Go to file
Stephen J Day a4fadc596b
errdefs: centralize error handling
Now that we have most of the services required for use with containerd,
it was found that common patterns were used throughout services. By
defining a central `errdefs` package, we ensure that services will map
errors to and from grpc consistently and cleanly. One can decorate an
error with as much context as necessary, using `pkg/errors` and still
have the error mapped correctly via grpc.

We make a few sacrifices. At this point, the common errors we use across
the repository all map directly to grpc error codes. While this seems
positively crazy, it actually works out quite well. The error conditions
that were specific weren't super necessary and the ones that were
necessary now simply have better context information. We lose the
ability to add new codes, but this constraint may not be a bad thing.

Effectively, as long as one uses the errors defined in `errdefs`, the
error class will be mapped correctly across the grpc boundary and
everything will be good. If you don't use those definitions, the error
maps to "unknown" and the error message is preserved.

Signed-off-by: Stephen J Day <stephen.day@docker.com>
2017-06-29 15:00:47 -07:00
api Implement task update 2017-06-26 16:38:49 -07:00
archive Add diff service implementation 2017-05-16 13:48:53 -07:00
cmd errdefs: centralize error handling 2017-06-29 15:00:47 -07:00
containers metadata: expand container runtime into bucket 2017-06-21 16:22:56 -07:00
content errdefs: centralize error handling 2017-06-29 15:00:47 -07:00
design Rewrite imports for new github org 2017-04-03 14:05:44 -07:00
differ Setup plugin ids and dependencies 2017-06-14 16:17:20 -07:00
docs retrying pr for website to satify cncf guidelines 2017-06-16 14:30:31 -07:00
errdefs errdefs: centralize error handling 2017-06-29 15:00:47 -07:00
events Use log package instead of logrus in eventSink.Write 2017-06-23 17:51:57 -07:00
filters filters: handle presence syntax correctly 2017-06-28 10:56:01 -07:00
fs mount: add mount.Lookup for ease of implementing snapshotters 2017-06-06 09:27:53 +00:00
gc fix typo I found in this repo 2017-01-20 01:18:26 +08:00
identifiers errdefs: centralize error handling 2017-06-29 15:00:47 -07:00
images Update GRPC for consistency 2017-06-21 13:34:24 -07:00
linux Merge pull request #1100 from crosbymichael/update-task 2017-06-27 14:39:45 -07:00
log Discard grpc logs by default 2017-06-14 11:58:13 -07:00
metadata errdefs: centralize error handling 2017-06-29 15:00:47 -07:00
metrics/cgroups Update windows and darwin for spec changes 2017-06-27 13:20:55 -07:00
mount mount: add mount.Lookup for ease of implementing snapshotters 2017-06-06 09:27:53 +00:00
namespaces errdefs: centralize error handling 2017-06-29 15:00:47 -07:00
oci package for manipulating OCI images 2017-06-14 06:49:56 +00:00
plugin Implement task update 2017-06-26 16:38:49 -07:00
progress cmd/dist: implement fetch prototype 2017-03-02 17:36:01 -08:00
reaper Handle start process errors in reaper 2017-06-16 16:03:13 -07:00
reference Add push object 2017-05-23 10:52:51 -07:00
remotes errdefs: centralize error handling 2017-06-29 15:00:47 -07:00
reports Fix sublist in dev report 2017-06-26 10:58:05 -07:00
rootfs errdefs: centralize error handling 2017-06-29 15:00:47 -07:00
server containerd: Do not fail on plugin failure 2017-06-23 17:51:57 -07:00
services errdefs: centralize error handling 2017-06-29 15:00:47 -07:00
snapshot errdefs: centralize error handling 2017-06-29 15:00:47 -07:00
sys Remove C implementation of epoll on arm64 2017-05-26 13:30:57 -04:00
testutil mount: add mount.Lookup for ease of implementing snapshotters 2017-06-06 09:27:53 +00:00
vendor Update runc and runtime-spec dependencies 2017-06-27 11:44:38 -07:00
version new service: version 2017-05-11 09:07:43 +00:00
windows Merge pull request #1100 from crosbymichael/update-task 2017-06-27 14:39:45 -07:00
.gitignore Add initial containerd *Client 2017-05-24 14:08:58 -07:00
.travis.yml Update runc and runtime-spec dependencies 2017-06-27 11:44:38 -07:00
benchmark_test.go Add DeleteOpts for container deletion 2017-06-23 11:57:29 -07:00
BUILDING.md Added build doc 2017-05-26 10:56:44 +02:00
checkpoint_test.go Add DeleteOpts for container deletion 2017-06-23 11:57:29 -07:00
client_test.go Move platformInit and plugin load to server 2017-06-23 12:06:31 -07:00
client_unix.go Add DefaultAddress to client 2017-06-20 13:34:37 -07:00
client_windows.go Add DefaultAddress to client 2017-06-20 13:34:37 -07:00
client.go Add NewWithGRPCOpts to specify grpc dial opts 2017-06-26 10:31:23 -07:00
code-of-conduct.md Add code of conduct 2017-04-04 09:41:38 -07:00
container_test.go container_test.go: fix compilation failure 2017-06-28 04:43:01 +00:00
container_unix.go errdefs: centralize error handling 2017-06-29 15:00:47 -07:00
container.go Merge pull request #1079 from crosbymichael/delete 2017-06-23 15:25:36 -07:00
containerd.service Add containerd unit file 2017-06-16 14:05:16 -07:00
CONTRIBUTING.md fix typo I found in this repo 2017-01-20 01:18:26 +08:00
grpc.go Add default namespace to client 2017-06-12 15:47:58 -07:00
image.go Update dist pull to use client 2017-06-06 15:03:52 -07:00
io_unix.go Add Load for container and Task with Attach 2017-06-01 14:12:02 -07:00
io_windows.go Add Load for container and Task with Attach 2017-06-01 14:12:02 -07:00
io.go Add terminal support 2017-06-01 14:46:14 -07:00
LICENSE.code Update readme and version to 0.1.0 2016-03-21 13:01:28 -07:00
LICENSE.docs Update copyright and license 2015-12-18 00:08:16 +01:00
MAINTAINERS Update with preferred email address 2017-05-17 14:09:15 -04:00
Makefile Merge pull request #1074 from stevvooe/whale-no-more 2017-06-23 11:08:27 -07:00
NOTICE Update readme and documentation for release 2015-12-16 12:15:22 -08:00
process.go Move shim protos into linux pkg 2017-06-23 16:21:47 -07:00
README.md Update readme 2017-06-20 13:19:53 -07:00
ROADMAP.md Rewrite imports for new github org 2017-04-03 14:05:44 -07:00
RUNC.md Update runc and runtime-spec dependencies 2017-06-27 11:44:38 -07:00
SCOPE.md Update readme 2017-06-20 13:19:53 -07:00
spec_unix_test.go containerd: Add WithNamespace to replace namespace 2017-06-19 11:22:26 -07:00
spec_unix.go Merge pull request #1100 from crosbymichael/update-task 2017-06-27 14:39:45 -07:00
spec_windows.go Merge pull request #1100 from crosbymichael/update-task 2017-06-27 14:39:45 -07:00
spec.go Don't require rootfs if not set on container 2017-05-25 11:17:36 -07:00
task.go Implement task update 2017-06-26 16:38:49 -07:00
vendor.conf Update runc and runtime-spec dependencies 2017-06-27 11:44:38 -07:00

banner

GoDoc Build Status FOSSA Status

containerd is an industry-standard container runtime with an emphasis on simplicity, robustness and portability. It is available as a daemon for Linux and Windows, which can manage the complete container lifecycle of its host system: image transfer and storage, container execution and supervision, low-level storage and network attachments, etc.

containerd is designed to be embedded into a larger system, rather than being used directly by developers or end-users.

Features

Client

containerd offers a full client package to help you integrate containerd into your platform.


import "github.com/containerd/containerd"

func main() {
	client, err := containerd.New("/run/containerd/containerd.sock")
	defer client.Close()
}

Namespaces

Namespaces allow multiple consumers to use the same containerd without conflicting with each other. It has the benefit of sharing content but still having separation with containers and images.

To set a namespace for requests to the API:

context    = context.Background()
// create a context for docker
docker = namespaces.WithNamespace(context, "docker")

containerd, err := client.NewContainer(docker, "id")

To set a default namespace on the client:

client, err := containerd.New(address, containerd.WithDefaultNamespace("docker"))

Distribution

// pull an image
image, err := client.Pull(context, "docker.io/library/redis:latest")

// push an image
err := client.Push(context, "docker.io/library/redis:latest", image.Target())

OCI Runtime Specification

containerd fully supports the OCI runtime specification for running containers. We have built in functions to help you generate runtime specifications based on images as well as custom parameters.

spec, err := containerd.GenerateSpec(containerd.WithImageConfig(context, image))

Containers

In containerd, a container is a metadata object. Resources such as an OCI runtime specification, image, root filesystem, and other metadata can be attached to a container.

redis, err := client.NewContainer(context, "redis-master",
	containerd.WithSpec(spec),
)
defer redis.Delete(context)

Root Filesystems

containerd allows you to use overlay or snapshot filesystems with your containers. It comes with builtin support for overlayfs and btrfs.

// pull an image and unpack it into the configured snapshotter
image, err := client.Pull(context, "docker.io/library/redis:latest", containerd.WithPullUnpack)

// allocate a new RW root filesystem for a container based on the image
redis, err := client.NewContainer(context, "redis-master",
	containerd.WithSpec(spec),
	containerd.WithNewRootFS("redis-rootfs", image),
)

// use a readonly filesystem with multiple containers
for i := 0; i < 10; i++ {
	id := fmt.Sprintf("id-%s", i)
	container, err := client.NewContainer(ctx, id,
		containerd.WithSpec(spec),
		containerd.WithNewReadonlyRootFS(id, image),
	)
}

Tasks

Taking a container object and turning it into a runnable process on a system is done by creating a new Task from the container. A task represents the runnable object within containerd.

// create a new task
task, err := redis.NewTask(context, containerd.Stdio)
defer task.Delete(context)

// the task is now running and has a pid that can be use to setup networking
// or other runtime settings outside of containerd
pid := task.Pid()

// start the redis-server process inside the container
err := task.Start(context)

// wait for the task to exit and get the exit status
status, err := task.Wait(context)

Checkpoint and Restore

If you have criu installed on your machine you can checkpoint and restore containers and their tasks. This allow you to clone and/or live migrate containers to other machines.

// checkpoint the task then push it to a registry
checkpoint, err := task.Checkpoint(context, containerd.WithExit)

err := client.Push(context, "myregistry/checkpoints/redis:master", checkpoint)

// on a new machine pull the checkpoint and restore the redis container
image, err := client.Pull(context, "myregistry/checkpoints/redis:master")

checkpoint := image.Target()

redis, err = client.NewContainer(context, "redis-master", containerd.WithCheckpoint(checkpoint, "redis-rootfs"))
defer container.Delete(context)

task, err = redis.NewTask(context, containerd.Stdio, containerd.WithTaskCheckpoint(checkpoint))
defer task.Delete(context)

err := task.Start(context)

Developer Quick-Start

To build the daemon and ctr simple test client, the following build system dependencies are required:

  • Go 1.8.x or above (requires 1.8 due to use of golang plugin(s))
  • Protoc 3.x compiler and headers (download at the Google protobuf releases page)
  • Btrfs headers and libraries for your distribution. Note that building the btrfs driver can be disabled via build tag removing this dependency.

For proper results, install the protoc release into /usr/local on your build system. For example, the following commands will download and install the 3.1.0 release for a 64-bit Linux host:

$ wget -c https://github.com/google/protobuf/releases/download/v3.1.0/protoc-3.1.0-linux-x86_64.zip
$ sudo unzip protoc-3.1.0-linux-x86_64.zip -d /usr/local

With the required dependencies installed, the Makefile target named binaries will compile the ctr and containerd binaries and place them in the bin/ directory. Using sudo make install will place the binaries in /usr/local/bin. When making any changes to the gRPC API, make generate will use the installed protoc compiler to regenerate the API generated code packages.

Note

: A build tag is currently available to disable building the btrfs snapshot driver. Adding BUILDTAGS=no_btrfs to your environment before calling the binaries Makefile target will disable the btrfs driver within the containerd Go build.

Vendoring of external imports uses the vndr tool which uses a simple config file, vendor.conf, to provide the URL and version or hash details for each vendored import. After modifying vendor.conf run the vndr tool to update the vendor/ directory contents. Combining the vendor.conf update with the changeset in vendor/ after running vndr should become a single commit for a PR which relies on vendored updates.

Please refer to RUNC.md for the currently supported version of runc that is used by containerd.

Releases

containerd will be released with a 1.0 when feature complete and this version will be supported for 1 year with security and bug fixes applied and released.

The upgrade path for containerd is that the 0.0.x patch releases are always backward compatible with its major and minor version. Minor (0.x.0) version will always be compatible with the previous minor release. i.e. 1.2.0 is backwards compatible with 1.1.0 and 1.1.0 is compatible with 1.0.0. There is no compatibility guarantees with upgrades from two minor releases. i.e. 1.0.0 to 1.2.0.

There are not backwards compatibility guarantees with upgrades to major versions. i.e 1.0.0 to 2.0.0. Each major version will be supported for 1 year with bug fixes and security patches.

Development reports.

Weekly summary on the progress and what is being worked on. https://github.com/containerd/containerd/tree/master/reports

Communication

For async communication and long running discussions please use issues and pull requests on the github repo. This will be the best place to discuss design and implementation.

For sync communication we have a community slack with a #containerd channel that everyone is welcome to join and chat about development.

Slack: https://dockr.ly/community

Copyright ©2016-2017 Docker, Inc. All rights reserved, except as follows. Code is released under the Apache 2.0 license. The README.md file, and files in the "docs" folder are licensed under the Creative Commons Attribution 4.0 International License under the terms and conditions set forth in the file "LICENSE.docs". You may obtain a duplicate copy of the same license, titled CC-BY-SA-4.0, at http://creativecommons.org/licenses/by/4.0/.