206 lines
6.2 KiB
Bash
Executable file
206 lines
6.2 KiB
Bash
Executable file
#!/bin/bash
|
|
|
|
set -e
|
|
exec 2> >(while read line; do echo -e "\e[01;31m$line\e[0m"; done)
|
|
|
|
script_name="$(basename "$0")"
|
|
dotfiles_dir="$(
|
|
cd "$(dirname "$0")"
|
|
pwd
|
|
)"
|
|
cd "$dotfiles_dir"
|
|
|
|
if (("$EUID")); then
|
|
sudo -s "$dotfiles_dir/$script_name" "$@"
|
|
exit 0
|
|
fi
|
|
|
|
if [ "$1" = "-r" ]; then
|
|
echo >&2 "Running in reverse mode!"
|
|
reverse=1
|
|
fi
|
|
|
|
copy() {
|
|
if [ -z "$reverse" ]; then
|
|
orig_file="$dotfiles_dir/$1"
|
|
dest_file="/$1"
|
|
else
|
|
orig_file="/$1"
|
|
dest_file="$dotfiles_dir/$1"
|
|
fi
|
|
|
|
mkdir -p "$(dirname "$orig_file")"
|
|
mkdir -p "$(dirname "$dest_file")"
|
|
|
|
rm -rf "$dest_file"
|
|
|
|
cp -R "$orig_file" "$dest_file"
|
|
if [ -z "$reverse" ]; then
|
|
[ -n "$2" ] && chmod "$2" "$dest_file"
|
|
else
|
|
chown -R $USER "$dest_file"
|
|
fi
|
|
echo "$dest_file <= $orig_file"
|
|
}
|
|
|
|
is_chroot() {
|
|
! cmp -s /proc/1/mountinfo /proc/self/mountinfo
|
|
}
|
|
|
|
systemctl_enable() {
|
|
echo "systemctl enable "$1""
|
|
systemctl enable "$1"
|
|
}
|
|
|
|
systemctl_enable_start() {
|
|
echo "systemctl enable --now "$1""
|
|
systemctl enable "$1"
|
|
systemctl start "$1"
|
|
}
|
|
|
|
echo ""
|
|
echo "=========================="
|
|
echo "Setting up /etc configs..."
|
|
echo "=========================="
|
|
|
|
copy "etc/kernel/cmdline"
|
|
copy "etc/sysctl.d/20-quiet-printk.conf"
|
|
copy "etc/modprobe.d/i915.conf"
|
|
#copy "etc/aurutils/pacman-x86_64.conf"
|
|
copy "etc/bluetooth/main.conf"
|
|
#copy "etc/conf.d/snapper"
|
|
#copy "etc/default/earlyoom"
|
|
#copy "etc/docker/daemon.json"
|
|
#copy "etc/fwupd/uefi_capsule.conf"
|
|
#copy "etc/modules-load.d/v4l2loopback.conf"
|
|
#copy "etc/modprobe.d/v4l2loopback.conf"
|
|
#copy "etc/nftables.conf"
|
|
#copy "etc/pacman.conf"
|
|
#copy "etc/pacman.d/hooks"
|
|
#copy "etc/pam.d/polkit-1"
|
|
#copy "etc/pam.d/sudo"
|
|
copy "etc/snap-pac.ini"
|
|
copy "etc/snapper/configs/root"
|
|
#copy "etc/ssh/ssh_config"
|
|
copy "etc/sudoers.d/override"
|
|
#copy "etc/sysctl.d/99-sysctl.conf"
|
|
#copy "etc/systemd/journald.conf.d/override.conf"
|
|
#copy "etc/systemd/logind.conf.d/override.conf"
|
|
copy "etc/systemd/network/20-wired.network"
|
|
copy "etc/systemd/network/25-wireless.network"
|
|
copy "etc/iwd/main.conf"
|
|
copy "etc/mkinitcpio.conf"
|
|
#copy "etc/systemd/resolved.conf.d/dnssec.conf"
|
|
copy "etc/systemd/system/getty@tty1.service.d/override.conf"
|
|
#copy "etc/systemd/system/usbguard.service.d/override.conf"
|
|
#copy "etc/systemd/system/reflector.service"
|
|
#copy "etc/systemd/system/reflector.timer"
|
|
#copy "etc/systemd/system/system-dotfiles-sync.service"
|
|
#copy "etc/systemd/system/system-dotfiles-sync.timer"
|
|
#copy "etc/systemd/system.conf.d/kill-fast.conf"
|
|
#copy "etc/usbguard/usbguard-daemon.conf" 600
|
|
#copy "etc/systemd/system/backup-repo@pkgbuild"
|
|
#copy "etc/systemd/system/backup-repo@.service"
|
|
#copy "etc/systemd/system/backup-repo@.timer"
|
|
|
|
(("$reverse")) && exit 0
|
|
|
|
echo ""
|
|
echo "================================="
|
|
echo "Enabling and starting services..."
|
|
echo "================================="
|
|
|
|
sysctl --system > /dev/null
|
|
|
|
systemctl daemon-reload
|
|
systemctl_enable_start "bluetooth.service"
|
|
#systemctl_enable_start "btrfs-scrub@-.timer"
|
|
#systemctl_enable_start "btrfs-scrub@mnt-btrfs\x2droot.timer"
|
|
#systemctl_enable_start "btrfs-scrub@home.timer"
|
|
#systemctl_enable_start "btrfs-scrub@var-cache-pacman.timer"
|
|
#systemctl_enable_start "btrfs-scrub@var-log.timer"
|
|
#systemctl_enable_start "btrfs-scrub@var-tmp.timer"
|
|
#systemctl_enable_start "btrfs-scrub@\x2esnapshots.timer"
|
|
#systemctl_enable_start "btrfs-scrub@var-lib-aurbuild.timer"
|
|
#systemctl_enable_start "btrfs-scrub@var-lib-archbuild.timer"
|
|
#systemctl_enable_start "btrfs-scrub@var-lib-docker.timer"
|
|
#systemctl_enable_start "docker.socket"
|
|
#systemctl_enable_start "earlyoom.service"
|
|
systemctl_enable_start "fstrim.timer"
|
|
systemctl_enable_start "iwd.service"
|
|
#systemctl_enable_start "linux-modules-cleanup.service"
|
|
#systemctl_enable_start "lenovo_fix.service"
|
|
#systemctl_enable_start "nftables.service"
|
|
systemctl_enable_start "pcscd.socket"
|
|
#systemctl_enable_start "reflector.timer"
|
|
#systemctl_enable_start "snapper-cleanup.timer"
|
|
#systemctl_enable_start "system-dotfiles-sync.timer"
|
|
systemctl_enable_start "systemd-networkd.socket"
|
|
systemctl_enable_start "systemd-resolved.service"
|
|
systemctl_enable_start "systemd-timesyncd"
|
|
#systemctl_enable_start "tlp.service"
|
|
|
|
#if [ ! -s "/etc/usbguard/rules.conf" ]; then
|
|
# echo >&2 "=== Remember to set usbguard rules: usbguard generate-policy >! /etc/usbguard/rules.conf"
|
|
#else
|
|
# chmod 600 /etc/usbguard/rules.conf
|
|
# systemctl_enable_start "usbguard.service"
|
|
# systemctl_enable_start "usbguard-dbus.service"
|
|
#fi
|
|
|
|
#systemctl_enable_start "backup-repo@pkgbuild.timer"
|
|
|
|
#echo ""
|
|
#echo "==============================="
|
|
#echo "Creating top level Trash dir..."
|
|
#echo "==============================="
|
|
#mkdir --parent /.Trash
|
|
#chmod a+rw /.Trash
|
|
#chmod +t /.Trash
|
|
#echo "Done"
|
|
|
|
echo ""
|
|
echo "======================================="
|
|
echo "Finishing various user configuration..."
|
|
echo "======================================="
|
|
|
|
if is_chroot; then
|
|
echo >&2 "=== Running in chroot, skipping /etc/resolv.conf setup..."
|
|
else
|
|
echo "Configuring /etc/resolv.conf"
|
|
ln -sf /run/systemd/resolve/stub-resolv.conf /etc/resolv.conf
|
|
fi
|
|
|
|
echo "Configuring NTP"
|
|
timedatectl set-ntp true
|
|
|
|
echo "Configuring aurutils"
|
|
ln -sf /etc/pacman.conf /etc/aurutils/pacman-tobias-local.conf
|
|
|
|
PLYMOUTH_THEME="spinner"
|
|
if [ "$(plymouth-set-default-theme)" != "$PLYMOUTH_THEME" ]; then
|
|
echo "Configuring plymouth"
|
|
plymouth-set-default-theme "$PLYMOUTH_THEME"
|
|
fi
|
|
|
|
echo "Configuring mkinitcpio + secure boot"
|
|
|
|
mkinitcpio -P
|
|
|
|
if [ ! -s "/etc/arch-secure-boot/keys/PK.auth" ]; then
|
|
arch-secure-boot initial-setup
|
|
else
|
|
arch-secure-boot generate-efi
|
|
fi
|
|
|
|
if [ ! -f /efi/EFI/secureboot/KeyTool-signed.efi ]; then
|
|
echo "Preparing KeyTool to allow install PK key"
|
|
mkdir -p /efi/EFI/secureboot
|
|
sbsign --key /etc/arch-secure-boot/keys/db.key --cert /etc/arch-secure-boot/keys/db.crt --output /efi/EFI/secureboot/KeyTool-signed.efi /usr/share/efitools/efi/KeyTool.efi
|
|
cp /etc/secureboot/keys/PK/PK.auth /efi/EFI/secureboot/PK.auth
|
|
mount="$(findmnt -n -o SOURCE -T "/efi")"
|
|
partition="${mount##*[!0-9]}"
|
|
entry="/EFI/secureboot/KeyTool-signed.efi"
|
|
efibootmgr -d "$mount" -p "$partition" -c -l "${entry//\//\\}" -L "KeyTool"
|
|
echo "Reboot into KeyTool and install PK key (EFI/secureboot/PK.auth) to UEFI"
|
|
fi
|