2018-11-26 13:32:49 -05:00
|
|
|
#!/bin/bash
|
|
|
|
|
|
|
|
#mount s3
|
|
|
|
set -euo pipefail
|
|
|
|
set -o errexit
|
|
|
|
set -o errtrace
|
|
|
|
IFS=$'\n\t'
|
|
|
|
|
|
|
|
export S3_ACL=${S3_ACL:-private}
|
|
|
|
|
|
|
|
if [ "$USE_S3_VOLUME" == "true" ]; then
|
2019-01-31 16:54:35 -05:00
|
|
|
test $MOUNT_POINT
|
|
|
|
rm -rf ${MOUNT_POINT}
|
|
|
|
mkdir -p ${MOUNT_POINT}
|
2018-11-26 13:32:49 -05:00
|
|
|
if [ "$S3_ENDPOINT" != "" ]; then
|
|
|
|
echo "$AWS_ACCESS_KEY_ID:$AWS_SECRET_ACCESS_KEY" > /usr/local/s3cred
|
|
|
|
chmod 400 /usr/local/s3cred
|
|
|
|
/usr/bin/s3fs ${S3_BUCKET_NAME} ${MOUNT_POINT} -o passwd_file=/usr/local/s3cred,use_path_request_style,url=${S3_ENDPOINT}
|
|
|
|
else
|
|
|
|
if [ "$IAM_ROLE" == "none" ]; then
|
|
|
|
export AWSACCESSKEYID=${AWSACCESSKEYID:-$AWS_ACCESS_KEY_ID}
|
|
|
|
export AWSSECRETACCESSKEY=${AWSSECRETACCESSKEY:-$AWS_SECRET_ACCESS_KEY}
|
|
|
|
|
|
|
|
echo 'IAM_ROLE is not set - mounting S3 with credentials from ENV'
|
|
|
|
/usr/bin/s3fs ${S3_BUCKET_NAME} ${MOUNT_POINT} -o nosuid,nonempty,nodev,allow_other,default_acl=${S3_ACL},retries=5
|
|
|
|
else
|
|
|
|
echo 'IAM_ROLE is set - using it to mount S3'
|
|
|
|
/usr/bin/s3fs ${S3_BUCKET_NAME} ${MOUNT_POINT} -o iam_role=${IAM_ROLE},nosuid,nonempty,nodev,allow_other,default_acl=${S3_ACL},retries=5
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
fi
|
|
|
|
|
|
|
|
mkdir -p /usr/local/source/web-api/.vizierdb/logs
|
|
|
|
|
|
|
|
|
|
|
|
|