2018-06-21 14:10:53 +00:00
|
|
|
#!/bin/bash
|
|
|
|
|
|
|
|
if [ ${DIB_DEBUG_TRACE:-1} -gt 0 ]; then
|
|
|
|
set -x
|
|
|
|
fi
|
|
|
|
set -eu
|
|
|
|
set -o pipefail
|
|
|
|
|
2018-09-24 07:34:22 +00:00
|
|
|
# This would only not be here if there was no kmod package installed,
|
|
|
|
# which can happen in some container situations. Obviously
|
|
|
|
# blacklisting a kernel module is not really useful; however allowing
|
|
|
|
# this to work can allow modules that do other things that *are*
|
|
|
|
# useful for a container to "just work" without a whole bunch of
|
|
|
|
# refactoring.
|
2019-12-18 16:26:17 +00:00
|
|
|
if [ ! -d $TMP_MOUNT_PATH/etc/modprobe.d ]; then
|
2018-09-24 07:34:22 +00:00
|
|
|
# ^ so we can see in the logs if we took this path ...
|
2019-12-18 16:26:17 +00:00
|
|
|
sudo mkdir -p $TMP_MOUNT_PATH/etc/modprobe.d
|
2018-09-24 07:34:22 +00:00
|
|
|
fi
|
|
|
|
|
2018-06-21 14:10:53 +00:00
|
|
|
# copy all modprobe.d snippets to /etc/modprobe.d
|
|
|
|
|
|
|
|
eval declare -A image_elements=($(get_image_element_array))
|
|
|
|
|
|
|
|
for i in "${!image_elements[@]}"; do
|
|
|
|
element=$i
|
|
|
|
element_dir=${image_elements[$i]}
|
|
|
|
|
|
|
|
if [ -d "${element_dir}/modprobe.d/" ]; then
|
|
|
|
sudo cp ${element_dir}/modprobe.d/*.conf $TMP_MOUNT_PATH/etc/modprobe.d/
|
|
|
|
fi
|
|
|
|
done
|