2018-05-23 19:15:21 +00:00
|
|
|
package supervisor // import "github.com/docker/docker/libcontainerd/supervisor"
|
2017-09-22 13:52:41 +00:00
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"fmt"
|
|
|
|
"io"
|
|
|
|
"io/ioutil"
|
|
|
|
"os"
|
|
|
|
"os/exec"
|
|
|
|
"path/filepath"
|
|
|
|
"strconv"
|
|
|
|
"strings"
|
|
|
|
"sync"
|
|
|
|
"time"
|
|
|
|
|
|
|
|
"github.com/BurntSushi/toml"
|
|
|
|
"github.com/containerd/containerd"
|
2018-10-18 19:37:23 +00:00
|
|
|
"github.com/containerd/containerd/services/server/config"
|
2017-09-22 13:52:41 +00:00
|
|
|
"github.com/docker/docker/pkg/system"
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
"github.com/sirupsen/logrus"
|
|
|
|
)
|
|
|
|
|
|
|
|
const (
|
|
|
|
maxConnectionRetryCount = 3
|
|
|
|
healthCheckTimeout = 3 * time.Second
|
|
|
|
shutdownTimeout = 15 * time.Second
|
2018-05-23 19:15:21 +00:00
|
|
|
startupTimeout = 15 * time.Second
|
2017-09-22 13:52:41 +00:00
|
|
|
configFile = "containerd.toml"
|
2018-09-21 22:58:34 +00:00
|
|
|
binaryName = "containerd"
|
|
|
|
pidFile = "containerd.pid"
|
2017-09-22 13:52:41 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type pluginConfigs struct {
|
|
|
|
Plugins map[string]interface{} `toml:"plugins"`
|
|
|
|
}
|
|
|
|
|
|
|
|
type remote struct {
|
|
|
|
sync.RWMutex
|
2018-10-18 19:37:23 +00:00
|
|
|
config.Config
|
2017-09-22 13:52:41 +00:00
|
|
|
|
|
|
|
daemonPid int
|
|
|
|
logger *logrus.Entry
|
|
|
|
|
2018-05-23 19:15:21 +00:00
|
|
|
daemonWaitCh chan struct{}
|
2018-09-04 19:04:35 +00:00
|
|
|
daemonStartCh chan error
|
2018-05-23 19:15:21 +00:00
|
|
|
daemonStopCh chan struct{}
|
2017-09-22 13:52:41 +00:00
|
|
|
|
|
|
|
rootDir string
|
|
|
|
stateDir string
|
|
|
|
pluginConfs pluginConfigs
|
|
|
|
}
|
|
|
|
|
2018-05-23 19:15:21 +00:00
|
|
|
// Daemon represents a running containerd daemon
|
|
|
|
type Daemon interface {
|
|
|
|
WaitTimeout(time.Duration) error
|
|
|
|
Address() string
|
|
|
|
}
|
|
|
|
|
|
|
|
// DaemonOpt allows to configure parameters of container daemons
|
|
|
|
type DaemonOpt func(c *remote) error
|
2017-09-22 13:52:41 +00:00
|
|
|
|
2018-05-23 19:15:21 +00:00
|
|
|
// Start starts a containerd daemon and monitors it
|
|
|
|
func Start(ctx context.Context, rootDir, stateDir string, opts ...DaemonOpt) (Daemon, error) {
|
2017-09-22 13:52:41 +00:00
|
|
|
r := &remote{
|
|
|
|
rootDir: rootDir,
|
|
|
|
stateDir: stateDir,
|
2018-10-18 19:37:23 +00:00
|
|
|
Config: config.Config{
|
2017-09-22 13:52:41 +00:00
|
|
|
Root: filepath.Join(rootDir, "daemon"),
|
|
|
|
State: filepath.Join(stateDir, "daemon"),
|
|
|
|
},
|
2018-05-23 19:15:21 +00:00
|
|
|
pluginConfs: pluginConfigs{make(map[string]interface{})},
|
|
|
|
daemonPid: -1,
|
|
|
|
logger: logrus.WithField("module", "libcontainerd"),
|
2018-09-04 19:04:35 +00:00
|
|
|
daemonStartCh: make(chan error, 1),
|
2018-05-23 19:15:21 +00:00
|
|
|
daemonStopCh: make(chan struct{}),
|
2017-09-22 13:52:41 +00:00
|
|
|
}
|
|
|
|
|
2018-05-23 19:15:21 +00:00
|
|
|
for _, opt := range opts {
|
|
|
|
if err := opt(r); err != nil {
|
|
|
|
return nil, err
|
2017-09-22 13:52:41 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
r.setDefaults()
|
|
|
|
|
2019-08-08 09:51:00 +00:00
|
|
|
if err := system.MkdirAll(stateDir, 0700); err != nil {
|
2018-05-23 19:15:21 +00:00
|
|
|
return nil, err
|
2017-09-22 13:52:41 +00:00
|
|
|
}
|
|
|
|
|
2018-05-23 19:15:21 +00:00
|
|
|
go r.monitorDaemon(ctx)
|
2017-09-22 13:52:41 +00:00
|
|
|
|
2019-01-09 18:24:03 +00:00
|
|
|
timeout := time.NewTimer(startupTimeout)
|
|
|
|
defer timeout.Stop()
|
|
|
|
|
2018-05-23 19:15:21 +00:00
|
|
|
select {
|
2019-01-09 18:24:03 +00:00
|
|
|
case <-timeout.C:
|
2018-05-23 19:15:21 +00:00
|
|
|
return nil, errors.New("timeout waiting for containerd to start")
|
2018-09-04 19:04:35 +00:00
|
|
|
case err := <-r.daemonStartCh:
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2017-09-22 13:52:41 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return r, nil
|
|
|
|
}
|
2018-05-23 19:15:21 +00:00
|
|
|
func (r *remote) WaitTimeout(d time.Duration) error {
|
2019-01-09 18:24:03 +00:00
|
|
|
timeout := time.NewTimer(d)
|
|
|
|
defer timeout.Stop()
|
|
|
|
|
2018-05-23 19:15:21 +00:00
|
|
|
select {
|
2019-01-09 18:24:03 +00:00
|
|
|
case <-timeout.C:
|
2018-05-23 19:15:21 +00:00
|
|
|
return errors.New("timeout waiting for containerd to stop")
|
|
|
|
case <-r.daemonStopCh:
|
2017-09-22 13:52:41 +00:00
|
|
|
}
|
|
|
|
|
2018-05-23 19:15:21 +00:00
|
|
|
return nil
|
2017-09-22 13:52:41 +00:00
|
|
|
}
|
|
|
|
|
2018-05-23 19:15:21 +00:00
|
|
|
func (r *remote) Address() string {
|
|
|
|
return r.GRPC.Address
|
2017-09-22 13:52:41 +00:00
|
|
|
}
|
|
|
|
func (r *remote) getContainerdPid() (int, error) {
|
|
|
|
pidFile := filepath.Join(r.stateDir, pidFile)
|
|
|
|
f, err := os.OpenFile(pidFile, os.O_RDWR, 0600)
|
|
|
|
if err != nil {
|
|
|
|
if os.IsNotExist(err) {
|
|
|
|
return -1, nil
|
|
|
|
}
|
|
|
|
return -1, err
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
|
|
|
|
b := make([]byte, 8)
|
|
|
|
n, err := f.Read(b)
|
|
|
|
if err != nil && err != io.EOF {
|
|
|
|
return -1, err
|
|
|
|
}
|
|
|
|
|
|
|
|
if n > 0 {
|
|
|
|
pid, err := strconv.ParseUint(string(b[:n]), 10, 64)
|
|
|
|
if err != nil {
|
|
|
|
return -1, err
|
|
|
|
}
|
|
|
|
if system.IsProcessAlive(int(pid)) {
|
|
|
|
return int(pid), nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return -1, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *remote) getContainerdConfig() (string, error) {
|
|
|
|
path := filepath.Join(r.stateDir, configFile)
|
|
|
|
f, err := os.OpenFile(path, os.O_CREATE|os.O_TRUNC|os.O_WRONLY, 0600)
|
|
|
|
if err != nil {
|
|
|
|
return "", errors.Wrapf(err, "failed to open containerd config file at %s", path)
|
|
|
|
}
|
|
|
|
defer f.Close()
|
|
|
|
|
|
|
|
enc := toml.NewEncoder(f)
|
|
|
|
if err = enc.Encode(r.Config); err != nil {
|
|
|
|
return "", errors.Wrapf(err, "failed to encode general config")
|
|
|
|
}
|
|
|
|
if err = enc.Encode(r.pluginConfs); err != nil {
|
|
|
|
return "", errors.Wrapf(err, "failed to encode plugin configs")
|
|
|
|
}
|
|
|
|
|
|
|
|
return path, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (r *remote) startContainerd() error {
|
|
|
|
pid, err := r.getContainerdPid()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
if pid != -1 {
|
|
|
|
r.daemonPid = pid
|
|
|
|
logrus.WithField("pid", pid).
|
|
|
|
Infof("libcontainerd: %s is still running", binaryName)
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
configFile, err := r.getContainerdConfig()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
args := []string{"--config", configFile}
|
2018-07-09 12:16:35 +00:00
|
|
|
|
|
|
|
if r.Debug.Level != "" {
|
|
|
|
args = append(args, "--log-level", r.Debug.Level)
|
|
|
|
}
|
|
|
|
|
2017-09-22 13:52:41 +00:00
|
|
|
cmd := exec.Command(binaryName, args...)
|
|
|
|
// redirect containerd logs to docker logs
|
|
|
|
cmd.Stdout = os.Stdout
|
|
|
|
cmd.Stderr = os.Stderr
|
|
|
|
cmd.SysProcAttr = containerdSysProcAttr()
|
|
|
|
// clear the NOTIFY_SOCKET from the env when starting containerd
|
|
|
|
cmd.Env = nil
|
|
|
|
for _, e := range os.Environ() {
|
|
|
|
if !strings.HasPrefix(e, "NOTIFY_SOCKET") {
|
|
|
|
cmd.Env = append(cmd.Env, e)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if err := cmd.Start(); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
r.daemonWaitCh = make(chan struct{})
|
|
|
|
go func() {
|
|
|
|
// Reap our child when needed
|
|
|
|
if err := cmd.Wait(); err != nil {
|
|
|
|
r.logger.WithError(err).Errorf("containerd did not exit successfully")
|
|
|
|
}
|
|
|
|
close(r.daemonWaitCh)
|
|
|
|
}()
|
|
|
|
|
|
|
|
r.daemonPid = cmd.Process.Pid
|
|
|
|
|
|
|
|
err = ioutil.WriteFile(filepath.Join(r.stateDir, pidFile), []byte(fmt.Sprintf("%d", r.daemonPid)), 0660)
|
|
|
|
if err != nil {
|
|
|
|
system.KillProcess(r.daemonPid)
|
|
|
|
return errors.Wrap(err, "libcontainerd: failed to save daemon pid to disk")
|
|
|
|
}
|
|
|
|
|
|
|
|
logrus.WithField("pid", r.daemonPid).
|
|
|
|
Infof("libcontainerd: started new %s process", binaryName)
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2018-05-23 19:15:21 +00:00
|
|
|
func (r *remote) monitorDaemon(ctx context.Context) {
|
|
|
|
var (
|
|
|
|
transientFailureCount = 0
|
|
|
|
client *containerd.Client
|
|
|
|
err error
|
2019-01-09 18:24:03 +00:00
|
|
|
delay time.Duration
|
|
|
|
timer = time.NewTimer(0)
|
2018-05-23 19:15:21 +00:00
|
|
|
started bool
|
|
|
|
)
|
|
|
|
|
|
|
|
defer func() {
|
|
|
|
if r.daemonPid != -1 {
|
|
|
|
r.stopDaemon()
|
|
|
|
}
|
|
|
|
|
|
|
|
// cleanup some files
|
|
|
|
os.Remove(filepath.Join(r.stateDir, pidFile))
|
|
|
|
|
|
|
|
r.platformCleanup()
|
|
|
|
|
|
|
|
close(r.daemonStopCh)
|
2019-01-09 18:24:03 +00:00
|
|
|
timer.Stop()
|
2018-05-23 19:15:21 +00:00
|
|
|
}()
|
2017-09-22 13:52:41 +00:00
|
|
|
|
2019-01-09 18:24:03 +00:00
|
|
|
// ensure no races on sending to timer.C even though there is a 0 duration.
|
|
|
|
if !timer.Stop() {
|
|
|
|
<-timer.C
|
|
|
|
}
|
|
|
|
|
2017-09-22 13:52:41 +00:00
|
|
|
for {
|
2019-01-09 18:24:03 +00:00
|
|
|
timer.Reset(delay)
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
r.logger.Info("stopping healthcheck following graceful shutdown")
|
|
|
|
if client != nil {
|
|
|
|
client.Close()
|
2018-05-23 19:15:21 +00:00
|
|
|
}
|
2019-01-09 18:24:03 +00:00
|
|
|
return
|
|
|
|
case <-timer.C:
|
2018-05-23 19:15:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if r.daemonPid == -1 {
|
|
|
|
if r.daemonWaitCh != nil {
|
2018-09-04 18:00:28 +00:00
|
|
|
select {
|
|
|
|
case <-ctx.Done():
|
|
|
|
r.logger.Info("stopping containerd startup following graceful shutdown")
|
|
|
|
return
|
|
|
|
case <-r.daemonWaitCh:
|
|
|
|
}
|
2018-05-23 19:15:21 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
os.RemoveAll(r.GRPC.Address)
|
|
|
|
if err := r.startContainerd(); err != nil {
|
2018-09-04 19:04:35 +00:00
|
|
|
if !started {
|
|
|
|
r.daemonStartCh <- err
|
|
|
|
return
|
|
|
|
}
|
|
|
|
r.logger.WithError(err).Error("failed restarting containerd")
|
2019-01-09 18:24:03 +00:00
|
|
|
delay = 50 * time.Millisecond
|
2018-05-23 19:15:21 +00:00
|
|
|
continue
|
|
|
|
}
|
|
|
|
|
2018-08-22 22:32:39 +00:00
|
|
|
client, err = containerd.New(r.GRPC.Address, containerd.WithTimeout(60*time.Second))
|
2018-05-23 19:15:21 +00:00
|
|
|
if err != nil {
|
|
|
|
r.logger.WithError(err).Error("failed connecting to containerd")
|
2019-01-09 18:24:03 +00:00
|
|
|
delay = 100 * time.Millisecond
|
2018-05-23 19:15:21 +00:00
|
|
|
continue
|
|
|
|
}
|
2019-10-16 19:23:10 +00:00
|
|
|
logrus.WithField("address", r.GRPC.Address).Debug("Created containerd monitoring client")
|
2018-03-13 16:21:56 +00:00
|
|
|
}
|
|
|
|
|
2018-09-04 18:00:28 +00:00
|
|
|
if client != nil {
|
|
|
|
tctx, cancel := context.WithTimeout(ctx, healthCheckTimeout)
|
|
|
|
_, err := client.IsServing(tctx)
|
|
|
|
cancel()
|
|
|
|
if err == nil {
|
|
|
|
if !started {
|
|
|
|
close(r.daemonStartCh)
|
|
|
|
started = true
|
|
|
|
}
|
|
|
|
|
|
|
|
transientFailureCount = 0
|
2019-10-16 19:23:10 +00:00
|
|
|
|
|
|
|
select {
|
|
|
|
case <-r.daemonWaitCh:
|
|
|
|
case <-ctx.Done():
|
|
|
|
}
|
|
|
|
|
|
|
|
// Set a small delay in case there is a recurring failure (or bug in this code)
|
|
|
|
// to ensure we don't end up in a super tight loop.
|
2019-01-09 18:24:03 +00:00
|
|
|
delay = 500 * time.Millisecond
|
2018-09-04 18:00:28 +00:00
|
|
|
continue
|
2018-05-23 19:15:21 +00:00
|
|
|
}
|
|
|
|
|
2018-09-04 18:00:28 +00:00
|
|
|
r.logger.WithError(err).WithField("binary", binaryName).Debug("daemon is not responding")
|
2017-09-22 13:52:41 +00:00
|
|
|
|
2018-09-04 18:00:28 +00:00
|
|
|
transientFailureCount++
|
|
|
|
if transientFailureCount < maxConnectionRetryCount || system.IsProcessAlive(r.daemonPid) {
|
2019-01-09 18:24:03 +00:00
|
|
|
delay = time.Duration(transientFailureCount) * 200 * time.Millisecond
|
2018-09-04 18:00:28 +00:00
|
|
|
continue
|
|
|
|
}
|
2019-01-30 13:41:54 +00:00
|
|
|
client.Close()
|
|
|
|
client = nil
|
2018-01-31 22:32:40 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if system.IsProcessAlive(r.daemonPid) {
|
|
|
|
r.logger.WithField("pid", r.daemonPid).Info("killing and restarting containerd")
|
2018-05-23 19:15:21 +00:00
|
|
|
r.killDaemon()
|
2018-01-31 22:32:40 +00:00
|
|
|
}
|
|
|
|
|
2018-05-23 19:15:21 +00:00
|
|
|
r.daemonPid = -1
|
2019-01-09 18:24:03 +00:00
|
|
|
delay = 0
|
2018-05-23 19:15:21 +00:00
|
|
|
transientFailureCount = 0
|
2017-09-22 13:52:41 +00:00
|
|
|
}
|
|
|
|
}
|