2018-02-05 21:05:59 +00:00
|
|
|
package container // import "github.com/docker/docker/container"
|
2015-11-12 19:55:17 +00:00
|
|
|
|
|
|
|
import (
|
2016-01-04 15:58:20 +00:00
|
|
|
"fmt"
|
2016-01-27 21:03:09 +00:00
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
|
2017-02-22 17:11:10 +00:00
|
|
|
"github.com/docker/docker/api/types"
|
2016-09-06 18:18:12 +00:00
|
|
|
containertypes "github.com/docker/docker/api/types/container"
|
2018-01-17 15:49:58 +00:00
|
|
|
swarmtypes "github.com/docker/docker/api/types/swarm"
|
2016-12-01 16:11:15 +00:00
|
|
|
"github.com/docker/docker/pkg/system"
|
2015-11-12 19:55:17 +00:00
|
|
|
)
|
|
|
|
|
2017-04-11 17:34:19 +00:00
|
|
|
const (
|
2021-05-01 19:41:34 +00:00
|
|
|
containerConfigMountPath = `C:\`
|
2016-12-01 16:11:15 +00:00
|
|
|
containerSecretMountPath = `C:\ProgramData\Docker\secrets`
|
|
|
|
containerInternalSecretMountPath = `C:\ProgramData\Docker\internal\secrets`
|
2017-05-11 18:55:03 +00:00
|
|
|
containerInternalConfigsDirPath = `C:\ProgramData\Docker\internal\configs`
|
2017-10-12 23:31:33 +00:00
|
|
|
|
pkg/signal: remove DefaultStopSignal const
This const was previously living in pkg/signal, but with that package
being moved to its own module, it didn't make much sense to put docker's
defaults in a generic module.
The const from the "signal" package is currenlty used *both* by the CLI
and the daemon as a default value when creating containers. This put up
some questions:
a. should the default be non-exported, and private to the container
package? After all, it's a _default_ (so should be used if _NOT_ set).
b. should the client actually setting a default, or instead just omit
the value, unless specified by the user? having the client set a
default also means that the daemon cannot change the default value
because the client (or older clients) will override it.
c. consider defaults from the client and defaults of the daemon to be
separate things, and create a default const in the CLI.
This patch implements option "a" (option "b" will be done separately,
as it involves the CLI code). This still leaves "c" open as an option,
if the CLI wants to set its own default.
Unfortunately, this change means we'll have to drop the alias for the
deprecated pkg/signal.DefaultStopSignal const, but a comment was left
instead, which can assist consumers of the const to find why it's no
longer there (a search showed the Docker CLI as the only consumer though).
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2021-08-06 16:50:56 +00:00
|
|
|
// defaultStopSignal is the default syscall signal used to stop a container.
|
|
|
|
defaultStopSignal = "SIGTERM"
|
|
|
|
|
2021-08-06 08:24:09 +00:00
|
|
|
// defaultStopTimeout is the timeout (in seconds) for the shutdown call on a container
|
|
|
|
defaultStopTimeout = 30
|
2017-04-11 17:34:19 +00:00
|
|
|
)
|
|
|
|
|
Implement none, private, and shareable ipc modes
Since the commit d88fe447df0e8 ("Add support for sharing /dev/shm/ and
/dev/mqueue between containers") container's /dev/shm is mounted on the
host first, then bind-mounted inside the container. This is done that
way in order to be able to share this container's IPC namespace
(and the /dev/shm mount point) with another container.
Unfortunately, this functionality breaks container checkpoint/restore
(even if IPC is not shared). Since /dev/shm is an external mount, its
contents is not saved by `criu checkpoint`, and so upon restore any
application that tries to access data under /dev/shm is severily
disappointed (which usually results in a fatal crash).
This commit solves the issue by introducing new IPC modes for containers
(in addition to 'host' and 'container:ID'). The new modes are:
- 'shareable': enables sharing this container's IPC with others
(this used to be the implicit default);
- 'private': disables sharing this container's IPC.
In 'private' mode, container's /dev/shm is truly mounted inside the
container, without any bind-mounting from the host, which solves the
issue.
While at it, let's also implement 'none' mode. The motivation, as
eloquently put by Justin Cormack, is:
> I wondered a while back about having a none shm mode, as currently it is
> not possible to have a totally unwriteable container as there is always
> a /dev/shm writeable mount. It is a bit of a niche case (and clearly
> should never be allowed to be daemon default) but it would be trivial to
> add now so maybe we should...
...so here's yet yet another mode:
- 'none': no /dev/shm mount inside the container (though it still
has its own private IPC namespace).
Now, to ultimately solve the abovementioned checkpoint/restore issue, we'd
need to make 'private' the default mode, but unfortunately it breaks the
backward compatibility. So, let's make the default container IPC mode
per-daemon configurable (with the built-in default set to 'shareable'
for now). The default can be changed either via a daemon CLI option
(--default-shm-mode) or a daemon.json configuration file parameter
of the same name.
Note one can only set either 'shareable' or 'private' IPC modes as a
daemon default (i.e. in this context 'host', 'container', or 'none'
do not make much sense).
Some other changes this patch introduces are:
1. A mount for /dev/shm is added to default OCI Linux spec.
2. IpcMode.Valid() is simplified to remove duplicated code that parsed
'container:ID' form. Note the old version used to check that ID does
not contain a semicolon -- this is no longer the case (tests are
modified accordingly). The motivation is we should either do a
proper check for container ID validity, or don't check it at all
(since it is checked in other places anyway). I chose the latter.
3. IpcMode.Container() is modified to not return container ID if the
mode value does not start with "container:", unifying the check to
be the same as in IpcMode.IsContainer().
3. IPC mode unit tests (runconfig/hostconfig_test.go) are modified
to add checks for newly added values.
[v2: addressed review at https://github.com/moby/moby/pull/34087#pullrequestreview-51345997]
[v3: addressed review at https://github.com/moby/moby/pull/34087#pullrequestreview-53902833]
[v4: addressed the case of upgrading from older daemon, in this case
container.HostConfig.IpcMode is unset and this is valid]
[v5: document old and new IpcMode values in api/swagger.yaml]
[v6: add the 'none' mode, changelog entry to docs/api/version-history.md]
Signed-off-by: Kir Kolyshkin <kolyshkin@gmail.com>
2017-06-27 21:58:50 +00:00
|
|
|
// UnmountIpcMount unmounts Ipc related mounts.
|
2015-11-12 19:55:17 +00:00
|
|
|
// This is a NOOP on windows.
|
2018-10-25 00:29:03 +00:00
|
|
|
func (container *Container) UnmountIpcMount() error {
|
Implement none, private, and shareable ipc modes
Since the commit d88fe447df0e8 ("Add support for sharing /dev/shm/ and
/dev/mqueue between containers") container's /dev/shm is mounted on the
host first, then bind-mounted inside the container. This is done that
way in order to be able to share this container's IPC namespace
(and the /dev/shm mount point) with another container.
Unfortunately, this functionality breaks container checkpoint/restore
(even if IPC is not shared). Since /dev/shm is an external mount, its
contents is not saved by `criu checkpoint`, and so upon restore any
application that tries to access data under /dev/shm is severily
disappointed (which usually results in a fatal crash).
This commit solves the issue by introducing new IPC modes for containers
(in addition to 'host' and 'container:ID'). The new modes are:
- 'shareable': enables sharing this container's IPC with others
(this used to be the implicit default);
- 'private': disables sharing this container's IPC.
In 'private' mode, container's /dev/shm is truly mounted inside the
container, without any bind-mounting from the host, which solves the
issue.
While at it, let's also implement 'none' mode. The motivation, as
eloquently put by Justin Cormack, is:
> I wondered a while back about having a none shm mode, as currently it is
> not possible to have a totally unwriteable container as there is always
> a /dev/shm writeable mount. It is a bit of a niche case (and clearly
> should never be allowed to be daemon default) but it would be trivial to
> add now so maybe we should...
...so here's yet yet another mode:
- 'none': no /dev/shm mount inside the container (though it still
has its own private IPC namespace).
Now, to ultimately solve the abovementioned checkpoint/restore issue, we'd
need to make 'private' the default mode, but unfortunately it breaks the
backward compatibility. So, let's make the default container IPC mode
per-daemon configurable (with the built-in default set to 'shareable'
for now). The default can be changed either via a daemon CLI option
(--default-shm-mode) or a daemon.json configuration file parameter
of the same name.
Note one can only set either 'shareable' or 'private' IPC modes as a
daemon default (i.e. in this context 'host', 'container', or 'none'
do not make much sense).
Some other changes this patch introduces are:
1. A mount for /dev/shm is added to default OCI Linux spec.
2. IpcMode.Valid() is simplified to remove duplicated code that parsed
'container:ID' form. Note the old version used to check that ID does
not contain a semicolon -- this is no longer the case (tests are
modified accordingly). The motivation is we should either do a
proper check for container ID validity, or don't check it at all
(since it is checked in other places anyway). I chose the latter.
3. IpcMode.Container() is modified to not return container ID if the
mode value does not start with "container:", unifying the check to
be the same as in IpcMode.IsContainer().
3. IPC mode unit tests (runconfig/hostconfig_test.go) are modified
to add checks for newly added values.
[v2: addressed review at https://github.com/moby/moby/pull/34087#pullrequestreview-51345997]
[v3: addressed review at https://github.com/moby/moby/pull/34087#pullrequestreview-53902833]
[v4: addressed the case of upgrading from older daemon, in this case
container.HostConfig.IpcMode is unset and this is valid]
[v5: document old and new IpcMode values in api/swagger.yaml]
[v6: add the 'none' mode, changelog entry to docs/api/version-history.md]
Signed-off-by: Kir Kolyshkin <kolyshkin@gmail.com>
2017-06-27 21:58:50 +00:00
|
|
|
return nil
|
2015-11-12 19:55:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// IpcMounts returns the list of Ipc related mounts.
|
2016-03-18 18:53:27 +00:00
|
|
|
func (container *Container) IpcMounts() []Mount {
|
2015-11-12 19:55:17 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-12-01 16:11:15 +00:00
|
|
|
// CreateSecretSymlinks creates symlinks to files in the secret mount.
|
|
|
|
func (container *Container) CreateSecretSymlinks() error {
|
|
|
|
for _, r := range container.SecretReferences {
|
|
|
|
if r.File == nil {
|
|
|
|
continue
|
|
|
|
}
|
|
|
|
resolvedPath, _, err := container.ResolvePath(getSecretTargetPath(r))
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-08-08 09:51:00 +00:00
|
|
|
if err := system.MkdirAll(filepath.Dir(resolvedPath), 0); err != nil {
|
2016-12-01 16:11:15 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := os.Symlink(filepath.Join(containerInternalSecretMountPath, r.SecretID), resolvedPath); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-10-27 20:51:13 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-12-01 16:11:15 +00:00
|
|
|
// SecretMounts returns the mount for the secret path.
|
|
|
|
// All secrets are stored in a single mount on Windows. Target symlinks are
|
|
|
|
// created for each secret, pointing to the files in this mount.
|
2017-12-18 21:02:23 +00:00
|
|
|
func (container *Container) SecretMounts() ([]Mount, error) {
|
2016-12-01 16:11:15 +00:00
|
|
|
var mounts []Mount
|
|
|
|
if len(container.SecretReferences) > 0 {
|
2017-12-18 21:02:23 +00:00
|
|
|
src, err := container.SecretMountPath()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2016-12-01 16:11:15 +00:00
|
|
|
mounts = append(mounts, Mount{
|
2017-12-18 21:02:23 +00:00
|
|
|
Source: src,
|
2016-12-01 16:11:15 +00:00
|
|
|
Destination: containerInternalSecretMountPath,
|
|
|
|
Writable: false,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2017-12-18 21:02:23 +00:00
|
|
|
return mounts, nil
|
2016-12-01 16:11:15 +00:00
|
|
|
}
|
|
|
|
|
2016-10-27 20:51:13 +00:00
|
|
|
// UnmountSecrets unmounts the fs for secrets
|
|
|
|
func (container *Container) UnmountSecrets() error {
|
2017-12-18 21:02:23 +00:00
|
|
|
p, err := container.SecretMountPath()
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
return os.RemoveAll(p)
|
2016-10-27 20:51:13 +00:00
|
|
|
}
|
|
|
|
|
2017-05-11 18:55:03 +00:00
|
|
|
// CreateConfigSymlinks creates symlinks to files in the config mount.
|
|
|
|
func (container *Container) CreateConfigSymlinks() error {
|
|
|
|
for _, configRef := range container.ConfigReferences {
|
|
|
|
if configRef.File == nil {
|
|
|
|
continue
|
|
|
|
}
|
2021-05-01 19:41:34 +00:00
|
|
|
resolvedPath, _, err := container.ResolvePath(getConfigTargetPath(configRef))
|
2017-05-11 18:55:03 +00:00
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-08-08 09:51:00 +00:00
|
|
|
if err := system.MkdirAll(filepath.Dir(resolvedPath), 0); err != nil {
|
2017-05-11 18:55:03 +00:00
|
|
|
return err
|
|
|
|
}
|
|
|
|
if err := os.Symlink(filepath.Join(containerInternalConfigsDirPath, configRef.ConfigID), resolvedPath); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// ConfigMounts returns the mount for configs.
|
2018-01-17 15:49:58 +00:00
|
|
|
// TODO: Right now Windows doesn't really have a "secure" storage for secrets,
|
|
|
|
// however some configs may contain secrets. Once secure storage is worked out,
|
|
|
|
// configs and secret handling should be merged.
|
|
|
|
func (container *Container) ConfigMounts() []Mount {
|
2017-05-11 18:55:03 +00:00
|
|
|
var mounts []Mount
|
|
|
|
if len(container.ConfigReferences) > 0 {
|
|
|
|
mounts = append(mounts, Mount{
|
2018-01-17 15:49:58 +00:00
|
|
|
Source: container.ConfigsDirPath(),
|
2017-05-11 18:55:03 +00:00
|
|
|
Destination: containerInternalConfigsDirPath,
|
|
|
|
Writable: false,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2018-01-17 15:49:58 +00:00
|
|
|
return mounts
|
2017-05-11 18:55:03 +00:00
|
|
|
}
|
|
|
|
|
2016-10-03 17:53:06 +00:00
|
|
|
// DetachAndUnmount unmounts all volumes.
|
|
|
|
// On Windows it only delegates to `UnmountVolumes` since there is nothing to
|
|
|
|
// force unmount.
|
|
|
|
func (container *Container) DetachAndUnmount(volumeEventLog func(name, action string, attributes map[string]string)) error {
|
|
|
|
return container.UnmountVolumes(volumeEventLog)
|
2015-11-12 19:55:17 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// TmpfsMounts returns the list of tmpfs mounts
|
2016-09-22 20:14:15 +00:00
|
|
|
func (container *Container) TmpfsMounts() ([]Mount, error) {
|
2016-06-06 09:57:11 +00:00
|
|
|
var mounts []Mount
|
2016-09-22 20:14:15 +00:00
|
|
|
return mounts, nil
|
2015-11-12 19:55:17 +00:00
|
|
|
}
|
|
|
|
|
2017-02-22 22:02:20 +00:00
|
|
|
// UpdateContainer updates configuration of a container. Callers must hold a Lock on the Container.
|
2016-03-01 18:23:43 +00:00
|
|
|
func (container *Container) UpdateContainer(hostConfig *containertypes.HostConfig) error {
|
2016-01-04 15:58:20 +00:00
|
|
|
resources := hostConfig.Resources
|
2017-03-07 02:29:27 +00:00
|
|
|
if resources.CPUShares != 0 ||
|
|
|
|
resources.Memory != 0 ||
|
|
|
|
resources.NanoCPUs != 0 ||
|
|
|
|
resources.CgroupParent != "" ||
|
|
|
|
resources.BlkioWeight != 0 ||
|
|
|
|
len(resources.BlkioWeightDevice) != 0 ||
|
|
|
|
len(resources.BlkioDeviceReadBps) != 0 ||
|
|
|
|
len(resources.BlkioDeviceWriteBps) != 0 ||
|
|
|
|
len(resources.BlkioDeviceReadIOps) != 0 ||
|
|
|
|
len(resources.BlkioDeviceWriteIOps) != 0 ||
|
|
|
|
resources.CPUPeriod != 0 ||
|
|
|
|
resources.CPUQuota != 0 ||
|
|
|
|
resources.CPURealtimePeriod != 0 ||
|
|
|
|
resources.CPURealtimeRuntime != 0 ||
|
|
|
|
resources.CpusetCpus != "" ||
|
|
|
|
resources.CpusetMems != "" ||
|
|
|
|
len(resources.Devices) != 0 ||
|
|
|
|
len(resources.DeviceCgroupRules) != 0 ||
|
|
|
|
resources.KernelMemory != 0 ||
|
|
|
|
resources.MemoryReservation != 0 ||
|
|
|
|
resources.MemorySwap != 0 ||
|
|
|
|
resources.MemorySwappiness != nil ||
|
|
|
|
resources.OomKillDisable != nil ||
|
2017-04-11 11:28:13 +00:00
|
|
|
(resources.PidsLimit != nil && *resources.PidsLimit != 0) ||
|
2017-03-07 02:29:27 +00:00
|
|
|
len(resources.Ulimits) != 0 ||
|
|
|
|
resources.CPUCount != 0 ||
|
|
|
|
resources.CPUPercent != 0 ||
|
|
|
|
resources.IOMaximumIOps != 0 ||
|
|
|
|
resources.IOMaximumBandwidth != 0 {
|
|
|
|
return fmt.Errorf("resource updating isn't supported on Windows")
|
2016-01-04 15:58:20 +00:00
|
|
|
}
|
|
|
|
// update HostConfig of container
|
|
|
|
if hostConfig.RestartPolicy.Name != "" {
|
2016-08-15 08:38:47 +00:00
|
|
|
if container.HostConfig.AutoRemove && !hostConfig.RestartPolicy.IsNone() {
|
|
|
|
return fmt.Errorf("Restart policy cannot be updated because AutoRemove is enabled for the container")
|
|
|
|
}
|
2016-01-04 15:58:20 +00:00
|
|
|
container.HostConfig.RestartPolicy = hostConfig.RestartPolicy
|
|
|
|
}
|
2015-12-28 11:19:26 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2016-03-10 04:33:21 +00:00
|
|
|
// BuildHostnameFile writes the container's hostname file.
|
|
|
|
func (container *Container) BuildHostnameFile() error {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2017-02-22 17:11:10 +00:00
|
|
|
// GetMountPoints gives a platform specific transformation to types.MountPoint. Callers must hold a Container lock.
|
|
|
|
func (container *Container) GetMountPoints() []types.MountPoint {
|
|
|
|
mountPoints := make([]types.MountPoint, 0, len(container.MountPoints))
|
|
|
|
for _, m := range container.MountPoints {
|
|
|
|
mountPoints = append(mountPoints, types.MountPoint{
|
|
|
|
Type: m.Type,
|
|
|
|
Name: m.Name,
|
|
|
|
Source: m.Path(),
|
|
|
|
Destination: m.Destination,
|
|
|
|
Driver: m.Driver,
|
|
|
|
RW: m.RW,
|
|
|
|
})
|
|
|
|
}
|
|
|
|
return mountPoints
|
|
|
|
}
|
2018-01-17 15:49:58 +00:00
|
|
|
|
|
|
|
func (container *Container) ConfigsDirPath() string {
|
|
|
|
return filepath.Join(container.Root, "configs")
|
|
|
|
}
|
|
|
|
|
|
|
|
// ConfigFilePath returns the path to the on-disk location of a config.
|
2019-08-09 12:51:11 +00:00
|
|
|
func (container *Container) ConfigFilePath(configRef swarmtypes.ConfigReference) (string, error) {
|
|
|
|
return filepath.Join(container.ConfigsDirPath(), configRef.ConfigID), nil
|
2018-01-17 15:49:58 +00:00
|
|
|
}
|