This ensures that we do not trigger assertions inside HCS by tring to call hcsshim.DestroyLayer on the parent of a currently-activated layer. It also deactivates the layers before deletion, to ensure we trigger or avert file-in-use failures due to leftover state from the tests with more detail than 'destroy failed'. Signed-off-by: Paul "TBBle" Hampson <Paul.Hampson@Pobox.com>
		
			
				
	
	
		
			331 lines
		
	
	
		
			10 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			331 lines
		
	
	
		
			10 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
// +build windows
 | 
						|
 | 
						|
/*
 | 
						|
   Copyright The containerd Authors.
 | 
						|
 | 
						|
   Licensed under the Apache License, Version 2.0 (the "License");
 | 
						|
   you may not use this file except in compliance with the License.
 | 
						|
   You may obtain a copy of the License at
 | 
						|
 | 
						|
       http://www.apache.org/licenses/LICENSE-2.0
 | 
						|
 | 
						|
   Unless required by applicable law or agreed to in writing, software
 | 
						|
   distributed under the License is distributed on an "AS IS" BASIS,
 | 
						|
   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
 | 
						|
   See the License for the specific language governing permissions and
 | 
						|
   limitations under the License.
 | 
						|
*/
 | 
						|
 | 
						|
package sys
 | 
						|
 | 
						|
import (
 | 
						|
	"os"
 | 
						|
	"path/filepath"
 | 
						|
	"regexp"
 | 
						|
	"sort"
 | 
						|
	"strconv"
 | 
						|
	"strings"
 | 
						|
	"syscall"
 | 
						|
	"unsafe"
 | 
						|
 | 
						|
	"github.com/Microsoft/hcsshim"
 | 
						|
	"github.com/pkg/errors"
 | 
						|
	"golang.org/x/sys/windows"
 | 
						|
)
 | 
						|
 | 
						|
const (
 | 
						|
	// SddlAdministratorsLocalSystem is local administrators plus NT AUTHORITY\System
 | 
						|
	SddlAdministratorsLocalSystem = "D:P(A;OICI;GA;;;BA)(A;OICI;GA;;;SY)"
 | 
						|
)
 | 
						|
 | 
						|
// MkdirAllWithACL is a wrapper for MkdirAll that creates a directory
 | 
						|
// ACL'd for Builtin Administrators and Local System.
 | 
						|
func MkdirAllWithACL(path string, perm os.FileMode) error {
 | 
						|
	return mkdirall(path, true)
 | 
						|
}
 | 
						|
 | 
						|
// MkdirAll implementation that is volume path aware for Windows. It can be used
 | 
						|
// as a drop-in replacement for os.MkdirAll()
 | 
						|
func MkdirAll(path string, _ os.FileMode) error {
 | 
						|
	return mkdirall(path, false)
 | 
						|
}
 | 
						|
 | 
						|
// mkdirall is a custom version of os.MkdirAll modified for use on Windows
 | 
						|
// so that it is both volume path aware, and can create a directory with
 | 
						|
// a DACL.
 | 
						|
func mkdirall(path string, adminAndLocalSystem bool) error {
 | 
						|
	if re := regexp.MustCompile(`^\\\\\?\\Volume{[a-z0-9-]+}$`); re.MatchString(path) {
 | 
						|
		return nil
 | 
						|
	}
 | 
						|
 | 
						|
	// The rest of this method is largely copied from os.MkdirAll and should be kept
 | 
						|
	// as-is to ensure compatibility.
 | 
						|
 | 
						|
	// Fast path: if we can tell whether path is a directory or file, stop with success or error.
 | 
						|
	dir, err := os.Stat(path)
 | 
						|
	if err == nil {
 | 
						|
		if dir.IsDir() {
 | 
						|
			return nil
 | 
						|
		}
 | 
						|
		return &os.PathError{
 | 
						|
			Op:   "mkdir",
 | 
						|
			Path: path,
 | 
						|
			Err:  syscall.ENOTDIR,
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// Slow path: make sure parent exists and then call Mkdir for path.
 | 
						|
	i := len(path)
 | 
						|
	for i > 0 && os.IsPathSeparator(path[i-1]) { // Skip trailing path separator.
 | 
						|
		i--
 | 
						|
	}
 | 
						|
 | 
						|
	j := i
 | 
						|
	for j > 0 && !os.IsPathSeparator(path[j-1]) { // Scan backward over element.
 | 
						|
		j--
 | 
						|
	}
 | 
						|
 | 
						|
	if j > 1 {
 | 
						|
		// Create parent
 | 
						|
		err = mkdirall(path[0:j-1], adminAndLocalSystem)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	// Parent now exists; invoke os.Mkdir or mkdirWithACL and use its result.
 | 
						|
	if adminAndLocalSystem {
 | 
						|
		err = mkdirWithACL(path)
 | 
						|
	} else {
 | 
						|
		err = os.Mkdir(path, 0)
 | 
						|
	}
 | 
						|
 | 
						|
	if err != nil {
 | 
						|
		// Handle arguments like "foo/." by
 | 
						|
		// double-checking that directory doesn't exist.
 | 
						|
		dir, err1 := os.Lstat(path)
 | 
						|
		if err1 == nil && dir.IsDir() {
 | 
						|
			return nil
 | 
						|
		}
 | 
						|
		return err
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// mkdirWithACL creates a new directory. If there is an error, it will be of
 | 
						|
// type *PathError. .
 | 
						|
//
 | 
						|
// This is a modified and combined version of os.Mkdir and windows.Mkdir
 | 
						|
// in golang to cater for creating a directory am ACL permitting full
 | 
						|
// access, with inheritance, to any subfolder/file for Built-in Administrators
 | 
						|
// and Local System.
 | 
						|
func mkdirWithACL(name string) error {
 | 
						|
	sa := windows.SecurityAttributes{Length: 0}
 | 
						|
	sd, err := windows.SecurityDescriptorFromString(SddlAdministratorsLocalSystem)
 | 
						|
	if err != nil {
 | 
						|
		return &os.PathError{Op: "mkdir", Path: name, Err: err}
 | 
						|
	}
 | 
						|
	sa.Length = uint32(unsafe.Sizeof(sa))
 | 
						|
	sa.InheritHandle = 1
 | 
						|
	sa.SecurityDescriptor = sd
 | 
						|
 | 
						|
	namep, err := windows.UTF16PtrFromString(name)
 | 
						|
	if err != nil {
 | 
						|
		return &os.PathError{Op: "mkdir", Path: name, Err: err}
 | 
						|
	}
 | 
						|
 | 
						|
	e := windows.CreateDirectory(namep, &sa)
 | 
						|
	if e != nil {
 | 
						|
		return &os.PathError{Op: "mkdir", Path: name, Err: e}
 | 
						|
	}
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
// IsAbs is a platform-specific wrapper for filepath.IsAbs. On Windows,
 | 
						|
// golang filepath.IsAbs does not consider a path \windows\system32 as absolute
 | 
						|
// as it doesn't start with a drive-letter/colon combination. However, in
 | 
						|
// docker we need to verify things such as WORKDIR /windows/system32 in
 | 
						|
// a Dockerfile (which gets translated to \windows\system32 when being processed
 | 
						|
// by the daemon. This SHOULD be treated as absolute from a docker processing
 | 
						|
// perspective.
 | 
						|
func IsAbs(path string) bool {
 | 
						|
	if !filepath.IsAbs(path) {
 | 
						|
		if !strings.HasPrefix(path, string(os.PathSeparator)) {
 | 
						|
			return false
 | 
						|
		}
 | 
						|
	}
 | 
						|
	return true
 | 
						|
}
 | 
						|
 | 
						|
// The origin of the functions below here are the golang OS and windows packages,
 | 
						|
// slightly modified to only cope with files, not directories due to the
 | 
						|
// specific use case.
 | 
						|
//
 | 
						|
// The alteration is to allow a file on Windows to be opened with
 | 
						|
// FILE_FLAG_SEQUENTIAL_SCAN (particular for docker load), to avoid eating
 | 
						|
// the standby list, particularly when accessing large files such as layer.tar.
 | 
						|
 | 
						|
// CreateSequential creates the named file with mode 0666 (before umask), truncating
 | 
						|
// it if it already exists. If successful, methods on the returned
 | 
						|
// File can be used for I/O; the associated file descriptor has mode
 | 
						|
// O_RDWR.
 | 
						|
// If there is an error, it will be of type *PathError.
 | 
						|
func CreateSequential(name string) (*os.File, error) {
 | 
						|
	return OpenFileSequential(name, os.O_RDWR|os.O_CREATE|os.O_TRUNC, 0)
 | 
						|
}
 | 
						|
 | 
						|
// OpenSequential opens the named file for reading. If successful, methods on
 | 
						|
// the returned file can be used for reading; the associated file
 | 
						|
// descriptor has mode O_RDONLY.
 | 
						|
// If there is an error, it will be of type *PathError.
 | 
						|
func OpenSequential(name string) (*os.File, error) {
 | 
						|
	return OpenFileSequential(name, os.O_RDONLY, 0)
 | 
						|
}
 | 
						|
 | 
						|
// OpenFileSequential is the generalized open call; most users will use Open
 | 
						|
// or Create instead.
 | 
						|
// If there is an error, it will be of type *PathError.
 | 
						|
func OpenFileSequential(name string, flag int, _ os.FileMode) (*os.File, error) {
 | 
						|
	if name == "" {
 | 
						|
		return nil, &os.PathError{Op: "open", Path: name, Err: syscall.ENOENT}
 | 
						|
	}
 | 
						|
	r, errf := windowsOpenFileSequential(name, flag, 0)
 | 
						|
	if errf == nil {
 | 
						|
		return r, nil
 | 
						|
	}
 | 
						|
	return nil, &os.PathError{Op: "open", Path: name, Err: errf}
 | 
						|
}
 | 
						|
 | 
						|
func windowsOpenFileSequential(name string, flag int, _ os.FileMode) (file *os.File, err error) {
 | 
						|
	r, e := windowsOpenSequential(name, flag|windows.O_CLOEXEC, 0)
 | 
						|
	if e != nil {
 | 
						|
		return nil, e
 | 
						|
	}
 | 
						|
	return os.NewFile(uintptr(r), name), nil
 | 
						|
}
 | 
						|
 | 
						|
func makeInheritSa() *windows.SecurityAttributes {
 | 
						|
	var sa windows.SecurityAttributes
 | 
						|
	sa.Length = uint32(unsafe.Sizeof(sa))
 | 
						|
	sa.InheritHandle = 1
 | 
						|
	return &sa
 | 
						|
}
 | 
						|
 | 
						|
func windowsOpenSequential(path string, mode int, _ uint32) (fd windows.Handle, err error) {
 | 
						|
	if len(path) == 0 {
 | 
						|
		return windows.InvalidHandle, windows.ERROR_FILE_NOT_FOUND
 | 
						|
	}
 | 
						|
	pathp, err := windows.UTF16PtrFromString(path)
 | 
						|
	if err != nil {
 | 
						|
		return windows.InvalidHandle, err
 | 
						|
	}
 | 
						|
	var access uint32
 | 
						|
	switch mode & (windows.O_RDONLY | windows.O_WRONLY | windows.O_RDWR) {
 | 
						|
	case windows.O_RDONLY:
 | 
						|
		access = windows.GENERIC_READ
 | 
						|
	case windows.O_WRONLY:
 | 
						|
		access = windows.GENERIC_WRITE
 | 
						|
	case windows.O_RDWR:
 | 
						|
		access = windows.GENERIC_READ | windows.GENERIC_WRITE
 | 
						|
	}
 | 
						|
	if mode&windows.O_CREAT != 0 {
 | 
						|
		access |= windows.GENERIC_WRITE
 | 
						|
	}
 | 
						|
	if mode&windows.O_APPEND != 0 {
 | 
						|
		access &^= windows.GENERIC_WRITE
 | 
						|
		access |= windows.FILE_APPEND_DATA
 | 
						|
	}
 | 
						|
	sharemode := uint32(windows.FILE_SHARE_READ | windows.FILE_SHARE_WRITE)
 | 
						|
	var sa *windows.SecurityAttributes
 | 
						|
	if mode&windows.O_CLOEXEC == 0 {
 | 
						|
		sa = makeInheritSa()
 | 
						|
	}
 | 
						|
	var createmode uint32
 | 
						|
	switch {
 | 
						|
	case mode&(windows.O_CREAT|windows.O_EXCL) == (windows.O_CREAT | windows.O_EXCL):
 | 
						|
		createmode = windows.CREATE_NEW
 | 
						|
	case mode&(windows.O_CREAT|windows.O_TRUNC) == (windows.O_CREAT | windows.O_TRUNC):
 | 
						|
		createmode = windows.CREATE_ALWAYS
 | 
						|
	case mode&windows.O_CREAT == windows.O_CREAT:
 | 
						|
		createmode = windows.OPEN_ALWAYS
 | 
						|
	case mode&windows.O_TRUNC == windows.O_TRUNC:
 | 
						|
		createmode = windows.TRUNCATE_EXISTING
 | 
						|
	default:
 | 
						|
		createmode = windows.OPEN_EXISTING
 | 
						|
	}
 | 
						|
	// Use FILE_FLAG_SEQUENTIAL_SCAN rather than FILE_ATTRIBUTE_NORMAL as implemented in golang.
 | 
						|
	// https://msdn.microsoft.com/en-us/library/windows/desktop/aa363858(v=vs.85).aspx
 | 
						|
	const fileFlagSequentialScan = 0x08000000 // FILE_FLAG_SEQUENTIAL_SCAN
 | 
						|
	h, e := windows.CreateFile(pathp, access, sharemode, sa, createmode, fileFlagSequentialScan, 0)
 | 
						|
	return h, e
 | 
						|
}
 | 
						|
 | 
						|
// ForceRemoveAll is the same as os.RemoveAll, but is aware of io.containerd.snapshotter.v1.windows
 | 
						|
// and uses hcsshim to unmount and delete container layers contained therein, in the correct order,
 | 
						|
// when passed a containerd root data directory (i.e. the `--root` directory for containerd).
 | 
						|
func ForceRemoveAll(path string) error {
 | 
						|
	// snapshots/windows/windows.go init()
 | 
						|
	const snapshotPlugin = "io.containerd.snapshotter.v1" + "." + "windows"
 | 
						|
	// snapshots/windows/windows.go NewSnapshotter()
 | 
						|
	snapshotDir := filepath.Join(path, snapshotPlugin, "snapshots")
 | 
						|
	if stat, err := os.Stat(snapshotDir); err == nil && stat.IsDir() {
 | 
						|
		if err := cleanupWCOWLayers(snapshotDir); err != nil {
 | 
						|
			return errors.Wrapf(err, "failed to cleanup WCOW layers in %s", snapshotDir)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return os.RemoveAll(path)
 | 
						|
}
 | 
						|
 | 
						|
func cleanupWCOWLayers(root string) error {
 | 
						|
	// See snapshots/windows/windows.go getSnapshotDir()
 | 
						|
	var layerNums []int
 | 
						|
	if err := filepath.Walk(root, func(path string, info os.FileInfo, err error) error {
 | 
						|
		if path != root && info.IsDir() {
 | 
						|
			if layerNum, err := strconv.Atoi(filepath.Base(path)); err == nil {
 | 
						|
				layerNums = append(layerNums, layerNum)
 | 
						|
			} else {
 | 
						|
				return err
 | 
						|
			}
 | 
						|
			return filepath.SkipDir
 | 
						|
		}
 | 
						|
 | 
						|
		return nil
 | 
						|
	}); err != nil {
 | 
						|
		return err
 | 
						|
	}
 | 
						|
 | 
						|
	sort.Sort(sort.Reverse(sort.IntSlice(layerNums)))
 | 
						|
 | 
						|
	for _, layerNum := range layerNums {
 | 
						|
		if err := cleanupWCOWLayer(filepath.Join(root, strconv.Itoa(layerNum))); err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 | 
						|
 | 
						|
func cleanupWCOWLayer(layerPath string) error {
 | 
						|
	info := hcsshim.DriverInfo{
 | 
						|
		HomeDir: filepath.Dir(layerPath),
 | 
						|
	}
 | 
						|
 | 
						|
	// ERROR_DEV_NOT_EXIST is returned if the layer is not currently prepared.
 | 
						|
	if err := hcsshim.UnprepareLayer(info, filepath.Base(layerPath)); err != nil {
 | 
						|
		if hcserror, ok := err.(*hcsshim.HcsError); !ok || hcserror.Err != windows.ERROR_DEV_NOT_EXIST {
 | 
						|
			return errors.Wrapf(err, "failed to unprepare %s", layerPath)
 | 
						|
		}
 | 
						|
	}
 | 
						|
 | 
						|
	if err := hcsshim.DeactivateLayer(info, filepath.Base(layerPath)); err != nil {
 | 
						|
		return errors.Wrapf(err, "failed to deactivate %s", layerPath)
 | 
						|
	}
 | 
						|
 | 
						|
	if err := hcsshim.DestroyLayer(info, filepath.Base(layerPath)); err != nil {
 | 
						|
		return errors.Wrapf(err, "failed to destroy %s", layerPath)
 | 
						|
	}
 | 
						|
 | 
						|
	return nil
 | 
						|
}
 |