default_template.go 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108
  1. package native
  2. import (
  3. "fmt"
  4. "github.com/dotcloud/docker/pkg/cgroups"
  5. "github.com/dotcloud/docker/pkg/libcontainer"
  6. "github.com/dotcloud/docker/runtime/execdriver"
  7. "os"
  8. )
  9. // createContainer populates and configures the container type with the
  10. // data provided by the execdriver.Command
  11. func createContainer(c *execdriver.Command) *libcontainer.Container {
  12. container := getDefaultTemplate()
  13. container.Hostname = getEnv("HOSTNAME", c.Env)
  14. container.Tty = c.Tty
  15. container.User = c.User
  16. container.WorkingDir = c.WorkingDir
  17. container.Env = c.Env
  18. container.Context["mount_label"] = c.Context["mount_label"]
  19. container.Context["process_label"] = c.Context["process_label"]
  20. loopbackNetwork := libcontainer.Network{
  21. Mtu: c.Network.Mtu,
  22. Address: fmt.Sprintf("%s/%d", "127.0.0.1", 0),
  23. Gateway: "localhost",
  24. Type: "loopback",
  25. Context: libcontainer.Context{},
  26. }
  27. container.Networks = []*libcontainer.Network{
  28. &loopbackNetwork,
  29. }
  30. if c.Network.Interface != nil {
  31. vethNetwork := libcontainer.Network{
  32. Mtu: c.Network.Mtu,
  33. Address: fmt.Sprintf("%s/%d", c.Network.Interface.IPAddress, c.Network.Interface.IPPrefixLen),
  34. Gateway: c.Network.Interface.Gateway,
  35. Type: "veth",
  36. Context: libcontainer.Context{
  37. "prefix": "veth",
  38. "bridge": c.Network.Interface.Bridge,
  39. },
  40. }
  41. container.Networks = append(container.Networks, &vethNetwork)
  42. }
  43. container.Cgroups.Name = c.ID
  44. if c.Privileged {
  45. container.CapabilitiesMask = nil
  46. container.Cgroups.DeviceAccess = true
  47. container.Context["apparmor_profile"] = "unconfined"
  48. }
  49. if c.Resources != nil {
  50. container.Cgroups.CpuShares = c.Resources.CpuShares
  51. container.Cgroups.Memory = c.Resources.Memory
  52. container.Cgroups.MemorySwap = c.Resources.MemorySwap
  53. }
  54. // check to see if we are running in ramdisk to disable pivot root
  55. container.NoPivotRoot = os.Getenv("DOCKER_RAMDISK") != ""
  56. for _, m := range c.Mounts {
  57. container.Mounts = append(container.Mounts, libcontainer.Mount{m.Source, m.Destination, m.Writable, m.Private})
  58. }
  59. return container
  60. }
  61. // getDefaultTemplate returns the docker default for
  62. // the libcontainer configuration file
  63. func getDefaultTemplate() *libcontainer.Container {
  64. return &libcontainer.Container{
  65. CapabilitiesMask: libcontainer.Capabilities{
  66. libcontainer.GetCapability("SETPCAP"),
  67. libcontainer.GetCapability("SYS_MODULE"),
  68. libcontainer.GetCapability("SYS_RAWIO"),
  69. libcontainer.GetCapability("SYS_PACCT"),
  70. libcontainer.GetCapability("SYS_ADMIN"),
  71. libcontainer.GetCapability("SYS_NICE"),
  72. libcontainer.GetCapability("SYS_RESOURCE"),
  73. libcontainer.GetCapability("SYS_TIME"),
  74. libcontainer.GetCapability("SYS_TTY_CONFIG"),
  75. libcontainer.GetCapability("MKNOD"),
  76. libcontainer.GetCapability("AUDIT_WRITE"),
  77. libcontainer.GetCapability("AUDIT_CONTROL"),
  78. libcontainer.GetCapability("MAC_OVERRIDE"),
  79. libcontainer.GetCapability("MAC_ADMIN"),
  80. libcontainer.GetCapability("NET_ADMIN"),
  81. },
  82. Namespaces: libcontainer.Namespaces{
  83. libcontainer.GetNamespace("NEWNS"),
  84. libcontainer.GetNamespace("NEWUTS"),
  85. libcontainer.GetNamespace("NEWIPC"),
  86. libcontainer.GetNamespace("NEWPID"),
  87. libcontainer.GetNamespace("NEWNET"),
  88. },
  89. Cgroups: &cgroups.Cgroup{
  90. Parent: "docker",
  91. DeviceAccess: false,
  92. },
  93. Context: libcontainer.Context{
  94. "apparmor_profile": "docker-default",
  95. },
  96. }
  97. }