2016-03-18 18:50:19 +00:00
|
|
|
package daemon
|
|
|
|
|
|
|
|
import (
|
|
|
|
"errors"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"runtime"
|
|
|
|
"strconv"
|
|
|
|
|
|
|
|
"github.com/Sirupsen/logrus"
|
2016-06-17 00:34:00 +00:00
|
|
|
"github.com/docker/docker/daemon/exec"
|
2016-03-18 18:50:19 +00:00
|
|
|
"github.com/docker/docker/libcontainerd"
|
|
|
|
"github.com/docker/docker/runconfig"
|
2016-08-03 02:11:01 +00:00
|
|
|
"github.com/docker/engine-api/types"
|
2016-03-18 18:50:19 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
// StateChanged updates daemon state changes from containerd
|
|
|
|
func (daemon *Daemon) StateChanged(id string, e libcontainerd.StateInfo) error {
|
|
|
|
c := daemon.containers.Get(id)
|
|
|
|
if c == nil {
|
|
|
|
return fmt.Errorf("no such container: %s", id)
|
|
|
|
}
|
|
|
|
|
|
|
|
switch e.State {
|
|
|
|
case libcontainerd.StateOOM:
|
|
|
|
// StateOOM is Linux specific and should never be hit on Windows
|
|
|
|
if runtime.GOOS == "windows" {
|
|
|
|
return errors.New("Received StateOOM from libcontainerd on Windows. This should never happen.")
|
|
|
|
}
|
2016-04-18 09:48:13 +00:00
|
|
|
daemon.updateHealthMonitor(c)
|
2016-03-18 18:50:19 +00:00
|
|
|
daemon.LogContainerEvent(c, "oom")
|
|
|
|
case libcontainerd.StateExit:
|
2016-08-03 02:11:01 +00:00
|
|
|
// if containers AutoRemove flag is set, remove it after clean up
|
|
|
|
if c.HostConfig.AutoRemove {
|
|
|
|
defer func() {
|
|
|
|
if err := daemon.ContainerRm(c.ID, &types.ContainerRmConfig{ForceRemove: true, RemoveVolume: true}); err != nil {
|
|
|
|
logrus.Errorf("can't remove container %s: %v", c.ID, err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
}
|
2016-03-18 18:50:19 +00:00
|
|
|
c.Lock()
|
|
|
|
defer c.Unlock()
|
|
|
|
c.Wait()
|
|
|
|
c.Reset(false)
|
|
|
|
c.SetStopped(platformConstructExitStatus(e))
|
|
|
|
attributes := map[string]string{
|
|
|
|
"exitCode": strconv.Itoa(int(e.ExitCode)),
|
|
|
|
}
|
2016-04-18 09:48:13 +00:00
|
|
|
daemon.updateHealthMonitor(c)
|
2016-03-18 18:50:19 +00:00
|
|
|
daemon.LogContainerEventWithAttributes(c, "die", attributes)
|
|
|
|
daemon.Cleanup(c)
|
|
|
|
// FIXME: here is race condition between two RUN instructions in Dockerfile
|
|
|
|
// because they share same runconfig and change image. Must be fixed
|
|
|
|
// in builder/builder.go
|
2016-04-02 00:02:38 +00:00
|
|
|
if err := c.ToDisk(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return daemon.postRunProcessing(c, e)
|
2016-03-18 18:50:19 +00:00
|
|
|
case libcontainerd.StateRestart:
|
|
|
|
c.Lock()
|
|
|
|
defer c.Unlock()
|
|
|
|
c.Reset(false)
|
|
|
|
c.RestartCount++
|
|
|
|
c.SetRestarting(platformConstructExitStatus(e))
|
|
|
|
attributes := map[string]string{
|
|
|
|
"exitCode": strconv.Itoa(int(e.ExitCode)),
|
|
|
|
}
|
|
|
|
daemon.LogContainerEventWithAttributes(c, "die", attributes)
|
2016-04-18 09:48:13 +00:00
|
|
|
daemon.updateHealthMonitor(c)
|
2016-05-10 23:02:44 +00:00
|
|
|
return c.ToDisk()
|
2016-03-18 18:50:19 +00:00
|
|
|
case libcontainerd.StateExitProcess:
|
|
|
|
c.Lock()
|
|
|
|
defer c.Unlock()
|
|
|
|
if execConfig := c.ExecCommands.Get(e.ProcessID); execConfig != nil {
|
|
|
|
ec := int(e.ExitCode)
|
|
|
|
execConfig.ExitCode = &ec
|
|
|
|
execConfig.Running = false
|
|
|
|
execConfig.Wait()
|
|
|
|
if err := execConfig.CloseStreams(); err != nil {
|
|
|
|
logrus.Errorf("%s: %s", c.ID, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// remove the exec command from the container's store only and not the
|
|
|
|
// daemon's store so that the exec command can be inspected.
|
|
|
|
c.ExecCommands.Delete(execConfig.ID)
|
|
|
|
} else {
|
|
|
|
logrus.Warnf("Ignoring StateExitProcess for %v but no exec command found", e)
|
|
|
|
}
|
|
|
|
case libcontainerd.StateStart, libcontainerd.StateRestore:
|
2016-04-18 09:48:13 +00:00
|
|
|
// Container is already locked in this case
|
2016-03-18 18:50:19 +00:00
|
|
|
c.SetRunning(int(e.Pid), e.State == libcontainerd.StateStart)
|
|
|
|
c.HasBeenManuallyStopped = false
|
|
|
|
if err := c.ToDisk(); err != nil {
|
|
|
|
c.Reset(false)
|
|
|
|
return err
|
|
|
|
}
|
2016-04-18 09:48:13 +00:00
|
|
|
daemon.initHealthMonitor(c)
|
2016-04-07 03:38:12 +00:00
|
|
|
daemon.LogContainerEvent(c, "start")
|
2016-03-18 18:50:19 +00:00
|
|
|
case libcontainerd.StatePause:
|
2016-04-18 09:48:13 +00:00
|
|
|
// Container is already locked in this case
|
2016-03-18 18:50:19 +00:00
|
|
|
c.Paused = true
|
2016-04-18 09:48:13 +00:00
|
|
|
daemon.updateHealthMonitor(c)
|
2016-03-18 18:50:19 +00:00
|
|
|
daemon.LogContainerEvent(c, "pause")
|
|
|
|
case libcontainerd.StateResume:
|
2016-04-18 09:48:13 +00:00
|
|
|
// Container is already locked in this case
|
2016-03-18 18:50:19 +00:00
|
|
|
c.Paused = false
|
2016-04-18 09:48:13 +00:00
|
|
|
daemon.updateHealthMonitor(c)
|
2016-03-18 18:50:19 +00:00
|
|
|
daemon.LogContainerEvent(c, "unpause")
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// AttachStreams is called by libcontainerd to connect the stdio.
|
|
|
|
func (daemon *Daemon) AttachStreams(id string, iop libcontainerd.IOPipe) error {
|
2016-06-17 00:34:00 +00:00
|
|
|
var (
|
|
|
|
s *runconfig.StreamConfig
|
|
|
|
ec *exec.Config
|
|
|
|
)
|
|
|
|
|
2016-03-18 18:50:19 +00:00
|
|
|
c := daemon.containers.Get(id)
|
|
|
|
if c == nil {
|
2016-06-17 00:34:00 +00:00
|
|
|
var err error
|
|
|
|
ec, err = daemon.getExecConfig(id)
|
2016-03-18 18:50:19 +00:00
|
|
|
if err != nil {
|
|
|
|
return fmt.Errorf("no such exec/container: %s", id)
|
|
|
|
}
|
|
|
|
s = ec.StreamConfig
|
|
|
|
} else {
|
|
|
|
s = c.StreamConfig
|
|
|
|
if err := daemon.StartLogging(c); err != nil {
|
|
|
|
c.Reset(false)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-07-27 02:17:22 +00:00
|
|
|
copyFunc := func(w io.Writer, r io.Reader) {
|
|
|
|
s.Add(1)
|
|
|
|
go func() {
|
|
|
|
if _, err := io.Copy(w, r); err != nil {
|
|
|
|
logrus.Errorf("%v stream copy error: %v", id, err)
|
|
|
|
}
|
|
|
|
s.Done()
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
|
|
|
|
if iop.Stdout != nil {
|
|
|
|
copyFunc(s.Stdout(), iop.Stdout)
|
|
|
|
}
|
|
|
|
if iop.Stderr != nil {
|
|
|
|
copyFunc(s.Stderr(), iop.Stderr)
|
|
|
|
}
|
|
|
|
|
2016-03-18 18:50:19 +00:00
|
|
|
if stdin := s.Stdin(); stdin != nil {
|
|
|
|
if iop.Stdin != nil {
|
|
|
|
go func() {
|
|
|
|
io.Copy(iop.Stdin, stdin)
|
|
|
|
iop.Stdin.Close()
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
} else {
|
2016-06-17 00:34:00 +00:00
|
|
|
//TODO(swernli): On Windows, not closing stdin when no tty is requested by the exec Config
|
|
|
|
// results in a hang. We should re-evaluate generalizing this fix for all OSes if
|
|
|
|
// we can determine that is the right thing to do more generally.
|
|
|
|
if (c != nil && !c.Config.Tty) || (ec != nil && !ec.Tty && runtime.GOOS == "windows") {
|
2016-03-18 18:50:19 +00:00
|
|
|
// tty is enabled, so dont close containerd's iopipe stdin.
|
|
|
|
if iop.Stdin != nil {
|
|
|
|
iop.Stdin.Close()
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|