65 lines
3.2 KiB
Bash
Executable file
65 lines
3.2 KiB
Bash
Executable file
#!/bin/bash
|
|
|
|
export DATA_DIR="${DATA_DIR:-/data}"
|
|
export ARCHIVEBOX_USER="${ARCHIVEBOX_USER:-archivebox}"
|
|
|
|
# if data directory already exists, autodetect detect owner by looking at files within
|
|
DETECTED_UID="$(stat -c '%u' "$DATA_DIR/logs/errors.log" 2>/dev/null || echo 911)"
|
|
DETECTED_GID="$(stat -c '%g' "$DATA_DIR/logs/errors.log" 2>/dev/null || echo 911)"
|
|
|
|
# prefer PUID and PGID passsed in explicitly as env vars to autodetected defaults
|
|
export PUID=${PUID:-$DETECTED_UID}
|
|
export PGID=${PGID:-$DETECTED_GID}
|
|
|
|
# Set the archivebox user to use the configured UID & GID
|
|
groupmod -o -g "$PGID" "$ARCHIVEBOX_USER" > /dev/null 2>&1
|
|
usermod -o -u "$PUID" "$ARCHIVEBOX_USER" > /dev/null 2>&1
|
|
export PUID="$(id -u archivebox)"
|
|
export PGID="$(id -g archivebox)"
|
|
|
|
# Check the permissions of the data dir (or create if it doesn't exist)
|
|
if [[ -d "$DATA_DIR/archive" ]]; then
|
|
if touch "$DATA_DIR/archive/.permissions_test_safe_to_delete" 2>/dev/null; then
|
|
# It's fine, we are able to write to the data directory
|
|
rm "$DATA_DIR/archive/.permissions_test_safe_to_delete"
|
|
# echo "[√] Permissions are correct"
|
|
else
|
|
echo -e "\n[X] Error: archivebox user (PUID=$PUID) is not able to write to your ./data dir." >&2
|
|
echo -e " Change ./data to be owned by PUID=$PUID PGID=$PGID on the host and retry:"
|
|
echo -e " \$ chown -R $PUID:$PGID ./data\n" >&2
|
|
echo -e " Configure the PUID & PGID environment variables to change the desired owner:" >&2
|
|
echo -e " https://docs.linuxserver.io/general/understanding-puid-and-pgid\n" >&2
|
|
exit 1
|
|
fi
|
|
else
|
|
# create data directory
|
|
mkdir -p "$DATA_DIR/logs"
|
|
fi
|
|
|
|
# force set the ownership of the data dir contents to the archivebox user and group
|
|
# this is needed because Docker Desktop often does not map user permissions from the host properly
|
|
chown $PUID:$PGID "$DATA_DIR"
|
|
chown $PUID:$PGID "$DATA_DIR"/*
|
|
|
|
|
|
export IN_QEMU="$(pmap 1 | grep qemu | wc -l | grep -E '^0$' >/dev/null && echo 'False' || echo 'True')"
|
|
if [[ "$IN_QEMU" == 'True' ]]; then
|
|
echo -e "\n[!] Warning: Running $(uname -m) emulated container in QEMU, some things will break!" >&2
|
|
echo -e " chromium (screenshot, pdf, dom), singlefile, and any dependencies that rely on inotify will not run in QEMU." >&2
|
|
echo -e " See here for more info: https://github.com/microsoft/playwright/issues/17395#issuecomment-1250830493\n" >&2
|
|
fi
|
|
|
|
# Drop permissions to run commands as the archivebox user
|
|
if [[ "$1" == /* || "$1" == "bash" || "$1" == "sh" || "$1" == "echo" || "$1" == "cat" || "$1" == "archivebox" ]]; then
|
|
# handle "docker run archivebox /some/non-archivebox/command" by executing args as direct bash command
|
|
# e.g. "docker run archivebox /venv/bin/archivebox-alt init"
|
|
# "docker run archivebox /bin/bash -c '...'"
|
|
# "docker run archivebox echo test"
|
|
exec gosu "$PUID" bash -c "$*"
|
|
else
|
|
# handle "docker run archivebox add ..." by running args as archivebox $subcommand
|
|
# e.g. "docker run archivebox add https://example.com"
|
|
# "docker run archivebox manage createsupseruser"
|
|
# "docker run archivebox server 0.0.0.0:8000"
|
|
exec gosu "$PUID" bash -c "archivebox $*"
|
|
fi
|