2014-02-18 22:14:43 +00:00
|
|
|
#!/bin/bash
|
|
|
|
|
|
|
|
# Intended to be called from the root.d cloud-image script as follows:
|
|
|
|
# $TMP_HOOKS_PATH/bin/extract-image $BASE_IMAGE_FILE $BASE_IMAGE_TAR $IMAGE_LOCATION $CACHED_IMAGE
|
|
|
|
|
2014-09-04 04:56:29 +00:00
|
|
|
if [ ${DIB_DEBUG_TRACE:-0} -gt 0 ]; then
|
|
|
|
set -x
|
|
|
|
fi
|
2014-02-18 22:14:43 +00:00
|
|
|
set -eu
|
2014-04-03 02:24:15 +00:00
|
|
|
set -o pipefail
|
2014-02-18 22:14:43 +00:00
|
|
|
|
|
|
|
BASE_IMAGE_FILE=$1
|
|
|
|
BASE_IMAGE_TAR=$2
|
|
|
|
IMAGE_LOCATION=$3
|
|
|
|
CACHED_IMAGE=$4
|
|
|
|
|
|
|
|
CACHED_TAR=$DIB_IMAGE_CACHE/$BASE_IMAGE_TAR
|
|
|
|
DIB_LOCAL_IMAGE=${DIB_LOCAL_IMAGE:-""}
|
2014-07-22 18:52:33 +00:00
|
|
|
TAR_LOCK=$CACHED_TAR.lock
|
2014-02-18 22:14:43 +00:00
|
|
|
|
2022-02-24 20:05:27 +00:00
|
|
|
# GPT GUIDs of interest.
|
|
|
|
# See https://en.wikipedia.org/wiki/GUID_Partition_Table#Partition_type_GUIDs
|
|
|
|
# also https://systemd.io/BOOT_LOADER_SPECIFICATION/
|
|
|
|
GUID_EFI="c12a7328-f81f-11d2-ba4b-00a0c93ec93b"
|
|
|
|
GUID_LINUX_BOOT="bc13c2ff-59e6-4262-a352-b275fd6f7172"
|
|
|
|
|
2014-07-22 18:52:33 +00:00
|
|
|
function extract_image() {
|
|
|
|
if [ -n "$DIB_OFFLINE" -a -f "$CACHED_TAR" ] ; then
|
|
|
|
echo "Not checking freshness of cached $CACHED_TAR."
|
|
|
|
else
|
|
|
|
if [ -z "$DIB_LOCAL_IMAGE" ]; then
|
|
|
|
echo "Fetching Base Image"
|
2014-02-18 22:14:43 +00:00
|
|
|
|
2014-07-22 18:52:33 +00:00
|
|
|
# There seems to be some bad Fedora mirrors returning http 404's for the cloud image.
|
|
|
|
# If the image fails to download due to a 404 we retry once.
|
|
|
|
set +e
|
2014-02-18 22:14:43 +00:00
|
|
|
$TMP_HOOKS_PATH/bin/cache-url $IMAGE_LOCATION $CACHED_IMAGE
|
2014-07-22 18:52:33 +00:00
|
|
|
RV=$?
|
|
|
|
set -e
|
|
|
|
|
|
|
|
if [ "$RV" == "44" ] ; then
|
|
|
|
$TMP_HOOKS_PATH/bin/cache-url $IMAGE_LOCATION $CACHED_IMAGE
|
|
|
|
elif [ "$RV" != "0" ] ; then
|
|
|
|
exit 1
|
|
|
|
fi
|
2014-07-03 01:49:38 +00:00
|
|
|
fi
|
|
|
|
|
2014-07-22 18:52:33 +00:00
|
|
|
if [ ! -f $CACHED_TAR -o \
|
|
|
|
$CACHED_IMAGE -nt $CACHED_TAR ] ; then
|
|
|
|
echo "Repacking base image as tarball."
|
2014-09-02 04:30:56 +00:00
|
|
|
|
|
|
|
WORKING=$(mktemp --tmpdir=${TMP_DIR:-/tmp} -d)
|
2014-07-22 18:52:33 +00:00
|
|
|
EACTION="rm -r $WORKING"
|
|
|
|
trap "$EACTION" EXIT
|
|
|
|
echo "Working in $WORKING"
|
2014-09-02 04:30:56 +00:00
|
|
|
|
2015-04-21 08:36:33 +00:00
|
|
|
RAW_FILE=$(mktemp --tmpdir=$WORKING XXXXXX.raw)
|
2014-09-02 04:30:56 +00:00
|
|
|
|
2015-09-16 15:31:27 +00:00
|
|
|
if [ "${CACHED_IMAGE: -3}" == ".xz" ] ; then
|
|
|
|
QCOW2_FILE=$(mktemp --tmpdir=$WORKING XXXXXX.qcow2)
|
|
|
|
# This leaves the old image in place so cache-url wont get it again
|
|
|
|
unxz --stdout $CACHED_IMAGE > $QCOW2_FILE
|
|
|
|
CACHED_IMAGE=$QCOW2_FILE
|
|
|
|
fi
|
|
|
|
|
2015-04-21 08:36:33 +00:00
|
|
|
qemu-img convert -f qcow2 -O raw $CACHED_IMAGE $RAW_FILE
|
2014-07-22 18:52:33 +00:00
|
|
|
|
|
|
|
# kpartx fails if no /dev/loop* exists, "losetup -f" prints first unused
|
|
|
|
# loop device and creates it if it doesn't exist
|
2022-02-24 20:05:27 +00:00
|
|
|
LOOPDEV_BASE=$(basename $(sudo losetup -f))
|
|
|
|
|
|
|
|
# add partition mappings
|
|
|
|
sudo kpartx -av $RAW_FILE
|
2014-07-22 18:52:33 +00:00
|
|
|
|
2014-04-25 00:46:11 +00:00
|
|
|
# If running inside Docker, make our nodes manually, because udev will not be working.
|
|
|
|
if [ -f /.dockerenv ]; then
|
|
|
|
sudo dmsetup --noudevsync mknodes
|
|
|
|
fi
|
2022-02-24 20:05:27 +00:00
|
|
|
if ! timeout 5 sh -c "while ! ls /dev/mapper/${LOOPDEV_BASE}p* ; do sleep 1; done"; then
|
|
|
|
echo "Error: Could not find any ${LOOPDEV_BASE} devices"
|
2014-07-22 18:52:33 +00:00
|
|
|
exit 1
|
|
|
|
fi
|
2022-02-24 20:05:27 +00:00
|
|
|
|
2015-04-21 08:36:33 +00:00
|
|
|
EACTION="sudo kpartx -d $RAW_FILE ; $EACTION"
|
2014-07-22 18:52:33 +00:00
|
|
|
trap "$EACTION" EXIT
|
2022-02-24 20:05:27 +00:00
|
|
|
|
|
|
|
ROOT_LOOPDEV=""
|
|
|
|
BOOT_LOOPDEV=""
|
|
|
|
EFI_LOOPDEV=""
|
|
|
|
|
|
|
|
LOOPDEVS=$(ls /dev/mapper/${LOOPDEV_BASE}p* | sort -r)
|
|
|
|
LOOPDEV_COUNT=$(echo $LOOPDEVS | wc -w)
|
|
|
|
if [ $LOOPDEV_COUNT == "1" ]; then
|
|
|
|
# if there is one partition device, assume it is the root device
|
|
|
|
ROOT_LOOPDEV=${LOOPDEVS}
|
|
|
|
LOOPDEVS=""
|
|
|
|
fi
|
|
|
|
|
|
|
|
for LOOPDEV in ${LOOPDEVS}; do
|
|
|
|
fstype=$(lsblk --all --nodeps --noheadings --output FSTYPE $LOOPDEV)
|
|
|
|
label=$(lsblk --all --nodeps --noheadings --output LABEL $LOOPDEV)
|
|
|
|
part_type=$(lsblk --all --nodeps --noheadings --output PARTTYPE $LOOPDEV)
|
|
|
|
|
|
|
|
if [ -z "${fstype}" ]; then
|
|
|
|
# Ignore block device with no filesystem type
|
|
|
|
continue
|
|
|
|
fi
|
|
|
|
|
|
|
|
# look for EFI partition to mount at /boot/efi either by GUID or
|
|
|
|
# label convention
|
|
|
|
if [ -z "$EFI_LOOPDEV" ]; then
|
|
|
|
if [[ ${part_type} == ${GUID_EFI} ]]; then
|
|
|
|
EFI_LOOPDEV=$LOOPDEV
|
|
|
|
continue
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
# look for EFI partition to mount at /boot/efi either by GUID or
|
|
|
|
# label convention.
|
|
|
|
if [ -z "$BOOT_LOOPDEV" ]; then
|
|
|
|
if [[ ${part_type} == ${GUID_LINUX_BOOT} || ${label} == "boot" ]]; then
|
|
|
|
BOOT_LOOPDEV=$LOOPDEV
|
|
|
|
continue
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ -z "$ROOT_LOOPDEV" ]; then
|
|
|
|
ROOT_LOOPDEV=$LOOPDEV
|
|
|
|
continue
|
|
|
|
fi
|
|
|
|
done
|
|
|
|
|
2014-07-22 18:52:33 +00:00
|
|
|
mkdir $WORKING/mnt
|
2022-03-11 02:48:03 +00:00
|
|
|
ROOT_FSTYPE=$(sudo blkid -o value -s TYPE $ROOT_LOOPDEV)
|
|
|
|
if [ "xfs" = "$ROOT_FSTYPE" ]; then
|
2015-04-22 22:11:09 +00:00
|
|
|
# mount xfs with nouuid, just in case that uuid is already mounted
|
2019-03-17 09:54:38 +00:00
|
|
|
# use ro to avoid/workaround xfs uuid issues on older
|
|
|
|
# kernels with newer rhel images which seem to set
|
|
|
|
# flags to generate unique uuid's:
|
|
|
|
# xfs superblock has incompatible features (0x4)
|
|
|
|
# we don't need to worry about this, we just want the data
|
|
|
|
MOUNTOPTS="-o nouuid,ro"
|
2022-03-11 02:48:03 +00:00
|
|
|
elif [ "btrfs" = "$ROOT_FSTYPE" ]; then
|
|
|
|
# Fedora has a btrfs filesystem with a subvolume called root.
|
|
|
|
# For now assume there will be a 'root' subvolume, but in the
|
|
|
|
# future the subvolume layout may need to be discovered for different
|
|
|
|
# images
|
|
|
|
MOUNTOPTS="-o subvol=root"
|
2015-04-22 22:11:09 +00:00
|
|
|
else
|
|
|
|
MOUNTOPTS=""
|
|
|
|
fi
|
|
|
|
|
2022-02-24 20:05:27 +00:00
|
|
|
sudo mount $MOUNTOPTS $ROOT_LOOPDEV $WORKING/mnt
|
2014-07-22 18:52:33 +00:00
|
|
|
EACTION="sudo umount -f $WORKING/mnt ; $EACTION"
|
2014-07-03 01:49:38 +00:00
|
|
|
trap "$EACTION" EXIT
|
|
|
|
|
2022-02-24 20:05:27 +00:00
|
|
|
if [ ! -z "$BOOT_LOOPDEV" ]; then
|
|
|
|
# mount to /boot
|
2022-05-25 15:33:31 +00:00
|
|
|
BOOT_FSTYPE=$(sudo blkid -o value -s TYPE $ROOT_LOOPDEV)
|
|
|
|
if [ "xfs" = "$BOOT_FSTYPE" ]; then
|
|
|
|
BOOT_MOUNTOPTS="-o nouuid,ro"
|
|
|
|
# Similar to root filesystem, if the boot filesystem
|
|
|
|
# is XFS and the base OS is the same as the image being
|
|
|
|
# rebuilt, we need to pass "nouuid" to bypass UUID safety
|
|
|
|
# checks and successfully mounts so we can extract the
|
|
|
|
# contents.
|
|
|
|
else
|
|
|
|
BOOT_MOUNTOPTS=""
|
|
|
|
fi
|
|
|
|
sudo mount $BOOT_MOUNTOPTS $BOOT_LOOPDEV $WORKING/mnt/boot
|
2022-02-24 20:05:27 +00:00
|
|
|
EACTION="sudo umount -f $BOOT_LOOPDEV ; $EACTION"
|
|
|
|
trap "$EACTION" EXIT
|
|
|
|
fi
|
|
|
|
if [ ! -z "$EFI_LOOPDEV" ]; then
|
|
|
|
# mount to /boot/efi
|
|
|
|
sudo mount $EFI_LOOPDEV $WORKING/mnt/boot/efi
|
|
|
|
EACTION="sudo umount -f $EFI_LOOPDEV ; $EACTION"
|
|
|
|
trap "$EACTION" EXIT
|
|
|
|
fi
|
|
|
|
|
2015-02-24 18:49:47 +00:00
|
|
|
# find out if chroot tar has full xattr support
|
|
|
|
if [ 0 == `sudo chroot $WORKING/mnt bin/tar --help | grep -c xattrs-exclude` ]; then
|
|
|
|
TAROPTS="--no-xattrs"
|
|
|
|
else
|
2017-09-01 22:29:15 +00:00
|
|
|
TAROPTS="--xattrs --xattrs-include=* --xattrs-exclude=security.selinux"
|
2015-02-24 18:49:47 +00:00
|
|
|
fi
|
2014-07-22 18:52:33 +00:00
|
|
|
# Chroot in so that we get the correct uid/gid
|
2015-02-24 18:49:47 +00:00
|
|
|
sudo chroot $WORKING/mnt bin/tar $TAROPTS -cz . > $WORKING/tmp.tar
|
2014-07-22 18:52:33 +00:00
|
|
|
mv $WORKING/tmp.tar $CACHED_TAR
|
|
|
|
else
|
|
|
|
echo "Using cached tar from $CACHED_TAR"
|
|
|
|
fi
|
2014-02-18 22:14:43 +00:00
|
|
|
fi
|
|
|
|
|
2014-07-22 18:52:33 +00:00
|
|
|
# Extract the base image (use --numeric-owner to avoid UID/GID mismatch between
|
|
|
|
# image tarball and host OS e.g. when building Fedora image on an openSUSE host)
|
2014-10-01 22:18:00 +00:00
|
|
|
# Include all xattrs except selinux because the selinux ones cause issues in our
|
|
|
|
# chroot environment, and we restore all of those at the end of the build anyway.
|
2014-07-22 18:52:33 +00:00
|
|
|
echo "Extracting base root image from $CACHED_TAR"
|
2014-10-01 22:18:00 +00:00
|
|
|
sudo tar -C $TARGET_ROOT --numeric-owner --xattrs --xattrs-include='*' --xattrs-exclude='security.selinux' -xzf $CACHED_TAR
|
2014-07-22 18:52:33 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
(
|
|
|
|
echo "Getting $TAR_LOCK: $(date)"
|
|
|
|
# Wait up to 20 minutes for another process to download
|
|
|
|
if ! flock -w 1200 9 ; then
|
|
|
|
echo "Did not get $TAR_LOCK: $(date)"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
extract_image
|
|
|
|
) 9> $TAR_LOCK
|