2013-01-18 19:13:39 -05:00
package docker
import (
"container/list"
"fmt"
2013-03-22 05:19:39 -04:00
"github.com/dotcloud/docker/auth"
2013-03-21 03:25:00 -04:00
"io"
2013-01-18 19:13:39 -05:00
"io/ioutil"
2013-04-18 23:47:24 -04:00
"log"
2013-01-18 19:13:39 -05:00
"os"
2013-03-31 20:40:39 -04:00
"os/exec"
2013-01-18 19:13:39 -05:00
"path"
2013-01-29 15:15:39 -05:00
"sort"
2013-03-31 20:40:39 -04:00
"strings"
2013-03-21 03:25:00 -04:00
"time"
2013-01-18 19:13:39 -05:00
)
2013-04-18 23:55:41 -04:00
type Capabilities struct {
MemoryLimit bool
SwapLimit bool
}
2013-03-21 03:41:15 -04:00
type Runtime struct {
2013-02-28 14:52:07 -05:00
root string
repository string
containers * list . List
networkManager * NetworkManager
2013-03-21 20:47:23 -04:00
graph * Graph
repositories * TagStore
2013-03-22 05:19:39 -04:00
authConfig * auth . AuthConfig
2013-03-31 05:02:01 -04:00
idIndex * TruncIndex
2013-04-18 23:55:41 -04:00
capabilities * Capabilities
2013-04-18 23:47:24 -04:00
kernelVersion * KernelVersionInfo
2013-04-24 22:01:23 -04:00
autoRestart bool
2013-03-21 03:25:00 -04:00
}
var sysInitPath string
func init ( ) {
sysInitPath = SelfPath ( )
2013-01-18 19:13:39 -05:00
}
2013-03-21 03:41:15 -04:00
func ( runtime * Runtime ) List ( ) [ ] * Container {
2013-01-29 15:15:39 -05:00
containers := new ( History )
2013-03-21 03:41:15 -04:00
for e := runtime . containers . Front ( ) ; e != nil ; e = e . Next ( ) {
2013-01-29 15:15:39 -05:00
containers . Add ( e . Value . ( * Container ) )
2013-01-29 06:24:31 -05:00
}
2013-01-29 15:15:39 -05:00
return * containers
2013-01-18 19:13:39 -05:00
}
2013-03-21 03:41:15 -04:00
func ( runtime * Runtime ) getContainerElement ( id string ) * list . Element {
for e := runtime . containers . Front ( ) ; e != nil ; e = e . Next ( ) {
2013-01-18 19:13:39 -05:00
container := e . Value . ( * Container )
2013-01-21 21:39:52 -05:00
if container . Id == id {
2013-01-18 19:13:39 -05:00
return e
}
}
return nil
}
2013-03-31 05:02:01 -04:00
func ( runtime * Runtime ) Get ( name string ) * Container {
id , err := runtime . idIndex . Get ( name )
if err != nil {
return nil
}
2013-03-21 03:41:15 -04:00
e := runtime . getContainerElement ( id )
2013-01-18 19:13:39 -05:00
if e == nil {
return nil
}
return e . Value . ( * Container )
}
2013-03-21 03:41:15 -04:00
func ( runtime * Runtime ) Exists ( id string ) bool {
return runtime . Get ( id ) != nil
2013-01-18 19:13:39 -05:00
}
2013-03-21 03:41:15 -04:00
func ( runtime * Runtime ) containerRoot ( id string ) string {
return path . Join ( runtime . repository , id )
2013-03-21 03:25:00 -04:00
}
2013-03-23 15:39:09 -04:00
func ( runtime * Runtime ) Create ( config * Config ) ( * Container , error ) {
2013-03-21 22:01:55 -04:00
// Lookup image
2013-03-23 15:39:09 -04:00
img , err := runtime . repositories . LookupImage ( config . Image )
2013-03-21 22:01:55 -04:00
if err != nil {
return nil , err
}
2013-03-26 16:14:44 -04:00
// Generate id
id := GenerateId ( )
// Generate default hostname
2013-03-31 05:02:01 -04:00
// FIXME: the lxc template no longer needs to set a default hostname
2013-03-26 16:14:44 -04:00
if config . Hostname == "" {
config . Hostname = id [ : 12 ]
}
2013-04-10 21:23:34 -04:00
2013-03-21 03:25:00 -04:00
container := & Container {
// FIXME: we should generate the ID here instead of receiving it as an argument
2013-03-26 16:14:44 -04:00
Id : id ,
2013-03-23 15:16:58 -04:00
Created : time . Now ( ) ,
Path : config . Cmd [ 0 ] ,
Args : config . Cmd [ 1 : ] , //FIXME: de-duplicate from config
Config : config ,
Image : img . Id , // Always use the resolved image id
2013-03-21 03:25:00 -04:00
NetworkSettings : & NetworkSettings { } ,
// FIXME: do we need to store this in the container?
SysInitPath : sysInitPath ,
}
2013-03-21 03:41:15 -04:00
container . root = runtime . containerRoot ( container . Id )
2013-03-21 03:25:00 -04:00
// Step 1: create the container directory.
// This doubles as a barrier to avoid race conditions.
if err := os . Mkdir ( container . root , 0700 ) ; err != nil {
return nil , err
}
2013-04-10 22:02:23 -04:00
// If custom dns exists, then create a resolv.conf for the container
if len ( config . Dns ) > 0 {
container . ResolvConfPath = path . Join ( container . root , "resolv.conf" )
f , err := os . Create ( container . ResolvConfPath )
if err != nil {
return nil , err
}
defer f . Close ( )
for _ , dns := range config . Dns {
if _ , err := f . Write ( [ ] byte ( "nameserver " + dns + "\n" ) ) ; err != nil {
return nil , err
}
}
} else {
container . ResolvConfPath = "/etc/resolv.conf"
}
2013-03-21 03:25:00 -04:00
// Step 2: save the container json
if err := container . ToDisk ( ) ; err != nil {
return nil , err
}
// Step 3: register the container
2013-03-21 03:41:15 -04:00
if err := runtime . Register ( container ) ; err != nil {
2013-03-21 03:25:00 -04:00
return nil , err
2013-01-18 19:13:39 -05:00
}
2013-03-21 03:25:00 -04:00
return container , nil
}
2013-03-11 08:42:36 -04:00
2013-03-21 03:41:15 -04:00
func ( runtime * Runtime ) Load ( id string ) ( * Container , error ) {
container := & Container { root : runtime . containerRoot ( id ) }
2013-03-21 03:25:00 -04:00
if err := container . FromDisk ( ) ; err != nil {
return nil , err
}
if container . Id != id {
return container , fmt . Errorf ( "Container %s is stored at %s" , container . Id , id )
}
2013-04-11 12:26:17 -04:00
if container . State . Running {
container . State . Ghost = true
}
2013-03-21 03:41:15 -04:00
if err := runtime . Register ( container ) ; err != nil {
2013-01-18 19:13:39 -05:00
return nil , err
}
return container , nil
}
2013-03-21 03:25:00 -04:00
// Register makes a container object usable by the runtime as <container.Id>
2013-03-21 03:41:15 -04:00
func ( runtime * Runtime ) Register ( container * Container ) error {
if container . runtime != nil || runtime . Exists ( container . Id ) {
2013-03-21 03:25:00 -04:00
return fmt . Errorf ( "Container is already loaded" )
}
if err := validateId ( container . Id ) ; err != nil {
return err
}
2013-03-31 20:40:39 -04:00
2013-04-09 20:40:02 -04:00
// init the wait lock
container . waitLock = make ( chan struct { } )
// Even if not running, we init the lock (prevents races in start/stop/kill)
2013-04-09 12:09:54 -04:00
container . State . initLock ( )
2013-03-31 20:40:39 -04:00
2013-03-21 03:41:15 -04:00
container . runtime = runtime
2013-04-09 10:57:59 -04:00
2013-03-21 03:25:00 -04:00
// Attach to stdout and stderr
container . stderr = newWriteBroadcaster ( )
container . stdout = newWriteBroadcaster ( )
// Attach to stdin
if container . Config . OpenStdin {
container . stdin , container . stdinPipe = io . Pipe ( )
} else {
container . stdinPipe = NopWriteCloser ( ioutil . Discard ) // Silently drop stdin
}
// done
2013-03-21 03:41:15 -04:00
runtime . containers . PushBack ( container )
2013-03-31 05:02:01 -04:00
runtime . idIndex . Add ( container . Id )
2013-04-19 15:08:43 -04:00
2013-04-24 22:01:23 -04:00
// When we actually restart, Start() do the monitoring.
// However, when we simply 'reattach', we have to restart a monitor
nomonitor := false
// FIXME: if the container is supposed to be running but is not, auto restart it?
// if so, then we need to restart monitor and init a new lock
// If the container is supposed to be running, make sure of it
if container . State . Running {
if output , err := exec . Command ( "lxc-info" , "-n" , container . Id ) . CombinedOutput ( ) ; err != nil {
return err
} else {
if ! strings . Contains ( string ( output ) , "RUNNING" ) {
Debugf ( "Container %s was supposed to be running be is not." , container . Id )
if runtime . autoRestart {
Debugf ( "Restarting" )
container . State . Ghost = false
container . State . setStopped ( 0 )
if err := container . Start ( ) ; err != nil {
return err
}
nomonitor = true
} else {
Debugf ( "Marking as stopped" )
container . State . setStopped ( - 127 )
if err := container . ToDisk ( ) ; err != nil {
return err
}
}
}
}
}
2013-04-19 15:08:43 -04:00
// If the container is not running or just has been flagged not running
// then close the wait lock chan (will be reset upon start)
if ! container . State . Running {
close ( container . waitLock )
2013-04-24 22:01:23 -04:00
} else if ! nomonitor {
2013-04-19 15:08:43 -04:00
container . allocateNetwork ( )
go container . monitor ( )
}
2013-03-21 03:25:00 -04:00
return nil
}
2013-03-21 03:41:15 -04:00
func ( runtime * Runtime ) LogToDisk ( src * writeBroadcaster , dst string ) error {
2013-03-21 03:25:00 -04:00
log , err := os . OpenFile ( dst , os . O_RDWR | os . O_APPEND | os . O_CREATE , 0600 )
if err != nil {
return err
}
2013-03-29 11:46:06 -04:00
src . AddWriter ( log )
2013-03-21 03:25:00 -04:00
return nil
}
2013-03-21 03:41:15 -04:00
func ( runtime * Runtime ) Destroy ( container * Container ) error {
element := runtime . getContainerElement ( container . Id )
2013-01-18 19:13:39 -05:00
if element == nil {
2013-01-21 21:39:52 -05:00
return fmt . Errorf ( "Container %v not found - maybe it was already destroyed?" , container . Id )
2013-01-18 19:13:39 -05:00
}
2013-04-16 12:43:44 -04:00
if err := container . Stop ( 10 ) ; err != nil {
2013-01-18 19:13:39 -05:00
return err
}
2013-03-21 03:25:00 -04:00
if mounted , err := container . Mounted ( ) ; err != nil {
return err
} else if mounted {
if err := container . Unmount ( ) ; err != nil {
return fmt . Errorf ( "Unable to unmount container %v: %v" , container . Id , err )
2013-01-28 14:58:59 -05:00
}
2013-03-14 07:06:57 -04:00
}
2013-03-21 03:25:00 -04:00
// Deregister the container before removing its directory, to avoid race conditions
2013-03-31 05:02:01 -04:00
runtime . idIndex . Delete ( container . Id )
2013-03-21 03:41:15 -04:00
runtime . containers . Remove ( element )
2013-03-21 03:25:00 -04:00
if err := os . RemoveAll ( container . root ) ; err != nil {
2013-03-15 06:07:33 -04:00
return fmt . Errorf ( "Unable to remove filesystem for %v: %v" , container . Id , err )
2013-01-18 19:13:39 -05:00
}
return nil
}
2013-03-21 23:07:37 -04:00
// Commit creates a new filesystem image from the current state of a container.
// The image can optionally be tagged into a repository
2013-04-17 22:58:17 -04:00
func ( runtime * Runtime ) Commit ( id , repository , tag , comment , author string ) ( * Image , error ) {
2013-03-21 23:07:37 -04:00
container := runtime . Get ( id )
if container == nil {
return nil , fmt . Errorf ( "No such container: %s" , id )
}
// FIXME: freeze the container before copying it to avoid data corruption?
// FIXME: this shouldn't be in commands.
rwTar , err := container . ExportRw ( )
if err != nil {
return nil , err
}
// Create a new image from the container's base layers + a new layer from container changes
2013-04-17 22:58:17 -04:00
img , err := runtime . graph . Create ( rwTar , container , comment , author )
2013-03-21 23:07:37 -04:00
if err != nil {
return nil , err
}
// Register the image if needed
if repository != "" {
2013-03-22 21:27:18 -04:00
if err := runtime . repositories . Set ( repository , tag , img . Id , true ) ; err != nil {
2013-03-21 23:07:37 -04:00
return img , err
}
}
return img , nil
}
2013-03-21 03:41:15 -04:00
func ( runtime * Runtime ) restore ( ) error {
dir , err := ioutil . ReadDir ( runtime . repository )
2013-01-18 19:13:39 -05:00
if err != nil {
return err
}
for _ , v := range dir {
2013-03-21 03:25:00 -04:00
id := v . Name ( )
2013-03-21 03:41:15 -04:00
container , err := runtime . Load ( id )
2013-01-18 19:13:39 -05:00
if err != nil {
2013-03-22 14:44:12 -04:00
Debugf ( "Failed to load container %v: %v" , id , err )
2013-01-18 19:13:39 -05:00
continue
}
2013-03-22 14:44:12 -04:00
Debugf ( "Loaded container %v" , container . Id )
2013-01-18 19:13:39 -05:00
}
return nil
}
2013-03-31 05:02:01 -04:00
// FIXME: harmonize with NewGraph()
2013-04-24 22:01:23 -04:00
func NewRuntime ( autoRestart bool ) ( * Runtime , error ) {
runtime , err := NewRuntimeFromDirectory ( "/var/lib/docker" , autoRestart )
2013-04-18 23:47:24 -04:00
if err != nil {
return nil , err
}
2013-04-22 14:26:34 -04:00
if k , err := GetKernelVersion ( ) ; err != nil {
log . Printf ( "WARNING: %s\n" , err )
} else {
runtime . kernelVersion = k
if CompareKernelVersion ( k , & KernelVersionInfo { Kernel : 3 , Major : 8 , Minor : 0 } ) < 0 {
log . Printf ( "WARNING: You are running linux kernel version %s, which might be unstable running docker. Please upgrade your kernel to 3.8.0." , k . String ( ) )
}
2013-04-18 23:47:24 -04:00
}
2013-04-22 00:44:57 -04:00
if cgroupMemoryMountpoint , err := FindCgroupMountpoint ( "memory" ) ; err != nil {
log . Printf ( "WARNING: %s\n" , err )
} else {
_ , err1 := ioutil . ReadFile ( path . Join ( cgroupMemoryMountpoint , "memory.limit_in_bytes" ) )
_ , err2 := ioutil . ReadFile ( path . Join ( cgroupMemoryMountpoint , "memory.soft_limit_in_bytes" ) )
runtime . capabilities . MemoryLimit = err1 == nil && err2 == nil
if ! runtime . capabilities . MemoryLimit {
2013-04-24 22:01:23 -04:00
log . Printf ( "WARNING: Your kernel does not support cgroup memory limit." )
2013-04-22 00:44:57 -04:00
}
2013-04-18 23:55:41 -04:00
2013-04-22 00:44:57 -04:00
_ , err = ioutil . ReadFile ( path . Join ( cgroupMemoryMountpoint , "memory.memsw.limit_in_bytes" ) )
runtime . capabilities . SwapLimit = err == nil
if ! runtime . capabilities . SwapLimit {
2013-04-24 22:01:23 -04:00
log . Printf ( "WARNING: Your kernel does not support cgroup swap limit." )
2013-04-22 00:44:57 -04:00
}
}
2013-04-18 23:47:24 -04:00
return runtime , nil
2013-01-18 19:13:39 -05:00
}
2013-04-24 22:01:23 -04:00
func NewRuntimeFromDirectory ( root string , autoRestart bool ) ( * Runtime , error ) {
2013-03-28 20:12:23 -04:00
runtimeRepo := path . Join ( root , "containers" )
2013-03-13 21:48:50 -04:00
2013-03-28 20:12:23 -04:00
if err := os . MkdirAll ( runtimeRepo , 0700 ) ; err != nil && ! os . IsExist ( err ) {
2013-03-13 21:48:50 -04:00
return nil , err
}
2013-03-21 20:47:23 -04:00
g , err := NewGraph ( path . Join ( root , "graph" ) )
2013-02-26 20:45:46 -05:00
if err != nil {
return nil , err
}
2013-03-21 20:47:23 -04:00
repositories , err := NewTagStore ( path . Join ( root , "repositories" ) , g )
2013-03-21 20:35:49 -04:00
if err != nil {
return nil , fmt . Errorf ( "Couldn't create Tag store: %s" , err )
}
2013-04-04 08:33:28 -04:00
if NetworkBridgeIface == "" {
NetworkBridgeIface = DefaultNetworkBridge
}
2013-04-03 17:53:09 -04:00
netManager , err := newNetworkManager ( NetworkBridgeIface )
2013-02-25 17:06:22 -05:00
if err != nil {
return nil , err
}
2013-03-22 05:19:39 -04:00
authConfig , err := auth . LoadConfig ( root )
if err != nil && authConfig == nil {
// If the auth file does not exist, keep going
return nil , err
}
2013-03-21 03:41:15 -04:00
runtime := & Runtime {
2013-02-28 14:52:07 -05:00
root : root ,
2013-03-28 20:12:23 -04:00
repository : runtimeRepo ,
2013-02-28 14:52:07 -05:00
containers : list . New ( ) ,
networkManager : netManager ,
2013-03-21 20:35:49 -04:00
graph : g ,
repositories : repositories ,
2013-03-22 05:19:39 -04:00
authConfig : authConfig ,
2013-03-31 05:02:01 -04:00
idIndex : NewTruncIndex ( ) ,
2013-04-18 23:55:41 -04:00
capabilities : & Capabilities { } ,
2013-04-24 22:01:23 -04:00
autoRestart : autoRestart ,
2013-01-18 19:13:39 -05:00
}
2013-03-21 03:41:15 -04:00
if err := runtime . restore ( ) ; err != nil {
2013-01-18 19:13:39 -05:00
return nil , err
}
2013-03-21 03:41:15 -04:00
return runtime , nil
2013-01-18 19:13:39 -05:00
}
2013-01-29 15:15:39 -05:00
type History [ ] * Container
func ( history * History ) Len ( ) int {
return len ( * history )
}
func ( history * History ) Less ( i , j int ) bool {
containers := * history
return containers [ j ] . When ( ) . Before ( containers [ i ] . When ( ) )
}
func ( history * History ) Swap ( i , j int ) {
containers := * history
tmp := containers [ i ]
containers [ i ] = containers [ j ]
containers [ j ] = tmp
}
func ( history * History ) Add ( container * Container ) {
* history = append ( * history , container )
sort . Sort ( history )
}