Compare commits
9 Commits
684d97cc21
...
cdcb466417
Author | SHA1 | Date | |
---|---|---|---|
cdcb466417 | |||
bb3136c9ef | |||
9208102c84 | |||
fce64b2939 | |||
44b877eae1 | |||
c2277ce10c | |||
549d517cf9 | |||
14984f417c | |||
346fd52a8e |
@ -22,6 +22,14 @@ gocage create jail1 -r 13.2-RELEASE
|
|||||||
gocage set Config.Ip4_addr="vnet0|192.168.1.91/24" Config.Vnet=1 jail1
|
gocage set Config.Ip4_addr="vnet0|192.168.1.91/24" Config.Vnet=1 jail1
|
||||||
</code></pre>
|
</code></pre>
|
||||||
|
|
||||||
|
Create basejail (jail based on a template, system will be nullfs read-only mounted from the template):
|
||||||
|
<pre><code>
|
||||||
|
# First create basetpl from 13.2-RELEASE
|
||||||
|
gocage create -r 13.2-RELEASE basetpl
|
||||||
|
# Then create basejail1 based on basetpl
|
||||||
|
gocage create -b basetpl basejail1
|
||||||
|
</code></pre>
|
||||||
|
|
||||||
|
|
||||||
List jails
|
List jails
|
||||||
----------
|
----------
|
||||||
|
@ -12,7 +12,7 @@ import (
|
|||||||
func ShellJail(args []string) error {
|
func ShellJail(args []string) error {
|
||||||
// We cant shell more than one jail bc we replace gocage execution with jexec, so there wont be no return to gocage
|
// We cant shell more than one jail bc we replace gocage execution with jexec, so there wont be no return to gocage
|
||||||
if len(args) > 0 {
|
if len(args) > 0 {
|
||||||
cj, err := getJailFromArray(args[0], []string{"jail"}, gJails)
|
cj, err := getJailFromArray(args[0], []string{"basejail", "jail"}, gJails)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Printf("Error getting jail %s: %v\n", args[0], err)
|
fmt.Printf("Error getting jail %s: %v\n", args[0], err)
|
||||||
return err
|
return err
|
||||||
|
@ -5,6 +5,7 @@ import (
|
|||||||
"fmt"
|
"fmt"
|
||||||
//"log"
|
//"log"
|
||||||
"time"
|
"time"
|
||||||
|
"errors"
|
||||||
"strings"
|
"strings"
|
||||||
cp "github.com/otiai10/copy"
|
cp "github.com/otiai10/copy"
|
||||||
log "github.com/sirupsen/logrus"
|
log "github.com/sirupsen/logrus"
|
||||||
@ -85,17 +86,26 @@ func CreateJail(args []string) {
|
|||||||
fmt.Printf(" > Create base read-only directories\n")
|
fmt.Printf(" > Create base read-only directories\n")
|
||||||
dstRootDir := fmt.Sprintf("%s/jails/%s/root", ds.Mountpoint, jname)
|
dstRootDir := fmt.Sprintf("%s/jails/%s/root", ds.Mountpoint, jname)
|
||||||
for _, d := range append(gBaseDirs, gEmptyDirs...) {
|
for _, d := range append(gBaseDirs, gEmptyDirs...) {
|
||||||
srcPerm, err := getPermissions(fmt.Sprintf("%s/%s", bj.RootPath, d))
|
dstPath := dstRootDir
|
||||||
|
srcPath := bj.RootPath
|
||||||
|
for _, cd := range strings.Split(d, "/") {
|
||||||
|
srcPath = fmt.Sprintf("%s/%s", srcPath, cd)
|
||||||
|
dstPath = fmt.Sprintf("%s/%s", dstPath, cd)
|
||||||
|
_, err := os.Stat(dstPath)
|
||||||
|
if errors.Is(err, os.ErrNotExist) {
|
||||||
|
srcPerm, err := getPermissions(srcPath)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Printf("ERROR getting permissions of %s/%s: %s\n", bj.RootPath, d, err.Error())
|
fmt.Printf("ERROR getting permissions of %s: %s\n", srcPath, err.Error())
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
err = os.Mkdir(fmt.Sprintf("%s/%s", dstRootDir, d), srcPerm.Mode().Perm())
|
err = os.Mkdir(dstPath, srcPerm.Mode().Perm())
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Printf("ERROR creating directory %s/%s: %s\n", dstRootDir, d, err.Error())
|
fmt.Printf("ERROR creating directory %s: %s\n", dstPath, err.Error())
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
// Copy these from basejail
|
// Copy these from basejail
|
||||||
fmt.Printf(" > Create base writable directories\n")
|
fmt.Printf(" > Create base writable directories\n")
|
||||||
@ -154,6 +164,11 @@ func CreateJail(args []string) {
|
|||||||
return
|
return
|
||||||
}
|
}
|
||||||
defer fstabHandle.Close()
|
defer fstabHandle.Close()
|
||||||
|
|
||||||
|
for _, d := range gBaseDirs {
|
||||||
|
fmt.Fprintf(fstabHandle, "%s\t%s\tnullfs\tro\t0\t0\n", fmt.Sprintf("%s/%s", bj.RootPath, d), fmt.Sprintf("%s/%s", dstRootDir, d))
|
||||||
|
}
|
||||||
|
|
||||||
fmt.Printf(" > Jail created!\n")
|
fmt.Printf(" > Jail created!\n")
|
||||||
} else {
|
} else {
|
||||||
/**************************************************************************
|
/**************************************************************************
|
||||||
@ -252,6 +267,7 @@ func CreateJail(args []string) {
|
|||||||
j.Config.Release = gCreateArgs.Release
|
j.Config.Release = gCreateArgs.Release
|
||||||
j.Config.Host_hostname = jname
|
j.Config.Host_hostname = jname
|
||||||
j.Config.Host_hostuuid = jname
|
j.Config.Host_hostuuid = jname
|
||||||
|
j.Config.Jailtype = "jail"
|
||||||
|
|
||||||
j.WriteConfigToDisk(false)
|
j.WriteConfigToDisk(false)
|
||||||
|
|
||||||
@ -265,6 +281,5 @@ func CreateJail(args []string) {
|
|||||||
defer fstabHandle.Close()
|
defer fstabHandle.Close()
|
||||||
fmt.Printf(" > Jail created!\n")
|
fmt.Printf(" > Jail created!\n")
|
||||||
}
|
}
|
||||||
// TODO : Set JailType
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -275,6 +275,13 @@ func listJailsFromDirectory(dir string, dsname string) ([]Jail, error) {
|
|||||||
// FIXME ??? Shouldn't be ioc-$Name ?
|
// FIXME ??? Shouldn't be ioc-$Name ?
|
||||||
j.InternalName = rj.Name
|
j.InternalName = rj.Name
|
||||||
j.Devfs_ruleset = rj.Devfs_ruleset
|
j.Devfs_ruleset = rj.Devfs_ruleset
|
||||||
|
// Update release
|
||||||
|
r, err := getVersion(&j)
|
||||||
|
if err != nil {
|
||||||
|
fmt.Printf("ERROR getting jail %s version: %s\n", j.Name, err.Error())
|
||||||
|
} else {
|
||||||
|
j.Config.Release = r
|
||||||
|
}
|
||||||
break
|
break
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -14,7 +14,7 @@ import (
|
|||||||
)
|
)
|
||||||
|
|
||||||
const (
|
const (
|
||||||
gVersion = "0.37a"
|
gVersion = "0.38"
|
||||||
|
|
||||||
// TODO : Get from $jail_zpool/defaults.json
|
// TODO : Get from $jail_zpool/defaults.json
|
||||||
MIN_DYN_DEVFS_RULESET = 1000
|
MIN_DYN_DEVFS_RULESET = 1000
|
||||||
@ -66,8 +66,8 @@ var (
|
|||||||
gUpgradeRelease string
|
gUpgradeRelease string
|
||||||
|
|
||||||
// For a based jail, these are directories binded to basejail
|
// For a based jail, these are directories binded to basejail
|
||||||
gBaseDirs = []string{"bin", "boot", "lib", "libexec", "rescue", "sbin", "usr", "usr/bin",
|
gBaseDirs = []string{"bin", "boot", "lib", "libexec", "rescue", "sbin", "usr/bin", "usr/include",
|
||||||
"usr/include", "usr/lib", "usr/lib32", "usr/libdata", "usr/libexec", "usr/sbin", "usr/share"}
|
"usr/lib", "usr/lib32", "usr/libdata", "usr/libexec", "usr/sbin", "usr/share"}
|
||||||
// These directories are to be created empty
|
// These directories are to be created empty
|
||||||
gEmptyDirs = []string{"dev", "media", "mnt", "net", "proc"}
|
gEmptyDirs = []string{"dev", "media", "mnt", "net", "proc"}
|
||||||
// Copy these from base template
|
// Copy these from base template
|
||||||
|
25
cmd/start.go
25
cmd/start.go
@ -899,7 +899,7 @@ func setupVnetInterfaceHostSide(jail *Jail) ([]string, error) {
|
|||||||
return epairs, nil
|
return epairs, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func setupVnetInterfaceJailSide(jail *Jail) error {
|
func setupVnetInterfaceJailSide(jail *Jail, hostepairs []string) error {
|
||||||
var jsmac []byte
|
var jsmac []byte
|
||||||
var err error
|
var err error
|
||||||
|
|
||||||
@ -919,7 +919,7 @@ func setupVnetInterfaceJailSide(jail *Jail) error {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Loop through configured interfaces
|
// Loop through configured interfaces
|
||||||
for _, nicCnf := range strings.Split(jail.Config.Interfaces, ",") {
|
for i, nicCnf := range strings.Split(jail.Config.Interfaces, ",") {
|
||||||
v := strings.Split(nicCnf, ":")
|
v := strings.Split(nicCnf, ":")
|
||||||
if len(v) != 2 {
|
if len(v) != 2 {
|
||||||
return fmt.Errorf("Invalid value for Interfaces: %s\n", nicCnf)
|
return fmt.Errorf("Invalid value for Interfaces: %s\n", nicCnf)
|
||||||
@ -930,6 +930,8 @@ func setupVnetInterfaceJailSide(jail *Jail) error {
|
|||||||
// inside jail final nic name
|
// inside jail final nic name
|
||||||
jnic := strings.Replace(v[0], "vnet", "epair", 1)
|
jnic := strings.Replace(v[0], "vnet", "epair", 1)
|
||||||
jnic = jnic + "b"
|
jnic = jnic + "b"
|
||||||
|
// host side associated jail nic name
|
||||||
|
jsepair := fmt.Sprintf("%sb", strings.TrimSuffix(hostepairs[i], "a"))
|
||||||
|
|
||||||
// Get jail side MAC
|
// Get jail side MAC
|
||||||
pname := fmt.Sprintf("Config.%s_mac", nic)
|
pname := fmt.Sprintf("Config.%s_mac", nic)
|
||||||
@ -948,7 +950,7 @@ func setupVnetInterfaceJailSide(jail *Jail) error {
|
|||||||
jsmac = val.Bytes()
|
jsmac = val.Bytes()
|
||||||
}
|
}
|
||||||
|
|
||||||
cmd := fmt.Sprintf("/sbin/ifconfig %s vnet %s", jnic, jail.InternalName)
|
cmd := fmt.Sprintf("/sbin/ifconfig %s vnet %s", jsepair, jail.InternalName)
|
||||||
_, err := executeCommand(cmd)
|
_, err := executeCommand(cmd)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("Error linking interface to jail: %v\n", err)
|
return fmt.Errorf("Error linking interface to jail: %v\n", err)
|
||||||
@ -960,14 +962,14 @@ func setupVnetInterfaceJailSide(jail *Jail) error {
|
|||||||
return fmt.Errorf("Error getting bridge %s mtu: %v\n", bridge, err)
|
return fmt.Errorf("Error getting bridge %s mtu: %v\n", bridge, err)
|
||||||
}
|
}
|
||||||
|
|
||||||
cmd = fmt.Sprintf("/usr/sbin/jexec %d ifconfig %s mtu %d", jail.JID, jnic, mtu)
|
cmd = fmt.Sprintf("/usr/sbin/jexec %d ifconfig %s mtu %d", jail.JID, jsepair, mtu)
|
||||||
_, err = executeCommand(cmd)
|
_, err = executeCommand(cmd)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("Error setting mtu: %v\n", err)
|
return fmt.Errorf("Error setting mtu: %v\n", err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// rename epairXXb to epair0b (or opair1b, ...)
|
// rename epairXXb to epair0b (or opair1b, ...)
|
||||||
cmd = fmt.Sprintf("/usr/sbin/setfib %s jexec %d ifconfig %s name %s", jail.Config.Exec_fib, jail.JID, jnic, jnic)
|
cmd = fmt.Sprintf("/usr/sbin/setfib %s jexec %d ifconfig %s name %s", jail.Config.Exec_fib, jail.JID, jsepair, jnic)
|
||||||
_, err = executeCommand(cmd)
|
_, err = executeCommand(cmd)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("Error linking interface to jail: %v\n", err)
|
return fmt.Errorf("Error linking interface to jail: %v\n", err)
|
||||||
@ -1070,9 +1072,9 @@ func StartJailsAtBoot() {
|
|||||||
var curThNb int
|
var curThNb int
|
||||||
var curPri int
|
var curPri int
|
||||||
|
|
||||||
// Get boot enabled jails
|
// Get boot enabled non-template jails
|
||||||
for _, j := range gJails {
|
for _, j := range gJails {
|
||||||
if j.Config.Boot > 0 {
|
if j.Config.Boot > 0 && !strings.EqualFold(j.Config.Jailtype, "template") {
|
||||||
startList = append(startList, j)
|
startList = append(startList, j)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@ -1166,7 +1168,7 @@ func StartJail(args []string) {
|
|||||||
|
|
||||||
for _, a := range args {
|
for _, a := range args {
|
||||||
// Check if jail exist and is distinctly named
|
// Check if jail exist and is distinctly named
|
||||||
cj, err = getJailFromArray(a, []string{"jail"}, gJails)
|
cj, err = getJailFromArray(a, []string{"basejail", "jail"}, gJails)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Printf("Error getting jail: %s\n", err)
|
fmt.Printf("Error getting jail: %s\n", err)
|
||||||
continue
|
continue
|
||||||
@ -1366,7 +1368,7 @@ func StartJail(args []string) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
// Synchronize jail config to disk
|
// Synchronize jail config to disk
|
||||||
writeConfigToDisk(cj, false)
|
cj.WriteConfigToDisk(false)
|
||||||
|
|
||||||
start_cmd := fmt.Sprintf("/usr/sbin/jail -f /var/run/jail.%s.conf -c", cj.InternalName)
|
start_cmd := fmt.Sprintf("/usr/sbin/jail -f /var/run/jail.%s.conf -c", cj.InternalName)
|
||||||
|
|
||||||
@ -1416,13 +1418,13 @@ func StartJail(args []string) {
|
|||||||
}
|
}
|
||||||
|
|
||||||
fmt.Printf(" > Setup VNet network:\n")
|
fmt.Printf(" > Setup VNet network:\n")
|
||||||
_, err = setupVnetInterfaceHostSide(cj);
|
hsepairs, err := setupVnetInterfaceHostSide(cj);
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Printf("Error setting VNet interface host side: %v\n", err)
|
fmt.Printf("Error setting VNet interface host side: %v\n", err)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
|
|
||||||
if err = setupVnetInterfaceJailSide(cj); err != nil {
|
if err = setupVnetInterfaceJailSide(cj, hsepairs); err != nil {
|
||||||
fmt.Printf("Error setting VNet interface jail side: %v\n", err)
|
fmt.Printf("Error setting VNet interface jail side: %v\n", err)
|
||||||
return
|
return
|
||||||
}
|
}
|
||||||
@ -1519,7 +1521,6 @@ func StartJail(args []string) {
|
|||||||
cj.Config.Last_started = curDate
|
cj.Config.Last_started = curDate
|
||||||
writeConfigToDisk(cj, false)
|
writeConfigToDisk(cj, false)
|
||||||
|
|
||||||
|
|
||||||
/*
|
/*
|
||||||
out, err := executeCommand(fmt.Sprintf("rctl jail:%s", cj.InternalName))
|
out, err := executeCommand(fmt.Sprintf("rctl jail:%s", cj.InternalName))
|
||||||
if err == nil && len(out) > 0 {
|
if err == nil && len(out) > 0 {
|
||||||
|
17
cmd/stop.go
17
cmd/stop.go
@ -123,7 +123,7 @@ func deleteDevfsRuleset(ruleset int) error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func umountJailFsFromHost(jail *Jail, mountpoint string) error {
|
func umountFsFromHost(mountpoint string) error {
|
||||||
cmd := "mount -p"
|
cmd := "mount -p"
|
||||||
out, err := executeCommand(cmd)
|
out, err := executeCommand(cmd)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -134,11 +134,11 @@ func umountJailFsFromHost(jail *Jail, mountpoint string) error {
|
|||||||
for _, l := range strings.Split(out, "\n") {
|
for _, l := range strings.Split(out, "\n") {
|
||||||
f := strings.Split(remSpPtrn.ReplaceAllString(l, " "), " ")
|
f := strings.Split(remSpPtrn.ReplaceAllString(l, " "), " ")
|
||||||
if len(f) > 2 {
|
if len(f) > 2 {
|
||||||
if strings.EqualFold(f[1], fmt.Sprintf("%s%s", jail.RootPath, mountpoint)) {
|
if strings.EqualFold(f[1], mountpoint) {
|
||||||
cmd = fmt.Sprintf("umount %s%s", jail.RootPath, mountpoint)
|
cmd = fmt.Sprintf("umount %s", mountpoint)
|
||||||
_, err := executeCommand(cmd)
|
_, err := executeCommand(cmd)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.New(fmt.Sprintf("Error umounting %s%s: %s", jail.RootPath, mountpoint, err.Error()))
|
return errors.New(fmt.Sprintf("Error umounting %s: %s", mountpoint, err.Error()))
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
@ -148,6 +148,10 @@ func umountJailFsFromHost(jail *Jail, mountpoint string) error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func umountJailFsFromHost(jail *Jail, mountpoint string) error {
|
||||||
|
return umountFsFromHost(fmt.Sprintf("%s%s", jail.RootPath, mountpoint))
|
||||||
|
}
|
||||||
|
|
||||||
// Internal usage only
|
// Internal usage only
|
||||||
func stopJail(jail *Jail) error {
|
func stopJail(jail *Jail) error {
|
||||||
cmd := "jail -q"
|
cmd := "jail -q"
|
||||||
@ -270,7 +274,7 @@ func StopJail(args []string) {
|
|||||||
|
|
||||||
for _, a := range args {
|
for _, a := range args {
|
||||||
// Check if jail exist and is distinctly named
|
// Check if jail exist and is distinctly named
|
||||||
cj, err = getJailFromArray(a, []string{"jail"}, gJails)
|
cj, err = getJailFromArray(a, []string{"basejail", "jail"}, gJails)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Printf("Error getting jail: %s\n", err)
|
fmt.Printf("Error getting jail: %s\n", err)
|
||||||
continue
|
continue
|
||||||
@ -404,7 +408,8 @@ func StopJail(args []string) {
|
|||||||
fmt.Printf(" > Umount mountpoints from %s\n", fstab)
|
fmt.Printf(" > Umount mountpoints from %s\n", fstab)
|
||||||
errs := 0
|
errs := 0
|
||||||
for _, m := range mounts {
|
for _, m := range mounts {
|
||||||
err = umountJailFsFromHost(cj, m.Mountpoint)
|
log.Debugf("Umounting %s\n", m.Mountpoint)
|
||||||
|
err = umountFsFromHost(m.Mountpoint)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Printf("ERROR: %s\n", err.Error())
|
fmt.Printf("ERROR: %s\n", err.Error())
|
||||||
errs += 1
|
errs += 1
|
||||||
|
@ -21,7 +21,7 @@ func updateJail(jail *Jail) error {
|
|||||||
defer cfgFile.Close()
|
defer cfgFile.Close()
|
||||||
defer os.Remove(cfgFile.Name())
|
defer os.Remove(cfgFile.Name())
|
||||||
|
|
||||||
// Folder containing update/uipgrade temporary files. Common so we save bandwith when upgrading multiple jails
|
// Folder containing update/upgrade temporary files. Common so we save bandwith when upgrading multiple jails
|
||||||
// TODO: Variabilize /iocage/freebsd-update
|
// TODO: Variabilize /iocage/freebsd-update
|
||||||
_, err = os.Stat("/iocage/freebsd-update")
|
_, err = os.Stat("/iocage/freebsd-update")
|
||||||
if os.IsNotExist(err) {
|
if os.IsNotExist(err) {
|
||||||
@ -30,11 +30,15 @@ func updateJail(jail *Jail) error {
|
|||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
cmd := fmt.Sprintf("/usr/sbin/freebsd-update --not-running-from-cron -f %s -b %s --currently-running %s fetch install",
|
cmd := fmt.Sprintf("/usr/sbin/freebsd-update --not-running-from-cron -f %s -b %s --currently-running %s fetch",
|
||||||
cfgFile.Name(), jail.RootPath, jail.Config.Release)
|
cfgFile.Name(), jail.RootPath, jail.Config.Release)
|
||||||
|
err = executeCommandWithOutputToStdout(cmd)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
//fmt.Printf("DEBUG: Prepare to execute \"%s\"\n", cmd)
|
cmd = fmt.Sprintf("/usr/sbin/freebsd-update --not-running-from-cron -f %s -b %s --currently-running %s install",
|
||||||
|
cfgFile.Name(), jail.RootPath, jail.Config.Release)
|
||||||
err = executeCommandWithOutputToStdout(cmd)
|
err = executeCommandWithOutputToStdout(cmd)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return err
|
return err
|
||||||
|
17
cmd/utils.go
17
cmd/utils.go
@ -474,6 +474,8 @@ func executeCommandWithOutputToStdout(cmdline string) (error) {
|
|||||||
word = word + string(c)
|
word = word + string(c)
|
||||||
}
|
}
|
||||||
|
|
||||||
|
log.Debugf("executeCommandWithOutputToStdout: will execute \"%s\"\n", strings.Join(cmd, " "))
|
||||||
|
|
||||||
var execHandle *exec.Cmd
|
var execHandle *exec.Cmd
|
||||||
if len(cmd) > 1 {
|
if len(cmd) > 1 {
|
||||||
execHandle = exec.Command(cmd[0], cmd[1:]...)
|
execHandle = exec.Command(cmd[0], cmd[1:]...)
|
||||||
@ -1062,7 +1064,7 @@ func getJailFromArray(name string, jailtypes []string, jarray []Jail) (*Jail, er
|
|||||||
var jails []Jail
|
var jails []Jail
|
||||||
|
|
||||||
if (len(jailtypes) == 1 && len(jailtypes[0]) == 0) || len(jailtypes) == 0 {
|
if (len(jailtypes) == 1 && len(jailtypes[0]) == 0) || len(jailtypes) == 0 {
|
||||||
jailtypes = []string{"jail", "basetpl"}
|
jailtypes = []string{"basejail", "jail", "template"}
|
||||||
}
|
}
|
||||||
|
|
||||||
if strings.Contains(name, "/") {
|
if strings.Contains(name, "/") {
|
||||||
@ -1128,15 +1130,24 @@ func setJailConfigUpdated(jail *Jail) error {
|
|||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func getVersion(jail *Jail) (string, error) {
|
||||||
|
cvers, err := executeCommand(fmt.Sprintf("%s/bin/freebsd-version", jail.RootPath))
|
||||||
|
if err != nil {
|
||||||
|
fmt.Printf("ERROR: %s\n", err.Error())
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
return strings.TrimRight(cvers, "\n"), nil
|
||||||
|
}
|
||||||
|
|
||||||
func updateVersion(jail *Jail) error {
|
func updateVersion(jail *Jail) error {
|
||||||
cvers, err := executeCommandInJail(jail, "/bin/freebsd-version")
|
cvers, err := executeCommand(fmt.Sprintf("%s/bin/freebsd-version", jail.RootPath))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
fmt.Printf("ERROR: %s\n", err.Error())
|
fmt.Printf("ERROR: %s\n", err.Error())
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
cvers = strings.TrimRight(cvers, "\n")
|
cvers = strings.TrimRight(cvers, "\n")
|
||||||
jail.Config.Release = cvers
|
jail.Config.Release = cvers
|
||||||
writeConfigToDisk(jail, false)
|
jail.WriteConfigToDisk(false)
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
Loading…
x
Reference in New Issue
Block a user