4
# This is an example hook script. It will be run by 'mkinitramfs'
5
# when it creates the image. It's job is to decide which files to
6
# install, then install them into the staging area, where the
7
# initramfs is being created. This happens when a new 'linux-image'
8
# package is installed, or when the administrator runs 'mkinitramfs'
9
# by hand to update an initramfs image.
11
# TODO: What about the case where you install something that should be
12
# added to the initramfs, but the linux-image it relates to has
13
# already been installed previously? Does this happen often
14
# enough that it needs to be handled? How can it be handled?
16
# * Think about the 'usplash'. The initramfs will need to be
17
# updated if a theme change or update is desired. Maybe it
18
# should not be totally automatic, but offered on upgrade
19
# predicated on a user response to a debconf question? That
20
# issue needs to be explored and a solution specified.
22
# * Do not assume that any needed subdirectories have been created
23
# yet, but don't bail out if they are already there.
25
# * All of the standard system tools are available, of course, since
26
# this hook is running in the real system, not the initramfs.
28
# * TODO: ... ? Anything else to tell them in this bullet-list?
3
# This script will be run by 'mkinitramfs' when it creates the image.
4
# Its job is to decide which files to install, then install them into
5
# the staging area, where the initramfs is being created. This
6
# happens when a new 'linux-image' package is installed, or when the
7
# administrator runs 'update-initramfs' by hand to update an initramfs
32
10
# The environment contains at least:
34
# CONFDIR -- usually /etc/mkinitramfs, can be set on mkinitramfs
37
# DESTDIR -- The staging directory where we are building the image.
39
# TODO: Decide what environment variables are meaningful and defined
40
# in this context, then document them as part of the interface.
42
# TODO: May need a version_compare function for comparison of VERSION?
46
# List the soft prerequisites here. This is a space separated list of
47
# names, of scripts that are in the same directory as this one, that
48
# must be run before this one can be.
12
# DESTDIR -- The staging directory where the image is being built.
14
# No initramfs pre-requirements
66
# You can do anything you need to from here on.
69
# Source the optional 'hook-functions' scriptlet, if you need the
70
# functions defined within it. Read it to see what is available to
71
# you. It contains functions for copying dynamically linked program
72
# binaries, and kernel modules into the DESTDIR.
74
30
. /usr/share/initramfs-tools/hook-functions
32
for d in /usr /usr/local; do
33
if [ -d "$d"/lib/mandos ]; then
38
if [ -z "$prefix" ]; then
43
for d in /etc/keys/mandos /etc/mandos/keys; do
49
if [ -z "$keydir" ]; then
50
# Mandos key directory not found
54
mandos_user="`{ getent passwd _mandos \
55
|| getent passwd mandos \
56
|| getent passwd nobody \
57
|| echo ::65534::::; } \
58
| cut --delimiter=: --fields=3 --only-delimited`"
59
mandos_group="`{ getent group _mandos \
60
|| getent group mandos \
61
|| getent group nogroup \
63
| cut --delimiter=: --fields=3 --only-delimited`"
65
# The Mandos network client uses the network
76
66
auto_add_modules net
67
# The Mandos network client uses IPv6
70
# These are directories inside the initrd
80
71
CONFDIR="/conf/conf.d/mandos"
81
DESTCONFDIR="${DESTDIR}${CONFDIR}"
82
mkdir --parents "${DESTCONFDIR}"
83
PLUGINDIR="${CONFDIR}/plugins.d"
84
mkdir --parents "${DESTDIR}${PLUGINDIR}"
86
# We don't need to copy_exec mandos-client, hooks/cryptroot will do
87
# that. That will not copy the plugins, however, so we do that here.
89
# The standard plugins
90
for file in /usr/lib/mandos/plugins.d/*; do
72
MANDOSDIR="/lib/mandos"
73
PLUGINDIR="${MANDOSDIR}/plugins.d"
76
install --directory --mode=u=rwx,go=rx "${DESTDIR}${CONFDIR}" \
77
"${DESTDIR}${MANDOSDIR}"
78
install --owner=${mandos_user} --group=${mandos_group} --directory \
79
--mode=u=rwx "${DESTDIR}${PLUGINDIR}"
81
# Copy the Mandos plugin runner
82
copy_exec "$prefix"/lib/mandos/plugin-runner "${MANDOSDIR}"
86
# Copy the packaged plugins
87
for file in "$prefix"/lib/mandos/plugins.d/*; do
91
88
base="`basename \"$file\"`"
92
89
# Is this plugin overridden?
93
90
if [ -e "/etc/mandos/plugins.d/$base" ]; then
97
*~|.*|\#*\#|*.dpkg-old|*.dpkg-new|*.dpkg-divert) : ;;
98
*) copy_exec "$file" "${PLUGINDIR}";;
94
*~|.*|\#*\#|*.dpkg-old|*.dpkg-bak|*.dpkg-new|*.dpkg-divert) : ;;
95
*/"*") echo "W: Mandos client plugin directory is empty." >&2 ;;
96
*) copy_exec "$file" "${PLUGINDIR}" ;;
102
# Any user-supplied plugins
100
# Copy any user-supplied plugins
103
101
for file in /etc/mandos/plugins.d/*; do
104
102
base="`basename \"$file\"`"
106
*~|.*|*.dpkg-old|*.dpkg-new|*.dpkg-divert) : ;;
107
*) copy_exec "$file" "${PLUGINDIR}";;
104
*~|.*|\#*\#|*.dpkg-old|*.dpkg-bak|*.dpkg-new|*.dpkg-divert) : ;;
106
*) copy_exec "$file" "${PLUGINDIR}" ;;
111
110
# GPGME needs /usr/bin/gpg
112
if [ -n "`ls \"${DESTDIR}\"/usr/lib/libgpgme.so* 2>/dev/null`" ]; then
111
if [ ! -e "${DESTDIR}/usr/bin/gpg" \
112
-a -n "`ls \"${DESTDIR}\"/usr/lib/libgpgme.so* \
113
2>/dev/null`" ]; then
113
114
copy_exec /usr/bin/gpg
117
118
for file in /etc/mandos/*; do
118
119
if [ -d "$file" ]; then
121
cp --archive --sparse=always "$file" "${DESTCONFDIR}"
123
# Create key ring files
124
LANG=C gpg --quiet --batch --no-tty --no-options \
125
--homedir "${DESTCONFDIR}" --no-permission-warning \
126
--import "${DESTCONFDIR}/seckey.txt" \
127
--import-options import-minimal
128
chown nobody "${DESTCONFDIR}/secring.gpg"
130
# /keyscripts/mandos-client will drop priviliges, but needs access to
131
# its plugin directory. However, since almost all files in initrd
132
# have been created with umask 027, this opening of permissions is needed.
122
cp --archive --sparse=always "$file" "${DESTDIR}${CONFDIR}"
125
if [ ${mandos_user} != 65534 ]; then
126
PLUGINRUNNERCONF="${DESTDIR}${CONFDIR}/plugin-runner.conf"
127
cat <<-EOF >> "$PLUGINRUNNERCONF"
129
--userid=${mandos_user}
133
if [ ${mandos_group} != 65534 ]; then
134
PLUGINRUNNERCONF="${DESTDIR}${CONFDIR}/plugin-runner.conf"
135
cat <<-EOF >> "$PLUGINRUNNERCONF"
137
--groupid=${mandos_group}
142
for file in "$keydir"/*; do
143
if [ -d "$file" ]; then
146
cp --archive --sparse=always "$file" "${DESTDIR}${CONFDIR}"
147
chown ${mandos_user}:${mandos_group} \
148
"${DESTDIR}${CONFDIR}/`basename \"$file\"`"
151
# /lib/mandos/plugin-runner will drop priviliges, but needs access to
152
# its plugin directory and its config file. However, since almost all
153
# files in initrd have been created with umask 027, this opening of
154
# permissions is needed.
134
156
# (The umask is not really intended to affect the files inside the
135
# initrd, but the initrd.img file itself, since it now contains secret
136
# key files. There is, however, no other way to set the permission of
137
# the initrd.img file without a race condition. This umask is set by
138
# "/usr/share/initramfs-tools/conf-hooks.d/mandos".)
157
# initrd; it is intended to affect the initrd.img file itself, since
158
# it now contains secret key files. There is, however, no other way
159
# to set the permission of the initrd.img file without a race
160
# condition. This umask is set by "initramfs-tools-hook-conf",
161
# installed as "/usr/share/initramfs-tools/conf-hooks.d/mandos".)
141
while [ "$full" != "/" ]; do
142
chmod a+rX "${DESTDIR}$full"
143
full="`dirname \"$full\"`"
163
for full in "${MANDOSDIR}" "${CONFDIR}"; do
164
while [ "$full" != "/" ]; do
165
chmod a+rX "${DESTDIR}$full"
166
full="`dirname \"$full\"`"
170
# Reset some other things to sane permissions which we have
171
# inadvertently affected with our umask setting.
145
172
for dir in / /bin /etc /keyscripts /sbin /scripts /usr /usr/bin; do
146
chmod a+rX "${DESTDIR}$dir"
173
if [ -d "${DESTDIR}$dir" ]; then
174
chmod a+rX "${DESTDIR}$dir"
148
for dir in /lib /usr/lib; do
149
chmod --recursive a+rX "${DESTDIR}$dir"
177
for dir in "${DESTDIR}"/lib* "${DESTDIR}"/usr/lib*; do
178
if [ -d "$dir" ]; then
179
find "$dir" \! -perm -u+rw,g+r -prune -or -print0 \
180
| xargs --null --no-run-if-empty chmod a+rX