default_template_linux.go 2.0 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798
  1. package template
  2. import (
  3. "syscall"
  4. "github.com/opencontainers/runc/libcontainer/apparmor"
  5. "github.com/opencontainers/runc/libcontainer/configs"
  6. )
  7. const defaultMountFlags = syscall.MS_NOEXEC | syscall.MS_NOSUID | syscall.MS_NODEV
  8. // New returns the docker default configuration for libcontainer
  9. func New() *configs.Config {
  10. container := &configs.Config{
  11. Capabilities: []string{
  12. "CHOWN",
  13. "DAC_OVERRIDE",
  14. "FSETID",
  15. "FOWNER",
  16. "MKNOD",
  17. "NET_RAW",
  18. "SETGID",
  19. "SETUID",
  20. "SETFCAP",
  21. "SETPCAP",
  22. "NET_BIND_SERVICE",
  23. "SYS_CHROOT",
  24. "KILL",
  25. "AUDIT_WRITE",
  26. },
  27. Namespaces: configs.Namespaces([]configs.Namespace{
  28. {Type: "NEWNS"},
  29. {Type: "NEWUTS"},
  30. {Type: "NEWIPC"},
  31. {Type: "NEWPID"},
  32. {Type: "NEWNET"},
  33. {Type: "NEWUSER"},
  34. }),
  35. Cgroups: &configs.Cgroup{
  36. Parent: "docker",
  37. AllowAllDevices: false,
  38. MemorySwappiness: -1,
  39. },
  40. Mounts: []*configs.Mount{
  41. {
  42. Source: "proc",
  43. Destination: "/proc",
  44. Device: "proc",
  45. Flags: defaultMountFlags,
  46. },
  47. {
  48. Source: "tmpfs",
  49. Destination: "/dev",
  50. Device: "tmpfs",
  51. Flags: syscall.MS_NOSUID | syscall.MS_STRICTATIME,
  52. Data: "mode=755",
  53. },
  54. {
  55. Source: "devpts",
  56. Destination: "/dev/pts",
  57. Device: "devpts",
  58. Flags: syscall.MS_NOSUID | syscall.MS_NOEXEC,
  59. Data: "newinstance,ptmxmode=0666,mode=0620,gid=5",
  60. },
  61. {
  62. Source: "sysfs",
  63. Destination: "/sys",
  64. Device: "sysfs",
  65. Flags: defaultMountFlags | syscall.MS_RDONLY,
  66. },
  67. {
  68. Source: "cgroup",
  69. Destination: "/sys/fs/cgroup",
  70. Device: "cgroup",
  71. Flags: defaultMountFlags | syscall.MS_RDONLY,
  72. },
  73. },
  74. MaskPaths: []string{
  75. "/proc/kcore",
  76. "/proc/latency_stats",
  77. "/proc/timer_stats",
  78. },
  79. ReadonlyPaths: []string{
  80. "/proc/asound",
  81. "/proc/bus",
  82. "/proc/fs",
  83. "/proc/irq",
  84. "/proc/sys",
  85. "/proc/sysrq-trigger",
  86. },
  87. }
  88. if apparmor.IsEnabled() {
  89. container.AppArmorProfile = "docker-default"
  90. }
  91. return container
  92. }