mirror of
https://gitee.com/amber-ce/amber-ce-bookworm.git
synced 2025-12-15 03:22:06 +08:00
Compare commits
9 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
| 516c4c30d4 | |||
| 75469cf1fc | |||
| b22439d7e6 | |||
| 0549dc74c3 | |||
| a2c95f2518 | |||
| 34f4ba62cb | |||
| 63fa6b6c46 | |||
| 172e219bb3 | |||
| 878d559241 |
@@ -11,7 +11,7 @@ Amber Compatability Environment is a container app packaging and distributing so
|
|||||||
|
|
||||||
With the help of bubblewrap, a super tiny container solution, you can run a `Debian 12` container in almost every linux distrobution. When you can not launch or pack an `Appimage` App, using Bookworm compatibility mode can allow you to pack the app in a newer environment and also be able to run on more distrobutions. It is a good choice!
|
With the help of bubblewrap, a super tiny container solution, you can run a `Debian 12` container in almost every linux distrobution. When you can not launch or pack an `Appimage` App, using Bookworm compatibility mode can allow you to pack the app in a newer environment and also be able to run on more distrobutions. It is a good choice!
|
||||||
|
|
||||||
Bookworm compatibility mode allows you to use Debian 12 applications on deepin or UniontechOS using bwrap containers, providing you with a better user experience!
|
**You need to logout or reboot your computer to show the entries in launcher app list if it's your first time using ACE.**
|
||||||
|
|
||||||
Please use `git clone --recurse-submodules` to obtain the env
|
Please use `git clone --recurse-submodules` to obtain the env
|
||||||
|
|
||||||
@@ -19,9 +19,9 @@ Please use `git clone --recurse-submodules` to obtain the env
|
|||||||
## Install Guide
|
## Install Guide
|
||||||
|
|
||||||
|
|
||||||
### Quick Install (Debian)
|
### Quick Install (Need to install Spark Store first)
|
||||||
|
|
||||||
https://bbs.spark-app.store/d/1668-xing-huo-ying-yong-shang-dian-on-ace
|
[spk://store/tools/cn.flamescion.bookworm-compatibility-mode/](https://spark-store-project.gitee.io/spk-resolv/?spk=spk://store/tools/cn.flamescion.bookworm-compatibility-mode/)
|
||||||
|
|
||||||
### Manual Install(Debian/Fedora/Arch)
|
### Manual Install(Debian/Fedora/Arch)
|
||||||
|
|
||||||
|
|||||||
@@ -7,15 +7,15 @@
|
|||||||
|
|
||||||
书虫兼容模式用极为轻量的容器方案让你可以在几乎任何的Linux发行版上运行一个`Debian 12`容器。在`Appimage`应用无法启动或者打包的时候,使用书虫兼容模式来打包可以让你在使用最新的环境的同时在更多的发行版上运行,是一个很好的选择
|
书虫兼容模式用极为轻量的容器方案让你可以在几乎任何的Linux发行版上运行一个`Debian 12`容器。在`Appimage`应用无法启动或者打包的时候,使用书虫兼容模式来打包可以让你在使用最新的环境的同时在更多的发行版上运行,是一个很好的选择
|
||||||
|
|
||||||
书虫兼容模式让你可以在deepin或UOS上使用Debian 12的应用,为你带来更好的使用体验!
|
**首次安装后请注销或重启以展示启动器入口**
|
||||||
|
|
||||||
请使用 `git clone --recurse-submodules` 来获取
|
请使用 `git clone --recurse-submodules` 来获取
|
||||||
|
|
||||||
## 安装指南
|
## 安装指南
|
||||||
|
|
||||||
### 快捷安装 (Debian)
|
### 快捷安装 (需要安装星火应用商店)
|
||||||
|
|
||||||
https://bbs.spark-app.store/d/1668-xing-huo-ying-yong-shang-dian-on-ace
|
[spk://store/tools/cn.flamescion.bookworm-compatibility-mode/](https://spark-store-project.gitee.io/spk-resolv/?spk=spk://store/tools/cn.flamescion.bookworm-compatibility-mode/)
|
||||||
|
|
||||||
### 手动安装(Debian/Fedora/Arch)
|
### 手动安装(Debian/Fedora/Arch)
|
||||||
|
|
||||||
|
|||||||
@@ -1,5 +1,5 @@
|
|||||||
Package: cn.flamescion.bookworm-compatibility-mode
|
Package: cn.flamescion.bookworm-compatibility-mode
|
||||||
Version: 12.4.9
|
Version: 12.4.10
|
||||||
Section: misc
|
Section: misc
|
||||||
Priority: optional
|
Priority: optional
|
||||||
Depends: bubblewrap,flatpak,zenity,policykit-1,gcc,systemd
|
Depends: bubblewrap,flatpak,zenity,policykit-1,gcc,systemd
|
||||||
|
|||||||
@@ -25,8 +25,13 @@ fi
|
|||||||
|
|
||||||
# 验证是否为desktop文件
|
# 验证是否为desktop文件
|
||||||
if [[ ! $ABSOLUTE_PATH == *.desktop ]]; then
|
if [[ ! $ABSOLUTE_PATH == *.desktop ]]; then
|
||||||
|
if [ ! -e $ABSOLUTE_PATH ];then
|
||||||
|
echo "$ABSOLUTE_PATH does not exist. May have already been uninstalled. Ignore it."
|
||||||
|
exit
|
||||||
|
else
|
||||||
echo "Error: The file is not a desktop file."
|
echo "Error: The file is not a desktop file."
|
||||||
exit 1
|
exit 1
|
||||||
|
fi
|
||||||
fi
|
fi
|
||||||
|
|
||||||
# 截取路径
|
# 截取路径
|
||||||
|
|||||||
@@ -37,16 +37,15 @@ bwrap --dev-bind $chrootEnvPath/ / \
|
|||||||
--setenv PULSE_SERVER /run/user/$uid/pulse/native \
|
--setenv PULSE_SERVER /run/user/$uid/pulse/native \
|
||||||
--setenv PATH /flamescion-container-tools/bin-override:$PATH \
|
--setenv PATH /flamescion-container-tools/bin-override:$PATH \
|
||||||
--setenv IS_ACE_ENV "1" \
|
--setenv IS_ACE_ENV "1" \
|
||||||
--dev-bind $chrootEnvPath/ / \
|
|
||||||
--dev-bind-try /media /media \
|
--dev-bind-try /media /media \
|
||||||
--dev-bind-try /tmp /tmp \
|
--dev-bind-try /tmp /tmp \
|
||||||
--dev /dev \
|
--dev /dev \
|
||||||
--dev-bind-try /dev/dri /dev/dri \
|
--dev-bind-try /dev/dri /dev/dri \
|
||||||
--proc /proc \
|
--proc /proc \
|
||||||
|
--dev-bind / /host \
|
||||||
--dev-bind /sys /sys \
|
--dev-bind /sys /sys \
|
||||||
--dev-bind /run /run \
|
--dev-bind /run /run \
|
||||||
--dev-bind-try /run/user/$uid/pulse /run/user/$uid/pulse \
|
--dev-bind-try /run/user/$uid/pulse /run/user/$uid/pulse \
|
||||||
--dev-bind / /host \
|
|
||||||
--bind-try /usr/share/themes /usr/local/share/themes \
|
--bind-try /usr/share/themes /usr/local/share/themes \
|
||||||
--bind-try /usr/share/icons /usr/local/share/icons \
|
--bind-try /usr/share/icons /usr/local/share/icons \
|
||||||
--bind-try /usr/share/fonts /usr/local/share/fonts \
|
--bind-try /usr/share/fonts /usr/local/share/fonts \
|
||||||
@@ -58,267 +57,26 @@ bwrap --dev-bind $chrootEnvPath/ / \
|
|||||||
|
|
||||||
|
|
||||||
}
|
}
|
||||||
# Move the package init work to build stage
|
|
||||||
#bookworm-run apt update
|
|
||||||
#bookworm-run apt install apt-utils bc curl dialog diffutils findutils gnupg2 less libnss-myhostname libvte-2.9*-common libvte-common lsof ncurses-base passwd pinentry-curses procps sudo time util-linux wget libegl1-mesa libgl1-mesa-glx libvulkan1 mesa-vulkan-drivers locales libglib2.0-bin -y
|
|
||||||
echo "Update the flamescion container tools"
|
echo "Update the flamescion container tools"
|
||||||
cp -r `dirname $chrootEnvPath`/flamescion-container-tools/ $chrootEnvPath
|
cp -r `dirname $chrootEnvPath`/flamescion-container-tools/ $chrootEnvPath
|
||||||
|
|
||||||
rm -rf $chrootEnvPath/usr/lib/`gcc -dumpmachine`/dri/dri
|
rm -rf $chrootEnvPath/usr/lib/`gcc -dumpmachine`/dri/dri
|
||||||
# 之前错误的多复制了一个,这里删掉
|
# 之前错误的多复制了一个,这里删掉
|
||||||
|
|
||||||
container_user_gid="$(sudo -u $non_root_user id -rg)"
|
export container_user_gid="$(sudo -u $non_root_user id -rg)"
|
||||||
container_user_home="/home/${non_root_user}"
|
export container_user_home="/home/${non_root_user}"
|
||||||
container_user_name="${non_root_user}"
|
export container_user_name="${non_root_user}"
|
||||||
container_user_uid="$(sudo -u $non_root_user id -ru)"
|
export container_user_uid="$(sudo -u $non_root_user id -ru)"
|
||||||
|
|
||||||
|
|
||||||
cat << EOFFFFFF > $chrootEnvPath/init.sh
|
|
||||||
#!/bin/bash
|
|
||||||
printf "bookworm-cm: Setting up sudo...\n"
|
|
||||||
mkdir -p /etc/sudoers.d
|
|
||||||
# Do not check fqdn when doing sudo, it will not work anyways
|
|
||||||
if ! grep -q 'Defaults !fqdn' /etc/sudoers.d/sudoers; then
|
|
||||||
printf "Defaults !fqdn\n" >> /etc/sudoers.d/sudoers
|
|
||||||
fi
|
|
||||||
# Ensure passwordless sudo is set up for user
|
|
||||||
if ! grep -q "\"${container_user_name}\" ALL = (root) NOPASSWD:ALL" /etc/sudoers.d/sudoers; then
|
|
||||||
printf "\"%s\" ALL = (root) NOPASSWD:ALL\n" "${container_user_name}" >> /etc/sudoers.d/sudoers
|
|
||||||
fi
|
|
||||||
|
|
||||||
|
|
||||||
printf "bookworm-cm: Setting up groups...\n"
|
|
||||||
# If not existing, ensure we have a group for our user.
|
|
||||||
if ! grep -q "^${container_user_name}:" /etc/group; then
|
|
||||||
if ! groupadd --force --gid "${container_user_gid}" "${container_user_name}"; then
|
|
||||||
# It may occur that we have users with unsupported user name (eg. on LDAP or AD)
|
|
||||||
# So let's try and force the group creation this way.
|
|
||||||
printf "%s:x:%s:" "${container_user_name}" "${container_user_gid}" >> /etc/group
|
|
||||||
fi
|
|
||||||
fi
|
|
||||||
|
|
||||||
printf "bookworm-cm: Setting up users...\n"
|
|
||||||
|
|
||||||
# Setup kerberos integration with the host
|
|
||||||
if [ -d "/run/host/var/kerberos" ] &&
|
|
||||||
[ -d "/etc/krb5.conf.d" ] &&
|
|
||||||
[ ! -e "/etc/krb5.conf.d/kcm_default_ccache" ]; then
|
|
||||||
|
|
||||||
cat << EOF > "/etc/krb5.conf.d/kcm_default_ccache"
|
|
||||||
# # To disable the KCM credential cache, comment out the following lines.
|
|
||||||
[libdefaults]
|
|
||||||
default_ccache_name = KCM:
|
|
||||||
EOF
|
|
||||||
fi
|
|
||||||
|
|
||||||
# If we have sudo/wheel groups, let's add the user to them.
|
|
||||||
additional_groups=""
|
|
||||||
if grep -q "^sudo" /etc/group; then
|
|
||||||
additional_groups="sudo"
|
|
||||||
elif grep -q "^wheel" /etc/group; then
|
|
||||||
additional_groups="wheel"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# Let's add our user to the container. if the user already exists, enforce properties.
|
|
||||||
#
|
|
||||||
# In case of AD or LDAP usernames, it is possible we will have a backslach in the name.
|
|
||||||
# In that case grep would fail, so we replace the backslash with a point to make the regex work.
|
|
||||||
# shellcheck disable=SC1003
|
|
||||||
if ! grep -q "^$(printf '%s' "${container_user_name}" | tr '\\' '.'):" /etc/passwd &&
|
|
||||||
! grep -q "^.*:.*:${container_user_uid}:" /etc/passwd; then
|
|
||||||
if ! useradd \
|
|
||||||
--home-dir "${container_user_home}" \
|
|
||||||
--no-create-home \
|
|
||||||
--groups "${additional_groups}" \
|
|
||||||
--shell "${SHELL:-"/bin/bash"}" \
|
|
||||||
--uid "${container_user_uid}" \
|
|
||||||
--gid "${container_user_gid}" \
|
|
||||||
"${container_user_name}"; then
|
|
||||||
|
|
||||||
printf "Warning: there was a problem setting up the user\n"
|
|
||||||
printf "Warning: trying manual addition\n"
|
|
||||||
printf "%s:x:%s:%s:%s:%s:%s" \
|
|
||||||
"${container_user_name}" "${container_user_uid}" \
|
|
||||||
"${container_user_gid}" "${container_user_name}" \
|
|
||||||
"${container_user_home}" "${SHELL:-"/bin/bash"}" >> /etc/passwd
|
|
||||||
printf "%s::1::::::" "${container_user_name}" >> /etc/shadow
|
|
||||||
fi
|
|
||||||
# Ensure we're not using the specified SHELL. Run it only once, so that future
|
|
||||||
# user's preferences are not overwritten at each start.
|
|
||||||
elif [ ! -e /etc/passwd.done ]; then
|
|
||||||
# This situation is presented when podman or docker already creates the user
|
|
||||||
# for us inside container. We should modify the user's prepopulated shadowfile
|
|
||||||
# entry though as per user's active preferences.
|
|
||||||
|
|
||||||
# If the user was there with a different username, get that username so
|
|
||||||
# we can modify it
|
|
||||||
if ! grep -q "^$(printf '%s' "${container_user_name}" | tr '\\' '.'):" /etc/passwd; then
|
|
||||||
user_to_modify=$(getent passwd "${container_user_uid}" | cut -d: -f1)
|
|
||||||
fi
|
|
||||||
|
|
||||||
if ! usermod \
|
|
||||||
--home "${container_user_home}" \
|
|
||||||
--shell "${SHELL:-"/bin/bash"}" \
|
|
||||||
--groups "${additional_groups}" \
|
|
||||||
--uid "${container_user_uid}" \
|
|
||||||
--gid "${container_user_gid}" \
|
|
||||||
--login "${container_user_name}" \
|
|
||||||
"${user_to_modify:-"${container_user_name}"}"; then
|
|
||||||
|
|
||||||
printf "Warning: there was a problem setting up the user\n"
|
|
||||||
fi
|
|
||||||
touch /etc/passwd.done
|
|
||||||
fi
|
|
||||||
|
|
||||||
# We generate a random password to initialize the entry for the user and root.
|
|
||||||
temporary_password="$(cat /proc/sys/kernel/random/uuid)"
|
|
||||||
printf "%s\n%s\n" "${temporary_password}" "${temporary_password}" | passwd root
|
|
||||||
printf "%s:%s" "${container_user_name}" "${temporary_password}" | chpasswd -e
|
|
||||||
# Delete password for root and user
|
|
||||||
printf "%s:" "root" | chpasswd -e
|
|
||||||
printf "%s:" "${container_user_name}" | chpasswd -e
|
|
||||||
|
|
||||||
mkdir -p /usr/share/fonts
|
|
||||||
mkdir -p /usr/share/icons
|
|
||||||
mkdir -p /usr/share/themes
|
|
||||||
|
|
||||||
## init host-spawn
|
|
||||||
unlink /flamescion-container-tools/bin-override/host-spawn
|
|
||||||
ln -sfv /flamescion-container-tools/bin-override/host-spawn-$(uname -m) /flamescion-container-tools/bin-override/host-spawn
|
|
||||||
|
|
||||||
## install host-integration
|
|
||||||
|
|
||||||
apt install --reinstall /flamescion-container-tools/ace-host-integration.deb
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
### Do NVIDIA Integration
|
|
||||||
|
|
||||||
echo "ACE: NVIDIA Integration"
|
|
||||||
|
|
||||||
ensureTargetDir() {
|
|
||||||
targetFile=$1
|
|
||||||
t=$(dirname "$targetFile")
|
|
||||||
mkdir -p "$t"
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
lib32_dir="/usr/lib/"
|
|
||||||
lib64_dir="/usr/lib/"
|
|
||||||
if [ -e "/usr/lib/x86_64-linux-gnu" ]; then
|
|
||||||
lib64_dir="/usr/lib/x86_64-linux-gnu/"
|
|
||||||
elif [ -e "/usr/lib64" ]; then
|
|
||||||
lib64_dir="/usr/lib64/"
|
|
||||||
fi
|
|
||||||
if [ -e "/usr/lib/i386-linux-gnu" ]; then
|
|
||||||
lib32_dir="/usr/lib/i386-linux-gnu/"
|
|
||||||
elif [ -e "/usr/lib32" ]; then
|
|
||||||
lib32_dir="/usr/lib32/"
|
|
||||||
fi
|
|
||||||
|
|
||||||
# First we find all non-lib files we need, this includes
|
|
||||||
# - binaries
|
|
||||||
# - confs
|
|
||||||
# - egl files
|
|
||||||
# - icd files
|
|
||||||
# Excluding here the libs, we will threat them later specifically
|
|
||||||
NVIDIA_FILES="$(find /host/etc/ /host/usr/ \
|
|
||||||
-path "/host/usr/lib/i386-linux-gnu/*" -prune -o \
|
|
||||||
-path "/host/usr/lib/x86_64-linux-gnu/*" -prune -o \
|
|
||||||
-path "/host/usr/lib32/*" -prune -o \
|
|
||||||
-path "/host/usr/lib64/*" -prune -o \
|
|
||||||
-iname "*nvidia*" -not -type d -print 2> /dev/null || :)"
|
|
||||||
for nvidia_file in ${NVIDIA_FILES}; do
|
|
||||||
dest_file="$(printf "%s" "${nvidia_file}" | sed 's|/host||g')"
|
|
||||||
ensureTargetDir ${dest_file}
|
|
||||||
cp -r "${nvidia_file}" "${dest_file}"
|
|
||||||
done
|
|
||||||
|
|
||||||
# Then we find all directories with nvidia in the name and just mount them
|
|
||||||
NVIDIA_DIRS="$(find /host/etc /host/usr -iname "*nvidia*" -type d 2> /dev/null || :)"
|
|
||||||
for nvidia_dir in ${NVIDIA_DIRS}; do
|
|
||||||
# /usr/lib64 is common in Arch or RPM based distros, while /usr/lib/x86_64-linux-gnu is
|
|
||||||
# common on Debian derivatives, so we need to adapt between the two nomenclatures.
|
|
||||||
if printf "%s" "${nvidia_dir}" | grep -Eq "lib32|lib64|x86_64-linux-gnu|i386-linux-gnu"; then
|
|
||||||
|
|
||||||
# Remove origin so we plug our own
|
|
||||||
dest_dir="$(printf "%s" "${nvidia_dir}" |
|
|
||||||
sed "s|/host/usr/lib/x86_64-linux-gnu/|${lib64_dir}|g" |
|
|
||||||
sed "s|/host/usr/lib/i386-linux-gnu/|${lib32_dir}|g" |
|
|
||||||
sed "s|/host/usr/lib64/|${lib64_dir}|g" |
|
|
||||||
sed "s|/host/usr/lib32/|${lib32_dir}|g")"
|
|
||||||
else
|
|
||||||
dest_dir="$(printf "%s" "${nvidia_dir}" | sed 's|/host||g')"
|
|
||||||
fi
|
|
||||||
ensureTargetDir ${dest_file}
|
|
||||||
cp -r "${nvidia_dir}" "${dest_file}"
|
|
||||||
done
|
|
||||||
|
|
||||||
# Then we find all the ".so" libraries, there are searched separately
|
|
||||||
# because we need to extract the relative path to mount them in the
|
|
||||||
# correct path based on the guest's setup
|
|
||||||
#
|
|
||||||
# /usr/lib64 is common in Arch or RPM based distros, while /usr/lib/x86_64-linux-gnu is
|
|
||||||
# common on Debian derivatives, so we need to adapt between the two nomenclatures.
|
|
||||||
NVIDIA_LIBS="$(find \
|
|
||||||
/host/usr/lib/i386-linux-gnu/ \
|
|
||||||
/host/usr/lib/x86_64-linux-gnu/ \
|
|
||||||
/host/usr/lib32/ \
|
|
||||||
/host/usr/lib64/ \
|
|
||||||
-iname "*nvidia*.so*" \
|
|
||||||
-o -iname "libcuda*.so*" \
|
|
||||||
-o -iname "libnvcuvid*.so*" \
|
|
||||||
-o -iname "libnvoptix*.so*" 2> /dev/null || :)"
|
|
||||||
for nvidia_lib in ${NVIDIA_LIBS}; do
|
|
||||||
dest_file="$(printf "%s" "${nvidia_lib}" |
|
|
||||||
sed "s|/host/usr/lib/x86_64-linux-gnu/|${lib64_dir}|g" |
|
|
||||||
sed "s|/host/usr/lib/i386-linux-gnu/|${lib32_dir}|g" |
|
|
||||||
sed "s|/host/usr/lib64/|${lib64_dir}|g" |
|
|
||||||
sed "s|/host/usr/lib32/|${lib32_dir}|g")"
|
|
||||||
|
|
||||||
# If file exists, just continue
|
|
||||||
# this may happen for directories like /usr/lib/nvidia/xorg/foo.so
|
|
||||||
# where the directory is already bind mounted (ro) and we don't need
|
|
||||||
# to mount further files in it.
|
|
||||||
if [ -e "${dest_file}" ]; then
|
|
||||||
continue
|
|
||||||
fi
|
|
||||||
|
|
||||||
type="file"
|
|
||||||
if [ -L "${nvidia_lib}" ]; then
|
|
||||||
type="link"
|
|
||||||
fi
|
|
||||||
|
|
||||||
if [ "${type}" = "link" ]; then
|
|
||||||
mkdir -p "$(dirname "${dest_file}")"
|
|
||||||
cp -d "${nvidia_lib}" "${dest_file}"
|
|
||||||
continue
|
|
||||||
fi
|
|
||||||
ensureTargetDir ${dest_file}
|
|
||||||
cp -r "${nvidia_lib}" "${dest_file}"
|
|
||||||
|
|
||||||
done
|
|
||||||
|
|
||||||
# Refresh ldconfig cache, also detect if there are empty files remaining
|
|
||||||
# and clean them.
|
|
||||||
# This could happen when upgrading drivers and changing versions.
|
|
||||||
empty_libs="$(ldconfig 2>&1 | grep -Eo "File.*is empty" | cut -d' ' -f2)"
|
|
||||||
if [ -n "${empty_libs}" ]; then
|
|
||||||
# shellcheck disable=SC2086
|
|
||||||
find ${empty_libs} -delete 2> /dev/null || :
|
|
||||||
find /usr/ /etc/ -empty -iname "*nvidia*" -delete 2> /dev/null || :
|
|
||||||
fi
|
|
||||||
|
|
||||||
|
|
||||||
EOFFFFFF
|
|
||||||
|
|
||||||
#####init
|
#####init
|
||||||
|
|
||||||
chmod +x $chrootEnvPath/init.sh
|
|
||||||
bookworm-run bash /init.sh
|
|
||||||
bookworm-run rm /init.sh
|
|
||||||
bookworm-run cp /host/etc/locale.gen /etc/locale.gen && locale-gen
|
|
||||||
|
|
||||||
|
bookworm-run bash /flamescion-container-tools/container-init/init.sh
|
||||||
|
bookworm-run cp /host/etc/locale.gen /etc/locale.gen && locale-gen
|
||||||
bookworm-run touch /finish.flag
|
bookworm-run touch /finish.flag
|
||||||
bookworm-run apt clean
|
bookworm-run apt clean
|
||||||
bookworm-run chown -R $(who | awk '{print $1}' | head -n 1) /usr/lib/locale/
|
bookworm-run chown -R $(who | awk '{print $1}' | head -n 1) /usr/lib/locale/
|
||||||
@@ -354,4 +112,4 @@ sudo -u $(who | awk '{print $1}' | head -n 1) bwrap --dev-bind $chrootEnvPath/ /
|
|||||||
locale-gen
|
locale-gen
|
||||||
|
|
||||||
chown -R root $chrootEnvPath
|
chown -R root $chrootEnvPath
|
||||||
|
chmod 777 -R $chrootEnvPath /usr/share/icons
|
||||||
|
|||||||
@@ -8,12 +8,6 @@ PKGNAME=`basename $ppparent_dir`
|
|||||||
export PACKAGE_NAME=$PKGNAME
|
export PACKAGE_NAME=$PKGNAME
|
||||||
chrootEnvPath=/opt/apps/$PKGNAME/files/bookworm-env
|
chrootEnvPath=/opt/apps/$PKGNAME/files/bookworm-env
|
||||||
|
|
||||||
|
|
||||||
if [ "$(id -u)" = "0" ]; then
|
|
||||||
`dirname $chrootEnvPath`/bin/bookworm-run-root "$@"
|
|
||||||
exit
|
|
||||||
fi
|
|
||||||
|
|
||||||
if [ ! -e $chrootEnvPath/finish.flag ];then
|
if [ ! -e $chrootEnvPath/finish.flag ];then
|
||||||
|
|
||||||
if [ "$(id -u)" = "0" ]; then
|
if [ "$(id -u)" = "0" ]; then
|
||||||
@@ -40,39 +34,126 @@ for arg in "$@"; do
|
|||||||
container_command="${container_command} '${arg}'"
|
container_command="${container_command} '${arg}'"
|
||||||
done
|
done
|
||||||
fi
|
fi
|
||||||
|
#########################################################################################
|
||||||
|
##########合成bwrap 1. 基础函数配置段
|
||||||
|
# 初始化 EXEC_COMMAND 为 bwrap 基础指令
|
||||||
|
EXEC_COMMAND="bwrap --dev-bind / / bwrap"
|
||||||
|
|
||||||
|
# add_command 函数定义
|
||||||
|
function add_command() {
|
||||||
|
# 参数拼接,考虑到转义和空格的处理
|
||||||
|
for arg in "$@"; do
|
||||||
|
EXEC_COMMAND="${EXEC_COMMAND} ${arg}"
|
||||||
|
done
|
||||||
|
}
|
||||||
|
|
||||||
|
function add_env_var() {
|
||||||
|
local var_name="${1}"
|
||||||
|
local var_value="${2}"
|
||||||
|
if [ "$var_value" != "" ]; then
|
||||||
|
add_command "--setenv $var_name $var_value"
|
||||||
|
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
##########合成bwrap 2. 特殊需求函数配置段
|
||||||
|
function cursor_theme_dir_integration() {
|
||||||
|
|
||||||
|
local directory=""
|
||||||
|
if [ "$(id -u)" = "0" ]; then #####We don't want bother root to install themes,but will try to fix the unwriteable issue
|
||||||
|
mkdir -p $chrootEnvPath/usr/share/icons
|
||||||
|
chmod 777 -R $chrootEnvPath/usr/share/icons
|
||||||
|
return
|
||||||
|
fi
|
||||||
|
|
||||||
|
for directory in "/usr/share/icons"/*; do
|
||||||
|
# 检查是否为目录
|
||||||
|
if [ -d "$directory" ]; then
|
||||||
|
# 检查目录中是否存在 cursors 文件
|
||||||
|
if [ -d "$directory/cursors" ]; then
|
||||||
|
if [ -w $chrootEnvPath/usr/share/icons ];then
|
||||||
|
add_command "--ro-bind-try $directory $directory"
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
|
||||||
|
|
||||||
bwrap --dev-bind / / \
|
|
||||||
bwrap \
|
|
||||||
--setenv LANG "$LANG" \
|
|
||||||
--setenv LC_COLLATE "$LC_COLLATE" \
|
|
||||||
--setenv LC_CTYPE "$LC_CTYPE" \
|
|
||||||
--setenv LC_MONETARY "$LC_MONETARY" \
|
}
|
||||||
--setenv LC_MESSAGES "$LC_MESSAGES" \
|
##########合成bwrap 3. 环境变量和目录绑定配置段
|
||||||
--setenv LC_NUMERIC "$LC_NUMERIC" \
|
# 添加环境变量和其他初始设置
|
||||||
--setenv LC_TIME "$LC_TIME" \
|
ENV_VARS=(
|
||||||
--setenv LC_ALL "$LC_ALL" \
|
"LANG $LANG"
|
||||||
--setenv PULSE_SERVER /run/user/$uid/pulse/native \
|
"LC_COLLATE $LC_COLLATE"
|
||||||
--setenv PATH /flamescion-container-tools/bin-override:$PATH \
|
"LC_CTYPE $LC_CTYPE"
|
||||||
--setenv IS_ACE_ENV "1" \
|
"LC_MONETARY $LC_MONETARY"
|
||||||
--dev-bind $chrootEnvPath/ / \
|
"LC_MESSAGES $LC_MESSAGES"
|
||||||
--dev-bind-try /media /media \
|
"LC_NUMERIC $LC_NUMERIC"
|
||||||
--dev-bind-try /tmp /tmp \
|
"LC_TIME $LC_TIME"
|
||||||
--dev /dev \
|
"LC_ALL $LC_ALL"
|
||||||
--dev-bind-try /dev/dri /dev/dri \
|
"PULSE_SERVER /run/user/\$uid/pulse/native"
|
||||||
--proc /proc \
|
"PATH /flamescion-container-tools/bin-override:\$PATH"
|
||||||
--dev-bind /sys /sys \
|
"IS_ACE_ENV 1"
|
||||||
--dev-bind /run /run \
|
)
|
||||||
--dev-bind-try /run/user/$uid/pulse /run/user/$uid/pulse \
|
|
||||||
--dev-bind / /host \
|
BIND_DIRS=(
|
||||||
--ro-bind-try /usr/share/themes /usr/local/share/themes \
|
"--dev-bind $chrootEnvPath/ /"
|
||||||
--ro-bind-try /usr/share/icons /usr/local/share/icons \
|
"--dev-bind-try /media /media"
|
||||||
--ro-bind-try /usr/share/fonts /usr/local/share/fonts \
|
"--dev-bind-try /tmp /tmp"
|
||||||
--hostname Amber-CE-Bookworm \
|
"--dev /dev"
|
||||||
--unshare-uts \
|
"--dev-bind-try /dev/dri /dev/dri"
|
||||||
--dev-bind-try /etc/resolv.conf /etc/resolv.conf \
|
"--proc /proc"
|
||||||
--cap-add CAP_SYS_ADMIN \
|
"--dev-bind /sys /sys"
|
||||||
--dev-bind-try /home /home \
|
"--dev-bind /run /run"
|
||||||
bash -c "${container_command}"
|
"--dev-bind-try /run/user/\$uid/pulse /run/user/\$uid/pulse"
|
||||||
|
"--dev-bind / /host"
|
||||||
|
"--ro-bind-try /usr/share/themes /usr/local/share/themes"
|
||||||
|
"--ro-bind-try /usr/share/icons /usr/local/share/icons"
|
||||||
|
"--ro-bind-try /usr/share/fonts /usr/local/share/fonts"
|
||||||
|
"--ro-bind-try $(realpath /etc/localtime) /etc/localtime"
|
||||||
|
"--dev-bind-try /etc/resolv.conf /etc/resolv.conf"
|
||||||
|
"--dev-bind-try /home /home"
|
||||||
|
|
||||||
|
)
|
||||||
|
EXTRA_ARGS=(
|
||||||
|
"--hostname Amber-CE-Bookworm"
|
||||||
|
"--unshare-uts"
|
||||||
|
"--cap-add CAP_SYS_ADMIN"
|
||||||
|
)
|
||||||
|
|
||||||
|
EXTRA_SCRIPTS=(
|
||||||
|
cursor_theme_dir_integration
|
||||||
|
)
|
||||||
|
|
||||||
|
##########合成bwrap 4. 合成并执行指令
|
||||||
|
# 逐一添加到 EXEC_COMMAND
|
||||||
|
for var in "${ENV_VARS[@]}"; do
|
||||||
|
add_env_var $var
|
||||||
|
done
|
||||||
|
|
||||||
|
for var in "${BIND_DIRS[@]}"; do
|
||||||
|
add_command "$var"
|
||||||
|
done
|
||||||
|
|
||||||
|
for var in "${EXTRA_ARGS[@]}"; do
|
||||||
|
add_command "$var"
|
||||||
|
done
|
||||||
|
|
||||||
|
for var in "${EXTRA_SCRIPTS[@]}"; do
|
||||||
|
$var
|
||||||
|
done
|
||||||
|
|
||||||
|
# 添加最终的 bash 命令
|
||||||
|
add_command "bash -c \"${container_command}\""
|
||||||
|
|
||||||
|
# 输出完整的 EXEC_COMMAND 以查看
|
||||||
|
# echo "${EXEC_COMMAND}"
|
||||||
|
|
||||||
|
# 注意: 实际执行时,请确保所有变量(如 $uid, $chrootEnvPath 等)都已正确定义
|
||||||
|
eval ${EXEC_COMMAND}
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
@@ -8,7 +8,6 @@ PKGNAME=`basename $ppparent_dir`
|
|||||||
export PACKAGE_NAME=$PKGNAME
|
export PACKAGE_NAME=$PKGNAME
|
||||||
chrootEnvPath=/opt/apps/$PKGNAME/files/bookworm-env
|
chrootEnvPath=/opt/apps/$PKGNAME/files/bookworm-env
|
||||||
|
|
||||||
|
|
||||||
if [ ! -e $chrootEnvPath/finish.flag ];then
|
if [ ! -e $chrootEnvPath/finish.flag ];then
|
||||||
|
|
||||||
if [ "$(id -u)" = "0" ]; then
|
if [ "$(id -u)" = "0" ]; then
|
||||||
@@ -23,36 +22,138 @@ non_root_user=$(who | awk '{print $1}' | head -n 1)
|
|||||||
uid=$(id -u $non_root_user)
|
uid=$(id -u $non_root_user)
|
||||||
|
|
||||||
|
|
||||||
bwrap --dev-bind / / \
|
#### This part is for args pharm
|
||||||
bwrap \
|
if [ "$1" = "" ];then
|
||||||
--setenv LANG "$LANG" \
|
container_command="bash"
|
||||||
--setenv LC_COLLATE "$LC_COLLATE" \
|
else
|
||||||
--setenv LC_CTYPE "$LC_CTYPE" \
|
container_command="$1"
|
||||||
--setenv LC_MONETARY "$LC_MONETARY" \
|
shift
|
||||||
--setenv LC_MESSAGES "$LC_MESSAGES" \
|
for arg in "$@"; do
|
||||||
--setenv LC_NUMERIC "$LC_NUMERIC" \
|
arg="$(echo "${arg}x" | sed 's|'\''|'\'\\\\\'\''|g')"
|
||||||
--setenv LC_TIME "$LC_TIME" \
|
arg="${arg%x}"
|
||||||
--setenv LC_ALL "$LC_ALL" \
|
container_command="${container_command} '${arg}'"
|
||||||
--setenv PULSE_SERVER /run/user/$uid/pulse/native \
|
done
|
||||||
--setenv PATH /flamescion-container-tools/bin-override:$PATH \
|
fi
|
||||||
--setenv IS_ACE_ENV "1" \
|
#########################################################################################
|
||||||
--dev-bind $chrootEnvPath/ / \
|
##########合成bwrap 1. 基础函数配置段
|
||||||
--dev-bind-try /media /media \
|
# 初始化 EXEC_COMMAND 为 bwrap 基础指令
|
||||||
--dev-bind-try /tmp /tmp \
|
EXEC_COMMAND="bwrap --dev-bind / / bwrap"
|
||||||
--dev /dev \
|
|
||||||
--dev-bind-try /dev/dri /dev/dri \
|
# add_command 函数定义
|
||||||
--proc /proc \
|
function add_command() {
|
||||||
--dev-bind /sys /sys \
|
# 参数拼接,考虑到转义和空格的处理
|
||||||
--dev-bind /run /run \
|
for arg in "$@"; do
|
||||||
--dev-bind-try /run/user/$uid/pulse /run/user/$uid/pulse \
|
EXEC_COMMAND="${EXEC_COMMAND} ${arg}"
|
||||||
--dev-bind / /host \
|
done
|
||||||
--ro-bind-try /usr/share/themes /usr/local/share/themes \
|
}
|
||||||
--ro-bind-try /usr/share/icons /usr/local/share/icons \
|
|
||||||
--ro-bind-try /usr/share/fonts /usr/local/share/fonts \
|
function add_env_var() {
|
||||||
--hostname Amber-CE-Bookworm \
|
local var_name="${1}"
|
||||||
--unshare-uts \
|
local var_value="${2}"
|
||||||
--dev-bind-try /etc/resolv.conf /etc/resolv.conf \
|
if [ "$var_value" != "" ]; then
|
||||||
--dev-bind-try /home /home \
|
add_command "--setenv $var_name $var_value"
|
||||||
/usr/bin/bwrap "$@"
|
|
||||||
|
fi
|
||||||
|
}
|
||||||
|
##########合成bwrap 2. 特殊需求函数配置段
|
||||||
|
function cursor_theme_dir_integration() {
|
||||||
|
|
||||||
|
local directory=""
|
||||||
|
if [ "$(id -u)" = "0" ]; then #####We don't want bother root to install themes,but will try to fix the unwriteable issue
|
||||||
|
mkdir -p $chrootEnvPath/usr/share/icons
|
||||||
|
chmod 777 -R $chrootEnvPath/usr/share/icons
|
||||||
|
return
|
||||||
|
fi
|
||||||
|
|
||||||
|
for directory in "/usr/share/icons"/*; do
|
||||||
|
# 检查是否为目录
|
||||||
|
if [ -d "$directory" ]; then
|
||||||
|
# 检查目录中是否存在 cursors 文件
|
||||||
|
if [ -d "$directory/cursors" ]; then
|
||||||
|
if [ -w $chrootEnvPath/usr/share/icons ];then
|
||||||
|
add_command "--ro-bind-try $directory $directory"
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
done
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
}
|
||||||
|
##########合成bwrap 3. 环境变量和目录绑定配置段
|
||||||
|
# 添加环境变量和其他初始设置
|
||||||
|
ENV_VARS=(
|
||||||
|
"LANG $LANG"
|
||||||
|
"LC_COLLATE $LC_COLLATE"
|
||||||
|
"LC_CTYPE $LC_CTYPE"
|
||||||
|
"LC_MONETARY $LC_MONETARY"
|
||||||
|
"LC_MESSAGES $LC_MESSAGES"
|
||||||
|
"LC_NUMERIC $LC_NUMERIC"
|
||||||
|
"LC_TIME $LC_TIME"
|
||||||
|
"LC_ALL $LC_ALL"
|
||||||
|
"PULSE_SERVER /run/user/\$uid/pulse/native"
|
||||||
|
"PATH /flamescion-container-tools/bin-override:\$PATH"
|
||||||
|
"IS_ACE_ENV 1"
|
||||||
|
)
|
||||||
|
|
||||||
|
BIND_DIRS=(
|
||||||
|
"--dev-bind $chrootEnvPath/ /"
|
||||||
|
"--dev-bind-try /media /media"
|
||||||
|
"--dev-bind-try /tmp /tmp"
|
||||||
|
"--dev /dev"
|
||||||
|
"--dev-bind-try /dev/dri /dev/dri"
|
||||||
|
"--proc /proc"
|
||||||
|
"--dev-bind /sys /sys"
|
||||||
|
"--dev-bind /run /run"
|
||||||
|
"--dev-bind-try /run/user/\$uid/pulse /run/user/\$uid/pulse"
|
||||||
|
"--dev-bind / /host"
|
||||||
|
"--ro-bind-try /usr/share/themes /usr/local/share/themes"
|
||||||
|
"--ro-bind-try /usr/share/icons /usr/local/share/icons"
|
||||||
|
"--ro-bind-try /usr/share/fonts /usr/local/share/fonts"
|
||||||
|
"--ro-bind-try $(realpath /etc/localtime) /etc/localtime"
|
||||||
|
"--dev-bind-try /etc/resolv.conf /etc/resolv.conf"
|
||||||
|
"--dev-bind-try /home /home"
|
||||||
|
|
||||||
|
)
|
||||||
|
EXTRA_ARGS=(
|
||||||
|
"--hostname Amber-CE-Bookworm"
|
||||||
|
"--unshare-uts"
|
||||||
|
# "--cap-add CAP_SYS_ADMIN"
|
||||||
|
)
|
||||||
|
|
||||||
|
EXTRA_SCRIPTS=(
|
||||||
|
cursor_theme_dir_integration
|
||||||
|
)
|
||||||
|
|
||||||
|
##########合成bwrap 4. 合成并执行指令
|
||||||
|
# 逐一添加到 EXEC_COMMAND
|
||||||
|
for var in "${ENV_VARS[@]}"; do
|
||||||
|
add_env_var $var
|
||||||
|
done
|
||||||
|
|
||||||
|
for var in "${BIND_DIRS[@]}"; do
|
||||||
|
add_command "$var"
|
||||||
|
done
|
||||||
|
|
||||||
|
for var in "${EXTRA_ARGS[@]}"; do
|
||||||
|
add_command "$var"
|
||||||
|
done
|
||||||
|
|
||||||
|
for var in "${EXTRA_SCRIPTS[@]}"; do
|
||||||
|
$var
|
||||||
|
done
|
||||||
|
|
||||||
|
# 添加最终的 bash 命令
|
||||||
|
add_command "bash -c \"/usr/bin/bwrap ${container_command}\""
|
||||||
|
|
||||||
|
# 输出完整的 EXEC_COMMAND 以查看
|
||||||
|
# echo "${EXEC_COMMAND}"
|
||||||
|
|
||||||
|
# 注意: 实际执行时,请确保所有变量(如 $uid, $chrootEnvPath 等)都已正确定义
|
||||||
|
eval ${EXEC_COMMAND}
|
||||||
|
|
||||||
|
|
||||||
|
|||||||
@@ -1,78 +0,0 @@
|
|||||||
#!/bin/bash
|
|
||||||
if [ "$(id -u)" != "0" ]; then
|
|
||||||
echo "当前用户不是 root 用户,退出"
|
|
||||||
exit
|
|
||||||
fi
|
|
||||||
|
|
||||||
curdir=`realpath $0`
|
|
||||||
parent_dir=`dirname $curdir`
|
|
||||||
pparent_dir=`dirname $parent_dir`
|
|
||||||
ppparent_dir=`dirname $pparent_dir`
|
|
||||||
PKGNAME=`basename $ppparent_dir`
|
|
||||||
export PACKAGE_NAME=$PKGNAME
|
|
||||||
chrootEnvPath=/opt/apps/$PKGNAME/files/bookworm-env
|
|
||||||
|
|
||||||
|
|
||||||
if [ ! -e $chrootEnvPath/finish.flag ];then
|
|
||||||
|
|
||||||
if [ "$(id -u)" = "0" ]; then
|
|
||||||
`dirname $chrootEnvPath`/bin/bookworm-init
|
|
||||||
else
|
|
||||||
pkexec `dirname $chrootEnvPath`/bin/bookworm-init
|
|
||||||
fi
|
|
||||||
|
|
||||||
|
|
||||||
fi
|
|
||||||
non_root_user=$(who | awk '{print $1}' | head -n 1)
|
|
||||||
uid=$(id -u $non_root_user)
|
|
||||||
|
|
||||||
|
|
||||||
#### This part is for args pharm
|
|
||||||
if [ "$1" = "" ];then
|
|
||||||
container_command="bash"
|
|
||||||
else
|
|
||||||
container_command="$1"
|
|
||||||
shift
|
|
||||||
for arg in "$@"; do
|
|
||||||
arg="$(echo "${arg}x" | sed 's|'\''|'\'\\\\\'\''|g')"
|
|
||||||
arg="${arg%x}"
|
|
||||||
container_command="${container_command} '${arg}'"
|
|
||||||
done
|
|
||||||
fi
|
|
||||||
|
|
||||||
|
|
||||||
bwrap --dev-bind / / \
|
|
||||||
bwrap \
|
|
||||||
--setenv LANG "$LANG" \
|
|
||||||
--setenv LC_COLLATE "$LC_COLLATE" \
|
|
||||||
--setenv LC_CTYPE "$LC_CTYPE" \
|
|
||||||
--setenv LC_MONETARY "$LC_MONETARY" \
|
|
||||||
--setenv LC_MESSAGES "$LC_MESSAGES" \
|
|
||||||
--setenv LC_NUMERIC "$LC_NUMERIC" \
|
|
||||||
--setenv LC_TIME "$LC_TIME" \
|
|
||||||
--setenv LC_ALL "$LC_ALL" \
|
|
||||||
--setenv PULSE_SERVER /run/user/$uid/pulse/native \
|
|
||||||
--setenv PATH /flamescion-container-tools/bin-override:$PATH \
|
|
||||||
--setenv IS_ACE_ENV "1" \
|
|
||||||
--dev-bind $chrootEnvPath/ / \
|
|
||||||
--dev-bind-try /media /media \
|
|
||||||
--dev-bind-try /tmp /tmp \
|
|
||||||
--dev /dev \
|
|
||||||
--dev-bind-try /dev/dri /dev/dri \
|
|
||||||
--proc /proc \
|
|
||||||
--dev-bind /sys /sys \
|
|
||||||
--dev-bind /run /run \
|
|
||||||
--dev-bind-try /run/user/$uid/pulse /run/user/$uid/pulse \
|
|
||||||
--dev-bind / /host \
|
|
||||||
--bind-try /usr/share/themes /usr/local/share/themes \
|
|
||||||
--bind-try /usr/share/icons /usr/local/share/icons \
|
|
||||||
--bind-try /usr/share/fonts /usr/local/share/fonts \
|
|
||||||
--hostname Amber-CE-Bookworm \
|
|
||||||
--unshare-uts \
|
|
||||||
--dev-bind-try /etc/resolv.conf /etc/resolv.conf \
|
|
||||||
--cap-add CAP_SYS_ADMIN \
|
|
||||||
--dev-bind-try /home /home \
|
|
||||||
bash -c "${container_command}"
|
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
@@ -0,0 +1,245 @@
|
|||||||
|
#!/bin/bash
|
||||||
|
if [ "$IS_ACE_ENV" != "1" ];then
|
||||||
|
echo "ONLY RUN ME IN ACE"
|
||||||
|
exit
|
||||||
|
fi
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
printf "ACE: Setting up sudo...\n"
|
||||||
|
mkdir -p /etc/sudoers.d
|
||||||
|
# Do not check fqdn when doing sudo, it will not work anyways
|
||||||
|
if ! grep -q 'Defaults !fqdn' /etc/sudoers.d/sudoers; then
|
||||||
|
printf "Defaults !fqdn\n" >> /etc/sudoers.d/sudoers
|
||||||
|
fi
|
||||||
|
# Ensure passwordless sudo is set up for user
|
||||||
|
if ! grep -q "\"${container_user_name}\" ALL = (root) NOPASSWD:ALL" /etc/sudoers.d/sudoers; then
|
||||||
|
printf "\"%s\" ALL = (root) NOPASSWD:ALL\n" "${container_user_name}" >> /etc/sudoers.d/sudoers
|
||||||
|
fi
|
||||||
|
|
||||||
|
|
||||||
|
printf "ACE: Setting up groups...\n"
|
||||||
|
# If not existing, ensure we have a group for our user.
|
||||||
|
if ! grep -q "^${container_user_name}:" /etc/group; then
|
||||||
|
if ! groupadd --force --gid "${container_user_gid}" "${container_user_name}"; then
|
||||||
|
# It may occur that we have users with unsupported user name (eg. on LDAP or AD)
|
||||||
|
# So let's try and force the group creation this way.
|
||||||
|
printf "%s:x:%s:" "${container_user_name}" "${container_user_gid}" >> /etc/group
|
||||||
|
fi
|
||||||
|
fi
|
||||||
|
|
||||||
|
printf "ACE: Setting up users...\n"
|
||||||
|
|
||||||
|
# Setup kerberos integration with the host
|
||||||
|
if [ -d "/run/host/var/kerberos" ] &&
|
||||||
|
[ -d "/etc/krb5.conf.d" ] &&
|
||||||
|
[ ! -e "/etc/krb5.conf.d/kcm_default_ccache" ]; then
|
||||||
|
|
||||||
|
cat << EOF > "/etc/krb5.conf.d/kcm_default_ccache"
|
||||||
|
# # To disable the KCM credential cache, comment out the following lines.
|
||||||
|
[libdefaults]
|
||||||
|
default_ccache_name = KCM:
|
||||||
|
EOF
|
||||||
|
fi
|
||||||
|
|
||||||
|
# If we have sudo/wheel groups, let's add the user to them.
|
||||||
|
additional_groups=""
|
||||||
|
if grep -q "^sudo" /etc/group; then
|
||||||
|
additional_groups="sudo"
|
||||||
|
elif grep -q "^wheel" /etc/group; then
|
||||||
|
additional_groups="wheel"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# Let's add our user to the container. if the user already exists, enforce properties.
|
||||||
|
#
|
||||||
|
# In case of AD or LDAP usernames, it is possible we will have a backslach in the name.
|
||||||
|
# In that case grep would fail, so we replace the backslash with a point to make the regex work.
|
||||||
|
# shellcheck disable=SC1003
|
||||||
|
if ! grep -q "^$(printf '%s' "${container_user_name}" | tr '\\' '.'):" /etc/passwd &&
|
||||||
|
! grep -q "^.*:.*:${container_user_uid}:" /etc/passwd; then
|
||||||
|
if ! useradd \
|
||||||
|
--home-dir "${container_user_home}" \
|
||||||
|
--no-create-home \
|
||||||
|
--groups "${additional_groups}" \
|
||||||
|
--shell "${SHELL:-"/bin/bash"}" \
|
||||||
|
--uid "${container_user_uid}" \
|
||||||
|
--gid "${container_user_gid}" \
|
||||||
|
"${container_user_name}"; then
|
||||||
|
|
||||||
|
printf "Warning: there was a problem setting up the user\n"
|
||||||
|
printf "Warning: trying manual addition\n"
|
||||||
|
printf "%s:x:%s:%s:%s:%s:%s" \
|
||||||
|
"${container_user_name}" "${container_user_uid}" \
|
||||||
|
"${container_user_gid}" "${container_user_name}" \
|
||||||
|
"${container_user_home}" "${SHELL:-"/bin/bash"}" >> /etc/passwd
|
||||||
|
printf "%s::1::::::" "${container_user_name}" >> /etc/shadow
|
||||||
|
fi
|
||||||
|
# Ensure we're not using the specified SHELL. Run it only once, so that future
|
||||||
|
# user's preferences are not overwritten at each start.
|
||||||
|
elif [ ! -e /etc/passwd.done ]; then
|
||||||
|
# This situation is presented when podman or docker already creates the user
|
||||||
|
# for us inside container. We should modify the user's prepopulated shadowfile
|
||||||
|
# entry though as per user's active preferences.
|
||||||
|
|
||||||
|
# If the user was there with a different username, get that username so
|
||||||
|
# we can modify it
|
||||||
|
if ! grep -q "^$(printf '%s' "${container_user_name}" | tr '\\' '.'):" /etc/passwd; then
|
||||||
|
user_to_modify=$(getent passwd "${container_user_uid}" | cut -d: -f1)
|
||||||
|
fi
|
||||||
|
|
||||||
|
if ! usermod \
|
||||||
|
--home "${container_user_home}" \
|
||||||
|
--shell "${SHELL:-"/bin/bash"}" \
|
||||||
|
--groups "${additional_groups}" \
|
||||||
|
--uid "${container_user_uid}" \
|
||||||
|
--gid "${container_user_gid}" \
|
||||||
|
--login "${container_user_name}" \
|
||||||
|
"${user_to_modify:-"${container_user_name}"}"; then
|
||||||
|
|
||||||
|
printf "Warning: there was a problem setting up the user\n"
|
||||||
|
fi
|
||||||
|
touch /etc/passwd.done
|
||||||
|
fi
|
||||||
|
|
||||||
|
# We generate a random password to initialize the entry for the user and root.
|
||||||
|
temporary_password="$(cat /proc/sys/kernel/random/uuid)"
|
||||||
|
printf "%s\n%s\n" "${temporary_password}" "${temporary_password}" | passwd root
|
||||||
|
printf "%s:%s" "${container_user_name}" "${temporary_password}" | chpasswd -e
|
||||||
|
# Delete password for root and user
|
||||||
|
printf "%s:" "root" | chpasswd -e
|
||||||
|
printf "%s:" "${container_user_name}" | chpasswd -e
|
||||||
|
|
||||||
|
mkdir -p /usr/share/fonts
|
||||||
|
mkdir -p /usr/share/icons
|
||||||
|
mkdir -p /usr/share/themes
|
||||||
|
|
||||||
|
## init host-spawn
|
||||||
|
unlink /flamescion-container-tools/bin-override/host-spawn
|
||||||
|
ln -sfv /flamescion-container-tools/bin-override/host-spawn-$(uname -m) /flamescion-container-tools/bin-override/host-spawn
|
||||||
|
|
||||||
|
## install host-integration
|
||||||
|
|
||||||
|
apt install --reinstall /flamescion-container-tools/ace-host-integration.deb
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
### Do NVIDIA Integration
|
||||||
|
|
||||||
|
echo "ACE: NVIDIA Integration"
|
||||||
|
|
||||||
|
ensureTargetDir() {
|
||||||
|
targetFile=$1
|
||||||
|
t=$(dirname "$targetFile")
|
||||||
|
mkdir -p "$t"
|
||||||
|
}
|
||||||
|
|
||||||
|
|
||||||
|
lib32_dir="/usr/lib/"
|
||||||
|
lib64_dir="/usr/lib/"
|
||||||
|
if [ -e "/usr/lib/x86_64-linux-gnu" ]; then
|
||||||
|
lib64_dir="/usr/lib/x86_64-linux-gnu/"
|
||||||
|
elif [ -e "/usr/lib64" ]; then
|
||||||
|
lib64_dir="/usr/lib64/"
|
||||||
|
fi
|
||||||
|
if [ -e "/usr/lib/i386-linux-gnu" ]; then
|
||||||
|
lib32_dir="/usr/lib/i386-linux-gnu/"
|
||||||
|
elif [ -e "/usr/lib32" ]; then
|
||||||
|
lib32_dir="/usr/lib32/"
|
||||||
|
fi
|
||||||
|
|
||||||
|
# First we find all non-lib files we need, this includes
|
||||||
|
# - binaries
|
||||||
|
# - confs
|
||||||
|
# - egl files
|
||||||
|
# - icd files
|
||||||
|
# Excluding here the libs, we will threat them later specifically
|
||||||
|
NVIDIA_FILES="$(find /host/etc/ /host/usr/ \
|
||||||
|
-path "/host/usr/lib/i386-linux-gnu/*" -prune -o \
|
||||||
|
-path "/host/usr/lib/x86_64-linux-gnu/*" -prune -o \
|
||||||
|
-path "/host/usr/lib32/*" -prune -o \
|
||||||
|
-path "/host/usr/lib64/*" -prune -o \
|
||||||
|
-iname "*nvidia*" -not -type d -print 2> /dev/null || :)"
|
||||||
|
for nvidia_file in ${NVIDIA_FILES}; do
|
||||||
|
dest_file="$(printf "%s" "${nvidia_file}" | sed 's|/host||g')"
|
||||||
|
ensureTargetDir ${dest_file}
|
||||||
|
cp -r "${nvidia_file}" "${dest_file}"
|
||||||
|
done
|
||||||
|
|
||||||
|
# Then we find all directories with nvidia in the name and just mount them
|
||||||
|
NVIDIA_DIRS="$(find /host/etc /host/usr -iname "*nvidia*" -type d 2> /dev/null || :)"
|
||||||
|
for nvidia_dir in ${NVIDIA_DIRS}; do
|
||||||
|
# /usr/lib64 is common in Arch or RPM based distros, while /usr/lib/x86_64-linux-gnu is
|
||||||
|
# common on Debian derivatives, so we need to adapt between the two nomenclatures.
|
||||||
|
if printf "%s" "${nvidia_dir}" | grep -Eq "lib32|lib64|x86_64-linux-gnu|i386-linux-gnu"; then
|
||||||
|
|
||||||
|
# Remove origin so we plug our own
|
||||||
|
dest_dir="$(printf "%s" "${nvidia_dir}" |
|
||||||
|
sed "s|/host/usr/lib/x86_64-linux-gnu/|${lib64_dir}|g" |
|
||||||
|
sed "s|/host/usr/lib/i386-linux-gnu/|${lib32_dir}|g" |
|
||||||
|
sed "s|/host/usr/lib64/|${lib64_dir}|g" |
|
||||||
|
sed "s|/host/usr/lib32/|${lib32_dir}|g")"
|
||||||
|
else
|
||||||
|
dest_dir="$(printf "%s" "${nvidia_dir}" | sed 's|/host||g')"
|
||||||
|
fi
|
||||||
|
ensureTargetDir ${dest_file}
|
||||||
|
cp -r "${nvidia_dir}" "${dest_file}"
|
||||||
|
done
|
||||||
|
|
||||||
|
# Then we find all the ".so" libraries, there are searched separately
|
||||||
|
# because we need to extract the relative path to mount them in the
|
||||||
|
# correct path based on the guest's setup
|
||||||
|
#
|
||||||
|
# /usr/lib64 is common in Arch or RPM based distros, while /usr/lib/x86_64-linux-gnu is
|
||||||
|
# common on Debian derivatives, so we need to adapt between the two nomenclatures.
|
||||||
|
NVIDIA_LIBS="$(find \
|
||||||
|
/host/usr/lib/i386-linux-gnu/ \
|
||||||
|
/host/usr/lib/x86_64-linux-gnu/ \
|
||||||
|
/host/usr/lib32/ \
|
||||||
|
/host/usr/lib64/ \
|
||||||
|
-iname "*nvidia*.so*" \
|
||||||
|
-o -iname "libcuda*.so*" \
|
||||||
|
-o -iname "libnvcuvid*.so*" \
|
||||||
|
-o -iname "libnvoptix*.so*" 2> /dev/null || :)"
|
||||||
|
for nvidia_lib in ${NVIDIA_LIBS}; do
|
||||||
|
dest_file="$(printf "%s" "${nvidia_lib}" |
|
||||||
|
sed "s|/host/usr/lib/x86_64-linux-gnu/|${lib64_dir}|g" |
|
||||||
|
sed "s|/host/usr/lib/i386-linux-gnu/|${lib32_dir}|g" |
|
||||||
|
sed "s|/host/usr/lib64/|${lib64_dir}|g" |
|
||||||
|
sed "s|/host/usr/lib32/|${lib32_dir}|g")"
|
||||||
|
|
||||||
|
# If file exists, just continue
|
||||||
|
# this may happen for directories like /usr/lib/nvidia/xorg/foo.so
|
||||||
|
# where the directory is already bind mounted (ro) and we don't need
|
||||||
|
# to mount further files in it.
|
||||||
|
if [ -e "${dest_file}" ]; then
|
||||||
|
continue
|
||||||
|
fi
|
||||||
|
|
||||||
|
type="file"
|
||||||
|
if [ -L "${nvidia_lib}" ]; then
|
||||||
|
type="link"
|
||||||
|
fi
|
||||||
|
|
||||||
|
if [ "${type}" = "link" ]; then
|
||||||
|
mkdir -p "$(dirname "${dest_file}")"
|
||||||
|
cp -d "${nvidia_lib}" "${dest_file}"
|
||||||
|
continue
|
||||||
|
fi
|
||||||
|
ensureTargetDir ${dest_file}
|
||||||
|
cp -r "${nvidia_lib}" "${dest_file}"
|
||||||
|
|
||||||
|
done
|
||||||
|
|
||||||
|
# Refresh ldconfig cache, also detect if there are empty files remaining
|
||||||
|
# and clean them.
|
||||||
|
# This could happen when upgrading drivers and changing versions.
|
||||||
|
empty_libs="$(ldconfig 2>&1 | grep -Eo "File.*is empty" | cut -d' ' -f2)"
|
||||||
|
if [ -n "${empty_libs}" ]; then
|
||||||
|
# shellcheck disable=SC2086
|
||||||
|
find ${empty_libs} -delete 2> /dev/null || :
|
||||||
|
find /usr/ /etc/ -empty -iname "*nvidia*" -delete 2> /dev/null || :
|
||||||
|
fi
|
||||||
|
echo "ACE: Timezone Integration"
|
||||||
|
rm /etc/localtime
|
||||||
|
cp $(realpath /host/etc/localtime) /etc/localtime
|
||||||
|
chmod 777 /etc/localtime
|
||||||
Reference in New Issue
Block a user