1 # chrootsetup_dragonfly.sh
3 # This file SHOULD NOT be executable! It is sourced by jailsetup.sh and
4 # SHOULD NOT be executed directly!
6 # On entry the current directory will be set to the top of the chroot
7 # This script must perform platform-specific chroot setup which includes
8 # creating any dev device entries, setting up proc (if needed), setting
9 # up lib64 (if needed) as well as installing a basic set of whatever libraries
10 # are needed for a chroot to function on this platform.
12 # This script must also define a pull_in_bin function that may be called to
13 # install an executable together with any libraries it depends on into the
16 # Finally this script must install a suitable nc.openbsd compatible version of
17 # netcat into the chroot jail that's available as nc.openbsd and which supports
18 # connects to unix sockets.
20 # We are designed to set up the chroot based on binaries from
21 # x86_64 DragonFly BSD 4.4; some things may need slight modifications if
22 # being run on a different distribution.
24 # We require update_pwd_db to be set to work properly on DragonFly BSD
25 [ -n "$cfg_update_pwd_db" -a "$cfg_update_pwd_db" != "0" ] ||
{
26 echo 'error: Config.pm must set $update_pwd_db to 1 to use a DragonFly BSD jail' >&2
36 mkdir
-p libexec var
/tmp
38 # Install the devfsctl chroot ruleset
40 cat "$curdir/fstab/devfsctl_chroot_ruleset" > etc
/devfs.conf
41 chown
0:0 etc
/devfs.conf
42 chmod 0444 etc
/devfs.conf
45 # use cpio to avoid setting flags
46 # must NOT use passthrough mode as that will set flags on newer systems
47 (cd "$(dirname "$1")" && echo "$(basename "$1")" | \
48 cpio -o -L 2>/dev
/null|
{ cd "$chroot_dir/${2%/*}" && cpio -i -m -u; } 2>/dev
/null
)
49 if [ "${2%/*}" != "${2%/}" ]; then
50 mv -f "$chroot_dir/${2%/*}/$(basename "$1")" \
51 "$chroot_dir/${2%/*}/$(basename "$2")"
55 # Bring in basic libraries:
58 cp_p
/libexec
/ld-elf.so
.2 libexec
62 dst
="${2%/}/$(basename "$1")"
63 if [ ! -e "$dst" ] ||
[ "$1" -nt "$dst" ]; then
65 for llib
in $
(ldd
"$1" |
grep '=>' |
awk '{print $3}'); do
66 (pull_in_lib
"$llib" lib
)
72 # pull_in_bin takes two arguments:
73 # 1: the full path to a binary to pull in (together with any library dependencies)
74 # 2: the destination directory relative to the current directory to copy it to which
75 # MUST already exist with optional alternate name if the name in the chroot should be different
76 # 3: optional name of binary that if already in $2 and the same as $1 hard link to instead
77 # for example, "pull_in_bin /bin/sh bin" will install the shell into the chroot bin directory
78 # for example, "pull_in_bin /bin/bash bin/sh" will install bash as the chroot bin/sh
79 # IMPORTANT: argument 1 must be a machine binary, NOT a shell script or other interpreted text
80 # IMPORTANT: text scripts can simply be copied in or installed as they don't have libraries to copy
81 # NOTE: it's expected that calling this function on a running chroot may cause temporary disruption
82 # In order to avoid a busy error while replacing binaries we first copy the binary to the
83 # var/tmp directory and then force move it into place after the libs have been brought in.
86 if [ -d "${bdst%/}" ]; then
87 bnam
="$(basename "$bin")"
90 bnam
="$(basename "$bdst")"
93 if [ -n "$3" ] && [ "$3" != "$bnam" ] && \
94 [ -r "$bdst/$3" -a -x "$bdst/$3" ] && cmp -s "$bin" "$bdst/$3"; then
95 ln -f "$bdst/$3" "$bdst/$bnam"
99 # ...and all the dependencies.
100 for lib
in $
(ldd
"$bin" |
grep '=>' |
awk '{print $3}'); do
101 pull_in_lib
"$lib" lib
103 mv -f "var/tmp/$(basename "$bin")" "$bdst/$bnam"
106 # A catch all that needs to be called after everything's been pulled in
107 chroot_update_permissions
() {
109 [ -n "$chroot_dir" -a "$chroot_dir" != "/" ] ||
{ echo bad
'$chroot_dir' >&2; exit 2; }
110 cd "$chroot_dir" ||
{ echo bad
'$chroot_dir' >&2; exit 2; }
112 chown
-R 0:0 bin lib sbin var libexec
113 # bootstrap the master.passwd database
114 rm -f etc
/master.passwd etc
/pwd.db etc
/spwd.db
115 awk -F ':' '{ print $1 ":" $2 ":" $3 ":" $4 "::0:0:" $5 ":" $6 ":" $7 }' < etc
/passwd
> etc
/master.passwd
116 PW_SCAN_BIG_IDS
=1 pwd_mkdb
-d etc etc
/master.passwd
2>/dev
/null
117 chown
$cfg_mirror_user:$cfg_owning_group etc
/master.passwd etc
/pwd.db etc
/spwd.db
118 chmod 0664 etc
/master.passwd etc
/pwd.db etc
/spwd.db
121 # the nc.openbsd compatible utility is available as $Girocco::Config::nc_openbsd_bin
122 pull_in_bin
"$(command -v "$cfg_nc_openbsd_bin")" bin
/nc.openbsd