package control import ( "bytes" "fmt" "io/ioutil" "os" "os/exec" "path" "regexp" "strings" "syscall" "github.com/codegangsta/cli" "github.com/rancher/os/cmd/cloudinitexecute" "github.com/rancher/os/config" "github.com/rancher/os/config/cmdline" "github.com/rancher/os/log" "github.com/rancher/os/util" ) const ( consoleDone = "/run/console-done" dockerHome = "/home/docker" gettyCmd = "/sbin/agetty" rancherHome = "/home/rancher" startScript = "/opt/rancher/bin/start.sh" ) type symlink struct { oldname, newname string } func ConsoleInitMain() { if err := consoleInitFunc(); err != nil { log.Fatal(err) } } func consoleInitAction(c *cli.Context) error { return consoleInitFunc() } func createHomeDir(homedir string, uid, gid int) { if _, err := os.Stat(homedir); os.IsNotExist(err) { if err := os.MkdirAll(homedir, 0755); err != nil { log.Error(err) } if err := os.Chown(homedir, uid, gid); err != nil { log.Error(err) } } } func consoleInitFunc() error { cfg := config.LoadConfig() // Now that we're booted, stop writing debug messages to the console cmd := exec.Command("sudo", "dmesg", "--console-off") if err := cmd.Run(); err != nil { log.Error(err) } createHomeDir(rancherHome, 1100, 1100) createHomeDir(dockerHome, 1101, 1101) password := cmdline.GetCmdline("rancher.password") if password != "" { cmd := exec.Command("chpasswd") cmd.Stdin = strings.NewReader(fmt.Sprint("rancher:", password)) if err := cmd.Run(); err != nil { log.Error(err) } cmd = exec.Command("bash", "-c", `sed -E -i 's/(rancher:.*:).*(:.*:.*:.*:.*:.*:.*)$/\1\2/' /etc/shadow`) if err := cmd.Run(); err != nil { log.Error(err) } } if err := setupSSH(cfg); err != nil { log.Error(err) } if err := writeRespawn("rancher", cfg.Rancher.SSH.Daemon, false); err != nil { log.Error(err) } if err := modifySshdConfig(); err != nil { log.Error(err) } for _, link := range []symlink{ {"/var/lib/rancher/engine/docker", "/usr/bin/docker"}, {"/var/lib/rancher/engine/docker-init", "/usr/bin/docker-init"}, {"/var/lib/rancher/engine/docker-containerd", "/usr/bin/docker-containerd"}, {"/var/lib/rancher/engine/docker-containerd-ctr", "/usr/bin/docker-containerd-ctr"}, {"/var/lib/rancher/engine/docker-containerd-shim", "/usr/bin/docker-containerd-shim"}, {"/var/lib/rancher/engine/dockerd", "/usr/bin/dockerd"}, {"/var/lib/rancher/engine/docker-proxy", "/usr/bin/docker-proxy"}, {"/var/lib/rancher/engine/docker-runc", "/usr/bin/docker-runc"}, {"/usr/share/ros/os-release", "/usr/lib/os-release"}, {"/usr/share/ros/os-release", "/etc/os-release"}, } { syscall.Unlink(link.newname) if err := os.Symlink(link.oldname, link.newname); err != nil { log.Error(err) } } // font backslashes need to be escaped for when issue is output! (but not the others..) if err := ioutil.WriteFile("/etc/issue", []byte(config.Banner), 0644); err != nil { log.Error(err) } // write out a profile.d file for the proxy settings. // maybe write these on the host and bindmount into everywhere? proxyLines := []string{} for _, k := range []string{"http_proxy", "HTTP_PROXY", "https_proxy", "HTTPS_PROXY", "no_proxy", "NO_PROXY"} { if v, ok := cfg.Rancher.Environment[k]; ok { proxyLines = append(proxyLines, fmt.Sprintf("export %s=%s", k, v)) } } if len(proxyLines) > 0 { proxyString := strings.Join(proxyLines, "\n") proxyString = fmt.Sprintf("#!/bin/sh\n%s\n", proxyString) if err := ioutil.WriteFile("/etc/profile.d/proxy.sh", []byte(proxyString), 0755); err != nil { log.Error(err) } } cmd = exec.Command("bash", "-c", `echo $(/sbin/ifconfig | grep -B1 "inet addr" |awk '{ if ( $1 == "inet" ) { print $2 } else if ( $2 == "Link" ) { printf "%s:" ,$1 } }' |awk -F: '{ print $1 ": " $3}') >> /etc/issue`) if err := cmd.Run(); err != nil { log.Error(err) } cloudinitexecute.ApplyConsole(cfg) if err := util.RunScript(config.CloudConfigScriptFile); err != nil { log.Error(err) } if err := util.RunScript(startScript); err != nil { log.Error(err) } if err := ioutil.WriteFile(consoleDone, []byte(CurrentConsole()), 0644); err != nil { log.Error(err) } if err := util.RunScript("/etc/rc.local"); err != nil { log.Error(err) } os.Setenv("TERM", "linux") respawnBinPath, err := exec.LookPath("respawn") if err != nil { return err } return syscall.Exec(respawnBinPath, []string{"respawn", "-f", "/etc/respawn.conf"}, os.Environ()) } func generateRespawnConf(cmdline, user string, sshd, recovery bool) string { var respawnConf bytes.Buffer autologinBin := "/usr/bin/autologin" if recovery { autologinBin = "/usr/bin/recovery" } for i := 1; i < 7; i++ { tty := fmt.Sprintf("tty%d", i) respawnConf.WriteString(gettyCmd) if strings.Contains(cmdline, fmt.Sprintf("rancher.autologin=%s", tty)) { respawnConf.WriteString(fmt.Sprintf(" -n -l %s -o %s:tty%d", autologinBin, user, i)) } respawnConf.WriteString(fmt.Sprintf(" --noclear %s linux\n", tty)) } for _, tty := range []string{"ttyS0", "ttyS1", "ttyS2", "ttyS3", "ttyAMA0"} { if !strings.Contains(cmdline, fmt.Sprintf("console=%s", tty)) { continue } respawnConf.WriteString(gettyCmd) if strings.Contains(cmdline, fmt.Sprintf("rancher.autologin=%s", tty)) { respawnConf.WriteString(fmt.Sprintf(" -n -l %s -o %s:%s", autologinBin, user, tty)) } respawnConf.WriteString(fmt.Sprintf(" %s\n", tty)) } if sshd { respawnConf.WriteString("/usr/sbin/sshd -D") } return respawnConf.String() } func writeRespawn(user string, sshd, recovery bool) error { cmdline, err := ioutil.ReadFile("/proc/cmdline") if err != nil { return err } respawn := generateRespawnConf(string(cmdline), user, sshd, recovery) files, err := ioutil.ReadDir("/etc/respawn.conf.d") if err == nil { for _, f := range files { p := path.Join("/etc/respawn.conf.d", f.Name()) content, err := ioutil.ReadFile(p) if err != nil { log.Errorf("Failed to read %s: %v", p, err) continue } respawn += fmt.Sprintf("\n%s", string(content)) } } else if !os.IsNotExist(err) { log.Error(err) } return ioutil.WriteFile("/etc/respawn.conf", []byte(respawn), 0644) } func modifySshdConfig() error { sshdConfig, err := ioutil.ReadFile("/etc/ssh/sshd_config") if err != nil { return err } sshdConfigString := string(sshdConfig) for _, item := range []string{ "UseDNS no", "PermitRootLogin no", "ServerKeyBits 2048", "AllowGroups docker", } { match, err := regexp.Match("^"+item, sshdConfig) if err != nil { return err } if !match { sshdConfigString += fmt.Sprintf("%s\n", item) } } return ioutil.WriteFile("/etc/ssh/sshd_config", []byte(sshdConfigString), 0644) } func setupSSH(cfg *config.CloudConfig) error { for _, keyType := range []string{"rsa", "dsa", "ecdsa", "ed25519"} { outputFile := fmt.Sprintf("/etc/ssh/ssh_host_%s_key", keyType) outputFilePub := fmt.Sprintf("/etc/ssh/ssh_host_%s_key.pub", keyType) if _, err := os.Stat(outputFile); err == nil { continue } saved, savedExists := cfg.Rancher.SSH.Keys[keyType] pub, pubExists := cfg.Rancher.SSH.Keys[keyType+"-pub"] if savedExists && pubExists { // TODO check permissions if err := util.WriteFileAtomic(outputFile, []byte(saved), 0600); err != nil { return err } if err := util.WriteFileAtomic(outputFilePub, []byte(pub), 0600); err != nil { return err } continue } cmd := exec.Command("bash", "-c", fmt.Sprintf("ssh-keygen -f %s -N '' -t %s", outputFile, keyType)) if err := cmd.Run(); err != nil { return err } savedBytes, err := ioutil.ReadFile(outputFile) if err != nil { return err } pubBytes, err := ioutil.ReadFile(outputFilePub) if err != nil { return err } config.Set(fmt.Sprintf("rancher.ssh.keys.%s", keyType), string(savedBytes)) config.Set(fmt.Sprintf("rancher.ssh.keys.%s-pub", keyType), string(pubBytes)) } return os.MkdirAll("/var/run/sshd", 0644) }