mirror of
https://github.com/kevingruesser/bootstrap-vz.git
synced 2025-08-24 15:36:27 +00:00

Documentation says about that, but it's not implemented like that. If the command to be executed is an array with just one string, it's likely the user passed the entire command inside the string. Plus, they benefit from shell expansion of wildcards like '*'.
892 B
892 B
Image script plugin
This plugin gives the possibility to the user to execute commands.
Plugin is defined in the manifest file, plugin section with:
"image_commands": {
"commands": [ [ "touch", "/var/www/index.html" ]],
}
The commands element is an array of commands. Each command is an array describing the executable and its arguments.
If you need shell expansion of wildcards, like *, just put the entire command as a single entry:
"image_commands": {
"commands": [ [ "rm -f /tmp/*" ]],
}
Command is executed in current context. It is possible to use variables to access the image or execute chroot commands in the image.
Available variables are: {root} : image mount point (to copy files for example or chroot commands)
Example:
[[ "touch", "{root}/var/www/hello" ],
[ "/usr/sbin/chroot", "{root}", "touch", "/var/www/hello"]]