forked from FooDeas/raspberrypi-ua-netinst
-
Notifications
You must be signed in to change notification settings - Fork 0
/
update.sh
executable file
·466 lines (415 loc) · 12.1 KB
/
update.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
#!/usr/bin/env bash
# shellcheck source=./build.conf
# shellcheck disable=SC1091
RASPBIAN_ARCHIVE_KEY_DIRECTORY="https://archive.raspbian.org"
RASPBIAN_ARCHIVE_KEY_FILE_NAME="raspbian.public.key"
RASPBIAN_ARCHIVE_KEY_URL="${RASPBIAN_ARCHIVE_KEY_DIRECTORY}/${RASPBIAN_ARCHIVE_KEY_FILE_NAME}"
RASPBIAN_ARCHIVE_KEY_FINGERPRINT="A0DA38D0D76E8B5D638872819165938D90FDDD2E"
RASPBERRYPI_ARCHIVE_KEY_DIRECTORY="https://archive.raspberrypi.org/debian"
RASPBERRYPI_ARCHIVE_KEY_FILE_NAME="raspberrypi.gpg.key"
RASPBERRYPI_ARCHIVE_KEY_URL="${RASPBERRYPI_ARCHIVE_KEY_DIRECTORY}/${RASPBERRYPI_ARCHIVE_KEY_FILE_NAME}"
RASPBERRYPI_ARCHIVE_KEY_FINGERPRINT="CF8A1AF502A2AA2D763BAE7E82B129927FA3303E"
mirror_raspbian=http://mirrordirector.raspbian.org/raspbian
mirror_raspberrypi=http://archive.raspberrypi.org/debian
declare mirror_raspbian_cache
declare mirror_raspberrypi_cache
release=buster
packages=()
# programs
packages+=("raspberrypi-bootloader")
packages+=("raspberrypi-kernel")
packages+=("firmware-brcm80211")
packages+=("btrfs-progs")
packages+=("libbtrfs0")
packages+=("busybox")
packages+=("bash-static")
packages+=("cdebootstrap-static")
packages+=("coreutils")
packages+=("diffutils")
packages+=("dosfstools")
packages+=("dpkg")
packages+=("libext2fs2")
packages+=("e2fsprogs")
packages+=("f2fs-tools")
packages+=("gpgv")
packages+=("ifupdown")
packages+=("iproute2")
packages+=("lsb-base")
packages+=("netbase")
packages+=("netcat-openbsd")
packages+=("ntpdate")
packages+=("raspbian-archive-keyring")
packages+=("rng-tools")
packages+=("tar")
packages+=("fdisk")
packages+=("util-linux")
packages+=("wpasupplicant")
packages+=("libraspberrypi-bin")
packages+=("xxd")
packages+=("curl")
# libraries
packages+=("libacl1")
packages+=("libatm1")
packages+=("libattr1")
packages+=("libaudit-common")
packages+=("libaudit1")
packages+=("libblkid1")
packages+=("libbsd0")
packages+=("libbz2-1.0")
packages+=("libc-bin")
packages+=("libc6")
packages+=("libcap2")
packages+=("libcom-err2")
packages+=("libcurl4")
packages+=("libdb5.3")
packages+=("libdbus-1-3")
packages+=("libelf1")
packages+=("libf2fs5")
packages+=("libfdisk1")
packages+=("libffi6")
packages+=("libgcc1")
packages+=("libgcrypt20")
packages+=("libgmp10")
packages+=("libgnutls30")
packages+=("libgpg-error0")
packages+=("libgssapi-krb5-2")
packages+=("libhogweed4")
packages+=("libidn11")
packages+=("libidn2-0")
packages+=("libk5crypto3")
packages+=("libkeyutils1")
packages+=("libkrb5-3")
packages+=("libkrb5support0")
packages+=("libldap-2.4-2")
packages+=("liblz4-1")
packages+=("liblzma5")
packages+=("liblzo2-2")
packages+=("libmount1")
packages+=("libmnl0")
packages+=("libncurses5")
packages+=("libnettle6")
packages+=("libnghttp2-14")
packages+=("libnl-3-200")
packages+=("libnl-genl-3-200")
packages+=("libnl-route-3-200")
packages+=("libpam0g")
packages+=("libpcre3")
packages+=("libpcsclite1")
packages+=("libp11-kit0")
packages+=("libpsl5")
packages+=("libraspberrypi0")
packages+=("librtmp1")
packages+=("libsasl2-2")
packages+=("libselinux1")
packages+=("libslang2")
packages+=("libsmartcols1")
packages+=("libssh2-1")
packages+=("libssl1.1")
packages+=("libssl1.0.2")
packages+=("libsystemd0")
packages+=("libtasn1-6")
packages+=("libtinfo6")
packages+=("libudev1")
packages+=("libunistring2")
packages+=("libuuid1")
packages+=("zlib1g")
packages_debs=
packages_sha256=
download_file() {
local download_source=$1
local download_target=$2
local progress_option
if wget --show-progress --version &> /dev/null; [ "${?}" -eq 2 ]; then
progress_option=()
else
progress_option=("--show-progress")
fi
if [ -z "${download_target}" ]; then
for i in $(seq 1 5); do
if ! wget "${progress_option[@]}" -q --no-cache "${download_source}"; then
if [ "${i}" != "5" ]; then
sleep 5
else
echo -e "ERROR\nDownloading file '${download_source}' failed! Exiting."
exit 1
fi
else
break
fi
done
else
for i in $(seq 1 5); do
if ! wget "${progress_option[@]}" -q --no-cache -O "${download_target}" "${download_source}"; then
if [ "${i}" != "5" ]; then
sleep 5
else
echo -e "ERROR\nDownloading file '${download_source}' failed! Exiting."
exit 1
fi
else
break
fi
done
fi
}
check_key() {
# param 1 = keyfile
# param 2 = key fingerprint
# check input parameters
if [ -z "${1}" ] || [ ! -f "${1}" ]; then
echo "Parameter 1 of check_key() is not a file!"
return 1
fi
if [ -z "${2}" ]; then
echo "Parameter 2 of check_key() is not a key fingerprint!"
return 1
fi
KEY_FILE="$1"
KEY_FINGERPRINT="$2"
echo -n "Checking key file '${KEY_FILE}'... "
# check that there is only 1 public key in the key file
if [ ! "$(gpg --quiet --homedir gnupg --keyid-format long --with-fingerprint --with-colons "${KEY_FILE}" | grep -c "^pub:")" -eq 1 ]; then
echo "FAILED!"
echo "There are zero or more than one keys in the ${KEY_FILE} key file!"
return 1
fi
# check that the key file's fingerprint is correct
if [ "$(gpg --quiet --homedir gnupg --keyid-format long --with-fingerprint --with-colons "${KEY_FILE}" | grep ^fpr: | awk -F: '{print $10}')" != "${KEY_FINGERPRINT}" ]; then
echo "FAILED!"
echo "Bad GPG key fingerprint for ${KEY_FILE}!"
return 1
fi
echo "OK"
return 0
}
setup_archive_keys() {
mkdir -m 0700 -p gnupg
# Let gpg set itself up already in the 'gnupg' dir before we actually use it
echo "Setting up gpg... "
gpg --homedir gnupg --list-secret-keys
echo ""
echo "Downloading ${RASPBIAN_ARCHIVE_KEY_FILE_NAME}."
download_file ${RASPBIAN_ARCHIVE_KEY_URL}
if check_key "${RASPBIAN_ARCHIVE_KEY_FILE_NAME}" "${RASPBIAN_ARCHIVE_KEY_FINGERPRINT}"; then
# GPG key checks out, thus import it into our own keyring
echo -n "Importing '${RASPBIAN_ARCHIVE_KEY_FILE_NAME}' into keyring... "
if gpg -q --homedir gnupg --import "${RASPBIAN_ARCHIVE_KEY_FILE_NAME}"; then
echo "OK"
else
echo "FAILED!"
return 1
fi
else
return 1
fi
echo ""
echo "Downloading ${RASPBERRYPI_ARCHIVE_KEY_FILE_NAME}."
download_file ${RASPBERRYPI_ARCHIVE_KEY_URL}
if check_key "${RASPBERRYPI_ARCHIVE_KEY_FILE_NAME}" "${RASPBERRYPI_ARCHIVE_KEY_FINGERPRINT}"; then
# GPG key checks out, thus import it into our own keyring
echo -n "Importing '${RASPBERRYPI_ARCHIVE_KEY_FILE_NAME}' into keyring..."
if gpg -q --homedir gnupg --import "${RASPBERRYPI_ARCHIVE_KEY_FILE_NAME}"; then
echo "OK"
else
echo "FAILED!"
return 1
fi
else
return 1
fi
return 0
}
required() {
for i in "${packages[@]}"; do
[[ $i = "${1}" ]] && return 0
done
return 1
}
unset_required() {
for i in "${!packages[@]}"; do
[[ ${packages[$i]} = "${1}" ]] && unset "packages[$i]" && return 0
done
return 1
}
allfound() {
[[ ${#packages[@]} -eq 0 ]] && return 0
return 1
}
filter_package_list() {
grep -E 'Package:|Filename:|SHA256:|^$'
}
download_package_list() {
# Download and verify package list for $package_section, then add to Packages file
# Assume that the repository's base Release file is present
extensions=( '.xz' '.bz2' '.gz' '' )
for extension in "${extensions[@]}"; do
# Check that this extension is available
if grep -q "${package_section}/binary-armhf/Packages${extension}" "${1}_Release"; then
# Download Packages file
echo -e "\nDownloading ${package_section} package list..."
if ! download_file "${2}/dists/$release/$package_section/binary-armhf/Packages${extension}" "tmp${extension}"; then
echo -e "ERROR\nDownloading '${package_section}' package list failed! Exiting."
cd ..
exit 1
fi
# Verify the checksum of the Packages file, assuming that the last checksums in the Release file are SHA256 sums
echo -n "Verifying ${package_section} package list... "
if [ "$(grep "${package_section}/binary-armhf/Packages${extension}" "${1}_Release" | tail -n1 | awk '{print $1}')" = \
"$(sha256sum "tmp${extension}" | awk '{print $1}')" ]; then
echo "OK"
else
echo -e "ERROR\nThe checksum of file '${package_section}/binary-armhf/Packages${extension}' doesn't match!"
cd ..
exit 1
fi
# Decompress the Packages file
if [ "${extension}" = ".bz2" ]; then
decompressor="bunzip2 -c "
elif [ "${extension}" = ".xz" ]; then
decompressor="xzcat "
elif [ "${extension}" = ".gz" ]; then
decompressor="gunzip -c "
elif [ "${extension}" = "" ]; then
decompressor="cat "
fi
${decompressor} "tmp${extension}" >> "${1}_Packages"
rm "tmp${extension}"
break
fi
done
}
download_package_lists() {
if ! setup_archive_keys; then
echo -e "ERROR\nSetting up the archives failed! Exiting."
cd ..
exit 1
fi
echo -e "\nDownloading Release file and its signature..."
download_file "${2}/dists/$release/Release" "${1}_Release"
download_file "${2}/dists/$release/Release.gpg" "${1}_Release.gpg"
echo -n "Verifying Release file... "
if gpg --homedir gnupg --verify "${1}_Release.gpg" "${1}_Release" &> /dev/null; then
echo "OK"
else
echo -e "ERROR\nBroken GPG signature on Release file!"
cd ..
exit 1
fi
echo -n > "${1}_Packages"
package_section=firmware
download_package_list "${1}" "${2}"
package_section=main
download_package_list "${1}" "${2}"
package_section=non-free
download_package_list "${1}" "${2}"
}
add_packages() {
echo -e "\nAdding required packages..."
while read -r k v
do
if [ "${k}" = "Package:" ]; then
current_package=${v}
elif [ "${k}" = "Filename:" ]; then
current_filename=${v}
elif [ "${k}" = "SHA256:" ]; then
current_sha256=${v}
elif [ "${k}" = "" ]; then
if required "${current_package}"; then
printf " %-32s %s\n" "${current_package}" "$(basename "${current_filename}")"
unset_required "${current_package}"
packages_debs+=("${2}/${current_filename}")
packages_sha256+=("${current_sha256} $(basename "${current_filename}")")
allfound && break
fi
current_package=
current_filename=
current_sha256=
fi
done < <(filter_package_list <"${1}_Packages")
}
download_packages() {
echo -e "\nDownloading packages..."
for package in "${packages_debs[@]}"; do
echo -e "Downloading package: '${package}'"
if ! download_file ${package}; then
echo -e "ERROR\nDownloading '${package}' failed! Exiting."
cd ..
exit 1
fi
done
echo -n "Verifying downloaded packages... "
printf "%s\n" "${packages_sha256[@]}" > SHA256SUMS
if sha256sum --quiet -c SHA256SUMS; then
echo "OK"
else
echo -e "ERROR\nThe checksums of the downloaded packages don't match the package lists!"
cd ..
exit 1
fi
}
download_remote_file() {
if [ "${4}" != "" ]; then
echo -e "\nDownloading '${4}'..."
else
echo -e "\nDownloading '${2}'..."
fi
download_file "${1}${2}" "${2}_tmp"
if [ "${3}" != "" ]; then
if [[ "${2}" =~ .*\.tar\..* ]]; then
${3} "${2}_tmp" | tar -x "${4}"
else
${3} "${2}_tmp"
fi
rm "${2}_tmp"
else
mv "${2}_tmp" "${2}"
fi
}
# Read config
if [ -r ./build.conf ]; then
source <(tr -d "\015" < ./build.conf)
fi
# Download packages
(
rm -rf packages/
mkdir packages && cd packages
## Add caching proxy if configured
if [ -n "${mirror_raspbian_cache}" ]; then
mirror_raspbian=${mirror_raspbian/:\/\//:\/\/${mirror_raspbian_cache}\/}
fi
if [ -n "${mirror_raspberrypi_cache}" ]; then
mirror_raspberrypi=${mirror_raspberrypi/:\/\//:\/\/${mirror_raspberrypi_cache}\/}
fi
## Download package list
download_package_lists raspberry ${mirror_raspberrypi}
download_package_lists raspbian ${mirror_raspbian}
## Select packages for download
packages_debs=()
packages_sha256=()
add_packages raspberry ${mirror_raspberrypi}
add_packages raspbian ${mirror_raspbian}
if ! allfound; then
echo "ERROR: Unable to find all required packages in package list!"
echo "Missing packages: '${packages[*]}'"
exit 1
fi
## Download selected packages
download_packages
) || exit $?
# Download additional resources
(
mkdir -p res && cd res
## Download default /boot/config.txt and do default changes
mkdir -p initramfs/boot
cd initramfs/boot || exit 1
download_remote_file https://downloads.raspberrypi.org/raspbian/ "boot.tar.xz" xzcat ./config.txt
sed -i "s/^\(dtparam=audio=on\)/#\1/" config.txt # disable audio
{
echo -e "\n[pi3]"
echo -e "# Enable serial port\nenable_uart=1"
echo -e "\n[all]"
echo -e "# Add other config parameters below this line."
} >> config.txt
chmod 644 config.txt
cd ../.. || exit 1
) || exit $?