#!/bin/bash -euxo pipefail # Copyright (C) The Arvados Authors. All rights reserved. # # SPDX-License-Identifier: Apache-2.0 set -eu -o pipefail SUDO=sudo wait_for_apt_locks() { while $SUDO fuser /var/{lib/{dpkg,apt/lists},cache/apt/archives}/lock >/dev/null 2>&1; do echo "APT: Waiting for apt/dpkg locks to be released..." sleep 1 done } . /etc/os-release DISTRO_ID="$ID" # Run apt-get update $SUDO DEBIAN_FRONTEND=noninteractive apt-get --yes update # Install gnupg and dirmgr or gpg key checks will fail wait_for_apt_locks && $SUDO DEBIAN_FRONTEND=noninteractive apt-get -qq --yes install \ gnupg \ dirmngr \ lsb-release # For good measure, apt-get upgrade wait_for_apt_locks && $SUDO DEBIAN_FRONTEND=noninteractive apt-get -qq --yes upgrade # Make sure cloud-init is installed wait_for_apt_locks && $SUDO DEBIAN_FRONTEND=noninteractive apt-get -qq --yes install cloud-init if [[ ! -d /var/lib/cloud/scripts/per-boot ]]; then mkdir -p /var/lib/cloud/scripts/per-boot fi SET_RESOLVER= if [ -n "$RESOLVER" ]; then SET_RESOLVER="--dns ${RESOLVER}" fi echo "Working directory is '${WORKDIR}'" # Add the arvados apt repository echo "# apt.arvados.org" |$SUDO tee --append /etc/apt/sources.list.d/apt.arvados.org.list echo "deb http://apt.arvados.org/$VERSION_CODENAME $VERSION_CODENAME${REPOSUFFIX} main" |$SUDO tee --append /etc/apt/sources.list.d/apt.arvados.org.list # Add the arvados signing key cat ${WORKDIR}/1078ECD7.asc | $SUDO apt-key add - # Add the debian keys (but don't abort if we can't find them, e.g. on Ubuntu where we don't need them) wait_for_apt_locks && $SUDO DEBIAN_FRONTEND=noninteractive apt-get install --yes debian-keyring debian-archive-keyring 2>/dev/null || true # Fix locale $SUDO /bin/sed -ri 's/# en_US.UTF-8 UTF-8/en_US.UTF-8 UTF-8/' /etc/locale.gen $SUDO /usr/sbin/locale-gen if [[ "${PIN_PACKAGES:-true}" != false ]]; then $SUDO install -d /etc/apt/preferences.d $SUDO install -m 0644 \ "$WORKDIR/etc-apt-preferences.d-arvados.pref" \ /etc/apt/preferences.d/arvados.pref fi # Install some packages we always need wait_for_apt_locks && $SUDO DEBIAN_FRONTEND=noninteractive apt-get --yes update wait_for_apt_locks && $SUDO DEBIAN_FRONTEND=noninteractive apt-get -qq --yes install \ openssh-server \ apt-utils \ git \ curl \ libcurl3-gnutls \ libcurl4-openssl-dev \ lvm2 \ cryptsetup \ xfsprogs # Install the Arvados packages we need wait_for_apt_locks && $SUDO DEBIAN_FRONTEND=noninteractive apt-get -qq --yes install \ python3-arvados-fuse \ arvados-docker-cleaner DOCKER_URL="https://download.docker.com/linux/$DISTRO_ID" curl -fsSL "$DOCKER_URL/gpg" | $SUDO gpg --dearmor -o /usr/share/keyrings/docker-archive-keyring.gpg echo "deb [arch=amd64 signed-by=/usr/share/keyrings/docker-archive-keyring.gpg] $DOCKER_URL/ $VERSION_CODENAME stable" | \ $SUDO tee /etc/apt/sources.list.d/docker.list $SUDO apt-get update $SUDO apt-get -yq --no-install-recommends install docker-ce # Set a higher ulimit and the resolver (if set) for docker $SUDO sed "s/ExecStart=\(.*\)/ExecStart=\1 --default-ulimit nofile=10000:10000 ${SET_RESOLVER}/g" \ /lib/systemd/system/docker.service \ > /etc/systemd/system/docker.service $SUDO systemctl daemon-reload # docker should not start on boot: we restart it inside /usr/local/bin/ensure-encrypted-partitions.sh, # and the BootProbeCommand might be "docker ps -q" $SUDO systemctl disable docker # Remove unattended-upgrades if it is installed wait_for_apt_locks && $SUDO DEBIAN_FRONTEND=noninteractive apt-get -qq --yes remove unattended-upgrades --purge # Configure arvados-docker-cleaner $SUDO mkdir -p /etc/arvados/docker-cleaner $SUDO echo -e "{\n \"Quota\": \"10G\",\n \"RemoveStoppedContainers\": \"always\"\n}" > /etc/arvados/docker-cleaner/docker-cleaner.json # Enable cgroup accounting (forcing cgroups v1) $SUDO echo 'GRUB_CMDLINE_LINUX="$GRUB_CMDLINE_LINUX cgroup_enable=memory swapaccount=1 systemd.unified_cgroup_hierarchy=0"' >> /etc/default/grub $SUDO update-grub # Make sure user_allow_other is set in fuse.conf $SUDO sed -i 's/#user_allow_other/user_allow_other/g' /etc/fuse.conf # Add crunch user with sudo powers $SUDO adduser --disabled-password --gecos "Crunch user,,,," crunch # Do not require a password to sudo echo -e "# for the crunch user\ncrunch ALL=(ALL) NOPASSWD:ALL" | $SUDO tee /etc/sudoers.d/91-crunch # Set up the ssh public key for the crunch user $SUDO mkdir /home/crunch/.ssh $SUDO mv ${WORKDIR}/crunch-authorized_keys /home/crunch/.ssh/authorized_keys $SUDO chown -R crunch:crunch /home/crunch/.ssh $SUDO chmod 600 /home/crunch/.ssh/authorized_keys $SUDO chmod 700 /home/crunch/.ssh/ # Make sure we resolve via the provided resolver IP if set. Prepending is good enough because # unless 'rotate' is set, the nameservers are queried in order (cf. man resolv.conf) if [ "x$RESOLVER" != "x" ]; then $SUDO sed -i "s/#prepend domain-name-servers 127.0.0.1;/prepend domain-name-servers ${RESOLVER};/" /etc/dhcp/dhclient.conf fi # AWS_EBS_AUTOSCALE is not always set, work around unset variable check EBS_AUTOSCALE=${AWS_EBS_AUTOSCALE:-} if [ "$EBS_AUTOSCALE" != "1" ]; then # Set up the cloud-init script that will ensure encrypted disks $SUDO mv ${WORKDIR}/usr-local-bin-ensure-encrypted-partitions.sh /usr/local/bin/ensure-encrypted-partitions.sh else wait_for_apt_locks && $SUDO DEBIAN_FRONTEND=noninteractive apt-get -qq --yes install jq unzip curl -s "https://awscli.amazonaws.com/awscli-exe-linux-x86_64.zip" -o "${WORKDIR}/awscliv2.zip" unzip -q ${WORKDIR}/awscliv2.zip -d ${WORKDIR} && $SUDO ${WORKDIR}/aws/install # Pinned to v2.4.5 because we apply a patch below #export EBS_AUTOSCALE_VERSION=$(curl --silent "https://api.github.com/repos/awslabs/amazon-ebs-autoscale/releases/latest" | jq -r .tag_name) export EBS_AUTOSCALE_VERSION="ee323f0751c2b6f733692e805b51b9bf3c251bac" cd /opt && $SUDO git clone https://github.com/arvados/amazon-ebs-autoscale.git cd /opt/amazon-ebs-autoscale && $SUDO git checkout $EBS_AUTOSCALE_VERSION # Set up the cloud-init script that makes use of the AWS EBS autoscaler $SUDO mv ${WORKDIR}/usr-local-bin-ensure-encrypted-partitions-aws-ebs-autoscale.sh /usr/local/bin/ensure-encrypted-partitions.sh fi $SUDO chmod 755 /usr/local/bin/ensure-encrypted-partitions.sh $SUDO chown root:root /usr/local/bin/ensure-encrypted-partitions.sh $SUDO mv ${WORKDIR}/etc-cloud-cloud.cfg.d-07_compute_arvados_dispatch_cloud.cfg /etc/cloud/cloud.cfg.d/07_compute_arvados_dispatch_cloud.cfg $SUDO chown root:root /etc/cloud/cloud.cfg.d/07_compute_arvados_dispatch_cloud.cfg if [ "$NVIDIA_GPU_SUPPORT" == "1" ]; then # We need a kernel and matching headers if [[ "$DISTRO_ID" == debian ]]; then $SUDO apt-get -y install linux-image-cloud-amd64 linux-headers-cloud-amd64 elif [ "$CLOUD" == "azure" ]; then $SUDO apt-get -y install linux-image-azure linux-headers-azure elif [ "$CLOUD" == "aws" ]; then $SUDO apt-get -y install linux-image-aws linux-headers-aws fi # Install CUDA NVIDIA_URL="https://developer.download.nvidia.com/compute/cuda/repos/$(echo "$DISTRO_ID$VERSION_ID" | tr -d .)/x86_64" $SUDO apt-key adv --fetch-keys "$NVIDIA_URL/7fa2af80.pub" $SUDO apt-key adv --fetch-keys "$NVIDIA_URL/3bf863cc.pub" $SUDO apt-get -y install software-properties-common $SUDO add-apt-repository "deb $NVIDIA_URL/ /" $SUDO add-apt-repository contrib $SUDO apt-get update $SUDO apt-get -y install cuda # Install libnvidia-container, the tooling for Docker/Singularity curl -s -L https://nvidia.github.io/libnvidia-container/gpgkey | \ $SUDO apt-key add - curl -fsSL "https://nvidia.github.io/libnvidia-container/stable/deb/nvidia-container-toolkit.list" | $SUDO tee /etc/apt/sources.list.d/nvidia-container-toolkit.list >/dev/null $SUDO apt-get update $SUDO apt-get -y install libnvidia-container1 libnvidia-container-tools nvidia-container-toolkit # Various components fail to start, and cause systemd to boot in degraded # state, if the system does not actually have an NVIDIA GPU. Configure the # image to adapt at boot time. # Don't load modules unconditionally. # Instead load them if hardware is detected. if [[ -f /etc/modules-load.d/nvidia.conf ]]; then $SUDO mv /etc/modules-load.d/nvidia.conf /etc/modules-load.d/nvidia.avail fi $SUDO install "$WORKDIR/usr-local-bin-detect-gpu.sh" /usr/local/bin/detect-gpu.sh $SUDO install -d /etc/systemd/system/systemd-modules-load.service.d $SUDO install -m 0644 \ "$WORKDIR/etc-systemd-system-systemd-modules-load.service.d-detect-gpu.conf" \ /etc/systemd/system/systemd-modules-load.service.d/detect-gpu.conf # Don't start the persistence daemon. # Instead rely on crunch-run's CUDA initialization. $SUDO systemctl disable nvidia-persistenced.service fi # Get Go and build singularity mkdir -p /var/lib/arvados rm -rf /var/lib/arvados/go/ curl -s https://storage.googleapis.com/golang/go${GOVERSION}.linux-amd64.tar.gz | tar -C /var/lib/arvados -xzf - ln -sf /var/lib/arvados/go/bin/* /usr/local/bin/ singularityversion=3.10.4 cd /var/lib/arvados git clone --recurse-submodules https://github.com/sylabs/singularity cd singularity git checkout v${singularityversion} # build dependencies for singularity wait_for_apt_locks && $SUDO DEBIAN_FRONTEND=noninteractive apt-get -qq --yes install \ make build-essential libssl-dev uuid-dev cryptsetup \ squashfs-tools libglib2.0-dev libseccomp-dev echo $singularityversion > VERSION ./mconfig --prefix=/var/lib/arvados make -C ./builddir make -C ./builddir install ln -sf /var/lib/arvados/bin/* /usr/local/bin/ # set `mksquashfs mem` in the singularity config file if it is configured if [ "$MKSQUASHFS_MEM" != "" ]; then echo "mksquashfs mem = ${MKSQUASHFS_MEM}" >> /var/lib/arvados/etc/singularity/singularity.conf fi # Print singularity version installed singularity --version $SUDO apt-get clean