Previously I was forcing them to be strings, which is horrible. Now you can either specify a numeric uid or the name of a service to use the allocated id for that service. Signed-off-by: Justin Cormack <justin.cormack@docker.com>
10 KiB
Configuration Reference
The moby
tool assembles a set of containerised components into in image. The simplest
type of image is just a tar
file of the contents (useful for debugging) but more useful
outputs add a Dockerfile
to build a container, or build a full disk image that can be
booted as a linuxKit VM. The main use case is to build an assembly that includes
containerd
to run a set of containers, but the tooling is very generic.
The yaml configuration specifies the components used to build up an image . All components are downloaded at build time to create an image. The image is self-contained and immutable, so it can be tested reliably for continuous delivery.
The configuration file is processed in the order kernel
, init
, onboot
, services
, files
.
Each section adds file to the root file system. Sections may be omitted.
Each container that is specified is allocated a unique uid
and gid
that it may use if it
wishes to run as an isolated user (or user namespace). Anywhere you specify a uid
or gid
field you specify either the numeric id, or if you use a name it will refer to the id allocated
to the container with that name.
services:
- name: redis
image: redis:latest
uid: redis
gid: redis
binds:
- /etc/redis:/etc/redis
files:
- path: /etc/redis/redis.conf
contents: "..."
uid: redis
gid: redis
mode: "0600"
kernel
The kernel
section is only required if booting a VM. The files will be put into the boot/
directory, where they are used to build bootable images.
The kernel
section defines the kernel configuration. The image
field specifies the Docker image,
which should contain a kernel
file that will be booted (eg a bzImage
for amd64
) and a file
called kernel.tar
which is a tarball that is unpacked into the root, which should usually
contain a kernel modules directory. cmdline
specifies the kernel command line options if required.
To override the names, you can specify the kernel image name with binary: bzImage
and the tar image
with tar: kernel.tar
or the empty string or none
if you do not want to use a tarball at all.
init
The init
section is a list of images that are used for the init
system and are unpacked directly
into the root filesystem. This should bring up containerd
, start the system and daemon containers,
and set up basic filesystem mounts. in the case of a LinuxKit system. For ease of
modification runc
and containerd
images, which just contain these programs are added here
rather than bundled into the init
container.
onboot
The onboot
section is a list of images. These images are run before any other
images. They are run sequentially and each must exit before the next one is run.
These images can be used to configure one shot settings. See Image
specification for a list of supported fields.
services
The services
section is a list of images for long running services which are
run with containerd
. Startup order is undefined, so containers should wait
on any resources, such as networking, that they need. See Image
specification for a list of supported fields.
files
The files section can be used to add files inline in the config, or from an external file.
files:
- path: dir
directory: true
mode: "0777"
- path: dir/name1
source: "/some/path/on/local/filesystem"
mode: "0666"
- path: dir/name2
source: "/some/path/that/it/is/ok/to/omit"
optional: true
mode: "0666"
- path: dir/name3
contents: "orange"
mode: "0644"
uid: 100
gid: 100
Specifying the mode
is optional, and will default to 0600
. Leading directories will be
created if not specified. You can use ~/path
in source
to specify a path in the build
user's home directory.
trust
The trust
section specifies which build components are to be cryptographically verified with
Docker Content Trust prior to pulling.
Trust is a central concern in any build system, and LinuxKit's is no exception: Docker Content Trust provides authenticity,
integrity, and freshness guarantees for the components it verifies. The LinuxKit maintainers are responsible for signing
linuxkit
components, though collaborators can sign their own images with Docker Content Trust or Notary.
image
lists which individual images to enforce pulling with Docker Content Trust. The image name may include tag or digest, but the matching also succeeds if the base image name is the same.org
lists which organizations for which Docker Content Trust is to be enforced across all images, for examplelinuxkit
is the org forlinuxkit/kernel
Image specification
Entries in the onboot
and services
sections specify an OCI image and
options. Default values may be specified using the org.mobyproject.config
image label.
For more details see the OCI specification.
If the org.mobylinux.config
label is set in the image, that specifies default values for these fields if they
are not set in the yaml file. You can override the label by setting the value, or setting it to be empty to remove
the specification for that value in the label.
If you need an OCI option that is not specified here please open an issue or pull request as the list is not yet complete.
By default the containers will be run in the host net
, ipc
and uts
namespaces, as that is the usual requirement;
in many ways they behave like pods in Kubernetes. Mount points must already exist, as must a file or directory being
bind mounted into a container.
name
a unique name for the program being executed, used as thecontainerd
id.image
the Docker image to use for the root filesystem. The default command, path and environment are extracted from this so they need not be filled in.capabilities
the Linux capabilities required, for exampleCAP_SYS_ADMIN
. If there is a single capabilityall
then all capabilities are added.ambient
the Linux ambient capabilities (capabilities passed to non root users) that are required.mounts
is the full form for specifying a mount, which requirestype
,source
,destination
and a list ofoptions
. If any fields are omitted, sensible defaults are used if possible, for example if thetype
isdev
it is assumed you want to mount at/dev
. The default mounts and their options can be replaced by specifying a mount with new options here at the same mount point.binds
is a simpler interface to specify bind mounts, accepting a string like/src:/dest:opt1,opt2
similar to the-v
option for bind mounts in Docker.tmpfs
is a simpler interface to mount atmpfs
, like--tmpfs
in Docker, taking/dest:opt1,opt2
.command
will override the command and entrypoint in the image with a new list of commands.env
will override the environment in the image with a new environment list. Specify variables asVAR=value
.cwd
will set the working directory, defaults to/
.net
sets the network namespace, either to a path, or ifnone
ornew
is specified it will use a new namespace.ipc
sets the ipc namespace, either to a path, or ifnew
is specified it will use a new namespace.uts
sets the uts namespace, either to a path, or ifnew
is specified it will use a new namespace.pid
sets the pid namespace, either to a path, or ifhost
is specified it will use the host namespace.readonly
sets the root filesystem to read only, and changes the other default filesystems to read only.maskedPaths
sets paths which should be hidden.readonlyPaths
sets paths to read only.uid
sets the user id of the process.gid
sets the group id of the process.additionalGids
sets a list of additional groups for the process.noNewPrivileges
istrue
means no additional capabilities can be acquired andsuid
binaries do not work.hostname
sets the hostname inside the image.oomScoreAdj
changes the OOM score.disableOOMKiller
disables the OOM killer for the service.rootfsPropagation
sets the rootfs propagation, egshared
,slave
or (default)private
.cgroupsPath
sets the path for cgroups.sysctl
sets a list ofsysctl
key value pairs that are set inside the container namespace.rmlimits
sets a list ofrlimit
values in the formname,soft,hard
, egnofile,100,200
. You can useunlimited
as a value too.
There are experimental userns
, uidMappings
and gidMappings
options for user namespaces but these are not yet supported, and may have
permissions issues in use.
Mount Options
When mounting filesystem paths into a container - whether as part of onboot
or services
- there are several options of which you need to be aware. Using them properly is necessary for your containers to function properly.
For most containers - e.g. nginx or even docker - these options are not needed. Simply doing the following will work fine:
binds:
- /var:/some/var/path
However, in some circumstances you will need additional options. These options are used primarily if you intend to make changes to mount points from within your container that should be visible from outside the container, e.g., if you intend to mount an external disk from inside the container but have it be visible outside.
In order for new mounts from within a container to be propagated, you must set the following on the container:
rootfsPropagation: shared
- The mount point into the container below which new mounts are to occur must be
rshared,rbind
. In practice, this is/var
(or some subdir of/var
), since that is the only true read-write area of the filesystem where you will mount things.
Thus, if you have a regular container that is only reading and writing, go ahead and do:
binds:
- /var:/some/var/path
On the other hand, if you have a container that will make new mounts that you wish to be visible outside the container, do:
binds:
- /var:/var:rshared,rbind
rootfsPropagation: shared