create.go 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190
  1. package native
  2. import (
  3. "fmt"
  4. "os"
  5. "os/exec"
  6. "path/filepath"
  7. "github.com/docker/libcontainer"
  8. "github.com/docker/libcontainer/apparmor"
  9. "github.com/docker/libcontainer/devices"
  10. "github.com/docker/libcontainer/mount"
  11. "github.com/docker/libcontainer/security/capabilities"
  12. "github.com/dotcloud/docker/daemon/execdriver"
  13. "github.com/dotcloud/docker/daemon/execdriver/native/configuration"
  14. "github.com/dotcloud/docker/daemon/execdriver/native/template"
  15. "github.com/dotcloud/docker/utils"
  16. )
  17. // createContainer populates and configures the container type with the
  18. // data provided by the execdriver.Command
  19. func (d *driver) createContainer(c *execdriver.Command) (*libcontainer.Config, error) {
  20. container := template.New()
  21. container.Hostname = getEnv("HOSTNAME", c.Env)
  22. container.Tty = c.Tty
  23. container.User = c.User
  24. container.WorkingDir = c.WorkingDir
  25. container.Env = c.Env
  26. container.Cgroups.Name = c.ID
  27. container.Cgroups.AllowedDevices = c.AllowedDevices
  28. container.MountConfig.DeviceNodes = c.AutoCreatedDevices
  29. // check to see if we are running in ramdisk to disable pivot root
  30. container.MountConfig.NoPivotRoot = os.Getenv("DOCKER_RAMDISK") != ""
  31. container.RestrictSys = true
  32. if err := d.createNetwork(container, c); err != nil {
  33. return nil, err
  34. }
  35. if c.Privileged {
  36. if err := d.setPrivileged(container); err != nil {
  37. return nil, err
  38. }
  39. } else {
  40. d.setCapabilities(container, c)
  41. }
  42. if err := d.setupCgroups(container, c); err != nil {
  43. return nil, err
  44. }
  45. if err := d.setupMounts(container, c); err != nil {
  46. return nil, err
  47. }
  48. if err := d.setupLabels(container, c); err != nil {
  49. return nil, err
  50. }
  51. cmds := make(map[string]*exec.Cmd)
  52. d.Lock()
  53. for k, v := range d.activeContainers {
  54. cmds[k] = v.cmd
  55. }
  56. d.Unlock()
  57. if err := configuration.ParseConfiguration(container, cmds, c.Config["native"]); err != nil {
  58. return nil, err
  59. }
  60. return container, nil
  61. }
  62. func (d *driver) createNetwork(container *libcontainer.Config, c *execdriver.Command) error {
  63. if c.Network.HostNetworking {
  64. container.Namespaces["NEWNET"] = false
  65. return nil
  66. }
  67. container.Networks = []*libcontainer.Network{
  68. {
  69. Mtu: c.Network.Mtu,
  70. Address: fmt.Sprintf("%s/%d", "127.0.0.1", 0),
  71. Gateway: "localhost",
  72. Type: "loopback",
  73. },
  74. }
  75. if c.Network.Interface != nil {
  76. vethNetwork := libcontainer.Network{
  77. Mtu: c.Network.Mtu,
  78. Address: fmt.Sprintf("%s/%d", c.Network.Interface.IPAddress, c.Network.Interface.IPPrefixLen),
  79. Gateway: c.Network.Interface.Gateway,
  80. Type: "veth",
  81. Bridge: c.Network.Interface.Bridge,
  82. VethPrefix: "veth",
  83. }
  84. container.Networks = append(container.Networks, &vethNetwork)
  85. }
  86. if c.Network.ContainerID != "" {
  87. d.Lock()
  88. active := d.activeContainers[c.Network.ContainerID]
  89. d.Unlock()
  90. if active == nil || active.cmd.Process == nil {
  91. return fmt.Errorf("%s is not a valid running container to join", c.Network.ContainerID)
  92. }
  93. cmd := active.cmd
  94. nspath := filepath.Join("/proc", fmt.Sprint(cmd.Process.Pid), "ns", "net")
  95. container.Networks = append(container.Networks, &libcontainer.Network{
  96. Type: "netns",
  97. NsPath: nspath,
  98. })
  99. }
  100. return nil
  101. }
  102. func (d *driver) setPrivileged(container *libcontainer.Config) (err error) {
  103. container.Capabilities = capabilities.GetAllCapabilities()
  104. container.Cgroups.AllowAllDevices = true
  105. hostDeviceNodes, err := devices.GetHostDeviceNodes()
  106. if err != nil {
  107. return err
  108. }
  109. container.MountConfig.DeviceNodes = hostDeviceNodes
  110. container.RestrictSys = false
  111. if apparmor.IsEnabled() {
  112. container.AppArmorProfile = "unconfined"
  113. }
  114. return nil
  115. }
  116. func (d *driver) setCapabilities(container *libcontainer.Config, c *execdriver.Command) {
  117. var caps []string
  118. for _, cap := range container.Capabilities {
  119. if !utils.StringsContains(c.CapDrop, cap) {
  120. caps = append(caps, cap)
  121. }
  122. }
  123. for _, cap := range c.CapAdd {
  124. if !utils.StringsContains(caps, cap) {
  125. caps = append(caps, cap)
  126. }
  127. }
  128. container.Capabilities = caps
  129. }
  130. func (d *driver) setupCgroups(container *libcontainer.Config, c *execdriver.Command) error {
  131. if c.Resources != nil {
  132. container.Cgroups.CpuShares = c.Resources.CpuShares
  133. container.Cgroups.Memory = c.Resources.Memory
  134. container.Cgroups.MemoryReservation = c.Resources.Memory
  135. container.Cgroups.MemorySwap = c.Resources.MemorySwap
  136. container.Cgroups.CpusetCpus = c.Resources.Cpuset
  137. }
  138. return nil
  139. }
  140. func (d *driver) setupMounts(container *libcontainer.Config, c *execdriver.Command) error {
  141. for _, m := range c.Mounts {
  142. container.MountConfig.Mounts = append(container.MountConfig.Mounts, mount.Mount{
  143. Type: "bind",
  144. Source: m.Source,
  145. Destination: m.Destination,
  146. Writable: m.Writable,
  147. Private: m.Private,
  148. })
  149. }
  150. return nil
  151. }
  152. func (d *driver) setupLabels(container *libcontainer.Config, c *execdriver.Command) error {
  153. container.ProcessLabel = c.Config["process_label"][0]
  154. container.MountConfig.MountLabel = c.Config["mount_label"][0]
  155. return nil
  156. }