18 Commits

Author SHA1 Message Date
yo
4edd0b7414 v0.39 : 2 bugfixes (see previous commits) 2023-11-09 19:17:57 +01:00
yo
b54ebfd915 BUGFIX: Correctly handle MAC adresses jail and host side 2023-11-09 19:17:39 +01:00
yo
69665fdcef BUGFIX: fstab comments made invalid format error 2023-11-09 19:16:53 +01:00
yo
7e1c213ff4 Exit(1) when more than 1 jail matching provided name 2023-09-02 10:07:55 +02:00
yo
26ceb1630a Version bump 2023-08-26 19:36:36 +02:00
yo
87e9ae894a Fix no-op when set property of a jail with fullname (datastore/jail) 2023-08-26 19:32:34 +02:00
yo
ed5f8f0b1c v0.38a: Block update to basejail, and redirect to template 2023-08-06 18:49:23 +02:00
yo
c55262690a README update 2023-08-06 17:06:41 +02:00
yo
c5aa547e5d README update with basejail 2023-08-06 15:12:53 +02:00
yo
cdcb466417 README update with basejail 2023-08-06 14:54:57 +02:00
yo
bb3136c9ef v0.38: Handle basejail 2023-08-06 14:51:41 +02:00
yo
9208102c84 BUGFIX removed usr from gBaseDirs as it should not be mounted from basejail 2023-08-06 14:51:05 +02:00
yo
fce64b2939 Handle basejails 2023-08-06 14:50:33 +02:00
yo
44b877eae1 updateVersion now can be used on stopped jail 2023-08-06 14:50:32 +02:00
yo
c2277ce10c Display currently running version when listing jails 2023-08-06 14:50:32 +02:00
yo
549d517cf9 BUGFIX setupVnetInterfaceJailSide 2023-08-06 14:50:32 +02:00
yo
14984f417c BUGFIX umounting jail fstab, add umountFsFromHost 2023-08-06 14:50:32 +02:00
yo
346fd52a8e BUGFIX: gocage update was not installing 2023-08-06 13:47:15 +02:00
10 changed files with 162 additions and 94 deletions

View File

@ -8,11 +8,11 @@ Gocage can handle multiple datastores, so you can have jails on HDD storage and
From v0.33b, due to multi ZFS pool support, gocage is no longer 100% compatible with iocage. From v0.33b, due to multi ZFS pool support, gocage is no longer 100% compatible with iocage.
Zfs datasets now should be specified with the ZFS pool. e.g. : Zfs datasets now should be specified with the ZFS pool. e.g. :
<code> <pre><code>
Config.Jail_zfs = 1 Config.Jail_zfs = 1
Config.Jail_zfs_dataset = myzfspool/poudriere Config.Jail_zfs_dataset = myzfspool/poudriere
Config.Jail_zfs_mountpoint = none Config.Jail_zfs_mountpoint = none
</code> </code></pre>
Create jails Create jails
------------ ------------
@ -22,6 +22,15 @@ gocage create jail1 -r 13.2-RELEASE
gocage set Config.Ip4_addr="vnet0|192.168.1.91/24" Config.Vnet=1 jail1 gocage set Config.Ip4_addr="vnet0|192.168.1.91/24" Config.Vnet=1 jail1
</code></pre> </code></pre>
Create basejail (jail based on a template, system will be nullfs read-only mounted from the template):
<pre><code>
# First create basetpl from 13.2-RELEASE, set it as a template
gocage create -r 13.2-RELEASE basetpl
gocage set Config.Jailtype="template" basetpl
# Then create basejail1 based on basetpl
gocage create -b basetpl basejail1
</code></pre>
List jails List jails
---------- ----------

View File

@ -12,7 +12,7 @@ import (
func ShellJail(args []string) error { func ShellJail(args []string) error {
// We cant shell more than one jail bc we replace gocage execution with jexec, so there wont be no return to gocage // We cant shell more than one jail bc we replace gocage execution with jexec, so there wont be no return to gocage
if len(args) > 0 { if len(args) > 0 {
cj, err := getJailFromArray(args[0], []string{"jail"}, gJails) cj, err := getJailFromArray(args[0], []string{"basejail", "jail"}, gJails)
if err != nil { if err != nil {
fmt.Printf("Error getting jail %s: %v\n", args[0], err) fmt.Printf("Error getting jail %s: %v\n", args[0], err)
return err return err

View File

@ -5,6 +5,7 @@ import (
"fmt" "fmt"
//"log" //"log"
"time" "time"
"errors"
"strings" "strings"
cp "github.com/otiai10/copy" cp "github.com/otiai10/copy"
log "github.com/sirupsen/logrus" log "github.com/sirupsen/logrus"
@ -85,15 +86,24 @@ func CreateJail(args []string) {
fmt.Printf(" > Create base read-only directories\n") fmt.Printf(" > Create base read-only directories\n")
dstRootDir := fmt.Sprintf("%s/jails/%s/root", ds.Mountpoint, jname) dstRootDir := fmt.Sprintf("%s/jails/%s/root", ds.Mountpoint, jname)
for _, d := range append(gBaseDirs, gEmptyDirs...) { for _, d := range append(gBaseDirs, gEmptyDirs...) {
srcPerm, err := getPermissions(fmt.Sprintf("%s/%s", bj.RootPath, d)) dstPath := dstRootDir
if err != nil { srcPath := bj.RootPath
fmt.Printf("ERROR getting permissions of %s/%s: %s\n", bj.RootPath, d, err.Error()) for _, cd := range strings.Split(d, "/") {
return srcPath = fmt.Sprintf("%s/%s", srcPath, cd)
} dstPath = fmt.Sprintf("%s/%s", dstPath, cd)
err = os.Mkdir(fmt.Sprintf("%s/%s", dstRootDir, d), srcPerm.Mode().Perm()) _, err := os.Stat(dstPath)
if err != nil { if errors.Is(err, os.ErrNotExist) {
fmt.Printf("ERROR creating directory %s/%s: %s\n", dstRootDir, d, err.Error()) srcPerm, err := getPermissions(srcPath)
return if err != nil {
fmt.Printf("ERROR getting permissions of %s: %s\n", srcPath, err.Error())
return
}
err = os.Mkdir(dstPath, srcPerm.Mode().Perm())
if err != nil {
fmt.Printf("ERROR creating directory %s: %s\n", dstPath, err.Error())
return
}
}
} }
} }
@ -154,6 +164,11 @@ func CreateJail(args []string) {
return return
} }
defer fstabHandle.Close() defer fstabHandle.Close()
for _, d := range gBaseDirs {
fmt.Fprintf(fstabHandle, "%s\t%s\tnullfs\tro\t0\t0\n", fmt.Sprintf("%s/%s", bj.RootPath, d), fmt.Sprintf("%s/%s", dstRootDir, d))
}
fmt.Printf(" > Jail created!\n") fmt.Printf(" > Jail created!\n")
} else { } else {
/************************************************************************** /**************************************************************************
@ -252,6 +267,7 @@ func CreateJail(args []string) {
j.Config.Release = gCreateArgs.Release j.Config.Release = gCreateArgs.Release
j.Config.Host_hostname = jname j.Config.Host_hostname = jname
j.Config.Host_hostuuid = jname j.Config.Host_hostuuid = jname
j.Config.Jailtype = "jail"
j.WriteConfigToDisk(false) j.WriteConfigToDisk(false)
@ -265,6 +281,5 @@ func CreateJail(args []string) {
defer fstabHandle.Close() defer fstabHandle.Close()
fmt.Printf(" > Jail created!\n") fmt.Printf(" > Jail created!\n")
} }
// TODO : Set JailType
} }
} }

View File

@ -52,7 +52,7 @@ func ListJails(args []string, display bool) {
for _, ds := range gDatastores { for _, ds := range gDatastores {
listJailsFromDatastore(ds, args, display) listJailsFromDatastore(ds, args, display)
} }
// Only when displaying jails, we accept to process multiple same name jails // Only when displaying jails, we accept to process multiple same name jails
if false == display { if false == display {
for _, j := range gJails { for _, j := range gJails {
@ -68,11 +68,11 @@ func ListJails(args []string, display bool) {
break break
} }
} }
if true == skip { if true == skip {
continue continue
} }
// Initialize if not found in nameChecked // Initialize if not found in nameChecked
if false == found { if false == found {
curCheck = &uniqueJailName{jail: j.Name, curCheck = &uniqueJailName{jail: j.Name,
@ -81,11 +81,11 @@ func ListJails(args []string, display bool) {
} else { } else {
found = false found = false
} }
if countOfJailsWithThisName(j.Name) > 1 { if countOfJailsWithThisName(j.Name) > 1 {
//fmt.Printf("DEBUG: Jail %s exist multiple times, now checking if specified with full name\n", j.Name) //fmt.Printf("DEBUG: Jail %s exist multiple times, now checking if specified with full name\n", j.Name)
curCheck.unique = false curCheck.unique = false
for _, a := range args { for _, a := range args {
//fmt.Printf("DEBUG: comparing %s/%s with %s\n", j.Datastore, j.Name, a) //fmt.Printf("DEBUG: comparing %s/%s with %s\n", j.Datastore, j.Name, a)
if strings.EqualFold(a, fmt.Sprintf("%s/%s", j.Datastore, j.Name)) { if strings.EqualFold(a, fmt.Sprintf("%s/%s", j.Datastore, j.Name)) {
@ -96,7 +96,7 @@ func ListJails(args []string, display bool) {
} }
nameChecked = append(nameChecked, curCheck) nameChecked = append(nameChecked, curCheck)
} }
// Now check // Now check
for _, a := range args { for _, a := range args {
for _, n := range nameChecked { for _, n := range nameChecked {
@ -107,9 +107,9 @@ func ListJails(args []string, display bool) {
} }
} }
} }
fields := strings.Split(gDisplayJColumns, ",") fields := strings.Split(gDisplayJColumns, ",")
// This is the structure we will filter, then display // This is the structure we will filter, then display
var jails []Jail var jails []Jail
@ -275,6 +275,13 @@ func listJailsFromDirectory(dir string, dsname string) ([]Jail, error) {
// FIXME ??? Shouldn't be ioc-$Name ? // FIXME ??? Shouldn't be ioc-$Name ?
j.InternalName = rj.Name j.InternalName = rj.Name
j.Devfs_ruleset = rj.Devfs_ruleset j.Devfs_ruleset = rj.Devfs_ruleset
// Update release
r, err := getVersion(&j)
if err != nil {
fmt.Printf("ERROR getting jail %s version: %s\n", j.Name, err.Error())
} else {
j.Config.Release = r
}
break break
} }
} }

View File

@ -1,8 +1,9 @@
package cmd package cmd
import ( import (
"errors" "os"
"fmt" "fmt"
"errors"
"reflect" "reflect"
"strconv" "strconv"
"strings" "strings"
@ -20,7 +21,7 @@ func GetJailProperties(args []string) {
jail, err = getJailFromArray(a, []string{""}, gJails) jail, err = getJailFromArray(a, []string{""}, gJails)
if err != nil { if err != nil {
fmt.Printf("Error: %s\n", err.Error()) fmt.Printf("Error: %s\n", err.Error())
return os.Exit(1)
} }
} else { } else {
props = append(props, a) props = append(props, a)
@ -105,20 +106,20 @@ func SetJailProperties(args []string) {
return return
} }
// Get jail by index to modify it cj, err := getJailFromArray(jail.Name, []string{""}, gJails)
for i, _ := range gJails { if err != nil {
if gJails[i].Name == jail.Name { fmt.Printf("Error getting jail %s: %v\n", jail.Name, err)
for _, p := range props { return
err := setStructFieldValue(&gJails[i], p.name, p.value) }
if err != nil {
fmt.Printf("Error: %s\n", err.Error()) for _, p := range props {
return err := setStructFieldValue(cj, p.name, p.value)
} else { if err != nil {
fmt.Printf("%s: %s set to %s\n", gJails[i].Name, p.name, p.value) fmt.Printf("Error: %s\n", err.Error())
gJails[i].ConfigUpdated = true return
} } else {
} fmt.Printf("%s: %s set to %s\n", cj.Name, p.name, p.value)
writeConfigToDisk(&gJails[i], false)
} }
} }
cj.WriteConfigToDisk(false)
} }

View File

@ -14,7 +14,7 @@ import (
) )
const ( const (
gVersion = "0.37a" gVersion = "0.39"
// TODO : Get from $jail_zpool/defaults.json // TODO : Get from $jail_zpool/defaults.json
MIN_DYN_DEVFS_RULESET = 1000 MIN_DYN_DEVFS_RULESET = 1000
@ -66,8 +66,8 @@ var (
gUpgradeRelease string gUpgradeRelease string
// For a based jail, these are directories binded to basejail // For a based jail, these are directories binded to basejail
gBaseDirs = []string{"bin", "boot", "lib", "libexec", "rescue", "sbin", "usr", "usr/bin", gBaseDirs = []string{"bin", "boot", "lib", "libexec", "rescue", "sbin", "usr/bin", "usr/include",
"usr/include", "usr/lib", "usr/lib32", "usr/libdata", "usr/libexec", "usr/sbin", "usr/share"} "usr/lib", "usr/lib32", "usr/libdata", "usr/libexec", "usr/sbin", "usr/share"}
// These directories are to be created empty // These directories are to be created empty
gEmptyDirs = []string{"dev", "media", "mnt", "net", "proc"} gEmptyDirs = []string{"dev", "media", "mnt", "net", "proc"}
// Copy these from base template // Copy these from base template

View File

@ -840,7 +840,7 @@ func setupVnetInterfaceHostSide(jail *Jail) ([]string, error) {
bridge := v[1] bridge := v[1]
// Get host side MAC // Get host side MAC
pname := fmt.Sprintf("Config.%s_mac", nic) pname := fmt.Sprintf("Config.%s_mac", strings.Title(nic))
var val *reflect.Value var val *reflect.Value
val, pname, err = getStructFieldValue(jail, pname) val, pname, err = getStructFieldValue(jail, pname)
if err != nil { if err != nil {
@ -853,7 +853,10 @@ func setupVnetInterfaceHostSide(jail *Jail) ([]string, error) {
return []string{}, err return []string{}, err
} }
} else { } else {
hsmac = val.Bytes() hsmac, err = hex.DecodeString(strings.Split(val.String(), " ")[0])
if err != nil {
return []string{}, fmt.Errorf("Error converting %s to hex\n", strings.Split(val.String(), " ")[0])
}
} }
// Get bridge MTU // Get bridge MTU
@ -899,7 +902,7 @@ func setupVnetInterfaceHostSide(jail *Jail) ([]string, error) {
return epairs, nil return epairs, nil
} }
func setupVnetInterfaceJailSide(jail *Jail) error { func setupVnetInterfaceJailSide(jail *Jail, hostepairs []string) error {
var jsmac []byte var jsmac []byte
var err error var err error
@ -919,7 +922,7 @@ func setupVnetInterfaceJailSide(jail *Jail) error {
} }
// Loop through configured interfaces // Loop through configured interfaces
for _, nicCnf := range strings.Split(jail.Config.Interfaces, ",") { for i, nicCnf := range strings.Split(jail.Config.Interfaces, ",") {
v := strings.Split(nicCnf, ":") v := strings.Split(nicCnf, ":")
if len(v) != 2 { if len(v) != 2 {
return fmt.Errorf("Invalid value for Interfaces: %s\n", nicCnf) return fmt.Errorf("Invalid value for Interfaces: %s\n", nicCnf)
@ -930,9 +933,11 @@ func setupVnetInterfaceJailSide(jail *Jail) error {
// inside jail final nic name // inside jail final nic name
jnic := strings.Replace(v[0], "vnet", "epair", 1) jnic := strings.Replace(v[0], "vnet", "epair", 1)
jnic = jnic + "b" jnic = jnic + "b"
// host side associated jail nic name
jsepair := fmt.Sprintf("%sb", strings.TrimSuffix(hostepairs[i], "a"))
// Get jail side MAC // Get jail side MAC
pname := fmt.Sprintf("Config.%s_mac", nic) pname := fmt.Sprintf("Config.%s_mac", strings.Title(nic))
var val *reflect.Value var val *reflect.Value
val, pname, err = getStructFieldValue(jail, pname) val, pname, err = getStructFieldValue(jail, pname)
if err != nil { if err != nil {
@ -945,10 +950,14 @@ func setupVnetInterfaceJailSide(jail *Jail) error {
return err return err
} }
} else { } else {
jsmac = val.Bytes() jsmac, err = hex.DecodeString(strings.Split(val.String(), " ")[1])
if err != nil {
return fmt.Errorf("Error converting %s to hex\n", strings.Split(val.String(), " ")[1])
}
} }
cmd := fmt.Sprintf("/sbin/ifconfig %s vnet %s", jnic, jail.InternalName) cmd := fmt.Sprintf("/sbin/ifconfig %s vnet %s", jsepair, jail.InternalName)
_, err := executeCommand(cmd) _, err := executeCommand(cmd)
if err != nil { if err != nil {
return fmt.Errorf("Error linking interface to jail: %v\n", err) return fmt.Errorf("Error linking interface to jail: %v\n", err)
@ -960,14 +969,14 @@ func setupVnetInterfaceJailSide(jail *Jail) error {
return fmt.Errorf("Error getting bridge %s mtu: %v\n", bridge, err) return fmt.Errorf("Error getting bridge %s mtu: %v\n", bridge, err)
} }
cmd = fmt.Sprintf("/usr/sbin/jexec %d ifconfig %s mtu %d", jail.JID, jnic, mtu) cmd = fmt.Sprintf("/usr/sbin/jexec %d ifconfig %s mtu %d", jail.JID, jsepair, mtu)
_, err = executeCommand(cmd) _, err = executeCommand(cmd)
if err != nil { if err != nil {
return fmt.Errorf("Error setting mtu: %v\n", err) return fmt.Errorf("Error setting mtu: %v\n", err)
} }
// rename epairXXb to epair0b (or opair1b, ...) // rename epairXXb to epair0b (or opair1b, ...)
cmd = fmt.Sprintf("/usr/sbin/setfib %s jexec %d ifconfig %s name %s", jail.Config.Exec_fib, jail.JID, jnic, jnic) cmd = fmt.Sprintf("/usr/sbin/setfib %s jexec %d ifconfig %s name %s", jail.Config.Exec_fib, jail.JID, jsepair, jnic)
_, err = executeCommand(cmd) _, err = executeCommand(cmd)
if err != nil { if err != nil {
return fmt.Errorf("Error linking interface to jail: %v\n", err) return fmt.Errorf("Error linking interface to jail: %v\n", err)
@ -1070,9 +1079,9 @@ func StartJailsAtBoot() {
var curThNb int var curThNb int
var curPri int var curPri int
// Get boot enabled jails // Get boot enabled non-template jails
for _, j := range gJails { for _, j := range gJails {
if j.Config.Boot > 0 { if j.Config.Boot > 0 && !strings.EqualFold(j.Config.Jailtype, "template") {
startList = append(startList, j) startList = append(startList, j)
} }
} }
@ -1166,7 +1175,7 @@ func StartJail(args []string) {
for _, a := range args { for _, a := range args {
// Check if jail exist and is distinctly named // Check if jail exist and is distinctly named
cj, err = getJailFromArray(a, []string{"jail"}, gJails) cj, err = getJailFromArray(a, []string{"basejail", "jail"}, gJails)
if err != nil { if err != nil {
fmt.Printf("Error getting jail: %s\n", err) fmt.Printf("Error getting jail: %s\n", err)
continue continue
@ -1178,7 +1187,7 @@ func StartJail(args []string) {
} }
fmt.Printf("> Starting jail %s\n", cj.Name) fmt.Printf("> Starting jail %s\n", cj.Name)
// Set InternalName as it is used by some of these // Set InternalName as it is used by some of these
cj.InternalName = fmt.Sprintf("ioc-%s", cj.Name) cj.InternalName = fmt.Sprintf("ioc-%s", cj.Name)
@ -1340,34 +1349,34 @@ func StartJail(args []string) {
cj.Config.Defaultrouter = ip4[0] cj.Config.Defaultrouter = ip4[0]
} }
} }
// See https://github.com/iocage/iocage/blob/e94863d4c54f02523fb09e62e48be7db9ac92eda/iocage_lib/ioc_start.py:401 // See https://github.com/iocage/iocage/blob/e94863d4c54f02523fb09e62e48be7db9ac92eda/iocage_lib/ioc_start.py:401
if cj.Config.Vnet == 0 { if cj.Config.Vnet == 0 {
// Not supported // Not supported
fmt.Printf("Only VNet jails supported\n") fmt.Printf("Only VNet jails supported\n")
return return
} }
var net []string var net []string
if false == strings.EqualFold(cj.Config.Vnet_interfaces, "none") { if false == strings.EqualFold(cj.Config.Vnet_interfaces, "none") {
net = append(net, strings.Split(cj.Config.Vnet_interfaces, " ")...) net = append(net, strings.Split(cj.Config.Vnet_interfaces, " ")...)
} }
err, dynrs := buildDevfsRuleSet(cj, &gMdevfs) err, dynrs := buildDevfsRuleSet(cj, &gMdevfs)
if err != nil { if err != nil {
fmt.Printf("%s\n", err.Error()) fmt.Printf("%s\n", err.Error())
return return
} }
err = buildJailParameters(cj, dynrs) err = buildJailParameters(cj, dynrs)
if err != nil { if err != nil {
fmt.Printf("%s\n", err.Error()) fmt.Printf("%s\n", err.Error())
return return
} }
// Synchronize jail config to disk // Synchronize jail config to disk
writeConfigToDisk(cj, false) cj.WriteConfigToDisk(false)
start_cmd := fmt.Sprintf("/usr/sbin/jail -f /var/run/jail.%s.conf -c", cj.InternalName) start_cmd := fmt.Sprintf("/usr/sbin/jail -f /var/run/jail.%s.conf -c", cj.InternalName)
//TODO: handle start_env & prestart_env, could be used by iocage plugins //TODO: handle start_env & prestart_env, could be used by iocage plugins
@ -1377,17 +1386,17 @@ func StartJail(args []string) {
fmt.Printf("Aborting jail start\n") fmt.Printf("Aborting jail start\n")
return return
} }
fmt.Printf(" > Start jail:\n") fmt.Printf(" > Start jail:\n")
_, err = executeCommand(start_cmd) _, err = executeCommand(start_cmd)
if err != nil { if err != nil {
fmt.Printf("Error starting jail %s: %v\n", cj.Name, err) fmt.Printf("Error starting jail %s: %v\n", cj.Name, err)
return return
} }
fmt.Printf(" > Start jail: OK\n") fmt.Printf(" > Start jail: OK\n")
fmt.Printf(" > With devfs ruleset %d\n", dynrs) fmt.Printf(" > With devfs ruleset %d\n", dynrs)
// Update running state, JID and Devfs_ruleset // Update running state, JID and Devfs_ruleset
cj.Running = true cj.Running = true
cj.Devfs_ruleset = dynrs cj.Devfs_ruleset = dynrs
@ -1401,13 +1410,13 @@ func StartJail(args []string) {
break break
} }
} }
hostInt, err := gJailHost.GetInterfaces() hostInt, err := gJailHost.GetInterfaces()
if err != nil { if err != nil {
fmt.Printf("Error listing jail host interfaces: %v\n", err) fmt.Printf("Error listing jail host interfaces: %v\n", err)
return return
} }
if false == strings.EqualFold(cj.Config.Vnet_default_interface, "auto") && if false == strings.EqualFold(cj.Config.Vnet_default_interface, "auto") &&
false == strings.EqualFold(cj.Config.Vnet_default_interface, "none") && false == strings.EqualFold(cj.Config.Vnet_default_interface, "none") &&
false == isStringInArray(hostInt, cj.Config.Vnet_default_interface) { false == isStringInArray(hostInt, cj.Config.Vnet_default_interface) {
@ -1416,13 +1425,13 @@ func StartJail(args []string) {
} }
fmt.Printf(" > Setup VNet network:\n") fmt.Printf(" > Setup VNet network:\n")
_, err = setupVnetInterfaceHostSide(cj); hsepairs, err := setupVnetInterfaceHostSide(cj);
if err != nil { if err != nil {
fmt.Printf("Error setting VNet interface host side: %v\n", err) fmt.Printf("Error setting VNet interface host side: %v\n", err)
return return
} }
if err = setupVnetInterfaceJailSide(cj); err != nil { if err = setupVnetInterfaceJailSide(cj, hsepairs); err != nil {
fmt.Printf("Error setting VNet interface jail side: %v\n", err) fmt.Printf("Error setting VNet interface jail side: %v\n", err)
return return
} }
@ -1439,7 +1448,7 @@ func StartJail(args []string) {
fmt.Printf(" > Setup default ipv4 gateway: OK\n") fmt.Printf(" > Setup default ipv4 gateway: OK\n")
} }
} }
if cj.Config.Ip6_addr != "none" { if cj.Config.Ip6_addr != "none" {
fmt.Printf(" > Setup default ipv6 gateway:\n") fmt.Printf(" > Setup default ipv6 gateway:\n")
cmd := fmt.Sprintf("/usr/sbin/setfib %s /usr/sbin/jexec %d route add -6 default %s", cj.Config.Exec_fib, cj.JID, cj.Config.Defaultrouter6) cmd := fmt.Sprintf("/usr/sbin/setfib %s /usr/sbin/jexec %d route add -6 default %s", cj.Config.Exec_fib, cj.JID, cj.Config.Defaultrouter6)
@ -1450,7 +1459,7 @@ func StartJail(args []string) {
fmt.Printf(" > Setup default ipv6 gateway: OK\n") fmt.Printf(" > Setup default ipv6 gateway: OK\n")
} }
} }
if cj.Config.Jail_zfs > 0 { if cj.Config.Jail_zfs > 0 {
fmt.Printf(" > Jail ZFS datasets:\n") fmt.Printf(" > Jail ZFS datasets:\n")
err = jailZfsDatasets(cj) err = jailZfsDatasets(cj)
@ -1465,14 +1474,14 @@ func StartJail(args []string) {
if err != nil { if err != nil {
fmt.Printf("%s\n", err) fmt.Printf("%s\n", err)
} }
if cj.Config.Host_time > 0 { if cj.Config.Host_time > 0 {
err = copyLocalTime(cj) err = copyLocalTime(cj)
if err != nil { if err != nil {
fmt.Printf("%s\n", err) fmt.Printf("%s\n", err)
} }
} }
// Start services // Start services
if len(cj.Config.Exec_start) > 0 { if len(cj.Config.Exec_start) > 0 {
fmt.Printf(" > Start services:\n") fmt.Printf(" > Start services:\n")
@ -1484,7 +1493,7 @@ func StartJail(args []string) {
fmt.Printf(" > Start services: OK\n") fmt.Printf(" > Start services: OK\n")
} }
} }
if cj.Config.Rtsold > 0 || strings.EqualFold(cj.Config.Ip6_addr, "accept_rtadv") { if cj.Config.Rtsold > 0 || strings.EqualFold(cj.Config.Ip6_addr, "accept_rtadv") {
fmt.Printf(" > Start rtsold:\n") fmt.Printf(" > Start rtsold:\n")
cmd := fmt.Sprintf("/usr/sbin/setfib %s /usr/sbin/jexec %d service rtsold start", cj.Config.Exec_fib, cj.JID) cmd := fmt.Sprintf("/usr/sbin/setfib %s /usr/sbin/jexec %d service rtsold start", cj.Config.Exec_fib, cj.JID)
@ -1495,7 +1504,7 @@ func StartJail(args []string) {
fmt.Printf(" > Start rtsold: OK\n") fmt.Printf(" > Start rtsold: OK\n")
} }
} }
// TODO: Execute Exec_poststart // TODO: Execute Exec_poststart
if len(cj.Config.Exec_poststart) > 0 { if len(cj.Config.Exec_poststart) > 0 {
fmt.Printf(" > Execute post-start:\n") fmt.Printf(" > Execute post-start:\n")
@ -1507,19 +1516,18 @@ func StartJail(args []string) {
fmt.Printf(" > Execute post-start: OK\n") fmt.Printf(" > Execute post-start: OK\n")
} }
} }
// WIP 10/07/2022 : https://github.com/iocage/iocage/blob/master/iocage_lib/ioc_start.py#L891 // WIP 10/07/2022 : https://github.com/iocage/iocage/blob/master/iocage_lib/ioc_start.py#L891
// TODO: Handle dhcp // TODO: Handle dhcp
// TODO: Apply rctl // TODO: Apply rctl
// Update last_started // Update last_started
// 23/07/2023 : This is not working, when writing to disk the old value is used // 23/07/2023 : This is not working, when writing to disk the old value is used
dt := time.Now() dt := time.Now()
curDate := fmt.Sprintf("%s", dt.Format("2006-01-02 15:04:05")) curDate := fmt.Sprintf("%s", dt.Format("2006-01-02 15:04:05"))
cj.Config.Last_started = curDate cj.Config.Last_started = curDate
writeConfigToDisk(cj, false) writeConfigToDisk(cj, false)
/* /*
out, err := executeCommand(fmt.Sprintf("rctl jail:%s", cj.InternalName)) out, err := executeCommand(fmt.Sprintf("rctl jail:%s", cj.InternalName))
if err == nil && len(out) > 0 { if err == nil && len(out) > 0 {

View File

@ -123,7 +123,7 @@ func deleteDevfsRuleset(ruleset int) error {
return nil return nil
} }
func umountJailFsFromHost(jail *Jail, mountpoint string) error { func umountFsFromHost(mountpoint string) error {
cmd := "mount -p" cmd := "mount -p"
out, err := executeCommand(cmd) out, err := executeCommand(cmd)
if err != nil { if err != nil {
@ -134,11 +134,11 @@ func umountJailFsFromHost(jail *Jail, mountpoint string) error {
for _, l := range strings.Split(out, "\n") { for _, l := range strings.Split(out, "\n") {
f := strings.Split(remSpPtrn.ReplaceAllString(l, " "), " ") f := strings.Split(remSpPtrn.ReplaceAllString(l, " "), " ")
if len(f) > 2 { if len(f) > 2 {
if strings.EqualFold(f[1], fmt.Sprintf("%s%s", jail.RootPath, mountpoint)) { if strings.EqualFold(f[1], mountpoint) {
cmd = fmt.Sprintf("umount %s%s", jail.RootPath, mountpoint) cmd = fmt.Sprintf("umount %s", mountpoint)
_, err := executeCommand(cmd) _, err := executeCommand(cmd)
if err != nil { if err != nil {
return errors.New(fmt.Sprintf("Error umounting %s%s: %s", jail.RootPath, mountpoint, err.Error())) return errors.New(fmt.Sprintf("Error umounting %s: %s", mountpoint, err.Error()))
} }
return nil return nil
} }
@ -148,6 +148,10 @@ func umountJailFsFromHost(jail *Jail, mountpoint string) error {
return nil return nil
} }
func umountJailFsFromHost(jail *Jail, mountpoint string) error {
return umountFsFromHost(fmt.Sprintf("%s%s", jail.RootPath, mountpoint))
}
// Internal usage only // Internal usage only
func stopJail(jail *Jail) error { func stopJail(jail *Jail) error {
cmd := "jail -q" cmd := "jail -q"
@ -270,7 +274,7 @@ func StopJail(args []string) {
for _, a := range args { for _, a := range args {
// Check if jail exist and is distinctly named // Check if jail exist and is distinctly named
cj, err = getJailFromArray(a, []string{"jail"}, gJails) cj, err = getJailFromArray(a, []string{"basejail", "jail"}, gJails)
if err != nil { if err != nil {
fmt.Printf("Error getting jail: %s\n", err) fmt.Printf("Error getting jail: %s\n", err)
continue continue
@ -404,7 +408,8 @@ func StopJail(args []string) {
fmt.Printf(" > Umount mountpoints from %s\n", fstab) fmt.Printf(" > Umount mountpoints from %s\n", fstab)
errs := 0 errs := 0
for _, m := range mounts { for _, m := range mounts {
err = umountJailFsFromHost(cj, m.Mountpoint) log.Debugf("Umounting %s\n", m.Mountpoint)
err = umountFsFromHost(m.Mountpoint)
if err != nil { if err != nil {
fmt.Printf("ERROR: %s\n", err.Error()) fmt.Printf("ERROR: %s\n", err.Error())
errs += 1 errs += 1

View File

@ -5,6 +5,7 @@ import (
"fmt" "fmt"
//"log" //"log"
"time" "time"
"strings"
) )
@ -21,7 +22,7 @@ func updateJail(jail *Jail) error {
defer cfgFile.Close() defer cfgFile.Close()
defer os.Remove(cfgFile.Name()) defer os.Remove(cfgFile.Name())
// Folder containing update/uipgrade temporary files. Common so we save bandwith when upgrading multiple jails // Folder containing update/upgrade temporary files. Common so we save bandwith when upgrading multiple jails
// TODO: Variabilize /iocage/freebsd-update // TODO: Variabilize /iocage/freebsd-update
_, err = os.Stat("/iocage/freebsd-update") _, err = os.Stat("/iocage/freebsd-update")
if os.IsNotExist(err) { if os.IsNotExist(err) {
@ -30,11 +31,15 @@ func updateJail(jail *Jail) error {
} }
} }
cmd := fmt.Sprintf("/usr/sbin/freebsd-update --not-running-from-cron -f %s -b %s --currently-running %s fetch install", cmd := fmt.Sprintf("/usr/sbin/freebsd-update --not-running-from-cron -f %s -b %s --currently-running %s fetch",
cfgFile.Name(), jail.RootPath, jail.Config.Release) cfgFile.Name(), jail.RootPath, jail.Config.Release)
err = executeCommandWithOutputToStdout(cmd)
if err != nil {
return err
}
//fmt.Printf("DEBUG: Prepare to execute \"%s\"\n", cmd) cmd = fmt.Sprintf("/usr/sbin/freebsd-update --not-running-from-cron -f %s -b %s --currently-running %s install",
cfgFile.Name(), jail.RootPath, jail.Config.Release)
err = executeCommandWithOutputToStdout(cmd) err = executeCommandWithOutputToStdout(cmd)
if err != nil { if err != nil {
return err return err
@ -58,7 +63,13 @@ func UpdateJail(args []string) {
fmt.Printf("Error getting jail: %s\n", err) fmt.Printf("Error getting jail: %s\n", err)
continue continue
} }
// We cant update basejail as system is readonly
if strings.EqualFold(cj.Config.Jailtype, "basejail") {
fmt.Printf("%s is a basejail using %s system files. Please update %s!\n", cj.Name, cj.Config.Origin, cj.Config.Origin)
continue
}
fmt.Printf(" > Snapshot jail %s\n", cj.Name) fmt.Printf(" > Snapshot jail %s\n", cj.Name)
// Set snapshot name // Set snapshot name
dt := time.Now() dt := time.Now()

View File

@ -474,6 +474,8 @@ func executeCommandWithOutputToStdout(cmdline string) (error) {
word = word + string(c) word = word + string(c)
} }
log.Debugf("executeCommandWithOutputToStdout: will execute \"%s\"\n", strings.Join(cmd, " "))
var execHandle *exec.Cmd var execHandle *exec.Cmd
if len(cmd) > 1 { if len(cmd) > 1 {
execHandle = exec.Command(cmd[0], cmd[1:]...) execHandle = exec.Command(cmd[0], cmd[1:]...)
@ -915,7 +917,8 @@ func getFstab(path string) ([]Mount, error) {
scan := bufio.NewScanner(f) scan := bufio.NewScanner(f)
for scan.Scan() { for scan.Scan() {
res := strings.Fields(scan.Text()) res := strings.Fields(scan.Text())
if len(res) != 6 { // iocage create lines like that : "/iocage/releases/13.2-RELEASE/root/bin /iocage/jails/smtp-router-02/root/bin nullfs ro 0 0 # Added by iocage on 2023-10-10 17:20:51"
if (len(res) > 6 && !strings.EqualFold(res[6], "#")) || len(res) < 6 {
return mounts, fmt.Errorf("Incorrect format for fstab line %s", scan.Text()) return mounts, fmt.Errorf("Incorrect format for fstab line %s", scan.Text())
} }
freq, err := strconv.Atoi(res[4]) freq, err := strconv.Atoi(res[4])
@ -1062,7 +1065,7 @@ func getJailFromArray(name string, jailtypes []string, jarray []Jail) (*Jail, er
var jails []Jail var jails []Jail
if (len(jailtypes) == 1 && len(jailtypes[0]) == 0) || len(jailtypes) == 0 { if (len(jailtypes) == 1 && len(jailtypes[0]) == 0) || len(jailtypes) == 0 {
jailtypes = []string{"jail", "basetpl"} jailtypes = []string{"basejail", "jail", "template"}
} }
if strings.Contains(name, "/") { if strings.Contains(name, "/") {
@ -1128,16 +1131,25 @@ func setJailConfigUpdated(jail *Jail) error {
return nil return nil
} }
func getVersion(jail *Jail) (string, error) {
cvers, err := executeCommand(fmt.Sprintf("%s/bin/freebsd-version", jail.RootPath))
if err != nil {
fmt.Printf("ERROR: %s\n", err.Error())
return "", err
}
return strings.TrimRight(cvers, "\n"), nil
}
func updateVersion(jail *Jail) error { func updateVersion(jail *Jail) error {
cvers, err := executeCommandInJail(jail, "/bin/freebsd-version") cvers, err := executeCommand(fmt.Sprintf("%s/bin/freebsd-version", jail.RootPath))
if err != nil { if err != nil {
fmt.Printf("ERROR: %s\n", err.Error()) fmt.Printf("ERROR: %s\n", err.Error())
return err return err
} }
cvers = strings.TrimRight(cvers, "\n") cvers = strings.TrimRight(cvers, "\n")
jail.Config.Release = cvers jail.Config.Release = cvers
writeConfigToDisk(jail, false) jail.WriteConfigToDisk(false)
return nil return nil
} }