2015-07-30 17:01:53 -04:00
// Package daemon exposes the functions that occur on the host server
// that the Docker daemon is running.
//
// In implementing the various functions of the daemon, there is often
// a method-specific struct for configuring the runtime behavior.
2014-04-17 17:43:01 -04:00
package daemon
2013-01-18 19:13:39 -05:00
import (
2017-03-30 16:52:40 -04:00
"context"
2013-01-18 19:13:39 -05:00
"fmt"
2014-04-28 17:36:04 -04:00
"io/ioutil"
2015-12-17 12:35:24 -05:00
"net"
2014-04-28 17:36:04 -04:00
"os"
2015-09-03 20:51:04 -04:00
"path"
2015-01-16 14:48:25 -05:00
"path/filepath"
2014-07-30 02:51:43 -04:00
"runtime"
Remove static errors from errors package.
Moving all strings to the errors package wasn't a good idea after all.
Our custom implementation of Go errors predates everything that's nice
and good about working with errors in Go. Take as an example what we
have to do to get an error message:
```go
func GetErrorMessage(err error) string {
switch err.(type) {
case errcode.Error:
e, _ := err.(errcode.Error)
return e.Message
case errcode.ErrorCode:
ec, _ := err.(errcode.ErrorCode)
return ec.Message()
default:
return err.Error()
}
}
```
This goes against every good practice for Go development. The language already provides a simple, intuitive and standard way to get error messages, that is calling the `Error()` method from an error. Reinventing the error interface is a mistake.
Our custom implementation also makes very hard to reason about errors, another nice thing about Go. I found several (>10) error declarations that we don't use anywhere. This is a clear sign about how little we know about the errors we return. I also found several error usages where the number of arguments was different than the parameters declared in the error, another clear example of how difficult is to reason about errors.
Moreover, our custom implementation didn't really make easier for people to return custom HTTP status code depending on the errors. Again, it's hard to reason about when to set custom codes and how. Take an example what we have to do to extract the message and status code from an error before returning a response from the API:
```go
switch err.(type) {
case errcode.ErrorCode:
daError, _ := err.(errcode.ErrorCode)
statusCode = daError.Descriptor().HTTPStatusCode
errMsg = daError.Message()
case errcode.Error:
// For reference, if you're looking for a particular error
// then you can do something like :
// import ( derr "github.com/docker/docker/errors" )
// if daError.ErrorCode() == derr.ErrorCodeNoSuchContainer { ... }
daError, _ := err.(errcode.Error)
statusCode = daError.ErrorCode().Descriptor().HTTPStatusCode
errMsg = daError.Message
default:
// This part of will be removed once we've
// converted everything over to use the errcode package
// FIXME: this is brittle and should not be necessary.
// If we need to differentiate between different possible error types,
// we should create appropriate error types with clearly defined meaning
errStr := strings.ToLower(err.Error())
for keyword, status := range map[string]int{
"not found": http.StatusNotFound,
"no such": http.StatusNotFound,
"bad parameter": http.StatusBadRequest,
"conflict": http.StatusConflict,
"impossible": http.StatusNotAcceptable,
"wrong login/password": http.StatusUnauthorized,
"hasn't been activated": http.StatusForbidden,
} {
if strings.Contains(errStr, keyword) {
statusCode = status
break
}
}
}
```
You can notice two things in that code:
1. We have to explain how errors work, because our implementation goes against how easy to use Go errors are.
2. At no moment we arrived to remove that `switch` statement that was the original reason to use our custom implementation.
This change removes all our status errors from the errors package and puts them back in their specific contexts.
IT puts the messages back with their contexts. That way, we know right away when errors used and how to generate their messages.
It uses custom interfaces to reason about errors. Errors that need to response with a custom status code MUST implementent this simple interface:
```go
type errorWithStatus interface {
HTTPErrorStatusCode() int
}
```
This interface is very straightforward to implement. It also preserves Go errors real behavior, getting the message is as simple as using the `Error()` method.
I included helper functions to generate errors that use custom status code in `errors/errors.go`.
By doing this, we remove the hard dependency we have eeverywhere to our custom errors package. Yes, you can use it as a helper to generate error, but it's still very easy to generate errors without it.
Please, read this fantastic blog post about errors in Go: http://dave.cheney.net/2014/12/24/inspecting-errors
Signed-off-by: David Calavera <david.calavera@gmail.com>
2016-02-25 10:53:35 -05:00
"strings"
2014-04-28 17:36:04 -04:00
"sync"
"time"
2017-09-22 09:52:41 -04:00
"github.com/docker/docker/api/errdefs"
2016-09-06 14:18:12 -04:00
"github.com/docker/docker/api/types"
containertypes "github.com/docker/docker/api/types/container"
2017-05-30 20:02:11 -04:00
"github.com/docker/docker/api/types/swarm"
2015-11-12 14:55:17 -05:00
"github.com/docker/docker/container"
2017-01-23 06:23:07 -05:00
"github.com/docker/docker/daemon/config"
"github.com/docker/docker/daemon/discovery"
2015-04-03 18:17:49 -04:00
"github.com/docker/docker/daemon/events"
2015-11-20 17:35:16 -05:00
"github.com/docker/docker/daemon/exec"
2016-11-14 13:53:53 -05:00
"github.com/docker/docker/daemon/logger"
2017-08-29 02:49:26 -04:00
"github.com/docker/docker/daemon/network"
2017-07-26 17:42:13 -04:00
"github.com/sirupsen/logrus"
2015-12-23 13:43:34 -05:00
// register graph drivers
_ "github.com/docker/docker/daemon/graphdriver/register"
2017-01-04 12:01:59 -05:00
"github.com/docker/docker/daemon/initlayer"
"github.com/docker/docker/daemon/stats"
2015-11-18 17:20:54 -05:00
dmetadata "github.com/docker/docker/distribution/metadata"
2015-11-13 19:59:01 -05:00
"github.com/docker/docker/distribution/xfer"
2017-01-04 12:01:59 -05:00
"github.com/docker/docker/dockerversion"
2015-07-20 13:57:15 -04:00
"github.com/docker/docker/image"
2015-11-18 17:20:54 -05:00
"github.com/docker/docker/layer"
2016-03-18 14:50:19 -04:00
"github.com/docker/docker/libcontainerd"
2015-11-18 17:20:54 -05:00
"github.com/docker/docker/migrate/v1"
2017-08-03 20:22:00 -04:00
"github.com/docker/docker/pkg/containerfs"
2015-10-08 11:51:41 -04:00
"github.com/docker/docker/pkg/idtools"
2016-10-07 16:53:14 -04:00
"github.com/docker/docker/pkg/plugingetter"
2014-07-24 18:19:50 -04:00
"github.com/docker/docker/pkg/sysinfo"
2015-05-15 19:34:26 -04:00
"github.com/docker/docker/pkg/system"
2014-07-24 18:19:50 -04:00
"github.com/docker/docker/pkg/truncindex"
2017-01-04 12:01:59 -05:00
"github.com/docker/docker/plugin"
2017-07-14 16:45:32 -04:00
pluginexec "github.com/docker/docker/plugin/executor/containerd"
2017-01-25 19:54:18 -05:00
refstore "github.com/docker/docker/reference"
2015-03-31 19:21:37 -04:00
"github.com/docker/docker/registry"
2014-07-24 18:19:50 -04:00
"github.com/docker/docker/runconfig"
2015-09-16 17:18:24 -04:00
volumedrivers "github.com/docker/docker/volume/drivers"
"github.com/docker/docker/volume/local"
2015-09-18 19:58:05 -04:00
"github.com/docker/docker/volume/store"
2015-05-15 19:34:26 -04:00
"github.com/docker/libnetwork"
2017-01-04 12:01:59 -05:00
"github.com/docker/libnetwork/cluster"
2016-03-09 23:33:21 -05:00
nwconfig "github.com/docker/libnetwork/config"
2015-11-18 17:20:54 -05:00
"github.com/docker/libtrust"
2016-12-12 18:05:53 -05:00
"github.com/pkg/errors"
2015-11-13 19:59:01 -05:00
)
2017-09-22 09:52:41 -04:00
// MainNamespace is the name of the namespace used for users containers
const MainNamespace = "moby"
2016-05-23 17:49:50 -04:00
2017-09-22 09:52:41 -04:00
var (
2017-08-17 15:16:30 -04:00
errSystemNotSupported = errors . New ( "the Docker daemon is not supported on this platform" )
2013-12-12 16:34:26 -05:00
)
2013-09-06 20:33:05 -04:00
2017-05-16 19:56:56 -04:00
type daemonStore struct {
graphDriver string
imageRoot string
imageStore image . Store
layerStore layer . Store
distributionMetadataStore dmetadata . Store
}
2015-07-30 17:01:53 -04:00
// Daemon holds information about the Docker daemon.
2014-04-17 17:43:01 -04:00
type Daemon struct {
2017-05-16 19:56:56 -04:00
ID string
repository string
containers container . Store
2017-02-23 18:12:18 -05:00
containersReplica container . ViewDB
2017-05-16 19:56:56 -04:00
execCommands * exec . Store
downloadManager * xfer . LayerDownloadManager
uploadManager * xfer . LayerUploadManager
trustKey libtrust . PrivateKey
idIndex * truncindex . TruncIndex
configStore * config . Config
statsCollector * stats . Collector
defaultLogConfig containertypes . LogConfig
RegistryService registry . Service
EventsService * events . Events
netController libnetwork . NetworkController
volumes * store . VolumeStore
discoveryWatcher discovery . Reloader
root string
seccompEnabled bool
apparmorEnabled bool
shutdown bool
idMappings * idtools . IDMappings
stores map [ string ] daemonStore // By container target platform
2017-08-17 18:43:36 -04:00
referenceStore refstore . Store
PluginStore * plugin . Store // todo: remove
2017-05-16 19:56:56 -04:00
pluginManager * plugin . Manager
linkIndex * linkIndex
containerd libcontainerd . Client
containerdRemote libcontainerd . Remote
defaultIsolation containertypes . Isolation // Default isolation mode on Windows
clusterProvider cluster . Provider
cluster Cluster
2017-05-30 20:02:11 -04:00
genericResources [ ] swarm . GenericResource
2017-05-16 19:56:56 -04:00
metricsPluginListener net . Listener
2016-09-02 09:20:54 -04:00
2017-01-04 12:01:59 -05:00
machineMemory uint64
2016-09-02 09:20:54 -04:00
seccompProfile [ ] byte
seccompProfilePath string
2017-04-12 16:59:59 -04:00
2017-04-12 17:04:49 -04:00
diskUsageRunning int32
pruneRunning int32
Don't create source directory while the daemon is being shutdown, fix #30348
If a container mount the socket the daemon is listening on into
container while the daemon is being shutdown, the socket will
not exist on the host, then daemon will assume it's a directory
and create it on the host, this will cause the daemon can't start
next time.
fix issue https://github.com/moby/moby/issues/30348
To reproduce this issue, you can add following code
```
--- a/daemon/oci_linux.go
+++ b/daemon/oci_linux.go
@@ -8,6 +8,7 @@ import (
"sort"
"strconv"
"strings"
+ "time"
"github.com/Sirupsen/logrus"
"github.com/docker/docker/container"
@@ -666,7 +667,8 @@ func (daemon *Daemon) createSpec(c *container.Container) (*libcontainerd.Spec, e
if err := daemon.setupIpcDirs(c); err != nil {
return nil, err
}
-
+ fmt.Printf("===please stop the daemon===\n")
+ time.Sleep(time.Second * 2)
ms, err := daemon.setupMounts(c)
if err != nil {
return nil, err
```
step1 run a container which has `--restart always` and `-v /var/run/docker.sock:/sock`
```
$ docker run -ti --restart always -v /var/run/docker.sock:/sock busybox
/ #
```
step2 exit the the container
```
/ # exit
```
and kill the daemon when you see
```
===please stop the daemon===
```
in the daemon log
The daemon can't restart again and fail with `can't create unix socket /var/run/docker.sock: is a directory`.
Signed-off-by: Lei Jitang <leijitang@huawei.com>
2017-05-22 03:44:01 -04:00
hosts map [ string ] bool // hosts stores the addresses the daemon is listening on
2017-06-08 06:55:20 -04:00
startupDone chan struct { }
2017-08-29 02:49:26 -04:00
2017-09-22 02:04:34 -04:00
attachmentStore network . AttachmentStore
Don't create source directory while the daemon is being shutdown, fix #30348
If a container mount the socket the daemon is listening on into
container while the daemon is being shutdown, the socket will
not exist on the host, then daemon will assume it's a directory
and create it on the host, this will cause the daemon can't start
next time.
fix issue https://github.com/moby/moby/issues/30348
To reproduce this issue, you can add following code
```
--- a/daemon/oci_linux.go
+++ b/daemon/oci_linux.go
@@ -8,6 +8,7 @@ import (
"sort"
"strconv"
"strings"
+ "time"
"github.com/Sirupsen/logrus"
"github.com/docker/docker/container"
@@ -666,7 +667,8 @@ func (daemon *Daemon) createSpec(c *container.Container) (*libcontainerd.Spec, e
if err := daemon.setupIpcDirs(c); err != nil {
return nil, err
}
-
+ fmt.Printf("===please stop the daemon===\n")
+ time.Sleep(time.Second * 2)
ms, err := daemon.setupMounts(c)
if err != nil {
return nil, err
```
step1 run a container which has `--restart always` and `-v /var/run/docker.sock:/sock`
```
$ docker run -ti --restart always -v /var/run/docker.sock:/sock busybox
/ #
```
step2 exit the the container
```
/ # exit
```
and kill the daemon when you see
```
===please stop the daemon===
```
in the daemon log
The daemon can't restart again and fail with `can't create unix socket /var/run/docker.sock: is a directory`.
Signed-off-by: Lei Jitang <leijitang@huawei.com>
2017-05-22 03:44:01 -04:00
}
// StoreHosts stores the addresses the daemon is listening on
func ( daemon * Daemon ) StoreHosts ( hosts [ ] string ) {
if daemon . hosts == nil {
daemon . hosts = make ( map [ string ] bool )
}
for _ , h := range hosts {
daemon . hosts [ h ] = true
}
2013-03-21 03:25:00 -04:00
}
2016-10-06 10:09:54 -04:00
// HasExperimental returns whether the experimental features of the daemon are enabled or not
func ( daemon * Daemon ) HasExperimental ( ) bool {
2017-09-19 18:14:41 -04:00
return daemon . configStore != nil && daemon . configStore . Experimental
2016-10-06 10:09:54 -04:00
}
2015-09-29 13:51:40 -04:00
func ( daemon * Daemon ) restore ( ) error {
2017-05-16 19:56:56 -04:00
containers := make ( map [ string ] * container . Container )
2014-05-30 14:03:56 -04:00
2016-09-28 02:41:19 -04:00
logrus . Info ( "Loading containers: start." )
2014-04-17 17:43:01 -04:00
dir , err := ioutil . ReadDir ( daemon . repository )
2013-01-18 19:13:39 -05:00
if err != nil {
return err
}
2013-10-24 19:49:28 -04:00
2013-12-18 13:43:42 -05:00
for _ , v := range dir {
2013-03-21 03:25:00 -04:00
id := v . Name ( )
2014-04-17 17:43:01 -04:00
container , err := daemon . load ( id )
2013-01-18 19:13:39 -05:00
if err != nil {
2015-03-26 18:22:04 -04:00
logrus . Errorf ( "Failed to load container %v: %v" , id , err )
2013-01-18 19:13:39 -05:00
continue
}
2013-11-15 01:52:08 -05:00
// Ignore the container if it does not support the current driver being used by the graph
2017-08-08 15:43:48 -04:00
currentDriverForContainerOS := daemon . stores [ container . OS ] . graphDriver
if ( container . Driver == "" && currentDriverForContainerOS == "aufs" ) || container . Driver == currentDriverForContainerOS {
rwlayer , err := daemon . stores [ container . OS ] . layerStore . GetRWLayer ( container . ID )
2016-01-26 20:20:30 -05:00
if err != nil {
logrus . Errorf ( "Failed to load container mount %v: %v" , id , err )
continue
}
container . RWLayer = rwlayer
2017-09-22 09:52:41 -04:00
logrus . Debugf ( "Loaded container %v, isRunning: %v" , container . ID , container . IsRunning ( ) )
2014-08-06 13:40:43 -04:00
2015-09-03 20:51:04 -04:00
containers [ container . ID ] = container
2013-11-15 01:52:08 -05:00
} else {
2015-03-26 18:22:04 -04:00
logrus . Debugf ( "Cannot load container %s because it was created with another graph driver." , container . ID )
2013-11-15 01:52:08 -05:00
}
2013-10-04 22:25:15 -04:00
}
2016-03-01 11:30:27 -05:00
removeContainers := make ( map [ string ] * container . Container )
2015-11-24 15:25:12 -05:00
restartContainers := make ( map [ * container . Container ] chan struct { } )
2016-06-14 12:13:53 -04:00
activeSandboxes := make ( map [ string ] interface { } )
2016-09-29 11:35:10 -04:00
for id , c := range containers {
2015-09-03 20:51:04 -04:00
if err := daemon . registerName ( c ) ; err != nil {
2017-02-22 17:02:20 -05:00
logrus . Errorf ( "Failed to register container name %s: %s" , c . ID , err )
delete ( containers , id )
continue
}
2016-09-06 09:49:10 -04:00
// verify that all volumes valid and have been migrated from the pre-1.7 layout
if err := daemon . verifyVolumesInfo ( c ) ; err != nil {
// don't skip the container due to error
logrus . Errorf ( "Failed to verify volumes for container '%s': %v" , c . ID , err )
}
2017-04-10 12:54:29 -04:00
if err := daemon . Register ( c ) ; err != nil {
logrus . Errorf ( "Failed to register container %s: %s" , c . ID , err )
delete ( containers , id )
continue
}
2016-09-06 09:49:10 -04:00
2016-05-07 12:20:24 -04:00
// The LogConfig.Type is empty if the container was created before docker 1.12 with default log driver.
// We should rewrite it to use the daemon defaults.
// Fixes https://github.com/docker/docker/issues/22536
if c . HostConfig . LogConfig . Type == "" {
if err := daemon . mergeAndVerifyLogConfig ( & c . HostConfig . LogConfig ) ; err != nil {
logrus . Errorf ( "Failed to verify log config for container %s: %q" , c . ID , err )
continue
}
}
2016-03-18 14:50:19 -04:00
}
2016-11-30 13:59:54 -05:00
2017-09-22 09:52:41 -04:00
var (
wg sync . WaitGroup
mapLock sync . Mutex
)
2016-03-18 14:50:19 -04:00
for _ , c := range containers {
wg . Add ( 1 )
go func ( c * container . Container ) {
defer wg . Done ( )
2017-04-25 13:05:21 -04:00
daemon . backportMountSpec ( c )
2017-03-27 13:18:53 -04:00
if err := daemon . checkpointAndSave ( c ) ; err != nil {
2017-04-25 13:05:21 -04:00
logrus . WithError ( err ) . WithField ( "container" , c . ID ) . Error ( "error saving backported mountspec to disk" )
2016-08-04 15:34:52 -04:00
}
2017-04-25 13:05:21 -04:00
daemon . setStateCounter ( c )
2017-09-22 09:52:41 -04:00
logrus . WithFields ( logrus . Fields {
"container" : c . ID ,
"running" : c . IsRunning ( ) ,
"paused" : c . IsPaused ( ) ,
} ) . Debug ( "restoring container" )
var (
err error
alive bool
ec uint32
exitedAt time . Time
)
alive , _ , err = daemon . containerd . Restore ( context . Background ( ) , c . ID , c . InitializeStdio )
if err != nil && ! errdefs . IsNotFound ( err ) {
logrus . Errorf ( "Failed to restore container %s with containerd: %s" , c . ID , err )
return
}
if ! alive {
ec , exitedAt , err = daemon . containerd . DeleteTask ( context . Background ( ) , c . ID )
if err != nil && ! errdefs . IsNotFound ( err ) {
logrus . WithError ( err ) . Errorf ( "Failed to delete container %s from containerd" , c . ID )
return
}
}
2016-03-18 14:50:19 -04:00
if c . IsRunning ( ) || c . IsPaused ( ) {
2016-10-05 16:29:56 -04:00
c . RestartManager ( ) . Cancel ( ) // manually start containers because some need to wait for swarm networking
2017-09-22 09:52:41 -04:00
if c . IsPaused ( ) && alive {
s , err := daemon . containerd . Status ( context . Background ( ) , c . ID )
if err != nil {
logrus . WithError ( err ) . WithField ( "container" , c . ID ) .
Errorf ( "Failed to get container status" )
} else {
logrus . WithField ( "container" , c . ID ) . WithField ( "state" , s ) .
Info ( "restored container paused" )
switch s {
case libcontainerd . StatusPaused , libcontainerd . StatusPausing :
// nothing to do
case libcontainerd . StatusStopped :
alive = false
case libcontainerd . StatusUnknown :
logrus . WithField ( "container" , c . ID ) .
Error ( "Unknown status for container during restore" )
default :
// running
c . Lock ( )
c . Paused = false
daemon . setStateCounter ( c )
if err := c . CheckpointTo ( daemon . containersReplica ) ; err != nil {
logrus . WithError ( err ) . WithField ( "container" , c . ID ) .
Error ( "Failed to update stopped container state" )
}
c . Unlock ( )
}
}
}
if ! alive {
c . Lock ( )
c . SetStopped ( & container . ExitStatus { ExitCode : int ( ec ) , ExitedAt : exitedAt } )
daemon . Cleanup ( c )
if err := c . CheckpointTo ( daemon . containersReplica ) ; err != nil {
logrus . Errorf ( "Failed to update stopped container %s state: %v" , c . ID , err )
}
c . Unlock ( )
2016-03-18 14:50:19 -04:00
}
2016-12-28 20:08:03 -05:00
// we call Mount and then Unmount to get BaseFs of the container
if err := daemon . Mount ( c ) ; err != nil {
// The mount is unlikely to fail. However, in case mount fails
// the container should be allowed to restore here. Some functionalities
// (like docker exec -u user) might be missing but container is able to be
// stopped/restarted/removed.
// See #29365 for related information.
// The error is only logged here.
logrus . Warnf ( "Failed to mount container on getting BaseFs path %v: %v" , c . ID , err )
} else {
if err := daemon . Unmount ( c ) ; err != nil {
logrus . Warnf ( "Failed to umount container on getting BaseFs path %v: %v" , c . ID , err )
}
}
2016-10-05 16:29:56 -04:00
c . ResetRestartManager ( false )
2016-06-16 07:54:36 -04:00
if ! c . HostConfig . NetworkMode . IsContainer ( ) && c . IsRunning ( ) {
2016-06-14 12:13:53 -04:00
options , err := daemon . buildSandboxOptions ( c )
if err != nil {
logrus . Warnf ( "Failed build sandbox option to restore container %s: %v" , c . ID , err )
}
mapLock . Lock ( )
activeSandboxes [ c . NetworkSettings . SandboxID ] = options
mapLock . Unlock ( )
}
2017-09-22 09:52:41 -04:00
} else {
// get list of containers we need to restart
2016-06-14 12:13:53 -04:00
2016-09-09 12:55:57 -04:00
// Do not autostart containers which
// has endpoints in a swarm scope
// network yet since the cluster is
// not initialized yet. We will start
// it after the cluster is
// initialized.
if daemon . configStore . AutoRestart && c . ShouldRestart ( ) && ! c . NetworkSettings . HasSwarmEndpoint {
2016-03-01 11:30:27 -05:00
mapLock . Lock ( )
restartContainers [ c ] = make ( chan struct { } )
mapLock . Unlock ( )
} else if c . HostConfig != nil && c . HostConfig . AutoRemove {
2016-08-29 19:58:01 -04:00
mapLock . Lock ( )
2016-03-01 11:30:27 -05:00
removeContainers [ c . ID ] = c
2016-08-29 19:58:01 -04:00
mapLock . Unlock ( )
2016-03-01 11:30:27 -05:00
}
2016-03-18 14:50:19 -04:00
}
2015-09-03 20:51:04 -04:00
2017-02-21 18:55:59 -05:00
c . Lock ( )
2016-04-29 14:38:13 -04:00
if c . RemovalInProgress {
// We probably crashed in the middle of a removal, reset
// the flag.
//
// We DO NOT remove the container here as we do not
// know if the user had requested for either the
// associated volumes, network links or both to also
// be removed. So we put the container in the "dead"
// state and leave further processing up to them.
logrus . Debugf ( "Resetting RemovalInProgress flag from %v" , c . ID )
2017-02-21 18:55:59 -05:00
c . RemovalInProgress = false
c . Dead = true
2017-03-27 13:18:53 -04:00
if err := c . CheckpointTo ( daemon . containersReplica ) ; err != nil {
2017-09-22 09:52:41 -04:00
logrus . Errorf ( "Failed to update RemovalInProgress container %s state: %v" , c . ID , err )
2017-03-27 13:18:53 -04:00
}
2016-04-29 14:38:13 -04:00
}
2017-02-21 18:55:59 -05:00
c . Unlock ( )
2016-03-18 14:50:19 -04:00
} ( c )
2015-11-21 13:45:34 -05:00
}
2016-03-18 14:50:19 -04:00
wg . Wait ( )
2016-06-14 12:13:53 -04:00
daemon . netController , err = daemon . initNetworkController ( daemon . configStore , activeSandboxes )
if err != nil {
return fmt . Errorf ( "Error initializing network controller: %v" , err )
}
2015-11-21 13:45:34 -05:00
2015-09-03 20:51:04 -04:00
// Now that all the containers are registered, register the links
for _ , c := range containers {
if err := daemon . registerLinks ( c , c . HostConfig ) ; err != nil {
logrus . Errorf ( "failed to register link for container %s: %v" , c . ID , err )
2015-11-24 15:25:12 -05:00
}
}
2014-08-06 13:40:43 -04:00
2015-11-24 15:25:12 -05:00
group := sync . WaitGroup { }
for c , notifier := range restartContainers {
group . Add ( 1 )
2015-09-03 20:51:04 -04:00
go func ( c * container . Container , chNotify chan struct { } ) {
2015-11-24 15:25:12 -05:00
defer group . Done ( )
2015-09-03 20:51:04 -04:00
logrus . Debugf ( "Starting container %s" , c . ID )
2014-08-06 13:40:43 -04:00
2015-11-24 15:25:12 -05:00
// ignore errors here as this is a best effort to wait for children to be
// running before we try to start the container
2015-09-03 20:51:04 -04:00
children := daemon . children ( c )
2015-11-24 15:25:12 -05:00
timeout := time . After ( 5 * time . Second )
for _ , child := range children {
if notifier , exists := restartContainers [ child ] ; exists {
select {
case <- notifier :
case <- timeout :
}
2014-08-06 13:40:43 -04:00
}
}
2016-05-04 10:13:23 -04:00
// Make sure networks are available before starting
daemon . waitForNetworks ( c )
2016-09-19 12:01:16 -04:00
if err := daemon . containerStart ( c , "" , "" , true ) ; err != nil {
2015-09-03 20:51:04 -04:00
logrus . Errorf ( "Failed to start container %s: %s" , c . ID , err )
2015-11-24 15:25:12 -05:00
}
close ( chNotify )
} ( c , notifier )
2015-09-03 20:51:04 -04:00
2014-06-05 20:31:58 -04:00
}
2015-05-19 16:05:25 -04:00
group . Wait ( )
2014-06-05 20:31:58 -04:00
2016-03-01 11:30:27 -05:00
removeGroup := sync . WaitGroup { }
for id := range removeContainers {
removeGroup . Add ( 1 )
go func ( cid string ) {
if err := daemon . ContainerRm ( cid , & types . ContainerRmConfig { ForceRemove : true , RemoveVolume : true } ) ; err != nil {
logrus . Errorf ( "Failed to remove container %s: %s" , cid , err )
}
2016-06-09 11:32:20 -04:00
removeGroup . Done ( )
2016-03-01 11:30:27 -05:00
} ( id )
}
removeGroup . Wait ( )
2016-01-20 12:06:03 -05:00
// any containers that were started above would already have had this done,
// however we need to now prepare the mountpoints for the rest of the containers as well.
// This shouldn't cause any issue running on the containers that already had this run.
// This must be run after any containers with a restart policy so that containerized plugins
// can have a chance to be running before we try to initialize them.
for _ , c := range containers {
2016-01-27 02:43:40 -05:00
// if the container has restart policy, do not
// prepare the mountpoints since it has been done on restarting.
// This is to speed up the daemon start when a restart container
2016-12-19 07:33:36 -05:00
// has a volume and the volume driver is not available.
2016-01-27 02:43:40 -05:00
if _ , ok := restartContainers [ c ] ; ok {
continue
2016-03-01 11:30:27 -05:00
} else if _ , ok := removeContainers [ c . ID ] ; ok {
// container is automatically removed, skip it.
continue
2016-01-27 02:43:40 -05:00
}
2016-03-01 11:30:27 -05:00
2016-01-20 12:06:03 -05:00
group . Add ( 1 )
go func ( c * container . Container ) {
defer group . Done ( )
if err := daemon . prepareMountPoints ( c ) ; err != nil {
logrus . Error ( err )
}
} ( c )
}
group . Wait ( )
2016-09-28 02:41:19 -04:00
logrus . Info ( "Loading containers: done." )
2013-10-04 22:25:15 -04:00
2013-01-18 19:13:39 -05:00
return nil
}
2016-09-09 12:55:57 -04:00
// RestartSwarmContainers restarts any autostart container which has a
// swarm endpoint.
func ( daemon * Daemon ) RestartSwarmContainers ( ) {
group := sync . WaitGroup { }
for _ , c := range daemon . List ( ) {
if ! c . IsRunning ( ) && ! c . IsPaused ( ) {
// Autostart all the containers which has a
// swarm endpoint now that the cluster is
// initialized.
if daemon . configStore . AutoRestart && c . ShouldRestart ( ) && c . NetworkSettings . HasSwarmEndpoint {
group . Add ( 1 )
go func ( c * container . Container ) {
defer group . Done ( )
2016-09-19 12:01:16 -04:00
if err := daemon . containerStart ( c , "" , "" , true ) ; err != nil {
2016-09-09 12:55:57 -04:00
logrus . Error ( err )
}
} ( c )
}
}
}
group . Wait ( )
}
2016-05-04 10:13:23 -04:00
// waitForNetworks is used during daemon initialization when starting up containers
// It ensures that all of a container's networks are available before the daemon tries to start the container.
// In practice it just makes sure the discovery service is available for containers which use a network that require discovery.
func ( daemon * Daemon ) waitForNetworks ( c * container . Container ) {
if daemon . discoveryWatcher == nil {
return
}
// Make sure if the container has a network that requires discovery that the discovery service is available before starting
for netName := range c . NetworkSettings . Networks {
2016-07-03 08:47:39 -04:00
// If we get `ErrNoSuchNetwork` here, we can assume that it is due to discovery not being ready
2016-05-04 10:13:23 -04:00
// Most likely this is because the K/V store used for discovery is in a container and needs to be started
if _ , err := daemon . netController . NetworkByName ( netName ) ; err != nil {
if _ , ok := err . ( libnetwork . ErrNoSuchNetwork ) ; ! ok {
continue
}
// use a longish timeout here due to some slowdowns in libnetwork if the k/v store is on anything other than --net=host
// FIXME: why is this slow???
logrus . Debugf ( "Container %s waiting for network to be ready" , c . Name )
select {
case <- daemon . discoveryWatcher . ReadyCh ( ) :
case <- time . After ( 60 * time . Second ) :
}
return
}
}
}
2015-09-03 20:51:04 -04:00
func ( daemon * Daemon ) children ( c * container . Container ) map [ string ] * container . Container {
return daemon . linkIndex . children ( c )
2013-10-04 22:25:15 -04:00
}
2015-07-30 17:01:53 -04:00
// parents returns the names of the parent containers of the container
// with the given name.
2015-09-03 20:51:04 -04:00
func ( daemon * Daemon ) parents ( c * container . Container ) map [ string ] * container . Container {
return daemon . linkIndex . parents ( c )
2014-07-14 19:19:37 -04:00
}
2015-11-12 14:55:17 -05:00
func ( daemon * Daemon ) registerLink ( parent , child * container . Container , alias string ) error {
2015-09-03 20:51:04 -04:00
fullName := path . Join ( parent . Name , alias )
2017-06-29 21:56:22 -04:00
if err := daemon . containersReplica . ReserveName ( fullName , child . ID ) ; err != nil {
if err == container . ErrNameReserved {
2016-01-20 16:24:16 -05:00
logrus . Warnf ( "error registering link for %s, to %s, as alias %s, ignoring: %v" , parent . ID , child . ID , alias , err )
return nil
}
2013-10-04 22:25:15 -04:00
return err
}
2015-09-03 20:51:04 -04:00
daemon . linkIndex . link ( parent , child , fullName )
2013-10-28 19:58:59 -04:00
return nil
2013-10-04 22:25:15 -04:00
}
2017-01-13 23:14:03 -05:00
// DaemonJoinsCluster informs the daemon has joined the cluster and provides
// the handler to query the cluster component
func ( daemon * Daemon ) DaemonJoinsCluster ( clusterProvider cluster . Provider ) {
daemon . setClusterProvider ( clusterProvider )
}
// DaemonLeavesCluster informs the daemon has left the cluster
func ( daemon * Daemon ) DaemonLeavesCluster ( ) {
// Daemon is in charge of removing the attachable networks with
// connected containers when the node leaves the swarm
daemon . clearAttachableNetworks ( )
2017-03-31 17:07:55 -04:00
// We no longer need the cluster provider, stop it now so that
// the network agent will stop listening to cluster events.
2017-01-13 23:14:03 -05:00
daemon . setClusterProvider ( nil )
2017-03-31 17:07:55 -04:00
// Wait for the networking cluster agent to stop
daemon . netController . AgentStopWait ( )
// Daemon is in charge of removing the ingress network when the
// node leaves the swarm. Wait for job to be done or timeout.
// This is called also on graceful daemon shutdown. We need to
// wait, because the ingress release has to happen before the
// network controller is stopped.
if done , err := daemon . ReleaseIngress ( ) ; err == nil {
select {
case <- done :
case <- time . After ( 5 * time . Second ) :
logrus . Warnf ( "timeout while waiting for ingress network removal" )
}
} else {
logrus . Warnf ( "failed to initiate ingress network removal: %v" , err )
}
2017-08-29 02:49:26 -04:00
2017-09-22 02:04:34 -04:00
daemon . attachmentStore . ClearAttachments ( )
2017-01-13 23:14:03 -05:00
}
// setClusterProvider sets a component for querying the current cluster state.
func ( daemon * Daemon ) setClusterProvider ( clusterProvider cluster . Provider ) {
2016-06-13 22:52:49 -04:00
daemon . clusterProvider = clusterProvider
daemon . netController . SetClusterProvider ( clusterProvider )
}
2016-06-14 12:13:53 -04:00
// IsSwarmCompatible verifies if the current daemon
// configuration is compatible with the swarm mode
func ( daemon * Daemon ) IsSwarmCompatible ( ) error {
if daemon . configStore == nil {
return nil
}
2017-01-23 06:23:07 -05:00
return daemon . configStore . IsSwarmCompatible ( )
2016-06-14 12:13:53 -04:00
}
2015-07-30 17:01:53 -04:00
// NewDaemon sets up everything for the daemon to be able to service
// requests from the webserver.
2017-03-17 17:57:23 -04:00
func NewDaemon ( config * config . Config , registryService registry . Service , containerdRemote libcontainerd . Remote , pluginStore * plugin . Store ) ( daemon * Daemon , err error ) {
2015-06-15 19:33:02 -04:00
setDefaultMtu ( config )
2016-06-01 20:29:06 -04:00
// Ensure that we have a correct root key limit for launching containers.
if err := ModifyRootKeyLimit ( ) ; err != nil {
2016-11-08 16:06:24 -05:00
logrus . Warnf ( "unable to modify root key limit, number of containers could be limited by this quota: %v" , err )
2016-06-01 20:29:06 -04:00
}
2016-01-22 21:15:09 -05:00
// Ensure we have compatible and valid configuration options
if err := verifyDaemonSettings ( config ) ; err != nil {
2015-05-15 19:34:26 -04:00
return nil , err
2014-09-16 23:00:15 -04:00
}
2015-05-15 19:34:26 -04:00
// Do we have a disabled network?
2015-06-30 13:34:15 -04:00
config . DisableBridge = isBridgeNetworkDisabled ( config )
2014-08-09 21:18:32 -04:00
2015-07-11 15:32:08 -04:00
// Verify the platform is supported as a daemon
2015-08-07 12:33:29 -04:00
if ! platformSupported {
2015-07-30 17:01:53 -04:00
return nil , errSystemNotSupported
2015-07-11 15:32:08 -04:00
}
// Validate platform-specific requirements
2015-05-15 19:34:26 -04:00
if err := checkSystem ( ) ; err != nil {
2014-09-16 13:42:59 -04:00
return nil , err
2014-07-30 02:51:43 -04:00
}
2017-05-19 18:06:46 -04:00
idMappings , err := setupRemappedRoot ( config )
2015-10-08 11:51:41 -04:00
if err != nil {
return nil , err
}
2017-05-31 17:56:23 -04:00
rootIDs := idMappings . RootPair ( )
2016-07-11 18:26:23 -04:00
if err := setupDaemonProcess ( config ) ; err != nil {
2014-05-09 21:05:54 -04:00
return nil , err
}
2015-06-23 08:53:18 -04:00
// set up the tmpDir to use a canonical path
2017-05-19 18:06:46 -04:00
tmp , err := prepareTempDir ( config . Root , rootIDs )
2015-06-23 08:53:18 -04:00
if err != nil {
return nil , fmt . Errorf ( "Unable to get the TempDir under %s: %s" , config . Root , err )
}
2017-05-31 20:11:42 -04:00
realTmp , err := getRealPath ( tmp )
2015-06-23 08:53:18 -04:00
if err != nil {
return nil , fmt . Errorf ( "Unable to get the full path to the TempDir (%s): %s" , tmp , err )
}
2017-10-03 17:47:55 -04:00
if runtime . GOOS == "windows" {
if _ , err := os . Stat ( realTmp ) ; err != nil && os . IsNotExist ( err ) {
if err := system . MkdirAll ( realTmp , 0700 , "" ) ; err != nil {
return nil , fmt . Errorf ( "Unable to create the TempDir (%s): %s" , realTmp , err )
}
}
os . Setenv ( "TEMP" , realTmp )
os . Setenv ( "TMP" , realTmp )
} else {
os . Setenv ( "TMPDIR" , realTmp )
}
2015-06-23 08:53:18 -04:00
2017-06-08 06:55:20 -04:00
d := & Daemon {
configStore : config ,
2017-09-22 09:52:41 -04:00
PluginStore : pluginStore ,
2017-06-08 06:55:20 -04:00
startupDone : make ( chan struct { } ) ,
}
2015-12-16 15:32:16 -05:00
// Ensure the daemon is properly shutdown if there is a failure during
// initialization
2015-04-27 17:11:29 -04:00
defer func ( ) {
if err != nil {
2015-09-29 13:51:40 -04:00
if err := d . Shutdown ( ) ; err != nil {
2015-04-27 17:11:29 -04:00
logrus . Error ( err )
}
2015-03-11 10:33:06 -04:00
}
2015-04-27 17:11:29 -04:00
} ( )
2013-11-07 15:34:01 -05:00
2017-05-30 20:02:11 -04:00
if err := d . setGenericResources ( config ) ; err != nil {
return nil , err
}
2017-04-04 10:23:14 -04:00
// set up SIGUSR1 handler on Unix-like systems, or a Win32 global event
// on Windows to dump Go routine stacks
stackDumpDir := config . Root
if execRoot := config . GetExecRoot ( ) ; execRoot != "" {
stackDumpDir = execRoot
}
d . setupDumpStackTrap ( stackDumpDir )
2016-09-02 09:20:54 -04:00
if err := d . setupSeccompProfile ( ) ; err != nil {
return nil , err
}
2016-03-18 14:50:19 -04:00
// Set the default isolation mode (only applicable on Windows)
if err := d . setDefaultIsolation ( ) ; err != nil {
return nil , fmt . Errorf ( "error setting default isolation mode: %v" , err )
}
2015-04-09 00:23:30 -04:00
logrus . Debugf ( "Using default logging driver %s" , config . LogConfig . Type )
2015-12-02 05:26:30 -05:00
if err := configureMaxThreads ( config ) ; err != nil {
logrus . Warnf ( "Failed to configure golang's threads limit: %v" , err )
}
2016-12-05 08:12:17 -05:00
if err := ensureDefaultAppArmorProfile ( ) ; err != nil {
logrus . Errorf ( err . Error ( ) )
}
2015-05-15 19:34:26 -04:00
daemonRepo := filepath . Join ( config . Root , "containers" )
2017-05-19 18:06:46 -04:00
if err := idtools . MkdirAllAndChown ( daemonRepo , 0700 , rootIDs ) ; err != nil && ! os . IsExist ( err ) {
2013-03-13 21:48:50 -04:00
return nil , err
}
2017-09-22 09:52:41 -04:00
// Create the directory where we'll store the runtime scripts (i.e. in
// order to support runtimeArgs)
daemonRuntimes := filepath . Join ( config . Root , "runtimes" )
if err := system . MkdirAll ( daemonRuntimes , 0700 , "" ) ; err != nil && ! os . IsExist ( err ) {
return nil , err
}
if err := d . loadRuntimes ( ) ; err != nil {
return nil , err
}
2016-06-07 15:15:50 -04:00
if runtime . GOOS == "windows" {
2017-06-01 21:59:11 -04:00
if err := system . MkdirAll ( filepath . Join ( config . Root , "credentialspecs" ) , 0 , "" ) ; err != nil && ! os . IsExist ( err ) {
2016-06-07 15:15:50 -04:00
return nil , err
}
}
2017-05-16 19:56:56 -04:00
// On Windows we don't support the environment variable, or a user supplied graphdriver
// as Windows has no choice in terms of which graphdrivers to use. It's a case of
// running Windows containers on Windows - windowsfilter, running Linux containers on Windows,
// lcow. Unix platforms however run a single graphdriver for all containers, and it can
// be set through an environment variable, a daemon start parameter, or chosen through
// initialization of the layerstore through driver priority order for example.
d . stores = make ( map [ string ] daemonStore )
if runtime . GOOS == "windows" {
d . stores [ "windows" ] = daemonStore { graphDriver : "windowsfilter" }
if system . LCOWSupported ( ) {
d . stores [ "linux" ] = daemonStore { graphDriver : "lcow" }
}
} else {
driverName := os . Getenv ( "DOCKER_DRIVER" )
if driverName == "" {
driverName = config . GraphDriver
2017-07-20 11:38:34 -04:00
} else {
logrus . Infof ( "Setting the storage driver from the $DOCKER_DRIVER environment variable (%s)" , driverName )
2017-05-16 19:56:56 -04:00
}
d . stores [ runtime . GOOS ] = daemonStore { graphDriver : driverName } // May still be empty. Layerstore init determines instead.
2015-12-16 15:32:16 -05:00
}
2016-09-07 20:01:10 -04:00
2016-11-18 16:54:11 -05:00
d . RegistryService = registryService
2016-11-14 13:53:53 -05:00
logger . RegisterPluginGetter ( d . PluginStore )
2017-03-17 17:57:23 -04:00
2017-04-13 21:56:50 -04:00
metricsSockPath , err := d . listenMetricsSock ( )
if err != nil {
return nil , err
}
registerMetricsPluginCallback ( d . PluginStore , metricsSockPath )
2017-07-14 16:45:32 -04:00
createPluginExec := func ( m * plugin . Manager ) ( plugin . Executor , error ) {
2017-09-22 09:52:41 -04:00
return pluginexec . New ( getPluginExecRoot ( config . Root ) , containerdRemote , m )
2017-07-14 16:45:32 -04:00
}
2016-11-18 16:54:11 -05:00
// Plugin system initialization should happen before restore. Do not change order.
2016-12-12 18:05:53 -05:00
d . pluginManager , err = plugin . NewManager ( plugin . ManagerConfig {
Root : filepath . Join ( config . Root , "plugins" ) ,
2017-02-02 14:22:12 -05:00
ExecRoot : getPluginExecRoot ( config . Root ) ,
2016-12-12 18:05:53 -05:00
Store : d . PluginStore ,
2017-07-14 16:45:32 -04:00
CreateExecutor : createPluginExec ,
2016-12-12 18:05:53 -05:00
RegistryService : registryService ,
LiveRestoreEnabled : config . LiveRestoreEnabled ,
LogPluginEvent : d . LogPluginEvent , // todo: make private
2017-03-17 17:57:23 -04:00
AuthzMiddleware : config . AuthzMiddleware ,
2016-12-12 18:05:53 -05:00
} )
if err != nil {
return nil , errors . Wrap ( err , "couldn't create plugin manager" )
2016-11-18 16:54:11 -05:00
}
2016-09-07 20:01:10 -04:00
2017-05-16 19:56:56 -04:00
var graphDrivers [ ] string
2017-08-08 15:43:48 -04:00
for operatingSystem , ds := range d . stores {
2017-05-16 19:56:56 -04:00
ls , err := layer . NewStoreFromOptions ( layer . StoreOptions {
StorePath : config . Root ,
MetadataStorePathTemplate : filepath . Join ( config . Root , "image" , "%s" , "layerdb" ) ,
GraphDriver : ds . graphDriver ,
GraphDriverOptions : config . GraphOptions ,
IDMappings : idMappings ,
PluginGetter : d . PluginStore ,
ExperimentalEnabled : config . Experimental ,
2017-08-08 15:43:48 -04:00
OS : operatingSystem ,
2017-05-16 19:56:56 -04:00
} )
if err != nil {
return nil , err
}
ds . graphDriver = ls . DriverName ( ) // As layerstore may set the driver
ds . layerStore = ls
2017-08-08 15:43:48 -04:00
d . stores [ operatingSystem ] = ds
2017-05-16 19:56:56 -04:00
graphDrivers = append ( graphDrivers , ls . DriverName ( ) )
2015-11-18 17:20:54 -05:00
}
2015-12-16 15:32:16 -05:00
// Configure and validate the kernels security support
2017-05-16 19:56:56 -04:00
if err := configureKernelSecuritySupport ( config , graphDrivers ) ; err != nil {
2015-11-18 17:20:54 -05:00
return nil , err
}
2016-05-06 00:45:55 -04:00
logrus . Debugf ( "Max Concurrent Downloads: %d" , * config . MaxConcurrentDownloads )
2017-05-16 19:56:56 -04:00
lsMap := make ( map [ string ] layer . Store )
2017-08-08 15:43:48 -04:00
for operatingSystem , ds := range d . stores {
lsMap [ operatingSystem ] = ds . layerStore
2017-05-16 19:56:56 -04:00
}
d . downloadManager = xfer . NewLayerDownloadManager ( lsMap , * config . MaxConcurrentDownloads )
2016-05-06 00:45:55 -04:00
logrus . Debugf ( "Max Concurrent Uploads: %d" , * config . MaxConcurrentUploads )
d . uploadManager = xfer . NewLayerUploadManager ( * config . MaxConcurrentUploads )
2017-08-08 15:43:48 -04:00
for operatingSystem , ds := range d . stores {
2017-05-16 19:56:56 -04:00
imageRoot := filepath . Join ( config . Root , "image" , ds . graphDriver )
ifs , err := image . NewFSStoreBackend ( filepath . Join ( imageRoot , "imagedb" ) )
if err != nil {
return nil , err
}
2015-11-18 17:20:54 -05:00
2017-05-16 19:56:56 -04:00
var is image . Store
2017-08-08 15:43:48 -04:00
is , err = image . NewImageStore ( ifs , operatingSystem , ds . layerStore )
2017-05-16 19:56:56 -04:00
if err != nil {
return nil , err
}
ds . imageRoot = imageRoot
ds . imageStore = is
2017-08-08 15:43:48 -04:00
d . stores [ operatingSystem ] = ds
2013-02-26 20:45:46 -05:00
}
2013-11-15 05:30:28 -05:00
2015-05-15 19:34:26 -04:00
// Configure the volumes driver
2017-05-19 18:06:46 -04:00
volStore , err := d . configureVolumes ( rootIDs )
2015-06-12 09:25:32 -04:00
if err != nil {
2013-04-05 21:00:10 -04:00
return nil , err
}
2014-08-28 10:18:08 -04:00
2017-09-06 11:44:11 -04:00
trustKey , err := loadOrCreateTrustKey ( config . TrustKeyPath )
2015-01-07 17:59:12 -05:00
if err != nil {
return nil , err
}
2015-05-15 19:34:26 -04:00
trustDir := filepath . Join ( config . Root , "trust" )
2017-06-01 21:59:11 -04:00
if err := system . MkdirAll ( trustDir , 0700 , "" ) ; err != nil {
2014-10-01 21:26:06 -04:00
return nil , err
}
2015-04-20 15:48:33 -04:00
eventsService := events . New ( )
2015-11-18 17:20:54 -05:00
2017-08-17 18:43:36 -04:00
// We have a single tag/reference store for the daemon globally. However, it's
// stored under the graphdriver. On host platforms which only support a single
// container OS, but multiple selectable graphdrivers, this means depending on which
// graphdriver is chosen, the global reference store is under there. For
// platforms which support multiple container operating systems, this is slightly
// more problematic as where does the global ref store get located? Fortunately,
// for Windows, which is currently the only daemon supporting multiple container
// operating systems, the list of graphdrivers available isn't user configurable.
// For backwards compatibility, we just put it under the windowsfilter
// directory regardless.
refStoreLocation := filepath . Join ( d . stores [ runtime . GOOS ] . imageRoot , ` repositories.json ` )
rs , err := refstore . NewReferenceStore ( refStoreLocation )
if err != nil {
return nil , fmt . Errorf ( "Couldn't create reference store repository: %s" , err )
}
d . referenceStore = rs
2017-05-16 19:56:56 -04:00
for platform , ds := range d . stores {
dms , err := dmetadata . NewFSMetadataStore ( filepath . Join ( ds . imageRoot , "distribution" ) , platform )
if err != nil {
return nil , err
}
2015-04-20 15:48:33 -04:00
2017-05-16 19:56:56 -04:00
ds . distributionMetadataStore = dms
d . stores [ platform ] = ds
// No content-addressability migration on Windows as it never supported pre-CA
if runtime . GOOS != "windows" {
migrationStart := time . Now ( )
if err := v1 . Migrate ( config . Root , ds . graphDriver , ds . layerStore , ds . imageStore , rs , dms ) ; err != nil {
logrus . Errorf ( "Graph migration failed: %q. Your old graph data was found to be too inconsistent for upgrading to content-addressable storage. Some of the old data was probably not upgraded. We recommend starting over with a clean storage directory if possible." , err )
}
logrus . Infof ( "Graph migration to content-addressability took %.2f seconds" , time . Since ( migrationStart ) . Seconds ( ) )
}
2015-07-24 20:49:43 -04:00
}
2015-09-21 08:04:36 -04:00
// Discovery is only enabled when the daemon is launched with an address to advertise. When
2016-12-23 07:48:25 -05:00
// initialized, the daemon is registered and we can store the discovery backend as it's read-only
2015-12-10 18:35:10 -05:00
if err := d . initDiscovery ( config ) ; err != nil {
return nil , err
2015-09-21 08:04:36 -04:00
}
2014-03-05 04:40:55 -05:00
sysInfo := sysinfo . New ( false )
2015-06-19 18:29:47 -04:00
// Check if Devices cgroup is mounted, it is hard requirement for container security,
2016-05-26 07:08:53 -04:00
// on Linux.
if runtime . GOOS == "linux" && ! sysInfo . CgroupDevicesEnabled {
2016-12-25 01:37:31 -05:00
return nil , errors . New ( "Devices cgroup isn't mounted" )
2015-06-16 22:36:20 -04:00
}
2015-04-27 17:11:29 -04:00
d . ID = trustKey . PublicKey ( ) . KeyID ( )
d . repository = daemonRepo
2016-01-15 18:55:46 -05:00
d . containers = container . NewMemoryStore ( )
2017-02-23 18:12:18 -05:00
if d . containersReplica , err = container . NewViewDB ( ) ; err != nil {
2017-02-22 17:02:20 -05:00
return nil , err
}
2015-11-20 17:35:16 -05:00
d . execCommands = exec . NewStore ( )
2015-11-18 17:20:54 -05:00
d . trustKey = trustKey
2015-04-27 17:11:29 -04:00
d . idIndex = truncindex . NewTruncIndex ( [ ] string { } )
2015-11-03 14:06:16 -05:00
d . statsCollector = d . newStatsCollector ( 1 * time . Second )
2015-12-10 18:35:10 -05:00
d . defaultLogConfig = containertypes . LogConfig {
Type : config . LogConfig . Type ,
Config : config . LogConfig . Config ,
}
2015-04-27 17:11:29 -04:00
d . EventsService = eventsService
2015-06-12 09:25:32 -04:00
d . volumes = volStore
2015-05-19 16:05:25 -04:00
d . root = config . Root
2017-05-19 18:06:46 -04:00
d . idMappings = idMappings
2016-01-11 14:44:34 -05:00
d . seccompEnabled = sysInfo . Seccomp
2016-12-19 07:22:45 -05:00
d . apparmorEnabled = sysInfo . AppArmor
2017-09-22 09:52:41 -04:00
d . containerdRemote = containerdRemote
2015-04-27 17:11:29 -04:00
2015-09-03 20:51:04 -04:00
d . linkIndex = newLinkIndex ( )
2016-03-18 14:50:19 -04:00
go d . execCommandGC ( )
2017-09-22 09:52:41 -04:00
d . containerd , err = containerdRemote . NewClient ( MainNamespace , d )
2016-03-18 14:50:19 -04:00
if err != nil {
2015-03-06 15:44:31 -05:00
return nil , err
}
2015-04-27 17:11:29 -04:00
2016-09-06 17:30:55 -04:00
if err := d . restore ( ) ; err != nil {
2016-07-18 11:02:12 -04:00
return nil , err
}
2017-06-08 06:55:20 -04:00
close ( d . startupDone )
2016-07-18 11:02:12 -04:00
2016-07-20 19:11:28 -04:00
// FIXME: this method never returns an error
info , _ := d . SystemInfo ( )
2017-04-24 07:32:01 -04:00
engineInfo . WithValues (
2016-07-20 19:11:28 -04:00
dockerversion . Version ,
dockerversion . GitCommit ,
info . Architecture ,
info . Driver ,
info . KernelVersion ,
info . OperatingSystem ,
2017-04-24 07:32:01 -04:00
info . OSType ,
info . ID ,
2016-07-20 19:11:28 -04:00
) . Set ( 1 )
engineCpus . Set ( float64 ( info . NCPU ) )
engineMemory . Set ( float64 ( info . MemTotal ) )
2017-05-16 19:56:56 -04:00
gd := ""
for platform , ds := range d . stores {
if len ( gd ) > 0 {
gd += ", "
}
gd += ds . graphDriver
if len ( d . stores ) > 1 {
gd = fmt . Sprintf ( "%s (%s)" , gd , platform )
}
}
logrus . WithFields ( logrus . Fields {
"version" : dockerversion . Version ,
"commit" : dockerversion . GitCommit ,
"graphdriver(s)" : gd ,
} ) . Info ( "Docker daemon" )
2015-05-06 18:39:29 -04:00
return d , nil
}
2017-06-08 06:55:20 -04:00
func ( daemon * Daemon ) waitForStartupDone ( ) {
<- daemon . startupDone
}
2015-11-12 14:55:17 -05:00
func ( daemon * Daemon ) shutdownContainer ( c * container . Container ) error {
2016-06-06 23:29:05 -04:00
stopTimeout := c . StopTimeout ( )
2017-03-30 16:52:40 -04:00
2016-06-06 23:29:05 -04:00
// If container failed to exit in stopTimeout seconds of SIGTERM, then using the force
if err := daemon . containerStop ( c , stopTimeout ) ; err != nil {
2016-07-03 08:47:39 -04:00
return fmt . Errorf ( "Failed to stop container %s with error: %v" , c . ID , err )
2015-10-29 18:11:35 -04:00
}
2017-03-30 16:52:40 -04:00
// Wait without timeout for the container to exit.
// Ignore the result.
2017-09-06 04:54:24 -04:00
<- c . Wait ( context . Background ( ) , container . WaitConditionNotRunning )
2015-10-29 18:11:35 -04:00
return nil
}
2016-05-26 17:07:30 -04:00
// ShutdownTimeout returns the shutdown timeout based on the max stopTimeout of the containers,
// and is limited by daemon's ShutdownTimeout.
2016-06-06 23:29:05 -04:00
func ( daemon * Daemon ) ShutdownTimeout ( ) int {
2016-05-26 17:07:30 -04:00
// By default we use daemon's ShutdownTimeout.
shutdownTimeout := daemon . configStore . ShutdownTimeout
2016-06-06 23:29:05 -04:00
graceTimeout := 5
if daemon . containers != nil {
for _ , c := range daemon . containers . List ( ) {
if shutdownTimeout >= 0 {
stopTimeout := c . StopTimeout ( )
if stopTimeout < 0 {
shutdownTimeout = - 1
} else {
if stopTimeout + graceTimeout > shutdownTimeout {
shutdownTimeout = stopTimeout + graceTimeout
}
}
}
}
}
return shutdownTimeout
}
2015-07-30 17:01:53 -04:00
// Shutdown stops the daemon.
2015-09-29 13:51:40 -04:00
func ( daemon * Daemon ) Shutdown ( ) error {
2015-08-05 17:09:08 -04:00
daemon . shutdown = true
2016-06-02 14:10:55 -04:00
// Keep mounts and networking running on daemon shutdown if
// we are to keep containers running and restore them.
2016-07-22 11:53:26 -04:00
2016-07-27 11:30:15 -04:00
if daemon . configStore . LiveRestoreEnabled && daemon . containers != nil {
2016-07-07 22:19:48 -04:00
// check if there are any running containers, if none we should do some cleanup
if ls , err := daemon . Containers ( & types . ContainerListOptions { } ) ; len ( ls ) != 0 || err != nil {
2017-04-13 21:56:50 -04:00
// metrics plugins still need some cleanup
daemon . cleanupMetricsPlugins ( )
2016-07-07 22:19:48 -04:00
return nil
}
2016-06-02 14:10:55 -04:00
}
2016-07-07 22:19:48 -04:00
2015-04-27 17:11:29 -04:00
if daemon . containers != nil {
2017-10-12 19:31:33 -04:00
logrus . Debugf ( "daemon configured with a %d seconds minimum shutdown timeout" , daemon . configStore . ShutdownTimeout )
logrus . Debugf ( "start clean shutdown of all containers with a %d seconds timeout..." , daemon . ShutdownTimeout ( ) )
2016-01-15 18:55:46 -05:00
daemon . containers . ApplyAll ( func ( c * container . Container ) {
if ! c . IsRunning ( ) {
return
2015-04-27 17:11:29 -04:00
}
2016-01-15 18:55:46 -05:00
logrus . Debugf ( "stopping %s" , c . ID )
if err := daemon . shutdownContainer ( c ) ; err != nil {
logrus . Errorf ( "Stop container error: %v" , err )
return
}
2017-08-08 15:43:48 -04:00
if mountid , err := daemon . stores [ c . OS ] . layerStore . GetMountID ( c . ID ) ; err == nil {
2016-03-18 14:50:19 -04:00
daemon . cleanupMountsByID ( mountid )
}
2016-01-15 18:55:46 -05:00
logrus . Debugf ( "container stopped %s" , c . ID )
} )
2015-10-29 18:11:35 -04:00
}
2015-06-05 18:02:56 -04:00
2016-12-01 17:17:07 -05:00
if daemon . volumes != nil {
if err := daemon . volumes . Shutdown ( ) ; err != nil {
logrus . Errorf ( "Error shutting down volume store: %v" , err )
}
}
2017-05-16 19:56:56 -04:00
for platform , ds := range daemon . stores {
if ds . layerStore != nil {
if err := ds . layerStore . Cleanup ( ) ; err != nil {
logrus . Errorf ( "Error during layer Store.Cleanup(): %v %s" , err , platform )
}
2016-11-29 20:00:02 -05:00
}
}
2017-03-31 17:07:55 -04:00
// If we are part of a cluster, clean up cluster's stuff
if daemon . clusterProvider != nil {
logrus . Debugf ( "start clean shutdown of cluster resources..." )
daemon . DaemonLeavesCluster ( )
}
2017-04-13 21:56:50 -04:00
daemon . cleanupMetricsPlugins ( )
2016-11-29 20:00:02 -05:00
// Shutdown plugins after containers and layerstore. Don't change the order.
2016-10-06 10:09:54 -04:00
daemon . pluginShutdown ( )
2016-10-03 18:42:46 -04:00
2015-10-29 18:11:35 -04:00
// trigger libnetwork Stop only if it's initialized
if daemon . netController != nil {
daemon . netController . Stop ( )
2015-04-27 17:11:29 -04:00
}
2014-03-25 19:21:07 -04:00
2015-08-03 18:05:34 -04:00
if err := daemon . cleanupMounts ( ) ; err != nil {
return err
}
2014-03-25 19:21:07 -04:00
return nil
}
2015-11-12 14:55:17 -05:00
// Mount sets container.BaseFS
2015-07-30 17:01:53 -04:00
// (is it not set coming in? why is it unset?)
2015-11-12 14:55:17 -05:00
func ( daemon * Daemon ) Mount ( container * container . Container ) error {
2015-12-16 17:13:50 -05:00
dir , err := container . RWLayer . Mount ( container . GetMountLabel ( ) )
2015-11-18 17:20:54 -05:00
if err != nil {
return err
}
logrus . Debugf ( "container mounted via layerStore: %v" , dir )
2015-05-15 19:34:26 -04:00
2017-08-03 20:22:00 -04:00
if container . BaseFS != nil && container . BaseFS . Path ( ) != dir . Path ( ) {
2015-05-15 19:34:26 -04:00
// The mount path reported by the graph driver should always be trusted on Windows, since the
// volume path for a given mounted layer may change over time. This should only be an error
// on non-Windows operating systems.
2017-08-03 20:22:00 -04:00
if runtime . GOOS != "windows" {
2015-11-18 17:20:54 -05:00
daemon . Unmount ( container )
2015-05-15 19:34:26 -04:00
return fmt . Errorf ( "Error: driver %s is returning inconsistent paths for container %s ('%s' then '%s')" ,
2017-08-08 15:43:48 -04:00
daemon . GraphDriverName ( container . OS ) , container . ID , container . BaseFS , dir )
2015-05-15 19:34:26 -04:00
}
2013-10-31 21:07:54 -04:00
}
2015-11-12 14:55:17 -05:00
container . BaseFS = dir // TODO: combine these fields
2013-11-07 15:34:01 -05:00
return nil
2013-10-31 21:07:54 -04:00
}
2015-11-02 20:06:09 -05:00
// Unmount unsets the container base filesystem
2016-03-18 14:50:19 -04:00
func ( daemon * Daemon ) Unmount ( container * container . Container ) error {
2015-12-16 17:13:50 -05:00
if err := container . RWLayer . Unmount ( ) ; err != nil {
2015-11-18 17:20:54 -05:00
logrus . Errorf ( "Error unmounting container %s: %s" , container . ID , err )
2016-03-18 14:50:19 -04:00
return err
2015-11-18 17:20:54 -05:00
}
2016-10-19 12:22:02 -04:00
2016-03-18 14:50:19 -04:00
return nil
2014-01-10 17:26:29 -05:00
}
2017-02-28 04:51:40 -05:00
// Subnets return the IPv4 and IPv6 subnets of networks that are manager by Docker.
func ( daemon * Daemon ) Subnets ( ) ( [ ] net . IPNet , [ ] net . IPNet ) {
var v4Subnets [ ] net . IPNet
var v6Subnets [ ] net . IPNet
2016-06-30 21:07:35 -04:00
managedNetworks := daemon . netController . Networks ( )
for _ , managedNetwork := range managedNetworks {
2017-02-28 04:51:40 -05:00
v4infos , v6infos := managedNetwork . Info ( ) . IpamInfo ( )
for _ , info := range v4infos {
if info . IPAMData . Pool != nil {
v4Subnets = append ( v4Subnets , * info . IPAMData . Pool )
2016-06-30 21:07:35 -04:00
}
}
2017-02-28 04:51:40 -05:00
for _ , info := range v6infos {
if info . IPAMData . Pool != nil {
v6Subnets = append ( v6Subnets , * info . IPAMData . Pool )
2016-06-30 21:07:35 -04:00
}
}
}
2017-02-28 04:51:40 -05:00
return v4Subnets , v6Subnets
2016-06-30 21:07:35 -04:00
}
2015-12-16 15:32:16 -05:00
// GraphDriverName returns the name of the graph driver used by the layer.Store
2017-05-16 19:56:56 -04:00
func ( daemon * Daemon ) GraphDriverName ( platform string ) string {
return daemon . stores [ platform ] . layerStore . DriverName ( )
2014-03-07 21:42:29 -05:00
}
2017-03-10 12:47:25 -05:00
// prepareTempDir prepares and returns the default directory to use
// for temporary files.
// If it doesn't exist, it is created. If it exists, its content is removed.
2017-05-19 18:06:46 -04:00
func prepareTempDir ( rootDir string , rootIDs idtools . IDPair ) ( string , error ) {
2015-03-29 14:51:17 -04:00
var tmpDir string
if tmpDir = os . Getenv ( "DOCKER_TMPDIR" ) ; tmpDir == "" {
tmpDir = filepath . Join ( rootDir , "tmp" )
2017-03-10 12:47:25 -05:00
newName := tmpDir + "-old"
2017-04-17 14:59:23 -04:00
if err := os . Rename ( tmpDir , newName ) ; err == nil {
2017-03-10 12:47:25 -05:00
go func ( ) {
if err := os . RemoveAll ( newName ) ; err != nil {
logrus . Warnf ( "failed to delete old tmp directory: %s" , newName )
}
} ( )
2017-09-26 05:45:54 -04:00
} else if ! os . IsNotExist ( err ) {
2017-03-10 12:47:25 -05:00
logrus . Warnf ( "failed to rename %s for background deletion: %s. Deleting synchronously" , tmpDir , err )
if err := os . RemoveAll ( tmpDir ) ; err != nil {
logrus . Warnf ( "failed to delete old tmp directory: %s" , tmpDir )
}
}
2015-03-29 14:51:17 -04:00
}
2017-03-10 12:47:25 -05:00
// We don't remove the content of tmpdir if it's not the default,
// it may hold things that do not belong to us.
2017-05-19 18:06:46 -04:00
return tmpDir , idtools . MkdirAllAndChown ( tmpDir , 0700 , rootIDs )
2015-04-16 02:31:52 -04:00
}
2015-04-22 22:23:02 -04:00
2017-08-03 20:22:00 -04:00
func ( daemon * Daemon ) setupInitLayer ( initPath containerfs . ContainerFS ) error {
2017-05-31 17:56:23 -04:00
rootIDs := daemon . idMappings . RootPair ( )
2017-05-19 18:06:46 -04:00
return initlayer . Setup ( initPath , rootIDs )
2015-11-18 17:20:54 -05:00
}
2017-05-30 20:02:11 -04:00
func ( daemon * Daemon ) setGenericResources ( conf * config . Config ) error {
2017-08-29 15:28:33 -04:00
genericResources , err := config . ParseGenericResources ( conf . NodeGenericResources )
2017-05-30 20:02:11 -04:00
if err != nil {
return err
}
daemon . genericResources = genericResources
return nil
}
2017-01-23 06:23:07 -05:00
func setDefaultMtu ( conf * config . Config ) {
2015-06-15 19:33:02 -04:00
// do nothing if the config does not have the default 0 value.
2017-01-23 06:23:07 -05:00
if conf . Mtu != 0 {
2015-06-15 19:33:02 -04:00
return
}
2017-01-23 06:23:07 -05:00
conf . Mtu = config . DefaultNetworkMtu
2015-06-15 19:33:02 -04:00
}
2017-05-19 18:06:46 -04:00
func ( daemon * Daemon ) configureVolumes ( rootIDs idtools . IDPair ) ( * store . VolumeStore , error ) {
volumesDriver , err := local . New ( daemon . configStore . Root , rootIDs )
2015-09-16 17:18:24 -04:00
if err != nil {
return nil , err
}
2015-09-18 19:58:05 -04:00
2016-10-07 17:53:17 -04:00
volumedrivers . RegisterPluginGetter ( daemon . PluginStore )
2016-09-07 20:01:10 -04:00
2016-04-11 11:17:52 -04:00
if ! volumedrivers . Register ( volumesDriver , volumesDriver . Name ( ) ) {
2016-12-25 01:37:31 -05:00
return nil , errors . New ( "local volume driver could not be registered" )
2016-04-11 11:17:52 -04:00
}
2016-05-16 11:50:55 -04:00
return store . New ( daemon . configStore . Root )
2015-09-16 17:18:24 -04:00
}
2015-10-08 19:16:36 -04:00
2015-11-03 14:25:22 -05:00
// IsShuttingDown tells whether the daemon is shutting down or not
func ( daemon * Daemon ) IsShuttingDown ( ) bool {
return daemon . shutdown
}
2015-12-10 18:35:10 -05:00
// initDiscovery initializes the discovery watcher for this daemon.
2017-01-23 06:23:07 -05:00
func ( daemon * Daemon ) initDiscovery ( conf * config . Config ) error {
advertise , err := config . ParseClusterAdvertiseSettings ( conf . ClusterStore , conf . ClusterAdvertise )
2015-12-10 18:35:10 -05:00
if err != nil {
2017-01-23 06:23:07 -05:00
if err == discovery . ErrDiscoveryDisabled {
2015-12-10 18:35:10 -05:00
return nil
}
return err
}
2017-01-23 06:23:07 -05:00
conf . ClusterAdvertise = advertise
discoveryWatcher , err := discovery . Init ( conf . ClusterStore , conf . ClusterAdvertise , conf . ClusterOpts )
2015-12-10 18:35:10 -05:00
if err != nil {
return fmt . Errorf ( "discovery initialization failed (%v)" , err )
}
daemon . discoveryWatcher = discoveryWatcher
return nil
}
2017-01-23 06:23:07 -05:00
func isBridgeNetworkDisabled ( conf * config . Config ) bool {
return conf . BridgeConfig . Iface == config . DisableNetworkBridge
2016-03-09 23:33:21 -05:00
}
2017-01-23 06:23:07 -05:00
func ( daemon * Daemon ) networkOptions ( dconfig * config . Config , pg plugingetter . PluginGetter , activeSandboxes map [ string ] interface { } ) ( [ ] nwconfig . Option , error ) {
2016-03-09 23:33:21 -05:00
options := [ ] nwconfig . Option { }
if dconfig == nil {
return options , nil
}
2016-12-13 17:07:57 -05:00
options = append ( options , nwconfig . OptionExperimental ( dconfig . Experimental ) )
2016-03-09 23:33:21 -05:00
options = append ( options , nwconfig . OptionDataDir ( dconfig . Root ) )
2016-07-21 19:13:10 -04:00
options = append ( options , nwconfig . OptionExecRoot ( dconfig . GetExecRoot ( ) ) )
2016-03-09 23:33:21 -05:00
dd := runconfig . DefaultDaemonNetworkMode ( )
dn := runconfig . DefaultDaemonNetworkMode ( ) . NetworkName ( )
options = append ( options , nwconfig . OptionDefaultDriver ( string ( dd ) ) )
options = append ( options , nwconfig . OptionDefaultNetwork ( dn ) )
if strings . TrimSpace ( dconfig . ClusterStore ) != "" {
kv := strings . Split ( dconfig . ClusterStore , "://" )
if len ( kv ) != 2 {
2016-12-25 01:37:31 -05:00
return nil , errors . New ( "kv store daemon config must be of the form KV-PROVIDER://KV-URL" )
2016-03-09 23:33:21 -05:00
}
options = append ( options , nwconfig . OptionKVProvider ( kv [ 0 ] ) )
options = append ( options , nwconfig . OptionKVProviderURL ( kv [ 1 ] ) )
}
if len ( dconfig . ClusterOpts ) > 0 {
options = append ( options , nwconfig . OptionKVOpts ( dconfig . ClusterOpts ) )
}
if daemon . discoveryWatcher != nil {
options = append ( options , nwconfig . OptionDiscoveryWatcher ( daemon . discoveryWatcher ) )
}
if dconfig . ClusterAdvertise != "" {
options = append ( options , nwconfig . OptionDiscoveryAddress ( dconfig . ClusterAdvertise ) )
}
options = append ( options , nwconfig . OptionLabels ( dconfig . Labels ) )
options = append ( options , driverOptions ( dconfig ) ... )
2016-06-14 12:13:53 -04:00
2016-07-27 11:30:15 -04:00
if daemon . configStore != nil && daemon . configStore . LiveRestoreEnabled && len ( activeSandboxes ) != 0 {
2016-06-14 12:13:53 -04:00
options = append ( options , nwconfig . OptionActiveSandboxes ( activeSandboxes ) )
}
2016-09-26 13:08:52 -04:00
if pg != nil {
options = append ( options , nwconfig . OptionPluginGetter ( pg ) )
}
2017-07-28 16:18:49 -04:00
options = append ( options , nwconfig . OptionNetworkControlPlaneMTU ( dconfig . NetworkControlPlaneMTU ) )
2016-03-09 23:33:21 -05:00
return options , nil
}
2016-03-18 14:50:19 -04:00
2016-10-18 00:36:52 -04:00
// GetCluster returns the cluster
func ( daemon * Daemon ) GetCluster ( ) Cluster {
return daemon . cluster
}
// SetCluster sets the cluster
func ( daemon * Daemon ) SetCluster ( cluster Cluster ) {
daemon . cluster = cluster
}
2016-11-09 20:49:09 -05:00
func ( daemon * Daemon ) pluginShutdown ( ) {
2016-12-12 18:05:53 -05:00
manager := daemon . pluginManager
2016-11-09 20:49:09 -05:00
// Check for a valid manager object. In error conditions, daemon init can fail
// and shutdown called, before plugin manager is initialized.
if manager != nil {
manager . Shutdown ( )
}
}
2016-11-04 15:42:21 -04:00
2016-12-12 18:05:53 -05:00
// PluginManager returns current pluginManager associated with the daemon
func ( daemon * Daemon ) PluginManager ( ) * plugin . Manager { // set up before daemon to avoid this method
return daemon . pluginManager
}
2017-01-19 20:09:37 -05:00
// PluginGetter returns current pluginStore associated with the daemon
func ( daemon * Daemon ) PluginGetter ( ) * plugin . Store {
return daemon . PluginStore
}
2016-11-04 15:42:21 -04:00
// CreateDaemonRoot creates the root for the daemon
2017-01-23 06:23:07 -05:00
func CreateDaemonRoot ( config * config . Config ) error {
2016-11-04 15:42:21 -04:00
// get the canonical path to the Docker root directory
var realRoot string
if _ , err := os . Stat ( config . Root ) ; err != nil && os . IsNotExist ( err ) {
realRoot = config . Root
} else {
2017-05-31 20:11:42 -04:00
realRoot , err = getRealPath ( config . Root )
2016-11-04 15:42:21 -04:00
if err != nil {
return fmt . Errorf ( "Unable to get the full path to root (%s): %s" , config . Root , err )
}
}
2017-05-19 18:06:46 -04:00
idMappings , err := setupRemappedRoot ( config )
2016-11-04 15:42:21 -04:00
if err != nil {
return err
}
2017-05-31 17:56:23 -04:00
return setupDaemonRoot ( config , realRoot , idMappings . RootPair ( ) )
2016-11-04 15:42:21 -04:00
}
2017-06-22 10:46:26 -04:00
// checkpointAndSave grabs a container lock to safely call container.CheckpointTo
func ( daemon * Daemon ) checkpointAndSave ( container * container . Container ) error {
container . Lock ( )
defer container . Unlock ( )
if err := container . CheckpointTo ( daemon . containersReplica ) ; err != nil {
return fmt . Errorf ( "Error saving container state: %v" , err )
}
return nil
}
2017-06-30 13:34:40 -04:00
// because the CLI sends a -1 when it wants to unset the swappiness value
// we need to clear it on the server side
func fixMemorySwappiness ( resources * containertypes . Resources ) {
if resources . MemorySwappiness != nil && * resources . MemorySwappiness == - 1 {
resources . MemorySwappiness = nil
}
}
2017-08-29 02:49:26 -04:00
2017-09-22 02:04:34 -04:00
// GetAttachmentStore returns current attachment store associated with the daemon
func ( daemon * Daemon ) GetAttachmentStore ( ) * network . AttachmentStore {
return & daemon . attachmentStore
2017-08-29 02:49:26 -04:00
}