123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224 |
- // +build linux,cgo
- package native
- import (
- "fmt"
- "os"
- "os/exec"
- "path/filepath"
- "github.com/docker/docker/daemon/execdriver"
- "github.com/docker/docker/daemon/execdriver/native/template"
- "github.com/docker/libcontainer"
- "github.com/docker/libcontainer/apparmor"
- "github.com/docker/libcontainer/devices"
- "github.com/docker/libcontainer/mount"
- "github.com/docker/libcontainer/security/capabilities"
- )
- // createContainer populates and configures the container type with the
- // data provided by the execdriver.Command
- func (d *driver) createContainer(c *execdriver.Command) (*libcontainer.Config, error) {
- container := template.New()
- container.Hostname = getEnv("HOSTNAME", c.ProcessConfig.Env)
- container.Tty = c.ProcessConfig.Tty
- container.User = c.ProcessConfig.User
- container.WorkingDir = c.WorkingDir
- container.Env = c.ProcessConfig.Env
- container.Cgroups.Name = c.ID
- container.Cgroups.AllowedDevices = c.AllowedDevices
- container.MountConfig.DeviceNodes = c.AutoCreatedDevices
- container.RootFs = c.Rootfs
- container.MountConfig.ReadonlyFs = c.ReadonlyRootfs
- // check to see if we are running in ramdisk to disable pivot root
- container.MountConfig.NoPivotRoot = os.Getenv("DOCKER_RAMDISK") != ""
- container.RestrictSys = true
- if err := d.createIpc(container, c); err != nil {
- return nil, err
- }
- if err := d.createPid(container, c); err != nil {
- return nil, err
- }
- if err := d.createNetwork(container, c); err != nil {
- return nil, err
- }
- if c.ProcessConfig.Privileged {
- if err := d.setPrivileged(container); err != nil {
- return nil, err
- }
- } else {
- if err := d.setCapabilities(container, c); err != nil {
- return nil, err
- }
- }
- if c.AppArmorProfile != "" {
- container.AppArmorProfile = c.AppArmorProfile
- }
- if err := d.setupCgroups(container, c); err != nil {
- return nil, err
- }
- if err := d.setupMounts(container, c); err != nil {
- return nil, err
- }
- if err := d.setupLabels(container, c); err != nil {
- return nil, err
- }
- cmds := make(map[string]*exec.Cmd)
- d.Lock()
- for k, v := range d.activeContainers {
- cmds[k] = v.cmd
- }
- d.Unlock()
- return container, nil
- }
- func (d *driver) createNetwork(container *libcontainer.Config, c *execdriver.Command) error {
- if c.Network.HostNetworking {
- container.Namespaces.Remove(libcontainer.NEWNET)
- return nil
- }
- container.Networks = []*libcontainer.Network{
- {
- Mtu: c.Network.Mtu,
- Address: fmt.Sprintf("%s/%d", "127.0.0.1", 0),
- Gateway: "localhost",
- Type: "loopback",
- },
- }
- if c.Network.Interface != nil {
- vethNetwork := libcontainer.Network{
- Mtu: c.Network.Mtu,
- Address: fmt.Sprintf("%s/%d", c.Network.Interface.IPAddress, c.Network.Interface.IPPrefixLen),
- MacAddress: c.Network.Interface.MacAddress,
- Gateway: c.Network.Interface.Gateway,
- Type: "veth",
- Bridge: c.Network.Interface.Bridge,
- VethPrefix: "veth",
- }
- if c.Network.Interface.GlobalIPv6Address != "" {
- vethNetwork.IPv6Address = fmt.Sprintf("%s/%d", c.Network.Interface.GlobalIPv6Address, c.Network.Interface.GlobalIPv6PrefixLen)
- vethNetwork.IPv6Gateway = c.Network.Interface.IPv6Gateway
- }
- container.Networks = append(container.Networks, &vethNetwork)
- }
- if c.Network.ContainerID != "" {
- d.Lock()
- active := d.activeContainers[c.Network.ContainerID]
- d.Unlock()
- if active == nil || active.cmd.Process == nil {
- return fmt.Errorf("%s is not a valid running container to join", c.Network.ContainerID)
- }
- cmd := active.cmd
- nspath := filepath.Join("/proc", fmt.Sprint(cmd.Process.Pid), "ns", "net")
- container.Namespaces.Add(libcontainer.NEWNET, nspath)
- }
- return nil
- }
- func (d *driver) createIpc(container *libcontainer.Config, c *execdriver.Command) error {
- if c.Ipc.HostIpc {
- container.Namespaces.Remove(libcontainer.NEWIPC)
- return nil
- }
- if c.Ipc.ContainerID != "" {
- d.Lock()
- active := d.activeContainers[c.Ipc.ContainerID]
- d.Unlock()
- if active == nil || active.cmd.Process == nil {
- return fmt.Errorf("%s is not a valid running container to join", c.Ipc.ContainerID)
- }
- cmd := active.cmd
- container.Namespaces.Add(libcontainer.NEWIPC, filepath.Join("/proc", fmt.Sprint(cmd.Process.Pid), "ns", "ipc"))
- }
- return nil
- }
- func (d *driver) createPid(container *libcontainer.Config, c *execdriver.Command) error {
- if c.Pid.HostPid {
- container.Namespaces.Remove(libcontainer.NEWPID)
- return nil
- }
- return nil
- }
- func (d *driver) setPrivileged(container *libcontainer.Config) (err error) {
- container.Capabilities = capabilities.GetAllCapabilities()
- container.Cgroups.AllowAllDevices = true
- hostDeviceNodes, err := devices.GetHostDeviceNodes()
- if err != nil {
- return err
- }
- container.MountConfig.DeviceNodes = hostDeviceNodes
- container.RestrictSys = false
- if apparmor.IsEnabled() {
- container.AppArmorProfile = "unconfined"
- }
- return nil
- }
- func (d *driver) setCapabilities(container *libcontainer.Config, c *execdriver.Command) (err error) {
- container.Capabilities, err = execdriver.TweakCapabilities(container.Capabilities, c.CapAdd, c.CapDrop)
- return err
- }
- func (d *driver) setupCgroups(container *libcontainer.Config, c *execdriver.Command) error {
- if c.Resources != nil {
- container.Cgroups.CpuShares = c.Resources.CpuShares
- container.Cgroups.Memory = c.Resources.Memory
- container.Cgroups.MemoryReservation = c.Resources.Memory
- container.Cgroups.MemorySwap = c.Resources.MemorySwap
- container.Cgroups.CpusetCpus = c.Resources.Cpuset
- }
- return nil
- }
- func (d *driver) setupMounts(container *libcontainer.Config, c *execdriver.Command) error {
- for _, m := range c.Mounts {
- container.MountConfig.Mounts = append(container.MountConfig.Mounts, &mount.Mount{
- Type: "bind",
- Source: m.Source,
- Destination: m.Destination,
- Writable: m.Writable,
- Private: m.Private,
- Slave: m.Slave,
- })
- }
- return nil
- }
- func (d *driver) setupLabels(container *libcontainer.Config, c *execdriver.Command) error {
- container.ProcessLabel = c.ProcessLabel
- container.MountConfig.MountLabel = c.MountLabel
- return nil
- }
|