2021-05-04 20:14:08 +00:00
|
|
|
#!/usr/bin/env bash
|
|
|
|
|
|
|
|
SCRIPTNAME="$( basename -- "$0" )"
|
|
|
|
|
2021-05-18 20:30:49 +00:00
|
|
|
# check : current user is root?
|
|
|
|
check_root () {
|
|
|
|
[[ $EUID -eq 0 ]]
|
|
|
|
}
|
|
|
|
|
|
|
|
# ok if root
|
2021-05-04 20:14:08 +00:00
|
|
|
ensure_root () {
|
2021-05-18 20:30:49 +00:00
|
|
|
if ! check_root; then
|
|
|
|
echo "ERROR : This script must be run as root"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
2021-05-04 20:14:08 +00:00
|
|
|
}
|
|
|
|
|
2021-05-18 20:30:49 +00:00
|
|
|
# ok if non root
|
2021-05-04 20:14:08 +00:00
|
|
|
ensure_not_root () {
|
2021-05-18 20:30:49 +00:00
|
|
|
if check_root; then
|
|
|
|
echo "ERROR : This script must not be *run* as root"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
2021-05-04 20:14:08 +00:00
|
|
|
}
|
|
|
|
|
2021-05-18 20:30:49 +00:00
|
|
|
# ok if running script from current directory
|
2021-05-04 20:14:08 +00:00
|
|
|
ensure_pwd_is_scriptdir () {
|
|
|
|
if [[ $PWD != $ABSDIR ]]; then
|
|
|
|
echo "Please cd in the script directory before running it :"
|
|
|
|
echo "cd ${ABSDIR}"
|
|
|
|
echo "./${SCRIPTNAME}"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2023-12-09 21:31:26 +00:00
|
|
|
# ok if current user is the same (name) as script directory
|
|
|
|
ensure_scriptdir_equals_user () {
|
|
|
|
if [[ "$USER" != "${ABSDIR##*/}" ]]; then
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2021-05-18 20:30:49 +00:00
|
|
|
# make sure systemd directory exists
|
2021-05-04 20:14:08 +00:00
|
|
|
ensure_systemd_as_user_dir_exists () {
|
2021-05-18 20:30:49 +00:00
|
|
|
[[ -d ${HOME}/.config/systemd/user/ ]] || mkdir -p ${HOME}/.config/systemd/user/
|
2021-05-04 20:14:08 +00:00
|
|
|
}
|
2021-05-05 21:03:22 +00:00
|
|
|
|
2021-06-04 17:36:50 +00:00
|
|
|
# sed or die trying
|
|
|
|
sed_in_place () {
|
2023-07-28 14:24:51 +00:00
|
|
|
${podman_unshare} grep -q "${1}" "${3}"
|
2021-06-04 17:36:50 +00:00
|
|
|
if [ $? -eq 0 ]; then
|
2023-07-28 14:24:51 +00:00
|
|
|
${podman_unshare} sed -i -e "s|${1}|${2}|g" ${3}
|
2021-06-04 17:36:50 +00:00
|
|
|
else
|
|
|
|
echo "Pattern ${1} not found in file ${3}, exiting."
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2023-07-28 15:01:12 +00:00
|
|
|
# podman_unshare prefixed
|
|
|
|
podman_unshare_sed_in_place () {
|
|
|
|
podman_unshare='podman unshare'
|
|
|
|
sed_in_place "${1}" "${2}" "${3}"
|
|
|
|
}
|
|
|
|
|
|
|
|
# sed or die trying
|
2023-07-28 14:42:04 +00:00
|
|
|
sed_in_place_multiline () {
|
2023-07-28 15:28:20 +00:00
|
|
|
${podman_unshare} grep -P -z -q "${1}" "${3}"
|
2023-07-28 14:42:04 +00:00
|
|
|
if [ $? -eq 0 ]; then
|
|
|
|
${podman_unshare} sed -z -i -e "s|${1}|${2}|g" ${3}
|
|
|
|
else
|
|
|
|
echo "Pattern ${1} not found in file ${3}, exiting."
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2023-07-28 15:01:12 +00:00
|
|
|
# podman_unshare prefixed
|
|
|
|
podman_unshare_sed_in_place_multiline () {
|
|
|
|
podman_unshare='podman unshare'
|
|
|
|
sed_in_place_multiline "${1}" "${2}" "${3}"
|
2023-07-28 14:42:04 +00:00
|
|
|
}
|
|
|
|
|
2021-05-18 20:30:49 +00:00
|
|
|
# check: systemd unit exists
|
2021-05-05 21:03:22 +00:00
|
|
|
check_systemd_unit_exists () {
|
|
|
|
systemctl --user cat -- ${1} &> /dev/null
|
|
|
|
}
|
|
|
|
|
2021-07-01 17:28:13 +00:00
|
|
|
# check if variable is empty
|
|
|
|
check_variable_is_empty () {
|
|
|
|
[[ -z ${!1} ]]
|
|
|
|
}
|
|
|
|
|
|
|
|
# ensure variable is defined
|
|
|
|
ensure_variable_is_defined () {
|
|
|
|
if check_variable_is_empty ${1}; then
|
|
|
|
echo "Error : variable ${1} must be defined"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# ensure all variables are defined
|
|
|
|
ensure_variables_are_defined () {
|
|
|
|
for i in ${1}; do
|
|
|
|
ensure_variable_is_defined $i
|
|
|
|
done
|
|
|
|
}
|
|
|
|
|
2021-09-23 20:32:22 +00:00
|
|
|
# check if IPv4 syntax is valid
|
|
|
|
check_valid_ipv4() {
|
|
|
|
re='^((1?[0-9]{1,2}|2([0-4][0-9]|5[0-5]))\.){3}'
|
|
|
|
re+='(1?[0-9]{1,2}|2([0-4][0-9]|5[0-5]))$'
|
|
|
|
|
|
|
|
if [[ ${1} =~ ${re} ]]; then
|
|
|
|
return 0
|
|
|
|
else
|
|
|
|
echo "ERROR : ${1} is not a valid IPv4 address"
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# Get default interface IPv4 address
|
|
|
|
# and return result in variable passed as argument
|
|
|
|
get_default_iface_ipv4() {
|
|
|
|
# Call this function with the name of the variable
|
|
|
|
# you want to store the result in :
|
2021-09-24 08:14:28 +00:00
|
|
|
# get_default_iface_ipv4 myipv4
|
2021-09-23 20:32:22 +00:00
|
|
|
# See https://www.linuxjournal.com/content/return-values-bash-functions
|
|
|
|
local __resultvar=${1}
|
|
|
|
local __default_iface=$(awk '$2 == 00000000 { print $1 }' /proc/net/route)
|
|
|
|
local __default_iface_ipv4=$(ip addr show dev "${__default_iface}" | awk '$1 == "inet" { sub("/.*", "", $2); print $2 }')
|
|
|
|
if check_valid_ipv4 ${__default_iface_ipv4}; then
|
|
|
|
eval $__resultvar="'${__default_iface_ipv4}'"
|
|
|
|
return 0
|
|
|
|
else
|
|
|
|
exit 1
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2021-05-18 20:30:49 +00:00
|
|
|
# ok if systemd unit file {1} exists
|
|
|
|
ensure_systemd_unit_exists () {
|
|
|
|
if ! check_systemd_unit_exists ${1}; then
|
|
|
|
echo "ERROR : systemd unit ${1} does not exists!"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# ok if systemd unit file {1} does not exists
|
|
|
|
ensure_systemd_unit_not_exists () {
|
|
|
|
if check_systemd_unit_exists ${1}; then
|
2021-06-04 07:40:17 +00:00
|
|
|
echo "ERROR : systemd unit ${1} exists!"
|
2021-05-18 20:30:49 +00:00
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# check: systemd unit running
|
2021-05-05 21:03:22 +00:00
|
|
|
check_systemd_unit_running () {
|
|
|
|
systemctl --user is-active --quiet service ${1}
|
|
|
|
}
|
|
|
|
|
2021-05-18 20:30:49 +00:00
|
|
|
# ok if systemd unit {1} is running
|
|
|
|
ensure_systemd_unit_running () {
|
|
|
|
if ! check_systemd_unit_running ${1}; then
|
|
|
|
echo "ERROR : systemd unit ${1} is not running!"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# ok if systemd unit {1} is NOT running
|
|
|
|
ensure_systemd_unit_not_running () {
|
|
|
|
if check_systemd_unit_running ${1}; then
|
|
|
|
echo "ERROR : systemd unit ${1} is running!"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# check: container $1 exists?
|
2021-05-05 21:03:22 +00:00
|
|
|
check_container_exists () {
|
2021-05-18 20:30:49 +00:00
|
|
|
podman container exists ${1}
|
2021-05-05 21:03:22 +00:00
|
|
|
}
|
|
|
|
|
2021-05-18 20:30:49 +00:00
|
|
|
# ok if container exists
|
|
|
|
ensure_container_exists () {
|
|
|
|
if ! check_container_exists ${1}; then
|
|
|
|
echo "ERROR : container ${1} does not exists"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# ok if container does not exists
|
|
|
|
ensure_container_not_exists () {
|
|
|
|
if check_container_exists ${1}; then
|
2021-06-04 07:40:17 +00:00
|
|
|
echo "ERROR : container ${1} exists"
|
2021-05-18 20:30:49 +00:00
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# check: container ${1} is running?
|
2021-05-05 21:03:22 +00:00
|
|
|
check_container_running () {
|
2021-10-23 08:51:40 +00:00
|
|
|
[[ `podman container inspect -f '{{.State.Status}}' ${1}` == "running" ]]
|
2021-05-18 20:30:49 +00:00
|
|
|
}
|
|
|
|
|
2021-05-18 20:54:58 +00:00
|
|
|
# ok if container is running
|
2021-05-18 20:30:49 +00:00
|
|
|
ensure_container_running () {
|
|
|
|
if ! check_container_running ${1}; then
|
|
|
|
echo "ERROR : container ${1} is not running"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
2021-05-18 20:54:58 +00:00
|
|
|
# ok if container is not running
|
2021-05-18 20:30:49 +00:00
|
|
|
ensure_container_not_running () {
|
|
|
|
if check_container_running ${1}; then
|
|
|
|
echo "ERROR : container ${1} is running"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
2021-05-05 21:03:22 +00:00
|
|
|
}
|
2021-06-04 13:33:24 +00:00
|
|
|
|
|
|
|
# check: pod $1 exists?
|
|
|
|
check_pod_exists () {
|
|
|
|
podman pod exists ${1}
|
|
|
|
}
|
|
|
|
|
|
|
|
# ok if pod exists
|
|
|
|
ensure_pod_exists () {
|
|
|
|
if ! check_pod_exists ${1}; then
|
|
|
|
echo "ERROR : pod ${1} does not exists"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# ok if pod does not exists
|
|
|
|
ensure_pod_not_exists () {
|
|
|
|
if check_pod_exists ${1}; then
|
|
|
|
echo "ERROR : pod ${1} exists"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# check: pod ${1} is running?
|
|
|
|
check_pod_running () {
|
2021-10-23 08:51:40 +00:00
|
|
|
[[ `podman pod inspect -f '{{.State}}' ${1}` == "Running" ]]
|
2021-06-04 13:33:24 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
# ok if pod is running
|
|
|
|
ensure_pod_running () {
|
|
|
|
if ! check_pod_running ${1}; then
|
|
|
|
echo "ERROR : pod ${1} is not running"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
|
|
|
|
|
|
|
# ok if pod is not running
|
|
|
|
ensure_pod_not_running () {
|
|
|
|
if check_pod_running ${1}; then
|
|
|
|
echo "ERROR : pod ${1} is running"
|
|
|
|
exit 1
|
|
|
|
else
|
|
|
|
return 0
|
|
|
|
fi
|
|
|
|
}
|
2022-01-28 11:54:55 +00:00
|
|
|
|
|
|
|
# Get podman volume path
|
|
|
|
# WARNING : this function assumes the volume exists
|
|
|
|
get_podman_volume_path () {
|
|
|
|
podman volume inspect --format '{{ .Mountpoint }}' ${1}
|
|
|
|
}
|
2022-03-05 22:34:52 +00:00
|
|
|
|
2022-03-05 23:40:36 +00:00
|
|
|
# Execute elf binary from stdin
|
|
|
|
elfexec () {
|
|
|
|
opts=$(echo "$@")
|
2023-04-26 20:14:38 +00:00
|
|
|
if [[ "${HOSTTYPE}" == 'aarch64' ]]; then
|
2022-03-05 23:12:47 +00:00
|
|
|
memfd_create='279'
|
|
|
|
else
|
|
|
|
# defaults to amd64
|
|
|
|
memfd_create='319'
|
|
|
|
fi
|
|
|
|
|
2022-03-05 23:40:36 +00:00
|
|
|
python3 -c "
|
2022-03-05 23:06:33 +00:00
|
|
|
import ctypes, os;
|
|
|
|
from sys import stdin;
|
|
|
|
l = ctypes.CDLL(None);
|
|
|
|
s = l.syscall;
|
|
|
|
e = stdin.buffer.read();
|
2022-03-05 23:12:47 +00:00
|
|
|
f = s(${memfd_create}, '', 1);
|
2022-03-05 23:06:33 +00:00
|
|
|
os.write(f, e);
|
|
|
|
p = '/proc/self/fd/%d' % f;
|
|
|
|
myargs='${opts}';
|
2022-03-06 12:46:10 +00:00
|
|
|
os.execve(p, ['binary'] + myargs.split(), {'PATH': '${PATH}'})"
|
2022-03-05 22:34:52 +00:00
|
|
|
}
|
2022-03-05 23:40:36 +00:00
|
|
|
|
|
|
|
# Execute buildctl directly from the web
|
|
|
|
my_buildctl () {
|
2023-07-29 08:41:35 +00:00
|
|
|
buildkitversion='v0.12.0'
|
2022-03-05 23:40:36 +00:00
|
|
|
if [[ $(uname -i) == 'aarch64' ]]; then
|
|
|
|
buildkitarch='arm64'
|
2023-07-29 08:41:35 +00:00
|
|
|
buildctlchecksum='50f667bedc70293710a1fa30cf0373fae159619cadbd279bc7b6174c96d856a2131130e4a78d5dcd75d3d3ff5693c3f062ae347256d5ee71cbbf36c1bb0e4769'
|
2022-03-05 23:40:36 +00:00
|
|
|
else
|
|
|
|
# defaults to amd64
|
|
|
|
buildkitarch='amd64'
|
2023-07-29 08:41:35 +00:00
|
|
|
buildctlchecksum='d79f9811e88b768162d27c53903e5764b7bce1b17520b5df2c693f5756bdf1a47c921b1dd48c585f56e30ee51214ee6ad07d1b7bebe4bdecf24efc77cca4fa53'
|
2022-03-05 23:40:36 +00:00
|
|
|
fi
|
2022-11-08 21:50:04 +00:00
|
|
|
curl -sSLf https://github.com/moby/buildkit/releases/download/${buildkitversion}/buildkit-${buildkitversion}.linux-${buildkitarch}.tar.gz |
|
2022-03-06 12:46:10 +00:00
|
|
|
tar xOz bin/buildctl | python3 -c "
|
|
|
|
import os, hashlib, sys
|
|
|
|
from sys import stdin
|
|
|
|
e = stdin.buffer.read();
|
|
|
|
if hashlib.sha512(e).hexdigest() == '${buildctlchecksum}':
|
|
|
|
sys.stdout.buffer.write(e)
|
|
|
|
sys.exit(0)
|
|
|
|
else:
|
|
|
|
sys.stderr.write('Invalid hash\n')
|
|
|
|
sys.exit(-1)" | elfexec "${@}"
|
2022-03-05 23:40:36 +00:00
|
|
|
}
|
2022-08-12 18:24:33 +00:00
|
|
|
|
|
|
|
oci_push_to_registry () {
|
2022-08-15 08:58:00 +00:00
|
|
|
if ! skopeo inspect --format "Image ${1} found on remote container registry." docker://${1}; then
|
2022-08-16 19:14:37 +00:00
|
|
|
if podman image exists ${1}; then
|
2022-11-21 15:03:53 +00:00
|
|
|
ensure_variables_are_defined "CONTAINER_REPO_USER CONTAINER_REPO_PASSWORD"
|
2023-04-21 11:53:55 +00:00
|
|
|
podman image push --creds=${CONTAINER_REPO_USER}:${CONTAINER_REPO_PASSWORD} ${1} &&
|
2022-08-16 19:14:37 +00:00
|
|
|
podman image rm ${1} &&
|
2023-04-21 11:53:55 +00:00
|
|
|
podman image pull ${1}
|
2022-08-16 19:18:03 +00:00
|
|
|
else
|
2022-08-16 19:14:37 +00:00
|
|
|
echo "Error : image ${1} does not exists"
|
|
|
|
exit 1
|
|
|
|
fi
|
2022-08-12 18:24:33 +00:00
|
|
|
fi
|
|
|
|
}
|