Files
hackacad/usr/local/share/bastille/start.sh

221 lines
7.8 KiB
Bash
Raw Normal View History

2018-11-07 10:36:54 -07:00
#!/bin/sh
2020-04-14 11:52:29 +02:00
#
# SPDX-License-Identifier: BSD-3-Clause
#
# Copyright (c) 2018-2025, Christer Edwards <christer.edwards@gmail.com>
2018-11-07 10:36:54 -07:00
# All rights reserved.
2020-04-14 11:52:29 +02:00
#
2018-11-07 10:36:54 -07:00
# Redistribution and use in source and binary forms, with or without
# modification, are permitted provided that the following conditions are met:
2020-04-14 11:52:29 +02:00
#
2018-11-07 10:36:54 -07:00
# * Redistributions of source code must retain the above copyright notice, this
# list of conditions and the following disclaimer.
2020-04-14 11:52:29 +02:00
#
2018-11-07 10:36:54 -07:00
# * Redistributions in binary form must reproduce the above copyright notice,
# this list of conditions and the following disclaimer in the documentation
# and/or other materials provided with the distribution.
2020-04-14 11:52:29 +02:00
#
2018-11-07 10:36:54 -07:00
# * Neither the name of the copyright holder nor the names of its
# contributors may be used to endorse or promote products derived from
# this software without specific prior written permission.
2020-04-14 11:52:29 +02:00
#
2018-11-07 10:36:54 -07:00
# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
# DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE
# FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
# DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
# SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
# CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
# OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
. /usr/local/share/bastille/common.sh
2018-11-07 10:36:54 -07:00
usage() {
error_notify "Usage: bastille start [option(s)] TARGET"
cat << EOF
2025-04-30 13:39:05 -06:00
Options:
2025-03-18 16:23:57 -06:00
-b | --boot Respect jail boot setting.
-d | --delay VALUE Time (seconds) to wait after starting each jail.
2025-03-18 16:23:57 -06:00
-v | --verbose Print every action on jail start.
-x | --debug Enable debug mode.
EOF
exit 1
2018-11-07 10:36:54 -07:00
}
# Handle options.
2025-03-15 21:35:03 -06:00
BOOT=0
2025-03-18 16:23:57 -06:00
DELAY_TIME=0
OPTION=""
while [ "$#" -gt 0 ]; do
case "${1}" in
-h|--help|help)
usage
;;
2025-03-15 21:35:03 -06:00
-b|--boot)
BOOT=1
shift
;;
2025-03-18 16:23:57 -06:00
-d|--delay)
2025-03-18 16:28:06 -06:00
if [ -z "${2}" ] && ! echo "${2}" | grep -Eq '^[0-9]+$'; then
2025-03-18 16:23:57 -06:00
error_exit "[-d|--delay] requires a value."
else
DELAY_TIME="${2}"
fi
shift 2
;;
-v|--verbose)
OPTION="-v"
shift
;;
-x|--debug)
enable_debug
shift
;;
-*)
for _opt in $(echo ${1} | sed 's/-//g' | fold -w1); do
case ${_opt} in
2025-03-15 21:35:03 -06:00
b) BOOT=1 ;;
v) OPTION="-v" ;;
x) enable_debug ;;
2025-05-01 17:39:50 -06:00
*) error_exit "[ERROR]: Unknown Option: \"${1}\"" ;;
esac
done
shift
;;
*)
break
;;
esac
done
2018-11-07 10:36:54 -07:00
if [ "$#" -ne 1 ]; then
2018-11-07 10:36:54 -07:00
usage
fi
2019-11-21 16:49:00 -07:00
TARGET="${1}"
bastille_root_check
set_target "${TARGET}"
2018-11-07 10:36:54 -07:00
for _jail in ${JAILS}; do
2019-11-21 16:49:00 -07:00
2025-03-15 21:35:03 -06:00
# Continue if '-b|--boot' is set and 'boot=off'
if [ "${BOOT}" -eq 1 ]; then
2025-05-02 10:27:00 -06:00
BOOT_ENABLED="$(sysrc -f ${bastille_jailsdir}/${_jail}/settings.conf -n boot)"
2025-03-15 21:35:03 -06:00
if [ "${BOOT_ENABLED}" = "off" ]; then
continue
fi
fi
2025-04-30 13:39:05 -06:00
# Validate that all 'depends' jails are running
2025-05-02 08:50:39 -06:00
_depend_jails="$(sysrc -f ${bastille_jailsdir}/${_jail}/settings.conf -n depend)"
for _depend_jail in ${_depend_jails}; do
if check_target_is_running; then
continue
else
bastille start ${_depend_jail}
fi
done
2025-04-29 21:51:24 -06:00
2025-04-30 08:19:50 -06:00
if check_target_is_running "${_jail}"; then
info "\n[${_jail}]:"
2025-04-30 13:39:05 -06:00
error_continue "Jail is already running."
2025-04-30 08:19:50 -06:00
fi
info "\n[${_jail}]:"
2025-04-30 08:19:50 -06:00
# Validate interfaces and add IPs to firewall table
if [ "$(bastille config ${_jail} get vnet)" != 'enabled' ]; then
_ip4_interfaces="$(bastille config ${_jail} get ip4.addr | sed 's/,/ /g')"
_ip6_interfaces="$(bastille config ${_jail} get ip6.addr | sed 's/,/ /g')"
# IP4
if [ "${_ip4_interfaces}" != "not set" ]; then
for _interface in ${_ip4_interfaces}; do
if echo "${_interface}" | grep -q "|"; then
_if="$(echo ${_interface} 2>/dev/null | awk -F"|" '{print $1}')"
_ip="$(echo ${_interface} 2>/dev/null | awk -F"|" '{print $2}' | sed -E 's#/[0-9]+$##g')"
else
_if="$(bastille config ${_jail} get interface)"
_ip="$(echo ${_interface} | sed -E 's#/[0-9]+$##g')"
fi
if ifconfig | grep "^${_if}:" >/dev/null; then
if ifconfig | grep -qwF "${_ip}"; then
2025-05-01 17:39:50 -06:00
warn "[WARNING]: IP address (${_ip}) already in use, continuing..."
fi
## add ip to firewall table if it is not reachable through local interface (assumes NAT/rdr is needed)
if route -n get ${_ip} | grep "gateway" >/dev/null; then
pfctl -q -t "${bastille_network_pf_table}" -T add "${_ip}"
fi
else
2025-05-01 17:39:50 -06:00
error_continue "[ERROR]: ${_if} interface does not exist."
fi
done
fi
# IP6
if [ "${_ip6_interfaces}" != "not set" ]; then
for _interface in ${_ip6_interfaces}; do
if echo "${_interface}" | grep -q "|"; then
_if="$(echo ${_interface} | awk -F"|" '{print $1}')"
_ip="$(echo ${_interface} | awk -F"|" '{print $2}' | sed -E 's#/[0-9]+$##g')"
else
_if="$(bastille config ${_jail} get interface)"
_ip="$(echo ${_interface} | sed -E 's#/[0-9]+$##g')"
fi
if ifconfig | grep "^${_if}:" >/dev/null; then
if ifconfig | grep -qwF "${_ip}"; then
2025-05-01 17:39:50 -06:00
warn "[WARNING]: IP address (${_ip}) already in use, continuing..."
fi
## add ip to firewall table if it is not reachable through local interface (assumes NAT/rdr is needed)
if route -6 -n get ${_ip} | grep "gateway" >/dev/null; then
pfctl -q -t "${bastille_network_pf_table}" -T add "${_ip}"
fi
else
2025-05-01 17:39:50 -06:00
error_continue "[ERROR]: ${_if} interface does not exist."
fi
done
2020-02-04 09:30:03 +01:00
fi
fi
2020-02-04 14:52:19 -07:00
# Start jail
jail ${OPTION} -f "${bastille_jailsdir}/${_jail}/jail.conf" -c "${_jail}"
2020-02-04 14:52:19 -07:00
2025-05-09 10:33:19 -06:00
# Add ZFS jailed datasets
if [ -s "${bastille_jailsdir}/${_jail}/zfs.conf" ]; then
while read _dataset _mount; do
zfs set jailed=on "${_dataset}"
zfs jail ${_jail} "${_dataset}"
jexec -l -U root "${_jail}" zfs set mountpoint="${_mount}" "${_dataset}"
jexec -l -U root "${_jail}" zfs mount "${_dataset}" 2>/dev/null
done < "${bastille_jailsdir}/${_jail}/zfs.conf"
fi
# Add rctl limits
if [ -s "${bastille_jailsdir}/${_jail}/rctl.conf" ]; then
while read _limits; do
rctl -a "${_limits}"
done < "${bastille_jailsdir}/${_jail}/rctl.conf"
fi
2025-05-03 16:12:19 -06:00
# Add cpuset limits
if [ -s "${bastille_jailsdir}/${_jail}/cpuset.conf" ]; then
while read _limits; do
cpuset -l "${_limits}" -j "${_jail}"
done < "${bastille_jailsdir}/${_jail}/cpuset.conf"
fi
# Add rdr rules
if [ -s "${bastille_jailsdir}/${_jail}/rdr.conf" ]; then
while read _rules; do
bastille rdr ${_jail} ${_rules}
done < "${bastille_jailsdir}/${_jail}/rdr.conf"
2018-11-24 09:55:16 -07:00
fi
2025-03-18 16:23:57 -06:00
# Delay between jail action
sleep "${DELAY_TIME}"
2025-08-03 13:32:59 -06:00
done