2017-02-13 14:01:54 -05:00
|
|
|
#!/usr/bin/env bash
|
2014-04-29 01:13:25 -04:00
|
|
|
set -e
|
2013-09-06 22:02:59 -04:00
|
|
|
|
2013-09-06 22:03:29 -04:00
|
|
|
# DinD: a wrapper script which allows docker to be run inside a docker container.
|
2014-07-24 18:19:50 -04:00
|
|
|
# Original version by Jerome Petazzoni <jerome@docker.com>
|
2015-04-11 13:22:16 -04:00
|
|
|
# See the blog post: https://blog.docker.com/2013/09/docker-can-now-run-within-docker/
|
2013-09-06 22:03:29 -04:00
|
|
|
#
|
2016-05-24 23:38:28 -04:00
|
|
|
# This script should be executed inside a docker container in privileged mode
|
2014-03-13 13:46:02 -04:00
|
|
|
# ('docker run --privileged', introduced in docker 0.6).
|
2013-09-06 22:03:29 -04:00
|
|
|
|
|
|
|
# Usage: dind CMD [ARG...]
|
|
|
|
|
2014-05-01 17:52:29 -04:00
|
|
|
# apparmor sucks and Docker needs to know that it's in a container (c) @tianon
|
|
|
|
export container=docker
|
|
|
|
|
2018-12-22 14:18:33 -05:00
|
|
|
if [[ -d /sys/kernel/security ]] && ! mountpoint -q /sys/kernel/security; then
|
2014-04-29 01:13:25 -04:00
|
|
|
mount -t securityfs none /sys/kernel/security || {
|
|
|
|
echo >&2 'Could not mount /sys/kernel/security.'
|
2015-10-12 01:46:14 -04:00
|
|
|
echo >&2 'AppArmor detection and --privileged mode might break.'
|
2014-04-29 01:13:25 -04:00
|
|
|
}
|
2013-10-31 17:58:43 -04:00
|
|
|
fi
|
|
|
|
|
2015-08-21 18:47:50 -04:00
|
|
|
# Mount /tmp (conditionally)
|
|
|
|
if ! mountpoint -q /tmp; then
|
|
|
|
mount -t tmpfs none /tmp
|
|
|
|
fi
|
2013-09-06 22:19:03 -04:00
|
|
|
|
2018-12-22 14:18:33 -05:00
|
|
|
if [[ $# -gt 0 ]]; then
|
2014-04-29 01:13:25 -04:00
|
|
|
exec "$@"
|
|
|
|
fi
|
|
|
|
|
|
|
|
echo >&2 'ERROR: No command specified.'
|
|
|
|
echo >&2 'You probably want to run hack/make.sh, or maybe a shell?'
|