diff options
Diffstat (limited to 'tools/pharos-validator/src/pxe_initrd/src/etc')
5 files changed, 0 insertions, 180 deletions
diff --git a/tools/pharos-validator/src/pxe_initrd/src/etc/init.d/initialnetwork b/tools/pharos-validator/src/pxe_initrd/src/etc/init.d/initialnetwork deleted file mode 100755 index 233c0b75..00000000 --- a/tools/pharos-validator/src/pxe_initrd/src/etc/init.d/initialnetwork +++ /dev/null @@ -1,20 +0,0 @@ -#!/sbin/openrc-run -# -# - -depend() -{ - need localmount - after firewall -} - -start() -{ - python3 /bin/initial_network.py - return 0 -} - -stop() -{ - return 0 -} diff --git a/tools/pharos-validator/src/pxe_initrd/src/etc/init.d/tmpfs b/tools/pharos-validator/src/pxe_initrd/src/etc/init.d/tmpfs deleted file mode 100755 index cea765cb..00000000 --- a/tools/pharos-validator/src/pxe_initrd/src/etc/init.d/tmpfs +++ /dev/null @@ -1,20 +0,0 @@ -#!/sbin/openrc-run -# -# - -depend() -{ - need localmount - after firewall -} - -start() -{ - mount -t tmpfs tmp /tmp - return 0 -} - -stop() -{ - return 0 -} diff --git a/tools/pharos-validator/src/pxe_initrd/src/etc/profile b/tools/pharos-validator/src/pxe_initrd/src/etc/profile deleted file mode 100644 index 34802483..00000000 --- a/tools/pharos-validator/src/pxe_initrd/src/etc/profile +++ /dev/null @@ -1,5 +0,0 @@ -export CHARSET=UTF-8 -export PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin -export PAGER=less -export PS1='\h:\w\$ ' -umask 022 diff --git a/tools/pharos-validator/src/pxe_initrd/src/etc/resolv.conf b/tools/pharos-validator/src/pxe_initrd/src/etc/resolv.conf deleted file mode 100644 index 0ffa7a23..00000000 --- a/tools/pharos-validator/src/pxe_initrd/src/etc/resolv.conf +++ /dev/null @@ -1,3 +0,0 @@ -# Change this to what you need -nameserver 8.8.8.8 -nameserver 8.8.4.4 diff --git a/tools/pharos-validator/src/pxe_initrd/src/etc/ssh/sshd_config b/tools/pharos-validator/src/pxe_initrd/src/etc/ssh/sshd_config deleted file mode 100644 index 856c2cd5..00000000 --- a/tools/pharos-validator/src/pxe_initrd/src/etc/ssh/sshd_config +++ /dev/null @@ -1,132 +0,0 @@ -# $OpenBSD: sshd_config,v 1.99 2016/07/11 03:19:44 tedu Exp $ - -# This is the sshd server system-wide configuration file. See -# sshd_config(5) for more information. - -# This sshd was compiled with PATH=/bin:/usr/bin:/sbin:/usr/sbin - -# The strategy used for options in the default sshd_config shipped with -# OpenSSH is to specify options with their default value where -# possible, but leave them commented. Uncommented options override the -# default value. - -#Port 22 -#AddressFamily any -#ListenAddress 0.0.0.0 -#ListenAddress :: - -# The default requires explicit activation of protocol 1 -#Protocol 2 - -# HostKey for protocol version 1 -#HostKey /etc/ssh/ssh_host_key -# HostKeys for protocol version 2 -#HostKey /etc/ssh/ssh_host_rsa_key -#HostKey /etc/ssh/ssh_host_dsa_key -#HostKey /etc/ssh/ssh_host_ecdsa_key -#HostKey /etc/ssh/ssh_host_ed25519_key - -# Lifetime and size of ephemeral version 1 server key -#KeyRegenerationInterval 1h -#ServerKeyBits 1024 - -# Ciphers and keying -#RekeyLimit default none - -# Logging -#SyslogFacility AUTH -#LogLevel INFO - -# Authentication: - -#LoginGraceTime 2m -PermitRootLogin yes -#StrictModes yes -#MaxAuthTries 6 -#MaxSessions 10 - -#RSAAuthentication yes -#PubkeyAuthentication yes - -# The default is to check both .ssh/authorized_keys and .ssh/authorized_keys2 -# but this is overridden so installations will only check .ssh/authorized_keys -AuthorizedKeysFile .ssh/authorized_keys - -#AuthorizedPrincipalsFile none - -#AuthorizedKeysCommand none -#AuthorizedKeysCommandUser nobody - -# For this to work you will also need host keys in /etc/ssh/ssh_known_hosts -#RhostsRSAAuthentication no -# similar for protocol version 2 -#HostbasedAuthentication no -# Change to yes if you don't trust ~/.ssh/known_hosts for -# RhostsRSAAuthentication and HostbasedAuthentication -#IgnoreUserKnownHosts no -# Don't read the user's ~/.rhosts and ~/.shosts files -#IgnoreRhosts yes - -# To disable tunneled clear text passwords, change to no here! -#PasswordAuthentication yes -#PermitEmptyPasswords no - -# Change to no to disable s/key passwords -#ChallengeResponseAuthentication yes - -# Kerberos options -#KerberosAuthentication no -#KerberosOrLocalPasswd yes -#KerberosTicketCleanup yes -#KerberosGetAFSToken no - -# GSSAPI options -#GSSAPIAuthentication no -#GSSAPICleanupCredentials yes - -# Set this to 'yes' to enable PAM authentication, account processing, -# and session processing. If this is enabled, PAM authentication will -# be allowed through the ChallengeResponseAuthentication and -# PasswordAuthentication. Depending on your PAM configuration, -# PAM authentication via ChallengeResponseAuthentication may bypass -# the setting of "PermitRootLogin without-password". -# If you just want the PAM account and session checks to run without -# PAM authentication, then enable this but set PasswordAuthentication -# and ChallengeResponseAuthentication to 'no'. -#UsePAM no - -#AllowAgentForwarding yes -#AllowTcpForwarding yes -#GatewayPorts no -#X11Forwarding no -#X11DisplayOffset 10 -#X11UseLocalhost yes -#PermitTTY yes -#PrintMotd yes -#PrintLastLog yes -#TCPKeepAlive yes -#UseLogin no -#UsePrivilegeSeparation sandbox -#PermitUserEnvironment no -#Compression delayed -#ClientAliveInterval 0 -#ClientAliveCountMax 3 -#UseDNS no -#PidFile /run/sshd.pid -#MaxStartups 10:30:100 -#PermitTunnel no -#ChrootDirectory none -#VersionAddendum none - -# no default banner path -#Banner none - -# override default of no subsystems -Subsystem sftp /usr/lib/ssh/sftp-server - -# Example of overriding settings on a per-user basis -#Match User anoncvs -# X11Forwarding no -# AllowTcpForwarding no -# PermitTTY no -# ForceCommand cvs server |