Building a Container from Scratch

Building a Simple Container from Scratch
Introduction
Containers have revolutionized how we deploy applications, providing isolation, portability, and efficiency. While tools like Docker make containerization accessible, understanding what happens under the hood is valuable. This blog post documents my journey creating a basic container implementation using Linux’s native features.
What is Containerization?
Containerization is a lightweight virtualization technique that isolates applications without the overhead of full virtual machines. Containers share the host’s kernel but run in isolated environments with their own:
- Filesystem
- Process tree
- Network stack
- Resource limits
Core Technologies
My implementation uses four key Linux features:
- Namespaces: Provide isolation for system resources
- Chroot: Creates a new root filesystem view
- Cgroups: Limit resource usage
- Virtual networking: Isolates network communication
Implementation Steps
1. Setting Up the Base Filesystem
The first step was creating a minimal root filesystem for our container:
|
|
This creates a minimal Ubuntu Focal installation in the rootfs
directory, which becomes our container’s filesystem.
2. Process Isolation with Namespaces
Linux namespaces isolate processes from the host system. My implementation uses:
- PID namespace: Container processes can’t see host processes
- Mount namespace: Container has its own filesystem mounts
- UTS namespace: Container has its own hostname
- IPC namespace: Container has its own IPC resources
- Network namespace: Container has its own network stack
The key to proper PID namespace isolation is to mount /proc inside the new namespace:
|
|
This approach ensures that when you run ps
inside the container, you only see container processes, with the bash shell having PID 1.
3. Resource Limits with Cgroups v2
For resource control, I used cgroups v2, which has a unified hierarchy:
|
|
4. Network Isolation
For networking, I created a virtual ethernet pair with one end in the container:
|
|
Then I set up NAT for internet access:
|
|
5. Running a Web Server in the Container
To demonstrate the container’s functionality, I added a simple Python web server:
|
|
Inside the container, you can start the server with /start_server.sh
and access it from the host at http://10.0.0.2:8080.
Challenges and Solutions
Challenge 1: Mount Points
Initially, the container couldn’t access /proc
and /sys
. Solution: Mount these special filesystems inside the container:
|
|
Challenge 2: Network Connectivity
Getting internet access from the container was tricky. I tried several approaches:
First attempt: Using specific outgoing interfaces in NAT rules
1
iptables -t nat -A POSTROUTING -s 10.0.0.0/24 -o eth0 -j MASQUERADE
This didn’t work reliably because the interface name varies between systems.
Second attempt: Using user namespace with UID/GID mapping
1
unshare --user --map-root-user
This caused permission issues with network access.
Final solution: Simplified NAT setup with FORWARD policy set to ACCEPT
1 2 3 4
iptables -t nat -F iptables -F FORWARD iptables -P FORWARD ACCEPT iptables -t nat -A POSTROUTING -s 10.0.0.0/24 -j MASQUERADE
This approach worked consistently across different systems.
Challenge 3: DNS Resolution
DNS resolution initially failed in the container. The solution was to:
Configure a proper resolv.conf with Google’s DNS servers
1 2
echo "nameserver 8.8.8.8" > $ROOTFS/etc/resolv.conf echo "nameserver 8.8.4.4" >> $ROOTFS/etc/resolv.conf
Add direct IP entries for common Ubuntu repositories
1
echo "91.189.91.81 archive.ubuntu.com" > $ROOTFS/etc/hosts
Challenge 4: Process Isolation
Initially, the container could see host processes. The solution was to properly mount /proc inside the new PID namespace:
|
|
This ensures that the container only sees its own processes.
Testing the Container
To verify isolation, I ran several tests:
Process isolation:
ps
inside the container showed only container processes1 2 3 4
root@container:/# ps PID TTY TIME CMD 1 ? 00:00:00 bash 7 ? 00:00:00 ps
Network isolation: The container had its own IP address (10.0.0.2)
1 2 3 4 5
root@container:/# ip addr 1: lo: <LOOPBACK,UP,LOWER_UP> mtu 65536 qdisc noqueue state UNKNOWN inet 127.0.0.1/8 scope host lo 2: veth1@if8: <BROADCAST,MULTICAST,UP,LOWER_UP> mtu 1500 qdisc noqueue state UP inet 10.0.0.2/24 scope global veth1
Internet connectivity: The container could access the internet
1 2 3
root@container:/# ping 8.8.8.8 PING 8.8.8.8 (8.8.8.8) 56(84) bytes of data. 64 bytes from 8.8.8.8: icmp_seq=1 ttl=111 time=25.7 ms
Filesystem isolation: The container had its own root filesystem
Web server test: Running the Python web server inside the container and accessing it from the host
1 2 3 4 5 6 7
# Inside container root@container:/# /start_server.sh Serving HTTP on 0.0.0.0 port 8080 ... # From host $ curl http://10.0.0.2:8080 <html><body><h1>Hello from Container!</h1></body></html>
Future Improvements
While this implementation covers the basics, several enhancements could be made:
- User namespace isolation: Properly map UIDs/GIDs between container and host
- Disk I/O limits: Add cgroup controls for disk operations
- Security hardening: Implement seccomp or AppArmor profiles
- Non-root execution: Run applications as non-root users inside the container
- Container image management: Add support for layered filesystem images
- Container orchestration: Implement basic container lifecycle management
Conclusion
Building a container from scratch helped me understand how Docker and other container technologies work internally. The implementation demonstrates the core concepts of containerization using Linux’s native features.
The most important lesson: containers aren’t magic - they’re just clever combinations of existing Linux isolation mechanisms! By understanding these mechanisms, we can better utilize, troubleshoot, and secure containerized applications.
This project shows that while container tools like Docker provide a polished experience, the underlying technology is accessible and can be implemented with basic Linux commands. The journey of building this container implementation has given me a deeper appreciation for the elegance of containerization and the power of Linux’s isolation features.