iSulad/src/services/execution/execute/execution_stream.c

2360 lines
67 KiB
C
Raw Normal View History

2019-09-30 10:53:41 -04:00
/******************************************************************************
* Copyright (c) Huawei Technologies Co., Ltd. 2017-2019. All rights reserved.
* iSulad licensed under the Mulan PSL v1.
* You can use this software according to the terms and conditions of the Mulan PSL v1.
* You may obtain a copy of Mulan PSL v1 at:
* http://license.coscl.org.cn/MulanPSL
* THIS SOFTWARE IS PROVIDED ON AN "AS IS" BASIS, WITHOUT WARRANTIES OF ANY KIND, EITHER EXPRESS OR
* IMPLIED, INCLUDING BUT NOT LIMITED TO NON-INFRINGEMENT, MERCHANTABILITY OR FIT FOR A PARTICULAR
* PURPOSE.
* See the Mulan PSL v1 for more details.
* Author: tanyifeng
* Create: 2017-11-22
* Description: provide container stream callback function definition
********************************************************************************/
#define _GNU_SOURCE
#include "execution_stream.h"
#include <stdio.h>
#include <unistd.h>
#include <sys/time.h>
#include <lcr/lcrcontainer.h>
#include <fcntl.h>
#include <errno.h>
#include <sys/types.h>
#include <sys/wait.h>
#include <ctype.h>
#include <sys/stat.h>
#include <malloc.h>
#include <sys/eventfd.h>
#include <sys/inotify.h>
#include <libgen.h>
#include "log.h"
#include "engine.h"
#include "console.h"
#include "isulad_config.h"
2019-09-30 10:53:41 -04:00
#include "config.h"
#include "image.h"
#include "path.h"
#include "libtar.h"
2019-09-30 10:53:41 -04:00
#include "container_inspect.h"
#include "containers_store.h"
#include "container_state.h"
#include "containers_gc.h"
#include "error.h"
#include "logger_json_file.h"
#include "constants.h"
2019-12-25 15:50:34 +08:00
#include "runtime.h"
#include "collector.h"
2019-09-30 10:53:41 -04:00
static char *create_single_fifo(const char *statepath, const char *subpath, const char *stdflag)
{
int nret = 0;
char *fifo_name = NULL;
char fifo_path[PATH_MAX] = { 0 };
fifo_name = util_common_calloc_s(PATH_MAX);
if (fifo_name == NULL) {
return NULL;
}
nret = console_fifo_name(statepath, subpath, stdflag, fifo_name, PATH_MAX,
fifo_path, sizeof(fifo_path), true);
if (nret != 0) {
ERROR("Failed to get console fifo name.");
free(fifo_name);
fifo_name = NULL;
goto out;
}
if (console_fifo_create(fifo_name)) {
ERROR("Failed to create console fifo.");
free(fifo_name);
fifo_name = NULL;
goto out;
}
out:
return fifo_name;
}
static int do_create_daemon_fifos(const char *statepath, const char *subpath, bool attach_stdin,
bool attach_stdout, bool attach_stderr, char *fifos[])
{
int ret = -1;
if (attach_stdin) {
fifos[0] = create_single_fifo(statepath, subpath, "in");
if (fifos[0] == NULL) {
goto cleanup;
}
}
if (attach_stdout) {
fifos[1] = create_single_fifo(statepath, subpath, "out");
if (fifos[1] == NULL) {
goto cleanup;
}
}
if (attach_stderr) {
fifos[2] = create_single_fifo(statepath, subpath, "err");
if (fifos[2] == NULL) {
goto cleanup;
}
}
ret = 0;
cleanup:
if (ret != 0) {
console_fifo_delete(fifos[0]);
free(fifos[0]);
fifos[0] = NULL;
console_fifo_delete(fifos[1]);
free(fifos[1]);
fifos[1] = NULL;
console_fifo_delete(fifos[2]);
free(fifos[2]);
fifos[2] = NULL;
}
return ret;
}
int create_daemon_fifos(const char *id, const char *runtime, bool attach_stdin, bool attach_stdout, bool attach_stderr,
const char *operation, char *fifos[], char **fifopath)
{
int nret;
int ret = -1;
char *statepath = NULL;
char subpath[PATH_MAX] = { 0 };
char fifodir[PATH_MAX] = { 0 };
struct timespec now;
pthread_t tid;
nret = clock_gettime(CLOCK_REALTIME, &now);
if (nret != 0) {
ERROR("Failed to get time");
goto cleanup;
}
tid = pthread_self();
statepath = conf_get_routine_statedir(runtime);
if (statepath == NULL) {
ERROR("State path is NULL");
goto cleanup;
}
nret = snprintf(subpath, PATH_MAX, "%s/%s/%u_%u_%u", id, operation,
(unsigned int)tid, (unsigned int)now.tv_sec, (unsigned int)(now.tv_nsec));
if (nret >= PATH_MAX || nret < 0) {
2019-09-30 10:53:41 -04:00
ERROR("Failed to print string");
goto cleanup;
}
nret = snprintf(fifodir, PATH_MAX, "%s/%s", statepath, subpath);
if (nret >= PATH_MAX || nret < 0) {
2019-09-30 10:53:41 -04:00
ERROR("Failed to print string");
goto cleanup;
}
*fifopath = util_strdup_s(fifodir);
if (do_create_daemon_fifos(statepath, subpath, attach_stdin, attach_stdout, attach_stderr, fifos) != 0) {
goto cleanup;
}
ret = 0;
cleanup:
free(statepath);
return ret;
}
void delete_daemon_fifos(const char *fifopath, const char *fifos[])
{
if (fifopath == NULL || fifos == NULL) {
return;
}
if (fifos[0] != NULL) {
console_fifo_delete(fifos[0]);
}
if (fifos[1] != NULL) {
console_fifo_delete(fifos[1]);
}
if (fifos[2] != NULL) {
console_fifo_delete(fifos[2]);
}
if (util_recursive_rmdir(fifopath, 0)) {
WARN("Failed to rmdir:%s", fifopath);
}
}
int ready_copy_io_data(int sync_fd, bool detach, const char *fifoin, const char *fifoout, const char *fifoerr,
int stdin_fd, struct io_write_wrapper *stdout_handler, struct io_write_wrapper *stderr_handler,
const char *fifos[], pthread_t *tid)
{
int ret = 0;
size_t len = 0;
struct io_copy_arg io_copy[6];
if (fifoin != NULL) {
io_copy[len].srctype = IO_FIFO;
io_copy[len].src = (void *)fifoin;
io_copy[len].dsttype = IO_FIFO;
io_copy[len].dst = (void *)fifos[0];
len++;
}
if (fifoout != NULL) {
io_copy[len].srctype = IO_FIFO;
io_copy[len].src = (void *)fifos[1];
io_copy[len].dsttype = IO_FIFO;
io_copy[len].dst = (void *)fifoout;
len++;
}
if (fifoerr != NULL) {
io_copy[len].srctype = IO_FIFO;
io_copy[len].src = (void *)fifos[2];
io_copy[len].dsttype = IO_FIFO;
io_copy[len].dst = (void *)fifoerr;
len++;
}
if (stdin_fd > 0) {
io_copy[len].srctype = IO_FD;
io_copy[len].src = &stdin_fd;
io_copy[len].dsttype = IO_FIFO;
io_copy[len].dst = (void *)fifos[0];
len++;
}
if (stdout_handler != NULL) {
io_copy[len].srctype = IO_FIFO;
io_copy[len].src = (void *)fifos[1];
io_copy[len].dsttype = IO_FUNC;
io_copy[len].dst = stdout_handler;
len++;
}
if (stderr_handler != NULL) {
io_copy[len].srctype = IO_FIFO;
io_copy[len].src = (void *)fifos[2];
io_copy[len].dsttype = IO_FUNC;
io_copy[len].dst = stderr_handler;
len++;
}
if (start_io_copy_thread(sync_fd, detach, io_copy, len, tid)) {
ret = -1;
goto out;
}
out:
return ret;
}
static int do_append_process_exec_env(const char **default_env, defs_process *spec)
{
int ret = 0;
size_t new_size = 0;
size_t old_size = 0;
size_t i = 0;
size_t j = 0;
char **temp = NULL;
char **default_kv = NULL;
char **custom_kv = NULL;
size_t default_env_len = util_array_len(default_env);
if (default_env_len == 0) {
return 0;
}
if (default_env_len > LIST_ENV_SIZE_MAX - spec->env_len) {
ERROR("The length of envionment variables is too long, the limit is %d", LIST_ENV_SIZE_MAX);
isulad_set_error_message("The length of envionment variables is too long, the limit is %d", LIST_ENV_SIZE_MAX);
ret = -1;
goto out;
}
new_size = (spec->env_len + default_env_len) * sizeof(char *);
old_size = spec->env_len * sizeof(char *);
ret = mem_realloc((void **)&temp, new_size, spec->env, old_size);
if (ret != 0) {
ERROR("Failed to realloc memory for envionment variables");
ret = -1;
goto out;
}
spec->env = temp;
for (i = 0; i < default_env_len; i++) {
bool found = false;
default_kv = util_string_split(default_env[i], '=');
if (default_kv == NULL) {
continue;
}
for (j = 0; j < spec->env_len; j++) {
custom_kv = util_string_split(spec->env[i], '=');
if (custom_kv == NULL) {
continue;
}
if (strcmp(default_kv[0], custom_kv[0]) == 0) {
found = true;
}
util_free_array(custom_kv);
custom_kv = NULL;
if (found) {
break;
}
}
if (!found) {
spec->env[spec->env_len] = util_strdup_s(default_env[i]);
spec->env_len++;
}
util_free_array(default_kv);
default_kv = NULL;
}
out:
return ret;
}
static int append_necessary_process_env(bool tty, const container_config *container_spec, defs_process *spec)
{
int ret = 0;
int nret = 0;
char **default_env = NULL;
char host_name_str[MAX_HOST_NAME_LEN + 10] = { 0 };
if (util_array_append(&default_env, "PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin") != 0) {
ERROR("Failed to append default exec env");
ret = -1;
goto out;
}
if (container_spec->hostname != NULL) {
nret = snprintf(host_name_str, sizeof(host_name_str), "HOSTNAME=%s", container_spec->hostname);
if (nret < 0 || (size_t)nret >= sizeof(host_name_str)) {
ERROR("hostname is too long");
ret = -1;
goto out;
}
if (util_array_append(&default_env, host_name_str) != 0) {
ERROR("Failed to append default exec env");
ret = -1;
goto out;
}
}
if (tty) {
if (util_array_append(&default_env, "TERM=xterm") != 0) {
ERROR("Failed to append default exec env");
ret = -1;
goto out;
}
}
ret = do_append_process_exec_env((const char **)default_env, spec);
out:
util_free_array(default_env);
return ret;
}
static int merge_exec_from_container_env(defs_process *spec, const container_config *container_spec)
{
int ret = 0;
size_t i = 0;
if (container_spec->env_len > LIST_ENV_SIZE_MAX - spec->env_len) {
ERROR("The length of envionment variables is too long, the limit is %d", LIST_ENV_SIZE_MAX);
isulad_set_error_message("The length of envionment variables is too long, the limit is %d", LIST_ENV_SIZE_MAX);
ret = -1;
goto out;
}
for (i = 0; i < container_spec->env_len; i++) {
ret = util_array_append(&(spec->env), container_spec->env[i]);
if (ret != 0) {
ERROR("Failed to append container env to exec process env");
goto out;
}
spec->env_len++;
}
out:
return ret;
}
static int merge_envs_from_request_env(defs_process *spec, const char **envs, size_t env_len)
{
int ret = 0;
size_t i = 0;
if (env_len > LIST_ENV_SIZE_MAX - spec->env_len) {
ERROR("The length of envionment variables is too long, the limit is %d", LIST_ENV_SIZE_MAX);
isulad_set_error_message("The length of envionment variables is too long, the limit is %d", LIST_ENV_SIZE_MAX);
ret = -1;
goto out;
}
for (i = 0; i < env_len; i++) {
ret = util_array_append(&(spec->env), envs[i]);
if (ret != 0) {
ERROR("Failed to append request env to exec process env");
goto out;
}
spec->env_len++;
}
out:
return ret;
}
static int dup_defs_process_user(defs_process_user *src, defs_process_user **dst)
{
int ret = 0;
size_t i;
if (src == NULL) {
return 0;
}
*dst = (defs_process_user *)util_common_calloc_s(sizeof(defs_process_user));
if (*dst == NULL) {
ERROR("Out of memory");
return -1;
}
(*dst)->username = util_strdup_s(src->username);
(*dst)->uid = src->uid;
(*dst)->gid = src->gid;
if (src->additional_gids_len != 0) {
(*dst)->additional_gids = util_common_calloc_s(sizeof(gid_t) * src->additional_gids_len);
if ((*dst)->additional_gids == NULL) {
ERROR("Out of memory");
ret = -1;
goto out;
}
(*dst)->additional_gids_len = src->additional_gids_len;
for (i = 0; i < src->additional_gids_len; i++) {
(*dst)->additional_gids[i] = src->additional_gids[i];
}
}
out:
return ret;
}
static defs_process *make_exec_process_spec(const container_config *container_spec, defs_process_user *puser,
const char *runtime, const container_exec_request *request)
{
int ret = 0;
defs_process *spec = NULL;
spec = util_common_calloc_s(sizeof(defs_process));
if (spec == NULL) {
return NULL;
}
if (strcasecmp(runtime, "lcr") != 0) {
ret = merge_exec_from_container_env(spec, container_spec);
if (ret != 0) {
ERROR("Failed to dup args for exec process spec");
goto err_out;
}
}
ret = merge_envs_from_request_env(spec, (const char **)request->env, request->env_len);
if (ret != 0) {
ERROR("Failed to dup args for exec process spec");
goto err_out;
}
if (strcasecmp(runtime, "lcr") != 0) {
ret = append_necessary_process_env(request->tty, container_spec, spec);
if (ret != 0) {
ERROR("Failed to append necessary for exec process spec");
goto err_out;
}
}
ret = dup_array_of_strings((const char **)request->argv, request->argv_len, &(spec->args), &(spec->args_len));
if (ret != 0) {
ERROR("Failed to dup envs for exec process spec");
goto err_out;
}
ret = dup_defs_process_user(puser, &(spec->user));
if (ret != 0) {
ERROR("Failed to dup process user for exec process spec");
goto err_out;
}
spec->terminal = request->tty;
spec->cwd = util_strdup_s(container_spec->working_dir ? container_spec->working_dir : "/");
return spec;
err_out:
free_defs_process(spec);
return NULL;
}
static int exec_container(container_t *cont, const char *runtime, char * const console_fifos[],
defs_process_user *puser,
const container_exec_request *request, int *exit_code)
2019-09-30 10:53:41 -04:00
{
int ret = 0;
char *engine_log_path = NULL;
char *loglevel = NULL;
char *logdriver = NULL;
defs_process *process_spec = NULL;
2019-12-25 15:50:34 +08:00
rt_exec_params_t params = { 0 };
2019-09-30 10:53:41 -04:00
loglevel = conf_get_isulad_loglevel();
2019-09-30 10:53:41 -04:00
if (loglevel == NULL) {
ERROR("Exec: failed to get log level");
ret = -1;
goto out;
}
logdriver = conf_get_isulad_logdriver();
2019-09-30 10:53:41 -04:00
if (logdriver == NULL) {
ERROR("Exec: Failed to get log driver");
ret = -1;
goto out;
}
engine_log_path = conf_get_engine_log_file();
if (strcmp(logdriver, "file") == 0 && engine_log_path == NULL) {
ERROR("Exec: Log driver is file, but engine log path is NULL");
ret = -1;
goto out;
}
process_spec = make_exec_process_spec(cont->common_config->config, puser, runtime, request);
if (process_spec == NULL) {
ERROR("Exec: Failed to make process spec");
ret = -1;
goto out;
}
2019-12-25 15:50:34 +08:00
params.loglevel = loglevel;
params.logpath = engine_log_path;
params.console_fifos = (const char **)console_fifos;
params.rootpath = cont->root_path;
params.timeout = request->timeout;
params.suffix = request->suffix;
params.state = cont->state_path;
params.spec = process_spec;
params.attach_stdin = request->attach_stdin;
2019-12-25 15:50:34 +08:00
if (runtime_exec(cont->common_config->id, runtime, &params, exit_code)) {
2019-09-30 10:53:41 -04:00
ERROR("Runtime exec container failed");
ret = -1;
goto out;
}
out:
free(loglevel);
free(engine_log_path);
free(logdriver);
free_defs_process(process_spec);
2019-09-30 10:53:41 -04:00
return ret;
}
static int container_exec_cb_check(const container_exec_request *request, container_exec_response **response,
uint32_t *cc, container_t **cont)
{
char *container_name = NULL;
if (request == NULL) {
return -1;
}
*response = util_common_calloc_s(sizeof(container_exec_response));
if (*response == NULL) {
ERROR("Out of memory");
*cc = ISULAD_ERR_MEMOUT;
2019-09-30 10:53:41 -04:00
return -1;
}
container_name = request->container_id;
if (container_name == NULL) {
ERROR("receive NULL Request id");
*cc = ISULAD_ERR_INPUT;
2019-09-30 10:53:41 -04:00
return -1;
}
if (!util_valid_container_id_or_name(container_name)) {
ERROR("Invalid container name %s", container_name);
isulad_set_error_message("Invalid container name %s", container_name);
*cc = ISULAD_ERR_EXEC;
2019-09-30 10:53:41 -04:00
return -1;
}
if (request->suffix != NULL && !util_valid_exec_suffix(request->suffix)) {
ERROR("Invalid exec suffix %s", request->suffix);
isulad_set_error_message("Invalid exec suffix %s", request->suffix);
*cc = ISULAD_ERR_EXEC;
return -1;
}
2019-09-30 10:53:41 -04:00
*cont = containers_store_get(container_name);
if (*cont == NULL) {
ERROR("No such container:%s", container_name);
isulad_set_error_message("No such container:%s", container_name);
*cc = ISULAD_ERR_EXEC;
2019-09-30 10:53:41 -04:00
return -1;
}
return 0;
}
static int exec_prepare_console(container_t *cont, const container_exec_request *request, int stdinfd,
struct io_write_wrapper *stdout_handler, struct io_write_wrapper *stderr_handler,
char **fifos, char **fifopath, int *sync_fd, pthread_t *thread_id)
2019-09-30 10:53:41 -04:00
{
int ret = 0;
const char *id = cont->common_config->id;
if (request->attach_stdin || request->attach_stdout || request->attach_stderr) {
if (create_daemon_fifos(id, cont->runtime, request->attach_stdin,
request->attach_stdout, request->attach_stderr,
"exec", fifos, fifopath)) {
ret = -1;
goto out;
}
*sync_fd = eventfd(0, EFD_CLOEXEC);
if (*sync_fd < 0) {
ERROR("Failed to create eventfd: %s", strerror(errno));
ret = -1;
goto out;
}
if (ready_copy_io_data(*sync_fd, false, request->stdin, request->stdout, request->stderr,
stdinfd, stdout_handler, stderr_handler, (const char **)fifos, thread_id)) {
2019-09-30 10:53:41 -04:00
ret = -1;
goto out;
}
}
out:
return ret;
}
2019-12-25 15:50:34 +08:00
static void container_exec_cb_end(container_exec_response *response, uint32_t cc, int exit_code, int sync_fd,
2019-09-30 10:53:41 -04:00
pthread_t thread_id)
{
if (response != NULL) {
response->cc = cc;
response->exit_code = (uint32_t)exit_code;
if (g_isulad_errmsg != NULL) {
response->errmsg = util_strdup_s(g_isulad_errmsg);
2019-09-30 10:53:41 -04:00
DAEMON_CLEAR_ERRMSG();
}
}
if (sync_fd >= 0 && cc != ISULAD_SUCCESS) {
2019-09-30 10:53:41 -04:00
if (eventfd_write(sync_fd, 1) < 0) {
ERROR("Failed to write eventfd: %s", strerror(errno));
}
}
if (thread_id > 0) {
if (pthread_join(thread_id, NULL) < 0) {
ERROR("Failed to join thread: %u", (unsigned int)thread_id);
}
}
if (sync_fd >= 0) {
close(sync_fd);
}
}
static int get_exec_user_info(const container_t *cont, const char *username, defs_process_user **puser)
2019-12-25 15:50:34 +08:00
{
int ret = 0;
2019-12-25 15:50:34 +08:00
*puser = util_common_calloc_s(sizeof(defs_process_user));
2019-12-25 15:50:34 +08:00
if (*puser == NULL) {
ERROR("Out of memory");
return -1;
}
ret = im_get_user_conf(cont->common_config->image_type, cont->common_config->base_fs,
cont->hostconfig, username, *puser);
if (ret != 0) {
ERROR("Get user failed with '%s'", username ? username : "");
ret = -1;
goto out;
}
out:
return ret;
}
static void get_exec_command(const container_config *conf, const container_exec_request *request,
char *exec_command, size_t len)
{
size_t i;
bool should_abbreviated = false;
size_t start = 0;
size_t end = 0;
for (i = 0; i < conf->entrypoint_len; i++) {
if (strlen(conf->entrypoint[i]) < len - strlen(exec_command)) {
(void)strcat(exec_command, conf->entrypoint[i]);
(void)strcat(exec_command, " ");
} else {
should_abbreviated = true;
goto out;
}
}
for (i = 0; i < request->argv_len; i++) {
if (strlen(request->argv[i]) < len - strlen(exec_command)) {
(void)strcat(exec_command, request->argv[i]);
if (i != request->argv_len) {
(void)strcat(exec_command, " ");
}
} else {
should_abbreviated = true;
goto out;
}
}
out:
if (should_abbreviated) {
if (strlen(exec_command) <= len - 1 - 3) {
start = strlen(exec_command);
end = start + 3;
} else {
start = len - 1 - 3;
end = len - 1;
}
for (i = start; i < end; i++) {
exec_command[i] = '.';
}
}
}
2019-12-25 15:50:34 +08:00
2019-09-30 10:53:41 -04:00
static int container_exec_cb(const container_exec_request *request, container_exec_response **response,
int stdinfd, struct io_write_wrapper *stdout_handler, struct io_write_wrapper *stderr_handler)
2019-09-30 10:53:41 -04:00
{
int exit_code = 0;
int sync_fd = -1;
uint32_t cc = ISULAD_SUCCESS;
2019-09-30 10:53:41 -04:00
char *id = NULL;
char *fifos[3] = { NULL, NULL, NULL };
char *fifopath = NULL;
pthread_t thread_id = 0;
container_t *cont = NULL;
defs_process_user *puser = NULL;
char exec_command[ARGS_MAX] = {0x00};
2019-09-30 10:53:41 -04:00
DAEMON_CLEAR_ERRMSG();
if (request == NULL || response == NULL) {
ERROR("Invalid NULL input");
return -1;
}
if (container_exec_cb_check(request, response, &cc, &cont) < 0) {
goto pack_response;
}
id = cont->common_config->id;
2019-12-25 15:50:34 +08:00
set_log_prefix(id);
2019-09-30 10:53:41 -04:00
EVENT("Event: {Object: %s, Type: execing}", id);
get_exec_command(cont->common_config->config, request, exec_command, sizeof(exec_command));
(void)isulad_monitor_send_container_event(id, EXEC_CREATE, -1, 0, exec_command, NULL);
2019-09-30 10:53:41 -04:00
if (gc_is_gc_progress(id)) {
isulad_set_error_message("You cannot exec container %s in garbage collector progress.", id);
2019-09-30 10:53:41 -04:00
ERROR("You cannot exec container %s in garbage collector progress.", id);
cc = ISULAD_ERR_EXEC;
2019-09-30 10:53:41 -04:00
goto pack_response;
}
2019-12-25 15:50:34 +08:00
if (!is_running(cont->state)) {
ERROR("Container %s is not running", id);
isulad_set_error_message("Container %s is not running", id);
cc = ISULAD_ERR_EXEC;
2019-12-25 15:50:34 +08:00
goto pack_response;
}
if (is_paused(cont->state)) {
ERROR("Container %s ispaused, unpause the container before exec", id);
isulad_set_error_message("Container %s paused, unpause the container before exec", id);
cc = ISULAD_ERR_EXEC;
2019-12-25 15:50:34 +08:00
goto pack_response;
}
if (is_restarting(cont->state)) {
ERROR("Container %s is currently restarting, wait until the container is running", id);
isulad_set_error_message("Container %s is currently restarting, wait until the container is running", id);
cc = ISULAD_ERR_EXEC;
2019-12-25 15:50:34 +08:00
goto pack_response;
}
if (request->user != NULL) {
if (get_exec_user_info(cont, request->user, &puser) != 0) {
cc = ISULAD_ERR_EXEC;
goto pack_response;
}
} else {
if (cont->common_config->config->user != NULL) {
if (get_exec_user_info(cont, cont->common_config->config->user, &puser) != 0) {
cc = ISULAD_ERR_EXEC;
goto pack_response;
}
}
}
if (exec_prepare_console(cont, request, stdinfd, stdout_handler, stderr_handler, fifos, &fifopath, &sync_fd,
&thread_id)) {
cc = ISULAD_ERR_EXEC;
2019-09-30 10:53:41 -04:00
goto pack_response;
}
(void)isulad_monitor_send_container_event(id, EXEC_START, -1, 0, exec_command, NULL);
if (exec_container(cont, cont->runtime, (char * const *)fifos, puser, request, &exit_code)) {
cc = ISULAD_ERR_EXEC;
2019-09-30 10:53:41 -04:00
goto pack_response;
}
EVENT("Event: {Object: %s, Type: execed}", id);
(void)isulad_monitor_send_container_event(id, EXEC_DIE, -1, 0, NULL, NULL);
2019-09-30 10:53:41 -04:00
pack_response:
2019-12-25 15:50:34 +08:00
container_exec_cb_end(*response, cc, exit_code, sync_fd, thread_id);
2019-09-30 10:53:41 -04:00
delete_daemon_fifos(fifopath, (const char **)fifos);
free(fifos[0]);
free(fifos[1]);
free(fifos[2]);
free(fifopath);
free_defs_process_user(puser);
2019-09-30 10:53:41 -04:00
container_unref(cont);
free_log_prefix();
return (cc == ISULAD_SUCCESS) ? 0 : -1;
2019-09-30 10:53:41 -04:00
}
static int container_attach_cb_check(const container_attach_request *request, container_attach_response **response,
uint32_t *cc, container_t **cont)
{
char *name = NULL;
*response = util_common_calloc_s(sizeof(container_attach_response));
if (*response == NULL) {
ERROR("Out of memory");
*cc = ISULAD_ERR_MEMOUT;
2019-09-30 10:53:41 -04:00
return -1;
}
name = request->container_id;
if (name == NULL) {
DEBUG("Receive NULL Request id");
*cc = ISULAD_ERR_INPUT;
2019-09-30 10:53:41 -04:00
return -1;
}
if (!util_valid_container_id_or_name(name)) {
ERROR("Invalid container name %s", name);
isulad_set_error_message("Invalid container name %s", name);
*cc = ISULAD_ERR_EXEC;
2019-09-30 10:53:41 -04:00
return -1;
}
*cont = containers_store_get(name);
if (*cont == NULL) {
ERROR("No such container:%s", name);
isulad_set_error_message("No such container:%s", name);
*cc = ISULAD_ERR_EXEC;
2019-09-30 10:53:41 -04:00
return -1;
}
return 0;
}
static int attach_check_container_state(const container_t *cont)
{
int ret = 0;
const char *id = cont->common_config->id;
if (!is_running(cont->state)) {
ERROR("Container is not running");
isulad_set_error_message("Container is is not running.");
2019-09-30 10:53:41 -04:00
ret = -1;
goto out;
}
if (is_paused(cont->state)) {
ERROR("Container %s is paused, unpause the container before attach.", id);
isulad_set_error_message("Container %s is paused, unpause the container before attach.", id);
2019-09-30 10:53:41 -04:00
ret = -1;
goto out;
}
if (is_restarting(cont->state)) {
ERROR("Container %s is restarting, wait until the container is running.", id);
isulad_set_error_message("Container %s is restarting, wait until the container is running.", id);
2019-09-30 10:53:41 -04:00
ret = -1;
goto out;
}
out:
return ret;
}
static int attach_prepare_console(const container_t *cont, const container_attach_request *request, int stdinfd,
struct io_write_wrapper *stdout_handler, struct io_write_wrapper *stderr_handler,
char **fifos, char **fifopath, pthread_t *tid)
{
int ret = 0;
const char *id = cont->common_config->id;
if (request->attach_stdin || request->attach_stdout || request->attach_stderr) {
if (create_daemon_fifos(id, cont->runtime, request->attach_stdin, request->attach_stdout,
request->attach_stderr, "attach", fifos, fifopath)) {
ret = -1;
goto out;
}
if (ready_copy_io_data(-1, true, request->stdin, request->stdout, request->stderr,
stdinfd, stdout_handler, stderr_handler, (const char **)fifos, tid)) {
ret = -1;
goto out;
}
}
out:
return ret;
}
static void close_io_writer(const struct io_write_wrapper *stdout_handler,
const struct io_write_wrapper *stderr_handler)
{
if (stdout_handler != NULL && stdout_handler->close_func != NULL) {
(void)stdout_handler->close_func(stdout_handler->context, NULL);
}
if (stderr_handler != NULL && stderr_handler->close_func != NULL) {
(void)stderr_handler->close_func(stderr_handler->context, NULL);
}
}
static int container_attach_cb(const container_attach_request *request, container_attach_response **response,
int stdinfd, struct io_write_wrapper *stdout_handler,
struct io_write_wrapper *stderr_handler)
{
char *id = NULL;
uint32_t cc = ISULAD_SUCCESS;
2019-09-30 10:53:41 -04:00
char *fifos[3] = { NULL, NULL, NULL };
char *fifopath = NULL;
pthread_t tid = 0;
container_t *cont = NULL;
rt_attach_params_t params = { 0 };
2019-09-30 10:53:41 -04:00
DAEMON_CLEAR_ERRMSG();
if (request == NULL || response == NULL) {
ERROR("Invalid NULL input");
return -1;
}
if (container_attach_cb_check(request, response, &cc, &cont) < 0) {
close_io_writer(stdout_handler, stderr_handler);
goto pack_response;
}
id = cont->common_config->id;
set_log_prefix(id);
if (attach_check_container_state(cont)) {
close_io_writer(stdout_handler, stderr_handler);
cc = ISULAD_ERR_EXEC;
2019-09-30 10:53:41 -04:00
goto pack_response;
}
if (attach_prepare_console(cont, request, stdinfd, stdout_handler, stderr_handler, fifos, &fifopath, &tid) != 0) {
cc = ISULAD_ERR_EXEC;
2019-09-30 10:53:41 -04:00
close_io_writer(stdout_handler, stderr_handler);
goto pack_response;
}
params.rootpath = cont->root_path;
params.stdin = fifos[0];
params.stdout = fifos[1];
params.stderr = fifos[2];
2019-09-30 10:53:41 -04:00
(void)isulad_monitor_send_container_event(id, ATTACH, -1, 0, NULL, NULL);
if (runtime_attach(cont->common_config->id, cont->runtime, &params)) {
ERROR("Runtime attach container failed");
cc = ISULAD_ERR_EXEC;
2019-09-30 10:53:41 -04:00
goto pack_response;
}
pack_response:
if (*response != NULL) {
(*response)->cc = cc;
if (g_isulad_errmsg != NULL) {
(*response)->errmsg = util_strdup_s(g_isulad_errmsg);
2019-09-30 10:53:41 -04:00
DAEMON_CLEAR_ERRMSG();
}
}
delete_daemon_fifos(fifopath, (const char **)fifos);
free(fifos[0]);
free(fifos[1]);
free(fifos[2]);
free(fifopath);
container_unref(cont);
free_log_prefix();
return (cc == ISULAD_SUCCESS) ? 0 : -1;
2019-09-30 10:53:41 -04:00
}
static int copy_from_container_cb_check(const struct isulad_copy_from_container_request *request,
struct isulad_copy_from_container_response **response,
2019-09-30 10:53:41 -04:00
container_t **cont)
{
int ret = -1;
char *name = NULL;
*response = util_common_calloc_s(sizeof(struct isulad_copy_from_container_response));
2019-09-30 10:53:41 -04:00
if (*response == NULL) {
ERROR("Out of memory");
return -1;
}
name = request->id;
if (name == NULL) {
ERROR("receive NULL Request id");
goto out;
}
if (!util_valid_container_id_or_name(name)) {
ERROR("Invalid container name %s", name);
isulad_set_error_message("Invalid container name %s", name);
2019-09-30 10:53:41 -04:00
goto out;
}
if (request->srcpath == NULL || request->srcpath[0] == '\0') {
ERROR("bad parameter: path cannot be empty");
isulad_set_error_message("bad parameter: path cannot be empty");
2019-09-30 10:53:41 -04:00
goto out;
}
*cont = containers_store_get(name);
if (*cont == NULL) {
ERROR("No such container:%s", name);
isulad_set_error_message("No such container:%s", name);
2019-09-30 10:53:41 -04:00
goto out;
}
ret = 0;
out:
return ret;
}
static int archive_and_send_copy_data(const stream_func_wrapper *stream,
struct isulad_copy_from_container_response *response,
2019-09-30 10:53:41 -04:00
const char *resolvedpath, const char *abspath)
{
int ret = -1;
int nret;
size_t buf_len = ARCHIVE_BLOCK_SIZE;
ssize_t read_len;
char *srcdir = NULL;
char *srcbase = NULL;
char *absbase = NULL;
char *err = NULL;
char *buf = NULL;
char cleaned[PATH_MAX + 2] = { 0 };
struct io_read_wrapper reader = { 0 };
buf = util_common_calloc_s(buf_len);
if (buf == NULL) {
ERROR("Out of memory");
return -1;
}
if (cleanpath(resolvedpath, cleaned, sizeof(cleaned)) == NULL) {
ERROR("Can not clean path: %s", resolvedpath);
goto cleanup;
}
nret = split_dir_and_base_name(cleaned, &srcdir, &srcbase);
if (nret != 0) {
ERROR("split %s failed", cleaned);
goto cleanup;
}
nret = split_dir_and_base_name(abspath, NULL, &absbase);
if (nret != 0) {
ERROR("split %s failed", abspath);
goto cleanup;
}
nret = archive_path(srcdir, srcbase, absbase, false, &reader);
if (nret != 0) {
ERROR("Archive %s failed", resolvedpath);
goto cleanup;
}
read_len = reader.read(reader.context, buf, buf_len);
while (read_len > 0) {
bool writed = true;
response->data = buf;
response->data_len = (size_t)read_len;
writed = stream->write_func(stream->writer, response);
response->data = NULL;
response->data_len = 0;
if (!writed) {
DEBUG("Write to client failed, client may be exited");
break;
}
read_len = reader.read(reader.context, buf, buf_len);
}
ret = 0;
cleanup:
free(buf);
free(srcdir);
free(srcbase);
free(absbase);
if (reader.close != NULL) {
int cret = reader.close(reader.context, &err);
if (err != NULL) {
isulad_set_error_message("%s", err);
2019-09-30 10:53:41 -04:00
}
ret = (cret != 0) ? cret : ret;
}
free(err);
return ret;
}
static container_path_stat *do_container_stat_path(const char *rootpath, const char *resolvedpath, const char *abspath)
{
int nret;
char *hostpath = NULL;
char *target = NULL;
timestamp *mtime = NULL;
struct stat st;
container_path_stat *stat = NULL;
nret = lstat(resolvedpath, &st);
if (nret < 0) {
ERROR("lstat %s: %s", resolvedpath, strerror(errno));
isulad_set_error_message("lstat %s: %s", resolvedpath, strerror(errno));
2019-09-30 10:53:41 -04:00
goto cleanup;
}
if (S_ISLNK(st.st_mode)) {
char *p = NULL;
hostpath = get_resource_path(rootpath, abspath);
if (hostpath == NULL) {
ERROR("Failed to get resource path");
goto cleanup;
}
p = strstr(hostpath, rootpath);
if (p == NULL) {
ERROR("rootpath %s should be in scope of hostpath %s", rootpath, hostpath);
goto cleanup;
}
target = util_path_join("/", p + strlen(rootpath));
if (target == NULL) {
ERROR("Can not join path");
goto cleanup;
}
}
mtime = util_common_calloc_s(sizeof(timestamp));
if (mtime == NULL) {
ERROR("Out of memory");
goto cleanup;
}
stat = util_common_calloc_s(sizeof(container_path_stat));
if (stat == NULL) {
ERROR("Out of memory");
goto cleanup;
}
nret = split_dir_and_base_name(abspath, NULL, &stat->name);
if (nret != 0) {
ERROR("split %s failed", abspath);
goto cleanup;
}
stat->size = (int64_t)st.st_size;
stat->mode = (uint32_t)st.st_mode;
stat->mtime = mtime;
mtime = NULL;
stat->mtime->seconds = (int64_t)st.st_mtim.tv_sec;
stat->mtime->nanos = (int32_t)st.st_mtim.tv_nsec;
stat->link_target = target;
target = NULL;
cleanup:
free_timestamp(mtime);
free(target);
free(hostpath);
return stat;
}
static int copy_from_container_send_path_stat(const stream_func_wrapper *stream,
const container_path_stat *stat)
{
int ret = -1;
char *json = NULL;
char *err = NULL;
struct parser_context ctx = { OPT_GEN_SIMPLIFY, 0 };
json = container_path_stat_generate_json(stat, &ctx, &err);
if (json == NULL) {
ERROR("Can not generate json: %s", err);
goto cleanup;
}
if (!stream->add_initial_metadata(stream->context, "isulad-container-path-stat", json)) {
goto cleanup;
}
// send metadata, client should always ignore the first read
if (!stream->write_func(stream->writer, NULL)) {
goto cleanup;
}
ret = 0;
cleanup:
free(json);
free(err);
return ret;
}
static container_path_stat *resolve_and_stat_path(const char *rootpath, const char *srcpath, char **resolvedpath,
char **abspath)
{
int nret;
char *resolved = NULL;
char *abs = NULL;
container_path_stat *stat = NULL;
nret = resolve_path(rootpath, srcpath, &resolved, &abs);
if (nret < 0) {
ERROR("Can not resolve path: %s", srcpath);
return NULL;
}
stat = do_container_stat_path(rootpath, resolved, abs);
if (resolvedpath != NULL) {
*resolvedpath = resolved;
resolved = NULL;
}
if (abspath != NULL) {
*abspath = abs;
abs = NULL;
}
free(resolved);
free(abs);
return stat;
}
2019-12-25 15:50:34 +08:00
static int pause_container(const container_t *cont)
{
int ret = 0;
rt_pause_params_t params = { 0 };
const char *id = cont->common_config->id;
params.rootpath = cont->root_path;
params.state = cont->state_path;
2019-12-25 15:50:34 +08:00
if (runtime_pause(id, cont->runtime, &params)) {
ERROR("Failed to pause container:%s", id);
ret = -1;
goto out;
}
state_set_paused(cont->state);
if (container_to_disk(cont)) {
ERROR("Failed to save container \"%s\" to disk", id);
ret = -1;
goto out;
}
out:
return ret;
}
static int resume_container(const container_t *cont)
{
int ret = 0;
rt_resume_params_t params = { 0 };
const char *id = cont->common_config->id;
params.rootpath = cont->root_path;
params.state = cont->state_path;
2019-12-25 15:50:34 +08:00
if (runtime_resume(id, cont->runtime, &params)) {
ERROR("Failed to resume container:%s", id);
ret = -1;
goto out;
}
state_reset_paused(cont->state);
if (container_to_disk(cont)) {
ERROR("Failed to save container \"%s\" to disk", id);
ret = -1;
goto out;
}
out:
return ret;
}
static int copy_from_container_cb(const struct isulad_copy_from_container_request *request,
2019-09-30 10:53:41 -04:00
const stream_func_wrapper *stream, char **err)
{
int ret = -1;
int nret;
char *resolvedpath = NULL;
char *abspath = NULL;
container_path_stat *stat = NULL;
container_t *cont = NULL;
struct isulad_copy_from_container_response *response = NULL;
2019-12-25 15:50:34 +08:00
bool need_pause = false;
2019-09-30 10:53:41 -04:00
DAEMON_CLEAR_ERRMSG();
if (request == NULL || stream == NULL || err == NULL) {
ERROR("Invalid NULL input");
return -1;
}
if (copy_from_container_cb_check(request, &response, &cont) < 0) {
goto pack_response;
}
container_lock(cont);
if (is_removal_in_progress(cont->state) || is_dead(cont->state)) {
ERROR("can't copy file from a container which is dead or marked for removal");
isulad_set_error_message("can't copy file from a container which is dead or marked for removal");
2019-09-30 10:53:41 -04:00
goto unlock_container;
}
2019-12-25 15:50:34 +08:00
need_pause = is_running(cont->state) && !is_paused(cont->state);
if (need_pause) {
if (pause_container(cont) != 0) {
ERROR("can't copy to a container which is cannot be paused");
isulad_set_error_message("can't copy to a container which is cannot be paused");
2019-12-25 15:50:34 +08:00
goto unlock_container;
}
}
2019-09-30 10:53:41 -04:00
nret = im_mount_container_rootfs(cont->common_config->image_type, cont->common_config->image,
cont->common_config->id);
if (nret != 0) {
2019-12-25 15:50:34 +08:00
goto unpause_container;
2019-09-30 10:53:41 -04:00
}
stat = resolve_and_stat_path(cont->common_config->base_fs, request->srcpath, &resolvedpath, &abspath);
if (stat == NULL) {
goto cleanup_rootfs;
}
DEBUG("Got resolved path: %s, abspath: %s", resolvedpath, abspath);
nret = copy_from_container_send_path_stat(stream, stat);
if (nret < 0) {
ERROR("Can not send metadata to client");
goto cleanup_rootfs;
}
nret = archive_and_send_copy_data(stream, response, resolvedpath, abspath);
if (nret < 0) {
ERROR("Failed to send archive data");
goto cleanup_rootfs;
}
(void)isulad_monitor_send_container_event(cont->common_config->id, ARCHIVE_PATH, -1, 0, NULL, NULL);
2019-09-30 10:53:41 -04:00
ret = 0;
cleanup_rootfs:
if (im_umount_container_rootfs(cont->common_config->image_type, cont->common_config->image,
cont->common_config->id) != 0) {
WARN("Can not umount rootfs of container: %s", cont->common_config->id);
}
2019-12-25 15:50:34 +08:00
unpause_container:
if (need_pause && resume_container(cont) != 0) {
ERROR("can't resume container which has been paused before copy");
}
2019-09-30 10:53:41 -04:00
unlock_container:
container_unlock(cont);
container_unref(cont);
pack_response:
if (g_isulad_errmsg != NULL) {
*err = util_strdup_s(g_isulad_errmsg);
2019-09-30 10:53:41 -04:00
}
isulad_copy_from_container_response_free(response);
2019-09-30 10:53:41 -04:00
free_container_path_stat(stat);
free(resolvedpath);
free(abspath);
DAEMON_CLEAR_ERRMSG();
return ret;
}
static int copy_to_container_cb_check(const container_copy_to_request *request,
container_t **cont)
{
int ret = -1;
char *name = NULL;
name = request->id;
if (name == NULL) {
ERROR("receive NULL Request id");
goto out;
}
if (!util_valid_container_id_or_name(name)) {
ERROR("Invalid container name %s", name);
isulad_set_error_message("Invalid container name %s", name);
2019-09-30 10:53:41 -04:00
goto out;
}
if (request->src_path == NULL || request->src_path[0] == '\0') {
ERROR("bad parameter: path cannot be empty");
isulad_set_error_message("bad parameter: path cannot be empty");
2019-09-30 10:53:41 -04:00
goto out;
}
*cont = containers_store_get(name);
if (*cont == NULL) {
ERROR("No such container:%s", name);
isulad_set_error_message("No such container:%s", name);
2019-09-30 10:53:41 -04:00
goto out;
}
ret = 0;
out:
return ret;
}
static ssize_t extract_stream_to_io_read(void *content, void *buf, size_t buf_len)
{
stream_func_wrapper *stream = (stream_func_wrapper *)content;
struct isulad_copy_to_container_data copy = { 0 };
2019-09-30 10:53:41 -04:00
if (!stream->read_func(stream->reader, &copy)) {
DEBUG("Client may exited");
return -1;
}
if (copy.data_len > buf_len) {
free(copy.data);
return -1;
}
(void)memcpy(buf, copy.data, copy.data_len);
2019-09-30 10:53:41 -04:00
free(copy.data);
return (ssize_t)(copy.data_len);
}
int read_and_extract_archive(stream_func_wrapper *stream, const char *resolved_path, const char *transform)
{
int ret = -1;
char *err = NULL;
struct io_read_wrapper content = { 0 };
content.context = stream;
content.read = extract_stream_to_io_read;
ret = archive_untar(&content, false, resolved_path, transform, &err);
if (ret != 0) {
ERROR("Can not untar to container: %s", (err != NULL) ? err : "unknown");
isulad_set_error_message("Can not untar to container: %s", (err != NULL) ? err : "unknown");
2019-09-30 10:53:41 -04:00
}
free(err);
return ret;
}
static char *copy_to_container_get_dstdir(const container_t *cont, const container_copy_to_request *request,
char **transform)
{
char *dstdir = NULL;
char *error = NULL;
container_path_stat *dststat = NULL;
struct archive_copy_info srcinfo = { 0 };
struct archive_copy_info *dstinfo = NULL;
if (cont == NULL) {
return NULL;
}
dstinfo = util_common_calloc_s(sizeof(struct archive_copy_info));
if (dstinfo == NULL) {
ERROR("Out of memory");
goto cleanup;
}
dstinfo->path = util_strdup_s(request->dst_path);
// stat once
dststat = resolve_and_stat_path(cont->common_config->base_fs, request->dst_path, NULL, NULL);
if (dststat != NULL) {
if (S_ISLNK(dststat->mode)) {
free(dstinfo->path);
dstinfo->path = util_strdup_s(dststat->link_target);
free_container_path_stat(dststat);
// stat twice
dststat = resolve_and_stat_path(cont->common_config->base_fs, dstinfo->path, NULL, NULL);
}
if (dststat != NULL) {
dstinfo->exists = true;
dstinfo->isdir = S_ISDIR(dststat->mode);
}
}
// ignore any error
DAEMON_CLEAR_ERRMSG();
srcinfo.exists = true;
srcinfo.isdir = request->src_isdir;
srcinfo.path = request->src_path;
srcinfo.rebase_name = request->src_rebase_name;
dstdir = prepare_archive_copy(&srcinfo, dstinfo, transform, &error);
if (dstdir == NULL) {
if (error == NULL) {
ERROR("Can not prepare archive copy");
} else {
ERROR("%s", error);
isulad_set_error_message("%s", error);
2019-09-30 10:53:41 -04:00
}
goto cleanup;
}
cleanup:
free(error);
free_archive_copy_info(dstinfo);
free_container_path_stat(dststat);
return dstdir;
}
static int copy_to_container_resolve_path(const container_t *cont, const char *dstdir,
char **resolvedpath, char **abspath)
{
int ret = -1;
char *joined = NULL;
char cleaned[PATH_MAX] = { 0 };
if (cont == NULL) {
return -1;
}
joined = util_path_join("/", dstdir);
if (joined == NULL) {
ERROR("Can not join path");
return -1;
}
if (cleanpath(joined, cleaned, sizeof(cleaned)) == NULL) {
ERROR("Can not clean path: %s", dstdir);
goto cleanup;
}
*abspath = preserve_trailing_dot_or_separator(cleaned, dstdir);
if (*abspath == NULL) {
ERROR("Can not preserve path");
goto cleanup;
}
*resolvedpath = get_resource_path(cont->common_config->base_fs, *abspath);
if (*resolvedpath == NULL) {
ERROR("Can not get resource path");
goto cleanup;
}
ret = 0;
cleanup:
free(joined);
return ret;
}
static int copy_to_container_check_path_valid(const container_t *cont, const char *resolvedpath, const char *abspath)
{
int ret = -1;
int nret;
struct stat st;
if (cont == NULL) {
return -1;
}
if (cont->hostconfig->readonly_rootfs) {
ERROR("container rootfs is marked read-only");
isulad_set_error_message("container rootfs is marked read-only");
2019-09-30 10:53:41 -04:00
goto cleanup;
}
nret = lstat(resolvedpath, &st);
if (nret < 0) {
ERROR("lstat %s: %s", resolvedpath, strerror(errno));
isulad_set_error_message("lstat %s: %s", resolvedpath, strerror(errno));
2019-09-30 10:53:41 -04:00
goto cleanup;
}
if (!S_ISDIR(st.st_mode)) {
ERROR("extraction point is not a directory");
isulad_set_error_message("extraction point is not a directory");
2019-09-30 10:53:41 -04:00
goto cleanup;
}
ret = 0;
cleanup:
return ret;
}
static int copy_to_container_cb(const container_copy_to_request *request,
stream_func_wrapper *stream, char **err)
{
int ret = -1;
int nret;
char *resolvedpath = NULL;
char *abspath = NULL;
char *dstdir = NULL;
char *transform = NULL;
container_t *cont = NULL;
2019-12-25 15:50:34 +08:00
bool need_pause = false;
2019-09-30 10:53:41 -04:00
DAEMON_CLEAR_ERRMSG();
if (request == NULL || stream == NULL || err == NULL) {
ERROR("Invalid NULL input");
return -1;
}
if (copy_to_container_cb_check(request, &cont) < 0) {
goto pack_response;
}
container_lock(cont);
if (is_removal_in_progress(cont->state) || is_dead(cont->state)) {
ERROR("can't copy to a container which is dead or marked for removal");
isulad_set_error_message("can't copy to a container which is dead or marked for removal");
2019-09-30 10:53:41 -04:00
goto unlock_container;
}
2019-12-25 15:50:34 +08:00
need_pause = is_running(cont->state) && !is_paused(cont->state);
if (need_pause) {
if (pause_container(cont) != 0) {
ERROR("can't copy to a container which is cannot be paused");
isulad_set_error_message("can't copy to a container which is cannot be paused");
2019-12-25 15:50:34 +08:00
goto unlock_container;
}
}
2019-09-30 10:53:41 -04:00
nret = im_mount_container_rootfs(cont->common_config->image_type, cont->common_config->image,
cont->common_config->id);
if (nret != 0) {
2019-12-25 15:50:34 +08:00
goto unpause_container;
2019-09-30 10:53:41 -04:00
}
dstdir = copy_to_container_get_dstdir(cont, request, &transform);
if (dstdir == NULL) {
goto cleanup_rootfs;
}
nret = copy_to_container_resolve_path(cont, dstdir, &resolvedpath, &abspath);
if (nret < 0) {
goto cleanup_rootfs;
}
nret = copy_to_container_check_path_valid(cont, resolvedpath, abspath);
if (nret < 0) {
goto cleanup_rootfs;
}
nret = read_and_extract_archive(stream, resolvedpath, transform);
if (nret < 0) {
ERROR("Failed to send archive data");
goto cleanup_rootfs;
}
(void)isulad_monitor_send_container_event(cont->common_config->id, EXTRACT_TO_DIR, -1, 0, NULL, NULL);
2019-09-30 10:53:41 -04:00
ret = 0;
2019-12-25 15:50:34 +08:00
2019-09-30 10:53:41 -04:00
cleanup_rootfs:
if (im_umount_container_rootfs(cont->common_config->image_type, cont->common_config->image,
cont->common_config->id) != 0) {
WARN("Can not umount rootfs of container: %s", cont->common_config->id);
}
2019-12-25 15:50:34 +08:00
unpause_container:
if (need_pause && resume_container(cont) != 0) {
ERROR("can't resume container which has been paused before copy");
}
2019-09-30 10:53:41 -04:00
unlock_container:
container_unlock(cont);
container_unref(cont);
pack_response:
if (g_isulad_errmsg != NULL) {
*err = util_strdup_s(g_isulad_errmsg);
2019-09-30 10:53:41 -04:00
DAEMON_CLEAR_ERRMSG();
}
free(resolvedpath);
free(abspath);
free(dstdir);
free(transform);
return ret;
}
static int container_logs_cb_check(const struct isulad_logs_request *request, struct isulad_logs_response *response)
2019-09-30 10:53:41 -04:00
{
if (request == NULL || request->id == NULL) {
response->cc = ISULAD_ERR_INPUT;
2019-09-30 10:53:41 -04:00
ERROR("Receive NULL request or id");
return -1;
}
if (!util_valid_container_id_or_name(request->id)) {
ERROR("Invalid container name %s", request->id);
response->cc = ISULAD_ERR_INPUT;
2019-09-30 10:53:41 -04:00
if (asprintf(&(response->errmsg), "Invalid container name %s", request->id) < 0) {
response->errmsg = util_strdup_s("Out of memory");
}
return -1;
}
return 0;
}
static int do_decode_write_log_entry(const char *json_str, const stream_func_wrapper *stream)
{
bool write_ok = false;
int ret = -1;
parser_error jerr = NULL;
logger_json_file *logentry = NULL;
struct parser_context ctx = { OPT_GEN_SIMPLIFY | OPT_GEN_NO_VALIDATE_UTF8, stderr };
logentry = logger_json_file_parse_data(json_str, &ctx, &jerr);
if (logentry == NULL) {
ERROR("parse logentry: %s, failed: %s", json_str, jerr);
goto out;
}
/* send to client */
write_ok = stream->write_func(stream->writer, logentry);
if (!write_ok) {
ERROR("Send log to client failed");
goto out;
}
ret = 0;
out:
free_logger_json_file(logentry);
free(jerr);
return ret;
}
/*
* return:
* < 0, mean read failed
* == 0, mean read zero line
* > 0, mean read many lines
* */
static int64_t do_read_log_file(const char *path, int64_t require_line, long pos, const stream_func_wrapper *stream,
long *last_pos)
{
#define MAX_JSON_DECODE_RETRY 20
int retries = 0;
int decode_retries = 0;
int64_t read_lines = 0;
FILE *fp = NULL;
char buffer[MAXLINE + 1] = { 0 };
for (retries = 0; retries <= LOG_MAX_RETRIES; retries++) {
fp = util_fopen(path, "r");
if (fp != NULL || errno != ENOENT) {
break;
}
/* fopen is too fast, need wait rename operator finish */
usleep_nointerupt(1000);
}
if (fp == NULL) {
ERROR("open file: %s failed: %s", path, strerror(errno));
return -1;
}
if (pos > 0 && fseek(fp, pos, SEEK_SET) != 0) {
ERROR("fseek to %ld failed: %s", pos, strerror(errno));
read_lines = -1;
goto out;
}
*last_pos = pos;
while (fgets(buffer, MAXLINE, fp) != NULL) {
(*last_pos) += (long)strlen(buffer);
if (do_decode_write_log_entry(buffer, stream) != 0) {
/* read a incomplete json object, try agin */
decode_retries++;
if (decode_retries < MAX_JSON_DECODE_RETRY) {
continue;
}
read_lines = -1;
goto out;
}
decode_retries = 0;
read_lines++;
if (read_lines == require_line) {
break;
}
}
out:
fclose(fp);
return read_lines;
}
struct last_log_file_position {
/* read file position */
long pos;
/* which log file */
int file_index;
};
static int do_read_all_container_logs(int64_t require_line, const char *path, const stream_func_wrapper *stream,
struct last_log_file_position *position)
{
int ret = -1;
int i = position->file_index;
int64_t read_lines = 0;
int64_t left_lines = require_line;
long pos = position->pos;
char log_path[PATH_MAX] = { 0 };
for (; i > 0; i--) {
int nret = snprintf(log_path, PATH_MAX, "%s.%d", path, i);
if (nret >= PATH_MAX || nret < 0) {
2019-09-30 10:53:41 -04:00
ERROR("Sprintf failed");
goto out;
}
read_lines = do_read_log_file(log_path, left_lines, pos, stream, &(position->pos));
if (read_lines < 0) {
if (errno == ENOENT) {
continue;
}
goto out;
}
/* only last file need pos */
pos = 0;
if (require_line < 0) {
continue;
}
left_lines -= read_lines;
if (left_lines <= 0) {
/* get enough lines */
ret = 0;
goto out;
}
}
read_lines = do_read_log_file(path, left_lines, pos, stream, &(position->pos));
ret = read_lines < 0 ? -1 : 0;
out:
position->file_index = i;
return ret;
}
static int do_show_all_logs(const struct container_log_config *conf, const stream_func_wrapper *stream,
struct last_log_file_position *last_pos)
{
int ret = 0;
int index = conf->rotate - 1;
char log_path[PATH_MAX] = { 0 };
while (index > 0) {
int nret = snprintf(log_path, PATH_MAX, "%s.%d", conf->path, index);
if (nret >= PATH_MAX || nret < 0) {
2019-09-30 10:53:41 -04:00
ERROR("Sprintf failed");
ret = -1;
goto out;
}
if (util_file_exists(log_path)) {
break;
}
index--;
}
last_pos->file_index = index;
last_pos->pos = 0;
ret = do_read_all_container_logs(-1, conf->path, stream, last_pos);
out:
return ret;
}
static int do_tail_find(FILE *fp, int64_t require_line, int64_t *get_line, long *get_pos)
{
#define SECTION_SIZE 4096
char buffer[SECTION_SIZE] = { 0 };
size_t read_size, i;
long len, pos, step_size;
int ret = -1;
if (fseek(fp, 0L, SEEK_END) != 0) {
ERROR("Fseek failed: %s", strerror(errno));
goto out;
}
len = ftell(fp);
if (len < 0) {
ERROR("Ftell failed: %s", strerror(errno));
goto out;
}
if (len < SECTION_SIZE) {
pos = len;
step_size = len;
} else {
step_size = SECTION_SIZE;
pos = len - step_size;
}
while (true) {
if (fseek(fp, pos, SEEK_SET) != 0) {
ERROR("Fseek failed: %s", strerror(errno));
goto out;
}
read_size = fread(buffer, sizeof(char), (size_t)step_size, fp);
for (i = read_size; i > 0; i--) {
if (buffer[i - 1] != '\n') {
continue;
}
(*get_line) += 1;
if ((*get_line) > require_line) {
(*get_pos) = pos + (long)i;
(*get_line) = require_line;
ret = 0;
goto out;
}
}
if (pos == 0) {
break;
}
if (pos < step_size) {
step_size = pos;
pos = 0;
} else {
pos -= step_size;
}
}
ret = 0;
out:
return ret;
}
static int util_find_tail_position(const char *file_name, int64_t require_line, int64_t *get_line, long *pos)
{
FILE *fp = NULL;
int ret = -1;
if (file_name == NULL) {
return 0;
}
if (get_line == NULL || pos == NULL) {
ERROR("Invalid Arguments");
return -1;
}
fp = util_fopen(file_name, "rb");
if (fp == NULL) {
ERROR("open file: %s failed: %s", file_name, strerror(errno));
return -1;
}
ret = do_tail_find(fp, require_line, get_line, pos);
fclose(fp);
return ret;
}
static int do_tail_container_logs(int64_t require_line, const struct container_log_config *conf,
const stream_func_wrapper *stream, struct last_log_file_position *last_pos)
{
int i, ret;
int64_t left = require_line;
int64_t get_line = 0;
long pos = 0;
char log_path[PATH_MAX] = { 0 };
if (require_line < 0) {
/* read all logs */
return do_show_all_logs(conf, stream, last_pos);
}
if (require_line == 0) {
/* require empty logs */
return 0;
}
ret = util_find_tail_position(conf->path, left, &get_line, &pos);
if (ret != 0) {
return -1;
}
if (pos != 0) {
/* first line in first log file */
get_line = do_read_log_file(conf->path, require_line, pos, stream, &(last_pos->pos));
last_pos->file_index = 0;
return get_line < 0 ? -1 : 0;
}
for (i = 1; i < conf->rotate; i++) {
if (left <= get_line) {
i--;
break;
}
left -= get_line;
get_line = 0;
int nret = snprintf(log_path, PATH_MAX, "%s.%d", conf->path, i);
if (nret >= PATH_MAX || nret < 0) {
2019-09-30 10:53:41 -04:00
ERROR("Sprintf failed");
goto out;
}
ret = util_find_tail_position(log_path, left, &get_line, &pos);
if (ret != 0) {
if (errno == ENOENT) {
i--;
break;
}
goto out;
}
if (pos != 0) {
break;
}
}
i = (i == conf->rotate ? i - 1 : i);
last_pos->pos = pos;
last_pos->file_index = i;
ret = do_read_all_container_logs(require_line, conf->path, stream, last_pos);
out:
return ret;
}
struct follow_args {
const char *path;
stream_func_wrapper *stream;
bool *finish;
long last_file_pos;
int last_file_index;
};
static int handle_rotate(int fd, int wd, const char *path)
{
int watch_fd = -1;
int retries = 0;
INFO("Do rotate...");
if (inotify_rm_watch(fd, wd) < 0) {
WARN("Rm watch failed");
}
for (; retries < LOG_MAX_RETRIES; retries++) {
watch_fd = inotify_add_watch(fd, path, IN_MODIFY | IN_DELETE | IN_MOVED_FROM | IN_MOVE_SELF);
if (watch_fd >= 0) {
break;
}
usleep_nointerupt(1000);
}
if (watch_fd < 0) {
SYSERROR("Add watch %s failed", path);
}
return watch_fd;
}
static void cleanup_handler(void *arg)
{
int *fds = (int *)arg;
if (fds[0] < 0) {
return;
}
if (fds[1] >= 0 && inotify_rm_watch(fds[0], fds[1]) < 0) {
SYSERROR("Rm watch failed");
}
close(fds[0]);
}
2019-09-30 10:53:41 -04:00
static int hanlde_events(int fd, const struct follow_args *farg)
{
int write_cnt, rename_cnt;
int watch_fd = 0;
int ret = -1;
size_t i = 0;
ssize_t len = 0;
struct inotify_event *c_event = NULL;
char buf[MAXLINE] __attribute__((aligned(__alignof__(struct inotify_event)))) = { 0 };
int clean_fds[2] = { fd, -1 };
2019-09-30 10:53:41 -04:00
struct last_log_file_position last_pos = {
.file_index = farg->last_file_index,
.pos = farg->last_file_pos,
};
pthread_cleanup_push(cleanup_handler, clean_fds);
2019-09-30 10:53:41 -04:00
watch_fd = inotify_add_watch(fd, farg->path, IN_MODIFY | IN_DELETE | IN_MOVED_FROM | IN_MOVE_SELF);
if (watch_fd < 0) {
SYSERROR("Add watch %s failed", farg->path);
goto out;
}
clean_fds[1] = watch_fd;
2019-09-30 10:53:41 -04:00
for (;;) {
if (pthread_setcancelstate(PTHREAD_CANCEL_ENABLE, NULL) != 0) {
ERROR("set cancel state failed");
}
len = util_read_nointr(fd, buf, sizeof(buf));
if (len < 0) {
SYSERROR("Read inotify event failed");
goto out;
}
if (pthread_setcancelstate(PTHREAD_CANCEL_DISABLE, NULL) != 0) {
ERROR("set cancel state failed");
}
write_cnt = 0;
rename_cnt = 0;
for (i = 0; i < (size_t)len; i += (sizeof(struct inotify_event) + c_event->len)) {
c_event = (struct inotify_event *)(&buf[i]);
if (c_event->mask & IN_MODIFY) {
write_cnt++;
} else if (c_event->mask & (IN_DELETE | IN_MOVED_FROM | IN_MOVE_SELF)) {
rename_cnt++;
}
}
if (rename_cnt == 0 && write_cnt == 0) {
continue;
}
last_pos.file_index = rename_cnt;
if (do_read_all_container_logs(write_cnt, farg->path, farg->stream, &last_pos) != 0) {
ERROR("Read all new logs failed");
goto out;
}
if (rename_cnt > 0) {
watch_fd = handle_rotate(fd, watch_fd, farg->path);
if (watch_fd < 0) {
goto out;
}
/* if terminal log file rotated and index of last_pos is not 0,
* this mean we reach end of console.log.1. We need change last_pos
* to begin of console.log.
* */
if (last_pos.file_index > 0) {
last_pos.pos = 0;
last_pos.file_index = 0;
}
}
}
out:
pthread_cleanup_pop(1);
2019-09-30 10:53:41 -04:00
return ret;
}
static void *follow_thread_func(void *arg)
{
int inotify_fd = 0;
struct follow_args *farg = (struct follow_args *)arg;
prctl(PR_SET_NAME, "logs-worker");
INFO("Get args, path: %s, last pos: %ld, last file: %d", farg->path, farg->last_file_pos, farg->last_file_index);
inotify_fd = inotify_init1(IN_CLOEXEC);
2019-09-30 10:53:41 -04:00
if (inotify_fd < 0) {
SYSERROR("Init inotify failed");
goto set_flag;
}
if (hanlde_events(inotify_fd, farg) != 0) {
ERROR("Handle inotify event failed");
}
set_flag:
*(farg->finish) = true;
return NULL;
}
static int do_follow_log_file(const char *cid, stream_func_wrapper *stream, struct last_log_file_position *last_pos,
const char *path)
{
int ret = 0;
bool finish = false;
bool *finish_pointer = &finish;
pthread_t thread = 0;
struct follow_args arg = {
.path = path,
.last_file_pos = last_pos->pos,
.last_file_index = last_pos->file_index,
.stream = stream,
.finish = finish_pointer,
};
container_t *cont = NULL;
ret = pthread_create(&thread, NULL, follow_thread_func, &arg);
if (ret != 0) {
ERROR("Thread create failed");
return -1;
}
cont = containers_store_get(cid);
if (cont == NULL) {
ERROR("No such container:%s", cid);
ret = -1;
goto out;
}
/* check whether need finish */
while (true) {
if (finish) {
ret = -1;
break;
}
if (!is_running(cont->state)) {
break;
}
if (stream->is_cancelled(stream->context)) {
ret = -1;
break;
}
usleep_nointerupt(10000);
}
out:
if (pthread_cancel(thread) != 0) {
ERROR("cancel log work thread failed");
ret = -1;
}
if (pthread_join(thread, NULL) != 0) {
ERROR("Joint log work failed");
ret = -1;
}
container_unref(cont);
return ret;
}
static int check_log_config(const struct container_log_config *log_config)
{
if (log_config == NULL) {
ERROR("Log config is NULL");
return -1;
}
if (log_config->path == NULL) {
isulad_set_error_message("Do not set log path");
2019-09-30 10:53:41 -04:00
ERROR("Do not set log path");
return -1;
}
if (strcmp(log_config->path, "none") == 0) {
ERROR("Disable console log");
isulad_set_error_message("disable console log");
2019-09-30 10:53:41 -04:00
return -1;
}
return 0;
}
static int container_get_container_log_config(const container_t *cont, struct container_log_config **log_config)
{
*log_config = (struct container_log_config *)util_common_calloc_s(sizeof(struct container_log_config));
if (*log_config == NULL) {
ERROR("Out of memory");
return -1;
}
(*log_config)->path = util_strdup_s(cont->log_path);
(*log_config)->rotate = cont->log_rotate;
(*log_config)->size = cont->log_maxsize;
return 0;
}
static void pack_logs_response(struct isulad_logs_response *response, uint32_t cc)
2019-09-30 10:53:41 -04:00
{
if (response == NULL) {
return;
}
response->cc = cc;
if (g_isulad_errmsg != NULL) {
response->errmsg = util_strdup_s(g_isulad_errmsg);
2019-09-30 10:53:41 -04:00
DAEMON_CLEAR_ERRMSG();
}
}
static int container_logs_cb(const struct isulad_logs_request *request, stream_func_wrapper *stream,
struct isulad_logs_response **response)
2019-09-30 10:53:41 -04:00
{
int nret = 0;
uint32_t cc = ISULAD_SUCCESS;
2019-09-30 10:53:41 -04:00
char *id = NULL;
container_t *cont = NULL;
struct container_log_config *log_config = NULL;
struct last_log_file_position last_pos = {0};
Container_Status status = CONTAINER_STATUS_UNKNOWN;
2019-09-30 10:53:41 -04:00
*response = (struct isulad_logs_response *)util_common_calloc_s(sizeof(struct isulad_logs_response));
2019-09-30 10:53:41 -04:00
if (*response == NULL) {
ERROR("Out of memory");
return -1;
}
(*response)->cc = ISULAD_SUCCESS;
2019-09-30 10:53:41 -04:00
/* check request */
if (container_logs_cb_check(request, *response) != 0) {
goto out;
}
cont = containers_store_get(request->id);
if (cont == NULL) {
ERROR("No such container: %s", request->id);
cc = ISULAD_ERR_EXEC;
isulad_set_error_message("No such container: %s", request->id);
2019-09-30 10:53:41 -04:00
goto out;
}
id = cont->common_config->id;
set_log_prefix(id);
status = state_get_status(cont->state);
if (status == CONTAINER_STATUS_CREATED) {
goto out;
}
2019-09-30 10:53:41 -04:00
/* check state of container */
if (gc_is_gc_progress(id)) {
isulad_set_error_message("can not get logs from container which is dead or marked for removal");
cc = ISULAD_ERR_EXEC;
2019-09-30 10:53:41 -04:00
ERROR("can not get logs from container which is dead or marked for removal");
goto out;
}
if (container_get_container_log_config(cont, &log_config) != 0) {
cc = ISULAD_ERR_EXEC;
2019-09-30 10:53:41 -04:00
goto out;
}
EVENT("Event: {Object: %s, Content: path: %s, rotate: %d, size: %ld }", id, log_config->path, log_config->rotate,
log_config->size);
nret = check_log_config(log_config);
if (nret != 0) {
cc = ISULAD_ERR_EXEC;
2019-09-30 10:53:41 -04:00
goto out;
}
/* tail of container log file */
if (do_tail_container_logs(request->tail, log_config, stream, &last_pos) != 0) {
isulad_set_error_message("do tail log file failed");
cc = ISULAD_ERR_EXEC;
2019-09-30 10:53:41 -04:00
goto out;
}
if (!request->follow) {
goto out;
}
if (!is_running(cont->state)) {
goto out;
}
/* follow of container log file */
if (do_follow_log_file(id, stream, &last_pos, log_config->path) != 0) {
isulad_set_error_message("do follow log file failed");
cc = ISULAD_ERR_EXEC;
2019-09-30 10:53:41 -04:00
goto out;
}
out:
pack_logs_response(*response, cc);
container_unref(cont);
container_log_config_free(log_config);
free_log_prefix();
return (cc == ISULAD_SUCCESS) ? 0 : -1;
2019-09-30 10:53:41 -04:00
}
void container_stream_callback_init(service_container_callback_t *cb)
{
cb->attach = container_attach_cb;
cb->exec = container_exec_cb;
cb->copy_from_container = copy_from_container_cb;
cb->copy_to_container = copy_to_container_cb;
cb->logs = container_logs_cb;
}