#!/bin/bash # Copyright (C) 2016 Ian Kelling # Licensed under the Apache License, Version 2.0 (the "License"); # you may not use this file except in compliance with the License. # You may obtain a copy of the License at # http://www.apache.org/licenses/LICENSE-2.0 # Unless required by applicable law or agreed to in writing, software # distributed under the License is distributed on an "AS IS" BASIS, # WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. # See the License for the specific language governing permissions and # limitations under the License. set -eE -o pipefail trap 'echo "$0:$LINENO:error: \"$BASH_COMMAND\" returned $?" >&2' ERR [[ $EUID == 0 ]] || exec sudo -E "${BASH_SOURCE[0]}" "$@" # leftover if [[ -L /root/.ssh ]]; then rm /root/.ssh fi mkdir -p /root/.ssh chmod 700 /root/.ssh user=$(id -un 1000) user_ssh_dir=$(eval echo ~$user)/.ssh if [[ ! -s $user_ssh_dir/authorized_keys ]]; then echo missing $user_ssh_dir/authorized_keys. bad sign. bailing >&2 exit 1 fi # remove broken links, or else rsync has error about them. find $user_ssh_dir -xtype l -exec rm '{}' \; # -t times, so it won't rewrite the file every time, # -L resolve links rsync --exclude=/h --exclude=/h.pub \ --exclude=/hrsa --exclude=/hrsa.pub \ --exclude /config --exclude /confighome -rtL --delete $user_ssh_dir/ /root/.ssh if [[ -e /q/root/h ]]; then cp -a /q/root/{h,hrsa}{,.pub} /root/.ssh fi if [[ -e $user_ssh_dir/config ]]; then ### The h key is like the home key, but only a whitelist of commands allowed, and # not encrypted, so cron and whatnot can use it. # For any interactive ssh command we want to run as root that is not in that # whitelist, we need to ssh -F $HOME/.ssh/confighome ### I run a separate ssh-agent for root where I add keys without # confirm. This the root ssh-agent is only available # to root, and it allows us to have a working ssh when X isnt available, # eg, in an ssh shell. confirm for regular user provides some protection # that a rouge user program cant use my ssh key. sed 's,^AddKeysToAgent confirm,AddKeysToAgent yes,;/^UserKnownHostsFile /d' $user_ssh_dir/config >/root/.ssh/confighome sed 's,^IdentityFile ~/\.ssh/home$,IdentityFile ~/\.ssh/h,' /root/.ssh/confighome >/root/.ssh/config fi chown -R root:root /root/.ssh # notably: installs hssh /a/exe/install-my-scripts if [[ -e /a/opt/btrbk/ssh_filter_btrbk.sh ]]; then install /a/opt/btrbk/ssh_filter_btrbk.sh /usr/local/bin fi if [[ -e /etc/systemd/system/ssh-agent-root.service ]]; then systemctl enable --now ssh-agent-root fi d=/etc/initramfs-tools if [[ -e $d ]] && ! diff -q /root/.ssh/authorized_keys $d/root/.ssh/authorized_keys &>/dev/null; then mkdir -p $d/root/.ssh /etc/dropbear-initramfs chmod 700 $d/root $d/root/.ssh cp -p /root/.ssh/authorized_keys $d/root/.ssh/authorized_keys cp -p /root/.ssh/authorized_keys /etc/dropbear-initramfs if [[ -e /root/.ssh/authorized_keys2 ]]; then cat /root/.ssh/authorized_keys2 >>/etc/dropbear-initramfs fi update-initramfs -u -k all fi