瀏覽代碼

Merge pull request #1 from jpetazzo/cherry-on-top-of-hack-release

Cherry on top of hack release
Tianon Gravi 11 年之前
父節點
當前提交
ac5bc86771
共有 3 個文件被更改,包括 32 次插入5 次删除
  1. 29 3
      hack/dind
  2. 2 2
      hack/make.sh
  3. 1 0
      hack/make/test

+ 29 - 3
hack/dind

@@ -27,6 +27,31 @@ do
 	[ -d $CGROUP/$SUBSYS ] || mkdir $CGROUP/$SUBSYS
 	[ -d $CGROUP/$SUBSYS ] || mkdir $CGROUP/$SUBSYS
 	mountpoint -q $CGROUP/$SUBSYS || 
 	mountpoint -q $CGROUP/$SUBSYS || 
 		mount -n -t cgroup -o $SUBSYS cgroup $CGROUP/$SUBSYS
 		mount -n -t cgroup -o $SUBSYS cgroup $CGROUP/$SUBSYS
+
+	# The two following sections address a bug which manifests itself
+	# by a cryptic "lxc-start: no ns_cgroup option specified" when
+	# trying to start containers withina container.
+	# The bug seems to appear when the cgroup hierarchies are not
+	# mounted on the exact same directories in the host, and in the
+	# container.
+
+	# Named, control-less cgroups are mounted with "-o name=foo"
+	# (and appear as such under /proc/<pid>/cgroup) but are usually
+	# mounted on a directory named "foo" (without the "name=" prefix).
+	# Systemd and OpenRC (and possibly others) both create such a
+	# cgroup. To avoid the aforementioned bug, we symlink "foo" to
+	# "name=foo". This shouldn't have any adverse effect.
+	echo $SUBSYS | grep -q ^name= && {
+		NAME=$(echo $SUBSYS | sed s/^name=//)
+		ln -s $SUBSYS $CGROUP/$NAME
+	}
+
+	# Likewise, on at least one system, it has been reported that
+	# systemd would mount the CPU and CPU accounting controllers
+	# (respectively "cpu" and "cpuacct") with "-o cpuacct,cpu"
+	# but on a directory called "cpu,cpuacct" (note the inversion
+	# in the order of the groups). This tries to work around it.
+	[ $SUBSYS = cpuacct,cpu ] && ln -s $SUBSYS $CGROUP/cpu,cpuacct
 done
 done
 
 
 # Note: as I write those lines, the LXC userland tools cannot setup
 # Note: as I write those lines, the LXC userland tools cannot setup
@@ -38,7 +63,7 @@ grep -qw devices /proc/1/cgroup ||
 	echo "WARNING: it looks like the 'devices' cgroup is not mounted."
 	echo "WARNING: it looks like the 'devices' cgroup is not mounted."
 
 
 # Now, close extraneous file descriptors.
 # Now, close extraneous file descriptors.
-pushd /proc/self/fd
+pushd /proc/self/fd >/dev/null
 for FD in *
 for FD in *
 do
 do
 	case "$FD" in
 	case "$FD" in
@@ -51,9 +76,10 @@ do
 		;;
 		;;
 	esac
 	esac
 done
 done
-popd
+popd >/dev/null
 
 
 # Mount /tmp
 # Mount /tmp
 mount -t tmpfs none /tmp
 mount -t tmpfs none /tmp
 
 
-exec $*
+[ "$1" ] && exec "$@"
+echo "You probably want to run hack/make.sh, or maybe a shell?"

+ 2 - 2
hack/make.sh

@@ -33,8 +33,8 @@ grep -q "$RESOLVCONF" /proc/mounts || {
 
 
 # List of bundles to create when no argument is passed
 # List of bundles to create when no argument is passed
 DEFAULT_BUNDLES=(
 DEFAULT_BUNDLES=(
-	test
 	binary
 	binary
+	test
 	ubuntu
 	ubuntu
 )
 )
 
 
@@ -67,7 +67,7 @@ main() {
 	fi
 	fi
 	SCRIPTDIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )"
 	SCRIPTDIR="$( cd "$( dirname "${BASH_SOURCE[0]}" )" && pwd )"
 	if [ $# -lt 1 ]; then
 	if [ $# -lt 1 ]; then
-		bundles=($DEFAULT_BUNDLES)
+		bundles=(${DEFAULT_BUNDLES[@]})
 	else
 	else
 		bundles=($@)
 		bundles=($@)
 	fi
 	fi

+ 1 - 0
hack/make/test

@@ -14,6 +14,7 @@ bundle_test() {
 		for test_dir in $(find_test_dirs); do (
 		for test_dir in $(find_test_dirs); do (
 			set -x
 			set -x
 			cd $test_dir
 			cd $test_dir
+			go test -i
 			go test -v -ldflags "$LDFLAGS" $TESTFLAGS
 			go test -v -ldflags "$LDFLAGS" $TESTFLAGS
 		)  done
 		)  done
 	} 2>&1 | tee $DEST/test.log
 	} 2>&1 | tee $DEST/test.log