mirror of
https://github.com/netdata/netdata.git
synced 2025-04-11 08:21:23 +00:00

* Better support running our Docker images without root in the container. Users can override what user ID is used inside of a container when creating the container. We don’t technically properly support this, but we should also ideally not _break_ such usage either as there are legitimate use-cases for it. This moves code that will only work when run as root inside the container inside a conditional in our entrypoint script so that it doesn’t break things otherwise. * Update Docker documentation. * Include all group manipulations in the EUID == 0 case.
123 lines
4.8 KiB
Bash
Executable file
123 lines
4.8 KiB
Bash
Executable file
#!/usr/bin/env bash
|
||
#
|
||
# Entry point script for netdata
|
||
#
|
||
# Copyright: 2018 and later Netdata Inc.
|
||
# SPDX-License-Identifier: GPL-3.0-or-later
|
||
#
|
||
# Author : Pavlos Emm. Katsoulakis <paul@netdata.cloud>
|
||
# Author : Austin S. Hemmelgarn <austin@netdata.cloud>
|
||
set -e
|
||
|
||
if [ ! -w / ] && [ "${EUID}" -eq 0 ]; then
|
||
echo >&2 "WARNING: This Docker host appears to not properly support newer stat system calls. This is known to cause issues with Netdata (most notably, nodes running on such hosts **cannot be claimed**)."
|
||
echo >&2 "WARNING: For more information, see https://learn.netdata.cloud/docs/agent/claim#known-issues-on-older-hosts-with-seccomp-enabled"
|
||
fi
|
||
|
||
# Needed to read Proxmox VMs and (LXC) containers configuration files (name resolution + CPU and memory limits)
|
||
function add_netdata_to_proxmox_conf_files_group() {
|
||
group_guid="$(stat -c %g /host/etc/pve 2>/dev/null || true)"
|
||
[ -z "${group_guid}" ] && return
|
||
|
||
if ! getent group "${group_guid}" >/dev/null; then
|
||
echo "Creating proxmox-etc-pve group with GID ${group_guid}"
|
||
if ! addgroup -g "${group_guid}" "proxmox-etc-pve"; then
|
||
echo >&2 "Failed to add group proxmox-etc-pve with GID ${group_guid}."
|
||
return
|
||
fi
|
||
fi
|
||
|
||
if ! getent group "${group_guid}" | grep -q netdata; then
|
||
echo "Assign netdata user to group ${group_guid}"
|
||
if ! usermod -a -G "${group_guid}" "${DOCKER_USR}"; then
|
||
echo >&2 "Failed to add netdata user to group with GID ${group_guid}."
|
||
return
|
||
fi
|
||
fi
|
||
}
|
||
|
||
if [ ! "${DISABLE_TELEMETRY:-0}" -eq 0 ] ||
|
||
[ -n "$DISABLE_TELEMETRY" ] ||
|
||
[ ! "${DO_NOT_TRACK:-0}" -eq 0 ] ||
|
||
[ -n "$DO_NOT_TRACK" ]; then
|
||
touch /etc/netdata/.opt-out-from-anonymous-statistics
|
||
fi
|
||
|
||
chmod o+rX / 2>/dev/null || echo "Unable to change permissions without errors."
|
||
|
||
if [ "${EUID}" -eq 0 ]; then
|
||
if [ -n "${NETDATA_EXTRA_APK_PACKAGES}" ]; then
|
||
echo >&2 "WARNING: Netdata’s Docker images have switched from Alpine to Debian as a base platform. Supplementary package support is now handled through the NETDATA_EXTRA_DEB_PACKAGES variable instead of NETDATA_EXTRA_APK_PACKAGES."
|
||
echo >&2 "WARNING: The container will still run, but supplementary packages listed in NETDATA_EXTRA_APK_PACKAGES will not be installed."
|
||
echo >&2 "WARNING: To remove these messages, either undefine NETDATA_EXTRA_APK_PACKAGES, or define it to an empty string."
|
||
fi
|
||
|
||
if [ -n "${NETDATA_EXTRA_DEB_PACKAGES}" ]; then
|
||
echo "Fetching APT repository metadata."
|
||
if ! apt-get update; then
|
||
echo "Failed to fetch APT repository metadata."
|
||
else
|
||
echo "Installing supplementary packages."
|
||
export DEBIAN_FRONTEND="noninteractive"
|
||
# shellcheck disable=SC2086
|
||
if ! apt-get install -y --no-install-recommends ${NETDATA_EXTRA_DEB_PACKAGES}; then
|
||
echo "Failed to install supplementary packages."
|
||
fi
|
||
fi
|
||
fi
|
||
|
||
BALENA_PGID=$(stat -c %g /var/run/balena.sock 2>/dev/null || true)
|
||
DOCKER_PGID=$(stat -c %g /var/run/docker.sock 2>/dev/null || true)
|
||
|
||
re='^[0-9]+$'
|
||
if [[ $BALENA_PGID =~ $re ]]; then
|
||
echo "Netdata detected balena-engine.sock"
|
||
DOCKER_HOST='/var/run/balena-engine.sock'
|
||
PGID="$BALENA_PGID"
|
||
elif [[ $DOCKER_PGID =~ $re ]]; then
|
||
echo "Netdata detected docker.sock"
|
||
DOCKER_HOST="/var/run/docker.sock"
|
||
PGID="$DOCKER_PGID"
|
||
fi
|
||
export PGID
|
||
export DOCKER_HOST
|
||
|
||
if [ -n "${PGID}" ]; then
|
||
echo "Creating docker group ${PGID}"
|
||
addgroup --gid "${PGID}" "docker" || echo >&2 "Could not add group docker with ID ${PGID}, its already there probably"
|
||
echo "Assign netdata user to docker group ${PGID}"
|
||
usermod --append --groups "docker" "${DOCKER_USR}" || echo >&2 "Could not add netdata user to group docker with ID ${PGID}"
|
||
fi
|
||
|
||
if [ -d "/host/etc/pve" ]; then
|
||
add_netdata_to_proxmox_conf_files_group || true
|
||
fi
|
||
else
|
||
echo >&2 "WARNING: Entrypoint started as non-root user. This is not officially supported and some features may not be available."
|
||
fi
|
||
|
||
if mountpoint -q /etc/netdata; then
|
||
echo "Copying stock configuration to /etc/netdata"
|
||
cp -an /etc/netdata.stock/* /etc/netdata
|
||
cp -an /etc/netdata.stock/.[^.]* /etc/netdata
|
||
fi
|
||
|
||
if [ -w "/etc/netdata" ]; then
|
||
if mountpoint -q /etc/netdata; then
|
||
hostname >/etc/netdata/.container-hostname
|
||
else
|
||
rm -f /etc/netdata/.container-hostname
|
||
fi
|
||
fi
|
||
|
||
if [ -n "${NETDATA_CLAIM_URL}" ] && [ -n "${NETDATA_CLAIM_TOKEN}" ] && [ ! -f /var/lib/netdata/cloud.d/claimed_id ]; then
|
||
# shellcheck disable=SC2086
|
||
/usr/sbin/netdata-claim.sh -token="${NETDATA_CLAIM_TOKEN}" \
|
||
-url="${NETDATA_CLAIM_URL}" \
|
||
${NETDATA_CLAIM_ROOMS:+-rooms="${NETDATA_CLAIM_ROOMS}"} \
|
||
${NETDATA_CLAIM_PROXY:+-proxy="${NETDATA_CLAIM_PROXY}"} \
|
||
${NETDATA_EXTRA_CLAIM_OPTS} \
|
||
-daemon-not-running
|
||
fi
|
||
|
||
exec /usr/sbin/netdata -u "${DOCKER_USR}" -D -s /host -p "${NETDATA_LISTENER_PORT}" "$@"
|