Compare commits

...

5 Commits

5 changed files with 73 additions and 33 deletions

11
TODO.md
View File

@ -1,8 +1,19 @@
Replicating jails between two servers (use zrepl) Replicating jails between two servers (use zrepl)
Manage remote jails :
- Make gocage a service
- All commands should become API endpoint
- How to handle authentication ?
DEBUG: DEBUG:
- cmd/list.go:275: - cmd/list.go:275:
// FIXME ??? Shouldn't be ioc-$Name ? // FIXME ??? Shouldn't be ioc-$Name ?
j.InternalName = rj.Name j.InternalName = rj.Name
- WriteConfigToDisk don't write neither "release" in cmd stop neither "last_started" in cmd start - WriteConfigToDisk don't write neither "release" in cmd stop neither "last_started" in cmd start
26/08/2023 : Last_started is updated
BUGS:
- unable to set values containing equal sign :
# gocage set Config.Exec_poststart="jail -m allow.mount.linprocfs=1 name=ioc-poudriere-noo" poudriere-noo
Error parsing args: Config.Exec_poststart=jail -m allow.mount.linprocfs=1 name=ioc-poudriere-noo
- Fix fstab when migrating jail

View File

@ -16,6 +16,11 @@ func CreateJail(args []string) {
var err error var err error
var jtype []string var jtype []string
if gCreateArgs.BaseJail && gCreateArgs.Release == "" {
fmt.Println("Release should be set when creating basejail")
os.Exit(1)
}
if len(gCreateArgs.JailType) > 0 { if len(gCreateArgs.JailType) > 0 {
jtype = []string{gCreateArgs.JailType} jtype = []string{gCreateArgs.JailType}
} }
@ -50,21 +55,20 @@ func CreateJail(args []string) {
} }
// Get base template if specified // Get base template if specified
if len(gCreateArgs.BaseTemplate) > 0 { if gCreateArgs.BaseJail {
/************************************************************************** /**************************************************************************
* Create based jail from a template * Create based jail from a template
*/ */
log.Debugf("Jail will be created from a base template\n") log.Debugf("Jail will be created read-only from release %s\n", gCreateArgs.Release)
bj, err := getJailFromArray(gCreateArgs.BaseTemplate, []string{"template"}, gJails)
if err != nil { // First check if we got release on the same datastore
if strings.EqualFold(err.Error(), "Jail not found") { releasePath := fmt.Sprintf("%s/releases/%s/root", ds.Mountpoint, gCreateArgs.Release)
fmt.Printf("Template not found\n") _, err := os.Stat(releasePath)
return if os.IsNotExist(err) {
} else { fmt.Printf("ERROR: Release locally not available. Run \"gocage fetch\"\n")
fmt.Printf("ERROR: %s\n", err.Error()) return
return
}
} }
// Create jail datasets // Create jail datasets
dstDset := fmt.Sprintf("%s/jails/%s", ds.ZFSDataset, jname) dstDset := fmt.Sprintf("%s/jails/%s", ds.ZFSDataset, jname)
fmt.Printf(" > Initialize dataset %s\n", dstDset) fmt.Printf(" > Initialize dataset %s\n", dstDset)
@ -87,7 +91,7 @@ func CreateJail(args []string) {
dstRootDir := fmt.Sprintf("%s/jails/%s/root", ds.Mountpoint, jname) dstRootDir := fmt.Sprintf("%s/jails/%s/root", ds.Mountpoint, jname)
for _, d := range append(gBaseDirs, gEmptyDirs...) { for _, d := range append(gBaseDirs, gEmptyDirs...) {
dstPath := dstRootDir dstPath := dstRootDir
srcPath := bj.RootPath srcPath := releasePath
for _, cd := range strings.Split(d, "/") { for _, cd := range strings.Split(d, "/") {
srcPath = fmt.Sprintf("%s/%s", srcPath, cd) srcPath = fmt.Sprintf("%s/%s", srcPath, cd)
dstPath = fmt.Sprintf("%s/%s", dstPath, cd) dstPath = fmt.Sprintf("%s/%s", dstPath, cd)
@ -110,9 +114,9 @@ func CreateJail(args []string) {
// Copy these from basejail // Copy these from basejail
fmt.Printf(" > Create base writable directories\n") fmt.Printf(" > Create base writable directories\n")
for _, d := range gCopyDirs { for _, d := range gCopyDirs {
err := cp.Copy(fmt.Sprintf("%s/%s", bj.RootPath, d), fmt.Sprintf("%s/%s", dstRootDir, d)) err := cp.Copy(fmt.Sprintf("%s/%s", releasePath, d), fmt.Sprintf("%s/%s", dstRootDir, d))
if err != nil { if err != nil {
fmt.Printf("ERROR copying %s to %s: %s\n", fmt.Sprintf("%s/%s", bj.RootPath, d), fmt.Printf("ERROR copying %s to %s: %s\n", fmt.Sprintf("%s/%s", releasePath, d),
fmt.Sprintf("%s/%s", dstRootDir, d), err.Error()) fmt.Sprintf("%s/%s", dstRootDir, d), err.Error())
return return
} }
@ -150,7 +154,7 @@ func CreateJail(args []string) {
// 2. Add a json item to config ("basejail_template" p.e.), but iocage would delete it once jail is started from iocage // 2. Add a json item to config ("basejail_template" p.e.), but iocage would delete it once jail is started from iocage
// 3. Add a gocage specific config ("config.gocage.json" p.e.) // 3. Add a gocage specific config ("config.gocage.json" p.e.)
j.Config.Jailtype = "basejail" j.Config.Jailtype = "basejail"
j.Config.Origin = bj.Name j.Config.Origin = gCreateArgs.Release
j.Config.Host_hostname = jname j.Config.Host_hostname = jname
j.Config.Host_hostuuid = jname j.Config.Host_hostuuid = jname
@ -166,7 +170,7 @@ func CreateJail(args []string) {
defer fstabHandle.Close() defer fstabHandle.Close()
for _, d := range gBaseDirs { for _, d := range gBaseDirs {
fmt.Fprintf(fstabHandle, "%s\t%s\tnullfs\tro\t0\t0\n", fmt.Sprintf("%s/%s", bj.RootPath, d), fmt.Sprintf("%s/%s", dstRootDir, d)) fmt.Fprintf(fstabHandle, "%s\t%s\tnullfs\tro\t0\t0\n", fmt.Sprintf("%s/%s", releasePath, d), fmt.Sprintf("%s/%s", dstRootDir, d))
} }
fmt.Printf(" > Jail created!\n") fmt.Printf(" > Jail created!\n")

View File

@ -14,7 +14,7 @@ import (
) )
const ( const (
gVersion = "0.39" gVersion = "0.40"
// TODO : Get from $jail_zpool/defaults.json // TODO : Get from $jail_zpool/defaults.json
MIN_DYN_DEVFS_RULESET = 1000 MIN_DYN_DEVFS_RULESET = 1000
@ -22,7 +22,7 @@ const (
type createArgs struct { type createArgs struct {
Release string Release string
BaseTemplate string BaseJail bool
Datastore string Datastore string
JailType string JailType string
} }
@ -420,7 +420,7 @@ func init() {
upgradeCmd.MarkFlagRequired("release") upgradeCmd.MarkFlagRequired("release")
createCmd.Flags().StringVarP(&gCreateArgs.Release, "release", "r", "", "Release for the jail (e.g.: \"13.1-RELEASE\"") createCmd.Flags().StringVarP(&gCreateArgs.Release, "release", "r", "", "Release for the jail (e.g.: \"13.1-RELEASE\"")
createCmd.Flags().StringVarP(&gCreateArgs.BaseTemplate, "basetpl", "b", "", "Base template. This will create a jail based on basetpl, so every up(date|grade) made to basetpl will immediately propagate to new jail\n") createCmd.Flags().BoolVarP(&gCreateArgs.BaseJail, "basejail", "b", false, "Basejail. This will create a jail mounted read only from a release, so every up(date|grade) made to this release will immediately propagate to new jail.\n")
createCmd.Flags().StringVarP(&gCreateArgs.Datastore, "datastore", "d", "", "Datastore to create the jail on. Defaults to first declared in config.") createCmd.Flags().StringVarP(&gCreateArgs.Datastore, "datastore", "d", "", "Datastore to create the jail on. Defaults to first declared in config.")
// Now declare commands // Now declare commands

View File

@ -340,7 +340,7 @@ func configureDhcpOrAcceptRtadv(jail *Jail, ipproto int, enable bool) error {
if ipproto == IPv6 { if ipproto == IPv6 {
key = fmt.Sprintf("%s_ipv6", key) key = fmt.Sprintf("%s_ipv6", key)
value = "inet6 auto_linklocal accept_rtadv autoconf" value = "\"inet6 auto_linklocal accept_rtadv autoconf\""
} }
if enable == true { if enable == true {
@ -363,7 +363,7 @@ func checkRtsold(jail *Jail) error {
if strings.Contains(jail.Config.Ip6_addr, "accept_rtadv") == false { if strings.Contains(jail.Config.Ip6_addr, "accept_rtadv") == false {
return fmt.Errorf("Must set at least one ip6_addr to accept_rtadv!\n") return fmt.Errorf("Must set at least one ip6_addr to accept_rtadv!\n")
} }
err := enableRcKeyValue(jail.ConfigPath, "rtsold_enable", "yes") err := enableRcKeyValue(fmt.Sprintf("%s/etc/rc.conf", jail.RootPath), "rtsold_enable", "yes")
if err != nil { if err != nil {
return fmt.Errorf("ERROR setting rtsold_enable=YES with sysrc for jail %s: %s\n", jail.Name, err) return fmt.Errorf("ERROR setting rtsold_enable=YES with sysrc for jail %s: %s\n", jail.Name, err)
} }
@ -810,7 +810,9 @@ func generateMAC(jail *Jail, nic string) ([]byte, []byte, error) {
} }
hsmac := append(prefix, suffix...) hsmac := append(prefix, suffix...)
jsmac := append(hsmac[:5], hsmac[5]+1) jsmac := make([]byte, 6)
copy(jsmac, hsmac)
jsmac[5] = jsmac[5] + 1
// Save MACs to config // Save MACs to config
pname := fmt.Sprintf("Config.%s_mac", strings.Title(nic)) pname := fmt.Sprintf("Config.%s_mac", strings.Title(nic))
@ -853,6 +855,12 @@ func setupVnetInterfaceHostSide(jail *Jail) ([]string, error) {
return []string{}, err return []string{}, err
} }
} else { } else {
if strings.EqualFold(val.String(), "none") {
hsmac, _, err = generateMAC(jail, nic)
if err != nil {
return []string{}, err
}
}
hsmac, err = hex.DecodeString(strings.Split(val.String(), " ")[0]) hsmac, err = hex.DecodeString(strings.Split(val.String(), " ")[0])
if err != nil { if err != nil {
return []string{}, fmt.Errorf("Error converting %s to hex\n", strings.Split(val.String(), " ")[0]) return []string{}, fmt.Errorf("Error converting %s to hex\n", strings.Split(val.String(), " ")[0])
@ -912,7 +920,9 @@ func setupVnetInterfaceJailSide(jail *Jail, hostepairs []string) error {
for _, i := range strings.Split(jail.Config.Ip4_addr, ",") { for _, i := range strings.Split(jail.Config.Ip4_addr, ",") {
v := strings.Split(i, "|") v := strings.Split(i, "|")
ip4s[v[0]] = v[1] if len(v) > 1 {
ip4s[v[0]] = v[1]
}
} }
for _, i := range strings.Split(jail.Config.Ip6_addr, ",") { for _, i := range strings.Split(jail.Config.Ip6_addr, ",") {
v := strings.Split(i, "|") v := strings.Split(i, "|")
@ -1438,7 +1448,7 @@ func StartJail(args []string) {
fmt.Printf(" > Setup VNet network: OK\n") fmt.Printf(" > Setup VNet network: OK\n")
// Set default route, unless main network is dhcp // Set default route, unless main network is dhcp
if ! cj.isFirstNetDhcp() { if ! cj.isFirstNetDhcp() && !strings.EqualFold(cj.Config.Ip4_addr, "none") {
fmt.Printf(" > Setup default ipv4 gateway:\n") fmt.Printf(" > Setup default ipv4 gateway:\n")
cmd := fmt.Sprintf("/usr/sbin/setfib %s /usr/sbin/jexec %d route add default %s", cj.Config.Exec_fib, cj.JID, cj.Config.Defaultrouter) cmd := fmt.Sprintf("/usr/sbin/setfib %s /usr/sbin/jexec %d route add default %s", cj.Config.Exec_fib, cj.JID, cj.Config.Defaultrouter)
out, err := executeCommand(cmd) out, err := executeCommand(cmd)

View File

@ -83,15 +83,30 @@ func umountAndUnjailZFS(jail *Jail) error {
} }
func destroyVNetInterfaces(jail *Jail) error { func destroyVNetInterfaces(jail *Jail) error {
for _, i := range strings.Split(jail.Config.Ip4_addr, ",") { if !strings.EqualFold(jail.Config.Ip4_addr, "none") {
iname := fmt.Sprintf("%s.%d", strings.Split(i, "|")[0], jail.JID) for _, i := range strings.Split(jail.Config.Ip4_addr, ",") {
fmt.Printf("%s: ", iname) iname := fmt.Sprintf("%s.%d", strings.Split(i, "|")[0], jail.JID)
_, err := executeCommand(fmt.Sprintf("ifconfig %s destroy", iname)) fmt.Printf("%s: ", iname)
//_, err := executeScript(fmt.Sprintf("ifconfig %s destroy >/dev/null 2>&1", iname)) _, err := executeCommand(fmt.Sprintf("ifconfig %s destroy", iname))
if err != nil { //_, err := executeScript(fmt.Sprintf("ifconfig %s destroy >/dev/null 2>&1", iname))
return err if err != nil {
} else { return err
fmt.Printf("OK\n") } else {
fmt.Printf("OK\n")
}
}
}
if !strings.EqualFold(jail.Config.Ip6_addr, "none") {
for _, i := range strings.Split(jail.Config.Ip6_addr, ",") {
iname := fmt.Sprintf("%s.%d", strings.Split(i, "|")[0], jail.JID)
fmt.Printf("%s: ", iname)
_, err := executeCommand(fmt.Sprintf("ifconfig %s destroy", iname))
//_, err := executeScript(fmt.Sprintf("ifconfig %s destroy >/dev/null 2>&1", iname))
if err != nil {
return err
} else {
fmt.Printf("OK\n")
}
} }
} }