docker_entrypoint.sh 12 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207
  1. #!/bin/bash
  2. # This Docker ENTRYPOINT script is called by `docker run archivebox ...` or `docker compose run archivebox ...`.
  3. # It takes a CMD as $* shell arguments and runs it following these setup steps:
  4. # - Set the archivebox user to use the correct PUID & PGID
  5. # 1. highest precedence is for valid PUID and PGID env vars passsed in explicitly
  6. # 2. fall back to DETECTED_PUID of files found within existing data dir
  7. # 3. fall back to DEFAULT_PUID if no data dir or its owned by root
  8. # - Create a new /data dir if necessary and set the correct ownership on it
  9. # - Create a new /browsers dir if necessary and set the correct ownership on it
  10. # - Check whether we're running inside QEMU emulation and show a warning if so.
  11. # - Check that enough free space is available on / and /data
  12. # - Drop down to archivebox user permisisons and execute passed CMD command.
  13. # Bash Environment Setup
  14. # http://redsymbol.net/articles/unofficial-bash-strict-mode/
  15. # https://www.gnu.org/software/bash/manual/html_node/The-Set-Builtin.html
  16. # set -o xtrace
  17. # set -o nounset
  18. set -o errexit
  19. set -o errtrace
  20. set -o pipefail
  21. # IFS=$'\n'
  22. # Load global invariants (set by Dockerfile during image build time, not intended to be customized by users at runtime)
  23. export DATA_DIR="${DATA_DIR:-/data}"
  24. export ARCHIVEBOX_USER="${ARCHIVEBOX_USER:-archivebox}"
  25. # Global default PUID and PGID if data dir is empty and no intended PUID+PGID is set manually by user
  26. export DEFAULT_PUID=911
  27. export DEFAULT_PGID=911
  28. # If user tires to set PUID and PGID to root values manually, catch and reject because root is not allowed
  29. if [[ "$PUID" == "0" ]]; then
  30. echo -e "\n[X] Error: Got PUID=$PUID and PGID=$PGID but ArchiveBox is not allowed to be run as root, please change or unset PUID & PGID and try again." > /dev/stderr
  31. echo -e " Hint: some NFS/SMB/FUSE/etc. filesystems force-remap/ignore all permissions," > /dev/stderr
  32. echo -e " leave PUID/PGID unset, disable root_squash, or use values the drive prefers (default is $DEFAULT_PUID:$DEFAULT_PGID)" > /dev/stderr
  33. echo -e " https://linux.die.net/man/8/mount.cifs#:~:text=does%20not%20provide%20unix%20ownership" > /dev/stderr
  34. exit 3
  35. fi
  36. # If data directory already exists, autodetect detect owner by looking at files within
  37. export DETECTED_PUID="$(stat -c '%u' "$DATA_DIR/logs/errors.log" 2>/dev/null || echo "$DEFAULT_PUID")"
  38. export DETECTED_PGID="$(stat -c '%g' "$DATA_DIR/logs/errors.log" 2>/dev/null || echo "$DEFAULT_PGID")"
  39. # If data directory exists but is owned by root, use defaults instead of root because root is not allowed
  40. [[ "$DETECTED_PUID" == "0" ]] && export DETECTED_PUID="$DEFAULT_PUID"
  41. # (GUID / DETECTED_GUID is allowed to be 0 though)
  42. # Set archivebox user and group ids to desired PUID/PGID
  43. usermod -o -u "${PUID:-$DETECTED_PUID}" "$ARCHIVEBOX_USER" > /dev/null 2>&1
  44. groupmod -o -g "${PGID:-$DETECTED_PGID}" "$ARCHIVEBOX_USER" > /dev/null 2>&1
  45. # re-set PUID and PGID to values reported by system instead of values we tried to set,
  46. # in case wonky filesystems or Docker setups try to play UID/GID remapping tricks on us
  47. export PUID="$(id -u archivebox)"
  48. export PGID="$(id -g archivebox)"
  49. # Check the permissions of the data dir (or create if it doesn't exist)
  50. if [[ -d "$DATA_DIR/archive" ]]; then
  51. if touch "$DATA_DIR/archive/.permissions_test_safe_to_delete" 2>/dev/null; then
  52. # It's fine, we are able to write to the data directory (as root inside the container)
  53. rm -f "$DATA_DIR/archive/.permissions_test_safe_to_delete"
  54. # echo "[√] Permissions are correct"
  55. else
  56. # the only time this fails is if the host filesystem doesn't allow us to write as root (e.g. some NFS mapall/maproot problems, connection issues, drive dissapeared, etc.)
  57. echo -e "\n[X] Error: archivebox user (PUID=$PUID) is not able to write to your ./data/archive dir (currently owned by $(stat -c '%u' "$DATA_DIR/archive"):$(stat -c '%g' "$DATA_DIR/archive")." > /dev/stderr
  58. echo -e " Change ./data to be owned by PUID=$PUID PGID=$PGID on the host and retry:" > /dev/stderr
  59. echo -e " \$ chown -R $PUID:$PGID ./data\n" > /dev/stderr
  60. echo -e " Configure the PUID & PGID environment variables to change the desired owner:" > /dev/stderr
  61. echo -e " https://docs.linuxserver.io/general/understanding-puid-and-pgid\n" > /dev/stderr
  62. echo -e " Hint: some NFS/SMB/FUSE/etc. filesystems force-remap/ignore all permissions," > /dev/stderr
  63. echo -e " leave PUID/PGID unset, disable root_squash, or use values the drive prefers (default is $DEFAULT_PUID:$DEFAULT_PGID)" > /dev/stderr
  64. echo -e " https://linux.die.net/man/8/mount.cifs#:~:text=does%20not%20provide%20unix%20ownership" > /dev/stderr
  65. exit 3
  66. fi
  67. else
  68. # create data directory (and logs, since its the first dir ArchiveBox needs to write to)
  69. mkdir -p "$DATA_DIR/logs"
  70. fi
  71. # force set the ownership of the data dir contents to the archivebox user and group
  72. # this is needed because Docker Desktop often does not map user permissions from the host properly
  73. chown $PUID:$PGID "$DATA_DIR"
  74. if ! chown $PUID:$PGID "$DATA_DIR"/* > /dev/null 2>&1; then
  75. # users may store the ./data/archive folder on a network mount that prevents chmod/chown
  76. # fallback to chowning everything else in ./data and leaving ./data/archive alone
  77. find "$DATA_DIR" -type d -not -path "$DATA_DIR/archive*" -exec chown $PUID:$PGID {} \; > /dev/null 2>&1
  78. find "$DATA_DIR" -type f -not -path "$DATA_DIR/archive/*" -exec chown $PUID:$PGID {} \; > /dev/null 2>&1
  79. fi
  80. mkdir -p /var/spool/cron/crontabs
  81. chown -R $PUID:$PGID /var/spool/cron/crontabs > /dev/null 2>&1 &
  82. # also chown BROWSERS_DIR because otherwise 'archivebox setup' wont be able to 'playwright install chromium' at runtime
  83. export PLAYWRIGHT_BROWSERS_PATH="${PLAYWRIGHT_BROWSERS_PATH:-/browsers}"
  84. mkdir -p "$PLAYWRIGHT_BROWSERS_PATH/permissions_test_safe_to_delete"
  85. rm -Rf "$PLAYWRIGHT_BROWSERS_PATH/permissions_test_safe_to_delete"
  86. chown $PUID:$PGID "$PLAYWRIGHT_BROWSERS_PATH"
  87. if [[ -d "$PLAYWRIGHT_BROWSERS_PATH/.links" ]]; then
  88. chown $PUID:$PGID "$PLAYWRIGHT_BROWSERS_PATH"/*
  89. chown $PUID:$PGID "$PLAYWRIGHT_BROWSERS_PATH"/.*
  90. chown -h $PUID:$PGID "$PLAYWRIGHT_BROWSERS_PATH"/.links/*
  91. fi
  92. # (this check is written in blood in 2023, QEMU silently breaks things in ways that are not obvious)
  93. export IN_QEMU="$(pmap 1 | grep qemu >/dev/null && echo 'True' || echo 'False')"
  94. if [[ "$IN_QEMU" == "True" ]]; then
  95. echo -e "\n[!] Warning: Running $(uname -m) docker image using QEMU emulation, some things will break!" > /dev/stderr
  96. echo -e " chromium (screenshot, pdf, dom), singlefile, and any dependencies that rely on inotify will not run in QEMU." > /dev/stderr
  97. echo -e " See here for more info: https://github.com/microsoft/playwright/issues/17395#issuecomment-1250830493\n" > /dev/stderr
  98. fi
  99. # check disk space free on /, /data, and /data/archive, warn on <500Mb free, error on <100Mb free
  100. export ROOT_USAGE="$(df --output=pcent,avail / | tail -n 1 | xargs)"
  101. export ROOT_USED_PCT="${ROOT_USAGE%%%*}"
  102. export ROOT_AVAIL_KB="$(echo "$ROOT_USAGE" | awk '{print $2}')"
  103. if [[ "$ROOT_AVAIL_KB" -lt 100000 ]]; then
  104. echo -e "\n[!] Warning: Docker root filesystem is completely out of space! (${ROOT_USED_PCT}% used on /)" > /dev/stderr
  105. echo -e " you need to free up at least 100Mb in your Docker VM to continue:" > /dev/stderr
  106. echo -e " \$ docker system prune\n" > /dev/stderr
  107. df -kh / > /dev/stderr
  108. exit 3
  109. elif [[ "$ROOT_USED_PCT" -ge 99 ]] || [[ "$ROOT_AVAIL_KB" -lt 500000 ]]; then
  110. echo -e "\n[!] Warning: Docker root filesystem is running out of space! (${ROOT_USED_PCT}% used on /)" > /dev/stderr
  111. echo -e " you may need to free up space in your Docker VM soon:" > /dev/stderr
  112. echo -e " \$ docker system prune\n" > /dev/stderr
  113. df -kh / > /dev/stderr
  114. fi
  115. export DATA_USAGE="$(df --output=pcent,avail "$DATA_DIR" | tail -n 1 | xargs)"
  116. export DATA_USED_PCT="${DATA_USAGE%%%*}"
  117. export DATA_AVAIL_KB="$(echo "$DATA_USAGE" | awk '{print $2}')"
  118. if [[ "$DATA_AVAIL_KB" -lt 100000 ]]; then
  119. echo -e "\n[!] Warning: Docker data volume is completely out of space! (${DATA_USED_PCT}% used on $DATA_DIR)" > /dev/stderr
  120. echo -e " you need to free up at least 100Mb on the drive holding your data directory" > /dev/stderr
  121. echo -e " \$ ncdu -x data\n" > /dev/stderr
  122. df -kh "$DATA_DIR" > /dev/stderr
  123. sleep 5
  124. elif [[ "$DATA_USED_PCT" -ge 99 ]] || [[ "$ROOT_AVAIL_KB" -lt 500000 ]]; then
  125. echo -e "\n[!] Warning: Docker data volume is running out of space! (${DATA_USED_PCT}% used on $DATA_DIR)" > /dev/stderr
  126. echo -e " you may need to free up space on the drive holding your data directory soon" > /dev/stderr
  127. echo -e " \$ ncdu -x data\n" > /dev/stderr
  128. df -kh "$DATA_DIR" > /dev/stderr
  129. else
  130. # data/ has space available, but check data/archive separately, because it might be on a network mount or external drive
  131. if [[ -d "$DATA_DIR/archive" ]]; then
  132. export ARCHIVE_USAGE="$(df --output=pcent,avail "$DATA_DIR/archive" | tail -n 1 | xargs)"
  133. export ARCHIVE_USED_PCT="${ARCHIVE_USAGE%%%*}"
  134. export ARCHIVE_AVAIL_KB="$(echo "$ARCHIVE_USAGE" | awk '{print $2}')"
  135. if [[ "$ARCHIVE_AVAIL_KB" -lt 100000 ]]; then
  136. echo -e "\n[!] Warning: data/archive folder is completely out of space! (${ARCHIVE_USED_PCT}% used on $DATA_DIR/archive)" > /dev/stderr
  137. echo -e " you need to free up at least 100Mb on the drive holding your data/archive directory" > /dev/stderr
  138. echo -e " \$ ncdu -x data/archive\n" > /dev/stderr
  139. df -kh "$DATA_DIR/archive" > /dev/stderr
  140. sleep 5
  141. elif [[ "$ARCHIVE_USED_PCT" -ge 99 ]] || [[ "$ROOT_AVAIL_KB" -lt 500000 ]]; then
  142. echo -e "\n[!] Warning: data/archive folder is running out of space! (${ARCHIVE_USED_PCT}% used on $DATA_DIR/archive)" > /dev/stderr
  143. echo -e " you may need to free up space on the drive holding your data/archive directory soon" > /dev/stderr
  144. echo -e " \$ ncdu -x data/archive\n" > /dev/stderr
  145. df -kh "$DATA_DIR/archive" > /dev/stderr
  146. fi
  147. fi
  148. fi
  149. # symlink etc crontabs into place
  150. mkdir -p "$DATA_DIR/crontabs"
  151. if ! test -L /var/spool/cron/crontabs; then
  152. # move files from old location into new data dir location
  153. for existing_file in /var/spool/cron/crontabs/*; do
  154. mv "$existing_file" "$DATA_DIR/crontabs/"
  155. done
  156. # replace old system path with symlink to data dir location
  157. rm -Rf /var/spool/cron/crontabs
  158. ln -sf "$DATA_DIR/crontabs" /var/spool/cron/crontabs
  159. fi
  160. # set DBUS_SYSTEM_BUS_ADDRESS & DBUS_SESSION_BUS_ADDRESS
  161. # (dbus is not actually needed, it makes chrome log fewer warnings but isn't worth making our docker images bigger)
  162. # service dbus start >/dev/null 2>&1 &
  163. # export $(dbus-launch --close-stderr)
  164. export ARCHIVEBOX_BIN_PATH="$(which archivebox)"
  165. # Drop permissions to run commands as the archivebox user
  166. if [[ "$1" == /* || "$1" == "bash" || "$1" == "sh" || "$1" == "echo" || "$1" == "cat" || "$1" == "whoami" || "$1" == "archivebox" ]]; then
  167. # handle "docker run archivebox /bin/somecommand --with=some args" by passing args directly to bash -c
  168. # e.g. "docker run archivebox archivebox init:
  169. # "docker run archivebox /venv/bin/ipython3"
  170. # "docker run archivebox /bin/bash -c '...'"
  171. # "docker run archivebox cat /VERSION.txt"
  172. exec gosu "$PUID" /bin/bash -c "exec $(printf ' %q' "$@")"
  173. # WARNING: make sure to test extensively if you change this line, there are many edge-cases with nested quotes, special character, etc.
  174. # printf requotes shell parameters properly https://stackoverflow.com/a/39463371/2156113
  175. # gosu spawns an ephemeral bash process owned by archivebox user (bash wrapper is needed to load env vars, PATH, and setup terminal TTY)
  176. # outermost exec hands over current process ID to inner bash process, inner exec hands over inner bash PID to user's command
  177. # - https://github.com/ArchiveBox/ArchiveBox/issues/1191
  178. else
  179. # handle "docker run archivebox add some subcommand --with=args abc" by calling archivebox to run as args as CLI subcommand
  180. # e.g. "docker run archivebox help"
  181. # "docker run archivebox add --depth=1 https://example.com"
  182. # "docker run archivebox manage createsupseruser"
  183. # "docker run archivebox server 0.0.0.0:8000"
  184. exec gosu "$PUID" "$ARCHIVEBOX_BIN_PATH" "$@"
  185. fi