create.go 4.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158
  1. package native
  2. import (
  3. "fmt"
  4. "os"
  5. "os/exec"
  6. "path/filepath"
  7. "github.com/dotcloud/docker/daemon/execdriver"
  8. "github.com/dotcloud/docker/daemon/execdriver/native/configuration"
  9. "github.com/dotcloud/docker/daemon/execdriver/native/template"
  10. "github.com/dotcloud/docker/pkg/apparmor"
  11. "github.com/dotcloud/docker/pkg/libcontainer"
  12. "github.com/dotcloud/docker/pkg/libcontainer/devices"
  13. )
  14. // createContainer populates and configures the container type with the
  15. // data provided by the execdriver.Command
  16. func (d *driver) createContainer(c *execdriver.Command) (*libcontainer.Container, error) {
  17. container := template.New()
  18. container.Hostname = getEnv("HOSTNAME", c.Env)
  19. container.Tty = c.Tty
  20. container.User = c.User
  21. container.WorkingDir = c.WorkingDir
  22. container.Env = c.Env
  23. container.Cgroups.Name = c.ID
  24. container.Cgroups.AllowedDevices = c.AllowedDevices
  25. container.DeviceNodes = c.AutoCreatedDevices
  26. // check to see if we are running in ramdisk to disable pivot root
  27. container.NoPivotRoot = os.Getenv("DOCKER_RAMDISK") != ""
  28. container.Context["restrictions"] = "true"
  29. if err := d.createNetwork(container, c); err != nil {
  30. return nil, err
  31. }
  32. if c.Privileged {
  33. if err := d.setPrivileged(container); err != nil {
  34. return nil, err
  35. }
  36. }
  37. if err := d.setupCgroups(container, c); err != nil {
  38. return nil, err
  39. }
  40. if err := d.setupMounts(container, c); err != nil {
  41. return nil, err
  42. }
  43. if err := d.setupLabels(container, c); err != nil {
  44. return nil, err
  45. }
  46. cmds := make(map[string]*exec.Cmd)
  47. d.Lock()
  48. for k, v := range d.activeContainers {
  49. cmds[k] = v.cmd
  50. }
  51. d.Unlock()
  52. if err := configuration.ParseConfiguration(container, cmds, c.Config["native"]); err != nil {
  53. return nil, err
  54. }
  55. return container, nil
  56. }
  57. func (d *driver) createNetwork(container *libcontainer.Container, c *execdriver.Command) error {
  58. if c.Network.HostNetworking {
  59. container.Namespaces["NEWNET"] = false
  60. return nil
  61. }
  62. container.Networks = []*libcontainer.Network{
  63. {
  64. Mtu: c.Network.Mtu,
  65. Address: fmt.Sprintf("%s/%d", "127.0.0.1", 0),
  66. Gateway: "localhost",
  67. Type: "loopback",
  68. Context: libcontainer.Context{},
  69. },
  70. }
  71. if c.Network.Interface != nil {
  72. vethNetwork := libcontainer.Network{
  73. Mtu: c.Network.Mtu,
  74. Address: fmt.Sprintf("%s/%d", c.Network.Interface.IPAddress, c.Network.Interface.IPPrefixLen),
  75. Gateway: c.Network.Interface.Gateway,
  76. Type: "veth",
  77. Context: libcontainer.Context{
  78. "prefix": "veth",
  79. "bridge": c.Network.Interface.Bridge,
  80. },
  81. }
  82. container.Networks = append(container.Networks, &vethNetwork)
  83. }
  84. if c.Network.ContainerID != "" {
  85. d.Lock()
  86. active := d.activeContainers[c.Network.ContainerID]
  87. d.Unlock()
  88. if active == nil || active.cmd.Process == nil {
  89. return fmt.Errorf("%s is not a valid running container to join", c.Network.ContainerID)
  90. }
  91. cmd := active.cmd
  92. nspath := filepath.Join("/proc", fmt.Sprint(cmd.Process.Pid), "ns", "net")
  93. container.Networks = append(container.Networks, &libcontainer.Network{
  94. Type: "netns",
  95. Context: libcontainer.Context{
  96. "nspath": nspath,
  97. },
  98. })
  99. }
  100. return nil
  101. }
  102. func (d *driver) setPrivileged(container *libcontainer.Container) (err error) {
  103. container.Capabilities = libcontainer.GetAllCapabilities()
  104. container.Cgroups.AllowAllDevices = true
  105. hostDeviceNodes, err := devices.GetHostDeviceNodes()
  106. if err != nil {
  107. return err
  108. }
  109. container.DeviceNodes = hostDeviceNodes
  110. delete(container.Context, "restrictions")
  111. if apparmor.IsEnabled() {
  112. container.Context["apparmor_profile"] = "unconfined"
  113. }
  114. return nil
  115. }
  116. func (d *driver) setupCgroups(container *libcontainer.Container, c *execdriver.Command) error {
  117. if c.Resources != nil {
  118. container.Cgroups.CpuShares = c.Resources.CpuShares
  119. container.Cgroups.Memory = c.Resources.Memory
  120. container.Cgroups.MemoryReservation = c.Resources.Memory
  121. container.Cgroups.MemorySwap = c.Resources.MemorySwap
  122. container.Cgroups.CpusetCpus = c.Resources.Cpuset
  123. }
  124. return nil
  125. }
  126. func (d *driver) setupMounts(container *libcontainer.Container, c *execdriver.Command) error {
  127. for _, m := range c.Mounts {
  128. container.Mounts = append(container.Mounts, libcontainer.Mount{
  129. Type: "bind",
  130. Source: m.Source,
  131. Destination: m.Destination,
  132. Writable: m.Writable,
  133. Private: m.Private,
  134. })
  135. }
  136. return nil
  137. }
  138. func (d *driver) setupLabels(container *libcontainer.Container, c *execdriver.Command) error {
  139. container.Context["process_label"] = c.Config["process_label"][0]
  140. container.Context["mount_label"] = c.Config["mount_label"][0]
  141. return nil
  142. }