With this changeset, image store access is now moved to completely accessible over GRPC. No clients manipulate the image store database directly and the GRPC client is fully featured. The metadata database is now managed by the daemon and access coordinated via services. Signed-off-by: Stephen J Day <stephen.day@docker.com>
		
			
				
	
	
		
			395 lines
		
	
	
		
			8.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			395 lines
		
	
	
		
			8.6 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
package main
 | 
						|
 | 
						|
import (
 | 
						|
	gocontext "context"
 | 
						|
	"encoding/json"
 | 
						|
	"fmt"
 | 
						|
	"os"
 | 
						|
	"path/filepath"
 | 
						|
	"runtime"
 | 
						|
	"strconv"
 | 
						|
	"strings"
 | 
						|
 | 
						|
	"google.golang.org/grpc"
 | 
						|
	"google.golang.org/grpc/codes"
 | 
						|
 | 
						|
	"github.com/containerd/containerd/api/services/execution"
 | 
						|
	rootfsapi "github.com/containerd/containerd/api/services/rootfs"
 | 
						|
	"github.com/containerd/containerd/images"
 | 
						|
	"github.com/crosbymichael/console"
 | 
						|
	protobuf "github.com/gogo/protobuf/types"
 | 
						|
	"github.com/opencontainers/image-spec/identity"
 | 
						|
	ocispec "github.com/opencontainers/image-spec/specs-go/v1"
 | 
						|
	"github.com/opencontainers/runtime-spec/specs-go"
 | 
						|
	"github.com/pkg/errors"
 | 
						|
	"github.com/urfave/cli"
 | 
						|
)
 | 
						|
 | 
						|
const (
 | 
						|
	rwm        = "rwm"
 | 
						|
	rootfsPath = "rootfs"
 | 
						|
)
 | 
						|
 | 
						|
var capabilities = []string{
 | 
						|
	"CAP_CHOWN",
 | 
						|
	"CAP_DAC_OVERRIDE",
 | 
						|
	"CAP_FSETID",
 | 
						|
	"CAP_FOWNER",
 | 
						|
	"CAP_MKNOD",
 | 
						|
	"CAP_NET_RAW",
 | 
						|
	"CAP_SETGID",
 | 
						|
	"CAP_SETUID",
 | 
						|
	"CAP_SETFCAP",
 | 
						|
	"CAP_SETPCAP",
 | 
						|
	"CAP_NET_BIND_SERVICE",
 | 
						|
	"CAP_SYS_CHROOT",
 | 
						|
	"CAP_KILL",
 | 
						|
	"CAP_AUDIT_WRITE",
 | 
						|
}
 | 
						|
 | 
						|
func spec(id string, config *ocispec.ImageConfig, context *cli.Context) (*specs.Spec, error) {
 | 
						|
	env := []string{
 | 
						|
		"PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin",
 | 
						|
	}
 | 
						|
	env = append(env, config.Env...)
 | 
						|
	cmd := config.Cmd
 | 
						|
	if v := context.Args().Tail(); len(v) > 0 {
 | 
						|
		cmd = v
 | 
						|
	}
 | 
						|
	var (
 | 
						|
		// TODO: support overriding entrypoint
 | 
						|
		args     = append(config.Entrypoint, cmd...)
 | 
						|
		tty      = context.Bool("tty")
 | 
						|
		uid, gid uint32
 | 
						|
	)
 | 
						|
	if config.User != "" {
 | 
						|
		parts := strings.Split(config.User, ":")
 | 
						|
		switch len(parts) {
 | 
						|
		case 1:
 | 
						|
			v, err := strconv.ParseUint(parts[0], 0, 10)
 | 
						|
			if err != nil {
 | 
						|
				return nil, err
 | 
						|
			}
 | 
						|
			uid, gid = uint32(v), uint32(v)
 | 
						|
		case 2:
 | 
						|
			v, err := strconv.ParseUint(parts[0], 0, 10)
 | 
						|
			if err != nil {
 | 
						|
				return nil, err
 | 
						|
			}
 | 
						|
			uid = uint32(v)
 | 
						|
			if v, err = strconv.ParseUint(parts[1], 0, 10); err != nil {
 | 
						|
				return nil, err
 | 
						|
			}
 | 
						|
			gid = uint32(v)
 | 
						|
		default:
 | 
						|
			return nil, fmt.Errorf("invalid USER value %s", config.User)
 | 
						|
		}
 | 
						|
	}
 | 
						|
	if tty {
 | 
						|
		env = append(env, "TERM=xterm")
 | 
						|
	}
 | 
						|
	cwd := config.WorkingDir
 | 
						|
	if cwd == "" {
 | 
						|
		cwd = "/"
 | 
						|
	}
 | 
						|
	return &specs.Spec{
 | 
						|
		Version: specs.Version,
 | 
						|
		Platform: specs.Platform{
 | 
						|
			OS:   runtime.GOOS,
 | 
						|
			Arch: runtime.GOARCH,
 | 
						|
		},
 | 
						|
		Root: specs.Root{
 | 
						|
			Path:     rootfsPath,
 | 
						|
			Readonly: context.Bool("readonly"),
 | 
						|
		},
 | 
						|
		Process: specs.Process{
 | 
						|
			Args:            args,
 | 
						|
			Env:             env,
 | 
						|
			Terminal:        tty,
 | 
						|
			Cwd:             cwd,
 | 
						|
			NoNewPrivileges: true,
 | 
						|
			User: specs.User{
 | 
						|
				UID: uid,
 | 
						|
				GID: gid,
 | 
						|
			},
 | 
						|
			Capabilities: &specs.LinuxCapabilities{
 | 
						|
				Bounding:    capabilities,
 | 
						|
				Permitted:   capabilities,
 | 
						|
				Inheritable: capabilities,
 | 
						|
				Effective:   capabilities,
 | 
						|
				Ambient:     capabilities,
 | 
						|
			},
 | 
						|
			Rlimits: []specs.LinuxRlimit{
 | 
						|
				{
 | 
						|
					Type: "RLIMIT_NOFILE",
 | 
						|
					Hard: uint64(1024),
 | 
						|
					Soft: uint64(1024),
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		Mounts: []specs.Mount{
 | 
						|
			{
 | 
						|
				Destination: "/proc",
 | 
						|
				Type:        "proc",
 | 
						|
				Source:      "proc",
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Destination: "/dev",
 | 
						|
				Type:        "tmpfs",
 | 
						|
				Source:      "tmpfs",
 | 
						|
				Options:     []string{"nosuid", "strictatime", "mode=755", "size=65536k"},
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Destination: "/dev/pts",
 | 
						|
				Type:        "devpts",
 | 
						|
				Source:      "devpts",
 | 
						|
				Options:     []string{"nosuid", "noexec", "newinstance", "ptmxmode=0666", "mode=0620", "gid=5"},
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Destination: "/dev/shm",
 | 
						|
				Type:        "tmpfs",
 | 
						|
				Source:      "shm",
 | 
						|
				Options:     []string{"nosuid", "noexec", "nodev", "mode=1777", "size=65536k"},
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Destination: "/dev/mqueue",
 | 
						|
				Type:        "mqueue",
 | 
						|
				Source:      "mqueue",
 | 
						|
				Options:     []string{"nosuid", "noexec", "nodev"},
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Destination: "/sys",
 | 
						|
				Type:        "sysfs",
 | 
						|
				Source:      "sysfs",
 | 
						|
				Options:     []string{"nosuid", "noexec", "nodev", "ro"},
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Destination: "/run",
 | 
						|
				Type:        "tmpfs",
 | 
						|
				Source:      "tmpfs",
 | 
						|
				Options:     []string{"nosuid", "strictatime", "mode=755", "size=65536k"},
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Destination: "/etc/resolv.conf",
 | 
						|
				Type:        "bind",
 | 
						|
				Source:      "/etc/resolv.conf",
 | 
						|
				Options:     []string{"rbind", "ro"},
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Destination: "/etc/hosts",
 | 
						|
				Type:        "bind",
 | 
						|
				Source:      "/etc/hosts",
 | 
						|
				Options:     []string{"rbind", "ro"},
 | 
						|
			},
 | 
						|
			{
 | 
						|
				Destination: "/etc/localtime",
 | 
						|
				Type:        "bind",
 | 
						|
				Source:      "/etc/localtime",
 | 
						|
				Options:     []string{"rbind", "ro"},
 | 
						|
			},
 | 
						|
		},
 | 
						|
		Hostname: id,
 | 
						|
		Linux: &specs.Linux{
 | 
						|
			Resources: &specs.LinuxResources{
 | 
						|
				Devices: []specs.LinuxDeviceCgroup{
 | 
						|
					{
 | 
						|
						Allow:  false,
 | 
						|
						Access: rwm,
 | 
						|
					},
 | 
						|
				},
 | 
						|
			},
 | 
						|
			Namespaces: []specs.LinuxNamespace{
 | 
						|
				{
 | 
						|
					Type: "pid",
 | 
						|
				},
 | 
						|
				{
 | 
						|
					Type: "ipc",
 | 
						|
				},
 | 
						|
				{
 | 
						|
					Type: "uts",
 | 
						|
				},
 | 
						|
				{
 | 
						|
					Type: "mount",
 | 
						|
				},
 | 
						|
				{
 | 
						|
					Type: "network",
 | 
						|
				},
 | 
						|
			},
 | 
						|
		},
 | 
						|
	}, nil
 | 
						|
}
 | 
						|
 | 
						|
var runCommand = cli.Command{
 | 
						|
	Name:      "run",
 | 
						|
	Usage:     "run a container",
 | 
						|
	ArgsUsage: "IMAGE [COMMAND] [ARG...]",
 | 
						|
	Flags: []cli.Flag{
 | 
						|
		cli.StringFlag{
 | 
						|
			Name:  "id",
 | 
						|
			Usage: "id of the container",
 | 
						|
		},
 | 
						|
		cli.BoolFlag{
 | 
						|
			Name:  "tty,t",
 | 
						|
			Usage: "allocate a TTY for the container",
 | 
						|
		},
 | 
						|
		cli.StringFlag{
 | 
						|
			Name:  "rootfs,r",
 | 
						|
			Usage: "path to the container's root filesystem",
 | 
						|
		},
 | 
						|
		cli.StringFlag{
 | 
						|
			Name:  "runtime",
 | 
						|
			Usage: "runtime name (linux, windows, vmware-linux)",
 | 
						|
			Value: "linux",
 | 
						|
		},
 | 
						|
		cli.BoolFlag{
 | 
						|
			Name:  "readonly",
 | 
						|
			Usage: "set the containers filesystem as readonly",
 | 
						|
		},
 | 
						|
	},
 | 
						|
	Action: func(context *cli.Context) error {
 | 
						|
		ctx := gocontext.Background()
 | 
						|
		id := context.String("id")
 | 
						|
		if id == "" {
 | 
						|
			return errors.New("container id must be provided")
 | 
						|
		}
 | 
						|
 | 
						|
		containers, err := getExecutionService(context)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		tmpDir, err := getTempDir(id)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		defer os.RemoveAll(tmpDir)
 | 
						|
		events, err := containers.Events(ctx, &execution.EventsRequest{})
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
 | 
						|
		provider, err := getContentProvider(context)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
 | 
						|
		rootfsClient, err := getRootFSService(context)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
 | 
						|
		imageStore, err := getImageStore(context)
 | 
						|
		if err != nil {
 | 
						|
			return errors.Wrap(err, "failed resolving image store")
 | 
						|
		}
 | 
						|
 | 
						|
		ref := context.Args().First()
 | 
						|
 | 
						|
		image, err := imageStore.Get(ctx, ref)
 | 
						|
		if err != nil {
 | 
						|
			return errors.Wrapf(err, "could not resolve %q", ref)
 | 
						|
		}
 | 
						|
		// let's close out our db and tx so we don't hold the lock whilst running.
 | 
						|
 | 
						|
		diffIDs, err := image.RootFS(ctx, provider)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
 | 
						|
		if _, err := rootfsClient.Prepare(gocontext.TODO(), &rootfsapi.PrepareRequest{
 | 
						|
			Name:    id,
 | 
						|
			ChainID: identity.ChainID(diffIDs),
 | 
						|
		}); err != nil {
 | 
						|
			if grpc.Code(err) != codes.AlreadyExists {
 | 
						|
				return err
 | 
						|
			}
 | 
						|
		}
 | 
						|
 | 
						|
		resp, err := rootfsClient.Mounts(gocontext.TODO(), &rootfsapi.MountsRequest{
 | 
						|
			Name: id,
 | 
						|
		})
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
 | 
						|
		ic, err := image.Config(ctx, provider)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		var imageConfig ocispec.Image
 | 
						|
		switch ic.MediaType {
 | 
						|
		case ocispec.MediaTypeImageConfig, images.MediaTypeDockerSchema2Config:
 | 
						|
			r, err := provider.Reader(ctx, ic.Digest)
 | 
						|
			if err != nil {
 | 
						|
				return err
 | 
						|
			}
 | 
						|
			if err := json.NewDecoder(r).Decode(&imageConfig); err != nil {
 | 
						|
				r.Close()
 | 
						|
				return err
 | 
						|
			}
 | 
						|
			r.Close()
 | 
						|
		default:
 | 
						|
			return fmt.Errorf("unknown image config media type %s", ic.MediaType)
 | 
						|
		}
 | 
						|
		rootfs := resp.Mounts
 | 
						|
		// generate the spec based on the image config
 | 
						|
		s, err := spec(id, &imageConfig.Config, context)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		data, err := json.Marshal(s)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		create := &execution.CreateRequest{
 | 
						|
			ID: id,
 | 
						|
			Spec: &protobuf.Any{
 | 
						|
				TypeUrl: specs.Version,
 | 
						|
				Value:   data,
 | 
						|
			},
 | 
						|
			Rootfs:   rootfs,
 | 
						|
			Runtime:  context.String("runtime"),
 | 
						|
			Terminal: context.Bool("tty"),
 | 
						|
			Stdin:    filepath.Join(tmpDir, "stdin"),
 | 
						|
			Stdout:   filepath.Join(tmpDir, "stdout"),
 | 
						|
			Stderr:   filepath.Join(tmpDir, "stderr"),
 | 
						|
		}
 | 
						|
		if create.Terminal {
 | 
						|
			con := console.Current()
 | 
						|
			defer con.Reset()
 | 
						|
			if err := con.SetRaw(); err != nil {
 | 
						|
				return err
 | 
						|
			}
 | 
						|
		}
 | 
						|
		fwg, err := prepareStdio(create.Stdin, create.Stdout, create.Stderr, create.Terminal)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		response, err := containers.Create(gocontext.Background(), create)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		if _, err := containers.Start(gocontext.Background(), &execution.StartRequest{
 | 
						|
			ID: response.ID,
 | 
						|
		}); err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
 | 
						|
		// Ensure we read all io only if container started successfully.
 | 
						|
		defer fwg.Wait()
 | 
						|
 | 
						|
		status, err := waitContainer(events, response)
 | 
						|
		if err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		if _, err := containers.Delete(gocontext.Background(), &execution.DeleteRequest{
 | 
						|
			ID: response.ID,
 | 
						|
		}); err != nil {
 | 
						|
			return err
 | 
						|
		}
 | 
						|
		if status != 0 {
 | 
						|
			return cli.NewExitError("", int(status))
 | 
						|
		}
 | 
						|
		return nil
 | 
						|
	},
 | 
						|
}
 |