209 lines
5.1 KiB
Go
209 lines
5.1 KiB
Go
package containerdexecutor
|
|
|
|
import (
|
|
"context"
|
|
"io"
|
|
"os"
|
|
"path/filepath"
|
|
"strings"
|
|
"syscall"
|
|
"time"
|
|
|
|
"github.com/containerd/containerd"
|
|
"github.com/containerd/containerd/cio"
|
|
containerdoci "github.com/containerd/containerd/oci"
|
|
"github.com/containerd/continuity/fs"
|
|
"github.com/docker/docker/pkg/idtools"
|
|
"github.com/moby/buildkit/cache"
|
|
"github.com/moby/buildkit/executor"
|
|
"github.com/moby/buildkit/executor/oci"
|
|
"github.com/moby/buildkit/identity"
|
|
"github.com/moby/buildkit/snapshot"
|
|
"github.com/moby/buildkit/solver/pb"
|
|
"github.com/moby/buildkit/util/network"
|
|
"github.com/pkg/errors"
|
|
"github.com/sirupsen/logrus"
|
|
)
|
|
|
|
type containerdExecutor struct {
|
|
client *containerd.Client
|
|
root string
|
|
networkProviders map[pb.NetMode]network.Provider
|
|
cgroupParent string
|
|
dnsConfig *oci.DNSConfig
|
|
}
|
|
|
|
// New creates a new executor backed by connection to containerd API
|
|
func New(client *containerd.Client, root, cgroup string, networkProviders map[pb.NetMode]network.Provider, dnsConfig *oci.DNSConfig) executor.Executor {
|
|
// clean up old hosts/resolv.conf file. ignore errors
|
|
os.RemoveAll(filepath.Join(root, "hosts"))
|
|
os.RemoveAll(filepath.Join(root, "resolv.conf"))
|
|
|
|
return containerdExecutor{
|
|
client: client,
|
|
root: root,
|
|
networkProviders: networkProviders,
|
|
cgroupParent: cgroup,
|
|
dnsConfig: dnsConfig,
|
|
}
|
|
}
|
|
|
|
func (w containerdExecutor) Exec(ctx context.Context, meta executor.Meta, root cache.Mountable, mounts []executor.Mount, stdin io.ReadCloser, stdout, stderr io.WriteCloser) (err error) {
|
|
id := identity.NewID()
|
|
|
|
resolvConf, err := oci.GetResolvConf(ctx, w.root, nil, w.dnsConfig)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
hostsFile, clean, err := oci.GetHostsFile(ctx, w.root, meta.ExtraHosts, nil)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if clean != nil {
|
|
defer clean()
|
|
}
|
|
|
|
mountable, err := root.Mount(ctx, false)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
rootMounts, release, err := mountable.Mount()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
if release != nil {
|
|
defer release()
|
|
}
|
|
|
|
var sgids []uint32
|
|
uid, gid, err := oci.ParseUIDGID(meta.User)
|
|
if err != nil {
|
|
lm := snapshot.LocalMounterWithMounts(rootMounts)
|
|
rootfsPath, err := lm.Mount()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
uid, gid, sgids, err = oci.GetUser(ctx, rootfsPath, meta.User)
|
|
if err != nil {
|
|
lm.Unmount()
|
|
return err
|
|
}
|
|
|
|
identity := idtools.Identity{
|
|
UID: int(uid),
|
|
GID: int(gid),
|
|
}
|
|
|
|
newp, err := fs.RootPath(rootfsPath, meta.Cwd)
|
|
if err != nil {
|
|
lm.Unmount()
|
|
return errors.Wrapf(err, "working dir %s points to invalid target", newp)
|
|
}
|
|
if _, err := os.Stat(newp); err != nil {
|
|
if err := idtools.MkdirAllAndChown(newp, 0755, identity); err != nil {
|
|
lm.Unmount()
|
|
return errors.Wrapf(err, "failed to create working directory %s", newp)
|
|
}
|
|
}
|
|
|
|
lm.Unmount()
|
|
}
|
|
|
|
provider, ok := w.networkProviders[meta.NetMode]
|
|
if !ok {
|
|
return errors.Errorf("unknown network mode %s", meta.NetMode)
|
|
}
|
|
namespace, err := provider.New()
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer namespace.Close()
|
|
|
|
if meta.NetMode == pb.NetMode_HOST {
|
|
logrus.Info("enabling HostNetworking")
|
|
}
|
|
|
|
opts := []containerdoci.SpecOpts{oci.WithUIDGID(uid, gid, sgids)}
|
|
if meta.ReadonlyRootFS {
|
|
opts = append(opts, containerdoci.WithRootFSReadonly())
|
|
}
|
|
|
|
if w.cgroupParent != "" {
|
|
var cgroupsPath string
|
|
lastSeparator := w.cgroupParent[len(w.cgroupParent)-1:]
|
|
if strings.Contains(w.cgroupParent, ".slice") && lastSeparator == ":" {
|
|
cgroupsPath = w.cgroupParent + id
|
|
} else {
|
|
cgroupsPath = filepath.Join("/", w.cgroupParent, "buildkit", id)
|
|
}
|
|
opts = append(opts, containerdoci.WithCgroup(cgroupsPath))
|
|
}
|
|
processMode := oci.ProcessSandbox // FIXME(AkihiroSuda)
|
|
spec, cleanup, err := oci.GenerateSpec(ctx, meta, mounts, id, resolvConf, hostsFile, namespace, processMode, nil, opts...)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer cleanup()
|
|
|
|
container, err := w.client.NewContainer(ctx, id,
|
|
containerd.WithSpec(spec),
|
|
)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
defer func() {
|
|
if err1 := container.Delete(context.TODO()); err == nil && err1 != nil {
|
|
err = errors.Wrapf(err1, "failed to delete container %s", id)
|
|
}
|
|
}()
|
|
|
|
task, err := container.NewTask(ctx, cio.NewCreator(cio.WithStreams(stdin, stdout, stderr)), containerd.WithRootFS(rootMounts))
|
|
if err != nil {
|
|
return err
|
|
}
|
|
defer func() {
|
|
if _, err1 := task.Delete(context.TODO()); err == nil && err1 != nil {
|
|
err = errors.Wrapf(err1, "failed to delete task %s", id)
|
|
}
|
|
}()
|
|
|
|
if err := task.Start(ctx); err != nil {
|
|
return err
|
|
}
|
|
|
|
statusCh, err := task.Wait(context.Background())
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
var cancel func()
|
|
ctxDone := ctx.Done()
|
|
for {
|
|
select {
|
|
case <-ctxDone:
|
|
ctxDone = nil
|
|
var killCtx context.Context
|
|
killCtx, cancel = context.WithTimeout(context.Background(), 10*time.Second)
|
|
task.Kill(killCtx, syscall.SIGKILL)
|
|
case status := <-statusCh:
|
|
if cancel != nil {
|
|
cancel()
|
|
}
|
|
if status.ExitCode() != 0 {
|
|
err := errors.Errorf("process returned non-zero exit code: %d", status.ExitCode())
|
|
select {
|
|
case <-ctx.Done():
|
|
err = errors.Wrap(ctx.Err(), err.Error())
|
|
default:
|
|
}
|
|
return err
|
|
}
|
|
return nil
|
|
}
|
|
}
|
|
|
|
}
|