mirror of
https://github.com/moby/moby.git
synced 2026-01-11 18:51:37 +00:00
When a NAT-based port mapping is created with a HostIP specified, we insert a DNAT rule in nat-DOCKER to replace the dest addr with the container IP. Then, in filter chains, we allow access to the container port for any packet not coming from the container's network itself (if hairpinning is disabled), nor from another host bridge. However we don't set any rule that prevents a rogue neighbor that shares a L2 segment with the host, but not the one where the port binding is expected to be published, from sending packets destined to that HostIP. For instance, if a port binding is created with HostIP == '127.0.0.1', this port should not be accessible from anything but the lo interface. That's currently not the case and this provides a false sense of security. Since nat-DOCKER mangles the dest addr, and the nat table rejects DROP rules, this change adds rules into raw-PREROUTING to filter ingress packets destined to mapped ports based on the input interface, the dest addr and the dest port. Interfaces are dynamically resolved when packets hit the host, thanks to iptables' addrtype extension. This extension does a fib lookup of the dest addr and checks that it's associated with the interface reached. Also, when a proxy-based port mapping is created, as is the case when an IPv6 HostIP is specified but the container is only IPv4-capable, we don't set any sort of filtering. So the same issue might happen. The reason is a bit different - in that case, that's just how the kernel works. But, in order to stay consistent with NAT-based mappings, these rules are also applied. The env var `DOCKER_DISABLE_INPUT_IFACE_FILTERING` can be set to any true-ish value to globally disable this behavior. Signed-off-by: Albin Kerouanton <albinker@gmail.com>
528 lines
16 KiB
Go
528 lines
16 KiB
Go
//go:build !windows
|
|
|
|
package daemon // import "github.com/docker/docker/daemon"
|
|
|
|
import (
|
|
"context"
|
|
"encoding/json"
|
|
"fmt"
|
|
"os"
|
|
"os/exec"
|
|
"path/filepath"
|
|
"strconv"
|
|
"strings"
|
|
|
|
runcoptions "github.com/containerd/containerd/api/types/runc/options"
|
|
"github.com/containerd/log"
|
|
"github.com/docker/docker/api/types"
|
|
containertypes "github.com/docker/docker/api/types/container"
|
|
"github.com/docker/docker/api/types/system"
|
|
"github.com/docker/docker/daemon/config"
|
|
"github.com/docker/docker/errdefs"
|
|
"github.com/docker/docker/pkg/rootless"
|
|
"github.com/docker/docker/pkg/sysinfo"
|
|
"github.com/pkg/errors"
|
|
rkclient "github.com/rootless-containers/rootlesskit/v2/pkg/api/client"
|
|
)
|
|
|
|
// fillPlatformInfo fills the platform related info.
|
|
func (daemon *Daemon) fillPlatformInfo(ctx context.Context, v *system.Info, sysInfo *sysinfo.SysInfo, cfg *configStore) error {
|
|
v.CgroupDriver = cgroupDriver(&cfg.Config)
|
|
v.CgroupVersion = "1"
|
|
if sysInfo.CgroupUnified {
|
|
v.CgroupVersion = "2"
|
|
}
|
|
|
|
if v.CgroupDriver != cgroupNoneDriver {
|
|
v.MemoryLimit = sysInfo.MemoryLimit
|
|
v.SwapLimit = sysInfo.SwapLimit
|
|
v.KernelMemory = sysInfo.KernelMemory
|
|
v.KernelMemoryTCP = sysInfo.KernelMemoryTCP
|
|
v.OomKillDisable = sysInfo.OomKillDisable
|
|
v.CPUCfsPeriod = sysInfo.CPUCfs
|
|
v.CPUCfsQuota = sysInfo.CPUCfs
|
|
v.CPUShares = sysInfo.CPUShares
|
|
v.CPUSet = sysInfo.Cpuset
|
|
v.PidsLimit = sysInfo.PidsLimit
|
|
}
|
|
v.Runtimes = make(map[string]system.RuntimeWithStatus)
|
|
for n, p := range stockRuntimes() {
|
|
v.Runtimes[n] = system.RuntimeWithStatus{
|
|
Runtime: system.Runtime{
|
|
Path: p,
|
|
},
|
|
Status: daemon.runtimeStatus(ctx, cfg, n),
|
|
}
|
|
}
|
|
for n, r := range cfg.Config.Runtimes {
|
|
v.Runtimes[n] = system.RuntimeWithStatus{
|
|
Runtime: system.Runtime{
|
|
Path: r.Path,
|
|
Args: append([]string(nil), r.Args...),
|
|
},
|
|
Status: daemon.runtimeStatus(ctx, cfg, n),
|
|
}
|
|
}
|
|
v.DefaultRuntime = cfg.Runtimes.Default
|
|
v.RuncCommit.ID = "N/A"
|
|
v.ContainerdCommit.ID = "N/A"
|
|
v.InitCommit.ID = "N/A"
|
|
|
|
if err := populateRuncCommit(&v.RuncCommit, cfg); err != nil {
|
|
log.G(ctx).WithError(err).Warn("Failed to retrieve default runtime version")
|
|
}
|
|
|
|
if err := daemon.populateContainerdCommit(ctx, &v.ContainerdCommit); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := daemon.populateInitCommit(ctx, v, cfg); err != nil {
|
|
return err
|
|
}
|
|
|
|
// Set expected and actual commits to the same value to prevent the client
|
|
// showing that the version does not match the "expected" version/commit.
|
|
|
|
if v.CgroupDriver == cgroupNoneDriver {
|
|
if v.CgroupVersion == "2" {
|
|
v.Warnings = append(v.Warnings, "WARNING: Running in rootless-mode without cgroups. Systemd is required to enable cgroups in rootless-mode.")
|
|
} else {
|
|
v.Warnings = append(v.Warnings, "WARNING: Running in rootless-mode without cgroups. To enable cgroups in rootless-mode, you need to boot the system in cgroup v2 mode.")
|
|
}
|
|
} else {
|
|
if !v.MemoryLimit {
|
|
v.Warnings = append(v.Warnings, "WARNING: No memory limit support")
|
|
}
|
|
if !v.SwapLimit {
|
|
v.Warnings = append(v.Warnings, "WARNING: No swap limit support")
|
|
}
|
|
if !v.KernelMemoryTCP && v.CgroupVersion == "1" {
|
|
// kernel memory is not available for cgroup v2.
|
|
// Warning is not printed on cgroup v2, because there is no action user can take.
|
|
v.Warnings = append(v.Warnings, "WARNING: No kernel memory TCP limit support")
|
|
}
|
|
if !v.OomKillDisable && v.CgroupVersion == "1" {
|
|
// oom kill disable is not available for cgroup v2.
|
|
// Warning is not printed on cgroup v2, because there is no action user can take.
|
|
v.Warnings = append(v.Warnings, "WARNING: No oom kill disable support")
|
|
}
|
|
if !v.CPUCfsQuota {
|
|
v.Warnings = append(v.Warnings, "WARNING: No cpu cfs quota support")
|
|
}
|
|
if !v.CPUCfsPeriod {
|
|
v.Warnings = append(v.Warnings, "WARNING: No cpu cfs period support")
|
|
}
|
|
if !v.CPUShares {
|
|
v.Warnings = append(v.Warnings, "WARNING: No cpu shares support")
|
|
}
|
|
if !v.CPUSet {
|
|
v.Warnings = append(v.Warnings, "WARNING: No cpuset support")
|
|
}
|
|
// TODO add fields for these options in types.Info
|
|
if !sysInfo.BlkioWeight && v.CgroupVersion == "2" {
|
|
// blkio weight is not available on cgroup v1 since kernel 5.0.
|
|
// Warning is not printed on cgroup v1, because there is no action user can take.
|
|
// On cgroup v2, blkio weight is implemented using io.weight
|
|
v.Warnings = append(v.Warnings, "WARNING: No io.weight support")
|
|
}
|
|
if !sysInfo.BlkioWeightDevice && v.CgroupVersion == "2" {
|
|
v.Warnings = append(v.Warnings, "WARNING: No io.weight (per device) support")
|
|
}
|
|
if !sysInfo.BlkioReadBpsDevice {
|
|
if v.CgroupVersion == "2" {
|
|
v.Warnings = append(v.Warnings, "WARNING: No io.max (rbps) support")
|
|
} else {
|
|
v.Warnings = append(v.Warnings, "WARNING: No blkio throttle.read_bps_device support")
|
|
}
|
|
}
|
|
if !sysInfo.BlkioWriteBpsDevice {
|
|
if v.CgroupVersion == "2" {
|
|
v.Warnings = append(v.Warnings, "WARNING: No io.max (wbps) support")
|
|
} else {
|
|
v.Warnings = append(v.Warnings, "WARNING: No blkio throttle.write_bps_device support")
|
|
}
|
|
}
|
|
if !sysInfo.BlkioReadIOpsDevice {
|
|
if v.CgroupVersion == "2" {
|
|
v.Warnings = append(v.Warnings, "WARNING: No io.max (riops) support")
|
|
} else {
|
|
v.Warnings = append(v.Warnings, "WARNING: No blkio throttle.read_iops_device support")
|
|
}
|
|
}
|
|
if !sysInfo.BlkioWriteIOpsDevice {
|
|
if v.CgroupVersion == "2" {
|
|
v.Warnings = append(v.Warnings, "WARNING: No io.max (wiops) support")
|
|
} else {
|
|
v.Warnings = append(v.Warnings, "WARNING: No blkio throttle.write_iops_device support")
|
|
}
|
|
}
|
|
}
|
|
if !v.IPv4Forwarding {
|
|
v.Warnings = append(v.Warnings, "WARNING: IPv4 forwarding is disabled")
|
|
}
|
|
if filtering, _ := strconv.ParseBool(os.Getenv("DOCKER_DISABLE_INPUT_IFACE_FILTERING")); filtering {
|
|
v.Warnings = append(v.Warnings,
|
|
"WARNING: input interface filtering is disabled on port mappings, this might be insecure",
|
|
"DEPRECATED: DOCKER_DISABLE_INPUT_IFACE_FILTERING is deprecated and will be removed in a future release",
|
|
)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (daemon *Daemon) fillPlatformVersion(ctx context.Context, v *types.Version, cfg *configStore) error {
|
|
if err := daemon.populateContainerdVersion(ctx, v); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := populateRuncVersion(cfg, v); err != nil {
|
|
log.G(ctx).WithError(err).Warn("Failed to retrieve default runtime version")
|
|
}
|
|
|
|
if err := populateInitVersion(ctx, cfg, v); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := daemon.fillRootlessVersion(ctx, v); err != nil {
|
|
if errdefs.IsContext(err) {
|
|
return err
|
|
}
|
|
log.G(ctx).WithError(err).Warn("Failed to fill rootless version")
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func populateRuncCommit(v *system.Commit, cfg *configStore) error {
|
|
_, _, commit, err := parseDefaultRuntimeVersion(&cfg.Runtimes)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
v.ID = commit
|
|
return nil
|
|
}
|
|
|
|
func (daemon *Daemon) populateInitCommit(ctx context.Context, v *system.Info, cfg *configStore) error {
|
|
v.InitBinary = cfg.GetInitPath()
|
|
initBinary, err := cfg.LookupInitPath()
|
|
if err != nil {
|
|
log.G(ctx).WithError(err).Warnf("Failed to find docker-init")
|
|
return nil
|
|
}
|
|
|
|
rv, err := exec.CommandContext(ctx, initBinary, "--version").Output()
|
|
if err != nil {
|
|
if errdefs.IsContext(err) {
|
|
return err
|
|
}
|
|
log.G(ctx).WithError(err).Warnf("Failed to retrieve %s version", initBinary)
|
|
return nil
|
|
}
|
|
|
|
_, commit, err := parseInitVersion(string(rv))
|
|
if err != nil {
|
|
log.G(ctx).WithError(err).Warnf("failed to parse %s version", initBinary)
|
|
return nil
|
|
}
|
|
v.InitCommit.ID = commit
|
|
return nil
|
|
}
|
|
|
|
func (daemon *Daemon) fillRootlessVersion(ctx context.Context, v *types.Version) error {
|
|
if !rootless.RunningWithRootlessKit() {
|
|
return nil
|
|
}
|
|
rlc, err := getRootlessKitClient()
|
|
if err != nil {
|
|
return errors.Wrap(err, "failed to create RootlessKit client")
|
|
}
|
|
rlInfo, err := rlc.Info(ctx)
|
|
if err != nil {
|
|
return errors.Wrap(err, "failed to retrieve RootlessKit version")
|
|
}
|
|
rlV := types.ComponentVersion{
|
|
Name: "rootlesskit",
|
|
Version: rlInfo.Version,
|
|
Details: map[string]string{
|
|
"ApiVersion": rlInfo.APIVersion,
|
|
"StateDir": rlInfo.StateDir,
|
|
},
|
|
}
|
|
if netDriver := rlInfo.NetworkDriver; netDriver != nil {
|
|
// netDriver is nil for the "host" network driver
|
|
// (not used for Rootless Docker)
|
|
rlV.Details["NetworkDriver"] = netDriver.Driver
|
|
}
|
|
if portDriver := rlInfo.PortDriver; portDriver != nil {
|
|
// portDriver is nil for the "implicit" port driver
|
|
// (used with "pasta" network driver)
|
|
//
|
|
// Because the ports are not managed via RootlessKit API in this case.
|
|
rlV.Details["PortDriver"] = portDriver.Driver
|
|
}
|
|
v.Components = append(v.Components, rlV)
|
|
|
|
switch rlInfo.NetworkDriver.Driver {
|
|
case "slirp4netns":
|
|
err = func() error {
|
|
rv, err := exec.CommandContext(ctx, "slirp4netns", "--version").Output()
|
|
if err != nil {
|
|
if errdefs.IsContext(err) {
|
|
return err
|
|
}
|
|
log.G(ctx).WithError(err).Warn("Failed to retrieve slirp4netns version")
|
|
return nil
|
|
}
|
|
|
|
_, ver, commit, err := parseRuntimeVersion(string(rv))
|
|
if err != nil {
|
|
log.G(ctx).WithError(err).Warn("Failed to parse slirp4netns version")
|
|
return nil
|
|
}
|
|
v.Components = append(v.Components, types.ComponentVersion{
|
|
Name: "slirp4netns",
|
|
Version: ver,
|
|
Details: map[string]string{
|
|
"GitCommit": commit,
|
|
},
|
|
})
|
|
return nil
|
|
}()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
case "vpnkit":
|
|
err = func() error {
|
|
out, err := exec.CommandContext(ctx, "vpnkit", "--version").Output()
|
|
if err != nil {
|
|
if errdefs.IsContext(err) {
|
|
return err
|
|
}
|
|
log.G(ctx).WithError(err).Warn("Failed to retrieve vpnkit version")
|
|
return nil
|
|
}
|
|
v.Components = append(v.Components, types.ComponentVersion{
|
|
Name: "vpnkit",
|
|
Version: strings.TrimSpace(strings.TrimSpace(string(out))),
|
|
})
|
|
return nil
|
|
}()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// getRootlessKitClient returns RootlessKit client
|
|
func getRootlessKitClient() (rkclient.Client, error) {
|
|
stateDir := os.Getenv("ROOTLESSKIT_STATE_DIR")
|
|
if stateDir == "" {
|
|
return nil, errors.New("environment variable `ROOTLESSKIT_STATE_DIR` is not set")
|
|
}
|
|
apiSock := filepath.Join(stateDir, "api.sock")
|
|
return rkclient.New(apiSock)
|
|
}
|
|
|
|
func fillDriverWarnings(v *system.Info) {
|
|
for _, pair := range v.DriverStatus {
|
|
if pair[0] == "Extended file attributes" && pair[1] == "best-effort" {
|
|
msg := fmt.Sprintf("WARNING: %s: extended file attributes from container images "+
|
|
"will be silently discarded if the backing filesystem does not support them.\n"+
|
|
" CONTAINERS MAY MALFUNCTION IF EXTENDED ATTRIBUTES ARE MISSING.\n"+
|
|
" This is an UNSUPPORTABLE configuration for which no bug reports will be accepted.\n", v.Driver)
|
|
|
|
v.Warnings = append(v.Warnings, msg)
|
|
continue
|
|
}
|
|
}
|
|
}
|
|
|
|
// parseInitVersion parses a Tini version string, and extracts the "version"
|
|
// and "git commit" from the output.
|
|
//
|
|
// Output example from `docker-init --version`:
|
|
//
|
|
// tini version 0.18.0 - git.fec3683
|
|
func parseInitVersion(v string) (version string, commit string, err error) {
|
|
parts := strings.Split(v, " - ")
|
|
|
|
if len(parts) >= 2 {
|
|
gitParts := strings.Split(strings.TrimSpace(parts[1]), ".")
|
|
if len(gitParts) == 2 && gitParts[0] == "git" {
|
|
commit = gitParts[1]
|
|
}
|
|
}
|
|
parts[0] = strings.TrimSpace(parts[0])
|
|
if strings.HasPrefix(parts[0], "tini version ") {
|
|
version = strings.TrimPrefix(parts[0], "tini version ")
|
|
}
|
|
if version == "" && commit == "" {
|
|
err = errors.Errorf("unknown output format: %s", v)
|
|
}
|
|
return version, commit, err
|
|
}
|
|
|
|
// parseRuntimeVersion parses the output of `[runtime] --version` and extracts the
|
|
// "name", "version" and "git commit" from the output.
|
|
//
|
|
// Output example from `runc --version`:
|
|
//
|
|
// runc version 1.0.0-rc5+dev
|
|
// commit: 69663f0bd4b60df09991c08812a60108003fa340
|
|
// spec: 1.0.0
|
|
func parseRuntimeVersion(v string) (runtime, version, commit string, err error) {
|
|
lines := strings.Split(strings.TrimSpace(v), "\n")
|
|
for _, line := range lines {
|
|
if strings.Contains(line, "version") {
|
|
s := strings.Split(line, "version")
|
|
runtime = strings.TrimSpace(s[0])
|
|
version = strings.TrimSpace(s[len(s)-1])
|
|
continue
|
|
}
|
|
if strings.HasPrefix(line, "commit:") {
|
|
commit = strings.TrimSpace(strings.TrimPrefix(line, "commit:"))
|
|
continue
|
|
}
|
|
}
|
|
if version == "" && commit == "" {
|
|
err = errors.Errorf("unknown output format: %s", v)
|
|
}
|
|
return runtime, version, commit, err
|
|
}
|
|
|
|
func parseDefaultRuntimeVersion(rts *runtimes) (runtime, version, commit string, err error) {
|
|
shim, opts, err := rts.Get(rts.Default)
|
|
if err != nil {
|
|
return "", "", "", err
|
|
}
|
|
shimopts, ok := opts.(*runcoptions.Options)
|
|
if !ok {
|
|
return "", "", "", fmt.Errorf("%s: retrieving version not supported", shim)
|
|
}
|
|
rt := shimopts.BinaryName
|
|
if rt == "" {
|
|
rt = defaultRuntimeName
|
|
}
|
|
rv, err := exec.Command(rt, "--version").Output()
|
|
if err != nil {
|
|
return "", "", "", fmt.Errorf("failed to retrieve %s version: %w", rt, err)
|
|
}
|
|
runtime, version, commit, err = parseRuntimeVersion(string(rv))
|
|
if err != nil {
|
|
return "", "", "", fmt.Errorf("failed to parse %s version: %w", rt, err)
|
|
}
|
|
return runtime, version, commit, err
|
|
}
|
|
|
|
func cgroupNamespacesEnabled(sysInfo *sysinfo.SysInfo, cfg *config.Config) bool {
|
|
return sysInfo.CgroupNamespaces && containertypes.CgroupnsMode(cfg.CgroupNamespaceMode).IsPrivate()
|
|
}
|
|
|
|
// Rootless returns true if daemon is running in rootless mode
|
|
func Rootless(cfg *config.Config) bool {
|
|
return cfg.Rootless
|
|
}
|
|
|
|
func noNewPrivileges(cfg *config.Config) bool {
|
|
return cfg.NoNewPrivileges
|
|
}
|
|
|
|
func (daemon *Daemon) populateContainerdCommit(ctx context.Context, v *system.Commit) error {
|
|
rv, err := daemon.containerd.Version(ctx)
|
|
if err != nil {
|
|
if errdefs.IsContext(err) {
|
|
return err
|
|
}
|
|
log.G(ctx).WithError(err).Warnf("Failed to retrieve containerd version")
|
|
return nil
|
|
}
|
|
v.ID = rv.Revision
|
|
return nil
|
|
}
|
|
|
|
func (daemon *Daemon) populateContainerdVersion(ctx context.Context, v *types.Version) error {
|
|
rv, err := daemon.containerd.Version(ctx)
|
|
if err != nil {
|
|
if errdefs.IsContext(err) {
|
|
return err
|
|
}
|
|
log.G(ctx).WithError(err).Warn("Failed to retrieve containerd version")
|
|
return nil
|
|
}
|
|
|
|
v.Components = append(v.Components, types.ComponentVersion{
|
|
Name: "containerd",
|
|
Version: rv.Version,
|
|
Details: map[string]string{
|
|
"GitCommit": rv.Revision,
|
|
},
|
|
})
|
|
return nil
|
|
}
|
|
|
|
func populateRuncVersion(cfg *configStore, v *types.Version) error {
|
|
_, ver, commit, err := parseDefaultRuntimeVersion(&cfg.Runtimes)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
v.Components = append(v.Components, types.ComponentVersion{
|
|
Name: cfg.Runtimes.Default,
|
|
Version: ver,
|
|
Details: map[string]string{
|
|
"GitCommit": commit,
|
|
},
|
|
})
|
|
return nil
|
|
}
|
|
|
|
func populateInitVersion(ctx context.Context, cfg *configStore, v *types.Version) error {
|
|
initBinary, err := cfg.LookupInitPath()
|
|
if err != nil {
|
|
log.G(ctx).WithError(err).Warn("Failed to find docker-init")
|
|
return nil
|
|
}
|
|
|
|
rv, err := exec.CommandContext(ctx, initBinary, "--version").Output()
|
|
if err != nil {
|
|
if errdefs.IsContext(err) {
|
|
return err
|
|
}
|
|
log.G(ctx).WithError(err).Warnf("Failed to retrieve %s version", initBinary)
|
|
return nil
|
|
}
|
|
|
|
ver, commit, err := parseInitVersion(string(rv))
|
|
if err != nil {
|
|
log.G(ctx).WithError(err).Warnf("failed to parse %s version", initBinary)
|
|
return nil
|
|
}
|
|
v.Components = append(v.Components, types.ComponentVersion{
|
|
Name: filepath.Base(initBinary),
|
|
Version: ver,
|
|
Details: map[string]string{
|
|
"GitCommit": commit,
|
|
},
|
|
})
|
|
return nil
|
|
}
|
|
|
|
// ociRuntimeFeaturesKey is the "well-known" key used for including the
|
|
// OCI runtime spec "features" struct.
|
|
//
|
|
// see https://github.com/opencontainers/runtime-spec/blob/main/features.md
|
|
const ociRuntimeFeaturesKey = "org.opencontainers.runtime-spec.features"
|
|
|
|
func (daemon *Daemon) runtimeStatus(ctx context.Context, cfg *configStore, runtimeName string) map[string]string {
|
|
m := make(map[string]string)
|
|
if runtimeName == "" {
|
|
runtimeName = cfg.Runtimes.Default
|
|
}
|
|
if features := cfg.Runtimes.Features(runtimeName); features != nil {
|
|
if j, err := json.Marshal(features); err == nil {
|
|
m[ociRuntimeFeaturesKey] = string(j)
|
|
} else {
|
|
log.G(ctx).WithFields(log.Fields{"error": err, "runtime": runtimeName}).Warn("Failed to call json.Marshal for the OCI features struct of runtime")
|
|
}
|
|
}
|
|
return m
|
|
}
|