sysinit.go 5.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264
  1. package sysinit
  2. import (
  3. "encoding/json"
  4. "flag"
  5. "fmt"
  6. "github.com/dotcloud/docker/netlink"
  7. "github.com/dotcloud/docker/utils"
  8. "github.com/syndtr/gocapability/capability"
  9. "io/ioutil"
  10. "log"
  11. "net"
  12. "os"
  13. "os/exec"
  14. "strconv"
  15. "strings"
  16. "syscall"
  17. )
  18. type DockerInitArgs struct {
  19. user string
  20. gateway string
  21. ip string
  22. workDir string
  23. privileged bool
  24. env []string
  25. args []string
  26. mtu int
  27. }
  28. func setupHostname(args *DockerInitArgs) error {
  29. hostname := getEnv(args, "HOSTNAME")
  30. if hostname == "" {
  31. return nil
  32. }
  33. return setHostname(hostname)
  34. }
  35. // Setup networking
  36. func setupNetworking(args *DockerInitArgs) error {
  37. if args.ip != "" {
  38. // eth0
  39. iface, err := net.InterfaceByName("eth0")
  40. if err != nil {
  41. return fmt.Errorf("Unable to set up networking: %v", err)
  42. }
  43. ip, ipNet, err := net.ParseCIDR(args.ip)
  44. if err != nil {
  45. return fmt.Errorf("Unable to set up networking: %v", err)
  46. }
  47. if err := netlink.NetworkLinkAddIp(iface, ip, ipNet); err != nil {
  48. return fmt.Errorf("Unable to set up networking: %v", err)
  49. }
  50. if err := netlink.NetworkSetMTU(iface, args.mtu); err != nil {
  51. return fmt.Errorf("Unable to set MTU: %v", err)
  52. }
  53. if err := netlink.NetworkLinkUp(iface); err != nil {
  54. return fmt.Errorf("Unable to set up networking: %v", err)
  55. }
  56. // loopback
  57. iface, err = net.InterfaceByName("lo")
  58. if err != nil {
  59. return fmt.Errorf("Unable to set up networking: %v", err)
  60. }
  61. if err := netlink.NetworkLinkUp(iface); err != nil {
  62. return fmt.Errorf("Unable to set up networking: %v", err)
  63. }
  64. }
  65. if args.gateway != "" {
  66. gw := net.ParseIP(args.gateway)
  67. if gw == nil {
  68. return fmt.Errorf("Unable to set up networking, %s is not a valid gateway IP", args.gateway)
  69. }
  70. if err := netlink.AddDefaultGw(gw); err != nil {
  71. return fmt.Errorf("Unable to set up networking: %v", err)
  72. }
  73. }
  74. return nil
  75. }
  76. // Setup working directory
  77. func setupWorkingDirectory(args *DockerInitArgs) error {
  78. if args.workDir == "" {
  79. return nil
  80. }
  81. if err := syscall.Chdir(args.workDir); err != nil {
  82. return fmt.Errorf("Unable to change dir to %v: %v", args.workDir, err)
  83. }
  84. return nil
  85. }
  86. // Takes care of dropping privileges to the desired user
  87. func changeUser(args *DockerInitArgs) error {
  88. if args.user == "" {
  89. return nil
  90. }
  91. userent, err := utils.UserLookup(args.user)
  92. if err != nil {
  93. return fmt.Errorf("Unable to find user %v: %v", args.user, err)
  94. }
  95. uid, err := strconv.Atoi(userent.Uid)
  96. if err != nil {
  97. return fmt.Errorf("Invalid uid: %v", userent.Uid)
  98. }
  99. gid, err := strconv.Atoi(userent.Gid)
  100. if err != nil {
  101. return fmt.Errorf("Invalid gid: %v", userent.Gid)
  102. }
  103. if err := syscall.Setgid(gid); err != nil {
  104. return fmt.Errorf("setgid failed: %v", err)
  105. }
  106. if err := syscall.Setuid(uid); err != nil {
  107. return fmt.Errorf("setuid failed: %v", err)
  108. }
  109. return nil
  110. }
  111. func setupCapabilities(args *DockerInitArgs) error {
  112. if args.privileged {
  113. return nil
  114. }
  115. drop := []capability.Cap{
  116. capability.CAP_SETPCAP,
  117. capability.CAP_SYS_MODULE,
  118. capability.CAP_SYS_RAWIO,
  119. capability.CAP_SYS_PACCT,
  120. capability.CAP_SYS_ADMIN,
  121. capability.CAP_SYS_NICE,
  122. capability.CAP_SYS_RESOURCE,
  123. capability.CAP_SYS_TIME,
  124. capability.CAP_SYS_TTY_CONFIG,
  125. capability.CAP_MKNOD,
  126. capability.CAP_AUDIT_WRITE,
  127. capability.CAP_AUDIT_CONTROL,
  128. capability.CAP_MAC_OVERRIDE,
  129. capability.CAP_MAC_ADMIN,
  130. }
  131. c, err := capability.NewPid(os.Getpid())
  132. if err != nil {
  133. return err
  134. }
  135. c.Unset(capability.CAPS|capability.BOUNDS, drop...)
  136. if err := c.Apply(capability.CAPS | capability.BOUNDS); err != nil {
  137. return err
  138. }
  139. return nil
  140. }
  141. // Clear environment pollution introduced by lxc-start
  142. func setupEnv(args *DockerInitArgs) {
  143. os.Clearenv()
  144. for _, kv := range args.env {
  145. parts := strings.SplitN(kv, "=", 2)
  146. if len(parts) == 1 {
  147. parts = append(parts, "")
  148. }
  149. os.Setenv(parts[0], parts[1])
  150. }
  151. }
  152. func getEnv(args *DockerInitArgs, key string) string {
  153. for _, kv := range args.env {
  154. parts := strings.SplitN(kv, "=", 2)
  155. if parts[0] == key && len(parts) == 2 {
  156. return parts[1]
  157. }
  158. }
  159. return ""
  160. }
  161. func executeProgram(args *DockerInitArgs) error {
  162. setupEnv(args)
  163. if err := setupHostname(args); err != nil {
  164. return err
  165. }
  166. if err := setupNetworking(args); err != nil {
  167. return err
  168. }
  169. if err := setupCapabilities(args); err != nil {
  170. return err
  171. }
  172. if err := setupWorkingDirectory(args); err != nil {
  173. return err
  174. }
  175. if err := changeUser(args); err != nil {
  176. return err
  177. }
  178. path, err := exec.LookPath(args.args[0])
  179. if err != nil {
  180. log.Printf("Unable to locate %v", args.args[0])
  181. os.Exit(127)
  182. }
  183. if err := syscall.Exec(path, args.args, os.Environ()); err != nil {
  184. panic(err)
  185. }
  186. // Will never reach here
  187. return nil
  188. }
  189. // Sys Init code
  190. // This code is run INSIDE the container and is responsible for setting
  191. // up the environment before running the actual process
  192. func SysInit() {
  193. if len(os.Args) <= 1 {
  194. fmt.Println("You should not invoke dockerinit manually")
  195. os.Exit(1)
  196. }
  197. // Get cmdline arguments
  198. user := flag.String("u", "", "username or uid")
  199. gateway := flag.String("g", "", "gateway address")
  200. ip := flag.String("i", "", "ip address")
  201. workDir := flag.String("w", "", "workdir")
  202. privileged := flag.Bool("privileged", false, "privileged mode")
  203. mtu := flag.Int("mtu", 1500, "interface mtu")
  204. flag.Parse()
  205. // Get env
  206. var env []string
  207. content, err := ioutil.ReadFile("/.dockerenv")
  208. if err != nil {
  209. log.Fatalf("Unable to load environment variables: %v", err)
  210. }
  211. if err := json.Unmarshal(content, &env); err != nil {
  212. log.Fatalf("Unable to unmarshal environment variables: %v", err)
  213. }
  214. // Propagate the plugin-specific container env variable
  215. env = append(env, "container="+os.Getenv("container"))
  216. args := &DockerInitArgs{
  217. user: *user,
  218. gateway: *gateway,
  219. ip: *ip,
  220. workDir: *workDir,
  221. privileged: *privileged,
  222. env: env,
  223. args: flag.Args(),
  224. mtu: *mtu,
  225. }
  226. if err := executeProgram(args); err != nil {
  227. log.Fatal(err)
  228. }
  229. }