
Now that we have most of the services required for use with containerd, it was found that common patterns were used throughout services. By defining a central `errdefs` package, we ensure that services will map errors to and from grpc consistently and cleanly. One can decorate an error with as much context as necessary, using `pkg/errors` and still have the error mapped correctly via grpc. We make a few sacrifices. At this point, the common errors we use across the repository all map directly to grpc error codes. While this seems positively crazy, it actually works out quite well. The error conditions that were specific weren't super necessary and the ones that were necessary now simply have better context information. We lose the ability to add new codes, but this constraint may not be a bad thing. Effectively, as long as one uses the errors defined in `errdefs`, the error class will be mapped correctly across the grpc boundary and everything will be good. If you don't use those definitions, the error maps to "unknown" and the error message is preserved. Signed-off-by: Stephen J Day <stephen.day@docker.com>
86 lines
2.4 KiB
Go
86 lines
2.4 KiB
Go
package rootfs
|
|
|
|
import (
|
|
"fmt"
|
|
|
|
"github.com/containerd/containerd/errdefs"
|
|
"github.com/containerd/containerd/log"
|
|
"github.com/containerd/containerd/mount"
|
|
"github.com/containerd/containerd/snapshot"
|
|
"github.com/opencontainers/go-digest"
|
|
"github.com/opencontainers/image-spec/identity"
|
|
ocispec "github.com/opencontainers/image-spec/specs-go/v1"
|
|
"github.com/pkg/errors"
|
|
"golang.org/x/net/context"
|
|
)
|
|
|
|
type Applier interface {
|
|
Apply(context.Context, ocispec.Descriptor, []mount.Mount) (ocispec.Descriptor, error)
|
|
}
|
|
|
|
type Layer struct {
|
|
Diff ocispec.Descriptor
|
|
Blob ocispec.Descriptor
|
|
}
|
|
|
|
func ApplyLayers(ctx context.Context, layers []Layer, sn snapshot.Snapshotter, a Applier) (digest.Digest, error) {
|
|
var chain []digest.Digest
|
|
for _, layer := range layers {
|
|
if err := applyLayer(ctx, layer, chain, sn, a); err != nil {
|
|
// TODO: possibly wait and retry if extraction of same chain id was in progress
|
|
return "", err
|
|
}
|
|
|
|
chain = append(chain, layer.Diff.Digest)
|
|
}
|
|
return identity.ChainID(chain), nil
|
|
}
|
|
|
|
func applyLayer(ctx context.Context, layer Layer, chain []digest.Digest, sn snapshot.Snapshotter, a Applier) error {
|
|
var (
|
|
parent = identity.ChainID(chain)
|
|
chainID = identity.ChainID(append(chain, layer.Diff.Digest))
|
|
diff ocispec.Descriptor
|
|
)
|
|
|
|
_, err := sn.Stat(ctx, chainID.String())
|
|
if err == nil {
|
|
log.G(ctx).Debugf("Extraction not needed, layer snapshot exists")
|
|
return nil
|
|
} else if !errdefs.IsNotFound(err) {
|
|
return errors.Wrap(err, "failed to stat snapshot")
|
|
}
|
|
|
|
key := fmt.Sprintf("extract %s", chainID)
|
|
|
|
// Prepare snapshot with from parent
|
|
mounts, err := sn.Prepare(ctx, key, parent.String())
|
|
if err != nil {
|
|
//TODO: If is snapshot exists error, retry
|
|
return errors.Wrap(err, "failed to prepare extraction layer")
|
|
}
|
|
defer func() {
|
|
if err != nil {
|
|
log.G(ctx).WithError(err).WithField("key", key).Infof("Apply failure, attempting cleanup")
|
|
if rerr := sn.Remove(ctx, key); rerr != nil {
|
|
log.G(ctx).WithError(rerr).Warnf("Extraction snapshot %q removal failed: %v", key)
|
|
}
|
|
}
|
|
}()
|
|
|
|
diff, err = a.Apply(ctx, layer.Blob, mounts)
|
|
if err != nil {
|
|
return errors.Wrapf(err, "failed to extract layer %s", layer.Diff.Digest)
|
|
}
|
|
if diff.Digest != layer.Diff.Digest {
|
|
err = errors.Errorf("wrong diff id calculated on extraction %q", diff.Digest)
|
|
return err
|
|
}
|
|
|
|
if err = sn.Commit(ctx, chainID.String(), key); err != nil {
|
|
return errors.Wrapf(err, "failed to commit snapshot %s", parent)
|
|
}
|
|
|
|
return nil
|
|
}
|