mirror of
https://github.com/tommytran732/Arch-Setup-Script
synced 2024-11-09 04:01:33 -05:00
442 lines
17 KiB
Bash
442 lines
17 KiB
Bash
#!/usr/bin/env -S bash -e
|
|
|
|
# Cleaning the TTY.
|
|
clear
|
|
|
|
# Updating the live environment
|
|
pacman -Syu
|
|
|
|
# Installing curl
|
|
pacman -S --noconfirm curl
|
|
|
|
# Selecting the kernel flavor to install.
|
|
kernel_selector () {
|
|
echo "List of kernels:"
|
|
echo "1) Stable — Vanilla Linux kernel and modules, with a few patches applied."
|
|
echo "2) Hardened — A security-focused Linux kernel."
|
|
echo "3) Longterm — Long-term support (LTS) Linux kernel and modules."
|
|
echo "4) Zen Kernel — Optimized for desktop usage."
|
|
read -r -p "Insert the number of the corresponding kernel: " choice
|
|
echo "$choice will be installed"
|
|
case $choice in
|
|
1 ) kernel=linux
|
|
;;
|
|
2 ) kernel=linux-hardened
|
|
;;
|
|
3 ) kernel=linux-lts
|
|
;;
|
|
4 ) kernel=linux-zen
|
|
;;
|
|
* ) echo "You did not enter a valid selection."
|
|
kernel_selector
|
|
esac
|
|
}
|
|
|
|
# Checking the microcode to install.
|
|
CPU=$(grep vendor_id /proc/cpuinfo)
|
|
if [[ $CPU == *"AuthenticAMD"* ]]; then
|
|
microcode=amd-ucode
|
|
else
|
|
microcode=intel-ucode
|
|
fi
|
|
|
|
# Selecting the target for the installation.
|
|
PS3="Select the disk where Arch Linux is going to be installed: "
|
|
select ENTRY in $(lsblk -dpnoNAME|grep -P "/dev/sd|nvme|vd");
|
|
do
|
|
DISK=$ENTRY
|
|
echo "Installing Arch Linux on $DISK."
|
|
break
|
|
done
|
|
|
|
# Deleting old partition scheme.
|
|
read -r -p "This will delete the current partition table on $DISK. Do you agree [y/N]? " response
|
|
response=${response,,}
|
|
if [[ "$response" =~ ^(yes|y)$ ]]; then
|
|
wipefs -af "$DISK" &>/dev/null
|
|
sgdisk -Zo "$DISK" &>/dev/null
|
|
else
|
|
echo "Quitting."
|
|
exit
|
|
fi
|
|
|
|
# Creating a new partition scheme.
|
|
echo "Creating new partition scheme on $DISK."
|
|
parted -s "$DISK" \
|
|
mklabel gpt \
|
|
mkpart ESP fat32 1MiB 101MiB \
|
|
set 1 esp on \
|
|
mkpart cryptroot 101MiB 100% \
|
|
|
|
ESP="/dev/disk/by-partlabel/ESP"
|
|
cryptroot="/dev/disk/by-partlabel/cryptroot"
|
|
|
|
# Informing the Kernel of the changes.
|
|
echo "Informing the Kernel about the disk changes."
|
|
partprobe "$DISK"
|
|
|
|
# Formatting the ESP as FAT32.
|
|
echo "Formatting the EFI Partition as FAT32."
|
|
mkfs.fat -F 32 $ESP &>/dev/null
|
|
|
|
# Creating a LUKS Container for the root partition.
|
|
echo "Creating LUKS Container for the root partition."
|
|
cryptsetup luksFormat --type luks1 $cryptroot
|
|
echo "Opening the newly created LUKS Container."
|
|
cryptsetup open $cryptroot cryptroot
|
|
BTRFS="/dev/mapper/cryptroot"
|
|
|
|
# Formatting the LUKS Container as BTRFS.
|
|
echo "Formatting the LUKS container as BTRFS."
|
|
mkfs.btrfs $BTRFS &>/dev/null
|
|
mount $BTRFS /mnt
|
|
|
|
# Creating BTRFS subvolumes.
|
|
echo "Creating BTRFS subvolumes."
|
|
btrfs su cr /mnt/@ &>/dev/null
|
|
btrfs su cr /mnt/@/.snapshots &>/dev/null
|
|
mkdir -p /mnt/@/.snapshots/1 &>/dev/null
|
|
btrfs su cr /mnt/@/.snapshots/1/snapshot &>/dev/null
|
|
btrfs su cr /mnt/@/boot/ &>/dev/null
|
|
btrfs su cr /mnt/@/home &>/dev/null
|
|
btrfs su cr /mnt/@/root &>/dev/null
|
|
btrfs su cr /mnt/@/srv &>/dev/null
|
|
btrfs su cr /mnt/@/var_log &>/dev/null
|
|
btrfs su cr /mnt/@/var_log_journal &>/dev/null
|
|
btrfs su cr /mnt/@/var_crash &>/dev/null
|
|
btrfs su cr /mnt/@/var_cache &>/dev/null
|
|
btrfs su cr /mnt/@/var_tmp &>/dev/null
|
|
btrfs su cr /mnt/@/var_spool &>/dev/null
|
|
btrfs su cr /mnt/@/var_lib_libvirt_images &>/dev/null
|
|
btrfs su cr /mnt/@/var_lib_machines &>/dev/null
|
|
btrfs su cr /mnt/@/var_lib_gdm &>/dev/null
|
|
btrfs su cr /mnt/@/var_lib_AccountsService &>/dev/null
|
|
btrfs su cr /mnt/@/cryptkey &>/dev/null
|
|
|
|
chattr +C /mnt/@/boot
|
|
chattr +C /mnt/@/srv
|
|
chattr +C /mnt/@/var_log
|
|
chattr +C /mnt/@/var_log_journal
|
|
chattr +C /mnt/@/var_crash
|
|
chattr +C /mnt/@/var_cache
|
|
chattr +C /mnt/@/var_tmp
|
|
chattr +C /mnt/@/var_spool
|
|
chattr +C /mnt/@/var_lib_libvirt_images
|
|
chattr +C /mnt/@/var_lib_machines
|
|
chattr +C /mnt/@/var_lib_gdm
|
|
chattr +C /mnt/@/var_lib_AccountsService
|
|
chattr +C /mnt/@/cryptkey
|
|
|
|
#Set the default BTRFS Subvol to Snapshot 1 before pacstrapping
|
|
btrfs subvolume set-default "$(btrfs subvolume list /mnt | grep "@/.snapshots/1/snapshot" | grep -oP '(?<=ID )[0-9]+')" /mnt
|
|
|
|
cat << EOF >> /mnt/@/.snapshots/1/info.xml
|
|
<?xml version="1.0"?>
|
|
<snapshot>
|
|
<type>single</type>
|
|
<num>1</num>
|
|
<date>1999-03-31 0:00:00</date>
|
|
<description>First Root Filesystem</description>
|
|
<cleanup>number</cleanup>
|
|
</snapshot>
|
|
EOF
|
|
|
|
chmod 600 /mnt/@/.snapshots/1/info.xml
|
|
|
|
# Mounting the newly created subvolumes.
|
|
umount /mnt
|
|
echo "Mounting the newly created subvolumes."
|
|
mount -o ssd,noatime,space_cache,compress=zstd:15 $BTRFS /mnt
|
|
mkdir -p /mnt/{boot,root,home,.snapshots,srv,tmp,/var/log,/var/log/journal,/var/crash,/var/cache,/var/tmp,/var/spool,/var/lib/libvirt/images,/var/lib/machines,/var/lib/gdm,/var/lib/AccountsService,/cryptkey}
|
|
mount -o ssd,noatime,space_cache=v2,autodefrag,compress=zstd:15,discard=async,nodev,nosuid,noexec,subvol=@/boot $BTRFS /mnt/boot
|
|
mount -o ssd,noatime,space_cache=v2,autodefrag,compress=zstd:15,discard=async,nodev,nosuid,subvol=@/root $BTRFS /mnt/root
|
|
mount -o ssd,noatime,space_cache=v2.autodefrag,compress=zstd:15,discard=async,nodev,nosuid,subvol=@/home $BTRFS /mnt/home
|
|
mount -o ssd,noatime,space_cache=v2,autodefrag,compress=zstd:15,discard=async,subvol=@/.snapshots $BTRFS /mnt/.snapshots
|
|
mount -o ssd,noatime,space_cache=v2.autodefrag,compress=zstd:15,discard=async,subvol=@/srv $BTRFS /mnt/srv
|
|
mount -o ssd,noatime,space_cache=v2,autodefrag,compress=zstd:15,discard=async,nodatacow,nodev,nosuid,noexec,subvol=@/var_log $BTRFS /mnt/var/log
|
|
|
|
# Toolbox (https://github.com/containers/toolbox) needs /var/log/journal to have dev, suid, and exec. Thus I am splitting the subvolume.
|
|
mount -o ssd,noatime,space_cache=v2,autodefrag,compress=zstd:15,discard=async,nodatacow,subvol=@/var_log_journal $BTRFS /mnt/var/log/journal
|
|
|
|
mount -o ssd,noatime,space_cache=v2,autodefrag,compress=zstd:15,discard=async,nodatacow,nodev,nosuid,noexec,subvol=@/var_crash $BTRFS /mnt/var/crash
|
|
mount -o ssd,noatime,space_cache=v2,autodefrag,compress=zstd:15,discard=async,nodatacow,nodev,nosuid,noexec,subvol=@/var_cache $BTRFS /mnt/var/cache
|
|
|
|
# Pamac needs /var/tmp to have exec. Thus I am not adding that flag.
|
|
# I am considering including pacmac-flatpak-gnome AUR package by default, since I am its maintainer.
|
|
mount -o ssd,noatime,space_cache=v2,autodefrag,compress=zstd:15,discard=async,nodatacow,nodev,nosuid,subvol=@/var_tmp $BTRFS /mnt/var/tmp
|
|
|
|
mount -o ssd,noatime,space_cache=v2,autodefrag,compress=zstd:15,discard=async,nodatacow,nodev,nosuid,noexec,subvol=@/var_spool $BTRFS /mnt/var/spool
|
|
mount -o ssd,noatime,space_cache=v2,autodefrag,compress=zstd:15,discard=async,nodatacow,nodev,nosuid,noexec,subvol=@/var_lib_libvirt_images $BTRFS /mnt/var/lib/libvirt/images
|
|
mount -o ssd,noatime,space_cache=v2,autodefrag,compress=zstd:15,discard=async,nodatacow,nodev,nosuid,noexec,subvol=@/var_lib_machines $BTRFS /mnt/var/lib/machines
|
|
|
|
# GNOME requires /var/lib/gdm and /var/lib/AccountsService to be writeable when booting into a readonly snapshot. Thus we sadly have to split them.
|
|
mount -o ssd,noatime,space_cache=v2,autodefrag,compress=zstd:15,discard=async,nodatacow,nodev,nosuid,noexec,subvol=@/var_lib_gdm $BTRFS /mnt/var/lib/gdm
|
|
mount -o ssd,noatime,space_cache=v2,autodefrag,compress=zstd:15,discard=async,nodatacow,nodev,nosuid,noexec,subvol=@/var_lib_AccountsService $BTRFS /mnt/var/lib/AccountsService
|
|
|
|
# The encryption is splitted as we do not want to include it in the backup with snap-pac.
|
|
mount -o ssd,noatime,space_cache=v2,autodefrag,compress=zstd:15,discard=async,nodatacow,nodev,nosuid,noexec,subvol=@/cryptkey $BTRFS /mnt/cryptkey
|
|
|
|
mkdir -p /mnt/boot/efi
|
|
mount -o nodev,nosuid,noexec $ESP /mnt/boot/efi
|
|
|
|
kernel_selector
|
|
|
|
# Pacstrap (setting up a base sytem onto the new root).
|
|
# As I said above, I am considering replacing gnome-software with pamac-flatpak-gnome as PackageKit seems very buggy on Arch Linux right now.
|
|
echo "Installing the base system (it may take a while)."
|
|
pacstrap /mnt base ${kernel} ${microcode} linux-firmware grub grub-btrfs snapper snap-pac efibootmgr sudo networkmanager apparmor python2-notify python-psutil nano gdm gnome-control-center gnome-terminal gnome-software gnome-software-packagekit-plugin gnome-tweaks nautilus pipewire-pulse pipewire-alsa pipewire-jack flatpak firewalld zram-generator adobe-source-han-sans-otc-fonts adobe-source-han-serif-otc-fonts gnu-free-fonts reflector mlocate man-db
|
|
|
|
# Routing jack2 through PipeWire.
|
|
echo "/usr/lib/pipewire-0.3/jack" > /mnt/etc/ld.so.conf.d/pipewire-jack.conf
|
|
|
|
# Generating /etc/fstab.
|
|
echo "Generating a new fstab."
|
|
genfstab -U /mnt >> /mnt/etc/fstab
|
|
sed -i 's#,subvolid=258,subvol=/@/.snapshots/1/snapshot,subvol=@/.snapshots/1/snapshot##g' /mnt/etc/fstab
|
|
|
|
# Setting hostname.
|
|
read -r -p "Please enter the hostname: " hostname
|
|
echo "$hostname" > /mnt/etc/hostname
|
|
|
|
# Setting hosts file.
|
|
echo "Setting hosts file."
|
|
cat > /mnt/etc/hosts <<EOF
|
|
127.0.0.1 localhost
|
|
::1 localhost
|
|
127.0.1.1 $hostname.localdomain $hostname
|
|
EOF
|
|
|
|
# Setting username.
|
|
read -r -p "Please enter name for a user account (enter empty to not create one): " username
|
|
|
|
# Setting up locales.
|
|
read -r -p "Please insert the locale you use in this format (xx_XX): " locale
|
|
echo "$locale.UTF-8 UTF-8" > /mnt/etc/locale.gen
|
|
echo "LANG=$locale.UTF-8" > /mnt/etc/locale.conf
|
|
|
|
# Setting up keyboard layout.
|
|
read -r -p "Please insert the keyboard layout you use: " kblayout
|
|
echo "KEYMAP=$kblayout" > /mnt/etc/vconsole.conf
|
|
|
|
# Configuring /etc/mkinitcpio.conf
|
|
echo "Configuring /etc/mkinitcpio for ZSTD compression and LUKS hook."
|
|
sed -i 's,#COMPRESSION="zstd",COMPRESSION="zstd",g' /mnt/etc/mkinitcpio.conf
|
|
sed -i 's,modconf block filesystems keyboard,keyboard modconf block encrypt filesystems,g' /mnt/etc/mkinitcpio.conf
|
|
|
|
# Enabling LUKS in GRUB and setting the UUID of the LUKS container.
|
|
UUID=$(blkid $cryptroot | cut -f2 -d'"')
|
|
sed -i 's/#\(GRUB_ENABLE_CRYPTODISK=y\)/\1/' /mnt/etc/default/grub
|
|
echo "" >> /mnt/etc/default/grub
|
|
echo -e "# Booting with BTRFS subvolume\nGRUB_BTRFS_OVERRIDE_BOOT_PARTITION_DETECTION=true" >> /mnt/etc/default/grub
|
|
sed -i 's#rootflags=subvol=${rootsubvol}##g' /mnt/etc/grub.d/10_linux
|
|
sed -i 's#rootflags=subvol=${rootsubvol}##g' /mnt/etc/grub.d/20_linux_xen
|
|
|
|
# Enabling CPU Mitigations
|
|
curl https://raw.githubusercontent.com/Whonix/security-misc/master/etc/default/grub.d/40_cpu_mitigations.cfg >> /mnt/etc/grub.d/40_cpu_mitigations
|
|
|
|
# Distrusting the CPU
|
|
curl https://raw.githubusercontent.com/Whonix/security-misc/master/etc/default/grub.d/40_distrust_cpu.cfg >> /mnt/etc/grub.d/40_distrust_cpu
|
|
|
|
# Enabling IOMMU
|
|
curl https://raw.githubusercontent.com/Whonix/security-misc/master/etc/default/grub.d/40_enable_iommu.cfg >> /mnt/etc/grub.d/40_enable_iommu
|
|
|
|
# Setting GRUB configuration file permissions
|
|
chmod 755 /mnt/etc/grub.d/*
|
|
|
|
# Adding keyfile to the initramfs to avoid double password.
|
|
dd bs=512 count=4 if=/dev/random of=/mnt/cryptkey/.root.key iflag=fullblock &>/dev/null
|
|
chmod 000 /mnt/cryptkey/.root.key &>/dev/null
|
|
cryptsetup -v luksAddKey /dev/disk/by-partlabel/cryptroot /mnt/cryptkey/.root.key
|
|
sed -i "s#quiet#cryptdevice=UUID=$UUID:cryptroot root=$BTRFS lsm=landlock,lockdown,yama,apparmor,bpf cryptkey=rootfs:/cryptkey/.root.key#g" /mnt/etc/default/grub
|
|
sed -i 's#FILES=()#FILES=(/cryptkey/.root.key)#g' /mnt/etc/mkinitcpio.conf
|
|
|
|
# Configure AppArmor Parser caching
|
|
sed -i 's/#write-cache/write-cache/g' /etc/apparmor/parser.conf
|
|
sed -i 's,#Include /etc/apparmor.d/,Include /etc/apparmor.d/#g' /etc/apparmor/parser.conf
|
|
|
|
# Blacklisting kernel modules
|
|
curl https://raw.githubusercontent.com/Whonix/security-misc/master/etc/modprobe.d/30_security-misc.conf >> /mnt/etc/modprobe.d/30_security-misc.conf
|
|
chmod 600 /mnt/etc/modprobe.d/*
|
|
|
|
# Security kernel settings.
|
|
curl https://raw.githubusercontent.com/Whonix/security-misc/master/etc/sysctl.d/30_security-misc.conf >> /mnt/etc/sysctl.d/30_security-misc.conf
|
|
sed -i 's/kernel.yama.ptrace_scope=2/kernel.yama.ptrace_scope=3/g' /mnt/etc/sysctl.d/30_security-misc.conf
|
|
curl https://raw.githubusercontent.com/Whonix/security-misc/master/etc/sysctl.d/30_silent-kernel-printk.conf >> /mnt/etc/sysctl.d/30_silent-kernel-printk.conf
|
|
chmod 600 /mnt/etc/sysctl.d/*
|
|
|
|
# IO udev rules
|
|
curl https://gitlab.com/garuda-linux/themes-and-settings/settings/garuda-common-settings/-/raw/master/etc/udev/rules.d/50-sata.rules > /mnt/etc/udev/rules.d/50-sata.rules
|
|
curl https://gitlab.com/garuda-linux/themes-and-settings/settings/garuda-common-settings/-/raw/master/etc/udev/rules.d/60-ioschedulers.rules > /etc/udev/rules.d/60-ioschedulers.rules
|
|
chmod 600 /mnt/etc/udev/rules.d/*
|
|
|
|
# Remove nullok from system-auth
|
|
sed -i 's/nullok//g' /mnt/etc/pam.d/system-auth
|
|
|
|
# Disable coredump
|
|
echo "* hard core 0" >> /mnt/etc/security/limits.conf
|
|
|
|
# Disable su for non-wheel users
|
|
bash -c 'cat > /mnt/etc/pam.d/su' <<-'EOF'
|
|
#%PAM-1.0
|
|
auth sufficient pam_rootok.so
|
|
# Uncomment the following line to implicitly trust users in the "wheel" group.
|
|
#auth sufficient pam_wheel.so trust use_uid
|
|
# Uncomment the following line to require a user to be in the "wheel" group.
|
|
auth required pam_wheel.so use_uid
|
|
auth required pam_unix.so
|
|
account required pam_unix.so
|
|
session required pam_unix.so
|
|
EOF
|
|
|
|
# ZRAM configuration
|
|
bash -c 'cat > /mnt/etc/systemd/zram-generator.conf' <<-'EOF'
|
|
[zram0]
|
|
zram-fraction = 1
|
|
max-zram-size = 8192
|
|
EOF
|
|
|
|
# Randomize Mac Address.
|
|
bash -c 'cat > /mnt/etc/NetworkManager/conf.d/00-macrandomize.conf' <<-'EOF'
|
|
[device]
|
|
wifi.scan-rand-mac-address=yes
|
|
[connection]
|
|
wifi.cloned-mac-address=random
|
|
ethernet.cloned-mac-address=random
|
|
connection.stable-id=${CONNECTION}/${BOOT}
|
|
EOF
|
|
|
|
chmod 600 /mnt/etc/NetworkManager/conf.d/00-macrandomize.conf
|
|
|
|
# Disable Connectivity Check.
|
|
bash -c 'cat > /mnt/etc/NetworkManager/conf.d/20-connectivity.conf' <<-'EOF'
|
|
[connectivity]
|
|
uri=http://www.archlinux.org/check_network_status.txt
|
|
interval=0
|
|
EOF
|
|
|
|
chmod 600 /mnt/etc/NetworkManager/conf.d/20-connectivity.conf
|
|
|
|
# Enable IPv6 privacy extensions
|
|
bash -c 'cat > /mnt/etc/NetworkManager/conf.d/ip6-privacy.conf' <<-'EOF'
|
|
[connection]
|
|
ipv6.ip6-privacy=2
|
|
EOF
|
|
|
|
chmod 600 /mnt/etc/NetworkManager/conf.d/ip6-privacy.conf
|
|
|
|
# Configuring the system.
|
|
arch-chroot /mnt /bin/bash -e <<EOF
|
|
|
|
# Setting up timezone.
|
|
ln -sf /usr/share/zoneinfo/$(curl -s http://ip-api.com/line?fields=timezone) /etc/localtime &>/dev/null
|
|
|
|
# Setting up clock.
|
|
hwclock --systohc
|
|
|
|
# Generating locales.my keys aren't even on
|
|
echo "Generating locales."
|
|
locale-gen &>/dev/null
|
|
|
|
# Generating a new initramfs.
|
|
echo "Creating a new initramfs."
|
|
chmod 600 /boot/initramfs-linux* &>/dev/null
|
|
mkinitcpio -P &>/dev/null
|
|
|
|
# Snapper configuration
|
|
umount /.snapshots
|
|
rm -r /.snapshots
|
|
snapper --no-dbus -c root create-config /
|
|
btrfs subvolume delete /.snapshots
|
|
mkdir /.snapshots
|
|
mount -a
|
|
chmod 750 /.snapshots
|
|
|
|
# Installing GRUB.
|
|
echo "Installing GRUB on /boot."
|
|
grub-install --target=x86_64-efi --efi-directory=/boot/efi --bootloader-id=GRUB --modules="normal test efi_gop efi_uga search echo linux all_video gfxmenu gfxterm_background gfxterm_menu gfxterm loadenv configfile gzio part_gtp cryptodisk luks gcry_rijndael gcry_sha256 btrfs" --disable-shim-lock &>/dev/null
|
|
|
|
# Creating grub config file.
|
|
echo "Creating GRUB config file."
|
|
grub-mkconfig -o /boot/grub/grub.cfg &>/dev/null
|
|
|
|
# Adding user with sudo privilege
|
|
if [ -n "$username" ]; then
|
|
echo "Adding $username with root privilege."
|
|
useradd -m $username
|
|
usermod -aG wheel $username
|
|
passwd ${USER}
|
|
groupadd -r audit
|
|
gpasswd -a ${USER} audit
|
|
fi
|
|
EOF
|
|
|
|
# Enanble AppArmor notifications
|
|
bash -c 'cat > /mnt/home/${USER}/.config/autostart/apparmor-notify.desktop' <<-'EOF'
|
|
[Desktop Entry]
|
|
Type=Application
|
|
Name=AppArmor Notify
|
|
Comment=Receive on screen notifications of AppArmor denials
|
|
TryExec=aa-notify
|
|
Exec=aa-notify -p -s 1 -w 60 -f /var/log/audit/audit.log
|
|
StartupNotify=false
|
|
NoDisplay=true
|
|
EOF
|
|
|
|
# Setting root password.
|
|
echo "Setting root password."
|
|
arch-chroot /mnt /bin/passwd
|
|
[ -n "$username" ] && echo "Setting user password for ${username}." && arch-chroot /mnt /bin/passwd "$username"
|
|
|
|
# Giving wheel user sudo access.
|
|
sed -i 's/# %wheel ALL=(ALL) ALL/%wheel ALL=(ALL) ALL/g' /mnt/etc/sudoers
|
|
|
|
# Change audit logging group
|
|
echo "log_group = audit" >> /etc/audit/auditd.conf
|
|
|
|
# Enabling audit service.
|
|
systemctl enable auditd --root=/mnt &>/dev/null
|
|
|
|
# Enabling auto-trimming service.
|
|
systemctl enable fstrim.timer --root=/mnt &>/dev/null
|
|
|
|
# Enabling NetworkManager.
|
|
systemctl enable NetworkManager --root=/mnt &>/dev/null
|
|
|
|
# Enabling GDM.
|
|
systemctl enable gdm --root=/mnt &>/dev/null
|
|
|
|
# Enabling AppArmor.
|
|
echo "Enabling AppArmor."
|
|
systemctl enable apparmor --root=/mnt &>/dev/null
|
|
|
|
# Enabling Firewalld.
|
|
echo "Enabling Firewalld."
|
|
systemctl enable firewalld --root=/mnt &>/dev/null
|
|
|
|
# Enabling Bluetooth Service (This is only to fix the visual glitch with gnome where it gets stuck in the menu at the top right).
|
|
# IF YOU WANT TO USE BLUETOOTH, YOU MUST REMOVE IT FROM THE LIST OF BLACKLISTED KERNEL MODULES IN /mnt/etc/modprobe.d/30_security-misc.conf
|
|
systemctl enable bluetooth --root=/mnt &>/dev/null
|
|
|
|
# Enabling Reflector timer.
|
|
echo "Enabling Reflector."
|
|
systemctl enable reflector.timer --root=/mnt &>/dev/null
|
|
|
|
# Enabling systemd-oomd.
|
|
echo "Enabling systemd-oomd."
|
|
systemctl enable systemd-oomd --root=/mnt &>/dev/null
|
|
|
|
# Enabling Snapper automatic snapshots.
|
|
echo "Enabling Snapper and automatic snapshots entries."
|
|
systemctl enable snapper-timeline.timer --root=/mnt &>/dev/null
|
|
systemctl enable snapper-cleanup.timer --root=/mnt &>/dev/null
|
|
systemctl enable grub-btrfs.path --root=/mnt &>/dev/null
|
|
|
|
# Setting umask to 077.
|
|
sed -i 's/022/077/g' /mnt/etc/profile
|
|
echo "" >> /mnt/etc/bash.bashrc
|
|
echo "umask 077" >> /mnt/etc/bash.bashrc
|
|
|
|
# Finishing up
|
|
echo "Done, you may now wish to reboot (further changes can be done by chrooting into /mnt)."
|
|
exit
|