# -*- mode: ruby -*- # vi: set ft=ruby : # Default # ---------------------- # login: root # pass: vagrant Vagrant.configure("2") do |config| # Basic configuration config.vm.provider "virtualbox" config.vm.box = "debian/bookworm64" config.ssh.forward_agent = true # Create a public network, which generally matched to bridged network. # Bridged networks make the machine appear as another physical device on # your network. config.vm.network "public_network" # Share an additional folder to the guest VM. The first argument is # the path on the host to the actual folder. The second argument is # the path on the guest to mount the folder. And the optional third # argument is a set of non-required options. config.vm.synced_folder "../../..", "/home/vagrant/Rublon-Linux" config.vm.provider "virtualbox" do |vb| # Display the VirtualBox GUI when booting the machine vb.gui = true vb.memory = 1024 vb.cpus = 4 # Fix for 'SSH auth method: Private key' stuck vb.customize ["modifyvm", :id, "--cableconnected1", "on"] end # Enable provisioning with a shell script. Additional provisioners such as # Ansible, Chef, Docker, Puppet and Salt are also available. Please see the # documentation for more information about their specific syntax and use. config.vm.provision "shell", inline: <<-SHELL DEBIAN_FRONTEND=noniteracactive\ apt-get update && apt-get install -y \ gcc \ build-essential \ openssh-server \ libcurl4-openssl-dev \ libpam0g-dev \ libssl-dev \ git \ rapidjson-dev \ cmake # get dependencies git clone --recurse-submodules https://github.com/socketio/socket.io-client-cpp.git mkdir socket.io-client-cpp/build; cd socket.io-client-cpp/build cmake -DCMAKE_POSITION_INDEPENDENT_CODE=ON -DCMAKE_BUILD_TYPE=Release .. cmake --build . --target install # Build project cd /home/vagrant/Rublon-Linux cmake -B build && cmake --build build # Install sudo cmake --install build sudo install -m 644 rsc/rublon.config.defaults /etc/rublon.config # Register Rublon pam SSHD_CONF=/etc/ssh/sshd_config SSHD_PAM_CONF=/etc/pam.d/sshd grep -qe "^PasswordAuthentication" $SSHD_CONF && sed -i 's/^#*PasswordAuthentication[[:space:]]\+.*/PasswordAuthentication yes/' $SSHD_CONF || echo "PasswordAuthentication yes" >> $SSHD_CONF grep -qe "^ChallengeResponseAuthentication" $SSHD_CONF && sed -i 's/^#*ChallengeResponseAuthentication[[:space:]]\+.*/ChallengeResponseAuthentication yes/' $SSHD_CONF || echo "ChallengeResponseAuthentication yes" >> $SSHD_CONF grep -qe "^UsePAM" $SSHD_CONF && sed -i 's/^#*UsePAM[[:space:]]\+.*/UsePAM yes/' $SSHD_CONF || echo "UsePAM yes" >> $SSHD_CONF grep -qe 'auth required pam_rublon.so' $SSHD_PAM_CONF || sed -i '\$aauth required pam_rublon.so' $SSHD_PAM_CONF grep -qe 'account required pam_rublon.so' $SSHD_PAM_CONF || sed -i '\$aaccount required pam_rublon.so' $SSHD_PAM_CONF useradd -s /bin/bash -m bwi echo "bwi:bwi"|chpasswd service sshd restart SHELL end