123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231 |
- package config // import "github.com/docker/docker/daemon/config"
- import (
- "fmt"
- "net"
- "os/exec"
- "path/filepath"
- "github.com/containerd/cgroups/v3"
- "github.com/docker/docker/api/types/container"
- "github.com/docker/docker/api/types/system"
- "github.com/docker/docker/opts"
- "github.com/docker/docker/pkg/homedir"
- "github.com/docker/docker/pkg/rootless"
- units "github.com/docker/go-units"
- "github.com/pkg/errors"
- )
- const (
- // DefaultIpcMode is default for container's IpcMode, if not set otherwise
- DefaultIpcMode = container.IPCModePrivate
- // DefaultCgroupNamespaceMode is the default mode for containers cgroup namespace when using cgroups v2.
- DefaultCgroupNamespaceMode = container.CgroupnsModePrivate
- // DefaultCgroupV1NamespaceMode is the default mode for containers cgroup namespace when using cgroups v1.
- DefaultCgroupV1NamespaceMode = container.CgroupnsModeHost
- // StockRuntimeName is the reserved name/alias used to represent the
- // OCI runtime being shipped with the docker daemon package.
- StockRuntimeName = "runc"
- // minAPIVersion represents Minimum REST API version supported
- minAPIVersion = "1.12"
- )
- // BridgeConfig stores all the parameters for both the bridge driver and the default bridge network.
- type BridgeConfig struct {
- DefaultBridgeConfig
- EnableIPTables bool `json:"iptables,omitempty"`
- EnableIP6Tables bool `json:"ip6tables,omitempty"`
- EnableIPForward bool `json:"ip-forward,omitempty"`
- EnableIPMasq bool `json:"ip-masq,omitempty"`
- EnableUserlandProxy bool `json:"userland-proxy,omitempty"`
- UserlandProxyPath string `json:"userland-proxy-path,omitempty"`
- }
- // DefaultBridgeConfig stores all the parameters for the default bridge network.
- type DefaultBridgeConfig struct {
- commonBridgeConfig
- // Fields below here are platform specific.
- EnableIPv6 bool `json:"ipv6,omitempty"`
- FixedCIDRv6 string `json:"fixed-cidr-v6,omitempty"`
- MTU int `json:"mtu,omitempty"`
- DefaultIP net.IP `json:"ip,omitempty"`
- IP string `json:"bip,omitempty"`
- DefaultGatewayIPv4 net.IP `json:"default-gateway,omitempty"`
- DefaultGatewayIPv6 net.IP `json:"default-gateway-v6,omitempty"`
- InterContainerCommunication bool `json:"icc,omitempty"`
- }
- // Config defines the configuration of a docker daemon.
- // It includes json tags to deserialize configuration from a file
- // using the same names that the flags in the command line uses.
- type Config struct {
- CommonConfig
- // Fields below here are platform specific.
- Runtimes map[string]system.Runtime `json:"runtimes,omitempty"`
- DefaultInitBinary string `json:"default-init,omitempty"`
- CgroupParent string `json:"cgroup-parent,omitempty"`
- EnableSelinuxSupport bool `json:"selinux-enabled,omitempty"`
- RemappedRoot string `json:"userns-remap,omitempty"`
- Ulimits map[string]*units.Ulimit `json:"default-ulimits,omitempty"`
- CPURealtimePeriod int64 `json:"cpu-rt-period,omitempty"`
- CPURealtimeRuntime int64 `json:"cpu-rt-runtime,omitempty"`
- OOMScoreAdjust int `json:"oom-score-adjust,omitempty"` // Deprecated: configure the daemon's oom-score-adjust using a process manager instead.
- Init bool `json:"init,omitempty"`
- InitPath string `json:"init-path,omitempty"`
- SeccompProfile string `json:"seccomp-profile,omitempty"`
- ShmSize opts.MemBytes `json:"default-shm-size,omitempty"`
- NoNewPrivileges bool `json:"no-new-privileges,omitempty"`
- IpcMode string `json:"default-ipc-mode,omitempty"`
- CgroupNamespaceMode string `json:"default-cgroupns-mode,omitempty"`
- // ResolvConf is the path to the configuration of the host resolver
- ResolvConf string `json:"resolv-conf,omitempty"`
- Rootless bool `json:"rootless,omitempty"`
- }
- // GetExecRoot returns the user configured Exec-root
- func (conf *Config) GetExecRoot() string {
- return conf.ExecRoot
- }
- // GetInitPath returns the configured docker-init path
- func (conf *Config) GetInitPath() string {
- if conf.InitPath != "" {
- return conf.InitPath
- }
- if conf.DefaultInitBinary != "" {
- return conf.DefaultInitBinary
- }
- return DefaultInitBinary
- }
- // LookupInitPath returns an absolute path to the "docker-init" binary by searching relevant "libexec" directories (per FHS 3.0 & 2.3) followed by PATH
- func (conf *Config) LookupInitPath() (string, error) {
- binary := conf.GetInitPath()
- if filepath.IsAbs(binary) {
- return binary, nil
- }
- for _, dir := range []string{
- // FHS 3.0: "/usr/libexec includes internal binaries that are not intended to be executed directly by users or shell scripts. Applications may use a single subdirectory under /usr/libexec."
- // https://refspecs.linuxfoundation.org/FHS_3.0/fhs/ch04s07.html
- "/usr/local/libexec/docker",
- "/usr/libexec/docker",
- // FHS 2.3: "/usr/lib includes object files, libraries, and internal binaries that are not intended to be executed directly by users or shell scripts."
- // https://refspecs.linuxfoundation.org/FHS_2.3/fhs-2.3.html#USRLIBLIBRARIESFORPROGRAMMINGANDPA
- "/usr/local/lib/docker",
- "/usr/lib/docker",
- } {
- // exec.LookPath has a fast-path short-circuit for paths that contain "/" (skipping the PATH lookup) that then verifies whether the given path is likely to be an actual executable binary (so we invoke that instead of reimplementing the same checks)
- if file, err := exec.LookPath(filepath.Join(dir, binary)); err == nil {
- return file, nil
- }
- }
- // if we checked all the "libexec" directories and found no matches, fall back to PATH
- return exec.LookPath(binary)
- }
- // GetResolvConf returns the appropriate resolv.conf
- // Check setupResolvConf on how this is selected
- func (conf *Config) GetResolvConf() string {
- return conf.ResolvConf
- }
- // IsSwarmCompatible defines if swarm mode can be enabled in this config
- func (conf *Config) IsSwarmCompatible() error {
- if conf.LiveRestoreEnabled {
- return fmt.Errorf("--live-restore daemon configuration is incompatible with swarm mode")
- }
- return nil
- }
- func verifyDefaultIpcMode(mode string) error {
- const hint = `use "shareable" or "private"`
- dm := container.IpcMode(mode)
- if !dm.Valid() {
- return fmt.Errorf("default IPC mode setting (%v) is invalid; "+hint, dm)
- }
- if dm != "" && !dm.IsPrivate() && !dm.IsShareable() {
- return fmt.Errorf(`IPC mode "%v" is not supported as default value; `+hint, dm)
- }
- return nil
- }
- func verifyDefaultCgroupNsMode(mode string) error {
- cm := container.CgroupnsMode(mode)
- if !cm.Valid() {
- return fmt.Errorf(`default cgroup namespace mode (%v) is invalid; use "host" or "private"`, cm)
- }
- return nil
- }
- // ValidatePlatformConfig checks if any platform-specific configuration settings are invalid.
- func (conf *Config) ValidatePlatformConfig() error {
- if conf.OOMScoreAdjust != 0 {
- return errors.New(`DEPRECATED: The "oom-score-adjust" config parameter and the dockerd "--oom-score-adjust" options have been removed.`)
- }
- if err := verifyDefaultIpcMode(conf.IpcMode); err != nil {
- return err
- }
- return verifyDefaultCgroupNsMode(conf.CgroupNamespaceMode)
- }
- // IsRootless returns conf.Rootless on Linux but false on Windows
- func (conf *Config) IsRootless() bool {
- return conf.Rootless
- }
- func setPlatformDefaults(cfg *Config) error {
- cfg.Ulimits = make(map[string]*units.Ulimit)
- cfg.ShmSize = opts.MemBytes(DefaultShmSize)
- cfg.SeccompProfile = SeccompProfileDefault
- cfg.IpcMode = string(DefaultIpcMode)
- cfg.Runtimes = make(map[string]system.Runtime)
- if cgroups.Mode() != cgroups.Unified {
- cfg.CgroupNamespaceMode = string(DefaultCgroupV1NamespaceMode)
- } else {
- cfg.CgroupNamespaceMode = string(DefaultCgroupNamespaceMode)
- }
- if rootless.RunningWithRootlessKit() {
- cfg.Rootless = true
- var err error
- // use rootlesskit-docker-proxy for exposing the ports in RootlessKit netns to the initial namespace.
- cfg.BridgeConfig.UserlandProxyPath, err = exec.LookPath(rootless.RootlessKitDockerProxyBinary)
- if err != nil {
- return errors.Wrapf(err, "running with RootlessKit, but %s not installed", rootless.RootlessKitDockerProxyBinary)
- }
- dataHome, err := homedir.GetDataHome()
- if err != nil {
- return err
- }
- runtimeDir, err := homedir.GetRuntimeDir()
- if err != nil {
- return err
- }
- cfg.Root = filepath.Join(dataHome, "docker")
- cfg.ExecRoot = filepath.Join(runtimeDir, "docker")
- cfg.Pidfile = filepath.Join(runtimeDir, "docker.pid")
- } else {
- cfg.Root = "/var/lib/docker"
- cfg.ExecRoot = "/var/run/docker"
- cfg.Pidfile = "/var/run/docker.pid"
- }
- return nil
- }
|