forked from nestybox/sysbox-runc
-
Notifications
You must be signed in to change notification settings - Fork 0
/
run.go
170 lines (148 loc) · 4.32 KB
/
run.go
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
//go:build linux
// +build linux
package main
import (
"fmt"
"os"
"github.com/opencontainers/runc/libsysbox/sysbox"
"github.com/opencontainers/runc/libsysbox/syscont"
specs "github.com/opencontainers/runtime-spec/specs-go"
"github.com/sirupsen/logrus"
"github.com/urfave/cli"
)
// default action is to start a container
var runCommand = cli.Command{
Name: "run",
Usage: "create and run a system container",
ArgsUsage: `<container-id>
Where "<container-id>" is your name for the instance of the container that you
are starting. The name you provide for the container instance must be unique on
your host.`,
Description: `The run command creates an instance of a container for a bundle. The bundle
is a directory with a specification file named "` + specConfig + `" and a root
filesystem.
The specification file includes an args parameter. The args parameter is used
to specify command(s) that get run when the container is started. To change the
command(s) that get executed on start, edit the args parameter of the spec. See
"runc spec --help" for more explanation.`,
Flags: []cli.Flag{
cli.StringFlag{
Name: "bundle, b",
Value: "",
Usage: `path to the root of the bundle directory, defaults to the current directory`,
},
cli.StringFlag{
Name: "console-socket",
Value: "",
Usage: "path to an AF_UNIX socket which will receive a file descriptor referencing the master end of the console's pseudoterminal",
},
cli.BoolFlag{
Name: "detach, d",
Usage: "detach from the container's process",
},
cli.BoolFlag{
Name: "keep",
Usage: "do not delete the container after it exits",
},
cli.StringFlag{
Name: "pid-file",
Value: "",
Usage: "specify the file to write the process id to",
},
cli.BoolFlag{
Name: "no-subreaper",
Usage: "disable the use of the subreaper used to reap reparented processes",
},
cli.BoolFlag{
Name: "no-pivot",
Usage: "do not use pivot root to jail process inside rootfs. This should be used whenever the rootfs is on top of a ramdisk",
},
cli.BoolFlag{
Name: "no-new-keyring",
Usage: "do not create a new session keyring for the container. This will cause the container to inherit the calling processes session key",
},
cli.IntFlag{
Name: "preserve-fds",
Usage: "Pass N additional file descriptors to the container (stdio + $LISTEN_FDS + N in total)",
},
},
Action: func(context *cli.Context) error {
var (
err error
spec *specs.Spec
status int
profiler interface{ Stop() }
)
// Enable profiler if requested to do so
profiler, err = runProfiler(context)
if err != nil {
return err
}
defer func() {
if profiler != nil {
logrus.Info("Stopping profiler ...")
profiler.Stop()
}
}()
if err = checkArgs(context, 1, exactArgs); err != nil {
return err
}
if err = revisePidFile(context); err != nil {
return err
}
spec, err = setupSpec(context)
if err != nil {
return err
}
if err = sysbox.CheckHostConfig(context, spec); err != nil {
return err
}
id := context.Args().First()
withMgr := !context.GlobalBool("no-sysbox-mgr")
withFs := !context.GlobalBool("no-sysbox-fs")
sysbox := sysbox.NewSysbox(id, withMgr, withFs)
// register with sysbox-mgr
if sysbox.Mgr.Enabled() {
if err = sysbox.Mgr.Register(spec); err != nil {
return err
}
defer func() {
if err != nil {
sysbox.Mgr.Unregister()
}
}()
}
// Get sysbox-fs related configs
if sysbox.Fs.Enabled() {
if err = sysbox.Fs.GetConfig(); err != nil {
return err
}
}
if err = syscont.ConvertSpec(context, spec, sysbox); err != nil {
return fmt.Errorf("error in the container spec: %v", err)
}
// pre-register with sysFs
if sysbox.Fs.Enabled() {
if err = sysbox.Fs.PreRegister(spec.Linux.Namespaces); err != nil {
return err
}
defer func() {
if err != nil {
sysbox.Fs.Unregister()
}
}()
}
status, err = startContainer(context, spec, CT_ACT_RUN, nil, sysbox)
if err == nil {
// note: defer func() to stop profiler won't execute on os.Exit(); must explicitly stop it.
if profiler != nil {
logrus.Info("Stopping profiler ...")
profiler.Stop()
}
// exit with the container's exit status so any external supervisor is
// notified of the exit with the correct exit status.
os.Exit(status)
}
return err
},
}