install.sh: expand @cfg_name@ in processed scripts
[girocco.git] / chrootsetup_dragonfly.sh
blob77e146e6c660c6b3c5f9887e2ea109bb2a254685
1 # chrootsetup_dragonfly.sh
3 # This file SHOULD NOT be executable! It is sourced by jailsetup.sh and
4 # SHOULD NOT be executed directly!
6 # On entry the current directory will be set to the top of the chroot
7 # This script must perform platform-specific chroot setup which includes
8 # creating any dev device entries, setting up proc (if needed), setting
9 # up lib64 (if needed) as well as installing a basic set of whatever libraries
10 # are needed for a chroot to function on this platform.
12 # This script must also define a pull_in_bin function that may be called to
13 # install an executable together with any libraries it depends on into the
14 # chroot.
16 # Finally this script must install a suitable nc.openbsd compatible version of
17 # netcat into the chroot jail that's available as nc.openbsd and which supports
18 # connections to unix sockets.
20 # We are designed to set up the chroot based on binaries from
21 # x86_64 DragonFly BSD 4.4; some things may need slight modifications if
22 # being run on a different distribution.
24 # We require update_pwd_db to be set to work properly on DragonFly BSD
25 [ -n "$cfg_update_pwd_db" ] && [ "$cfg_update_pwd_db" != "0" ] || {
26 echo 'error: Config.pm must set $update_pwd_db to 1 to use a DragonFly BSD jail' >&2
27 exit 1
30 chroot_dir="$(pwd)"
32 mkdir -p dev proc
33 chown 0:0 dev proc
35 # Extra directories
36 mkdir -p libexec var/tmp
38 # Install the devfsctl chroot ruleset
39 rm -f etc/devfs.conf
40 cat "$curdir/fstab/devfsctl_chroot_ruleset" >etc/devfs.conf
41 chown 0:0 etc/devfs.conf
42 chmod 0444 etc/devfs.conf
44 # Make sure there's an auth.conf file, empty is fine
45 if ! [ -e etc/auth.conf ]; then
46 >etc/auth.conf
47 chown 0:0 etc/auth.conf
48 chmod 0444 etc/auth.conf
51 cp_p() {
52 # use cpio to avoid setting flags
53 # must NOT use passthrough mode as that will set flags on newer systems
54 [ "$2" = "${2%/}/" ] || ! [ -d "$chroot_dir/$2" ] || set -- "$1" "$2/"
55 (cd "$(dirname "$1")" && echo "$(basename "$1")" |
56 cpio -o -L 2>/dev/null | { cd "$chroot_dir/${2%/*}" && cpio -i -m -u; } 2>/dev/null)
57 test $? -eq 0
58 if [ "${2%/*}" != "${2%/}" ]; then
59 mv -f "$chroot_dir/${2%/*}/$(basename "$1")" \
60 "$chroot_dir/${2%/*}/$(basename "$2")"
64 fixup_lib()
66 for _l in "$@"; do
67 test -f "$_l" || return 0
68 if test -x "$_l"; then
69 chmod 0755 "$_l"
70 else
71 chmod 0644 "$_l"
73 done
74 return 0
77 # Bring in basic libraries:
78 rm -f lib/* libexec/*
79 # ld-elf.so.2:
80 cp_p /libexec/ld-elf.so.2 libexec/
81 fixup_lib "libexec/ld-elf.so.2"
83 pull_in_lib() {
84 [ -f "$1" ] || return
85 dst="${2%/}/$(basename "$1")"
86 if [ ! -e "$dst" ] || [ "$1" -nt "$dst" ]; then
87 cp_p "$1" "$dst"
88 fixup_lib "$dst"
89 for llib in $(ldd "$1" | grep '=>' | LC_ALL=C awk '{print $3}'); do
90 (pull_in_lib "$llib" lib)
91 test $? -eq 0
92 done
97 # pull_in_bin takes two arguments:
98 # 1: the full path to a binary to pull in (together with any library dependencies)
99 # 2: the destination directory relative to the current directory to copy it to which
100 # MUST already exist with optional alternate name if the name in the chroot should be different
101 # 3: optional name of binary that if already in $2 and the same as $1 hard link to instead
102 # for example, "pull_in_bin /bin/sh bin" will install the shell into the chroot bin directory
103 # for example, "pull_in_bin /bin/bash bin/sh" will install bash as the chroot bin/sh
104 # IMPORTANT: argument 1 must be a machine binary, NOT a shell script or other interpreted text
105 # IMPORTANT: text scripts can simply be copied in or installed as they don't have libraries to copy
106 # NOTE: it's expected that calling this function on a running chroot may cause temporary disruption
107 # In order to avoid a busy error while replacing binaries we first copy the binary to the
108 # var/tmp directory and then force move it into place after the libs have been brought in.
109 pull_in_bin() {
110 bin="$1"; bdst="$2"
111 if [ -d "${bdst%/}" ]; then
112 bnam="$(basename "$bin")"
113 bdst="${bdst%/}"
114 else
115 bnam="$(basename "$bdst")"
116 bdst="${bdst%/*}"
118 if [ -n "$3" ] && [ "$3" != "$bnam" ] &&
119 [ -r "$bdst/$3" ] && [ -x "$bdst/$3" ] && cmp -s "$bin" "$bdst/$3"; then
120 ln -f "$bdst/$3" "$bdst/$bnam"
121 return 0
123 cp_p "$bin" var/tmp/
124 # ...and all the dependencies.
125 for lib in $(ldd "$bin" | grep '=>' | LC_ALL=C awk '{print $3}'); do
126 pull_in_lib "$lib" lib
127 done
128 chmod 0755 "var/tmp/$(basename "$bin")"
129 mv -f "var/tmp/$(basename "$bin")" "$bdst/$bnam"
132 # A catch all that needs to be called after everything's been pulled in
133 chroot_update_permissions() {
134 # Be paranoid
135 [ -n "$chroot_dir" ] && [ "$chroot_dir" != "/" ] || { echo bad '$chroot_dir' >&2; exit 2; }
136 cd "$chroot_dir" || { echo bad '$chroot_dir' >&2; exit 2; }
137 rm -rf var/tmp
138 chown -R 0:0 bin lib sbin var libexec
139 # bootstrap the master.passwd database
140 rm -f etc/master.passwd etc/pwd.db etc/spwd.db
141 LC_ALL=C awk -F ':' '{ print $1 ":" $2 ":" $3 ":" $4 "::0:0:" $5 ":" $6 ":" $7 }' <etc/passwd >etc/master.passwd
142 PW_SCAN_BIG_IDS=1 pwd_mkdb -d etc etc/master.passwd 2>/dev/null
143 chown $cfg_mirror_user:$cfg_owning_group etc/master.passwd etc/pwd.db etc/spwd.db
144 chmod 0664 etc/master.passwd etc/pwd.db etc/spwd.db
147 # the nc.openbsd compatible utility is available as $var_nc_openbsd_bin
148 pull_in_bin "$var_nc_openbsd_bin" bin/nc.openbsd