Compare commits
20 Commits
v0.37
...
4edd0b7414
Author | SHA1 | Date | |
---|---|---|---|
4edd0b7414 | |||
b54ebfd915 | |||
69665fdcef | |||
7e1c213ff4 | |||
26ceb1630a | |||
87e9ae894a | |||
ed5f8f0b1c | |||
c55262690a | |||
c5aa547e5d | |||
cdcb466417 | |||
bb3136c9ef | |||
9208102c84 | |||
fce64b2939 | |||
44b877eae1 | |||
c2277ce10c | |||
549d517cf9 | |||
14984f417c | |||
346fd52a8e | |||
684d97cc21 | |||
a3dd0a7aa2 |
13
README.md
13
README.md
@ -8,11 +8,11 @@ Gocage can handle multiple datastores, so you can have jails on HDD storage and
|
||||
|
||||
From v0.33b, due to multi ZFS pool support, gocage is no longer 100% compatible with iocage.
|
||||
Zfs datasets now should be specified with the ZFS pool. e.g. :
|
||||
<code>
|
||||
<pre><code>
|
||||
Config.Jail_zfs = 1
|
||||
Config.Jail_zfs_dataset = myzfspool/poudriere
|
||||
Config.Jail_zfs_mountpoint = none
|
||||
</code>
|
||||
</code></pre>
|
||||
|
||||
Create jails
|
||||
------------
|
||||
@ -22,6 +22,15 @@ gocage create jail1 -r 13.2-RELEASE
|
||||
gocage set Config.Ip4_addr="vnet0|192.168.1.91/24" Config.Vnet=1 jail1
|
||||
</code></pre>
|
||||
|
||||
Create basejail (jail based on a template, system will be nullfs read-only mounted from the template):
|
||||
<pre><code>
|
||||
# First create basetpl from 13.2-RELEASE, set it as a template
|
||||
gocage create -r 13.2-RELEASE basetpl
|
||||
gocage set Config.Jailtype="template" basetpl
|
||||
# Then create basejail1 based on basetpl
|
||||
gocage create -b basetpl basejail1
|
||||
</code></pre>
|
||||
|
||||
|
||||
List jails
|
||||
----------
|
||||
|
@ -12,7 +12,7 @@ import (
|
||||
func ShellJail(args []string) error {
|
||||
// We cant shell more than one jail bc we replace gocage execution with jexec, so there wont be no return to gocage
|
||||
if len(args) > 0 {
|
||||
cj, err := getJailFromArray(args[0], []string{"jail"}, gJails)
|
||||
cj, err := getJailFromArray(args[0], []string{"basejail", "jail"}, gJails)
|
||||
if err != nil {
|
||||
fmt.Printf("Error getting jail %s: %v\n", args[0], err)
|
||||
return err
|
||||
|
159
cmd/create.go
159
cmd/create.go
@ -5,7 +5,9 @@ import (
|
||||
"fmt"
|
||||
//"log"
|
||||
"time"
|
||||
"errors"
|
||||
"strings"
|
||||
cp "github.com/otiai10/copy"
|
||||
log "github.com/sirupsen/logrus"
|
||||
)
|
||||
|
||||
@ -46,38 +48,132 @@ func CreateJail(args []string) {
|
||||
} else {
|
||||
ds = &gDatastores[0]
|
||||
}
|
||||
|
||||
/*
|
||||
// Create and populate datasets
|
||||
err = zfsCreateDataset(fmt.Sprintf("%s/jails/%s", ds.ZFSDataset, jname), fmt.Sprintf("%s/jails/%s", ds.Mountpoint, jname), "lz4")
|
||||
if err != nil {
|
||||
fmt.Printf("ERROR: %s\n", err.Error())
|
||||
return
|
||||
}
|
||||
err = zfsCreateDataset(fmt.Sprintf("%s/jails/%s/root", ds.ZFSDataset, jname), fmt.Sprintf("%s/jails/%s/root", ds.Mountpoint, jname), "lz4")
|
||||
if err != nil {
|
||||
fmt.Printf("ERROR: %s\n", err.Error())
|
||||
return
|
||||
}
|
||||
*/
|
||||
|
||||
// Get base template if specified
|
||||
if len(gCreateArgs.BaseTemplate) > 0 {
|
||||
/**************************************************************************
|
||||
* Create based jail from a template
|
||||
*/
|
||||
log.Debugf("Jail will be created from a base template\n")
|
||||
/*bj, err := getJailFromArray(jname, []string{"template"}, gJails)
|
||||
bj, err := getJailFromArray(gCreateArgs.BaseTemplate, []string{"template"}, gJails)
|
||||
if err != nil {
|
||||
if strings.EqualFold(err.Error(), "Jail not found") {
|
||||
|
||||
fmt.Printf("Template not found\n")
|
||||
return
|
||||
} else {
|
||||
fmt.Printf("ERROR: %s\n", err.Error())
|
||||
return
|
||||
}
|
||||
} else {
|
||||
fmt.Printf("Jail exist: %s\n", jname)
|
||||
continue
|
||||
}*/
|
||||
}
|
||||
// Create jail datasets
|
||||
dstDset := fmt.Sprintf("%s/jails/%s", ds.ZFSDataset, jname)
|
||||
fmt.Printf(" > Initialize dataset %s\n", dstDset)
|
||||
err = zfsCreateDataset(dstDset, "", "")
|
||||
if err != nil {
|
||||
fmt.Printf("ERROR creating dataset %s: %s\n", dstDset, err.Error())
|
||||
return
|
||||
}
|
||||
// Create jail root datasets
|
||||
dstRootDset := fmt.Sprintf("%s/jails/%s/root", ds.ZFSDataset, jname)
|
||||
fmt.Printf(" > Initialize dataset %s\n", dstRootDset)
|
||||
err = zfsCreateDataset(dstRootDset, "", "")
|
||||
if err != nil {
|
||||
fmt.Printf("ERROR creating dataset %s: %s\n", dstRootDset, err.Error())
|
||||
return
|
||||
}
|
||||
|
||||
// Create needed directories with basejail permissions
|
||||
fmt.Printf(" > Create base read-only directories\n")
|
||||
dstRootDir := fmt.Sprintf("%s/jails/%s/root", ds.Mountpoint, jname)
|
||||
for _, d := range append(gBaseDirs, gEmptyDirs...) {
|
||||
dstPath := dstRootDir
|
||||
srcPath := bj.RootPath
|
||||
for _, cd := range strings.Split(d, "/") {
|
||||
srcPath = fmt.Sprintf("%s/%s", srcPath, cd)
|
||||
dstPath = fmt.Sprintf("%s/%s", dstPath, cd)
|
||||
_, err := os.Stat(dstPath)
|
||||
if errors.Is(err, os.ErrNotExist) {
|
||||
srcPerm, err := getPermissions(srcPath)
|
||||
if err != nil {
|
||||
fmt.Printf("ERROR getting permissions of %s: %s\n", srcPath, err.Error())
|
||||
return
|
||||
}
|
||||
err = os.Mkdir(dstPath, srcPerm.Mode().Perm())
|
||||
if err != nil {
|
||||
fmt.Printf("ERROR creating directory %s: %s\n", dstPath, err.Error())
|
||||
return
|
||||
}
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
// Copy these from basejail
|
||||
fmt.Printf(" > Create base writable directories\n")
|
||||
for _, d := range gCopyDirs {
|
||||
err := cp.Copy(fmt.Sprintf("%s/%s", bj.RootPath, d), fmt.Sprintf("%s/%s", dstRootDir, d))
|
||||
if err != nil {
|
||||
fmt.Printf("ERROR copying %s to %s: %s\n", fmt.Sprintf("%s/%s", bj.RootPath, d),
|
||||
fmt.Sprintf("%s/%s", dstRootDir, d), err.Error())
|
||||
return
|
||||
}
|
||||
}
|
||||
|
||||
///////////////////////////////////////////////////////////////////////
|
||||
// Copy defaults.json...
|
||||
jailConfPath := fmt.Sprintf("%s/jails/%s/config.json", ds.Mountpoint, jname)
|
||||
err = copyFile(fmt.Sprintf("%s/defaults.json", ds.Mountpoint),
|
||||
jailConfPath)
|
||||
if err != nil {
|
||||
fmt.Printf("ERROR creating config.json: %s\n", err.Error())
|
||||
return
|
||||
}
|
||||
///////////////////////////////////////////////////////////////////////
|
||||
// ... and update it
|
||||
jailConf, err := getJailConfig(jailConfPath)
|
||||
if err != nil {
|
||||
log.Println("ERROR reading jail config from %s", jailConfPath)
|
||||
}
|
||||
|
||||
// Build jail object from config
|
||||
jailRootPath := fmt.Sprintf("%s/jails/%s/%s", ds.Mountpoint, jname, "root")
|
||||
j := Jail{
|
||||
Name: jailConf.Host_hostuuid,
|
||||
Config: jailConf,
|
||||
ConfigPath: jailConfPath,
|
||||
Datastore: ds.Name,
|
||||
RootPath: jailRootPath,
|
||||
Running: false,
|
||||
}
|
||||
|
||||
// We need to store the basejail template. We could :
|
||||
// 1. Use "origin" ?
|
||||
// 2. Add a json item to config ("basejail_template" p.e.), but iocage would delete it once jail is started from iocage
|
||||
// 3. Add a gocage specific config ("config.gocage.json" p.e.)
|
||||
j.Config.Jailtype = "basejail"
|
||||
j.Config.Origin = bj.Name
|
||||
j.Config.Host_hostname = jname
|
||||
j.Config.Host_hostuuid = jname
|
||||
|
||||
j.WriteConfigToDisk(false)
|
||||
|
||||
///////////////////////////////////////////////////////////////////////
|
||||
// Create fstab
|
||||
fstabHandle, err := os.Create(fmt.Sprintf("%s/jails/%s/fstab", ds.Mountpoint, jname))
|
||||
if err != nil {
|
||||
fmt.Printf("ERROR creating fstab: %s", err.Error())
|
||||
return
|
||||
}
|
||||
defer fstabHandle.Close()
|
||||
|
||||
for _, d := range gBaseDirs {
|
||||
fmt.Fprintf(fstabHandle, "%s\t%s\tnullfs\tro\t0\t0\n", fmt.Sprintf("%s/%s", bj.RootPath, d), fmt.Sprintf("%s/%s", dstRootDir, d))
|
||||
}
|
||||
|
||||
fmt.Printf(" > Jail created!\n")
|
||||
} else {
|
||||
// Normal jail with its own freebsd base
|
||||
/**************************************************************************
|
||||
* Create normal jail with its own freebsd base
|
||||
*/
|
||||
log.Debugf("Creating jail with its own freebsd base\n")
|
||||
|
||||
// First check if we got release on the same datastore
|
||||
@ -86,10 +182,9 @@ func CreateJail(args []string) {
|
||||
fmt.Printf("ERROR: Release locally not available. Run \"gocage fetch\"\n")
|
||||
return
|
||||
}
|
||||
|
||||
|
||||
///////////////////////////////////////////////////////////////////////
|
||||
//
|
||||
// Create and populate jail filesystem
|
||||
// Create and populate jail filesystem from release
|
||||
dstDset := fmt.Sprintf("%s/jails/%s", ds.ZFSDataset, jname)
|
||||
fmt.Printf(" > Initialize dataset %s\n", dstDset)
|
||||
sNow := time.Now().Format("20060102150405")
|
||||
@ -142,10 +237,7 @@ func CreateJail(args []string) {
|
||||
return
|
||||
}
|
||||
|
||||
fmt.Printf("Jail filesystem successfuly initalized\n")
|
||||
|
||||
///////////////////////////////////////////////////////////////////////
|
||||
//
|
||||
// Copy defaults.json...
|
||||
jailConfPath := fmt.Sprintf("%s/jails/%s/config.json", ds.Mountpoint, jname)
|
||||
err = copyFile(fmt.Sprintf("%s/defaults.json", ds.Mountpoint),
|
||||
@ -155,15 +247,13 @@ func CreateJail(args []string) {
|
||||
return
|
||||
}
|
||||
///////////////////////////////////////////////////////////////////////
|
||||
//
|
||||
// ... and update it
|
||||
// Get conf from config.json
|
||||
jailConf, err := getJailConfig(jailConfPath)
|
||||
if err != nil {
|
||||
log.Println("ERROR reading jail config from %s", jailConfPath)
|
||||
}
|
||||
|
||||
// 2. Build jail object from config
|
||||
|
||||
// Build jail object from config
|
||||
jailRootPath := fmt.Sprintf("%s/jails/%s/%s", ds.Mountpoint, jname, "root")
|
||||
j := Jail{
|
||||
Name: jailConf.Host_hostuuid,
|
||||
@ -173,15 +263,15 @@ func CreateJail(args []string) {
|
||||
RootPath: jailRootPath,
|
||||
Running: false,
|
||||
}
|
||||
|
||||
|
||||
j.Config.Release = gCreateArgs.Release
|
||||
j.Config.Host_hostname = jname
|
||||
j.Config.Host_hostuuid = jname
|
||||
j.Config.Jailtype = "jail"
|
||||
|
||||
j.WriteConfigToDisk(false)
|
||||
|
||||
///////////////////////////////////////////////////////////////////////
|
||||
//
|
||||
// Create fstab
|
||||
fstabHandle, err := os.Create(fmt.Sprintf("%s/jails/%s/fstab", ds.Mountpoint, jname))
|
||||
if err != nil {
|
||||
@ -189,8 +279,7 @@ func CreateJail(args []string) {
|
||||
return
|
||||
}
|
||||
defer fstabHandle.Close()
|
||||
fmt.Printf(" > Jail created!\n")
|
||||
}
|
||||
|
||||
// TODO : Set JailType
|
||||
}
|
||||
}
|
||||
|
23
cmd/list.go
23
cmd/list.go
@ -52,7 +52,7 @@ func ListJails(args []string, display bool) {
|
||||
for _, ds := range gDatastores {
|
||||
listJailsFromDatastore(ds, args, display)
|
||||
}
|
||||
|
||||
|
||||
// Only when displaying jails, we accept to process multiple same name jails
|
||||
if false == display {
|
||||
for _, j := range gJails {
|
||||
@ -68,11 +68,11 @@ func ListJails(args []string, display bool) {
|
||||
break
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
if true == skip {
|
||||
continue
|
||||
}
|
||||
|
||||
|
||||
// Initialize if not found in nameChecked
|
||||
if false == found {
|
||||
curCheck = &uniqueJailName{jail: j.Name,
|
||||
@ -81,11 +81,11 @@ func ListJails(args []string, display bool) {
|
||||
} else {
|
||||
found = false
|
||||
}
|
||||
|
||||
|
||||
if countOfJailsWithThisName(j.Name) > 1 {
|
||||
//fmt.Printf("DEBUG: Jail %s exist multiple times, now checking if specified with full name\n", j.Name)
|
||||
curCheck.unique = false
|
||||
|
||||
|
||||
for _, a := range args {
|
||||
//fmt.Printf("DEBUG: comparing %s/%s with %s\n", j.Datastore, j.Name, a)
|
||||
if strings.EqualFold(a, fmt.Sprintf("%s/%s", j.Datastore, j.Name)) {
|
||||
@ -96,7 +96,7 @@ func ListJails(args []string, display bool) {
|
||||
}
|
||||
nameChecked = append(nameChecked, curCheck)
|
||||
}
|
||||
|
||||
|
||||
// Now check
|
||||
for _, a := range args {
|
||||
for _, n := range nameChecked {
|
||||
@ -107,9 +107,9 @@ func ListJails(args []string, display bool) {
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
fields := strings.Split(gDisplayJColumns, ",")
|
||||
|
||||
|
||||
// This is the structure we will filter, then display
|
||||
var jails []Jail
|
||||
|
||||
@ -275,6 +275,13 @@ func listJailsFromDirectory(dir string, dsname string) ([]Jail, error) {
|
||||
// FIXME ??? Shouldn't be ioc-$Name ?
|
||||
j.InternalName = rj.Name
|
||||
j.Devfs_ruleset = rj.Devfs_ruleset
|
||||
// Update release
|
||||
r, err := getVersion(&j)
|
||||
if err != nil {
|
||||
fmt.Printf("ERROR getting jail %s version: %s\n", j.Name, err.Error())
|
||||
} else {
|
||||
j.Config.Release = r
|
||||
}
|
||||
break
|
||||
}
|
||||
}
|
||||
|
@ -1,8 +1,9 @@
|
||||
package cmd
|
||||
|
||||
import (
|
||||
"errors"
|
||||
"os"
|
||||
"fmt"
|
||||
"errors"
|
||||
"reflect"
|
||||
"strconv"
|
||||
"strings"
|
||||
@ -20,7 +21,7 @@ func GetJailProperties(args []string) {
|
||||
jail, err = getJailFromArray(a, []string{""}, gJails)
|
||||
if err != nil {
|
||||
fmt.Printf("Error: %s\n", err.Error())
|
||||
return
|
||||
os.Exit(1)
|
||||
}
|
||||
} else {
|
||||
props = append(props, a)
|
||||
@ -105,20 +106,20 @@ func SetJailProperties(args []string) {
|
||||
return
|
||||
}
|
||||
|
||||
// Get jail by index to modify it
|
||||
for i, _ := range gJails {
|
||||
if gJails[i].Name == jail.Name {
|
||||
for _, p := range props {
|
||||
err := setStructFieldValue(&gJails[i], p.name, p.value)
|
||||
if err != nil {
|
||||
fmt.Printf("Error: %s\n", err.Error())
|
||||
return
|
||||
} else {
|
||||
fmt.Printf("%s: %s set to %s\n", gJails[i].Name, p.name, p.value)
|
||||
gJails[i].ConfigUpdated = true
|
||||
}
|
||||
}
|
||||
writeConfigToDisk(&gJails[i], false)
|
||||
cj, err := getJailFromArray(jail.Name, []string{""}, gJails)
|
||||
if err != nil {
|
||||
fmt.Printf("Error getting jail %s: %v\n", jail.Name, err)
|
||||
return
|
||||
}
|
||||
|
||||
for _, p := range props {
|
||||
err := setStructFieldValue(cj, p.name, p.value)
|
||||
if err != nil {
|
||||
fmt.Printf("Error: %s\n", err.Error())
|
||||
return
|
||||
} else {
|
||||
fmt.Printf("%s: %s set to %s\n", cj.Name, p.name, p.value)
|
||||
}
|
||||
}
|
||||
cj.WriteConfigToDisk(false)
|
||||
}
|
||||
|
10
cmd/root.go
10
cmd/root.go
@ -14,7 +14,7 @@ import (
|
||||
)
|
||||
|
||||
const (
|
||||
gVersion = "0.37"
|
||||
gVersion = "0.39"
|
||||
|
||||
// TODO : Get from $jail_zpool/defaults.json
|
||||
MIN_DYN_DEVFS_RULESET = 1000
|
||||
@ -65,6 +65,14 @@ var (
|
||||
gFetchFrom string
|
||||
gUpgradeRelease string
|
||||
|
||||
// For a based jail, these are directories binded to basejail
|
||||
gBaseDirs = []string{"bin", "boot", "lib", "libexec", "rescue", "sbin", "usr/bin", "usr/include",
|
||||
"usr/lib", "usr/lib32", "usr/libdata", "usr/libexec", "usr/sbin", "usr/share"}
|
||||
// These directories are to be created empty
|
||||
gEmptyDirs = []string{"dev", "media", "mnt", "net", "proc"}
|
||||
// Copy these from base template
|
||||
gCopyDirs = []string{"etc", "root", "tmp", "var"}
|
||||
|
||||
gMdevfs sync.Mutex
|
||||
|
||||
rootCmd = &cobra.Command{
|
||||
|
84
cmd/start.go
84
cmd/start.go
@ -840,7 +840,7 @@ func setupVnetInterfaceHostSide(jail *Jail) ([]string, error) {
|
||||
bridge := v[1]
|
||||
|
||||
// Get host side MAC
|
||||
pname := fmt.Sprintf("Config.%s_mac", nic)
|
||||
pname := fmt.Sprintf("Config.%s_mac", strings.Title(nic))
|
||||
var val *reflect.Value
|
||||
val, pname, err = getStructFieldValue(jail, pname)
|
||||
if err != nil {
|
||||
@ -853,7 +853,10 @@ func setupVnetInterfaceHostSide(jail *Jail) ([]string, error) {
|
||||
return []string{}, err
|
||||
}
|
||||
} else {
|
||||
hsmac = val.Bytes()
|
||||
hsmac, err = hex.DecodeString(strings.Split(val.String(), " ")[0])
|
||||
if err != nil {
|
||||
return []string{}, fmt.Errorf("Error converting %s to hex\n", strings.Split(val.String(), " ")[0])
|
||||
}
|
||||
}
|
||||
|
||||
// Get bridge MTU
|
||||
@ -899,7 +902,7 @@ func setupVnetInterfaceHostSide(jail *Jail) ([]string, error) {
|
||||
return epairs, nil
|
||||
}
|
||||
|
||||
func setupVnetInterfaceJailSide(jail *Jail) error {
|
||||
func setupVnetInterfaceJailSide(jail *Jail, hostepairs []string) error {
|
||||
var jsmac []byte
|
||||
var err error
|
||||
|
||||
@ -919,7 +922,7 @@ func setupVnetInterfaceJailSide(jail *Jail) error {
|
||||
}
|
||||
|
||||
// Loop through configured interfaces
|
||||
for _, nicCnf := range strings.Split(jail.Config.Interfaces, ",") {
|
||||
for i, nicCnf := range strings.Split(jail.Config.Interfaces, ",") {
|
||||
v := strings.Split(nicCnf, ":")
|
||||
if len(v) != 2 {
|
||||
return fmt.Errorf("Invalid value for Interfaces: %s\n", nicCnf)
|
||||
@ -930,9 +933,11 @@ func setupVnetInterfaceJailSide(jail *Jail) error {
|
||||
// inside jail final nic name
|
||||
jnic := strings.Replace(v[0], "vnet", "epair", 1)
|
||||
jnic = jnic + "b"
|
||||
// host side associated jail nic name
|
||||
jsepair := fmt.Sprintf("%sb", strings.TrimSuffix(hostepairs[i], "a"))
|
||||
|
||||
// Get jail side MAC
|
||||
pname := fmt.Sprintf("Config.%s_mac", nic)
|
||||
pname := fmt.Sprintf("Config.%s_mac", strings.Title(nic))
|
||||
var val *reflect.Value
|
||||
val, pname, err = getStructFieldValue(jail, pname)
|
||||
if err != nil {
|
||||
@ -945,10 +950,14 @@ func setupVnetInterfaceJailSide(jail *Jail) error {
|
||||
return err
|
||||
}
|
||||
} else {
|
||||
jsmac = val.Bytes()
|
||||
jsmac, err = hex.DecodeString(strings.Split(val.String(), " ")[1])
|
||||
if err != nil {
|
||||
return fmt.Errorf("Error converting %s to hex\n", strings.Split(val.String(), " ")[1])
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
cmd := fmt.Sprintf("/sbin/ifconfig %s vnet %s", jnic, jail.InternalName)
|
||||
cmd := fmt.Sprintf("/sbin/ifconfig %s vnet %s", jsepair, jail.InternalName)
|
||||
_, err := executeCommand(cmd)
|
||||
if err != nil {
|
||||
return fmt.Errorf("Error linking interface to jail: %v\n", err)
|
||||
@ -960,14 +969,14 @@ func setupVnetInterfaceJailSide(jail *Jail) error {
|
||||
return fmt.Errorf("Error getting bridge %s mtu: %v\n", bridge, err)
|
||||
}
|
||||
|
||||
cmd = fmt.Sprintf("/usr/sbin/jexec %d ifconfig %s mtu %d", jail.JID, jnic, mtu)
|
||||
cmd = fmt.Sprintf("/usr/sbin/jexec %d ifconfig %s mtu %d", jail.JID, jsepair, mtu)
|
||||
_, err = executeCommand(cmd)
|
||||
if err != nil {
|
||||
return fmt.Errorf("Error setting mtu: %v\n", err)
|
||||
}
|
||||
|
||||
// rename epairXXb to epair0b (or opair1b, ...)
|
||||
cmd = fmt.Sprintf("/usr/sbin/setfib %s jexec %d ifconfig %s name %s", jail.Config.Exec_fib, jail.JID, jnic, jnic)
|
||||
cmd = fmt.Sprintf("/usr/sbin/setfib %s jexec %d ifconfig %s name %s", jail.Config.Exec_fib, jail.JID, jsepair, jnic)
|
||||
_, err = executeCommand(cmd)
|
||||
if err != nil {
|
||||
return fmt.Errorf("Error linking interface to jail: %v\n", err)
|
||||
@ -1070,9 +1079,9 @@ func StartJailsAtBoot() {
|
||||
var curThNb int
|
||||
var curPri int
|
||||
|
||||
// Get boot enabled jails
|
||||
// Get boot enabled non-template jails
|
||||
for _, j := range gJails {
|
||||
if j.Config.Boot > 0 {
|
||||
if j.Config.Boot > 0 && !strings.EqualFold(j.Config.Jailtype, "template") {
|
||||
startList = append(startList, j)
|
||||
}
|
||||
}
|
||||
@ -1166,7 +1175,7 @@ func StartJail(args []string) {
|
||||
|
||||
for _, a := range args {
|
||||
// Check if jail exist and is distinctly named
|
||||
cj, err = getJailFromArray(a, []string{"jail"}, gJails)
|
||||
cj, err = getJailFromArray(a, []string{"basejail", "jail"}, gJails)
|
||||
if err != nil {
|
||||
fmt.Printf("Error getting jail: %s\n", err)
|
||||
continue
|
||||
@ -1178,7 +1187,7 @@ func StartJail(args []string) {
|
||||
}
|
||||
|
||||
fmt.Printf("> Starting jail %s\n", cj.Name)
|
||||
|
||||
|
||||
// Set InternalName as it is used by some of these
|
||||
cj.InternalName = fmt.Sprintf("ioc-%s", cj.Name)
|
||||
|
||||
@ -1340,34 +1349,34 @@ func StartJail(args []string) {
|
||||
cj.Config.Defaultrouter = ip4[0]
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
// See https://github.com/iocage/iocage/blob/e94863d4c54f02523fb09e62e48be7db9ac92eda/iocage_lib/ioc_start.py:401
|
||||
if cj.Config.Vnet == 0 {
|
||||
// Not supported
|
||||
fmt.Printf("Only VNet jails supported\n")
|
||||
return
|
||||
}
|
||||
|
||||
|
||||
var net []string
|
||||
if false == strings.EqualFold(cj.Config.Vnet_interfaces, "none") {
|
||||
net = append(net, strings.Split(cj.Config.Vnet_interfaces, " ")...)
|
||||
}
|
||||
|
||||
|
||||
err, dynrs := buildDevfsRuleSet(cj, &gMdevfs)
|
||||
if err != nil {
|
||||
fmt.Printf("%s\n", err.Error())
|
||||
return
|
||||
}
|
||||
|
||||
|
||||
err = buildJailParameters(cj, dynrs)
|
||||
if err != nil {
|
||||
fmt.Printf("%s\n", err.Error())
|
||||
return
|
||||
}
|
||||
|
||||
|
||||
// Synchronize jail config to disk
|
||||
writeConfigToDisk(cj, false)
|
||||
|
||||
cj.WriteConfigToDisk(false)
|
||||
|
||||
start_cmd := fmt.Sprintf("/usr/sbin/jail -f /var/run/jail.%s.conf -c", cj.InternalName)
|
||||
|
||||
//TODO: handle start_env & prestart_env, could be used by iocage plugins
|
||||
@ -1377,17 +1386,17 @@ func StartJail(args []string) {
|
||||
fmt.Printf("Aborting jail start\n")
|
||||
return
|
||||
}
|
||||
|
||||
|
||||
fmt.Printf(" > Start jail:\n")
|
||||
_, err = executeCommand(start_cmd)
|
||||
if err != nil {
|
||||
fmt.Printf("Error starting jail %s: %v\n", cj.Name, err)
|
||||
return
|
||||
}
|
||||
|
||||
|
||||
fmt.Printf(" > Start jail: OK\n")
|
||||
fmt.Printf(" > With devfs ruleset %d\n", dynrs)
|
||||
|
||||
|
||||
// Update running state, JID and Devfs_ruleset
|
||||
cj.Running = true
|
||||
cj.Devfs_ruleset = dynrs
|
||||
@ -1401,13 +1410,13 @@ func StartJail(args []string) {
|
||||
break
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
hostInt, err := gJailHost.GetInterfaces()
|
||||
if err != nil {
|
||||
fmt.Printf("Error listing jail host interfaces: %v\n", err)
|
||||
return
|
||||
}
|
||||
|
||||
|
||||
if false == strings.EqualFold(cj.Config.Vnet_default_interface, "auto") &&
|
||||
false == strings.EqualFold(cj.Config.Vnet_default_interface, "none") &&
|
||||
false == isStringInArray(hostInt, cj.Config.Vnet_default_interface) {
|
||||
@ -1416,13 +1425,13 @@ func StartJail(args []string) {
|
||||
}
|
||||
|
||||
fmt.Printf(" > Setup VNet network:\n")
|
||||
_, err = setupVnetInterfaceHostSide(cj);
|
||||
hsepairs, err := setupVnetInterfaceHostSide(cj);
|
||||
if err != nil {
|
||||
fmt.Printf("Error setting VNet interface host side: %v\n", err)
|
||||
return
|
||||
}
|
||||
|
||||
if err = setupVnetInterfaceJailSide(cj); err != nil {
|
||||
|
||||
if err = setupVnetInterfaceJailSide(cj, hsepairs); err != nil {
|
||||
fmt.Printf("Error setting VNet interface jail side: %v\n", err)
|
||||
return
|
||||
}
|
||||
@ -1439,7 +1448,7 @@ func StartJail(args []string) {
|
||||
fmt.Printf(" > Setup default ipv4 gateway: OK\n")
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
if cj.Config.Ip6_addr != "none" {
|
||||
fmt.Printf(" > Setup default ipv6 gateway:\n")
|
||||
cmd := fmt.Sprintf("/usr/sbin/setfib %s /usr/sbin/jexec %d route add -6 default %s", cj.Config.Exec_fib, cj.JID, cj.Config.Defaultrouter6)
|
||||
@ -1450,7 +1459,7 @@ func StartJail(args []string) {
|
||||
fmt.Printf(" > Setup default ipv6 gateway: OK\n")
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
if cj.Config.Jail_zfs > 0 {
|
||||
fmt.Printf(" > Jail ZFS datasets:\n")
|
||||
err = jailZfsDatasets(cj)
|
||||
@ -1465,14 +1474,14 @@ func StartJail(args []string) {
|
||||
if err != nil {
|
||||
fmt.Printf("%s\n", err)
|
||||
}
|
||||
|
||||
|
||||
if cj.Config.Host_time > 0 {
|
||||
err = copyLocalTime(cj)
|
||||
if err != nil {
|
||||
fmt.Printf("%s\n", err)
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
// Start services
|
||||
if len(cj.Config.Exec_start) > 0 {
|
||||
fmt.Printf(" > Start services:\n")
|
||||
@ -1484,7 +1493,7 @@ func StartJail(args []string) {
|
||||
fmt.Printf(" > Start services: OK\n")
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
if cj.Config.Rtsold > 0 || strings.EqualFold(cj.Config.Ip6_addr, "accept_rtadv") {
|
||||
fmt.Printf(" > Start rtsold:\n")
|
||||
cmd := fmt.Sprintf("/usr/sbin/setfib %s /usr/sbin/jexec %d service rtsold start", cj.Config.Exec_fib, cj.JID)
|
||||
@ -1495,7 +1504,7 @@ func StartJail(args []string) {
|
||||
fmt.Printf(" > Start rtsold: OK\n")
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
// TODO: Execute Exec_poststart
|
||||
if len(cj.Config.Exec_poststart) > 0 {
|
||||
fmt.Printf(" > Execute post-start:\n")
|
||||
@ -1507,19 +1516,18 @@ func StartJail(args []string) {
|
||||
fmt.Printf(" > Execute post-start: OK\n")
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
// WIP 10/07/2022 : https://github.com/iocage/iocage/blob/master/iocage_lib/ioc_start.py#L891
|
||||
// TODO: Handle dhcp
|
||||
// TODO: Apply rctl
|
||||
|
||||
|
||||
// Update last_started
|
||||
// 23/07/2023 : This is not working, when writing to disk the old value is used
|
||||
dt := time.Now()
|
||||
curDate := fmt.Sprintf("%s", dt.Format("2006-01-02 15:04:05"))
|
||||
cj.Config.Last_started = curDate
|
||||
writeConfigToDisk(cj, false)
|
||||
|
||||
|
||||
|
||||
/*
|
||||
out, err := executeCommand(fmt.Sprintf("rctl jail:%s", cj.InternalName))
|
||||
if err == nil && len(out) > 0 {
|
||||
|
17
cmd/stop.go
17
cmd/stop.go
@ -123,7 +123,7 @@ func deleteDevfsRuleset(ruleset int) error {
|
||||
return nil
|
||||
}
|
||||
|
||||
func umountJailFsFromHost(jail *Jail, mountpoint string) error {
|
||||
func umountFsFromHost(mountpoint string) error {
|
||||
cmd := "mount -p"
|
||||
out, err := executeCommand(cmd)
|
||||
if err != nil {
|
||||
@ -134,11 +134,11 @@ func umountJailFsFromHost(jail *Jail, mountpoint string) error {
|
||||
for _, l := range strings.Split(out, "\n") {
|
||||
f := strings.Split(remSpPtrn.ReplaceAllString(l, " "), " ")
|
||||
if len(f) > 2 {
|
||||
if strings.EqualFold(f[1], fmt.Sprintf("%s%s", jail.RootPath, mountpoint)) {
|
||||
cmd = fmt.Sprintf("umount %s%s", jail.RootPath, mountpoint)
|
||||
if strings.EqualFold(f[1], mountpoint) {
|
||||
cmd = fmt.Sprintf("umount %s", mountpoint)
|
||||
_, err := executeCommand(cmd)
|
||||
if err != nil {
|
||||
return errors.New(fmt.Sprintf("Error umounting %s%s: %s", jail.RootPath, mountpoint, err.Error()))
|
||||
return errors.New(fmt.Sprintf("Error umounting %s: %s", mountpoint, err.Error()))
|
||||
}
|
||||
return nil
|
||||
}
|
||||
@ -148,6 +148,10 @@ func umountJailFsFromHost(jail *Jail, mountpoint string) error {
|
||||
return nil
|
||||
}
|
||||
|
||||
func umountJailFsFromHost(jail *Jail, mountpoint string) error {
|
||||
return umountFsFromHost(fmt.Sprintf("%s%s", jail.RootPath, mountpoint))
|
||||
}
|
||||
|
||||
// Internal usage only
|
||||
func stopJail(jail *Jail) error {
|
||||
cmd := "jail -q"
|
||||
@ -270,7 +274,7 @@ func StopJail(args []string) {
|
||||
|
||||
for _, a := range args {
|
||||
// Check if jail exist and is distinctly named
|
||||
cj, err = getJailFromArray(a, []string{"jail"}, gJails)
|
||||
cj, err = getJailFromArray(a, []string{"basejail", "jail"}, gJails)
|
||||
if err != nil {
|
||||
fmt.Printf("Error getting jail: %s\n", err)
|
||||
continue
|
||||
@ -404,7 +408,8 @@ func StopJail(args []string) {
|
||||
fmt.Printf(" > Umount mountpoints from %s\n", fstab)
|
||||
errs := 0
|
||||
for _, m := range mounts {
|
||||
err = umountJailFsFromHost(cj, m.Mountpoint)
|
||||
log.Debugf("Umounting %s\n", m.Mountpoint)
|
||||
err = umountFsFromHost(m.Mountpoint)
|
||||
if err != nil {
|
||||
fmt.Printf("ERROR: %s\n", err.Error())
|
||||
errs += 1
|
||||
|
@ -5,6 +5,7 @@ import (
|
||||
"fmt"
|
||||
//"log"
|
||||
"time"
|
||||
"strings"
|
||||
)
|
||||
|
||||
|
||||
@ -21,7 +22,7 @@ func updateJail(jail *Jail) error {
|
||||
defer cfgFile.Close()
|
||||
defer os.Remove(cfgFile.Name())
|
||||
|
||||
// Folder containing update/uipgrade temporary files. Common so we save bandwith when upgrading multiple jails
|
||||
// Folder containing update/upgrade temporary files. Common so we save bandwith when upgrading multiple jails
|
||||
// TODO: Variabilize /iocage/freebsd-update
|
||||
_, err = os.Stat("/iocage/freebsd-update")
|
||||
if os.IsNotExist(err) {
|
||||
@ -30,11 +31,15 @@ func updateJail(jail *Jail) error {
|
||||
}
|
||||
}
|
||||
|
||||
cmd := fmt.Sprintf("/usr/sbin/freebsd-update --not-running-from-cron -f %s -b %s --currently-running %s fetch install",
|
||||
cmd := fmt.Sprintf("/usr/sbin/freebsd-update --not-running-from-cron -f %s -b %s --currently-running %s fetch",
|
||||
cfgFile.Name(), jail.RootPath, jail.Config.Release)
|
||||
err = executeCommandWithOutputToStdout(cmd)
|
||||
if err != nil {
|
||||
return err
|
||||
}
|
||||
|
||||
//fmt.Printf("DEBUG: Prepare to execute \"%s\"\n", cmd)
|
||||
|
||||
cmd = fmt.Sprintf("/usr/sbin/freebsd-update --not-running-from-cron -f %s -b %s --currently-running %s install",
|
||||
cfgFile.Name(), jail.RootPath, jail.Config.Release)
|
||||
err = executeCommandWithOutputToStdout(cmd)
|
||||
if err != nil {
|
||||
return err
|
||||
@ -58,7 +63,13 @@ func UpdateJail(args []string) {
|
||||
fmt.Printf("Error getting jail: %s\n", err)
|
||||
continue
|
||||
}
|
||||
|
||||
|
||||
// We cant update basejail as system is readonly
|
||||
if strings.EqualFold(cj.Config.Jailtype, "basejail") {
|
||||
fmt.Printf("%s is a basejail using %s system files. Please update %s!\n", cj.Name, cj.Config.Origin, cj.Config.Origin)
|
||||
continue
|
||||
}
|
||||
|
||||
fmt.Printf(" > Snapshot jail %s\n", cj.Name)
|
||||
// Set snapshot name
|
||||
dt := time.Now()
|
||||
|
47
cmd/utils.go
47
cmd/utils.go
@ -474,6 +474,8 @@ func executeCommandWithOutputToStdout(cmdline string) (error) {
|
||||
word = word + string(c)
|
||||
}
|
||||
|
||||
log.Debugf("executeCommandWithOutputToStdout: will execute \"%s\"\n", strings.Join(cmd, " "))
|
||||
|
||||
var execHandle *exec.Cmd
|
||||
if len(cmd) > 1 {
|
||||
execHandle = exec.Command(cmd[0], cmd[1:]...)
|
||||
@ -790,9 +792,20 @@ func doZfsDatasetExist(dataset string) (bool, error) {
|
||||
return true, nil
|
||||
}
|
||||
|
||||
// Create ZFS dataset. mountpoint can be "none", then the dataset won't be mounted
|
||||
/* Create ZFS dataset
|
||||
* mountpoint can be "none", then the dataset won't be mounted
|
||||
* mountpoint can be "", then it will be inherited
|
||||
* compression can be "", then it wil be inherited
|
||||
*/
|
||||
func zfsCreateDataset(dataset, mountpoint, compression string) error {
|
||||
cmd := fmt.Sprintf("zfs create -o mountpoint=%s -o compression=%s %s", mountpoint, compression, dataset)
|
||||
cmd := "zfs create"
|
||||
if len(mountpoint) > 0 {
|
||||
cmd = fmt.Sprintf("%s -o mountpoint=%s", cmd, mountpoint)
|
||||
}
|
||||
if len(compression) > 0 {
|
||||
cmd = fmt.Sprintf("%s -o compression=%s", cmd, compression)
|
||||
}
|
||||
cmd = fmt.Sprintf("%s %s", cmd, dataset)
|
||||
out, err := executeCommand(cmd)
|
||||
if err != nil {
|
||||
return errors.New(fmt.Sprintf("%v; command returned \"%s\"", err, out))
|
||||
@ -821,6 +834,11 @@ func zfsDestroy(dataset string) error {
|
||||
return nil
|
||||
}
|
||||
|
||||
/*****************************************************************************
|
||||
*
|
||||
* Filesystem operations
|
||||
*
|
||||
*****************************************************************************/
|
||||
/* Copy file */
|
||||
func copyFile(src, dst string) error {
|
||||
srcfinfo, err := os.Stat(src)
|
||||
@ -845,6 +863,11 @@ func copyFile(src, dst string) error {
|
||||
return err
|
||||
}
|
||||
|
||||
// Get permissions of file or folder
|
||||
func getPermissions(path string) (os.FileInfo, error) {
|
||||
return os.Stat(path)
|
||||
}
|
||||
|
||||
/*****************************************************************************
|
||||
*
|
||||
* rc.conf management
|
||||
@ -894,7 +917,8 @@ func getFstab(path string) ([]Mount, error) {
|
||||
scan := bufio.NewScanner(f)
|
||||
for scan.Scan() {
|
||||
res := strings.Fields(scan.Text())
|
||||
if len(res) != 6 {
|
||||
// iocage create lines like that : "/iocage/releases/13.2-RELEASE/root/bin /iocage/jails/smtp-router-02/root/bin nullfs ro 0 0 # Added by iocage on 2023-10-10 17:20:51"
|
||||
if (len(res) > 6 && !strings.EqualFold(res[6], "#")) || len(res) < 6 {
|
||||
return mounts, fmt.Errorf("Incorrect format for fstab line %s", scan.Text())
|
||||
}
|
||||
freq, err := strconv.Atoi(res[4])
|
||||
@ -1041,7 +1065,7 @@ func getJailFromArray(name string, jailtypes []string, jarray []Jail) (*Jail, er
|
||||
var jails []Jail
|
||||
|
||||
if (len(jailtypes) == 1 && len(jailtypes[0]) == 0) || len(jailtypes) == 0 {
|
||||
jailtypes = []string{"jail", "basetpl"}
|
||||
jailtypes = []string{"basejail", "jail", "template"}
|
||||
}
|
||||
|
||||
if strings.Contains(name, "/") {
|
||||
@ -1107,16 +1131,25 @@ func setJailConfigUpdated(jail *Jail) error {
|
||||
return nil
|
||||
}
|
||||
|
||||
func getVersion(jail *Jail) (string, error) {
|
||||
cvers, err := executeCommand(fmt.Sprintf("%s/bin/freebsd-version", jail.RootPath))
|
||||
if err != nil {
|
||||
fmt.Printf("ERROR: %s\n", err.Error())
|
||||
return "", err
|
||||
}
|
||||
return strings.TrimRight(cvers, "\n"), nil
|
||||
}
|
||||
|
||||
func updateVersion(jail *Jail) error {
|
||||
cvers, err := executeCommandInJail(jail, "/bin/freebsd-version")
|
||||
cvers, err := executeCommand(fmt.Sprintf("%s/bin/freebsd-version", jail.RootPath))
|
||||
if err != nil {
|
||||
fmt.Printf("ERROR: %s\n", err.Error())
|
||||
return err
|
||||
}
|
||||
cvers = strings.TrimRight(cvers, "\n")
|
||||
jail.Config.Release = cvers
|
||||
writeConfigToDisk(jail, false)
|
||||
|
||||
jail.WriteConfigToDisk(false)
|
||||
|
||||
return nil
|
||||
}
|
||||
|
||||
|
3
go.mod
3
go.mod
@ -6,6 +6,7 @@ require (
|
||||
github.com/c-robinson/iplib v1.0.3
|
||||
github.com/c2h5oh/datasize v0.0.0-20220606134207-859f65c6625b
|
||||
github.com/google/shlex v0.0.0-20191202100458-e7afc7fbc510
|
||||
github.com/otiai10/copy v1.12.0
|
||||
github.com/sirupsen/logrus v1.8.1
|
||||
github.com/spf13/cobra v1.2.1
|
||||
github.com/spf13/viper v1.9.0
|
||||
@ -24,7 +25,7 @@ require (
|
||||
github.com/spf13/jwalterweatherman v1.1.0 // indirect
|
||||
github.com/spf13/pflag v1.0.5 // indirect
|
||||
github.com/subosito/gotenv v1.2.0 // indirect
|
||||
golang.org/x/sys v0.0.0-20210823070655-63515b42dcdf // indirect
|
||||
golang.org/x/sys v0.0.0-20220715151400-c0bba94af5f8 // indirect
|
||||
golang.org/x/text v0.3.6 // indirect
|
||||
gopkg.in/ini.v1 v1.63.2 // indirect
|
||||
gopkg.in/yaml.v2 v2.4.0 // indirect
|
||||
|
Reference in New Issue
Block a user