An open API service indexing awesome lists of open source software.

https://github.com/owent/docker-setup

My docker setup scripts
https://github.com/owent/docker-setup

Last synced: about 2 months ago
JSON representation

My docker setup scripts

Awesome Lists containing this project

README

        

# Docker Setup Script

## 系统

扩展软件源:

+ https://software.opensuse.org/

```bash
# 对用户启用systemd支持
sudo loginctl enable-linger <用户名>

# For user session
export XDG_RUNTIME_DIR="/run/user/$UID"
export DBUS_SESSION_BUS_ADDRESS="unix:path=${XDG_RUNTIME_DIR}/bus"

# For rootless docker, install uidmap(which contains newuidmap and newgidmap)
grep ^$(whoami): /etc/subuid # Test subuid
grep ^$(whoami): /etc/subgid # Test subgid
export DOCKER_HOST=unix://$XDG_RUNTIME_DIR/docker.sock
# export DOCKERD_ROOTLESS_ROOTLESSKIT_PORT_DRIVER=slirp4netns
```

## 启动命令备注

```bash
# 带systemd
podman run docker run -d --systemd true IMAGE /sbin/init

## systemd expects to have /run, /run/lock and /tmp on tmpfs
## It also expects to be able to write to /sys/fs/cgroup/systemd and /var/log/journal
## docker run -d --cap-add=SYS_ADMIN -v /sys/fs/cgroup:/sys/fs/cgroup IMAGE /sbin/init
## Mount list come from setupSystemd@libpod/container_internal_linux.go on https://github.com/containers/libpod
## More details https://systemd.io/CONTAINER_INTERFACE/
docker build --tag router-base -f debian10.router.raw.Dockerfile
docker run -d --name router --cap-add=SYS_ADMIN \
--mount type=tmpfs,target=/run,tmpfs-size=67108864 \
--mount type=tmpfs,target=/run/lock,tmpfs-size=67108864 \
--mount type=tmpfs,target=/tmp \
--mount type=tmpfs,target=/var/log/journal \
--mount type=bind,source=/sys/fs/cgroup,target=/sys/fs/cgroup \
IMAGE /sbin/init
# --mount type=bind,source=/sys/fs/cgroup/systemd,target=/sys/fs/cgroup/systemd

# 路由
podman build --tag router-base -f debian10.router.raw.Dockerfile
podman run -d --name router --systemd true \
--mount type=bind,source=/home/router,target=/home/router \
--mount type=bind,source=/opt/nftables,target=/opt/nftables,ro=true \
--cap-add=NET_ADMIN --network=host router-base /sbin/init

podman run -d --name router --systemd true \
--mount type=bind,source=/home/router,target=/home/router \
--cap-add=NET_ADMIN --network=host router-base /lib/systemd/systemd

# @see https://docs.docker.com/engine/reference/builder/#entrypoint for detail about CMD and ENTRYPOINT

# 查看当前内核所有可用的模块
find /lib/modules/$(uname -r) -type f -name '*.ko*' | xargs basename -a | sort | uniq

# 查看已安装的内核所有可用的模块
find /lib/modules/ -type f -name '*.ko*' | awk '{if (match($0, /^\/lib\/modules\/([^\/]+).*\/([^\/]+)\.ko(\.[^\/\.]+)?$/, m)) {print m[1] " : " m[2];}}' | sort | uniq

# 查看和管理当前内核加载的模块信息
insmod/modprobe # 加载
rmmod # 卸载
lsmod # 查看系统中所有已经被加载了的所有的模块以及模块间的依赖关系
modinfo # 获得模块的信息
cat /proc/modules # 能够显示模块大小、在内核空间中的地址
cat /proc/devices # 只显示驱动的主设备号,且是分类显示
ls /sys/modules # 下面存在对应的驱动的目录,目录下包含驱动的分段信息等等。
```

### 配置firewalld

```bash
apt/dnf/yum install firewalld;
systemctl enable firewalld;
systemctl start firewalld;
vim /etc/firewalld/firewalld.conf ; # using FirewallBackend=nftables
firewall-cmd --permanent --add-service=dhcp;
firewall-cmd --permanent --add-service=dhcpv6;
firewall-cmd --permanent --add-service=dhcpv6-client;
firewall-cmd --permanent --add-service=dns;
firewall-cmd --permanent --add-service=ssh;
# firewall-cmd --permanent --add-service=custom services;
# firewall-cmd --permanent --add-port=custom tcp port/tcp;
# firewall-cmd --permanent --add-port=custom udp port/udp;
firewall-cmd --reload ;
firewall-cmd --list-all ;
```

## 文档地址备注

+ kernel latest: https://www.kernel.org/doc/html/latest/ , https://www.kernel.org/doc/Documentation/
+ kernel 5.10.X: https://www.kernel.org/doc/html/v5.10/ , https://git.kernel.org/pub/scm/linux/kernel/git/stable/linux.git/tree/Documentation?h=v5.10
+ nftables: https://www.netfilter.org/projects/nftables/manpage.html
+ nftables: https://www.mankier.com/8/nft
+ nftables: https://wiki.nftables.org/wiki-nftables/index.php/Quick_reference-nftables_in_10_minutes
+ 已分配IP地址范围: http://ftp.apnic.net/apnic/stats/apnic/delegated-apnic-latest
+ dnsmasq: http://www.thekelleys.org.uk/dnsmasq/docs/dnsmasq-man.html
+ DNS over HTTPS/TLS: https://dnscrypt.info/
+ DNS ranking: https://www.dnsperf.com/#!dns-resolvers
+ DHCP & BOOT options: https://www.iana.org/assignments/bootp-dhcp-parameters
+ DHCPv6 options: https://www.iana.org/assignments/dhcpv6-parameters
+ IPv4 Specification: https://tools.ietf.org/html/rfc791#section-3.1
+ IPv6 Specification: https://tools.ietf.org/html/rfc8200#section-3
+ TCP Specification: https://tools.ietf.org/html/rfc793#page-15 , https://en.wikipedia.org/wiki/Transmission_Control_Protocol
+ UDP Specification: https://tools.ietf.org/html/rfc768 , https://en.wikipedia.org/wiki/User_Datagram_Protocol
+ ICMP: https://tools.ietf.org/html/rfc792#page-4 , https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol
+ ICMPv6: https://tools.ietf.org/html/rfc4443#section-2.1 , https://en.wikipedia.org/wiki/Internet_Control_Message_Protocol_for_IPv6
+ IPv6 Address Types: https://www.apnic.net/get-ip/faqs/what-is-an-ip-address/ipv6-address-types/
+ https://en.wikipedia.org/wiki/IPv6_address
+ https://en.wikipedia.org/wiki/Reserved_IP_addresses#IPv6

## 更新内核备注

```bash
## CentOS - add elrepo from http://elrepo.org/tiki/tiki-index.php
yum/dnf --enablerepo=elrepo-kernel install kernel-ml kernel-ml-core kernel-ml-modules kernel-ml-devel kernel-ml-modules-extra

if [[ "x$NEED_KERNEL_TOOLS" != "x" ]] || [[ "x$NEED_REBUILD_GLIBC" != "x" ]]; then
yum/dnf remove -y kernel-headers kernel-tools kernel-tools-libs ;
yum/dnf --enablerepo=elrepo-kernel install -y kernel-ml-tools kernel-ml-tools-libs ;
fi
if [[ "x$NEED_REBUILD_GLIBC" != "x" ]]; then
yum/dnf remove -y kernel-headers ;
yum/dnf --enablerepo=elrepo-kernel install -y kernel-ml-headers ;
# install gcc again
yum/dnf install -y gcc gcc-c++ libtool ;
yum/dnf --enablerepo=elrepo-kernel update -y;
fi

### Update boot order - CentOS/RHEL 8 only
for KERNEL_PATH in /boot/vmlinuz-* ; do
printf "============ %s ============\n%s\n" "$KERNEL_PATH" "$(grubby --info=$KERNEL_PATH)";
done
grubby --make-default ;
echo "Current boot -> Kernel: $(grubby --default-kernel), Index: $(grubby --default-index)" ;

### Update boot order - CentOS/RHEL 7 only
awk -F\' '$1=="menuentry " {print $2}' /etc/grub2.cfg ;
SELECT_KERNEL_INDEXS=($(awk -F\' '$1=="menuentry " {print $2}' /etc/grub2.cfg | grep -n '[(]\s*[4-9]\.' | cut -d: -f 1));
if [ ${#SELECT_KERNEL_INDEXS} -gt 0 ]; then
((SELECT_KERNEL_INDEX=${SELECT_KERNEL_INDEXS[0]}-1));
grub2-set-default $SELECT_KERNEL_INDEX ;
echo "Now, you can reboot to use kernel $(awk -F\' '$1=="menuentry " {print $2}' /etc/grub2.cfg | grep '[(]\s*[4-9]\.' | head -n 1) ";
echo -e "Please to rerun this script if you want to update componments in this system, or use \\033[33;1myum --enablerepo=elrepo-kernel update -y\\033[0m to update system";
else
echo -e "\\033[31;1mError: kernel 4.X or upper not found.\\033[0m";
fi

## Ubuntu - download from https://kernel.ubuntu.com/~kernel-ppa/mainline/ or run scripts below
apt search "linux-image-" | awk '$0 ~ /linux-image-[0-9\.-]+-generic/ {print $0}' ;
apt install linux-image--generic

## Debian
apt search linux-image;
apt install linux-image-
```

## Docker备注

```yum/apt install -y docker-ce``` 或 ```dnf install -y podman```

```bash
# 手动设置docker需要的网桥
sudo brctl addbr docker0
sudo ip addr add 192.168.10.1/24 dev docker0
sudo ip link set dev docker0 up
ip addr show docker0

# 代理必须在启动脚本加环境变量
HTTP_PROXY=$http_proxy
HTTPS_PROXY=$https_proxy
NO_PROXY=$no_proxy

# /etc/docker/daemon.json 里可配不用验证证书的服务和存储位置
{
"graph": "/data/docker-data",
"storage-driver": "overlay",
"insecure-registries" : [ "docker.io" ]
}

```

### 生成Kubernetes secret

+ https://kubernetes.io/docs/concepts/configuration/secret/

```bash
# Generate secret with kubectl

# === docker-registry ===
# export KUBECONFIG=$HOME/.kube/config
# Or add --kubeconfig=PATH_TO_CONFIG_FILE.conf after all kubectl command
kubectl config view
kubectl create secret docker-registry my-secret-name --docker-server=docker.io \
--docker-username=USERNAME --docker-password=PASSWORD --docker-email=ci@DOMAIN \
--dry-run=client -o yaml > my-secret-name.yaml
kubectl -n NAMESPACE apply -f my-secret-name.yaml # Deploy, optional
# kubectl -n NAMESPACE get secret # Check

# === generic - kubernetes.io/dockerconfigjson ===
# export KUBECONFIG=$HOME/.kube/config
mkdir "$PWD/temporary-docker-config"
echo "PASSWARD" | docker --config "$PWD/temporary-docker-config" login docker.io -u USERNAME --password-stdin
kubectl create secret generic NAME --type=kubernetes.io/dockerconfigjson --from-file=.dockerconfigjson=$PWD/temporary-docker-config/config.json
rm -rf "$PWD/temporary-docker-config"

```

## ```systemd/journald``` 备注

### 日志

```bash
echo "$LOG_CONTENT" | systemd-cat -t TARGET_NAME -p info ; # Write log
journalctl -t TARGET_NAME ; # Review log
```

Configure GC of journal

```bash
# Usage
journalctl --disk-usage
du -sh /var/log/journal/

# Rotate and cleanup
journalctl --rotate

# Clear journal log older than x days
journalctl --vacuum-time=2d

# Restrict logs to a certain size
journalctl --vacuum-size=100M

# Restrict number of log files
journalctl --vacuum-files=5
```

Auto cleanup: edit ```/etc/systemd/journald.conf```

```bash
systemctl restart systemd-journald
```

## 常见错误

+ sshd版本过老导致 `sign_and_send_pubkey: no mutual signature supported`

```bash
# 配置 ~/.ssh/config 文件,添加如下内容
Host *
PubkeyAcceptedKeyTypes=+ssh-rsa
HostKeyAlgorithms=+ssh-rsa
```

+ podman启动报 `Error: OCI runtime error: container_linux.go:380: starting container process caused: error adding seccomp filter rule for syscall bdflush: requested action matches default action of filter`

启动时增加 `--security-opt seccomp=unconfined` 参数

> 请先确保 `grep CONFIG_SECCOMP= /boot/config-$(uname -r)` 输出 `CONFIG_SECCOMP=y`

*docker-compose.yml*

```yaml
version: "3.9" # optional since v1.27.0
services:
samba-pix:
image: samba-server:latest
security_opt:
- seccomp=unconfined
- label=disable
ports:
- "139:139/TCP"
- "445:445/TCP"
- "137:137/UDP"
- "138:138/UDP"
volumes:
- type: bind
source: /home/owent/docker-data/samba
target: /data/samba
- type: bind
source: /sys/fs/cgroup
target: /sys/fs/cgroup
tmpfs:
- /run:exec,mode=1777,size=67108864
- /run/lock:exec,mode=1777,size=67108864
- /tmp:exec,mode=1777
- /var/log/journal:exec,mode=1777
```

+ podman启动访问后bind的目录提示 `Permission denied`

启动时增加 `--security-opt label=disable` 参数或关闭 selinux (修改 `/etc/selinux/config` 后重启)

+ docker内mount目录提示 `pam_open_session: Permission denied` 和 `policy plugin failed session initialization`

启动时增加 `--cap-add CAP_SYS_RESOURCE` 。

请注意rootless模式下 `~/.config/systemd/user/docker.service` 或其他类似systemd配置内的限制不能大于 `/etc/security/limits.d/` 和 `cat /etc/security/limits.conf` 的配置。

+ docker内mount nfs提示 `mount.nfs: Operation not permitted`

启动时增加 `--cap-add CAP_SYS_ADMIN` 。

rootless模式下建议母机mount完共享到子机。编辑 `/etc/fstab` 增加 `NFS_REMOTE:/NFS_REMOTE_PATH /NFS_LOCAL_PATH nfs rw,nolock 0 0` ,然后手动mount一下: `sudo mount -t nfs -o rw,nolock NFS_REMOTE:/NFS_REMOTE_PATH /NFS_LOCAL_PATH`

+ 启动systemd提示 `Failed to create /init.scope control group: No such file or directory`

尝试启动时增加 `--cgroupns host` 。或在 `/etc/docker/daemon.json` 中添加 `"default-cgroupns-mode": "host"` 。

## 非root 模式 systemd(`systrmctl --user`)

需要对每个用户单独启动 systemd 服务。先补全下面几个文件:

### File: `/lib/systemd/system/[email protected]`

如果 `/lib/systemd/systemd-user-runtime-dir` 文件不存在忽略这个

```toml
# SPDX-License-Identifier: LGPL-2.1-or-later
#
# This file is part of systemd.
#
# systemd is free software; you can redistribute it and/or modify it
# under the terms of the GNU Lesser General Public License as published by
# the Free Software Foundation; either version 2.1 of the License, or
# (at your option) any later version.

[Unit]
Description=User Runtime Directory /run/user/%i
Documentation=man:[email protected](5)
After=systemd-user-sessions.service dbus.service
StopWhenUnneeded=yes
IgnoreOnIsolate=yes

[Service]
ExecStart=/lib/systemd/systemd-user-runtime-dir start %i
ExecStop=/lib/systemd/systemd-user-runtime-dir stop %i
Type=oneshot
RemainAfterExit=yes
Slice=user-%i.slice
```

### File: `/lib/systemd/system/[email protected]`

**如果上面 `[email protected]` 未启用,移除下面的After和Requires里的对应条目**

```toml
# SPDX-License-Identifier: LGPL-2.1-or-later
#
# This file is part of systemd.
#
# systemd is free software; you can redistribute it and/or modify it
# under the terms of the GNU Lesser General Public License as published by
# the Free Software Foundation; either version 2.1 of the License, or
# (at your option) any later version.

[Unit]
Description=User Manager for UID %i
Documentation=man:[email protected](5)
After=systemd-user-sessions.service user-runtime-dir@%i.service dbus.service
Requires=user-runtime-dir@%i.service
IgnoreOnIsolate=yes

[Service]
User=%i
PAMName=systemd-user
Type=notify
ExecStart=/lib/systemd/systemd --user
Slice=user-%i.slice
KillMode=mixed
Delegate=pids memory
TasksMax=infinity
TimeoutStopSec=120s
KeyringMode=inherit
OOMScoreAdjust=100
```

可能需要在 `[Service]` 下加 `Environment="XDG_RUNTIME_DIR=/run/user/%i" "DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/%i/bus"` ·

### root 用户执行

```bash
systemctl daemon-reload
systemctl start user-runtime-dir@<需要启用systemd的用户UID>.service
systemctl enable user-runtime-dir@<需要启用systemd的用户UID>.service
systemctl start user@<需要启用systemd的用户UID>.service
systemctl enable user@<需要启用systemd的用户UID>.service

loginctl enable-linger <需要启用systemd的用户>
```

### 目标用户执行

```bash
export XDG_RUNTIME_DIR="/run/user/$(id -u)"
export DBUS_SESSION_BUS_ADDRESS="unix:path=$XDG_RUNTIME_DIR/bus"

systemctl --user status
```

### 或者直接手动设置

```bash
echo "[Unit]
Description=User Manager for UID %i
After=systemd-user-sessions.service
# These are present in the RHEL8 version of this file except that the unit is Requires, not Wants.
# It's listed as Wants here so that if this file is used in a RHEL7 settings, it will not fail.
# If a user upgrades from RHEL7 to RHEL8, this unit file will continue to work until it's
# deleted the next time they upgrade Tableau Server itself.
After=user-runtime-dir@%i.service
Wants=user-runtime-dir@%i.service

[Service]
LimitNOFILE=infinity
LimitNPROC=infinity
User=%i
PAMName=systemd-user
Type=notify
# PermissionsStartOnly is deprecated and will be removed in future versions of systemd
# This is required for all systemd versions prior to version 231
PermissionsStartOnly=true
ExecStartPre=/bin/loginctl enable-linger %i
ExecStart=-/lib/systemd/systemd --user
Slice=user-%i.slice
KillMode=mixed
Delegate=yes
TasksMax=infinity
Restart=always
RestartSec=15

[Install]
WantedBy=default.target" | sudo tee /lib/systemd/system/user@$(id -u).service

sudo systemctl daemon-reload
sudo systemctl enable user@$(id -u).service
sudo systemctl start user@$(id -u).service
```

可能需要在 `[Service]` 下加 `Environment="XDG_RUNTIME_DIR=/run/user/%i" "DBUS_SESSION_BUS_ADDRESS=unix:path=/run/user/%i/bus"` ·