config_unix.go 6.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899
  1. //go:build linux || freebsd
  2. // +build linux freebsd
  3. package main
  4. import (
  5. "os/exec"
  6. "path/filepath"
  7. "github.com/containerd/cgroups"
  8. "github.com/docker/docker/api/types"
  9. "github.com/docker/docker/daemon/config"
  10. "github.com/docker/docker/opts"
  11. "github.com/docker/docker/pkg/homedir"
  12. "github.com/docker/docker/registry"
  13. "github.com/docker/docker/rootless"
  14. units "github.com/docker/go-units"
  15. "github.com/pkg/errors"
  16. "github.com/spf13/pflag"
  17. )
  18. // installConfigFlags adds flags to the pflag.FlagSet to configure the daemon
  19. func installConfigFlags(conf *config.Config, flags *pflag.FlagSet) error {
  20. // First handle install flags which are consistent cross-platform
  21. if err := installCommonConfigFlags(conf, flags); err != nil {
  22. return err
  23. }
  24. conf.Ulimits = make(map[string]*units.Ulimit)
  25. conf.NetworkConfig.DefaultAddressPools = opts.PoolsOpt{}
  26. // Set default value for `--default-shm-size`
  27. conf.ShmSize = opts.MemBytes(config.DefaultShmSize)
  28. conf.Runtimes = make(map[string]types.Runtime)
  29. // Then platform-specific install flags
  30. flags.Var(opts.NewNamedRuntimeOpt("runtimes", &conf.Runtimes, config.StockRuntimeName), "add-runtime", "Register an additional OCI compatible runtime")
  31. flags.StringVarP(&conf.SocketGroup, "group", "G", "docker", "Group for the unix socket")
  32. flags.StringVarP(&conf.GraphDriver, "storage-driver", "s", "", "Storage driver to use")
  33. flags.BoolVar(&conf.EnableSelinuxSupport, "selinux-enabled", false, "Enable selinux support")
  34. flags.Var(opts.NewNamedUlimitOpt("default-ulimits", &conf.Ulimits), "default-ulimit", "Default ulimits for containers")
  35. flags.BoolVar(&conf.BridgeConfig.EnableIPTables, "iptables", true, "Enable addition of iptables rules")
  36. flags.BoolVar(&conf.BridgeConfig.EnableIP6Tables, "ip6tables", false, "Enable addition of ip6tables rules (experimental)")
  37. flags.BoolVar(&conf.BridgeConfig.EnableIPForward, "ip-forward", true, "Enable net.ipv4.ip_forward")
  38. flags.BoolVar(&conf.BridgeConfig.EnableIPMasq, "ip-masq", true, "Enable IP masquerading")
  39. flags.BoolVar(&conf.BridgeConfig.EnableIPv6, "ipv6", false, "Enable IPv6 networking")
  40. flags.StringVar(&conf.BridgeConfig.IP, "bip", "", "Specify network bridge IP")
  41. flags.StringVarP(&conf.BridgeConfig.Iface, "bridge", "b", "", "Attach containers to a network bridge")
  42. flags.StringVar(&conf.BridgeConfig.FixedCIDR, "fixed-cidr", "", "IPv4 subnet for fixed IPs")
  43. flags.StringVar(&conf.BridgeConfig.FixedCIDRv6, "fixed-cidr-v6", "", "IPv6 subnet for fixed IPs")
  44. flags.Var(opts.NewIPOpt(&conf.BridgeConfig.DefaultGatewayIPv4, ""), "default-gateway", "Container default gateway IPv4 address")
  45. flags.Var(opts.NewIPOpt(&conf.BridgeConfig.DefaultGatewayIPv6, ""), "default-gateway-v6", "Container default gateway IPv6 address")
  46. flags.BoolVar(&conf.BridgeConfig.InterContainerCommunication, "icc", true, "Enable inter-container communication")
  47. flags.Var(opts.NewIPOpt(&conf.BridgeConfig.DefaultIP, "0.0.0.0"), "ip", "Default IP when binding container ports")
  48. flags.BoolVar(&conf.BridgeConfig.EnableUserlandProxy, "userland-proxy", true, "Use userland proxy for loopback traffic")
  49. defaultUserlandProxyPath := ""
  50. if rootless.RunningWithRootlessKit() {
  51. var err error
  52. // use rootlesskit-docker-proxy for exposing the ports in RootlessKit netns to the initial namespace.
  53. defaultUserlandProxyPath, err = exec.LookPath(rootless.RootlessKitDockerProxyBinary)
  54. if err != nil {
  55. return errors.Wrapf(err, "running with RootlessKit, but %s not installed", rootless.RootlessKitDockerProxyBinary)
  56. }
  57. }
  58. flags.StringVar(&conf.BridgeConfig.UserlandProxyPath, "userland-proxy-path", defaultUserlandProxyPath, "Path to the userland proxy binary")
  59. flags.StringVar(&conf.CgroupParent, "cgroup-parent", "", "Set parent cgroup for all containers")
  60. flags.StringVar(&conf.RemappedRoot, "userns-remap", "", "User/Group setting for user namespaces")
  61. flags.BoolVar(&conf.LiveRestoreEnabled, "live-restore", false, "Enable live restore of docker when containers are still running")
  62. flags.IntVar(&conf.OOMScoreAdjust, "oom-score-adjust", 0, "Set the oom_score_adj for the daemon")
  63. flags.BoolVar(&conf.Init, "init", false, "Run an init in the container to forward signals and reap processes")
  64. flags.StringVar(&conf.InitPath, "init-path", "", "Path to the docker-init binary")
  65. flags.Int64Var(&conf.CPURealtimePeriod, "cpu-rt-period", 0, "Limit the CPU real-time period in microseconds for the parent cgroup for all containers (not supported with cgroups v2)")
  66. flags.Int64Var(&conf.CPURealtimeRuntime, "cpu-rt-runtime", 0, "Limit the CPU real-time runtime in microseconds for the parent cgroup for all containers (not supported with cgroups v2)")
  67. flags.StringVar(&conf.SeccompProfile, "seccomp-profile", config.SeccompProfileDefault, `Path to seccomp profile. Use "unconfined" to disable the default seccomp profile`)
  68. flags.Var(&conf.ShmSize, "default-shm-size", "Default shm size for containers")
  69. flags.BoolVar(&conf.NoNewPrivileges, "no-new-privileges", false, "Set no-new-privileges by default for new containers")
  70. flags.StringVar(&conf.IpcMode, "default-ipc-mode", string(config.DefaultIpcMode), `Default mode for containers ipc ("shareable" | "private")`)
  71. flags.Var(&conf.NetworkConfig.DefaultAddressPools, "default-address-pool", "Default address pools for node specific local networks")
  72. // rootless needs to be explicitly specified for running "rootful" dockerd in rootless dockerd (#38702)
  73. // Note that defaultUserlandProxyPath and honorXDG are configured according to the value of rootless.RunningWithRootlessKit, not the value of --rootless.
  74. flags.BoolVar(&conf.Rootless, "rootless", rootless.RunningWithRootlessKit(), "Enable rootless mode; typically used with RootlessKit")
  75. defaultCgroupNamespaceMode := config.DefaultCgroupNamespaceMode
  76. if cgroups.Mode() != cgroups.Unified {
  77. defaultCgroupNamespaceMode = config.DefaultCgroupV1NamespaceMode
  78. }
  79. flags.StringVar(&conf.CgroupNamespaceMode, "default-cgroupns-mode", string(defaultCgroupNamespaceMode), `Default mode for containers cgroup namespace ("host" | "private")`)
  80. return nil
  81. }
  82. // configureCertsDir configures registry.CertsDir() depending on if the daemon
  83. // is running in rootless mode or not.
  84. func configureCertsDir() {
  85. if rootless.RunningWithRootlessKit() {
  86. configHome, err := homedir.GetConfigHome()
  87. if err == nil {
  88. registry.SetCertsDir(filepath.Join(configHome, "docker/certs.d"))
  89. }
  90. }
  91. }