#!/bin/bash -ex # vi: ts=4 noexpandtab # # Generate a generic Vagrant Box. # # Vagrant images are essentially nothing more than OVA's with extra-metadata # and some preinstalled packages. # # We can't use the OVA's for Vagrant since Vagrant uses SSH to modify the # instance. This build step creates a cloud-config ISO so that Cloud-Init # will configure the initial user, creates meta-data that tells Vagrant how # to interact with the cloud-init created users, and finally create the OVA. # # For this step, we make a deriviative of binary/boot/disk.ext4 and install # some packages in it, convert it to a vmdk, and then assemble the vagrant # box. case ${SUBPROJECT:-} in minimized) echo "Skipping minimized $0 build as images won't boot with linux-kvm" exit 0 ;; *) ;; esac cur_d=${PWD} my_d=$(dirname $(readlink -f ${0})) # Switch on $ARCH to determine which ID and description to use in the produced # OVF. We have fancy Ubuntu-specific IDs in the OVF specification, we might as # well use them. case $ARCH in amd64) ovf_id=94 ovf_os_type="ubuntu64Guest" ovf_desc_bits=64 ;; *) echo "Vagrant images are not supported for $ARCH yet." exit 0;; esac . config/functions # Lets be safe about this box_d=$(mktemp -d) seed_d=$(mktemp -d) mount_d=$(mktemp -d) create_derivative "disk" "vagrant" #sets ${derivative_img} mount_disk_image ${derivative_img} ${mount_d} cleanup_vagrant() { if [ -d "$mount_d" ]; then umount_disk_image "$mount_d" fi rm -rf ${box_d} ${seed_d} ${mount_d} ${derivative_img} } trap cleanup_vagrant EXIT ########################## ### Vagrant User Setup ### Create ed25519 ssh key ### the default insecure key is rsa, and that is disabled in Jammy forward ### https://github.com/hashicorp/vagrant/tree/main/keys ########################## ssh-keygen -t ed25519 -C "ubuntu_vagrant_insecure_key" -b 4096 \ -f ${box_d}/vagrant_insecure_key -N "" pub_key=$(cat ${box_d}/vagrant_insecure_key.pub) # Create and setup users inside the image. # Vagrant users expect a "vagrant" user with a "vagrant" username. # See https://www.vagrantup.com/docs/boxes/base.html # Note: We decided NOT to allow root login with a default password. chroot ${mount_d} adduser vagrant --disabled-password --gecos "" echo "vagrant:vagrant" | chroot ${mount_d} chpasswd # The vagrant user should have passwordless sudo. cat << EOF > ${mount_d}/etc/sudoers.d/vagrant vagrant ALL=(ALL) NOPASSWD:ALL EOF # Add an insecure vagrant pubkey to the vagrant user, as is expected by the # vagrant ecosystem (https://www.vagrantup.com/docs/boxes/base.html) chroot ${mount_d} chmod 0440 /etc/sudoers.d/vagrant chroot ${mount_d} mkdir -p /home/vagrant/.ssh cat << EOF > ${mount_d}/home/vagrant/.ssh/authorized_keys ${pub_key} EOF chroot ${mount_d} chown -R vagrant:vagrant /home/vagrant/.ssh chroot ${mount_d} chmod 700 /home/vagrant/.ssh umount_disk_image "$mount_d" rmdir "$mount_d" # Used to identify bits suite=$(chroot chroot lsb_release -c -s) version=$(chroot chroot lsb_release --release --short) distro=$(chroot chroot lsb_release --id --short | tr [:upper:] [:lower:]) # Get the VMDK in place prefix="${distro}-${suite}-${version}-cloudimg" vmdk_f="${box_d}/${prefix}.vmdk" create_vmdk ${derivative_img} ${vmdk_f} 40960 #################################### # Create the ConfigDrive # This is a cloud-init piece that instructs cloud-init to configure # a default user at first boot. cdrom_vmdk_f="${box_d}/${prefix}-configdrive.vmdk" # Create the user-data. This is totally insecure, but so is Vagrant. To # mitigate this insecurity, the vagrant instance is not accessible # except via local host. cat > ${seed_d}/user-data < ${seed_d}/meta-data < ${box_d}/Vagrantfile < ${box_d}/metadata.json < "${manifest}" <