The base image for much of the bfren ecosystem, containing Alpine Linux installed with the S6 Overlay.
Source files (GitHub) Container images (Docker Hub)
The S6 Overlay is a version of the S6 supervisor which has various useful features for containers and managing services.
The image comes with the S6 Overlay and all its dependencies.
The most important concept in these images is the /overlay/
directory, which is copied from the source over the top of the image. You can use whatever structure you like within that.
So, for example, the edge
repositories are added via the /overlay/etc/apk/repositories
file, which is copied over the top of the base image filesystem by the Dockerfile
command COPY ./overlay /
.
You can add any files you want to the image this way.
Every time the container starts, the S6 Overlay runs the same series of scripts. These allow you to ensure that there is a consistent environment for your service.
The sequence is as follows (all should be contained within the /overlay/
directory):
/etc/fix-attrs.d/
- set required permissions
/etc/cont-init.d/
- run initialisation scripts
/etc/services.d/
- register the services you want to be supervised
My rule of thumb is that the first image uses 0-based files. Then the next uses 1-based files, then 2-based, etc. As S6 loads these files alphabetically, this practice ensures base permissions and configuration is always done first.
The S6 Overlay does more before and after all this - additional information can be found in their documentation. These three folders are where you will most often hook into the container processes.
For me, permissions are one the most powerful and most frustrating features of Linux. These are set by adding files to /overlay/etc/fix-attrs.d/
. Good practice is to prefix these files with a number so you have control over the order in which they are loaded. For example:
First we have the absolute path to the file or directory to set permissions for
Next we have true
or false
whether or not to recurse (obviously meaningless for a file)
Then we have the owner of the file or directory
Finally we have the permissions, first fmode
(file permissions) and then dmode
(directory permissions). I find the chmod calculator extremely useful for generating these.
You can have as many of these as you wish, and you can reapply them at any point by using bf-fix-attrs.
After the permissions are set, the scripts in /etc/cont-init.d/
are run. Here you might want to run installation routines, create configuration files, etc.
For example, in the ClamAV image the following two scripts run in this stage:/etc/cont-init.d/10-initial # downloads the latest virus definitions
Notice that in this example the files begin 10-
and 11-
as mentioned earlier.
(It does mean there can't be more than ten initialisation scripts per image, but frankly if there are more we need to ask the question, is the image trying to do too much? A key principle of Docker is that an image should do one thing.)
All the services you want to be managed by S6 go in /etc/services.d/
. The name of the next directory will be the name of the service, e.g. cron
. Within that the minimum you need is a file named run
, which contains the script necessary to start your service.
Here is the run
file from the cron
service of this image:
As you can see, it doesn't have to be complex! The trick with this particular example is the -f
flag which tells the cron daemon to run in the foreground. If it ran in the background, S6 wouldn't be able to supervise it. This is something to watch out for when creating your own services.
You can have as many services as you want - however the main point of Docker is to separate services into their own 'contained' environments. Therefore I try to keep the discipline of one 'main' service, and only adding 'supporting' services beyond that.
So, for example, in the Nginx image, the main service is nginx itself, but there are also two services to manage logging.
Note that service directories are not given a number prefix - they will run in any order. S6 does have ways of making a service wait for another service to start, but it's complex and very fiddly. Plus, if something needs to happen before your service starts, it should probably go in /etc/cont-init.d/
instead.
In your main service directory, I suggest also including a finish
file:
This is also from the cron
service of this image, but you'll see it in the main service directory of all the bfren images. What this does is tell S6 to close down all the services gracefully when this one quits, and then stop the container. You don't have to do this, but it's good practice to ensure a safe closedown of your container services when one of them crashes.
It means you may want to set restart
to unless-stopped
instead of always, or you could end up with a never-ending loop of a container starting, crashing, restarting, crashing, etc.
One of the most useful tricks when using S6 is to make use of the following directive to import all environment variables into the current script:
This is an example from the ClamAV image (in fact it is the contents of the 11-updater
file we looked at earlier). One of that image's environment variables is FRESHCLAM_PER_DAY
which allows you to define how many times a day you want freshclam
to run.
You do not get Docker's environment variables in scripts by default however, so you need to use the S6 helper function with-contenv
(with container environment). Then you can access all the environment variables you want.
And that's it! There is a lot more to it if you want to get complicated - I suggest you read the S6 documentation if you want to go deeper..
Name | Values | Description | Default |
---|---|---|---|
BF_CRON_LOG_LEVEL
0-8
Cron log level (0 is most verbose).
8
Various helper executables for interacting with S6 and the container environment.
Outputs service closing down debug message and optionally terminates all running services. Usually used in /etc/services.d/xxx/finish
file to show
-s X
outputs a message that service "X" is shutting down
-t
terminates all other services as well
Clears contents of /etc/bf/src
.
Run all scripts within a cron directory.
-h Show usage
-q Run quietly (otherwise it will output that the cron is being run to the logs - individual scripts may still send output)
DIRECTORY - the directory within /etc/periodic
to run
Adds a container environment variable called $1
with value $2
.
Variable name
Variable value
Re-applies attributes and permissions defined in /etc/fix-attrs.d
. Based on code from S6 Overlay.
Forwards errors logged in $2
to Docker logs; if $2
is not set, disables service $1
.
Service name.
Absolute path to log file.
Uses S6 to control the service named $2
.
Control action: 'disable', 'restart', 'start', 'stop'
Service name
Terminates all running services - usually used in /etc/services.d/xxx/finish
file - which also closes down (and potentially restarts) the whole container.