Commit c4c133b4 by Christian Brauner Committed by GitHub

Merge pull request #1839 from hallyn/2017-10-02/oci

Add OCI container creation template
parents b90eff81 0ef43a5c
...@@ -898,6 +898,7 @@ AC_CONFIG_FILES([ ...@@ -898,6 +898,7 @@ AC_CONFIG_FILES([
templates/lxc-fedora templates/lxc-fedora
templates/lxc-fedora-legacy templates/lxc-fedora-legacy
templates/lxc-gentoo templates/lxc-gentoo
templates/lxc-oci
templates/lxc-openmandriva templates/lxc-openmandriva
templates/lxc-opensuse templates/lxc-opensuse
templates/lxc-oracle templates/lxc-oracle
......
...@@ -263,6 +263,19 @@ Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA ...@@ -263,6 +263,19 @@ Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
<variablelist> <variablelist>
<varlistentry> <varlistentry>
<term> <term>
<option>lxc.execute.cmd</option>
</term>
<listitem>
<para>
Absolute path from container rootfs to the binary to run by default. This
mostly makes sense for lxc-execute.
</para>
</listitem>
</varlistentry>
</variablelist>
<variablelist>
<varlistentry>
<term>
<option>lxc.init.cmd</option> <option>lxc.init.cmd</option>
</term> </term>
<listitem> <listitem>
......
...@@ -3525,6 +3525,7 @@ void lxc_conf_free(struct lxc_conf *conf) ...@@ -3525,6 +3525,7 @@ void lxc_conf_free(struct lxc_conf *conf)
free(conf->ttydir); free(conf->ttydir);
free(conf->fstab); free(conf->fstab);
free(conf->rcfile); free(conf->rcfile);
free(conf->execute_cmd);
free(conf->init_cmd); free(conf->init_cmd);
free(conf->unexpanded_config); free(conf->unexpanded_config);
free(conf->pty_names); free(conf->pty_names);
......
...@@ -309,6 +309,9 @@ struct lxc_conf { ...@@ -309,6 +309,9 @@ struct lxc_conf {
char *unexpanded_config; char *unexpanded_config;
size_t unexpanded_len, unexpanded_alloced; size_t unexpanded_len, unexpanded_alloced;
/* default command for lxc-execute */
char *execute_cmd;
/* init command */ /* init command */
char *init_cmd; char *init_cmd;
......
...@@ -127,6 +127,7 @@ lxc_config_define(start); ...@@ -127,6 +127,7 @@ lxc_config_define(start);
lxc_config_define(monitor); lxc_config_define(monitor);
lxc_config_define(group); lxc_config_define(group);
lxc_config_define(environment); lxc_config_define(environment);
lxc_config_define(execute_cmd);
lxc_config_define(init_cmd); lxc_config_define(init_cmd);
lxc_config_define(init_uid); lxc_config_define(init_uid);
lxc_config_define(init_gid); lxc_config_define(init_gid);
...@@ -149,6 +150,7 @@ static struct lxc_config_t config[] = { ...@@ -149,6 +150,7 @@ static struct lxc_config_t config[] = {
{ "lxc.console.path", false, set_config_console_path, get_config_console_path, clr_config_console_path, }, { "lxc.console.path", false, set_config_console_path, get_config_console_path, clr_config_console_path, },
{ "lxc.environment", false, set_config_environment, get_config_environment, clr_config_environment, }, { "lxc.environment", false, set_config_environment, get_config_environment, clr_config_environment, },
{ "lxc.ephemeral", false, set_config_ephemeral, get_config_ephemeral, clr_config_ephemeral, }, { "lxc.ephemeral", false, set_config_ephemeral, get_config_ephemeral, clr_config_ephemeral, },
{ "lxc.execute.cmd", false, set_config_execute_cmd, get_config_execute_cmd, clr_config_execute_cmd, },
{ "lxc.group", false, set_config_group, get_config_group, clr_config_group, }, { "lxc.group", false, set_config_group, get_config_group, clr_config_group, },
{ "lxc.hook.autodev", false, set_config_hooks, get_config_hooks, clr_config_hooks, }, { "lxc.hook.autodev", false, set_config_hooks, get_config_hooks, clr_config_hooks, },
{ "lxc.hook.clone", false, set_config_hooks, get_config_hooks, clr_config_hooks, }, { "lxc.hook.clone", false, set_config_hooks, get_config_hooks, clr_config_hooks, },
...@@ -920,6 +922,12 @@ static int set_config_seccomp_profile(const char *key, const char *value, ...@@ -920,6 +922,12 @@ static int set_config_seccomp_profile(const char *key, const char *value,
return set_config_path_item(&lxc_conf->seccomp, value); return set_config_path_item(&lxc_conf->seccomp, value);
} }
static int set_config_execute_cmd(const char *key, const char *value,
struct lxc_conf *lxc_conf, void *data)
{
return set_config_path_item(&lxc_conf->execute_cmd, value);
}
static int set_config_init_cmd(const char *key, const char *value, static int set_config_init_cmd(const char *key, const char *value,
struct lxc_conf *lxc_conf, void *data) struct lxc_conf *lxc_conf, void *data)
{ {
...@@ -3095,6 +3103,12 @@ static int get_config_environment(const char *key, char *retv, int inlen, ...@@ -3095,6 +3103,12 @@ static int get_config_environment(const char *key, char *retv, int inlen,
return fulllen; return fulllen;
} }
static int get_config_execute_cmd(const char *key, char *retv, int inlen,
struct lxc_conf *c, void *data)
{
return lxc_get_conf_str(retv, inlen, c->execute_cmd);
}
static int get_config_init_cmd(const char *key, char *retv, int inlen, static int get_config_init_cmd(const char *key, char *retv, int inlen,
struct lxc_conf *c, void *data) struct lxc_conf *c, void *data)
{ {
...@@ -3450,6 +3464,14 @@ static inline int clr_config_environment(const char *key, struct lxc_conf *c, ...@@ -3450,6 +3464,14 @@ static inline int clr_config_environment(const char *key, struct lxc_conf *c,
return lxc_clear_environment(c); return lxc_clear_environment(c);
} }
static inline int clr_config_execute_cmd(const char *key, struct lxc_conf *c,
void *data)
{
free(c->execute_cmd);
c->execute_cmd = NULL;
return 0;
}
static inline int clr_config_init_cmd(const char *key, struct lxc_conf *c, static inline int clr_config_init_cmd(const char *key, struct lxc_conf *c,
void *data) void *data)
{ {
......
...@@ -46,16 +46,6 @@ lxc_log_define(lxc_execute_ui, lxc); ...@@ -46,16 +46,6 @@ lxc_log_define(lxc_execute_ui, lxc);
static struct lxc_list defines; static struct lxc_list defines;
static int my_checker(const struct lxc_arguments* args)
{
if (!args->argc) {
lxc_error(args, "missing command to execute !");
return -1;
}
return 0;
}
static int my_parser(struct lxc_arguments* args, int c, char* arg) static int my_parser(struct lxc_arguments* args, int c, char* arg)
{ {
switch (c) { switch (c) {
...@@ -100,9 +90,29 @@ Options :\n\ ...@@ -100,9 +90,29 @@ Options :\n\
-g, --gid=GID Execute COMMAND with GID inside the container\n", -g, --gid=GID Execute COMMAND with GID inside the container\n",
.options = my_longopts, .options = my_longopts,
.parser = my_parser, .parser = my_parser,
.checker = my_checker,
}; };
static bool set_argv(struct lxc_conf *conf, struct lxc_arguments *args)
{
char **components, **p;
if (!conf->execute_cmd)
return false;
/* TODO -
we should honor '"' etc; This seems worth a new helper in utils.c.
*/
components = lxc_string_split(conf->execute_cmd, ' ');
if (!components)
return false;
args->argv = components;
for (p = components; *p; p++)
args->argc++;
return true;
}
int main(int argc, char *argv[]) int main(int argc, char *argv[])
{ {
struct lxc_container *c; struct lxc_container *c;
...@@ -150,6 +160,14 @@ int main(int argc, char *argv[]) ...@@ -150,6 +160,14 @@ int main(int argc, char *argv[])
} }
} }
if (my_args.argc == 0) {
if (!set_argv(c->lxc_conf, &my_args)) {
ERROR("missing command to execute!");
lxc_container_put(c);
exit(EXIT_FAILURE);
}
}
if (my_args.uid) if (my_args.uid)
c->lxc_conf->init_uid = my_args.uid; c->lxc_conf->init_uid = my_args.uid;
......
...@@ -12,6 +12,7 @@ templates_SCRIPTS = \ ...@@ -12,6 +12,7 @@ templates_SCRIPTS = \
lxc-fedora \ lxc-fedora \
lxc-fedora-legacy \ lxc-fedora-legacy \
lxc-gentoo \ lxc-gentoo \
lxc-oci \
lxc-openmandriva \ lxc-openmandriva \
lxc-opensuse \ lxc-opensuse \
lxc-oracle \ lxc-oracle \
......
#!/bin/bash
# Create application containers from OCI images
# Copyright © 2014 Stéphane Graber <stgraber@ubuntu.com>
# Copyright © 2017 Serge Hallyn <serge@hallyn.com>
#
# This library is free software; you can redistribute it and/or
# modify it under the terms of the GNU Lesser General Public
# License as published by the Free Software Foundation; either
# version 2.1 of the License, or (at your option) any later version.
# This library is distributed in the hope that it will be useful,
# but WITHOUT ANY WARRANTY; without even the implied warranty of
# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
# Lesser General Public License for more details.
# You should have received a copy of the GNU Lesser General Public
# License along with this library; if not, write to the Free Software
# Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301
# USA
set -eu
# set -x # debug
# Make sure the usual locations are in PATH
export PATH=$PATH:/usr/sbin:/usr/bin:/sbin:/bin
# Check for required binaries
for bin in skopeo umoci jq; do
if ! type $bin >/dev/null 2>&1; then
echo "ERROR: Missing required tool: $bin" 1>&2
exit 1
fi
done
# Some useful functions
cleanup() {
if [ -d "$DOWNLOAD_TEMP" ]; then
rm -Rf $DOWNLOAD_TEMP
fi
}
in_userns() {
[ -e /proc/self/uid_map ] || { echo no; return; }
while read line; do
fields=$(echo $line | awk '{ print $1 " " $2 " " $3 }')
[ "$fields" = "0 0 4294967295" ] && { echo no; return; } || true
echo $fields | grep -q " 0 1$" && { echo userns-root; return; } || true
done < /proc/self/uid_map
[ "$(cat /proc/self/uid_map)" = "$(cat /proc/1/uid_map)" ] && \
{ echo userns-root; return; }
echo yes
}
# get entrypoint from oci image. Use sh if unspecified
# TODO - we can get other things like resource limits here
getep() {
basedir="$1"
q="$2"
digest=`cat "${basedir}/index.json" | jq --arg q "$q" '.manifests[] | if .annotations."org.opencontainers.image.ref.name" == $q then .digest else null end' | sed -e 's/"//g'`
if [ -z "${digest}" ]; then
echo "$q not found in index.json" >&2
echo "/bin/sh"
return
fi
# Ok we have the image config digest, now get the config from that,
d=${digest:7}
cdigest=`cat "${basedir}/blobs/sha256/${d}" | jq '.config.digest' | sed -e 's/"//g'`
if [ -z "${cdigest}" ]; then
echo "container config not found" >&2
echo "/bin/sh"
return
fi
d2=${cdigest:7}
ep=`cat "${basedir}/blobs/sha256/${d2}" | jq -c '.config.Entrypoint' | sed -e 's/^\[//; s/\]$//; s/","/" "/'`
cmd=`cat "${basedir}/blobs/sha256/${d2}" | jq -c '.config.Cmd' | sed -e 's/^\[//; s/\]$//; s/","/" "/'`
if [ "${ep}" = "null" ]; then
ep="${cmd}"
if [ "${ep}" = "null" ]; then
ep="/bin/sh"
fi
elif [ "${cmd}" != "null" ]; then
ep="${ep} ${cmd}"
fi
if [ -z "${ep}" ]; then
echo "/bin/sh"
return
fi
echo "${ep}"
return
}
usage() {
cat <<EOF
LXC container template for OCI images
Special arguments:
[ -h | --help ]: Print this help message and exit.
Required arguments:
[ -u | --url <url> ]: The OCI image URL
LXC internal arguments (do not pass manually!):
[ --name <name> ]: The container name
[ --path <path> ]: The path to the container
[ --rootfs <rootfs> ]: The path to the container's rootfs
[ --mapped-uid <map> ]: A uid map (user namespaces)
[ --mapped-gid <map> ]: A gid map (user namespaces)
EOF
return 0
}
options=$(getopt -o u:h -l help,name:,path:,\
rootfs:,mapped-uid:,mapped-gid: -- "$@")
if [ $? -ne 0 ]; then
usage
exit 1
fi
eval set -- "$options"
OCI_URL=""
LXC_MAPPED_GID=
LXC_MAPPED_UID=
LXC_NAME=
LXC_PATH=
LXC_ROOTFS=
while :; do
case "$1" in
-h|--help) usage && exit 1;;
-u|--url) OCI_URL=$2; shift 2;;
--name) LXC_NAME=$2; shift 2;;
--path) LXC_PATH=$2; shift 2;;
--rootfs) LXC_ROOTFS=$2; shift 2;;
--mapped-uid) LXC_MAPPED_UID=$2; shift 2;;
--mapped-gid) LXC_MAPPED_GID=$2; shift 2;;
*) break;;
esac
done
# Check that we have all variables we need
if [ -z "$LXC_NAME" ] || [ -z "$LXC_PATH" ] || [ -z "$LXC_ROOTFS" ]; then
echo "ERROR: Not running through LXC." 1>&2
exit 1
fi
if [ -z "$OCI_URL" ]; then
echo "ERROR: no OCI URL given"
exit 1
fi
USERNS=$(in_userns)
if [ "$USERNS" != "no" ]; then
if [ "$USERNS" = "yes" ]; then
if [ -z "$LXC_MAPPED_UID" ] || [ "$LXC_MAPPED_UID" = "-1" ]; then
echo "ERROR: In a user namespace without a map." 1>&2
exit 1
fi
DOWNLOAD_MODE="user"
DOWNLOAD_TARGET="user"
else
DOWNLOAD_MODE="user"
DOWNLOAD_TARGET="system"
fi
fi
# Trap all exit signals
trap cleanup EXIT HUP INT TERM
if ! type mktemp >/dev/null 2>&1; then
DOWNLOAD_TEMP=/tmp/lxc-oci.$$
mkdir -p $DOWNLOAD_TEMP
else
DOWNLOAD_TEMP=$(mktemp -d)
fi
# Download the image - TODO - cache
skopeo copy "${OCI_URL}" "oci:${DOWNLOAD_TEMP}:latest"
# Unpack the rootfs
echo "Unpacking the rootfs"
umoci unpack --image "${DOWNLOAD_TEMP}:latest" "${LXC_ROOTFS}.tmp"
rmdir "${LXC_ROOTFS}"
mv "${LXC_ROOTFS}.tmp/rootfs" "${LXC_ROOTFS}"
entrypoint=$(getep ${DOWNLOAD_TEMP} latest)
rm -rf "${LXC_ROOTFS}.tmp"
LXC_CONF_FILE="${LXC_PATH}/config"
echo "lxc.execute.cmd = ${entrypoint}" >> "${LXC_CONF_FILE}"
echo "lxc.mount.auto = proc:mixed sys:mixed cgroup:mixed" >> "${LXC_CONF_FILE}"
echo "lxc.uts.name = ${LXC_NAME}" >> ${LXC_PATH}/config
if [ -n "$LXC_MAPPED_UID" ] && [ "$LXC_MAPPED_UID" != "-1" ]; then
chown $LXC_MAPPED_UID $LXC_PATH/config $LXC_PATH/fstab >/dev/null 2>&1 || true
fi
if [ -n "$LXC_MAPPED_GID" ] && [ "$LXC_MAPPED_GID" != "-1" ]; then
chgrp $LXC_MAPPED_GID $LXC_PATH/config $LXC_PATH/fstab >/dev/null 2>&1 || true
fi
exit 0
Markdown is supported
0% or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment