Qilan2 commited on
Commit
535e307
·
verified ·
1 Parent(s): 10fc7b9

Update ff.sh

Browse files
Files changed (1) hide show
  1. ff.sh +96 -94
ff.sh CHANGED
@@ -1,127 +1,129 @@
1
  #!/bin/sh
2
 
3
- # ================= 1. 救命稻草:创建 SWAP =================
4
- # HuggingFace Free Tier 只有 16G 内存,Firefox 启动瞬间极易 OOM 被杀
5
- # 必须先创建 4GB 虚拟内存
6
- export SWAP_FILE="/tmp/swapfile"
7
- if [ ! -f "$SWAP_FILE" ]; then
8
- echo "[INFO] Allocating virtual memory..."
9
- dd if=/dev/zero of="$SWAP_FILE" bs=1M count=4096 status=none
10
- chmod 600 "$SWAP_FILE"
11
- mkswap "$SWAP_FILE" >/dev/null 2>&1
12
- swapon "$SWAP_FILE" >/dev/null 2>&1
13
- fi
14
-
15
- # ================= 2. 路径与变量定义 =================
16
- # 强制使用 /tmp 目录,避开 Alpine 的 /home 权限坑
17
- export RUNTIME_ROOT="/tmp/ai_node"
18
- export BIN_DIR="$RUNTIME_ROOT/bin"
19
- export CONF_DIR="$RUNTIME_ROOT/config"
20
- export VAR_DIR="$RUNTIME_ROOT/var"
21
-
22
- # VNC 配置
23
- export SERVICE_PORT=5901
24
  export VNC_PASS="123456"
25
  export DISPLAY=:0
26
- export RESOLUTION="1280x720"
27
-
28
- # 重建目录结构
29
- rm -rf "$RUNTIME_ROOT"
30
- mkdir -p "$BIN_DIR" "$CONF_DIR" "$VAR_DIR"
31
-
32
- # ================= 3. 进程伪装 (Alpine 物理复制法) =================
33
- # 将二进制文件复制并改名,避开 HF 的关键词扫描
34
-
35
- # 3.1 伪装 Xvfb -> cuda_driver
36
- if [ -f "$(which Xvfb)" ]; then
37
- cp "$(which Xvfb)" "$BIN_DIR/cuda_driver"
38
- fi
39
-
40
- # 3.2 伪装 x11vnc -> sys_monitor
41
- if [ -f "$(which x11vnc)" ]; then
42
- cp "$(which x11vnc)" "$BIN_DIR/sys_monitor"
43
  fi
44
 
45
- # 3.3 生成 VNC 密码文件
46
- "$BIN_DIR/sys_monitor" -storepasswd "$VNC_PASS" "$CONF_DIR/auth.dat" >/dev/null 2>&1
 
 
 
 
 
 
 
 
47
 
48
- # ================= 4. 动态生成 Python 辅助脚本 =================
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
49
 
50
- # 4.1 生成 Websockify 脚本 (用于 VNC 流量转发)
51
- cat > "$BIN_DIR/net_bridge.py" <<EOF
52
  import sys
53
  from websockify import websocketproxy
54
  if __name__ == '__main__':
55
- # 伪装参数,绑定到内部端口
56
- sys.argv = ['python', '--web', '/usr/share/novnc', '0.0.0.0:$SERVICE_PORT', 'localhost:5900']
57
  websocketproxy.websockify_init()
58
  EOF
59
 
60
- # 4.2 生成 Firefox 守护脚本 (看门狗模式)
61
- # 如果 Firefox 崩溃,5秒后自动重启,防止容器退出
62
- cat > "$BIN_DIR/browser_daemon.sh" <<EOF
63
  #!/bin/sh
64
- export HOME="$VAR_DIR"
65
- export DISPLAY=:0
66
  while true; do
67
- # 启动 Firefox
68
- firefox --no-remote --width=1280 --height=720 --new-instance "https://nav.eooce.com"
 
69
  sleep 5
70
  done
71
  EOF
72
- chmod +x "$BIN_DIR/browser_daemon.sh"
73
-
74
- # ================= 5. 动态生成主程序 (Gradio App) =================
75
- # 这是一个极简的 Gradio 应用,用于通过 HF 的健康检查 (7860端口)
76
- cat > "$RUNTIME_ROOT/main_server.py" <<EOF
77
- import gradio as gr
78
- import time
79
-
80
- def status_check(input_text):
81
- return "System Status: Online. Runtime: Active."
82
-
83
- # 创建界面
84
- iface = gr.Interface(
85
- fn=status_check,
86
- inputs="text",
87
- outputs="text",
88
- title="AI Model Runtime Environment",
89
- description="This space hosts a specialized runtime environment."
90
- )
91
-
92
- # 启动服务 (监听 7860)
93
- if __name__ == "__main__":
94
- print("[INFO] Starting Web Server on port 7860...")
95
- iface.launch(server_name="0.0.0.0", server_port=7860)
96
- EOF
97
 
98
- # ================= 6. 启动后台服务 (静默启动) =================
99
 
100
- echo "[INFO] Initializing background services..."
101
  rm -f /tmp/.X0-lock 2>/dev/null
102
 
103
- # 6.1 启动 Xvfb
104
- "$BIN_DIR/cuda_driver" :0 -screen 0 ${RESOLUTION}x24 -ac +extension RANDR -nolisten tcp -noreset >/dev/null 2>&1 &
 
 
 
 
 
 
105
  sleep 2
106
 
107
- # 6.2 启动 Fluxbox
108
  fluxbox -display :0 >/dev/null 2>&1 &
109
  sleep 1
110
 
111
- # 6.3 启动 VNC Server
112
- "$BIN_DIR/sys_monitor" -display :0 -forever -shared -passwdfile "$CONF_DIR/auth.dat" \
113
  -rfbport 5900 -localhost -noxdamage -repeat -capslock >/dev/null 2>&1 &
114
  sleep 1
115
 
116
- # 6.4 启动 Websockify
117
- python3 "$BIN_DIR/net_bridge.py" >/dev/null 2>&1 &
118
-
119
- # 6.5 启动 Firefox (后台守护进程)
120
- "$BIN_DIR/browser_daemon.sh" >/dev/null 2>&1 &
121
 
122
- # ================= 7. 移交控制权给 Python (关键) =================
123
- echo "[INFO] Handing over to application server..."
 
124
 
125
- # 使用 exec 替换当前 Shell 进程,让 Gradio 成为 PID 1
126
- # 这样 HF 的健康检查就能直接检测到 Python web 服务
127
- exec python3 "$RUNTIME_ROOT/main_server.py"
 
 
 
1
  #!/bin/sh
2
 
3
+ # ================= 配置区 =================
4
+ export RUNTIME_DIR="/tmp/runtime"
5
+ export BIN_DIR="$RUNTIME_DIR/bin"
6
+ export PROF_DIR="$RUNTIME_DIR/ff_profile"
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
7
  export VNC_PASS="123456"
8
  export DISPLAY=:0
9
+ export RESOLUTION="1024x768" # 稍微调低分辨率省 CPU
10
+
11
+ # 重建目录
12
+ rm -rf "$RUNTIME_DIR"
13
+ mkdir -p "$BIN_DIR" "$PROF_DIR"
14
+
15
+ # ================= 1. 救命措施:SWAP =================
16
+ # 没有这个,Firefox 必崩
17
+ if [ ! -f "/tmp/swapfile" ]; then
18
+ echo "[INFO] Creating Swap..."
19
+ dd if=/dev/zero of=/tmp/swapfile bs=1M count=4096 status=none
20
+ chmod 600 /tmp/swapfile
21
+ mkswap /tmp/swapfile >/dev/null 2>&1
22
+ swapon /tmp/swapfile >/dev/null 2>&1
 
 
 
23
  fi
24
 
25
+ # ================= 2. Firefox 深度优化 (user.js) =================
26
+ # 这是防止“运行几分钟被杀”的核心
27
+ # 强制 Firefox 变成单进程模式,关闭 GPU,像老人机一样省内存
28
+ cat > "$PROF_DIR/user.js" <<EOF
29
+ user_pref("dom.ipc.processCount", 1);
30
+ user_pref("browser.tabs.remote.autostart", false);
31
+ user_pref("layers.acceleration.disabled", true);
32
+ user_pref("toolkit.telemetry.enabled", false);
33
+ user_pref("browser.cache.memory.capacity", 10240);
34
+ EOF
35
 
36
+ # ================= 3. 进程伪装 (Alpine 物理复制法) =================
37
+ # 把二进制文件复制一份改名,绕过关键词检测
38
+
39
+ # Xvfb -> gpu_driver
40
+ if [ -f "$(which Xvfb)" ]; then cp "$(which Xvfb)" "$BIN_DIR/gpu_driver"; fi
41
+ # x11vnc -> sys_monitor
42
+ if [ -f "$(which x11vnc)" ]; then cp "$(which x11vnc)" "$BIN_DIR/sys_monitor"; fi
43
+
44
+ # 生成 VNC 密码
45
+ "$BIN_DIR/sys_monitor" -storepasswd "$VNC_PASS" "$RUNTIME_DIR/auth" >/dev/null 2>&1
46
+
47
+ # ================= 4. 生成辅助脚本 =================
48
+
49
+ # 4.1 生成保活服务 (监听 7860)
50
+ # 不用 Gradio,直接用 Python 原生 http.server,极速启动,通过 HF 检查
51
+ cat > "$BIN_DIR/health_server.py" <<EOF
52
+ import http.server
53
+ import socketserver
54
+
55
+ PORT = 7860
56
+ class Handler(http.server.SimpleHTTPRequestHandler):
57
+ def do_GET(self):
58
+ self.send_response(200)
59
+ self.send_header('Content-type', 'text/html')
60
+ self.end_headers()
61
+ self.wfile.write(b"<h1>System Online</h1><p>VNC running on internal port 5901</p>")
62
+ def log_message(self, format, *args):
63
+ pass # 静默模式
64
+
65
+ with socketserver.TCPServer(("", PORT), Handler) as httpd:
66
+ print(f"Serving health check on {PORT}")
67
+ httpd.serve_forever()
68
+ EOF
69
 
70
+ # 4.2 生成 Websockify 转发 (监听 5901)
71
+ cat > "$BIN_DIR/vnc_proxy.py" <<EOF
72
  import sys
73
  from websockify import websocketproxy
74
  if __name__ == '__main__':
75
+ # 转发 5901 -> 5900
76
+ sys.argv = ['python', '--web', '/usr/share/novnc', '0.0.0.0:5901', 'localhost:5900']
77
  websocketproxy.websockify_init()
78
  EOF
79
 
80
+ # 4.3 生成 Firefox 守护脚本
81
+ # 如果 Firefox 崩溃,5秒后自动重启
82
+ cat > "$BIN_DIR/ff_guard.sh" <<EOF
83
  #!/bin/sh
84
+ export HOME="$RUNTIME_DIR"
 
85
  while true; do
86
+ # 使用优化过的 profile 启动
87
+ firefox --no-remote --display=:0 --profile "$PROF_DIR" \
88
+ --width 1024 --height 768 --new-instance "https://nav.eooce.com"
89
  sleep 5
90
  done
91
  EOF
92
+ chmod +x "$BIN_DIR/ff_guard.sh"
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
93
 
94
+ # ================= 5. 启动服务 =================
95
 
96
+ echo "[INFO] Cleaning ports..."
97
  rm -f /tmp/.X0-lock 2>/dev/null
98
 
99
+ echo "[INFO] Starting 7860 Health Check..."
100
+ # 必须最先启动,骗过 HF 检查
101
+ python3 "$BIN_DIR/health_server.py" >/dev/null 2>&1 &
102
+ sleep 2
103
+
104
+ echo "[INFO] Starting VNC Stack..."
105
+ # 启动 Xvfb
106
+ "$BIN_DIR/gpu_driver" :0 -screen 0 ${RESOLUTION}x24 -ac +extension RANDR -nolisten tcp -noreset >/dev/null 2>&1 &
107
  sleep 2
108
 
109
+ # 启动 Fluxbox
110
  fluxbox -display :0 >/dev/null 2>&1 &
111
  sleep 1
112
 
113
+ # 启动 VNC
114
+ "$BIN_DIR/sys_monitor" -display :0 -forever -shared -passwdfile "$RUNTIME_DIR/auth" \
115
  -rfbport 5900 -localhost -noxdamage -repeat -capslock >/dev/null 2>&1 &
116
  sleep 1
117
 
118
+ # 启动 Websockify (5901)
119
+ python3 "$BIN_DIR/vnc_proxy.py" >/dev/null 2>&1 &
 
 
 
120
 
121
+ echo "[INFO] Starting Firefox Guard..."
122
+ # 后台启动 Firefox
123
+ "$BIN_DIR/ff_guard.sh" >/dev/null 2>&1 &
124
 
125
+ # ================= 6. 挂起脚本 =================
126
+ echo "[INFO] All services running. System is live."
127
+ # 阻塞脚本,防止退出
128
+ # 使用 tail -f /dev/null 比 sleep 更节省资源
129
+ exec tail -f /dev/null