2013-02-11 04:01:36 +00:00
|
|
|
#!/bin/bash
|
|
|
|
# These are useful, or at worst not harmful, for all images we build.
|
|
|
|
|
2014-09-04 04:56:29 +00:00
|
|
|
if [ ${DIB_DEBUG_TRACE:-1} -gt 0 ]; then
|
|
|
|
set -x
|
|
|
|
fi
|
|
|
|
set -eu
|
2014-04-03 02:24:15 +00:00
|
|
|
set -o pipefail
|
2013-02-11 04:01:36 +00:00
|
|
|
|
|
|
|
[ -n "$ARCH" ]
|
|
|
|
[ -n "$TARGET_ROOT" ]
|
|
|
|
|
2013-04-21 20:31:51 +00:00
|
|
|
shopt -s extglob
|
|
|
|
|
2014-05-02 18:53:25 +00:00
|
|
|
DIB_RELEASE=${DIB_RELEASE:-trusty}
|
2022-03-16 12:21:23 +00:00
|
|
|
DIB_CLOUD_IMAGES=${DIB_CLOUD_IMAGES:-https://cloud-images.ubuntu.com/$DIB_RELEASE/current}
|
2021-11-10 22:09:21 +00:00
|
|
|
if [ $DIB_RELEASE != "trusty" ] ; then
|
2018-05-15 10:42:31 +00:00
|
|
|
BASE_IMAGE_FILE=${BASE_IMAGE_FILE:-$DIB_RELEASE-server-cloudimg-$ARCH.squashfs}
|
|
|
|
else
|
|
|
|
BASE_IMAGE_FILE=${BASE_IMAGE_FILE:-$DIB_RELEASE-server-cloudimg-$ARCH-root.tar.gz}
|
|
|
|
fi
|
2018-05-15 21:12:59 +00:00
|
|
|
SHA256SUMS=${SHA256SUMS:-https://${DIB_CLOUD_IMAGES##http?(s)://}/SHA256SUMS}
|
2013-09-19 13:50:48 +00:00
|
|
|
CACHED_FILE=$DIB_IMAGE_CACHE/$BASE_IMAGE_FILE
|
2017-10-22 16:16:04 +00:00
|
|
|
CACHED_FILE_LOCK=$DIB_LOCKFILES/$BASE_IMAGE_FILE.lock
|
2014-04-16 21:09:02 +00:00
|
|
|
CACHED_SUMS=$DIB_IMAGE_CACHE/SHA256SUMS.ubuntu.$DIB_RELEASE.$ARCH
|
2013-02-11 04:01:36 +00:00
|
|
|
|
2014-07-18 08:50:42 +00:00
|
|
|
function get_ubuntu_tarball() {
|
2021-11-10 22:09:21 +00:00
|
|
|
if [ -n "$DIB_LOCAL_IMAGE" ] ; then
|
|
|
|
echo "Using local image without download"
|
|
|
|
if [ ! -f "$DIB_LOCAL_IMAGE" ] ; then
|
|
|
|
echo "Unable to find image $DIB_LOCAL_IMAGE locally! Check path and file name to source image"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
IMAGE_PATH=$DIB_LOCAL_IMAGE
|
2021-10-15 05:40:46 +00:00
|
|
|
else
|
2021-11-10 22:09:21 +00:00
|
|
|
if [ -n "$DIB_OFFLINE" -a -f "$CACHED_FILE" ] ; then
|
|
|
|
echo "Not checking freshness of cached $CACHED_FILE."
|
|
|
|
else
|
|
|
|
echo "Fetching Base Image"
|
|
|
|
$TMP_HOOKS_PATH/bin/cache-url $SHA256SUMS $CACHED_SUMS
|
|
|
|
$TMP_HOOKS_PATH/bin/cache-url \
|
|
|
|
$DIB_CLOUD_IMAGES/$BASE_IMAGE_FILE $CACHED_FILE
|
|
|
|
pushd $DIB_IMAGE_CACHE
|
2014-07-18 08:50:42 +00:00
|
|
|
if ! grep "$BASE_IMAGE_FILE" $CACHED_SUMS | sha256sum --check - ; then
|
2021-10-15 05:40:46 +00:00
|
|
|
$TMP_HOOKS_PATH/bin/cache-url -f \
|
|
|
|
$DIB_CLOUD_IMAGES/$BASE_IMAGE_FILE $CACHED_FILE
|
|
|
|
grep "$BASE_IMAGE_FILE" $CACHED_SUMS | sha256sum --check -
|
2014-07-18 08:50:42 +00:00
|
|
|
fi
|
2014-07-08 20:07:58 +00:00
|
|
|
fi
|
2021-11-10 22:09:21 +00:00
|
|
|
IMAGE_PATH=$DIB_IMAGE_CACHE/$BASE_IMAGE_FILE
|
2014-04-16 21:09:02 +00:00
|
|
|
fi
|
2014-07-18 08:50:42 +00:00
|
|
|
# Extract the base image (use --numeric-owner to avoid UID/GID mismatch between
|
|
|
|
# image tarball and host OS e.g. when building Ubuntu image on an openSUSE host)
|
2021-11-10 22:09:21 +00:00
|
|
|
if [ "$DIB_RELEASE" != "trusty" ] ; then
|
|
|
|
sudo unsquashfs -f -d $TARGET_ROOT $IMAGE_PATH
|
2018-05-15 10:42:31 +00:00
|
|
|
else
|
2021-11-10 22:09:21 +00:00
|
|
|
sudo tar -C $TARGET_ROOT --numeric-owner -xzf $IMAGE_PATH
|
2018-05-15 10:42:31 +00:00
|
|
|
fi
|
2014-07-18 08:50:42 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
(
|
|
|
|
echo "Getting $CACHED_FILE_LOCK: $(date)"
|
|
|
|
# Wait up to 20 minutes for another process to download
|
|
|
|
if ! flock -w 1200 9 ; then
|
|
|
|
echo "Did not get $CACHED_FILE_LOCK: $(date)"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
get_ubuntu_tarball
|
|
|
|
) 9> $CACHED_FILE_LOCK
|