added missing quotation marks to first EOF

This commit is contained in:
7aqdxe6f 2021-05-15 15:36:59 +02:00
parent c0a9babdb7
commit da2fda85a3
No known key found for this signature in database
GPG key ID: D6844406A2D2F0DD
7 changed files with 25 additions and 25 deletions

View file

@ -261,7 +261,7 @@ veracrypt --text --dismount "$BACKUP_VOLUME_PATH"
### Step 12: create `/usr/local/bin/backup.sh` script ### Step 12: create `/usr/local/bin/backup.sh` script
```shell ```shell
cat << EOF > /usr/local/bin/backup.sh cat << "EOF" > /usr/local/bin/backup.sh
#! /bin/sh #! /bin/sh
set -e set -e
@ -340,7 +340,7 @@ Press <kbd>i</kbd> to enter insert mode, edit backup script, press <kbd>esc</kbd
### Step 14: create `/usr/local/bin/check.sh` script ### Step 14: create `/usr/local/bin/check.sh` script
```shell ```shell
cat << EOF > /usr/local/bin/check.sh cat << "EOF" > /usr/local/bin/check.sh
#! /bin/sh #! /bin/sh
set -e set -e
@ -368,7 +368,7 @@ chmod +x /usr/local/bin/check.sh
### Step 15: create `/usr/local/bin/restore.sh` script ### Step 15: create `/usr/local/bin/restore.sh` script
```shell ```shell
cat << EOF > /usr/local/bin/restore.sh cat << "EOF" > /usr/local/bin/restore.sh
#! /bin/sh #! /bin/sh
set -e set -e

View file

@ -131,7 +131,7 @@ BORG_HOSTNAME="ch-s011.rsync.net"
#### Generate `authorized_keys` file #### Generate `authorized_keys` file
```shell ```shell
cat << EOF > ~/Desktop/authorized_keys cat << "EOF" > ~/Desktop/authorized_keys
command="borg1 serve --restrict-to-repository /data1/home/$BORG_USERNAME/backup --storage-quota $BORG_STORAGE_QUOTA",restrict $(cat ~/.ssh/borg.pub) command="borg1 serve --restrict-to-repository /data1/home/$BORG_USERNAME/backup --storage-quota $BORG_STORAGE_QUOTA",restrict $(cat ~/.ssh/borg.pub)
command="borg1 serve --append-only --restrict-to-repository /data1/home/$BORG_USERNAME/backup --storage-quota $BORG_STORAGE_QUOTA",restrict $(cat ~/.ssh/borg-append-only.pub) command="borg1 serve --append-only --restrict-to-repository /data1/home/$BORG_USERNAME/backup --storage-quota $BORG_STORAGE_QUOTA",restrict $(cat ~/.ssh/borg-append-only.pub)
EOF EOF
@ -217,7 +217,7 @@ BACKUP_NAME="$USER-macbook-pro"
### Step 10: create `/usr/local/bin/borg-backup.sh` script ### Step 10: create `/usr/local/bin/borg-backup.sh` script
```shell ```shell
cat << EOF > /usr/local/bin/borg-backup.sh cat << "EOF" > /usr/local/bin/borg-backup.sh
#! /bin/sh #! /bin/sh
set -e set -e
@ -251,7 +251,7 @@ vi /usr/local/bin/borg-backup.sh
### Step 12: create `/usr/local/bin/borg-list.sh` script ### Step 12: create `/usr/local/bin/borg-list.sh` script
```shell ```shell
cat << EOF > /usr/local/bin/borg-list.sh cat << "EOF" > /usr/local/bin/borg-list.sh
#! /bin/sh #! /bin/sh
set -e set -e
@ -272,7 +272,7 @@ chmod +x /usr/local/bin/borg-list.sh
### Step 13: create `/usr/local/bin/borg-check.sh` script ### Step 13: create `/usr/local/bin/borg-check.sh` script
```shell ```shell
cat << EOF > /usr/local/bin/borg-check.sh cat << "EOF" > /usr/local/bin/borg-check.sh
#! /bin/sh #! /bin/sh
set -e set -e
@ -293,7 +293,7 @@ chmod +x /usr/local/bin/borg-check.sh
### Step 14: create `/usr/local/bin/borg-restore.sh` script ### Step 14: create `/usr/local/bin/borg-restore.sh` script
```shell ```shell
cat << EOF > /usr/local/bin/borg-restore.sh cat << "EOF" > /usr/local/bin/borg-restore.sh
#! /bin/sh #! /bin/sh
set -e set -e
@ -334,7 +334,7 @@ chmod +x /usr/local/bin/borg-restore.sh
### Step 15: create `/usr/local/bin/borg-prune.sh` script ### Step 15: create `/usr/local/bin/borg-prune.sh` script
```shell ```shell
cat << EOF > /usr/local/bin/borg-prune.sh cat << "EOF" > /usr/local/bin/borg-prune.sh
#! /bin/sh #! /bin/sh
set -e set -e

View file

@ -65,7 +65,7 @@ ssh-rsa AAAAB3NzaC1yc2EAAAADAQABAAABgQDCzQpX9uqDP8L2gSZNJxYEi04Y1pZWz28v4zANY5dU
### Step 2: generate heredoc (the output of following command will be used at [step 10](#step-10-configure-pi-ssh-authorized-keys)) ### Step 2: generate heredoc (the output of following command will be used at [step 10](#step-10-configure-pi-ssh-authorized-keys))
```shell ```shell
cat << EOF cat << "EOF"
cat << "_EOF" > ~/.ssh/authorized_keys cat << "_EOF" > ~/.ssh/authorized_keys
$(cat ~/.ssh/pi.pub) $(cat ~/.ssh/pi.pub)
_EOF _EOF

View file

@ -173,7 +173,7 @@ KILLSWITCH_VPN_ENDPOINT_IPS="{ 185.193.126.203 }"
This anchor blocks everything except DHCP and VPN requests. This anchor blocks everything except DHCP and VPN requests.
```shell ```shell
cat << EOF | sudo tee /etc/pf.anchors/local.pf.strict cat << "EOF" | sudo tee /etc/pf.anchors/local.pf.strict
# Options # Options
set block-policy drop set block-policy drop
set ruleset-optimization basic set ruleset-optimization basic
@ -204,7 +204,7 @@ sudo chmod 644 /etc/pf.anchors/local.pf.strict
Same as strict but allows multicast DNS and local network requests. Same as strict but allows multicast DNS and local network requests.
```shell ```shell
cat << EOF | sudo tee /etc/pf.anchors/local.pf.trusted cat << "EOF" | sudo tee /etc/pf.anchors/local.pf.trusted
# Options # Options
set block-policy drop set block-policy drop
set ruleset-optimization basic set ruleset-optimization basic

View file

@ -42,7 +42,7 @@ STRONGSWAN_CLIENT_NAME=bob
#### Update OpenSSL config file #### Update OpenSSL config file
```shell ```shell
cat << EOF > openssl.cnf cat << "EOF" > openssl.cnf
[ req ] [ req ]
distinguished_name = req_distinguished_name distinguished_name = req_distinguished_name
attributes = req_attributes attributes = req_attributes
@ -161,7 +161,7 @@ STRONGSWAN_SERVER_IP=185.193.126.203
```shell ```shell
cp /etc/ipsec.conf /etc/ipsec.conf.backup cp /etc/ipsec.conf /etc/ipsec.conf.backup
cat << EOF > /etc/ipsec.conf cat << "EOF" > /etc/ipsec.conf
conn ikev2 conn ikev2
auto=start auto=start
ike=aes256gcm16-prfsha512-ecp384! ike=aes256gcm16-prfsha512-ecp384!
@ -184,7 +184,7 @@ EOF
```shell ```shell
cp /etc/ipsec.secrets /etc/ipsec.secrets.backup cp /etc/ipsec.secrets /etc/ipsec.secrets.backup
cat << EOF > /etc/ipsec.secrets cat << "EOF" > /etc/ipsec.secrets
: RSA $STRONGSWAN_CLIENT_NAME.key : RSA $STRONGSWAN_CLIENT_NAME.key
EOF EOF
``` ```
@ -217,7 +217,7 @@ On client computer: run `chmod -R 600 /etc/ipsec.d/private` -->
On certificate authority computer, run: On certificate authority computer, run:
```shell ```shell
cat << EOF cat << "EOF"
cat << "_EOF" > /etc/ipsec.d/cacerts/ca.crt cat << "_EOF" > /etc/ipsec.d/cacerts/ca.crt
$(cat ca.crt) $(cat ca.crt)
_EOF _EOF
@ -265,7 +265,7 @@ _EOF
On certificate authority computer, run: On certificate authority computer, run:
```shell ```shell
cat << EOF cat << "EOF"
cat << "_EOF" > /etc/ipsec.d/private/$STRONGSWAN_CLIENT_NAME.key cat << "_EOF" > /etc/ipsec.d/private/$STRONGSWAN_CLIENT_NAME.key
$(cat $STRONGSWAN_CLIENT_NAME.key) $(cat $STRONGSWAN_CLIENT_NAME.key)
_EOF _EOF
@ -333,7 +333,7 @@ _EOF
On certificate authority computer, run: On certificate authority computer, run:
```shell ```shell
cat << EOF cat << "EOF"
cat << "_EOF" > /etc/ipsec.d/certs/$STRONGSWAN_CLIENT_NAME.crt cat << "_EOF" > /etc/ipsec.d/certs/$STRONGSWAN_CLIENT_NAME.crt
$(cat $STRONGSWAN_CLIENT_NAME.crt) $(cat $STRONGSWAN_CLIENT_NAME.crt)
_EOF _EOF

View file

@ -105,7 +105,7 @@ BORG_STORAGE_QUOTA="10G"
#### Generate heredoc (the output of following command will be used at [step 8](#create-homeborgsshauthorized_keys-using-heredoc-generated-at-step-2)) #### Generate heredoc (the output of following command will be used at [step 8](#create-homeborgsshauthorized_keys-using-heredoc-generated-at-step-2))
```shell ```shell
cat << EOF cat << "EOF"
cat << "_EOF" > /home/borg/.ssh/authorized_keys cat << "_EOF" > /home/borg/.ssh/authorized_keys
command="borg serve --restrict-to-repository /home/borg/backup --storage-quota $BORG_STORAGE_QUOTA",restrict $(cat ~/.ssh/borg.pub) command="borg serve --restrict-to-repository /home/borg/backup --storage-quota $BORG_STORAGE_QUOTA",restrict $(cat ~/.ssh/borg.pub)
command="borg serve --append-only --restrict-to-repository /home/borg/backup --storage-quota $BORG_STORAGE_QUOTA",restrict $(cat ~/.ssh/borg-append-only.pub) command="borg serve --append-only --restrict-to-repository /home/borg/backup --storage-quota $BORG_STORAGE_QUOTA",restrict $(cat ~/.ssh/borg-append-only.pub)

View file

@ -482,7 +482,7 @@ cp /etc/ipsec.conf /etc/ipsec.conf.backup
If network is IPv4-only, run: If network is IPv4-only, run:
```shell ```shell
cat << EOF > /etc/ipsec.conf cat << "EOF" > /etc/ipsec.conf
config setup config setup
charondebug="ike 1, knl 1, cfg 1" charondebug="ike 1, knl 1, cfg 1"
@ -516,7 +516,7 @@ EOF
If network is dual stack (IPv4 + IPv6) run: If network is dual stack (IPv4 + IPv6) run:
```shell ```shell
cat << EOF > /etc/ipsec.conf cat << "EOF" > /etc/ipsec.conf
config setup config setup
charondebug="ike 1, knl 1, cfg 1" charondebug="ike 1, knl 1, cfg 1"
@ -630,7 +630,7 @@ STRONGSWAN_CLIENT_NAME=alice
#### Create OpenSSL config file #### Create OpenSSL config file
```shell ```shell
cat << EOF > openssl.cnf cat << "EOF" > openssl.cnf
[ req ] [ req ]
distinguished_name = req_distinguished_name distinguished_name = req_distinguished_name
attributes = req_attributes attributes = req_attributes
@ -719,7 +719,7 @@ Verifying - Enter Export Password:
On Mac, run: On Mac, run:
```shell ```shell
cat << EOF cat << "EOF"
cat << "_EOF" > /etc/ipsec.d/cacerts/ca.crt cat << "_EOF" > /etc/ipsec.d/cacerts/ca.crt
$(cat ca.crt) $(cat ca.crt)
_EOF _EOF
@ -767,7 +767,7 @@ _EOF
On Mac, run: On Mac, run:
```shell ```shell
cat << EOF cat << "EOF"
cat << "_EOF" > /etc/ipsec.d/private/server.key cat << "_EOF" > /etc/ipsec.d/private/server.key
$(cat server.key) $(cat server.key)
_EOF _EOF
@ -835,7 +835,7 @@ _EOF
On Mac, run: On Mac, run:
```shell ```shell
cat << EOF cat << "EOF"
cat << "_EOF" > /etc/ipsec.d/certs/server.crt cat << "_EOF" > /etc/ipsec.d/certs/server.crt
$(cat server.crt) $(cat server.crt)
_EOF _EOF