2018-02-05 16:05:59 -05:00
|
|
|
package oci // import "github.com/docker/docker/oci"
|
2016-11-16 19:18:43 -05:00
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
"strings"
|
|
|
|
|
|
|
|
"github.com/opencontainers/runc/libcontainer/configs"
|
|
|
|
"github.com/opencontainers/runc/libcontainer/devices"
|
|
|
|
specs "github.com/opencontainers/runtime-spec/specs-go"
|
|
|
|
)
|
|
|
|
|
2017-04-27 17:52:47 -04:00
|
|
|
// Device transforms a libcontainer configs.Device to a specs.LinuxDevice object.
|
|
|
|
func Device(d *configs.Device) specs.LinuxDevice {
|
|
|
|
return specs.LinuxDevice{
|
2016-11-16 19:18:43 -05:00
|
|
|
Type: string(d.Type),
|
|
|
|
Path: d.Path,
|
|
|
|
Major: d.Major,
|
|
|
|
Minor: d.Minor,
|
|
|
|
FileMode: fmPtr(int64(d.FileMode)),
|
|
|
|
UID: u32Ptr(int64(d.Uid)),
|
|
|
|
GID: u32Ptr(int64(d.Gid)),
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2017-04-27 17:52:47 -04:00
|
|
|
func deviceCgroup(d *configs.Device) specs.LinuxDeviceCgroup {
|
2016-11-16 19:18:43 -05:00
|
|
|
t := string(d.Type)
|
2017-04-27 17:52:47 -04:00
|
|
|
return specs.LinuxDeviceCgroup{
|
2016-11-16 19:18:43 -05:00
|
|
|
Allow: true,
|
2017-04-27 17:52:47 -04:00
|
|
|
Type: t,
|
2016-11-16 19:18:43 -05:00
|
|
|
Major: &d.Major,
|
|
|
|
Minor: &d.Minor,
|
2017-04-27 17:52:47 -04:00
|
|
|
Access: d.Permissions,
|
2016-11-16 19:18:43 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// DevicesFromPath computes a list of devices and device permissions from paths (pathOnHost and pathInContainer) and cgroup permissions.
|
2017-04-27 17:52:47 -04:00
|
|
|
func DevicesFromPath(pathOnHost, pathInContainer, cgroupPermissions string) (devs []specs.LinuxDevice, devPermissions []specs.LinuxDeviceCgroup, err error) {
|
2016-11-16 19:18:43 -05:00
|
|
|
resolvedPathOnHost := pathOnHost
|
|
|
|
|
|
|
|
// check if it is a symbolic link
|
|
|
|
if src, e := os.Lstat(pathOnHost); e == nil && src.Mode()&os.ModeSymlink == os.ModeSymlink {
|
|
|
|
if linkedPathOnHost, e := filepath.EvalSymlinks(pathOnHost); e == nil {
|
|
|
|
resolvedPathOnHost = linkedPathOnHost
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
device, err := devices.DeviceFromPath(resolvedPathOnHost, cgroupPermissions)
|
|
|
|
// if there was no error, return the device
|
|
|
|
if err == nil {
|
|
|
|
device.Path = pathInContainer
|
|
|
|
return append(devs, Device(device)), append(devPermissions, deviceCgroup(device)), nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// if the device is not a device node
|
|
|
|
// try to see if it's a directory holding many devices
|
|
|
|
if err == devices.ErrNotADevice {
|
|
|
|
|
|
|
|
// check if it is a directory
|
|
|
|
if src, e := os.Stat(resolvedPathOnHost); e == nil && src.IsDir() {
|
|
|
|
|
|
|
|
// mount the internal devices recursively
|
|
|
|
filepath.Walk(resolvedPathOnHost, func(dpath string, f os.FileInfo, e error) error {
|
|
|
|
childDevice, e := devices.DeviceFromPath(dpath, cgroupPermissions)
|
|
|
|
if e != nil {
|
|
|
|
// ignore the device
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// add the device to userSpecified devices
|
|
|
|
childDevice.Path = strings.Replace(dpath, resolvedPathOnHost, pathInContainer, 1)
|
|
|
|
devs = append(devs, Device(childDevice))
|
|
|
|
devPermissions = append(devPermissions, deviceCgroup(childDevice))
|
|
|
|
|
|
|
|
return nil
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(devs) > 0 {
|
|
|
|
return devs, devPermissions, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
return devs, devPermissions, fmt.Errorf("error gathering device information while adding custom device %q: %s", pathOnHost, err)
|
|
|
|
}
|