123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403 |
- // +build linux,cgo
- package native
- import (
- "encoding/json"
- "fmt"
- "io"
- "io/ioutil"
- "os"
- "os/exec"
- "path/filepath"
- "strings"
- "sync"
- "syscall"
- "time"
- log "github.com/Sirupsen/logrus"
- "github.com/docker/docker/daemon/execdriver"
- "github.com/docker/docker/pkg/reexec"
- sysinfo "github.com/docker/docker/pkg/system"
- "github.com/docker/docker/pkg/term"
- "github.com/docker/libcontainer"
- "github.com/docker/libcontainer/apparmor"
- "github.com/docker/libcontainer/cgroups/systemd"
- "github.com/docker/libcontainer/configs"
- "github.com/docker/libcontainer/system"
- "github.com/docker/libcontainer/utils"
- )
- const (
- DriverName = "native"
- Version = "0.2"
- )
- type driver struct {
- root string
- initPath string
- activeContainers map[string]libcontainer.Container
- machineMemory int64
- factory libcontainer.Factory
- sync.Mutex
- }
- func NewDriver(root, initPath string) (*driver, error) {
- meminfo, err := sysinfo.ReadMemInfo()
- if err != nil {
- return nil, err
- }
- if err := os.MkdirAll(root, 0700); err != nil {
- return nil, err
- }
- // native driver root is at docker_root/execdriver/native. Put apparmor at docker_root
- if err := apparmor.InstallDefaultProfile(); err != nil {
- return nil, err
- }
- cgm := libcontainer.Cgroupfs
- if systemd.UseSystemd() {
- cgm = libcontainer.SystemdCgroups
- }
- f, err := libcontainer.New(
- root,
- cgm,
- libcontainer.InitPath(reexec.Self(), DriverName),
- libcontainer.TmpfsRoot,
- )
- if err != nil {
- return nil, err
- }
- return &driver{
- root: root,
- initPath: initPath,
- activeContainers: make(map[string]libcontainer.Container),
- machineMemory: meminfo.MemTotal,
- factory: f,
- }, nil
- }
- type execOutput struct {
- exitCode int
- err error
- }
- func (d *driver) Run(c *execdriver.Command, pipes *execdriver.Pipes, startCallback execdriver.StartCallback) (execdriver.ExitStatus, error) {
- // take the Command and populate the libcontainer.Config from it
- container, err := d.createContainer(c)
- if err != nil {
- return execdriver.ExitStatus{ExitCode: -1}, err
- }
- var term execdriver.Terminal
- p := &libcontainer.Process{
- Args: append([]string{c.ProcessConfig.Entrypoint}, c.ProcessConfig.Arguments...),
- Env: c.ProcessConfig.Env,
- Cwd: c.WorkingDir,
- User: c.ProcessConfig.User,
- }
- if c.ProcessConfig.Tty {
- rootuid, err := container.HostUID()
- if err != nil {
- return execdriver.ExitStatus{ExitCode: -1}, err
- }
- cons, err := p.NewConsole(rootuid)
- if err != nil {
- return execdriver.ExitStatus{ExitCode: -1}, err
- }
- term, err = NewTtyConsole(cons, pipes, rootuid)
- } else {
- p.Stdout = pipes.Stdout
- p.Stderr = pipes.Stderr
- r, w, err := os.Pipe()
- if err != nil {
- return execdriver.ExitStatus{ExitCode: -1}, err
- }
- if pipes.Stdin != nil {
- go func() {
- io.Copy(w, pipes.Stdin)
- w.Close()
- }()
- p.Stdin = r
- }
- term = &execdriver.StdConsole{}
- }
- if err != nil {
- return execdriver.ExitStatus{ExitCode: -1}, err
- }
- c.ProcessConfig.Terminal = term
- cont, err := d.factory.Create(c.ID, container)
- if err != nil {
- return execdriver.ExitStatus{ExitCode: -1}, err
- }
- d.Lock()
- d.activeContainers[c.ID] = cont
- d.Unlock()
- defer func() {
- cont.Destroy()
- d.cleanContainer(c.ID)
- }()
- if err := cont.Start(p); err != nil {
- return execdriver.ExitStatus{ExitCode: -1}, err
- }
- if startCallback != nil {
- pid, err := p.Pid()
- if err != nil {
- p.Signal(os.Kill)
- p.Wait()
- return execdriver.ExitStatus{ExitCode: -1}, err
- }
- startCallback(&c.ProcessConfig, pid)
- }
- oomKillNotification, err := cont.NotifyOOM()
- if err != nil {
- oomKillNotification = nil
- log.Warnf("Your kernel does not support OOM notifications: %s", err)
- }
- waitF := p.Wait
- if nss := cont.Config().Namespaces; nss.Contains(configs.NEWPID) {
- // we need such hack for tracking processes with inerited fds,
- // because cmd.Wait() waiting for all streams to be copied
- waitF = waitInPIDHost(p, cont)
- }
- ps, err := waitF()
- if err != nil {
- if err, ok := err.(*exec.ExitError); !ok {
- return execdriver.ExitStatus{ExitCode: -1}, err
- } else {
- ps = err.ProcessState
- }
- }
- cont.Destroy()
- _, oomKill := <-oomKillNotification
- return execdriver.ExitStatus{ExitCode: utils.ExitStatus(ps.Sys().(syscall.WaitStatus)), OOMKilled: oomKill}, nil
- }
- func waitInPIDHost(p *libcontainer.Process, c libcontainer.Container) func() (*os.ProcessState, error) {
- return func() (*os.ProcessState, error) {
- pid, err := p.Pid()
- if err != nil {
- return nil, err
- }
- process, err := os.FindProcess(pid)
- s, err := process.Wait()
- if err != nil {
- if err, ok := err.(*exec.ExitError); !ok {
- return s, err
- } else {
- s = err.ProcessState
- }
- }
- processes, err := c.Processes()
- if err != nil {
- return s, err
- }
- for _, pid := range processes {
- process, err := os.FindProcess(pid)
- if err != nil {
- log.Errorf("Failed to kill process: %d", pid)
- continue
- }
- process.Kill()
- }
- p.Wait()
- return s, err
- }
- }
- func (d *driver) Kill(c *execdriver.Command, sig int) error {
- active := d.activeContainers[c.ID]
- if active == nil {
- return fmt.Errorf("active container for %s does not exist", c.ID)
- }
- state, err := active.State()
- if err != nil {
- return err
- }
- return syscall.Kill(state.InitProcessPid, syscall.Signal(sig))
- }
- func (d *driver) Pause(c *execdriver.Command) error {
- active := d.activeContainers[c.ID]
- if active == nil {
- return fmt.Errorf("active container for %s does not exist", c.ID)
- }
- return active.Pause()
- }
- func (d *driver) Unpause(c *execdriver.Command) error {
- active := d.activeContainers[c.ID]
- if active == nil {
- return fmt.Errorf("active container for %s does not exist", c.ID)
- }
- return active.Resume()
- }
- func (d *driver) Terminate(c *execdriver.Command) error {
- defer d.cleanContainer(c.ID)
- // lets check the start time for the process
- active := d.activeContainers[c.ID]
- if active == nil {
- return fmt.Errorf("active container for %s does not exist", c.ID)
- }
- state, err := active.State()
- if err != nil {
- return err
- }
- pid := state.InitProcessPid
- currentStartTime, err := system.GetProcessStartTime(pid)
- if err != nil {
- return err
- }
- if state.InitProcessStartTime == currentStartTime {
- err = syscall.Kill(pid, 9)
- syscall.Wait4(pid, nil, 0, nil)
- }
- return err
- }
- func (d *driver) Info(id string) execdriver.Info {
- return &info{
- ID: id,
- driver: d,
- }
- }
- func (d *driver) Name() string {
- return fmt.Sprintf("%s-%s", DriverName, Version)
- }
- func (d *driver) GetPidsForContainer(id string) ([]int, error) {
- d.Lock()
- active := d.activeContainers[id]
- d.Unlock()
- if active == nil {
- return nil, fmt.Errorf("active container for %s does not exist", id)
- }
- return active.Processes()
- }
- func (d *driver) writeContainerFile(container *configs.Config, id string) error {
- data, err := json.Marshal(container)
- if err != nil {
- return err
- }
- return ioutil.WriteFile(filepath.Join(d.root, id, "container.json"), data, 0655)
- }
- func (d *driver) cleanContainer(id string) error {
- d.Lock()
- delete(d.activeContainers, id)
- d.Unlock()
- return os.RemoveAll(filepath.Join(d.root, id))
- }
- func (d *driver) createContainerRoot(id string) error {
- return os.MkdirAll(filepath.Join(d.root, id), 0655)
- }
- func (d *driver) Clean(id string) error {
- return os.RemoveAll(filepath.Join(d.root, id))
- }
- func (d *driver) Stats(id string) (*execdriver.ResourceStats, error) {
- c := d.activeContainers[id]
- if c == nil {
- return nil, execdriver.ErrNotRunning
- }
- now := time.Now()
- stats, err := c.Stats()
- if err != nil {
- return nil, err
- }
- memoryLimit := c.Config().Cgroups.Memory
- // if the container does not have any memory limit specified set the
- // limit to the machines memory
- if memoryLimit == 0 {
- memoryLimit = d.machineMemory
- }
- return &execdriver.ResourceStats{
- Stats: stats,
- Read: now,
- MemoryLimit: memoryLimit,
- }, nil
- }
- func getEnv(key string, env []string) string {
- for _, pair := range env {
- parts := strings.Split(pair, "=")
- if parts[0] == key {
- return parts[1]
- }
- }
- return ""
- }
- type TtyConsole struct {
- console libcontainer.Console
- }
- func NewTtyConsole(console libcontainer.Console, pipes *execdriver.Pipes, rootuid int) (*TtyConsole, error) {
- tty := &TtyConsole{
- console: console,
- }
- if err := tty.AttachPipes(pipes); err != nil {
- tty.Close()
- return nil, err
- }
- return tty, nil
- }
- func (t *TtyConsole) Master() libcontainer.Console {
- return t.console
- }
- func (t *TtyConsole) Resize(h, w int) error {
- return term.SetWinsize(t.console.Fd(), &term.Winsize{Height: uint16(h), Width: uint16(w)})
- }
- func (t *TtyConsole) AttachPipes(pipes *execdriver.Pipes) error {
- go func() {
- if wb, ok := pipes.Stdout.(interface {
- CloseWriters() error
- }); ok {
- defer wb.CloseWriters()
- }
- io.Copy(pipes.Stdout, t.console)
- }()
- if pipes.Stdin != nil {
- go func() {
- io.Copy(t.console, pipes.Stdin)
- pipes.Stdin.Close()
- }()
- }
- return nil
- }
- func (t *TtyConsole) Close() error {
- return t.console.Close()
- }
|