Project

General

Profile

Download (86.6 KB) Statistics
| Branch: | Tag: | Revision:
1
#!/bin/sh
2
#
3
# builder_common.sh
4
#
5
# part of pfSense (https://www.pfsense.org)
6
# Copyright (c) 2004-2016 Rubicon Communications, LLC (Netgate)
7
# All rights reserved.
8
#
9
# NanoBSD portions of the code
10
# Copyright (c) 2005 Poul-Henning Kamp.
11
# and copied from nanobsd.sh
12
# All rights reserved.
13
#
14
# FreeSBIE portions of the code
15
# Copyright (c) 2005 Dario Freni
16
# and copied from FreeSBIE project
17
# All rights reserved.
18
#
19
# Redistribution and use in source and binary forms, with or without
20
# modification, are permitted provided that the following conditions are met:
21
#
22
# 1. Redistributions of source code must retain the above copyright notice,
23
#    this list of conditions and the following disclaimer.
24
#
25
# 2. Redistributions in binary form must reproduce the above copyright
26
#    notice, this list of conditions and the following disclaimer in
27
#    the documentation and/or other materials provided with the
28
#    distribution.
29
#
30
# 3. All advertising materials mentioning features or use of this software
31
#    must display the following acknowledgment:
32
#    "This product includes software developed by the pfSense Project
33
#    for use in the pfSense® software distribution. (http://www.pfsense.org/).
34
#
35
# 4. The names "pfSense" and "pfSense Project" must not be used to
36
#    endorse or promote products derived from this software without
37
#    prior written permission. For written permission, please contact
38
#    coreteam@pfsense.org.
39
#
40
# 5. Products derived from this software may not be called "pfSense"
41
#    nor may "pfSense" appear in their names without prior written
42
#    permission of the Electric Sheep Fencing, LLC.
43
#
44
# 6. Redistributions of any form whatsoever must retain the following
45
#    acknowledgment:
46
#
47
# "This product includes software developed by the pfSense Project
48
# for use in the pfSense software distribution (http://www.pfsense.org/).
49
#
50
# THIS SOFTWARE IS PROVIDED BY THE pfSense PROJECT ``AS IS'' AND ANY
51
# EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
52
# IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
53
# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE pfSense PROJECT OR
54
# ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
55
# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
56
# NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
57
# LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
58
# HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
59
# STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
60
# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
61
# OF THE POSSIBILITY OF SUCH DAMAGE.
62

    
63
if [ -n "${IMAGES_FINAL_DIR}" -a "${IMAGES_FINAL_DIR}" != "/" ]; then
64
	mkdir -p ${IMAGES_FINAL_DIR}
65
else
66
	echo "IMAGES_FINAL_DIR is not defined"
67
	print_error_pfS
68
fi
69

    
70
lc() {
71
	echo "${1}" | tr '[[:upper:]]' '[[:lower:]]'
72
}
73

    
74
git_last_commit() {
75
	export CURRENT_COMMIT=$(git -C ${BUILDER_ROOT} log -1 --format='%H')
76
	export CURRENT_AUTHOR=$(git -C ${BUILDER_ROOT} log -1 --format='%an')
77
	echo ">>> Last known commit $CURRENT_AUTHOR - $CURRENT_COMMIT"
78
	echo "$CURRENT_COMMIT" > $SCRATCHDIR/build_commit_info.txt
79
}
80

    
81
# Create core pkg repository
82
core_pkg_create_repo() {
83
	if [ ! -d "${CORE_PKG_REAL_PATH}/All" ]; then
84
		return
85
	fi
86

    
87
	############ ATTENTION ##############
88
	#
89
	# For some reason pkg-repo fail without / in the end of directory name
90
	# so removing it will break command
91
	#
92
	# https://github.com/freebsd/pkg/issues/1364
93
	#
94
	echo -n ">>> Creating core packages repository... "
95
	if pkg repo -q "${CORE_PKG_REAL_PATH}/"; then
96
		echo "Done!"
97
	else
98
		echo "Failed!"
99
		print_error_pfS
100
	fi
101

    
102
	# Use the same directory structure as poudriere does to avoid
103
	# breaking snapshot repositories during rsync
104
	ln -sf $(basename ${CORE_PKG_REAL_PATH}) ${CORE_PKG_PATH}/.latest
105
	ln -sf .latest/All ${CORE_PKG_ALL_PATH}
106
	ln -sf .latest/digests.txz ${CORE_PKG_PATH}/digests.txz
107
	ln -sf .latest/meta.txz ${CORE_PKG_PATH}/meta.txz
108
	ln -sf .latest/packagesite.txz ${CORE_PKG_PATH}/packagesite.txz
109
}
110

    
111
# Create core pkg (base, kernel)
112
core_pkg_create() {
113
	local _template="${1}"
114
	local _flavor="${2}"
115
	local _version="${3}"
116
	local _root="${4}"
117
	local _filter="${5}"
118

    
119
	[ -d "${CORE_PKG_TMP}" ] \
120
		&& rm -rf ${CORE_PKG_TMP}
121

    
122
	local _templates_path=${BUILDER_TOOLS}/templates/core_pkg/${_template}
123
	local _template_metadir=${_templates_path}/metadir
124
	local _metadir=${CORE_PKG_TMP}/${_template}_metadir
125

    
126
	if [ ! -d ${_template_metadir} ]; then
127
		echo "ERROR: Template dir not found for pkg ${_template}"
128
		exit
129
	fi
130

    
131
	mkdir -p ${CORE_PKG_TMP}
132

    
133
	cp -r ${_template_metadir} ${_metadir}
134

    
135
	local _manifest=${_metadir}/+MANIFEST
136
	local _plist=${CORE_PKG_TMP}/${_template}_plist
137
	local _exclude_plist=${CORE_PKG_TMP}/${_template}_exclude_plist
138

    
139
	if [ -f "${_templates_path}/pkg-plist" ]; then
140
		cp ${_templates_path}/pkg-plist ${_plist}
141
	else
142
		if [ -n "${_filter}" ]; then
143
			_filter="-name ${_filter}"
144
		fi
145
		(cd ${_root} && find . ${_filter} -type f -or -type l | sed 's,^.,,' | sort -u) > ${_plist}
146
	fi
147

    
148
	if [ -f "${_templates_path}/exclude_plist" ]; then
149
		cp ${_templates_path}/exclude_plist ${_exclude_plist}
150
	else
151
		touch ${_exclude_plist}
152
	fi
153

    
154
	sed \
155
		-i '' \
156
		-e "s,%%PRODUCT_NAME%%,${PRODUCT_NAME},g" \
157
		-e "s,%%PRODUCT_URL%%,${PRODUCT_URL},g" \
158
		-e "s,%%FLAVOR%%,${_flavor:+-}${_flavor},g" \
159
		-e "s,%%FLAVOR_DESC%%,${_flavor:+ (${_flavor})},g" \
160
		-e "s,%%VERSION%%,${_version},g" \
161
		${_metadir}/* \
162
		${_plist} \
163
		${exclude_plist}
164

    
165
	if [ -f "${_exclude_plist}" ]; then
166
		sort -u ${_exclude_plist} > ${_plist}.exclude
167
		mv ${_plist} ${_plist}.tmp
168
		comm -23 ${_plist}.tmp ${_plist}.exclude > ${_plist}
169
		rm -f ${_plist}.tmp ${plist}.exclude
170
	fi
171

    
172
	# Add license information
173
	local _portname=$(sed '/^name: /!d; s,^[^"]*",,; s,",,' ${_metadir}/+MANIFEST)
174
	local _licenses_dir="/usr/local/share/licenses/${_portname}-${_version}"
175
	mkdir -p ${_root}${_licenses_dir}
176
	cp ${BUILDER_ROOT}/license.txt ${_root}${_licenses_dir}/ESF
177
	echo "This package has a single license: ESF (Electric Sheep Fencing License)." \
178
		> ${_root}${_licenses_dir}/LICENSE
179
	cat <<EOF >${_root}${_licenses_dir}/catalog.mk
180
_LICENSE=ESF
181
_LICENSE_NAME=Electric Sheep Fencing License
182
_LICENSE_PERMS=dist-mirror dist-sell pkg-mirror pkg-sell auto-accept
183
_LICENSE_GROUPS=
184
_LICENSE_DISTFILES=
185
EOF
186
	cat <<EOF >>${_plist}
187
${_licenses_dir}/catalog.mk
188
${_licenses_dir}/LICENSE
189
${_licenses_dir}/ESF
190
EOF
191

    
192
	mkdir -p ${CORE_PKG_REAL_PATH}/All
193
	if ! pkg create -o ${CORE_PKG_REAL_PATH}/All -p ${_plist} -r ${_root} -m ${_metadir}; then
194
		echo ">>> ERROR: Error building package ${_template} ${_flavor}"
195
		print_error_pfS
196
	fi
197

    
198
	# Cleanup _licenses_dir
199
	rm -rf ${_root}${_licenses_dir}
200
}
201

    
202
# This routine will output that something went wrong
203
print_error_pfS() {
204
	echo
205
	echo "####################################"
206
	echo "Something went wrong, check errors!" >&2
207
	echo "####################################"
208
	echo
209
	echo "NOTE: a lot of times you can run './build.sh --clean-builder' to resolve."
210
	echo
211
	if [ "$1" != "" ]; then
212
		echo $1
213
	fi
214
	[ -n "${LOGFILE}" -a -f "${LOGFILE}" ] && \
215
		echo "Log saved on ${LOGFILE}" && \
216
		tail -n20 ${LOGFILE} >&2
217
	echo
218
	kill $$
219
	exit 1
220
}
221

    
222
# This routine will verify that the kernel has been
223
# installed OK to the staging area.
224
ensure_kernel_exists() {
225
	if [ ! -f "$1/boot/kernel/kernel.gz" ]; then
226
		echo ">>> ERROR: Could not locate $1/boot/kernel.gz"
227
		print_error_pfS
228
	fi
229
	KERNEL_SIZE=$(stat -f "%z" $1/boot/kernel/kernel.gz)
230
	if [ "$KERNEL_SIZE" -lt 3500 ]; then
231
		echo ">>> ERROR: Kernel $1/boot/kernel.gz appears to be smaller than it should be: $KERNEL_SIZE"
232
		print_error_pfS
233
	fi
234
}
235

    
236
get_pkg_name() {
237
	echo "${PRODUCT_NAME}-${1}-${CORE_PKG_VERSION}"
238
}
239

    
240
# This routine builds all related kernels
241
build_all_kernels() {
242
	# Set KERNEL_BUILD_PATH if it has not been set
243
	if [ -z "${KERNEL_BUILD_PATH}" ]; then
244
		KERNEL_BUILD_PATH=$SCRATCHDIR/kernels
245
		echo ">>> KERNEL_BUILD_PATH has not been set. Setting to ${KERNEL_BUILD_PATH}!"
246
	fi
247

    
248
	[ -d "${KERNEL_BUILD_PATH}" ] \
249
		&& rm -rf ${KERNEL_BUILD_PATH}
250

    
251
	# Build embedded kernel
252
	for BUILD_KERNEL in $BUILD_KERNELS; do
253
		unset KERNCONF
254
		unset KERNEL_DESTDIR
255
		unset KERNELCONF
256
		unset KERNEL_NAME
257
		export KERNCONF=$BUILD_KERNEL
258
		export KERNEL_DESTDIR="$KERNEL_BUILD_PATH/$BUILD_KERNEL"
259
		export KERNELCONF="${FREEBSD_SRC_DIR}/sys/${TARGET}/conf/$BUILD_KERNEL"
260
		export KERNEL_NAME=${BUILD_KERNEL}
261

    
262
		LOGFILE="${BUILDER_LOGS}/kernel.${KERNCONF}.${TARGET}.log"
263
		echo ">>> Building $BUILD_KERNEL kernel."  | tee -a ${LOGFILE}
264

    
265
		if [ ! -e "${FREEBSD_SRC_DIR}/sys/${TARGET}/conf/${BUILD_KERNEL}" ]; then
266
			echo ">>> ERROR: Could not find $KERNELCONF"
267
			print_error_pfS
268
		fi
269

    
270
		if [ -n "${NO_BUILDKERNEL}" -a -f "${CORE_PKG_ALL_PATH}/$(get_pkg_name kernel-${KERNEL_NAME}).txz" ]; then
271
			echo ">>> NO_BUILDKERNEL set, skipping build" | tee -a ${LOGFILE}
272
			continue
273
		fi
274

    
275
		export SRC_CONF=${SRC_CONF}
276
		buildkernel
277

    
278
		echo ">>> Staging $BUILD_KERNEL kernel..." | tee -a ${LOGFILE}
279
		installkernel
280

    
281
		ensure_kernel_exists $KERNEL_DESTDIR
282

    
283
		echo -n ">>> Creating pkg of $KERNEL_NAME-debug kernel to staging area... "  | tee -a ${LOGFILE}
284
		core_pkg_create kernel-debug ${KERNEL_NAME} ${CORE_PKG_VERSION} ${KERNEL_DESTDIR} \*.symbols
285
		find ${KERNEL_DESTDIR} -name '*.symbols' -type f -delete
286
		echo " Done" | tee -a ${LOGFILE}
287

    
288
		echo -n ">>> Creating pkg of $KERNEL_NAME kernel to staging area... "  | tee -a ${LOGFILE}
289
		core_pkg_create kernel ${KERNEL_NAME} ${CORE_PKG_VERSION} ${KERNEL_DESTDIR}
290

    
291
		rm -rf $KERNEL_DESTDIR 2>&1 1>/dev/null
292

    
293
		echo " Done" | tee -a ${LOGFILE}
294
	done
295
}
296

    
297
install_default_kernel() {
298
	if [ -z "${1}" ]; then
299
		echo ">>> ERROR: install_default_kernel called without a kernel config name"| tee -a ${LOGFILE}
300
		print_error_pfS
301
	fi
302

    
303
	export KERNEL_NAME="${1}"
304

    
305
	echo -n ">>> Installing kernel to be used by image ${KERNEL_NAME}..." | tee -a ${LOGFILE}
306

    
307
	# Copy kernel package to chroot, otherwise pkg won't find it to install
308
	if ! pkg_chroot_add ${FINAL_CHROOT_DIR} kernel-${KERNEL_NAME}; then
309
		echo ">>> ERROR: Error installing kernel package $(get_pkg_name kernel-${KERNEL_NAME}).txz" | tee -a ${LOGFILE}
310
		print_error_pfS
311
	fi
312

    
313
	# Lock kernel to avoid user end up removing it for any reason
314
	pkg_chroot ${FINAL_CHROOT_DIR} lock -q -y $(get_pkg_name kernel-${KERNEL_NAME})
315

    
316
	if [ ! -f $FINAL_CHROOT_DIR/boot/kernel/kernel.gz ]; then
317
		echo ">>> ERROR: No kernel installed on $FINAL_CHROOT_DIR and the resulting image will be unusable. STOPPING!" | tee -a ${LOGFILE}
318
		print_error_pfS
319
	fi
320
	mkdir -p $FINAL_CHROOT_DIR/pkgs
321
	if [ -z "${2}" -o -n "${INSTALL_EXTRA_KERNELS}" ]; then
322
		cp ${CORE_PKG_ALL_PATH}/$(get_pkg_name kernel-${KERNEL_NAME}).txz $FINAL_CHROOT_DIR/pkgs
323
		if [ -n "${INSTALL_EXTRA_KERNELS}" ]; then
324
			for _EXTRA_KERNEL in $INSTALL_EXTRA_KERNELS; do
325
				_EXTRA_KERNEL_PATH=${CORE_PKG_ALL_PATH}/$(get_pkg_name kernel-${_EXTRA_KERNEL}).txz
326
				if [ -f "${_EXTRA_KERNEL_PATH}" ]; then
327
					echo -n ". adding ${_EXTRA_KERNEL_PATH} on image /pkgs folder"
328
					cp ${_EXTRA_KERNEL_PATH} $FINAL_CHROOT_DIR/pkgs
329
				else
330
					echo ">>> ERROR: Requested kernel $(get_pkg_name kernel-${_EXTRA_KERNEL}).txz was not found to be put on image /pkgs folder!"
331
					print_error_pfS
332
				fi
333
			done
334
		fi
335
	fi
336
	echo "Done." | tee -a ${LOGFILE}
337

    
338
	unset KERNEL_NAME
339
}
340

    
341
# Creates a full update file
342
create_Full_update_tarball() {
343
	local _variant="$1"
344

    
345
	LOGFILE=${BUILDER_LOGS}/full_update.${TARGET}
346
	if [ "${UPDATES_TARBALL_FILENAME}" = "" ]; then
347
		echo ">>> UPDATES_TARBALL_FILENAME is empty skipping generation of full update image!" | tee -a ${LOGFILE}
348
		return
349
	fi
350

    
351
	local _image_path=${UPDATES_TARBALL_FILENAME}
352
	if [ -n "${_variant}" ]; then
353
		_image_path=$(echo "$_image_path" | \
354
			sed "s/-Full-Update-/-Full-Update-${_variant}-/")
355
		VARIANTUPDATES="${VARIANTUPDATES}${VARIANTUPDATES:+ }${_image_path}"
356
	fi
357

    
358
	mkdir -p $UPDATESDIR
359

    
360
	customize_stagearea_for_image "fullupdate" "" $_variant
361
	install_default_kernel ${DEFAULT_KERNEL}
362

    
363
	rm -rf ${FINAL_CHROOT_DIR}/cf
364
	rm -rf ${FINAL_CHROOT_DIR}/conf
365
	rm -f ${FINAL_CHROOT_DIR}/etc/dh-parameters.*
366
	rm -f ${FINAL_CHROOT_DIR}/etc/rc.conf
367
	rm -f ${FINAL_CHROOT_DIR}/etc/pwd.db 2>/dev/null
368
	rm -f ${FINAL_CHROOT_DIR}/etc/group 2>/dev/null
369
	rm -f ${FINAL_CHROOT_DIR}/etc/spwd.db 2>/dev/null
370
	rm -f ${FINAL_CHROOT_DIR}/etc/passwd 2>/dev/null
371
	rm -f ${FINAL_CHROOT_DIR}/etc/master.passwd 2>/dev/null
372
	rm -f ${FINAL_CHROOT_DIR}/etc/fstab 2>/dev/null
373
	rm -f ${FINAL_CHROOT_DIR}/etc/bogons 2>/dev/null
374
	# Remove loader.conf and friends.  Ticket #560
375
	rm ${FINAL_CHROOT_DIR}/boot/loader.conf 2>/dev/null
376
	rm ${FINAL_CHROOT_DIR}/boot/loader.conf.local 2>/dev/null
377

    
378
	# Old systems will run (pre|post)_upgrade_command from /tmp
379
	if [ -f ${FINAL_CHROOT_DIR}${PRODUCT_SHARE_DIR}/pre_upgrade_command ]; then
380
		cp -p \
381
			${FINAL_CHROOT_DIR}${PRODUCT_SHARE_DIR}/pre_upgrade_command \
382
			${FINAL_CHROOT_DIR}/tmp
383
	fi
384
	if [ -f ${FINAL_CHROOT_DIR}${PRODUCT_SHARE_DIR}/post_upgrade_command ]; then
385
		cp -p \
386
			${FINAL_CHROOT_DIR}${PRODUCT_SHARE_DIR}/post_upgrade_command \
387
			${FINAL_CHROOT_DIR}/tmp
388
	fi
389

    
390
	echo ">>> Creating ${_image_path} ..." | tee -a ${LOGFILE}
391
	tar --exclude=./dev -czPf ${_image_path} -C ${FINAL_CHROOT_DIR} .
392

    
393
	echo ">>> Full Update created: $(LC_ALL=C date)" | tee -a ${LOGFILE}
394
}
395

    
396
# Outputs various set variables aka env
397
print_flags() {
398

    
399
	echo
400
	printf "             Product version: %s\n" $PRODUCT_VERSION
401
	printf "                   Stage DIR: %s\n" $STAGE_CHROOT_DIR
402
	printf "                 Updates dir: %s\n" $UPDATESDIR
403
	printf " Image Preparation Stage DIR: %s\n" $FINAL_CHROOT_DIR
404
	printf "                  Source DIR: %s\n" $FREEBSD_SRC_DIR
405
	printf "          FreeBSD repository: %s\n" $FREEBSD_REPO_BASE
406
	printf "          FreeBSD-src branch: %s\n" $FREEBSD_BRANCH
407
	printf "     FreeBSD original branch: %s\n" $FREEBSD_PARENT_BRANCH
408
	printf "               BUILD_KERNELS: %s\n" $BUILD_KERNELS
409
	printf "           Git Branch or Tag: %s\n" $GIT_REPO_BRANCH_OR_TAG
410
	printf "            MODULES_OVERRIDE: %s\n" $MODULES_OVERRIDE
411
	printf "    VMDK_DISK_CAPACITY_IN_GB: %s\n" $VMDK_DISK_CAPACITY_IN_GB
412
	printf "                 OVFTEMPLATE: %s\n" $OVFTEMPLATE
413
	printf "                     OVFVMDK: %s\n" $OVFVMDK
414
	printf "                    SRC_CONF: %s\n" $SRC_CONF
415
	printf "                     ISOPATH: %s\n" $ISOPATH
416
	printf "                MEMSTICKPATH: %s\n" $MEMSTICKPATH
417
	printf "    UPDATES_TARBALL_FILENAME: %s\n" $UPDATES_TARBALL_FILENAME
418
if [ -n "$SHOW_ENV" ]; then
419
	for LINE in $(env | egrep -v '(terminal|PASS|NAME|USER|SSH|GROUP|HOST)'); do
420
		echo "SHOW_ENV: $LINE"
421
	done
422
fi
423
	echo
424
}
425

    
426
# This builds FreeBSD (make buildworld)
427
# Imported from FreeSBIE
428
make_world() {
429

    
430
	LOGFILE=${BUILDER_LOGS}/buildworld.${TARGET}
431
	if [ -n "${NO_BUILDWORLD}" ]; then
432
		echo ">>> NO_BUILDWORLD set, skipping build" | tee -a ${LOGFILE}
433
		return
434
	fi
435

    
436
	# Set SRC_CONF variable if it's not already set.
437
	if [ -z "${SRC_CONF}" ]; then
438
		echo ">>> SRC_CONF is unset make sure this is what you want!" | tee -a ${LOGFILE}
439
	else
440
		echo ">>> Setting SRC_CONF to $SRC_CONF" | tee -a ${LOGFILE}
441
	fi
442

    
443
	# Set default parameters
444
	export MAKE_ARGS="${MAKEJ_WORLD} __MAKE_CONF=${MAKE_CONF} SRCCONF=${SRC_CONF} TARGET=${TARGET} TARGET_ARCH=${TARGET_ARCH}"
445

    
446
	echo ">>> LOGFILE set to $LOGFILE." | tee -a ${LOGFILE}
447
	makeargs="${MAKE_ARGS}"
448
	echo ">>> Building world for ${TARGET} architecture... (Starting - $(LC_ALL=C date))" | tee -a ${LOGFILE}
449
	echo ">>> Builder is running the command: env LOCAL_ITOOLS=\"${EXTRA_TOOLS}\" script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR} -DNO_CLEAN ${makeargs} buildworld" | tee -a ${LOGFILE}
450
	(env LOCAL_ITOOLS="${EXTRA_TOOLS}" script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR} -DNO_CLEAN ${makeargs} buildworld || print_error_pfS;) | egrep '^>>>' | tee -a ${LOGFILE}
451
	echo ">>> Building world for ${TARGET} architecture... (Finished - $(LC_ALL=C date))" | tee -a ${LOGFILE}
452

    
453
	LOGFILE=${BUILDER_LOGS}/installworld.${TARGET}
454
	echo ">>> LOGFILE set to $LOGFILE." | tee -a ${LOGFILE}
455
	# Create if cleaned up
456
	makeargs="${MAKE_ARGS} DESTDIR=${STAGE_CHROOT_DIR} WITHOUT_TOOLCHAIN=1"
457
	echo ">>> Installing world for ${TARGET} architecture... (Starting - $(LC_ALL=C date))" | tee -a ${LOGFILE}
458
	echo ">>> Builder is running the command: env LOCAL_ITOOLS=\"${EXTRA_TOOLS}\" script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR} ${makeargs} installworld" | tee -a ${LOGFILE}
459
	(env LOCAL_ITOOLS="${EXTRA_TOOLS}" script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR} ${makeargs} installworld || print_error_pfS;) | egrep '^>>>' | tee -a ${LOGFILE}
460
	echo ">>> Installing world for ${TARGET} architecture... (Finished - $(LC_ALL=C date))" | tee -a ${LOGFILE}
461

    
462
	makeargs="${MAKE_ARGS} DESTDIR=${STAGE_CHROOT_DIR}"
463
	echo ">>> Distribution world for ${TARGET} architecture... (Starting - $(LC_ALL=C date))" | tee -a ${LOGFILE}
464
	echo ">>> Builder is running the command: script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR} ${makeargs} distribution " | tee -a ${LOGFILE}
465
	(script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR} ${makeargs} distribution  || print_error_pfS;) | egrep '^>>>' | tee -a ${LOGFILE}
466
	echo ">>> Distribution world for ${TARGET} architecture... (Finished - $(LC_ALL=C date))" | tee -a ${LOGFILE}
467

    
468
	[ -d "${STAGE_CHROOT_DIR}/usr/local/bin" ] \
469
		|| mkdir -p ${STAGE_CHROOT_DIR}/usr/local/bin
470
	makeargs="${MAKE_ARGS} DESTDIR=${STAGE_CHROOT_DIR}"
471
	echo ">>> Building and installing crypto tools and athstats for ${TARGET} architecture... (Starting - $(LC_ALL=C date))" | tee -a ${LOGFILE}
472
	echo ">>> Builder is running the command: script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR}/tools/tools/crypto ${makeargs} clean all install " | tee -a ${LOGFILE}
473
	(script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR}/tools/tools/crypto ${makeargs} clean all install || print_error_pfS;) | egrep '^>>>' | tee -a ${LOGFILE}
474
	echo ">>> Builder is running the command: script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR}/tools/tools/ath/athstats ${makeargs} clean" | tee -a ${LOGFILE}
475
	(script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR}/tools/tools/ath/athstats ${makeargs} clean || print_error_pfS;) | egrep '^>>>' | tee -a ${LOGFILE}
476
	echo ">>> Builder is running the command: script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR}/tools/tools/ath/athstats ${makeargs} all" | tee -a ${LOGFILE}
477
	(script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR}/tools/tools/ath/athstats ${makeargs} all || print_error_pfS;) | egrep '^>>>' | tee -a ${LOGFILE}
478
	echo ">>> Builder is running the command: script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR}/tools/tools/ath/athstats ${makeargs} install" | tee -a ${LOGFILE}
479
	(script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR}/tools/tools/ath/athstats ${makeargs} install || print_error_pfS;) | egrep '^>>>' | tee -a ${LOGFILE}
480
	echo ">>> Building and installing crypto tools and athstats for ${TARGET} architecture... (Finished - $(LC_ALL=C date))" | tee -a ${LOGFILE}
481

    
482
	if [ "${PRODUCT_NAME}" = "pfSense" -a -n "${GNID_REPO_BASE}" ]; then
483
		echo ">>> Building gnid... " | tee -a ${LOGFILE}
484
		(\
485
			cd ${GNID_SRC_DIR} && \
486
			make INCLUDE_DIR=${GNID_INCLUDE_DIR} \
487
			LIBCRYPTO_DIR=${GNID_LIBCRYPTO_DIR} clean gnid \
488
		) || print_error_pfS
489
		install -o root -g wheel -m 0700 ${GNID_SRC_DIR}/gnid \
490
			${STAGE_CHROOT_DIR}/usr/sbin \
491
			|| print_error_pfS
492
	fi
493

    
494
	unset makeargs
495
}
496

    
497
nanobsd_image_filename() {
498
	local _size="$1"
499
	local _type="$2"
500
	local _upgrade="$3"
501

    
502
	if [ -z "$_upgrade" ]; then
503
		local _template=${NANOBSD_IMG_TEMPLATE}
504
	else
505
		local _template=${NANOBSD_UPGRADE_TEMPLATE}
506
	fi
507

    
508
	echo "$_template" | sed \
509
		-e "s,%%SIZE%%,${_size},g" \
510
		-e "s,%%TYPE%%,${_type},g"
511

    
512
	return 0
513
}
514

    
515
# This routine originated in nanobsd.sh
516
nanobsd_set_flash_details () {
517
	a1=$(echo $1 | tr '[:upper:]' '[:lower:]')
518

    
519
	# Source:
520
	#	SanDisk CompactFlash Memory Card
521
	#	Product Manual
522
	#	Version 10.9
523
	#	Document No. 20-10-00038
524
	#	April 2005
525
	# Table 2-7
526
	# NB: notice math error in SDCFJ-4096-388 line.
527
	#
528
	case "${a1}" in
529
		2048|2048m|2048mb|2g)
530
			NANO_MEDIASIZE=$((1989999616/512))
531
			;;
532
		4096|4096m|4096mb|4g)
533
			NANO_MEDIASIZE=$((3989999616/512))
534
			;;
535
		8192|8192m|8192mb|8g)
536
			NANO_MEDIASIZE=$((7989999616/512))
537
			;;
538
		16384|16384m|16384mb|16g)
539
			NANO_MEDIASIZE=$((15989999616/512))
540
			;;
541
		*)
542
			echo "Unknown Flash capacity"
543
			exit 2
544
			;;
545
	esac
546

    
547
	NANO_HEADS=16
548
	NANO_SECTS=63
549

    
550
	echo ">>> [nanoo] $1"
551
	echo ">>> [nanoo] NANO_MEDIASIZE: $NANO_MEDIASIZE"
552
	echo ">>> [nanoo] NANO_HEADS: $NANO_HEADS"
553
	echo ">>> [nanoo] NANO_SECTS: $NANO_SECTS"
554
	echo ">>> [nanoo] NANO_BOOT0CFG: $NANO_BOOT0CFG"
555
}
556

    
557
# This routine originated in nanobsd.sh
558
create_nanobsd_diskimage () {
559
	if [ -z "${1}" ]; then
560
		echo ">>> ERROR: Type of image has not been specified"
561
		print_error_pfS
562
	fi
563
	if [ -z "${2}" ]; then
564
		echo ">>> ERROR: Size of image has not been specified"
565
		print_error_pfS
566
	fi
567

    
568
	if [ "${1}" = "nanobsd" ]; then
569
		# It's serial
570
		export NANO_BOOTLOADER="boot/boot0sio"
571
	elif [ "${1}" = "nanobsd-vga" ]; then
572
		# It's vga
573
		export NANO_BOOTLOADER="boot/boot0"
574
	else
575
		echo ">>> ERROR: Type of image to create unknown"
576
		print_error_pfS
577
	fi
578

    
579
	if [ -z "${2}" ]; then
580
		echo ">>> ERROR: Media size(s) not specified."
581
		print_error_pfS
582
	fi
583

    
584
	if [ -z "${2}" ]; then
585
		echo ">>> ERROR: FLASH_SIZE is not set."
586
		print_error_pfS
587
	fi
588

    
589
	LOGFILE=${BUILDER_LOGS}/${1}.${TARGET}
590
	# Prepare folder to be put in image
591
	customize_stagearea_for_image "${1}"
592
	install_default_kernel ${DEFAULT_KERNEL} "no"
593

    
594
	echo ">>> Fixing up NanoBSD Specific items..." | tee -a ${LOGFILE}
595

    
596
	echo "nanobsd" > $FINAL_CHROOT_DIR/etc/platform
597

    
598
	local BOOTCONF=${FINAL_CHROOT_DIR}/boot.config
599
	local LOADERCONF=${FINAL_CHROOT_DIR}/boot/loader.conf
600

    
601
	if [ "${1}" = "nanobsd" ]; then
602
		# Tell loader to use serial console early.
603
		echo "-S115200 -h" >> ${BOOTCONF}
604

    
605
		# Remove old console options if present.
606
		[ -f "${LOADERCONF}" ] \
607
			&& sed -i "" -Ee "/(console|boot_multicons|boot_serial|hint.uart)/d" ${LOADERCONF}
608
		# Activate serial console+video console in loader.conf
609
		echo 'loader_color="NO"' >> ${LOADERCONF}
610
		echo 'beastie_disable="YES"' >> ${LOADERCONF}
611
		echo 'boot_serial="YES"' >> ${LOADERCONF}
612
		echo 'console="comconsole"' >> ${LOADERCONF}
613
		echo 'comconsole_speed="115200"' >> ${LOADERCONF}
614
	fi
615
	echo 'autoboot_delay="5"' >> ${LOADERCONF}
616

    
617
	# Old systems will run (pre|post)_upgrade_command from /tmp
618
	if [ -f ${FINAL_CHROOT_DIR}${PRODUCT_SHARE_DIR}/pre_upgrade_command ]; then
619
		cp -p \
620
			${FINAL_CHROOT_DIR}${PRODUCT_SHARE_DIR}/pre_upgrade_command \
621
			${FINAL_CHROOT_DIR}/tmp
622
	fi
623
	if [ -f ${FINAL_CHROOT_DIR}${PRODUCT_SHARE_DIR}/post_upgrade_command ]; then
624
		cp -p \
625
			${FINAL_CHROOT_DIR}${PRODUCT_SHARE_DIR}/post_upgrade_command \
626
			${FINAL_CHROOT_DIR}/tmp
627
	fi
628

    
629
	for _NANO_MEDIASIZE in ${2}; do
630
		if [ -z "${_NANO_MEDIASIZE}" ]; then
631
			continue;
632
		fi
633

    
634
		echo ">>> building NanoBSD(${1}) disk image with size ${_NANO_MEDIASIZE} for platform (${TARGET})..." | tee -a ${LOGFILE}
635
		echo "" > $BUILDER_LOGS/nanobsd_cmds.sh
636

    
637
		IMG="${IMAGES_FINAL_DIR}/$(nanobsd_image_filename ${_NANO_MEDIASIZE} ${1})"
638
		IMGUPDATE="${IMAGES_FINAL_DIR}/$(nanobsd_image_filename ${_NANO_MEDIASIZE} ${1} 1)"
639

    
640
		nanobsd_set_flash_details ${_NANO_MEDIASIZE}
641

    
642
		# These are defined in FlashDevice and on builder_default.sh
643
		echo $NANO_MEDIASIZE \
644
			$NANO_IMAGES \
645
			$NANO_SECTS \
646
			$NANO_HEADS \
647
			$NANO_CODESIZE \
648
			$NANO_CONFSIZE \
649
			$NANO_DATASIZE |
650
awk '
651
{
652
	printf "# %s\n", $0
653

    
654
	# size of cylinder in sectors
655
	cs = $3 * $4
656

    
657
	# number of full cylinders on media
658
	cyl = int ($1 / cs)
659

    
660
	# output fdisk geometry spec, truncate cyls to 1023
661
	if (cyl <= 1023)
662
		print "g c" cyl " h" $4 " s" $3
663
	else
664
		print "g c" 1023 " h" $4 " s" $3
665

    
666
	if ($7 > 0) {
667
		# size of data partition in full cylinders
668
		dsl = int (($7 + cs - 1) / cs)
669
	} else {
670
		dsl = 0;
671
	}
672

    
673
	# size of config partition in full cylinders
674
	csl = int (($6 + cs - 1) / cs)
675

    
676
	if ($5 == 0) {
677
		# size of image partition(s) in full cylinders
678
		isl = int ((cyl - dsl - csl) / $2)
679
	} else {
680
		isl = int (($5 + cs - 1) / cs)
681
	}
682

    
683
	# First image partition start at second track
684
	print "p 1 165 " $3, isl * cs - $3
685
	c = isl * cs;
686

    
687
	# Second image partition (if any) also starts offset one
688
	# track to keep them identical.
689
	if ($2 > 1) {
690
		print "p 2 165 " $3 + c, isl * cs - $3
691
		c += isl * cs;
692
	}
693

    
694
	# Config partition starts at cylinder boundary.
695
	print "p 3 165 " c, csl * cs
696
	c += csl * cs
697

    
698
	# Data partition (if any) starts at cylinder boundary.
699
	if ($7 > 0) {
700
		print "p 4 165 " c, dsl * cs
701
	} else if ($7 < 0 && $1 > c) {
702
		print "p 4 165 " c, $1 - c
703
	} else if ($1 < c) {
704
		print "Disk space overcommitted by", \
705
		    c - $1, "sectors" > "/dev/stderr"
706
		exit 2
707
	}
708

    
709
	# Force slice 1 to be marked active. This is necessary
710
	# for booting the image from a USB device to work.
711
	print "a 1"
712
}
713
	' > ${IMAGES_FINAL_DIR}/_.fdisk
714

    
715
		MNT=${IMAGES_FINAL_DIR}/_.mnt
716
		mkdir -p ${MNT}
717

    
718
		dd if=/dev/zero of=${IMG} bs=${NANO_SECTS}b \
719
			count=0 seek=$((${NANO_MEDIASIZE}/${NANO_SECTS})) 2>&1 >> ${LOGFILE}
720

    
721
		MD=$(mdconfig -a -t vnode -f ${IMG} -x ${NANO_SECTS} -y ${NANO_HEADS})
722
		trap "mdconfig -d -u ${MD}; return" 1 2 15 EXIT
723

    
724
		fdisk -i -f ${IMAGES_FINAL_DIR}/_.fdisk ${MD} 2>&1 >> ${LOGFILE}
725
		fdisk ${MD} 2>&1 >> ${LOGFILE}
726

    
727
		boot0cfg -t 100 -B -b ${FINAL_CHROOT_DIR}/${NANO_BOOTLOADER} ${NANO_BOOT0CFG} ${MD} 2>&1 >> ${LOGFILE}
728

    
729
		# Create first image
730
		bsdlabel -m i386 -w -B -b ${FINAL_CHROOT_DIR}/boot/boot ${MD}s1 2>&1 >> ${LOGFILE}
731
		bsdlabel -m i386 ${MD}s1 2>&1 >> ${LOGFILE}
732
		local _label=$(lc ${PRODUCT_NAME})
733
		newfs -L ${_label}0 ${NANO_NEWFS} /dev/${MD}s1a 2>&1 >> ${LOGFILE}
734
		mount /dev/ufs/${_label}0 ${MNT}
735
		if [ $? -ne 0 ]; then
736
			echo ">>> ERROR: Something wrong happened during mount of first slice image creation. STOPPING!" | tee -a ${LOGFILE}
737
			print_error_pfS
738
		fi
739
		# Consider the unmounting as well
740
		trap "umount /dev/ufs/${_label}0; mdconfig -d -u ${MD}; return" 1 2 15 EXIT
741

    
742
		clone_directory_contents ${FINAL_CHROOT_DIR} ${MNT}
743

    
744
		# Set NanoBSD image size
745
		echo "${_NANO_MEDIASIZE}" > ${MNT}/etc/nanosize.txt
746

    
747
		echo "/dev/ufs/${_label}0 / ufs ro,sync,noatime 1 1" > ${MNT}/etc/fstab
748
		if [ $NANO_CONFSIZE -gt 0 ] ; then
749
			echo "/dev/ufs/cf /cf ufs ro,sync,noatime 1 1" >> ${MNT}/etc/fstab
750
		fi
751

    
752
		sync; sync; sync
753
		umount ${MNT} || umount -f ${MNT}
754
		# Restore the original trap
755
		trap "mdconfig -d -u ${MD}; return" 1 2 15 EXIT
756

    
757
		# Setting NANO_IMAGES to 1 and NANO_INIT_IMG2 will tell
758
		# NanoBSD to only create one partition.  We default to 2
759
		# partitions in case anything happens to the first the
760
		# operator can boot from the 2nd and should be OK.
761

    
762
		# Before just going to use dd for duplicate think!
763
		# The images are created as sparse so lets take advantage
764
		# of that by just exec some commands.
765
		if [ $NANO_IMAGES -gt 1 -a $NANO_INIT_IMG2 -gt 0 ] ; then
766
			# Duplicate to second image (if present)
767
			echo ">>> Creating NanoBSD second slice by duplicating first slice." | tee -a ${LOGFILE}
768
			# Create second image
769
			dd if=/dev/${MD}s1 of=/dev/${MD}s2 conv=sparse bs=64k 2>&1 >> ${LOGFILE}
770
			tunefs -L ${_label}1 /dev/${MD}s2a 2>&1 >> ${LOGFILE}
771
			mount /dev/ufs/${_label}1 ${MNT}
772
			if [ $? -ne 0 ]; then
773
				echo ">>> ERROR: Something wrong happened during mount of second slice image creation. STOPPING!" | tee -a ${LOGFILE}
774
				print_error_pfS
775
			fi
776
			# Consider the unmounting as well
777
			trap "umount /dev/ufs/${_label}1; mdconfig -d -u ${MD}; return" 1 2 15 EXIT
778

    
779
			echo "/dev/ufs/${_label}1 / ufs ro,sync,noatime 1 1" > ${MNT}/etc/fstab
780
			if [ $NANO_CONFSIZE -gt 0 ] ; then
781
				echo "/dev/ufs/cf /cf ufs ro,sync,noatime 1 1" >> ${MNT}/etc/fstab
782
			fi
783

    
784
			sync; sync; sync
785
			umount ${MNT} || umount -f ${MNT}
786
			# Restore the trap back
787
			trap "mdconfig -d -u ${MD}; return" 1 2 15 EXIT
788
		fi
789

    
790
		# Create Data slice, if any.
791
		# Note the changing of the variable to NANO_CONFSIZE
792
		# from NANO_DATASIZE.  We also added glabel support
793
		# and populate the Product configuration from the /cf
794
		# directory located in FINAL_CHROOT_DIR
795
		if [ $NANO_CONFSIZE -gt 0 ] ; then
796
			echo ">>> Creating /cf area to hold config.xml"
797
			newfs -L cf ${NANO_NEWFS} /dev/${MD}s3 2>&1 >> ${LOGFILE}
798
			# Mount data partition and copy contents of /cf
799
			# Can be used later to create custom default config.xml while building
800
			mount /dev/ufs/cf ${MNT}
801
			if [ $? -ne 0 ]; then
802
				echo ">>> ERROR: Something wrong happened during mount of cf slice image creation. STOPPING!" | tee -a ${LOGFILE}
803
				print_error_pfS
804
			fi
805
			# Consider the unmounting as well
806
			trap "umount /dev/ufs/cf; mdconfig -d -u ${MD}; return" 1 2 15 EXIT
807

    
808
			clone_directory_contents ${FINAL_CHROOT_DIR}/cf ${MNT}
809

    
810
			sync; sync; sync
811
			umount ${MNT} || umount -f ${MNT}
812
			# Restore the trap back
813
			trap "mdconfig -d -u ${MD}; return" 1 2 15 EXIT
814
		else
815
			">>> [nanoo] NANO_CONFSIZE is not set. Not adding a /conf partition.. You sure about this??" | tee -a ${LOGFILE}
816
		fi
817

    
818
		echo ">>> [nanoo] Creating NanoBSD upgrade file from first slice..." | tee -a ${LOGFILE}
819
		dd if=/dev/${MD}s1 of=$IMGUPDATE conv=sparse bs=64k 2>&1 >> ${LOGFILE}
820

    
821
		mdconfig -d -u $MD
822
		# Restore default action
823
		trap "-" 1 2 15 EXIT
824

    
825
		chflags -R noschg $MNT
826
		rm -rf $MNT
827

    
828
		# Check each image and ensure that they are over
829
		# 3 megabytes.  If either image is under 20 megabytes
830
		# in size then error out.
831
		IMGSIZE=$(stat -f "%z" ${IMG})
832
		IMGUPDATESIZE=$(stat -f "%z" ${IMGUPDATE})
833
		CHECKSIZE="20040710"
834
		if [ "$IMGSIZE" -lt "$CHECKSIZE" ]; then
835
			echo ">>> ERROR: Something went wrong when building NanoBSD.  The image size is under 20 megabytes!" | tee -a ${LOGFILE}
836
			print_error_pfS
837
		fi
838
		if [ "$IMGUPDATESIZE" -lt "$CHECKSIZE" ]; then
839
			echo ">>> ERROR: Something went wrong when building NanoBSD upgrade image.  The image size is under 20 megabytes!" | tee -a ${LOGFILE}
840
			print_error_pfS
841
		fi
842

    
843
		# Wrap up the show, Johnny
844
		echo ">>> NanoBSD Image completed for size: $_NANO_MEDIASIZE." | tee -a ${LOGFILE}
845

    
846
		gzip -qf $IMG &
847
		_bg_pids="${_bg_pids}${_bg_pids:+ }$!"
848
		gzip -qf $IMGUPDATE &
849
		_bg_pids="${_bg_pids}${_bg_pids:+ }$!"
850
	done
851

    
852
	unset IMG
853
	unset IMGUPDATE
854
	unset IMGUPDATESIZE
855
	unset IMGSIZE
856

    
857
	ls -lah $IMAGES_FINAL_DIR
858
}
859

    
860
# This routine creates a ova image that contains
861
# a ovf and vmdk file. These files can be imported
862
# right into vmware or virtual box.
863
# (and many other emulation platforms)
864
# http://www.vmware.com/pdf/ovf_whitepaper_specification.pdf
865
create_ova_image() {
866
	# XXX create a .ovf php creator that you can pass:
867
	#     1. populatedSize
868
	#     2. license
869
	#     3. product name
870
	#     4. version
871
	#     5. number of network interface cards
872
	#     6. allocationUnits
873
	#     7. capacity
874
	#     8. capacityAllocationUnits
875

    
876
	LOGFILE=${BUILDER_LOGS}/ova.${TARGET}.log
877

    
878
	local _mntdir=${OVA_TMP}/mnt
879

    
880
	if [ -d "${_mntdir}" ]; then
881
		local _dev
882
		# XXX Root cause still didn't found but it doesn't umount
883
		#     properly on looped builds and then require this extra
884
		#     check
885
		while true; do
886
			_dev=$(mount -p ${_mntdir} 2>/dev/null | awk '{print $1}')
887
			[ $? -ne 0 -o -z "${_dev}" ] \
888
				&& break
889
			umount -f ${_mntdir}
890
			mdconfig -d -u ${_dev#/dev/}
891
		done
892
		chflags -R noschg ${OVA_TMP}
893
		rm -rf ${OVA_TMP}
894
	fi
895

    
896
	mkdir -p ${_mntdir}
897

    
898
	if [ -z "${OVA_SWAP_PART_SIZE_IN_GB}" -o "${OVA_SWAP_PART_SIZE_IN_GB}" = "0" ]; then
899
		# first partition size (freebsd-ufs)
900
		local OVA_FIRST_PART_SIZE_IN_GB=${VMDK_DISK_CAPACITY_IN_GB}
901
		# Calculate real first partition size, removing 128 blocks (65536 bytes) beginning/loader
902
		local OVA_FIRST_PART_SIZE=$((${OVA_FIRST_PART_SIZE_IN_GB}*1024*1024*1024-65536))
903
		# Unset swap partition size variable
904
		unset OVA_SWAP_PART_SIZE
905
		# Parameter used by mkimg
906
		unset OVA_SWAP_PART_PARAM
907
	else
908
		# first partition size (freebsd-ufs)
909
		local OVA_FIRST_PART_SIZE_IN_GB=$((VMDK_DISK_CAPACITY_IN_GB-OVA_SWAP_PART_SIZE_IN_GB))
910
		# Use first partition size in g
911
		local OVA_FIRST_PART_SIZE="${OVA_FIRST_PART_SIZE_IN_GB}g"
912
		# Calculate real swap size, removing 128 blocks (65536 bytes) beginning/loader
913
		local OVA_SWAP_PART_SIZE=$((${OVA_SWAP_PART_SIZE_IN_GB}*1024*1024*1024-65536))
914
		# Parameter used by mkimg
915
		local OVA_SWAP_PART_PARAM="-p freebsd-swap/swap0::${OVA_SWAP_PART_SIZE}"
916
	fi
917

    
918
	# Prepare folder to be put in image
919
	customize_stagearea_for_image "ova"
920
	install_default_kernel ${DEFAULT_KERNEL} "no"
921

    
922
	# Fill fstab
923
	echo ">>> Installing platform specific items..." | tee -a ${LOGFILE}
924
	echo "/dev/gpt/${PRODUCT_NAME}	/	ufs		rw	1	1" > ${FINAL_CHROOT_DIR}/etc/fstab
925
	if [ -n "${OVA_SWAP_PART_SIZE}" ]; then
926
		echo "/dev/gpt/swap0	none	swap	sw	0	0" >> ${FINAL_CHROOT_DIR}/etc/fstab
927
	fi
928

    
929
	# Create / partition
930
	echo -n ">>> Creating / partition... " | tee -a ${LOGFILE}
931
	truncate -s ${OVA_FIRST_PART_SIZE} ${OVA_TMP}/${OVFUFS}
932
	local _md=$(mdconfig -a -f ${OVA_TMP}/${OVFUFS})
933
	trap "mdconfig -d -u ${_md}; return" 1 2 15 EXIT
934

    
935
	newfs -L ${PRODUCT_NAME} -j /dev/${_md} 2>&1 >>${LOGFILE}
936

    
937
	if ! mount /dev/${_md} ${_mntdir} 2>&1 >>${LOGFILE}; then
938
		echo "Failed!" | tee -a ${LOGFILE}
939
		echo ">>> ERROR: Error mounting temporary vmdk image. STOPPING!" | tee -a ${LOGFILE}
940
		print_error_pfS
941
	fi
942
	trap "sync; sleep 3; umount ${_mntdir} || umount -f ${_mntdir}; mdconfig -d -u ${_md}; return" 1 2 15 EXIT
943

    
944
	echo "Done!" | tee -a ${LOGFILE}
945

    
946
	clone_directory_contents ${FINAL_CHROOT_DIR} ${_mntdir}
947

    
948
	sync
949
	sleep 3
950
	umount ${_mntdir} || umount -f ${_mntdir} >>${LOGFILE} 2>&1
951
	mdconfig -d -u ${_md}
952
	trap "-" 1 2 15 EXIT
953

    
954
	# Create raw disk
955
	echo -n ">>> Creating raw disk... " | tee -a ${LOGFILE}
956
	mkimg \
957
		-s gpt \
958
		-f raw \
959
		-b ${FINAL_CHROOT_DIR}/boot/pmbr \
960
		-p freebsd-boot:=${FINAL_CHROOT_DIR}/boot/gptboot \
961
		-p freebsd-ufs/${PRODUCT_NAME}:=${OVA_TMP}/${OVFUFS} \
962
		${OVA_SWAP_PART_PARAM} \
963
		-o ${OVA_TMP}/${OVFRAW} 2>&1 >> ${LOGFILE}
964

    
965
	if [ $? -ne 0 -o ! -f ${OVA_TMP}/${OVFRAW} ]; then
966
		if [ -f ${OVA_TMP}/${OVFUFS} ]; then
967
			rm -f ${OVA_TMP}/${OVFUFS}
968
		fi
969
		if [ -f ${OVA_TMP}/${OVFRAW} ]; then
970
			rm -f ${OVA_TMP}/${OVFRAW}
971
		fi
972
		echo "Failed!" | tee -a ${LOGFILE}
973
		echo ">>> ERROR: Error creating temporary vmdk image. STOPPING!" | tee -a ${LOGFILE}
974
		print_error_pfS
975
	fi
976
	echo "Done!" | tee -a ${LOGFILE}
977

    
978
	# We don't need it anymore
979
	rm -f ${OVA_TMP}/${OVFUFS} >/dev/null 2>&1
980

    
981
	# Convert raw to vmdk
982
	echo -n ">>> Creating vmdk disk... " | tee -a ${LOGFILE}
983
	vmdktool -z9 -v ${OVA_TMP}/${OVFVMDK} ${OVA_TMP}/${OVFRAW}
984

    
985
	if [ $? -ne 0 -o ! -f ${OVA_TMP}/${OVFVMDK} ]; then
986
		if [ -f ${OVA_TMP}/${OVFRAW} ]; then
987
			rm -f ${OVA_TMP}/${OVFRAW}
988
		fi
989
		if [ -f ${OVA_TMP}/${OVFVMDK} ]; then
990
			rm -f ${OVA_TMP}/${OVFVMDK}
991
		fi
992
		echo "Failed!" | tee -a ${LOGFILE}
993
		echo ">>> ERROR: Error creating vmdk image. STOPPING!" | tee -a ${LOGFILE}
994
		print_error_pfS
995
	fi
996
	echo "Done!" | tee -a ${LOGFILE}
997

    
998
	rm -f ${OVA_TMP}/${OVFRAW}
999

    
1000
	ova_setup_ovf_template
1001

    
1002
	echo -n ">>> Writing final ova image... " | tee -a ${LOGFILE}
1003
	# Create OVA file for vmware
1004
	gtar -C ${OVA_TMP} -cpf ${OVAPATH} ${PRODUCT_NAME}.ovf ${OVFVMDK}
1005
	echo "Done!" | tee -a ${LOGFILE}
1006
	rm -f ${OVA_TMP}/${OVFVMDK} >/dev/null 2>&1
1007

    
1008
	echo ">>> OVA created: $(LC_ALL=C date)" | tee -a ${LOGFILE}
1009
}
1010

    
1011
# called from create_ova_image
1012
ova_setup_ovf_template() {
1013
	if [ ! -f ${OVFTEMPLATE} ]; then
1014
		echo ">>> ERROR: OVF template file (${OVFTEMPLATE}) not found."
1015
		print_error_pfS
1016
	fi
1017

    
1018
	#  OperatingSystemSection (${PRODUCT_NAME}.ovf)
1019
	#  42   FreeBSD 32-Bit
1020
	#  78   FreeBSD 64-Bit
1021
	if [ "${TARGET}" = "amd64" ]; then
1022
		local _os_id="78"
1023
		local _os_type="freebsd64Guest"
1024
		local _os_descr="FreeBSD 64-Bit"
1025
	elif [ "${TARGET}" = "i386" ]; then
1026
		local _os_id="42"
1027
		local _os_type="freebsdGuest"
1028
		local _os_descr="FreeBSD"
1029
	else
1030
		echo ">>> ERROR: Platform not supported for OVA (${TARGET})"
1031
		print_error_pfS
1032
	fi
1033

    
1034
	local POPULATED_SIZE=$(du -d0 -k $FINAL_CHROOT_DIR | cut -f1)
1035
	local POPULATED_SIZE_IN_BYTES=$((${POPULATED_SIZE}*1024))
1036
	local VMDK_FILE_SIZE=$(stat -f "%z" ${OVA_TMP}/${OVFVMDK})
1037

    
1038
	sed \
1039
		-e "s,%%VMDK_FILE_SIZE%%,${VMDK_FILE_SIZE},g" \
1040
		-e "s,%%VMDK_DISK_CAPACITY_IN_GB%%,${VMDK_DISK_CAPACITY_IN_GB},g" \
1041
		-e "s,%%POPULATED_SIZE_IN_BYTES%%,${POPULATED_SIZE_IN_BYTES},g" \
1042
		-e "s,%%OS_ID%%,${_os_id},g" \
1043
		-e "s,%%OS_TYPE%%,${_os_type},g" \
1044
		-e "s,%%OS_DESCR%%,${_os_descr},g" \
1045
		-e "s,%%PRODUCT_NAME%%,${PRODUCT_NAME},g" \
1046
		-e "s,%%PRODUCT_NAME_SUFFIX%%,${PRODUCT_NAME_SUFFIX},g" \
1047
		-e "s,%%PRODUCT_VERSION%%,${PRODUCT_VERSION},g" \
1048
		-e "s,%%PRODUCT_URL%%,${PRODUCT_URL},g" \
1049
		-e "s#%%VENDOR_NAME%%#${VENDOR_NAME}#g" \
1050
		-e "s#%%OVF_INFO%%#${OVF_INFO}#g" \
1051
		-e "/^%%PRODUCT_LICENSE%%/r ${BUILDER_ROOT}/license.txt" \
1052
		-e "/^%%PRODUCT_LICENSE%%/d" \
1053
		${OVFTEMPLATE} > ${OVA_TMP}/${PRODUCT_NAME}.ovf
1054
}
1055

    
1056
# Cleans up previous builds
1057
clean_builder() {
1058
	# Clean out directories
1059
	echo ">>> Cleaning up previous build environment...Please wait!"
1060

    
1061
	staginareas_clean_each_run
1062

    
1063
	if [ -d "${STAGE_CHROOT_DIR}" ]; then
1064
		BASENAME=$(basename ${STAGE_CHROOT_DIR})
1065
		echo -n ">>> Cleaning ${STAGE_CHROOT_DIR} ..."
1066
		chflags -R noschg ${STAGE_CHROOT_DIR} 2>&1 >/dev/null
1067
		rm -rf ${STAGE_CHROOT_DIR}/* 2>/dev/null
1068
		echo "Done."
1069
	fi
1070

    
1071
	if [ -z "${NO_CLEAN_FREEBSD_OBJ}" -a -d "${FREEBSD_SRC_DIR}" ]; then
1072
		OBJTREE=$(env TARGET=${TARGET} TARGET_ARCH=${TARGET_ARCH} make -C ${FREEBSD_SRC_DIR} -V OBJTREE)
1073
		if [ -d "${OBJTREE}" ]; then
1074
			echo -n ">>> Cleaning FreeBSD objects dir staging..."
1075
			echo -n "."
1076
			chflags -R noschg ${OBJTREE} 2>&1 >/dev/null
1077
			echo -n "."
1078
			rm -rf ${OBJTREE}/*
1079
			echo "Done!"
1080
		fi
1081
		if [ -d "${KERNEL_BUILD_PATH}" ]; then
1082
			echo -n ">>> Cleaning previously built kernel stage area..."
1083
			rm -rf $KERNEL_BUILD_PATH/*
1084
			echo "Done!"
1085
		fi
1086
	fi
1087
	mkdir -p $KERNEL_BUILD_PATH
1088

    
1089
	echo -n ">>> Cleaning previously built images..."
1090
	chflags -R noschg ${IMAGES_FINAL_DIR} ${STAGINGAREA} 2>&1 1>/dev/null
1091
	rm -rf $IMAGES_FINAL_DIR/*
1092
	rm -rf $STAGINGAREA/*
1093
	echo "Done!"
1094

    
1095
	if [ -z "${NO_CLEAN_FREEBSD_SRC}" ]; then
1096
		if [ -d "$FREEBSD_SRC_DIR" ]; then
1097
			echo -n ">>> Ensuring $FREEBSD_SRC_DIR is clean..."
1098
			rm -rf ${FREEBSD_SRC_DIR}
1099
			echo "Done!"
1100
		fi
1101
	fi
1102

    
1103
	echo -n ">>> Cleaning previous builder logs..."
1104
	if [ -d "$BUILDER_LOGS" ]; then
1105
		rm -rf ${BUILDER_LOGS}
1106
	fi
1107
	mkdir -p ${BUILDER_LOGS}
1108

    
1109
	echo "Done!"
1110

    
1111
	echo ">>> Cleaning of builder environment has finished."
1112
}
1113

    
1114
clone_directory_contents() {
1115
	if [ ! -e "$2" ]; then
1116
		mkdir -p "$2"
1117
	fi
1118
	if [ ! -d "$1" -o ! -d "$2" ]; then
1119
		if [ -z "${LOGFILE}" ]; then
1120
			echo ">>> ERROR: Argument $1 supplied is not a directory!"
1121
		else
1122
			echo ">>> ERROR: Argument $1 supplied is not a directory!" | tee -a ${LOGFILE}
1123
		fi
1124
		print_error_pfS
1125
	fi
1126
	echo -n ">>> Using TAR to clone $1 to $2 ..."
1127
	tar -C ${1} -c -f - . | tar -C ${2} -x -p -f -
1128
	echo "Done!"
1129
}
1130

    
1131
clone_to_staging_area() {
1132
	# Clone everything to the final staging area
1133
	echo -n ">>> Cloning everything to ${STAGE_CHROOT_DIR} staging area..."
1134
	LOGFILE=${BUILDER_LOGS}/cloning.${TARGET}.log
1135

    
1136
	tar -C ${PRODUCT_SRC} -c -f - . | \
1137
		tar -C ${STAGE_CHROOT_DIR} -x -p -f -
1138

    
1139
	if [ "${PRODUCT_NAME}" != "pfSense" ]; then
1140
		mv ${STAGE_CHROOT_DIR}/usr/local/sbin/pfSense-upgrade \
1141
			${STAGE_CHROOT_DIR}/usr/local/sbin/${PRODUCT_NAME}-upgrade
1142
	fi
1143

    
1144
	if [ -f ${STAGE_CHROOT_DIR}/etc/master.passwd ]; then
1145
		chroot ${STAGE_CHROOT_DIR} pwd_mkdb /etc/master.passwd
1146
	fi
1147
	mkdir -p ${STAGE_CHROOT_DIR}/etc/mtree
1148
	mtree -Pcp ${STAGE_CHROOT_DIR}/var > ${STAGE_CHROOT_DIR}/etc/mtree/var.dist
1149
	mtree -Pcp ${STAGE_CHROOT_DIR}/etc > ${STAGE_CHROOT_DIR}/etc/mtree/etc.dist
1150
	if [ -d ${STAGE_CHROOT_DIR}/usr/local/etc ]; then
1151
		mtree -Pcp ${STAGE_CHROOT_DIR}/usr/local/etc > ${STAGE_CHROOT_DIR}/etc/mtree/localetc.dist
1152
	fi
1153

    
1154
	## Add buildtime and lastcommit information
1155
	# This is used for detecting updates.
1156
	echo "$BUILTDATESTRING" > $STAGE_CHROOT_DIR/etc/version.buildtime
1157
	# Record last commit info if it is available.
1158
	if [ -f $SCRATCHDIR/build_commit_info.txt ]; then
1159
		cp $SCRATCHDIR/build_commit_info.txt $STAGE_CHROOT_DIR/etc/version.lastcommit
1160
	fi
1161

    
1162
	local _exclude_files="${CORE_PKG_TMP}/base_exclude_files"
1163
	sed \
1164
		-e "s,%%PRODUCT_NAME%%,${PRODUCT_NAME},g" \
1165
		-e "s,%%VERSION%%,${_version},g" \
1166
		${BUILDER_TOOLS}/templates/core_pkg/base/exclude_files \
1167
		> ${_exclude_files}
1168

    
1169
	mkdir -p ${STAGE_CHROOT_DIR}${PRODUCT_SHARE_DIR} >/dev/null 2>&1
1170

    
1171
	# Include a sample pkg stable conf to base
1172
	setup_pkg_repo \
1173
		${PKG_REPO_DEFAULT} \
1174
		${STAGE_CHROOT_DIR}${PRODUCT_SHARE_DIR}/${PRODUCT_NAME}-repo.conf \
1175
		${TARGET} \
1176
		${TARGET_ARCH}
1177

    
1178
	mtree \
1179
		-c \
1180
		-k uid,gid,mode,size,flags,sha256digest \
1181
		-p ${STAGE_CHROOT_DIR} \
1182
		-X ${_exclude_files} \
1183
		> ${STAGE_CHROOT_DIR}${PRODUCT_SHARE_DIR}/base.mtree
1184
	tar \
1185
		-C ${STAGE_CHROOT_DIR} \
1186
		-cJf ${STAGE_CHROOT_DIR}${PRODUCT_SHARE_DIR}/base.txz \
1187
		-X ${_exclude_files} \
1188
		.
1189

    
1190
	core_pkg_create rc "" ${CORE_PKG_VERSION} ${STAGE_CHROOT_DIR}
1191
	core_pkg_create base "" ${CORE_PKG_VERSION} ${STAGE_CHROOT_DIR}
1192
	core_pkg_create base-nanobsd "" ${CORE_PKG_VERSION} ${STAGE_CHROOT_DIR}
1193
	core_pkg_create default-config "" ${CORE_PKG_VERSION} ${STAGE_CHROOT_DIR}
1194

    
1195
	local DEFAULTCONF=${STAGE_CHROOT_DIR}/conf.default/config.xml
1196

    
1197
	# Save current WAN and LAN if value
1198
	local _old_wan_if=$(xml sel -t -v "${XML_ROOTOBJ}/interfaces/wan/if" ${DEFAULTCONF})
1199
	local _old_lan_if=$(xml sel -t -v "${XML_ROOTOBJ}/interfaces/lan/if" ${DEFAULTCONF})
1200

    
1201
	# Change default interface names to match vmware driver
1202
	xml ed -P -L -u "${XML_ROOTOBJ}/interfaces/wan/if" -v "vmx0" ${DEFAULTCONF}
1203
	xml ed -P -L -u "${XML_ROOTOBJ}/interfaces/lan/if" -v "vmx1" ${DEFAULTCONF}
1204
	core_pkg_create default-config "vmware" ${CORE_PKG_VERSION} ${STAGE_CHROOT_DIR}
1205

    
1206
	# Restore default values to be used by serial package
1207
	xml ed -P -L -u "${XML_ROOTOBJ}/interfaces/wan/if" -v "${_old_wan_if}" ${DEFAULTCONF}
1208
	xml ed -P -L -u "${XML_ROOTOBJ}/interfaces/lan/if" -v "${_old_lan_if}" ${DEFAULTCONF}
1209

    
1210
	# Activate serial console in config.xml
1211
	xml ed -L -P -d "${XML_ROOTOBJ}/system/enableserial" ${DEFAULTCONF}
1212
	xml ed -P -s "${XML_ROOTOBJ}/system" -t elem -n "enableserial" \
1213
		${DEFAULTCONF} > ${DEFAULTCONF}.tmp
1214
	xml fo -t ${DEFAULTCONF}.tmp > ${DEFAULTCONF}
1215
	rm -f ${DEFAULTCONF}.tmp
1216

    
1217
	echo force > ${STAGE_CHROOT_DIR}/cf/conf/enableserial_force
1218

    
1219
	core_pkg_create default-config-serial "" ${CORE_PKG_VERSION} ${STAGE_CHROOT_DIR}
1220

    
1221
	rm -f ${STAGE_CHROOT_DIR}/cf/conf/enableserial_force
1222
	rm -f ${STAGE_CHROOT_DIR}/cf/conf/config.xml
1223

    
1224
	# Make sure pkg is present
1225
	pkg_bootstrap ${STAGE_CHROOT_DIR}
1226

    
1227
	# Make sure correct repo is available on tmp dir
1228
	mkdir -p ${STAGE_CHROOT_DIR}/tmp/pkg-repos
1229
	setup_pkg_repo \
1230
		${PKG_REPO_DEFAULT} \
1231
		${STAGE_CHROOT_DIR}/tmp/pkg-repos/repo.conf \
1232
		${TARGET} \
1233
		${TARGET_ARCH} \
1234
		staging
1235

    
1236
	echo "Done!"
1237
}
1238

    
1239
create_final_staging_area() {
1240
	if [ -z "${FINAL_CHROOT_DIR}" ]; then
1241
		echo ">>> ERROR: FINAL_CHROOT_DIR is not set, cannot continue!" | tee -a ${LOGFILE}
1242
		print_error_pfS
1243
	fi
1244

    
1245
	if [ -d "${FINAL_CHROOT_DIR}" ]; then
1246
		echo -n ">>> Previous ${FINAL_CHROOT_DIR} detected cleaning up..." | tee -a ${LOGFILE}
1247
		chflags -R noschg ${FINAL_CHROOT_DIR} 2>&1 1>/dev/null
1248
		rm -rf ${FINAL_CHROOT_DIR}/* 2>&1 1>/dev/null
1249
		echo "Done." | tee -a ${LOGFILE}
1250
	fi
1251

    
1252
	echo ">>> Preparing Final image staging area: $(LC_ALL=C date)" 2>&1 | tee -a ${LOGFILE}
1253
	echo ">>> Cloning ${STAGE_CHROOT_DIR} to ${FINAL_CHROOT_DIR}" 2>&1 | tee -a ${LOGFILE}
1254
	clone_directory_contents ${STAGE_CHROOT_DIR} ${FINAL_CHROOT_DIR}
1255

    
1256
	if [ ! -f $FINAL_CHROOT_DIR/sbin/init ]; then
1257
		echo ">>> ERROR: Something went wrong during cloning -- Please verify!" 2>&1 | tee -a ${LOGFILE}
1258
		print_error_pfS
1259
	fi
1260
}
1261

    
1262
customize_stagearea_for_image() {
1263
	local _image_type="$1"
1264
	local _default_config="" # filled with $2 below
1265
	local _image_variant="$3"
1266

    
1267
	if [ -n "$2" ]; then
1268
		_default_config="$2"
1269
	elif [ "${_image_type}" = "nanobsd" -o \
1270
	     "${_image_type}" = "memstickserial" -o \
1271
	     "${_image_type}" = "memstickadi" ]; then
1272
		_default_config="default-config-serial"
1273
	elif [ "${_image_type}" = "ova" ]; then
1274
		_default_config="default-config-vmware"
1275
	else
1276
		_default_config="default-config"
1277
	fi
1278

    
1279
	# Prepare final stage area
1280
	create_final_staging_area
1281

    
1282
	pkg_chroot_add ${FINAL_CHROOT_DIR} rc
1283

    
1284
	if [ "${_image_type}" = "nanobsd" -o \
1285
	     "${_image_type}" = "nanobsd-vga" ]; then
1286

    
1287
		mkdir -p ${FINAL_CHROOT_DIR}/root/var/db \
1288
			 ${FINAL_CHROOT_DIR}/root/var/cache \
1289
			 ${FINAL_CHROOT_DIR}/var/db/pkg \
1290
			 ${FINAL_CHROOT_DIR}/var/cache/pkg
1291
		mv -f ${FINAL_CHROOT_DIR}/var/db/pkg ${FINAL_CHROOT_DIR}/root/var/db
1292
		mv -f ${FINAL_CHROOT_DIR}/var/cache/pkg ${FINAL_CHROOT_DIR}/root/var/cache
1293
		ln -sf ../../root/var/db/pkg ${FINAL_CHROOT_DIR}/var/db/pkg
1294
		ln -sf ../../root/var/cache/pkg ${FINAL_CHROOT_DIR}/var/cache/pkg
1295

    
1296
		pkg_chroot_add ${FINAL_CHROOT_DIR} base-nanobsd
1297
	else
1298
		pkg_chroot_add ${FINAL_CHROOT_DIR} base
1299
	fi
1300

    
1301
	if [ "${_image_type}" = "iso" -o \
1302
	     "${_image_type}" = "memstick" -o \
1303
	     "${_image_type}" = "memstickserial" -o \
1304
	     "${_image_type}" = "memstickadi" ]; then
1305
		install_bsdinstaller
1306
		mkdir -p ${FINAL_CHROOT_DIR}/pkgs
1307
		cp ${CORE_PKG_ALL_PATH}/*default-config*.txz ${FINAL_CHROOT_DIR}/pkgs
1308
	fi
1309

    
1310
	pkg_chroot_add ${FINAL_CHROOT_DIR} ${_default_config}
1311

    
1312
	# XXX: Workaround to avoid pkg to complain regarding release
1313
	#      repo on first boot since packages are installed from
1314
	#      staging server during build phase
1315
	if [ -n "${USE_PKG_REPO_STAGING}" ]; then
1316
		_read_cmd="select value from repodata where key='packagesite'"
1317
		if [ -n "${_IS_RELEASE}" ]; then
1318
			local _tgt_server="${PKG_REPO_SERVER_RELEASE}"
1319
		else
1320
			local _tgt_server="${PKG_REPO_SERVER_DEVEL}"
1321
		fi
1322
		for _db in ${FINAL_CHROOT_DIR}/var/db/pkg/repo-*sqlite; do
1323
			_cur=$(/usr/local/bin/sqlite3 ${_db} "${_read_cmd}")
1324
			_new=$(echo "${_cur}" | sed -e "s,^${PKG_REPO_SERVER_STAGING},${_tgt_server},")
1325
			/usr/local/bin/sqlite3 ${_db} "update repodata set value='${_new}' where key='packagesite'"
1326
		done
1327
	fi
1328

    
1329
	if [ -n "$_image_variant" -a \
1330
	    -d ${BUILDER_TOOLS}/templates/custom_logos/${_image_variant} ]; then
1331
		mkdir -p ${FINAL_CHROOT_DIR}/usr/local/share/${PRODUCT_NAME}/custom_logos
1332
		cp -f \
1333
			${BUILDER_TOOLS}/templates/custom_logos/${_image_variant}/*.png \
1334
			${FINAL_CHROOT_DIR}/usr/local/share/${PRODUCT_NAME}/custom_logos
1335
	fi
1336

    
1337
	# Remove temporary repo conf
1338
	rm -rf ${FINAL_CHROOT_DIR}/tmp/pkg-repos
1339
}
1340

    
1341
create_distribution_tarball() {
1342
	mkdir -p ${FINAL_CHROOT_DIR}/distrib
1343

    
1344
	tar -C ${FINAL_CHROOT_DIR} --exclude ./distrib --exclude ./pkgs -cJf ${FINAL_CHROOT_DIR}/distrib/${PRODUCT_NAME}.txz .
1345
}
1346

    
1347
create_iso_image() {
1348
	local _variant="$1"
1349

    
1350
	LOGFILE=${BUILDER_LOGS}/isoimage.${TARGET}
1351
	echo ">>> Building bootable ISO image for ${TARGET}" | tee -a ${LOGFILE}
1352
	if [ -z "${DEFAULT_KERNEL}" ]; then
1353
		echo ">>> ERROR: Could not identify DEFAULT_KERNEL to install on image!" | tee -a ${LOGFILE}
1354
		print_error_pfS
1355
	fi
1356

    
1357
	local _image_path=${ISOPATH}
1358
	if [ -n "${_variant}" ]; then
1359
		_image_path=$(echo "$_image_path" | \
1360
			sed "s/${PRODUCT_NAME_SUFFIX}-/&${_variant}-/")
1361
		VARIANTIMAGES="${VARIANTIMAGES}${VARIANTIMAGES:+ }${_image_path}"
1362
	fi
1363

    
1364
	customize_stagearea_for_image "iso" "" $_variant
1365
	install_default_kernel ${DEFAULT_KERNEL}
1366

    
1367
	echo cdrom > $FINAL_CHROOT_DIR/etc/platform
1368

    
1369
	FSLABEL=$(echo ${PRODUCT_NAME} | tr '[:lower:]' '[:upper:]')
1370
	echo "/dev/iso9660/${FSLABEL} / cd9660 ro 0 0" > ${FINAL_CHROOT_DIR}/etc/fstab
1371

    
1372
	# This check is for supporting create memstick/ova images
1373
	echo -n ">>> Running command: script -aq $LOGFILE makefs -t cd9660 -o bootimage=\"i386;${FINAL_CHROOT_DIR}/boot/cdboot \"-o no-emul-boot -o rockridge " | tee -a ${LOGFILE}
1374
	echo "-o label=${FSLABEL} -o publisher=\"${PRODUCT_NAME} project.\" $_image_path ${FINAL_CHROOT_DIR}" | tee -a ${LOGFILE}
1375

    
1376
	create_distribution_tarball
1377

    
1378
	# Remove /rescue from iso since cd9660 cannot deal with hardlinks
1379
	rm -rf ${FINAL_CHROOT_DIR}/rescue
1380

    
1381
	makefs -t cd9660 -o bootimage="i386;${FINAL_CHROOT_DIR}/boot/cdboot" -o no-emul-boot -o rockridge \
1382
		-o label=${FSLABEL} -o publisher="${PRODUCT_NAME} project." $_image_path ${FINAL_CHROOT_DIR} 2>&1 >> ${LOGFILE}
1383
	if [ $? -ne 0 -o ! -f $_image_path ]; then
1384
		if [ -f ${_image_path} ]; then
1385
			rm -f $_image_path
1386
		fi
1387
		echo ">>> ERROR: Something wrong happened during ISO image creation. STOPPING!" | tee -a ${LOGFILE}
1388
		print_error_pfS
1389
	fi
1390
	gzip -qf $_image_path &
1391
	_bg_pids="${_bg_pids}${_bg_pids:+ }$!"
1392

    
1393
	echo ">>> ISO created: $(LC_ALL=C date)" | tee -a ${LOGFILE}
1394
}
1395

    
1396
create_memstick_image() {
1397
	local _variant="$1"
1398

    
1399
	LOGFILE=${BUILDER_LOGS}/memstick.${TARGET}
1400
	if [ "${MEMSTICKPATH}" = "" ]; then
1401
		echo ">>> MEMSTICKPATH is empty skipping generation of memstick image!" | tee -a ${LOGFILE}
1402
		return
1403
	fi
1404

    
1405
	local _image_path=${MEMSTICKPATH}
1406
	if [ -n "${_variant}" ]; then
1407
		_image_path=$(echo "$_image_path" | \
1408
			sed "s/-memstick-/-memstick-${_variant}-/")
1409
		VARIANTIMAGES="${VARIANTIMAGES}${VARIANTIMAGES:+ }${_image_path}"
1410
	fi
1411

    
1412
	customize_stagearea_for_image "memstick" "" $_variant
1413
	install_default_kernel ${DEFAULT_KERNEL}
1414

    
1415
	echo cdrom > $FINAL_CHROOT_DIR/etc/platform
1416

    
1417
	echo ">>> Creating memstick to ${_image_path}." 2>&1 | tee -a ${LOGFILE}
1418
	echo "/dev/ufs/${PRODUCT_NAME} / ufs ro 0 0" > ${FINAL_CHROOT_DIR}/etc/fstab
1419
	echo "kern.cam.boot_delay=10000" >> ${FINAL_CHROOT_DIR}/boot/loader.conf.local
1420

    
1421
	create_distribution_tarball
1422

    
1423
	makefs -B little -o label=${PRODUCT_NAME},version=2 ${_image_path} ${FINAL_CHROOT_DIR}
1424
	if [ $? -ne 0 ]; then
1425
		if [ -f ${_image_path} ]; then
1426
			rm -f $_image_path
1427
		fi
1428
		echo ">>> ERROR: Something wrong happened during MEMSTICK image creation. STOPPING!" | tee -a ${LOGFILE}
1429
		print_error_pfS
1430
	fi
1431
	MD=$(mdconfig -a -t vnode -f $_image_path)
1432
	# Just in case
1433
	trap "mdconfig -d -u ${MD}" 1 2 15 EXIT
1434
	gpart create -s BSD ${MD} 2>&1 >> ${LOGFILE}
1435
	gpart bootcode -b ${FINAL_CHROOT_DIR}/boot/boot ${MD} 2>&1 >> ${LOGFILE}
1436
	gpart add -t freebsd-ufs ${MD} 2>&1 >> ${LOGFILE}
1437
	trap "-" 1 2 15 EXIT
1438
	mdconfig -d -u ${MD} 2>&1 | tee -a ${LOGFILE}
1439
	gzip -qf $_image_path &
1440
	_bg_pids="${_bg_pids}${_bg_pids:+ }$!"
1441

    
1442
	echo ">>> MEMSTICK created: $(LC_ALL=C date)" | tee -a ${LOGFILE}
1443
}
1444

    
1445
create_memstick_serial_image() {
1446
	LOGFILE=${BUILDER_LOGS}/memstickserial.${TARGET}
1447
	if [ "${MEMSTICKSERIALPATH}" = "" ]; then
1448
		echo ">>> MEMSTICKSERIALPATH is empty skipping generation of memstick image!" | tee -a ${LOGFILE}
1449
		return
1450
	fi
1451

    
1452
	customize_stagearea_for_image "memstickserial"
1453
	install_default_kernel ${DEFAULT_KERNEL}
1454

    
1455
	echo cdrom > $FINAL_CHROOT_DIR/etc/platform
1456

    
1457
	echo "/dev/ufs/${PRODUCT_NAME} / ufs ro 0 0" > ${FINAL_CHROOT_DIR}/etc/fstab
1458
	echo "kern.cam.boot_delay=10000" >> ${FINAL_CHROOT_DIR}/boot/loader.conf.local
1459

    
1460
	echo ">>> Creating serial memstick to ${MEMSTICKSERIALPATH}." 2>&1 | tee -a ${LOGFILE}
1461

    
1462
	BOOTCONF=${FINAL_CHROOT_DIR}/boot.config
1463
	LOADERCONF=${FINAL_CHROOT_DIR}/boot/loader.conf
1464

    
1465
	echo ">>> Activating serial console..." 2>&1 | tee -a ${LOGFILE}
1466
	# Activate serial console in boot.config
1467
	if [ -f ${BOOTCONF} ]; then
1468
		sed -i "" '/-D$/d' ${BOOTCONF}
1469
	fi
1470
	echo "-S115200 -D" >> ${BOOTCONF}
1471

    
1472
	# Remove old console options if present.
1473
	[ -f "${LOADERCONF}" ] \
1474
		&& sed -i "" -Ee "/(console|boot_multicons|boot_serial)/d" ${LOADERCONF}
1475
	# Activate serial console+video console in loader.conf
1476
	echo 'boot_multicons="YES"' >>  ${LOADERCONF}
1477
	echo 'boot_serial="YES"' >> ${LOADERCONF}
1478
	echo 'console="comconsole,vidconsole"' >> ${LOADERCONF}
1479
	echo 'comconsole_speed="115200"' >> ${LOADERCONF}
1480

    
1481
	create_distribution_tarball
1482

    
1483
	makefs -B little -o label=${PRODUCT_NAME},version=2 ${MEMSTICKSERIALPATH} ${FINAL_CHROOT_DIR}
1484
	if [ $? -ne 0 ]; then
1485
		if [ -f ${MEMSTICKSERIALPATH} ]; then
1486
			rm -f $MEMSTICKSERIALPATH
1487
		fi
1488
		echo ">>> ERROR: Something wrong happened during MEMSTICKSERIAL image creation. STOPPING!" | tee -a ${LOGFILE}
1489
		print_error_pfS
1490
	fi
1491
	MD=$(mdconfig -a -t vnode -f $MEMSTICKSERIALPATH)
1492
	# Just in case
1493
	trap "mdconfig -d -u ${MD}" 1 2 15 EXIT
1494
	gpart create -s BSD ${MD} 2>&1 >> ${LOGFILE}
1495
	gpart bootcode -b ${FINAL_CHROOT_DIR}/boot/boot ${MD} 2>&1 >> ${LOGFILE}
1496
	gpart add -t freebsd-ufs ${MD} 2>&1 >> ${LOGFILE}
1497
	trap "-" 1 2 15 EXIT
1498
	mdconfig -d -u ${MD} 2>&1 >> ${LOGFILE}
1499
	gzip -qf $MEMSTICKSERIALPATH &
1500
	_bg_pids="${_bg_pids}${_bg_pids:+ }$!"
1501

    
1502
	echo ">>> MEMSTICKSERIAL created: $(LC_ALL=C date)" | tee -a ${LOGFILE}
1503
}
1504

    
1505
create_memstick_adi_image() {
1506
	LOGFILE=${BUILDER_LOGS}/memstickadi.${TARGET}
1507
	if [ "${MEMSTICKADIPATH}" = "" ]; then
1508
		echo ">>> MEMSTICKADIPATH is empty skipping generation of memstick image!" | tee -a ${LOGFILE}
1509
		return
1510
	fi
1511

    
1512
	customize_stagearea_for_image "memstickadi"
1513
	install_default_kernel ${DEFAULT_KERNEL}
1514

    
1515
	echo cdrom > $FINAL_CHROOT_DIR/etc/platform
1516

    
1517
	echo "/dev/ufs/${PRODUCT_NAME} / ufs ro 0 0" > ${FINAL_CHROOT_DIR}/etc/fstab
1518
	echo "kern.cam.boot_delay=10000" >> ${FINAL_CHROOT_DIR}/boot/loader.conf.local
1519

    
1520
	echo ">>> Creating serial memstick to ${MEMSTICKADIPATH}." 2>&1 | tee -a ${LOGFILE}
1521

    
1522
	BOOTCONF=${FINAL_CHROOT_DIR}/boot.config
1523
	LOADERCONF=${FINAL_CHROOT_DIR}/boot/loader.conf
1524

    
1525
	echo ">>> Activating serial console..." 2>&1 | tee -a ${LOGFILE}
1526
	# Activate serial console in boot.config
1527
	if [ -f ${BOOTCONF} ]; then
1528
		sed -i "" '/-[Dh]$/d' ${BOOTCONF}
1529
	fi
1530
	echo "-S115200 -h" >> ${BOOTCONF}
1531

    
1532
	# Remove old console options if present.
1533
	[ -f "${LOADERCONF}" ] \
1534
		&& sed -i "" -Ee "/(console|boot_multicons|boot_serial|hint.uart)/d" ${LOADERCONF}
1535
	# Activate serial console+video console in loader.conf
1536
	echo 'boot_serial="YES"' >> ${LOADERCONF}
1537
	echo 'console="comconsole"' >> ${LOADERCONF}
1538
	echo 'comconsole_speed="115200"' >> ${LOADERCONF}
1539
	echo 'comconsole_port="0x2F8"' >> ${LOADERCONF}
1540
	echo 'hint.uart.0.flags="0x00"' >> ${LOADERCONF}
1541
	echo 'hint.uart.1.flags="0x10"' >> ${LOADERCONF}
1542

    
1543
	create_distribution_tarball
1544

    
1545
	makefs -B little -o label=${PRODUCT_NAME},version=2 ${MEMSTICKADIPATH} ${FINAL_CHROOT_DIR}
1546
	if [ $? -ne 0 ]; then
1547
		if [ -f ${MEMSTICKADIPATH} ]; then
1548
			rm -f $MEMSTICKADIPATH
1549
		fi
1550
		echo ">>> ERROR: Something wrong happened during MEMSTICKADI image creation. STOPPING!" | tee -a ${LOGFILE}
1551
		print_error_pfS
1552
	fi
1553
	MD=$(mdconfig -a -t vnode -f $MEMSTICKADIPATH)
1554
	# Just in case
1555
	trap "mdconfig -d -u ${MD}" 1 2 15 EXIT
1556
	gpart create -s BSD ${MD} 2>&1 >> ${LOGFILE}
1557
	gpart bootcode -b ${FINAL_CHROOT_DIR}/boot/boot ${MD} 2>&1 >> ${LOGFILE}
1558
	gpart add -t freebsd-ufs ${MD} 2>&1 >> ${LOGFILE}
1559
	trap "-" 1 2 15 EXIT
1560
	mdconfig -d -u ${MD} 2>&1 >> ${LOGFILE}
1561
	gzip -qf $MEMSTICKADIPATH &
1562
	_bg_pids="${_bg_pids}${_bg_pids:+ }$!"
1563

    
1564
	echo ">>> MEMSTICKADI created: $(LC_ALL=C date)" | tee -a ${LOGFILE}
1565
}
1566

    
1567
# Create pkg conf on desired place with desired arch/branch
1568
setup_pkg_repo() {
1569
	if [ -z "${4}" ]; then
1570
		return
1571
	fi
1572

    
1573
	local _template="${1}"
1574
	local _target="${2}"
1575
	local _arch="${3}"
1576
	local _target_arch="${4}"
1577
	local _staging="${5}"
1578

    
1579
	if [ -z "${_template}" -o ! -f "${_template}" ]; then
1580
		echo ">>> ERROR: It was not possible to find pkg conf template ${_template}"
1581
		print_error_pfS
1582
	fi
1583

    
1584
	if [ -n "${_staging}" -a -n "${USE_PKG_REPO_STAGING}" ]; then
1585
		local _pkg_repo_server_devel=${PKG_REPO_SERVER_STAGING}
1586
		local _pkg_repo_branch_devel=${PKG_REPO_BRANCH_STAGING}
1587
		local _pkg_repo_server_release=${PKG_REPO_SERVER_STAGING}
1588
		local _pkg_repo_branch_release=${PKG_REPO_BRANCH_STAGING}
1589
	else
1590
		local _pkg_repo_server_devel=${PKG_REPO_SERVER_DEVEL}
1591
		local _pkg_repo_branch_devel=${PKG_REPO_BRANCH_DEVEL}
1592
		local _pkg_repo_server_release=${PKG_REPO_SERVER_RELEASE}
1593
		local _pkg_repo_branch_release=${PKG_REPO_BRANCH_RELEASE}
1594
	fi
1595

    
1596
	mkdir -p $(dirname ${_target}) >/dev/null 2>&1
1597

    
1598
	sed \
1599
		-e "s/%%ARCH%%/${_target_arch}/" \
1600
		-e "s/%%PKG_REPO_BRANCH_DEVEL%%/${_pkg_repo_branch_devel}/g" \
1601
		-e "s/%%PKG_REPO_BRANCH_RELEASE%%/${_pkg_repo_branch_release}/g" \
1602
		-e "s,%%PKG_REPO_SERVER_DEVEL%%,${_pkg_repo_server_devel},g" \
1603
		-e "s,%%PKG_REPO_SERVER_RELEASE%%,${_pkg_repo_server_release},g" \
1604
		-e "s/%%PRODUCT_NAME%%/${PRODUCT_NAME}/g" \
1605
		${_template} \
1606
		> ${_target}
1607
}
1608

    
1609
# This routine ensures any ports / binaries that the builder
1610
# system needs are on disk and ready for execution.
1611
builder_setup() {
1612
	# If Product-builder is already installed, just leave
1613
	if pkg info -e -q ${PRODUCT_NAME}-builder; then
1614
		return
1615
	fi
1616

    
1617
	if [ ! -f ${PKG_REPO_PATH} ]; then
1618
		[ -d $(dirname ${PKG_REPO_PATH}) ] \
1619
			|| mkdir -p $(dirname ${PKG_REPO_PATH})
1620

    
1621
		update_freebsd_sources
1622

    
1623
		local _arch=$(uname -m)
1624
		setup_pkg_repo \
1625
			${PKG_REPO_DEFAULT} \
1626
			${PKG_REPO_PATH} \
1627
			${_arch} \
1628
			${_arch} \
1629
			"staging"
1630

    
1631
		# Use fingerprint keys from repo
1632
		sed -i '' -e "/fingerprints:/ s,\"/,\"${BUILDER_ROOT}/src/," \
1633
			${PKG_REPO_PATH}
1634
	fi
1635

    
1636
	pkg install ${PRODUCT_NAME}-builder
1637
}
1638

    
1639
# Updates FreeBSD sources
1640
update_freebsd_sources() {
1641
	if [ "${1}" = "full" ]; then
1642
		local _full=1
1643
		local _clone_params=""
1644
	else
1645
		local _full=0
1646
		local _clone_params="--depth 1 --single-branch"
1647
	fi
1648

    
1649
	if [ ! -d "${FREEBSD_SRC_DIR}" ]; then
1650
		mkdir -p ${FREEBSD_SRC_DIR}
1651
	fi
1652

    
1653
	if [ -n "${NO_BUILDWORLD}" -a -n "${NO_BUILDKERNEL}" ]; then
1654
		echo ">>> NO_BUILDWORLD and NO_BUILDKERNEL set, skipping update of freebsd sources" | tee -a ${LOGFILE}
1655
		return
1656
	fi
1657

    
1658
	echo -n ">>> Obtaining FreeBSD sources ${FREEBSD_BRANCH}..."
1659
	local _FREEBSD_BRANCH=${FREEBSD_BRANCH:-"devel"}
1660
	local _CLONE=1
1661

    
1662
	if [ -d "${FREEBSD_SRC_DIR}/.git" ]; then
1663
		CUR_BRANCH=$(cd ${FREEBSD_SRC_DIR} && git branch | grep '^\*' | cut -d' ' -f2)
1664
		if [ ${_full} -eq 0 -a "${CUR_BRANCH}" = "${_FREEBSD_BRANCH}" ]; then
1665
			_CLONE=0
1666
			( cd ${FREEBSD_SRC_DIR} && git clean -fd; git fetch origin; git reset --hard origin/${_FREEBSD_BRANCH} ) 2>&1 | grep -C3 -i -E 'error|fatal'
1667
		else
1668
			rm -rf ${FREEBSD_SRC_DIR}
1669
		fi
1670
	fi
1671

    
1672
	if [ ${_CLONE} -eq 1 ]; then
1673
		( git clone --branch ${_FREEBSD_BRANCH} ${_clone_params} ${FREEBSD_REPO_BASE} ${FREEBSD_SRC_DIR} ) 2>&1 | grep -C3 -i -E 'error|fatal'
1674
	fi
1675

    
1676
	if [ ! -d "${FREEBSD_SRC_DIR}/.git" ]; then
1677
		echo ">>> ERROR: It was not possible to clone FreeBSD src repo"
1678
		print_error_pfS
1679
	fi
1680

    
1681
	if [ -n "${GIT_FREEBSD_COSHA1}" ]; then
1682
		( cd ${FREEBSD_SRC_DIR} && git checkout ${GIT_FREEBSD_COSHA1} ) 2>&1 | grep -C3 -i -E 'error|fatal'
1683
	fi
1684
	echo "Done!"
1685

    
1686
	if [ "${PRODUCT_NAME}" = "pfSense" -a -n "${GNID_REPO_BASE}" ]; then
1687
		echo ">>> Obtaining gnid sources..."
1688

    
1689
		_CLONE=1
1690
		if [ -d "${GNID_SRC_DIR}/.git" ]; then
1691
			CUR_BRANCH=$(cd ${GNID_SRC_DIR} && git branch | grep '^\*' | cut -d' ' -f2)
1692
			if [ "${CUR_BRANCH}" = "${GNID_BRANCH}" ]; then
1693
				_CLONE=0
1694
				( cd ${GNID_SRC_DIR} && git clean -fd; git fetch origin; git reset --hard origin/${GNID_BRANCH} ) 2>&1 | grep -C3 -i -E 'error|fatal'
1695
			else
1696
				rm -rf ${GNID_SRC_DIR}
1697
			fi
1698
		fi
1699

    
1700
		if [ ${_CLONE} -eq 1 ]; then
1701
			( git clone --branch ${GNID_BRANCH} ${GNID_REPO_BASE} ${GNID_SRC_DIR} ) 2>&1 | grep -C3 -i -E 'error|fatal'
1702
		fi
1703

    
1704
		if [ ! -d "${GNID_SRC_DIR}/.git" ]; then
1705
			echo ">>> ERROR: It was not possible to clone gnid src repo"
1706
			print_error_pfS
1707
		fi
1708
	fi
1709
}
1710

    
1711
pkg_chroot() {
1712
	local _root="${1}"
1713
	shift
1714

    
1715
	if [ $# -eq 0 ]; then
1716
		return -1
1717
	fi
1718

    
1719
	if [ -z "${_root}" -o "${_root}" = "/" -o ! -d "${_root}" ]; then
1720
		return -1
1721
	fi
1722

    
1723
	mkdir -p \
1724
		${SCRATCHDIR}/pkg_cache \
1725
		${_root}/var/cache/pkg \
1726
		${_root}/dev
1727

    
1728
	/sbin/mount -t nullfs ${SCRATCHDIR}/pkg_cache ${_root}/var/cache/pkg
1729
	/sbin/mount -t devfs devfs ${_root}/dev
1730
	cp -f /etc/resolv.conf ${_root}/etc/resolv.conf
1731
	touch ${BUILDER_LOGS}/install_pkg_install_ports.txt
1732
	local _params=""
1733
	if [ -f "${_root}/tmp/pkg-repos/repo.conf" ]; then
1734
		_params="--repo-conf-dir /tmp/pkg-repos "
1735
	fi
1736
	script -aq ${BUILDER_LOGS}/install_pkg_install_ports.txt \
1737
		chroot ${_root} pkg ${_params}$@ >/dev/null 2>&1
1738
	local result=$?
1739
	rm -f ${_root}/etc/resolv.conf
1740
	/sbin/umount -f ${_root}/dev
1741
	/sbin/umount -f ${_root}/var/cache/pkg
1742

    
1743
	return $result
1744
}
1745

    
1746

    
1747
pkg_chroot_add() {
1748
	if [ -z "${1}" -o -z "${2}" ]; then
1749
		return 1
1750
	fi
1751

    
1752
	local _target="${1}"
1753
	local _pkg="$(get_pkg_name ${2}).txz"
1754

    
1755
	if [ ! -d "${_target}" ]; then
1756
		echo ">>> ERROR: Target dir ${_target} not found"
1757
		print_error_pfS
1758
	fi
1759

    
1760
	if [ ! -f ${CORE_PKG_ALL_PATH}/${_pkg} ]; then
1761
		echo ">>> ERROR: Package ${_pkg} not found"
1762
		print_error_pfS
1763
	fi
1764

    
1765
	cp ${CORE_PKG_ALL_PATH}/${_pkg} ${_target}
1766
	pkg_chroot ${_target} add /${_pkg}
1767
	rm -f ${_target}/${_pkg}
1768
}
1769

    
1770
pkg_bootstrap() {
1771
	local _root=${1:-"${STAGE_CHROOT_DIR}"}
1772

    
1773
	setup_pkg_repo \
1774
		${PKG_REPO_DEFAULT} \
1775
		${_root}${PKG_REPO_PATH} \
1776
		${TARGET} \
1777
		${TARGET_ARCH} \
1778
		"staging"
1779

    
1780
	pkg_chroot ${_root} bootstrap -f
1781
}
1782

    
1783
# This routine assists with installing various
1784
# freebsd ports files into the pfsense-fs staging
1785
# area.
1786
install_pkg_install_ports() {
1787
	local MAIN_PKG="${1}"
1788

    
1789
	if [ -z "${MAIN_PKG}" ]; then
1790
		MAIN_PKG=${PRODUCT_NAME}
1791
	fi
1792

    
1793
	echo ">>> Installing pkg repository in chroot (${STAGE_CHROOT_DIR})..."
1794

    
1795
	[ -d ${STAGE_CHROOT_DIR}/var/cache/pkg ] || \
1796
		mkdir -p ${STAGE_CHROOT_DIR}/var/cache/pkg
1797

    
1798
	[ -d ${SCRATCHDIR}/pkg_cache ] || \
1799
		mkdir -p ${SCRATCHDIR}/pkg_cache
1800

    
1801
	echo -n ">>> Installing built ports (packages) in chroot (${STAGE_CHROOT_DIR})... "
1802
	# First mark all packages as automatically installed
1803
	pkg_chroot ${STAGE_CHROOT_DIR} set -A 1 -a
1804
	# Install all necessary packages
1805
	if ! pkg_chroot ${STAGE_CHROOT_DIR} install ${MAIN_PKG} ${custom_package_list}; then
1806
		echo "Failed!"
1807
		print_error_pfS
1808
	fi
1809
	# Make sure required packages are set as non-automatic
1810
	pkg_chroot ${STAGE_CHROOT_DIR} set -A 0 pkg ${MAIN_PKG} ${custom_package_list}
1811
	# Remove unnecessary packages
1812
	pkg_chroot ${STAGE_CHROOT_DIR} autoremove
1813
	echo "Done!"
1814
}
1815

    
1816
install_bsdinstaller() {
1817
	local _params=""
1818

    
1819
	echo ">>> Installing BSDInstaller in chroot (${FINAL_CHROOT_DIR})... (starting)"
1820
	pkg_chroot ${FINAL_CHROOT_DIR} install -f bsdinstaller
1821
	sed -i '' -e "s,%%PRODUCT_NAME%%,${PRODUCT_NAME}," \
1822
		  -e "s,%%PRODUCT_VERSION%%,${PRODUCT_VERSION}," \
1823
		  -e "s,%%ARCH%%,${TARGET}," \
1824
		  ${FINAL_CHROOT_DIR}/usr/local/share/dfuibe_lua/conf/pfSense.lua \
1825
		  ${FINAL_CHROOT_DIR}/usr/local/share/dfuibe_lua/conf/pfSense_rescue.lua
1826
	echo ">>> Installing BSDInstaller in chroot (${FINAL_CHROOT_DIR})... (finished)"
1827
}
1828

    
1829
staginareas_clean_each_run() {
1830
	echo -n ">>> Cleaning build directories: "
1831
	if [ -d "${FINAL_CHROOT_DIR}" ]; then
1832
		BASENAME=$(basename ${FINAL_CHROOT_DIR})
1833
		echo -n "$BASENAME "
1834
		chflags -R noschg ${FINAL_CHROOT_DIR} 2>&1 >/dev/null
1835
		rm -rf ${FINAL_CHROOT_DIR}/* 2>/dev/null
1836
	fi
1837
	echo "Done!"
1838
}
1839

    
1840
# Imported from FreeSBIE
1841
buildkernel() {
1842
	if [ -n "${NO_BUILDKERNEL}" ]; then
1843
		echo ">>> NO_BUILDKERNEL set, skipping build" | tee -a ${LOGFILE}
1844
		return
1845
	fi
1846

    
1847
	if [ -z "${KERNCONF}" ]; then
1848
		echo ">>> ERROR: No kernel configuration defined probably this is not what you want! STOPPING!" | tee -a ${LOGFILE}
1849
		print_error_pfS
1850
	fi
1851

    
1852
	if [ -n "${KERNELCONF}" ]; then
1853
		export KERNCONFDIR=$(dirname ${KERNELCONF})
1854
		export KERNCONF=$(basename ${KERNELCONF})
1855
	fi
1856

    
1857
	SRCCONFBASENAME=$(basename ${SRC_CONF})
1858
	echo ">>> KERNCONFDIR: ${KERNCONFDIR}"
1859
	echo ">>> ARCH:        ${TARGET}"
1860
	echo ">>> SRC_CONF:    ${SRCCONFBASENAME}"
1861

    
1862
	makeargs="${MAKEJ_KERNEL} SRCCONF=${SRC_CONF} __MAKE_CONF=${MAKE_CONF} TARGET_ARCH=${TARGET_ARCH} TARGET=${TARGET}"
1863
	echo ">>> Builder is running the command: script -aq $LOGFILE make -DNO_KERNELCLEAN $makeargs buildkernel KERNCONF=${KERNCONF}" | tee -a $LOGFILE
1864
	(script -q $LOGFILE make -C ${FREEBSD_SRC_DIR} -DNO_KERNELCLEAN $makeargs buildkernel KERNCONF=${KERNCONF} || print_error_pfS;) | egrep '^>>>'
1865
}
1866

    
1867
# Imported from FreeSBIE
1868
installkernel() {
1869
	if [ -z "${KERNCONF}" ]; then
1870
		echo ">>> ERROR: No kernel configuration defined probably this is not what you want! STOPPING!" | tee -a ${LOGFILE}
1871
		print_error_pfS
1872
	fi
1873

    
1874
	if [ -n "${KERNELCONF}" ]; then
1875
		export KERNCONFDIR=$(dirname ${KERNELCONF})
1876
		export KERNCONF=$(basename ${KERNELCONF})
1877
	fi
1878

    
1879
	mkdir -p ${STAGE_CHROOT_DIR}/boot
1880
	makeargs="${MAKEJ_KERNEL} SRCCONF=${SRC_CONF} __MAKE_CONF=${MAKE_CONF} TARGET_ARCH=${TARGET_ARCH} TARGET=${TARGET} DESTDIR=${KERNEL_DESTDIR}"
1881
	echo ">>> Builder is running the command: script -aq $LOGFILE make ${makeargs} installkernel KERNCONF=${KERNCONF}"  | tee -a $LOGFILE
1882
	(script -aq $LOGFILE make -C ${FREEBSD_SRC_DIR} ${makeargs} installkernel KERNCONF=${KERNCONF} || print_error_pfS;) | egrep '^>>>'
1883
	gzip -f9 $KERNEL_DESTDIR/boot/kernel/kernel
1884
}
1885

    
1886
# Launch is ran first to setup a few variables that we need
1887
# Imported from FreeSBIE
1888
launch() {
1889
	if [ "$(id -u)" != "0" ]; then
1890
		echo "Sorry, this must be done as root."
1891
	fi
1892

    
1893
	echo ">>> Operation $0 has started at $(date)"
1894
}
1895

    
1896
finish() {
1897
	echo ">>> Operation $0 has ended at $(date)"
1898
}
1899

    
1900
pkg_repo_rsync() {
1901
	local _repo_path_param="${1}"
1902
	local _ignore_final_rsync="${2}"
1903

    
1904
	if [ -z "${_repo_path_param}" -o ! -d "${_repo_path_param}" ]; then
1905
		return
1906
	fi
1907

    
1908
	if [ -n "${SKIP_FINAL_RSYNC}" ]; then
1909
		_ignore_final_rsync="1"
1910
	fi
1911

    
1912
	# Sanitize path
1913
	_repo_path=$(realpath ${_repo_path_param})
1914

    
1915
	local _repo_dir=$(dirname ${_repo_path})
1916
	local _repo_base=$(basename ${_repo_path})
1917

    
1918
	# Add ./ it's an rsync trick to make it chdir to directory before sending it
1919
	_repo_path="${_repo_dir}/./${_repo_base}"
1920

    
1921
	if [ -z "${LOGFILE}" ]; then
1922
		local _logfile="/dev/null"
1923
	else
1924
		local _logfile="${LOGFILE}"
1925
	fi
1926

    
1927
	if [ -n "${PKG_REPO_SIGNING_COMMAND}" -a -z "${DO_NOT_SIGN_PKG_REPO}" ]; then
1928
		# Detect poudriere directory structure
1929
		if [ -L "${_repo_path}/.latest" ]; then
1930
			local _real_repo_path=$(readlink -f ${_repo_path}/.latest)
1931
		else
1932
			local _real_repo_path=${_repo_path}
1933
		fi
1934

    
1935
		echo -n ">>> Signing repository... " | tee -a ${_logfile}
1936
		############ ATTENTION ##############
1937
		#
1938
		# For some reason pkg-repo fail without / in the end of directory name
1939
		# so removing it will break command
1940
		#
1941
		# https://github.com/freebsd/pkg/issues/1364
1942
		#
1943
		if script -aq ${_logfile} pkg repo ${_real_repo_path}/ \
1944
		    signing_command: ${PKG_REPO_SIGNING_COMMAND} >/dev/null 2>&1; then
1945
			echo "Done!" | tee -a ${_logfile}
1946
		else
1947
			echo "Failed!" | tee -a ${_logfile}
1948
			echo ">>> ERROR: An error occurred trying to sign repo"
1949
			print_error_pfS
1950
		fi
1951

    
1952
		local _pkgfile="${_repo_path}/Latest/pkg.txz"
1953
		if [ -e ${_pkgfile} ]; then
1954
			echo -n ">>> Signing Latest/pkg.txz for bootstraping... " | tee -a ${_logfile}
1955

    
1956
			if sha256 -q ${_pkgfile} | ${PKG_REPO_SIGNING_COMMAND} \
1957
			    > ${_pkgfile}.sig 2>/dev/null; then
1958
				echo "Done!" | tee -a ${_logfile}
1959
			else
1960
				echo "Failed!" | tee -a ${_logfile}
1961
				echo ">>> ERROR: An error occurred trying to sign Latest/pkg.txz"
1962
				print_error_pfS
1963
			fi
1964
		fi
1965
	fi
1966

    
1967
	if [ -z "${UPLOAD}" ]; then
1968
		return
1969
	fi
1970

    
1971
	for _pkg_rsync_hostname in ${PKG_RSYNC_HOSTNAME}; do
1972
		# Make sure destination directory exist
1973
		ssh -p ${PKG_RSYNC_SSH_PORT} \
1974
			${PKG_RSYNC_USERNAME}@${_pkg_rsync_hostname} \
1975
			"mkdir -p ${PKG_RSYNC_DESTDIR}"
1976

    
1977
		echo -n ">>> Sending updated repository to ${_pkg_rsync_hostname}... " | tee -a ${_logfile}
1978
		if script -aq ${_logfile} rsync -Have "ssh -p ${PKG_RSYNC_SSH_PORT}" \
1979
			--timeout=60 --delete-delay ${_repo_path} \
1980
			${PKG_RSYNC_USERNAME}@${_pkg_rsync_hostname}:${PKG_RSYNC_DESTDIR} >/dev/null 2>&1
1981
		then
1982
			echo "Done!" | tee -a ${_logfile}
1983
		else
1984
			echo "Failed!" | tee -a ${_logfile}
1985
			echo ">>> ERROR: An error occurred sending repo to remote hostname"
1986
			print_error_pfS
1987
		fi
1988

    
1989
		if [ -z "${USE_PKG_REPO_STAGING}" -o -n "${_ignore_final_rsync}" ]; then
1990
			return
1991
		fi
1992

    
1993
		if [ -n "${_IS_RELEASE}" -o "${_repo_path_param}" = "${CORE_PKG_PATH}" ]; then
1994
			for _pkg_final_rsync_hostname in ${PKG_FINAL_RSYNC_HOSTNAME}; do
1995
				# Send .real* directories first to prevent having a broken repo while transfer happens
1996
				local _cmd="rsync -Have \"ssh -p ${PKG_FINAL_RSYNC_SSH_PORT}\" \
1997
					--timeout=60 ${PKG_RSYNC_DESTDIR}/./${_repo_base%%-core}* \
1998
					--include=\"/*\" --include=\"*/.real*\" --include=\"*/.real*/***\" \
1999
					--exclude=\"*\" \
2000
					${PKG_FINAL_RSYNC_USERNAME}@${_pkg_final_rsync_hostname}:${PKG_FINAL_RSYNC_DESTDIR}"
2001

    
2002
				echo -n ">>> Sending updated packages to ${_pkg_final_rsync_hostname}... " | tee -a ${_logfile}
2003
				if script -aq ${_logfile} ssh -p ${PKG_RSYNC_SSH_PORT} \
2004
					${PKG_RSYNC_USERNAME}@${_pkg_rsync_hostname} ${_cmd} >/dev/null 2>&1; then
2005
					echo "Done!" | tee -a ${_logfile}
2006
				else
2007
					echo "Failed!" | tee -a ${_logfile}
2008
					echo ">>> ERROR: An error occurred sending repo to final hostname"
2009
					print_error_pfS
2010
				fi
2011

    
2012
				_cmd="rsync -Have \"ssh -p ${PKG_FINAL_RSYNC_SSH_PORT}\" \
2013
					--timeout=60 --delete-delay ${PKG_RSYNC_DESTDIR}/./${_repo_base%%-core}* \
2014
					${PKG_FINAL_RSYNC_USERNAME}@${_pkg_final_rsync_hostname}:${PKG_FINAL_RSYNC_DESTDIR}"
2015

    
2016
				echo -n ">>> Sending updated repositories metadata to ${_pkg_final_rsync_hostname}... " | tee -a ${_logfile}
2017
				if script -aq ${_logfile} ssh -p ${PKG_RSYNC_SSH_PORT} \
2018
					${PKG_RSYNC_USERNAME}@${_pkg_rsync_hostname} ${_cmd} >/dev/null 2>&1; then
2019
					echo "Done!" | tee -a ${_logfile}
2020
				else
2021
					echo "Failed!" | tee -a ${_logfile}
2022
					echo ">>> ERROR: An error occurred sending repo to final hostname"
2023
					print_error_pfS
2024
				fi
2025
			done
2026
		fi
2027
	done
2028
}
2029

    
2030
poudriere_create_patch() {
2031
	local _jail_patch="${SCRATCHDIR}/poudriere_jail.${POUDRIERE_BRANCH}.patch"
2032

    
2033
	if [ -z "${FREEBSD_PARENT_BRANCH}" ]; then
2034
		echo ">>> ERROR: FREEBSD_PARENT_BRANCH is not set"
2035
	fi
2036

    
2037
	LOGFILE=${BUILDER_LOGS}/poudriere.log
2038

    
2039
	# Get FreeBSD source and apply patches
2040
	update_freebsd_sources full
2041

    
2042
	[ -f "${_jail_patch}" ] && \
2043
		rm -f "${_jail_patch}"
2044

    
2045
	# Create a big patch with all our changes to use on jail
2046
	( \
2047
		cd ${FREEBSD_SRC_DIR} && \
2048
		git diff $(git merge-base origin/${FREEBSD_PARENT_BRANCH} ${FREEBSD_BRANCH}) > ${_jail_patch}
2049
	) >/dev/null 2>&1
2050

    
2051
	# Check if patch was created
2052
	if [ ! -s "${_jail_patch}" ]; then
2053
		echo ">>> ERROR: Patch does not exist or is empty, aborting..." | tee -a ${LOGFILE}
2054
		print_error_pfS
2055
	fi
2056
}
2057

    
2058
poudriere_possible_archs() {
2059
	local _arch=$(uname -m)
2060
	local _archs="i386.i386"
2061

    
2062
	# If host is amd64, we'll create both repos, and if possible armv6
2063
	if [ "${_arch}" = "amd64" ]; then
2064
		_archs="amd64.amd64 ${_archs}"
2065

    
2066
		if [ -f /usr/local/bin/qemu-arm-static ]; then
2067
			# Make sure binmiscctl is ok
2068
			/usr/local/etc/rc.d/qemu_user_static forcestart >/dev/null 2>&1
2069

    
2070
			if binmiscctl lookup armv6 >/dev/null 2>&1; then
2071
				_archs="${_archs} arm.armv6"
2072
			fi
2073
		fi
2074
	fi
2075

    
2076
	if [ -n "${ARCH_LIST}" ]; then
2077
		local _found=0
2078
		for _desired_arch in ${ARCH_LIST}; do
2079
			_found=0
2080
			for _possible_arch in ${_archs}; do
2081
				if [ "${_desired_arch}" = "${_possible_arch}" ]; then
2082
					_found=1
2083
					break
2084
				fi
2085
			done
2086
			if [ ${_found} -eq 0 ]; then
2087
				echo ">>> ERROR: Impossible to build for arch: ${_desired_arch}"
2088
				print_error_pfS
2089
			fi
2090
		done
2091
		_archs="${ARCH_LIST}"
2092
	fi
2093

    
2094
	echo ${_archs}
2095
}
2096

    
2097
poudriere_jail_name() {
2098
	local _jail_arch="${1}"
2099

    
2100
	if [ -z "${_jail_arch}" ]; then
2101
		return 1
2102
	fi
2103

    
2104
	# Remove arch
2105
	echo "${PRODUCT_NAME}_${POUDRIERE_BRANCH}_${_jail_arch##*.}"
2106
}
2107

    
2108
poudriere_rename_ports() {
2109
	if [ "${PRODUCT_NAME}" = "pfSense" ]; then
2110
		return;
2111
	fi
2112

    
2113
	LOGFILE=${BUILDER_LOGS}/poudriere.log
2114

    
2115
	local _ports_dir="/usr/local/poudriere/ports/${POUDRIERE_PORTS_NAME}"
2116

    
2117
	echo -n ">>> Renaming product ports on ${POUDRIERE_PORTS_NAME}... " | tee -a ${LOGFILE}
2118
	for d in $(find ${_ports_dir} -depth 2 -type d -name '*pfSense*'); do
2119
		local _pdir=$(dirname ${d})
2120
		local _pname=$(echo $(basename ${d}) | sed "s,pfSense,${PRODUCT_NAME},")
2121
		local _plist=""
2122

    
2123
		if [ -e ${_pdir}/${_pname} ]; then
2124
			rm -rf ${_pdir}/${_pname}
2125
		fi
2126

    
2127
		cp -r ${d} ${_pdir}/${_pname}
2128

    
2129
		if [ -f ${_pdir}/${_pname}/pkg-plist ]; then
2130
			_plist=${_pdir}/${_pname}/pkg-plist
2131
		fi
2132

    
2133
		sed -i '' -e "s,pfSense,${PRODUCT_NAME},g" \
2134
			  -e "s,https://www.pfsense.org,${PRODUCT_URL},g" \
2135
			  -e "/^MAINTAINER=/ s,^.*$,MAINTAINER=	${PRODUCT_EMAIL}," \
2136
			${_pdir}/${_pname}/Makefile \
2137
			${_pdir}/${_pname}/pkg-descr ${_plist}
2138

    
2139
		# PHP module is special
2140
		if echo "${_pname}" | grep -q "^php[0-9]*-${PRODUCT_NAME}-module"; then
2141
			local _product_capital=$(echo ${PRODUCT_NAME} | tr '[a-z]' '[A-Z]')
2142
			sed -i '' -e "s,PHP_PFSENSE,PHP_${_product_capital},g" \
2143
				  -e "s,PFSENSE_SHARED_LIBADD,${_product_capital}_SHARED_LIBADD,g" \
2144
				  -e "s,pfSense,${PRODUCT_NAME},g" \
2145
				  -e "s,${PRODUCT_NAME}\.c,pfSense.c,g" \
2146
				${_pdir}/${_pname}/files/config.m4
2147

    
2148
			sed -i '' -e "s,COMPILE_DL_PFSENSE,COMPILE_DL_${_product_capital}," \
2149
				  -e "s,pfSense_module_entry,${PRODUCT_NAME}_module_entry,g" \
2150
				  -e "/ZEND_GET_MODULE/ s,pfSense,${PRODUCT_NAME}," \
2151
				  -e "/PHP_PFSENSE_WORLD_EXTNAME/ s,pfSense,${PRODUCT_NAME}," \
2152
				${_pdir}/${_pname}/files/pfSense.c \
2153
				${_pdir}/${_pname}/files/php_pfSense.h
2154
		fi
2155

    
2156
		if [ -d ${_pdir}/${_pname}/files ]; then
2157
			for fd in $(find ${_pdir}/${_pname}/files -type d -name '*pfSense*'); do
2158
				local _fddir=$(dirname ${fd})
2159
				local _fdname=$(echo $(basename ${fd}) | sed "s,pfSense,${PRODUCT_NAME},")
2160

    
2161
				mv ${fd} ${_fddir}/${_fdname}
2162
			done
2163
		fi
2164
	done
2165
	echo "Done!" | tee -a ${LOGFILE}
2166
}
2167

    
2168
poudriere_create_ports_tree() {
2169
	LOGFILE=${BUILDER_LOGS}/poudriere.log
2170

    
2171
	if ! poudriere ports -l | grep -q -E "^${POUDRIERE_PORTS_NAME}[[:blank:]]"; then
2172
		local _branch=""
2173
		if [ -z "${POUDRIERE_PORTS_GIT_URL}" ]; then
2174
			echo ">>> ERROR: POUDRIERE_PORTS_GIT_URL is not defined"
2175
			print_error_pfS
2176
		fi
2177
		if [ -n "${POUDRIERE_PORTS_GIT_BRANCH}" ]; then
2178
			_branch="-B ${POUDRIERE_PORTS_GIT_BRANCH}"
2179
		fi
2180
		echo -n ">>> Creating poudriere ports tree, it may take some time... " | tee -a ${LOGFILE}
2181
		if ! script -aq ${LOGFILE} poudriere ports -c -p "${POUDRIERE_PORTS_NAME}" -m git ${_branch} >/dev/null 2>&1; then
2182
			echo "" | tee -a ${LOGFILE}
2183
			echo ">>> ERROR: Error creating poudriere ports tree, aborting..." | tee -a ${LOGFILE}
2184
			print_error_pfS
2185
		fi
2186
		echo "Done!" | tee -a ${LOGFILE}
2187
		poudriere_rename_ports
2188
	fi
2189
}
2190

    
2191
poudriere_init() {
2192
	local _error=0
2193
	local _archs=$(poudriere_possible_archs)
2194
	local _jail_patch="${SCRATCHDIR}/poudriere_jail.${POUDRIERE_BRANCH}.patch"
2195

    
2196
	LOGFILE=${BUILDER_LOGS}/poudriere.log
2197

    
2198
	# Sanity checks
2199
	if [ -z "${ZFS_TANK}" ]; then
2200
		echo ">>> ERROR: \$ZFS_TANK is empty" | tee -a ${LOGFILE}
2201
		error=1
2202
	fi
2203

    
2204
	if [ -z "${ZFS_ROOT}" ]; then
2205
		echo ">>> ERROR: \$ZFS_ROOT is empty" | tee -a ${LOGFILE}
2206
		error=1
2207
	fi
2208

    
2209
	if [ -z "${POUDRIERE_PORTS_NAME}" ]; then
2210
		echo ">>> ERROR: \$POUDRIERE_PORTS_NAME is empty" | tee -a ${LOGFILE}
2211
		error=1
2212
	fi
2213

    
2214
	if [ ${_error} -eq 1 ]; then
2215
		print_error_pfS
2216
	fi
2217

    
2218
	# Check if zpool exists
2219
	if ! zpool list ${ZFS_TANK} >/dev/null 2>&1; then
2220
		echo ">>> ERROR: ZFS tank ${ZFS_TANK} not found, please create it and try again..." | tee -a ${LOGFILE}
2221
		print_error_pfS
2222
	fi
2223

    
2224
	# Check if zfs rootfs exists
2225
	if ! zfs list ${ZFS_TANK}${ZFS_ROOT} >/dev/null 2>&1; then
2226
		echo -n ">>> Creating ZFS filesystem ${ZFS_TANK}${ZFS_ROOT}... "
2227
		if zfs create -o atime=off -o mountpoint=/usr/local${ZFS_ROOT} \
2228
		    ${ZFS_TANK}${ZFS_ROOT} >/dev/null 2>&1; then
2229
			echo "Done!"
2230
		else
2231
			echo "Failed!"
2232
			print_error_pfS
2233
		fi
2234
	fi
2235

    
2236
	# Make sure poudriere is installed
2237
	if ! pkg info --quiet poudriere; then
2238
		echo ">>> Installing poudriere..." | tee -a ${LOGFILE}
2239
		if ! pkg install poudriere >/dev/null 2>&1; then
2240
			echo ">>> ERROR: poudriere was not installed, aborting..." | tee -a ${LOGFILE}
2241
			print_error_pfS
2242
		fi
2243
	fi
2244

    
2245
	# Create poudriere.conf
2246
	if [ -z "${POUDRIERE_PORTS_GIT_URL}" ]; then
2247
		echo ">>> ERROR: POUDRIERE_PORTS_GIT_URL is not defined"
2248
		print_error_pfS
2249
	fi
2250
	echo ">>> Creating poudriere.conf" | tee -a ${LOGFILE}
2251
	cat <<EOF >/usr/local/etc/poudriere.conf
2252
ZPOOL=${ZFS_TANK}
2253
ZROOTFS=${ZFS_ROOT}
2254
RESOLV_CONF=/etc/resolv.conf
2255
BASEFS=/usr/local/poudriere
2256
USE_PORTLINT=no
2257
USE_TMPFS=yes
2258
NOLINUX=yes
2259
DISTFILES_CACHE=/usr/ports/distfiles
2260
CHECK_CHANGED_OPTIONS=yes
2261
CHECK_CHANGED_DEPS=yes
2262
ATOMIC_PACKAGE_REPOSITORY=yes
2263
COMMIT_PACKAGES_ON_FAILURE=no
2264
KEEP_OLD_PACKAGES=yes
2265
KEEP_OLD_PACKAGES_COUNT=5
2266
EOF
2267

    
2268
	# Create specific items conf
2269
	[ ! -d /usr/local/etc/poudriere.d ] \
2270
		&& mkdir -p /usr/local/etc/poudriere.d
2271

    
2272
	cat <<EOF >/usr/local/etc/poudriere.d/${POUDRIERE_PORTS_NAME}-poudriere.conf
2273
GIT_URL="${POUDRIERE_PORTS_GIT_URL}"
2274
EOF
2275

    
2276
	# Create DISTFILES_CACHE if it doesn't exist
2277
	if [ ! -d /usr/ports/distfiles ]; then
2278
		mkdir -p /usr/ports/distfiles
2279
	fi
2280

    
2281
	# Remove old jails
2282
	for jail_arch in ${_archs}; do
2283
		jail_name=$(poudriere_jail_name ${jail_arch})
2284

    
2285
		if poudriere jail -i -j "${jail_name}" >/dev/null 2>&1; then
2286
			echo ">>> Poudriere jail ${jail_name} already exists, deleting it..." | tee -a ${LOGFILE}
2287
			poudriere jail -d -j "${jail_name}" >/dev/null 2>&1
2288
		fi
2289
	done
2290

    
2291
	# Remove old ports tree
2292
	if poudriere ports -l | grep -q -E "^${POUDRIERE_PORTS_NAME}[[:blank:]]"; then
2293
		echo ">>> Poudriere ports tree ${POUDRIERE_PORTS_NAME} already exists, deleting it..." | tee -a ${LOGFILE}
2294
		poudriere ports -d -p "${POUDRIERE_PORTS_NAME}"
2295
	fi
2296

    
2297
	poudriere_create_patch
2298

    
2299
	local native_xtools=""
2300
	# Now we are ready to create jails
2301
	for jail_arch in ${_archs}; do
2302
		jail_name=$(poudriere_jail_name ${jail_arch})
2303

    
2304
		if [ "${jail_arch}" = "arm.armv6" ]; then
2305
			native_xtools="-x"
2306
		else
2307
			native_xtools=""
2308
		fi
2309

    
2310
		echo -n ">>> Creating jail ${jail_name}, it may take some time... " | tee -a ${LOGFILE}
2311
		# XXX: Change -m to git when it's available in poudriere
2312
		if ! script -aq ${LOGFILE} poudriere jail -c -j "${jail_name}" -v ${FREEBSD_PARENT_BRANCH} \
2313
				-a ${jail_arch} -m svn -P ${_jail_patch} ${native_xtools} >/dev/null 2>&1; then
2314
			echo "" | tee -a ${LOGFILE}
2315
			echo ">>> ERROR: Error creating jail ${jail_name}, aborting..." | tee -a ${LOGFILE}
2316
			print_error_pfS
2317
		fi
2318
		echo "Done!" | tee -a ${LOGFILE}
2319
	done
2320

    
2321
	poudriere_create_ports_tree
2322

    
2323
	echo ">>> Poudriere is now configured!" | tee -a ${LOGFILE}
2324
}
2325

    
2326
poudriere_update_jails() {
2327
	local _archs=$(poudriere_possible_archs)
2328
	local _jail_patch="${SCRATCHDIR}/poudriere_jail.${POUDRIERE_BRANCH}.patch"
2329

    
2330
	LOGFILE=${BUILDER_LOGS}/poudriere.log
2331

    
2332
	poudriere_create_patch
2333

    
2334
	local native_xtools=""
2335
	for jail_arch in ${_archs}; do
2336
		jail_name=$(poudriere_jail_name ${jail_arch})
2337

    
2338
		local _create_or_update="-u"
2339
		local _create_or_update_text="Updating"
2340
		if ! poudriere jail -i -j "${jail_name}" >/dev/null 2>&1; then
2341
			echo ">>> Poudriere jail ${jail_name} not found, creating..." | tee -a ${LOGFILE}
2342
			_create_or_update="-c -v ${FREEBSD_PARENT_BRANCH} -a ${jail_arch} -m svn"
2343
			_create_or_update_text="Creating"
2344
		fi
2345

    
2346
		if [ "${jail_arch}" = "arm.armv6" ]; then
2347
			native_xtools="-x"
2348
		else
2349
			native_xtools=""
2350
		fi
2351

    
2352
		echo -n ">>> ${_create_or_update_text} jail ${jail_name}, it may take some time... " | tee -a ${LOGFILE}
2353
		if ! script -aq ${LOGFILE} poudriere jail ${_create_or_update} -j "${jail_name}" -P ${_jail_patch} ${native_xtools} >/dev/null 2>&1; then
2354
			echo "" | tee -a ${LOGFILE}
2355
			echo ">>> ERROR: Error ${_create_or_update_text} jail ${jail_name}, aborting..." | tee -a ${LOGFILE}
2356
			print_error_pfS
2357
		fi
2358
		echo "Done!" | tee -a ${LOGFILE}
2359
	done
2360
}
2361

    
2362
poudriere_update_ports() {
2363
	LOGFILE=${BUILDER_LOGS}/poudriere.log
2364

    
2365
	# Create ports tree if necessary
2366
	if ! poudriere ports -l | grep -q -E "^${POUDRIERE_PORTS_NAME}[[:blank:]]"; then
2367
		poudriere_create_ports_tree
2368
	else
2369
		echo -n ">>> Resetting local changes on ports tree ${POUDRIERE_PORTS_NAME}... " | tee -a ${LOGFILE}
2370
		script -aq ${LOGFILE} git -C "/usr/local/poudriere/ports/${POUDRIERE_PORTS_NAME}" reset --hard >/dev/null 2>&1
2371
		script -aq ${LOGFILE} git -C "/usr/local/poudriere/ports/${POUDRIERE_PORTS_NAME}" clean -fd >/dev/null 2>&1
2372
		echo "Done!" | tee -a ${LOGFILE}
2373
		echo -n ">>> Updating ports tree ${POUDRIERE_PORTS_NAME}... " | tee -a ${LOGFILE}
2374
		script -aq ${LOGFILE} poudriere ports -u -p "${POUDRIERE_PORTS_NAME}" >/dev/null 2>&1
2375
		echo "Done!" | tee -a ${LOGFILE}
2376
		poudriere_rename_ports
2377
	fi
2378
}
2379

    
2380
poudriere_bulk() {
2381
	local _archs=$(poudriere_possible_archs)
2382

    
2383
	LOGFILE=${BUILDER_LOGS}/poudriere.log
2384

    
2385
	if [ -n "${UPLOAD}" -a -z "${PKG_RSYNC_HOSTNAME}" ]; then
2386
		echo ">>> ERROR: PKG_RSYNC_HOSTNAME is not set"
2387
		print_error_pfS
2388
	fi
2389

    
2390
	rm -f ${LOGFILE}
2391

    
2392
	poudriere_create_ports_tree
2393

    
2394
	[ -d /usr/local/etc/poudriere.d ] || \
2395
		mkdir -p /usr/local/etc/poudriere.d
2396

    
2397
	if [ -f "${BUILDER_TOOLS}/conf/pfPorts/make.conf" ]; then
2398
		cp -f "${BUILDER_TOOLS}/conf/pfPorts/make.conf" \
2399
			/usr/local/etc/poudriere.d/${POUDRIERE_PORTS_NAME}-make.conf
2400
	fi
2401

    
2402
	cat <<EOF >>/usr/local/etc/poudriere.d/${POUDRIERE_PORTS_NAME}-make.conf
2403
PKG_REPO_BRANCH_DEVEL=${PKG_REPO_BRANCH_DEVEL}
2404
PKG_REPO_BRANCH_RELEASE=${PKG_REPO_BRANCH_RELEASE}
2405
PKG_REPO_SERVER_DEVEL=${PKG_REPO_SERVER_DEVEL}
2406
PKG_REPO_SERVER_RELEASE=${PKG_REPO_SERVER_RELEASE}
2407
POUDRIERE_PORTS_NAME=${POUDRIERE_PORTS_NAME}
2408
PRODUCT_NAME=${PRODUCT_NAME}
2409
EOF
2410

    
2411
	# Change version of pfSense meta ports for snapshots
2412
	if [ -z "${_IS_RELEASE}" ]; then
2413
		local _meta_pkg_version="$(echo "${PRODUCT_VERSION}" | sed 's,DEVELOPMENT,ALPHA,')-${DATESTRING}"
2414
		sed -i '' \
2415
			-e "/^DISTVERSION/ s,^.*,DISTVERSION=	${_meta_pkg_version}," \
2416
			-e "/^PORTREVISION=/d" \
2417
			/usr/local/poudriere/ports/${POUDRIERE_PORTS_NAME}/security/${PRODUCT_NAME}/Makefile \
2418
			/usr/local/poudriere/ports/${POUDRIERE_PORTS_NAME}/sysutils/${PRODUCT_NAME}-repo/Makefile
2419
	fi
2420

    
2421
	# Copy over pkg repo templates to pfSense-repo
2422
	mkdir -p /usr/local/poudriere/ports/${POUDRIERE_PORTS_NAME}/sysutils/${PRODUCT_NAME}-repo/files
2423
	cp -f ${PKG_REPO_BASE}/* \
2424
		/usr/local/poudriere/ports/${POUDRIERE_PORTS_NAME}/sysutils/${PRODUCT_NAME}-repo/files
2425

    
2426
	for jail_arch in ${_archs}; do
2427
		jail_name=$(poudriere_jail_name ${jail_arch})
2428

    
2429
		if ! poudriere jail -i -j "${jail_name}" >/dev/null 2>&1; then
2430
			echo ">>> Poudriere jail ${jail_name} not found, skipping..." | tee -a ${LOGFILE}
2431
			continue
2432
		fi
2433

    
2434
		if [ -f "${POUDRIERE_BULK}.${jail_arch}" ]; then
2435
			_ref_bulk="${POUDRIERE_BULK}.${jail_arch}"
2436
		else
2437
			_ref_bulk="${POUDRIERE_BULK}"
2438
		fi
2439

    
2440
		_bulk=${SCRATCHDIR}/poudriere_bulk.${POUDRIERE_BRANCH}
2441
		sed -e "s,%%PRODUCT_NAME%%,${PRODUCT_NAME},g" ${_ref_bulk} > ${_bulk}
2442

    
2443
		local _exclude_bulk="${POUDRIERE_BULK}.exclude.${jail_arch}"
2444
		if [ -f "${_exclude_bulk}" ]; then
2445
			mv ${_bulk} ${_bulk}.tmp
2446
			sed -e "s,%%PRODUCT_NAME%%,${PRODUCT_NAME},g" ${_exclude_bulk} > ${_bulk}.exclude
2447
			cat ${_bulk}.tmp ${_bulk}.exclude | sort | uniq -u > ${_bulk}
2448
			rm -f ${_bulk}.tmp ${_bulk}.exclude
2449
		fi
2450

    
2451
		if ! poudriere bulk -f ${_bulk} -j ${jail_name} -p ${POUDRIERE_PORTS_NAME}; then
2452
			echo ">>> ERROR: Something went wrong..."
2453
			print_error_pfS
2454
		fi
2455

    
2456
		echo ">>> Cleaning up old packages from repo..."
2457
		if ! poudriere pkgclean -f ${_bulk} -j ${jail_name} -p ${POUDRIERE_PORTS_NAME} -y; then
2458
			echo ">>> ERROR: Something went wrong..."
2459
			print_error_pfS
2460
		fi
2461

    
2462
		pkg_repo_rsync "/usr/local/poudriere/data/packages/${jail_name}-${POUDRIERE_PORTS_NAME}"
2463
	done
2464
}
2465

    
2466
# This routine is called to write out to stdout
2467
# a string. The string is appended to $SNAPSHOTSLOGFILE
2468
snapshots_update_status() {
2469
	if [ -z "$1" ]; then
2470
		return
2471
	fi
2472
	if [ -z "${SNAPSHOTS}" -a -z "${POUDRIERE_SNAPSHOTS}" ]; then
2473
		return
2474
	fi
2475
	echo "$*"
2476
	echo "`date` -|- $*" >> $SNAPSHOTSLOGFILE
2477
}
2478

    
2479
create_sha256() {
2480
	local _file="${1}"
2481

    
2482
	if [ ! -f "${_file}" ]; then
2483
		return 1
2484
	fi
2485

    
2486
	( \
2487
		cd $(dirname ${_file}) && \
2488
		sha256 $(basename ${_file}) > $(basename ${_file}).sha256 \
2489
	)
2490
}
2491

    
2492
snapshots_create_latest_symlink() {
2493
	local _image="${1}"
2494

    
2495
	if [ -z "${_image}" ]; then
2496
		return
2497
	fi
2498

    
2499
	if [ -z "${TIMESTAMP_SUFFIX}" ]; then
2500
		return
2501
	fi
2502

    
2503
	if [ ! -f "${_image}" ]; then
2504
		return
2505
	fi
2506

    
2507
	local _symlink=$(echo ${_image} | sed "s,${TIMESTAMP_SUFFIX},-latest,")
2508
	ln -sf $(basename ${_image}) ${_symlink}
2509
	ln -sf $(basename ${_image}).sha256 ${_symlink}.sha256
2510
}
2511

    
2512
snapshots_copy_to_staging_nanobsd() {
2513
	for NANOTYPE in nanobsd nanobsd-vga; do
2514
		for FILESIZE in ${1}; do
2515
			FILENAMEFULL="$(nanobsd_image_filename ${FILESIZE} ${NANOTYPE}).gz"
2516
			FILENAMEUPGRADE="$(nanobsd_image_filename ${FILESIZE} ${NANOTYPE} 1).gz"
2517
			mkdir -p $STAGINGAREA/nanobsd
2518
			mkdir -p $STAGINGAREA/nanobsdupdates
2519

    
2520
			cp -l $IMAGES_FINAL_DIR/$FILENAMEFULL $STAGINGAREA/nanobsd/ 2>/dev/null
2521
			cp -l $IMAGES_FINAL_DIR/$FILENAMEUPGRADE $STAGINGAREA/nanobsdupdates 2>/dev/null
2522

    
2523
			if [ -f $STAGINGAREA/nanobsd/$FILENAMEFULL ]; then
2524
				create_sha256 $STAGINGAREA/nanobsd/$FILENAMEFULL
2525
			fi
2526
			if [ -f $STAGINGAREA/nanobsdupdates/$FILENAMEUPGRADE ]; then
2527
				create_sha256 $STAGINGAREA/nanobsdupdates/$FILENAMEUPGRADE
2528
			fi
2529

    
2530
			# Copy NanoBSD auto update:
2531
			if [ -f $STAGINGAREA/nanobsdupdates/$FILENAMEUPGRADE ]; then
2532
				cp -l $STAGINGAREA/nanobsdupdates/$FILENAMEUPGRADE $STAGINGAREA/latest-${NANOTYPE}-$FILESIZE.img.gz 2>/dev/null
2533
				create_sha256 $STAGINGAREA/latest-${NANOTYPE}-$FILESIZE.img.gz
2534
				# NOTE: Updates need a file with output similar to date output
2535
				# Use the file generated at start of snapshots_dobuilds() to be consistent on times
2536
				cp $BUILTDATESTRINGFILE $STAGINGAREA/version-${NANOTYPE}-$FILESIZE
2537
			fi
2538
		done
2539
	done
2540
}
2541

    
2542
snapshots_copy_to_staging_iso_updates() {
2543
	local _img=""
2544

    
2545
	for _img in ${ISOPATH} ${MEMSTICKPATH} ${MEMSTICKSERIALPATH} ${MEMSTICKADIPATH} ${VARIANTIMAGES}; do
2546
		if [ ! -f "${_img}.gz" ]; then
2547
			continue
2548
		fi
2549
		_img="${_img}.gz"
2550
		create_sha256 ${_img}
2551
		cp -l ${_img}* $STAGINGAREA/ 2>/dev/null
2552
		snapshots_create_latest_symlink ${STAGINGAREA}/$(basename ${_img})
2553
	done
2554

    
2555
	for _img in ${UPDATES_TARBALL_FILENAME} ${VARIANTUPDATES}; do
2556
		if [ -f "${_img}" ]; then
2557
			create_sha256 ${_img}
2558
			cp -l ${_img}* $STAGINGAREA/ 2>/dev/null
2559
			snapshots_create_latest_symlink ${STAGINGAREA}/$(basename ${_img})
2560
		fi
2561
	done
2562

    
2563
	if [ -f "${OVAPATH}" ]; then
2564
		mkdir -p ${STAGINGAREA}/virtualization
2565
		create_sha256 ${OVAPATH}
2566
		cp -l ${OVAPATH}* $STAGINGAREA/virtualization 2>/dev/null
2567
		snapshots_create_latest_symlink ${STAGINGAREA}/virtualization/$(basename ${OVAPATH})
2568
	fi
2569

    
2570
	# NOTE: Updates need a file with output similar to date output
2571
	# Use the file generated at start of snapshots_dobuilds() to be consistent on times
2572
	if [ -z "${_IS_RELEASE}" ]; then
2573
		cp $BUILTDATESTRINGFILE $STAGINGAREA/version 2>/dev/null
2574
	fi
2575
}
2576

    
2577
snapshots_scp_files() {
2578
	if [ -z "${RSYNC_COPY_ARGUMENTS}" ]; then
2579
		RSYNC_COPY_ARGUMENTS="-ave ssh --timeout=60"
2580
	fi
2581

    
2582
	snapshots_update_status ">>> Copying core pkg repo to ${PKG_RSYNC_HOSTNAME}"
2583
	pkg_repo_rsync "${CORE_PKG_PATH}"
2584
	snapshots_update_status ">>> Finished copying core pkg repo"
2585

    
2586
	for _rsyncip in ${RSYNCIP}; do
2587
		snapshots_update_status ">>> Copying files to ${_rsyncip}"
2588

    
2589
		# Ensure directory(s) are available
2590
		ssh ${RSYNCUSER}@${_rsyncip} "mkdir -p ${RSYNCPATH}/installer"
2591
		ssh ${RSYNCUSER}@${_rsyncip} "mkdir -p ${RSYNCPATH}/updates"
2592
		ssh ${RSYNCUSER}@${_rsyncip} "mkdir -p ${RSYNCPATH}/nanobsd"
2593
		if [ -d $STAGINGAREA/virtualization ]; then
2594
			ssh ${RSYNCUSER}@${_rsyncip} "mkdir -p ${RSYNCPATH}/virtualization"
2595
		fi
2596
		ssh ${RSYNCUSER}@${_rsyncip} "mkdir -p ${RSYNCPATH}/.updaters"
2597
		# ensure permissions are correct for r+w
2598
		ssh ${RSYNCUSER}@${_rsyncip} "chmod -R ug+rw ${RSYNCPATH}/."
2599
		rsync $RSYNC_COPY_ARGUMENTS $STAGINGAREA/${PRODUCT_NAME}${PRODUCT_NAME_SUFFIX}-*iso* \
2600
			${RSYNCUSER}@${_rsyncip}:${RSYNCPATH}/installer/
2601
		rsync $RSYNC_COPY_ARGUMENTS $STAGINGAREA/${PRODUCT_NAME}${PRODUCT_NAME_SUFFIX}-memstick* \
2602
			${RSYNCUSER}@${_rsyncip}:${RSYNCPATH}/installer/
2603
		rsync $RSYNC_COPY_ARGUMENTS $STAGINGAREA/${PRODUCT_NAME}${PRODUCT_NAME_SUFFIX}-*Update* \
2604
			${RSYNCUSER}@${_rsyncip}:${RSYNCPATH}/updates/
2605
		rsync $RSYNC_COPY_ARGUMENTS $STAGINGAREA/nanobsd/* \
2606
			${RSYNCUSER}@${_rsyncip}:${RSYNCPATH}/nanobsd/
2607
		rsync $RSYNC_COPY_ARGUMENTS $STAGINGAREA/nanobsdupdates/* \
2608
			${RSYNCUSER}@${_rsyncip}:${RSYNCPATH}/updates/
2609
		if [ -d $STAGINGAREA/virtualization ]; then
2610
			rsync $RSYNC_COPY_ARGUMENTS $STAGINGAREA/virtualization/* \
2611
				${RSYNCUSER}@${_rsyncip}:${RSYNCPATH}/virtualization/
2612
		fi
2613

    
2614
		# Rather than copy these twice, use ln to link to the latest one.
2615

    
2616
		ssh ${RSYNCUSER}@${_rsyncip} "rm -f ${RSYNCPATH}/.updaters/latest.tgz"
2617
		ssh ${RSYNCUSER}@${_rsyncip} "rm -f ${RSYNCPATH}/.updaters/latest.tgz.sha256"
2618

    
2619
		LATESTFILENAME=$(basename ${UPDATES_TARBALL_FILENAME})
2620
		ssh ${RSYNCUSER}@${_rsyncip} "ln -s ${RSYNCPATH}/updates/${LATESTFILENAME} \
2621
			${RSYNCPATH}/.updaters/latest.tgz"
2622
		ssh ${RSYNCUSER}@${_rsyncip} "ln -s ${RSYNCPATH}/updates/${LATESTFILENAME}.sha256 \
2623
			${RSYNCPATH}/.updaters/latest.tgz.sha256"
2624

    
2625
		for i in ${FLASH_SIZE}
2626
		do
2627
			ssh ${RSYNCUSER}@${_rsyncip} "rm -f ${RSYNCPATH}/.updaters/latest-nanobsd-${i}.img.gz"
2628
			ssh ${RSYNCUSER}@${_rsyncip} "rm -f ${RSYNCPATH}/.updaters/latest-nanobsd-${i}.img.gz.sha256"
2629
			ssh ${RSYNCUSER}@${_rsyncip} "rm -f ${RSYNCPATH}/.updaters/latest-nanobsd-vga-${i}.img.gz"
2630
			ssh ${RSYNCUSER}@${_rsyncip} "rm -f ${RSYNCPATH}/.updaters/latest-nanobsd-vga-${i}.img.gz.sha256"
2631

    
2632
			FILENAMEUPGRADE="$(nanobsd_image_filename ${i} nanobsd 1).gz"
2633
			ssh ${RSYNCUSER}@${_rsyncip} "ln -s ${RSYNCPATH}/updates/${FILENAMEUPGRADE} \
2634
				${RSYNCPATH}/.updaters/latest-nanobsd-${i}.img.gz"
2635
			ssh ${RSYNCUSER}@${_rsyncip} "ln -s ${RSYNCPATH}/updates/${FILENAMEUPGRADE}.sha256 \
2636
				${RSYNCPATH}/.updaters/latest-nanobsd-${i}.img.gz.sha256"
2637

    
2638
			FILENAMEUPGRADE="$(nanobsd_image_filename ${i} nanobsd-vga 1).gz"
2639
			ssh ${RSYNCUSER}@${_rsyncip} "ln -s ${RSYNCPATH}/updates/${FILENAMEUPGRADE} \
2640
				${RSYNCPATH}/.updaters/latest-nanobsd-vga-${i}.img.gz"
2641
			ssh ${RSYNCUSER}@${_rsyncip} "ln -s ${RSYNCPATH}/updates/${FILENAMEUPGRADE}.sha256 \
2642
				${RSYNCPATH}/.updaters/latest-nanobsd-vga-${i}.img.gz.sha256"
2643
		done
2644

    
2645
		rsync $RSYNC_COPY_ARGUMENTS $STAGINGAREA/version* \
2646
			${RSYNCUSER}@${_rsyncip}:${RSYNCPATH}/.updaters
2647
		snapshots_update_status ">>> Finished copying files."
2648
	done
2649
}
(2-2/3)