ZeroTier One as Docker Image
Go to file
Phill Kelley 4d0f21c52b
unexpected script termination - entrypoint-router.sh
Resolves issue raised in #15 where `entrypoint-router.sh` exits after
telling the pipe listener process to go away, with the result that the
temporary pipe file does not get cleaned up on a container restart.

> The temporary pipe file is not persisted so it will always get cleaned
 up when the container is terminated or recreated.

The pipe listener process exits automatically without needing any signal
from `entrypoint-router.sh` so the script lines doing that are removed.

Instead of creating the pipe file using `mktemp` with a random suffix,
the hard-coded name "/tmp/zerotier-ipc-log" will be used. The pipe file
is:

* still in `/tmp` so it is not persisted and will get cleaned up when
 the container is terminated.

* always initalised empty each time the script runs (important if the
 container restarts).

Fixes: #15

Signed-off-by: Phill Kelley <34226495+Paraphraser@users.noreply.github.com>
2022-08-03 12:45:22 +10:00
.github/workflows fix builds 2022-07-28 14:48:15 +02:00
k8s rename "bridge" to "router" 2022-07-18 16:03:36 +10:00
patches upgrade to 1.10.1 2022-07-01 00:15:27 +02:00
scripts unexpected script termination - entrypoint-router.sh 2022-08-03 12:45:22 +10:00
docker-compose-router.yml support three routing modes as proposed by @bfg100k 2022-07-27 21:58:39 +10:00
docker-compose.yml Add docker-compose file for convenience 2021-08-13 03:59:21 -07:00
Dockerfile upgrade to 1.10.1 2022-07-01 00:15:27 +02:00
Dockerfile.router timezone support 2022-07-19 15:58:18 +10:00
LICENSE move repo from znx to here 2019-10-17 16:11:51 +02:00
README-router.md support three routing modes as proposed by @bfg100k 2022-07-27 21:58:39 +10:00
README.md refactor documentation to separate zerotier-router into separate readme 2022-07-25 11:13:36 +10:00

Docker Pulls Quay.io Enabled Multiarch build

zerotier-docker

Description

This is a container based on a lightweight Alpine Linux image and a copy of ZeroTier One. It's designed to allow you to run ZeroTier One as a service on container-oriented distributions like Fedora CoreOS, though it should work on any Linux system with Docker or Podman.

Run

To run this container in the correct way requires some special options to give it special permissions and allow it to persist its files. Here's an example (tested on Fedora CoreOS):

docker run --name zerotier-one --device=/dev/net/tun --net=host \
  --cap-add=NET_ADMIN --cap-add=SYS_ADMIN \
  -v /var/lib/zerotier-one:/var/lib/zerotier-one zyclonite/zerotier

This runs zyclonite/zerotier in a container with special network admin permissions and with access to the host's network stack (no network isolation) and /dev/net/tun to create tun/tap devices. This will allow it to create zt# interfaces on the host the way a copy of ZeroTier One running on the host would normally be able to.

In other words that basically does the same thing that running zerotier-one directly on the host would do, except it runs in a container. Since Fedora CoreOS has no package management this is the preferred way of distributing software for it.

It also mounts /var/lib/zerotier-one to /var/lib/zerotier-one inside the container, allowing your service container to persist its state across restarts of the container itself. If you don't do this it'll generate a new identity every time. You can put the actual data somewhere other than /var/lib/zerotier-one if you want.

To join a zerotier network you can use

docker exec zerotier-one zerotier-cli join 8056c2e21c000001

or create an empty file with the network as name

/var/lib/zerotier-one/networks.d/8056c2e21c000001.conf

Router mode

A variation on the container which implements a local network router. See:

Source

https://github.com/zyclonite/zerotier-docker