mirror of
https://github.com/linuxkit/linuxkit.git
synced 2025-12-06 00:00:28 +00:00
vsudd: New daemon to proxy vsock to Unix domain sock
Used to proxy vsock 2376 <-> /var/run/docker.sock in the Moby VM. Signed-off-by: Ian Campbell <ian.campbell@docker.com>
This commit is contained in:
164
alpine/packages/vsudd/main.go
Normal file
164
alpine/packages/vsudd/main.go
Normal file
@@ -0,0 +1,164 @@
|
||||
package main
|
||||
|
||||
import (
|
||||
"flag"
|
||||
"fmt"
|
||||
"io"
|
||||
"log"
|
||||
"net"
|
||||
"os"
|
||||
"syscall"
|
||||
"time"
|
||||
)
|
||||
|
||||
/* No way to teach net or syscall about vsock sockaddr, so go right to C */
|
||||
|
||||
/*
|
||||
#include <sys/socket.h>
|
||||
#include "include/uapi/linux/vm_sockets.h"
|
||||
int bind_sockaddr_vm(int fd, const struct sockaddr_vm *sa_vm) {
|
||||
return bind(fd, (const struct sockaddr*)sa_vm, sizeof(*sa_vm));
|
||||
}
|
||||
int connect_sockaddr_vm(int fd, const struct sockaddr_vm *sa_vm) {
|
||||
return connect(fd, (const struct sockaddr*)sa_vm, sizeof(*sa_vm));
|
||||
}
|
||||
int accept_vm(int fd) {
|
||||
return accept(fd, 0, 0);
|
||||
}
|
||||
*/
|
||||
import "C"
|
||||
|
||||
const (
|
||||
AF_VSOCK = 40
|
||||
VSOCK_CID_ANY = 4294967295 /* 2^32-1 */
|
||||
)
|
||||
|
||||
var (
|
||||
port uint
|
||||
sock string
|
||||
detach bool
|
||||
)
|
||||
|
||||
func init() {
|
||||
flag.UintVar(&port, "port", 2376, "vsock port to forward")
|
||||
flag.StringVar(&sock, "sock", "/var/run/docker.sock", "path of the local Unix domain socket to forward to")
|
||||
flag.BoolVar(&detach, "detach", false, "detach from terminal")
|
||||
}
|
||||
|
||||
func main() {
|
||||
log.SetFlags(0)
|
||||
flag.Parse()
|
||||
|
||||
if detach {
|
||||
logFile, err := os.Create("/var/log/vsudd.log")
|
||||
if err != nil {
|
||||
log.Fatalln("Failed to open log file", err)
|
||||
}
|
||||
log.SetOutput(logFile)
|
||||
null, err := os.OpenFile("/dev/null", os.O_RDWR, 0)
|
||||
if err != nil {
|
||||
log.Fatalln("Failed to open /dev/null", err)
|
||||
}
|
||||
fd := null.Fd()
|
||||
syscall.Dup2(int(fd), int(os.Stdin.Fd()))
|
||||
syscall.Dup2(int(fd), int(os.Stdout.Fd()))
|
||||
syscall.Dup2(int(fd), int(os.Stderr.Fd()))
|
||||
}
|
||||
|
||||
accept_fd, err := syscall.Socket(AF_VSOCK, syscall.SOCK_STREAM, 0)
|
||||
if err != nil {
|
||||
log.Fatal(err)
|
||||
}
|
||||
|
||||
sa := C.struct_sockaddr_vm{}
|
||||
sa.svm_family = AF_VSOCK
|
||||
sa.svm_port = C.uint(port)
|
||||
sa.svm_cid = 3
|
||||
|
||||
if ret := C.bind_sockaddr_vm(C.int(accept_fd), &sa); ret != 0 {
|
||||
log.Fatal(fmt.Sprintf("failed bind vsock connection to %08x.%08x, returned %d", sa.svm_cid, sa.svm_port, ret))
|
||||
}
|
||||
|
||||
err = syscall.Listen(accept_fd, syscall.SOMAXCONN)
|
||||
if err != nil {
|
||||
log.Fatalln("Failed to listen to VSOCK", err)
|
||||
}
|
||||
|
||||
log.Printf("Starting at %s", time.Now().Format(time.RFC822))
|
||||
log.Printf("Listening on fd %d", accept_fd)
|
||||
|
||||
connid := 0
|
||||
|
||||
for {
|
||||
connid++
|
||||
fd, err := C.accept_vm(C.int(accept_fd))
|
||||
if err != nil {
|
||||
log.Fatalln("Error accepting connection", err)
|
||||
}
|
||||
go handleOne(connid, int(fd))
|
||||
}
|
||||
}
|
||||
|
||||
func handleOne(connid int, fd int) {
|
||||
vsock := os.NewFile(uintptr(fd), "vsock connection")
|
||||
log.Println(connid, "Accepted connection on fd", fd)
|
||||
|
||||
defer syscall.Close(fd)
|
||||
|
||||
var docker *net.UnixConn
|
||||
var err error
|
||||
|
||||
// Cope with the server socket appearing up to 10s later
|
||||
for i := 0; i < 200; i++ {
|
||||
docker, err = net.DialUnix("unix", nil, &net.UnixAddr{sock, "unix"})
|
||||
if err == nil {
|
||||
break
|
||||
}
|
||||
time.Sleep(50 * time.Millisecond)
|
||||
}
|
||||
defer docker.Close()
|
||||
|
||||
if err != nil {
|
||||
// If the forwarding program has broken then close and continue
|
||||
log.Println(connid, "Failed to connect to Unix domain socket after 10s", sock, err)
|
||||
return
|
||||
}
|
||||
|
||||
w := make(chan int64)
|
||||
go func() {
|
||||
n, err := io.Copy(vsock, docker)
|
||||
if err != nil {
|
||||
log.Println(connid, "error copying from docker to vsock:", err)
|
||||
}
|
||||
log.Println(connid, "copying from docker to vsock: ", n, "bytes done")
|
||||
|
||||
err = docker.CloseRead()
|
||||
if err != nil {
|
||||
log.Println(connid, "error CloseRead on docker socket:", err)
|
||||
}
|
||||
err = syscall.Shutdown(fd, syscall.SHUT_WR)
|
||||
if err != nil {
|
||||
log.Println(connid, "error SHUT_WR on vsock:", err)
|
||||
}
|
||||
w <- n
|
||||
}()
|
||||
|
||||
n, err := io.Copy(docker, vsock)
|
||||
if err != nil {
|
||||
log.Println(connid, "error copying from vsock to docker:", err)
|
||||
}
|
||||
log.Println(connid, "copying from vsock to docker: ", n, "bytes done")
|
||||
totalRead := n
|
||||
|
||||
err = docker.CloseWrite()
|
||||
if err != nil {
|
||||
log.Println(connid, "error CloseWrite on docker socket:", err)
|
||||
}
|
||||
err = syscall.Shutdown(fd, syscall.SHUT_RD)
|
||||
if err != nil {
|
||||
log.Println(connid, "error SHUT_RD on vsock:", err)
|
||||
}
|
||||
|
||||
totalWritten := <-w
|
||||
log.Println(connid, "Done. read:", totalRead, "written:", totalWritten)
|
||||
}
|
||||
Reference in New Issue
Block a user