2021-05-04 20:14:08 +00:00
|
|
|
#!/usr/bin/env bash
|
|
|
|
|
|
|
|
SCRIPTNAME="$( basename -- "$0" )"
|
|
|
|
|
2021-05-18 20:30:49 +00:00
|
|
|
# check : current user is root?
|
|
|
|
check_root () {
|
|
|
|
[[ $EUID -eq 0 ]]
|
|
|
|
}
|
|
|
|
|
|
|
|
# ok if root
|
2021-05-04 20:14:08 +00:00
|
|
|
ensure_root () {
|
2021-05-18 20:30:49 +00:00
|
|
|
if ! check_root; then
|
|
|
|
echo "ERROR : This script must be run as root"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
2021-05-04 20:14:08 +00:00
|
|
|
}
|
|
|
|
|
2021-05-18 20:30:49 +00:00
|
|
|
# ok if non root
|
2021-05-04 20:14:08 +00:00
|
|
|
ensure_not_root () {
|
2021-05-18 20:30:49 +00:00
|
|
|
if check_root; then
|
|
|
|
echo "ERROR : This script must not be *run* as root"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
2021-05-04 20:14:08 +00:00
|
|
|
}
|
|
|
|
|
2021-05-18 20:30:49 +00:00
|
|
|
# ok if running script from current directory
|
2021-05-04 20:14:08 +00:00
|
|
|
ensure_pwd_is_scriptdir () {
|
|
|
|
if [[ $PWD != $ABSDIR ]]; then
|
|
|
|
echo "Please cd in the script directory before running it :"
|
|
|
|
echo "cd ${ABSDIR}"
|
|
|
|
echo "./${SCRIPTNAME}"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2021-05-18 20:30:49 +00:00
|
|
|
# make sure systemd directory exists
|
2021-05-04 20:14:08 +00:00
|
|
|
ensure_systemd_as_user_dir_exists () {
|
2021-05-18 20:30:49 +00:00
|
|
|
[[ -d ${HOME}/.config/systemd/user/ ]] || mkdir -p ${HOME}/.config/systemd/user/
|
2021-05-04 20:14:08 +00:00
|
|
|
}
|
2021-05-05 21:03:22 +00:00
|
|
|
|
2021-06-04 17:36:50 +00:00
|
|
|
# sed or die trying
|
|
|
|
sed_in_place () {
|
|
|
|
grep -q "${1}" "${3}"
|
|
|
|
if [ $? -eq 0 ]; then
|
|
|
|
sed -i -e "s|${1}|${2}|g" ${3}
|
|
|
|
else
|
|
|
|
echo "Pattern ${1} not found in file ${3}, exiting."
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2021-05-18 20:30:49 +00:00
|
|
|
# check: systemd unit exists
|
2021-05-05 21:03:22 +00:00
|
|
|
check_systemd_unit_exists () {
|
|
|
|
systemctl --user cat -- ${1} &> /dev/null
|
|
|
|
}
|
|
|
|
|
2021-07-01 17:28:13 +00:00
|
|
|
# check if variable is empty
|
|
|
|
check_variable_is_empty () {
|
|
|
|
[[ -z ${!1} ]]
|
|
|
|
}
|
|
|
|
|
|
|
|
# ensure variable is defined
|
|
|
|
ensure_variable_is_defined () {
|
|
|
|
if check_variable_is_empty ${1}; then
|
|
|
|
echo "Error : variable ${1} must be defined"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# ensure all variables are defined
|
|
|
|
ensure_variables_are_defined () {
|
|
|
|
for i in ${1}; do
|
|
|
|
ensure_variable_is_defined $i
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2021-09-23 20:32:22 +00:00
|
|
|
# check if IPv4 syntax is valid
|
|
|
|
check_valid_ipv4() {
|
|
|
|
re='^((1?[0-9]{1,2}|2([0-4][0-9]|5[0-5]))\.){3}'
|
|
|
|
re+='(1?[0-9]{1,2}|2([0-4][0-9]|5[0-5]))$'
|
|
|
|
|
|
|
|
if [[ ${1} =~ ${re} ]]; then
|
|
|
|
return 0
|
|
|
|
else
|
|
|
|
echo "ERROR : ${1} is not a valid IPv4 address"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# Get default interface IPv4 address
|
|
|
|
# and return result in variable passed as argument
|
|
|
|
get_default_iface_ipv4() {
|
|
|
|
# Call this function with the name of the variable
|
|
|
|
# you want to store the result in :
|
2021-09-24 08:14:28 +00:00
|
|
|
# get_default_iface_ipv4 myipv4
|
2021-09-23 20:32:22 +00:00
|
|
|
# See https://www.linuxjournal.com/content/return-values-bash-functions
|
|
|
|
local __resultvar=${1}
|
|
|
|
local __default_iface=$(awk '$2 == 00000000 { print $1 }' /proc/net/route)
|
|
|
|
local __default_iface_ipv4=$(ip addr show dev "${__default_iface}" | awk '$1 == "inet" { sub("/.*", "", $2); print $2 }')
|
|
|
|
if check_valid_ipv4 ${__default_iface_ipv4}; then
|
|
|
|
eval $__resultvar="'${__default_iface_ipv4}'"
|
|
|
|
return 0
|
|
|
|
else
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2021-05-18 20:30:49 +00:00
|
|
|
# ok if systemd unit file {1} exists
|
|
|
|
ensure_systemd_unit_exists () {
|
|
|
|
if ! check_systemd_unit_exists ${1}; then
|
|
|
|
echo "ERROR : systemd unit ${1} does not exists!"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# ok if systemd unit file {1} does not exists
|
|
|
|
ensure_systemd_unit_not_exists () {
|
|
|
|
if check_systemd_unit_exists ${1}; then
|
2021-06-04 07:40:17 +00:00
|
|
|
echo "ERROR : systemd unit ${1} exists!"
|
2021-05-18 20:30:49 +00:00
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# check: systemd unit running
|
2021-05-05 21:03:22 +00:00
|
|
|
check_systemd_unit_running () {
|
|
|
|
systemctl --user is-active --quiet service ${1}
|
|
|
|
}
|
|
|
|
|
2021-05-18 20:30:49 +00:00
|
|
|
# ok if systemd unit {1} is running
|
|
|
|
ensure_systemd_unit_running () {
|
|
|
|
if ! check_systemd_unit_running ${1}; then
|
|
|
|
echo "ERROR : systemd unit ${1} is not running!"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# ok if systemd unit {1} is NOT running
|
|
|
|
ensure_systemd_unit_not_running () {
|
|
|
|
if check_systemd_unit_running ${1}; then
|
|
|
|
echo "ERROR : systemd unit ${1} is running!"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# check: container $1 exists?
|
2021-05-05 21:03:22 +00:00
|
|
|
check_container_exists () {
|
2021-05-18 20:30:49 +00:00
|
|
|
podman container exists ${1}
|
2021-05-05 21:03:22 +00:00
|
|
|
}
|
|
|
|
|
2021-05-18 20:30:49 +00:00
|
|
|
# ok if container exists
|
|
|
|
ensure_container_exists () {
|
|
|
|
if ! check_container_exists ${1}; then
|
|
|
|
echo "ERROR : container ${1} does not exists"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# ok if container does not exists
|
|
|
|
ensure_container_not_exists () {
|
|
|
|
if check_container_exists ${1}; then
|
2021-06-04 07:40:17 +00:00
|
|
|
echo "ERROR : container ${1} exists"
|
2021-05-18 20:30:49 +00:00
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# check: container ${1} is running?
|
2021-05-05 21:03:22 +00:00
|
|
|
check_container_running () {
|
2021-10-23 08:51:40 +00:00
|
|
|
[[ `podman container inspect -f '{{.State.Status}}' ${1}` == "running" ]]
|
2021-05-18 20:30:49 +00:00
|
|
|
}
|
|
|
|
|
2021-05-18 20:54:58 +00:00
|
|
|
# ok if container is running
|
2021-05-18 20:30:49 +00:00
|
|
|
ensure_container_running () {
|
|
|
|
if ! check_container_running ${1}; then
|
|
|
|
echo "ERROR : container ${1} is not running"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2021-05-18 20:54:58 +00:00
|
|
|
# ok if container is not running
|
2021-05-18 20:30:49 +00:00
|
|
|
ensure_container_not_running () {
|
|
|
|
if check_container_running ${1}; then
|
|
|
|
echo "ERROR : container ${1} is running"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
2021-05-05 21:03:22 +00:00
|
|
|
}
|
2021-06-04 13:33:24 +00:00
|
|
|
|
|
|
|
# check: pod $1 exists?
|
|
|
|
check_pod_exists () {
|
|
|
|
podman pod exists ${1}
|
|
|
|
}
|
|
|
|
|
|
|
|
# ok if pod exists
|
|
|
|
ensure_pod_exists () {
|
|
|
|
if ! check_pod_exists ${1}; then
|
|
|
|
echo "ERROR : pod ${1} does not exists"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# ok if pod does not exists
|
|
|
|
ensure_pod_not_exists () {
|
|
|
|
if check_pod_exists ${1}; then
|
|
|
|
echo "ERROR : pod ${1} exists"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# check: pod ${1} is running?
|
|
|
|
check_pod_running () {
|
2021-10-23 08:51:40 +00:00
|
|
|
[[ `podman pod inspect -f '{{.State}}' ${1}` == "Running" ]]
|
2021-06-04 13:33:24 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
# ok if pod is running
|
|
|
|
ensure_pod_running () {
|
|
|
|
if ! check_pod_running ${1}; then
|
|
|
|
echo "ERROR : pod ${1} is not running"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# ok if pod is not running
|
|
|
|
ensure_pod_not_running () {
|
|
|
|
if check_pod_running ${1}; then
|
|
|
|
echo "ERROR : pod ${1} is running"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
2022-01-28 11:54:55 +00:00
|
|
|
|
|
|
|
# Get podman volume path
|
|
|
|
# WARNING : this function assumes the volume exists
|
|
|
|
get_podman_volume_path () {
|
|
|
|
podman volume inspect --format '{{ .Mountpoint }}' ${1}
|
|
|
|
}
|
2022-03-05 22:34:52 +00:00
|
|
|
|
2022-03-05 23:40:36 +00:00
|
|
|
# Execute elf binary from stdin
|
|
|
|
elfexec () {
|
|
|
|
opts=$(echo "$@")
|
2022-03-05 23:12:47 +00:00
|
|
|
if [[ $(uname -i) == 'aarch64' ]]; then
|
|
|
|
memfd_create='279'
|
|
|
|
else
|
|
|
|
# defaults to amd64
|
|
|
|
memfd_create='319'
|
|
|
|
fi
|
|
|
|
|
2022-03-05 23:40:36 +00:00
|
|
|
python3 -c "
|
2022-03-05 23:06:33 +00:00
|
|
|
import ctypes, os;
|
|
|
|
from sys import stdin;
|
|
|
|
l = ctypes.CDLL(None);
|
|
|
|
s = l.syscall;
|
|
|
|
e = stdin.buffer.read();
|
2022-03-05 23:12:47 +00:00
|
|
|
f = s(${memfd_create}, '', 1);
|
2022-03-05 23:06:33 +00:00
|
|
|
os.write(f, e);
|
|
|
|
p = '/proc/self/fd/%d' % f;
|
|
|
|
myargs='${opts}';
|
2022-03-06 12:46:10 +00:00
|
|
|
os.execve(p, ['binary'] + myargs.split(), {'PATH': '${PATH}'})"
|
2022-03-05 22:34:52 +00:00
|
|
|
}
|
2022-03-05 23:40:36 +00:00
|
|
|
|
|
|
|
# Execute buildctl directly from the web
|
|
|
|
my_buildctl () {
|
|
|
|
if [[ $(uname -i) == 'aarch64' ]]; then
|
|
|
|
buildkitarch='arm64'
|
2022-03-06 12:46:10 +00:00
|
|
|
buildctlchecksum='addd49a1db6962c1f04242c93b91d385742a9f8a971f69014d7fd3add30dd82d9f7c002b4cbe4c18c81759cac1c0e0ff2a7f6014e721074216a4f307b112e30e'
|
2022-03-05 23:40:36 +00:00
|
|
|
else
|
|
|
|
# defaults to amd64
|
|
|
|
buildkitarch='amd64'
|
2022-03-06 12:46:10 +00:00
|
|
|
buildctlchecksum='510fe781c844b39b569839f27528a2290f39b25f26182489239557a42edded6c16cec571b20c55bdc8f69ffbb59f8e63320540477c7a0d642543d07df99a198b'
|
2022-03-05 23:40:36 +00:00
|
|
|
fi
|
|
|
|
curl -sSLf https://github.com/moby/buildkit/releases/download/v0.9.3/buildkit-v0.9.3.linux-${buildkitarch}.tar.gz |
|
2022-03-06 12:46:10 +00:00
|
|
|
tar xOz bin/buildctl | python3 -c "
|
|
|
|
import os, hashlib, sys
|
|
|
|
from sys import stdin
|
|
|
|
e = stdin.buffer.read();
|
|
|
|
if hashlib.sha512(e).hexdigest() == '${buildctlchecksum}':
|
|
|
|
sys.stdout.buffer.write(e)
|
|
|
|
sys.exit(0)
|
|
|
|
else:
|
|
|
|
sys.stderr.write('Invalid hash\n')
|
|
|
|
sys.exit(-1)" | elfexec "${@}"
|
2022-03-05 23:40:36 +00:00
|
|
|
}
|
2022-08-12 18:24:33 +00:00
|
|
|
|
|
|
|
oci_push_to_registry () {
|
2022-08-12 18:40:41 +00:00
|
|
|
if ! skopeo inspect --format "Image ${1} found on remote container repository." docker://${1}; then
|
|
|
|
podman login --username ${CONTAINER_REPO_USER} --password ${CONTAINER_REPO_PASSWORD} ${1%%/*} &&
|
2022-08-12 18:24:33 +00:00
|
|
|
# Try x times because of unexplained error 500
|
2022-08-13 20:15:13 +00:00
|
|
|
for i in $(seq 1 3); do podman push ${1} && s=0 && break || s=$? && sleep 1; done; (exit $s) &&
|
2022-08-13 20:42:36 +00:00
|
|
|
podman image rm ${1} &&
|
2022-08-13 20:50:37 +00:00
|
|
|
podman pull ${1}
|
2022-08-12 18:24:33 +00:00
|
|
|
fi
|
|
|
|
}
|