
docker will run the process(es) within the container with an SELinux label and will label all of the content within the container with mount label. Any temporary file systems created within the container need to be mounted with the same mount label. The user can override the process label by specifying -Z With a string of space separated options. -Z "user=unconfined_u role=unconfined_r type=unconfined_t level=s0" Would cause the process label to run with unconfined_u:unconfined_r:unconfined_t:s0" By default the processes will run execute within the container as svirt_lxc_net_t. All of the content in the container as svirt_sandbox_file_t. The process mcs level is based of the PID of the docker process that is creating the container. If you run the container in --priv mode, the labeling will be disabled. Docker-DCO-1.1-Signed-off-by: Dan Walsh <dwalsh@redhat.com> (github: rhatdan)
144 lines
4.1 KiB
Go
144 lines
4.1 KiB
Go
package execdriver
|
|
|
|
import (
|
|
"errors"
|
|
"io"
|
|
"os"
|
|
"os/exec"
|
|
)
|
|
|
|
// Context is a generic key value pair that allows
|
|
// arbatrary data to be sent
|
|
type Context map[string]string
|
|
|
|
var (
|
|
ErrNotRunning = errors.New("Process could not be started")
|
|
ErrWaitTimeoutReached = errors.New("Wait timeout reached")
|
|
ErrDriverAlreadyRegistered = errors.New("A driver already registered this docker init function")
|
|
ErrDriverNotFound = errors.New("The requested docker init has not been found")
|
|
)
|
|
|
|
var dockerInitFcts map[string]InitFunc
|
|
|
|
type (
|
|
StartCallback func(*Command)
|
|
InitFunc func(i *InitArgs) error
|
|
)
|
|
|
|
func RegisterInitFunc(name string, fct InitFunc) error {
|
|
if dockerInitFcts == nil {
|
|
dockerInitFcts = make(map[string]InitFunc)
|
|
}
|
|
if _, ok := dockerInitFcts[name]; ok {
|
|
return ErrDriverAlreadyRegistered
|
|
}
|
|
dockerInitFcts[name] = fct
|
|
return nil
|
|
}
|
|
|
|
func GetInitFunc(name string) (InitFunc, error) {
|
|
fct, ok := dockerInitFcts[name]
|
|
if !ok {
|
|
return nil, ErrDriverNotFound
|
|
}
|
|
return fct, nil
|
|
}
|
|
|
|
// Args provided to the init function for a driver
|
|
type InitArgs struct {
|
|
User string
|
|
Gateway string
|
|
Ip string
|
|
WorkDir string
|
|
Privileged bool
|
|
Env []string
|
|
Args []string
|
|
Mtu int
|
|
Driver string
|
|
Console string
|
|
Pipe int
|
|
Root string
|
|
}
|
|
|
|
// Driver specific information based on
|
|
// processes registered with the driver
|
|
type Info interface {
|
|
IsRunning() bool
|
|
}
|
|
|
|
// Terminal in an interface for drivers to implement
|
|
// if they want to support Close and Resize calls from
|
|
// the core
|
|
type Terminal interface {
|
|
io.Closer
|
|
Resize(height, width int) error
|
|
}
|
|
|
|
type TtyTerminal interface {
|
|
Master() *os.File
|
|
}
|
|
|
|
type Driver interface {
|
|
Run(c *Command, pipes *Pipes, startCallback StartCallback) (int, error) // Run executes the process and blocks until the process exits and returns the exit code
|
|
Kill(c *Command, sig int) error
|
|
Name() string // Driver name
|
|
Info(id string) Info // "temporary" hack (until we move state from core to plugins)
|
|
GetPidsForContainer(id string) ([]int, error) // Returns a list of pids for the given container.
|
|
}
|
|
|
|
// Network settings of the container
|
|
type Network struct {
|
|
Interface *NetworkInterface `json:"interface"` // if interface is nil then networking is disabled
|
|
Mtu int `json:"mtu"`
|
|
}
|
|
|
|
type NetworkInterface struct {
|
|
Gateway string `json:"gateway"`
|
|
IPAddress string `json:"ip"`
|
|
Bridge string `json:"bridge"`
|
|
IPPrefixLen int `json:"ip_prefix_len"`
|
|
}
|
|
|
|
type Resources struct {
|
|
Memory int64 `json:"memory"`
|
|
MemorySwap int64 `json:"memory_swap"`
|
|
CpuShares int64 `json:"cpu_shares"`
|
|
}
|
|
|
|
type Mount struct {
|
|
Source string `json:"source"`
|
|
Destination string `json:"destination"`
|
|
Writable bool `json:"writable"`
|
|
Private bool `json:"private"`
|
|
}
|
|
|
|
// Process wrapps an os/exec.Cmd to add more metadata
|
|
type Command struct {
|
|
exec.Cmd `json:"-"`
|
|
|
|
ID string `json:"id"`
|
|
Privileged bool `json:"privileged"`
|
|
User string `json:"user"`
|
|
Rootfs string `json:"rootfs"` // root fs of the container
|
|
InitPath string `json:"initpath"` // dockerinit
|
|
Entrypoint string `json:"entrypoint"`
|
|
Arguments []string `json:"arguments"`
|
|
WorkingDir string `json:"working_dir"`
|
|
ConfigPath string `json:"config_path"` // this should be able to be removed when the lxc template is moved into the driver
|
|
Context Context `json:"context"` // generic context for specific options (apparmor, selinux)
|
|
Tty bool `json:"tty"`
|
|
Network *Network `json:"network"`
|
|
Config []string `json:"config"` // generic values that specific drivers can consume
|
|
Resources *Resources `json:"resources"`
|
|
Mounts []Mount `json:"mounts"`
|
|
|
|
Terminal Terminal `json:"-"` // standard or tty terminal
|
|
Console string `json:"-"` // dev/console path
|
|
ContainerPid int `json:"container_pid"` // the pid for the process inside a container
|
|
}
|
|
|
|
// Return the pid of the process
|
|
// If the process is nil -1 will be returned
|
|
func (c *Command) Pid() int {
|
|
return c.ContainerPid
|
|
}
|