Moving Beyond Basic Bash SHELL GAMES

Total Page:16

File Type:pdf, Size:1020Kb

Moving Beyond Basic Bash SHELL GAMES LinuxuSer Command Line: Bash Builtins Sebastian Duda, 123RF Duda, Sebastian Moving beyond basic Bash SHELL GAMES Even beginners can benefit from a greater understanding of the Bash has a mixture of single-letter options be- ginning with a hyphen (-) that it inher- shell’s many built-in commands. BY BRUCE BYFIELD ited from earlier incarnations, along with longer options that begin with a double ost GNU/ Linux users know or another shell just like any other com- hyphen (- -) that were added by the GNU that the command line uses mand. In Gnome, you can add options Project. MBash (Bourne Again Shell) [1], by running Gnome Terminal and creat- However, as a command, bash does but what fewer know is that, by default, ing a custom profile. When the profile is behave in some unusual ways. The first they use the plainest version of Bash. created, select Edit | Profiles | Edit | Title argument after the options can be a file The truth is that Bash is a command & Command. Then check the Run a cus- full of commands that Bash runs instead much like any other. It might be the tom command instead of my shell check- of waiting for your input at the key- command that runs other commands – a box (Figure 1). In the Custom command board. Even more significantly, as Bash command interpreter – but, just like any field, enter the form of the Bash com- starts, it refers to /etc/ profile, the generic other command, its behavior can be rad- mand you want to run, then, directly Bash profile, and ~/ .profile or ~./ . ically altered by the options you add below it, select what you want to hap- bash_profile, the customized profile in when starting it up or by running some pen when you exit from the command. the home directory of the current ac- of its built-in commands (builtins). Similarly, in KDE, open Konsole and count, as well as /etc/ bash.bashrc and Moreover, you can even choose an en- create a new profile by selecting Settings ~/ .bashrc for non-login shells. You can tirely different shell through which to in- | Manage Profile. Highlight the new pro- prevent the reading of profile files by teract with your system. file and click Edit Profile | General to adding the --noprofile option and of the Admittedly, many of Bash’s options modify the Bash command (Figure 1). If *bashrc files by adding the --norc option. and builtins [2] are of interest only if you you add the Konsole widget to your Instead, you can force Bash to use a re- are writing scripts. Desktop users are un- panel or folder view, it presents a list of placement for all bashrc files with the likely, for example, to find uses for a profiles from which you can choose to option --rcfile [file]. login shell or builtins like continue or de- suit your needs. Many of Bash’s options are of interest clare. Still, even beginners at the com- mainly to advanced users, although you mand prompt can benefit from learning Options effects might try running --verbose for a while to more about the options available from The basic structure of the Bash com- see which environment variables are in- the command line. mand is no different from any other voked by each command (Figure 2). Modifying Bash is easy. From any command: bash [options] [arguments]. Many, like those that change the startup computer or terminal, you can start Bash And, just like any other command, bash files, modify resources that Bash uses. 88 ISSUE 111 FEBRUARY 2010 Command Line: Bash Builtins LinuxuSer Several builtins give you basic information about your system. For instance, the type com- mand either tells you whether a command is an alias or builtin or it gives the path to the executable (Figure 5). You cannot see system commands like apt-get unless you are logged in as root, but type can satisfy your curiosity about the commands you Figure 1: Whether you run KDE (left) or Gnome (right), you can run a modified version of Bash, or another shell are using and how each is altogether, by making a simple change in your desktop. regarded. For example, cp (copy) is a essential com- However, you might try running the cd command to move to the subdirectory mand and is placed in /bin, whereas command bash --debugger -O extdebug (Figure 4). Another handy mod is cd- sudo, which allows you to perform root to run Bash in debugger mode. Another spell, which tries to correct the misspell- functions from another account, is less moderately advanced option is to start a ings of directory names automatically – essential to your system and is therefore restricted shell with -r, --restricted, or -O although it usually requires the full path placed in /usr/ bin. Also, you can use restricted_shell. A restricted shell is ex- and fails when you use abbreviations type to check to see whether a command actly what it sounds like: one in which like ./ for the current directory. Similarly, is an alias, although you might prefer to some basic actions are not permitted. dirspell corrects misspellings of directory use the alias command instead. These include changing directories, turn- names in file completion. Another builtin that gives you infor- ing off restrictions with set, and another Another mod for file completion is no- mation is jobs, which lists processes and nine or ten actions [3]. caseglob, which ignores the usual dis- whether they are running or stopped – Some system administrators use a re- tinction between upper- and lowercase something that can be hard to tell if you stricted shell to prevent users from mov- letters. Also, checkjobs di- are running ing about in the shell, but this technique rects Bash to display the commands in is a weak security tactic because you do status of running or the background, not need to be much of an expert to start stopped jobs when you especially if a shell that is interactive. Instead, a re- exit Bash. The mailwarn they follow the stricted shell is most valuable when you mod has Bash tell you Figure 3: A restricted shell is just Unix tradition want to test programs that might be when a file containing what it sounds like: a shell in which of not providing buggy or untrusted (Figure 3). By run- mail has been read since some functionality, like changing completion ning such programs in a restricted shell, the last time Bash ac- directories, is not allowed. messages. you can hope to minimize any damage cessed it. Entering the that they cause. bare command will give you a list of the Perhaps the most interesting option is Builtin Commands processes owned by the current user ac- -O [modification], which affects Bash in Many of Bash’s builtins are for scripting, count and the status of each. If you want a number of simple yet productive ways. which is a topic for another day, but in to end a process because it is misbehav- You can start the same modifications addition to shopt, with its modifications ing, you can enter job -l to find its pro- with Bash’s builtin shopt -s [option]. of Bash’s behavior, the builtins also in- cess ID, then enter kill [processID] to Besides the extdebug and restricted_ clude functions that are useful in every- shut it down. shell options already mentioned, some of day desktop computing. Other builtins both give information the most immediately useful modifica- In fact, Bash’s builtins are unavoid- and edit system behavior. For example, tions (mods) affect navigation. For in- able. If you have ever typed pwd to the unadorned command set lists all en- stance, if you run bash -O autocd, Bash check which directory you are in or cre- vironmental variables, whereas other interprets the name of a subdirectory ated an alias so that entering ls is equiv- options allow you to turn off or on stan- that is entered as an alias for using the alent to typing ls --color=auto, then you dard system behavior such as brace ex- have used Bash’s pansion (-B), which is Bash’s ability to builtins. For ex- replace a variable typed in curly braces ample, you can’t with its value. even navigate at Similarly, ulimit -a gives you informa- the prompt with- tion about system resource limitations, Figure 2: If you’ve ever wondered what happens when you run a com‑ out using the cd such as the maximum number of threads mand, run Bash with the verbose option. builtin. allowed or the maximum number of pro- FEBRUARY 2010 ISSUE 111 89 LinuxuSer Command Line: Bash Builtins thing: The owner of a file can zsh described as being to Bash what read, write, or execute it, but Bash is to the Windows command line – neither their group nor any- in other words, vastly superior. That is one else except root can do an exaggeration and, in tcsh’s case, is any of these things. If I probably helped by the fact that tcsh is wanted to allow others to the default shell of FreeBSD. But, with- Figure 4: Here, the ‑O option tells Bash to treat a direc‑ read new files, I could enter out a doubt, these shells possess numer- tory name that is entered as the equivalent of changing umask 4477 to change the ous features that Bash either lacks or has to that directory, and it will try to correct directory default. in less sophisticated form. For instance, names that are misspelled. Yet another builtin worth tcsh not only has a scripting syntax simi- knowing about is history, lar to that of the C programming lan- cesses that a single user can own (Figure which manages the command history guage, but it also has programmable 6).
Recommended publications
  • GNU Guix Cookbook Tutorials and Examples for Using the GNU Guix Functional Package Manager
    GNU Guix Cookbook Tutorials and examples for using the GNU Guix Functional Package Manager The GNU Guix Developers Copyright c 2019 Ricardo Wurmus Copyright c 2019 Efraim Flashner Copyright c 2019 Pierre Neidhardt Copyright c 2020 Oleg Pykhalov Copyright c 2020 Matthew Brooks Copyright c 2020 Marcin Karpezo Copyright c 2020 Brice Waegeneire Copyright c 2020 Andr´eBatista Copyright c 2020 Christine Lemmer-Webber Copyright c 2021 Joshua Branson Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.3 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitled \GNU Free Documentation License". i Table of Contents GNU Guix Cookbook ::::::::::::::::::::::::::::::: 1 1 Scheme tutorials ::::::::::::::::::::::::::::::::: 2 1.1 A Scheme Crash Course :::::::::::::::::::::::::::::::::::::::: 2 2 Packaging :::::::::::::::::::::::::::::::::::::::: 5 2.1 Packaging Tutorial:::::::::::::::::::::::::::::::::::::::::::::: 5 2.1.1 A \Hello World" package :::::::::::::::::::::::::::::::::: 5 2.1.2 Setup:::::::::::::::::::::::::::::::::::::::::::::::::::::: 8 2.1.2.1 Local file ::::::::::::::::::::::::::::::::::::::::::::: 8 2.1.2.2 `GUIX_PACKAGE_PATH' ::::::::::::::::::::::::::::::::: 9 2.1.2.3 Guix channels ::::::::::::::::::::::::::::::::::::::: 10 2.1.2.4 Direct checkout hacking:::::::::::::::::::::::::::::: 10 2.1.3 Extended example ::::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • Bash Guide for Beginners
    Bash Guide for Beginners Machtelt Garrels Garrels BVBA <tille wants no spam _at_ garrels dot be> Version 1.11 Last updated 20081227 Edition Bash Guide for Beginners Table of Contents Introduction.........................................................................................................................................................1 1. Why this guide?...................................................................................................................................1 2. Who should read this book?.................................................................................................................1 3. New versions, translations and availability.........................................................................................2 4. Revision History..................................................................................................................................2 5. Contributions.......................................................................................................................................3 6. Feedback..............................................................................................................................................3 7. Copyright information.........................................................................................................................3 8. What do you need?...............................................................................................................................4 9. Conventions used in this
    [Show full text]
  • Functional Package and Configuration Management with GNU Guix
    Functional Package and Configuration Management with GNU Guix David Thompson Wednesday, January 20th, 2016 About me GNU project volunteer GNU Guile user and contributor since 2012 GNU Guix contributor since 2013 Day job: Ruby + JavaScript web development / “DevOps” 2 Overview • Problems with application packaging and deployment • Intro to functional package and configuration management • Towards the future • How you can help 3 User autonomy and control It is becoming increasingly difficult to have control over your own computing: • GNU/Linux package managers not meeting user needs • Self-hosting web applications requires too much time and effort • Growing number of projects recommend installation via curl | sudo bash 1 or otherwise avoid using system package managers • Users unable to verify that a given binary corresponds to the source code 1http://curlpipesh.tumblr.com/ 4 User autonomy and control “Debian and other distributions are going to be that thing you run Docker on, little more.” 2 2“ownCloud and distribution packaging” http://lwn.net/Articles/670566/ 5 User autonomy and control This is very bad for desktop users and system administrators alike. We must regain control! 6 What’s wrong with Apt/Yum/Pacman/etc.? Global state (/usr) that prevents multiple versions of a package from coexisting. Non-atomic installation, removal, upgrade of software. No way to roll back. Nondeterminstic package builds and maintainer-uploaded binaries. (though this is changing!) Reliance on pre-built binaries provided by a single point of trust. Requires superuser privileges. 7 The problem is bigger Proliferation of language-specific package managers and binary bundles that complicate secure system maintenance.
    [Show full text]
  • Introduction to Shell Programming Using Bash Part I
    Introduction to shell programming using bash Part I Deniz Savas and Michael Griffiths 2005-2011 Corporate Information and Computing Services The University of Sheffield Email [email protected] [email protected] Presentation Outline • Introduction • Why use shell programs • Basics of shell programming • Using variables and parameters • User Input during shell script execution • Arithmetical operations on shell variables • Aliases • Debugging shell scripts • References Introduction • What is ‘shell’ ? • Why write shell programs? • Types of shell What is ‘shell’ ? • Provides an Interface to the UNIX Operating System • It is a command interpreter – Built on top of the kernel – Enables users to run services provided by the UNIX OS • In its simplest form a series of commands in a file is a shell program that saves having to retype commands to perform common tasks. • Shell provides a secure interface between the user and the ‘kernel’ of the operating system. Why write shell programs? • Run tasks customised for different systems. Variety of environment variables such as the operating system version and type can be detected within a script and necessary action taken to enable correct operation of a program. • Create the primary user interface for a variety of programming tasks. For example- to start up a package with a selection of options. • Write programs for controlling the routinely performed jobs run on a system. For example- to take backups when the system is idle. • Write job scripts for submission to a job-scheduler such as the sun- grid-engine. For example- to run your own programs in batch mode. Types of Unix shells • sh Bourne Shell (Original Shell) (Steven Bourne of AT&T) • csh C-Shell (C-like Syntax)(Bill Joy of Univ.
    [Show full text]
  • Using Octave and Sagemath on Taito
    Using Octave and SageMath on Taito Sampo Sillanpää 17 October 2017 CSC – Finnish research, education, culture and public administration ICT knowledge center Octave ● Powerful mathematics-oriented syntax with built- in plotting and visualization tools. ● Free software, runs on GNU/Linux, macOS, BSD, and Windows. ● Drop-in compatible with many Matlab scripts. ● https://www.gnu.org/software/octave/ SageMath ● SageMath is a free open-source mathematics software system licensed under the GPL. ● Builds on top of many existing open-source packages: NumPy, SciPy, matplotlib, Sympy, Maxima, GAP, FLINT, R and many more. ● http://www.sagemath.org/ Octave on Taito ● Latest version 4.2.1 module load octave-env octave Or octave --no-gui ● Interactive sessions on Taito-shell via NoMachine client https://research.csc.5/-/nomachine Octave Forge ● A central location for development of packages for GNU Octave. ● Packages can be installed on Taito module load octave-env octave --no-gui octave:> pkg install -forge package_name octave:> pkg load package_name SageMath on Taito ● installed version 7.6. module load sagemath sage ● Interactive sessions on Taito-shell via NoMachine client. ● Browser-based notebook sage: notebook() Octave Batch Jobs #!/bin/bash -l #mytest.sh #SBATCH --constraint="snb|hsw" #SBATCH -o output.out #SBATCH -e stderr.err #SBATCH -p serial #SBATCH -n 1 #SBATCH -t 00:05:00 #SBATCH --mem-per-cpu=1000 module load octave-env octave --no-gui/wrk/user_name/example.m used_slurm_resources.bash [user@taito-login1]$ sbatch mytest.sh SageMath Batch Jobs #!/bin/bash -l #mytest.sh #SBATCH --constraint="snb|hsw" #SBATCH -o output.out #SBATCH -e stderr.err #SBATCH -p serial #SBATCH -n 1 #SBATCH -t 00:05:00 #SBATCH --mem-per-cpu=1000 module load sagemath sage /wrk/user_name/example.sage used_slurm_resources.bash [user@taito-login1]$ sbatch mytest.sh Instrucons and Documentaon ● Octave – https://research.csc.5/-/octave – https://www.gnu.org/software/octave/doc/interp reter/ ● SageMath – https://research.csc.5/-/sagemath – http://doc.sagemath.org/ [email protected].
    [Show full text]
  • BASH Programming − Introduction HOW−TO BASH Programming − Introduction HOW−TO
    BASH Programming − Introduction HOW−TO BASH Programming − Introduction HOW−TO Table of Contents BASH Programming − Introduction HOW−TO.............................................................................................1 by Mike G mikkey at dynamo.com.ar.....................................................................................................1 1.Introduction...........................................................................................................................................1 2.Very simple Scripts...............................................................................................................................1 3.All about redirection.............................................................................................................................1 4.Pipes......................................................................................................................................................1 5.Variables...............................................................................................................................................2 6.Conditionals..........................................................................................................................................2 7.Loops for, while and until.....................................................................................................................2 8.Functions...............................................................................................................................................2
    [Show full text]
  • Introduction to BASH: Part II
    Introduction to BASH: Part II By Michael Stobb University of California, Merced February 17th, 2017 Quick Review ● Linux is a very popular operating system for scientific computing ● The command line interface (CLI) is ubiquitous and efficient ● A “shell” is a program that interprets and executes a user's commands ○ BASH: Bourne Again SHell (by far the most popular) ○ CSH: C SHell ○ ZSH: Z SHell ● Does everyone have access to a shell? Quick Review: Basic Commands ● pwd ○ ‘print working directory’, or where are you currently ● cd ○ ‘change directory’ in the filesystem, or where you want to go ● ls ○ ‘list’ the contents of the directory, or look at what is inside ● mkdir ○ ‘make directory’, or make a new folder ● cp ○ ‘copy’ a file ● mv ○ ‘move’ a file ● rm ○ ‘remove’ a file (be careful, usually no undos!) ● echo ○ Return (like an echo) the input to the screen ● Autocomplete! Download Some Example Files 1) Make a new folder, perhaps ‘bash_examples’, then cd into it. Capital ‘o’ 2) Type the following command: wget "goo.gl/oBFKrL" -O tutorial.tar 3) Extract the tar file with: tar -xf tutorial.tar 4) Delete the old tar file with rm tutorial.tar 5) cd into the new director ‘tutorial’ Input/Output Redirection ● Typically we give input to a command as follows: ○ cat file.txt ● Make the input explicit by using “<” ○ cat < file.txt ● Change the output by using “>” ○ cat < file.txt > output.txt ● Use the output of one function as the input of another ○ cat < file.txt | less BASH Utilities ● BASH has some awesome utilities ○ External commands not
    [Show full text]
  • Introduction to UNIX Command Line
    Introduction to UNIX Command Line ● Files and directories ● Some useful commands (echo, cat, grep, find, diff, tar) ● Redirection ● Pipes ● Variables ● Background processes ● Remote connections (e.g. ssh, wget) ● Scripts The Command Line ● What is it? ● An interface to UNIX ● You type commands, things happen ● Also referred to as a “shell” ● We'll use the bash shell – check you're using it by typing (you'll see what this means later): ● echo $SHELL ● If it doesn't say “bash”, then type bash to get into the bash shell Files and Directories / home var usr mcuser abenson drmentor science catvideos stuff data code report M51.fits simulate.c analyze.py report.tex Files and Directories ● Get a pre-made set of directories and files to work with ● We'll talk about what these commands do later ● The “$” is the command prompt (yours might differ). Type what's listed after hit, then press enter. $$ wgetwget http://bit.ly/1TXIZSJhttp://bit.ly/1TXIZSJ -O-O playground.tarplayground.tar $$ tartar xvfxvf playground.tarplayground.tar Files and directories $$ pwdpwd /home/abenson/home/abenson $$ cdcd playgroundplayground $$ pwdpwd /home/abenson/playground/home/abenson/playground $$ lsls animalsanimals documentsdocuments sciencescience $$ mkdirmkdir mystuffmystuff $$ lsls animalsanimals documentsdocuments mystuffmystuff sciencescience $$ cdcd animals/mammalsanimals/mammals $$ lsls badger.txtbadger.txt porcupine.txtporcupine.txt $$ lsls -l-l totaltotal 88 -rw-r--r--.-rw-r--r--. 11 abensonabenson abensonabenson 19441944 MayMay 3131 18:0318:03 badger.txtbadger.txt -rw-r--r--.-rw-r--r--. 11 abensonabenson abensonabenson 13471347 MayMay 3131 18:0518:05 porcupine.txtporcupine.txt Files and directories “Present Working Directory” $$ pwdpwd Shows the full path of your current /home/abenson/home/abenson location in the filesystem.
    [Show full text]
  • Functional Package Management with Guix
    Functional Package Management with Guix Ludovic Courtès Bordeaux, France [email protected] ABSTRACT 1. INTRODUCTION We describe the design and implementation of GNU Guix, a GNU Guix1 is a purely functional package manager for the purely functional package manager designed to support a com- GNU system [20], and in particular GNU/Linux. Pack- plete GNU/Linux distribution. Guix supports transactional age management consists in all the activities that relate upgrades and roll-backs, unprivileged package management, to building packages from source, honoring the build-time per-user profiles, and garbage collection. It builds upon the and run-time dependencies on packages, installing, removing, low-level build and deployment layer of the Nix package man- and upgrading packages in user environments. In addition ager. Guix uses Scheme as its programming interface. In to these standard features, Guix supports transactional up- particular, we devise an embedded domain-specific language grades and roll-backs, unprivileged package management, (EDSL) to describe and compose packages. We demonstrate per-user profiles, and garbage collection. Guix comes with a how it allows us to benefit from the host general-purpose distribution of user-land free software packages. programming language while not compromising on expres- siveness. Second, we show the use of Scheme to write build Guix seeks to empower users in several ways: by offering the programs, leading to a \two-tier" programming system. uncommon features listed above, by providing the tools that allow users to formally correlate a binary package and the Categories and Subject Descriptors \recipes" and source code that led to it|furthering the spirit D.4.5 [Operating Systems]: Reliability; D.4.5 [Operating of the GNU General Public License|, by allowing them to Systems]: System Programs and Utilities; D.1.1 [Software]: customize the distribution, and by lowering the barrier to Applicative (Functional) Programming entry in distribution development.
    [Show full text]
  • Learning GNU Emacs Other Resources from O’Reilly
    Learning GNU Emacs Other Resources from O’Reilly Related titles Unix in a Nutshell sed and awk Learning the vi Editor Essential CVS GNU Emacs Pocket Reference Version Control with Subversion oreilly.com oreilly.com is more than a complete catalog of O’Reilly books. You’ll also find links to news, events, articles, weblogs, sample chapters, and code examples. oreillynet.com is the essential portal for developers interested in open and emerging technologies, including new platforms, pro- gramming languages, and operating systems. Conferences O’Reilly brings diverse innovators together to nurture the ideas that spark revolutionary industries. We specialize in document- ing the latest tools and systems, translating the innovator’s knowledge into useful skills for those in the trenches. Visit con- ferences.oreilly.com for our upcoming events. Safari Bookshelf (safari.oreilly.com) is the premier online refer- ence library for programmers and IT professionals. Conduct searches across more than 1,000 books. Subscribers can zero in on answers to time-critical questions in a matter of seconds. Read the books on your Bookshelf from cover to cover or sim- ply flip to the page you need. Try it today with a free trial. THIRD EDITION Learning GNU Emacs Debra Cameron, James Elliott, Marc Loy, Eric Raymond, and Bill Rosenblatt Beijing • Cambridge • Farnham • Köln • Paris • Sebastopol • Taipei • Tokyo Learning GNU Emacs, Third Edition by Debra Cameron, James Elliott, Marc Loy, Eric Raymond, and Bill Rosenblatt Copyright © 2005 O’Reilly Media, Inc. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472.
    [Show full text]
  • An Introduction to R Notes on R: a Programming Environment for Data Analysis and Graphics Version 4.1.1 (2021-08-10)
    An Introduction to R Notes on R: A Programming Environment for Data Analysis and Graphics Version 4.1.1 (2021-08-10) W. N. Venables, D. M. Smith and the R Core Team This manual is for R, version 4.1.1 (2021-08-10). Copyright c 1990 W. N. Venables Copyright c 1992 W. N. Venables & D. M. Smith Copyright c 1997 R. Gentleman & R. Ihaka Copyright c 1997, 1998 M. Maechler Copyright c 1999{2021 R Core Team Permission is granted to make and distribute verbatim copies of this manual provided the copyright notice and this permission notice are preserved on all copies. Permission is granted to copy and distribute modified versions of this manual under the conditions for verbatim copying, provided that the entire resulting derived work is distributed under the terms of a permission notice identical to this one. Permission is granted to copy and distribute translations of this manual into an- other language, under the above conditions for modified versions, except that this permission notice may be stated in a translation approved by the R Core Team. i Table of Contents Preface :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 1 1 Introduction and preliminaries :::::::::::::::::::::::::::::::: 2 1.1 The R environment :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 2 1.2 Related software and documentation ::::::::::::::::::::::::::::::::::::::::::::::: 2 1.3 R and statistics :::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 2 1.4 R and the window system ::::::::::::::::::::::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • Enabling Rootless Linux Containers in Multi-User Environments: the Udocker Tool
    DESY 17-096 Enabling rootless Linux Containers in multi-user environments: the udocker tool Jorge Gomes1, Emanuele Bagnaschi2, Isabel Campos3, Mario David1, Lu´ısAlves1, Jo~aoMartins1, Jo~aoPina1, Alvaro L´opez-Garc´ıa3, and Pablo Orviz3 1Laborat´oriode Instrumenta¸c~aoe F´ısicaExperimental de Part´ıculas(LIP), Lisboa, Portugal 2Deutsches Elektronen-Synchrotron (DESY), 22607 Hamburg, Germany 3IFCA, Consejo Superior de Investigaciones Cient´ıficas-CSIC,Santander, Spain June 5, 2018 Abstract Containers are increasingly used as means to distribute and run Linux services and applications. In this paper we describe the architectural design and implementation of udocker, a tool which enables the user to execute Linux containers in user mode. We also present a few practical applications, using a range of scientific codes characterized by different requirements: from single core execution to MPI parallel execution and execution on GPGPUs. 1 Introduction Technologies based on Linux containers have become very popular among soft- ware developers and system administrators. The main reason behind this suc- cess is the flexibility and efficiency that containers offer when it comes to pack- ing, deploying and running software. A given software can be containerized together with all its dependencies in arXiv:1711.01758v2 [cs.SE] 1 Jun 2018 such a way that it can be seamlessly executed regardless of the Linux distribution used by the designated host systems. This is achieved by using advanced features of modern Linux kernels [1], namely control groups and namespaces isolation [2, 3]. Using both features, a set of processes can be placed in a fully isolated environment (using namespaces isolation), with a given amount of resources, such as CPU or RAM, allocated to it (using control groups).
    [Show full text]