That's the way how DragonFlyBSD devs solved the problem
https://gitweb.dragonflybsd.org/dragonfly.git/commitdiff/451640b7cf6bcf7826b901ac9a51647442adb96b
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Advanced Search
Feb 20 2024
Feb 9 2024
Add SPDX BSD-2-Clause to safe_eval.sh
Feb 7 2024
Use local.rc.subr rather than rc.subr.local
Validate load_rc_config_reader
Feb 6 2024
Implement some feedback
Feb 3 2024
Update doc in debug.sh
Feb 2 2024
rc.subr add comment explaining the no-op Debug{On,Off} and safe_dot
at the end - in case the real ones could not be found.
Tweak debug.sh.8, use .Fn when refering to functions called.
Feb 1 2024
Man page tweaks
Add man page for debug.sh
Jan 31 2024
Further man page tweaks
Make a start on man pages
Fix some style issues in rc.subr
Will have a go at the style issues.
The comments for rc.subr also apply to the new files.
What about a man page update how to turn on the debug feature? To my current understanding DEBUG_SH can be set interactively in the loader, and administratively in loader.conf... maybe also in rc.conf? So more than one man page to touch at least with a cross-ref.
Jan 30 2024
Check for -f as well as -s
This is overcome by D43671
Note: If the format of rc_log is deemed undesirable we could move it (and rc_trace) to rc.subr.local and just put a place holder in rc.subr
I know a few folk are interested in using mac_veriexec, but we could push the guts of vdot etc into rc.subr.local (I've moved it to the end of the file) and just put a place holder here like vdot() { dot "$@"; }. It is the callouts in run_rc_* etc which are most important.
Jan 16 2024
Resigning from this; I tried to provide feedback over IRC, but that was seemingly not well-received (and questions unanswered) and I'm not interested in reviewing this as-is. I'd much prefer splitting it into two scripts, one with, e.g., verbs, that manages wireguard interfaces and then the rc script that simply drives that in an obvious way. The last objection I heard was that there's too much state to pass around, but it's not at all clear why unless this is trying to mix way too much rc.conf configuration in with wg config.
Jan 15 2024
Jan 11 2024
OK for the man page change. Make sure to bump the .Dd when you commit it for this content change.
Thanks for working on this, it's appreciated!
- make some scripts compatible with svcj (convert parts of the precmd into another way of settings variables), precmd is not run inside the same shell/jail = make it work with svcj
- add some support for nfs in svcj, not yet finished (precmd is not comaptible)
- exclude some scripts from svcj due to an incompatible precmd (not run in same shell/jail)
Make jls quiet.
Dec 29 2023
In D41318#980524, @pauamma_gundo.com wrote:No manual page to review, yet manpages is a group reviewer. Did a file get accidentally left out?
Dec 12 2023
No manual page to review, yet manpages is a group reviewer. Did a file get accidentally left out?
Dec 2 2023
In D36309#977969, @eugen_grosbein.net wrote:In D36309#935684, @jlduran_gmail.com wrote:Is there a reason why this change was not MFCd? Thank you!
Forgot about it. I've just merged it downto stable/12.
In D36309#935684, @jlduran_gmail.com wrote:Is there a reason why this change was not MFCd? Thank you!
Nov 28 2023
Nov 26 2023
This script looks very promising, but it won't be easy to fulfill all committers' needs, but perhaps it would be easier to make it available as a port, for example, net-mgmt/ng_bpf_firewall ?
Nov 24 2023
Only rc.d/opensm is missing.
Nov 21 2023
Maybe to add to that: the main motivation was a user-side precmd type hook support since the precmd is hard or impossible to overwrite (being used in the rc scripts defined by the ports) and name_setup=path/to/file seemed to be the easiest solution.
Set up script variable:
can you show me an example of this in action?
how are you using it in your ports?
@oshogbo I've updated this again fixing a remaining issue with restart_precmd -- if you can find the time to review I'd appreciate it.
update to latest
Nov 16 2023
Add support for nfs. Sort the options.
Add config for some more services.
Nov 13 2023
Please send me the git-formatted patch, with the metadata filled in. Most important, please set the author field to appropriate name/email.
Incorporated feedback.
Nov 12 2023
Nov 10 2023
Change what was noticed in comments. Add a feature to enable the execution of extra commands inside the service jail.
Oct 16 2023
This is my first review here, I hope to not be stepping on any toes. If I have, please correct me so I might do better next time. Overall your wireguard startup mechanism looks good and my suggestions are strictly cosmetic in nature. I would not be at all disappointed if this patch were committed unaltered.
Oct 14 2023
Follow-up to discussion in IRC,
This has landed in 5ac2a874d070, closing it.
Oct 5 2023
Two fixes for the man page.
Aug 23 2023
The interface name restriction function is a judgment call restricting users from creating problematic (for shell scripts) interface names. Applying the same restrictions to existing services like netif and routing could break (partly) working configurations.
Aug 18 2023
first pass…
Aug 4 2023
Jul 19 2023
Is there a reason why this change was not MFCd? Thank you!
Jul 15 2023
Jun 15 2023
Jun 9 2023
Jun 6 2023
Jun 2 2023
Jun 1 2023
I don't know the technology for this change, but the wording is good now.
address @grahamperrin's review
May 30 2023
arc swallowed my previous commit
address @debdrup's review
I only spotted a minor nit.
Mar 26 2023
Mar 15 2023
So where is this review? It seems to have wound down a bit.
Mar 12 2023
Changed novnetjail to nojailvnet.
s/novnetjail/nojailvnet/
Mar 11 2023
Just use the KEYWORD novnetjail to indicate the
daemons can run in a vnet jail, as suggested by jamie@.