/* Copyright The containerd Authors. Licensed under the Apache License, Version 2.0 (the "License"); you may not use this file except in compliance with the License. You may obtain a copy of the License at http://www.apache.org/licenses/LICENSE-2.0 Unless required by applicable law or agreed to in writing, software distributed under the License is distributed on an "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. See the License for the specific language governing permissions and limitations under the License. */ package v2 import ( "context" "errors" "fmt" "os" "os/exec" "path/filepath" "strings" "sync" "github.com/containerd/containerd/v2/core/containers" "github.com/containerd/containerd/v2/core/events/exchange" "github.com/containerd/containerd/v2/core/metadata" "github.com/containerd/containerd/v2/core/runtime" "github.com/containerd/containerd/v2/core/sandbox" "github.com/containerd/containerd/v2/internal/cleanup" "github.com/containerd/containerd/v2/pkg/namespaces" shimbinary "github.com/containerd/containerd/v2/pkg/shim" "github.com/containerd/containerd/v2/pkg/timeout" "github.com/containerd/containerd/v2/plugins" "github.com/containerd/containerd/v2/version" "github.com/containerd/log" "github.com/containerd/plugin" "github.com/containerd/plugin/registry" "github.com/containerd/typeurl/v2" ) // ShimConfig for the shim type ShimConfig struct { // Env is environment variables added to shim processes Env []string `toml:"env"` } func init() { // ShimManager is not only for TaskManager, // the "shim" sandbox controller also use it to manage shims, // so we make it an independent plugin registry.Register(&plugin.Registration{ Type: plugins.ShimPlugin, ID: "manager", Requires: []plugin.Type{ plugins.EventPlugin, plugins.MetadataPlugin, }, Config: &ShimConfig{}, InitFn: func(ic *plugin.InitContext) (interface{}, error) { config := ic.Config.(*ShimConfig) m, err := ic.GetSingle(plugins.MetadataPlugin) if err != nil { return nil, err } ep, err := ic.GetByID(plugins.EventPlugin, "exchange") if err != nil { return nil, err } events := ep.(*exchange.Exchange) cs := metadata.NewContainerStore(m.(*metadata.DB)) ss := metadata.NewSandboxStore(m.(*metadata.DB)) return NewShimManager(&ManagerConfig{ Address: ic.Properties[plugins.PropertyGRPCAddress], TTRPCAddress: ic.Properties[plugins.PropertyTTRPCAddress], Events: events, Store: cs, ShimEnv: config.Env, SandboxStore: ss, }) }, ConfigMigration: func(ctx context.Context, configVersion int, pluginConfigs map[string]interface{}) error { // Migrate configurations from io.containerd.runtime.v2.task // if the configVersion >= 3 please make sure the config is under io.containerd.shim.v1.manager. if configVersion >= version.ConfigVersion { return nil } const originalPluginName = string(plugins.RuntimePluginV2) + ".task" original, ok := pluginConfigs[originalPluginName] if !ok { return nil } src := original.(map[string]interface{}) dest := map[string]interface{}{} if v, ok := src["sched_core"]; ok { if schedCore, ok := v.(bool); schedCore { dest["env"] = []string{"SCHED_CORE=1"} } else if !ok { log.G(ctx).Warnf("skipping migration for non-boolean 'sched_core' value %v", v) } delete(src, "sched_core") } const newPluginName = string(plugins.ShimPlugin) + ".manager" pluginConfigs[originalPluginName] = src pluginConfigs[newPluginName] = dest return nil }, }) } type ManagerConfig struct { Store containers.Store Events *exchange.Exchange Address string TTRPCAddress string SandboxStore sandbox.Store ShimEnv []string } // NewShimManager creates a manager for v2 shims func NewShimManager(config *ManagerConfig) (*ShimManager, error) { m := &ShimManager{ containerdAddress: config.Address, containerdTTRPCAddress: config.TTRPCAddress, shims: runtime.NewNSMap[ShimInstance](), events: config.Events, containers: config.Store, env: config.ShimEnv, sandboxStore: config.SandboxStore, } return m, nil } // ShimManager manages currently running shim processes. // It is mainly responsible for launching new shims and for proper shutdown and cleanup of existing instances. // The manager is unaware of the underlying services shim provides and lets higher level services consume them, // but don't care about lifecycle management. type ShimManager struct { containerdAddress string containerdTTRPCAddress string env []string shims *runtime.NSMap[ShimInstance] events *exchange.Exchange containers containers.Store // runtimePaths is a cache of `runtime names` -> `resolved fs path` runtimePaths sync.Map sandboxStore sandbox.Store } // ID of the shim manager func (m *ShimManager) ID() string { return plugins.ShimPlugin.String() + ".manager" } // Start launches a new shim instance func (m *ShimManager) Start(ctx context.Context, id string, bundle *Bundle, opts runtime.CreateOpts) (_ ShimInstance, retErr error) { // This container belongs to sandbox which supposed to be already started via sandbox API. if opts.SandboxID != "" { var params shimbinary.BootstrapParams if opts.Address != "" { // The address returned from sandbox controller should be in the form like ttrpc+unix:// // or grpc+vsock://:, we should get the protocol from the url first. protocol, address, ok := strings.Cut(opts.Address, "+") if !ok { return nil, fmt.Errorf("the scheme of sandbox address should be in " + " the form of +, i.e. ttrpc+unix or grpc+vsock") } params = shimbinary.BootstrapParams{ Version: int(opts.Version), Protocol: protocol, Address: address, } } else { // For those sandbox we can not get endpoint, // fallback to legacy implementation process, err := m.Get(ctx, opts.SandboxID) if err != nil { return nil, fmt.Errorf("can't find sandbox %s", opts.SandboxID) } p, restoreErr := restoreBootstrapParams(process.Bundle()) if restoreErr != nil { return nil, fmt.Errorf("failed to get bootstrap "+ "params of sandbox %s, %v, legacy restore error %v", opts.SandboxID, err, restoreErr) } params = p } // Write sandbox ID this task belongs to. if err := os.WriteFile(filepath.Join(bundle.Path, "sandbox"), []byte(opts.SandboxID), 0600); err != nil { return nil, err } if err := writeBootstrapParams(filepath.Join(bundle.Path, "bootstrap.json"), params); err != nil { return nil, fmt.Errorf("failed to write bootstrap.json for bundle %s: %w", bundle.Path, err) } shim, err := loadShim(ctx, bundle, func() {}) if err != nil { return nil, fmt.Errorf("failed to load sandbox task %q: %w", opts.SandboxID, err) } if err := m.shims.Add(ctx, shim); err != nil { return nil, err } return shim, nil } shim, err := m.startShim(ctx, bundle, id, opts) if err != nil { return nil, err } defer func() { if retErr != nil { m.cleanupShim(ctx, shim) } }() if err := m.shims.Add(ctx, shim); err != nil { return nil, fmt.Errorf("failed to add task: %w", err) } return shim, nil } func (m *ShimManager) startShim(ctx context.Context, bundle *Bundle, id string, opts runtime.CreateOpts) (*shim, error) { ns, err := namespaces.NamespaceRequired(ctx) if err != nil { return nil, err } ctx = log.WithLogger(ctx, log.G(ctx).WithField("namespace", ns)) topts := opts.TaskOptions if topts == nil || topts.GetValue() == nil { topts = opts.RuntimeOptions } runtimePath, err := m.resolveRuntimePath(opts.Runtime) if err != nil { return nil, fmt.Errorf("failed to resolve runtime path: %w", err) } b := shimBinary(bundle, shimBinaryConfig{ runtime: runtimePath, address: m.containerdAddress, ttrpcAddress: m.containerdTTRPCAddress, env: m.env, }) shim, err := b.Start(ctx, typeurl.MarshalProto(topts), func() { log.G(ctx).WithField("id", id).Info("shim disconnected") cleanupAfterDeadShim(cleanup.Background(ctx), id, m.shims, m.events, b) // Remove self from the runtime task list. Even though the cleanupAfterDeadShim() // would publish taskExit event, but the shim.Delete() would always failed with ttrpc // disconnect and there is no chance to remove this dead task from runtime task lists. // Thus it's better to delete it here. m.shims.Delete(ctx, id) }) if err != nil { return nil, fmt.Errorf("start failed: %w", err) } return shim, nil } // restoreBootstrapParams reads bootstrap.json to restore shim configuration. // If its an old shim, this will perform migration - read address file and write default bootstrap // configuration (version = 2, protocol = ttrpc, and address). func restoreBootstrapParams(bundlePath string) (shimbinary.BootstrapParams, error) { filePath := filepath.Join(bundlePath, "bootstrap.json") // Read bootstrap.json if exists if _, err := os.Stat(filePath); err == nil { return readBootstrapParams(filePath) } else if !errors.Is(err, os.ErrNotExist) { return shimbinary.BootstrapParams{}, fmt.Errorf("failed to stat %s: %w", filePath, err) } // File not found, likely its an older shim. Try migrate. address, err := shimbinary.ReadAddress(filepath.Join(bundlePath, "address")) if err != nil { return shimbinary.BootstrapParams{}, fmt.Errorf("unable to migrate shim: failed to get socket address for bundle %s: %w", bundlePath, err) } params := shimbinary.BootstrapParams{ Version: 2, Address: address, Protocol: "ttrpc", } if err := writeBootstrapParams(filePath, params); err != nil { return shimbinary.BootstrapParams{}, fmt.Errorf("unable to migrate: failed to write bootstrap.json file: %w", err) } return params, nil } func (m *ShimManager) resolveRuntimePath(runtime string) (string, error) { if runtime == "" { return "", fmt.Errorf("no runtime name") } // Custom path to runtime binary if filepath.IsAbs(runtime) { // Make sure it exists before returning ok if _, err := os.Stat(runtime); err != nil { return "", fmt.Errorf("invalid custom binary path: %w", err) } return runtime, nil } // Check if relative path to runtime binary provided if strings.Contains(runtime, "/") { return "", fmt.Errorf("invalid runtime name %s, correct runtime name should be either format like `io.containerd.runc.v2` or a full path to the binary", runtime) } // Preserve existing logic and resolve runtime path from runtime name. name := shimbinary.BinaryName(runtime) if name == "" { return "", fmt.Errorf("invalid runtime name %s, correct runtime name should be either format like `io.containerd.runc.v2` or a full path to the binary", runtime) } if path, ok := m.runtimePaths.Load(name); ok { return path.(string), nil } var ( cmdPath string lerr error ) binaryPath := shimbinary.BinaryPath(runtime) if _, serr := os.Stat(binaryPath); serr == nil { cmdPath = binaryPath } if cmdPath == "" { if cmdPath, lerr = exec.LookPath(name); lerr != nil { if eerr, ok := lerr.(*exec.Error); ok { if eerr.Err == exec.ErrNotFound { self, err := os.Executable() if err != nil { return "", err } // Match the calling binaries (containerd) path and see // if they are side by side. If so, execute the shim // found there. testPath := filepath.Join(filepath.Dir(self), name) if _, serr := os.Stat(testPath); serr == nil { cmdPath = testPath } if cmdPath == "" { return "", fmt.Errorf("runtime %q binary not installed %q: %w", runtime, name, os.ErrNotExist) } } } } } cmdPath, err := filepath.Abs(cmdPath) if err != nil { return "", err } if path, ok := m.runtimePaths.LoadOrStore(name, cmdPath); ok { // We didn't store cmdPath we loaded an already cached value. Use it. cmdPath = path.(string) } return cmdPath, nil } // cleanupShim attempts to properly delete and cleanup shim after error func (m *ShimManager) cleanupShim(ctx context.Context, shim *shim) { dctx, cancel := timeout.WithContext(cleanup.Background(ctx), cleanupTimeout) defer cancel() _ = shim.Delete(dctx) m.shims.Delete(dctx, shim.ID()) } func (m *ShimManager) Get(ctx context.Context, id string) (ShimInstance, error) { return m.shims.Get(ctx, id) } // Delete a runtime task func (m *ShimManager) Delete(ctx context.Context, id string) error { shim, err := m.shims.Get(ctx, id) if err != nil { return err } err = shim.Delete(ctx) m.shims.Delete(ctx, id) return err }