mirror of
https://github.com/linuxserver/docker-mods.git
synced 2026-01-20 04:11:49 +08:00
519 lines
23 KiB
Plaintext
Executable File
519 lines
23 KiB
Plaintext
Executable File
#!/command/with-contenv bash
|
|
# shellcheck shell=bash
|
|
|
|
# Use /command/with-contenv shebang because /usr/bin/with-contenv is created in this script
|
|
|
|
# Version 3
|
|
# 2022-09-25 - Initial Release
|
|
# 2024-04-13 - Let lsiown ignore broken symlinks (requires gnu find)
|
|
MOD_SCRIPT_VER="3.20240413"
|
|
|
|
# Define custom folder paths
|
|
SCRIPTS_DIR="/custom-cont-init.d"
|
|
SERVICES_DIR="/custom-services.d"
|
|
|
|
if [[ ${DOCKER_MODS_DEBUG_CURL,,} = "true" ]]; then
|
|
CURL_NOISE_LEVEL="-v"
|
|
else
|
|
CURL_NOISE_LEVEL="--silent"
|
|
fi
|
|
|
|
# Set executable bit on cont-init and services built into the image
|
|
set_legacy_executable_bits() {
|
|
mkdir -p /etc/{cont-init.d,services.d}
|
|
chmod +x \
|
|
/etc/cont-init.d/* \
|
|
/etc/services.d/*/* 2>/dev/null || true
|
|
}
|
|
|
|
tamper_check() {
|
|
# Tamper check custom service locations
|
|
if [[ -d "${SERVICES_DIR}" ]] && [[ -n "$(find ${SERVICES_DIR}/* ! -user root 2>/dev/null)" ]]; then
|
|
echo "╔═════════════════════════════════════════════════════════════════════════╗
|
|
║ ║
|
|
║ Some of the contents of the folder ${SERVICES_DIR} ║
|
|
║ are not owned by root, which is a security risk. ║
|
|
║ ║
|
|
║ Please review the permissions of this folder and its contents to make ║
|
|
║ sure they are owned by root, and can only be modified by root. ║
|
|
║ ║
|
|
╚═════════════════════════════════════════════════════════════════════════╝"
|
|
elif [[ -d "${SERVICES_DIR}" ]] && [[ -n "$(find ${SERVICES_DIR}/* -perm -o+w 2>/dev/null)" ]]; then
|
|
echo "╔═════════════════════════════════════════════════════════════════════════╗
|
|
║ ║
|
|
║ Some of the contents of the folder ${SERVICES_DIR} ║
|
|
║ have write permissions for others, which is a security risk. ║
|
|
║ ║
|
|
║ Please review the permissions of this folder and its contents to make ║
|
|
║ sure they are owned by root, and can only be modified by root. ║
|
|
║ ║
|
|
╚═════════════════════════════════════════════════════════════════════════╝"
|
|
fi
|
|
# Tamper check custom script locations
|
|
if [[ -d "${SCRIPTS_DIR}" ]] && [[ -n "$(find ${SCRIPTS_DIR}/* ! -user root 2>/dev/null)" ]]; then
|
|
echo "╔═════════════════════════════════════════════════════════════════════════╗
|
|
║ ║
|
|
║ Some of the contents of the folder ${SCRIPTS_DIR} ║
|
|
║ are not owned by root, which is a security risk. ║
|
|
║ ║
|
|
║ Please review the permissions of this folder and its contents to make ║
|
|
║ sure they are owned by root, and can only be modified by root. ║
|
|
║ ║
|
|
╚═════════════════════════════════════════════════════════════════════════╝"
|
|
elif [[ -d "${SCRIPTS_DIR}" ]] && [[ -n "$(find ${SCRIPTS_DIR}/* -perm -o+w 2>/dev/null)" ]]; then
|
|
echo "╔═════════════════════════════════════════════════════════════════════════╗
|
|
║ ║
|
|
║ Some of the contents of the folder ${SCRIPTS_DIR} ║
|
|
║ have write permissions for others, which is a security risk. ║
|
|
║ ║
|
|
║ Please review the permissions of this folder and its contents to make ║
|
|
║ sure they are owned by root, and can only be modified by root. ║
|
|
║ ║
|
|
╚═════════════════════════════════════════════════════════════════════════╝"
|
|
fi
|
|
}
|
|
|
|
process_custom_services() {
|
|
# Remove all existing custom services before continuing to ensure
|
|
# we aren't running anything the user may have removed
|
|
if [[ -n "$(/bin/ls -A /etc/s6-overlay/s6-rc.d/custom-svc-* 2>/dev/null)" ]]; then
|
|
echo "[custom-init] removing existing custom services..."
|
|
rm -rf /etc/s6-overlay/s6-rc.d/custom-svc-*
|
|
rm /etc/s6-overlay/s6-rc.d/user/contents.d/custom-svc-*
|
|
fi
|
|
|
|
# Make sure custom service directory exists and has files in it
|
|
if [[ -e "${SERVICES_DIR}" ]] && [[ -n "$(/bin/ls -A ${SERVICES_DIR} 2>/dev/null)" ]]; then
|
|
echo "[custom-init] Service files found in ${SERVICES_DIR}"
|
|
for SERVICE in "${SERVICES_DIR}"/*; do
|
|
NAME="$(basename "${SERVICE}")"
|
|
if [[ -f "${SERVICE}" ]]; then
|
|
echo "[custom-init] ${NAME}: service detected, copying..."
|
|
mkdir -p /etc/s6-overlay/s6-rc.d/custom-svc-"${NAME}"/dependencies.d/
|
|
cp "${SERVICE}" /etc/s6-overlay/s6-rc.d/custom-svc-"${NAME}"/run
|
|
chmod +x /etc/s6-overlay/s6-rc.d/custom-svc-"${NAME}"/run
|
|
echo "longrun" >/etc/s6-overlay/s6-rc.d/custom-svc-"${NAME}"/type
|
|
touch /etc/s6-overlay/s6-rc.d/custom-svc-"${NAME}"/dependencies.d/init-services
|
|
touch /etc/s6-overlay/s6-rc.d/user/contents.d/custom-svc-"${NAME}"
|
|
echo "[custom-init] ${NAME}: copied"
|
|
elif [[ ! -f "${SERVICE}" ]]; then
|
|
echo "[custom-init] ${NAME}: is not a file"
|
|
fi
|
|
done
|
|
else
|
|
echo "[custom-init] No custom services found, skipping..."
|
|
fi
|
|
}
|
|
|
|
# Create our noisy chown alias to handle read-only/remote volumes
|
|
create_lsiown_alias() {
|
|
# intentional tabs in the heredoc
|
|
cat <<-'EOF' >/usr/bin/lsiown
|
|
#!/bin/bash
|
|
|
|
MAXDEPTH=("-maxdepth" "0")
|
|
OPTIONS=()
|
|
while getopts RcfvhHLP OPTION
|
|
do
|
|
if [[ "${OPTION}" != "?" && "${OPTION}" != "R" ]]; then
|
|
OPTIONS+=("-${OPTION}")
|
|
fi
|
|
if [[ "${OPTION}" = "R" ]]; then
|
|
MAXDEPTH=()
|
|
fi
|
|
done
|
|
|
|
shift $((OPTIND - 1))
|
|
OWNER=$1
|
|
IFS=: read -r USER GROUP <<< "${OWNER}"
|
|
if [[ -z "${GROUP}" ]]; then
|
|
printf '**** Permissions could not be set. Group is missing or incorrect, expecting user:group. ****\n'
|
|
exit 0
|
|
fi
|
|
|
|
ERROR='**** Permissions could not be set. This is probably because your volume mounts are remote or read-only. ****\n**** The app may not work properly and we will not provide support for it. ****\n'
|
|
PATH=("${@:2}")
|
|
/usr/bin/find "${PATH[@]}" "${MAXDEPTH[@]}" ! -xtype l \( ! -group "${GROUP}" -o ! -user "${USER}" \) -exec chown "${OPTIONS[@]}" "${USER}":"${GROUP}" {} + || printf "${ERROR}"
|
|
EOF
|
|
chmod +x /usr/bin/lsiown
|
|
}
|
|
|
|
# Create our with-contenv alias with umask support
|
|
create_with_contenv_alias() {
|
|
if [[ ! -f /command/with-contenv ]]; then
|
|
echo "/command/with-contenv not found, skipping alias creation"
|
|
return
|
|
fi
|
|
rm -rf /usr/bin/with-contenv
|
|
# intentional tabs in the heredoc
|
|
cat <<-EOF >/usr/bin/with-contenv
|
|
#!/bin/bash
|
|
if [[ -f /run/s6/container_environment/UMASK ]] &&
|
|
{ [[ "\$(pwdx \$\$)" =~ "/run/s6/legacy-services/" ]] ||
|
|
[[ "\$(pwdx \$\$)" =~ "/run/s6/services/" ]] ||
|
|
[[ "\$(pwdx \$\$)" =~ "/servicedirs/svc-" ]]; }; then
|
|
umask "\$(cat /run/s6/container_environment/UMASK)"
|
|
fi
|
|
exec /command/with-contenv "\$@"
|
|
EOF
|
|
chmod +x /usr/bin/with-contenv
|
|
}
|
|
|
|
# Check for curl
|
|
curl_check() {
|
|
if [[ ! -f /usr/bin/curl ]] || [[ ! -f /usr/bin/jq ]]; then
|
|
write_mod_info "Curl/JQ was not found on this system for Docker mods installing"
|
|
if [[ -f /usr/bin/apt ]]; then
|
|
# Ubuntu
|
|
export DEBIAN_FRONTEND="noninteractive"
|
|
apt-get update
|
|
apt-get install --no-install-recommends -y \
|
|
curl \
|
|
jq
|
|
elif [[ -f /sbin/apk ]]; then
|
|
# Alpine
|
|
apk add --no-cache \
|
|
curl \
|
|
jq
|
|
elif [[ -f /usr/bin/dnf ]]; then
|
|
# Fedora
|
|
dnf install -y --setopt=install_weak_deps=False --best \
|
|
curl \
|
|
jq
|
|
elif [[ -f /usr/sbin/pacman ]]; then
|
|
# Arch
|
|
pacman -Sy --noconfirm \
|
|
curl \
|
|
jq
|
|
fi
|
|
fi
|
|
}
|
|
|
|
write_mod_info() {
|
|
local MSG=$*
|
|
echo "[mod-init] $MSG"
|
|
}
|
|
|
|
write_mod_error() {
|
|
local MSG=$*
|
|
echo "[mod-init] (ERROR) $MSG"
|
|
}
|
|
|
|
write_mod_debug() {
|
|
local MSG=$*
|
|
if [[ ${DOCKER_MODS_DEBUG,,} = "true" ]]; then echo "[mod-init] (DEBUG) $MSG"; fi
|
|
}
|
|
|
|
# Use different filtering depending on URL
|
|
get_blob_sha() {
|
|
MULTIDIGEST=$(curl -f --retry 10 --retry-max-time 60 --retry-connrefused \
|
|
${CURL_NOISE_LEVEL} \
|
|
--location \
|
|
--header "Accept: application/vnd.docker.distribution.manifest.v2+json" \
|
|
--header "Accept: application/vnd.oci.image.index.v1+json" \
|
|
--header "Authorization: Bearer ${1}" \
|
|
--user-agent "${MOD_UA}" \
|
|
"${2}/${3}")
|
|
if jq -e '.layers // empty' <<< "${MULTIDIGEST}" >/dev/null 2>&1; then
|
|
# If there's a layer element it's a single-arch manifest so just get that digest
|
|
jq -r '.layers[0].digest' <<< "${MULTIDIGEST}";
|
|
else
|
|
# Otherwise it's multi-arch or has manifest annotations
|
|
if jq -e '.manifests[]?.annotations // empty' <<< "${MULTIDIGEST}" >/dev/null 2>&1; then
|
|
# Check for manifest annotations and delete if found
|
|
write_mod_debug "Mod has one or more manifest annotations" >&2
|
|
MULTIDIGEST=$(jq 'del(.manifests[] | select(.annotations))' <<< "${MULTIDIGEST}")
|
|
fi
|
|
if [[ $(jq '.manifests | length' <<< "${MULTIDIGEST}") -gt 1 ]]; then
|
|
# If there's still more than one digest, it's multi-arch
|
|
write_mod_debug "Mod has a multi-arch manifest" >&2
|
|
MULTIDIGEST=$(jq -r ".manifests[] | select(.platform.architecture == \"${4}\").digest?" <<< "${MULTIDIGEST}")
|
|
if [[ -z "${MULTIDIGEST}" ]]; then
|
|
exit 1
|
|
fi
|
|
else
|
|
# Otherwise it's single arch
|
|
write_mod_debug "Mod only has a single arch manifest" >&2
|
|
MULTIDIGEST=$(jq -r ".manifests[].digest?" <<< "${MULTIDIGEST}")
|
|
fi
|
|
if DIGEST=$(curl -f --retry 10 --retry-max-time 60 --retry-connrefused \
|
|
${CURL_NOISE_LEVEL} \
|
|
--location \
|
|
--header "Accept: application/vnd.docker.distribution.manifest.v2+json" \
|
|
--header "Accept: application/vnd.oci.image.manifest.v1+json" \
|
|
--header "Authorization: Bearer ${1}" \
|
|
--user-agent "${MOD_UA}" \
|
|
"${2}/${MULTIDIGEST}"); then
|
|
jq -r '.layers[0].digest' <<< "${DIGEST}";
|
|
fi
|
|
fi
|
|
}
|
|
|
|
get_auth_url() {
|
|
local auth_header
|
|
local realm_url
|
|
local service
|
|
local scope
|
|
# Call to get manifests and extract www-authenticate header
|
|
auth_header=$(curl -sLI ${CURL_NOISE_LEVEL} "${1}/${2}" | grep -i www-authenticate | tr -d '\r')
|
|
if [[ -n "${auth_header}" ]]; then
|
|
write_mod_debug "${auth_header}" >&2
|
|
# Extract realm URL from www-authenticate header
|
|
realm_url=$(echo "$auth_header" | awk -F'[="]+' '/realm=/{print $2}')
|
|
service=$(echo "$auth_header" | awk -F'[="]+' '/service=/{print $4}')
|
|
scope=$(echo "$auth_header" | awk -F'[="]+' '/scope=/{print $6}')
|
|
echo "$realm_url?service=$service&scope=$scope"
|
|
else
|
|
exit 1
|
|
fi
|
|
}
|
|
|
|
get_arch(){
|
|
local arch
|
|
|
|
if [[ -f /sbin/apk ]]; then
|
|
arch=$(apk --print-arch)
|
|
elif [[ -f /usr/bin/dpkg ]]; then
|
|
arch=$(dpkg --print-architecture)
|
|
else
|
|
arch=$(uname -m)
|
|
fi
|
|
|
|
case "${arch}" in
|
|
x86_64 )
|
|
arch="amd64"
|
|
;;
|
|
aarch64 )
|
|
arch="arm64"
|
|
;;
|
|
esac
|
|
|
|
echo "${arch}"
|
|
}
|
|
|
|
# Main run logic
|
|
run_mods() {
|
|
write_mod_info "Running Docker Modification Logic"
|
|
write_mod_debug "Running in debug mode"
|
|
write_mod_debug "Mod script version ${MOD_SCRIPT_VER}"
|
|
for DOCKER_MOD in $(echo "${DOCKER_MODS}" | tr '|' '\n'); do
|
|
# Support alternative endpoints
|
|
case "${DOCKER_MOD}" in
|
|
linuxserver/* )
|
|
[[ ${DOCKER_MODS_FORCE_REGISTRY,,} = "true" ]] && REGISTRY="registry-1.docker.io" || REGISTRY="lscr.io"
|
|
;;
|
|
docker.io/linuxserver/* )
|
|
[[ ${DOCKER_MODS_FORCE_REGISTRY,,} = "true" ]] && REGISTRY="registry-1.docker.io" || REGISTRY="lscr.io"
|
|
DOCKER_MOD="${DOCKER_MOD#docker.io/*}"
|
|
;;
|
|
ghcr.io/linuxserver/* )
|
|
[[ ${DOCKER_MODS_FORCE_REGISTRY,,} = "true" ]] && REGISTRY="ghcr.io" || REGISTRY="lscr.io"
|
|
DOCKER_MOD="${DOCKER_MOD#ghcr.io/*}"
|
|
;;
|
|
docker.io/* )
|
|
REGISTRY="registry-1.docker.io"
|
|
DOCKER_MOD="${DOCKER_MOD#docker.io/*}"
|
|
;;
|
|
* )
|
|
# Default assumption is docker.io
|
|
REGISTRY="registry-1.docker.io"
|
|
MOD="${DOCKER_MOD%/*}"
|
|
# If mod still has a / after stripping off the image name it's not docker.io
|
|
if [[ $MOD == */* ]]; then
|
|
REGISTRY="${MOD%%/*}"
|
|
DOCKER_MOD="${DOCKER_MOD#"$REGISTRY"/*}"
|
|
# If "repo" name has . in it, then assume it's actually a registry with no repo
|
|
elif [[ ${DOCKER_MOD%%/*} =~ \. ]]; then
|
|
REGISTRY="${DOCKER_MOD%%/*}"
|
|
MOD="${DOCKER_MOD##*/}"
|
|
fi
|
|
;;
|
|
esac
|
|
ENDPOINT="${DOCKER_MOD%%:*}"
|
|
USERNAME="${DOCKER_MOD%%/*}"
|
|
REPO="${ENDPOINT#*/}"
|
|
TAG="${DOCKER_MOD#*:}"
|
|
if [[ "${TAG}" == "${DOCKER_MOD}" ]]; then
|
|
TAG="latest"
|
|
fi
|
|
FILENAME="${USERNAME}.${REPO}.${TAG}"
|
|
MANIFEST_URL="https://${REGISTRY}/v2/${ENDPOINT}/manifests"
|
|
BLOB_URL="https://${REGISTRY}/v2/${ENDPOINT}/blobs/"
|
|
MOD_UA="Mozilla/5.0 (Linux $(uname -m)) linuxserver.io ${REGISTRY}/${ENDPOINT}:${TAG}"
|
|
write_mod_debug "Registry='${REGISTRY}', Repository='${USERNAME}', Image='${ENDPOINT}', Tag='${TAG}'"
|
|
case "${REGISTRY}" in
|
|
"lscr.io") AUTH_URL="https://ghcr.io/token?scope=repository%3A${USERNAME}%2F${REPO}%3Apull";;
|
|
"ghcr.io") AUTH_URL="https://ghcr.io/token?scope=repository%3A${USERNAME}%2F${REPO}%3Apull";;
|
|
"quay.io") AUTH_URL="https://quay.io/v2/auth?service=quay.io&scope=repository%3A${USERNAME}%2F${REPO}%3Apull";;
|
|
"registry-1.docker.io") AUTH_URL="https://auth.docker.io/token?service=registry.docker.io&scope=repository:${ENDPOINT}:pull";;
|
|
*) AUTH_URL=$(get_auth_url "${MANIFEST_URL}" "${TAG}")
|
|
esac
|
|
# Kill off modification logic if any of the usernames are banned
|
|
for BANNED in $(curl -s https://raw.githubusercontent.com/linuxserver/docker-mods/master/blacklist.txt); do
|
|
if [[ "${BANNED,,}" == "${USERNAME,,}" ]]; then
|
|
if [[ -z ${RUN_BANNED_MODS+x} ]]; then
|
|
write_mod_info "${DOCKER_MOD} is banned from use due to reported abuse, skipping mod"
|
|
continue
|
|
else
|
|
write_mod_info "You have chosen to run banned mods, ${DOCKER_MOD} will be applied"
|
|
fi
|
|
fi
|
|
done
|
|
if [[ -n "${AUTH_URL}" ]]; then
|
|
# Get registry token for api operations
|
|
TOKEN="$(
|
|
curl -f --retry 10 --retry-max-time 60 --retry-connrefused \
|
|
${CURL_NOISE_LEVEL} \
|
|
"${AUTH_URL}" |
|
|
jq -r '.token'
|
|
)"
|
|
else
|
|
write_mod_info "Could not fetch auth URL from registry for ${DOCKER_MOD}, attempting unauthenticated fetch"
|
|
fi
|
|
write_mod_info "Adding ${DOCKER_MOD} to container"
|
|
# If we're using lscr try and get the manifest from ghcr, if it fails re-request a token from Docker Hub
|
|
if [[ "${REGISTRY}" == "lscr.io" ]]; then
|
|
if [[ -n $(curl --user-agent "${MOD_UA}" -sLH "Authorization: Bearer ${TOKEN}" "${MANIFEST_URL}/${TAG}" | jq -r '.errors' >/dev/null 2>&1) ]]; then
|
|
write_mod_debug "Couldn't fetch manifest from ghcr.io, trying docker.io"
|
|
AUTH_URL="https://auth.docker.io/token?service=registry.docker.io&scope=repository:${ENDPOINT}:pull"
|
|
TOKEN="$(
|
|
curl -f --retry 10 --retry-max-time 60 --retry-connrefused \
|
|
${CURL_NOISE_LEVEL} \
|
|
"${AUTH_URL}" |
|
|
jq -r '.token'
|
|
)"
|
|
fi
|
|
fi
|
|
if [[ -n "${AUTH_URL}" ]]; then
|
|
write_mod_debug "Using ${AUTH_URL} as auth endpoint"
|
|
fi
|
|
ARCH=$(get_arch)
|
|
write_mod_debug "Arch detected as ${ARCH}"
|
|
# Determine first and only layer of image
|
|
SHALAYER=$(get_blob_sha "${TOKEN}" "${MANIFEST_URL}" "${TAG}" "${ARCH:=-amd64}")
|
|
if [[ $? -eq 1 ]]; then
|
|
write_mod_error "No manifest available for arch ${ARCH:=-amd64}, cannot fetch mod"
|
|
continue
|
|
elif [[ -z "${SHALAYER}" ]]; then
|
|
write_mod_error "${DOCKER_MOD} digest could not be fetched from ${REGISTRY}"
|
|
continue
|
|
fi
|
|
# Check if we have allready applied this layer
|
|
if [[ -f "/${FILENAME}" ]] && [[ "${SHALAYER}" == "$(cat /"${FILENAME}")" ]]; then
|
|
write_mod_info "${DOCKER_MOD} at ${SHALAYER} has been previously applied skipping"
|
|
else
|
|
write_mod_info "Downloading ${DOCKER_MOD} from ${REGISTRY}"
|
|
# Download and extract layer to /
|
|
curl -f --retry 10 --retry-max-time 60 --retry-all-errors \
|
|
${CURL_NOISE_LEVEL} \
|
|
--location \
|
|
--header "Authorization: Bearer ${TOKEN}" \
|
|
--user-agent "${MOD_UA}" \
|
|
"${BLOB_URL}${SHALAYER}" -o \
|
|
/modtarball.tar.xz
|
|
mkdir -p /tmp/mod
|
|
if ! tar -tzf /modtarball.tar.xz >/dev/null 2>&1; then
|
|
write_mod_error "Invalid tarball, could not download ${DOCKER_MOD} from ${REGISTRY}"
|
|
continue
|
|
fi
|
|
write_mod_info "Installing ${DOCKER_MOD}"
|
|
tar xzf /modtarball.tar.xz -C /tmp/mod
|
|
if [[ -d /tmp/mod/etc/s6-overlay ]]; then
|
|
if [[ -d /tmp/mod/etc/cont-init.d ]]; then
|
|
rm -rf /tmp/mod/etc/cont-init.d
|
|
fi
|
|
if [[ -d /tmp/mod/etc/services.d ]]; then
|
|
rm -rf /tmp/mod/etc/services.d
|
|
fi
|
|
fi
|
|
shopt -s dotglob
|
|
cp -R /tmp/mod/* /
|
|
shopt -u dotglob
|
|
rm -rf /tmp/mod
|
|
rm -rf /modtarball.tar.xz
|
|
echo "${SHALAYER}" >"/${FILENAME}"
|
|
write_mod_info "${DOCKER_MOD} applied to container"
|
|
fi
|
|
done
|
|
}
|
|
|
|
run_mods_local() {
|
|
write_mod_info "Running Local Docker Modification Logic"
|
|
for DOCKER_MOD in $(echo "${DOCKER_MODS}" | tr '|' '\n'); do
|
|
# Check mod file exists
|
|
if [[ -n "$(/bin/ls -A "/mods/${DOCKER_MOD}.tar" 2>/dev/null)" ]]; then
|
|
# Caculate mod bits
|
|
FILENAME="${DOCKER_MOD}.local"
|
|
SHALAYER=$(sha256sum "/mods/${DOCKER_MOD}.tar" | cut -d " " -f 1)
|
|
# Check if we have allready applied this layer
|
|
if [[ -f "/${FILENAME}" ]] && [[ "${SHALAYER}" == "$(cat /"${FILENAME}")" ]]; then
|
|
write_mod_info "${DOCKER_MOD} at ${SHALAYER} has been previously applied, skipping"
|
|
else
|
|
write_mod_info "Installing ${DOCKER_MOD}"
|
|
mkdir -p "/tmp/mod/${DOCKER_MOD}"
|
|
tar xf "/mods/${DOCKER_MOD}.tar" -C /tmp/mod --strip-components=1
|
|
tar xf "/tmp/mod/layer.tar" -C "/tmp/mod/${DOCKER_MOD}"
|
|
if [[ -d "/tmp/mod/${DOCKER_MOD}/etc/s6-overlay" ]]; then
|
|
if [[ -d "/tmp/mod/${DOCKER_MOD}/etc/cont-init.d" ]]; then
|
|
rm -rf "/tmp/mod/${DOCKER_MOD}/etc/cont-init.d"
|
|
fi
|
|
if [[ -d "/tmp/mod/${DOCKER_MOD}/etc/services.d" ]]; then
|
|
rm -rf "/tmp/mod/${DOCKER_MOD}/etc/services.d"
|
|
fi
|
|
fi
|
|
shopt -s dotglob
|
|
cp -R "/tmp/mod/${DOCKER_MOD}"/* /
|
|
shopt -u dotglob
|
|
rm -rf "/tmp/mod/${DOCKER_MOD}"
|
|
echo "${SHALAYER}" >"/${FILENAME}.local"
|
|
write_mod_info "${DOCKER_MOD} applied to container"
|
|
fi
|
|
else
|
|
write_mod_error "${DOCKER_MOD}.tar not found in /mods, skipping"
|
|
fi
|
|
done
|
|
}
|
|
|
|
run_branding() {
|
|
# intentional tabs in the heredoc
|
|
cat <<-EOF >/etc/s6-overlay/s6-rc.d/init-adduser/branding
|
|
───────────────────────────────────────
|
|
|
|
██╗ ███████╗██╗ ██████╗
|
|
██║ ██╔════╝██║██╔═══██╗
|
|
██║ ███████╗██║██║ ██║
|
|
██║ ╚════██║██║██║ ██║
|
|
███████╗███████║██║╚██████╔╝
|
|
╚══════╝╚══════╝╚═╝ ╚═════╝
|
|
|
|
Brought to you by linuxserver.io
|
|
───────────────────────────────────────
|
|
EOF
|
|
}
|
|
|
|
# Run alias creation functions
|
|
create_lsiown_alias
|
|
create_with_contenv_alias
|
|
|
|
# Main script loop
|
|
|
|
if [[ -d "${SCRIPTS_DIR}" ]] || [[ -d "${SERVICES_DIR}" ]]; then
|
|
tamper_check
|
|
process_custom_services
|
|
fi
|
|
|
|
# Run mod logic
|
|
if [[ -n "${DOCKER_MODS+x}" ]] && [[ "${DOCKER_MODS_SIDELOAD,,}" = "true" ]]; then
|
|
run_mods_local
|
|
elif [[ -n "${DOCKER_MODS+x}" ]]; then
|
|
curl_check
|
|
run_mods
|
|
fi
|
|
|
|
if [[ "${LSIO_FIRST_PARTY}" = "true" ]]; then
|
|
run_branding
|
|
fi
|
|
|
|
# Set executable bit on legacy cont-init and services built into the image and anything legacy unpacked by mods
|
|
set_legacy_executable_bits
|