mirror of
https://github.com/phusion/baseimage-docker.git
synced 2026-03-26 04:18:46 +00:00
Compare commits
59 Commits
| Author | SHA1 | Date | |
|---|---|---|---|
|
|
5ae32384d5 | ||
|
|
f55fde8d99 | ||
|
|
0632b4865b | ||
|
|
7914d8ac55 | ||
|
|
73709ed0a0 | ||
|
|
dfaac83527 | ||
|
|
e11f2b8cfd | ||
|
|
fa3098206d | ||
|
|
ad347d91c8 | ||
|
|
55727c2f30 | ||
|
|
c8e79991b7 | ||
|
|
a03b58d94d | ||
|
|
ed89f20836 | ||
|
|
fd8a1273ad | ||
|
|
4094d20cec | ||
|
|
585932c74c | ||
|
|
3366687e86 | ||
|
|
b749352f1e | ||
|
|
25d9972c0b | ||
|
|
5b1b6e8364 | ||
|
|
0dab5aa4c8 | ||
|
|
2ef5fa1659 | ||
|
|
17cb4cebca | ||
|
|
ac7f9b0785 | ||
|
|
d06b177508 | ||
|
|
775ded05dc | ||
|
|
cc9847580d | ||
|
|
46334c7363 | ||
|
|
1684aa1448 | ||
|
|
367cddb201 | ||
|
|
27782aca39 | ||
|
|
4e60438c66 | ||
|
|
ec719ad255 | ||
|
|
23651ad5ff | ||
|
|
300adc0bf2 | ||
|
|
c0e872b3e3 | ||
|
|
87698aa223 | ||
|
|
68e4f5e8bf | ||
|
|
8cf30f326e | ||
|
|
9af37c0d58 | ||
|
|
095c1e715c | ||
|
|
aa46e10163 | ||
|
|
5e9f60b0ea | ||
|
|
139bc7b81e | ||
|
|
3d5a46482f | ||
|
|
6d1a12673b | ||
|
|
55efefa51b | ||
|
|
1443856c34 | ||
|
|
bf35ff2bf1 | ||
|
|
7bd55402b0 | ||
|
|
1c560d073d | ||
|
|
3eec5201da | ||
|
|
02c42206ec | ||
|
|
3125ec683b | ||
|
|
829d753a88 | ||
|
|
91a6b2d7a2 | ||
|
|
636444612f | ||
|
|
a131b126f5 | ||
|
|
cb700ed590 |
30
Changelog.md
30
Changelog.md
@@ -1,10 +1,38 @@
|
|||||||
|
## 0.9.9 (release date: 2014-03-25)
|
||||||
|
|
||||||
|
* Fixed a problem with rssh. (Slawomir Chodnicki)
|
||||||
|
* The `INITRD` environment variable is now set in the container by default. This prevents updates to the `initramfs` from running grub or lilo.
|
||||||
|
* The `ischroot` tool in Ubuntu has been modified to always return true. This prevents updates to the `initscripts` package from breaking /dev/shm.
|
||||||
|
* Various minor bug fixes, improvements and typo corrections. (Felix Hummel, Laurent Sarrazin, Dung Quang, Amir Gur)
|
||||||
|
|
||||||
|
## 0.9.8 (release date: 2014-02-26)
|
||||||
|
|
||||||
|
* Fixed a regression in `my_init` which causes it to delete environment variables passed from Docker.
|
||||||
|
* Fixed `my_init` not properly forcing Runit to shut down if Runit appears to refuse to respond to SIGTERM.
|
||||||
|
|
||||||
|
## 0.9.7 (release date: 2014-02-25)
|
||||||
|
|
||||||
|
* Improved and fixed bugs in `my_init` (Thomas LÉVEIL):
|
||||||
|
* It is now possible to enable the insecure key by passing `--enable-insecure-key` to `my_init`. This allows users to easily enable the insecure key for convenience reasons, without having the insecure key enabled permanently in the image.
|
||||||
|
* `my_init` now exports environment variables to the directory `/etc/container_environment` and to the files `/etc/container_environment.sh`, `/etc/container_environment.json`. This allows all applications to query what the original environment variables were. It is also possible to change the environment variables in `my_init` by modifying `/etc/container_environment`. More information can be found in the README, section "Environment variables".
|
||||||
|
* Fixed a bug that causes it not to print messages to stdout when there is no pseudo terminal. This is because Python buffers stdout by default.
|
||||||
|
* Fixed an incorrectly printed message.
|
||||||
|
* The insecure key is now also available in PuTTY format. (Thomas LÉVEIL)
|
||||||
|
* Fixed `enable_insecure_key` removing already installed SSH keys. (Thomas LÉVEIL)
|
||||||
|
* The baseimage-docker image no longer EXPOSEs any ports by default. The EXPOSE entries were originally there to enable some default guest-to-host port forwarding entries, but in recent Docker versions they changed the meaning of EXPOSE, and now EXPOSE is used for linking containers. As such, we no longer have a reason to EXPOSE any ports by default. Fixes GH-15.
|
||||||
|
* Fixed syslog-ng not being able to start because of a missing afsql module. Fixes the issue described in [pull request 7](https://github.com/phusion/baseimage-docker/pull/7).
|
||||||
|
* Removed some default Ubuntu cron jobs which are not useful in Docker containers.
|
||||||
|
* Added the logrotate service. Fixes GH-22.
|
||||||
|
* Fixed some warnings in `/etc/my_init.d/00_regen_ssh_host_keys.sh`.
|
||||||
|
* Fixed some typos in the documentation. (Dr Nic Williams, Tomer Cohen)
|
||||||
|
|
||||||
## 0.9.6 (release date: 2014-02-17)
|
## 0.9.6 (release date: 2014-02-17)
|
||||||
|
|
||||||
* Fixed a bug in `my_init`: child processes that have been adopted during execution of init scripts are now properly reaped.
|
* Fixed a bug in `my_init`: child processes that have been adopted during execution of init scripts are now properly reaped.
|
||||||
* Much improved `my_init`:
|
* Much improved `my_init`:
|
||||||
* It is now possible to run and watch a custom command, possibly in addition to running runit. See "Running a one-shot command in the container" in the README.
|
* It is now possible to run and watch a custom command, possibly in addition to running runit. See "Running a one-shot command in the container" in the README.
|
||||||
* It is now possible to skip running startup files such as /etc/rc.local.
|
* It is now possible to skip running startup files such as /etc/rc.local.
|
||||||
* Shutdown is not much faster. It previously took a few seconds, but it is now almost instantaneous.
|
* Shutdown is now much faster. It previously took a few seconds, but it is now almost instantaneous.
|
||||||
* It ensures that all processes in the container are properly shut down with SIGTERM, even those that are not direct child processes of `my_init`.
|
* It ensures that all processes in the container are properly shut down with SIGTERM, even those that are not direct child processes of `my_init`.
|
||||||
* `setuser` now also sets auxilliary groups, as well as more environment variables such as `USER` and `UID`.
|
* `setuser` now also sets auxilliary groups, as well as more environment variables such as `USER` and `UID`.
|
||||||
|
|
||||||
|
|||||||
6
Makefile
6
Makefile
@@ -1,12 +1,12 @@
|
|||||||
NAME = phusion/baseimage
|
NAME = phusion/baseimage
|
||||||
VERSION = 0.9.6
|
VERSION = 0.9.9
|
||||||
|
|
||||||
.PHONY: all build test tag_latest release ssh
|
.PHONY: all build test tag_latest release ssh
|
||||||
|
|
||||||
all: build
|
all: build
|
||||||
|
|
||||||
build:
|
build:
|
||||||
docker build -t $(NAME):$(VERSION) -rm image
|
docker build -t $(NAME):$(VERSION) --rm image
|
||||||
|
|
||||||
test:
|
test:
|
||||||
env NAME=$(NAME) VERSION=$(VERSION) ./test/runner.sh
|
env NAME=$(NAME) VERSION=$(VERSION) ./test/runner.sh
|
||||||
@@ -15,7 +15,7 @@ tag_latest:
|
|||||||
docker tag $(NAME):$(VERSION) $(NAME):latest
|
docker tag $(NAME):$(VERSION) $(NAME):latest
|
||||||
|
|
||||||
release: test tag_latest
|
release: test tag_latest
|
||||||
@if ! docker images phusion/baseimage | awk '{ print $$2 }' | grep -q -F $(VERSION); then echo "$(NAME) version $(VERSION) is not yet built. Please run 'make build'"; false; fi
|
@if ! docker images $(NAME) | awk '{ print $$2 }' | grep -q -F $(VERSION); then echo "$(NAME) version $(VERSION) is not yet built. Please run 'make build'"; false; fi
|
||||||
docker push $(NAME)
|
docker push $(NAME)
|
||||||
@echo "*** Don't forget to create a tag. git tag rel-$(VERSION) && git push origin rel-$(VERSION)"
|
@echo "*** Don't forget to create a tag. git tag rel-$(VERSION) && git push origin rel-$(VERSION)"
|
||||||
|
|
||||||
|
|||||||
153
README.md
153
README.md
@@ -41,7 +41,16 @@ You can configure the stock `ubuntu` image yourself from your Dockerfile, so why
|
|||||||
* [Adding additional daemons](#adding_additional_daemons)
|
* [Adding additional daemons](#adding_additional_daemons)
|
||||||
* [Running scripts during container startup](#running_startup_scripts)
|
* [Running scripts during container startup](#running_startup_scripts)
|
||||||
* [Running a one-shot command in the container](#oneshot)
|
* [Running a one-shot command in the container](#oneshot)
|
||||||
|
* [Environment variables](#environment_variables)
|
||||||
|
* [Centrally defining your own environment variables](#envvar_central_definition)
|
||||||
|
* [Environment variable dumps](#envvar_dumps)
|
||||||
|
* [Modifying environment variables](#modifying_envvars)
|
||||||
|
* [Security](#envvar_security)
|
||||||
* [Login to the container via SSH](#login)
|
* [Login to the container via SSH](#login)
|
||||||
|
* [Using the insecure key for one container only](#using_the_insecure_key_for_one_container_only)
|
||||||
|
* [Enabling the insecure key permanently](#enabling_the_insecure_key_permanently)
|
||||||
|
* [Using your own key](#using_your_own_key)
|
||||||
|
* [Disabling SSH](#disabling_ssh)
|
||||||
* [Building the image yourself](#building)
|
* [Building the image yourself](#building)
|
||||||
* [Conclusion](#conclusion)
|
* [Conclusion](#conclusion)
|
||||||
|
|
||||||
@@ -58,10 +67,11 @@ You can configure the stock `ubuntu` image yourself from your Dockerfile, so why
|
|||||||
| Component | Why is it included? / Remarks |
|
| Component | Why is it included? / Remarks |
|
||||||
| ---------------- | ------------------- |
|
| ---------------- | ------------------- |
|
||||||
| Ubuntu 12.04 LTS | The base system. |
|
| Ubuntu 12.04 LTS | The base system. |
|
||||||
| A **correct** init process | According to the Unix process model, [the init process](https://en.wikipedia.org/wiki/Init) -- PID 1 -- inherits all [orphaned child processes](https://en.wikipedia.org/wiki/Orphan_process) and must [reap them](https://en.wikipedia.org/wiki/Wait_(system_call). Most Docker containers do not have an init process that does this correctly, and as a result their containers become filled with [zombie processes](https://en.wikipedia.org/wiki/Zombie_process) over time. <br><br>Furthermore, `docker stop` sends SIGTERM to the init process, which is then supposed to stop all services. Unfortunately most init systems don't do this correctly within Docker since they're built for hardware shutdowns instead. This causes processes to be hard killed with SIGKILL, which doesn't give them a chance to correctly deinitialize things. This can cause file corruption. <br><br>Baseimage-docker comes with an init process `/sbin/my_init` that performs both of these tasks correctly. |
|
| A **correct** init process | According to the Unix process model, [the init process](https://en.wikipedia.org/wiki/Init) -- PID 1 -- inherits all [orphaned child processes](https://en.wikipedia.org/wiki/Orphan_process) and must [reap them](https://en.wikipedia.org/wiki/Wait_(system_call)). Most Docker containers do not have an init process that does this correctly, and as a result their containers become filled with [zombie processes](https://en.wikipedia.org/wiki/Zombie_process) over time. <br><br>Furthermore, `docker stop` sends SIGTERM to the init process, which is then supposed to stop all services. Unfortunately most init systems don't do this correctly within Docker since they're built for hardware shutdowns instead. This causes processes to be hard killed with SIGKILL, which doesn't give them a chance to correctly deinitialize things. This can cause file corruption. <br><br>Baseimage-docker comes with an init process `/sbin/my_init` that performs both of these tasks correctly. |
|
||||||
| Fixes APT incompatibilities with Docker | See https://github.com/dotcloud/docker/issues/1024. |
|
| Fixes APT incompatibilities with Docker | See https://github.com/dotcloud/docker/issues/1024. |
|
||||||
| syslog-ng | A syslog daemon is necessary so that many services - including the kernel itself - can correctly log to /var/log/syslog. If no syslog daemon is running, a lot of important messages are silently swallowed. <br><br>Only listens locally. |
|
| syslog-ng | A syslog daemon is necessary so that many services - including the kernel itself - can correctly log to /var/log/syslog. If no syslog daemon is running, a lot of important messages are silently swallowed. <br><br>Only listens locally. |
|
||||||
| ssh server | Allows you to easily login to your container to inspect or administer things. <br><br>Password and challenge-response authentication are disabled by default. Only key authentication is allowed.<br>By default, it allows a predefined key, in order to make debugging easy. You should replace this ASAP. See instructions. |
|
| logrotate | Rotates and compresses logs on a regular basis. |
|
||||||
|
| ssh server | Allows you to easily login to your container to inspect or administer things. <br><br>Password and challenge-response authentication are disabled by default. Only key authentication is allowed.<br><br>SSH access can be easily disabled if you so wish. Read on for instructions. |
|
||||||
| cron | The cron daemon must be running for cron jobs to work. |
|
| cron | The cron daemon must be running for cron jobs to work. |
|
||||||
| [runit](http://smarden.org/runit/) | Replaces Ubuntu's Upstart. Used for service supervision and management. Much easier to use than SysV init and supports restarting daemons when they crash. Much easier to use and more lightweight than Upstart. |
|
| [runit](http://smarden.org/runit/) | Replaces Ubuntu's Upstart. Used for service supervision and management. Much easier to use than SysV init and supports restarting daemons when they crash. Much easier to use and more lightweight than Upstart. |
|
||||||
| `setuser` | A tool for running a command as another user. Easier to use than `su`, has a smaller attack vector than `sudo`, and unlike `chpst` this tool sets `$HOME` correctly. Available as `/sbin/setuser`. |
|
| `setuser` | A tool for running a command as another user. Easier to use than `su`, has a smaller attack vector than `sudo`, and unlike `chpst` this tool sets `$HOME` correctly. Available as `/sbin/setuser`. |
|
||||||
@@ -80,7 +90,7 @@ Baseimage-docker *encourages* multiple processes through the use of runit.
|
|||||||
|
|
||||||
To look around in the image, run:
|
To look around in the image, run:
|
||||||
|
|
||||||
docker run -rm -t -i phusion/baseimage bash -l
|
docker run -rm -t -i phusion/baseimage /sbin/my_init -- bash -l
|
||||||
|
|
||||||
You don't have to download anything manually. The above command will automatically pull the baseimage-docker image from the Docker registry.
|
You don't have to download anything manually. The above command will automatically pull the baseimage-docker image from the Docker registry.
|
||||||
|
|
||||||
@@ -121,7 +131,7 @@ You can add additional daemons (e.g. your own app) to the image by creating runi
|
|||||||
|
|
||||||
The shell script must be called `run`, must be executable, and is to be placed in the directory `/etc/service/<NAME>`.
|
The shell script must be called `run`, must be executable, and is to be placed in the directory `/etc/service/<NAME>`.
|
||||||
|
|
||||||
Here's an example showing you how to a memached server runit entry can be made.
|
Here's an example showing you how a memached server runit entry can be made.
|
||||||
|
|
||||||
### In memcached.sh (make sure this file is chmod +x):
|
### In memcached.sh (make sure this file is chmod +x):
|
||||||
#!/bin/sh
|
#!/bin/sh
|
||||||
@@ -199,12 +209,126 @@ The following example runs `ls` without running the startup files and with less
|
|||||||
$ docker run phusion/baseimage:<VERSION> /sbin/my_init --skip-startup-files --quiet -- ls
|
$ docker run phusion/baseimage:<VERSION> /sbin/my_init --skip-startup-files --quiet -- ls
|
||||||
bin boot dev etc home image lib lib64 media mnt opt proc root run sbin selinux srv sys tmp usr var
|
bin boot dev etc home image lib lib64 media mnt opt proc root run sbin selinux srv sys tmp usr var
|
||||||
|
|
||||||
|
<a name="environment_variables"></a>
|
||||||
|
### Environment variables
|
||||||
|
|
||||||
|
If you use `/sbin/my_init` as the main container command, then any environment variables set with `docker run --env` or with the `ENV` command in the Dockerfile, will be picked up by `my_init`. These variables will also be passed to all child processes, including `/etc/my_init.d` startup scripts, Runit and Runit-managed services. There are however a few caveats you should be aware of:
|
||||||
|
|
||||||
|
* Environment variables on Unix are inherited on a per-process basis. This means that it is generally not possible for a child process to change the environment variables of other processes.
|
||||||
|
* Because of the aforementioned point, there is no good central place for defining environment variables for all applications and services. Debian has the `/etc/environment` file but it only works in some situations.
|
||||||
|
* Some services change environment variables for child processes. Nginx is one such example: it removes all environment variables unless you explicitly instruct it to retain them through the `env` configuration option. If you host any applications on Nginx (e.g. using the [passenger-docker](https://github.com/phusion/passenger-docker) image, or using Phusion Passenger in your own image) then they will not see the environment variables that were originally passed by Docker.
|
||||||
|
|
||||||
|
`my_init` provides a solution for all these caveats.
|
||||||
|
|
||||||
|
<a name="envvar_central_definition"></a>
|
||||||
|
#### Centrally defining your own environment variables
|
||||||
|
|
||||||
|
During startup, before running any [startup scripts](#running_startup_scripts), `my_init` imports environment variables from the directory `/etc/container_environment`. This directory contains files who are named after the environment variable names. The file contents contain the environment variable values. This directory is therefore a good place to centrally define your own environment variables, which will be inherited by all startup scripts and Runit services.
|
||||||
|
|
||||||
|
For example, here's how you can define an environment variable from your Dockerfile:
|
||||||
|
|
||||||
|
RUN echo -n Apachai Hopachai > /etc/container_environment/MY_NAME
|
||||||
|
|
||||||
|
You can verify that it works, as follows:
|
||||||
|
|
||||||
|
$ docker run -t -i <YOUR_NAME_IMAGE> /sbin/my_init -- bash -l
|
||||||
|
...
|
||||||
|
*** Running bash -l...
|
||||||
|
# echo $MY_NAME
|
||||||
|
Apachai Hopachai
|
||||||
|
|
||||||
|
<a name="envvar_dumps"></a>
|
||||||
|
#### Environment variable dumps
|
||||||
|
|
||||||
|
While the previously mentioned mechanism is good for centrally defining environment variables, it by itself does not prevent services (e.g. Nginx) from changing and resetting environment variables from child processes. However, the `my_init` mechanism does make it easy for you to query what the original environment variables are.
|
||||||
|
|
||||||
|
During startup, right after importing environment variables from `/etc/container_environment`, `my_init` will dump all its environment variables (that is, all variables imported from `container_environment`, as well as all variables it picked up from `docker run --env`) to the following locations, in the following formats:
|
||||||
|
|
||||||
|
* `/etc/container_environment`
|
||||||
|
* `/etc/container_environment.sh` - a dump of the environment variables in Bash format. You can source the file directly from a Bash shell script.
|
||||||
|
* `/etc/container_environment.json` - a dump of the environment variables in JSON format.
|
||||||
|
|
||||||
|
The multiple formats makes it easy for you to query the original environment variables no matter which language your scripts/apps are written in.
|
||||||
|
|
||||||
|
Here is an example shell session showing you how the dumps look like:
|
||||||
|
|
||||||
|
$ docker run -t -i \
|
||||||
|
--env FOO=bar --env HELLO='my beautiful world' \
|
||||||
|
phusion/baseimage:<VERSION> /sbin/my_init -- \
|
||||||
|
bash -l
|
||||||
|
...
|
||||||
|
*** Running bash -l...
|
||||||
|
# ls /etc/container_environment
|
||||||
|
FOO HELLO HOME HOSTNAME PATH TERM container
|
||||||
|
# cat /etc/container_environment/HELLO; echo
|
||||||
|
my beautiful world
|
||||||
|
# cat /etc/container_environment.json; echo
|
||||||
|
{"TERM": "xterm", "container": "lxc", "HOSTNAME": "f45449f06950", "HOME": "/root", "PATH": "/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "FOO": "bar", "HELLO": "my beautiful world"}
|
||||||
|
# source /etc/container_environment.sh
|
||||||
|
# echo $HELLO
|
||||||
|
my beautiful world
|
||||||
|
|
||||||
|
<a name="modifying_envvars"></a>
|
||||||
|
#### Modifying environment variables
|
||||||
|
|
||||||
|
It is even possible to modify the environment variables in `my_init` (and therefore the environment variables in all child processes that are spawned after that point in time), by altering the files in `/etc/container_environment`. After each time `my_init` runs a [startup script](#running_startup_scripts), it resets its own environment variables to the state in `/etc/container_environment`, and re-dumps the new environment variables to `container_environment.sh` and `container_environment.json`.
|
||||||
|
|
||||||
|
But note that:
|
||||||
|
|
||||||
|
* modifying `container_environment.sh` and `container_environment.json` has no effect.
|
||||||
|
* Runit services cannot modify the environment like that. `my_init` only activates changes in `/etc/container_environment` when running startup scripts.
|
||||||
|
|
||||||
|
<a name="envvar_security"></a>
|
||||||
|
#### Security
|
||||||
|
|
||||||
|
Because environment variables can potentially contain sensitive information, `/etc/container_environment` and its Bash and JSON dumps are by default owned by root, and root-accessible only. If you are sure that your environment variables don't contain sensitive data, then you can relax the permissions on that directory and those files by making them world-readable:
|
||||||
|
|
||||||
|
RUN chmod 755 /etc/container_environment
|
||||||
|
RUN chmod 644 /etc/container_environment.sh /etc/container_environment.json
|
||||||
|
|
||||||
<a name="login"></a>
|
<a name="login"></a>
|
||||||
### Login to the container via SSH
|
### Login to the container via SSH
|
||||||
|
|
||||||
You can use SSH to login to any container that is based on baseimage-docker.
|
You can use SSH to login to any container that is based on baseimage-docker.
|
||||||
|
|
||||||
The first thing that you need to do is to ensure that you have the right SSH keys installed inside the container. By default, no keys are installed, so you can't login. For convenience reasons, we provide [a pregenerated, insecure key](https://github.com/phusion/baseimage-docker/blob/master/image/insecure_key) that you easily enable. However, please be aware that using this key is for convenience only. It does not provide any insecurity because this key (both the public and the private side) are publicly available. In production environments, you should use your own keys.
|
The first thing that you need to do is to ensure that you have the right SSH keys installed inside the container. By default, no keys are installed, so you can't login. For convenience reasons, we provide [a pregenerated, insecure key](https://github.com/phusion/baseimage-docker/blob/master/image/insecure_key) [(PuTTY format)](https://github.com/phusion/baseimage-docker/blob/master/image/insecure_key.ppk) that you can easily enable. However, please be aware that using this key is for convenience only. It does not provide any security because this key (both the public and the private side) is publicly available. **In production environments, you should use your own keys**.
|
||||||
|
|
||||||
|
<a name="using_the_insecure_key_for_one_container_only"></a>
|
||||||
|
#### Using the insecure key for one container only
|
||||||
|
|
||||||
|
You can temporarily enable the insecure key for one container only. This means that the insecure key is installed at container boot. If you `docker stop` and `docker start` the container, the insecure key will still be there, but if you use `docker run` to start a new container then that container will not contain the insecure key.
|
||||||
|
|
||||||
|
Start a container with `--enable-insecure-key`:
|
||||||
|
|
||||||
|
docker run YOUR_IMAGE /sbin/my_init --enable-insecure-key
|
||||||
|
|
||||||
|
Find out the ID of the container that you just ran:
|
||||||
|
|
||||||
|
docker ps
|
||||||
|
|
||||||
|
Once you have the ID, look for its IP address with:
|
||||||
|
|
||||||
|
docker inspect <ID> | grep IPAddress
|
||||||
|
|
||||||
|
Now SSH into the container as follows:
|
||||||
|
|
||||||
|
curl -o insecure_key -fSL https://github.com/phusion/baseimage-docker/raw/master/image/insecure_key
|
||||||
|
chmod 600 insecure_key
|
||||||
|
ssh -i insecure_key root@<IP address>
|
||||||
|
|
||||||
|
<a name="enabling_the_insecure_key_permanently"></a>
|
||||||
|
#### Enabling the insecure key permanently
|
||||||
|
|
||||||
|
It is also possible to enable the insecure key in the image permanently. This is not generally recommended, but it suitable for e.g. temporary development or demo environments where security does not matter.
|
||||||
|
|
||||||
|
Edit your Dockerfile to install the insecure key permanently:
|
||||||
|
|
||||||
|
RUN /usr/sbin/enable_insecure_key
|
||||||
|
|
||||||
|
Instructions for logging in the container is the same as in section [Using the insecure key for one container only](#using_the_insecure_key_for_one_container_only).
|
||||||
|
|
||||||
|
<a name="using_your_own_key"></a>
|
||||||
|
#### Using your own key
|
||||||
|
|
||||||
Edit your Dockerfile to install an SSH key:
|
Edit your Dockerfile to install an SSH key:
|
||||||
|
|
||||||
@@ -212,11 +336,6 @@ Edit your Dockerfile to install an SSH key:
|
|||||||
ADD your_key /tmp/your_key
|
ADD your_key /tmp/your_key
|
||||||
RUN cat /tmp/your_key >> /root/.ssh/authorized_keys && rm -f /tmp/your_key
|
RUN cat /tmp/your_key >> /root/.ssh/authorized_keys && rm -f /tmp/your_key
|
||||||
|
|
||||||
## -OR-
|
|
||||||
|
|
||||||
## Uncomment this to enable the insecure key.
|
|
||||||
# RUN /usr/sbin/enable_insecure_key
|
|
||||||
|
|
||||||
Then rebuild your image. Once you have that, start a container based on that image:
|
Then rebuild your image. Once you have that, start a container based on that image:
|
||||||
|
|
||||||
docker run your-image-name
|
docker run your-image-name
|
||||||
@@ -233,13 +352,6 @@ Now SSH into the container as follows:
|
|||||||
|
|
||||||
ssh -i /path-to/your_key root@<IP address>
|
ssh -i /path-to/your_key root@<IP address>
|
||||||
|
|
||||||
# -OR-
|
|
||||||
|
|
||||||
# If you're using the insecure key, download it and SSH
|
|
||||||
# into the container using that key.
|
|
||||||
curl -o insecure_key -fSL https://github.com/phusion/baseimage-docker/raw/master/image/insecure_key
|
|
||||||
chmod 700 insecure_key
|
|
||||||
ssh -i insecure_key root@<IP address>
|
|
||||||
|
|
||||||
<a name="building"></a>
|
<a name="building"></a>
|
||||||
## Building the image yourself
|
## Building the image yourself
|
||||||
@@ -265,6 +377,13 @@ If you want to call the resulting image something else, pass the NAME variable,
|
|||||||
|
|
||||||
make build NAME=joe/baseimage
|
make build NAME=joe/baseimage
|
||||||
|
|
||||||
|
<a name="disabling_ssh"></a>
|
||||||
|
### Disabling SSH
|
||||||
|
|
||||||
|
In case you do not want to enable SSH, here's how you can disable it:
|
||||||
|
|
||||||
|
RUN rm -rf /etc/service/sshd /etc/my_init.d/00_regen_ssh_host_keys.sh
|
||||||
|
|
||||||
<a name="conclusion"></a>
|
<a name="conclusion"></a>
|
||||||
## Conclusion
|
## Conclusion
|
||||||
|
|
||||||
|
|||||||
55
Vagrantfile
vendored
55
Vagrantfile
vendored
@@ -1,31 +1,54 @@
|
|||||||
# -*- mode: ruby -*-
|
# -*- mode: ruby -*-
|
||||||
# vi: set ft=ruby :
|
# vi: set ft=ruby :
|
||||||
ROOT = File.dirname(File.expand_path(__FILE__))
|
ROOT = File.dirname(File.absolute_path(__FILE__))
|
||||||
|
|
||||||
# Vagrantfile API/syntax version. Don't touch unless you know what you're doing!
|
# Vagrantfile API/syntax version. Don't touch unless you know what you're doing!
|
||||||
VAGRANTFILE_API_VERSION = "2"
|
VAGRANTFILE_API_VERSION = '2'
|
||||||
|
|
||||||
|
# Default env properties which can be overridden
|
||||||
|
# Example overrides:
|
||||||
|
# echo "ENV['PASSENGER_DOCKER_PATH'] ||= '../../phusion/passenger-docker' " >> ~/.vagrant.d/Vagrantfile
|
||||||
|
# echo "ENV['BASE_BOX_URL'] ||= 'd\:/dev/vm/vagrant/boxes/phusion/'" >> ~/.vagrant.d/Vagrantfile
|
||||||
|
BASE_BOX_URL = ENV['BASE_BOX_URL'] || 'https://oss-binaries.phusionpassenger.com/vagrant/boxes/'
|
||||||
|
VAGRANT_BOX_URL = ENV['VAGRANT_BOX_URL'] || BASE_BOX_URL + 'ubuntu-12.04.3-amd64-vbox.box'
|
||||||
|
VMWARE_BOX_URL = ENV['VMWARE_BOX_URL'] || BASE_BOX_URL + 'ubuntu-12.04.3-amd64-vmwarefusion.box'
|
||||||
|
BASEIMAGE_PATH = ENV['BASEIMAGE_PATH' ] || '.'
|
||||||
|
PASSENGER_DOCKER_PATH = ENV['PASSENGER_PATH' ] || '../passenger-docker'
|
||||||
|
DOCKERIZER_PATH = ENV['DOCKERIZER_PATH'] || '../dockerizer'
|
||||||
|
|
||||||
|
$script = <<SCRIPT
|
||||||
|
wget -q -O - https://get.docker.io/gpg | apt-key add -
|
||||||
|
echo deb http://get.docker.io/ubuntu docker main > /etc/apt/sources.list.d/docker.list
|
||||||
|
apt-get update -qq
|
||||||
|
apt-get install -q -y --force-yes lxc-docker
|
||||||
|
usermod -a -G docker vagrant
|
||||||
|
docker version
|
||||||
|
su - vagrant -c 'echo alias d=docker >> ~/.bash_aliases'
|
||||||
|
SCRIPT
|
||||||
|
|
||||||
Vagrant.configure(VAGRANTFILE_API_VERSION) do |config|
|
Vagrant.configure(VAGRANTFILE_API_VERSION) do |config|
|
||||||
config.vm.box = "phusion-open-ubuntu-12.04-amd64"
|
config.vm.box = 'phusion-open-ubuntu-12.04-amd64'
|
||||||
config.vm.box_url = "https://oss-binaries.phusionpassenger.com/vagrant/boxes/ubuntu-12.04.3-amd64-vbox.box"
|
config.vm.box_url = VAGRANT_BOX_URL
|
||||||
config.ssh.forward_agent = true
|
config.ssh.forward_agent = true
|
||||||
if File.directory?("#{ROOT}/../passenger-docker")
|
passenger_docker_path = File.absolute_path(PASSENGER_DOCKER_PATH, ROOT)
|
||||||
config.vm.synced_folder File.expand_path("#{ROOT}/../passenger-docker"),
|
if File.directory?(passenger_docker_path)
|
||||||
"/vagrant/passenger-docker"
|
config.vm.synced_folder passenger_docker_path, '/vagrant/passenger-docker'
|
||||||
|
end
|
||||||
|
baseimage_path = File.absolute_path(BASEIMAGE_PATH, ROOT)
|
||||||
|
if File.directory?(baseimage_path)
|
||||||
|
config.vm.synced_folder baseimage_path, "/vagrant/baseimage-docker"
|
||||||
|
end
|
||||||
|
dockerizer_path = File.absolute_path(DOCKERIZER_PATH, ROOT)
|
||||||
|
if File.directory?(dockerizer_path)
|
||||||
|
config.vm.synced_folder dockerizer_path, '/vagrant/dockerizer'
|
||||||
end
|
end
|
||||||
|
|
||||||
config.vm.provider :vmware_fusion do |f, override|
|
config.vm.provider :vmware_fusion do |f, override|
|
||||||
override.vm.box_url = "https://oss-binaries.phusionpassenger.com/vagrant/boxes/ubuntu-12.04.3-amd64-vmwarefusion.box"
|
override.vm.box_url = VMWARE_BOX_URL
|
||||||
f.vmx["displayName"] = "baseimage-docker"
|
f.vmx['displayName'] = 'baseimage-docker'
|
||||||
end
|
end
|
||||||
|
|
||||||
if Dir.glob("#{File.dirname(__FILE__)}/.vagrant/machines/default/*/id").empty?
|
if Dir.glob("#{File.dirname(__FILE__)}/.vagrant/machines/default/*/id").empty?
|
||||||
# Add lxc-docker package
|
config.vm.provision :shell, :inline => $script
|
||||||
pkg_cmd = "wget -q -O - https://get.docker.io/gpg | apt-key add -;" \
|
|
||||||
"echo deb http://get.docker.io/ubuntu docker main > /etc/apt/sources.list.d/docker.list;" \
|
|
||||||
"apt-get update -qq; apt-get install -q -y --force-yes lxc-docker; "
|
|
||||||
# Add vagrant user to the docker group
|
|
||||||
pkg_cmd << "usermod -a -G docker vagrant; "
|
|
||||||
config.vm.provision :shell, :inline => pkg_cmd
|
|
||||||
end
|
end
|
||||||
end
|
end
|
||||||
|
|||||||
@@ -2,5 +2,7 @@
|
|||||||
set -e
|
set -e
|
||||||
if [[ ! -e /etc/ssh/ssh_host_rsa_key ]]; then
|
if [[ ! -e /etc/ssh/ssh_host_rsa_key ]]; then
|
||||||
echo "No SSH host key available. Generating one..."
|
echo "No SSH host key available. Generating one..."
|
||||||
|
export LC_ALL=C
|
||||||
|
export DEBIAN_FRONTEND=noninteractive
|
||||||
dpkg-reconfigure openssh-server
|
dpkg-reconfigure openssh-server
|
||||||
fi
|
fi
|
||||||
|
|||||||
@@ -11,4 +11,3 @@ RUN /build/prepare.sh && \
|
|||||||
/build/cleanup.sh
|
/build/cleanup.sh
|
||||||
|
|
||||||
CMD ["/sbin/my_init"]
|
CMD ["/sbin/my_init"]
|
||||||
EXPOSE 22 80 443
|
|
||||||
|
|||||||
@@ -6,5 +6,7 @@ set -x
|
|||||||
apt-get clean
|
apt-get clean
|
||||||
rm -rf /build
|
rm -rf /build
|
||||||
rm -rf /tmp/* /var/tmp/*
|
rm -rf /tmp/* /var/tmp/*
|
||||||
|
rm -rf /var/lib/apt/lists/*
|
||||||
|
rm -f /etc/dpkg/dpkg.cfg.d/02apt-speedup
|
||||||
|
|
||||||
rm -f /etc/ssh/ssh_host_*
|
rm -f /etc/ssh/ssh_host_*
|
||||||
|
|||||||
@@ -123,7 +123,7 @@ ChallengeResponseAuthentication no
|
|||||||
#Banner none
|
#Banner none
|
||||||
|
|
||||||
# override default of no subsystems
|
# override default of no subsystems
|
||||||
Subsystem sftp /usr/lib/sftp-server
|
Subsystem sftp /usr/lib/openssh/sftp-server
|
||||||
|
|
||||||
# Example of overriding settings on a per-user basis
|
# Example of overriding settings on a per-user basis
|
||||||
#Match User anoncvs
|
#Match User anoncvs
|
||||||
|
|||||||
13
image/config/syslog_ng_default
Normal file
13
image/config/syslog_ng_default
Normal file
@@ -0,0 +1,13 @@
|
|||||||
|
# If a variable is not set here, then the corresponding
|
||||||
|
# parameter will not be changed.
|
||||||
|
# If a variables is set, then every invocation of
|
||||||
|
# syslog-ng's init script will set them using dmesg.
|
||||||
|
|
||||||
|
# log level of messages which should go to console
|
||||||
|
# see syslog(3) for details
|
||||||
|
#
|
||||||
|
#CONSOLE_LOG_LEVEL=1
|
||||||
|
|
||||||
|
# Command line options to syslog-ng
|
||||||
|
# We set --default-modules because of https://github.com/phusion/baseimage-docker/pull/7.
|
||||||
|
SYSLOGNG_OPTS="--no-caps --default-modules=affile,afprog,afsocket,afuser,basicfuncs,csvparser,dbparser,syslogformat"
|
||||||
@@ -12,6 +12,19 @@ else
|
|||||||
chmod 700 "$DIR"
|
chmod 700 "$DIR"
|
||||||
chown root:root "$DIR"
|
chown root:root "$DIR"
|
||||||
echo "Editing $AUTHORIZED_KEYS..."
|
echo "Editing $AUTHORIZED_KEYS..."
|
||||||
cat /etc/insecure_key.pub > "$AUTHORIZED_KEYS"
|
cat /etc/insecure_key.pub >> "$AUTHORIZED_KEYS"
|
||||||
echo "Success: insecure key has been added to $AUTHORIZED_KEYS"
|
echo "Success: insecure key has been added to $AUTHORIZED_KEYS"
|
||||||
|
cat <<-EOF
|
||||||
|
|
||||||
|
+------------------------------------------------------------------------------+
|
||||||
|
| Insecure SSH key installed |
|
||||||
|
| |
|
||||||
|
| DO NOT expose port 22 on the Internet unless you know what you are doing! |
|
||||||
|
| |
|
||||||
|
| Use the private key below to connect with user root |
|
||||||
|
+------------------------------------------------------------------------------+
|
||||||
|
|
||||||
|
EOF
|
||||||
|
cat /etc/insecure_key
|
||||||
|
echo -e "\n\n"
|
||||||
fi
|
fi
|
||||||
|
|||||||
26
image/insecure_key.ppk
Normal file
26
image/insecure_key.ppk
Normal file
@@ -0,0 +1,26 @@
|
|||||||
|
PuTTY-User-Key-File-2: ssh-rsa
|
||||||
|
Encryption: none
|
||||||
|
Comment: imported-openssh-key
|
||||||
|
Public-Lines: 6
|
||||||
|
AAAAB3NzaC1yc2EAAAADAQABAAABAQDVmzBG5v7cO9IScGLIzlhGlHNFhXzy87Vf
|
||||||
|
aPzru7qnIIdQ1e9FEKvtqEws8hVixnCUdviwX5lvcMk4Ef4Tbrmj3dyF0zFtYbji
|
||||||
|
TSyl/XQlF68DQlc2sTAdHy96wJHvh7ky511tKJzzyWwSqeef4WjeVK28TqcGnq1u
|
||||||
|
p0S7saFO0dJh6OfDAg2cDmhyweR3VgT0vZJyrDV7hte95MBCdK+Gp7fdCyEZcWm3
|
||||||
|
S1DBFaeBqHzzt/Y/njAVKbYL9TIVPum8iMg0rMiLi9ShfP+dT5Xud5Oa3dcN2OWh
|
||||||
|
iDfJw5pfhFJWd44cJ/uGRwQpvNs/PNKsYABhgLlTMUH4iawhu1Xb
|
||||||
|
Private-Lines: 14
|
||||||
|
AAABAQCjROxgtX2Gft7yIx8Ol9IXmK6HLCI2XZt7ovb3hFWGGzHy0qMBql2P2Tzo
|
||||||
|
ed1o038Hq+woe9n+uTnEdtQ6rD6PByzgyW2VSsWTjCOdeJ5HH9Qw7ItXDZZWHBkh
|
||||||
|
fYHOkXI4e2oI3qshGAtYNLALn7KVhioJriCyyaSM2KOLx5khcY+EJ1inQfwQJKqP
|
||||||
|
GsdKc72liz07T8ifRj+mNLKtwrxlK3IXYfIdgLp/1pCKdrC80DhprMsD4xvNgq4p
|
||||||
|
CR9jd4FoqM9t/Up5ppTm+p6A/bDwdIPh6cFFeyMP+G3+bTlW1Gg7RLoNCc6qh53W
|
||||||
|
WVgEOQqdLHcQ8Ge4RLmbwLUmnRuRAAAAgQD312H46T2YvKzyEKbsddwbO8WktfxW
|
||||||
|
vVqqxH6z6bRXVFR3hQhmPKjlFXsD74h3W7NJwe9WJ5Pf3vemoBWIo0Hak0M1Z6WC
|
||||||
|
OIvBohpOYDzIgdlGHifx2ZiAd47Vsn+mfxjtISdWupl9Fw98yRjahWosKmmIHTtR
|
||||||
|
cIfYHB9ztpR8owAAAIEA3KNMYMFgenE+7q4pwat4t3RKA7rU8SPto5I1+sEHY8rz
|
||||||
|
cD7ONkIVlEhaqN+uTEYbr5rZa4dsQe4Ia+7ZXmO4djFsAP/fyJX+VCX/bHK83V5H
|
||||||
|
9toTdRLTqqfqJ3GOeZ41kPIN6UDHVEa4S8tfVM0DMNPEHBjLMfdbZGkoBQAPXWkA
|
||||||
|
AACBAJV/Bxr1jJohvmURQf/9y6MvO2wcRpTdKVLQhEnGm2cXQdh5CPVae2K+u0CG
|
||||||
|
d8u0/PDIZMGpueCQo4lft02W0skTDo5Kn+1IUwmQuoRzanVJ5ab+GyVnlouRLp/J
|
||||||
|
bWMQZ3pjXNkBsQOK/igrKYvqUb1jRsy9zxVQRl4i7JjjLpe/
|
||||||
|
Private-MAC: ef1e472b5254ae2c5319a522d39ad31d432dde75
|
||||||
@@ -1,5 +1,5 @@
|
|||||||
#!/usr/bin/python2
|
#!/usr/bin/python2 -u
|
||||||
import os, sys, stat, signal, errno, argparse, time
|
import os, os.path, sys, stat, signal, errno, argparse, time, json, re, posixfile
|
||||||
|
|
||||||
KILL_PROCESS_TIMEOUT = 5
|
KILL_PROCESS_TIMEOUT = 5
|
||||||
KILL_ALL_PROCESSES_TIMEOUT = 5
|
KILL_ALL_PROCESSES_TIMEOUT = 5
|
||||||
@@ -54,9 +54,53 @@ def is_exe(path):
|
|||||||
except OSError:
|
except OSError:
|
||||||
return False
|
return False
|
||||||
|
|
||||||
|
def import_envvars(clear_existing_environment = True):
|
||||||
|
new_env = {}
|
||||||
|
for envfile in listdir("/etc/container_environment"):
|
||||||
|
name = os.path.basename(envfile)
|
||||||
|
with open("/etc/container_environment/" + envfile, "r") as f:
|
||||||
|
value = f.read()
|
||||||
|
new_env[name] = value
|
||||||
|
if clear_existing_environment:
|
||||||
|
os.environ.clear()
|
||||||
|
for name, value in new_env.items():
|
||||||
|
os.environ[name] = value
|
||||||
|
|
||||||
|
def export_envvars(to_dir = True):
|
||||||
|
shell_dump = ""
|
||||||
|
for name, value in os.environ.items():
|
||||||
|
if to_dir:
|
||||||
|
with open("/etc/container_environment/" + name, "w") as f:
|
||||||
|
f.write(value)
|
||||||
|
shell_dump += "export " + shquote(name) + "=" + shquote(value) + "\n"
|
||||||
|
with open("/etc/container_environment.sh", "w") as f:
|
||||||
|
f.write(shell_dump)
|
||||||
|
with open("/etc/container_environment.json", "w") as f:
|
||||||
|
f.write(json.dumps(dict(os.environ)))
|
||||||
|
|
||||||
|
_find_unsafe = re.compile(r'[^\w@%+=:,./-]').search
|
||||||
|
|
||||||
|
def shquote(s):
|
||||||
|
"""Return a shell-escaped version of the string *s*."""
|
||||||
|
if not s:
|
||||||
|
return "''"
|
||||||
|
if _find_unsafe(s) is None:
|
||||||
|
return s
|
||||||
|
|
||||||
|
# use single quotes, and put single quotes into double quotes
|
||||||
|
# the string $'b is then quoted as '$'"'"'b'
|
||||||
|
return "'" + s.replace("'", "'\"'\"'") + "'"
|
||||||
|
|
||||||
def waitpid_reap_other_children(pid):
|
def waitpid_reap_other_children(pid):
|
||||||
done = False
|
done = False
|
||||||
status = None
|
status = None
|
||||||
|
try:
|
||||||
|
this_pid, status = os.waitpid(pid, os.WNOHANG)
|
||||||
|
except OSError as e:
|
||||||
|
if e.errno == errno.ECHILD or e.errno == errno.ESRCH:
|
||||||
|
return None
|
||||||
|
else:
|
||||||
|
raise
|
||||||
while not done:
|
while not done:
|
||||||
this_pid, status = os.waitpid(-1, 0)
|
this_pid, status = os.waitpid(-1, 0)
|
||||||
done = this_pid == pid
|
done = this_pid == pid
|
||||||
@@ -75,7 +119,7 @@ def stop_child_process(name, pid, signo = signal.SIGTERM, time_limit = KILL_PROC
|
|||||||
except OSError:
|
except OSError:
|
||||||
pass
|
pass
|
||||||
except AlarmException:
|
except AlarmException:
|
||||||
warn("%s (PID %d) did not shut down in time. Forcing it to exit.")
|
warn("%s (PID %d) did not shut down in time. Forcing it to exit." % (name, pid))
|
||||||
try:
|
try:
|
||||||
os.kill(pid, signal.SIGKILL)
|
os.kill(pid, signal.SIGKILL)
|
||||||
except OSError:
|
except OSError:
|
||||||
@@ -98,9 +142,17 @@ def run_command_killable(*argv):
|
|||||||
stop_child_process(filename, pid)
|
stop_child_process(filename, pid)
|
||||||
raise
|
raise
|
||||||
if status != 0:
|
if status != 0:
|
||||||
error("%s failed with exit code %d\n" % (filename, status))
|
if status is None:
|
||||||
|
error("%s exited with unknown exit code\n" % filename)
|
||||||
|
else:
|
||||||
|
error("%s failed with exit code %d\n" % (filename, status))
|
||||||
sys.exit(1)
|
sys.exit(1)
|
||||||
|
|
||||||
|
def run_command_killable_and_import_envvars(*argv):
|
||||||
|
run_command_killable(*argv)
|
||||||
|
import_envvars()
|
||||||
|
export_envvars(False)
|
||||||
|
|
||||||
def kill_all_processes(time_limit):
|
def kill_all_processes(time_limit):
|
||||||
info("Killing all processes...")
|
info("Killing all processes...")
|
||||||
try:
|
try:
|
||||||
@@ -134,12 +186,12 @@ def run_startup_files():
|
|||||||
filename = "/etc/my_init.d/" + name
|
filename = "/etc/my_init.d/" + name
|
||||||
if is_exe(filename):
|
if is_exe(filename):
|
||||||
info("Running %s..." % filename)
|
info("Running %s..." % filename)
|
||||||
run_command_killable(filename)
|
run_command_killable_and_import_envvars(filename)
|
||||||
|
|
||||||
# Run /etc/rc.local.
|
# Run /etc/rc.local.
|
||||||
if is_exe("/etc/rc.local"):
|
if is_exe("/etc/rc.local"):
|
||||||
info("Running /etc/rc.local...")
|
info("Running /etc/rc.local...")
|
||||||
run_command_killable("/etc/rc.local")
|
run_command_killable_and_import_envvars("/etc/rc.local")
|
||||||
|
|
||||||
def start_runit():
|
def start_runit():
|
||||||
info("Booting runit daemon...")
|
info("Booting runit daemon...")
|
||||||
@@ -167,7 +219,17 @@ def wait_for_runit_services():
|
|||||||
if not done:
|
if not done:
|
||||||
time.sleep(0.1)
|
time.sleep(0.1)
|
||||||
|
|
||||||
|
def install_insecure_key():
|
||||||
|
info("Installing insecure SSH key for user root")
|
||||||
|
run_command_killable("/usr/sbin/enable_insecure_key")
|
||||||
|
|
||||||
def main(args):
|
def main(args):
|
||||||
|
import_envvars(False)
|
||||||
|
export_envvars()
|
||||||
|
|
||||||
|
if args.enable_insecure_key:
|
||||||
|
install_insecure_key()
|
||||||
|
|
||||||
if not args.skip_startup_files:
|
if not args.skip_startup_files:
|
||||||
run_startup_files()
|
run_startup_files()
|
||||||
|
|
||||||
@@ -180,13 +242,21 @@ def main(args):
|
|||||||
if len(args.main_command) == 0:
|
if len(args.main_command) == 0:
|
||||||
runit_exited, exit_code = wait_for_runit_or_interrupt(runit_pid)
|
runit_exited, exit_code = wait_for_runit_or_interrupt(runit_pid)
|
||||||
if runit_exited:
|
if runit_exited:
|
||||||
info("Runit exited with code %d" % exit_code)
|
if exit_code is None:
|
||||||
|
info("Runit exited with unknown exit code")
|
||||||
|
exit_code = 1
|
||||||
|
else:
|
||||||
|
info("Runit exited with code %d" % exit_code)
|
||||||
else:
|
else:
|
||||||
info("Running %s..." % " ".join(args.main_command))
|
info("Running %s..." % " ".join(args.main_command))
|
||||||
pid = os.spawnvp(os.P_NOWAIT, args.main_command[0], args.main_command)
|
pid = os.spawnvp(os.P_NOWAIT, args.main_command[0], args.main_command)
|
||||||
try:
|
try:
|
||||||
exit_code = waitpid_reap_other_children(pid)
|
exit_code = waitpid_reap_other_children(pid)
|
||||||
info("%s exited with exit code %d." % (args.main_command[0], exit_code))
|
if exit_code is None:
|
||||||
|
info("%s exited with unknown exit code." % args.main_command[0])
|
||||||
|
exit_code = 1
|
||||||
|
else:
|
||||||
|
info("%s exited with exit code %d." % (args.main_command[0], exit_code))
|
||||||
except KeyboardInterrupt:
|
except KeyboardInterrupt:
|
||||||
stop_child_process(args.main_command[0], pid)
|
stop_child_process(args.main_command[0], pid)
|
||||||
except BaseException as s:
|
except BaseException as s:
|
||||||
@@ -205,6 +275,9 @@ def main(args):
|
|||||||
parser = argparse.ArgumentParser(description = 'Initialize the system.')
|
parser = argparse.ArgumentParser(description = 'Initialize the system.')
|
||||||
parser.add_argument('main_command', metavar = 'MAIN_COMMAND', type = str, nargs = '*',
|
parser.add_argument('main_command', metavar = 'MAIN_COMMAND', type = str, nargs = '*',
|
||||||
help = 'The main command to run. (default: runit)')
|
help = 'The main command to run. (default: runit)')
|
||||||
|
parser.add_argument('--enable-insecure-key', dest = 'enable_insecure_key',
|
||||||
|
action = 'store_const', const = True, default = False,
|
||||||
|
help = 'Install the insecure SSH key')
|
||||||
parser.add_argument('--skip-startup-files', dest = 'skip_startup_files',
|
parser.add_argument('--skip-startup-files', dest = 'skip_startup_files',
|
||||||
action = 'store_const', const = True, default = False,
|
action = 'store_const', const = True, default = False,
|
||||||
help = 'Skip running /etc/my_init.d/* and /etc/rc.local')
|
help = 'Skip running /etc/my_init.d/* and /etc/rc.local')
|
||||||
|
|||||||
@@ -3,22 +3,37 @@ set -e
|
|||||||
source /build/buildconfig
|
source /build/buildconfig
|
||||||
set -x
|
set -x
|
||||||
|
|
||||||
## Enable Ubuntu Universe.
|
## Temporarily disable dpkg fsync to make building faster.
|
||||||
echo deb http://archive.ubuntu.com/ubuntu precise main universe > /etc/apt/sources.list
|
echo force-unsafe-io > /etc/dpkg/dpkg.cfg.d/02apt-speedup
|
||||||
echo deb http://archive.ubuntu.com/ubuntu precise-updates main universe >> /etc/apt/sources.list
|
|
||||||
apt-get update
|
|
||||||
|
|
||||||
## Install HTTPS support for APT.
|
## Prevent initramfs updates from trying to run grub and lilo.
|
||||||
$minimal_apt_get_install apt-transport-https
|
## https://journal.paul.querna.org/articles/2013/10/15/docker-ubuntu-on-rackspace/
|
||||||
|
## http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=594189
|
||||||
|
export INITRD=no
|
||||||
|
mkdir -p /etc/container_environment
|
||||||
|
echo -n no > /etc/container_environment/INITRD
|
||||||
|
|
||||||
|
## Enable Ubuntu Universe and Multiverse.
|
||||||
|
cp /build/sources.list /etc/apt/sources.list
|
||||||
|
apt-get update
|
||||||
|
|
||||||
## Fix some issues with APT packages.
|
## Fix some issues with APT packages.
|
||||||
## See https://github.com/dotcloud/docker/issues/1024
|
## See https://github.com/dotcloud/docker/issues/1024
|
||||||
dpkg-divert --local --rename --add /sbin/initctl
|
dpkg-divert --local --rename --add /sbin/initctl
|
||||||
ln -sf /bin/true /sbin/initctl
|
ln -sf /bin/true /sbin/initctl
|
||||||
|
|
||||||
|
## Replace the 'ischroot' tool to make it always return true.
|
||||||
|
## Prevent initscripts updates from breaking /dev/shm.
|
||||||
|
## https://journal.paul.querna.org/articles/2013/10/15/docker-ubuntu-on-rackspace/
|
||||||
|
## https://bugs.launchpad.net/launchpad/+bug/974584
|
||||||
|
dpkg-divert --local --rename --add /usr/bin/ischroot
|
||||||
|
ln -sf /bin/true /usr/bin/ischroot
|
||||||
|
|
||||||
|
## Install HTTPS support for APT.
|
||||||
|
$minimal_apt_get_install apt-transport-https
|
||||||
|
|
||||||
## Upgrade all packages.
|
## Upgrade all packages.
|
||||||
echo "initscripts hold" | dpkg --set-selections
|
apt-get dist-upgrade -y --no-install-recommends
|
||||||
apt-get upgrade -y --no-install-recommends
|
|
||||||
|
|
||||||
## Fix locale.
|
## Fix locale.
|
||||||
$minimal_apt_get_install language-pack-en
|
$minimal_apt_get_install language-pack-en
|
||||||
|
|||||||
@@ -1,3 +1,24 @@
|
|||||||
#!/bin/sh
|
#!/bin/sh
|
||||||
set -e
|
set -e
|
||||||
exec syslog-ng -F -p /var/run/syslog-ng.pid
|
|
||||||
|
SYSLOGNG_OPTS=""
|
||||||
|
|
||||||
|
[ -r /etc/default/syslog-ng ] && . /etc/default/syslog-ng
|
||||||
|
|
||||||
|
case "x$CONSOLE_LOG_LEVEL" in
|
||||||
|
x[1-8])
|
||||||
|
dmesg -n $CONSOLE_LOG_LEVEL
|
||||||
|
;;
|
||||||
|
x)
|
||||||
|
;;
|
||||||
|
*)
|
||||||
|
echo "CONSOLE_LOG_LEVEL is of unaccepted value."
|
||||||
|
;;
|
||||||
|
esac
|
||||||
|
|
||||||
|
if [ ! -e /dev/xconsole ]
|
||||||
|
then
|
||||||
|
mknod -m 640 /dev/xconsole p
|
||||||
|
fi
|
||||||
|
|
||||||
|
exec syslog-ng -F -p /var/run/syslog-ng.pid $SYSLOGNG_OPTS
|
||||||
|
|||||||
25
image/sources.list
Normal file
25
image/sources.list
Normal file
@@ -0,0 +1,25 @@
|
|||||||
|
deb http://archive.ubuntu.com/ubuntu precise main restricted
|
||||||
|
deb-src http://archive.ubuntu.com/ubuntu precise main restricted
|
||||||
|
|
||||||
|
deb http://archive.ubuntu.com/ubuntu precise-updates main restricted
|
||||||
|
deb-src http://archive.ubuntu.com/ubuntu precise-updates main restricted
|
||||||
|
|
||||||
|
deb http://archive.ubuntu.com/ubuntu precise universe
|
||||||
|
deb-src http://archive.ubuntu.com/ubuntu precise universe
|
||||||
|
deb http://archive.ubuntu.com/ubuntu precise-updates universe
|
||||||
|
deb-src http://archive.ubuntu.com/ubuntu precise-updates universe
|
||||||
|
|
||||||
|
deb http://archive.ubuntu.com/ubuntu precise multiverse
|
||||||
|
deb-src http://archive.ubuntu.com/ubuntu precise multiverse
|
||||||
|
deb http://archive.ubuntu.com/ubuntu precise-updates multiverse
|
||||||
|
deb-src http://archive.ubuntu.com/ubuntu precise-updates multiverse
|
||||||
|
|
||||||
|
deb http://archive.ubuntu.com/ubuntu precise-backports main restricted universe multiverse
|
||||||
|
deb-src http://archive.ubuntu.com/ubuntu precise-backports main restricted universe multiverse
|
||||||
|
|
||||||
|
deb http://archive.ubuntu.com/ubuntu precise-security main restricted
|
||||||
|
deb-src http://archive.ubuntu.com/ubuntu precise-security main restricted
|
||||||
|
deb http://archive.ubuntu.com/ubuntu precise-security universe
|
||||||
|
deb-src http://archive.ubuntu.com/ubuntu precise-security universe
|
||||||
|
deb http://archive.ubuntu.com/ubuntu precise-security multiverse
|
||||||
|
deb-src http://archive.ubuntu.com/ubuntu precise-security multiverse
|
||||||
@@ -6,6 +6,11 @@ set -x
|
|||||||
## Install init process.
|
## Install init process.
|
||||||
cp /build/my_init /sbin/
|
cp /build/my_init /sbin/
|
||||||
mkdir -p /etc/my_init.d
|
mkdir -p /etc/my_init.d
|
||||||
|
mkdir -p /etc/container_environment
|
||||||
|
touch /etc/container_environment.sh
|
||||||
|
touch /etc/container_environment.json
|
||||||
|
chmod 700 /etc/container_environment
|
||||||
|
chmod 600 /etc/container_environment.sh /etc/container_environment.json
|
||||||
|
|
||||||
## Install runit.
|
## Install runit.
|
||||||
$minimal_apt_get_install runit
|
$minimal_apt_get_install runit
|
||||||
@@ -15,6 +20,10 @@ $minimal_apt_get_install syslog-ng-core
|
|||||||
mkdir /etc/service/syslog-ng
|
mkdir /etc/service/syslog-ng
|
||||||
cp /build/runit/syslog-ng /etc/service/syslog-ng/run
|
cp /build/runit/syslog-ng /etc/service/syslog-ng/run
|
||||||
mkdir -p /var/lib/syslog-ng
|
mkdir -p /var/lib/syslog-ng
|
||||||
|
cp /build/config/syslog_ng_default /etc/default/syslog-ng
|
||||||
|
|
||||||
|
## Install logrotate.
|
||||||
|
$minimal_apt_get_install logrotate
|
||||||
|
|
||||||
## Install the SSH server.
|
## Install the SSH server.
|
||||||
$minimal_apt_get_install openssh-server
|
$minimal_apt_get_install openssh-server
|
||||||
@@ -29,11 +38,16 @@ mkdir -p /root/.ssh
|
|||||||
chmod 700 /root/.ssh
|
chmod 700 /root/.ssh
|
||||||
chown root:root /root/.ssh
|
chown root:root /root/.ssh
|
||||||
cp /build/insecure_key.pub /etc/insecure_key.pub
|
cp /build/insecure_key.pub /etc/insecure_key.pub
|
||||||
chmod 644 /etc/insecure_key.pub
|
cp /build/insecure_key /etc/insecure_key
|
||||||
chown root:root /etc/insecure_key.pub
|
chmod 644 /etc/insecure_key*
|
||||||
|
chown root:root /etc/insecure_key*
|
||||||
cp /build/enable_insecure_key /usr/sbin/
|
cp /build/enable_insecure_key /usr/sbin/
|
||||||
|
|
||||||
## Install cron daemon.
|
## Install cron daemon.
|
||||||
$minimal_apt_get_install cron
|
$minimal_apt_get_install cron
|
||||||
mkdir /etc/service/cron
|
mkdir /etc/service/cron
|
||||||
cp /build/runit/cron /etc/service/cron/run
|
cp /build/runit/cron /etc/service/cron/run
|
||||||
|
|
||||||
|
## Remove useless cron entries.
|
||||||
|
# Checks for lost+found and scans for mtab.
|
||||||
|
rm -f /etc/cron.daily/standard
|
||||||
|
|||||||
11
test/runner.sh
Normal file → Executable file
11
test/runner.sh
Normal file → Executable file
@@ -12,19 +12,12 @@ function cleanup()
|
|||||||
echo " --> Stopping container"
|
echo " --> Stopping container"
|
||||||
docker stop $ID >/dev/null
|
docker stop $ID >/dev/null
|
||||||
docker rm $ID >/dev/null
|
docker rm $ID >/dev/null
|
||||||
docker rmi baseimage_test >/dev/null 2>/dev/null
|
|
||||||
}
|
}
|
||||||
|
|
||||||
PWD=`pwd`
|
PWD=`pwd`
|
||||||
|
|
||||||
echo " --> Preparing container"
|
echo " --> Starting insecure container"
|
||||||
ID=`docker run -d $NAME:$VERSION enable_insecure_key`
|
ID=`docker run -d -v $PWD/test:/test $NAME:$VERSION /sbin/my_init --enable-insecure-key`
|
||||||
docker wait $ID >/dev/null
|
|
||||||
docker commit $ID baseimage_test >/dev/null
|
|
||||||
docker rm $ID >/dev/null
|
|
||||||
|
|
||||||
echo " --> Starting container"
|
|
||||||
ID=`docker run -d -v $PWD/test:/test baseimage_test /sbin/my_init`
|
|
||||||
sleep 1
|
sleep 1
|
||||||
|
|
||||||
echo " --> Obtaining IP"
|
echo " --> Obtaining IP"
|
||||||
|
|||||||
0
test/test.sh
Normal file → Executable file
0
test/test.sh
Normal file → Executable file
Reference in New Issue
Block a user