diff --git a/bin/docker_entrypoint.sh b/bin/docker_entrypoint.sh index 35e3c365..23cb7e91 100755 --- a/bin/docker_entrypoint.sh +++ b/bin/docker_entrypoint.sh @@ -3,27 +3,32 @@ export DATA_DIR="${DATA_DIR:-/data}" export ARCHIVEBOX_USER="${ARCHIVEBOX_USER:-archivebox}" -# if data directory already exists, autodetect detect owner by looking at files within -DETECTED_UID="$(stat -c '%u' "$DATA_DIR/logs/errors.log" 2>/dev/null || echo 911)" -DETECTED_GID="$(stat -c '%g' "$DATA_DIR/logs/errors.log" 2>/dev/null || echo 911)" +# default PUID and PGID if data dir is empty and no PUID+PGID is set +export DEFAULT_PUID=911 +export DEFAULT_PGID=911 -# prefer PUID and PGID passsed in explicitly as env vars to autodetected defaults -export PUID=${PUID:-$DETECTED_UID} -export PGID=${PGID:-$DETECTED_GID} +# if data directory already exists, autodetect detect owner by looking at files within +export DETECTED_UID="$(stat -c '%u' "$DATA_DIR/logs/errors.log" 2>/dev/null || echo "$DEFAULT_PUID")" +export DETECTED_GID="$(stat -c '%g' "$DATA_DIR/logs/errors.log" 2>/dev/null || echo "$DEFAULT_PGID")" # Set the archivebox user to use the configured UID & GID -groupmod -o -g "$PGID" "$ARCHIVEBOX_USER" > /dev/null 2>&1 -usermod -o -u "$PUID" "$ARCHIVEBOX_USER" > /dev/null 2>&1 +# prefers PUID and PGID env vars passsed in explicitly, falls back to autodetected defaults +groupmod -o -g "${PUID:-$DETECTED_UID}" "$ARCHIVEBOX_USER" > /dev/null 2>&1 +usermod -o -u "${PGID:-$DETECTED_GID}" "$ARCHIVEBOX_USER" > /dev/null 2>&1 + +# re-set PUID and PGID to values reported by system instead of values we tried to set, +# in case wonky filesystems or Docker setups try to play UID/GID remapping tricks on us export PUID="$(id -u archivebox)" export PGID="$(id -g archivebox)" # Check the permissions of the data dir (or create if it doesn't exist) if [[ -d "$DATA_DIR/archive" ]]; then if touch "$DATA_DIR/archive/.permissions_test_safe_to_delete" 2>/dev/null; then - # It's fine, we are able to write to the data directory - rm "$DATA_DIR/archive/.permissions_test_safe_to_delete" + # It's fine, we are able to write to the data directory (as root inside the container) + rm -f "$DATA_DIR/archive/.permissions_test_safe_to_delete" # echo "[√] Permissions are correct" else + # the only time this fails is if the host filesystem doesn't allow us to write as root (e.g. some NFS mapall/maproot problems, connection issues, drive dissapeared, etc.) echo -e "\n[X] Error: archivebox user (PUID=$PUID) is not able to write to your ./data dir." >&2 echo -e " Change ./data to be owned by PUID=$PUID PGID=$PGID on the host and retry:" echo -e " \$ chown -R $PUID:$PGID ./data\n" >&2 @@ -41,7 +46,12 @@ fi chown $PUID:$PGID "$DATA_DIR" chown $PUID:$PGID "$DATA_DIR"/* +# also chown BROWSERS_DIR because otherwise 'archivebox setup' wont be able to install chrome +PLAYWRIGHT_BROWSERS_PATH="${PLAYWRIGHT_BROWSERS_PATH:-/browsers}" +chown $PUID:$PGID "$PLAYWRIGHT_BROWSERS_PATH" +chown $PUID:$PGID "${PLAYWRIGHT_BROWSERS_PATH}/*" +# (this check is written in blood, QEMU silently breaks things in ways that are not obvious) export IN_QEMU="$(pmap 1 | grep qemu | wc -l | grep -E '^0$' >/dev/null && echo 'False' || echo 'True')" if [[ "$IN_QEMU" == 'True' ]]; then echo -e "\n[!] Warning: Running $(uname -m) emulated container in QEMU, some things will break!" >&2 @@ -51,14 +61,14 @@ fi # Drop permissions to run commands as the archivebox user if [[ "$1" == /* || "$1" == "bash" || "$1" == "sh" || "$1" == "echo" || "$1" == "cat" || "$1" == "archivebox" ]]; then - # handle "docker run archivebox /some/non-archivebox/command" by executing args as direct bash command + # handle "docker run archivebox /some/non-archivebox/command --with=some args" by passing args directly to bash -c # e.g. "docker run archivebox /venv/bin/archivebox-alt init" # "docker run archivebox /bin/bash -c '...'" # "docker run archivebox echo test" exec gosu "$PUID" bash -c "$*" else - # handle "docker run archivebox add ..." by running args as archivebox $subcommand - # e.g. "docker run archivebox add https://example.com" + # handle "docker run archivebox add some subcommand --with=args abc" by calling archivebox to run as args as CLI subcommand + # e.g. "docker run archivebox add --depth=1 https://example.com" # "docker run archivebox manage createsupseruser" # "docker run archivebox server 0.0.0.0:8000" exec gosu "$PUID" bash -c "archivebox $*"