3 # This will format a new machine with a BOOT+HAMMER setup and install
4 # the live CD. You would boot the live CD, dhclient your network up,
5 # then run 'rconfig :hammer', assuming you have a rconfig server on the
6 # LAN. Alternately fetch the script from a known location and just run it.
8 # ad0s1a will be setup as a small UFS /boot. ad0s1d will be setup as
9 # HAMMER with all remaining disk space. Pseudo file-systems will be
10 # created for /var, /usr, etc (giving them separate inode spaces and
13 # ad0s1d will be set up as encrypted root file system using cryptsetup.
14 # During the installation process you have to choose a password and enter
15 # it three times. Remember your password as you won't be able to recover
16 # your data without it!
18 # WARNING: HAMMER filesystems (and pseudo-filesystems) must be
19 # occassionally pruned and reblocked. 'man hammer' for more information.
23 # For safety this only runs on a CD-booted machine
25 df / | awk '{ print $1; }' | fgrep cd
26 if ( $status > 0 ) then
27 echo "This program formats your disk and you didn't run it from"
32 echo "This program formats disk ${disk}! Hit ^C now or its gone."
33 foreach i ( 10 9 8 7 6 5 4 3 2 1 )
39 # Unmount any prior mounts on /mnt, reverse order to unwind
40 # sub-directory mounts.
42 foreach i ( `df | fgrep /mnt | awk '{ print $6; }' | tail -r` )
52 # Format and label the disk.
55 # 'd' HAMMER filesystem
57 # Use PFSs for backup domain separation
59 dd if=/dev/zero of=/dev/${disk} bs=32k count=16
61 disklabel64 -r -w ${disk}s1 auto
62 disklabel64 -B ${disk}s1
63 disklabel64 ${disk}s1 > /tmp/label
64 cat >> /tmp/label << EOF
69 disklabel64 -R ${disk}s1 /tmp/label
73 # Load dm and setup a new encrypted root fs
76 cryptsetup -y luksFormat /dev/${disk}s1
77 cryptsetup luksOpen /dev/${disk}s1d root || exit 1
79 newfs_hammer -L ROOT /dev/mapper/root
83 mount_hammer /dev/mapper/root /mnt
85 mount /dev/${disk}s1a /mnt/boot
87 # Create PFS mount points for nullfs.
89 # Do the mounts manually so we can install the system, setup
93 hammer pfs-master /mnt/pfs/usr
94 hammer pfs-master /mnt/pfs/usr.obj
95 hammer pfs-master /mnt/pfs/var
96 hammer pfs-master /mnt/pfs/var.crash
97 hammer pfs-master /mnt/pfs/var.tmp
98 hammer pfs-master /mnt/pfs/tmp
99 hammer pfs-master /mnt/pfs/home
106 mount_null /mnt/pfs/usr /mnt/usr
107 mount_null /mnt/pfs/var /mnt/var
108 mount_null /mnt/pfs/tmp /mnt/tmp
109 mount_null /mnt/pfs/home /mnt/home
115 mount_null /mnt/pfs/var.tmp /mnt/var/tmp
116 mount_null /mnt/pfs/var.crash /mnt/var/crash
117 mount_null /mnt/pfs/usr.obj /mnt/usr/obj
120 chmod 1777 /mnt/var/tmp
122 # Install the system from the live CD
125 cpdup -o /boot /mnt/boot
126 cpdup -o /usr /mnt/usr
127 cpdup -o /var /mnt/var
128 cpdup -i0 /etc.hdd /mnt/etc
130 chflags -R nohistory /mnt/tmp
131 chflags -R nohistory /mnt/var/tmp
132 chflags -R nohistory /mnt/var/crash
133 chflags -R nohistory /mnt/usr/obj
135 # Create some directories to be used for NFS mounts later on.
138 foreach i ( /proc /usr/doc /usr/src /repository /ftp /archive )
139 if ( ! -d /mnt$i ) then
144 cat > /mnt/etc/fstab << EOF
145 # Device Mountpoint FStype Options Dump Pass#
146 /dev/${disk}s1d / hammer rw 1 1
147 /dev/${disk}s1a /boot ufs rw 1 1
148 /dev/${disk}s1b none swap sw 0 0
149 /pfs/usr /usr null rw 0 0
150 /pfs/var /var null rw 0 0
151 /pfs/tmp /tmp null rw 0 0
152 /pfs/home /home null rw 0 0
153 /pfs/var.tmp /var/tmp null rw 0 0
154 /pfs/usr.obj /usr/obj null rw 0 0
155 /pfs/var.crash /var/crash null rw 0 0
156 proc /proc procfs rw 0 0
157 # misc NFS mounts to get your test box access to 'stuff'
158 #crater:/repository /repository nfs ro,intr,bg 0 0
159 #crater:/usr/doc /usr/doc nfs ro,intr,bg 0 0
160 #crater:/ftp /ftp nfs ro,intr,bg 0 0
161 #crater:/sources/HEAD /usr/src nfs ro,intr,bg 0 0
162 #pkgbox:/archive /archive nfs ro,intr,bg 0 0
166 # Mount devfs and create a new initrd
171 # Because root is not on the boot partition we have to tell the loader
172 # to tell the kernel where root is.
174 cat > /mnt/boot/loader.conf << EOF
176 initrd.img_load="YES"
177 initrd.img_type="md_image"
178 vfs.root.mountfrom="ufs:md0s0"
179 vfs.root.realroot="crypt:hammer:/dev/${disk}s1d:root"
182 # Setup interface, configuration, sshd
184 set ifc = `route -n get default | fgrep interface | awk '{ print $2; }'`
185 set ip = `ifconfig $ifc | fgrep inet | fgrep -v inet6 | awk '{ print $2; }'`
186 set lip = `echo $ip | awk -F . '{ print $4; }'`
188 echo -n "ifconfig_$ifc=" >> /mnt/etc/rc.conf
189 echo '"DHCP"' >> /mnt/etc/rc.conf
190 cat >> /mnt/etc/rc.conf << EOF
193 hostname="test$lip.MYDOMAIN.XXX"
194 dumpdev="/dev/${disk}s1b"
199 cat >> /mnt/etc/sysctl.conf << EOF
200 #net.inet.ip.portrange.first=4000
203 # adjust work directory for pkgsrc in case we want
204 # to mount /usr/pkgsrc read-only.
206 cat >> /mnt/usr/pkg/etc/mk.conf << EOF
207 .ifdef BSD_PKG_MK # begin pkgsrc settings
208 WRKOBJDIR= /usr/obj/pkgsrc
209 .endif # end pkgsrc settings
212 # Allow sshd root logins via dsa key only
214 fgrep 'PermitRootLogin without-password' /mnt/etc/ssh/sshd_config >& /dev/null
216 echo "PermitRootLogin without-password" >> /mnt/etc/ssh/sshd_config
219 # additional loader.conf stuff
220 #cat >> /mnt/boot/loader.conf << EOF
224 # Get sshd working - auto install my key so I can login.
226 #mkdir -p /mnt/root/.ssh
227 #cat > /mnt/root/.ssh/authorized_keys << EOF
231 if ( ! -f /mnt/etc/ssh/ssh_host_dsa_key ) then
233 ssh-keygen -t dsa -f ssh_host_dsa_key -N ""
236 # take CD out and reboot