Compare commits

...

87 Commits

Author SHA1 Message Date
Iwan Clement
6836d462fc French locales 2019-06-23 13:55:34 +02:00
Iwan Clement
f6eae18e51 First modification 2019-06-23 13:51:45 +02:00
Travis Rowland
c87dcdf546 Merge pull request #535 from CodeCutterUK/multi-arch-build
Further improvements to the multi-arch build
2019-06-11 11:00:06 -07:00
Mark Ison
9c9ffde394 Ensure building multiarch works when the image name isn't overridden
Stop tagging latest by when running the make release step
2019-05-31 08:30:02 +01:00
Travis Rowland
b5c34e9776 Merge pull request #534 from CodeCutterUK/multi-arch-build
Multiarch implementation for amd64, arm64 and arm32
2019-05-29 18:47:29 -07:00
Mark Ison
e4ae9aac10 Multiarch implementation for amd64, arm64 and arm32 2019-05-22 16:27:12 +01:00
Travis Rowland
e97d8464b9 Merge pull request #530 from iaon/master
Touch cron files to fix 'NUMBER OF HARD LINKS > 1' issue.
2019-05-10 17:04:14 -07:00
Travis Rowland
0dc0303a03 Merge branch 'master' into master 2019-05-10 17:04:02 -07:00
Travis Rowland
fc6672b4bb Merge pull request #527 from scrapinghub/master
Ability to override ubuntu:18.04
2019-05-10 16:53:10 -07:00
Matyas Markovics
d616b3bafb fix for 'ttyname failed: Inappropriate ioctl for device' during make test 2019-04-17 10:08:26 +02:00
Matyas Markovics
89597c5bc5 Use tools/docker-ssh in make ssh and in test/runner.sh to connect to container via SSH, fix SSH connection by IP issue on Mac-OS 2019-04-08 09:49:13 +02:00
Matyas Markovics
36bd41108f Default to ubuntu BASE_IMAGE in Dockerfile, modify make to only add --build-arg to build target if BASE_IMAGE is defined, document the use of BASE_IMAGE in README 2019-04-08 09:45:37 +02:00
Ivan Onushkin
386b8284d8 Touch cron files to fix 'NUMBER OF HARD LINKS > 1' issue. 2019-04-05 20:57:00 +03:00
Matyas Markovics
6d6395c58f invoke make from travis 2019-03-13 11:34:47 +01:00
Matyas Markovics
4a3476b6a6 send tests over in ssh, instead of mounting them 2019-03-13 11:09:41 +01:00
Matyas Markovics
ad88ec9226 ssh by IP in test; verbose SSH into container 2019-03-13 10:37:56 +01:00
Matyas Markovics
17a737f47b remove interactive and TTY flags when Enabling SSH in test 2019-03-13 10:12:22 +01:00
Matyas Markovics
9d29b23db2 exclude mounts (e.g.: /proc) from cleanup 2019-03-13 09:59:33 +01:00
Matyas Markovics
089258a746 if both NAME and BASE_IMAGE are defined, don't append variant to baseimage 2019-03-13 01:00:13 +01:00
Matyas Markovics
4f65f0a270 build-arg to define base-image, fix locale for Debian 2019-03-12 23:28:58 +01:00
Travis Rowland
14394bcb3f Merge pull request #523 from pmav99/python_bytecode
Remove python bytecode
2019-01-14 06:57:56 -08:00
Travis Rowland
a9fdb8878d Merge pull request #522 from silke/master
Fixed wrong line breaks in syslog-ng's logrotate config
2019-01-14 06:57:10 -08:00
Panos Mavrogiorgos
d0b150c5ef Remove python bytecode 2019-01-04 08:18:58 +02:00
Silke Meyer
c18b511311 Fixed wrong line breaks in syslog-ng's logrotate config 2018-12-25 10:34:05 +01:00
Travis Rowland
60e2cdd375 Merge pull request #520 from kingdonb/issue-459
addressing the confusion in issue #459
2018-11-26 11:00:38 -08:00
Kingdon Barrett
31fce7a874 clarifications and corrections 2018-11-20 10:03:00 -05:00
Kingdon Barrett
55bb086681 addressing the confusion in issue #459 2018-11-20 08:19:28 -05:00
Travis Rowland
dd699da614 Merge pull request #519 from kingdonb/fix-timeout-docs
documentation for #510
2018-10-23 14:14:24 -07:00
Kingdon Barrett
1be96f1edf documentation for #510
closes #517
2018-10-21 11:43:38 -04:00
Travis Rowland
8be7395886 Merge pull request #510 from jarischaefer/increase-kill-timeout
increase default kill timeout from 5 to 30 seconds
2018-10-11 11:26:29 -07:00
Travis Rowland
a9ae3334ed Merge branch 'master' into increase-kill-timeout 2018-10-11 11:26:11 -07:00
Travis Rowland
3b511622e0 Merge pull request #511 from CWelshE/master
docs(README): Add more daemon info
2018-09-14 15:50:21 -07:00
Travis Rowland
fdc1008c17 Merge pull request #512 from PikachuEXE/doc/update-os-version
Point OS version in other section to overview
2018-09-14 15:47:18 -07:00
Floor Drees
ac37bcf2bd Update contact persons 2018-09-13 08:30:55 -04:00
Niels van der Zanden
0d22512947 Add consultancy, fix logo in README 2018-09-13 13:59:48 +02:00
PikachuEXE
4e78e19a34 Point OS version in other section to overview
[ci skip]
2018-09-13 10:23:45 +08:00
Travis Rowland
14d156ce73 Merge pull request #505 from awking/master
change version from 16.04 to 18.04
2018-09-12 01:19:07 -07:00
Cody Welsh
10c7bbf3b4 docs(README): Add more daemon info
Gives the "Adding Additional Daemons" section of the README some extra
information, including another warning not to use `-it <cmd>` when
starting a given container.
2018-09-03 21:31:55 -07:00
jari.schaefer
b41f997b6c increase default kill timeout from 5 to 30 seconds 2018-08-31 22:49:08 +02:00
Kingdon Barrett
c14fecb3b1 Merge branch 'master' into master 2018-08-24 17:49:09 -04:00
Travis Rowland
3e62736510 Merge pull request #507 from tgpfeiffer/fix/506-escalate-term
use `sv force-stop` instead of `sv down` to stop services
2018-08-23 22:18:31 -07:00
Tobias Pfeiffer
8b50080470 use sv force-stop instead of sv down to stop services 2018-08-24 12:00:51 +09:00
awking
dd336f2bf0 change version from 16.04 to 18.04 2018-08-21 11:44:55 +08:00
Travis Rowland
e8d48f3af4 Update Makefile 2018-08-16 00:01:31 -07:00
Travis Rowland
d37f7aff3f Merge pull request #488 from unilynx/ubuntu-1804
Ubuntu 18.04
2018-08-15 23:56:52 -07:00
Travis Rowland
f802be0dfe Merge branch 'master' into ubuntu-1804 2018-08-15 23:55:47 -07:00
Travis Rowland
5493db5179 Update Dockerfile 2018-08-15 23:54:56 -07:00
Travis Rowland
becf747182 Update Makefile 2018-08-15 23:47:10 -07:00
Travis Rowland
0c9eaf3c43 Merge branch 'master' into ubuntu-1804 2018-08-13 10:11:30 -07:00
Travis Rowland
673cd89f41 Merge pull request #501 from davidbernick/bernick_18.04
syslog fix
2018-07-18 08:18:17 -07:00
Travis Rowland
8cf2e208ff Merge branch 'master' into bernick_18.04 2018-07-18 08:17:52 -07:00
Travis Rowland
924f874d7e Update Dockerfile 2018-07-18 08:17:29 -07:00
Travis Rowland
b89b718067 Merge pull request #497 from rwky/logrotate-permissions-fix
Fix /var/log permissions on syslog-ng startup
2018-07-18 08:09:40 -07:00
Travis Rowland
422781c7cf Merge branch 'master' into logrotate-permissions-fix 2018-07-18 08:08:34 -07:00
Travis Rowland
ed15d0d250 Merge pull request #487 from unilynx/support-maketest-on-osx
Allow 'make test' to work on macOS by publishing the SSH port
2018-07-18 07:45:32 -07:00
David Bernick
a018aba0c2 syslog fix 2018-07-16 12:46:18 -04:00
Rowan Wookey
dd9d23f1ea Fix /var/log permissions on syslog-ng startup 2018-06-30 10:58:14 +01:00
Arnold Hendriks
d796c2e32c Add gpg-agent and dirmngr so 'apt-key' works out of the box again, just like it did on the 16.04 phusion image 2018-04-27 20:40:49 +02:00
Arnold Hendriks
f936902c23 Update syslog configuration (took the diff between stock 16.04 and phusion 16.04 to figure out what to apply to the stock 18.04 syslog conf) as it complains about old config format 2018-04-27 20:40:49 +02:00
Arnold Hendriks
43791943e5 Update the baseimage to use, see https://hub.docker.com/r/library/ubuntu/tags/
Taking the bionic tag because so far the 'latest' and 18.04 tags haven't been updated yet
2018-04-27 20:40:48 +02:00
Arnold Hendriks
2f0e1ad0b8 Allow 'make test' to work on macOS by publishing the SSH port and using that during tests, as the IP address cannot be directly reached on macOS docker 2018-04-09 23:08:01 +02:00
Travis Rowland
92a357a41f Merge pull request #478 from andres-h/master
fix syslog reload
2018-04-02 00:49:31 -07:00
Travis Rowland
996e31b743 Incrementing version AFFECTS #485 2018-04-02 00:25:08 -07:00
Andres Heinloo
cb8cd8ad82 fix syslog reload 2018-03-16 18:24:00 +01:00
Floor Drees
69a8fc1246 update Code of Conduct with contact persons 2018-03-05 10:30:11 +01:00
Travis Rowland
12718e6954 Merge pull request #470 from davidhiendl/master
fixed syslog warning when using --tty as described in #468
2018-03-04 19:53:43 -03:00
David Hiendl
be8fc49e52 fixed syslog warning when using --tty as described in #468 2018-02-22 08:53:27 +01:00
Travis Rowland
14896d9181 Merge pull request #466 from phusion/readme-fix
removed syslog-forwarder from readme
2018-02-19 17:13:21 -08:00
Zsolt Ero
9d63ae751c RAM usage updated in readme 2018-02-17 02:28:14 +01:00
Zsolt Ero
c5b6ed442d readme fix 2018-02-17 02:05:21 +01:00
Zsolt Ero
c40591ee2c removed syslog-forwarder from readme 2018-02-17 02:03:32 +01:00
Travis Rowland
be5d910bad Merge pull request #445 from phusion/Theaxiom-patch-1
my_init exits with 0 on SIGINT after runit is started
2018-01-31 23:09:55 -08:00
Travis Rowland
db73c10615 Merge branch 'master' into Theaxiom-patch-1 2018-01-31 22:57:45 -08:00
Travis Rowland
733dac8706 Merge pull request #465 from rdxmb/master
README.md -> fix SSH docs
2018-01-31 22:56:16 -08:00
Marc Bihlmaier
768d4b4d3f fix SSH README.md 2018-01-31 11:33:17 +01:00
rdxmb
b20ebe448c Merge pull request #1 from phusion/master
Rebase
2018-01-31 11:18:19 +01:00
Travis Rowland
adf8fd7805 Latest tag not yet necessary 2018-01-26 02:51:52 -08:00
Travis Rowland
670f189553 Merge pull request #463 from phusion/ci-test
Ci test
2018-01-26 02:44:52 -08:00
Travis Rowland
e81e664a72 Push master as latest 2018-01-26 02:36:46 -08:00
Travis Rowland
6b8be06bba GitLab CI is better 2018-01-26 02:26:03 -08:00
Travis Rowland
efc5865789 Was using incorrect variable replacements 2018-01-26 02:17:56 -08:00
Travis Rowland
300b96fb93 build local Dockerfile 2018-01-26 02:01:09 -08:00
Travis Rowland
1bffe76e6a don't remove image 2018-01-26 01:58:22 -08:00
Travis Rowland
7a639692ab Automated Docker builds 2018-01-26 01:54:38 -08:00
Travis Rowland
fdfe6b1937 Merge pull request #449 from phusion/Theaxiom-patch-2
Incrementing version AFFECTS #448
2018-01-26 01:25:41 -08:00
Travis Rowland
90e411fec2 Merge branch 'master' into Theaxiom-patch-1 2017-11-23 15:13:09 -08:00
Travis Rowland
7c7ab1a0a6 my_init exits with 0 on SIGINT after runit is started
fixes #358
2017-10-30 12:04:21 -07:00
20 changed files with 298 additions and 1233 deletions

21
.circleci/config.yml Normal file
View File

@@ -0,0 +1,21 @@
version: 2
jobs:
build:
machine: true
steps:
- checkout
#- run:
# name : Getting docker
# command: curl https://get.docker.com | sh
- run:
name: Enabling qemu
command: docker run --rm --privileged multiarch/qemu-user-static:register --reset
- run:
name: Building arm based image.
command: docker build -t arm-test .
- run:
name: Listing built images
command: docker images
# - run:
# name: Running arm based image.
# command: docker run --rm arm-test

View File

@@ -1,19 +1,51 @@
sudo: required
language: c
services:
- docker
script:
- make build
addons:
apt:
packages:
- docker-ce
- qemu-user-static
deploy:
- provider: script
script: make test_release
on:
branch: master
tags: true
condition: '$TRAVIS_TAG =~ ^[0-9]+(\.[0-9]+)*$'
- provider: script
script: make test_master
on:
branch: master
env:
global:
# - VERSION=${TRAVIS_TAG}
- VERSION=${TRAVIS_BRANCH}
- DOCKER_CLI_EXPERIMENTAL=enabled
- QEMU_VERSION=v4.0.0
matrix:
# PLATFORM = Base image architecture to be used
# QEMU_ARCH = qemu binary to be downloaded from https://github.com/multiarch/qemu-user-static/releases
# TAG_ARCH = Tag to be applied to the image when upload to DockerHub
- PLATFORM=amd64 QEMU_ARCH=amd64 TAG_ARCH=amd64
- PLATFORM=arm64 QEMU_ARCH=aarch64 TAG_ARCH=arm64
- PLATFORM=arm QEMU_ARCH=arm TAG_ARCH=arm
stage: Compile
before_script:
- echo '{"experimental":true}' | sudo tee /etc/docker/daemon.json
- sudo service docker restart
script:
- docker login -u "${DOCKER_USERNAME}" -p "${DOCKER_PASSWORD}";
- make build test
- if [[ $TRAVIS_PULL_REQUEST == 'false' ]]; then
make release;
fi
jobs:
include:
- stage: deploy
env:
- ARCHS="amd64 arm64 arm"
script:
- echo $NAME:$VERSION_TAG
- echo "$DOCKER_PASSWORD" | docker login --username "$DOCKER_USERNAME" --password-stdin
- make build_multiarch

View File

@@ -34,7 +34,13 @@ This Code of Conduct applies both within project spaces and in public spaces whe
## Enforcement
Instances of abusive, harassing, or otherwise unacceptable behavior may be reported by contacting the project team at info@phusion.nl. The project team will review and investigate all complaints, and will respond in a way that it deems appropriate to the circumstances. The project team is obligated to maintain confidentiality with regard to the reporter of an incident. Further details of specific enforcement policies may be posted separately.
Instances of abusive, harassing, or otherwise unacceptable behavior may be reported by contacting the project team at Phusion Passenger:
[FloorD](https://github.com/floord) (she/her), floor@phusion.nl, English / Dutch / German
[Scarhand](https://github.com/scarhand) (he/his), niels@phusion.nl, English / Dutch
The project team will review and investigate all complaints, and will respond in a way that it deems appropriate to the circumstances. The project team is obligated to maintain confidentiality with regard to the reporter of an incident. Further details of specific enforcement policies may be posted separately.
Project maintainers who do not follow or enforce the Code of Conduct in good faith may face temporary or permanent repercussions as determined by other members of the project's leadership.

View File

@@ -1,31 +1,53 @@
NAME = phusion/baseimage
VERSION = 0.10.0
VERSION ?= 0.11
ifdef BASE_IMAGE
BUILD_ARG = --build-arg BASE_IMAGE=$(BASE_IMAGE)
ifndef NAME
NAME = phusion/baseimage-$(subst :,-,${BASE_IMAGE})
endif
else
NAME ?= phusion/baseimage
endif
ifdef TAG_ARCH
# VERSION_ARG = $(VERSION)-$(subst /,-,$(subst :,-,${BASE_IMAGE}))-$(TAG_ARCH)
VERSION_ARG = $(VERSION)-$(TAG_ARCH)
LATEST_VERSION = latest-$(TAG_ARCH)
else
# VERSION_ARG = $(VERSION)-$(subst /,-,$(subst :,-,${BASE_IMAGE}))
VERSION_ARG = $(VERSION)
LATEST_VERSION = latest
endif
VERSION_ARG ?= $(VERSION)
.PHONY: all build test tag_latest release ssh
all: build
build:
docker build -t $(NAME):$(VERSION) --rm image
./build.sh
docker build --no-cache -t $(NAME):$(VERSION_ARG) $(BUILD_ARG) --build-arg QEMU_ARCH=$(QEMU_ARCH) --platform $(PLATFORM) --rm image
build_multiarch:
env NAME=$(NAME) VERSION=$(VERSION_ARG) ./build-multiarch.sh
test:
env NAME=$(NAME) VERSION=$(VERSION) ./test/runner.sh
env NAME=$(NAME) VERSION=$(VERSION_ARG) ./test/runner.sh
tag_latest:
docker tag $(NAME):$(VERSION) $(NAME):latest
docker tag $(NAME):$(VERSION_ARG) $(NAME):$(LATEST_VERSION)
release: test tag_latest
@if ! docker images $(NAME) | awk '{ print $$2 }' | grep -q -F $(VERSION); then echo "$(NAME) version $(VERSION) is not yet built. Please run 'make build'"; false; fi
tag_multiarch_latest:
env NAME=$(NAME) VERSION=$(VERSION) TAG_LATEST=true ./build-multiarch.sh
release: test
@if ! docker images $(NAME) | awk '{ print $$2 }' | grep -q -F $(VERSION_ARG); then echo "$(NAME) version $(VERSION_ARG) is not yet built. Please run 'make build'"; false; fi
docker push $(NAME)
@echo "*** Don't forget to create a tag by creating an official GitHub release."
ssh: SSH_COMMAND?=
ssh:
chmod 600 image/services/sshd/keys/insecure_key
@ID=$$(docker ps | grep -F "$(NAME):$(VERSION)" | awk '{ print $$1 }') && \
ID=$$(docker ps | grep -F "$(NAME):$(VERSION_ARG)" | awk '{ print $$1 }') && \
if test "$$ID" = ""; then echo "Container is not running."; exit 1; fi && \
IP=$$(docker inspect $$ID | grep IPAddr | sed 's/.*: "//; s/".*//') && \
echo "SSHing into $$IP" && \
ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i image/services/sshd/keys/insecure_key root@$$IP
tools/docker-ssh $$ID ${SSH_COMMAND}
test_release:
echo test_release

View File

@@ -3,7 +3,7 @@
[![](https://badge.imagelayers.io/phusion/baseimage:latest.svg)](https://imagelayers.io/?images=phusion/baseimage:latest 'Get your own badge on imagelayers.io')
[![Travis](https://img.shields.io/travis/phusion/baseimage-docker.svg)](https://travis-ci.org/phusion/baseimage-docker)
_Baseimage-docker only consumes 6 MB RAM and is much more powerful than Busybox or Alpine. See why below._
_Baseimage-docker only consumes 8.3 MB RAM and is much more powerful than Busybox or Alpine. See why below._
Baseimage-docker is a special [Docker](https://www.docker.com) image that is configured for correct use within Docker containers. It is Ubuntu, plus:
@@ -87,7 +87,7 @@ You can configure the stock `ubuntu` image yourself from your Dockerfile, so why
| Component | Why is it included? / Remarks |
| ---------------- | ------------------- |
| Ubuntu 16.04 LTS | The base system. |
| Ubuntu 18.04 LTS | The base system. |
| A **correct** init process | _Main article: [Docker and the PID 1 zombie reaping problem](http://blog.phusion.nl/2015/01/20/docker-and-the-pid-1-zombie-reaping-problem/)._ <br><br>According to the Unix process model, [the init process](https://en.wikipedia.org/wiki/Init) -- PID 1 -- inherits all [orphaned child processes](https://en.wikipedia.org/wiki/Orphan_process) and must [reap them](https://en.wikipedia.org/wiki/Wait_(system_call)). Most Docker containers do not have an init process that does this correctly. As a result, their containers become filled with [zombie processes](https://en.wikipedia.org/wiki/Zombie_process) over time. <br><br>Furthermore, `docker stop` sends SIGTERM to the init process, which stops all services. Unfortunately most init systems don't do this correctly within Docker since they're built for hardware shutdowns instead. This causes processes to be hard killed with SIGKILL, which doesn't give them a chance to correctly deinitialize things. This can cause file corruption. <br><br>Baseimage-docker comes with an init process `/sbin/my_init` that performs both of these tasks correctly. |
| Fixes APT incompatibilities with Docker | See https://github.com/dotcloud/docker/issues/1024. |
| syslog-ng | A syslog daemon is necessary so that many services - including the kernel itself - can correctly log to /var/log/syslog. If no syslog daemon is running, a lot of important messages are silently swallowed. <br><br>Only listens locally. All syslog messages are forwarded to "docker logs".<br><br>Why syslog-ng?<br>I've had bad experience with rsyslog. I regularly run into bugs with rsyslog, and once in a while it takes my log host down by entering a 100% CPU loop in which it can't do anything. Syslog-ng seems to be much more stable. |
@@ -98,7 +98,7 @@ You can configure the stock `ubuntu` image yourself from your Dockerfile, so why
| `setuser` | A tool for running a command as another user. Easier to use than `su`, has a smaller attack vector than `sudo`, and unlike `chpst` this tool sets `$HOME` correctly. Available as `/sbin/setuser`. |
| `install_clean` | A tool for installing `apt` packages that automatically cleans up after itself. All arguments are passed to `apt-get -y install --no-install-recommends` and after installation the apt caches are cleared. To include recommended packages, add `--install-recommends`. |
Baseimage-docker is very lightweight: it only consumes 6 MB of memory.
Baseimage-docker is very lightweight: it only consumes 8.3 MB of memory.
<a name="docker_single_process"></a>
### Wait, I thought Docker is about running a single process in a container?
@@ -156,26 +156,45 @@ The image is called `phusion/baseimage`, and is available on the Docker registry
<a name="adding_additional_daemons"></a>
### Adding additional daemons
You can add additional daemons (e.g. your own app) to the image by creating runit entries. You only have to write a small shell script which runs your daemon, and runit will keep it up and running for you, restarting it when it crashes, etc.
A daemon is a program which runs in the background of its system, such
as a web server.
The shell script must be called `run`, must be executable, and is to be placed in the directory `/etc/service/<NAME>`.
You can add additional daemons (for example, your own app) to the image
by creating runit service directories. You only have to write a small
shell script which runs your daemon;
[`runsv`](http://smarden.org/runit/runsv.8.html) will start your script,
and - by default - restart it upon its exit, after waiting one second.
Here's an example showing you how a memcached server runit entry can be made.
The shell script must be called `run`, must be executable, and is to be
placed in the directory `/etc/service/<NAME>`. `runsv` will switch to
the directory and invoke `./run` after your container starts.
In `memcached.sh` (make sure this file is chmod +x):
**Be certain that you do not start your container using interactive mode
(`-it`) with another command, as `runit` must be the first process to run. If you do this, your runit service directories won't be started. For instance, `docker run -it <name> bash` will bring you to bash in your container, but you'll lose all your daemons.**
#!/bin/sh
# `/sbin/setuser memcache` runs the given command as the user `memcache`.
# If you omit that part, the command will be run as root.
exec /sbin/setuser memcache /usr/bin/memcached >>/var/log/memcached.log 2>&1
Here's an example showing you how a `runit` service directory can be
made for a `memcached` server.
In `Dockerfile`:
In `memcached.sh`, or whatever you choose to name your file (make sure
this file is chmod +x):
```bash
#!/bin/sh
# `/sbin/setuser memcache` runs the given command as the user `memcache`.
# If you omit that part, the command will be run as root.
exec /sbin/setuser memcache /usr/bin/memcached >>/var/log/memcached.log 2>&1
```
In an accompanying `Dockerfile`:
RUN mkdir /etc/service/memcached
COPY memcached.sh /etc/service/memcached/run
RUN chmod +x /etc/service/memcached/run
Note that the shell script must run the daemon **without letting it daemonize/fork it**. Usually, daemons provide a command line flag or a config file option for that.
```Dockerfile
RUN mkdir /etc/service/memcached
COPY memcached.sh /etc/service/memcached/run
RUN chmod +x /etc/service/memcached/run
```
A given shell script must run **without daemonizing or forking itself**;
this is because `runit` will start and restart your script on its own.
Usually, daemons provide a command line flag or a config file option for
preventing such behavior - essentially, you just want your script to run
in the foreground, not the background.
<a name="running_startup_scripts"></a>
### Running scripts during container startup
@@ -200,7 +219,7 @@ In `Dockerfile`:
RUN mkdir -p /etc/my_init.d
COPY logtime.sh /etc/my_init.d/logtime.sh
RUN chmod +x /etc/my_init.d/logtime.sh
RUN chmod +x /etc/my_init.d/logtime.sh
<a name="environment_variables"></a>
@@ -219,6 +238,12 @@ environment variables:
# Give all other processes (such as those which have been forked) 5 minutes to timeout
ENV KILL_ALL_PROCESSES_TIMEOUT=300
Note: Prior to 0.11.1, the default values for `KILL_PROCESS_TIMEOUT` and `KILL_ALL_PROCESSES_TIMEOUT`
were 5 seconds. In version 0.11.1+ the default process timeout has been adjusted to 30 seconds to
allow more time for containers to terminate gracefully. The default timeout of your container runtime
may supersede this setting, for example Docker currently applies a [10s timeout](https://docs.docker.com/engine/reference/commandline/stop/#options)
by default before sending SIGKILL, upon `docker stop` or receiving SIGTERM.
### Environment variables
If you use `/sbin/my_init` as the main container command, then any environment variables set with `docker run --env` or with the `ENV` command in the Dockerfile, will be picked up by `my_init`. These variables will also be passed to all child processes, including `/etc/my_init.d` startup scripts, Runit and Runit-managed services. There are however a few caveats you should be aware of:
@@ -307,7 +332,7 @@ If you are sure that your environment variables don't contain sensitive data, th
<a name="logging"></a>
### System logging
Baseimage-docker uses syslog-ng to provide a syslog facility to the container. Syslog-ng is not managed as an runit service (see below). Syslog messages are forwarded to the console via the service at /etc/service/syslog-forwarder.
Baseimage-docker uses syslog-ng to provide a syslog facility to the container. Syslog-ng is not managed as an runit service (see below). Syslog messages are forwarded to the console.
#### Log startup/shutdown sequence
In order to ensure that all application log messages are captured by syslog-ng, syslog-ng is started separately before the runit supervisor process, and shutdown after runit exits. This uses the [startup script facility](#running_startup_scripts) provided by this image. This avoids a race condition which would exist if syslog-ng were managed as an runit service, where runit kills syslog-ng in parallel with the container's other services, causing log messages to be dropped during a graceful shutdown if syslog-ng exits while logs are still being produced by other services.
@@ -315,7 +340,7 @@ In order to ensure that all application log messages are captured by syslog-ng,
<a name="upgrading_os"></a>
### Upgrading the operating system inside the container
Baseimage-docker images contain an Ubuntu 16.04 operating system. You may want to update this OS from time to time, for example to pull in the latest security updates. OpenSSL is a notorious example. Vulnerabilities are discovered in OpenSSL on a regular basis, so you should keep OpenSSL up-to-date as much as you can.
Baseimage-docker images contain an Ubuntu operating system (see OS version at [Overview](#overview)). You may want to update this OS from time to time, for example to pull in the latest security updates. OpenSSL is a notorious example. Vulnerabilities are discovered in OpenSSL on a regular basis, so you should keep OpenSSL up-to-date as much as you can.
While we release Baseimage-docker images with the latest OS updates from time to time, you do not have to rely on us. You can update the OS inside Baseimage-docker images yourself, and it is recommended that you do this instead of waiting for us.
@@ -450,7 +475,7 @@ Then, you can start your container with
docker run -d -v `pwd`/myfolder:/etc/my_init.d my/dockerimage
This will initialize sshd on container boot. You can then access it with the insecure key as below, or using the methods to add a secure key. Further, you can publish the port to your machine with -p 22:2222 allowing you to ssh to localhost:2222 instead of looking up the ip address.
This will initialize sshd on container boot. You can then access it with the insecure key as below, or using the methods to add a secure key. Further, you can publish the port to your machine with -p 2222:22 allowing you to ssh to 127.0.0.1:2222 instead of looking up the ip address of the container.
<a name="ssh_keys"></a>
#### About SSH keys
@@ -572,14 +597,29 @@ If you want to call the resulting image something else, pass the NAME variable,
make build NAME=joe/baseimage
You can also change the `ubuntu` base-image to `debian` as these distributions are quite similar.
make build BASE_IMAGE=debian:stretch
The image will be: `phusion/baseimage-debian-stretch`. Use the `NAME` variable in combination with the `BASE_IMAGE` one to call it `joe/stretch`.
make build BASE_IMAGE=debian:stretch NAME=joe/stretch
To verify that the various services are started, when the image is run as a container, add `test` to the end of your make invocations, e.g.:
make build BASE_IMAGE=debian:stretch NAME=joe/stretch test
<a name="removing_optional_services"></a>
### Removing optional services
The default baseimage-docker installs `syslog-ng`, `cron` and `sshd` services during the build process.
In case you don't need one or more of these services in your image, you can disable its installation.
In case you don't need one or more of these services in your image, you can disable its installation through the `image/buildconfig` that is sourced within `image/system_services.sh`. Do this at build time by passing a variable in with `--build-arg` as in `docker build --build-arg DISABLE_SYSLOG=1 image/`, or you may set the variable in `image/Dockerfile` with an ENV setting above the RUN directive.
As shown in the following example, to prevent `sshd` from being installed into your image, set `1` to the `DISABLE_SSH` variable in the `./image/buildconfig` file.
These represent build-time configuration, so setting them in the shell env at build-time [will not have any effect](https://github.com/phusion/baseimage-docker/issues/459#issuecomment-439177442). Setting them in child images' Dockerfiles will also not have any effect.)
You can also set them directly as shown in the following example, to prevent `sshd` from being installed into your image, set `1` to the `DISABLE_SSH` variable in the `./image/buildconfig` file.
### In ./image/buildconfig
# ...
@@ -597,7 +637,8 @@ Then you can proceed with `make build` command.
* Using baseimage-docker? [Tweet about us](https://twitter.com/share) or [follow us on Twitter](https://twitter.com/phusion_nl).
* Having problems? Want to participate in development? Please post a message at [the discussion forum](https://groups.google.com/d/forum/passenger-docker).
* Looking for a more complete base image, one that is ideal for Ruby, Python, Node.js and Meteor web apps? Take a look at [passenger-docker](https://github.com/phusion/passenger-docker).
* Need a helping hand? Phusion also offers [consulting](https://www.phusion.nl/consultancy) on a wide range of topics, including Web Development, UI/UX Research & Design, Technology Migration and Auditing.
[<img src="http://www.phusion.nl/assets/logo.png">](http://www.phusion.nl/)
[<img src="https://www.phusion.nl/images/mark_logotype.svg">](https://www.phusion.nl/)
Please enjoy baseimage-docker, a product by [Phusion](http://www.phusion.nl/). :-)

View File

@@ -1,569 +0,0 @@
<a name="a-minimal-ubuntu-base-image-modified-for-docker-friendliness"></a>
# Docker友好的最小的Ubuntu基础镜像
Baseimage-docker是一个特殊的[Docker](http://www.docker.io)镜像在Docker容器内做了配置并且可以正确使用。它确实是一个Ubuntu系统, 除此之外进行了如下修订:
* 为更加友好的支持Docker做了修订。
* 在Docker环境下作为管理工具特别有用。
* 在[不违反Docker哲学](#docker_single_process)的前提下,能够很容易的运行多进程的机制。
可以把它作为自己的基础Docker镜像。
Baseimage-docker项目可以直接从Docker的[registry](https://index.docker.io/u/phusion/baseimage/)获取!
<a name="what-are-the-problems-with-the-stock-ubuntu-base-image"></a>
### 原生的Ubuntu基础镜像有什么问题呢
原生Ubuntu不是为了在Docker内运行而设计的。它的初始化系统Upstart假定运行的环境要么是真实的硬件要么是虚拟的硬件而不是在Docker容器内。但是在一个Docker的容器内并不需要一个完整的系统你需要的只是一个很小的系统。但是如果你不是非常熟悉Unix的系统模型想要在Docker容器内裁减出最小的系统会碰到很多难以正确解决的陌生的技术坑。这些坑会引起很多莫名其妙的问题。
Baseimage-docker让这一切完美。在"内容"部分描述了所有这些修改。
<a name="why-use-baseimage-docker"></a>
### 为什么使用baseimage-docker
你自己可以从Dockerfile配置一个原生`ubuntu`镜像为什么还要多此一举的使用baseimage-docker呢?
* 配置一个Docker友好的基础系统并不是一个简单的任务。如前所述过程中会碰到很多坑。当你搞定这些坑之后只不过是又重新发明了一个baseimage-docker而已。使用baseimage-docker可以免去你这方面需要做的努力。
* 减少需要正确编写Dockerfile文件的时间。你不用再担心基础系统可以专注于你自己的技术栈和你的项目。
* 减少需要运行`docker build`的时间让你更快的迭代Dockerfile。
* 减少了重新部署的时的下载时间。Docker只需要在第一次部署的时候下载一次基础镜像。在随后的部署中,只需要改变你下载之后对基础镜像进行修改的部分。
-----------------------------------------
**相关资源**
[网站](http://phusion.github.io/baseimage-docker/) |
[Github](https://github.com/phusion/baseimage-docker) |
[Docker registry](https://index.docker.io/u/phusion/baseimage/) |
[论坛](https://groups.google.com/d/forum/passenger-docker) |
[Twitter](https://twitter.com/phusion_nl) |
[Blog](http://blog.phusion.nl/)
**目录**
* [镜像里面有什么?](#whats_inside)
* [概述](#whats_inside_overview)
* [等等,我认为Docker在一个容器中只能允许运行一个进程?](#docker_single_process)
* [Baseimage-docker更侧重于“胖容器”还是“把容器当作虚拟机”](#fat_containers)
* [查看baseimage-docker](#inspecting)
* [使用baseimage-docker作为基础镜像](#using)
* [开始](#getting_started)
* [增加额外的后台进程](#adding_additional_daemons)
* [容器启动时运行脚本](#running_startup_scripts)
* [环境变量](#environment_variables)
* [集中定义自己的环境变量](#envvar_central_definition)
* [保存环境变量](#envvar_dumps)
* [修改环境变量](#modifying_envvars)
* [安全性](#envvar_security)
* [容器管理](#container_administration)
* [在一个新容器中运行单条命令](#oneshot)
* [在正在运行的的容器中运行一条命令](#run_inside_existing_container)
* [通过`docer exec`登录容器](#login_docker_exec)
* [用法](#nsenter_usage)
* [使用SSH登录容器](#login_ssh)
* [启用SSH](#enabling_ssh)
* [关于SSH的key](#ssh_keys)
* [只对一个容器使用不安全key](#using_insecure_key_for_one_container_only)
* [永久开启不安全key](#enabling_the_insecure_key_permanently)
* [使用你自己的key](#using_your_own_key)
* [`docker-ssh`工具](#docker_ssh)
* [构建自己的镜像](#building)
* [总结](#conclusion)
-----------------------------------------
<a name="whats_inside"></a>
## 镜像里面有什么?
<a name="whats_inside_overview"></a>
### 概述
*想看一个里面包含RubyPythonNode.js以及Meteor的完整基础镜像可以看一下[passenger-docker](https://github.com/phusion/passenger-docker)。*
| 模块 | 为什么包含这些?以及备注 |
| ---------------- | ------------------- |
| Ubuntu 16.04 LTS | 基础系统。 |
| 一个**正确**的初始化进程 | *主要文章:[Docker和PID 1 僵尸进程回收问题](http://blog.phusion.nl/2015/01/20/docker-and-the-pid-1-zombie-reaping-problem/)*<br/><br/>根据Unix进程模型[初始化进程](https://en.wikipedia.org/wiki/Init) -- PID 1 -- 继承了所有[孤立的子进程](https://en.wikipedia.org/wiki/Orphan_process),并且必须[进行回收](https://en.wikipedia.org/wiki/Wait_(system_call))。大多数Docker容器没有一个初始化进程可以正确的完成此操作随着时间的推移会导致他们的容器出现了大量的[僵尸进程](https://en.wikipedia.org/wiki/Zombie_process)。<br/><br/>而且,`docker stop`发送SIGTERM信号给初始化进程照理说此信号应该可以停止所有服务。不幸的是由于它们对硬件进行了关闭操作导致Docker内的大多数初始化系统没有正确执行。这会导致进程强行被SIGKILL信号关闭从而丧失了一个正确取消初始化设置的机会。这会导致文件损坏。<br/><br/>Baseimage-docker配有一个名为`/sbin/my_init`的初始化进程来同时正确的完成这些任务。 |
| 修复了APT与Docker不兼容的问题 | 详情参见https://github.com/dotcloud/docker/issues/1024 。 |
| syslog-ng | 对于很多服务包括kernel自身都需要一个syslog后台进程以便可以正确的将log输出到/var/log/syslog中。如果没有运行syslog后台进程很多重要的信息就会默默的丢失了。<br/><br/>只对本地进行监听。所有syslog信息会被转发给“docker logs”。 |
| logrotate | 定期转存和压缩日志。 |
| SSH服务 | 允许你很容易的登录到容器中进行[查询或管理](#login_ssh)操作。<br/><br/>_SSH**默认是禁用**的这也是baseimage-docker为此目的提供的唯一方法。其它方法需要通过[docker exec](#login_docker_exec)。由于`docker exec`同时带来了几个需要注意的问题SSH同时也提供了一个可替换的方法。_<br/><br/>密码和challenge-response认证方式默认是禁用的。只有key认证通过之后才能够开启。 |
| cron | 为了保证cron任务能够工作必须运行cron后台进程。 |
| [runit](http://smarden.org/runit/) | 替换Ubuntu的Upstart。用于服务监控和管理。比SysV init更容易使用同时当这些服务崩溃之后支持后台进程自动重启。比Upstart更易使用更加的轻量级。 |
| `setuser` | 使用其它账户运行命令的工具。比`su`更容易使用,比使用`sudo`有那么一点优势,跟`chpst`不同,这个工具需要正确的设置`$HOME`。像`/sbin/setuser`这样。 |
Baseimage-docker非常的轻量级仅仅占用6MB内存。
<a name="docker_single_process"></a>
### 等等,我认为Docker在一个容器中就运行一个进程吗?
绝对不是这样的. 在一个docker容器中,运行多个进程也是很好的. 事实上,没有什么技术原因限制你只运行一个进程,运行很多的进程,只会把容器中系统的基本功能搞的更乱,比如syslog.
Baseimage-docker *鼓励* 通过runit来运行多进程.
<a name="inspecting"></a>
## 检测一下baseimage-docker
要检测镜像,执行下面的命令:
docker run --rm -t -i phusion/baseimage:<VERSION> /sbin/my_init -- bash -l
`<VERSION>` 是[baseimage-docker的版本号](https://github.com/phusion/baseimage-docker/blob/master/Changelog.md).
你不用手动去下载任何文件.上面的命令会自动从docker仓库下载baseimage-docker镜像.
<a name="using"></a>
## 使用baseimage-docker作为基础镜像
<a name="getting_started"></a>
### 入门指南
镜像名字叫`phusion/baseimage`,在Docker仓库上也是可用的.
下面的这个是一个Dockerfile的模板.
# 使用phusion/baseimage作为基础镜像,去构建你自己的镜像,需要下载一个明确的版本,千万不要使用`latest`.
# 查看https://github.com/phusion/baseimage-docker/blob/master/Changelog.md,可用看到版本的列表.
FROM phusion/baseimage:<VERSION>
# 设置正确的环境变量.
ENV HOME /root
# 生成SSH keys,baseimage-docker不包含任何的key,所以需要你自己生成.你也可以注释掉这句命令,系统在启动过程中,会生成一个.
RUN /etc/my_init.d/00_regen_ssh_host_keys.sh
# 初始化baseimage-docker系统
CMD ["/sbin/my_init"]
# 这里可以放置你自己需要构建的命令
# 当完成后,清除APT.
RUN apt-get clean && rm -rf /var/lib/apt/lists/* /tmp/* /var/tmp/*
<a name="adding_additional_daemons"></a>
### 增加后台进程
你可以通过runit工具向你的镜像中添加后台进程(例如:你自己的某些应用).你需要编写一个运行你需要的后台进程的脚本就可以了,runit工具会保证它的正常运行,如果进程死掉,runit也会重启它的.
脚本的名称必须是`run`,必须是可以运行的,它需要放到`/etc/service/<NAME>`.
这里有一个例子,向你展示如果运行memcached服务的.
### memcached.sh(确定文件的权限是chmod +x):
#!/bin/sh
# `/sbin/setuser memcache` 指定一个`memcache`用户来运行命令.如果你忽略了这部分,就会使用root用户执行.
exec /sbin/setuser memcache /usr/bin/memcached >>/var/log/memcached.log 2>&1
### 在Dockerfile中:
RUN mkdir /etc/service/memcached
COPY memcached.sh /etc/service/memcached/run
注意脚本必须运行在后台的,**不能让他们进程进行daemonize/fork**.通常,后台进程会提供一个标志位或者配置文件.
<a name="running_startup_scripts"></a>
### 在容器启动的时候,运行脚本.
baseimage-docker的初始化脚本 `/sbin/my_init`,在启动的时候进程运行,按照下面的顺序:
* 如果`/etc/my_init.d`存在,则按照字母顺序执行脚本.
* 如果`/etc/rc.local`存在,则执行里面的脚本.
所有的脚本都是正确退出的,例如:退出的code是0.如果有任何脚本以非0的code退出,启动就会失败.
下面的例子向你展示了怎么添加一个启动脚本.这个脚本很简单的记录的一个系统启动时间,将启动时间记录到/tmp/boottime.txt.
### 在 logtime.sh (文件权限chmod +x):
#!/bin/sh
date > /tmp/boottime.txt
### 在 Dockerfile中:
RUN mkdir -p /etc/my_init.d
COPY logtime.sh /etc/my_init.d/logtime.sh
<a name="environment_variables"></a>
### 环境变量
如果你使用`/sbin/my_init`作为主容器命令,那么通过`docker run --env`或者在Dockerfile文件中设置的`ENV`环境变量,都会被`my_init`读取.
* 在Unix系统中,环境变量都会被子进程给继承.这就意味着,子进程不可能修改环境变量或者修改其他进程的环境变量.
* 由于上面提到的一点,这里没有一个可以为所有应用和服务集中定义环境的地方.Debian提供了一个`/etc/environment` 文件,解决一些问题.
* 某些服务更改环境变量是为了给子进程使用.Nginx有这样的一个例子:它移除了所有的环境变量,除非你通过`env`进行了配置,明确了某些是保留的.如果你部署了任何应用在Nginx镜像(例如:使用[passenger-docker](https://github.com/phusion/passenger-docker)镜像或者使用Phusion Passenger作为你的镜像.),那么你通过Docker,你不会看到任何环境变量.
`my_init`提供了一个办法来解决这些问题.
<a name="envvar_central_definition"></a>
#### 集中定义你的环境变量
在启动的时候,在执行[startup scripts](#running_startup_scripts),`my_init`会从`/etc/container_environment`导入环境变量.这个文件夹下面,包含的文件,文件被命名为环境变量的名字.文件内容就是环境变量的值.这个文件夹是因此是一个集中定义你的环境变量的好地方,它会继承到所有启动项目和Runit管理的服务中.
给个例子,在你的dockerfile如何定义一个环境变量:
RUN echo Apachai Hopachai > /etc/container_environment/MY_NAME
你可以按照下面这样验证:
$ docker run -t -i <YOUR_NAME_IMAGE> /sbin/my_init -- bash -l
...
*** Running bash -l...
# echo $MY_NAME
Apachai Hopachai
**换行处理**
如果你观察仔细一点,你会注意到'echo'命令,实际上在它是在新行打印出来的.为什么$MY_NAME没有包含在一行呢? 因为`my_init`在尾部有个换行字符.如果你打算让你的值包含一个新行,你需要增*另外*一个新字符,像这样:
RUN echo -e "Apachai Hopachai\n" > /etc/container_environment/MY_NAME
<a name="envvar_dumps"></a>
#### 环境变量存储
上面提到集中定义环境变量,它不会从子服务进程改变父服务进程或者重置环境变量.而且,`my_init`也会很容易的让你查询到原始的环境变量是什么.
在启动的时候,`/etc/container_environment`, `my_init`中的变量会存储起来,并且导入到环境变量中,例如一下的格式:
* `/etc/container_environment`
* `/etc/container_environment.sh`- 一个bash存储的环境变量格式.你可以从这个命令中得到base格式的文件.
* `/etc/container_environment.json` - 一个json格式存储的环境变量格式.
多种格式可以让你不管采用什么语言/apps都可以很容易使用环境变量.
这里有个例子,展示怎么使用:
$ docker run -t -i \
--env FOO=bar --env HELLO='my beautiful world' \
phusion/baseimage:<VERSION> /sbin/my_init -- \
bash -l
...
*** Running bash -l...
# ls /etc/container_environment
FOO HELLO HOME HOSTNAME PATH TERM container
# cat /etc/container_environment/HELLO; echo
my beautiful world
# cat /etc/container_environment.json; echo
{"TERM": "xterm", "container": "lxc", "HOSTNAME": "f45449f06950", "HOME": "/root", "PATH": "/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "FOO": "bar", "HELLO": "my beautiful world"}
# source /etc/container_environment.sh
# echo $HELLO
my beautiful world
<a name="modifying_envvars"></a>
#### 修改环境变量
通过修改`/etc/container_environment`这个文件,很有可能修改了`my_init`中的环境变量.之后,每次`my_init`启动[启动脚本](#running_startup_scripts),就会重置掉我们自己`/etc/container_environment`中的环境变量,也就会导致`container_environment.sh``container_environment.json`重新存储.
但是记住这些:
* 修改`container_environment.sh``container_environment.json`是没有效果的.
* Runit 的服务是不能像这样修改环境变量的.`my_init`运行的时候,只对`/etc/container_environment`中的修改是生效的.
<a name="envvar_security"></a>
#### 安全
因为环境变量可能包含敏感信息, `/etc/container_environment`和它的bash文件和JSON文件,默认都是root,都是可以被`docker_env`群组可以访问的(所以任何用户只要添加到群组中,都可以自动的获取这些信息).
如果你确定你的环境变量中没有什么敏感信息,那么你可以放松管理权限,将文件夹和文件分配下面的权限:
RUN chmod 755 /etc/container_environment
RUN chmod 644 /etc/container_environment.sh /etc/container_environment.json
<a name="workaroud_modifying_etc_hosts"></a>
### 解决Docker没有办法解决的/etc/hosts的问题
当前是没有办法在docker容器中修改`/etc/hosts`,这个是因为[Docker bug 2267](https://github.com/dotcloud/docker/issues/2267).Baseimage-docker包含了解决这个问题的办法,你必须明白是怎么修改的.
修改的办法包含在系统库中的` libnss_files.so.2`文件,这个文件使用`/etc/workaround-docker-2267/hosts`来代替系统使用`/etc/hosts`.如果需要修改`/etc/hosts`,你只要修改`/etc/workaround-docker-2267/hosts`就可以了.
增加这个修改到你的Dockerfile.下面的命令修改了文件`libnss_files.so.2`.
RUN /usr/bin/workaround-docker-2267
(其实你不用在Dockerfile文件中运行这个命令,你可以在容器中运行一个shell就可以了.)
验证一下它是否生效了,[在你的容器中打开一个shell](#inspecting),修改`/etc/workaround-docker-2267/hosts`,检查一下是否生效了:
bash# echo 127.0.0.1 my-test-domain.com >> /etc/workaround-docker-2267/hosts
bash# ping my-test-domain.com
...should ping 127.0.0.1...
**注意apt-get升级:** 如果Ubuntu升级,就有可能将`libnss_files.so.2`覆盖掉,那么修改就会失效.你必须重新运行`/usr/bin/workaround-docker-2267`.为了安全一点,你应该在运行`apt-get upgrade`之后,运行一下这个命令.
<a name="disabling_ssh"></a>
### 禁用SSH
Baseimage-docker默认是支持SSH的,所以可以[使用SSH](#login_ssh)来[管理你的容器](#container_administration).万一你不想支持SSH,你只要禁用它就可以:
RUN rm -rf /etc/service/sshd /etc/my_init.d/00_regen_ssh_host_keys.sh
<a name="container_administration"></a>
## 容器管理
一个优秀的docker想法,就是docker是一个无状态的,容易启动的容器,就想一个黑盒子.然而,你可能遇到某种情况,需要登录到容器,或者运行命令在容器中.或者为了开发,需要查看或者debug的目的.这章就给你讲解怎么管理容器.
<a name="oneshot"></a>
### 在一个新容器中运行一个一闪而过的命令
_**备注:** 这章讲解怎么在一个-新-容器中运行命令.要在一个存在的容器中运行命令,请查看[在一个存在的容器中,运行一个命令](#run_inside_existing_container)._
正常情况下,当你创建了一个新容器,为了在容器中运行一个单独的命令,而且在运行之后会立即退出的,你会这样调用docker命令:
docker run YOUR_IMAGE COMMAND ARGUMENTS...
然而下面的方法初始化系统的进行是不会启动.它是这样的,当调用`COMMAND`的时候,重要的后台进程,例如定时任务和系统日志都是不运行的.同样,子进程也是不会出现的,因为`COMMAND`的pid是1.
Baseimage-docker提供了一个灵活的方式运行只要一闪而过的命令,同时也解决了上述所说的问题.以一下的方式运行一条命令:
docker run YOUR_IMAGE /sbin/my_init -- COMMAND ARGUMENTS ...
他们会按照下面的流程执行:
* 运行所有的启动文件,例如 /etc/my_init.d/* and /etc/rc.local.
* 运行所有的runit服务
* 运行指定的命令
* 运行指定的命令结束之后,结束所有runit服务.
例如:
$ docker run phusion/baseimage:<VERSION> /sbin/my_init -- ls
*** Running /etc/my_init.d/00_regen_ssh_host_keys.sh...
No SSH host key available. Generating one...
Creating SSH2 RSA key; this may take some time ...
Creating SSH2 DSA key; this may take some time ...
Creating SSH2 ECDSA key; this may take some time ...
*** Running /etc/rc.local...
*** Booting runit daemon...
*** Runit started as PID 80
*** Running ls...
bin boot dev etc home image lib lib64 media mnt opt proc root run sbin selinux srv sys tmp usr var
*** ls exited with exit code 0.
*** Shutting down runit daemon (PID 80)...
*** Killing all processes...
你会发现默认的启动流程太复杂或者你不希望执行启动文件, 你可以自定义这些参数传递给 `my_init`. 调用`docker run YOUR_IMAGE /sbin/my_init --help`可以看到帮助信息.
例如上面运行`ls`命令,同时要求不运行启动脚本,减少信息打印,运行runit所有命令.
$ docker run phusion/baseimage:<VERSION> /sbin/my_init --skip-startup-files --quiet -- ls
bin boot dev etc home image lib lib64 media mnt opt proc root run sbin selinux srv sys tmp usr var
<a name="run_inside_existing_container"></a>
### 在一个已经运行的容器中,运行一条命令
这里有两种办法, 在一个已经运行的容器内执行命令.
* 通过`nseneter`工具. 这个工具用于Linux内核调用在内嵌容器中运行命令. 可以查看[通过`nsenter`,登录容器或者在容器内执行命令](#login_nsenter).
* 通过SSH.这种办法需要在容器中运行ssh服务,而且需要你创建自己的sshkey. 可以查看[通过`ssh`,登录容器或者在容器内执行命令](#login_ssh).
两种方法都是他们各自的优点和确定, 你可以学习他们各自的章节来了解他们.
<a name="login_nsenter"></a>
### 通过`nsenter`,登录容器或者在容器内执行命令
你可以使用在docker主机上面的`nsenter`工具,来登录任何基于baseimage-docker的docker容器.你可以使用它在你的容器中运行命令.
这里有个和[通过`ssh`,登录容器或者在容器内执行命令](#login_ssh)的优缺点的比较:
* 优点
* 不需要在容器中运行ssh服务.
* 不需要ssh key.
* 运行在任何容器上,甚至不是基于baseimage-docker的容器.
* 缺点
* 通过`nsenter`运行的进程会和正常运行稍微有不同.例如,他们不同结束掉在容器中正常运行的进程.这适用于所有的子进程.
* 如果`nsenter`进程被其他命令(如`kill`命令)给终止,然后由nsenter所执行的命令,是*不会*被结束的.你将不得不手动清理.(备注:终端控制命令像Ctrl-C ** 清理所有的子进程,因为终端信号被发送到所有流程的终端会话)
* 需要学习新工具.
* 需要在docker主机上面提供root权限.
* 需要在docker主机上面是可用的.在写这篇文字的时候(2014年7月),大多数linux发行版没有加载它.然而,baseimage-docker提供了预编译的二进制文件,允许你通过[docker-bash](#docker_bash)工具,来很容易的使用它.
* 不可能没有登录到docker主机,就登录到docker容器中.(也就是说,你必须登录到docker主机,通过docker主机登录到容器.)
<a name="nsenter_usage"></a>
#### 用例
第一,确定`nsenter`已经安装了.在写这篇文字的时候(2014年7月),大多数linux发行版没有加载它.然而,baseimage-docker提供了预编译的二进制文件,允许你通过[docker-bash](#docker_bash)工具,让任何人都可以使用.
接着,启动一个容器.
docker run YOUR_IMAGE
找出你刚才运行容器的`ID`.
docker ps
一旦得到容器的id, 找到运行容器的主进程`PID`.
docker inspect -f "{{ .State.Pid }}" <ID>
现在你已得到容器的主进程PID, 就可以使用`nsenter`来登录容器, 或者在容器中执行命令:
# 登录容器
nsenter --target <MAIN PROCESS PID> --mount --uts --ipc --net --pid bash -l
# 在容器中执行命令
nsenter --target <MAIN PROCESS PID> --mount --uts --ipc --net --pid -- echo hello world
<a name="docker_bash"></a>
#### `docker-bash`工具
目前(2017-03-31), 英文文档没有发现这个命令
查找一个容器的主要进程的PID和输入这么长的nsenter命令很快会变得乏味无比.幸运的是,我们提供了一个`docker-bash` 工具,它可以自动完成只要的工具.这个工具是运行在*docker主机*上面,不是在docker容器中.
该工具还附带了一个预编译的二进制`nsenter`,这样你不需要自己安装`nsenter`了.`docker-bash`是很简单的使用的.
首先,在docker主机上安装这个工具:
curl --fail -L -O https://github.com/phusion/baseimage-docker/archive/master.tar.gz && \
tar xzf master.tar.gz && \
sudo ./baseimage-docker-master/install-tools.sh
运行这个工具登录到容器中:
docker-bash YOUR-CONTAINER-ID
你可以通过`docker ps`来查找你的容器ID.
默认,`docker-bash`会打开一个bash 回话.你可以告诉运行什么命令,之后就会自动退出:
docker-bash YOUR-CONTAINER-ID echo hello world
<a name="login_ssh"></a>
### 通过`ssh`,登录容器或者在容器内执行命令
你可以使用ssh来登录任何基于baseimage-docker的容器.你可以使用它在容器中执行命令.
这里有个和[通过`nsenter`,登录容器或者在容器内执行命令](#login_nsenter)的优缺点的比较:
* 优点
* 不像`nsenter`一样,运行在docker主机上面.几乎每个人都会安装一个ssh客户端.
* 不想使用`nsenter`,运行的进程和正在的进程会不一样.
* 不需要docker主机提供root权限.
* 运行你让用户登录到容器,而不需要登录到docker主机.然而,默认这是不启用的,因为baseimage-docker默认不是开放ssh服务的.
* 缺点
* 需要设置ssh key.然而,baseimage-docker会提供一种方法,会让key的生成变得很容易.阅读更多信息.
第一件事情,就是你需要确定你在容器中已经安装设置了ssh key. 默认是不安装任何key的,所以任何人都无法登录.为了方便的原因,我们提供了一个[已经生成的key](https://github.com/phusion/baseimage-docker/blob/master/image/services/sshd/keys/insecure_key) [(PuTTY format)](https://github.com/phusion/baseimage-docker/blob/master/image/services/sshd/keys/insecure_key.ppk),为了让你使用方便.然后,请注意这个key仅仅是为方便.他没有任何安全性,因为它的key是在网络上提供的.**在生产环境,你必须使用你自己的key.**
<a name="using_the_insecure_key_for_one_container_only"></a>
#### 在容器中使用key
你可以临时的使用key仅仅作为容器使用.这就以为这key是安装在容器上的.如果你使用`docker stop``docker start`控制容器,那么key是在容器中,但是如果你使用`docker run`开启一个新容器,那么这个容器是不包含key的.
启动新容器包含key`--enable-insecure-key`:
docker run YOUR_IMAGE /sbin/my_init --enable-insecure-key
找出你的刚才运行的容器的ID:
docker ps
一旦你得到容器的ID,就能找到容器使用的IP地址:
docker inspect -f "{{ .NetworkSettings.IPAddress }}" <ID>
译者注: 类似 `"{{ .NetworkSettings.IPAddress }}"` 是用到了 [Go的模板语法](https://gohugo.io/templates/go-templates/).
现在你得到了IP地址, 你就可以通过SSH来登录容器,或者在容器中执行命令了:
# 下载key
curl -o insecure_key -fSL https://github.com/phusion/baseimage-docker/raw/master/image/services/sshd/keys/insecure_key
chmod 600 insecure_key
# 登录容器
ssh -i insecure_key root@<IP address>
# 在容器中执行命令
ssh -i insecure_key root@<IP address> echo hello world
<a name="enabling_the_insecure_key_permanently"></a>
#### 支持一个长久的key
在一个长久存在的镜像中支持一个key是很可能的.一般是不推荐这么做,但是对于临时开始或者做demo演示,对安全要求不高,还是很合适的.
编辑你的dockerfile,来安装永久的key:
RUN /usr/sbin/enable_insecure_key
在容器中怎么使用,同[在容器中使用key](#using_the_insecure_key_for_one_container_only)的章节说的一样.
<a name="using_your_own_key"></a>
#### 使用你自己的key
编辑你的dockerfile,来安装ssh public key:
## 安装你自己的public key.
COPY your_key.pub /tmp/your_key.pub
RUN cat /tmp/your_key.pub >> /root/.ssh/authorized_keys && rm -f /tmp/your_key.pub
重新创建你的镜像.一旦你创建成功,启动基于这个镜像的容器.
docker run your-image-name
找出你的刚才运行的容器的ID:
docker ps
一旦你拥有容器的ID,就能找到容器使用的IP地址:
docker inspect -f "{{ .NetworkSettings.IPAddress }}" <ID>
现在你有得了IP地址,你就可以通过SSH来登录容器,或者在容器中执行命令了:
# 登录容器
ssh -i /path-to/your_key root@<IP address>
# 在容器中执行命令
ssh -i /path-to/your_key root@<IP address> echo hello world
<a name="docker_ssh"></a>
#### `docker-ssh`工具
找到容器的IP,运行ssh命令,很快会变得乏味无聊.幸运的是,我们提供了一个`docker-ssh`,可以自动完成这些事情.这个工具是运行在*Docker 主机*上的,不是安装在docker容器中的.
首先,在docker主机上面安装这个工具.
curl --fail -L -O https://github.com/phusion/baseimage-docker/archive/master.tar.gz && \
tar xzf master.tar.gz && \
sudo ./baseimage-docker-master/install-tools.sh
使用这个工具通过ssh登录容器:
docker-ssh YOUR-CONTAINER-ID
你可以使用`docker ps`找到`YOUR-CONTAINER-ID`.
默认,`docker-bash`会打开一个bash 回话.你可以告诉运行什么命令,之后就会自动退出:
docker-ssh YOUR-CONTAINER-ID echo hello world
<a name="building"></a>
## 创建你自己的镜像
如果某些原因,你需要创建你自己的镜像,来替代从docker仓库下载镜像,可以按照的说明.
克隆仓库:
git clone https://github.com/phusion/baseimage-docker.git
cd baseimage-docker
创建一个包含docker在内的虚拟机.你可以使用我们提供的Vagrantfile.
vagrant up
vagrant ssh
cd /vagrant
编译镜像:
make build
如果你想修改镜像的名称, 通过`NAME`变量可以设置:
make build NAME=joe/baseimage
<a name="conclusion"></a>
## 总结
* Using baseimage-docker? [Tweet about us](https://twitter.com/share) or [follow us on Twitter](https://twitter.com/phusion_nl).
* Having problems? Want to participate in development? Please post a message at [the discussion forum](https://groups.google.com/d/forum/passenger-docker).
* Looking for a more complete base image, one that is ideal for Ruby, Python, Node.js and Meteor web apps? Take a look at [passenger-docker](https://github.com/phusion/passenger-docker).
[<img src="http://www.phusion.nl/assets/logo.png">](http://www.phusion.nl/)
Please enjoy baseimage-docker, a product by [Phusion](http://www.phusion.nl/). :-)

View File

@@ -1,567 +0,0 @@
<a name="a-minimal-ubuntu-base-image-modified-for-docker-friendliness"></a>
# Docker友好的最小的Ubuntu基礎鏡像
Baseimage-docker是一個特殊的[Docker](http://www.docker.io)鏡像在Docker容器內做了配置並且可以正確使用。它確實是一個Ubuntu系統, 除此之外進行了如下修訂:
* 爲更加友好的支持Docker做了修訂。
* 在Docker環境下作爲管理工具特別有用。
* 在[不違反Docker哲學](#docker_single_process)的前提下,能夠很容易的運行多行程的機制。
可以把它作爲自己的基礎Docker鏡像。
Baseimage-docker項目可以直接從Docker的[registry](https://index.docker.io/u/phusion/baseimage/)獲取!
<a name="what-are-the-problems-with-the-stock-ubuntu-base-image"></a>
### 原生的Ubuntu基礎鏡像有什麼問題呢
原生Ubuntu不是爲了在Docker內運行而設計的。它的初始化系統Upstart假定運行的環境要麼是真實的硬體要麼是虛擬的硬體而不是在Docker容器內。但是在一個Docker的容器內並不需要一個完整的系統你需要的只是一個很小的系統。但是如果你不是非常熟悉Unix的系統模型想要在Docker容器內裁減出最小的系統會碰到很多難以正確解決的陌生的技術坑。這些坑會引起很多莫名其妙的問題。
Baseimage-docker讓這一切完美。在"內容"部分描述了所有這些修改。
<a name="why-use-baseimage-docker"></a>
### 爲什麼使用baseimage-docker
你自己可以從Dockerfile配置一個原生`ubuntu`鏡像爲什麼還要多此一舉的使用baseimage-docker呢?
* 配置一個Docker友好的基礎系統並不是一個簡單的任務。如前所述過程中會碰到很多坑。當你搞定這些坑之後只不過是又重新發明了一個baseimage-docker而已。使用baseimage-docker可以免去你這方面需要做的努力。
* 減少需要正確編寫Dockerfile文件的時間。你不用再擔心基礎系統可以專注於你自己的技術棧和你的項目。
* 減少需要運行`docker build`的時間讓你更快的迭代Dockerfile。
* 減少了重新部署的時的下載時間。Docker只需要在第一次部署的時候下載一次基礎鏡像。在隨後的部署中,只需要改變你下載之後對基礎鏡像進行修改的部分。
-----------------------------------------
**相關資源**
[網站](http://phusion.github.io/baseimage-docker/) |
[Github](https://github.com/phusion/baseimage-docker) |
[Docker registry](https://index.docker.io/u/phusion/baseimage/) |
[論壇](https://groups.google.com/d/forum/passenger-docker) |
[Twitter](https://twitter.com/phusion_nl) |
[Blog](http://blog.phusion.nl/)
**目錄**
* [鏡像裏面有什麼?](#whats_inside)
* [概述](#whats_inside_overview)
* [等等,我認爲Docker在一個容器中只能允許運行一個行程?](#docker_single_process)
* [Baseimage-docker更側重於“胖容器”還是“把容器當作虛擬機”](#fat_containers)
* [查看baseimage-docker](#inspecting)
* [使用baseimage-docker作爲基礎鏡像](#using)
* [開始](#getting_started)
* [增加額外的後臺行程](#adding_additional_daemons)
* [容器啓動時運行腳本](#running_startup_scripts)
* [環境變數](#environment_variables)
* [集中定義自己的環境變數](#envvar_central_definition)
* [保存環境變數](#envvar_dumps)
* [修改環境變數](#modifying_envvars)
* [安全性](#envvar_security)
* [容器管理](#container_administration)
* [在一個新容器中運行單條命令](#oneshot)
* [在正在運行的的容器中運行一條命令](#run_inside_existing_container)
* [通過`docer exec`登錄容器](#login_docker_exec)
* [用法](#nsenter_usage)
* [使用SSH登錄容器](#login_ssh)
* [啓用SSH](#enabling_ssh)
* [關於SSH的key](#ssh_keys)
* [只對一個容器使用不安全key](#using_insecure_key_for_one_container_only)
* [永久開啓不安全key](#enabling_the_insecure_key_permanently)
* [使用你自己的key](#using_your_own_key)
* [`docker-ssh`工具](#docker_ssh)
* [構建自己的鏡像](#building)
* [總結](#conclusion)
-----------------------------------------
<a name="whats_inside"></a>
## 鏡像裏面有什麼?
<a name="whats_inside_overview"></a>
### 概述
*想看一個裏面包含RubyPythonNode.js以及Meteor的完整基礎鏡像可以看一下[passenger-docker](https://github.com/phusion/passenger-docker)。*
| 模塊 | 爲什麼包含這些?以及備註 |
| ---------------- | ------------------- |
| Ubuntu 16.04 LTS | 基礎系統。 |
| 一個**正確**的初始化行程 | *主要文章:[Docker和PID 1 殭屍行程回收問題](http://blog.phusion.nl/2015/01/20/docker-and-the-pid-1-zombie-reaping-problem/)*<br/><br/>根據Unix行程模型[初始化行程](https://en.wikipedia.org/wiki/Init) -- PID 1 -- 繼承了所有[孤立的子行程](https://en.wikipedia.org/wiki/Orphan_process),並且必須[進行回收](https://en.wikipedia.org/wiki/Wait_(system_call))。大多數Docker容器沒有一個初始化行程可以正確的完成此操作隨着時間的推移會導致他們的容器出現了大量的[殭屍行程](https://en.wikipedia.org/wiki/Zombie_process)。<br/><br/>而且,`docker stop`發送SIGTERM信號給初始化行程照理說此信號應該可以停止所有服務。不幸的是由於它們對硬體進行了關閉操作導致Docker內的大多數初始化系統沒有正確執行。這會導致行程強行被SIGKILL信號關閉從而喪失了一個正確取消初始化設置的機會。這會導致文件損壞。<br/><br/>Baseimage-docker配有一個名爲`/sbin/my_init`的初始化行程來同時正確的完成這些任務。 |
| 修復了APT與Docker不兼容的問題 | 詳情參見https://github.com/dotcloud/docker/issues/1024 。 |
| syslog-ng | 對於很多服務包括kernel自身都需要一個syslog後臺行程以便可以正確的將log輸出到/var/log/syslog中。如果沒有運行syslog後臺行程很多重要的信息就會默默的丟失了。<br/><br/>只對本地進行監聽。所有syslog信息會被轉發給“docker logs”。 |
| logrotate | 定期轉存和壓縮日誌。 |
| SSH服務 | 允許你很容易的登錄到容器中進行[查詢或管理](#login_ssh)操作。<br/><br/>_SSH**默認是禁用**的這也是baseimage-docker爲此目的提供的唯一方法。其它方法需要通過[docker exec](#login_docker_exec)。由於`docker exec`同時帶來了幾個需要注意的問題SSH同時也提供了一個可替換的方法。_<br/><br/>密碼和challenge-response認證方式默認是禁用的。只有key認證通過之後才能夠開啓。 |
| cron | 爲了保證cron任務能夠工作必須運行cron後臺行程。 |
| [runit](http://smarden.org/runit/) | 替換Ubuntu的Upstart。用於服務監控和管理。比SysV init更容易使用同時當這些服務崩潰之後支持後臺行程自動重啓。比Upstart更易使用更加的輕量級。 |
| `setuser` | 使用其它賬戶運行命令的工具。比`su`更容易使用,比使用`sudo`有那麼一點優勢,跟`chpst`不同,這個工具需要正確的設置`$HOME`。像`/sbin/setuser`這樣。 |
Baseimage-docker非常的輕量級僅僅佔用6MB內存。
<a name="docker_single_process"></a>
### 等等,我認爲Docker在一個容器中就運行一個行程嗎?
絕對不是這樣的. 在一個docker容器中,運行多個行程也是很好的. 事實上,沒有什麼技術原因限制你只運行一個行程,運行很多的行程,只會把容器中系統的基本功能搞的更亂,比如syslog.
Baseimage-docker *鼓勵* 通過runit來運行多行程.
<a name="inspecting"></a>
## 檢測一下baseimage-docker
要檢測鏡像,執行下面的命令:
docker run --rm -t -i phusion/baseimage:<VERSION> /sbin/my_init -- bash -l
`<VERSION>` 是[baseimage-docker的版本號](https://github.com/phusion/baseimage-docker/blob/master/Changelog.md).
你不用手動去下載任何文件.上面的命令會自動從docker倉庫下載baseimage-docker鏡像.
<a name="using"></a>
## 使用baseimage-docker作爲基礎鏡像
<a name="getting_started"></a>
### 入門指南
The image is called `phusion/baseimage`, and is available on the Docker registry.
鏡像名字叫`phusion/baseimage`,在Docker倉庫上也是可用的.
下面的這個是一個Dockerfile的模板.
# 使用phusion/baseimage作爲基礎鏡像,去構建你自己的鏡像,需要下載一個明確的版本,千萬不要使用`latest`.
# 查看https://github.com/phusion/baseimage-docker/blob/master/Changelog.md,可用看到版本的列表.
FROM phusion/baseimage:<VERSION>
# 設置正確的環境變數.
ENV HOME /root
# 生成SSH keys,baseimage-docker不包含任何的key,所以需要你自己生成.你也可以註釋掉這句命令,系統在啓動過程中,會生成一個.
RUN /etc/my_init.d/00_regen_ssh_host_keys.sh
# 初始化baseimage-docker系統
CMD ["/sbin/my_init"]
# 這裏可以放置你自己需要構建的命令
# 當完成後,清除APT.
RUN apt-get clean && rm -rf /var/lib/apt/lists/* /tmp/* /var/tmp/*
<a name="adding_additional_daemons"></a>
### 增加後臺行程
你可以通過runit工具向你的鏡像中添加後臺行程(例如:你自己的某些應用).你需要編寫一個運行你需要的後臺行程的腳本就可以了,runit工具會保證它的正常運行,如果行程死掉,runit也會重啓它的.
腳本的名稱必須是`run`,必須是可以運行的,它需要放到`/etc/service/<NAME>`.
這裏有一個例子,向你展示如果運行memcached服務的.
### memcached.sh(確定文件的權限是chmod +x):
#!/bin/sh
# `/sbin/setuser memcache` 指定一個`memcache`用戶來運行命令.如果你忽略了這部分,就會使用root用戶執行.
exec /sbin/setuser memcache /usr/bin/memcached >>/var/log/memcached.log 2>&1
### 在Dockerfile中:
RUN mkdir /etc/service/memcached
COPY memcached.sh /etc/service/memcached/run
注意腳本必須運行在後臺的,**不能讓他們行程進行daemonize/fork**.通常,後臺行程會提供一個標誌位或者配置文件.
<a name="running_startup_scripts"></a>
### 在容器啓動的時候,運行腳本.
baseimage-docker的初始化腳本 `/sbin/my_init`,在啓動的時候行程運行,按照下面的順序:
* 如果`/etc/my_init.d`存在,則按照字母順序執行腳本.
* 如果`/etc/rc.local`存在,則執行裏面的腳本.
所有的腳本都是正確退出的,例如:退出的code是0.如果有任何腳本以非0的code退出,啓動就會失敗.
下面的例子向你展示了怎麼添加一個啓動腳本.這個腳本很簡單的記錄的一個系統啓動時間,將啓動時間記錄到/tmp/boottime.txt.
### 在 logtime.sh (文件權限chmod +x):
#!/bin/sh
date > /tmp/boottime.txt
### 在 Dockerfile中:
RUN mkdir -p /etc/my_init.d
COPY logtime.sh /etc/my_init.d/logtime.sh
<a name="environment_variables"></a>
### 環境變數
如果你使用`/sbin/my_init`作爲主容器命令,那麼通過`docker run --env`或者在Dockerfile文件中設置的`ENV`環境變數,都會被`my_init`讀取.
* 在Unix系統中,環境變數都會被子行程給繼承.這就意味着,子行程不可能修改環境變數或者修改其他行程的環境變數.
* 由於上面提到的一點,這裏沒有一個可以爲所有應用和服務集中定義環境的地方.Debian提供了一個`/etc/environment` 文件,解決一些問題.
* 某些服務更改環境變數是爲了給子行程使用.Nginx有這樣的一個例子:它移除了所有的環境變數,除非你通過`env`進行了配置,明確了某些是保留的.如果你部署了任何應用在Nginx鏡像(例如:使用[passenger-docker](https://github.com/phusion/passenger-docker)鏡像或者使用Phusion Passenger作爲你的鏡像.),那麼你通過Docker,你不會看到任何環境變數.
`my_init`提供了一個辦法來解決這些問題.
<a name="envvar_central_definition"></a>
#### 集中定義你的環境變數
在啓動的時候,在執行[startup scripts](#running_startup_scripts),`my_init`會從`/etc/container_environment`導入環境變數.這個文件夾下面,包含的文件,文件被命名爲環境變數的名字.文件內容就是環境變數的值.這個文件夾是因此是一個集中定義你的環境變數的好地方,它會繼承到所有啓動項目和Runit管理的服務中.
給個例子,在你的dockerfile如何定義一個環境變數:
RUN echo Apachai Hopachai > /etc/container_environment/MY_NAME
你可以按照下面這樣驗證:
$ docker run -t -i <YOUR_NAME_IMAGE> /sbin/my_init -- bash -l
...
*** Running bash -l...
# echo $MY_NAME
Apachai Hopachai
**換行處理**
如果你觀察仔細一點,你會注意到'echo'命令,實際上在它是在新行打印出來的.爲什麼$MY_NAME沒有包含在一行呢? 因爲`my_init`在尾部有個換行字符.如果你打算讓你的值包含一個新行,你需要增*另外*一個新字符,像這樣:
RUN echo -e "Apachai Hopachai\n" > /etc/container_environment/MY_NAME
<a name="envvar_dumps"></a>
#### 環境變數存儲
上面提到集中定義環境變數,它不會從子服務行程改變父服務行程或者重置環境變數.而且,`my_init`也會很容易的讓你查詢到原始的環境變數是什麼.
在啓動的時候,`/etc/container_environment`, `my_init`中的變數會存儲起來,並且導入到環境變數中,例如一下的格式:
* `/etc/container_environment`
* `/etc/container_environment.sh`- 一個bash存儲的環境變數格式.你可以從這個命令中得到base格式的文件.
* `/etc/container_environment.json` - 一個json格式存儲的環境變數格式.
多種格式可以讓你不管採用什麼語言/apps都可以很容易使用環境變數.
這裏有個例子,展示怎麼使用:
$ docker run -t -i \
--env FOO=bar --env HELLO='my beautiful world' \
phusion/baseimage:<VERSION> /sbin/my_init -- \
bash -l
...
*** Running bash -l...
# ls /etc/container_environment
FOO HELLO HOME HOSTNAME PATH TERM container
# cat /etc/container_environment/HELLO; echo
my beautiful world
# cat /etc/container_environment.json; echo
{"TERM": "xterm", "container": "lxc", "HOSTNAME": "f45449f06950", "HOME": "/root", "PATH": "/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin", "FOO": "bar", "HELLO": "my beautiful world"}
# source /etc/container_environment.sh
# echo $HELLO
my beautiful world
<a name="modifying_envvars"></a>
#### 修改環境變數
通過修改`/etc/container_environment`這個文件,很有可能修改了`my_init`中的環境變數.之後,每次`my_init`啓動[啓動腳本](#running_startup_scripts),就會重置掉我們自己`/etc/container_environment`中的環境變數,也就會導致`container_environment.sh``container_environment.json`重新存儲.
但是記住這些:
* 修改`container_environment.sh``container_environment.json`是沒有效果的.
* Runit 的服務是不能像這樣修改環境變數的.`my_init`運行的時候,只對`/etc/container_environment`中的修改是生效的.
<a name="envvar_security"></a>
#### 安全
因爲環境變數可能包含敏感信息, `/etc/container_environment`和它的bash文件和JSON文件,默認都是root,都是可以被`docker_env`羣組可以訪問的(所以任何用戶只要添加到羣組中,都可以自動的獲取這些信息).
如果你確定你的環境變數中沒有什麼敏感信息,那麼你可以放鬆管理權限,將文件夾和文件分配下面的權限:
RUN chmod 755 /etc/container_environment
RUN chmod 644 /etc/container_environment.sh /etc/container_environment.json
<a name="workaroud_modifying_etc_hosts"></a>
### 解決Docker沒有辦法解決的/etc/hosts的問題
當前是沒有辦法在docker容器中修改`/etc/hosts`,這個是因爲[Docker bug 2267](https://github.com/dotcloud/docker/issues/2267).Baseimage-docker包含了解決這個問題的辦法,你必須明白是怎麼修改的.
修改的辦法包含在系統庫中的` libnss_files.so.2`文件,這個文件使用`/etc/workaround-docker-2267/hosts`來代替系統使用`/etc/hosts`.如果需要修改`/etc/hosts`,你只要修改`/etc/workaround-docker-2267/hosts`就可以了.
增加這個修改到你的Dockerfile.下面的命令修改了文件`libnss_files.so.2`.
RUN /usr/bin/workaround-docker-2267
(其實你不用在Dockerfile文件中運行這個命令,你可以在容器中運行一個shell就可以了.)
驗證一下它是否生效了,[在你的容器中打開一個shell](#inspecting),修改`/etc/workaround-docker-2267/hosts`,檢查一下是否生效了:
bash# echo 127.0.0.1 my-test-domain.com >> /etc/workaround-docker-2267/hosts
bash# ping my-test-domain.com
...should ping 127.0.0.1...
**注意apt-get升級:** 如果Ubuntu升級,就有可能將`libnss_files.so.2`覆蓋掉,那麼修改就會失效.你必須重新運行`/usr/bin/workaround-docker-2267`.爲了安全一點,你應該在運行`apt-get upgrade`之後,運行一下這個命令.
<a name="disabling_ssh"></a>
### 禁用SSH
Baseimage-docker默認是支持SSH的,所以可以[使用SSH](#login_ssh)來[管理你的容器](#container_administration).萬一你不想支持SSH,你可以只要禁用它:
RUN rm -rf /etc/service/sshd /etc/my_init.d/00_regen_ssh_host_keys.sh
<a name="container_administration"></a>
## 容器管理
一個優秀的docker想法,就是docker是一個無狀態的,容易啓動的容器,就想一個黑盒子.然而,你可能遇到某種情況,需要登錄到容器,或者運行命令在容器中.或者爲了開發,需要查看或者debug的目的.這章就給你講解怎麼管理容器.
<a name="oneshot"></a>
### 在一個新容器中運行一個一閃而過的命令
_**備註:** 這章講解怎麼在一個-新-容器中運行命令.要在一個存在的容器中運行命令,請查看[在一個存在的容器中,運行一個命令](#run_inside_existing_container)._
正常情況下,當你創建了一個新容器,爲了在容器中運行一個單獨的命令,而且在運行之後會立即退出的,你會這樣調用docker命令:
docker run YOUR_IMAGE COMMAND ARGUMENTS...
然而下面的方法初始化系統的進行是不會啓動.它是這樣的,當調用`COMMAND`的時候,重要的後臺行程,例如定時任務和系統日誌都是不運行的.同樣,子行程也是不會出現的,因爲`COMMAND`的pid是1.
Baseimage-docker提供了一個靈活的方式運行只要一閃而過的命令,同時也解決了上述所說的問題.以一下的方式運行一條命令:
docker run YOUR_IMAGE /sbin/my_init -- COMMAND ARGUMENTS ...
他們會按照下面的流程執行:
* 運行所有的啓動文件,例如 /etc/my_init.d/* and /etc/rc.local.
* 運行所有的runit服務
* 運行指定的命令
* 運行指定的命令結束之後,結束所有runit服務.
例如:
$ docker run phusion/baseimage:<VERSION> /sbin/my_init -- ls
*** Running /etc/my_init.d/00_regen_ssh_host_keys.sh...
No SSH host key available. Generating one...
Creating SSH2 RSA key; this may take some time ...
Creating SSH2 DSA key; this may take some time ...
Creating SSH2 ECDSA key; this may take some time ...
*** Running /etc/rc.local...
*** Booting runit daemon...
*** Runit started as PID 80
*** Running ls...
bin boot dev etc home image lib lib64 media mnt opt proc root run sbin selinux srv sys tmp usr var
*** ls exited with exit code 0.
*** Shutting down runit daemon (PID 80)...
*** Killing all processes...
你會發現默認的啓動的流程太負責.或者你不希望執行啓動文件.你可以自定義所有通過給`my_init`增加參數.調用`docker run YOUR_IMAGE /sbin/my_init --help`可以看到幫助信息.
例如上面運行`ls`命令,同時要求不運行啓動腳本,減少信息打印,運行runit所有命令.
$ docker run phusion/baseimage:<VERSION> /sbin/my_init --skip-startup-files --quiet -- ls
bin boot dev etc home image lib lib64 media mnt opt proc root run sbin selinux srv sys tmp usr var
<a name="run_inside_existing_container"></a>
### 在一個已經運行的容器中,運行一條命令
這裏有兩種辦法去在一個已經運行的容器中運行命令.
* 通過`nseneter`工具.這個工具用於Linux內核調用在內嵌容器中運行命令.可以查看[通過`nsenter`,登錄容器或者在容器內執行命令](#login_nsenter).
* 通過SSH.這種辦法需要在容器中運行ssh服務,而且需要你創建自己的sshkey.可以查看[通過`ssh`,登錄容器或者在容器內執行命令](#login_ssh).
兩種方法都是他們各自的優點和確定,你可以學習他們各自的章節來了他們.
<a name="login_nsenter"></a>
### 通過`nsenter`,登錄容器或者在容器內執行命令
你可以使用在docker主機上面的`nsenter`工具,來登錄任何基於baseimage-docker的docker容器.你可以使用它在你的容器中運行命令.
這裏有個和[通過`ssh`,登錄容器或者在容器內執行命令](#login_ssh)的優缺點的比較:
* 優點
* 不需要在容器中運行ssh服務.
* 不需要ssh key.
* 運行在任何容器上,甚至不是基於baseimage-docker的容器.
* 缺點
* 通過`nsenter`運行的行程會和正常運行稍微有不同.例如,他們不同結束掉在容器中正常運行的行程.這適用於所有的子行程.
* 如果`nsenter`行程被其他命令(如`kill`命令)給終止,然後由nsenter所執行的命令,是*不會*被結束的.你將不得不手動清理.(備註:終端控制命令像Ctrl-C ** 清理所有的子行程,因爲終端信號被髮送到所有流程的終端會話)
* 需要學習新工具.
* 需要在docker主機上面提供root權限.
* 需要在docker主機上面是可用的.在寫這篇文字的時候(2014年7月),大多數linux發行版沒有加載它.然而,baseimage-docker提供了預編譯的二進制文件,允許你通過[docker-bash](#docker_bash)工具,來很容易的使用它.
* 不可能沒有登錄到docker主機,就登錄到docker容器中.(也就是說,你必須登錄到docker主機,通過docker主機登錄到容器.)
<a name="nsenter_usage"></a>
#### 用例
第一,確定`nsenter`已經安裝了.在寫這篇文字的時候(2014年7月),大多數linux發行版沒有加載它.然而,baseimage-docker提供了預編譯的二進制文件,允許你通過[docker-bash](#docker_bash)工具,讓任何人都可以使用.
接着,啓動一個容器.
docker run YOUR_IMAGE
找出你剛纔運行容器的`ID`.
docker ps
一旦擁有容器的id,找到運行容器的主要行程額`PID`.
docker inspect -f "{{ .State.Pid }}" <ID>
現在你有的容器的主行程的PID,就可以使用`nsenter`來登錄容器,或者在容器裏面執行命令:
# 登錄容器
nsenter --target <MAIN PROCESS PID> --mount --uts --ipc --net --pid bash -l
# 在容器中執行命令
nsenter --target <MAIN PROCESS PID> --mount --uts --ipc --net --pid -- echo hello world
<a name="docker_bash"></a>
#### `docker-bash`工具
查找一個容器的主要行程的PID和輸入這麼長的nsenter命令很快會變得乏味無論.幸運的是,我們提供了一個`docker-bash` 工具,它可以自動完成只要的工具.這個工具是運行在*docker主機*上面,不是在docker容器中.
該工具還附帶了一個預編譯的二進制`nsenter`,這樣你不需要自己安裝`nsenter`了.`docker-bash`是很簡單的使用的.
首先,在docker主機上安裝這個工具:
curl --fail -L -O https://github.com/phusion/baseimage-docker/archive/master.tar.gz && \
tar xzf master.tar.gz && \
sudo ./baseimage-docker-master/install-tools.sh
運行這個工具登錄到容器中:
docker-bash YOUR-CONTAINER-ID
你可以通過`docker ps`來查找你的容器ID.
默認,`docker-bash`會打開一個bash 回話.你可以告訴運行什麼命令,之後就會自動退出:
docker-bash YOUR-CONTAINER-ID echo hello world
<a name="login_ssh"></a>
### 通過`ssh`,登錄容器或者在容器內執行命令
你可以使用ssh來登錄任何基於baseimage-docker的容器.你可以使用它在容器中執行命令.
這裏有個和[通過`nsenter`,登錄容器或者在容器內執行命令](#login_nsenter)的優缺點的比較:
* 優點
* 不像`nsenter`一樣,運行在docker主機上面.幾乎每個人都會安裝一個ssh客戶端.
* 不想使用`nsenter`,運行的行程和正在的行程會不一樣.
* 不需要docker主機提供root權限.
* 運行你讓用戶登錄到容器,而不需要登錄到docker主機.然而,默認這是不啓用的,因爲baseimage-docker默認不是開放ssh服務的.
* 缺點
* 需要設置ssh key.然而,baseimage-docker會提供一中辦法,會讓key的生成會很容易.閱讀更多信息.
第一件事情,就是你需要確定你在容器中已經安裝設置了ssh key. 默認是不安裝任何key的,所以任何人都無法登錄.爲了方便的原因,我們提供了一個[已經生成的key](https://github.com/phusion/baseimage-docker/blob/master/image/services/sshd/keys/insecure_key) [(PuTTY format)](https://github.com/phusion/baseimage-docker/blob/master/image/services/sshd/keys/insecure_key.ppk),爲了讓你使用方便.然後,請注意這個key僅僅是爲方便.他沒有任何安全性,因爲它的key是在網絡上提供的.**在生產環境,你必須使用你自己的key.**
<a name="using_the_insecure_key_for_one_container_only"></a>
#### 在容器中使用key
你可以臨時的使用key僅僅作爲容器使用.這就以爲這key是安裝在容器上的.如果你使用`docker stop``docker start`控制容器,那麼key是在容器中,但是如果你使用`docker run`開啓一個新容器,那麼這個容器是不包含key的.
啓動新容器包含key`--enable-insecure-key`:
docker run YOUR_IMAGE /sbin/my_init --enable-insecure-key
找出你的剛纔運行的容器的ID:
docker ps
一旦你擁有容器的ID,就能找到容器使用的IP地址:
docker inspect -f "{{ .NetworkSettings.IPAddress }}" <ID>
現在你有得了IP地址,你就看通過SSH來登錄容器,或者在容器中執行命令了:
# 下載key
curl -o insecure_key -fSL https://github.com/phusion/baseimage-docker/raw/master/image/services/sshd/keys/insecure_key
chmod 600 insecure_key
# 登錄容器
ssh -i insecure_key root@<IP address>
# 在容器中執行命令
ssh -i insecure_key root@<IP address> echo hello world
<a name="enabling_the_insecure_key_permanently"></a>
#### 支持一個長久的key
在一個長久存在的鏡像中支持一個key是很可能的.一般是不推薦這麼做,但是對於臨時開始或者做demo演示,對安全要求不高,還是很合適的.
編輯你的dockerfile,來安裝永久的key:
RUN /usr/sbin/enable_insecure_key
在容器中怎麼使用,同[在容器中使用key](#using_the_insecure_key_for_one_container_only)的章節說的一樣.
<a name="using_your_own_key"></a>
#### 使用你自己的key
編輯你的dockerfile,來安裝ssh public key:
## 安裝你自己的public key.
COPY your_key.pub /tmp/your_key.pub
RUN cat /tmp/your_key.pub >> /root/.ssh/authorized_keys && rm -f /tmp/your_key.pub
重新創建你的鏡像.一旦你創建成功,啓動基於這個鏡像的容器.
docker run your-image-name
找出你的剛纔運行的容器的ID:
docker ps
一旦你擁有容器的ID,就能找到容器使用的IP地址:
docker inspect -f "{{ .NetworkSettings.IPAddress }}" <ID>
現在你有得了IP地址,你就看通過SSH來登錄容器,或者在容器中執行命令了:
# 登錄容器
ssh -i /path-to/your_key root@<IP address>
# 在容器中執行命令
ssh -i /path-to/your_key root@<IP address> echo hello world
<a name="docker_ssh"></a>
#### `docker-ssh`工具
找到容器的IP,運行ssh命令,很快會變得乏味無聊.幸運的是,我們提供了一個`docker-ssh`,可以自動完成這些事情.這個工具是運行在*Docker 主機*上的,不是安裝在docker容器中的.
首先,在docker主機上面安裝這個工具.
curl --fail -L -O https://github.com/phusion/baseimage-docker/archive/master.tar.gz && \
tar xzf master.tar.gz && \
sudo ./baseimage-docker-master/install-tools.sh
使用這個工具通過ssh登錄容器:
docker-ssh YOUR-CONTAINER-ID
你可以使用`docker ps`找到`YOUR-CONTAINER-ID`.
默認,`docker-bash`會打開一個bash 回話.你可以告訴運行什麼命令,之後就會自動退出:
docker-ssh YOUR-CONTAINER-ID echo hello world
<a name="building"></a>
## 創建你自己的鏡像
如果某些原因,你需要創建你自己的鏡像,來替代從docker倉庫下載鏡像,可以按照的說明.
克隆倉庫:
git clone https://github.com/phusion/baseimage-docker.git
cd baseimage-docker
創建一個包含docker在的虛擬機.你可以使用我們提供的Vagrantfile.
vagrant up
vagrant ssh
cd /vagrant
編譯鏡像:
make build
如果你想把創建的鏡像名字,叫其他名字,通過`NAME`變數可以設置:
make build NAME=joe/baseimage
<a name="conclusion"></a>
## 總結
* Using baseimage-docker? [Tweet about us](https://twitter.com/share) or [follow us on Twitter](https://twitter.com/phusion_nl).
* Having problems? Want to participate in development? Please post a message at [the discussion forum](https://groups.google.com/d/forum/passenger-docker).
* Looking for a more complete base image, one that is ideal for Ruby, Python, Node.js and Meteor web apps? Take a look at [passenger-docker](https://github.com/phusion/passenger-docker).
[<img src="http://www.phusion.nl/assets/logo.png">](http://www.phusion.nl/)
Please enjoy baseimage-docker, a product by [Phusion](http://www.phusion.nl/). :-)

22
build-multiarch.sh Executable file
View File

@@ -0,0 +1,22 @@
#!/bin/bash
set -e
set -x
for arch in $ARCHS; do
docker pull $NAME:$VERSION-${arch}
if [[ $TAG_LATEST != 'true' ]]; then
docker manifest create --amend $NAME:$VERSION $NAME:$VERSION-${arch}
docker manifest annotate $NAME:$VERSION $NAME:$VERSION-${arch} --arch ${arch}
else
docker manifest create --amend $NAME:latest $NAME:$VERSION-${arch}
docker manifest annotate $NAME:latest $NAME:$VERSION-${arch} --arch ${arch}
fi
done
echo "Push manifests"
if [[ $TAG_LATEST != 'true' ]]; then
docker manifest push $NAME:$VERSION
else
docker manifest push $NAME:latest
fi

19
build.sh Executable file
View File

@@ -0,0 +1,19 @@
#!/bin/bash
set -e
# # Prepare qemu
# if [ '$QEMU_ARCH' != 'amd64' ]; then
# # docker run --rm --privileged multiarch/qemu-user-static:register --reset
# fi
# Get qemu package
echo "Getting qemu package for $QEMU_ARCH"
# Fake qemu for amd64 builds to avoid breaking COPY in Dockerfile
if [ $QEMU_ARCH == 'amd64' ]; then
touch x86_64_qemu-"$QEMU_ARCH"-static.tar.gz
mv x86_64_qemu-${QEMU_ARCH}-static.tar.gz image
else
curl -L -o x86_64_qemu-"$QEMU_ARCH"-static.tar.gz https://github.com/multiarch/qemu-user-static/releases/download/"$QEMU_VERSION"/x86_64_qemu-"$QEMU_ARCH"-static.tar.gz
mv x86_64_qemu-${QEMU_ARCH}-static.tar.gz image
fi

View File

@@ -1,5 +1,9 @@
FROM ubuntu:16.04
MAINTAINER Phusion <info@phusion.nl>
ARG BASE_IMAGE=ubuntu:18.04
FROM $BASE_IMAGE
MAINTAINER Iwan <iwanpub.phusion_fr@mg.familleclement.space>
ARG QEMU_ARCH
ADD x86_64_qemu-${QEMU_ARCH}-static.tar.gz /usr/bin
COPY . /bd_build
@@ -9,8 +13,8 @@ RUN /bd_build/prepare.sh && \
/bd_build/cleanup.sh
ENV DEBIAN_FRONTEND="teletype" \
LANG="en_US.UTF-8" \
LANGUAGE="en_US:en" \
LC_ALL="en_US.UTF-8"
LANG="fr_FR.UTF-8" \
LANGUAGE="fr_FR:fr" \
LC_ALL="fr_FR.UTF-8"
CMD ["/sbin/my_init"]

View File

@@ -14,8 +14,8 @@ import time
ENV_INIT_DIRECTORY = os.environ.get('ENV_INIT_DIRECTORY', '/etc/my_init.d')
KILL_PROCESS_TIMEOUT = int(os.environ.get('KILL_PROCESS_TIMEOUT', 5))
KILL_ALL_PROCESSES_TIMEOUT = int(os.environ.get('KILL_ALL_PROCESSES_TIMEOUT', 5))
KILL_PROCESS_TIMEOUT = int(os.environ.get('KILL_PROCESS_TIMEOUT', 30))
KILL_ALL_PROCESSES_TIMEOUT = int(os.environ.get('KILL_ALL_PROCESSES_TIMEOUT', 30))
LOG_LEVEL_ERROR = 1
LOG_LEVEL_WARN = 1
@@ -296,17 +296,14 @@ def start_runit():
def wait_for_runit_or_interrupt(pid):
try:
status = waitpid_reap_other_children(pid)
return (True, status)
except KeyboardInterrupt:
return (False, None)
status = waitpid_reap_other_children(pid)
return (True, status)
def shutdown_runit_services(quiet=False):
if not quiet:
debug("Begin shutting down runit services...")
os.system("/usr/bin/sv -w %d down /etc/service/* > /dev/null" % KILL_PROCESS_TIMEOUT)
os.system("/usr/bin/sv -w %d force-stop /etc/service/* > /dev/null" % KILL_PROCESS_TIMEOUT)
def wait_for_runit_services():

View File

@@ -8,4 +8,8 @@ find /bd_build/ -not \( -name 'bd_build' -or -name 'buildconfig' -or -name 'clea
rm -rf /tmp/* /var/tmp/*
rm -rf /var/lib/apt/lists/*
# clean up python bytecode
find / -mount -name *.pyc -delete
find / -mount -name *__pycache__* -delete
rm -f /etc/ssh/ssh_host_*

View File

@@ -41,8 +41,17 @@ $minimal_apt_get_install software-properties-common
apt-get dist-upgrade -y --no-install-recommends -o Dpkg::Options::="--force-confold"
## Fix locale.
$minimal_apt_get_install language-pack-en
locale-gen en_US
update-locale LANG=en_US.UTF-8 LC_CTYPE=en_US.UTF-8
echo -n en_US.UTF-8 > /etc/container_environment/LANG
echo -n en_US.UTF-8 > /etc/container_environment/LC_CTYPE
case $(lsb_release -is) in
Ubuntu)
$minimal_apt_get_install language-pack-en language-pack-fr
;;
Debian)
$minimal_apt_get_install locales locales-all
;;
*)
;;
esac
locale-gen fr_FR
update-locale LANG=fr_FR.UTF-8 LC_CTYPE=fr_FR.UTF-8
echo -n fr_FR.UTF-8 > /etc/container_environment/LANG
echo -n fr_FR.UTF-8 > /etc/container_environment/LC_CTYPE

View File

@@ -1,2 +1,8 @@
#!/bin/sh
# Touch cron files to fix 'NUMBER OF HARD LINKS > 1' issue. See https://github.com/phusion/baseimage-docker/issues/198
touch -c /var/spool/cron/crontabs/*
touch -c /etc/crontab
touch -c /etc/cron.d/* /etc/cron.daily/* /etc/cron.hourly/* /etc/cron.monthly/* /etc/cron.weekly/*
exec /usr/sbin/cron -f

View File

@@ -1,5 +1,4 @@
/var/log/syslog
{
/var/log/syslog {
rotate 7
daily
missingok
@@ -7,7 +6,9 @@
delaycompress
compress
postrotate
sv reload syslog-ng > /dev/null
if [ -f /var/run/syslog-ng.pid ]; then
kill -HUP `cat /var/run/syslog-ng.pid`
fi
endscript
}
@@ -22,8 +23,7 @@
/var/log/lpr.log
/var/log/cron.log
/var/log/debug
/var/log/messages
{
/var/log/messages {
rotate 4
weekly
missingok
@@ -32,6 +32,8 @@
delaycompress
sharedscripts
postrotate
sv reload syslog-ng > /dev/null
if [ -f /var/run/syslog-ng.pid ]; then
kill -HUP `cat /var/run/syslog-ng.pid`
fi
endscript
}

View File

@@ -1,14 +1,13 @@
@version: 3.5
@version: 3.13
@include "scl.conf"
@include "`scl-root`/system/tty10.conf"
# Syslog-ng configuration file, compatible with default Debian syslogd
# installation.
# First, set some global options.
options { chain_hostnames(off); flush_lines(0); use_dns(no); use_fqdn(no);
owner("root"); group("adm"); perm(0640); stats_freq(0);
bad_hostname("^gconfd$");
owner("root"); group("adm"); perm(0640); stats_freq(0);
bad_hostname("^gconfd$");
};
########################
@@ -54,7 +53,7 @@ destination d_newscrit { file("/var/log/news/news.crit"); };
destination d_newserr { file("/var/log/news/news.err"); };
destination d_newsnotice { file("/var/log/news/news.notice"); };
# Some `catch-all' logfiles.
# Some 'catch-all' logfiles.
#
destination d_debug { file("/var/log/debug"); };
destination d_error { file("/var/log/error"); };
@@ -75,7 +74,7 @@ destination d_xconsole { pipe("/dev/xconsole"); };
destination d_ppp { file("/var/log/ppp.log"); };
# stdout for docker
destination d_stdout { pipe("/dev/stdout"); };
destination d_stdout { ##SYSLOG_OUTPUT_MODE_DEV_STDOUT##("/dev/stdout"); };
########################
# Filters
@@ -134,6 +133,8 @@ log { source(s_src); filter(f_mail); destination(d_mail); };
log { source(s_src); filter(f_news); filter(f_crit); destination(d_newscrit); };
log { source(s_src); filter(f_news); filter(f_err); destination(d_newserr); };
log { source(s_src); filter(f_news); filter(f_notice); destination(d_newsnotice); };
#log { source(s_src); filter(f_cnews); destination(d_console_all); };
#log { source(s_src); filter(f_cother); destination(d_console_all); };
#log { source(s_src); filter(f_ppp); destination(d_ppp); };

View File

@@ -7,6 +7,17 @@ set -em
if [ ! -S /dev/log ]; then rm -f /dev/log; fi
if [ ! -S /var/lib/syslog-ng/syslog-ng.ctl ]; then rm -f /var/lib/syslog-ng/syslog-ng.ctl; fi
# determine output mode on /dev/stdout because of the issue documented at https://github.com/phusion/baseimage-docker/issues/468
if [ -p /dev/stdout ]; then
sed -i 's/##SYSLOG_OUTPUT_MODE_DEV_STDOUT##/pipe/' /etc/syslog-ng/syslog-ng.conf
else
sed -i 's/##SYSLOG_OUTPUT_MODE_DEV_STDOUT##/file/' /etc/syslog-ng/syslog-ng.conf
fi
# If /var/log is writable by another user logrotate will fail
/bin/chown root:root /var/log
/bin/chmod 0755 /var/log
PIDFILE="/var/run/syslog-ng.pid"
SYSLOGNG_OPTS=""

View File

@@ -4,7 +4,7 @@ source /bd_build/buildconfig
set -x
## Often used tools.
$minimal_apt_get_install curl less vim-tiny psmisc
$minimal_apt_get_install curl less vim-tiny psmisc gpg-agent dirmngr
ln -s /usr/bin/vim.tiny /usr/bin/vim
## This tool runs a command as another user and sets $HOME.

View File

@@ -14,29 +14,25 @@ function cleanup()
docker rm $ID >/dev/null
}
PWD=`pwd`
echo " --> Starting insecure container"
ID=`docker run -d -v $PWD/test:/test $NAME:$VERSION /sbin/my_init --enable-insecure-key`
ID=`docker run -d -p 22 $NAME:$VERSION /sbin/my_init --enable-insecure-key`
sleep 1
echo " --> Obtaining IP"
IP=`docker inspect -f "{{ .NetworkSettings.IPAddress }}" "$ID"`
if [[ "$IP" = "" ]]; then
abort "Unable to obtain container IP"
echo " --> Obtaining SSH port number"
SSHPORT=`docker inspect --format='{{(index (index .NetworkSettings.Ports "22/tcp") 0).HostPort}}' "$ID"`
if [[ "$SSHPORT" = "" ]]; then
abort "Unable to obtain container SSH port number"
fi
trap cleanup EXIT
echo " --> Enabling SSH in the container"
docker exec -t -i $ID /etc/my_init.d/00_regen_ssh_host_keys.sh -f
docker exec -t -i $ID rm /etc/service/sshd/down
docker exec -t -i $ID sv start /etc/service/sshd
docker exec $ID /etc/my_init.d/00_regen_ssh_host_keys.sh -f
docker exec $ID rm /etc/service/sshd/down
docker exec $ID sv start /etc/service/sshd
sleep 1
echo " --> Logging into container and running tests"
cp image/services/sshd/keys/insecure_key /tmp/insecure_key
chmod 600 /tmp/insecure_key
sleep 1 # Give container some more time to start up.
ssh -o UserKnownHostsFile=/dev/null -o StrictHostKeyChecking=no -i /tmp/insecure_key root@$IP \
/bin/bash /test/test.sh
DIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" >/dev/null 2>&1 && pwd )"
tools/docker-ssh $ID bash < test/test.sh

View File

@@ -58,6 +58,13 @@ fi
KNOWN_HOSTS_FILE=`mktemp /tmp/docker-ssh.XXXXXXXXX`
IP=`docker inspect -f "{{ .NetworkSettings.IPAddress }}" "$CONTAINER_ID"`
PORT=`docker inspect -f '{{(index (index .NetworkSettings.Ports "22/tcp") 0).HostPort}}' "$CONTAINER_ID"`
if test "`uname`" = "Darwin"; then
IP="127.0.0.1"
else
PORT=22
fi
echo "SSHing into $IP:$PORT"
# Prevent SSH from warning about adding a host to the known_hosts file.
ssh-keyscan "$IP" >"$KNOWN_HOSTS_FILE" 2>&1
@@ -68,6 +75,7 @@ if ! ssh -i ~/.baseimage_docker_insecure_key \
-o PasswordAuthentication=no \
-o KbdInteractiveAuthentication=no \
-o ChallengeResponseAuthentication=no \
-p $PORT \
"root@$IP" "$@"
then
STATUS=$?