saving uncommitted changes in /etc prior to apt run

Joshua Dye 5 years ago
parent a970c508f6
commit c8dd1cc731

@ -8,6 +8,8 @@ mkdir -p './avahi/services'
mkdir -p './binfmt.d'
mkdir -p './ca-certificates/update.d'
mkdir -p './dbus-1/session.d'
mkdir -p './dehydrated/alpn-certs'
mkdir -p './dehydrated/chains'
mkdir -p './dhcp/.git/branches'
mkdir -p './dhcp/.git/objects/info'
mkdir -p './dhcp/.git/objects/pack'
@ -277,6 +279,26 @@ maybe chmod 0644 'default/ssh'
maybe chmod 0644 'default/sysstat'
maybe chmod 0644 'default/triggerhappy'
maybe chmod 0644 'default/useradd'
maybe chmod 0755 'dehydrated'
maybe chmod 0700 'dehydrated/accounts'
maybe chmod 0700 'dehydrated/accounts/aHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2RpcmVjdG9yeQo'
maybe chmod 0600 'dehydrated/accounts/aHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2RpcmVjdG9yeQo/account_key.pem'
maybe chmod 0600 'dehydrated/accounts/aHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2RpcmVjdG9yeQo/registration_info-1547219110.json'
maybe chmod 0600 'dehydrated/accounts/aHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2RpcmVjdG9yeQo/registration_info-1547219326.json'
maybe chmod 0600 'dehydrated/accounts/aHR0cHM6Ly9hY21lLXYwMi5hcGkubGV0c2VuY3J5cHQub3JnL2RpcmVjdG9yeQo/registration_info.json'
maybe chmod 0700 'dehydrated/alpn-certs'
maybe chmod 0700 'dehydrated/certs'
maybe chmod 0700 'dehydrated/certs/5f3b42dd7a0ab1cb.natalieandjoshua.com'
maybe chmod 0600 'dehydrated/certs/5f3b42dd7a0ab1cb.natalieandjoshua.com/cert-1547219510.csr'
maybe chmod 0600 'dehydrated/certs/5f3b42dd7a0ab1cb.natalieandjoshua.com/cert-1547219510.pem'
maybe chmod 0600 'dehydrated/certs/5f3b42dd7a0ab1cb.natalieandjoshua.com/privkey-1547219510.pem'
maybe chmod 0700 'dehydrated/chains'
maybe chown 'jgdye' 'dehydrated/config'
maybe chgrp 'jgdye' 'dehydrated/config'
maybe chmod 0644 'dehydrated/config'
maybe chown 'jgdye' 'dehydrated/domains.txt'
maybe chgrp 'jgdye' 'dehydrated/domains.txt'
maybe chmod 0644 'dehydrated/domains.txt'
maybe chmod 0644 'deluser.conf'
maybe chmod 0644 'devscripts.conf'
maybe chmod 0755 'dhcp'

@ -0,0 +1,51 @@
-----BEGIN RSA PRIVATE KEY-----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-----END RSA PRIVATE KEY-----

@ -0,0 +1,12 @@
{
"id": 49334232,
"key": {
"kty": "RSA",
"n": "w2anOE2E-QynOuH0MF1FgQi6DJ8UC5KJoDlt1Rasq5VEguIqTjnFJkeyJW6qxJYzB4ssChGez7xBR4ELLRwvaWwg4431EoEyCSHKt1OVJfonm5r0_n-BV_c2P5ebYJWk1gbmQfn93XkzfQXgInU1TDvKRAQ9mTduWESehkwMSSgqMd5xmLcteq9lCRe9Bg2cHRVcNeE3cFZcwm0njt8AplWERFoyqIU4DPCMzmxPNJ8Qei_4IpImvCj8QJXVZsnE_1pYkTb3oqdhZcOlswA9ulnfFxnGvR4sOhcWKYWH-4xcyDkSlnc8s24V5N2At1dg7XlLexzOWYuYIKkOk9FG6v_-aKotWQw14HFHfEh7KTKsem5nJbGcUxl6kcxUGEj35cLSaxwSuXg_Ru0ixeFiYn3LeBXhq8eM_Fytosr7ZZVPlnuPbhcqR1oh2hCHOqEsaJ0iHwZe9EOGCoVTXaMCVGUA-3xw3yAEND6-U2kwucb7UiJr54QZNVxP2D26OAct3ruBqykINcn-zqhR2ZePtBvpBZYQH14NBpkOqfaW_SB2S4sXZOd6BkBI-pd9ps3oxIcduPgCdQpL_uX9bhIP71nA7bp79IJAy0q4xKbQh-KqPOQG7pBlknSQkkNw_SRI-rl3RURH9vVPi37UpZBJRl59PbALGly2eMjUDRLgPHc",
"e": "AQAB"
},
"contact": [],
"initialIp": "71.176.21.34",
"createdAt": "2019-01-11T15:03:35.397065828Z",
"status": "valid"
}

@ -0,0 +1,12 @@
{
"id": 49334232,
"key": {
"kty": "RSA",
"n": "w2anOE2E-QynOuH0MF1FgQi6DJ8UC5KJoDlt1Rasq5VEguIqTjnFJkeyJW6qxJYzB4ssChGez7xBR4ELLRwvaWwg4431EoEyCSHKt1OVJfonm5r0_n-BV_c2P5ebYJWk1gbmQfn93XkzfQXgInU1TDvKRAQ9mTduWESehkwMSSgqMd5xmLcteq9lCRe9Bg2cHRVcNeE3cFZcwm0njt8AplWERFoyqIU4DPCMzmxPNJ8Qei_4IpImvCj8QJXVZsnE_1pYkTb3oqdhZcOlswA9ulnfFxnGvR4sOhcWKYWH-4xcyDkSlnc8s24V5N2At1dg7XlLexzOWYuYIKkOk9FG6v_-aKotWQw14HFHfEh7KTKsem5nJbGcUxl6kcxUGEj35cLSaxwSuXg_Ru0ixeFiYn3LeBXhq8eM_Fytosr7ZZVPlnuPbhcqR1oh2hCHOqEsaJ0iHwZe9EOGCoVTXaMCVGUA-3xw3yAEND6-U2kwucb7UiJr54QZNVxP2D26OAct3ruBqykINcn-zqhR2ZePtBvpBZYQH14NBpkOqfaW_SB2S4sXZOd6BkBI-pd9ps3oxIcduPgCdQpL_uX9bhIP71nA7bp79IJAy0q4xKbQh-KqPOQG7pBlknSQkkNw_SRI-rl3RURH9vVPi37UpZBJRl59PbALGly2eMjUDRLgPHc",
"e": "AQAB"
},
"contact": [],
"initialIp": "71.176.21.34",
"createdAt": "2019-01-11T15:03:35Z",
"status": "valid"
}

@ -0,0 +1,14 @@
{
"id": 49334232,
"key": {
"kty": "RSA",
"n": "w2anOE2E-QynOuH0MF1FgQi6DJ8UC5KJoDlt1Rasq5VEguIqTjnFJkeyJW6qxJYzB4ssChGez7xBR4ELLRwvaWwg4431EoEyCSHKt1OVJfonm5r0_n-BV_c2P5ebYJWk1gbmQfn93XkzfQXgInU1TDvKRAQ9mTduWESehkwMSSgqMd5xmLcteq9lCRe9Bg2cHRVcNeE3cFZcwm0njt8AplWERFoyqIU4DPCMzmxPNJ8Qei_4IpImvCj8QJXVZsnE_1pYkTb3oqdhZcOlswA9ulnfFxnGvR4sOhcWKYWH-4xcyDkSlnc8s24V5N2At1dg7XlLexzOWYuYIKkOk9FG6v_-aKotWQw14HFHfEh7KTKsem5nJbGcUxl6kcxUGEj35cLSaxwSuXg_Ru0ixeFiYn3LeBXhq8eM_Fytosr7ZZVPlnuPbhcqR1oh2hCHOqEsaJ0iHwZe9EOGCoVTXaMCVGUA-3xw3yAEND6-U2kwucb7UiJr54QZNVxP2D26OAct3ruBqykINcn-zqhR2ZePtBvpBZYQH14NBpkOqfaW_SB2S4sXZOd6BkBI-pd9ps3oxIcduPgCdQpL_uX9bhIP71nA7bp79IJAy0q4xKbQh-KqPOQG7pBlknSQkkNw_SRI-rl3RURH9vVPi37UpZBJRl59PbALGly2eMjUDRLgPHc",
"e": "AQAB"
},
"contact": [
"mailto:joshua.dye@gmail.com"
],
"initialIp": "71.176.21.34",
"createdAt": "2019-01-11T15:03:35Z",
"status": "valid"
}

@ -0,0 +1,28 @@
-----BEGIN CERTIFICATE REQUEST-----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-----END CERTIFICATE REQUEST-----

@ -0,0 +1,51 @@
-----BEGIN RSA PRIVATE KEY-----
MIIJKAIBAAKCAgEAuLARRdgmvIYaOgTOu8/eDEqHnUf/qfZqnjK89UM52dpE/O2c
74PexhFTgyCFxzAtUGOrUH6IpxCWSu6FVLimqlCyNquWBLLJLGFqz/dgnY8RQSxI
pwrxFHntMIg88PiI+BdzocdO2FvdZoZk+N3zLybkLy71wF4wMiIL012h+qtjaKNK
g3jnaAVdFQgnDEbQd0oM+Y7hLnXN3yq6qs/wNKngbkEQWjrE7YxizLcdSEqUbOQ9
sy3X0xK8wo6ITuImAz1R+3OpHSfdF9ZM1/bx1thpoF1fyLievsQVvG4nZaKsjOCE
32g9zzGBQYOu73HV2ss208BcR0xofoWEwNUvA2hQQIkXn5ukwrrhTb+PzukhgKDl
NWhjetfRngbdSMFbVJfUapsGnAYiCVZJN+4k50qIn7PZ3xQEP3Mt5syvWngd8INB
m8xURFnMjVPr90d1bLD/Qi0satiSmV8l1TRScOsMStCYU5g/F6ff1MATDt2SmA6A
ltpm4qvDgpc6V88jflrbAg1Zwp4d/YN8ld/5VzmW3Idep8fcp/1i4sG8gEwTF/+q
FTlWZRY4pG+24x4JnlRGHqsB+LIabz2QaCev5nPPzhnWXgcaRy8EHMUR2WtCPFL1
1msuMCi83SQ8iYJnZsiHPS+eVNY8J96Kh3pLIC8BXSZRStzZV5YyIBGkyWMCAwEA
AQKCAgAg8XcDSF0Qf7Mp6jWeFqP6+Uhba75U6Nl3woEmFom5LE/l9dRqfNE971VA
LIrwTs2ma0DhqNBjTHgigY1S4WUJOD+xtMWbrPBpdC8DTZL0R9LCF04WTcNW7bC7
WXHVYd+8sSI1F0IfIbPKV+qm4aBBJuTI7c10NNjP+Ha3ixobhnrC7W2bKfPNADfs
Snn8nJ0OyiyqTywnh2fjiNGnKlQkcLDRudVa4uTBoqr07SzR+kujaMsArQq0YcE9
ywLRX1F8fnGjMqxVwQiU+erXEvtsYUnmCwHM4fGfAYcHB3cLkArLTjklSIjN7nyp
3P1VRK7qyhjLiKJtLVnuR464fs5VtXUMovQuZcX/+ZP82XCJSVo0XttEtL1NhPuu
N8smH93YaNm7uIZJ2XadvWT1H0sga8BUR1K4pFAwvM/DbTF36vHB5xvRWWI790vo
eUZmdrw3pdTsecXrTgkmPimfFQX0iQ7dyQqVh1Y0P386yuUUdaI90K7C3EyoCUxx
fu1onClpss35AtaNmm6Yn4+VHcwRq88fegljYrdMJtP+gyD2hMXiksrTMu5WZalZ
mj9KjwQLdcv6He62TZCbvirYN9VgOKsTfdSBHT+bvPZS10+RNdI+PCUmf6Lp3bzf
LpFFYDlaR2+SlrUw1sdFemiWytC8Rtu4IUhUECaSM6iLuT6GoQKCAQEA6wzfeJrV
9bSsL8Q1YFmM19aThCEgs4MV3oQ4wU1iN1Aiy/xF91iM+VEIU7vb7K8AZUr9c8Ro
KcgXkMINOGh9l5kijBPBbAxIwn+LbgWJiGWGUcQOSZ9aoWaSgkLY57XIYCPzE62O
JLUGKXW/GCqC1viyDMH+woAqW4x9VRebWcZ4jcqKMHigCTmcEGMTJg3e8ve6DcNp
cySjj/xumL6YMhGFVSNg2G6iXM2g88ubQCM89gtch1CPhEB1mwyqjicTUesB54Pw
6lgr2lpgtm8bXsrtun6rY82i7WrTDv6kiKA6fgN5m84LS8+UHji/+dzUVD8Yyfj5
9N8XMU0NRSdDawKCAQEAySYTf3Q3q4kJXpJgkFK2AOxfRVS2O9y1sAB1tSE5eHs5
W6yYZGQ0/BNJtvD9IiwbvZZH0JiCXhASZsSq017LyWaFgSY43bplz82ajWilbsPm
2kqc5siPtnuwgg1mDr8Mr8x3+bNl4rRuIiSogh0IAKxORRfokjI4d7XXraPoLapU
U4gg8xg5NCNAbCGZNVEjDCI88o7RRXZNFe6i9Kog6dz41RE8/X5lpz9Rt2CZJj2/
RlP86yGpB9vJOI3Ze/rJRt/uu8K0M7yF1dKD1BGVgUmf1SOsvdpdej4A5cxqLUTG
Zj3+N4krRuKQTFcvGOcGF9BCwxXYRpFNtCctptGH6QKCAQAJbOa5K1xREgGlmLSb
PHwNW6lmrv1ktWj3F04/Uh8SIMCEdYVIueBNTxaKZQoYn5vgc/Vd4w5aPo/TWjS1
glsm7RkZjOFAt+1i/0JUExzEv213cekwwpcbycUuPAf+oqd6U3a330nH5wpsNzCG
g43jmO1q3YyduA36xdNwyhWMsAy9gtWvw+aG+Cxt68skx4GdNJndW2yrFVkJuRGm
Rl5MA6/ZDiYgB6+zEPvXSt7a347ePu5i7rQSlZMhuIxOTvrTWh0lb4EFpKt9ggpG
xoXOc0y9Ib81rVVPN+1muIdYgzRVQUZrHQQO8i/6VkQ8fMJ27mDMGJPNYfTIIVLa
5wwpAoIBAAvGCsYfC1MjBkVe1AAel0CelUT9nF0MoiXXIQylETQYIldXVuQpaWCH
0HzAxlBFvKnwLevrwVW4IxuYz1bn6Y20ToQstI9l5aewJSe5xFUjalPEokJv4tmP
i9lQ53RdgmSX1z3qXkBSx0+ATcyv3lQLwdkReS91eRCouCMVwPVLTvxEr4kLFe4T
UiYCIXGZei+voVmhOmaSchiiiy8+9gY6ROZTx/oed9y+PA47vTsbyiJXsCojIj2v
g6unwd8b4sQfP14GG34bvsmxNL4o+VND9/MFz4qdSXNqRastt9lGeUZqwoKFqN7R
TBjr0Xnnq9eg/QdmM+6NerrcwDNPeGECggEBAIoiec8KAbXDjNrGCbyOkosOrpyB
9YqI8NDJbcXe/sY58mWQDK7qBQmmT9dy2UAhu0Md+mHX6mf5QwHTiSC/lasw9ibC
X/cxcZuXFMRks+y+BoGd42ytdlV8j8hzg2Nj2eGnEc5s2+OEv6p20+dOrfuz5MtU
l1ycEkTeB/V6NXgHGmWseaoLma4k/jl043w6Sr2nndQkmwxCioCcO5XnOk8Whjsy
E/8XsVtEOvq3/vhr7XoW/rvFWL5p1d4EnzGJghfyicEvu9Jx6fLBMGEiKo68T8jV
BoD6AnrHISq+Wrg/XbIEpcM10qib+Klq9IGD9WSiAiSFwRAlJXfNYkSZpJ8=
-----END RSA PRIVATE KEY-----

@ -0,0 +1,127 @@
########################################################
# This is the main config file for dehydrated #
# #
# This file is looked for in the following locations: #
# $SCRIPTDIR/config (next to this script) #
# /usr/local/etc/dehydrated/config #
# /etc/dehydrated/config #
# ${PWD}/config (in current working-directory) #
# #
# Default values of this config are in comments #
########################################################
# Which user should dehydrated run as? This will be implictly enforced when running as root
#DEHYDRATED_USER=
# Which group should dehydrated run as? This will be implictly enforced when running as root
#DEHYDRATED_GROUP=
# Resolve names to addresses of IP version only. (curl)
# supported values: 4, 6
# default: <unset>
#IP_VERSION=
# Path to certificate authority (default: https://acme-v02.api.letsencrypt.org/directory)
#CA="https://acme-v02.api.letsencrypt.org/directory"
# Path to old certificate authority
# Set this value to your old CA value when upgrading from ACMEv1 to ACMEv2 under a different endpoint.
# If dehydrated detects an account-key for the old CA it will automatically reuse that key
# instead of registering a new one.
# default: https://acme-v01.api.letsencrypt.org/directory
#OLDCA="https://acme-v01.api.letsencrypt.org/directory"
# Which challenge should be used? Currently http-01, dns-01 and tls-alpn-01 are supported
CHALLENGETYPE="tls-alpn-01"
# Path to a directory containing additional config files, allowing to override
# the defaults found in the main configuration file. Additional config files
# in this directory needs to be named with a '.sh' ending.
# default: <unset>
#CONFIG_D=
# Directory for per-domain configuration files.
# If not set, per-domain configurations are sourced from each certificates output directory.
# default: <unset>
#DOMAINS_D=
# Base directory for account key, generated certificates and list of domains (default: $SCRIPTDIR -- uses config directory if undefined)
BASEDIR=/etc/dehydrated
# File containing the list of domains to request certificates for (default: $BASEDIR/domains.txt)
#DOMAINS_TXT="${BASEDIR}/domains.txt"
# Output directory for generated certificates
#CERTDIR="${BASEDIR}/certs"
# Output directory for alpn verification certificates
#ALPNCERTDIR="${BASEDIR}/alpn-certs"
# Directory for account keys and registration information
#ACCOUNTDIR="${BASEDIR}/accounts"
# Output directory for challenge-tokens to be served by webserver or deployed in HOOK (default: /var/www/dehydrated)
#WELLKNOWN="/var/www/dehydrated"
# Default keysize for private keys (default: 4096)
#KEYSIZE="4096"
# Path to openssl config file (default: <unset> - tries to figure out system default)
#OPENSSL_CNF=
# Path to OpenSSL binary (default: "openssl")
#OPENSSL="openssl"
# Extra options passed to the curl binary (default: <unset>)
#CURL_OPTS=
# Program or function called in certain situations
#
# After generating the challenge-response, or after failed challenge (in this case altname is empty)
# Given arguments: clean_challenge|deploy_challenge altname token-filename token-content
#
# After successfully signing certificate
# Given arguments: deploy_cert domain path/to/privkey.pem path/to/cert.pem path/to/fullchain.pem
#
# BASEDIR and WELLKNOWN variables are exported and can be used in an external program
# default: <unset>
#HOOK=
# Chain clean_challenge|deploy_challenge arguments together into one hook call per certificate (default: no)
#HOOK_CHAIN="no"
# Minimum days before expiration to automatically renew certificate (default: 30)
#RENEW_DAYS="30"
# Regenerate private keys instead of just signing new certificates on renewal (default: yes)
#PRIVATE_KEY_RENEW="yes"
# Create an extra private key for rollover (default: no)
#PRIVATE_KEY_ROLLOVER="no"
# Which public key algorithm should be used? Supported: rsa, prime256v1 and secp384r1
#KEY_ALGO=rsa
# E-mail to use during the registration (default: <unset>)
CONTACT_EMAIL="joshua.dye@gmail.com"
# Lockfile location, to prevent concurrent access (default: $BASEDIR/lock)
#LOCKFILE="${BASEDIR}/lock"
# Option to add CSR-flag indicating OCSP stapling to be mandatory (default: no)
#OCSP_MUST_STAPLE="no"
# Fetch OCSP responses (default: no)
#OCSP_FETCH="no"
# OCSP refresh interval (default: 5 days)
#OCSP_DAYS=5
# Issuer chain cache directory (default: $BASEDIR/chains)
#CHAINCACHE="${BASEDIR}/chains"
# Automatic cleanup (default: no)
#AUTO_CLEANUP="no"
# ACME API version (default: auto)
#API=auto

@ -0,0 +1,7 @@
# Create certificate for 'example.org' with an alternative name of
# 'www.example.org'. It will be stored in the directory ${CERT_DIR}/example.org
5f3b42dd7a0ab1cb.natalieandjoshua.com
rss.natalieandjoshua.com
vpn.ovalwonder.com
wifi2.natalieandjoshua.com
wifi.natalieandjoshua.com
Loading…
Cancel
Save