Major changes in how config is fetched from jail config. A major variable renaming took place. A new subcommand config has been introduced. Jails can be configured not to be run automatically. Crypto images do not work anymore if made with an older version. (Due to config file variable renaming) .norun has been set as standard "do not run" name. However, any . is enough to prevent booting the jail.
459 lines
21 KiB
Bash
Executable File
459 lines
21 KiB
Bash
Executable File
#!/bin/sh
|
|
|
|
# ugly: this variable is set during port install time
|
|
ezjail_prefix=EZJAIL_PREFIX
|
|
ezjail_etc=${ezjail_prefix}/etc
|
|
ezjail_share=${ezjail_prefix}/share/ezjail
|
|
ezjail_examples=${ezjail_prefix}/share/examples/ezjail
|
|
ezjail_jailcfgs=${ezjail_etc}/ezjail
|
|
|
|
# read user config
|
|
[ -f ${ezjail_etc}/ezjail.conf ] && . ${ezjail_etc}/ezjail.conf
|
|
|
|
# set defaults
|
|
ezjail_jaildir=${ezjail_jaildir:-"/usr/jails"}
|
|
ezjail_jailtemplate=${ezjail_jailtemplate:-"${ezjail_jaildir}/newjail"}
|
|
ezjail_jailbase=${ezjail_jailbase:-"${ezjail_jaildir}/basejail"}
|
|
ezjail_jailfull=${ezjail_jailfull:-"${ezjail_jaildir}/fulljail"}
|
|
ezjail_flavours=${ezjail_flavours:-"${ezjail_jaildir}/flavours"}
|
|
ezjail_sourcetree=${ezjail_sourcetree:-"/usr/src"}
|
|
ezjail_portscvsroot=${ezjail_portscvsroot:-":pserver:anoncvs@anoncvs.at.FreeBSD.org:/home/ncvs"}
|
|
ezjail_uglyperlhack=${ezjail_uglyperlhack:-"YES"}
|
|
|
|
ezjail_mount_enable=${ezjail_mount_enable:-"YES"}
|
|
ezjail_devfs_enable=${ezjail_devfs_enable:-"YES"}
|
|
ezjail_devfs_ruleset=${ezjail_devfs_ruleset:-"devfsrules_jail"}
|
|
ezjail_procfs_enable=${ezjail_procfs_enable:-"YES"}
|
|
ezjail_fdescfs_enable=${ezjail_fdescfs_enable:-"YES"}
|
|
|
|
# define our bail out shortcut
|
|
exerr () { echo -e "$*"; exit 1; }
|
|
|
|
# define detach strategy for image jails
|
|
detach_images () {
|
|
# unmount and detach memory disc
|
|
if [ "${ezjail_imagedevice}" ]; then
|
|
umount ${ezjail_rootdir} > /dev/null
|
|
[ "${ezjail_imagetype}" = "crypto" ] && gbde detach /dev/${ezjail_imagedevice} > /dev/null
|
|
mdconfig -d -u ${ezjail_imagedevice} > /dev/null
|
|
[ "$1" = "success" ] || rm -f ${ezjail_image}
|
|
fi
|
|
}
|
|
|
|
# fetch everything we need to know about an ezjail from config
|
|
fetchjailinfo () {
|
|
ezjail_name=$1
|
|
|
|
# Clean variables, prevent polution
|
|
unset ezjail_config ezjail_running ezjail_hostname ezjail_rootdir ezjail_image ezjail_imagetype ezjail_ip ezjail_id
|
|
|
|
ezjail_safename=`echo -n "${ezjail_name}" | tr -c [:alnum:] _`
|
|
|
|
[ -e ${ezjail_jailcfgs}/${ezjail_safename} ] && ezjail_config=${ezjail_jailcfgs}/${ezjail_safename}
|
|
[ -e ${ezjail_jailcfgs}/${ezjail_safename}.norun ] && ezjail_config=${ezjail_jailcfgs}/${ezjail_safename}.norun
|
|
[ "${ezjail_config}" ] || return 0
|
|
|
|
. ${ezjail_config}
|
|
eval ezjail_hostname=\"\$jail_$ezjail_safename}_hostname\"
|
|
eval ezjail_rootdir=\"\$jail_$ezjail_safename}_rootdir\"
|
|
eval ezjail_image=\"\$jail_${ezjail_safename}_image\"
|
|
eval ezjail_imagetype=\"\$jail_${ezjail_safename}_imagetype\"
|
|
eval ezjail_ip=\"\$jail_${ezjail_safename}_ip\"
|
|
|
|
ezjail_softlink=${ezjail_jaildir}/`basename -- ${ezjail_rootdir}`
|
|
ezjail_id=`jls | grep " ${ezjail_hostname} " | head -n 1 | awk {'print $1'}`
|
|
}
|
|
|
|
# check for command
|
|
[ "$1" ] || exerr "Usage: `basename -- $0` [config|create|delete|list|update] {params}"
|
|
|
|
case "$1" in
|
|
######################## ezjail-admin CREATE ########################
|
|
create)
|
|
shift
|
|
args=`getopt f:r:s:xic $*` || exerr "Usage: `basename -- $0` create [-f flavour] [-r jailroot] [-s size] [-xic] jailname jailip"
|
|
|
|
# Clean variables, prevent polution
|
|
unset ezjail_rootdir ezjail_flavour ezjail_softlink ezjail_image ezjail_lock ezjail_imagetype ezjail_imagesize ezjail_device ezjail_config
|
|
ezjail_fillme="YES"
|
|
|
|
set -- ${args}
|
|
for arg do
|
|
case ${arg} in
|
|
-x) ezjail_fillme="NO"; shift;;
|
|
-r) ezjail_rootdir="$2"; shift 2;;
|
|
-f) ezjail_flavour="$2"; shift 2;;
|
|
-c) ezjail_imagetype="crypto"; shift;;
|
|
-i) ezjail_imagetype=${ezjail_imagetype:-"simple"}; shift;;
|
|
-s) ezjail_imagesize="$2"; shift 2;;
|
|
--) shift; break;;
|
|
esac
|
|
done
|
|
ezjail_name=$1; ezjail_ip=$2
|
|
|
|
# we need at least a name and an ip for new jail
|
|
[ "${ezjail_name}" -a "${ezjail_ip}" -a $# = 2 ] || exerr "Usage: `basename -- $0` create [-f flavour] [-r jailroot] [-s size] [-xic] jailname jailip"
|
|
|
|
# check for sanity of settings concerning the image feature
|
|
[ "${ezjail_imagetype}" -a "$ezjail_fillme" = "YES" -a ! "${ezjail_imagesize}" ] && exerr "Image jails need an image size."
|
|
|
|
# check, whether ezjail-update has been called. existence of
|
|
# ezjail_jailbase is our indicator
|
|
[ -d ${ezjail_jailbase} ] || exerr "Error: base jail does not exist. Please run 'ezjail-admin update' first."
|
|
|
|
# relative paths don't make sense in rc.scripts
|
|
[ "${ezjail_jaildir%%[!/]*}" ] || exerr "Error: Need an absolute path in ezjail_jaildir, it currently is set to: ${ezjail_jaildir}."
|
|
|
|
# jail names must not irritate file systems, excluding dots from this list
|
|
# was done intentionally to permit foo.com style directory names, however,
|
|
# the jail name will be foo_com in most scripts
|
|
|
|
ezjail_hostname=`echo -n ${ezjail_name} | tr /~ __`
|
|
ezjail_safename=`echo -n "${ezjail_name}" | tr -c [:alnum:] _`
|
|
ezjail_rootdir=${ezjail_rootdir:-"${ezjail_jaildir}/${ezjail_hostname}"}
|
|
ezjail_config=${ezjail_jailcfgs}/${ezjail_safename}
|
|
|
|
# This scenario really will only lead to real troubles in the 'fulljail'
|
|
# case, but I should still explain this to the user and not claim that
|
|
# "an ezjail would already exist"
|
|
[ "${ezjail_hostname}" = "basejail" -o "${ezjail_hostname}" = "newjail" -o "${ezjail_hostname}" = "fulljail" -o "${ezjail_hostname}" = "flavours" ] && \
|
|
exerr "Error: ezjail needs the ${ezjail_hostname} directory for its own administrative purposes. Please rename the ezjail."
|
|
|
|
# jail names may lead to identical configs, eg. foo.bar.com == foo-bar.com
|
|
# so check, whether we might be running into problems
|
|
[ -e ${ezjail_config} ] && exerr "Error: an ezjail config already exists at ${ezjail_jailconfig}. Please rename the ezjail."
|
|
|
|
# if jail root specified on command line is not absolute, make it absolute
|
|
# inside our jail directory
|
|
[ "${ezjail_rootdir%%[!/]*}" ] || ezjail_rootdir=${ezjail_jaildir}/${ezjail_rootdir}
|
|
|
|
# if a directory at the specified jail root already exists, refuse to
|
|
# install
|
|
[ -e ${ezjail_rootdir} -a "${ezjail_fillme}" = "YES" ] && exerr "Error: the specified jail root ${ezjail_rootdir} alread exists."
|
|
|
|
# if jail root specified on command line does not lie within our jail
|
|
# directory, we need to create a softlink
|
|
if [ "${ezjail_rootdir##${ezjail_jaildir}}" = "${ezjail_rootdir}" ]; then
|
|
ezjail_softlink=${ezjail_jaildir}/`basename -- ${ezjail_rootdir}`
|
|
[ -e ${ezjail_softlink} -a "${ezjail_fillme}" = "YES" ] && exerr "Error: an ezjail already exists at ${ezjail_softlink}."
|
|
fi
|
|
|
|
# do some sanity checks on the selected flavour (if any)
|
|
[ "${ezjail_flavour}" -a ! -d ${ezjail_flavours}/${ezjail_flavour} ] && exerr "Error: Flavour config directory ${ezjail_flavours}/${ezjail_flavour} not found."
|
|
|
|
#
|
|
# All sanity checks that may lead to errors are hopefully passed here
|
|
#
|
|
|
|
if [ "${ezjail_imagetype}" ]; then
|
|
# Strip trailing slashes from jail root, those would confuse image path
|
|
ezjail_image=${ezjail_rootdir%/}; while [ "${ezjail_image}" -a -z "${ezjail_image%%*/}" ]; do ezjail_image=${ezjail_image%/}; done
|
|
[ -z "${ezjail_image}" ] && exerr "Error: Could not determine image file name, something is wrong with the jail root: ${ezjail_rootdir}."
|
|
|
|
# Location of our image and crypto image lock file
|
|
ezjail_lock=${ezjail_image}.lock
|
|
ezjail_image=${ezjail_image}.img
|
|
|
|
# If NOT exist, create image
|
|
if [ "$ezjail_fillme" = "YES" ]; then
|
|
[ -e "${ezjail_image}" ] && exerr "Error: a file exists at the location ${ezjail_image}, preventing our own image file to be created."
|
|
[ "${ezjail_imagetype}" = "crypto" -a -e "${ezjail_lock}" ] && exerr "Error: a file exists at the location ${ezjail_lock}, preventing our own crypto image lock file to be created."
|
|
|
|
# Now create jail disc image
|
|
touch "${ezjail_image}"
|
|
dd if=/dev/random of="${ezjail_image}" bs="${ezjail_imagesize}" count=1 || exerr "Error: Could not (or not fully) create the image file. You might want to check (and possibly remove) the file ${ezjail_image}. The image size provided was ${ezjail_imagesize}."
|
|
|
|
# And attach device
|
|
ezjail_imagedevice=`mdconfig -a -t vnode -f ${ezjail_image}`
|
|
[ $? = 0 ] || detach_images || exerr "Error: Could not attach image device. (Command failed was 'mdconfig -a -t vnode -f ${ezjail_image}')"
|
|
|
|
if [ "${ezjail_imagetype}" = "crypto" ]; then
|
|
# Initialise crypto image
|
|
echo "Initialising crypto device. Enter a new passphrase twice..."
|
|
gbde init /dev/${ezjail_imagedevice} -L ${ezjail_lock} || detach_images || exerr "Error: Could not initialise crypto image."
|
|
|
|
echo "Attaching crypto device. Enter the passphrase..."
|
|
gbde attach /dev/${ezjail_imagedevice} -l ${ezjail_lock} || detach_images || exerr "Error: Could not attach crypto image."
|
|
ezjail_device=${ezjail_imagedevice}.bde
|
|
else
|
|
ezjail_device=${ezjail_imagedevice}
|
|
fi
|
|
|
|
# Format memory image
|
|
newfs /dev/${ezjail_device} || detach_images || exerr "Error: Could not newfs /dev/${ezjail_device}."
|
|
# Create mount point and mount
|
|
mkdir -p ${ezjail_rootdir} || detach_images || exerr "Error: Could not create jail root mount point ${ezjail_rootdir}."
|
|
mount /dev/${ezjail_device} ${ezjail_rootdir} || detach_images || exerr "Error: Could not mount /dev/${ezjail_device} to ${ezjail_root}."
|
|
else
|
|
[ -e ${ezjail_rootdir} -a ! -d ${ezjail_rootdir} ] && exerr "Error: Could not create mount point for your jail image. A file exists at its location. (For existing image jails, call this tool without the .img suffix when specifying jail root.)"
|
|
[ -d ${ezjail_rootdir} ] || mkdir -p ${ezjail_rootdir}
|
|
fi
|
|
fi
|
|
|
|
# now take a copy of our template jail
|
|
if [ "${ezjail_fillme}" = "YES" ]; then
|
|
mkdir -p ${ezjail_rootdir} && cd ${ezjail_jailtemplate} && find * | cpio -p -v ${ezjail_rootdir} > /dev/null
|
|
[ $? = 0 ] || detach_images || exerr "Error: Could not copy template jail."
|
|
fi
|
|
|
|
# if a soft link is necessary, create it now
|
|
[ "${ezjail_softlink}" ] && ln -s ${ezjail_rootdir} ${ezjail_softlink}
|
|
|
|
# if the automount feature is not disabled, this fstab entry for new jail
|
|
# will be obeyed
|
|
echo -n > /etc/fstab.${ezjail_safename}
|
|
[ "${ezjail_imagetype}" ] && \
|
|
echo ${ezjail_rootdir}.device ${ezjail_rootdir} ufs rw 0 0 >> /etc/fstab.${ezjail_safename}
|
|
echo ${ezjail_jailbase} ${ezjail_rootdir}/basejail nullfs ro 0 0 >> /etc/fstab.${ezjail_nname}
|
|
|
|
# now, where everything seems to have gone right, create control file in
|
|
# ezjails config dir
|
|
mkdir -p ${ezjail_jailcfgs}
|
|
echo "# To specify the start up order of your ezjails, use these lines to" > ${ezjail_jailconfig}
|
|
echo "# create a Jail dependency tree. See rcorder(8) for more details." >> ${ezjail_jailconfig}
|
|
echo -e "#\n# PROVIDE: \n# REQUIRE: \n# BEFORE: \n#\n" >> ${ezjail_jailconfig}
|
|
echo export jail_${ezjail_safename}_hostname=\"${ezjail_hostname}\" >> ${ezjail_jailconfig}
|
|
echo export jail_${ezjail_safename}_ip=\"${ezjail_ip}\" >> ${ezjail_jailconfig}
|
|
echo export jail_${ezjail_safename}_rootdir=\"${ezjail_rootdir}\" >> ${ezjail_jailconfig}
|
|
echo export jail_${ezjail_safename}_exec=\"/bin/sh /etc/rc\" >> ${ezjail_jailconfig}
|
|
echo export jail_${ezjail_safename}_mount_enable=\"${ezjail_mount_enable}\" >> ${ezjail_jailconfig}
|
|
echo export jail_${ezjail_safename}_devfs_enable=\"${ezjail_devfs_enable}\" >> ${ezjail_jailconfig}
|
|
echo export jail_${ezjail_safename}_devfs_ruleset=\"devfsrules_jail\" >> ${ezjail_jailconfig}
|
|
echo export jail_${ezjail_safename}_procfs_enable=\"${ezjail_procfs_enable}\" >> ${ezjail_jailconfig}
|
|
echo export jail_${ezjail_safename}_fdescfs_enable=\"${ezjail_fdescfs_enable}\" >> ${ezjail_jailconfig}
|
|
echo export jail_${ezjail_safename}_image=\"${ezjail_image}\" >> ${ezjail_jailconfig}
|
|
echo export jail_${ezjail_safename}_imagetype=\"${ezjail_imagetype}\" >> ${ezjail_jailconfig}
|
|
|
|
# Final steps for flavour installation
|
|
if [ "${ezjail_fillme}" = "YES" -a "${ezjail_flavour}" ]; then
|
|
# install files and config to new jail
|
|
cd ${ezjail_flavours}/${ezjail_flavour} && find * | cpio -p -u -v ${ezjail_rootdir} > /dev/null
|
|
[ $? = 0 ] || echo "Warning: Could not fully install flavour."
|
|
|
|
# If a config is found, make it auto run on jails startup
|
|
if [ -f ${ezjail_rootdir}/ezjail.flavour ]; then
|
|
ln -s /ezjail.flavour ${ezjail_rootdir}/etc/rc.d/ezjail-config.sh
|
|
chmod 0700 ${ezjail_rootdir}/ezjail.flavour
|
|
echo "Note: Shell scripts installed, flavourizing on jails first startup."
|
|
fi
|
|
fi
|
|
|
|
# Detach (crypto and) memory discs
|
|
detach_images success
|
|
|
|
#
|
|
# For user convenience some scenarios commonly causing headaches are checked
|
|
#
|
|
|
|
# check, whether IP is configured on a local interface, warn if it isnt
|
|
ping -c 1 -m 1 -t 1 -q ${ezjail_ip} > /dev/null
|
|
[ $? = 0 ] || echo "Warning: IP ${ezjail_ip} not configured on a local interface."
|
|
|
|
# check, whether some host system services do listen on the Jails IP
|
|
TIFS=${IFS}; IFS=_
|
|
ezjail_listener=`sockstat -4 -l | grep ${ezjail_ip}:[[:digit:]]`
|
|
[ $? = 0 ] && echo -e "Warning: Some services already seem to be listening on IP ${ezjail_ip}\n This may cause some confusion, here they are:\n${ezjail_listener}"
|
|
|
|
ezjail_listener=`sockstat -4 -l | grep \*:[[:digit:]]`
|
|
[ $? = 0 ] && echo -e "Warning: Some services already seem to be listening on all IP, (including ${ezjail_ip})\n This may cause some confusion, here they are:\n${ezjail_listener}"
|
|
IFS=${TIFS}
|
|
|
|
;;
|
|
######################## ezjail-admin DELETE ########################
|
|
delete)
|
|
shift
|
|
args=`getopt w $*` || exerr "Usage: `basename -- $0` delete [-w] jailname"
|
|
|
|
# Clean variables, prevent polution
|
|
unset ezjail_wipeme
|
|
|
|
set -- ${args}
|
|
for arg do
|
|
case ${arg} in
|
|
-w) ezjail_wipeme="YES"; shift;;
|
|
--) shift; break;;
|
|
esac
|
|
done
|
|
|
|
# Get all info we have on that jail
|
|
fetchjailinfo $1
|
|
|
|
# we only need name of jail to vanish
|
|
[ "${ezjail_safename}" -a $# = 1 ] || exerr "Usage: `basename -- $0` delete [-w] jailname"
|
|
|
|
# check for existence of jail in our records
|
|
[ "${ezjail_config}" ] || exerr "Error: Nothing known about jail ${ezjail_name}."
|
|
|
|
# if jail is still running, refuse to go any further
|
|
[ "${ezjail_id}" ] && exerr "Error: Jail appears to be still running, stop it first.\n"
|
|
|
|
# now we know everything we need to let the jail be gone remove entry
|
|
# from ezjail resource structure, delete fstab.JAILNAME
|
|
rm -f ${ezjail_jailconfig}
|
|
rm -f /etc/fstab.${ezjail_safename}
|
|
|
|
# if there is a soft link pointing to the jail root, remove it
|
|
[ -L ${ezjail_softlink} ] && rm ${ezjail_softlink}
|
|
|
|
# if wiping the jail was requested, remove it
|
|
if [ "${ezjail_wipeme}" ]; then
|
|
[ "${ezjail_image}" ] && rm -f ${ezjail_image} ${ezjail_image%.img}.lock ${ezjail_image%.img}.device
|
|
rm -rf ${ezjail_rootdir}
|
|
fi
|
|
|
|
;;
|
|
######################## ezjail-admin LIST ########################
|
|
list)
|
|
ezjail_list=${ezjail_list:-`rcorder ${ezjail_prefix}/etc/ezjail/*`}
|
|
ezjail_list=`basename -a ${ezjail_list}`
|
|
|
|
printf "%-3s %-5s %-15s %-28s %s\\n" STA JID IP Hostname "Root Directory"
|
|
echo "--- ----- --------------- ---------------------------- -----------------------------"
|
|
for ezjail in ${ezjail_list}; do
|
|
fetchjailinfo ${ezjail%.norun}
|
|
ezjail_id=`jls | grep " ${ezjail_hostname} " | head -n 1 | awk {'print $1'}`
|
|
ezjail_state="D"
|
|
[ "${ezjail_imagetype}" = "simple" ] && ezjail_state="I"
|
|
[ "${ezjail_imagetype}" = "crypto" ] && ezjail_state="C"
|
|
[ "${ezjail_id}" ] && ezjail_state=${ezjail_state}R || ezjail_state=${ezjail_state}S
|
|
[ "${ezjail_safename}" != "${ezjail}" ] && ezjail_state=${ezjail_state}N
|
|
|
|
printf "%-3s %-5s %-15s %-28s %s\\n" "${ezjail_state}" "${ezjail_id:-N/A}" "${ezjail_ip}" "${ezjail_hostname}" "${ezjail_rootdir}"
|
|
done
|
|
|
|
;;
|
|
######################## ezjail-admin UPDATE ########################
|
|
setup|update)
|
|
shift
|
|
args=`getopt ipPs: $*` || exerr "Usage: `basename -- $0` update [-s sourcetree] [-i] [-pP]"
|
|
|
|
updatejail_installaction="world"
|
|
updatejail_provideports=
|
|
|
|
set -- ${args}
|
|
for arg do
|
|
case ${arg} in
|
|
-i) updatejail_installaction="installworld"; shift;;
|
|
-s) ezjail_sourcetree="$2"; shift 2;;
|
|
-p) updatejail_provideports="YES"; shift;;
|
|
-P) updatejail_provideports="YES"; updatejail_installaction="none"; shift;;
|
|
--) shift; break;;
|
|
esac
|
|
done
|
|
|
|
if [ "${updatejail_installaction}" = "none" ]; then
|
|
# check, whether ezjail-update has been called. existence of
|
|
# ezjail_jailbase is our indicator
|
|
[ -d ${ezjail_jailbase} ] || exerr "Error: base jail does not exist. You cannot fill base jails ports tree before creating it. Please run 'ezjail-admin update' first."
|
|
else
|
|
# Bump the user for some of the most common errors
|
|
[ -d ${ezjail_sourcetree} ] || exerr "Cannot find your copy of the FreeBSD source tree in ${ezjail_sourcetree}."
|
|
[ -e ${ezjail_sourcetree}/Makefile ] || exerr "Your source tree in ${ezjail_sourcetree} seems to be incomplete (Makefile missing)."
|
|
|
|
# Normally fulljail should be renamed by past ezjail-admin commands.
|
|
# However those may have failed
|
|
[ -d "${ezjail_jailfull}" ] && chflags -R noschg ${ezjail_jailfull} && rm -rf ${ezjail_jailfull}
|
|
mkdir -p ${ezjail_jailfull} || exerr "Cannot create temporary Jail directory."
|
|
|
|
# make our world
|
|
cd ${ezjail_sourcetree} && make ${updatejail_installaction} DESTDIR=${ezjail_jailfull} || exerr "make ${updatejail_installaction} failed."
|
|
|
|
# setup world
|
|
cd ${ezjail_sourcetree}/etc && make distribution DESTDIR=${ezjail_jailfull} || exerr "make distribution failed."
|
|
|
|
# Fill basejail from installed world
|
|
cd ${ezjail_jailfull} || exerr "Cant access temporary Jail directory."
|
|
# This mkdir is important, since cpio will create intermediate
|
|
# directories with permission 0700 which is bad
|
|
mkdir -p ${ezjail_jailbase}/usr
|
|
for dir in bin boot lib libexec rescue sbin usr/bin usr/games usr/include usr/lib usr/libdata usr/libexec usr/sbin usr/src usr/share; do
|
|
find ${dir} | cpio -d -p -v ${ezjail_jailbase} || exerr "Installation of ${dir} failed."
|
|
chflags -R noschg ${dir}; rm -r ${dir}; ln -s /basejail/${dir} ${dir}
|
|
done
|
|
mkdir basejail
|
|
|
|
# Try to remove the old template jail
|
|
[ -d ${ezjail_template} ] && chflags -R noschg ${ezjail_jailtemplate} && rm -rf ${ezjail_jailtemplate}
|
|
mv ${ezjail_jailfull} ${ezjail_jailtemplate}
|
|
|
|
# If the default flavour example has not yet been copied, do it now
|
|
[ -d ${ezjail_flavours}/default ] || mkdir -p ${ezjail_flavours} && cp -p -R ${ezjail_examples}/default ${ezjail_flavours}
|
|
|
|
fi # installaction="none"
|
|
|
|
# The user may want to have a ports tree in basejail
|
|
if [ "${updatejail_provideports}" = "YES" ]; then
|
|
# if /usr/ports/CVS exists, assume cvs up is safe
|
|
if [ -f ${ezjail_jailbase}/usr/ports/CVS/Root ]; then
|
|
echo -n "Updating ports from "; cat ${ezjail_jailbase}/usr/ports/CVS/Root
|
|
echo "Gathering local information may take a while."
|
|
cd ${ezjail_jailbase}/usr/ports/ && cvs -d ${ezjail_portscvsroot} up -Pd
|
|
else
|
|
echo "Checking out ports from ${ezjail_portscvsroot}"
|
|
mkdir -p ${ezjail_jailbase}/usr/ports/
|
|
cd ${ezjail_jailbase}/usr/ && cvs -d ${ezjail_portscvsroot} co ports
|
|
fi
|
|
[ $? = 0 ] || exerr "Updating ports failed."
|
|
fi
|
|
|
|
# A ports collection inside jails is hardly useful w/o an appropriate
|
|
# /etc/make.conf. If we find basejail/usr/ports/Makefile, assume that
|
|
# the admin wants a working make.conf in new jails also a softlink to
|
|
# the ports in basejail is provided
|
|
if [ -f ${ezjail_jailbase}/usr/ports/Makefile ]; then
|
|
# no /usr/ports? link to /basejail/usr/ports
|
|
[ -e ${ezjail_jailtemplate}/usr/ports ] || ln -s /basejail/usr/ports ${ezjail_jailtemplate}/usr/ports
|
|
|
|
if [ -f ${ezjail_examples}/default/etc/make.conf -a ! -f ${ezjail_jailtemplate}/etc/make.conf ]; then
|
|
cp -p ${ezjail_examples}/default/etc/make.conf ${ezjail_jailtemplate}/etc/
|
|
echo "Note: a non-standard /etc/make.conf was copied to the template jail in order to get the ports collection running inside jails."
|
|
fi
|
|
fi
|
|
|
|
# The ugly perl hack[tm]. Note: we wont do such things for any given
|
|
# port :(
|
|
[ "${ezjail_uglyperlhack}" = "YES" -a ! -L ${ezjail_jailbase}/usr/bin/perl ] && ln -s /usr/local/bin/perl ${ezjail_jailbase}/usr/bin/perl
|
|
|
|
;;
|
|
######################## ezjail-admin CONFIG ########################
|
|
config)
|
|
shift
|
|
|
|
args=`getopt -r: $*` || exerr "Usage: `basename -- $0` config [-r run|norun] jailname"
|
|
|
|
ezjail_setrunnable=
|
|
|
|
set -- ${args}
|
|
for arg do
|
|
case ${arg} in
|
|
-r) ezjail_setrunnable=$1; shift 2;;
|
|
--) shift; break;;
|
|
esac
|
|
done
|
|
|
|
[ $# = 1 ] || exerr "Usage: `basename -- $0` config [-r run|norun] jailname"
|
|
|
|
# Jail name mandatory
|
|
fetchjailinfo $1
|
|
|
|
# check for existence of jail in our records
|
|
[ "${ezjail_jailconfig}" ] || exerr "Error: Nothing known about jail ${ezjail_name}."
|
|
|
|
# Nothing to be configured?
|
|
[ "${ezjail_setrunnable}" ] || echo "Warning: No config option specified."
|
|
|
|
case ${ezjail_setrunnable} in
|
|
run)
|
|
[ "${ezjail_config}" = "${ezjail_config%.norun}" ] || mv {ezjail_config} ${ezjail_config%.norun}
|
|
;;
|
|
norun)
|
|
[ "${ezjail_config}" = "${ezjail_config%.norun}" ] && mv {ezjail_config} ${ezjail_config}.norun
|
|
;;
|
|
esac
|
|
|
|
;;
|
|
*)
|
|
exerr "Usage: `basename -- $0` [config|create|delete|list|update] {params}"
|
|
;;
|
|
esac
|