create.go 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140
  1. package native
  2. import (
  3. "fmt"
  4. "os"
  5. "path/filepath"
  6. "github.com/dotcloud/docker/daemon/execdriver"
  7. "github.com/dotcloud/docker/daemon/execdriver/native/configuration"
  8. "github.com/dotcloud/docker/daemon/execdriver/native/template"
  9. "github.com/dotcloud/docker/pkg/apparmor"
  10. "github.com/dotcloud/docker/pkg/libcontainer"
  11. )
  12. // createContainer populates and configures the container type with the
  13. // data provided by the execdriver.Command
  14. func (d *driver) createContainer(c *execdriver.Command) (*libcontainer.Container, error) {
  15. container := template.New()
  16. container.Hostname = getEnv("HOSTNAME", c.Env)
  17. container.Tty = c.Tty
  18. container.User = c.User
  19. container.WorkingDir = c.WorkingDir
  20. container.Env = c.Env
  21. container.Cgroups.Name = c.ID
  22. // check to see if we are running in ramdisk to disable pivot root
  23. container.NoPivotRoot = os.Getenv("DOCKER_RAMDISK") != ""
  24. container.Context["restrictions"] = "true"
  25. if err := d.createNetwork(container, c); err != nil {
  26. return nil, err
  27. }
  28. if c.Privileged {
  29. if err := d.setPrivileged(container); err != nil {
  30. return nil, err
  31. }
  32. } else {
  33. container.Mounts = append(container.Mounts, libcontainer.Mount{Type: "devtmpfs"})
  34. }
  35. if err := d.setupCgroups(container, c); err != nil {
  36. return nil, err
  37. }
  38. if err := d.setupMounts(container, c); err != nil {
  39. return nil, err
  40. }
  41. if err := d.setupLabels(container, c); err != nil {
  42. return nil, err
  43. }
  44. if err := configuration.ParseConfiguration(container, d.activeContainers, c.Config["native"]); err != nil {
  45. return nil, err
  46. }
  47. return container, nil
  48. }
  49. func (d *driver) createNetwork(container *libcontainer.Container, c *execdriver.Command) error {
  50. if c.Network.HostNetworking {
  51. container.Namespaces["NEWNET"] = false
  52. return nil
  53. }
  54. container.Networks = []*libcontainer.Network{
  55. {
  56. Mtu: c.Network.Mtu,
  57. Address: fmt.Sprintf("%s/%d", "127.0.0.1", 0),
  58. Gateway: "localhost",
  59. Type: "loopback",
  60. Context: libcontainer.Context{},
  61. },
  62. }
  63. if c.Network.Interface != nil {
  64. vethNetwork := libcontainer.Network{
  65. Mtu: c.Network.Mtu,
  66. Address: fmt.Sprintf("%s/%d", c.Network.Interface.IPAddress, c.Network.Interface.IPPrefixLen),
  67. Gateway: c.Network.Interface.Gateway,
  68. Type: "veth",
  69. Context: libcontainer.Context{
  70. "prefix": "veth",
  71. "bridge": c.Network.Interface.Bridge,
  72. },
  73. }
  74. container.Networks = append(container.Networks, &vethNetwork)
  75. }
  76. if c.Network.ContainerID != "" {
  77. cmd := d.activeContainers[c.Network.ContainerID]
  78. if cmd == nil || cmd.Process == nil {
  79. return fmt.Errorf("%s is not a valid running container to join", c.Network.ContainerID)
  80. }
  81. nspath := filepath.Join("/proc", fmt.Sprint(cmd.Process.Pid), "ns", "net")
  82. container.Networks = append(container.Networks, &libcontainer.Network{
  83. Type: "netns",
  84. Context: libcontainer.Context{
  85. "nspath": nspath,
  86. },
  87. })
  88. }
  89. return nil
  90. }
  91. func (d *driver) setPrivileged(container *libcontainer.Container) error {
  92. container.Capabilities = libcontainer.GetAllCapabilities()
  93. container.Cgroups.DeviceAccess = true
  94. delete(container.Context, "restrictions")
  95. if apparmor.IsEnabled() {
  96. container.Context["apparmor_profile"] = "unconfined"
  97. }
  98. return nil
  99. }
  100. func (d *driver) setupCgroups(container *libcontainer.Container, c *execdriver.Command) error {
  101. if c.Resources != nil {
  102. container.Cgroups.CpuShares = c.Resources.CpuShares
  103. container.Cgroups.Memory = c.Resources.Memory
  104. container.Cgroups.MemoryReservation = c.Resources.Memory
  105. container.Cgroups.MemorySwap = c.Resources.MemorySwap
  106. container.Cgroups.CpusetCpus = c.Resources.Cpuset
  107. }
  108. return nil
  109. }
  110. func (d *driver) setupMounts(container *libcontainer.Container, c *execdriver.Command) error {
  111. for _, m := range c.Mounts {
  112. container.Mounts = append(container.Mounts, libcontainer.Mount{
  113. Type: "bind",
  114. Source: m.Source,
  115. Destination: m.Destination,
  116. Writable: m.Writable,
  117. Private: m.Private,
  118. })
  119. }
  120. return nil
  121. }
  122. func (d *driver) setupLabels(container *libcontainer.Container, c *execdriver.Command) error {
  123. container.Context["process_label"] = c.Config["process_label"][0]
  124. container.Context["mount_label"] = c.Config["mount_label"][0]
  125. return nil
  126. }