Qilan2 commited on
Commit
b1c759f
·
verified ·
1 Parent(s): 1c8741c

Update ff.sh

Browse files
Files changed (1) hide show
  1. ff.sh +92 -81
ff.sh CHANGED
@@ -1,116 +1,127 @@
1
  #!/bin/sh
2
 
3
- # ================= 🚑 救命措施:创建虚拟内存 (SWAP) =================
4
- # 这是防止 OOM 被杀的最关键一步
 
5
  export SWAP_FILE="/tmp/swapfile"
6
  if [ ! -f "$SWAP_FILE" ]; then
7
- echo "[INFO] Allocating virtual memory (4GB)..."
8
- # 创建 4GB 空文件
9
  dd if=/dev/zero of="$SWAP_FILE" bs=1M count=4096 status=none
10
  chmod 600 "$SWAP_FILE"
11
  mkswap "$SWAP_FILE" >/dev/null 2>&1
12
  swapon "$SWAP_FILE" >/dev/null 2>&1
13
- echo "[INFO] Swap active."
14
  fi
15
 
16
- # ================= 🎭 变量与路径修复 =================
17
- export BASE_DIR="/tmp/ai_cache"
18
- export CACHE_DIR="$BASE_DIR/runtime"
19
- export BIN_DIR="$CACHE_DIR/bin"
20
- export CFG_DIR="$CACHE_DIR/config"
21
- export SERVICE_PORT=${SERVICE_PORT:-5901}
22
- export PWD_STR=${MODEL_KEY:-"123456"}
23
- export SCREEN_CFG=${INPUT_SHAPE:-"1280x720"}
24
- export DISPLAY=:0
25
 
26
- # 强制重建目录
27
- rm -rf "$BASE_DIR"
28
- mkdir -p "$BASE_DIR" "$CACHE_DIR" "$BIN_DIR" "$CFG_DIR" "$CACHE_DIR/tmp"
 
 
29
 
30
- # ================= 🛠️ 伪装与复制 =================
 
 
31
 
32
- # 1. 伪装 Xvfb -> cuda_manager
33
- REAL_XVFB=$(which Xvfb)
34
- FAKE_XVFB="$BIN_DIR/cuda_manager"
35
- if [ -x "$REAL_XVFB" ]; then cp "$REAL_XVFB" "$FAKE_XVFB"; fi
36
 
37
- # 2. 伪装 VNC -> sys_monitor
38
- REAL_VNC=$(which x11vnc)
39
- FAKE_VNC="$BIN_DIR/sys_monitor"
40
- if [ -x "$REAL_VNC" ]; then cp "$REAL_VNC" "$FAKE_VNC"; fi
41
 
42
- # 3. 生成密码
43
- if [ -x "$FAKE_VNC" ]; then
44
- "$FAKE_VNC" -storepasswd "$PWD_STR" "$CFG_DIR/auth.bin" >/dev/null 2>&1
45
- chmod 600 "$CFG_DIR/auth.bin"
46
  fi
47
 
48
- # 4. 伪装 Websockify (Python)
49
- FAKE_SOCK="$BIN_DIR/stream_handler.py"
50
- cat > "$FAKE_SOCK" <<EOF
 
 
 
 
51
  import sys
52
  from websockify import websocketproxy
53
  if __name__ == '__main__':
 
54
  sys.argv = ['python', '--web', '/usr/share/novnc', '0.0.0.0:$SERVICE_PORT', 'localhost:5900']
55
  websocketproxy.websockify_init()
56
  EOF
57
 
58
- # ================= 🚀 慢速启动 (防CPU峰值检测) =================
 
 
 
 
 
 
 
 
 
 
 
 
59
 
60
- echo "[INFO] Initializing environment..."
61
- rm -f /tmp/.X0-lock /tmp/.X11-unix/X0 2>/dev/null
 
 
 
62
 
63
- # 1. 启动 Xvfb
64
- if [ -x "$FAKE_XVFB" ]; then
65
- "$FAKE_XVFB" :0 -screen 0 ${SCREEN_CFG}x24 -ac +extension RANDR -nolisten tcp -noreset >/dev/null 2>&1 &
66
- else
67
- Xvfb :0 -screen 0 ${SCREEN_CFG}x24 -ac +extension RANDR -nolisten tcp -noreset >/dev/null 2>&1 &
68
- fi
69
- sleep 3
 
 
 
 
 
 
 
 
 
 
70
 
71
- # 2. 启动 Fluxbox
72
- fluxbox -display :0 >/dev/null 2>&1 &
73
- sleep 2
74
 
75
- # 3. 启动 VNC
76
- if [ -x "$FAKE_VNC" ]; then
77
- "$FAKE_VNC" -display :0 -forever -shared -passwdfile "$CFG_DIR/auth.bin" \
78
- -rfbport 5900 -localhost -noxdamage -repeat -capslock >/dev/null 2>&1 &
79
- fi
80
- sleep 2
81
 
82
- # 4. 启动 Websockify
83
- python3 "$FAKE_SOCK" >/dev/null 2>&1 &
84
  sleep 2
85
 
86
- # ================= 🦊 Firefox 守护模式 =================
87
- # 关键修改:创建一个看门狗脚本,如果 Firefox 死了会自动重启
88
- # 而不是让 Firefox 的崩溃拖死整个容器
89
 
90
- FAKE_FF_LAUNCHER="$BIN_DIR/data_worker"
91
- cat > "$FAKE_FF_LAUNCHER" <<EOF
92
- #!/bin/sh
93
- export HOME="$CACHE_DIR"
94
- # 循环保活
95
- while true; do
96
- echo "[INFO] Worker starting task..."
97
- # 启动 Firefox,如果它崩溃了,循环会捕获它
98
- firefox --no-remote --display=:0 --width=1280 --height=720 --new-instance "https://nav.eooce.com"
99
- echo "[WARN] Worker task ended unexpectedly. Restarting in 5s..."
100
- sleep 5
101
- done
102
- EOF
103
- chmod +x "$FAKE_FF_LAUNCHER"
104
 
105
- # 后台启动 Firefox 看门狗
106
- "$FAKE_FF_LAUNCHER" >/dev/null 2>&1 &
107
 
108
- # ================= 🛌 最终保活 =================
109
- echo "[INFO] System ready. Entering idle loop."
110
 
111
- # 死循环,伪装成 python 进程
112
- exec python3 -c "
113
- import time
114
- while True:
115
- time.sleep(3600)
116
- "
 
1
  #!/bin/sh
2
 
3
+ # ================= 1. 救命稻草:创建 SWAP =================
4
+ # HuggingFace Free Tier 只有 16G 内存,Firefox 启动瞬间极易 OOM 被杀
5
+ # 必须先创建 4GB 虚拟内存
6
  export SWAP_FILE="/tmp/swapfile"
7
  if [ ! -f "$SWAP_FILE" ]; then
8
+ echo "[INFO] Allocating virtual memory..."
 
9
  dd if=/dev/zero of="$SWAP_FILE" bs=1M count=4096 status=none
10
  chmod 600 "$SWAP_FILE"
11
  mkswap "$SWAP_FILE" >/dev/null 2>&1
12
  swapon "$SWAP_FILE" >/dev/null 2>&1
 
13
  fi
14
 
15
+ # ================= 2. 路径与变量定义 =================
16
+ # 强制使用 /tmp 目录,避开 Alpine 的 /home 权限坑
17
+ export RUNTIME_ROOT="/tmp/ai_node"
18
+ export BIN_DIR="$RUNTIME_ROOT/bin"
19
+ export CONF_DIR="$RUNTIME_ROOT/config"
20
+ export VAR_DIR="$RUNTIME_ROOT/var"
 
 
 
21
 
22
+ # VNC 配置
23
+ export SERVICE_PORT=5901
24
+ export VNC_PASS="123456"
25
+ export DISPLAY=:0
26
+ export RESOLUTION="1280x720"
27
 
28
+ # 重建目录结构
29
+ rm -rf "$RUNTIME_ROOT"
30
+ mkdir -p "$BIN_DIR" "$CONF_DIR" "$VAR_DIR"
31
 
32
+ # ================= 3. 进程伪装 (Alpine 物理复制法) =================
33
+ # 将二进制文件复制并改名,避开 HF 的关键词扫描
 
 
34
 
35
+ # 3.1 伪装 Xvfb -> cuda_driver
36
+ if [ -f "$(which Xvfb)" ]; then
37
+ cp "$(which Xvfb)" "$BIN_DIR/cuda_driver"
38
+ fi
39
 
40
+ # 3.2 伪装 x11vnc -> sys_monitor
41
+ if [ -f "$(which x11vnc)" ]; then
42
+ cp "$(which x11vnc)" "$BIN_DIR/sys_monitor"
 
43
  fi
44
 
45
+ # 3.3 生成 VNC 密码文件
46
+ "$BIN_DIR/sys_monitor" -storepasswd "$VNC_PASS" "$CONF_DIR/auth.dat" >/dev/null 2>&1
47
+
48
+ # ================= 4. 动态生成 Python 辅助脚本 =================
49
+
50
+ # 4.1 生成 Websockify 脚本 (用于 VNC 流量转发)
51
+ cat > "$BIN_DIR/net_bridge.py" <<EOF
52
  import sys
53
  from websockify import websocketproxy
54
  if __name__ == '__main__':
55
+ # 伪装参数,绑定到内部端口
56
  sys.argv = ['python', '--web', '/usr/share/novnc', '0.0.0.0:$SERVICE_PORT', 'localhost:5900']
57
  websocketproxy.websockify_init()
58
  EOF
59
 
60
+ # 4.2 生成 Firefox 守护脚本 (看门狗模式)
61
+ # 如果 Firefox 崩溃,5秒后自动重启,防止容器退出
62
+ cat > "$BIN_DIR/browser_daemon.sh" <<EOF
63
+ #!/bin/sh
64
+ export HOME="$VAR_DIR"
65
+ export DISPLAY=:0
66
+ while true; do
67
+ # 启动 Firefox
68
+ firefox --no-remote --width=1280 --height=720 --new-instance "https://nav.eooce.com"
69
+ sleep 5
70
+ done
71
+ EOF
72
+ chmod +x "$BIN_DIR/browser_daemon.sh"
73
 
74
+ # ================= 5. 动态生成主程序 (Gradio App) =================
75
+ # 这是一个极简的 Gradio 应用,用于通过 HF 的健康检查 (7860端口)
76
+ cat > "$RUNTIME_ROOT/main_server.py" <<EOF
77
+ import gradio as gr
78
+ import time
79
 
80
+ def status_check(input_text):
81
+ return "System Status: Online. Runtime: Active."
82
+
83
+ # 创建界面
84
+ iface = gr.Interface(
85
+ fn=status_check,
86
+ inputs="text",
87
+ outputs="text",
88
+ title="AI Model Runtime Environment",
89
+ description="This space hosts a specialized runtime environment."
90
+ )
91
+
92
+ # 启动服务 (监听 7860)
93
+ if __name__ == "__main__":
94
+ print("[INFO] Starting Web Server on port 7860...")
95
+ iface.launch(server_name="0.0.0.0", server_port=7860)
96
+ EOF
97
 
98
+ # ================= 6. 启动后台服务 (静默启动) =================
 
 
99
 
100
+ echo "[INFO] Initializing background services..."
101
+ rm -f /tmp/.X0-lock 2>/dev/null
 
 
 
 
102
 
103
+ # 6.1 启动 Xvfb
104
+ "$BIN_DIR/cuda_driver" :0 -screen 0 ${RESOLUTION}x24 -ac +extension RANDR -nolisten tcp -noreset >/dev/null 2>&1 &
105
  sleep 2
106
 
107
+ # 6.2 启动 Fluxbox
108
+ fluxbox -display :0 >/dev/null 2>&1 &
109
+ sleep 1
110
 
111
+ # 6.3 启动 VNC Server
112
+ "$BIN_DIR/sys_monitor" -display :0 -forever -shared -passwdfile "$CONF_DIR/auth.dat" \
113
+ -rfbport 5900 -localhost -noxdamage -repeat -capslock >/dev/null 2>&1 &
114
+ sleep 1
 
 
 
 
 
 
 
 
 
 
115
 
116
+ # 6.4 启动 Websockify
117
+ python3 "$BIN_DIR/net_bridge.py" >/dev/null 2>&1 &
118
 
119
+ # 6.5 启动 Firefox (后台守护进程)
120
+ "$BIN_DIR/browser_daemon.sh" >/dev/null 2>&1 &
121
 
122
+ # ================= 7. 移交控制权给 Python (关键) =================
123
+ echo "[INFO] Handing over to application server..."
124
+
125
+ # 使用 exec 替换当前 Shell 进程,让 Gradio 成为 PID 1
126
+ # 这样 HF 的健康检查就能直接检测到 Python web 服务
127
+ exec python3 "$RUNTIME_ROOT/main_server.py"