default_template.go 2.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110
  1. package template
  2. import (
  3. "syscall"
  4. "github.com/docker/libcontainer/apparmor"
  5. "github.com/docker/libcontainer/configs"
  6. )
  7. const defaultMountFlags = syscall.MS_NOEXEC | syscall.MS_NOSUID | syscall.MS_NODEV
  8. // New returns the docker default configuration for libcontainer
  9. func New() *configs.Config {
  10. container := &configs.Config{
  11. Capabilities: []string{
  12. "CHOWN",
  13. "DAC_OVERRIDE",
  14. "FSETID",
  15. "FOWNER",
  16. "MKNOD",
  17. "NET_RAW",
  18. "SETGID",
  19. "SETUID",
  20. "SETFCAP",
  21. "SETPCAP",
  22. "NET_BIND_SERVICE",
  23. "SYS_CHROOT",
  24. "KILL",
  25. "AUDIT_WRITE",
  26. },
  27. Namespaces: configs.Namespaces([]configs.Namespace{
  28. {Type: "NEWNS"},
  29. {Type: "NEWUTS"},
  30. {Type: "NEWIPC"},
  31. {Type: "NEWPID"},
  32. {Type: "NEWNET"},
  33. }),
  34. Cgroups: &configs.Cgroup{
  35. Parent: "docker",
  36. AllowAllDevices: false,
  37. MemorySwappiness: -1,
  38. },
  39. Mounts: []*configs.Mount{
  40. {
  41. Source: "proc",
  42. Destination: "/proc",
  43. Device: "proc",
  44. Flags: defaultMountFlags,
  45. },
  46. {
  47. Source: "tmpfs",
  48. Destination: "/dev",
  49. Device: "tmpfs",
  50. Flags: syscall.MS_NOSUID | syscall.MS_STRICTATIME,
  51. Data: "mode=755",
  52. },
  53. {
  54. Source: "devpts",
  55. Destination: "/dev/pts",
  56. Device: "devpts",
  57. Flags: syscall.MS_NOSUID | syscall.MS_NOEXEC,
  58. Data: "newinstance,ptmxmode=0666,mode=0620,gid=5",
  59. },
  60. {
  61. Device: "tmpfs",
  62. Source: "shm",
  63. Destination: "/dev/shm",
  64. Data: "mode=1777,size=65536k",
  65. Flags: defaultMountFlags,
  66. },
  67. {
  68. Source: "mqueue",
  69. Destination: "/dev/mqueue",
  70. Device: "mqueue",
  71. Flags: defaultMountFlags,
  72. },
  73. {
  74. Source: "sysfs",
  75. Destination: "/sys",
  76. Device: "sysfs",
  77. Flags: defaultMountFlags | syscall.MS_RDONLY,
  78. },
  79. {
  80. Source: "cgroup",
  81. Destination: "/sys/fs/cgroup",
  82. Device: "cgroup",
  83. Flags: defaultMountFlags | syscall.MS_RDONLY,
  84. },
  85. },
  86. MaskPaths: []string{
  87. "/proc/kcore",
  88. "/proc/latency_stats",
  89. "/proc/timer_stats",
  90. },
  91. ReadonlyPaths: []string{
  92. "/proc/asound",
  93. "/proc/bus",
  94. "/proc/fs",
  95. "/proc/irq",
  96. "/proc/sys",
  97. "/proc/sysrq-trigger",
  98. },
  99. }
  100. if apparmor.IsEnabled() {
  101. container.AppArmorProfile = "docker-default"
  102. }
  103. return container
  104. }