2024-07-15 20:00:04 +01:00
|
|
|
#!/bin/sh -e
|
|
|
|
|
2024-07-21 21:19:03 +01:00
|
|
|
# shellcheck disable=SC2034
|
|
|
|
|
2024-07-14 03:16:02 +01:00
|
|
|
RC='\033[0m'
|
|
|
|
RED='\033[31m'
|
|
|
|
YELLOW='\033[33m'
|
|
|
|
GREEN='\033[32m'
|
2024-07-13 22:44:09 +01:00
|
|
|
|
|
|
|
command_exists() {
|
2024-07-15 22:26:03 +01:00
|
|
|
which "$1" >/dev/null 2>&1
|
2024-07-13 22:44:09 +01:00
|
|
|
}
|
|
|
|
|
2024-08-23 14:12:47 +01:00
|
|
|
checkEscalationTool() {
|
|
|
|
## Check for escalation tools.
|
|
|
|
if [ -z "$ESCALATION_TOOL_CHECKED" ]; then
|
|
|
|
ESCALATION_TOOLS='sudo doas'
|
|
|
|
for tool in ${ESCALATION_TOOLS}; do
|
|
|
|
if command_exists "${tool}"; then
|
|
|
|
ESCALATION_TOOL=${tool}
|
|
|
|
echo "Using ${tool} for privilege escalation"
|
|
|
|
ESCALATION_TOOL_CHECKED=true
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
echo -e "${RED}Can't find a supported escalation tool${RC}"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
2024-07-15 22:26:03 +01:00
|
|
|
|
|
|
|
checkCommandRequirements() {
|
2024-07-13 22:44:09 +01:00
|
|
|
## Check for requirements.
|
2024-07-15 22:26:03 +01:00
|
|
|
REQUIREMENTS=$1
|
2024-07-14 03:16:02 +01:00
|
|
|
for req in ${REQUIREMENTS}; do
|
2024-07-15 22:26:03 +01:00
|
|
|
if ! command_exists "${req}"; then
|
|
|
|
echo "${RED}To run me, you need: ${REQUIREMENTS}${RC}"
|
2024-07-14 03:16:02 +01:00
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
done
|
2024-07-15 22:26:03 +01:00
|
|
|
}
|
2024-07-13 22:44:09 +01:00
|
|
|
|
2024-07-15 22:26:03 +01:00
|
|
|
checkPackageManager() {
|
|
|
|
## Check Package Manager
|
|
|
|
PACKAGEMANAGER=$1
|
2024-07-13 22:44:09 +01:00
|
|
|
for pgm in ${PACKAGEMANAGER}; do
|
2024-07-15 22:26:03 +01:00
|
|
|
if command_exists "${pgm}"; then
|
2024-07-13 22:44:09 +01:00
|
|
|
PACKAGER=${pgm}
|
2024-07-14 03:16:02 +01:00
|
|
|
echo "Using ${pgm}"
|
|
|
|
break
|
2024-07-13 22:44:09 +01:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
if [ -z "${PACKAGER}" ]; then
|
2024-07-15 22:00:28 +01:00
|
|
|
echo -e "${RED}Can't find a supported package manager${RC}"
|
2024-07-13 22:44:09 +01:00
|
|
|
exit 1
|
|
|
|
fi
|
2024-07-15 22:26:03 +01:00
|
|
|
}
|
2024-07-13 22:44:09 +01:00
|
|
|
|
2024-07-15 22:26:03 +01:00
|
|
|
checkSuperUser() {
|
2024-07-13 22:44:09 +01:00
|
|
|
## Check SuperUser Group
|
|
|
|
SUPERUSERGROUP='wheel sudo root'
|
|
|
|
for sug in ${SUPERUSERGROUP}; do
|
2024-07-15 22:26:03 +01:00
|
|
|
if groups | grep -q "${sug}"; then
|
2024-07-13 22:44:09 +01:00
|
|
|
SUGROUP=${sug}
|
2024-07-14 03:16:02 +01:00
|
|
|
echo "Super user group ${SUGROUP}"
|
|
|
|
break
|
2024-07-13 22:44:09 +01:00
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
|
|
|
## Check if member of the sudo group.
|
2024-07-15 22:26:03 +01:00
|
|
|
if ! groups | grep -q "${SUGROUP}"; then
|
|
|
|
echo "${RED}You need to be a member of the sudo group to run me!${RC}"
|
2024-07-13 22:44:09 +01:00
|
|
|
exit 1
|
|
|
|
fi
|
2024-07-15 22:26:03 +01:00
|
|
|
}
|
2024-07-13 22:44:09 +01:00
|
|
|
|
2024-07-15 22:26:03 +01:00
|
|
|
checkCurrentDirectoryWritable() {
|
|
|
|
## Check if the current directory is writable.
|
|
|
|
GITPATH="$(dirname "$(realpath "$0")")"
|
|
|
|
if [ ! -w "$GITPATH" ]; then
|
|
|
|
echo "${RED}Can't write to $GITPATH${RC}"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
checkDistro() {
|
2024-07-13 22:44:09 +01:00
|
|
|
DTYPE="unknown" # Default to unknown
|
2024-07-14 03:16:02 +01:00
|
|
|
# Use /etc/os-release for modern distro identification
|
|
|
|
if [ -f /etc/os-release ]; then
|
|
|
|
. /etc/os-release
|
|
|
|
DTYPE=$ID
|
|
|
|
fi
|
2024-07-15 22:26:03 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
checkEnv() {
|
|
|
|
checkCommandRequirements 'curl groups sudo'
|
2024-07-25 23:01:11 +01:00
|
|
|
checkPackageManager 'apt-get nala dnf pacman zypper yum xbps-install nix-env'
|
|
|
|
checkCurrentDirectoryWritable
|
2024-07-15 22:26:03 +01:00
|
|
|
checkSuperUser
|
|
|
|
checkDistro
|
2024-08-23 14:12:47 +01:00
|
|
|
checkEscalationTool
|
2024-07-15 22:26:03 +01:00
|
|
|
}
|