the Free Software # Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA. set -eE -o pipefail trap 'echo "$0:$LINENO:error: \"$BASH_COMMAND\" returned $?" >&2' ERR usage() { cat <&2; usage 1 ;; esac ;; m) mac=$OPTARG ;; *) echo "$0: Internal error! unexpected args: $*" >&2 ; usage 1 ;; esac done shift "$((OPTIND-1))" # Discard the options and sentinel -- if [[ ! $mac ]] && ! $test; then # if we wanted to increment it #WIRELESSMAC=${WIRELESSMAC:0: -1}$((${WIRELESSMAC: -1} + 2)) mac=$WIRELESSMAC fi if (( $# != 0 )); then usage 1 fi macpre=${mac:0: -1} macsuf=${mac: -1} pmirror() { # background: upgrading all packages is not recommended because it # doesn't go into the firmware. build new firmware if you want # lots of upgrades. I think /tmp/opkg-lists is a pre openwrt 14 location. f=(/var/opkg-lists/*) if ! (( $(date -r $f +%s) + 60*60*24 > $(date +%s) )); then opkg update fi } pi() { for x in "$@"; do if [[ ! $(opkg list-installed "$x") ]]; then pmirror opkg install "$@" fi done } v() { printf "+ %s\n" "$*" "$@" } ######### uci example:####### # # https://wiki.openwrt.org/doc/uci # wan_index=$(uci show firewall | sed -rn 's/firewall\.@zone\[([0-9])+\]\.name=wan/\1/p') # wan="firewall.@zone[$wan_index]" # if [[ $(uci get firewall.@forwarding[0].dest) != $forward_dest ]]; then # # default is wan # v uci set firewall.@forwarding[0].dest=$forward_dest # uci commit firewall # firewall_restart=true # fi ####### end uci example ##### uset() { local key="$1" local val="$2" local service="${key%%.*}" restart_var=${service}_restart if [[ ! ${!restart_var} ]]; then eval $restart_var=false fi if [[ $(uci get "$key") != "$val" ]]; then v uci set "$key"="$val" uci commit $service eval $restart_var=true fi } ### network config ### ssid="check out gnu.org" lan=10.0.0.0 if $test; then ssid="gnuv3" lan=10.1.0.0 fi mask=255.255.0.0 cidr=16 l=${lan%.0} passwd -l root ||: #already locked fails sed -ibak '/^root:/d' /etc/shadow # /root/router created by manually running passwd then copying the resulting # line. We have no mkpasswd on wrt/librecmc, then we scp it in. cat /root/router >>/etc/shadow # otherwise, serial console gets root login with no password uset system.@system[0].ttylogin 1 cat >/usr/bin/archlike-pxe-mount <<'EOFOUTER' #!/bin/bash # symlinks are collapsed for nfs mount points, so use a bind mount. # tried putting this in /etc/config/fstab, # then doing block mount, it didn't work. This doesn't persist across reboots, # todo: figure that out rm -f /etc/fstab for d in /run/{arch,parabola}iso/bootmnt; do cat >>/etc/fstab </dev/null || mount $d done /etc/init.d/nfsd restart EOFOUTER chmod +x /usr/bin/archlike-pxe-mount sed -i '/^root:/s,/bin/ash$,/bin/bash,' /etc/passwd # usb, screen, relay are for libremanage v pi kmod-usb-storage block-mount kmod-fs-ext4 nfs-kernel-server \ tcpdump openvpn-openssl adblock libusb-compat /root/relay_1.0-1_mips_24kc.ipk \ screen kmod-usb-serial-cp210x kmod-usb-serial-ftdi cat >/etc/libremanage.conf </dev/null) ]]; then # default is '/tmp/resolv.conf.auto', we switch to the dnsmasq default of # /etc/resolv.conf. not sure why I did this. v uci delete dhcp.@dnsmasq[0].resolvfile uci commit dhcp dnsmasq_restart=true fi uset dhcp.@dnsmasq[0].domain b8.nz uset dhcp.@dnsmasq[0].local /b8.nz/ uset system.@system[0].hostname $hostname if [[ $(uci get adblock.global.adb_enabled) != 1 ]]; then v uci set adblock.global.adb_enabled=1 uci commit adblock /etc/init.d/adblock restart fi # https://github.com/openwrt/packages/tree/master/net/adblock/files cat >/etc/crontabs/root <<'EOF' 0 06 * * * /etc/init.d/adblock reload EOF # useful: http://wiki.openwrt.org/doc/howto/dhcp.dnsmasq # sometimes /mnt/usb fails, cuz it's just a flash drive, # so make sure we have this dir or else dnsmasq will fail # to start. mkdir -p /mnt/usb/tftpboot v cedit /etc/dnsmasq.conf < # default dhcp range is 100-150 # bottom port, iPXE (PCI 03:00.0) in seabios boot menu dhcp-host=c8:60:00:31:6b:75,set:kd,$l.2,kd # top port, iPXE (PCI 04:00.0) in seabios boot menu #dhcp-host=c8:60:00:2b:15:07,set:kd,$l.2,kd dhcp-host=00:26:18:97:bb:16,set:frodo,$l.3,frodo # 4 is reserved for a staticly configured host. dhcp-host=00:1f:16:16:39:24,set:x2,$l.5,x2 # This is so fai can have an explicit name to use for testing, # or else any random machine which did a pxe boot would get # reformatted. The mac is from doing a virt-install, cancelling it, # and copying the generated mac, so it should be randomish. dhcp-host=52:54:00:9c:ef:ad,set:demohost,$l.6,demohost dhcp-host=00:1f:16:14:01:d8,set:tp,$l.7,x3 dhcp-host=80:fa:5b:1c:6e:cf,set:tp,$l.8,tp # faiserver vm dhcp-host=52:54:00:56:09:f9,set:faiserver,$l.15,faiserver # This is the ip it picks by default if dhcp fails, # so might as well use it. # hostname is the name it uses according to telnet dhcp-host=b4:75:0e:94:29:ca,set:switch9429ca,$l.251,switch9429ca # template # dhcp-host=,$l., # Just leave the tftp server up even if we aren't doing pxe boot. # It has no sensitive info. enable-tftp=br-lan tftp-root=/mnt/usb/tftpboot EOF uset network.lan.ipaddr $l.$lanip uset network.lan.netmask $mask uset dhcp.wan.ignore $dev2 # default is false uset dhcp.lan.ignore $dev2 # default is false if $dev2; then uset network.lan.gateway $l.1 uset network.wan.proto none uset network.wan6.proto none else # these are the defaults uset network.lan.gateway '' uset network.wan.proto dhcp uset network.wan6.proto dhcpv6 fi if $dnsmasq_restart; then v /etc/init.d/dnsmasq restart fi if $firewall_restart; then v /etc/init.d/firewall restart fi if $network_restart; then reboot fi if $dropbear_restart; then v /etc/init.d/dropbear restart fi exit 0