#!/bin/bash # Copyright (c) Jupyter Development Team. # Distributed under the terms of the Modified BSD License. set -e # Exec the specified command or fall back on bash if [ $# -eq 0 ]; then cmd=bash else cmd=$* fi for f in /usr/local/bin/start-notebook.d/*; do case "$f" in *.sh) echo "$0: running $f"; . "$f" ;; *) if [ -x $f ]; then echo "$0: running $f" $f else echo "$0: ignoring $f" fi ;; esac echo done # Handle special flags if we're root if [ $(id -u) == 0 ] ; then # Only attempt to change the jovyan username if it exists if id jovyan &> /dev/null ; then echo "Set username to: $NB_USER" usermod -d /home/$NB_USER -l $NB_USER jovyan fi # Handle case where provisioned storage does not have the correct permissions by default # Ex: default NFS/EFS (no auto-uid/gid) if [[ "$CHOWN_HOME" == "1" || "$CHOWN_HOME" == 'yes' ]]; then echo "Changing ownership of /home/$NB_USER to $NB_UID:$NB_GID" chown $CHOWN_HOME_OPTS $NB_UID:$NB_GID /home/$NB_USER fi if [ ! -z "$CHOWN_EXTRA" ]; then for extra_dir in $(echo $CHOWN_EXTRA | tr ',' ' '); do chown $CHOWN_EXTRA_OPTS $NB_UID:$NB_GID $extra_dir done fi # handle home and working directory if the username changed if [[ "$NB_USER" != "jovyan" ]]; then # changing username, make sure homedir exists # (it could be mounted, and we shouldn't create it if it already exists) if [[ ! -e "/home/$NB_USER" ]]; then echo "Relocating home dir to /home/$NB_USER" mv /home/jovyan "/home/$NB_USER" fi # if workdir is in /home/jovyan, cd to /home/$NB_USER if [[ "$PWD/" == "/home/jovyan/"* ]]; then newcwd="/home/$NB_USER/${PWD:13}" echo "Setting CWD to $newcwd" cd "$newcwd" fi fi # Change UID of NB_USER to NB_UID if it does not match if [ "$NB_UID" != $(id -u $NB_USER) ] ; then echo "Set $NB_USER UID to: $NB_UID" usermod -u $NB_UID $NB_USER fi # Change GID of NB_USER to NB_GID if it does not match if [ "$NB_GID" != $(id -g $NB_USER) ] ; then echo "Set $NB_USER GID to: $NB_GID" groupmod -g $NB_GID -o $(id -g -n $NB_USER) fi # Enable sudo if requested if [[ "$GRANT_SUDO" == "1" || "$GRANT_SUDO" == 'yes' ]]; then echo "Granting $NB_USER sudo access and appending $CONDA_DIR/bin to sudo PATH" echo "$NB_USER ALL=(ALL) NOPASSWD:ALL" > /etc/sudoers.d/notebook fi # Add $CONDA_DIR/bin to sudo secure_path sed -r "s#Defaults\s+secure_path=\"([^\"]+)\"#Defaults secure_path=\"\1:$CONDA_DIR/bin\"#" /etc/sudoers | grep secure_path > /etc/sudoers.d/path # Exec the command as NB_USER with the PATH and the rest of # the environment preserved echo "Executing the command: $cmd" exec sudo -E -H -u $NB_USER PATH=$PATH PYTHONPATH=$PYTHONPATH $cmd else if [[ "$NB_UID" == "$(id -u jovyan)" && "$NB_GID" == "$(id -g jovyan)" ]]; then # User is not attempting to override user/group via environment # variables, but they could still have overridden the uid/gid that # container runs as. Check that the user has an entry in the passwd # file and if not add an entry. Also add a group file entry if the # uid has its own distinct group but there is no entry. whoami &> /dev/null || STATUS=$? && true if [[ "$STATUS" != "0" ]]; then if [[ -w /etc/passwd ]]; then echo "Adding passwd file entry for $(id -u)" cat /etc/passwd | sed -e "s/^jovyan:/nayvoj:/" > /tmp/passwd echo "jovyan:x:$(id -u):$(id -g):,,,:/home/jovyan:/bin/bash" >> /tmp/passwd cat /tmp/passwd > /etc/passwd rm /tmp/passwd id -G -n 2>/dev/null | grep -q -w $(id -u) || STATUS=$? && true if [[ "$STATUS" != "0" && "$(id -g)" == "0" ]]; then echo "Adding group file entry for $(id -u)" echo "jovyan:x:$(id -u):" >> /etc/group fi else echo 'Container must be run with group root to update passwd file' fi fi # Warn if the user isn't going to be able to write files to $HOME. if [[ ! -w /home/jovyan ]]; then echo 'Container must be run with group users to update files' fi else # Warn if looks like user want to override uid/gid but hasn't # run the container as root. if [[ ! -z "$NB_UID" && "$NB_UID" != "$(id -u)" ]]; then echo 'Container must be run as root to set $NB_UID' fi if [[ ! -z "$NB_GID" && "$NB_GID" != "$(id -g)" ]]; then echo 'Container must be run as root to set $NB_GID' fi fi # Warn if looks like user want to run in sudo mode but hasn't run # the container as root. if [[ "$GRANT_SUDO" == "1" || "$GRANT_SUDO" == 'yes' ]]; then echo 'Container must be run as root to grant sudo permissions' fi # Execute the command echo "Executing the command: $cmd" exec $cmd fi