1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120
|
#!/bin/sh -e
# Setup for using apt to install packages in /target.
mountpoints () {
cut -d" " -f2 /proc/mounts | sort | uniq
}
chroot_setup () {
# Bail out if directories we need are not there
if [ ! -d /target/sbin ] || [ ! -d /target/usr/sbin ] || \
[ ! -d /target/proc ]; then
return 1
fi
case $(uname -r | cut -d . -f 1,2) in
2.6)
if [ ! -d /target/sys ] ; then
return 1
fi
;;
esac
if [ -e /var/run/chroot-setup.lock ]; then
cat >&2 <<EOF
apt-install or in-target is already running, so you cannot run either of
them again until the other instance finishes. You may be able to use
'chroot /target ...' instead.
EOF
return 1
fi
touch /var/run/chroot-setup.lock
# Create a policy-rc.d to stop maintainer scripts using invoke-rc.d
# from running init scripts. In case of maintainer scripts that don't
# use invoke-rc.d, add a dummy start-stop-daemon.
cat > /target/usr/sbin/policy-rc.d <<EOF
#!/bin/sh
exit 101
EOF
chmod a+rx /target/usr/sbin/policy-rc.d
if [ -e /target/sbin/start-stop-daemon ]; then
mv /target/sbin/start-stop-daemon /target/sbin/start-stop-daemon.REAL
fi
cat > /target/sbin/start-stop-daemon <<EOF
#!/bin/sh
echo 1>&2
echo 'Warning: Fake start-stop-daemon called, doing nothing.' 1>&2
exit 0
EOF
chmod a+rx /target/sbin/start-stop-daemon
# Record the current mounts
mountpoints > /tmp/mount.pre
# Some packages (eg. the kernel-image package) require a mounted
# /proc/. Only mount it if not mounted already
if [ ! -f /target/proc/cmdline ] ; then
mount -t proc proc /target/proc
fi
# For installing >=2.6.14 kernels we also need sysfs mounted
# Only mount it if not mounted already and we're running 2.6
case $(uname -r | cut -d . -f 1,2) in
2.6)
if [ ! -d /target/sys/devices ] ; then
mount -t sysfs none /target/sys
fi
;;
esac
# Try to enable proxy when using HTTP.
# What about using ftp_proxy for FTP sources?
RET=$(debconf-get mirror/protocol || true)
if [ "$RET" = "http" ]; then
RET=$(debconf-get mirror/http/proxy || true)
if [ "$RET" ] ; then
http_proxy="$RET"
export http_proxy
fi
fi
# Pass debconf priority through.
DEBIAN_PRIORITY=$(debconf-get debconf/priority || true)
export DEBIAN_PRIORITY
LANG=$(debconf-get debian-installer/locale || true)
export LANG
export PERL_BADLANG=0
# Unset variables that would make scripts in the target think
# that debconf is already running there.
unset DEBIAN_HAS_FRONTEND
unset DEBIAN_FRONTEND
unset DEBCONF_FRONTEND
unset DEBCONF_REDIR
# Avoid debconf mailing notes.
DEBCONF_ADMIN_EMAIL=""
export DEBCONF_ADMIN_EMAIL
return 0
}
chroot_cleanup () {
rm -f /target/usr/sbin/policy-rc.d
mv /target/sbin/start-stop-daemon.REAL /target/sbin/start-stop-daemon
# Undo the mounts done by the packages during installation.
# Reverse sorting to umount the deepest mount points first.
# Items with count of 1 are new.
for dir in $( (cat /tmp/mount.pre /tmp/mount.pre; mountpoints ) | \
sort -r | uniq -c | grep "^[[:space:]]*1[[:space:]]" | \
sed "s/^[[:space:]]*[0-9][[:space:]]//"); do
if ! umount $dir ; then
logger -t $0 "warning: Unable to umount '$dir'"
fi
done
rm -f /tmp/mount.pre
rm -f /var/run/chroot-setup.lock
}
|