2018-10-15 03:52:53 -04:00
#!/bin/sh
# dockerd-rootless.sh executes dockerd in rootless mode.
#
2020-03-09 22:36:30 -04:00
# Usage: dockerd-rootless.sh [DOCKERD_OPTIONS]
2018-10-15 03:52:53 -04:00
#
# External dependencies:
# * newuidmap and newgidmap needs to be installed.
# * /etc/subuid and /etc/subgid needs to be configured for the current user.
2020-05-08 07:45:12 -04:00
# * Either one of slirp4netns (>= v0.4.0), VPNKit, lxc-user-nic needs to be installed.
2020-06-24 02:43:45 -04:00
#
# Recognized environment variables:
# * DOCKERD_ROOTLESS_ROOTLESSKIT_NET=(slirp4netns|vpnkit|lxc-user-nic): the rootlesskit network driver. Defaults to "slirp4netns" if slirp4netns (>= v0.4.0) is installed. Otherwise defaults to "vpnkit".
# * DOCKERD_ROOTLESS_ROOTLESSKIT_MTU=NUM: the MTU value for the rootlesskit network driver. Defaults to 65520 for slirp4netns, 1500 for other drivers.
# * DOCKERD_ROOTLESS_ROOTLESSKIT_PORT_DRIVER=(builtin|slirp4netns): the rootlesskit port driver. Defaults to "builtin".
# * DOCKERD_ROOTLESS_ROOTLESSKIT_SLIRP4NETNS_SANDBOX=(auto|true|false): whether to protect slirp4netns with a dedicated mount namespace. Defaults to "auto".
# * DOCKERD_ROOTLESS_ROOTLESSKIT_SLIRP4NETNS_SECCOMP=(auto|true|false): whether to protect slirp4netns with seccomp. Defaults to "auto".
2018-10-15 03:52:53 -04:00
#
2020-03-09 22:36:30 -04:00
# See the documentation for the further information: https://docs.docker.com/engine/security/rootless/
2018-10-15 03:52:53 -04:00
set -e -x
if ! [ -w $XDG_RUNTIME_DIR ] ; then
echo "XDG_RUNTIME_DIR needs to be set and writable"
exit 1
fi
if ! [ -w $HOME ] ; then
echo "HOME needs to be set and writable"
exit 1
fi
rootlesskit = ""
for f in docker-rootlesskit rootlesskit; do
2020-03-02 22:27:49 -05:00
if which $f > /dev/null 2>& 1; then
2018-10-15 03:52:53 -04:00
rootlesskit = $f
break
fi
done
if [ -z $rootlesskit ] ; then
echo "rootlesskit needs to be installed"
exit 1
fi
2019-04-19 04:54:29 -04:00
: " ${ DOCKERD_ROOTLESS_ROOTLESSKIT_NET : = } "
: " ${ DOCKERD_ROOTLESS_ROOTLESSKIT_MTU : = } "
2020-06-24 02:43:45 -04:00
: " ${ DOCKERD_ROOTLESS_ROOTLESSKIT_PORT_DRIVER : =builtin } "
2019-09-02 01:58:58 -04:00
: " ${ DOCKERD_ROOTLESS_ROOTLESSKIT_SLIRP4NETNS_SANDBOX : =auto } "
: " ${ DOCKERD_ROOTLESS_ROOTLESSKIT_SLIRP4NETNS_SECCOMP : =auto } "
2019-04-19 04:54:29 -04:00
net = $DOCKERD_ROOTLESS_ROOTLESSKIT_NET
mtu = $DOCKERD_ROOTLESS_ROOTLESSKIT_MTU
2018-10-15 03:52:53 -04:00
if [ -z $net ] ; then
2020-03-02 22:27:49 -05:00
if which slirp4netns > /dev/null 2>& 1; then
2020-05-08 07:45:12 -04:00
# If --netns-type is present in --help, slirp4netns is >= v0.4.0.
if slirp4netns --help | grep -qw -- --netns-type; then
2019-04-19 04:54:29 -04:00
net = slirp4netns
if [ -z $mtu ] ; then
mtu = 65520
fi
else
2020-05-08 07:45:12 -04:00
echo "slirp4netns found but seems older than v0.4.0. Falling back to VPNKit."
2019-04-19 04:54:29 -04:00
fi
2018-10-15 03:52:53 -04:00
fi
2019-04-19 04:54:29 -04:00
if [ -z $net ] ; then
2020-03-02 22:27:49 -05:00
if which vpnkit > /dev/null 2>& 1; then
2019-04-19 04:54:29 -04:00
net = vpnkit
else
2020-05-08 07:45:12 -04:00
echo "Either slirp4netns (>= v0.4.0) or vpnkit needs to be installed"
2019-04-19 04:54:29 -04:00
exit 1
fi
fi
fi
if [ -z $mtu ] ; then
mtu = 1500
2018-10-15 03:52:53 -04:00
fi
if [ -z $_DOCKERD_ROOTLESS_CHILD ] ; then
_DOCKERD_ROOTLESS_CHILD = 1
export _DOCKERD_ROOTLESS_CHILD
# Re-exec the script via RootlessKit, so as to create unprivileged {user,mount,network} namespaces.
#
# --copy-up allows removing/creating files in the directories by creating tmpfs and symlinks
# * /etc: copy-up is required so as to prevent `/etc/resolv.conf` in the
# namespace from being unexpectedly unmounted when `/etc/resolv.conf` is recreated on the host
# (by either systemd-networkd or NetworkManager)
# * /run: copy-up is required so that we can create /run/docker (hardcoded for plugins) in our namespace
2019-05-15 07:52:59 -04:00
exec $rootlesskit \
2019-04-19 04:54:29 -04:00
--net= $net --mtu= $mtu \
2019-09-02 01:58:58 -04:00
--slirp4netns-sandbox= $DOCKERD_ROOTLESS_ROOTLESSKIT_SLIRP4NETNS_SANDBOX \
--slirp4netns-seccomp= $DOCKERD_ROOTLESS_ROOTLESSKIT_SLIRP4NETNS_SECCOMP \
2020-06-24 02:43:45 -04:00
--disable-host-loopback --port-driver= $DOCKERD_ROOTLESS_ROOTLESSKIT_PORT_DRIVER \
2018-10-15 03:52:53 -04:00
--copy-up= /etc --copy-up= /run \
2020-03-06 09:22:41 -05:00
--propagation= rslave \
2018-10-15 03:52:53 -04:00
$DOCKERD_ROOTLESS_ROOTLESSKIT_FLAGS \
$0 $@
else
[ $_DOCKERD_ROOTLESS_CHILD = 1 ]
# remove the symlinks for the existing files in the parent namespace if any,
# so that we can create our own files in our mount namespace.
rm -f /run/docker /run/xtables.lock
2019-05-15 07:52:59 -04:00
exec dockerd $@
2018-10-15 03:52:53 -04:00
fi