forked from containers/automation_images
-
Notifications
You must be signed in to change notification settings - Fork 0
/
lib.sh
347 lines (307 loc) · 12.1 KB
/
lib.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
# This file is intended to be sourced by other scripts running on
# aa Fedora or Ubuntu VM during various stages of initial setup.
# Using it in any other way or context unlikely to do anything
# useful for you.
# By default, assume we're not running inside a container
CONTAINER="${CONTAINER:-0}"
OS_RELEASE_VER="$(source /etc/os-release; echo $VERSION_ID | tr -d '.')"
OS_RELEASE_ID="$(source /etc/os-release; echo $ID)"
OS_REL_VER="$OS_RELEASE_ID-$OS_RELEASE_VER"
# Avoid getting stuck waiting for user input
[[ "$OS_RELEASE_ID" != "ubuntu" ]] || \
export DEBIAN_FRONTEND="noninteractive"
# This location is checked by automation in other repos, please do not change.
PACKAGE_DOWNLOAD_DIR=/var/cache/download
INSTALL_AUTOMATION_VERSION="4.1.1"
PUSH_LATEST="${PUSH_LATEST:-0}"
# Mask secrets in show_env_vars() from automation library
SECRET_ENV_RE='(ACCOUNT)|(.+_JSON)|(AWS.+)|(SSH)|(PASSWORD)|(TOKEN)'
# Some platforms set and make this read-only
[[ -n "$UID" ]] || \
UID=$(getent passwd $USER | cut -d : -f 3)
SUDO=""
if [[ -n "$UID" ]] && [[ "$UID" -ne 0 ]]; then
SUDO="sudo"
fi
if [[ "$OS_RELEASE_ID" == "ubuntu" ]]; then
export DEBIAN_FRONTEND=noninteractive
SUDO="$SUDO env DEBIAN_FRONTEND=$DEBIAN_FRONTEND"
fi
if [[ -r "/etc/automation_environment" ]]; then
source /etc/automation_environment
#shellcheck disable=SC1090,SC2154
source $AUTOMATION_LIB_PATH/common_lib.sh
# Shortcuts to common retry/timeout calls
lilto() { err_retry 8 1000 "" "$@"; } # just over 4 minutes max
bigto() { err_retry 7 5670 "" "$@"; } # 12 minutes max
else # Automation common library not installed yet
echo "Warning: Automation library not found. Assuming it's not yet installed"
die() { echo "ERROR: ${1:-No error message provided}"; exit 1; }
lilto() { die "Automation library not installed; Required for lilto()"; }
bigto() { die "Automation library not installed; Required for bigto()"; }
fi
install_automation_tooling() {
# This script supports installing all current and previous versions
local installer_url="https://raw.githubusercontent.com/containers/automation/master/bin/install_automation.sh"
curl --silent --show-error --location \
--url "$installer_url" | \
$SUDO env INSTALL_PREFIX=/usr/share /bin/bash -s - \
"$INSTALL_AUTOMATION_VERSION" "$@"
# This defines AUTOMATION_LIB_PATH
source /usr/share/automation/environment
#shellcheck disable=SC1090
source $AUTOMATION_LIB_PATH/common_lib.sh
}
custom_cloud_init() {
#shellcheck disable=SC2154
CUSTOM_CLOUD_CONFIG_DEFAULTS="$REPO_DIRPATH/base_images/cloud-init/$OS_RELEASE_ID/cloud.cfg.d"
if [[ -d "$CUSTOM_CLOUD_CONFIG_DEFAULTS" ]]
then
echo "Installing custom cloud-init defaults"
$SUDO cp -v --dereference \
"$CUSTOM_CLOUD_CONFIG_DEFAULTS"/* \
/etc/cloud/cloud.cfg.d/
else
echo "Could not find any files in $CUSTOM_CLOUD_CONFIG_DEFAULTS"
exit 1
fi
}
clear_cred_files() {
set +ex
if ((${#GAC_FILEPATH}>0)); then
rm -f "$GAC_FILEPATH"
fi
if ((${#AWS_SHARED_CREDENTIALS_FILE}>0)); then
rm -f "$AWS_SHARED_CREDENTIALS_FILE"
fi
}
# This function may only/ever be used within Cirrus-CI
set_gac_filepath() {
# shellcheck disable=SC2154
if [[ -z "$CI" ]] || [[ "$CI" != "true" ]] || [[ "$CIRRUS_CI" != "$CI" ]]; then
die "Unexpected \$CI=$CI and/or \$CIRRUS_CI=$CIRRUS_CI"
elif ((${#GAC_JSON}<=2)); then
die "Required (secret) \$GAC_JSON value appears to be empty"
elif grep -iq "ENCRYPTED" <<<"$GAC_JSON"; then
die "Decrpytion of \$GAC_JSON failed."
fi
set +x;
GAC_FILEPATH=$(mktemp -p '' '.XXXXXXXX.')
export GAC_FILEPATH
trap clear_cred_files EXIT
echo "$GAC_JSON" > "$GAC_FILEPATH"
unset GAC_JSON;
}
# This function may only/ever be used within Cirrus-CI
set_aws_filepath() {
# shellcheck disable=SC2154
if [[ -z "$CI" ]] || [[ "$CI" != "true" ]] || [[ "$CIRRUS_CI" != "$CI" ]]; then
die "Unexpected \$CI=$CI and/or \$CIRRUS_CI=$CIRRUS_CI"
elif ((${#AWS_INI}<=2)); then
die "Required (secret) \$AWS_INI value appears to be empty"
elif grep -iq "ENCRYPTED" <<<"$AWS_INI"; then
die "Decrpytion of \$AWS_INI failed."
fi
set +x;
# Magic filename packer is sensitive to
AWS_SHARED_CREDENTIALS_FILE=$(mktemp -p '' '.XXXXXXXX.')
export AWS_SHARED_CREDENTIALS_FILE
trap clear_cred_files EXIT
echo "$AWS_INI" > "$AWS_SHARED_CREDENTIALS_FILE"
unset AWS_INI;
}
# Almost every CI-driven image build includes a `$PACKER_BUILDS`
# or `$TARTGET_NAME` specifier. Leverage appearance of a `no_*`
# PR-label prefix to bypass certain builds when running under CI.
skip_on_pr_label() {
req_env_vars AUTOMATION_LIB_PATH # Automation library is required
local build_spec pr_labels pr_label
if [[ -z "$CI" ]] || [[ "$CI" != 'true' ]]; then
warn "Skipping builds by PR-label only works under CI"
return 1 # reverse-logic: DO NOT SKIP
fi
build_spec="${TARGET_NAME:-$PACKER_BUILDS}"
pr_labels=$(get_pr_labels) # Will fail if not running under CI
if [[ -z "$build_spec" ]]; then
warn "Both \$TARGET_NAME and \$PACKER_BUILDS found empty, continuing anyway."
return 1
elif [[ -z "$pr_labels" ]]; then
warn "No labels found on PR, continuing with build."
return 1
fi
# N/B: Labels can contain spaces, assume maintainers are smart enough
# to not do this, or they're not important for this usage.
for pr_label in $pr_labels; do
if [[ "$pr_label" =~ no_.+ ]] && [[ "${pr_label#no_}" == "$build_spec" ]]; then
warn "Found '$pr_label' for '$build_spec', skipping build."
return 0 # reverse-logic: DO skip.
fi
dbg "Label '$pr_label' no match to '$build_spec'."
done
return 1 # Do not skip
}
# print a space-separated list of labels when run under Cirrus-CI for a PR
get_pr_labels() {
req_env_vars CIRRUS_CI CIRRUS_PR CIRRUS_REPO_CLONE_TOKEN
req_env_vars CIRRUS_REPO_OWNER CIRRUS_REPO_NAME
local query h_accept h_content api result fltrpfx
local filter labels h_auth h_accept h_content
# shellcheck disable=SC2154
h_auth="Authorization: bearer $CIRRUS_REPO_CLONE_TOKEN"
h_accept='Accept: application/vnd.github.antiope-preview+json'
h_content='Content-Type: application/json'
api="https://api.github.com/graphql"
# shellcheck disable=SC2154
query="{
\"query\": \"query {
repository(owner: \\\"$CIRRUS_REPO_OWNER\\\",
name: \\\"$CIRRUS_REPO_NAME\\\") {
pullRequest(number: $CIRRUS_PR) {
labels(first: 100) {
nodes {
name
}
}
}
}
}\"
}"
# Used to check that properly formated result was returned
fltrpfx=".data.repository.pullRequest.labels"
# Used to get the actual list of labels
filter="${fltrpfx}.nodes[].name"
dbg "Issuing '$query'"
result=$(curl --silent --location \
-H "$h_auth" -H "$h_accept" -H "$h_content" \
--request POST --data @- --url "$api" <<<"$query") \
|| \
die "Error communicating with GraphQL API $api: $result"
# GraphQL sometimes returns errors inline, try to detect this.
if ! jq -e "$fltrpfx" <<<"$result" &> /dev/null; then
die "Received unexpected reply: $result"
fi
dbg "Filtering & formatting line-separated result: '$result'"
labels=$(jq --raw-output "$filter" <<<"$result" | \
tr '[:space:]' ' ' | sed -e 's/ $//')
dbg "Outputting space-separated labels: '$labels'"
echo -n "$labels"
}
remove_netavark_aardvark_files() {
req_env_vars OS_RELEASE_ID
# OS_RELEASE_ID is defined by automation-library
# shellcheck disable=SC2154
if [[ "$OS_RELEASE_ID" =~ "ubuntu" ]]
then
die "Ubuntu netavark/aardvark-dns testing is not supported"
fi
LISTING_CMD="rpm -ql podman"
# yum/dnf/dpkg may list system directories, only remove files
rpm -ql netavark aardvark-dns | while read fullpath
do
# Sub-directories may contain unrelated/valuable stuff
if [[ -d "$fullpath" ]]; then continue; fi
sudo rm -vf "$fullpath"
done
}
# Warning: DO NOT USE the following functions willy-nilly!
# They are only intended to be called by other setup scripts, as the very
# last step during the build process. They're purpose is to "reset" the
# VM so all the first-boot operations happen again normally (like
# generating new ssh host keys, resizing partitions, etc.)
# Ref: https://cloud.google.com/compute/docs/oslogin
# Google "OS-login" service manages persistent accounts automatically.
# The "packer" tool also does this during image creation, and the two
# have been observed causing conflicts upon reboot. When finalizing
# an image for re-use, remove all standard user accounts AND home
# directories.
clean_automatic_users() {
DELUSER="deluser --remove-home"
DELGROUP="delgroup --only-if-empty"
if [[ "$OS_RELEASE_ID" == "fedora" ]]; then
DELUSER="userdel --remove";
DELGROUP="groupdel"
fi
# Avoid needing to parse login.defs (fedora) and deluser.conf (Ubuntu)
# for the UID/GID ranges standard user accounts.
cd /home || exit
for account in *; do
# Cannot remove active user executing sudo - assume this is "packer"
# and will be removed by the tool upon image build completion.
if id "$account" &> /dev/null && [[ "$account" != "$USER" ]]; then
$SUDO $DELUSER "$account"
$SUDO $DELGROUP "$account" || true
fi
done
$SUDO rm -rf /home/*/.ssh/*
}
# Workaround for "NetworkManager doing weird things" (leading to testing-flakes)
# Ref:https://github.com/containers/podman/issues/11123#issuecomment-912516145
nm_ignore_cni() {
echo "Deploying NetworkManager anti-weird-things workaround"
$SUDO mkdir -p /etc/NetworkManager/conf.d/
cat << EOF | $SUDO tee /etc/NetworkManager/conf.d/podman-cni.conf
[keyfile]
unmanaged-devices=interface-name:*podman*;interface-name:veth*
EOF
}
common_finalize() {
set -x # extra detail is no-longer necessary
cd /
clean_automatic_users
$SUDO cloud-init clean --logs
if ! ((CONTAINER)); then
# Prevent periodically activated services interfering with testing
/bin/bash $(dirname ${BASH_SOURCE[0]})/systemd_banish.sh
fi
$SUDO rm -rf /var/lib/cloud/instanc*
$SUDO rm -rf /root/.ssh/*
$SUDO rm -rf /etc/ssh/*key*
$SUDO rm -rf /tmp/*
$SUDO rm -rf /tmp/.??*
echo -n "" | $SUDO tee /etc/machine-id
$SUDO sync
if ! ((CONTAINER)); then
# This helps when google goes to compress the image
$SUDO fstrim -av
fi
}
# Called during VM Image setup, not intended for general use.
rh_finalize() {
set +e # Don't fail at the very end
if ((CONTAINER)); then # try to save a little space
msg "Cleaning up packaging metadata and cache"
$SUDO dnf clean all
$SUDO rm -rf /var/cache/dnf
fi
set -x
# Packaging cache is preserved across builds of container images
$SUDO rm -f /etc/udev/rules.d/*-persistent-*.rules
$SUDO touch /.unconfigured # force firstboot to run
common_finalize
}
# Called during VM Image setup, not intended for general use.
ubuntu_finalize() {
set +e # Don't fail at the very end
# N/B: Several CI setups depend on VMs with downloaded/cached
# packages under /var/cache/download a.k.a. /var/cache/apt/archives.
# Avoid apt cache cleaning on Ubuntu VMs!
if ((CONTAINER)); then # try to save a little space for containers
msg "Cleaning up packaging metadata and cache"
$SUDO apt-get clean
$SUDO rm -rf /var/cache/apt
fi
set -x
# Packaging cache is preserved across builds of container images
common_finalize
}
finalize() {
if [[ "$OS_RELEASE_ID" == "centos" ]]; then
rh_finalize
elif [[ "$OS_RELEASE_ID" == "fedora" ]]; then
rh_finalize
elif [[ "$OS_RELEASE_ID" == "ubuntu" ]]; then
ubuntu_finalize
else
die "Unknown/Unsupported Distro '$OS_RELEASE_ID'"
fi
}