Compare commits
28 Commits
setup_vnet
...
master
| Author | SHA1 | Date | |
|---|---|---|---|
| 4984e64e91 | |||
| 7711702256 | |||
| c49c2bbaeb | |||
| 6bb3d7110a | |||
|
|
cee6f20aa5 | ||
|
|
1a27a7e0d4 | ||
|
|
c7f46c3fbb | ||
|
|
bfe413e8ec | ||
|
|
9aeb0ea10c | ||
|
|
9f2cf6651b | ||
|
|
cb5697acdd | ||
|
|
09dcdd0ec7 | ||
|
|
b7b2efca12 | ||
|
|
e441850f81 | ||
|
|
87febb6407 | ||
|
|
3fff3d371d | ||
|
|
7750a1b927 | ||
|
|
ee96a206aa | ||
|
|
6568a28c15 | ||
|
|
4859b56050 | ||
|
|
1d14badc4a | ||
|
|
5faac5e7a4 | ||
|
|
19c8c021c4 | ||
|
|
9d55c2ceb0 | ||
|
|
6ca8ea578e | ||
|
|
3a4ebc63bb | ||
|
|
c627b1f7fa | ||
|
|
bce28bf89a |
@@ -47,7 +47,7 @@ EOL Releases
|
|||||||
------------
|
------------
|
||||||
|
|
||||||
It is sometimes necessary to run end-of-life releases for testing or legacy
|
It is sometimes necessary to run end-of-life releases for testing or legacy
|
||||||
application support. Dy default Bastille will only install supported releases
|
application support. By default Bastille will only install supported releases
|
||||||
but you can bootstrap EOL / unsupported releases with a simple trick.
|
but you can bootstrap EOL / unsupported releases with a simple trick.
|
||||||
|
|
||||||
.. code-block:: shell
|
.. code-block:: shell
|
||||||
|
|||||||
@@ -158,6 +158,18 @@ clone|config|cmd|console|convert|cp|edit|htop|limits|mount|pkg|rcp|rename|servic
|
|||||||
TARGET="${1}"
|
TARGET="${1}"
|
||||||
shift
|
shift
|
||||||
|
|
||||||
|
# This is needed to handle the special case of 'bastille rcp' and 'bastille cp' with the '-q' or '--quiet'
|
||||||
|
# option specified before the TARGET. Also seems the cp and rcp commands does not support ALL as a target, so
|
||||||
|
# that's why is handled here. Maybe this behaviour needs an improvement later. -- yaazkal
|
||||||
|
if { [ "${CMD}" = 'rcp' ] || [ "${CMD}" = 'cp' ]; } && \
|
||||||
|
{ [ "${TARGET}" = '-q' ] || [ "${TARGET}" = '--quiet' ]; }; then
|
||||||
|
TARGET="${1}"
|
||||||
|
JAILS="${TARGET}"
|
||||||
|
OPTION="-q"
|
||||||
|
export OPTION
|
||||||
|
shift
|
||||||
|
fi
|
||||||
|
|
||||||
if [ "${TARGET}" = 'ALL' ]; then
|
if [ "${TARGET}" = 'ALL' ]; then
|
||||||
target_all_jails
|
target_all_jails
|
||||||
elif [ "${CMD}" = "pkg" ] && [ "${TARGET}" = '-H' ] || [ "${TARGET}" = '--host' ]; then
|
elif [ "${CMD}" = "pkg" ] && [ "${TARGET}" = '-H' ] || [ "${TARGET}" = '--host' ]; then
|
||||||
|
|||||||
@@ -41,7 +41,7 @@ bastille_url_midnightbsd="https://www.midnightbsd.org/ftp/MidnightBSD/releases/"
|
|||||||
## ZFS options
|
## ZFS options
|
||||||
bastille_zfs_enable="" ## default: ""
|
bastille_zfs_enable="" ## default: ""
|
||||||
bastille_zfs_zpool="" ## default: ""
|
bastille_zfs_zpool="" ## default: ""
|
||||||
bastille_zfs_prefix="bastille" ## default: "${bastille_zfs_zpool}/bastille"
|
bastille_zfs_prefix="${bastille_zfs_zpool}/bastille" ## default: "${bastille_zfs_zpool}/bastille"
|
||||||
bastille_zfs_options="-o compress=lz4 -o atime=off" ## default: "-o compress=lz4 -o atime=off"
|
bastille_zfs_options="-o compress=lz4 -o atime=off" ## default: "-o compress=lz4 -o atime=off"
|
||||||
|
|
||||||
## Export/Import options
|
## Export/Import options
|
||||||
|
|||||||
@@ -3,7 +3,7 @@
|
|||||||
# Bastille jail startup script
|
# Bastille jail startup script
|
||||||
#
|
#
|
||||||
# PROVIDE: bastille
|
# PROVIDE: bastille
|
||||||
# REQUIRE: NETWORKING
|
# REQUIRE: jail
|
||||||
# KEYWORD: shutdown
|
# KEYWORD: shutdown
|
||||||
|
|
||||||
# Add the following to /etc/rc.conf[.local] to enable this service
|
# Add the following to /etc/rc.conf[.local] to enable this service
|
||||||
@@ -41,7 +41,7 @@ restart_cmd="bastille_stop && bastille_start"
|
|||||||
rcordered_list() {
|
rcordered_list() {
|
||||||
local _jailsdir
|
local _jailsdir
|
||||||
_jailsdir=$(. $bastille_conf; echo $bastille_jailsdir)
|
_jailsdir=$(. $bastille_conf; echo $bastille_jailsdir)
|
||||||
bastille_ordered_list=$(rcorder -s nostart ${_jailsdir}/*/jail.conf | xargs dirname | xargs basename | tr "\n" " ")
|
bastille_ordered_list=$(rcorder -s nostart ${_jailsdir}/*/jail.conf | xargs dirname | xargs basename -a | tr "\n" " ")
|
||||||
}
|
}
|
||||||
|
|
||||||
bastille_start()
|
bastille_start()
|
||||||
|
|||||||
@@ -45,7 +45,7 @@ esac
|
|||||||
bastille_root_check
|
bastille_root_check
|
||||||
|
|
||||||
#Validate if ZFS is enabled in rc.conf and bastille.conf.
|
#Validate if ZFS is enabled in rc.conf and bastille.conf.
|
||||||
if [ "$(sysrc -n zfs_enable)" = "YES" ] && checkyesno bastille_zfs_enable; then
|
if [ "$(sysrc -n zfs_enable)" = "YES" ] && ! checkyesno bastille_zfs_enable; then
|
||||||
warn "ZFS is enabled in rc.conf but not bastille.conf. Do you want to continue? (N|y)"
|
warn "ZFS is enabled in rc.conf but not bastille.conf. Do you want to continue? (N|y)"
|
||||||
read answer
|
read answer
|
||||||
case $answer in
|
case $answer in
|
||||||
|
|||||||
@@ -79,7 +79,8 @@ generate_vnet_jail_netblock() {
|
|||||||
## define uniq_epair
|
## define uniq_epair
|
||||||
local jail_list=$(bastille list jails)
|
local jail_list=$(bastille list jails)
|
||||||
if [ -n "${jail_list}" ]; then
|
if [ -n "${jail_list}" ]; then
|
||||||
local list_jails_num=$(echo "${jail_list}" | wc -l | awk '{print $1}')
|
# local list_jails_num=$(echo "${jail_list}" | wc -l | awk '{print $1}')
|
||||||
|
local list_jails_num=$(grep -e "e[0-9]b_bastille" "${bastille_jailsdir}"/*/jail.conf | grep -Eo '(bastille)([0-9]{1,3});' | grep -Eo '[0-9]{1,2}' | sort -hr | head -1 | awk '{print $1}')
|
||||||
local num_range=$((list_jails_num + 1))
|
local num_range=$((list_jails_num + 1))
|
||||||
for _num in $(seq 0 "${num_range}"); do
|
for _num in $(seq 0 "${num_range}"); do
|
||||||
if ! grep -q "e[0-9]b_bastille${_num}" "${bastille_jailsdir}"/*/jail.conf; then
|
if ! grep -q "e[0-9]b_bastille${_num}" "${bastille_jailsdir}"/*/jail.conf; then
|
||||||
@@ -112,7 +113,7 @@ EOF
|
|||||||
vnet;
|
vnet;
|
||||||
vnet.interface = e0b_${uniq_epair};
|
vnet.interface = e0b_${uniq_epair};
|
||||||
exec.prestart += "jib addm ${uniq_epair} ${external_interface}";
|
exec.prestart += "jib addm ${uniq_epair} ${external_interface}";
|
||||||
exec.prestart += "ifconfig e0a_${uniq_epair} description \"vnet host interface for Bastille jail ${jail_name}\"";
|
exec.prestart += "ifconfig e0a_${uniq_epair} description \'vnet host interface for Bastille jail ${jail_name}\'";
|
||||||
exec.poststop += "jib destroy ${uniq_epair}";
|
exec.poststop += "jib destroy ${uniq_epair}";
|
||||||
EOF
|
EOF
|
||||||
fi
|
fi
|
||||||
|
|||||||
@@ -82,6 +82,7 @@ for _jail in ${JAILS}; do
|
|||||||
if [ -n "${USER}" ]; then
|
if [ -n "${USER}" ]; then
|
||||||
validate_user
|
validate_user
|
||||||
else
|
else
|
||||||
|
check_fib
|
||||||
LOGIN="$(jexec -l "${_jail}" which login)"
|
LOGIN="$(jexec -l "${_jail}" which login)"
|
||||||
${_setfib} jexec -l "${_jail}" $LOGIN -f root
|
${_setfib} jexec -l "${_jail}" $LOGIN -f root
|
||||||
fi
|
fi
|
||||||
|
|||||||
@@ -165,10 +165,15 @@ EOF
|
|||||||
}
|
}
|
||||||
|
|
||||||
generate_jail_conf() {
|
generate_jail_conf() {
|
||||||
|
if [ "$(sysctl -n security.jail.jailed)" -eq 1 ]; then
|
||||||
|
devfs_ruleset_value=0
|
||||||
|
else
|
||||||
|
devfs_ruleset_value=4
|
||||||
|
fi
|
||||||
cat << EOF > "${bastille_jail_conf}"
|
cat << EOF > "${bastille_jail_conf}"
|
||||||
${NAME} {
|
${NAME} {
|
||||||
devfs_ruleset = 4;
|
|
||||||
enforce_statfs = 2;
|
enforce_statfs = 2;
|
||||||
|
devfs_ruleset = ${devfs_ruleset_value};
|
||||||
exec.clean;
|
exec.clean;
|
||||||
exec.consolelog = ${bastille_jail_log};
|
exec.consolelog = ${bastille_jail_log};
|
||||||
exec.start = '/bin/sh /etc/rc';
|
exec.start = '/bin/sh /etc/rc';
|
||||||
@@ -189,12 +194,17 @@ EOF
|
|||||||
}
|
}
|
||||||
|
|
||||||
generate_linux_jail_conf() {
|
generate_linux_jail_conf() {
|
||||||
|
if [ "$(sysctl -n security.jail.jailed)" -eq 1 ]; then
|
||||||
|
devfs_ruleset_value=0
|
||||||
|
else
|
||||||
|
devfs_ruleset_value=4
|
||||||
|
fi
|
||||||
cat << EOF > "${bastille_jail_conf}"
|
cat << EOF > "${bastille_jail_conf}"
|
||||||
${NAME} {
|
${NAME} {
|
||||||
host.hostname = ${NAME};
|
host.hostname = ${NAME};
|
||||||
mount.fstab = ${bastille_jail_fstab};
|
mount.fstab = ${bastille_jail_fstab};
|
||||||
path = ${bastille_jail_path};
|
path = ${bastille_jail_path};
|
||||||
devfs_ruleset = 4;
|
devfs_ruleset = ${devfs_ruleset_value};
|
||||||
enforce_statfs = 1;
|
enforce_statfs = 1;
|
||||||
|
|
||||||
exec.start = '/bin/true';
|
exec.start = '/bin/true';
|
||||||
@@ -212,11 +222,16 @@ EOF
|
|||||||
}
|
}
|
||||||
|
|
||||||
generate_vnet_jail_conf() {
|
generate_vnet_jail_conf() {
|
||||||
|
if [ "$(sysctl -n security.jail.jailed)" -eq 1 ]; then
|
||||||
|
devfs_ruleset_value=0
|
||||||
|
else
|
||||||
|
devfs_ruleset_value=13
|
||||||
|
fi
|
||||||
NETBLOCK=$(generate_vnet_jail_netblock "$NAME" "${VNET_JAIL_BRIDGE}" "${bastille_jail_conf_interface}")
|
NETBLOCK=$(generate_vnet_jail_netblock "$NAME" "${VNET_JAIL_BRIDGE}" "${bastille_jail_conf_interface}")
|
||||||
cat << EOF > "${bastille_jail_conf}"
|
cat << EOF > "${bastille_jail_conf}"
|
||||||
${NAME} {
|
${NAME} {
|
||||||
devfs_ruleset = 13;
|
|
||||||
enforce_statfs = 2;
|
enforce_statfs = 2;
|
||||||
|
devfs_ruleset = ${devfs_ruleset_value};
|
||||||
exec.clean;
|
exec.clean;
|
||||||
exec.consolelog = ${bastille_jail_log};
|
exec.consolelog = ${bastille_jail_log};
|
||||||
exec.start = '/bin/sh /etc/rc';
|
exec.start = '/bin/sh /etc/rc';
|
||||||
|
|||||||
@@ -212,7 +212,7 @@ if [ -n "${TXZ_EXPORT}" -o -n "${TGZ_EXPORT}" ] && [ -n "${SAFE_EXPORT}" ]; then
|
|||||||
error_exit "Error: Simple archive modes with safe ZFS export can't be used together."
|
error_exit "Error: Simple archive modes with safe ZFS export can't be used together."
|
||||||
fi
|
fi
|
||||||
|
|
||||||
if checkyesno bastille_zfs_enable; then
|
if ! checkyesno bastille_zfs_enable; then
|
||||||
if [ -n "${GZIP_EXPORT}" -o -n "${RAW_EXPORT}" -o -n "${SAFE_EXPORT}" -o "${OPT_ZSEND}" = "-Rv" ]; then
|
if [ -n "${GZIP_EXPORT}" -o -n "${RAW_EXPORT}" -o -n "${SAFE_EXPORT}" -o "${OPT_ZSEND}" = "-Rv" ]; then
|
||||||
error_exit "Options --gz, --raw, --safe, --verbose are valid for ZFS configured systems only."
|
error_exit "Options --gz, --raw, --safe, --verbose are valid for ZFS configured systems only."
|
||||||
fi
|
fi
|
||||||
|
|||||||
@@ -28,8 +28,9 @@
|
|||||||
# OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
# OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
|
||||||
# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
|
||||||
|
|
||||||
|
bastille_config="/usr/local/etc/bastille/bastille.conf"
|
||||||
. /usr/local/share/bastille/common.sh
|
. /usr/local/share/bastille/common.sh
|
||||||
. /usr/local/etc/bastille/bastille.conf
|
. ${bastille_config}
|
||||||
|
|
||||||
usage() {
|
usage() {
|
||||||
error_exit "Usage: bastille setup [pf|bastille0|zfs|vnet]"
|
error_exit "Usage: bastille setup [pf|bastille0|zfs|vnet]"
|
||||||
@@ -111,8 +112,8 @@ configure_zfs() {
|
|||||||
else
|
else
|
||||||
## attempt to determine bastille_zroot from `zpool list`
|
## attempt to determine bastille_zroot from `zpool list`
|
||||||
bastille_zroot=$(zpool list | grep -v NAME | awk '{print $1}')
|
bastille_zroot=$(zpool list | grep -v NAME | awk '{print $1}')
|
||||||
sysrc -f "${bastille_prefix}/bastille.conf" bastille_zfs_enable=YES
|
sysrc -f "${bastille_config}" bastille_zfs_enable=YES
|
||||||
sysrc -f "${bastille_prefix}/bastille.conf" bastille_zfs_zpool="${bastille_zroot}"
|
sysrc -f "${bastille_config}" bastille_zfs_zpool="${bastille_zroot}"
|
||||||
fi
|
fi
|
||||||
}
|
}
|
||||||
|
|
||||||
|
|||||||
Reference in New Issue
Block a user