Fixed errors
This commit is contained in:
175
harden
175
harden
@@ -78,6 +78,7 @@ function install_packages {
|
|||||||
export DEBIAN_FRONTEND=noninteractive
|
export DEBIAN_FRONTEND=noninteractive
|
||||||
export NEEDRESTART_MODE=a
|
export NEEDRESTART_MODE=a
|
||||||
export DEBIAN_PRIORITY=critical
|
export DEBIAN_PRIORITY=critical
|
||||||
|
# Running sudo with -E will preserve the environment variables set in the script
|
||||||
sudo -E apt update -y && sudo apt upgrade -y # Update the package list and upgrade the packages
|
sudo -E apt update -y && sudo apt upgrade -y # Update the package list and upgrade the packages
|
||||||
sudo -E apt install -y "$@" # Install the packages passed as arguments
|
sudo -E apt install -y "$@" # Install the packages passed as arguments
|
||||||
;;
|
;;
|
||||||
@@ -103,6 +104,7 @@ function install_packages {
|
|||||||
# Then it will install the packages that are missing by invoking the install_packages function.
|
# Then it will install the packages that are missing by invoking the install_packages function.
|
||||||
function check_dependencies {
|
function check_dependencies {
|
||||||
local dependencies=(fuse-overlayfs dbus-user-session uidmap slirp4netns docker-compose htop curl git sudo vim ssh wget fail2ban) # Declare dependencies as a local array
|
local dependencies=(fuse-overlayfs dbus-user-session uidmap slirp4netns docker-compose htop curl git sudo vim ssh wget fail2ban) # Declare dependencies as a local array
|
||||||
|
# local dependencies=(fuse-overlayfs dbus-user-session uidmap slirp4netns docker-compose dnsutils htop curl git sudo vim ssh wget fail2ban) # Declare dependencies as a local array
|
||||||
#> see what to do with name differences between distros if any <#
|
#> see what to do with name differences between distros if any <#
|
||||||
local missing_dependencies=() # Declare missing_dependencies as a local array
|
local missing_dependencies=() # Declare missing_dependencies as a local array
|
||||||
for dependency in "${dependencies[@]}"; do # Loop through the dependencies array
|
for dependency in "${dependencies[@]}"; do # Loop through the dependencies array
|
||||||
@@ -267,27 +269,172 @@ function kernelSecurityModuleInit {
|
|||||||
esac
|
esac
|
||||||
}
|
}
|
||||||
|
|
||||||
|
# function getIP {
|
||||||
|
# RESOLVERS='@resolver4.opendns.com @resolver3.opendns.com @resolver2.opendns.com @resolver1.opendns.com'
|
||||||
|
# for resolver in $RESOLVERS ; do
|
||||||
|
# result="$(dig +short myip.opendns.com "$resolver")"
|
||||||
|
# rc="$?"
|
||||||
|
# if [ -n "$result" ] ; then
|
||||||
|
# printf "%s\n" "$result"
|
||||||
|
# exit "$rc"
|
||||||
|
# fi
|
||||||
|
# done
|
||||||
|
# }
|
||||||
|
|
||||||
function dockerInit {
|
function dockerInit {
|
||||||
# Add user to docker group to avoid using sudo when running docker commands
|
# Add user to docker group to avoid using sudo when running docker commands
|
||||||
##sudo usermod -aG docker "$USER"
|
##sudo usermod -aG docker "$USER"
|
||||||
# Set up rootless docker
|
# Set up rootless docker
|
||||||
sudo runuser - secdep -c 'curl -fsSL https://get.docker.com/rootless | sh'
|
# sudo runuser - secdep -c 'curl -fsSL https://get.docker.com/rootless | sh'
|
||||||
sudo runuser - secdep -c 'export DOCKER_HOST=unix://$XDG_RUNTIME_DIR/docker.sock'
|
# IP="$(getIP)"
|
||||||
sudo runuser - secdep -c 'export PATH=/home/$USER/bin:$PATH'
|
|
||||||
sudo runuser - secdep -c 'printf "%s\n" "export DOCKER_HOST=unix://$XDG_RUNTIME_DIR/docker.sock" >> "$HOME/.bashrc"'
|
# sudo su secdep << 'EOF'
|
||||||
sudo runuser - secdep -c 'printf "%s\n" "export PATH=/home/$USER/bin:$PATH" >> "$HOME/.bashrc"'
|
#
|
||||||
sudo runuser - secdep -c 'systemctl --user enable --now docker.service'
|
# export XDG_RUNTIME_DIR=/run/user/$(id -u secdep)
|
||||||
sudo runuser - secdep -c 'sudo setcap cap_net_bind_service=ep "$(which rootlesskit)"'
|
# export DBUS_SESSION_BUS_ADDRESS=/run/user/$(id -u secdep)/bus
|
||||||
sudo runuser - secdep -c 'systemctl --user restart docker.service'
|
# curl -fsSL https://get.docker.com/rootless | sh
|
||||||
|
# export DOCKER_HOST=unix:///run/user/$UID/docker.sock
|
||||||
|
# export PATH=/home/$USER/bin:$PATH
|
||||||
|
# printf "%s\n" "export PATH=/home/$USER/bin:$PATH" >> "$HOME/.bashrc"
|
||||||
|
# printf "%s\n" "export DOCKER_HOST=unix:///run/user/$UID/docker.sock" >> "$HOME/.bashrc"
|
||||||
|
# source "$HOME/.bashrc" && systemctl --machine=secdep@.host --user enable now docker.service
|
||||||
|
#
|
||||||
|
# EOF
|
||||||
|
|
||||||
|
# export XDG_RUNTIME_DIR=/run/user/$(id -u secdep)
|
||||||
|
# export DBUS_SESSION_BUS_ADDRESS=/run/user/$(id -u secdep)/bus
|
||||||
|
|
||||||
|
sudo su secdep << 'EOF'
|
||||||
|
|
||||||
|
curl -fsSL https://get.docker.com/rootless | sh
|
||||||
|
export DOCKER_HOST=unix:///run/user/$UID/docker.sock
|
||||||
|
export PATH=/home/$USER/bin:$PATH
|
||||||
|
printf "%s\n" "export PATH=/home/$USER/bin:$PATH" >> "$HOME/.bashrc"
|
||||||
|
printf "%s\n" "export DOCKER_HOST=unix:///run/user/$UID/docker.sock" >> "$HOME/.bashrc"
|
||||||
|
|
||||||
|
EOF
|
||||||
|
|
||||||
|
# sudo -u secdep bash -c 'curl -fsSL https://get.docker.com/rootless | sh'
|
||||||
|
# sudo touch /etc/profile.d/docker.sh
|
||||||
|
# sudo echo '[[ -S /run/user/${UID}/docker.sock ]] && { export XDG_RUNTIME_DIR=/run/user/${UID} export PATH=/usr/bin:$PATH export DOCKER_HOST=unix:///run/user/${UID}/docker.sock; }' | sudo tee -a /etc/profile.d/docker.sh
|
||||||
|
sudo runuser - secdep -c 'mkdir -p "/home/secdep/.config/systemd/user"'
|
||||||
|
sudo runuser - secdep -c 'mkdir -p "/home/secdep/.config/systemd/default.target.wants"'
|
||||||
|
sudo runuser - secdep -c 'touch "/home/secdep/.config/systemd/user/docker.service"'
|
||||||
|
|
||||||
|
# sudo runuser - secdep -c 'cat <<- EOT > "/home/secdep/.config/systemd/user/docker.service"
|
||||||
|
sudo runuser - secdep -c 'cat << EOF > "/home/secdep/.config/systemd/user/docker.service"
|
||||||
|
[Unit]
|
||||||
|
Description=Docker Application Container Engine (Rootless)
|
||||||
|
Documentation=https://docs.docker.com/go/rootless/
|
||||||
|
[Service]
|
||||||
|
Environment=PATH=/home/secdep/bin:/sbin:/usr/sbin:/home/secdep/bin:/home/secdep/bin:/home/secdep/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin
|
||||||
|
ExecStart=/home/secdep/bin/dockerd-rootless.sh
|
||||||
|
ExecReload=/bin/kill -s HUP $MAINPID
|
||||||
|
TimeoutSec=0
|
||||||
|
RestartSec=2
|
||||||
|
Restart=always
|
||||||
|
StartLimitBurst=3
|
||||||
|
StartLimitInterval=60s
|
||||||
|
LimitNOFILE=infinity
|
||||||
|
LimitNPROC=infinity
|
||||||
|
LimitCORE=infinity
|
||||||
|
TasksMax=infinity
|
||||||
|
Delegate=yes
|
||||||
|
Type=notify
|
||||||
|
NotifyAccess=all
|
||||||
|
KillMode=mixed
|
||||||
|
[Install]
|
||||||
|
WantedBy=default.target
|
||||||
|
EOF'
|
||||||
|
|
||||||
|
sudo runuser - secdep -c 'ln -s "/home/secdep/.config/systemd/user/docker.service" "/home/secdep/.config/systemd/default.target.wants/docker.service"'
|
||||||
|
|
||||||
|
# sudo su secdep << 'EOF'
|
||||||
|
# export XDG_RUNTIME_DIR=/run/user/$(id -u secdep)
|
||||||
|
# export DBUS_SESSION_BUS_ADDRESS=/run/user/$(id -u secdep)/bus
|
||||||
|
# systemctl --machine=secdep@.host --user daemon-reload
|
||||||
|
# systemctl --machine=secdep@.host --user enable --now docker.service
|
||||||
|
# EOF
|
||||||
|
|
||||||
|
id=$(id -u secdep)
|
||||||
|
sudo mkdir -p /run/user/"$id"
|
||||||
|
sudo chown secdep /run/user/"$id"
|
||||||
|
sudo systemctl start user@"$id"
|
||||||
|
sudo loginctl enable-linger secdep
|
||||||
|
sudo setcap cap_net_bind_service=ep /home/secdep/bin/rootlesskit
|
||||||
|
export DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/"$id"/bus
|
||||||
|
export XDG_RUNTIME_DIR=/run/user/"id"
|
||||||
|
sudo -E su secdep << 'EOF'
|
||||||
|
systemctl --user daemon-reload
|
||||||
|
systemctl --user enable --now docker.service
|
||||||
|
EOF
|
||||||
|
# sudo su secdep << EOF
|
||||||
|
# export XDG_RUNTIME_DIR=/run/user/$(id -u secdep)
|
||||||
|
# export DBUS_SESSION_BUS_ADDRESS=/run/user/$(id -u secdep)/bus
|
||||||
|
# systemctl --host secdep@$IP daemon-reload
|
||||||
|
# systemctl --host secdep@$IP enable --now docker.service
|
||||||
|
# EOF
|
||||||
|
|
||||||
|
# sudo runuser - secdep -c 'mkdir -p "/home/secdep/.docker/run"'
|
||||||
|
|
||||||
|
# sudo runuser - secdep -c 'bash /home/secdep/bin/dockerd-rootless-setuptool.sh install'
|
||||||
|
# sudo runuser - secdep -c 'mkdir -p "/home/secdep/.config/systemd/user"'
|
||||||
|
# sudo runuser - secdep -c 'cat <<- EOT > "/home/secdep/.config/systemd/user/docker.service"
|
||||||
|
# [Unit]
|
||||||
|
# Description=Docker Application Container Engine (Rootless)
|
||||||
|
# Documentation=https://docs.docker.com/go/rootless/
|
||||||
|
# [Service]
|
||||||
|
# Environment=PATH=$BIN:/sbin:/usr/sbin:$PATH
|
||||||
|
# ExecStart=$BIN/dockerd-rootless.sh $DOCKERD_ROOTLESS_SH_FLAGS
|
||||||
|
# ExecReload=/bin/kill -s HUP \$MAINPID
|
||||||
|
# TimeoutSec=0
|
||||||
|
# RestartSec=2
|
||||||
|
# Restart=always
|
||||||
|
# StartLimitBurst=3
|
||||||
|
# StartLimitInterval=60s
|
||||||
|
# LimitNOFILE=infinity
|
||||||
|
# LimitNPROC=infinity
|
||||||
|
# LimitCORE=infinity
|
||||||
|
# TasksMax=infinity
|
||||||
|
# Delegate=yes
|
||||||
|
# Type=notify
|
||||||
|
# NotifyAccess=all
|
||||||
|
# KillMode=mixed
|
||||||
|
# [Install]
|
||||||
|
# WantedBy=default.target
|
||||||
|
# EOT
|
||||||
|
# '
|
||||||
|
|
||||||
|
# sudo runuser - secdep -c 'systemctl --user -M secdep@ daemon-reload'
|
||||||
|
|
||||||
|
#sudo runuser - secdep -c 'export XDG_RUNTIME_DIR=/run/user/$UID'
|
||||||
|
|
||||||
|
|
||||||
|
# sudo -u secdep bash -c 'export DOCKER_HOST=unix:///run/user/$UID/docker.sock'
|
||||||
|
# sudo -u secdep bash -c 'export PATH=/home/$USER/bin:$PATH'
|
||||||
|
# sudo -u secdep bash -c 'printf "%s\n" "export DOCKER_HOST=unix:///run/user/$UID/docker.sock" >> "$HOME/.bashrc"'
|
||||||
|
# sudo -u secdep bash -c 'printf "%s\n" "export PATH=/home/$USER/bin:$PATH" >> "$HOME/.bashrc"'
|
||||||
|
# sudo -u secdep bash -c 'source "$HOME/.bashrc" && systemctl --user start docker.service'
|
||||||
|
# sudo runuser - secdep -c 'systemctl --user -M secdep@ enable --now docker.service'
|
||||||
|
|
||||||
|
# sudo loginctl enable-linger secdep
|
||||||
|
# sudo setcap cap_net_bind_service=ep /home/secdep/bin/rootlesskit
|
||||||
|
|
||||||
|
# sudo runuser - secdep -c "systemctl --host secdep@$IP --user restart docker.service"
|
||||||
|
# sudo runuser - secdep -c "systemctl --machine=secdep@.host --user restart docker.service"
|
||||||
|
|
||||||
|
# sudo runuser - secdep -c 'sudo setcap cap_net_bind_service=ep "$(which rootlesskit)"'
|
||||||
|
# sudo -u secdep bash -c 'systemctl --user restart docker.service'
|
||||||
# Create a new docker network to dissalow communication between containers
|
# Create a new docker network to dissalow communication between containers
|
||||||
##sudo docker network create --driver bridge -o "com.docker.network.bridge.enable_icc"="false" dockerNetworkNoICC
|
##sudo docker network create --driver bridge -o "com.docker.network.bridge.enable_icc"="false" dockerNetworkNoICC
|
||||||
# Get all arguments passed to the function and store them in the dockerImages array
|
# Get all arguments passed to the function and store them in the dockerImages array
|
||||||
local dockerImages=("$@")
|
local dockerImages=("$@")
|
||||||
# Check if there is a docker-compose.yml file in the user's home directory
|
# Check if there is a docker-compose.yml file in the user's home directory
|
||||||
sudo runuser - secdep -c '[[ -f "$HOME/docker-compose.yml" ]] && docker-compose -f "$HOME/docker-compose.yml" up -d' # If there is, run it
|
sudo -u secdep bash -c '[[ -f "$HOME/docker-compose.yml" ]] && docker-compose -f "$HOME/docker-compose.yml" up -d' # If there is, run it
|
||||||
# sudo runuser - secdep -c '[[ -f "$HOME/docker-compose.yml" ]] && docker-compose -f "$HOME/docker-compose.yml" up -d' || return 0 # If there is, run it
|
# sudo runuser - secdep -c '[[ -f "$HOME/docker-compose.yml" ]] && docker-compose -f "$HOME/docker-compose.yml" up -d' || return 0 # If there is, run it
|
||||||
# Check if the dockerImages array is empty and return 0 if it is
|
# Check if the dockerImages array is empty and return 0 if it is
|
||||||
[[ "${#dockerImages[@]}" -eq 0 ]] && return 0
|
[[ "${#dockerImages[@]}" -eq 0 ]] && return 0
|
||||||
|
ID=$(id -u secdep)
|
||||||
# Loop through the dockerImages array
|
# Loop through the dockerImages array
|
||||||
# The dockerImages array contains all the docker images to install and run
|
# The dockerImages array contains all the docker images to install and run
|
||||||
for dockerImage in "${dockerImages[@]}"; do
|
for dockerImage in "${dockerImages[@]}"; do
|
||||||
@@ -302,7 +449,12 @@ function dockerInit {
|
|||||||
# The --network dockerNetworkNoICC option will connect the docker image to the dockerNetworkNoICC network
|
# The --network dockerNetworkNoICC option will connect the docker image to the dockerNetworkNoICC network
|
||||||
# The -v /:/host option will enable the docker rootless mode
|
# The -v /:/host option will enable the docker rootless mode
|
||||||
# # The --user secdep option will run the docker image as the secdep user to prevent privilege escalation
|
# # The --user secdep option will run the docker image as the secdep user to prevent privilege escalation
|
||||||
/home/secdep/bin/docker run -d --restart always --name "$dockerImage" --security-opt=no-new-privileges --cap-drop all --cap-add NET_BIND_SERVICE --read-only --tmpfs /opt -v /:/host "$dockerImage"
|
sudo -u secdep bash -c 'mkdir -p /home/secdep/opt'
|
||||||
|
CMD="docker run -d --restart always --name $dockerImage --security-opt=no-new-privileges --cap-drop all --cap-add NET_BIND_SERVICE --read-only --tmpfs /home/secdep/opt -v /run/user/$ID/docker.sock:/home/secdep/.docker/run/docker.sock $dockerImage"
|
||||||
|
# CMD="docker run -d --restart always --name \"$dockerImage\" --security-opt=no-new-privileges --cap-drop all --cap-add NET_BIND_SERVICE --read-only --tmpfs /home/secdep/opt -v /:/host \"$dockerImage\""
|
||||||
|
# sudo -u secdep bash -c "$CMD"
|
||||||
|
sudo runuser - secdep -c "$CMD"
|
||||||
|
# /home/secdep/bin/docker run -d --restart always --name "$dockerImage" --security-opt=no-new-privileges --cap-drop all --cap-add NET_BIND_SERVICE --read-only --tmpfs /opt -v /:/host "$dockerImage"
|
||||||
##docker run -d --restart always --name "$dockerImage" --security-opt=no-new-privileges --cap-drop all --cap-add NET_BIND_SERVICE --read-only --tmpfs /opt -v /:/host --network dockerNetworkNoICC "$dockerImage"
|
##docker run -d --restart always --name "$dockerImage" --security-opt=no-new-privileges --cap-drop all --cap-add NET_BIND_SERVICE --read-only --tmpfs /opt -v /:/host --network dockerNetworkNoICC "$dockerImage"
|
||||||
#docker run -d --restart always --name "$dockerImage" --security-opt=no-new-privileges --cap-drop all --cap-add NET_ADMIN --user secdep "$dockerImage"
|
#docker run -d --restart always --name "$dockerImage" --security-opt=no-new-privileges --cap-drop all --cap-add NET_ADMIN --user secdep "$dockerImage"
|
||||||
done
|
done
|
||||||
@@ -403,7 +555,8 @@ function restartServices {
|
|||||||
# For firewalld
|
# For firewalld
|
||||||
# Reload the firewall
|
# Reload the firewall
|
||||||
[[ "$currentFirewall" == "firewalld" ]] && sudo firewall-cmd --reload
|
[[ "$currentFirewall" == "firewalld" ]] && sudo firewall-cmd --reload
|
||||||
sudo systemctl disable --now docker
|
sudo systemctl disable --now docker.service docker.socket
|
||||||
|
# sudo systemctl disable --now docker
|
||||||
# Make sure docker is disabled after
|
# Make sure docker is disabled after
|
||||||
# installing docker-compose, to make sure
|
# installing docker-compose, to make sure
|
||||||
# only rootless docker is used
|
# only rootless docker is used
|
||||||
|
|||||||
Reference in New Issue
Block a user