146 lines
4.7 KiB
Go
146 lines
4.7 KiB
Go
// +build linux
|
|
|
|
/*
|
|
Copyright The containerd Authors.
|
|
|
|
Licensed under the Apache License, Version 2.0 (the "License");
|
|
you may not use this file except in compliance with the License.
|
|
You may obtain a copy of the License at
|
|
|
|
http://www.apache.org/licenses/LICENSE-2.0
|
|
|
|
Unless required by applicable law or agreed to in writing, software
|
|
distributed under the License is distributed on an "AS IS" BASIS,
|
|
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
See the License for the specific language governing permissions and
|
|
limitations under the License.
|
|
*/
|
|
|
|
package oci
|
|
|
|
import (
|
|
"context"
|
|
|
|
"github.com/containerd/containerd/containers"
|
|
"github.com/containerd/containerd/pkg/cap"
|
|
specs "github.com/opencontainers/runtime-spec/specs-go"
|
|
)
|
|
|
|
// WithHostDevices adds all the hosts device nodes to the container's spec
|
|
func WithHostDevices(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
|
|
setLinux(s)
|
|
|
|
devs, err := HostDevices()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
s.Linux.Devices = append(s.Linux.Devices, devs...)
|
|
return nil
|
|
}
|
|
|
|
// WithDevices recursively adds devices from the passed in path and associated cgroup rules for that device.
|
|
// If devicePath is a dir it traverses the dir to add all devices in that dir.
|
|
// If devicePath is not a dir, it attempts to add the single device.
|
|
// If containerPath is not set then the device path is used for the container path.
|
|
func WithDevices(devicePath, containerPath, permissions string) SpecOpts {
|
|
return func(_ context.Context, _ Client, _ *containers.Container, s *Spec) error {
|
|
devs, err := getDevices(devicePath, containerPath)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
for i := range devs {
|
|
s.Linux.Devices = append(s.Linux.Devices, devs[i])
|
|
s.Linux.Resources.Devices = append(s.Linux.Resources.Devices, specs.LinuxDeviceCgroup{
|
|
Allow: true,
|
|
Type: devs[i].Type,
|
|
Major: &devs[i].Major,
|
|
Minor: &devs[i].Minor,
|
|
Access: permissions,
|
|
})
|
|
}
|
|
return nil
|
|
}
|
|
}
|
|
|
|
// WithMemorySwap sets the container's swap in bytes
|
|
func WithMemorySwap(swap int64) SpecOpts {
|
|
return func(ctx context.Context, _ Client, c *containers.Container, s *Spec) error {
|
|
setResources(s)
|
|
if s.Linux.Resources.Memory == nil {
|
|
s.Linux.Resources.Memory = &specs.LinuxMemory{}
|
|
}
|
|
s.Linux.Resources.Memory.Swap = &swap
|
|
return nil
|
|
}
|
|
}
|
|
|
|
// WithPidsLimit sets the container's pid limit or maximum
|
|
func WithPidsLimit(limit int64) SpecOpts {
|
|
return func(ctx context.Context, _ Client, c *containers.Container, s *Spec) error {
|
|
setResources(s)
|
|
if s.Linux.Resources.Pids == nil {
|
|
s.Linux.Resources.Pids = &specs.LinuxPids{}
|
|
}
|
|
s.Linux.Resources.Pids.Limit = limit
|
|
return nil
|
|
}
|
|
}
|
|
|
|
// WithCPUShares sets the container's cpu shares
|
|
func WithCPUShares(shares uint64) SpecOpts {
|
|
return func(ctx context.Context, _ Client, c *containers.Container, s *Spec) error {
|
|
setCPU(s)
|
|
s.Linux.Resources.CPU.Shares = &shares
|
|
return nil
|
|
}
|
|
}
|
|
|
|
// WithCPUs sets the container's cpus/cores for use by the container
|
|
func WithCPUs(cpus string) SpecOpts {
|
|
return func(ctx context.Context, _ Client, c *containers.Container, s *Spec) error {
|
|
setCPU(s)
|
|
s.Linux.Resources.CPU.Cpus = cpus
|
|
return nil
|
|
}
|
|
}
|
|
|
|
// WithCPUsMems sets the container's cpu mems for use by the container
|
|
func WithCPUsMems(mems string) SpecOpts {
|
|
return func(ctx context.Context, _ Client, c *containers.Container, s *Spec) error {
|
|
setCPU(s)
|
|
s.Linux.Resources.CPU.Mems = mems
|
|
return nil
|
|
}
|
|
}
|
|
|
|
// WithCPUCFS sets the container's Completely fair scheduling (CFS) quota and period
|
|
func WithCPUCFS(quota int64, period uint64) SpecOpts {
|
|
return func(ctx context.Context, _ Client, c *containers.Container, s *Spec) error {
|
|
setCPU(s)
|
|
s.Linux.Resources.CPU.Quota = "a
|
|
s.Linux.Resources.CPU.Period = &period
|
|
return nil
|
|
}
|
|
}
|
|
|
|
// WithAllCurrentCapabilities propagates the effective capabilities of the caller process to the container process.
|
|
// The capability set may differ from WithAllKnownCapabilities when running in a container.
|
|
var WithAllCurrentCapabilities = func(ctx context.Context, client Client, c *containers.Container, s *Spec) error {
|
|
caps, err := cap.Current()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return WithCapabilities(caps)(ctx, client, c, s)
|
|
}
|
|
|
|
// WithAllKnownCapabilities sets all the the known linux capabilities for the container process
|
|
var WithAllKnownCapabilities = func(ctx context.Context, client Client, c *containers.Container, s *Spec) error {
|
|
caps := cap.Known()
|
|
return WithCapabilities(caps)(ctx, client, c, s)
|
|
}
|
|
|
|
// WithoutRunMount removes the `/run` inside the spec
|
|
func WithoutRunMount(ctx context.Context, client Client, c *containers.Container, s *Spec) error {
|
|
return WithoutMounts("/run")(ctx, client, c, s)
|
|
}
|