Sign Up
Log In
Log In
or
Sign Up
Places
All Projects
Status Monitor
Collapse sidebar
Virtualization:Appliances:SelfContained:fedora
box
_service:obs_scm:images.sh
Overview
Repositories
Revisions
Requests
Users
Attributes
Meta
File _service:obs_scm:images.sh of Package box
#!/bin/bash run_kiwi=/usr/local/bin/run_kiwi tail -n +9 "$0" >"${run_kiwi}" && chmod 755 "${run_kiwi}" exit $? # The code of interest starts here #!/bin/bash set -x exec &>/dev/console function run_build { # """ # Run kiwi and the bundler # """ local options local logfile=/bundle/result.log local exit_code_file=/bundle/result.code if type setenforce &>/dev/null; then # for SELinux managed systems the enforcing rule # set does not allow to e.g create a new rpm database. # Also other restrictions drives us crazy when building # images. Therefore in the boxes we don't need this # sort of security setenforce 0 fi echo 1 > "${exit_code_file}" rm -rf /result options=$(cut -f2 -d\" /proc/cmdline) options="${options} --description /description --target-dir /result" if kiwi-ng --logfile "${logfile}" ${options}; then kiwi-ng result bundle --id 0 --target-dir /result --bundle-dir /bundle fi echo $? > "${exit_code_file}" } function wait_network { # """ # even though this program is called in a systemd unit that # requires the network-online target there could be a delay # in the network online status between the host and the guest. # This means the guest could be online while the host/guest # network negotiation is still not done. # """ local sleep_timeout=2 local retry_count=5 local check=0 echo "Waiting for link up on lan0..." while true;do if ip link ls lan0 | grep -qi "state UP"; then # interface link is up break fi if [ "${check}" -eq "${retry_count}" ];then # interface link did not came up exit 1 fi echo "Waiting for link up on lan0..." check=$((check + 1)) sleep "${sleep_timeout}" done } function mount_shared_path { # """ # mount shared host path identified by given mount tag # """ local path=$1 local tag=$2 local ssh_host_path declare sharing_backend=${sharing_backend} declare host_kiwidescription=${host_kiwidescription} declare host_kiwibundle=${host_kiwibundle} declare host_custompath=${host_custompath} if mountpoint -q "${path}"; then return fi mkdir -p "${path}" if [ "${sharing_backend}" = "virtiofs" ];then mount -t virtiofs "${tag}" "${path}" elif [ "${sharing_backend}" = "sshfs" ];then # The kiwi boxbuild code forwards the host ssh port # here to port HOST_SSH_PORT_FORWARDED_TO_BOX(10000) if waitport 10000; then if [ "${tag}" = "kiwidescription" ];then ssh_host_path=${host_kiwidescription} fi if [ "${tag}" = "kiwibundle" ];then ssh_host_path=${host_kiwibundle} fi if [ "${tag}" = "custompath" ];then ssh_host_path=${host_custompath} fi # Without the box pubkey added to the authorized_keys # file on the host, the following call will be # interactively asking for credentials. while ! sshfs -p 10000 \ -o "idmap=user" \ -o "StrictHostKeyChecking=accept-new" \ "${ssh_host_path}" "${path}"; do sleep 2 done fi else mount -t 9p -o "trans=virtio,version=9p2000.L" "${tag}" "${path}" fi } function import_box_overlay_files { # """ # Import optional boxroot overlay tree into box system # Also make sure there is .gnupg directory for the root # user created # """ if [ -d /description/boxroot ];then rsync -zav /description/boxroot/ / fi # make sure it's possible to create a GPG keyring # used for apt repo keys as an example mkdir -p /root/.gnupg chmod 700 /root/.gnupg } function import_box_environment { # """ # Import optional etc/boxprofile into runtime environment # """ if [ -e /etc/boxprofile ];then source /etc/boxprofile fi } function import_box_variables { # """ # Box variables are those which uses the =_*_ notation # """ # shellcheck disable=SC2002,SC2046 eval export $( cat /proc/cmdline | \ tr " " "\n" | grep "=_" | sed -e "s@=_@=@" | sed -e "s@_\$@@" ) } function import_ssh_pub_key { rm -f /run/nologin declare ssh_key=${ssh_key} declare ssh_key_type=${ssh_key_type} if [ -n "${ssh_key}" ];then mkdir -p /root/.ssh echo "${ssh_key_type} ${ssh_key}" >> /root/.ssh/authorized_keys chmod 600 /root/.ssh/authorized_keys fi } function waitport { while ! nc -z localhost $1 ; do sleep 1 ; done } function finish { if ! grep -q kiwi-no-halt /proc/cmdline; then halt -p fi } # main declare custom_mount=${custom_mount} declare kiwi_version=${kiwi_version} trap finish EXIT import_box_variables import_ssh_pub_key wait_network if ! mount_shared_path "/description" "kiwidescription"; then exit 1 fi if ! mount_shared_path "/bundle" "kiwibundle"; then exit 1 fi if [ -n "${custom_mount}" ]; then if ! mount_shared_path "${custom_mount}" "custompath"; then exit 1 fi fi import_box_overlay_files import_box_environment if [ -n "${kiwi_version}" ]; then if ! pip3 install --break-system-packages kiwi=="${kiwi_version}"; then exit 1 fi fi run_build
Locations
Projects
Search
Status Monitor
Help
OpenBuildService.org
Documentation
API Documentation
Code of Conduct
Contact
Support
@OBShq
Terms
openSUSE Build Service is sponsored by
The Open Build Service is an
openSUSE project
.
Sign Up
Log In
Places
Places
All Projects
Status Monitor