freedombone-image-mesh 34KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914
  1. #!/bin/bash
  2. #
  3. # .---. . .
  4. # | | |
  5. # |--- .--. .-. .-. .-.| .-. .--.--. |.-. .-. .--. .-.
  6. # | | (.-' (.-' ( | ( )| | | | )( )| | (.-'
  7. # ' ' --' --' -' - -' ' ' -' -' -' ' - --'
  8. #
  9. # Freedom in the Cloud
  10. #
  11. # This command is run on initial install in order to set up a mesh router
  12. #
  13. # License
  14. # =======
  15. #
  16. # This program is free software: you can redistribute it and/or modify
  17. # it under the terms of the GNU Affero General Public License as published by
  18. # the Free Software Foundation, either version 3 of the License, or
  19. # (at your option) any later version.
  20. #
  21. # This program is distributed in the hope that it will be useful,
  22. # but WITHOUT ANY WARRANTY; without even the implied warranty of
  23. # MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  24. # GNU Affero General Public License for more details.
  25. #
  26. # You should have received a copy of the GNU Affero General Public License
  27. # along with this program. If not, see <http://www.gnu.org/licenses/>.
  28. PROJECT_NAME='freedombone'
  29. export TEXTDOMAIN=${PROJECT_NAME}-image-mesh
  30. export TEXTDOMAINDIR="/usr/share/locale"
  31. # The browser application to use
  32. BROWSER=midori
  33. BROWSER_OPTIONS='-p'
  34. MY_USERNAME='fbone'
  35. PEER_ID=
  36. INSTALL_DIR=/root/build
  37. INSTALL_LOG=/var/log/${PROJECT_NAME}.log
  38. DEFAULT_USERNAME=fbone
  39. TOX_NODES=
  40. #TOX_NODES=(
  41. # '192.254.75.102,2607:5600:284::2,33445,951C88B7E75C867418ACDB5D273821372BB5BD652740BCDF623A4FA293E75D2F,Tox RELENG,US'
  42. # '144.76.60.215,2a01:4f8:191:64d6::1,33445,04119E835DF3E78BACF0F84235B300546AF8B936F035185E2A8E9E0A67C8924F,sonOfRa,DE'
  43. #)
  44. MESH_INSTALL_DIR=/var/lib
  45. MESH_INSTALL_COMPLETED=/root/.mesh_setup_completed
  46. MESH_INSTALL_SETUP=/root/.initial_mesh_setup
  47. MESH_AMNESIC=/root/.amnesic
  48. FIRST_BOOT=/home/$MY_USERNAME/.first_boot
  49. # Tomb containing logs
  50. TOMB_LOG_SIZE_MB=10
  51. # tmp directory
  52. TOMB_TMP_SIZE_MB=10
  53. # size of the tomb used to store qtox settings
  54. TOMB_TOX_SIZE_MB=10
  55. # Tomb containing tox bootstrap
  56. TOMB_TOX_BOOTSTRAP_SIZE_MB=10
  57. MESH_INSTALL_DIR=/var/lib
  58. IPFS_PORT=4001
  59. CURRENT_BLOG_INDEX=/home/$MY_USERNAME/.blog-index
  60. OPENVPN_SERVER_NAME="server"
  61. OPENVPN_KEY_FILENAME='client.ovpn'
  62. VPN_COUNTRY_CODE="US"
  63. VPN_AREA="Apparent Free Speech Zone"
  64. VPN_LOCATION="Freedomville"
  65. VPN_ORGANISATION="Freedombone"
  66. VPN_UNIT="Freedombone Unit"
  67. STUNNEL_PORT=3439
  68. VPN_TLS_PORT=553
  69. VPN_MESH_TLS_PORT=653
  70. SCUTTLEBOT_PORT=8010
  71. # Debian stretch has a problem where the formerly predictable wlan0 and eth0
  72. # device names get assigned random names. This is a hacky workaround.
  73. # Also adding net.ifnames=0 to kernel options on bootloader may work.
  74. function enable_predictable_device_names {
  75. ln -s /dev/null /etc/udev/rules.d/80-net-setup-link.rules
  76. update-initramfs -u
  77. }
  78. function create_avahi_mesh_service {
  79. service_name=$1
  80. service_type=$2
  81. service_protocol=$3
  82. service_port=$4
  83. service_description="$5"
  84. if [ ! -d /etc/avahi ]; then
  85. echo $'create_avahi_mesh_service: avahi was not installed'
  86. exit 52925
  87. fi
  88. echo '<?xml version="1.0" standalone="no"?><!--*-nxml-*-->' > /etc/avahi/services/${service_name}.service
  89. echo '<!DOCTYPE service-group SYSTEM "avahi-service.dtd">' >> /etc/avahi/services/${service_name}.service
  90. echo '<service-group>' >> /etc/avahi/services/${service_name}.service
  91. echo " <name replace-wildcards=\"yes\">%h ${service_type}</name>" >> /etc/avahi/services/${service_name}.service
  92. echo ' <service>' >> /etc/avahi/services/${service_name}.service
  93. echo " <type>_${service_type}._${service_protocol}</type>" >> /etc/avahi/services/${service_name}.service
  94. echo " <port>${service_port}</port>" >> /etc/avahi/services/${service_name}.service
  95. echo " <txt-record>$service_description</txt-record>" >> /etc/avahi/services/${service_name}.service
  96. echo ' </service>' >> /etc/avahi/services/${service_name}.service
  97. echo '</service-group>' >> /etc/avahi/services/${service_name}.service
  98. }
  99. function create_ram_disk {
  100. ramdisk_size_mb=$1
  101. if [ ! -d /mnt/ramdisk ]; then
  102. mkdir -p /mnt/ramdisk
  103. fi
  104. if ! grep -q "ramdisk" /etc/fstab; then
  105. mount -t tmpfs -o size=${ramdisk_size_mb}m tmpfs /mnt/ramdisk
  106. echo "tmpfs /mnt/ramdisk tmpfs nodev,nosuid,noexec,nodiratime,size=${ramdisk_size_mb}M 0 0" >> /etc/fstab
  107. echo $"${ramdisk_size_mb}M ramdisk created for /tmp" >> $INSTALL_LOG
  108. fi
  109. }
  110. function make_root_read_only {
  111. if [ ! -d /home/$MY_USERNAME/Desktop ]; then
  112. if ! grep -q 'ro,subvol=@' /etc/fstab; then
  113. sed -i 's|subvol=@|ro,subvol=@|g' /etc/fstab
  114. echo $'Root filesystem set to read only' >> $INSTALL_LOG
  115. fi
  116. fi
  117. }
  118. function tmp_ram_disk {
  119. ramdisk_size_mb=$1
  120. if [ ! -d /tmp ]; then
  121. mkdir -p /tmp
  122. fi
  123. if ! grep -q '/tmp' /etc/fstab; then
  124. mount -t tmpfs -o size=${ramdisk_size_mb}m tmpfs /tmp
  125. echo "tmpfs /tmp tmpfs nodev,nosuid,noexec,nodiratime,size=${ramdisk_size_mb}M 0 0" >> /etc/fstab
  126. fi
  127. }
  128. function set_hostname {
  129. DEFAULT_DOMAIN_NAME="$1"
  130. echo "$DEFAULT_DOMAIN_NAME" > /etc/hostname
  131. echo "$DEFAULT_DOMAIN_NAME" > /etc/mailname
  132. hostname $DEFAULT_DOMAIN_NAME
  133. if grep -q "127.0.1.1" /etc/hosts; then
  134. sed -i "s/127.0.1.1.*/127.0.1.1 $DEFAULT_DOMAIN_NAME/g" /etc/hosts
  135. else
  136. echo "127.0.1.1 $DEFAULT_DOMAIN_NAME" >> /etc/hosts
  137. fi
  138. }
  139. function change_avahi_name {
  140. decarray=( 1 2 3 4 5 6 7 8 9 0 )
  141. PEER_ID=${decarray[$RANDOM%10]}${decarray[$RANDOM%10]}${decarray[$RANDOM%10]}${decarray[$RANDOM%10]}${decarray[$RANDOM%10]}${decarray[$RANDOM%10]}${decarray[$RANDOM%10]}${decarray[$RANDOM%10]}
  142. sed -i "s|#host-name=.*|host-name=P$PEER_ID|g" /etc/avahi/avahi-daemon.conf
  143. sed -i "s|host-name=.*|host-name=P$PEER_ID|g" /etc/avahi/avahi-daemon.conf
  144. set_hostname P$PEER_ID
  145. systemctl restart avahi-daemon
  146. echo "New avahi name for this peer is P$PEER_ID"
  147. echo $"avahi name changed to P${PEER_ID}.local" >> $INSTALL_LOG
  148. }
  149. function configure_toxcore {
  150. echo $'Configuring toxcore' >> $INSTALL_LOG
  151. TOXIC_FILE=$(cat /usr/share/${PROJECT_NAME}/apps/${PROJECT_NAME}-app-tox | grep "TOXIC_FILE=" | head -n 1 | awk -F '=' '{print $2}')
  152. if [ -f $MESH_AMNESIC ]; then
  153. # change to the amnesic mount
  154. sed -i 's|/var/lib/tox-bootstrapd|/media/tox-bootstrapd|g' /etc/tox-bootstrapd.conf
  155. systemctl stop tox-bootstrapd.service
  156. sed -i 's|WorkingDirectory=.*|WorkingDirectory=/media/tox-bootstrapd|g' /etc/systemd/system/tox-bootstrapd.service
  157. systemctl daemon-reload
  158. userdel -r tox-bootstrapd
  159. useradd --home-dir /media/tox-bootstrapd --create-home --system --shell /sbin/nologin --comment "Account to run Tox's DHT bootstrap daemon" --user-group tox-bootstrapd
  160. chmod 700 /media/tox-bootstrapd
  161. fi
  162. echo $'Enabling toxcore daemon' >> $INSTALL_LOG
  163. chmod +x /etc/systemd/system/tox-bootstrapd.service
  164. systemctl enable tox-bootstrapd.service
  165. echo $'Regenerating Tox bootstrap node keys' >> $INSTALL_LOG
  166. systemctl stop tox-bootstrapd.service
  167. if [ -f /var/lib/tox-bootstrapd/keys ]; then
  168. rm /var/lib/tox-bootstrapd/keys
  169. fi
  170. systemctl start tox-bootstrapd.service
  171. # sleep for a while so that the tox keys can be generated
  172. sleep 30
  173. TOX_BOOTSTRAP_ID_FILE=/var/lib/tox-bootstrapd/pubkey.txt
  174. if [ -f $MESH_AMNESIC ]; then
  175. TOX_BOOTSTRAP_ID_FILE=/media/tox-bootstrapd/pubkey.txt
  176. fi
  177. TOX_PUBLIC_KEY=$(cat /var/log/syslog | grep tox | grep "Public Key" | awk -F ' ' '{print $8}' | tail -1)
  178. if [ ${#TOX_PUBLIC_KEY} -lt 30 ]; then
  179. echo $'WARNING: Could not obtain the tox node public key' >> $INSTALL_LOG
  180. exit 46362
  181. fi
  182. # save the public key for later reference
  183. echo "$TOX_PUBLIC_KEY" > $TOX_BOOTSTRAP_ID_FILE
  184. echo $'Configured toxcore' >> $INSTALL_LOG
  185. }
  186. function create_tox_user {
  187. # remove any existing user
  188. if [ -f /home/${MY_USERNAME}/.config/tox/data.tox ]; then
  189. rm -f /home/${MY_USERNAME}/.config/tox/data*
  190. fi
  191. if [ -d /home/${MY_USERNAME}/.config/tox/avatars ]; then
  192. rm -rf /home/${MY_USERNAME}/.config/tox/avatars
  193. fi
  194. if [ ! -f /home/${MY_USERNAME}/.first_boot ]; then
  195. touch /home/${MY_USERNAME}/.first_boot
  196. fi
  197. if [ ! -d /home/$MY_USERNAME/Desktop ]; then
  198. return
  199. fi
  200. toxid -u $MY_USERNAME -n data
  201. chown -R ${MY_USERNAME}:${MY_USERNAME} /home/${MY_USERNAME}/.config/tox
  202. chmod +x /home/$MY_USERNAME/Desktop/*.desktop
  203. chown ${MY_USERNAME}:${MY_USERNAME} /home/$MY_USERNAME/Desktop/*
  204. echo $'Created Tox user' >> $INSTALL_LOG
  205. }
  206. function show_desktop_icons {
  207. if [ ! -d /home/$MY_USERNAME/Desktop ]; then
  208. return
  209. fi
  210. echo '#!/bin/bash' > /home/$MY_USERNAME/.showhelp
  211. echo "pkill $BROWSER" >> /home/$MY_USERNAME/.showhelp
  212. echo "$BROWSER $BROWSER_OPTIONS /home/$MY_USERNAME/help/mesh.html" >> /home/$MY_USERNAME/.showhelp
  213. chmod +x /home/$MY_USERNAME/.showhelp
  214. chown $MY_USERNAME:$MY_USERNAME /home/$MY_USERNAME/.showhelp
  215. echo '[Desktop Entry]' > /home/$MY_USERNAME/Desktop/help.desktop
  216. echo 'Version=1.0' >> /home/$MY_USERNAME/Desktop/help.desktop
  217. echo 'Name=Help' >> /home/$MY_USERNAME/Desktop/help.desktop
  218. echo 'Type=Application' >> /home/$MY_USERNAME/Desktop/help.desktop
  219. echo 'Comment=Show help' >> /home/$MY_USERNAME/Desktop/help.desktop
  220. echo "Exec=bash -c /home/$MY_USERNAME/.showhelp" >> /home/$MY_USERNAME/Desktop/help.desktop
  221. echo 'Icon=/usr/share/freedombone/avatars/help.png' >> /home/$MY_USERNAME/Desktop/help.desktop
  222. echo 'Terminal=false' >> /home/$MY_USERNAME/Desktop/help.desktop
  223. echo 'Categories=Application;' >> /home/$MY_USERNAME/Desktop/help.desktop
  224. echo '[Desktop Entry]' > /home/$MY_USERNAME/Desktop/wifi.desktop
  225. echo 'Version=1.0' >> /home/$MY_USERNAME/Desktop/wifi.desktop
  226. echo 'Name=Wifi' >> /home/$MY_USERNAME/Desktop/wifi.desktop
  227. echo 'Type=Application' >> /home/$MY_USERNAME/Desktop/wifi.desktop
  228. echo 'Comment=Check wifi status' >> /home/$MY_USERNAME/Desktop/wifi.desktop
  229. echo 'Exec=mate-terminal -e "sudo batman monitor"' >> /home/$MY_USERNAME/Desktop/wifi.desktop
  230. echo 'Icon=/usr/share/freedombone/avatars/wifi.png' >> /home/$MY_USERNAME/Desktop/wifi.desktop
  231. echo 'Terminal=false' >> /home/$MY_USERNAME/Desktop/wifi.desktop
  232. echo 'Categories=Application;' >> /home/$MY_USERNAME/Desktop/wifi.desktop
  233. echo '[Desktop Entry]' > /home/$MY_USERNAME/Desktop/restart.desktop
  234. echo 'Version=1.0' >> /home/$MY_USERNAME/Desktop/restart.desktop
  235. echo 'Name=Network Restart' >> /home/$MY_USERNAME/Desktop/restart.desktop
  236. echo 'Type=Application' >> /home/$MY_USERNAME/Desktop/restart.desktop
  237. echo 'Comment=Restart batman' >> /home/$MY_USERNAME/Desktop/restart.desktop
  238. echo 'Exec=mate-terminal -e "sudo batman restart 2> /dev/null"' >> /home/$MY_USERNAME/Desktop/restart.desktop
  239. echo 'Icon=/usr/share/freedombone/avatars/restart.png' >> /home/$MY_USERNAME/Desktop/restart.desktop
  240. echo 'Terminal=false' >> /home/$MY_USERNAME/Desktop/restart.desktop
  241. echo 'Categories=Application;' >> /home/$MY_USERNAME/Desktop/restart.desktop
  242. echo '[Desktop Entry]' > /home/$MY_USERNAME/Desktop/new_identity.desktop
  243. echo 'Version=1.0' >> /home/$MY_USERNAME/Desktop/new_identity.desktop
  244. echo 'Name=New Identity' >> /home/$MY_USERNAME/Desktop/new_identity.desktop
  245. echo 'Type=Application' >> /home/$MY_USERNAME/Desktop/new_identity.desktop
  246. echo 'Comment=Create a new identity' >> /home/$MY_USERNAME/Desktop/new_identity.desktop
  247. echo 'Exec=mate-terminal -e freedombone-mesh-reset' >> /home/$MY_USERNAME/Desktop/new_identity.desktop
  248. echo 'Icon=/usr/share/freedombone/avatars/newidentity.png' >> /home/$MY_USERNAME/Desktop/new_identity.desktop
  249. echo 'Terminal=false' >> /home/$MY_USERNAME/Desktop/new_identity.desktop
  250. echo 'Categories=Application;' >> /home/$MY_USERNAME/Desktop/new_identity.desktop
  251. echo '[Desktop Entry]' > /home/$MY_USERNAME/Desktop/social.desktop
  252. echo 'Name=Social (Offline)' >> /home/$MY_USERNAME/Desktop/social.desktop
  253. echo 'Type=Application' >> /home/$MY_USERNAME/Desktop/social.desktop
  254. echo 'Comment=A decentralized messaging and sharing app built on top of Secure Scuttlebutt (SSB)' >> /home/$MY_USERNAME/Desktop/social.desktop
  255. echo 'Exec=bash /usr/bin/start_patchwork' >> /home/$MY_USERNAME/Desktop/social.desktop
  256. echo "Icon=/etc/patchwork/icon_patchwork.png" >> /home/$MY_USERNAME/Desktop/social.desktop
  257. echo 'Terminal=false' >> /home/$MY_USERNAME/Desktop/social.desktop
  258. echo 'Categories=Application;' >> /home/$MY_USERNAME/Desktop/social.desktop
  259. echo '[Desktop Entry]' > /home/$MY_USERNAME/Desktop/audio.desktop
  260. echo 'Name=Audio/Music (Offline)' >> /home/$MY_USERNAME/Desktop/audio.desktop
  261. echo 'Type=Application' >> /home/$MY_USERNAME/Desktop/audio.desktop
  262. echo 'Comment=Audio publishing and streaming' >> /home/$MY_USERNAME/Desktop/audio.desktop
  263. echo 'Exec=bash /usr/bin/start_ferment' >> /home/$MY_USERNAME/Desktop/audio.desktop
  264. echo "Icon=/etc/patchwork/icon_ferment.png" >> /home/$MY_USERNAME/Desktop/audio.desktop
  265. echo 'Terminal=false' >> /home/$MY_USERNAME/Desktop/audio.desktop
  266. echo 'Categories=Application;' >> /home/$MY_USERNAME/Desktop/audio.desktop
  267. # set permissions
  268. chmod +x /home/$MY_USERNAME/Desktop/*.desktop
  269. chown ${MY_USERNAME}:${MY_USERNAME} /home/$MY_USERNAME/Desktop/*
  270. chown ${MY_USERNAME}:${MY_USERNAME} /home/$MY_USERNAME/.config
  271. chown -R ${MY_USERNAME}:${MY_USERNAME} /home/$MY_USERNAME/.config/tox
  272. chown -R ${MY_USERNAME}:${MY_USERNAME} /home/$MY_USERNAME/.config/autostart
  273. chown ${MY_USERNAME}:${MY_USERNAME} /home/$MY_USERNAME/*.sh
  274. # link to Tahoe-LAFS Magic folder
  275. #ln -s /home/${MY_USERNAME}/Desktop/${TAHOELAFS_SHARED_DIR} /home/${MY_USERNAME}/${TAHOELAFS_SHARED_DIR}
  276. # restart caja
  277. killall caja
  278. killall mate-panel
  279. }
  280. function enable_batman_daemon {
  281. systemctl enable batman
  282. systemctl daemon-reload
  283. }
  284. function mesh_amnesic {
  285. if [ ! -f $MESH_AMNESIC ]; then
  286. return
  287. fi
  288. echo '#!/bin/bash' > /usr/bin/amnesic
  289. echo '' >> /usr/bin/amnesic
  290. echo 'MY_USERNAME=$1' >> /usr/bin/amnesic
  291. echo 'tomb slam all' >> /usr/bin/amnesic
  292. echo "if [ -f /home/${MY_USERNAME}/.bash_history ]; then" >> /usr/bin/amnesic
  293. echo " shred -zu /home/${MY_USERNAME}/.bash_history" >> /usr/bin/amnesic
  294. echo 'fi' >> /usr/bin/amnesic
  295. echo "if [ -f /home/${MY_USERNAME}/.xsession-errors ]; then" >> /usr/bin/amnesic
  296. echo " shred -zu /home/${MY_USERNAME}/.xsession-errors" >> /usr/bin/amnesic
  297. echo 'fi' >> /usr/bin/amnesic
  298. echo '' >> /usr/bin/amnesic
  299. echo 'exit 0' >> /usr/bin/amnesic
  300. chmod +x /usr/bin/amnesic
  301. if [ ! -f /etc/systemd/system/amnesic.service ]; then
  302. echo '[Unit]' > /etc/systemd/system/amnesic.service
  303. echo 'Description=Amnesic Mesh' >> /etc/systemd/system/amnesic.service
  304. echo '' >> /etc/systemd/system/amnesic.service
  305. echo '[Service]' >> /etc/systemd/system/amnesic.service
  306. echo 'User=root' >> /etc/systemd/system/amnesic.service
  307. echo 'Group=root' >> /etc/systemd/system/amnesic.service
  308. echo 'Type=oneshot' >> /etc/systemd/system/amnesic.service
  309. echo 'RemainAfterExit=true' >> /etc/systemd/system/amnesic.service
  310. echo 'ExecStart=/bin/true' >> /etc/systemd/system/amnesic.service
  311. echo "ExecStop=/usr/bin/amnesic $MY_USERNAME" >> /etc/systemd/system/amnesic.service
  312. echo '' >> /etc/systemd/system/amnesic.service
  313. echo '[Install]' >> /etc/systemd/system/amnesic.service
  314. echo 'WantedBy=multi-user.target' >> /etc/systemd/system/amnesic.service
  315. chmod +x /etc/systemd/system/amnesic.service
  316. systemctl daemon-reload
  317. fi
  318. systemctl enable amnesic
  319. systemctl start amnesic
  320. }
  321. function mesh_restart_daemons {
  322. systemctl restart avahi-daemon
  323. systemctl restart tox-bootstrapd
  324. echo $'Daemons restarted' >> $INSTALL_LOG
  325. }
  326. function create_tomb {
  327. tomb_name=$1
  328. tomb_size=$2
  329. if [ -f /tmp/${tomb_name}.tomb ]; then
  330. tomb slam /tmp/${tomb_name}.tomb
  331. fi
  332. # make a temporary password
  333. tomb dig -s ${tomb_size} /tmp/${tomb_name}.tomb
  334. if [ ! -f /tmp/${tomb_name}.tomb ]; then
  335. echo "WARNING: ${tomb_name} tomb did not install properly" >> /var/log/${PROJECT_NAME}.log
  336. tomb >> /var/log/${PROJECT_NAME}.log
  337. fi
  338. TOMB_TEMP_PASSWORD=$(openssl rand -base64 64 | tr -dc A-Za-z0-9 | head -c 30)
  339. tomb forge /mnt/ramdisk/${tomb_name}.tomb.key --tomb-pwd "${TOMB_TEMP_PASSWORD}" --unsafe
  340. tomb lock /tmp/${tomb_name}.tomb -k /mnt/ramdisk/${tomb_name}.tomb.key --tomb-pwd "${TOMB_TEMP_PASSWORD}" --unsafe
  341. tomb open /tmp/${tomb_name}.tomb -k /mnt/ramdisk/${tomb_name}.tomb.key --tomb-pwd "${TOMB_TEMP_PASSWORD}" --unsafe
  342. # stop stuff from popping up
  343. pkill caja
  344. # clear the temporary password
  345. TOMB_TEMP_PASSWORD=
  346. }
  347. function setup_amnesic_data {
  348. if [ ! -f $MESH_AMNESIC ]; then
  349. return
  350. fi
  351. if [ ! -d /mnt/ramdisk ]; then
  352. return
  353. fi
  354. # clear crypttab
  355. if [ -f /etc/crypttab ]; then
  356. shred -zu /etc/crypttab
  357. touch /etc/crypttab
  358. fi
  359. tomb_name=log
  360. create_tomb ${tomb_name} $TOMB_LOG_SIZE_MB
  361. if [ -d /media/${tomb_name} ]; then
  362. if [ -d /var/log ]; then
  363. if [ ! -d /var/log_base ]; then
  364. mv /var/log /var/log_base
  365. fi
  366. fi
  367. ln -s /media/${tomb_name} /var/log
  368. if [ -d /var/log_base ]; then
  369. cp -rp /var/log_base/* /media/${tomb_name}
  370. fi
  371. echo "${tomb_name} tomb created" >> $INSTALL_LOG
  372. else
  373. echo "WARNING: ${tomb_name} tomb not found" >> $INSTALL_LOG
  374. fi
  375. tomb_name=tox-bootstrapd
  376. if [ -f /etc/systemd/system/${tomb_name}.service ]; then
  377. systemctl stop ${tomb_name}
  378. fi
  379. create_tomb ${tomb_name} $TOMB_TOX_BOOTSTRAP_SIZE_MB
  380. if [ -d /media/${tomb_name} ]; then
  381. if [ -d /var/lib/tox-bootstrapd ]; then
  382. if [ ! -d /var/lib/tox-bootstrapd_base ]; then
  383. mv /var/lib/tox-bootstrapd /var/lib/tox-bootstrapd_base
  384. fi
  385. fi
  386. if [ -d /var/lib/tox-bootstrapd ]; then
  387. shred -zu /var/lib/tox-bootstrapd/*
  388. rm -rf /var/lib/tox-bootstrapd
  389. fi
  390. ln -s /media/${tomb_name} /var/lib/tox-bootstrapd
  391. if [ -d /var/lib/tox-bootstrapd_base ]; then
  392. cp -rp /var/lib/tox-bootstrapd_base/* /media/${tomb_name}
  393. fi
  394. echo "${tomb_name} tomb created" >> $INSTALL_LOG
  395. else
  396. echo "WARNING: ${tomb_name} tomb not found" >> $INSTALL_LOG
  397. fi
  398. tomb_name=tox
  399. create_tomb ${tomb_name} $TOMB_TOX_SIZE_MB
  400. if [ -d /media/${tomb_name} ]; then
  401. if [ ! -d /home/${MY_USERNAME}/.config ]; then
  402. mkdir -p /home/${MY_USERNAME}/.config
  403. chown ${MY_USERNAME}:${MY_USERNAME} /home/${MY_USERNAME}/.config
  404. fi
  405. if [ -d /home/${MY_USERNAME}/.config/${tomb_name} ]; then
  406. rm -rf /home/${MY_USERNAME}/.config/${tomb_name}
  407. fi
  408. ln -s /media/${tomb_name} /home/${MY_USERNAME}/.config/${tomb_name}
  409. chown -R ${MY_USERNAME}:${MY_USERNAME} /home/${MY_USERNAME}/.config/${tomb_name}
  410. chown -R ${MY_USERNAME}:${MY_USERNAME} /media/${tomb_name}
  411. echo "${tomb_name} tomb created" >> $INSTALL_LOG
  412. else
  413. echo "WARNING: ${tomb_name} tomb not found" >> $INSTALL_LOG
  414. fi
  415. }
  416. function setup_ipfs {
  417. IPFS_PATH=/usr/bin
  418. IPFS_KEY_LENGTH=2048
  419. IPFS_COMMAND=$IPFS_PATH/ipfs
  420. IPFS_PUBLIC=/home/$MY_USERNAME/.ipfs-public
  421. su -c "systemctl --user enable ipfs" - $MY_USERNAME
  422. if [ -f $CURRENT_BLOG_INDEX ]; then
  423. shred -zu $CURRENT_BLOG_INDEX
  424. fi
  425. if [ -d /home/$MY_USERNAME/Public ]; then
  426. rm /home/$MY_USERNAME/Desktop/Public
  427. rm -rf /home/$MY_USERNAME/Public
  428. fi
  429. if [ -d /home/$MY_USERNAME/CreateBlog/content/images ]; then
  430. shred -zu /home/$MY_USERNAME/CreateBlog/content/images/*
  431. fi
  432. if [ -d /home/$MY_USERNAME/CreateBlog/content ]; then
  433. shred -zu /home/$MY_USERNAME/CreateBlog/content/*
  434. if grep -q "THEME=" /home/$MY_USERNAME/CreateBlog/pelicanconf.py; then
  435. sed -i "s|THEME=.*|THEME='themes/nice-blog'|g" /home/$MY_USERNAME/CreateBlog/pelicanconf.py
  436. else
  437. echo "THEME='themes/nice-blog'" >> /home/$MY_USERNAME/CreateBlog/pelicanconf.py
  438. fi
  439. fi
  440. if [ -d /home/$MY_USERNAME/.ipfs ]; then
  441. shred -zu /home/$MY_USERNAME/.ipfs/config
  442. rm -rf /home/$MY_USERNAME/.ipfs
  443. su -c "systemctl --user restart ipfs" - $MY_USERNAME
  444. else
  445. su -c "systemctl --user start ipfs" - $MY_USERNAME
  446. fi
  447. if [ -f /home/$MY_USERNAME/.blog-index ]; then
  448. shred -zu /home/$MY_USERNAME/.blog-index
  449. fi
  450. if [ -f /home/$MY_USERNAME/.blog-theme-index ]; then
  451. shred -zu /home/$MY_USERNAME/.blog-theme-index
  452. fi
  453. if [ -f /home/$MY_USERNAME/.ipfs-id ]; then
  454. shred -zu /home/$MY_USERNAME/.ipfs-id
  455. fi
  456. if [ -f /home/$MY_USERNAME/.ipfs-public ]; then
  457. shred -zu /home/$MY_USERNAME/.ipfs-public
  458. fi
  459. su -c "$IPFS_COMMAND init -b $IPFS_KEY_LENGTH" - $MY_USERNAME
  460. if [ ! -d /home/$MY_USERNAME/.ipfs ]; then
  461. echo "IPFS could not be initialised for user $MY_USERNAME" >> $INSTALL_LOG
  462. return
  463. fi
  464. MY_IPFS_ID=/home/$MY_USERNAME/.ipfs-id
  465. su -c "echo \$($IPFS_COMMAND id | grep '\"ID\":' | awk -F '\"' '{print \$4}') > $MY_IPFS_ID" - $MY_USERNAME
  466. if [ ! -f $MY_IPFS_ID ]; then
  467. echo 'No IPFS identity was created' >> $INSTALL_LOG
  468. return
  469. fi
  470. IPFS_PEER_ID=$(cat $MY_IPFS_ID)
  471. if [ ${#IPFS_PEER_ID} -lt 10 ]; then
  472. echo 'Invalid IPFS peer ID' >> $INSTALL_LOG
  473. echo "$IPFS_PEER_ID" >> $INSTALL_LOG
  474. return
  475. fi
  476. # make a public directory
  477. TOX_ID='none'
  478. if [ -d /home/$MY_USERNAME/Desktop ]; then
  479. if [ ! -d /home/$MY_USERNAME/Public ]; then
  480. mkdir /home/$MY_USERNAME/Public
  481. echo $'Files within this directory will be publicly visible on the network' > /home/$MY_USERNAME/Public/README.txt
  482. chown -R $MY_USERNAME:$MY_USERNAME /home/$MY_USERNAME/Public
  483. ln -s /home/$MY_USERNAME/Public /home/$MY_USERNAME/Desktop/Public
  484. su -c "echo \$($IPFS_COMMAND add -rq /home/$MY_USERNAME/Public | tail -n 1) > $IPFS_PUBLIC" - $MY_USERNAME
  485. if [ ! -f $IPFS_PUBLIC ]; then
  486. echo $'Unable to create public IPFS directory' >> $INSTALL_LOG
  487. exit 368225
  488. fi
  489. fi
  490. TOX_ID=$(su -c 'toxid' - $MY_USERNAME)
  491. fi
  492. create_avahi_mesh_service "ipfs_id" "ipfs_id" "udp" "$IPFS_PORT" "${IPFS_PEER_ID}:${TOX_ID}"
  493. echo "IPFS installed with ID ${IPFS_PEER_ID}" >> $INSTALL_LOG
  494. }
  495. function setup_tahoelafs {
  496. reconfigure_tahoelafs
  497. TAHOELAFS_CONFIG=/home/${MY_USERNAME}/.tahoe/tahoe.cfg
  498. if [ ! -f ${TAHOELAFS_CONFIG} ]; then
  499. exit 673923
  500. fi
  501. echo $'Configured Tahoe-LAFS' >> $INSTALL_LOG
  502. }
  503. function create_user_vpn_key {
  504. username=$1
  505. if [ ! -d /home/$username ]; then
  506. return
  507. fi
  508. echo $"Creating VPN key for $username" >> /var/log/${PROJECT_NAME}.log
  509. cd /etc/openvpn/easy-rsa
  510. if [ -f /etc/openvpn/easy-rsa/keys/$username.crt ]; then
  511. rm /etc/openvpn/easy-rsa/keys/$username.crt
  512. fi
  513. if [ -f /etc/openvpn/easy-rsa/keys/$username.key ]; then
  514. rm /etc/openvpn/easy-rsa/keys/$username.key
  515. fi
  516. if [ -f /etc/openvpn/easy-rsa/keys/$username.csr ]; then
  517. rm /etc/openvpn/easy-rsa/keys/$username.csr
  518. fi
  519. sed -i 's| --interact||g' build-key
  520. ./build-key "$username"
  521. if [ ! -f /etc/openvpn/easy-rsa/keys/$username.crt ]; then
  522. echo $'VPN user cert not generated' >> /var/log/${PROJECT_NAME}.log
  523. exit 783528
  524. fi
  525. user_cert=$(cat /etc/openvpn/easy-rsa/keys/$username.crt)
  526. if [ ${#user_cert} -lt 10 ]; then
  527. cat /etc/openvpn/easy-rsa/keys/$username.crt
  528. echo $'User cert generation failed' >> /var/log/${PROJECT_NAME}.log
  529. exit 634659
  530. fi
  531. if [ ! -f /etc/openvpn/easy-rsa/keys/$username.key ]; then
  532. echo $'VPN user key not generated'
  533. exit 682523
  534. fi
  535. user_key=$(cat /etc/openvpn/easy-rsa/keys/$username.key)
  536. if [ ${#user_key} -lt 10 ]; then
  537. cat /etc/openvpn/easy-rsa/keys/$username.key
  538. echo $'User key generation failed'
  539. exit 285838
  540. fi
  541. user_vpn_cert_file=/home/$username/$OPENVPN_KEY_FILENAME
  542. echo 'client' > $user_vpn_cert_file
  543. echo 'dev tun' >> $user_vpn_cert_file
  544. echo 'proto tcp' >> $user_vpn_cert_file
  545. echo "remote localhost $STUNNEL_PORT" >> $user_vpn_cert_file
  546. echo "route $DEFAULT_DOMAIN_NAME 255.255.255.255 net_gateway" >> $user_vpn_cert_file
  547. echo 'resolv-retry infinite' >> $user_vpn_cert_file
  548. echo 'nobind' >> $user_vpn_cert_file
  549. echo 'tun-mtu 1500' >> $user_vpn_cert_file
  550. echo 'tun-mtu-extra 32' >> $user_vpn_cert_file
  551. echo 'mssfix 1450' >> $user_vpn_cert_file
  552. echo 'persist-key' >> $user_vpn_cert_file
  553. echo 'persist-tun' >> $user_vpn_cert_file
  554. echo 'auth-nocache' >> $user_vpn_cert_file
  555. echo 'remote-cert-tls server' >> $user_vpn_cert_file
  556. echo 'comp-lzo' >> $user_vpn_cert_file
  557. echo 'verb 3' >> $user_vpn_cert_file
  558. echo '' >> $user_vpn_cert_file
  559. echo '<ca>' >> $user_vpn_cert_file
  560. cat /etc/openvpn/ca.crt >> $user_vpn_cert_file
  561. echo '</ca>' >> $user_vpn_cert_file
  562. echo '<cert>' >> $user_vpn_cert_file
  563. cat /etc/openvpn/easy-rsa/keys/$username.crt >> $user_vpn_cert_file
  564. echo '</cert>' >> $user_vpn_cert_file
  565. echo '<key>' >> $user_vpn_cert_file
  566. cat /etc/openvpn/easy-rsa/keys/$username.key >> $user_vpn_cert_file
  567. echo '</key>' >> $user_vpn_cert_file
  568. chown $username:$username $user_vpn_cert_file
  569. # keep a backup
  570. cp $user_vpn_cert_file /etc/openvpn/easy-rsa/keys/$username.ovpn
  571. #rm /etc/openvpn/easy-rsa/keys/$username.crt
  572. #rm /etc/openvpn/easy-rsa/keys/$username.csr
  573. shred -zu /etc/openvpn/easy-rsa/keys/$username.key
  574. echo $"VPN key created at $user_vpn_cert_file" >> /var/log/${PROJECT_NAME}.log
  575. }
  576. function vpn_generate_keys {
  577. # generate host keys
  578. if [ ! -f /etc/openvpn/dh2048.pem ]; then
  579. ${PROJECT_NAME}-dhparam -o /etc/openvpn/dh2048.pem
  580. fi
  581. if [ ! -f /etc/openvpn/dh2048.pem ]; then
  582. echo $'vpn dhparams were not generated' >> /var/log/${PROJECT_NAME}.log
  583. exit 73724523
  584. fi
  585. cp /etc/openvpn/dh2048.pem /etc/openvpn/easy-rsa/keys/dh2048.pem
  586. cd /etc/openvpn/easy-rsa
  587. . ./vars
  588. ./clean-all
  589. vpn_openssl_version='1.0.0'
  590. if [ ! -f openssl-${vpn_openssl_version}.cnf ]; then
  591. echo $"openssl-${vpn_openssl_version}.cnf was not found" >> /var/log/${PROJECT_NAME}.log
  592. exit 7392353
  593. fi
  594. cp openssl-${vpn_openssl_version}.cnf openssl.cnf
  595. if [ -f /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.crt ]; then
  596. rm /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.crt
  597. fi
  598. if [ -f /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.key ]; then
  599. rm /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.key
  600. fi
  601. if [ -f /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.csr ]; then
  602. rm /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.csr
  603. fi
  604. sed -i 's| --interact||g' build-key-server
  605. sed -i 's| --interact||g' build-ca
  606. ./build-ca
  607. ./build-key-server ${OPENVPN_SERVER_NAME}
  608. if [ ! -f /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.crt ]; then
  609. echo $'OpenVPN crt not found' >> /var/log/${PROJECT_NAME}.log
  610. exit 7823352
  611. fi
  612. server_cert=$(cat /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.crt)
  613. if [ ${#server_cert} -lt 10 ]; then
  614. cat /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.crt
  615. echo $'Server cert generation failed' >> /var/log/${PROJECT_NAME}.log
  616. exit 3284682
  617. fi
  618. if [ ! -f /etc/openvpn/easy-rsa/keys/${OPENVPN_SERVER_NAME}.key ]; then
  619. echo $'OpenVPN key not found' >> /var/log/${PROJECT_NAME}.log
  620. exit 6839436
  621. fi
  622. if [ ! -f /etc/openvpn/easy-rsa/keys/ca.key ]; then
  623. echo $'OpenVPN ca not found' >> /var/log/${PROJECT_NAME}.log
  624. exit 7935203
  625. fi
  626. cp /etc/openvpn/easy-rsa/keys/{$OPENVPN_SERVER_NAME.crt,$OPENVPN_SERVER_NAME.key,ca.crt} /etc/openvpn
  627. create_user_vpn_key ${MY_USERNAME}
  628. }
  629. function generate_stunnel_keys {
  630. echo "Creating stunnel keys" >> /var/log/${PROJECT_NAME}.log
  631. openssl req -x509 -nodes -days 3650 -sha256 \
  632. -subj "/O=$VPN_ORGANISATION/OU=$VPN_UNIT/C=$VPN_COUNTRY_CODE/ST=$VPN_AREA/L=$VPN_LOCATION/CN=$HOSTNAME" \
  633. -newkey rsa:2048 -keyout /etc/stunnel/key.pem \
  634. -out /etc/stunnel/cert.pem
  635. if [ ! -f /etc/stunnel/key.pem ]; then
  636. echo $'stunnel key not created' >> /var/log/${PROJECT_NAME}.log
  637. exit 793530
  638. fi
  639. if [ ! -f /etc/stunnel/cert.pem ]; then
  640. echo $'stunnel cert not created' >> /var/log/${PROJECT_NAME}.log
  641. exit 204587
  642. fi
  643. chmod 400 /etc/stunnel/key.pem
  644. chmod 640 /etc/stunnel/cert.pem
  645. cat /etc/stunnel/key.pem /etc/stunnel/cert.pem >> /etc/stunnel/stunnel.pem
  646. chmod 640 /etc/stunnel/stunnel.pem
  647. openssl pkcs12 -export -out /etc/stunnel/stunnel.p12 -inkey /etc/stunnel/key.pem -in /etc/stunnel/cert.pem -passout pass:
  648. if [ ! -f /etc/stunnel/stunnel.p12 ]; then
  649. echo $'stunnel pkcs12 not created' >> /var/log/${PROJECT_NAME}.log
  650. exit 639353
  651. fi
  652. chmod 640 /etc/stunnel/stunnel.p12
  653. cp /etc/stunnel/stunnel.pem /home/$MY_USERNAME/stunnel.pem
  654. cp /etc/stunnel/stunnel.p12 /home/$MY_USERNAME/stunnel.p12
  655. chown $MY_USERNAME:$MY_USERNAME $prefix$userhome/stunnel*
  656. echo "stunnel keys created" >> /var/log/${PROJECT_NAME}.log
  657. }
  658. function mesh_setup_vpn {
  659. vpn_generate_keys
  660. cp /etc/stunnel/stunnel-client.conf /home/$MY_USERNAME/stunnel-client.conf
  661. chown $MY_USERNAME:$MY_USERNAME /home/$MY_USERNAME/stunnel*
  662. generate_stunnel_keys
  663. sed -i 's|tun-mtu .*|tun-mtu 1532|g' /home/$MY_USERNAME/client.ovpn
  664. systemctl restart openvpn
  665. }
  666. function initialise_scuttlebot_pub {
  667. chown -R scuttlebot:scuttlebot /etc/scuttlebot
  668. systemctl enable scuttlebot.service
  669. systemctl daemon-reload
  670. systemctl start scuttlebot.service
  671. sleep 3
  672. if [ ! -d /etc/scuttlebot/.ssb ]; then
  673. echo $'Scuttlebot config not generated' >> /var/log/${PROJECT_NAME}.log
  674. exit 73528
  675. fi
  676. echo '{' > /etc/scuttlebot/.ssb/config
  677. echo " \"host\": \"${HOSTNAME}\"," >> /etc/scuttlebot/.ssb/config
  678. echo " \"port\": ${SCUTTLEBOT_PORT}," >> /etc/scuttlebot/.ssb/config
  679. echo ' "timeout": 30000,' >> /etc/scuttlebot/.ssb/config
  680. echo ' "pub": true,' >> /etc/scuttlebot/.ssb/config
  681. echo ' "local": true,' >> /etc/scuttlebot/.ssb/config
  682. echo ' "friends": {' >> /etc/scuttlebot/.ssb/config
  683. echo ' "dunbar": 150,' >> /etc/scuttlebot/.ssb/config
  684. echo ' "hops": 3' >> /etc/scuttlebot/.ssb/config
  685. echo ' },' >> /etc/scuttlebot/.ssb/config
  686. echo ' "gossip": {' >> /etc/scuttlebot/.ssb/config
  687. echo ' "connections": 2' >> /etc/scuttlebot/.ssb/config
  688. echo ' },' >> /etc/scuttlebot/.ssb/config
  689. echo ' "master": [],' >> /etc/scuttlebot/.ssb/config
  690. echo ' "logging": {' >> /etc/scuttlebot/.ssb/config
  691. echo ' "level": "error"' >> /etc/scuttlebot/.ssb/config
  692. echo ' }' >> /etc/scuttlebot/.ssb/config
  693. echo '}' >> /etc/scuttlebot/.ssb/config
  694. chown scuttlebot:scuttlebot /etc/scuttlebot/.ssb/config
  695. systemctl restart scuttlebot.service
  696. }
  697. # whether to reset the identity
  698. set_new_identity=
  699. if [ $2 ]; then
  700. if [[ "$2" == $"new"* ]]; then
  701. if [ ! -f $MESH_INSTALL_SETUP ]; then
  702. touch $MESH_INSTALL_SETUP
  703. fi
  704. set_new_identity=1
  705. fi
  706. if [[ "$2" == $"amnesic"* ]]; then
  707. if [ ! -f $MESH_AMNESIC ]; then
  708. touch $MESH_AMNESIC
  709. fi
  710. if [ ! -f $MESH_INSTALL_SETUP ]; then
  711. touch $MESH_INSTALL_SETUP
  712. fi
  713. set_new_identity=1
  714. fi
  715. fi
  716. if [ -f $MESH_INSTALL_SETUP ]; then
  717. if [ $1 ]; then
  718. MY_USERNAME=$1
  719. fi
  720. if [ ! $set_new_identity ]; then
  721. # sleep in order to allow other daemons to start up
  722. sleep 5
  723. fi
  724. # clear the install log
  725. if [ -f $INSTALL_LOG ]; then
  726. rm $INSTALL_LOG
  727. fi
  728. # Remove SSB/Patchwork files
  729. if [ -d /home/$MY_USERNAME/.ssb ]; then
  730. rm -rf /home/$MY_USERNAME/.ssb
  731. fi
  732. # Remove vpn keys
  733. if [ -d /etc/openvpn/easy-rsa/keys ]; then
  734. rm -rf /etc/openvpn/easy-rsa/keys/*
  735. fi
  736. echo $'Beginning mesh node setup' >> $INSTALL_LOG
  737. if [ -d /home/$MY_USERNAME/.config ]; then
  738. chown ${MY_USERNAME}:${MY_USERNAME} /home/$MY_USERNAME/.config
  739. fi
  740. #tomb slam all
  741. tmp_ram_disk 100
  742. enable_predictable_device_names
  743. enable_batman_daemon
  744. #create_ram_disk 1
  745. #setup_amnesic_data
  746. change_avahi_name
  747. configure_toxcore
  748. create_tox_user
  749. #setup_tahoelafs
  750. mesh_setup_vpn
  751. initialise_scuttlebot_pub
  752. setup_ipfs
  753. mesh_amnesic
  754. make_root_read_only
  755. if [ ! -f $MESH_AMNESIC ]; then
  756. rm $MESH_INSTALL_SETUP
  757. systemctl disable mesh-setup.service
  758. fi
  759. show_desktop_icons
  760. mesh_restart_daemons
  761. if [ ! -f $MESH_INSTALL_COMPLETED ]; then
  762. echo $'Mesh node setup complete' >> $INSTALL_LOG
  763. touch $MESH_INSTALL_COMPLETED
  764. if [ -d /home/$MY_USERNAME/Desktop ]; then
  765. touch $FIRST_BOOT
  766. chown ${MY_USERNAME}:${MY_USERNAME} $FIRST_BOOT
  767. fi
  768. # set the desktop background
  769. if [ -d /home/$MY_USERNAME/Desktop ]; then
  770. MESH_DESKTOP_BACKGROUND_IMAGE=/usr/local/share/${PROJECT_NAME}_mesh_background.png
  771. cp $MESH_DESKTOP_BACKGROUND_IMAGE /usr/share/images/desktop-base/${PROJECT_NAME}_mesh_background.png
  772. rm /usr/share/images/desktop-base/desktop-background
  773. ln -s /usr/share/images/desktop-base/${PROJECT_NAME}_mesh_background.png /usr/share/images/desktop-base/desktop-background
  774. fi
  775. if [ -f /etc/default/grub ]; then
  776. update-grub
  777. fi
  778. systemctl reboot -i
  779. fi
  780. fi
  781. exit 0