#!/usr/bin/env bash set -uo pipefail PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin log() { printf '[microagent-init] %s\n' "$*" >&2 } read_machine_name() { if [ -r /etc/microagent/machine-name ]; then tr -d '\r\n' /dev/null 2>&1 || true cleanup() { trap - INT TERM [ -n "${rng_pid:-}" ] && kill "$rng_pid" >/dev/null 2>&1 || true [ -n "${ready_agent_pid:-}" ] && kill "$ready_agent_pid" >/dev/null 2>&1 || true [ -n "${sshd_pid:-}" ] && kill "$sshd_pid" >/dev/null 2>&1 || true [ -n "${desktop_pid:-}" ] && kill "$desktop_pid" >/dev/null 2>&1 || true [ -n "${guestd_pid:-}" ] && kill "$guestd_pid" >/dev/null 2>&1 || true wait >/dev/null 2>&1 || true exit 0 } pid_running() { local pid="${1:-}" [ -n "$pid" ] && kill -0 "$pid" >/dev/null 2>&1 } reap_if_needed() { local pid="${1:-}" if [ -n "$pid" ]; then wait "$pid" >/dev/null 2>&1 || true fi } start_sshd() { reap_if_needed "${sshd_pid:-}" log "starting sshd on 2222" /usr/sbin/sshd -D -e >>/var/log/sshd.log 2>&1 & sshd_pid=$! } start_ready_agent() { reap_if_needed "${ready_agent_pid:-}" log "starting ready agent on vsock 1024" /usr/local/bin/microagent-ready-agent >>/var/log/ready-agent.log 2>&1 & ready_agent_pid=$! } start_desktop() { reap_if_needed "${desktop_pid:-}" log "starting noVNC desktop on 6080" /usr/local/bin/microagent-desktop-session >>/var/log/desktop.log 2>&1 & desktop_pid=$! } start_guestd() { reap_if_needed "${guestd_pid:-}" log "starting guestd on 49983" /usr/local/bin/microagent-guestd >>/var/log/guestd.log 2>&1 & guestd_pid=$! } trap cleanup INT TERM log "bringing up guest network" if ! /usr/local/bin/microagent-network-up >/var/log/network.log 2>&1; then cat /var/log/network.log >&2 || true exit 1 fi machine_name="$(read_machine_name)" export COMPUTER_NAME="$machine_name" printf '%s\n' "$machine_name" >/etc/hostname cat >/etc/hosts </dev/null 2>&1 || true if [ -f /etc/microagent/authorized_keys ]; then log "installing injected authorized_keys for node" install -d -m 0700 -o node -g node /home/node/.ssh install -m 0600 -o node -g node /etc/microagent/authorized_keys /home/node/.ssh/authorized_keys fi if [ -f /etc/microagent/trusted_user_ca_keys ]; then log "using injected trusted user CA keys" chmod 0644 /etc/microagent/trusted_user_ca_keys fi # Raise default process and file-descriptor limits for interactive sessions. ulimit -n 1048576 2>/dev/null || true ulimit -u 65536 2>/dev/null || true cat >/etc/security/limits.d/microagent.conf <<'LIMITS' * soft nofile 1048576 * hard nofile 1048576 * soft nproc 65536 * hard nproc 65536 LIMITS if command -v jitterentropy-rngd >/dev/null 2>&1; then log "starting jitterentropy-rngd" jitterentropy-rngd -v >/var/log/jitterentropy.log 2>&1 & rng_pid=$! fi start_ready_agent start_sshd start_desktop start_guestd while true; do if ! pid_running "${ready_agent_pid:-}"; then log "ready agent exited; restarting" start_ready_agent fi if ! pid_running "${sshd_pid:-}"; then log "sshd exited; restarting" start_sshd fi if ! pid_running "${desktop_pid:-}"; then log "desktop session exited; restarting" start_desktop fi if ! pid_running "${guestd_pid:-}"; then log "guestd exited; restarting" start_guestd fi sleep 1 done