create.go 3.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122
  1. package native
  2. import (
  3. "fmt"
  4. "os"
  5. "github.com/dotcloud/docker/daemon/execdriver"
  6. "github.com/dotcloud/docker/daemon/execdriver/native/configuration"
  7. "github.com/dotcloud/docker/daemon/execdriver/native/template"
  8. "github.com/dotcloud/docker/pkg/apparmor"
  9. "github.com/dotcloud/docker/pkg/libcontainer"
  10. )
  11. // createContainer populates and configures the container type with the
  12. // data provided by the execdriver.Command
  13. func (d *driver) createContainer(c *execdriver.Command) (*libcontainer.Container, error) {
  14. container := template.New()
  15. container.Hostname = getEnv("HOSTNAME", c.Env)
  16. container.Tty = c.Tty
  17. container.User = c.User
  18. container.WorkingDir = c.WorkingDir
  19. container.Env = c.Env
  20. container.Cgroups.Name = c.ID
  21. // check to see if we are running in ramdisk to disable pivot root
  22. container.NoPivotRoot = os.Getenv("DOCKER_RAMDISK") != ""
  23. container.Context["restrictions"] = "true"
  24. if err := d.createNetwork(container, c); err != nil {
  25. return nil, err
  26. }
  27. if c.Privileged {
  28. if err := d.setPrivileged(container); err != nil {
  29. return nil, err
  30. }
  31. } else {
  32. container.Mounts = append(container.Mounts, libcontainer.Mount{Type: "devtmpfs"})
  33. }
  34. if err := d.setupCgroups(container, c); err != nil {
  35. return nil, err
  36. }
  37. if err := d.setupMounts(container, c); err != nil {
  38. return nil, err
  39. }
  40. if err := d.setupLabels(container, c); err != nil {
  41. return nil, err
  42. }
  43. if err := configuration.ParseConfiguration(container, d.activeContainers, c.Config["native"]); err != nil {
  44. return nil, err
  45. }
  46. return container, nil
  47. }
  48. func (d *driver) createNetwork(container *libcontainer.Container, c *execdriver.Command) error {
  49. container.Networks = []*libcontainer.Network{
  50. {
  51. Mtu: c.Network.Mtu,
  52. Address: fmt.Sprintf("%s/%d", "127.0.0.1", 0),
  53. Gateway: "localhost",
  54. Type: "loopback",
  55. Context: libcontainer.Context{},
  56. },
  57. }
  58. if c.Network.Interface != nil {
  59. vethNetwork := libcontainer.Network{
  60. Mtu: c.Network.Mtu,
  61. Address: fmt.Sprintf("%s/%d", c.Network.Interface.IPAddress, c.Network.Interface.IPPrefixLen),
  62. Gateway: c.Network.Interface.Gateway,
  63. Type: "veth",
  64. Context: libcontainer.Context{
  65. "prefix": "veth",
  66. "bridge": c.Network.Interface.Bridge,
  67. },
  68. }
  69. container.Networks = append(container.Networks, &vethNetwork)
  70. }
  71. return nil
  72. }
  73. func (d *driver) setPrivileged(container *libcontainer.Container) error {
  74. for key := range container.CapabilitiesMask {
  75. container.CapabilitiesMask[key] = true
  76. }
  77. container.Cgroups.DeviceAccess = true
  78. delete(container.Context, "restrictions")
  79. if apparmor.IsEnabled() {
  80. container.Context["apparmor_profile"] = "unconfined"
  81. }
  82. return nil
  83. }
  84. func (d *driver) setupCgroups(container *libcontainer.Container, c *execdriver.Command) error {
  85. if c.Resources != nil {
  86. container.Cgroups.CpuShares = c.Resources.CpuShares
  87. container.Cgroups.Memory = c.Resources.Memory
  88. container.Cgroups.MemoryReservation = c.Resources.Memory
  89. container.Cgroups.MemorySwap = c.Resources.MemorySwap
  90. }
  91. return nil
  92. }
  93. func (d *driver) setupMounts(container *libcontainer.Container, c *execdriver.Command) error {
  94. for _, m := range c.Mounts {
  95. container.Mounts = append(container.Mounts, libcontainer.Mount{
  96. Type: "bind",
  97. Source: m.Source,
  98. Destination: m.Destination,
  99. Writable: m.Writable,
  100. Private: m.Private,
  101. })
  102. }
  103. return nil
  104. }
  105. func (d *driver) setupLabels(container *libcontainer.Container, c *execdriver.Command) error {
  106. container.Context["process_label"] = c.Config["process_label"][0]
  107. container.Context["mount_label"] = c.Config["mount_label"][0]
  108. return nil
  109. }