- All gsdDir/gsdRoot/gsdHome → sfDir/sfRootDir/sfHome - GSDWorkspace* → SFWorkspace* interfaces - bootstrapGsdProject → bootstrapProject - runGSDDoctor → runSFDoctor - GsdClient → SfClient, gsd-client.ts → sf-client.ts - .gsd/ → .sf/ in all tests, docs, docker, native, vscode - Auto-migration: headless detects .gsd/ → renames to .sf/ - Deleted gsd-phase-state.ts backward-compat re-export - Renamed bin/gsd-from-source → bin/sf-from-source - Updated mintlify docs, github workflows, docker configs
81 lines
2.7 KiB
Bash
Executable file
81 lines
2.7 KiB
Bash
Executable file
#!/bin/bash
|
|
set -e
|
|
|
|
# ──────────────────────────────────────────────
|
|
# SF Container Entrypoint
|
|
#
|
|
# Responsibilities:
|
|
# 1. UID/GID remapping — match host user via PUID/PGID
|
|
# 2. Pre-create critical files — prevent Docker bind-mount
|
|
# from creating directories where files are expected
|
|
# 3. Sentinel-based bootstrap — one-time first-boot setup
|
|
# 4. Signal forwarding — exec into the final process
|
|
# ──────────────────────────────────────────────
|
|
|
|
SF_USER="sf"
|
|
SF_HOME="/home/${SF_USER}"
|
|
SF_DIR="${SF_HOME}/.sf"
|
|
|
|
# ── 1. UID/GID Remapping ────────────────────────────────
|
|
# Accept PUID/PGID from the environment so the container
|
|
# can run with the same UID/GID as the host user, avoiding
|
|
# permission headaches on bind-mounted volumes.
|
|
|
|
PUID="${PUID:-1000}"
|
|
PGID="${PGID:-1000}"
|
|
|
|
CURRENT_UID=$(id -u "${SF_USER}")
|
|
CURRENT_GID=$(id -g "${SF_USER}")
|
|
|
|
REMAPPED=0
|
|
|
|
if [ "${PGID}" != "${CURRENT_GID}" ]; then
|
|
groupmod -o -g "${PGID}" "${SF_USER}"
|
|
REMAPPED=1
|
|
fi
|
|
|
|
if [ "${PUID}" != "${CURRENT_UID}" ]; then
|
|
usermod -o -u "${PUID}" "${SF_USER}"
|
|
REMAPPED=1
|
|
fi
|
|
|
|
# Fix ownership only when UID/GID actually changed
|
|
if [ "${REMAPPED}" -eq 1 ]; then
|
|
chown -R "${PUID}:${PGID}" "${SF_HOME}"
|
|
chown "${PUID}:${PGID}" /workspace
|
|
fi
|
|
|
|
# ── 2. Pre-create Critical Files ────────────────────────
|
|
# Docker bind-mounts will create a *directory* if the target
|
|
# path doesn't exist. We need these to be files, so touch
|
|
# them before Docker gets a chance to mangle things.
|
|
|
|
mkdir -p "${SF_DIR}"
|
|
|
|
if [ ! -f "${SF_DIR}/settings.json" ]; then
|
|
echo '{}' > "${SF_DIR}/settings.json"
|
|
fi
|
|
|
|
chown "${PUID}:${PGID}" "${SF_DIR}" "${SF_DIR}/settings.json"
|
|
|
|
# ── 3. Sentinel-based Bootstrap ─────────────────────────
|
|
# Run first-boot setup exactly once. Subsequent container
|
|
# starts (or restarts) skip this entirely.
|
|
|
|
SENTINEL="${SF_DIR}/.bootstrapped"
|
|
|
|
if [ ! -f "${SENTINEL}" ]; then
|
|
if [ -x /usr/local/bin/bootstrap.sh ]; then
|
|
# Run bootstrap as the sf user so files get correct ownership
|
|
gosu "${SF_USER}" /usr/local/bin/bootstrap.sh
|
|
fi
|
|
touch "${SENTINEL}"
|
|
chown "${PUID}:${PGID}" "${SENTINEL}"
|
|
fi
|
|
|
|
# ── 4. Drop Privileges & Exec ──────────────────────────
|
|
# Replace this shell process with the final command running
|
|
# as the sf user. exec + gosu = proper PID 1 = proper
|
|
# signal forwarding (SIGTERM, SIGINT, etc.).
|
|
|
|
exec gosu "${SF_USER}" "$@"
|