diff --git a/Laps_Linux/User_Laps4Linux.keytab b/Laps_Linux/User_Laps4Linux.keytab new file mode 100644 index 0000000..6ecd17e Binary files /dev/null and b/Laps_Linux/User_Laps4Linux.keytab differ diff --git a/Laps_Linux/ldap.sh b/Laps_Linux/ldap.sh new file mode 100644 index 0000000..8be4f83 --- /dev/null +++ b/Laps_Linux/ldap.sh @@ -0,0 +1,126 @@ +func_ldap() +{ +#!/bin/bash +#======================================================================= +# FILE: ~laps.sh +# USAGE: ./~laps.sh +# DESCRIPTION: mise en place d'un pseudo LAPS fonctionnant sous linux avec un AD windows +# +# OPTIONS: --- +# REQUIREMENTS: --- +# BUGS: --- +# NOTES: --- +# AUTHOR: Maxime Tertrais +# COMPANY: Operis +# CREATED: 30/09/2024 +# REVISION: --- +#======================================================================= +##Définition des variables + +USER="operis" ##user local dont on doit changer le mot de passe +PASSWORD_LENGTH=16 +PASSWORD_FILE="/var/lib/laps/${USER}_password.txt" +LOG_FILE="/var/log/laps.log" +BASE_DN="DC=OPERIS,DC=CHAMPLAN" +DC="VM2016DOMORV.operis.champlan" +LDAP_URI="ldap://$DC" +LDAP_USER="User_Laps4Linux@OPERIS.CHAMPLAN" # Notez les guillemets +AD_ATTRIBUTE="" + +#======================================================================= +##Définition des fonctions + + +### test de connexion à l'AD +if ! ping -c 4 "$DC" > /dev/null 2>&1; then + echo "$(date '+%Y-%m-%d %H:%M:%S') - contrôleur de domaine injoignable, mise à jour mot de passe non réalisée." >> "$LOG_FILE" + exit 1 +fi + + +### Génération et changement du mot de passe du compte Operis +## Générer un mot de passe aléatoire +PASSWORD=$(openssl rand -base64 $PASSWORD_LENGTH) + +## Changer le mot de passe de l'utilisateur local +echo "$USER:$PASSWORD" | chpasswd +chage -M 30 operis # durée de vie du mot de passe + +## Créer un dossier sécurisé pour stocker le mot de passe s'il n'existe pas +if [ ! -d "$(dirname "$PASSWORD_FILE")" ]; then + mkdir -p "$(dirname "$PASSWORD_FILE")" + chmod 700 "$(dirname "$PASSWORD_FILE")" +fi + +## Stocker le mot de passe dans un fichier sécurisé +echo "$PASSWORD" > "$PASSWORD_FILE" +chmod 600 "$PASSWORD_FILE" + +### Récupération de la date de dernière modification du mot de passe +## Fonction pour convertir une date en FILETIME (100-nanosecondes depuis 1601-01-01) +dt_to_filetime() { + local dt="$1" + local epoch=$(date --date="$dt" +%s) ## Convertion en timestamp Unix (secondes depuis 1970) + local sec_since_1601=$((epoch + 11644473600)) ## Nombre de secondes depuis 1601 + echo $((sec_since_1601 * 10000000)) ## Convertion en FILETIME (100-nanosecondes depuis 1601) +} + +## Obtenir la date de dernière modification du mot de passe +PASSWORD_LAST_MODIFIED=$(chage -l "$USER" | grep "Le mot de passe expire" | cut -d: -f2 | xargs) + +## Convertir la date en anglais pour qu'elle soit correctement parsée par 'date' +PASSWORD_LAST_MODIFIED_EN=$(echo "$PASSWORD_LAST_MODIFIED" \ + | sed 's/janv./Jan/g' \ + | sed 's/févr./Feb/g' \ + | sed 's/mars/Mar/g' \ + | sed 's/avr./Apr/g' \ + | sed 's/mai/May/g' \ + | sed 's/juin/Jun/g' \ + | sed 's/juil./Jul/g' \ + | sed 's/août/Aug/g' \ + | sed 's/sept./Sep/g' \ + | sed 's/oct./Oct/g' \ + | sed 's/nov./Nov/g' \ + | sed 's/déc./Dec/g') + +## Vérification de la date +if [[ -z "$PASSWORD_LAST_MODIFIED_EN" ]]; then + echo "Erreur: Impossible d'obtenir la date de modification du mot de passe pour l'utilisateur $USER." + exit 1 +fi + +## Convertir la date en FILETIME +EXPIRATION_TIME=$(dt_to_filetime "$PASSWORD_LAST_MODIFIED_EN") + +###Connexion et modification de l'objet ordinateur de l'AD +## Obtenir un ticket Kerberos pour l'authentification +kinit "$LDAP_USER" -k -t /etc/laps/User_Laps4Linux.keytab + +## Obtenir l'objet Ordinateur de la machine +FQHN=$(ldapsearch -H $LDAP_URI -Y GSSAPI -U $LDAP_USER -b $BASE_DN "(cn=$HOSTNAME)" dn | grep -oP '^dn: \KCN=.*') + +## Mettre à jour l'attributs ms-Mcs-AdmPwd de l'objet ordinateur dans AD +AD_ATTRIBUTE="ms-Mcs-AdmPwd" + +ldapmodify -H $LDAP_URI -Y GSSAPI <> "$LOG_FILE" +echo "Password for $USER has been updated locally and in AD." +} \ No newline at end of file diff --git a/Malwarebytes_linux/malwarebytes.sh b/Malwarebytes_linux/malwarebytes.sh new file mode 100644 index 0000000..1ad3c7b --- /dev/null +++ b/Malwarebytes_linux/malwarebytes.sh @@ -0,0 +1,27 @@ +func_malwarebytes() +{ +#!/bin/bash +#======================================================================= +# FILE: ~malwarebytes.sh +# USAGE: ./~malwarebytes.sh +# DESCRIPTION: Installation du package malwarebytes sur les postes debians +# +# OPTIONS: --- +# REQUIREMENTS: --- +# BUGS: --- +# NOTES: --- +# AUTHOR: Maxime Tertrais +# COMPANY: Operis +# CREATED: 30/09/2024 +# REVISION: --- +#======================================================================= +##Définition des variables +srclist="/etc/apt/sources.list.d/mblinux.list" + +#======================================================================= +##Script +touch $srclist +echo 'deb [arch=amd64] https://repositories.mwbsys.com/dpkg jessie non-free' | tee -a $srclist +wget -q -O - https://repositories.mwbsys.com/dpkg/keyring.gpg | apt-key add - +apt-get update; ACCOUNTTOKEN=cbfa3f5f-e8a5-4603-bb2f-f034e56fdf21 apt-get install mblinux; +} \ No newline at end of file diff --git a/OCS_Linux/Ocsinventory-Unix-Agent-2.10.2.tar.gz b/OCS_Linux/Ocsinventory-Unix-Agent-2.10.2.tar.gz new file mode 100644 index 0000000..750cc05 Binary files /dev/null and b/OCS_Linux/Ocsinventory-Unix-Agent-2.10.2.tar.gz differ diff --git a/OCS_Linux/cacert.pem b/OCS_Linux/cacert.pem new file mode 100644 index 0000000..f00eb8e --- /dev/null +++ b/OCS_Linux/cacert.pem @@ -0,0 +1,112 @@ +subject=C = FR, ST = Loire-Atlantique, L = Orvault, O = Operis, CN = srv-vrm-ocs-001.operis.champlan, emailAddress = Service_INFRA@operis.fr +issuer=DC = CHAMPLAN, DC = OPERIS, CN = Vm2016DOMORVSubCA +-----BEGIN CERTIFICATE----- +MIIGczCCBVugAwIBAgITNgAAHoL85ZL2grA5AAADAAAegjANBgkqhkiG9w0BAQsF +ADBOMRgwFgYKCZImiZPyLGQBGRYIQ0hBTVBMQU4xFjAUBgoJkiaJk/IsZAEZFgZP +UEVSSVMxGjAYBgNVBAMTEVZtMjAxNkRPTU9SVlN1YkNBMB4XDTI0MDcxODEyMDEy +MloXDTI1MDcxMjA4NDQ0M1owgZ0xCzAJBgNVBAYTAkZSMRkwFwYDVQQIExBMb2ly +ZS1BdGxhbnRpcXVlMRAwDgYDVQQHEwdPcnZhdWx0MQ8wDQYDVQQKEwZPcGVyaXMx +KDAmBgNVBAMTH3Nydi12cm0tb2NzLTAwMS5vcGVyaXMuY2hhbXBsYW4xJjAkBgkq +hkiG9w0BCQEWF1NlcnZpY2VfSU5GUkFAb3BlcmlzLmZyMIIBIjANBgkqhkiG9w0B +AQEFAAOCAQ8AMIIBCgKCAQEAv9T5a+b5vp3hDEKgHrI9zkoEXXwj+haaUmoqFI/z +XloT1wxQ18SDwLSoKTq6z2jp2m8+t72FRbh1bBDR0qAAGyN+7OUDSJa8iKQiWN51 +rnPl2umbnXdFqYuxnrNLVuUxhq3Sgb+ZzLJzWNPpo1V7tvSXf/boY0qXzoQ1ni+f +zeuLocUsiL97jzLnlqujoSzjA5B1ZD5kwwIsbMLjimzua1+BzEw9FOHjA9dS0Vij +LAwlhXeXQhDJsZ+2eAC/zp8LeiSSHN57YwWEgvyoy5DQ/WU0zlVeGIyxMunz0RpY +H8s2OgpK7WmJxgIqGplkNyecEnSxA09rf2qTDjF52ASA5wIDAQABo4IC+DCCAvQw +IQYJKwYBBAGCNxQCBBQeEgBXAGUAYgBTAGUAcgB2AGUAcjA/BgNVHREEODA2gh9z +cnYtdnJtLW9jcy0wMDEub3BlcmlzLmNoYW1wbGFughNvY3Mub3BlcmlzLmNoYW1w +bGFuMB0GA1UdDgQWBBT8KuSglNd/V12iUJgWlxTZ2PxQvjAfBgNVHSMEGDAWgBRA +GWvXzWhgJkVDiw3R+qaKbwaQ6zCCARoGA1UdHwSCAREwggENMIIBCaCCAQWgggEB +hoHBbGRhcDovLy9DTj1WbTIwMTZET01PUlZTdWJDQSxDTj1WTTIwMTZET01PUlYs +Q049Q0RQLENOPVB1YmxpYyUyMEtleSUyMFNlcnZpY2VzLENOPVNlcnZpY2VzLENO +PUNvbmZpZ3VyYXRpb24sREM9T1BFUklTLERDPUNIQU1QTEFOP2NlcnRpZmljYXRl +UmV2b2NhdGlvbkxpc3Q/YmFzZT9vYmplY3RDbGFzcz1jUkxEaXN0cmlidXRpb25Q +b2ludIY7aHR0cDovL3BraS5vcGVyaXMuY2hhbXBsYW4vQ2VydEVucm9sbC9WbTIw +MTZET01PUlZTdWJDQS5jcmwwggEJBggrBgEFBQcBAQSB/DCB+TBABggrBgEFBQcw +AoY0aHR0cDovL3BraS5vcGVyaXMuY2hhbXBsYW4vQ2VydEVucm9sbC9NeVN1YkNh +LUNBLmNydDCBtAYIKwYBBQUHMAKGgadsZGFwOi8vL0NOPVZtMjAxNkRPTU9SVlN1 +YkNBLENOPUFJQSxDTj1QdWJsaWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1TZXJ2aWNl +cyxDTj1Db25maWd1cmF0aW9uLERDPU9QRVJJUyxEQz1DSEFNUExBTj9jQUNlcnRp +ZmljYXRlP2Jhc2U/b2JqZWN0Q2xhc3M9Y2VydGlmaWNhdGlvbkF1dGhvcml0eTAO +BgNVHQ8BAf8EBAMCBaAwEwYDVR0lBAwwCgYIKwYBBQUHAwEwDQYJKoZIhvcNAQEL +BQADggEBAFmG7c7xT3u2wHCwkkVps3rASixfnRmETbtZdZlKnP+KHse9oquhxjZc +zoJebI1x17LC9FxFg1q1QRTcj6nTBTPZr1JWT95MLHxeoerfUFuNwhwTaNnXMehw +ZIul355OpoU7iF/BahRgkE2K03B1Qbh1uH6KyeSrWDqFsIYfOUpWPR0B3uFa7AY/ +McslckEZy/9h9tJrdy2hJliXE51ck5GK4YKDy/XAQVKCEOhFuHFUW3UFSYxnFPkh +lgDIWFcBOwur0QGK4CFTJfSDEdCPBJ4FhjzwRExKCKa3oEcjW/8hKDdnzf8vk9la +9E+x8jAbcbIWb+ZYqkUR5UNaivkmyWc= +-----END CERTIFICATE----- + +subject=CN = OperisRootCA +issuer=CN = OperisRootCA +-----BEGIN CERTIFICATE----- +MIIFMDCCAxigAwIBAgIQFGUI7Zg5MpZInFnGXtiYZTANBgkqhkiG9w0BAQsFADAX +MRUwEwYDVQQDEwxPcGVyaXNSb290Q0EwHhcNMjMwMzI3MTEzMDQ5WhcNNDMwMzI3 +MTIxMDMyWjAXMRUwEwYDVQQDEwxPcGVyaXNSb290Q0EwggIiMA0GCSqGSIb3DQEB +AQUAA4ICDwAwggIKAoICAQCdop13rlsI6nQGIDwX8PoMvbY95Dwg13c6PDUlZ4Qa +55LxLiaCur5qz1P+M2AQmxRAeQDTy5WrMDnY6QT0bDjfHGDhcdU3dgwMo1EjRQ1v +KIdqzhLFrNsvLSejD25mwfIgoA+gNH502MPVO7z3GDFn2rDYsGiW/e+pYtrq8UNr +YjSHZjxXVOxwBmAGX9kmx2EaTnRiJD6LH4NUDV9hKW8wdYWtIIx9fYjCQPSTSvd0 +zwA/nFU33KNMyXDIMCJeLLljS+wZrZpuJ3CQV2ymq1WYsNxOkpX7tma9NFQwbdpI +nkSUauJFbj8MALaJgwJDVhYC3QXbxj3DUkHOgbhzYE1HS+ONxg97UlpFYCVJK0Q4 +3k2WYab5ByMsrUPdc6+YhWpF7EfQoYHrinPtxFuwYQ/77FMvtS6BqQ2P2KT4JKFf +jymBLCD6imG/hS4L5UWdapL0JxfTSXKnfRqz6MkF1lBAQRCe6t2W9ds9jhixYJPc +EnNTrCl4NFlheit2+IolBtdVaClgVt9rJUnawxC7FZOXUt04cK5Fmb+LMitGLDOb +v6X0wJZwsZoKrwsUTf4T518dFgadRJ5JkhAfihH5hmlkycrFc4Izn/5hPQjSeB0U +SsLg+MzfCpHOwKMmGNxCtTIDj3cjey90uJZ3/2GEToJ5v7J/n9T6CXXXiiZMCfru +wQIDAQABo3gwdjALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/BAUwAwEB/zAdBgNVHQ4E +FgQUQKAe14myEkwC3PqvH2HajKRd3n8wEgYJKwYBBAGCNxUBBAUCAwoACzAjBgkr +BgEEAYI3FQIEFgQUVT78pO5JGfy0RyN10dSiCqwYyUQwDQYJKoZIhvcNAQELBQAD +ggIBAHsIq1NyjpkwkBwn2MkAKJYDiAz95SM33OPQa/yVBaF1ilyFgHVGDEVjAyhG +gEWssHYyTVQ0KMUiH/lVrg9ZZucqDLY5YHP9/NzAz9HM7jgnv8wQGwC/PFL9o6yh +/L7TVPGj/rARzfA/6MZykpnnQQXvhG9lmuVAelXsglvi89K+I3DLHLAc6+9rZAUq +kOZAnl9JiJxwxGFCnQxdo6Zn3eEKspi7Z4Gp+dt5oJKs7r1sTAzQJSEsGY6djzTc +XnqF7yZCVfCLYocWfGGuq9t0WfmhKCaEuzLmxmjgmmpi5lEtzM+SPApDwFHNBiT+ +NVEfr8DnNiINYDjIl03YUPMsWx2YnjJH/JbRKqIoB7MtLLwgfYGUvlfC3Xtkzfpn +FIiY7zlzmaVCRU9iQ/udutuxbNvZwL9lh0jyfXxyq2vNm9ALjoRgSkCMCZmEIGN7 +Ih2juElQUDnU+jwIqtT350WPFUk62Z7hV+o5NZ8bX3To61uhc5TALvLWxbfbC92v +M6Ux+JdGoeXU4Ht0PqcsoTJGMEQ+tT1+XsaCNT7Qb5khGgY4aVqvgse8uu3izK+5 +ngtIbNEOS3BzskgGWNIaSfvDEg0QtD7AtO1Ft3eFoafHbpNLE8TpeYP/z5UgJg6u +iFuOBaARcMxC20bP+izduUlx+0R5ZiSH8GjMbmxGv72vjSrE +-----END CERTIFICATE----- + +subject=DC = CHAMPLAN, DC = OPERIS, CN = Vm2016DOMORVSubCA +issuer=CN = OperisRootCA +-----BEGIN CERTIFICATE----- +MIIGQzCCBCugAwIBAgITIwAAACp7fugHds4HkwALAAAAKjANBgkqhkiG9w0BAQsF +ADAXMRUwEwYDVQQDEwxPcGVyaXNSb290Q0EwHhcNMjQwNzEyMDgzNDQzWhcNMjUw +NzEyMDg0NDQzWjBOMRgwFgYKCZImiZPyLGQBGRYIQ0hBTVBMQU4xFjAUBgoJkiaJ +k/IsZAEZFgZPUEVSSVMxGjAYBgNVBAMTEVZtMjAxNkRPTU9SVlN1YkNBMIIBIjAN +BgkqhkiG9w0BAQEFAAOCAQ8AMIIBCgKCAQEAvnYJmrHuywzuVUtNmXDmOPGfRGEj +JhnAZYBFz9OHOdBH6s3U1vP/9eKEXjyszFpYjRHut2xTCCUIJoYasqWUXJTqmkY3 +6UYq3YSqd8eJg+5FhYiTRTvBwXU21eVWwI+T1kBCWdSCd208oMIIXmdHStr/rU8C +QHo5aoWg3XgJT/NY1qkq7IeVJMZLeIkXGOEdwR8Tam6YqFEmnB0e5YOCRel7AKzC +ZKKru+OZotFis5oYsvE1qD68yqq9608JIDFcLVu9TfbOmFVo+1VuLHkAY9yAPmR+ +l/cyz8ve5IwmgNikqAStPmFnvoEC0ReC2mzWXQhdALvIZwOAJjZrV0JyjQIDAQAB +o4ICTzCCAkswEAYJKwYBBAGCNxUBBAMCAQMwIwYJKwYBBAGCNxUCBBYEFHkgf9uT +ExnVeI6tSCB+FO2Fim0UMB0GA1UdDgQWBBRAGWvXzWhgJkVDiw3R+qaKbwaQ6zAZ +BgkrBgEEAYI3FAIEDB4KAFMAdQBiAEMAQTALBgNVHQ8EBAMCAYYwDwYDVR0TAQH/ +BAUwAwEB/zAfBgNVHSMEGDAWgBRAoB7XibISTALc+q8fYdqMpF3efzCB0wYDVR0f +BIHLMIHIMIHFoIHCoIG/hoG8bGRhcDovLy9DTj1PcGVyaXNSb290Q0EoMTApLENO +PXZtMTljZXJ0LENOPUNEUCxDTj1QdWJsaWMlMjBLZXklMjBTZXJ2aWNlcyxDTj1T +ZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPU9QRVJJUyxEQz1DSEFNUExBTj9j +ZXJ0aWZpY2F0ZVJldm9jYXRpb25MaXN0P2Jhc2U/b2JqZWN0Q2xhc3M9Y1JMRGlz +dHJpYnV0aW9uUG9pbnQwgcIGCCsGAQUFBwEBBIG1MIGyMIGvBggrBgEFBQcwAoaB +omxkYXA6Ly8vQ049T3BlcmlzUm9vdENBLENOPUFJQSxDTj1QdWJsaWMlMjBLZXkl +MjBTZXJ2aWNlcyxDTj1TZXJ2aWNlcyxDTj1Db25maWd1cmF0aW9uLERDPU9QRVJJ +UyxEQz1DSEFNUExBTj9jQUNlcnRpZmljYXRlP2Jhc2U/b2JqZWN0Q2xhc3M9Y2Vy +dGlmaWNhdGlvbkF1dGhvcml0eTANBgkqhkiG9w0BAQsFAAOCAgEAGg/jyYXxwAsT +MTfqwGquyaD7lOHMnj+To5PLzoUP33AUZYIMECV+TwksrsV6yCIQDJ2I8Gliu2pU +IalDG7XcnG8URlxmkOPNNeS+iJphMathvC9zSMndDYvVEArgsW3sc+IvO/2CsRlo +JM0707+x+srgv50YyYXmROIMZ5j2mak7ADbbqNZhK6fYIu69qa9PX6lUosFCC1rB +OVK0Tu8YPhv3iKKYmCP2U39ZA8FhZ5kRE4lmptCT04R8ia258+Ya4eaQrgAA58oW +RnoZbTpHAWCFWuBlMm1uoAVV8ejfkMEq+VfIYWWrF7nJxDLrxQguFkg3fp6h9MEc +BGnLXZEy77f6lIH0bGv+Q/pxwWCOmb0Ni0c9eUOM9a7LM4+dBjXBGafy+dXh9fMB +IyWcyM8vw7uQKxKpEyjsqAQFSSPdstl23TOA3UAH3iFEANDPwOWsvhvf5wLgl1W3 +t37U0NRY4TLJUgLhKTYr+IAjzNToVEa7+G4GWiACOxIgz+aky5yvp8Z7f96+slYp +w4908umSehGSGlydMKrD5CF3aFu/0ljyfPTBuQNgdce6fUJPBklIvV0p5/1JM8jf +q760wd5YEgSGcaro4ff+ZFV0xJAJFnQ2bN+kRduFHj/KQMCCEWSrloIlUvV0BGci +hfaqB3rC2t4yL840kQP/Yni5UlERLPQ= +-----END CERTIFICATE----- + diff --git a/OCS_Linux/ocs.sh b/OCS_Linux/ocs.sh new file mode 100644 index 0000000..94cd1b1 --- /dev/null +++ b/OCS_Linux/ocs.sh @@ -0,0 +1,59 @@ +func_ocs() +{ +#!/bin/bash +#======================================================================= +# FILE: ~ocs.sh +# USAGE: ./~ocs.sh +# DESCRIPTION: Installation du package ocs et du certificat nécessaire au fonctionnement en https +# +# OPTIONS: --- +# REQUIREMENTS: --- +# BUGS: --- +# NOTES: --- +# AUTHOR: Maxime Tertrais +# COMPANY: Operis +# CREATED: 30/09/2024 +# REVISION: --- +#======================================================================= +##Définition des variables + +server="https://srv-vrm-ocs-001.operis.champlan/ocsinventory" +basevardir="/var/lib/ocsinventory-agent" +configdir="/etc/ocsinventory-agent" +logfile="/var/log/ocsagent.log" +ca="$configdir/cacert.pem" +$folder=$(pwd) ##dossier local + +#======================================================================= +##Script + +echo "Mise a jour dependances OCS" + apt-get update + apt install -y make gcc libmodule-install-perl dmidecode libxml-simple-perl libcompress-zlib-perl openssl libnet-ip-perl libwww-perl libdigest-md5-perl libdata-uuid-perl libcrypt-ssleay-perl libnet-snmp-perl libproc-pid-file-perl libproc-daemon-perl net-tools libsys-syslog-perl pciutils smartmontools read-edid nmap libnet-netmask-perl + sleep 2 + +echo "nettoyage version precedente de l'agent ocs" + rm -r $basevardir + rm -r $configdir + rm -r $logfile + sleep 2 + +echo "decompression archive de l'Agent" + tar xvzf "$folder/Ocsinventory-Unix-Agent-2.10.2.tar.gz" + cd "$folder/Ocsinventory-Unix-Agent-2.10.2" + sleep 2 + +echo "Installation sans interaction de l'agent" + read -p "Les poste est déployé dans quel service?" service + env PERL_AUTOINSTALL=1 perl Makefile.PL && make && make install && perl postinst.pl --server=$server --basevardir=$basevardir --configdir=$configdir --logfile=$logfile --crontab --tag=$service --ssl=1 --nosoftware=0 --ca=$ca --debug --snmp --nowizard + mv "$folder/cacert.pem" $configdir + sleep 2 + +echo "test de la connexion au serveur" + ocsinventory-agent --server $server + +echo "nettoyage du dossier d'installation" + cd / + rm -r /Installateur_OCS_agent + +} \ No newline at end of file diff --git a/deploiement_main.sh b/deploiement_main.sh index a561bc4..f140d46 100644 --- a/deploiement_main.sh +++ b/deploiement_main.sh @@ -14,14 +14,14 @@ # REVISION: --- #======================================================================= ##Définition des variables - +folder=$(pwd) #======================================================================= ##Définition des fonctions -source "installation Malwarebytes" +source "$folder/malwarebytes.sh" source "intégration au domaine" -source "installation OCS" -source "installation LAPS" +source "$folder/ocs.sh" +source "$folder/ldap.sh" source "installation vpn" source "paramétrage des depots" source "installation des paquets métier" @@ -63,7 +63,7 @@ while true ;do echo "Déploiement/intégration complète du poste au domaine" ;; m|M) - #func_Installation Malwarebytes + #func_malwarebytes echo "Installation Malwarebytes" ;; d|D) @@ -71,11 +71,11 @@ while true ;do echo "Intégration au domaine" ;; o|O) - #func_Installation OCS + #func_ocs echo "Installation OCS" ;; l|L) - #func_Installation LAPS + #func_ldap echo "Installation LAPS" ;; v|V) diff --git a/workspace.code-workspace b/workspace.code-workspace new file mode 100644 index 0000000..3e70edd --- /dev/null +++ b/workspace.code-workspace @@ -0,0 +1,4 @@ +{ + "folders": [], + "settings": {} +} \ No newline at end of file