-
-
Save trentster/cbf8652c08bea8d39aa5 to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[root@smartosn2 ~]# vmadm get adb341dd-2ed7-4f31-b5ae-9e873324b820 | |
{ | |
"zonename": "adb341dd-2ed7-4f31-b5ae-9e873324b820", | |
"autoboot": true, | |
"brand": "joyent", | |
"limit_priv": "default", | |
"v": 1, | |
"create_timestamp": "2014-09-06T15:55:03.690Z", | |
"image_uuid": "c1200fbc-35d2-11e4-a5cc-f73f4cb16f6e", | |
"cpu_shares": 64, | |
"zfs_io_priority": 64, | |
"max_lwps": 2000, | |
"max_physical_memory": 2048, | |
"max_locked_memory": 2048, | |
"max_swap": 4096, | |
"cpu_cap": 100, | |
"billing_id": "00000000-0000-0000-0000-000000000000", | |
"tmpfs": 2048, | |
"hostname": "fusion-mibe-pgsql-pass", | |
"dns_domain": "local", | |
"resolvers": [ | |
"10.1.1.1", | |
"8.8.8.8" | |
], | |
"alias": "fusion-mibe-pgsql-pass", | |
"nics": [ | |
{ | |
"interface": "net0", | |
"mac": "62:c3:2e:c4:cd:d3", | |
"nic_tag": "admin", | |
"gateway": "10.1.1.1", | |
"ip": "10.1.1.222", | |
"netmask": "255.255.255.0", | |
"primary": true | |
} | |
], | |
"uuid": "adb341dd-2ed7-4f31-b5ae-9e873324b820", | |
"zone_state": "running", | |
"zonepath": "/zones/adb341dd-2ed7-4f31-b5ae-9e873324b820", | |
"zoneid": 24, | |
"last_modified": "2014-09-06T15:55:37.000Z", | |
"firewall_enabled": false, | |
"server_uuid": "002590ae-b1a0-0607-0025-90aeb1a00e0f", | |
"platform_buildstamp": "20140515T211957Z", | |
"state": "running", | |
"customer_metadata": { | |
"pgsql_pw": "secretpass", | |
"root_authorized_keys": "ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAlK0ev0x6F9Ss2bD+L/5GNGU20+Xbdq7PeSMrW0lvRFsk0EdMHUQSfr2Op2DW2lLzIWPavixC6PCF6Hq0Xwg5jtTyVSgXbJ83MkRZe0tUFBfjR7HX9Ig5PIJyU8YYBSi+CSLK9L6kzC7vATeKCo4HnE7Kx/TsMq9Yymp5E6kfJo1LP8tPoPfBNCjFuGNRGPRFKRH+1gjuNBiCA3MI+mxt0Swzlkn3Ac9SlI4dXGVUmVgNMZ3v3zQnlD0mLQK7WpVCJDWhLsQNRglov9aI9RkWU3MTh9a38IiLM+m8KWN+vRNR9RKtuboPpCKYU//HsKtj5x5B/hmd1TT2S7H4kugR8Q== marktrent@onyxit\n" | |
}, | |
"internal_metadata": { | |
"package": "2d39164e-51cc-416c-95c9-81c10da81dbd" | |
}, | |
"routes": {}, | |
"tags": {}, | |
"quota": 100, | |
"zfs_root_recsize": 131072, | |
"zfs_filesystem": "zones/adb341dd-2ed7-4f31-b5ae-9e873324b820", | |
"zpool": "zones", | |
"snapshots": [] | |
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[ Sep 6 15:55:11 Enabled. ] | |
[ Sep 6 15:55:12 Executing start method ("/opt/local/lib/svc/method/zoneinit"). ] | |
+ . /lib/svc/share/smf_include.sh | |
++ SMF_EXIT_OK=0 | |
++ SMF_EXIT_NODAEMON=94 | |
++ SMF_EXIT_ERR_FATAL=95 | |
++ SMF_EXIT_ERR_CONFIG=96 | |
++ SMF_EXIT_MON_DEGRADE=97 | |
++ SMF_EXIT_MON_OFFLINE=98 | |
++ SMF_EXIT_ERR_NOSMF=99 | |
++ SMF_EXIT_ERR_PERM=100 | |
+ smf_is_globalzone | |
+ '[' adb341dd-2ed7-4f31-b5ae-9e873324b820 = global ']' | |
+ return 1 | |
+ ZONEINIT_INCLUDES=/var/zoneinit/includes | |
+ ZONECONFIG=/root/zoneconfig | |
+ '[' -e /root/zoneconfig ']' | |
+ [[ ! start == \s\t\a\r\t ]] | |
+ [[ ! -e /var/svc/provisioning ]] | |
++ svcprop -p application/done zoneinit | |
+ [[ false =~ true ]] | |
+ trap 'exit_handler "received exit status" $?' EXIT | |
++ date +%s | |
+ START_TIME=1410018912 | |
+ log '(start)' | |
++ basename zoneinit | |
+ local WHERE=zoneinit | |
+ echo 'zoneinit: (start)' | |
zoneinit: (start) | |
+ for INC in '${ZONEINIT_INCLUDES}/*.sh' | |
+ log '(start)' | |
++ basename /var/zoneinit/includes/00-mdata.sh | |
+ local WHERE=00-mdata.sh | |
+ echo '00-mdata.sh: (start)' | |
00-mdata.sh: (start) | |
+ source /var/zoneinit/includes/00-mdata.sh | |
++ '[' -x /usr/sbin/mdata-get ']' | |
++ HAS_METADATA=yes | |
++ log 'waiting for metadata to show up' | |
+++ basename /var/zoneinit/includes/00-mdata.sh | |
++ local WHERE=00-mdata.sh | |
++ echo '00-mdata.sh: waiting for metadata to show up' | |
00-mdata.sh: waiting for metadata to show up | |
++ '[' -e /.zonecontrol/metadata.sock ']' | |
++ '[' -e /.zonecontrol/metadata.sock ']' | |
+ for INC in '${ZONEINIT_INCLUDES}/*.sh' | |
+ log '(start)' | |
++ basename /var/zoneinit/includes/01-reboot-file.sh | |
+ local WHERE=01-reboot-file.sh | |
+ echo '01-reboot-file.sh: (start)' | |
01-reboot-file.sh: (start) | |
+ source /var/zoneinit/includes/01-reboot-file.sh | |
++ touch /tmp/.FIRST_REBOOT_NOT_YET_COMPLETE | |
+ for INC in '${ZONEINIT_INCLUDES}/*.sh' | |
+ log '(start)' | |
++ basename /var/zoneinit/includes/02-config.sh | |
+ local WHERE=02-config.sh | |
+ echo '02-config.sh: (start)' | |
02-config.sh: (start) | |
+ source /var/zoneinit/includes/02-config.sh | |
++ log 'determine machine parameters and configuration' | |
+++ basename /var/zoneinit/includes/02-config.sh | |
++ local WHERE=02-config.sh | |
++ echo '02-config.sh: determine machine parameters and configuration' | |
02-config.sh: determine machine parameters and configuration | |
++ log 'checking for duplicate IPs' | |
+++ basename /var/zoneinit/includes/02-config.sh | |
++ local WHERE=02-config.sh | |
++ echo '02-config.sh: checking for duplicate IPs' | |
02-config.sh: checking for duplicate IPs | |
++ ifconfig -a | |
++ grep DUP | |
++ '[' yes ']' | |
++ mdata sdc:uuid | |
++ set -o pipefail | |
+++ mdata-get sdc:uuid | |
++ output=adb341dd-2ed7-4f31-b5ae-9e873324b820 | |
++ echo -e adb341dd-2ed7-4f31-b5ae-9e873324b820 | |
++ '[' '!' ']' | |
+++ mdata sdc:zonename | |
+++ set -o pipefail | |
++++ mdata-get sdc:zonename | |
+++ output=adb341dd-2ed7-4f31-b5ae-9e873324b820 | |
+++ echo -e adb341dd-2ed7-4f31-b5ae-9e873324b820 | |
++ ZONENAME=adb341dd-2ed7-4f31-b5ae-9e873324b820 | |
+++ mdata sdc:hostname | |
+++ set -o pipefail | |
++++ mdata-get sdc:hostname | |
+++ output=fusion-mibe-pgsql-pass | |
+++ echo -e fusion-mibe-pgsql-pass | |
++ HOSTNAME=fusion-mibe-pgsql-pass | |
+++ mdata sdc:dns_domain | |
+++ set -o pipefail | |
++++ mdata-get sdc:dns_domain | |
+++ output=local | |
+++ echo -e local | |
++ DOMAINNAME=local | |
++ unset i | |
++ : -1 | |
++ (( i++ )) | |
+++ mdata sdc:resolvers.0 | |
+++ set -o pipefail | |
++++ mdata-get sdc:resolvers.0 | |
+++ output=10.1.1.1 | |
+++ echo -e 10.1.1.1 | |
++ SERVER=10.1.1.1 | |
++ '[' 10.1.1.1 ']' | |
++ RESOLVERS=(${RESOLVERS[@]} ${SERVER}) | |
++ : 0 | |
++ (( i++ )) | |
+++ mdata sdc:resolvers.1 | |
+++ set -o pipefail | |
++++ mdata-get sdc:resolvers.1 | |
+++ output=8.8.8.8 | |
+++ echo -e 8.8.8.8 | |
++ SERVER=8.8.8.8 | |
++ '[' 8.8.8.8 ']' | |
++ RESOLVERS=(${RESOLVERS[@]} ${SERVER}) | |
++ : 1 | |
++ (( i++ )) | |
+++ mdata sdc:resolvers.2 | |
+++ set -o pipefail | |
++++ mdata-get sdc:resolvers.2 | |
+++ output= | |
+++ return 1 | |
++ SERVER= | |
++ '[' ']' | |
+++ bc | |
++++ mdata sdc:max_physical_memory | |
++++ set -o pipefail | |
+++++ mdata-get sdc:max_physical_memory | |
++++ output=2048 | |
++++ echo -e 2048 | |
+++ echo '2048*1024^2' | |
++ RAM_IN_BYTES=2147483648 | |
+++ bc | |
++++ mdata sdc:max_swap | |
++++ set -o pipefail | |
+++++ mdata-get sdc:max_swap | |
++++ output=4096 | |
++++ echo -e 4096 | |
+++ echo '4096*1024^2' | |
++ SWAP_IN_BYTES=4294967296 | |
+++ mdata sdc:tmpfs | |
+++ set -o pipefail | |
++++ mdata-get sdc:tmpfs | |
+++ output=2048 | |
+++ echo -e 2048 | |
++ TMPFS=2048m | |
++ unset i | |
++ : -1 | |
++ (( i++ )) | |
+++ mdata sdc:nics.0.interface | |
+++ set -o pipefail | |
++++ mdata-get sdc:nics.0.interface | |
+++ output=net0 | |
+++ echo -e net0 | |
++ IFACE=net0 | |
++ '[' net0 ']' | |
++ NET_INTERFACES=(${NET_INTERFACES[@]} ${IFACE}) | |
+++ mdata sdc:nics.0.ip | |
+++ set -o pipefail | |
++++ mdata-get sdc:nics.0.ip | |
+++ output=10.1.1.222 | |
+++ echo -e 10.1.1.222 | |
++ THIS_IP=10.1.1.222 | |
++ [[ 10.1.1.222. =~ ^(([01]?[0-9]{1,2}|2[0-4][0-9]|25[0-5])\.){4}$ ]] | |
++ eval net0_IP=10.1.1.222 | |
+++ net0_IP=10.1.1.222 | |
++ case "$(mdata sdc:nics.${i}.nic_tag)" in | |
+++ mdata sdc:nics.0.nic_tag | |
+++ set -o pipefail | |
++++ mdata-get sdc:nics.0.nic_tag | |
+++ output=admin | |
+++ echo -e admin | |
++ PRIVATE_IPS=(${PRIVATE_IPS[@]} ${THIS_IP}) | |
++ : 0 | |
++ (( i++ )) | |
+++ mdata sdc:nics.1.interface | |
+++ set -o pipefail | |
++++ mdata-get sdc:nics.1.interface | |
+++ output= | |
+++ return 1 | |
++ IFACE= | |
++ '[' ']' | |
++ PUBLIC_IP= | |
++ PRIVATE_IP=10.1.1.222 | |
+++ ifconfig lo0 | |
+++ awk '{if ($1=="inet") print $2}' | |
++ LOCAL_IP=127.0.0.1 | |
++ '[' 2 -gt 0 ']' | |
++ : admin root | |
++ USERS=(${USERS}) | |
++ for USER in '${USERS[@]}' | |
++ PASS_VAR_LOWER=admin_pw | |
+++ echo admin_pw | |
+++ tr '[a-z]' '[A-Z]' | |
++ PASS_VAR_UPPER=ADMIN_PW | |
++ '[' yes ']' | |
+++ mdata admin_pw | |
+++ set -o pipefail | |
++++ mdata-get admin_pw | |
+++ output= | |
+++ return 1 | |
++ USER_PW= | |
++ unset USER_PW | |
++ '[' -n '' ']' | |
++ unset ADMIN_PW | |
++ for USER in '${USERS[@]}' | |
++ PASS_VAR_LOWER=root_pw | |
+++ echo root_pw | |
+++ tr '[a-z]' '[A-Z]' | |
++ PASS_VAR_UPPER=ROOT_PW | |
++ '[' yes ']' | |
+++ mdata root_pw | |
+++ set -o pipefail | |
++++ mdata-get root_pw | |
+++ output= | |
+++ return 1 | |
++ USER_PW= | |
++ unset USER_PW | |
++ '[' -n '' ']' | |
++ unset ROOT_PW | |
+ for INC in '${ZONEINIT_INCLUDES}/*.sh' | |
+ log '(start)' | |
++ basename /var/zoneinit/includes/04-mdata.sh | |
+ local WHERE=04-mdata.sh | |
+ echo '04-mdata.sh: (start)' | |
04-mdata.sh: (start) | |
+ source /var/zoneinit/includes/04-mdata.sh | |
++ '[' yes ']' | |
++ log 'enabling metadata agent' | |
+++ basename /var/zoneinit/includes/04-mdata.sh | |
++ local WHERE=04-mdata.sh | |
++ echo '04-mdata.sh: enabling metadata agent' | |
04-mdata.sh: enabling metadata agent | |
++ svcadm enable mdata:fetch | |
+ for INC in '${ZONEINIT_INCLUDES}/*.sh' | |
+ log '(start)' | |
++ basename /var/zoneinit/includes/11-files.sh | |
+ local WHERE=11-files.sh | |
+ echo '11-files.sh: (start)' | |
11-files.sh: (start) | |
+ source /var/zoneinit/includes/11-files.sh | |
++ log 'cleaning files' | |
+++ basename /var/zoneinit/includes/11-files.sh | |
++ local WHERE=11-files.sh | |
++ echo '11-files.sh: cleaning files' | |
11-files.sh: cleaning files | |
++ '[' -e /var/log/auth.log ']' | |
++ cp /dev/null /var/log/authlog | |
++ log 'substituting placeholders for real data in config files' | |
+++ basename /var/zoneinit/includes/11-files.sh | |
++ local WHERE=11-files.sh | |
++ echo '11-files.sh: substituting placeholders for real data in config files' | |
11-files.sh: substituting placeholders for real data in config files | |
++ substitute_files=($(find /etc /opt/local/etc -type f | sort | xargs /usr/bin/egrep -l '@(PUBLIC_IP|PRIVATE_IP|LOCAL_IP|DOMAINNAME|HOSTNAME|ZONENAME)@' || true)) | |
+++ find /etc /opt/local/etc -type f | |
+++ sort | |
+++ xargs /usr/bin/egrep -l '@(PUBLIC_IP|PRIVATE_IP|LOCAL_IP|DOMAINNAME|HOSTNAME|ZONENAME)@' | |
+++ true | |
++ sed -e '/tmpfs/s/-$/size=2048m/' /etc/vfstab | |
++ mv /etc/vfstab.tmp /etc/vfstab | |
++ rm -f /etc/vfstab.tmp | |
+ for INC in '${ZONEINIT_INCLUDES}/*.sh' | |
+ log '(start)' | |
++ basename /var/zoneinit/includes/12-network.sh | |
+ local WHERE=12-network.sh | |
+ echo '12-network.sh: (start)' | |
12-network.sh: (start) | |
+ source /var/zoneinit/includes/12-network.sh | |
++ log 'setting hostname, IPs and resolvers' | |
+++ basename /var/zoneinit/includes/12-network.sh | |
++ local WHERE=12-network.sh | |
++ echo '12-network.sh: setting hostname, IPs and resolvers' | |
12-network.sh: setting hostname, IPs and resolvers | |
++ echo fusion-mibe-pgsql-pass | |
++ /bin/hostname fusion-mibe-pgsql-pass | |
++ /bin/sed /nameserver/d /etc/resolv.conf | |
++ for HOST in '${RESOLVERS[@]}' | |
++ echo 'nameserver 10.1.1.1' | |
++ for HOST in '${RESOLVERS[@]}' | |
++ echo 'nameserver 8.8.8.8' | |
++ mv /etc/resolv.conf.tmp /etc/resolv.conf | |
++ sed '/^127\.0\.0\.1/s/$/ fusion-mibe-pgsql-pass/' /etc/inet/hosts | |
++ mv /etc/inet/hosts.tmp /etc/inet/hosts | |
+ for INC in '${ZONEINIT_INCLUDES}/*.sh' | |
+ log '(start)' | |
++ basename /var/zoneinit/includes/31-postgresql.sh | |
+ local WHERE=31-postgresql.sh | |
+ echo '31-postgresql.sh: (start)' | |
31-postgresql.sh: (start) | |
+ source /var/zoneinit/includes/31-postgresql.sh | |
++ log 'getting pgsql_pw' | |
+++ basename /var/zoneinit/includes/31-postgresql.sh | |
++ local WHERE=31-postgresql.sh | |
++ echo '31-postgresql.sh: getting pgsql_pw' | |
31-postgresql.sh: getting pgsql_pw | |
+++ mdata-get pgsql_pw | |
++ PGSQL_PW= | |
++ PGSQL_PW=postgres | |
++ echo postgres | |
++ [[ -d /var/pgsql/data ]] | |
++ rm -rf /var/pgsql/data | |
++ log 'initializing PostgreSQL' | |
+++ basename /var/zoneinit/includes/31-postgresql.sh | |
++ local WHERE=31-postgresql.sh | |
++ echo '31-postgresql.sh: initializing PostgreSQL' | |
31-postgresql.sh: initializing PostgreSQL | |
++ su - postgres -c '/opt/local/bin/initdb --pgdata=/var/pgsql/data --encoding=UTF8 --locale=en_US.UTF-8 --auth=password --pwfile=/tmp/pgpasswd' | |
++ rm /tmp/pgpasswd | |
++ log 'starting PostgreSQL' | |
+++ basename /var/zoneinit/includes/31-postgresql.sh | |
++ local WHERE=31-postgresql.sh | |
++ echo '31-postgresql.sh: starting PostgreSQL' | |
31-postgresql.sh: starting PostgreSQL | |
++ svcadm enable -s postgresql | |
+ for INC in '${ZONEINIT_INCLUDES}/*.sh' | |
+ log '(start)' | |
++ basename /var/zoneinit/includes/32-fusionpbx.sh | |
+ local WHERE=32-fusionpbx.sh | |
+ echo '32-fusionpbx.sh: (start)' | |
32-fusionpbx.sh: (start) | |
+ source /var/zoneinit/includes/32-fusionpbx.sh | |
++ log 'generating ssl certs' | |
+++ basename /var/zoneinit/includes/32-fusionpbx.sh | |
++ local WHERE=32-fusionpbx.sh | |
++ echo '32-fusionpbx.sh: generating ssl certs' | |
32-fusionpbx.sh: generating ssl certs | |
++ /opt/local/etc/nginx/sslgen.sh | |
Creating certificates | |
Generating RSA private key, 2048 bit long modulus | |
.............+++ | |
......+++ | |
unable to write 'random state' | |
e is 65537 (0x10001) | |
writing RSA key | |
Signature ok | |
subject=/C=AU/ST=Victoria/O=FusionPBX/L=Melbourne/CN=fusion/OU=Infrastructure/emailAddress=domains@fusionpbx.com | |
Getting Private key | |
unable to write 'random state' | |
++ log 'enabling http services' | |
+++ basename /var/zoneinit/includes/32-fusionpbx.sh | |
++ local WHERE=32-fusionpbx.sh | |
++ echo '32-fusionpbx.sh: enabling http services' | |
32-fusionpbx.sh: enabling http services | |
++ svcadm enable nginx | |
++ svcadm enable php-fpm | |
++ svcadm enable memcached | |
++ log 'enabling freeswitch' | |
+++ basename /var/zoneinit/includes/32-fusionpbx.sh | |
++ local WHERE=32-fusionpbx.sh | |
++ echo '32-fusionpbx.sh: enabling freeswitch' | |
32-fusionpbx.sh: enabling freeswitch | |
++ svcadm enable freeswitch | |
++ log 'determine the webui address for the motd' | |
+++ basename /var/zoneinit/includes/32-fusionpbx.sh | |
++ local WHERE=32-fusionpbx.sh | |
++ echo '32-fusionpbx.sh: determine the webui address for the motd' | |
32-fusionpbx.sh: determine the webui address for the motd | |
++ WEBUI_ADDRESS=10.1.1.222 | |
++ [[ ! -z '' ]] | |
++ gsed -i s/%WEBUI_ADDRESS%/10.1.1.222/ /etc/motd | |
+ for INC in '${ZONEINIT_INCLUDES}/*.sh' | |
+ log '(start)' | |
++ basename /var/zoneinit/includes/91-passwords.sh | |
+ local WHERE=91-passwords.sh | |
+ echo '91-passwords.sh: (start)' | |
91-passwords.sh: (start) | |
+ source /var/zoneinit/includes/91-passwords.sh | |
+++ type -p genbfpw | |
++ for _HASHTOOL in /usr/lib/cryptpass '$(type -p genbfpw)' | |
++ '[' -x /usr/lib/cryptpass ']' | |
++ HASHTOOL=/usr/lib/cryptpass | |
++ break | |
+++ type -p changepass | |
++ for _PASSTOOL in '$(type -p changepass)' | |
++ '[' -x /opt/local/sbin/changepass ']' | |
++ PASSTOOL=/opt/local/sbin/changepass | |
++ break | |
++ for USER in '${USERS[@]}' | |
++ log 'setting system password for user '\''admin'\''' | |
+++ basename /var/zoneinit/includes/91-passwords.sh | |
++ local WHERE=91-passwords.sh | |
++ echo '91-passwords.sh: setting system password for user '\''admin'\''' | |
91-passwords.sh: setting system password for user 'admin' | |
++ PASS_VAR_LOWER=admin_pw | |
+++ echo admin_pw | |
+++ tr '[a-z]' '[A-Z]' | |
++ PASS_VAR_UPPER=ADMIN_PW | |
++ USER_PW= | |
++ '[' '' ']' | |
++ passwd -N admin | |
++ for USER in '${USERS[@]}' | |
++ log 'setting system password for user '\''root'\''' | |
+++ basename /var/zoneinit/includes/91-passwords.sh | |
++ local WHERE=91-passwords.sh | |
++ echo '91-passwords.sh: setting system password for user '\''root'\''' | |
91-passwords.sh: setting system password for user 'root' | |
++ PASS_VAR_LOWER=root_pw | |
+++ echo root_pw | |
+++ tr '[a-z]' '[A-Z]' | |
++ PASS_VAR_UPPER=ROOT_PW | |
++ USER_PW= | |
++ '[' '' ']' | |
++ passwd -N root | |
+ for INC in '${ZONEINIT_INCLUDES}/*.sh' | |
+ log '(start)' | |
++ basename /var/zoneinit/includes/92-sshd.sh | |
+ local WHERE=92-sshd.sh | |
+ echo '92-sshd.sh: (start)' | |
92-sshd.sh: (start) | |
+ source /var/zoneinit/includes/92-sshd.sh | |
++ awk '/^HostKey/ {print $2}' /etc/ssh/sshd_config | |
++ grep /etc/ssh | |
++ '[' ']' | |
+ for INC in '${ZONEINIT_INCLUDES}/*.sh' | |
+ log '(start)' | |
++ basename /var/zoneinit/includes/999-cleanup.sh | |
+ local WHERE=999-cleanup.sh | |
+ echo '999-cleanup.sh: (start)' | |
999-cleanup.sh: (start) | |
+ source /var/zoneinit/includes/999-cleanup.sh | |
++ log 'cleaning up' | |
+++ basename /var/zoneinit/includes/999-cleanup.sh | |
++ local WHERE=999-cleanup.sh | |
++ echo '999-cleanup.sh: cleaning up' | |
999-cleanup.sh: cleaning up | |
++ svccfg -s zoneinit 'setprop application/done = true' | |
++ svcadm refresh zoneinit | |
++ rm -f /root/zoneconfig | |
++ log 'scheduling an immediate reboot' | |
+++ basename /var/zoneinit/includes/999-cleanup.sh | |
++ local WHERE=999-cleanup.sh | |
++ echo '999-cleanup.sh: scheduling an immediate reboot' | |
999-cleanup.sh: scheduling an immediate reboot | |
++ echo 'reboot >/dev/null' | |
++ at now | |
commands will be executed using /usr/bin/sh | |
job 1410018918.a at Sat Sep 6 15:55:18 2014 | |
+ unset INC | |
++ date +%s | |
+ END_TIME=1410018918 | |
+ RUN_TIME=6 | |
+ '[' 6 -gt 0 ']' | |
+ log 'total runtime 6 seconds' | |
++ basename zoneinit | |
+ local WHERE=zoneinit | |
+ echo 'zoneinit: total runtime 6 seconds' | |
zoneinit: total runtime 6 seconds | |
+ log '(finish)' | |
++ basename zoneinit | |
+ local WHERE=zoneinit | |
+ echo 'zoneinit: (finish)' | |
zoneinit: (finish) | |
+ exit 0 | |
+ exit_handler 'received exit status' 0 | |
++ basename zoneinit | |
+ local WHERE=zoneinit | |
+ local EXITCODE=0 | |
+ '[' 0 -gt 0 ']' | |
[ Sep 6 15:55:18 Method "start" exited with status 0. ] | |
[ Sep 6 15:55:18 Rereading configuration. ] | |
[ Sep 6 15:55:18 No 'refresh' method defined. Treating as :true. ] | |
[ Sep 6 15:55:35 Enabled. ] | |
[ Sep 6 15:55:37 Executing start method ("/opt/local/lib/svc/method/zoneinit"). ] | |
+ . /lib/svc/share/smf_include.sh | |
++ SMF_EXIT_OK=0 | |
++ SMF_EXIT_NODAEMON=94 | |
++ SMF_EXIT_ERR_FATAL=95 | |
++ SMF_EXIT_ERR_CONFIG=96 | |
++ SMF_EXIT_MON_DEGRADE=97 | |
++ SMF_EXIT_MON_OFFLINE=98 | |
++ SMF_EXIT_ERR_NOSMF=99 | |
++ SMF_EXIT_ERR_PERM=100 | |
+ smf_is_globalzone | |
+ '[' adb341dd-2ed7-4f31-b5ae-9e873324b820 = global ']' | |
+ return 1 | |
+ ZONEINIT_INCLUDES=/var/zoneinit/includes | |
+ ZONECONFIG=/root/zoneconfig | |
+ '[' -e /root/zoneconfig ']' | |
+ [[ ! start == \s\t\a\r\t ]] | |
+ [[ ! -e /var/svc/provisioning ]] | |
++ svcprop -p application/done zoneinit | |
+ [[ true =~ true ]] | |
+ exit 0 | |
[ Sep 6 15:55:37 Method "start" exited with status 0. ] |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[root@fusion-mibe-pgsql-pass ~]# | |
[root@fusion-mibe-pgsql-pass ~]# mdata-get root_authorized_keys | |
ssh-rsa AAAAB3NzaC1yc2EAAAABIwAAAQEAlK0ev0x6F9Ss2bD+L/9GQGU50+Xbdq7PeSMrW0lvRFsk0EdMHUQSfr2Op2DW2lLzIWPavixC6PCF6Hq0Xwg5jtTyVSgXbJ83MkRZe0tUFBfjR7HX9Ig5PIJyU8YYBSi+CSLK9L6kzC7vATeKCo4HnE7Kx/TsMq9Yymp5E6kfJo1LP8tPoPfBNCjFuGNRGPRFKRH+1gjuNBiCA3MI+mxt0Swzlkn3Ac9SlI4dXGVUmVgNMZ3v3zQnlD0mLQK7WpVCJDWhLsQNRglov9aI9RkWU3MTh9a38IiLM+m8KWN+vRNR9RKtuboPpCKYU//HsKtj5x5B/hmd1TT2S7H4kugR8Q== marktrent@onyxit | |
[root@fusion-mibe-pgsql-pass ~]# mdata-get pgsql_pw | |
No metadata for 'pgsql_pw' | |
[root@fusion-mibe-pgsql-pass ~]# |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment