2016-05-14 07:54:16 +08:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"os"
|
|
|
|
|
2016-06-07 02:45:46 +08:00
|
|
|
"github.com/urfave/cli"
|
2016-05-14 07:54:16 +08:00
|
|
|
)
|
|
|
|
|
|
|
|
var createCommand = cli.Command{
|
|
|
|
Name: "create",
|
|
|
|
Usage: "create a container",
|
|
|
|
ArgsUsage: `<container-id>
|
|
|
|
|
|
|
|
Where "<container-id>" is your name for the instance of the container that you
|
|
|
|
are starting. The name you provide for the container instance must be unique on
|
|
|
|
your host.`,
|
|
|
|
Description: `The create command creates an instance of a container for a bundle. The bundle
|
|
|
|
is a directory with a specification file named "` + specConfig + `" and a root
|
|
|
|
filesystem.
|
|
|
|
|
|
|
|
The specification file includes an args parameter. The args parameter is used
|
|
|
|
to specify command(s) that get run when the container is started. To change the
|
|
|
|
command(s) that get executed on start, edit the args parameter of the spec. See
|
|
|
|
"runc spec --help" for more explanation.`,
|
|
|
|
Flags: []cli.Flag{
|
|
|
|
cli.StringFlag{
|
|
|
|
Name: "bundle, b",
|
|
|
|
Value: "",
|
|
|
|
Usage: `path to the root of the bundle directory, defaults to the current directory`,
|
|
|
|
},
|
2016-09-03 01:31:54 +08:00
|
|
|
cli.StringFlag{
|
|
|
|
Name: "console-socket",
|
|
|
|
Value: "",
|
|
|
|
Usage: "path to an AF_UNIX socket which will receive a file descriptor referencing the master end of the console's pseudoterminal",
|
|
|
|
},
|
2016-05-14 07:54:16 +08:00
|
|
|
cli.StringFlag{
|
|
|
|
Name: "pid-file",
|
|
|
|
Value: "",
|
|
|
|
Usage: "specify the file to write the process id to",
|
|
|
|
},
|
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "no-pivot",
|
|
|
|
Usage: "do not use pivot root to jail process inside rootfs. This should be used whenever the rootfs is on top of a ramdisk",
|
|
|
|
},
|
2016-06-04 02:53:07 +08:00
|
|
|
cli.BoolFlag{
|
|
|
|
Name: "no-new-keyring",
|
|
|
|
Usage: "do not create a new session keyring for the container. This will cause the container to inherit the calling processes session key",
|
|
|
|
},
|
2016-05-14 07:54:16 +08:00
|
|
|
},
|
2016-05-26 02:24:26 +08:00
|
|
|
Action: func(context *cli.Context) error {
|
2016-10-28 23:43:10 +08:00
|
|
|
if err := checkArgs(context, 1, exactArgs); err != nil {
|
|
|
|
return err
|
2016-10-20 10:01:47 +08:00
|
|
|
}
|
2016-11-01 19:13:49 +08:00
|
|
|
if err := revisePidFile(context); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2016-05-26 02:24:26 +08:00
|
|
|
spec, err := setupSpec(context)
|
2016-05-14 07:54:16 +08:00
|
|
|
if err != nil {
|
2016-05-26 02:24:26 +08:00
|
|
|
return err
|
2016-05-14 07:54:16 +08:00
|
|
|
}
|
|
|
|
status, err := startContainer(context, spec, true)
|
|
|
|
if err != nil {
|
2016-05-26 02:24:26 +08:00
|
|
|
return err
|
2016-05-14 07:54:16 +08:00
|
|
|
}
|
|
|
|
// exit with the container's exit status so any external supervisor is
|
|
|
|
// notified of the exit with the correct exit status.
|
|
|
|
os.Exit(status)
|
2016-05-26 02:24:26 +08:00
|
|
|
return nil
|
2016-05-14 07:54:16 +08:00
|
|
|
},
|
|
|
|
}
|