mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
00fd63e558
There are a couple of drivers that swallow errors that may occur in their Put() implementation. This changes the signature of (*Driver).Put for all the drivers implemented. Signed-off-by: Vincent Batts <vbatts@hashbangbash.com>
382 lines
9.4 KiB
Go
382 lines
9.4 KiB
Go
// +build linux
|
|
|
|
package overlay
|
|
|
|
import (
|
|
"bufio"
|
|
"fmt"
|
|
"io/ioutil"
|
|
"os"
|
|
"os/exec"
|
|
"path"
|
|
"sync"
|
|
"syscall"
|
|
|
|
log "github.com/Sirupsen/logrus"
|
|
"github.com/docker/docker/daemon/graphdriver"
|
|
"github.com/docker/docker/pkg/archive"
|
|
"github.com/docker/docker/pkg/chrootarchive"
|
|
"github.com/docker/libcontainer/label"
|
|
)
|
|
|
|
// This is a small wrapper over the NaiveDiffWriter that lets us have a custom
|
|
// implementation of ApplyDiff()
|
|
|
|
var (
|
|
ErrApplyDiffFallback = fmt.Errorf("Fall back to normal ApplyDiff")
|
|
)
|
|
|
|
type ApplyDiffProtoDriver interface {
|
|
graphdriver.ProtoDriver
|
|
ApplyDiff(id, parent string, diff archive.ArchiveReader) (size int64, err error)
|
|
}
|
|
|
|
type naiveDiffDriverWithApply struct {
|
|
graphdriver.Driver
|
|
applyDiff ApplyDiffProtoDriver
|
|
}
|
|
|
|
func NaiveDiffDriverWithApply(driver ApplyDiffProtoDriver) graphdriver.Driver {
|
|
return &naiveDiffDriverWithApply{
|
|
Driver: graphdriver.NaiveDiffDriver(driver),
|
|
applyDiff: driver,
|
|
}
|
|
}
|
|
|
|
func (d *naiveDiffDriverWithApply) ApplyDiff(id, parent string, diff archive.ArchiveReader) (int64, error) {
|
|
b, err := d.applyDiff.ApplyDiff(id, parent, diff)
|
|
if err == ErrApplyDiffFallback {
|
|
return d.Driver.ApplyDiff(id, parent, diff)
|
|
}
|
|
return b, err
|
|
}
|
|
|
|
// This backend uses the overlay union filesystem for containers
|
|
// plus hard link file sharing for images.
|
|
|
|
// Each container/image can have a "root" subdirectory which is a plain
|
|
// filesystem hierarchy, or they can use overlay.
|
|
|
|
// If they use overlay there is a "upper" directory and a "lower-id"
|
|
// file, as well as "merged" and "work" directories. The "upper"
|
|
// directory has the upper layer of the overlay, and "lower-id" contains
|
|
// the id of the parent whose "root" directory shall be used as the lower
|
|
// layer in the overlay. The overlay itself is mounted in the "merged"
|
|
// directory, and the "work" dir is needed for overlay to work.
|
|
|
|
// When a overlay layer is created there are two cases, either the
|
|
// parent has a "root" dir, then we start out with a empty "upper"
|
|
// directory overlaid on the parents root. This is typically the
|
|
// case with the init layer of a container which is based on an image.
|
|
// If there is no "root" in the parent, we inherit the lower-id from
|
|
// the parent and start by making a copy if the parents "upper" dir.
|
|
// This is typically the case for a container layer which copies
|
|
// its parent -init upper layer.
|
|
|
|
// Additionally we also have a custom implementation of ApplyLayer
|
|
// which makes a recursive copy of the parent "root" layer using
|
|
// hardlinks to share file data, and then applies the layer on top
|
|
// of that. This means all child images share file (but not directory)
|
|
// data with the parent.
|
|
|
|
type ActiveMount struct {
|
|
count int
|
|
path string
|
|
mounted bool
|
|
}
|
|
type Driver struct {
|
|
home string
|
|
sync.Mutex // Protects concurrent modification to active
|
|
active map[string]*ActiveMount
|
|
}
|
|
|
|
func init() {
|
|
graphdriver.Register("overlay", Init)
|
|
}
|
|
|
|
func Init(home string, options []string) (graphdriver.Driver, error) {
|
|
if err := supportsOverlay(); err != nil {
|
|
return nil, graphdriver.ErrNotSupported
|
|
}
|
|
|
|
// check if they are running over btrfs
|
|
var buf syscall.Statfs_t
|
|
if err := syscall.Statfs(path.Dir(home), &buf); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
switch graphdriver.FsMagic(buf.Type) {
|
|
case graphdriver.FsMagicBtrfs:
|
|
log.Error("'overlay' is not supported over btrfs.")
|
|
return nil, graphdriver.ErrIncompatibleFS
|
|
case graphdriver.FsMagicAufs:
|
|
log.Error("'overlay' is not supported over aufs.")
|
|
return nil, graphdriver.ErrIncompatibleFS
|
|
}
|
|
|
|
// Create the driver home dir
|
|
if err := os.MkdirAll(home, 0755); err != nil && !os.IsExist(err) {
|
|
return nil, err
|
|
}
|
|
|
|
d := &Driver{
|
|
home: home,
|
|
active: make(map[string]*ActiveMount),
|
|
}
|
|
|
|
return NaiveDiffDriverWithApply(d), nil
|
|
}
|
|
|
|
func supportsOverlay() error {
|
|
// We can try to modprobe overlay first before looking at
|
|
// proc/filesystems for when overlay is supported
|
|
exec.Command("modprobe", "overlay").Run()
|
|
|
|
f, err := os.Open("/proc/filesystems")
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer f.Close()
|
|
|
|
s := bufio.NewScanner(f)
|
|
for s.Scan() {
|
|
if s.Text() == "nodev\toverlay" {
|
|
return nil
|
|
}
|
|
}
|
|
log.Error("'overlay' not found as a supported filesystem on this host. Please ensure kernel is new enough and has overlay support loaded.")
|
|
return graphdriver.ErrNotSupported
|
|
}
|
|
|
|
func (d *Driver) String() string {
|
|
return "overlay"
|
|
}
|
|
|
|
func (d *Driver) Status() [][2]string {
|
|
return nil
|
|
}
|
|
|
|
func (d *Driver) Cleanup() error {
|
|
return nil
|
|
}
|
|
|
|
func (d *Driver) Create(id string, parent string) (retErr error) {
|
|
dir := d.dir(id)
|
|
if err := os.MkdirAll(path.Dir(dir), 0700); err != nil {
|
|
return err
|
|
}
|
|
if err := os.Mkdir(dir, 0700); err != nil {
|
|
return err
|
|
}
|
|
|
|
defer func() {
|
|
// Clean up on failure
|
|
if retErr != nil {
|
|
os.RemoveAll(dir)
|
|
}
|
|
}()
|
|
|
|
// Toplevel images are just a "root" dir
|
|
if parent == "" {
|
|
if err := os.Mkdir(path.Join(dir, "root"), 0755); err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
parentDir := d.dir(parent)
|
|
|
|
// Ensure parent exists
|
|
if _, err := os.Lstat(parentDir); err != nil {
|
|
return err
|
|
}
|
|
|
|
// If parent has a root, just do a overlay to it
|
|
parentRoot := path.Join(parentDir, "root")
|
|
|
|
if s, err := os.Lstat(parentRoot); err == nil {
|
|
if err := os.Mkdir(path.Join(dir, "upper"), s.Mode()); err != nil {
|
|
return err
|
|
}
|
|
if err := os.Mkdir(path.Join(dir, "work"), 0700); err != nil {
|
|
return err
|
|
}
|
|
if err := os.Mkdir(path.Join(dir, "merged"), 0700); err != nil {
|
|
return err
|
|
}
|
|
if err := ioutil.WriteFile(path.Join(dir, "lower-id"), []byte(parent), 0666); err != nil {
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
// Otherwise, copy the upper and the lower-id from the parent
|
|
|
|
lowerId, err := ioutil.ReadFile(path.Join(parentDir, "lower-id"))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := ioutil.WriteFile(path.Join(dir, "lower-id"), lowerId, 0666); err != nil {
|
|
return err
|
|
}
|
|
|
|
parentUpperDir := path.Join(parentDir, "upper")
|
|
s, err := os.Lstat(parentUpperDir)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
upperDir := path.Join(dir, "upper")
|
|
if err := os.Mkdir(upperDir, s.Mode()); err != nil {
|
|
return err
|
|
}
|
|
if err := os.Mkdir(path.Join(dir, "work"), 0700); err != nil {
|
|
return err
|
|
}
|
|
if err := os.Mkdir(path.Join(dir, "merged"), 0700); err != nil {
|
|
return err
|
|
}
|
|
|
|
return copyDir(parentUpperDir, upperDir, 0)
|
|
}
|
|
|
|
func (d *Driver) dir(id string) string {
|
|
return path.Join(d.home, id)
|
|
}
|
|
|
|
func (d *Driver) Remove(id string) error {
|
|
dir := d.dir(id)
|
|
if _, err := os.Stat(dir); err != nil {
|
|
return err
|
|
}
|
|
return os.RemoveAll(dir)
|
|
}
|
|
|
|
func (d *Driver) Get(id string, mountLabel string) (string, error) {
|
|
// Protect the d.active from concurrent access
|
|
d.Lock()
|
|
defer d.Unlock()
|
|
|
|
mount := d.active[id]
|
|
if mount != nil {
|
|
mount.count++
|
|
return mount.path, nil
|
|
} else {
|
|
mount = &ActiveMount{count: 1}
|
|
}
|
|
|
|
dir := d.dir(id)
|
|
if _, err := os.Stat(dir); err != nil {
|
|
return "", err
|
|
}
|
|
|
|
// If id has a root, just return it
|
|
rootDir := path.Join(dir, "root")
|
|
if _, err := os.Stat(rootDir); err == nil {
|
|
mount.path = rootDir
|
|
d.active[id] = mount
|
|
return mount.path, nil
|
|
}
|
|
|
|
lowerId, err := ioutil.ReadFile(path.Join(dir, "lower-id"))
|
|
if err != nil {
|
|
return "", err
|
|
}
|
|
lowerDir := path.Join(d.dir(string(lowerId)), "root")
|
|
upperDir := path.Join(dir, "upper")
|
|
workDir := path.Join(dir, "work")
|
|
mergedDir := path.Join(dir, "merged")
|
|
|
|
opts := fmt.Sprintf("lowerdir=%s,upperdir=%s,workdir=%s", lowerDir, upperDir, workDir)
|
|
if err := syscall.Mount("overlay", mergedDir, "overlay", 0, label.FormatMountLabel(opts, mountLabel)); err != nil {
|
|
return "", err
|
|
}
|
|
mount.path = mergedDir
|
|
mount.mounted = true
|
|
d.active[id] = mount
|
|
|
|
return mount.path, nil
|
|
}
|
|
|
|
func (d *Driver) Put(id string) error {
|
|
// Protect the d.active from concurrent access
|
|
d.Lock()
|
|
defer d.Unlock()
|
|
|
|
mount := d.active[id]
|
|
if mount == nil {
|
|
log.Debugf("Put on a non-mounted device %s", id)
|
|
return nil
|
|
}
|
|
|
|
mount.count--
|
|
if mount.count > 0 {
|
|
return nil
|
|
}
|
|
|
|
defer delete(d.active, id)
|
|
if mount.mounted {
|
|
err := syscall.Unmount(mount.path, 0)
|
|
if err != nil {
|
|
log.Debugf("Failed to unmount %s overlay: %v", id, err)
|
|
}
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func (d *Driver) ApplyDiff(id string, parent string, diff archive.ArchiveReader) (size int64, err error) {
|
|
dir := d.dir(id)
|
|
|
|
if parent == "" {
|
|
return 0, ErrApplyDiffFallback
|
|
}
|
|
|
|
parentRootDir := path.Join(d.dir(parent), "root")
|
|
if _, err := os.Stat(parentRootDir); err != nil {
|
|
return 0, ErrApplyDiffFallback
|
|
}
|
|
|
|
// We now know there is a parent, and it has a "root" directory containing
|
|
// the full root filesystem. We can just hardlink it and apply the
|
|
// layer. This relies on two things:
|
|
// 1) ApplyDiff is only run once on a clean (no writes to upper layer) container
|
|
// 2) ApplyDiff doesn't do any in-place writes to files (would break hardlinks)
|
|
// These are all currently true and are not expected to break
|
|
|
|
tmpRootDir, err := ioutil.TempDir(dir, "tmproot")
|
|
if err != nil {
|
|
return 0, err
|
|
}
|
|
defer func() {
|
|
if err != nil {
|
|
os.RemoveAll(tmpRootDir)
|
|
} else {
|
|
os.RemoveAll(path.Join(dir, "upper"))
|
|
os.RemoveAll(path.Join(dir, "work"))
|
|
os.RemoveAll(path.Join(dir, "merged"))
|
|
os.RemoveAll(path.Join(dir, "lower-id"))
|
|
}
|
|
}()
|
|
|
|
if err = copyDir(parentRootDir, tmpRootDir, CopyHardlink); err != nil {
|
|
return 0, err
|
|
}
|
|
|
|
if size, err = chrootarchive.ApplyLayer(tmpRootDir, diff); err != nil {
|
|
return 0, err
|
|
}
|
|
|
|
rootDir := path.Join(dir, "root")
|
|
if err := os.Rename(tmpRootDir, rootDir); err != nil {
|
|
return 0, err
|
|
}
|
|
|
|
return
|
|
}
|
|
|
|
func (d *Driver) Exists(id string) bool {
|
|
_, err := os.Stat(d.dir(id))
|
|
return err == nil
|
|
}
|