-
Notifications
You must be signed in to change notification settings - Fork 5
/
start.sh
executable file
·213 lines (184 loc) · 8.28 KB
/
start.sh
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
#!/usr/bin/env bash
# Copyright (c) Jupyter Development Team.
# Distributed under the terms of the Modified BSD License.
set -e
# Exec the specified command or fall back on bash
if [ $# -eq 0 ]; then
cmd=bash
else
# bootstrap requires that ${LIBPROCESS_IP} or ${MESOS_CONTAINER_IP} be set
if [ -z ${LIBPROCESS_IP+x} ]; then
CONTAINER_IP=$(LIBPROCESS_IP="0.0.0.0" bootstrap -get-task-ip);
export LIBPROCESS_IP="${CONTAINER_IP}"
else
CONTAINER_IP=$(bootstrap -get-task-ip)
fi
export CONTAINER_IP
echo "CONTAINER_IP: ${CONTAINER_IP}"
echo "LIBPROCESS_IP: ${LIBPROCESS_IP}"
if [ -z ${MESOS_CONTAINER_IP+x} ]; then
export MESOS_CONTAINER_IP="${CONTAINER_IP}"
fi
echo "MESOS_CONTAINER_IP: ${MESOS_CONTAINER_IP}"
if [ -z ${MESOS_SANDBOX+x} ]; then
export MESOS_SANDBOX="${HOME}"
else
# Copy over profile files for convenience
cp /home/beakerx/.bash_profile "${MESOS_SANDBOX}/"
cp /home/beakerx/.bashrc "${MESOS_SANDBOX}/"
cp /home/beakerx/.dircolors "${MESOS_SANDBOX}/"
cp /home/beakerx/.profile "${MESOS_SANDBOX}/"
fi
echo "MESOS_SANDBOX: ${MESOS_SANDBOX}"
# Set environment variables for Spark Monitor: https://krishnan-r.github.io/sparkmonitor/install.html
export SPARKMONITOR_UI_HOST="${MESOS_CONTAINER_IP}"
if [ ${PORT_SPARKUI+x} ]; then
export SPARKMONITOR_UI_PORT="${PORT_SPARKUI}"
fi
# ${HOME} is set to ${MESOS_SANDBOX} on DC/OS and won't have a default IPython profile
if [ ! -f "${MESOS_SANDBOX}/.ipython/profile_default/ipython_kernel_config.py" ]; then
ipython profile create default
# Enable the SparkMonitor Jupyter Kernel Extension
echo "c.InteractiveShellApp.extensions.append('sparkmonitor.kernelextension')" \
>> "$(ipython profile locate default)/ipython_kernel_config.py"
fi
# Copy over beakerx.json so that we have a sane set of defaults
if [ ! -f "${MESOS_SANDBOX}/.jupyter/beakerx.json" ]; then
mkdir -p "${MESOS_SANDBOX}/.jupyter"
cp "/home/beakerx/.jupyter/beakerx.json" "${MESOS_SANDBOX}/.jupyter/"
fi
# Copy over .hadooprc so that hadoop fs s3a://<bucket>/ works
if [ ! -f "${MESOS_SANDBOX}/.hadooprc" ]; then
cp "/home/beakerx/.hadooprc" "${MESOS_SANDBOX}/.hadooprc"
fi
# Tensorboard
if [ ${TENSORBOARD_LOGDIR+x} ]; then
if [ ${PORT_TFDBG+x} ]; then
tensorboard --host localhost --port 6006 --debugger_port "${PORT_TFDBG}" --logdir "${TENSORBOARD_LOGDIR}" 2>&1 &
else
tensorboard --host localhost --port 6006 --logdir "${TENSORBOARD_LOGDIR}" 2>&1 &
fi
fi
# bootstrap needs ${MESOS_SANDBOX} set to obtain the relative path to the mustache template(s)
MESOS_SANDBOX="/" CONFIG_TEMPLATE_NGINX_CONF="/opt/mesosphere/nginx.conf.mustache,/usr/local/openresty/nginx/conf/nginx.conf" bootstrap -template -resolve=false --print-env=false -install-certs=false
MESOS_SANDBOX="/" CONFIG_TEMPLATE_NGINX_PROXY_CONF="/opt/mesosphere/proxy.conf.mustache,/usr/local/openresty/nginx/conf/sites/proxy.conf" bootstrap -template -resolve=false --print-env=false -install-certs=false
# Start Openresty for (Optional) OpenID Connect Authentication: https://github.com/zmartzone/lua-resty-openidc
openresty
cmd=$*
fi
# Run additional scripts in /usr/local/bin/start-notebook.d/
for f in /usr/local/bin/start-notebook.d/*; do
case "$f" in
*.sh)
echo "$0: running $f"; . "$f"
;;
*)
if [ -x $f ]; then
echo "$0: running $f"
$f
else
echo "$0: ignoring $f"
fi
;;
esac
echo
done
# Handle special flags if we're root
if [ "$(id -u)" == '0' ] ; then
# Only attempt to change the beakerx username if it exists
if id beakerx &> /dev/null ; then
echo "Set username to: ${NB_USER}"
usermod -d "/home/${NB_USER}" -l "${NB_USER}" beakerx
fi
# Handle case where provisioned storage does not have the correct permissions by default
# Ex: default NFS/EFS (no auto-uid/gid)
if [[ "${CHOWN_HOME}" == "1" || "${CHOWN_HOME}" == 'yes' ]]; then
echo "Changing ownership of /home/${NB_USER} to ${NB_UID}:${NB_GID}"
chown "${CHOWN_HOME_OPTS}" "${NB_UID}:${NB_GID}" "/home/${NB_USER}"
fi
if [ ! -z "${CHOWN_EXTRA}" ]; then
for extra_dir in $(echo "${CHOWN_EXTRA}" | tr ',' ' '); do
chown "${CHOWN_EXTRA_OPTS}" "${NB_UID}:${NB_GID}" "${extra_dir}"
done
fi
if [ -d "${MESOS_SANDBOX}" ];then
# Change ownership of $MESOS_SANDBOX so that $NB_USER can write to it
chown -R "${NB_UID}:${NB_GID}" "${MESOS_SANDBOX}"
fi
# handle home and working directory if the username changed
if [[ "${NB_USER}" != "beakerx" ]]; then
# changing username, make sure homedir exists
# (it could be mounted, and we shouldn't create it if it already exists)
if [[ ! -e "/home/${NB_USER}" ]]; then
echo "Relocating home dir to /home/${NB_USER}"
mv /home/beakerx "/home/${NB_USER}"
fi
# if workdir is in /home/beakerx, cd to /home/$NB_USER
if [[ "${PWD}/" == "/home/beakerx/"* ]]; then
newcwd="/home/${NB_USER}/${PWD:13}"
echo "Setting CWD to ${newcwd}"
cd "${newcwd}"
fi
fi
# Change UID of NB_USER to NB_UID if it does not match
if [ "${NB_UID}" != "$(id -u ${NB_USER})" ] ; then
echo "Set ${NB_USER} UID to: ${NB_UID}"
usermod -u "${NB_UID}" "${NB_USER}"
fi
# Change GID of NB_USER to NB_GID if it does not match
if [ "${NB_GID}" != "$(id -g ${NB_USER})" ] ; then
echo "Set ${NB_USER} GID to: ${NB_GID}"
groupmod -g "${NB_GID}" -o "$(id -g -n ${NB_USER})"
fi
# Enable sudo if requested
#if [[ "$GRANT_SUDO" == "1" || "$GRANT_SUDO" == 'yes' ]]; then
# echo "Granting $NB_USER sudo access and appending $CONDA_DIR/bin to sudo PATH"
# echo "$NB_USER ALL=(ALL) NOPASSWD:ALL" > /etc/sudoers.d/notebook
#fi
# Add $CONDA_DIR/bin to sudo secure_path
#sed -r "s#Defaults\s+secure_path=\"([^\"]+)\"#Defaults secure_path=\"\1:$CONDA_DIR/bin\"#" /etc/sudoers | grep secure_path > /etc/sudoers.d/path
# Exec the command as NB_USER with the PATH and the rest of
# the environment preserved
echo "Executing the command: ${cmd}"
exec sudo -E -H -u "${NB_USER}" PATH="${PATH}" PYTHONPATH="${PYTHONPATH}" ${cmd}
else
if [[ "${NB_UID}" == "$(id -u beakerx)" && "${NB_GID}" == "$(id -g beakerx)" ]]; then
# User is not attempting to override user/group via environment
# variables, but they could still have overridden the uid/gid that
# container runs as. Check that the user has an entry in the passwd
# file and if not add an entry.
whoami &> /dev/null || STATUS=$? && true
if [[ "${STATUS}" != "0" ]]; then
if [[ -w /etc/passwd ]]; then
echo "Adding passwd file entry for $(id -u)"
sed -e "s/^beakerx:/xrekaeb:/" /etc/passwd > /tmp/passwd
echo "beakerx:x:$(id -u):$(id -g):,,,:/home/beakerx:/bin/bash" >> /tmp/passwd
cat /tmp/passwd > /etc/passwd
rm /tmp/passwd
else
echo 'Container must be run with group root to update passwd file'
fi
fi
# Warn if the user isn't going to be able to write files to $HOME.
if [[ ! -w /home/beakerx ]]; then
echo 'Container must be run with group users to update files'
fi
else
# Warn if looks like user want to override uid/gid but hasn't
# run the container as root.
if [[ ! -z "${NB_UID}" && "${NB_UID}" != "$(id -u)" ]]; then
echo 'Container must be run as root to set ${NB_UID}'
fi
if [[ ! -z "${NB_GID}" && "${NB_GID}" != "$(id -g)" ]]; then
echo 'Container must be run as root to set $NB_GID'
fi
fi
# Warn if looks like user want to run in sudo mode but hasn't run
# the container as root.
#if [[ "${GRANT_SUDO}" == "1" || "${GRANT_SUDO}" == 'yes' ]]; then
# echo 'Container must be run as root to grant sudo permissions'
#fi
# Execute the command
echo "Executing the command: ${cmd}"
exec ${cmd}
fi