180 lines
3.6 KiB
Go
180 lines
3.6 KiB
Go
|
package main
|
||
|
|
||
|
import (
|
||
|
"path/filepath"
|
||
|
"runtime"
|
||
|
|
||
|
"github.com/docker/containerkit"
|
||
|
specs "github.com/opencontainers/runtime-spec/specs-go"
|
||
|
)
|
||
|
|
||
|
func NewBindDriver() containerkit.GraphDriver {
|
||
|
return &bindDriver{}
|
||
|
}
|
||
|
|
||
|
// this demos how the graph/layer subsystem will create the rootfs and
|
||
|
// provide it to the container, the Mount type ties the execution and
|
||
|
// filesystem layers together
|
||
|
type bindDriver struct {
|
||
|
}
|
||
|
|
||
|
func (b *bindDriver) Mount(id string) (*containerkit.Mount, error) {
|
||
|
return &containerkit.Mount{
|
||
|
Target: "/",
|
||
|
Type: "bind",
|
||
|
Source: "/containers/redis/rootfs",
|
||
|
Options: []string{
|
||
|
"rbind",
|
||
|
"rw",
|
||
|
},
|
||
|
}, nil
|
||
|
}
|
||
|
|
||
|
var (
|
||
|
RWM = "rwm"
|
||
|
caps = []string{
|
||
|
"CAP_AUDIT_WRITE",
|
||
|
"CAP_KILL",
|
||
|
"CAP_FOWNER",
|
||
|
"CAP_CHOWN",
|
||
|
"CAP_MKNOD",
|
||
|
"CAP_FSETID",
|
||
|
"CAP_DAC_OVERRIDE",
|
||
|
"CAP_SETFCAP",
|
||
|
"CAP_SETPCAP",
|
||
|
"CAP_SETGID",
|
||
|
"CAP_SETUID",
|
||
|
"CAP_NET_BIND_SERVICE",
|
||
|
}
|
||
|
env = []string{
|
||
|
"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
|
||
|
}
|
||
|
)
|
||
|
|
||
|
type testConfig struct {
|
||
|
}
|
||
|
|
||
|
func (t *testConfig) ID() string {
|
||
|
return "test"
|
||
|
}
|
||
|
|
||
|
func (t *testConfig) Root() string {
|
||
|
return "/var/lib/containerkit"
|
||
|
}
|
||
|
|
||
|
func (t *testConfig) Spec(m *containerkit.Mount) (*specs.Spec, error) {
|
||
|
cgpath := filepath.Join("/containerkit", t.ID())
|
||
|
return &specs.Spec{
|
||
|
Version: specs.Version,
|
||
|
Platform: specs.Platform{
|
||
|
OS: runtime.GOOS,
|
||
|
Arch: runtime.GOARCH,
|
||
|
},
|
||
|
Root: specs.Root{
|
||
|
Path: "rootfs",
|
||
|
Readonly: false,
|
||
|
},
|
||
|
Process: specs.Process{
|
||
|
Env: env,
|
||
|
Args: []string{"sleep", "30"},
|
||
|
Terminal: false,
|
||
|
Cwd: "/",
|
||
|
NoNewPrivileges: true,
|
||
|
Capabilities: caps,
|
||
|
},
|
||
|
Hostname: "containerkit",
|
||
|
Mounts: []specs.Mount{
|
||
|
{
|
||
|
Destination: m.Target,
|
||
|
Type: m.Type,
|
||
|
Source: m.Source,
|
||
|
Options: m.Options,
|
||
|
},
|
||
|
{
|
||
|
Destination: "/proc",
|
||
|
Type: "proc",
|
||
|
Source: "proc",
|
||
|
},
|
||
|
{
|
||
|
Destination: "/dev",
|
||
|
Type: "tmpfs",
|
||
|
Source: "tmpfs",
|
||
|
Options: []string{"nosuid", "strictatime", "mode=755", "size=65536k"},
|
||
|
},
|
||
|
{
|
||
|
Destination: "/dev/pts",
|
||
|
Type: "devpts",
|
||
|
Source: "devpts",
|
||
|
Options: []string{"nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5"},
|
||
|
},
|
||
|
{
|
||
|
Destination: "/dev/shm",
|
||
|
Type: "tmpfs",
|
||
|
Source: "shm",
|
||
|
Options: []string{"nosuid", "noexec", "nodev", "mode=1777", "size=65536k"},
|
||
|
},
|
||
|
{
|
||
|
Destination: "/dev/mqueue",
|
||
|
Type: "mqueue",
|
||
|
Source: "mqueue",
|
||
|
Options: []string{"nosuid", "noexec", "nodev"},
|
||
|
},
|
||
|
{
|
||
|
Destination: "/sys",
|
||
|
Type: "sysfs",
|
||
|
Source: "sysfs",
|
||
|
Options: []string{"nosuid", "noexec", "nodev"},
|
||
|
},
|
||
|
{
|
||
|
Destination: "/run",
|
||
|
Type: "tmpfs",
|
||
|
Source: "tmpfs",
|
||
|
Options: []string{"nosuid", "strictatime", "mode=755", "size=65536k"},
|
||
|
},
|
||
|
{
|
||
|
Destination: "/etc/resolv.conf",
|
||
|
Type: "bind",
|
||
|
Source: "/etc/resolv.conf",
|
||
|
Options: []string{"rbind", "ro"},
|
||
|
},
|
||
|
{
|
||
|
Destination: "/etc/hosts",
|
||
|
Type: "bind",
|
||
|
Source: "/etc/hosts",
|
||
|
Options: []string{"rbind", "ro"},
|
||
|
},
|
||
|
{
|
||
|
Destination: "/etc/localtime",
|
||
|
Type: "bind",
|
||
|
Source: "/etc/localtime",
|
||
|
Options: []string{"rbind", "ro"},
|
||
|
},
|
||
|
},
|
||
|
Linux: &specs.Linux{
|
||
|
CgroupsPath: &cgpath,
|
||
|
Resources: &specs.Resources{
|
||
|
Devices: []specs.DeviceCgroup{
|
||
|
{
|
||
|
Allow: false,
|
||
|
Access: &RWM,
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
Namespaces: []specs.Namespace{
|
||
|
{
|
||
|
Type: "pid",
|
||
|
},
|
||
|
{
|
||
|
Type: "ipc",
|
||
|
},
|
||
|
{
|
||
|
Type: "uts",
|
||
|
},
|
||
|
{
|
||
|
Type: "mount",
|
||
|
},
|
||
|
},
|
||
|
},
|
||
|
}, nil
|
||
|
}
|