This is a toy container build from scratch in Go solely for learning purpose. It uses namespaces and cgroups, mount a tmpfs that's isolated from host filesystem.
Before starting, you'll have to unzip the content of ubuntu_fs.zip
file. This will create a subdirectory called ubuntu_fs
which will be mounted as our container's root directory.
You'll have to be inside a Linux box (Ubuntu in my case) to try this.
This will start our container (needs root privilege for creating cgroup
):
sudo su
go run main.go run /bin/bash
It will:
- Fork itself with
CLONE_NEWUTS
,CLONE_NEWPID
,CLONE_NEWNS
flags with isolated hostname, processes and mounts - The forked process will create
cgroup
to limit memory usage of itself and any child process it creates - Mount
./ubuntu_fs
directory as root filesystem usingchroot
to limit access to host machine's filesystem - Mount
/mytemp
directory as tmpfs. Any change made to this directory will not be visible from host. - Mount proc (where
CLONE_NEWPID
namespace was already set) so that container can runps
and see only the processes running inside it. - Execute the supplied argument
/bin/bash
inside the isolated environment
Building Containers from Scratch with Go by Liz Rice https://www.safaribooksonline.com/videos/building-containers-from/9781491988404
If you don't have access to safaribooksonline.com, Liz Rice gave talk on the same topic in several conferences too. One of them is "GOTO 2018 • Containers From Scratch": https://www.youtube.com/watch?v=8fi7uSYlOdc
Also, sysdevbd initiative by @appscode: https://sysdevbd.com/
Part 1: Linux Namespaces https://medium.com/@teddyking/linux-namespaces-850489d3ccf
Part 2: Namespaces in Go - Basics https://medium.com/@teddyking/namespaces-in-go-basics-e3f0fc1ff69a
Part 3: Namespaces in Go - User https://medium.com/@teddyking/namespaces-in-go-user-a54ef9476f2a
Part 4: Namespaces in Go - reexec https://medium.com/@teddyking/namespaces-in-go-reexec-3d1295b91af8
Part 5: Namespaces in Go - Mount https://medium.com/@teddyking/namespaces-in-go-mount-e4c04fe9fb29
Part 6: Namespaces in Go - Network https://medium.com/@teddyking/namespaces-in-go-network-fdcf63e76100
Part 7: Namespaces in Go - UTS https://medium.com/@teddyking/namespaces-in-go-uts-d47aebcdf00e
https://pierrchen.blogspot.com/2018/08/understand-container-index.html
I have used OSX to develop the container from scratch and have run it inside Ubuntu in a virtualbox by sharing the development directory. While this setup is fine for running the code inside Linux, the development experience is not great because a lot of pieces of this application is Linux specific. For example, calls like syscall.Sethostname
or the Cloneflags
field in the syscall.SysProcAttr{}
struct is not available in intellisense in VSCode when the dev environment is not Linux. VS Code will mark those lines as errors, because they are platform specific and declared in the standard library in Go for Linux only.
Fortunately the workaround is very simple. Search for "go.toolsEnvVars"
in VS Code settings, copy it to User Settings and change it to:
"go.toolsEnvVars": {
"GOOS": "linux"
}
Restarting VS Code after that will recognize all Linux specific declarations and will not see them as errors. Go-to-definition will work properly too.
PS: the contents of ubuntu_fs.zip
file has been extracted from Ubuntu docker image (using docker export...
command).