| 
				
			 | 
			
			
				@@ -69,6 +69,8 @@ SSH_PORT=2222 
			 | 
		
	
		
			
			| 
				69
			 | 
			
				69
			 | 
			
			
				 # Whether sites are accessible only within a Tor browser 
			 | 
		
	
		
			
			| 
				70
			 | 
			
				70
			 | 
			
			
				 ONION_ONLY="no" 
			 | 
		
	
		
			
			| 
				71
			 | 
			
				71
			 | 
			
			
				  
			 | 
		
	
		
			
			| 
				
			 | 
			
				72
			 | 
			
			
				+WIFI_INTERFACE='wlan0' 
			 | 
		
	
		
			
			| 
				
			 | 
			
				73
			 | 
			
			
				+ 
			 | 
		
	
		
			
			| 
				72
			 | 
			
				74
			 | 
			
			
				 enable_eatmydata_override() { 
			 | 
		
	
		
			
			| 
				73
			 | 
			
				75
			 | 
			
			
				     chroot $rootdir apt-get install --no-install-recommends -y eatmydata 
			 | 
		
	
		
			
			| 
				74
			 | 
			
				76
			 | 
			
			
				     if [ -x $rootdir/usr/bin/eatmydata ] && \ 
			 | 
		
	
	
		
			
			| 
				
			 | 
			
			
				@@ -391,7 +393,7 @@ mesh_avahi() { 
			 | 
		
	
		
			
			| 
				391
			 | 
			
				393
			 | 
			
			
				     echo '</service-group>' >> $rootdir/etc/avahi/services/ssh.service 
			 | 
		
	
		
			
			| 
				392
			 | 
			
				394
			 | 
			
			
				  
			 | 
		
	
		
			
			| 
				393
			 | 
			
				395
			 | 
			
			
				     # keep the daemon running 
			 | 
		
	
		
			
			| 
				394
			 | 
			
				
			 | 
			
			
				-	WATCHDOG_SCRIPT_NAME="keepon" 
			 | 
		
	
		
			
			| 
				
			 | 
			
				396
			 | 
			
			
				+    WATCHDOG_SCRIPT_NAME="keepon" 
			 | 
		
	
		
			
			| 
				395
			 | 
			
				397
			 | 
			
			
				     echo '' >> $rootdir/usr/bin/$WATCHDOG_SCRIPT_NAME 
			 | 
		
	
		
			
			| 
				396
			 | 
			
				398
			 | 
			
			
				     echo '# keep avahi daemon running' >> $rootdir/usr/bin/$WATCHDOG_SCRIPT_NAME 
			 | 
		
	
		
			
			| 
				397
			 | 
			
				399
			 | 
			
			
				     echo 'AVAHI_RUNNING=$(pgrep avahi-daemon > /dev/null && echo Running)' >> $rootdir/usr/bin/$WATCHDOG_SCRIPT_NAME 
			 | 
		
	
	
		
			
			| 
				
			 | 
			
			
				@@ -400,10 +402,10 @@ mesh_avahi() { 
			 | 
		
	
		
			
			| 
				400
			 | 
			
				402
			 | 
			
			
				     echo '  echo -n $CURRENT_DATE >> $LOGFILE' >> $rootdir/usr/bin/$WATCHDOG_SCRIPT_NAME 
			 | 
		
	
		
			
			| 
				401
			 | 
			
				403
			 | 
			
			
				     echo '  echo " Avahi daemon restarted" >> $LOGFILE' >> $rootdir/usr/bin/$WATCHDOG_SCRIPT_NAME 
			 | 
		
	
		
			
			| 
				402
			 | 
			
				404
			 | 
			
			
				     echo 'fi' >> $rootdir/usr/bin/$WATCHDOG_SCRIPT_NAME 
			 | 
		
	
		
			
			| 
				403
			 | 
			
				
			 | 
			
			
				-	chmod +x $rootdir/usr/bin/$WATCHDOG_SCRIPT_NAME 
			 | 
		
	
		
			
			| 
				
			 | 
			
				405
			 | 
			
			
				+    chmod +x $rootdir/usr/bin/$WATCHDOG_SCRIPT_NAME 
			 | 
		
	
		
			
			| 
				404
			 | 
			
				406
			 | 
			
			
				 } 
			 | 
		
	
		
			
			| 
				405
			 | 
			
				407
			 | 
			
			
				  
			 | 
		
	
		
			
			| 
				406
			 | 
			
				
			 | 
			
			
				-function mesh_batman { 
			 | 
		
	
		
			
			| 
				
			 | 
			
				408
			 | 
			
			
				+mesh_batman() { 
			 | 
		
	
		
			
			| 
				407
			 | 
			
				409
			 | 
			
			
				     chroot "$rootdir" apt-get -y install iproute bridge-utils libnetfilter-conntrack3 batctl 
			 | 
		
	
		
			
			| 
				408
			 | 
			
				410
			 | 
			
			
				     chroot "$rootdir" apt-get -y install python-dev libevent-dev ebtables python-pip git 
			 | 
		
	
		
			
			| 
				409
			 | 
			
				411
			 | 
			
			
				     chroot "$rootdir" apt-get -y install wireless-tools rfkill 
			 | 
		
	
	
		
			
			| 
				
			 | 
			
			
				@@ -412,11 +414,11 @@ function mesh_batman { 
			 | 
		
	
		
			
			| 
				412
			 | 
			
				414
			 | 
			
			
				         echo 'batman_adv' >> $rootdir/etc/modules 
			 | 
		
	
		
			
			| 
				413
			 | 
			
				415
			 | 
			
			
				     fi 
			 | 
		
	
		
			
			| 
				414
			 | 
			
				416
			 | 
			
			
				  
			 | 
		
	
		
			
			| 
				415
			 | 
			
				
			 | 
			
			
				-	if [ -f /usr/local/bin/${PROJECT_NAME}-mesh-batman ]; then 
			 | 
		
	
		
			
			| 
				
			 | 
			
				417
			 | 
			
			
				+    if [ -f /usr/local/bin/${PROJECT_NAME}-mesh-batman ]; then 
			 | 
		
	
		
			
			| 
				416
			 | 
			
				418
			 | 
			
			
				         cp /usr/local/bin/${PROJECT_NAME}-mesh-batman $rootdir/var/lib/batman 
			 | 
		
	
		
			
			| 
				417
			 | 
			
				
			 | 
			
			
				-	else 
			 | 
		
	
		
			
			| 
				
			 | 
			
				419
			 | 
			
			
				+    else 
			 | 
		
	
		
			
			| 
				418
			 | 
			
				420
			 | 
			
			
				         cp /usr/bin/${PROJECT_NAME}-mesh-batman $rootdir/var/lib/batman 
			 | 
		
	
		
			
			| 
				419
			 | 
			
				
			 | 
			
			
				-	fi 
			 | 
		
	
		
			
			| 
				
			 | 
			
				421
			 | 
			
			
				+    fi 
			 | 
		
	
		
			
			| 
				420
			 | 
			
				422
			 | 
			
			
				  
			 | 
		
	
		
			
			| 
				421
			 | 
			
				423
			 | 
			
			
				     echo '[Unit]' > $rootdir/etc/systemd/system/batman.service 
			 | 
		
	
		
			
			| 
				422
			 | 
			
				424
			 | 
			
			
				     echo 'Description=B.A.T.M.A.N. Advanced' >> $rootdir/etc/systemd/system/batman.service 
			 | 
		
	
	
		
			
			| 
				
			 | 
			
			
				@@ -435,7 +437,78 @@ function mesh_batman { 
			 | 
		
	
		
			
			| 
				435
			 | 
			
				437
			 | 
			
			
				     chroot "$rootdir" systemctl enable batman 
			 | 
		
	
		
			
			| 
				436
			 | 
			
				438
			 | 
			
			
				 } 
			 | 
		
	
		
			
			| 
				437
			 | 
			
				439
			 | 
			
			
				  
			 | 
		
	
		
			
			| 
				438
			 | 
			
				
			 | 
			
			
				-function mesh_tox_node { 
			 | 
		
	
		
			
			| 
				
			 | 
			
				440
			 | 
			
			
				+mesh_firewall() { 
			 | 
		
	
		
			
			| 
				
			 | 
			
				441
			 | 
			
			
				+    TOX_PORT=33445 
			 | 
		
	
		
			
			| 
				
			 | 
			
				442
			 | 
			
			
				+    ZERONET_PORT=15441 
			 | 
		
	
		
			
			| 
				
			 | 
			
				443
			 | 
			
			
				+    TRACKER_PORT=6969 
			 | 
		
	
		
			
			| 
				
			 | 
			
				444
			 | 
			
			
				+    FIREWALL_FILENAME=$rootdir/etc/systemd/system/meshfirewall.service 
			 | 
		
	
		
			
			| 
				
			 | 
			
				445
			 | 
			
			
				+    MESH_FIREWALL_SCRIPT=/usr/bin/mesh-firewall 
			 | 
		
	
		
			
			| 
				
			 | 
			
				446
			 | 
			
			
				+ 
			 | 
		
	
		
			
			| 
				
			 | 
			
				447
			 | 
			
			
				+    echo '#!/bin/bash' > $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				448
			 | 
			
			
				+    echo 'iptables -P INPUT ACCEPT' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				449
			 | 
			
			
				+    echo 'ip6tables -P INPUT ACCEPT' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				450
			 | 
			
			
				+    echo 'iptables -F' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				451
			 | 
			
			
				+    echo 'ip6tables -F' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				452
			 | 
			
			
				+    echo 'iptables -t nat -F' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				453
			 | 
			
			
				+    echo 'ip6tables -t nat -F' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				454
			 | 
			
			
				+    echo 'iptables -X' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				455
			 | 
			
			
				+    echo 'ip6tables -X' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				456
			 | 
			
			
				+    echo 'iptables -P INPUT DROP' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				457
			 | 
			
			
				+    echo 'ip6tables -P INPUT DROP' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				458
			 | 
			
			
				+    echo 'iptables -A INPUT -i lo -j ACCEPT' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				459
			 | 
			
			
				+    echo 'iptables -A INPUT -m conntrack --ctstate ESTABLISHED,RELATED -j ACCEPT' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				460
			 | 
			
			
				+    echo '' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				461
			 | 
			
			
				+    echo '# Make sure incoming tcp connections are SYN packets' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				462
			 | 
			
			
				+    echo 'iptables -A INPUT -p tcp ! --syn -m state --state NEW -j DROP' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				463
			 | 
			
			
				+    echo '' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				464
			 | 
			
			
				+    echo '# Drop packets with incoming fragments' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				465
			 | 
			
			
				+    echo 'iptables -A INPUT -f -j DROP' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				466
			 | 
			
			
				+    echo '' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				467
			 | 
			
			
				+    echo '# Drop bogons' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				468
			 | 
			
			
				+    echo 'iptables -A INPUT -p tcp --tcp-flags ALL ALL -j DROP' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				469
			 | 
			
			
				+    echo 'iptables -A INPUT -p tcp --tcp-flags ALL FIN,PSH,URG -j DROP' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				470
			 | 
			
			
				+    echo 'iptables -A INPUT -p tcp --tcp-flags ALL SYN,RST,ACK,FIN,URG -j DROP' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				471
			 | 
			
			
				+    echo '' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				472
			 | 
			
			
				+    echo '# Incoming malformed NULL packets:' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				473
			 | 
			
			
				+    echo 'iptables -A INPUT -p tcp --tcp-flags ALL NONE -j DROP' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				474
			 | 
			
			
				+    echo '' >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				475
			 | 
			
			
				+    echo "iptables -A INPUT -p tcp --dport $TOX_PORT -j ACCEPT" >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				476
			 | 
			
			
				+    echo "iptables -A INPUT -i $WIFI_INTERFACE -p udp --dport $ZERONET_PORT -j ACCEPT" >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				477
			 | 
			
			
				+    echo "iptables -A INPUT -i $WIFI_INTERFACE -p tcp --dport $ZERONET_PORT -j ACCEPT" >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				478
			 | 
			
			
				+    echo "iptables -A INPUT -i $WIFI_INTERFACE -p udp --dport $TRACKER_PORT -j ACCEPT" >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				479
			 | 
			
			
				+    echo "iptables -A INPUT -i $WIFI_INTERFACE -p tcp --dport $TRACKER_PORT -j ACCEPT" >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				480
			 | 
			
			
				+    echo "iptables -A INPUT -i $WIFI_INTERFACE -p udp --dport 1900 -j ACCEPT" >> $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				481
			 | 
			
			
				+    chmod +x $rootdir/$MESH_FIREWALL_SCRIPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				482
			 | 
			
			
				+ 
			 | 
		
	
		
			
			| 
				
			 | 
			
				483
			 | 
			
			
				+    echo '[Unit]' > $FIREWALL_FILENAME 
			 | 
		
	
		
			
			| 
				
			 | 
			
				484
			 | 
			
			
				+    echo 'Description=Mesh Firewall' >> $FIREWALL_FILENAME 
			 | 
		
	
		
			
			| 
				
			 | 
			
				485
			 | 
			
			
				+    echo '' >> $FIREWALL_FILENAME 
			 | 
		
	
		
			
			| 
				
			 | 
			
				486
			 | 
			
			
				+    echo '[Service]' >> $FIREWALL_FILENAME 
			 | 
		
	
		
			
			| 
				
			 | 
			
				487
			 | 
			
			
				+    echo 'Type=oneshot' >> $FIREWALL_FILENAME 
			 | 
		
	
		
			
			| 
				
			 | 
			
				488
			 | 
			
			
				+    echo "ExecStart=$MESH_FIREWALL_SCRIPT" >> $FIREWALL_FILENAME 
			 | 
		
	
		
			
			| 
				
			 | 
			
				489
			 | 
			
			
				+    echo 'RemainAfterExit=no' >> $FIREWALL_FILENAME 
			 | 
		
	
		
			
			| 
				
			 | 
			
				490
			 | 
			
			
				+    echo '' >> $FIREWALL_FILENAME 
			 | 
		
	
		
			
			| 
				
			 | 
			
				491
			 | 
			
			
				+    echo 'TimeoutSec=30' >> $FIREWALL_FILENAME 
			 | 
		
	
		
			
			| 
				
			 | 
			
				492
			 | 
			
			
				+    echo '' >> $FIREWALL_FILENAME 
			 | 
		
	
		
			
			| 
				
			 | 
			
				493
			 | 
			
			
				+    echo '[Install]' >> $FIREWALL_FILENAME 
			 | 
		
	
		
			
			| 
				
			 | 
			
				494
			 | 
			
			
				+    echo 'WantedBy=multi-user.target' >> $FIREWALL_FILENAME 
			 | 
		
	
		
			
			| 
				
			 | 
			
				495
			 | 
			
			
				+    chroot "$rootdir" systemctl enable meshfirewall 
			 | 
		
	
		
			
			| 
				
			 | 
			
				496
			 | 
			
			
				+} 
			 | 
		
	
		
			
			| 
				
			 | 
			
				497
			 | 
			
			
				+ 
			 | 
		
	
		
			
			| 
				
			 | 
			
				498
			 | 
			
			
				+mesh_tox_node() { 
			 | 
		
	
		
			
			| 
				
			 | 
			
				499
			 | 
			
			
				+    TOX_REPO='git://github.com/irungentoo/toxcore.git' 
			 | 
		
	
		
			
			| 
				
			 | 
			
				500
			 | 
			
			
				+    TOX_COMMIT='73b2144edcfd1ca617e9054479b66ab0c0361a14' 
			 | 
		
	
		
			
			| 
				
			 | 
			
				501
			 | 
			
			
				+    TOX_BOOTSTRAP_ID_FILE=/var/lib/tox-bootstrapd/pubkey.txt 
			 | 
		
	
		
			
			| 
				
			 | 
			
				502
			 | 
			
			
				+    # These are some default nodes, but you can replace them with trusted nodes 
			 | 
		
	
		
			
			| 
				
			 | 
			
				503
			 | 
			
			
				+    # as you prefer. See https://wiki.tox.im/Nodes 
			 | 
		
	
		
			
			| 
				
			 | 
			
				504
			 | 
			
			
				+    TOX_NODES= 
			 | 
		
	
		
			
			| 
				
			 | 
			
				505
			 | 
			
			
				+    #TOX_NODES=( 
			 | 
		
	
		
			
			| 
				
			 | 
			
				506
			 | 
			
			
				+    #  '192.254.75.102,2607:5600:284::2,33445,951C88B7E75C867418ACDB5D273821372BB5BD652740BCDF623A4FA293E75D2F,Tox RELENG,US' 
			 | 
		
	
		
			
			| 
				
			 | 
			
				507
			 | 
			
			
				+    #  '144.76.60.215,2a01:4f8:191:64d6::1,33445,04119E835DF3E78BACF0F84235B300546AF8B936F035185E2A8E9E0A67C8924F,sonOfRa,DE' 
			 | 
		
	
		
			
			| 
				
			 | 
			
				508
			 | 
			
			
				+    #) 
			 | 
		
	
		
			
			| 
				
			 | 
			
				509
			 | 
			
			
				+    iptables -A INPUT -p tcp --dport $TOX_PORT -j ACCEPT 
			 | 
		
	
		
			
			| 
				
			 | 
			
				510
			 | 
			
			
				+    save_firewall_settings 
			 | 
		
	
		
			
			| 
				
			 | 
			
				511
			 | 
			
			
				+ 
			 | 
		
	
		
			
			| 
				439
			 | 
			
				512
			 | 
			
			
				     chroot "$rootdir" apt-get -y install build-essential libtool autotools-dev 
			 | 
		
	
		
			
			| 
				440
			 | 
			
				513
			 | 
			
			
				     chroot "$rootdir" apt-get -y install automake checkinstall check git yasm 
			 | 
		
	
		
			
			| 
				441
			 | 
			
				514
			 | 
			
			
				     chroot "$rootdir" apt-get -y install libsodium13 libsodium-dev libcap2-bin 
			 | 
		
	
	
		
			
			| 
				
			 | 
			
			
				@@ -543,29 +616,30 @@ initialise_mesh() { 
			 | 
		
	
		
			
			| 
				543
			 | 
			
				616
			 | 
			
			
				     if [[ $VARIANT != "mesh" ]]; then 
			 | 
		
	
		
			
			| 
				544
			 | 
			
				617
			 | 
			
			
				         return 
			 | 
		
	
		
			
			| 
				545
			 | 
			
				618
			 | 
			
			
				     fi 
			 | 
		
	
		
			
			| 
				
			 | 
			
				619
			 | 
			
			
				+    mesh_firewall 
			 | 
		
	
		
			
			| 
				546
			 | 
			
				620
			 | 
			
			
				     mesh_avahi 
			 | 
		
	
		
			
			| 
				547
			 | 
			
				
			 | 
			
			
				-	mesh_batman 
			 | 
		
	
		
			
			| 
				548
			 | 
			
				
			 | 
			
			
				- 
			 | 
		
	
		
			
			| 
				549
			 | 
			
				
			 | 
			
			
				-	#MESH_SERVICE='mesh-setup.service' 
			 | 
		
	
		
			
			| 
				550
			 | 
			
				
			 | 
			
			
				-    #MESH_SETUP_DAEMON=$rootdir/etc/systemd/system/$MESH_SERVICE 
			 | 
		
	
		
			
			| 
				551
			 | 
			
				
			 | 
			
			
				- 
			 | 
		
	
		
			
			| 
				552
			 | 
			
				
			 | 
			
			
				-    #echo '[Unit]' > $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				553
			 | 
			
				
			 | 
			
			
				-    #echo 'Description=Initial mesh router configuration' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				554
			 | 
			
				
			 | 
			
			
				-    #echo 'After=syslog.target' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				555
			 | 
			
				
			 | 
			
			
				-    #echo 'After=network.target' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				556
			 | 
			
				
			 | 
			
			
				-    #echo '[Service]' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				557
			 | 
			
				
			 | 
			
			
				-    #echo 'Type=simple' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				558
			 | 
			
				
			 | 
			
			
				-    #echo 'User=root' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				559
			 | 
			
				
			 | 
			
			
				-    #echo 'Group=root' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				560
			 | 
			
				
			 | 
			
			
				-    #echo 'WorkingDirectory=/root' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				561
			 | 
			
				
			 | 
			
			
				-    #echo "ExecStart=/usr/local/bin/${PROJECT_NAME}-image-mesh > /var/log/mesh-setup.log" >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				562
			 | 
			
				
			 | 
			
			
				-    #echo '' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				563
			 | 
			
				
			 | 
			
			
				-    #echo 'TimeoutSec=99999' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				564
			 | 
			
				
			 | 
			
			
				-    #echo '' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				565
			 | 
			
				
			 | 
			
			
				-    #echo '[Install]' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				566
			 | 
			
				
			 | 
			
			
				-    #echo 'WantedBy=multi-user.target' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				567
			 | 
			
				
			 | 
			
			
				- 
			 | 
		
	
		
			
			| 
				568
			 | 
			
				
			 | 
			
			
				-    #chroot "$rootdir" systemctl enable $MESH_SERVICE 
			 | 
		
	
		
			
			| 
				
			 | 
			
				621
			 | 
			
			
				+    mesh_batman 
			 | 
		
	
		
			
			| 
				
			 | 
			
				622
			 | 
			
			
				+    #mesh_tox_node 
			 | 
		
	
		
			
			| 
				
			 | 
			
				623
			 | 
			
			
				+ 
			 | 
		
	
		
			
			| 
				
			 | 
			
				624
			 | 
			
			
				+    MESH_SERVICE='mesh-setup.service' 
			 | 
		
	
		
			
			| 
				
			 | 
			
				625
			 | 
			
			
				+    MESH_SETUP_DAEMON=$rootdir/etc/systemd/system/$MESH_SERVICE 
			 | 
		
	
		
			
			| 
				
			 | 
			
				626
			 | 
			
			
				+ 
			 | 
		
	
		
			
			| 
				
			 | 
			
				627
			 | 
			
			
				+    echo '[Unit]' > $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				
			 | 
			
				628
			 | 
			
			
				+    echo 'Description=Initial mesh router configuration' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				
			 | 
			
				629
			 | 
			
			
				+    echo 'After=syslog.target' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				
			 | 
			
				630
			 | 
			
			
				+    echo 'After=network.target' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				
			 | 
			
				631
			 | 
			
			
				+    echo '[Service]' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				
			 | 
			
				632
			 | 
			
			
				+    echo 'Type=simple' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				
			 | 
			
				633
			 | 
			
			
				+    echo 'User=root' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				
			 | 
			
				634
			 | 
			
			
				+    echo 'Group=root' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				
			 | 
			
				635
			 | 
			
			
				+    echo 'WorkingDirectory=/root' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				
			 | 
			
				636
			 | 
			
			
				+    echo "ExecStart=/usr/local/bin/${PROJECT_NAME}-image-mesh > /var/log/mesh-setup.log" >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				
			 | 
			
				637
			 | 
			
			
				+    echo '' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				
			 | 
			
				638
			 | 
			
			
				+    echo 'TimeoutSec=99999' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				
			 | 
			
				639
			 | 
			
			
				+    echo '' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				
			 | 
			
				640
			 | 
			
			
				+    echo '[Install]' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				
			 | 
			
				641
			 | 
			
			
				+    echo 'WantedBy=multi-user.target' >> $MESH_SETUP_DAEMON 
			 | 
		
	
		
			
			| 
				
			 | 
			
				642
			 | 
			
			
				+    chroot "$rootdir" systemctl enable $MESH_SERVICE 
			 | 
		
	
		
			
			| 
				569
			 | 
			
				643
			 | 
			
			
				 } 
			 | 
		
	
		
			
			| 
				570
			 | 
			
				644
			 | 
			
			
				  
			 | 
		
	
		
			
			| 
				571
			 | 
			
				645
			 | 
			
			
				 # Set to true/false to control if eatmydata is used during build 
			 |