gvisor/runsc/container/state_file.go

358 lines
9.9 KiB
Go

// Copyright 2019 The gVisor Authors.
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
// http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.
package container
import (
"encoding/json"
"fmt"
"io/ioutil"
"os"
"path/filepath"
"regexp"
"strings"
"github.com/gofrs/flock"
"golang.org/x/sys/unix"
"gvisor.dev/gvisor/pkg/log"
"gvisor.dev/gvisor/pkg/sync"
)
const stateFileExtension = "state"
// LoadOpts provides options for Load()ing a container.
type LoadOpts struct {
// Exact tells whether the search should be exact. See Load() for more.
Exact bool
// SkipCheck tells Load() to skip checking if container is runnning.
SkipCheck bool
}
// Load loads a container with the given id from a metadata file. "id" may
// be an abbreviation of the full container id in case LoadOpts.Exact if not
// set. It also checks if the container is still running, in order to return
// an error to the caller earlier. This check is skipped if LoadOpts.SkipCheck
// is set.
//
// Returns ErrNotExist if no container is found. Returns error in case more than
// one containers matching the ID prefix is found.
func Load(rootDir string, id FullID, opts LoadOpts) (*Container, error) {
log.Debugf("Load container, rootDir: %q, id: %+v, opts: %+v", rootDir, id, opts)
if !opts.Exact {
var err error
id, err = findContainerID(rootDir, id.ContainerID)
if err != nil {
// Preserve error so that callers can distinguish 'not found' errors.
return nil, err
}
}
if err := id.validate(); err != nil {
return nil, fmt.Errorf("invalid container id: %v", err)
}
state := StateFile{
RootDir: rootDir,
ID: id,
}
defer state.close()
c := &Container{}
if err := state.load(c); err != nil {
if os.IsNotExist(err) {
// Preserve error so that callers can distinguish 'not found' errors.
return nil, err
}
return nil, fmt.Errorf("reading container metadata file %q: %v", state.statePath(), err)
}
if !opts.SkipCheck {
// If the status is "Running" or "Created", check that the sandbox/container
// is still running, setting it to Stopped if not.
//
// This is inherently racy.
switch c.Status {
case Created:
if !c.IsSandboxRunning() {
// Sandbox no longer exists, so this container definitely does not exist.
c.changeStatus(Stopped)
}
case Running:
if err := c.SignalContainer(unix.Signal(0), false); err != nil {
c.changeStatus(Stopped)
}
}
}
return c, nil
}
// List returns all container ids in the given root directory.
func List(rootDir string) ([]FullID, error) {
log.Debugf("List containers %q", rootDir)
return listMatch(rootDir, FullID{})
}
// listMatch returns all container ids that match the provided id.
func listMatch(rootDir string, id FullID) ([]FullID, error) {
id.SandboxID += "*"
id.ContainerID += "*"
pattern := buildPath(rootDir, id, stateFileExtension)
list, err := filepath.Glob(pattern)
if err != nil {
return nil, err
}
var out []FullID
for _, path := range list {
id, err := parseFileName(filepath.Base(path))
if err == nil {
out = append(out, id)
}
}
return out, nil
}
// loadSandbox loads all containers that belong to the sandbox with the given
// ID.
func loadSandbox(rootDir, id string) ([]*Container, error) {
cids, err := listMatch(rootDir, FullID{SandboxID: id})
if err != nil {
return nil, err
}
// Load the container metadata.
var containers []*Container
for _, cid := range cids {
container, err := Load(rootDir, cid, LoadOpts{Exact: true, SkipCheck: true})
if err != nil {
// Container file may not exist if it raced with creation/deletion or
// directory was left behind. Load provides a snapshot in time, so it's
// fine to skip it.
if os.IsNotExist(err) {
continue
}
return nil, fmt.Errorf("loading sandbox %q, failed to load container %q: %v", id, cid, err)
}
containers = append(containers, container)
}
return containers, nil
}
func findContainerID(rootDir, partialID string) (FullID, error) {
// Check whether the id fully specifies an existing container.
pattern := buildPath(rootDir, FullID{SandboxID: "*", ContainerID: partialID + "*"}, stateFileExtension)
list, err := filepath.Glob(pattern)
if err != nil {
return FullID{}, err
}
switch len(list) {
case 0:
return FullID{}, os.ErrNotExist
case 1:
return parseFileName(filepath.Base(list[0]))
}
// Now see whether id could be an abbreviation of exactly 1 of the
// container ids. If id is ambiguous (it could match more than 1
// container), it is an error.
ids, err := List(rootDir)
if err != nil {
return FullID{}, err
}
var rv *FullID
for _, id := range ids {
if strings.HasPrefix(id.ContainerID, partialID) {
if rv != nil {
return FullID{}, fmt.Errorf("id %q is ambiguous and could refer to multiple containers: %q, %q", partialID, rv, id)
}
rv = &id
}
}
if rv == nil {
return FullID{}, os.ErrNotExist
}
log.Debugf("abbreviated id %q resolves to full id %v", partialID, *rv)
return *rv, nil
}
func parseFileName(name string) (FullID, error) {
re := regexp.MustCompile(`([\w+-\.]+)_sandbox:([\w+-\.]+)\.` + stateFileExtension)
groups := re.FindStringSubmatch(name)
if len(groups) != 3 {
return FullID{}, fmt.Errorf("invalid state file name format: %q", name)
}
id := FullID{
SandboxID: groups[2],
ContainerID: groups[1],
}
if err := id.validate(); err != nil {
return FullID{}, fmt.Errorf("invalid state file name %q: %w", name, err)
}
return id, nil
}
// FullID combines sandbox and container ID to identify a container. Sandbox ID
// is used to allow all containers for a given sandbox to be loaded by matching
// sandbox ID in the file name.
type FullID struct {
SandboxID string `json:"sandboxId"`
ContainerID string `json:"containerId"`
}
func (f *FullID) String() string {
return f.SandboxID + "/" + f.ContainerID
}
func (f *FullID) validate() error {
if err := validateID(f.SandboxID); err != nil {
return err
}
return validateID(f.ContainerID)
}
// StateFile handles load from/save to container state safely from multiple
// processes. It uses a lock file to provide synchronization between operations.
//
// The lock file is located at: "${s.RootDir}/${containerd-id}_sand:{sandbox-id}.lock".
// The state file is located at: "${s.RootDir}/${containerd-id}_sand:{sandbox-id}.state".
type StateFile struct {
// RootDir is the directory containing the container metadata file.
RootDir string `json:"rootDir"`
// ID is the sandbox+container ID.
ID FullID `json:"id"`
//
// Fields below this line are not saved in the state file and will not
// be preserved across commands.
//
once sync.Once
flock *flock.Flock
}
// lock globally locks all locking operations for the container.
func (s *StateFile) lock() error {
s.once.Do(func() {
s.flock = flock.New(s.lockPath())
})
if err := s.flock.Lock(); err != nil {
return fmt.Errorf("acquiring lock on %q: %v", s.flock, err)
}
return nil
}
// lockForNew acquires the lock and checks if the state file doesn't exist. This
// is done to ensure that more than one creation didn't race to create
// containers with the same ID.
func (s *StateFile) lockForNew() error {
if err := s.lock(); err != nil {
return err
}
// Checks if the container already exists by looking for the metadata file.
if _, err := os.Stat(s.statePath()); err == nil {
s.unlock()
return fmt.Errorf("container already exists")
} else if !os.IsNotExist(err) {
s.unlock()
return fmt.Errorf("looking for existing container: %v", err)
}
return nil
}
// unlock globally unlocks all locking operations for the container.
func (s *StateFile) unlock() error {
if !s.flock.Locked() {
panic("unlock called without lock held")
}
if err := s.flock.Unlock(); err != nil {
log.Warningf("Error to release lock on %q: %v", s.flock, err)
return fmt.Errorf("releasing lock on %q: %v", s.flock, err)
}
return nil
}
// saveLocked saves 'v' to the state file.
//
// Preconditions: lock() must been called before.
func (s *StateFile) saveLocked(v interface{}) error {
if !s.flock.Locked() {
panic("saveLocked called without lock held")
}
meta, err := json.Marshal(v)
if err != nil {
return err
}
if err := ioutil.WriteFile(s.statePath(), meta, 0640); err != nil {
return fmt.Errorf("writing json file: %v", err)
}
return nil
}
func (s *StateFile) load(v interface{}) error {
if err := s.lock(); err != nil {
return err
}
defer s.unlock()
metaBytes, err := ioutil.ReadFile(s.statePath())
if err != nil {
return err
}
return json.Unmarshal(metaBytes, &v)
}
func (s *StateFile) close() error {
if s.flock == nil {
return nil
}
if s.flock.Locked() {
panic("Closing locked file")
}
return s.flock.Close()
}
func buildPath(rootDir string, id FullID, extension string) string {
// Note: "_" and ":" are not valid in IDs.
name := fmt.Sprintf("%s_sandbox:%s.%s", id.ContainerID, id.SandboxID, extension)
return filepath.Join(rootDir, name)
}
// statePath is the full path to the state file.
func (s *StateFile) statePath() string {
return buildPath(s.RootDir, s.ID, stateFileExtension)
}
// lockPath is the full path to the lock file.
func (s *StateFile) lockPath() string {
return buildPath(s.RootDir, s.ID, "lock")
}
// destroy deletes all state created by the stateFile. It may be called with the
// lock file held. In that case, the lock file must still be unlocked and
// properly closed after destroy returns.
func (s *StateFile) destroy() error {
if err := os.Remove(s.statePath()); err != nil && !os.IsNotExist(err) {
return err
}
if err := os.Remove(s.lockPath()); err != nil && !os.IsNotExist(err) {
return err
}
return nil
}