Read docker container spec from cgroupfs, rather than libcontainer spec
This commit is contained in:
parent
4861405904
commit
4a8f3e4c93
@ -18,7 +18,6 @@ package docker
|
||||
import (
|
||||
"fmt"
|
||||
"io/ioutil"
|
||||
"math"
|
||||
"path"
|
||||
"strings"
|
||||
"time"
|
||||
@ -28,7 +27,6 @@ import (
|
||||
containerlibcontainer "github.com/google/cadvisor/container/libcontainer"
|
||||
"github.com/google/cadvisor/fs"
|
||||
info "github.com/google/cadvisor/info/v1"
|
||||
"github.com/google/cadvisor/utils"
|
||||
|
||||
docker "github.com/fsouza/go-dockerclient"
|
||||
"github.com/opencontainers/runc/libcontainer/cgroups"
|
||||
@ -222,50 +220,6 @@ func (self *dockerContainerHandler) ContainerReference() (info.ContainerReferenc
|
||||
}, nil
|
||||
}
|
||||
|
||||
func (self *dockerContainerHandler) readLibcontainerConfig() (*libcontainerconfigs.Config, error) {
|
||||
config, err := containerlibcontainer.ReadConfig(*dockerRootDir, *dockerRunDir, self.id)
|
||||
if err != nil {
|
||||
return nil, fmt.Errorf("failed to read libcontainer config: %v", err)
|
||||
}
|
||||
|
||||
// Replace cgroup parent and name with our own since we may be running in a different context.
|
||||
if config.Cgroups == nil {
|
||||
config.Cgroups = new(libcontainerconfigs.Cgroup)
|
||||
}
|
||||
config.Cgroups.Name = self.name
|
||||
config.Cgroups.Parent = "/"
|
||||
|
||||
return config, nil
|
||||
}
|
||||
|
||||
func libcontainerConfigToContainerSpec(config *libcontainerconfigs.Config, mi *info.MachineInfo) info.ContainerSpec {
|
||||
var spec info.ContainerSpec
|
||||
spec.HasMemory = true
|
||||
spec.Memory.Limit = math.MaxUint64
|
||||
spec.Memory.SwapLimit = math.MaxUint64
|
||||
|
||||
if config.Cgroups.Resources != nil {
|
||||
if config.Cgroups.Resources.Memory > 0 {
|
||||
spec.Memory.Limit = uint64(config.Cgroups.Resources.Memory)
|
||||
}
|
||||
if config.Cgroups.Resources.MemorySwap > 0 {
|
||||
spec.Memory.SwapLimit = uint64(config.Cgroups.Resources.MemorySwap)
|
||||
}
|
||||
|
||||
// Get CPU info
|
||||
spec.HasCpu = true
|
||||
spec.Cpu.Limit = 1024
|
||||
if config.Cgroups.Resources.CpuShares != 0 {
|
||||
spec.Cpu.Limit = uint64(config.Cgroups.Resources.CpuShares)
|
||||
}
|
||||
spec.Cpu.Mask = utils.FixCpuMask(config.Cgroups.Resources.CpusetCpus, mi.NumCores)
|
||||
}
|
||||
|
||||
spec.HasDiskIo = true
|
||||
|
||||
return spec
|
||||
}
|
||||
|
||||
func (self *dockerContainerHandler) needNet() bool {
|
||||
if !self.ignoreMetrics.Has(container.NetworkUsageMetrics) {
|
||||
return !strings.HasPrefix(self.networkMode, "container:")
|
||||
@ -274,28 +228,8 @@ func (self *dockerContainerHandler) needNet() bool {
|
||||
}
|
||||
|
||||
func (self *dockerContainerHandler) GetSpec() (info.ContainerSpec, error) {
|
||||
mi, err := self.machineInfoFactory.GetMachineInfo()
|
||||
if err != nil {
|
||||
return info.ContainerSpec{}, err
|
||||
}
|
||||
libcontainerConfig, err := self.readLibcontainerConfig()
|
||||
if err != nil {
|
||||
return info.ContainerSpec{}, err
|
||||
}
|
||||
|
||||
spec := libcontainerConfigToContainerSpec(libcontainerConfig, mi)
|
||||
spec.CreationTime = self.creationTime
|
||||
|
||||
if !self.ignoreMetrics.Has(container.DiskUsageMetrics) {
|
||||
spec.HasFilesystem = true
|
||||
}
|
||||
|
||||
spec.Labels = self.labels
|
||||
spec.Envs = self.envs
|
||||
spec.Image = self.image
|
||||
spec.HasNetwork = self.needNet()
|
||||
|
||||
return spec, err
|
||||
hasFilesystem := !self.ignoreMetrics.Has(container.DiskUsageMetrics)
|
||||
return common.GetSpec(self.cgroupPaths, self.machineInfoFactory, self.needNet(), hasFilesystem)
|
||||
}
|
||||
|
||||
func (self *dockerContainerHandler) getFsStats(stats *info.ContainerStats) error {
|
||||
|
@ -15,169 +15,11 @@
|
||||
package libcontainer
|
||||
|
||||
import (
|
||||
"encoding/json"
|
||||
"io/ioutil"
|
||||
"path"
|
||||
|
||||
"github.com/google/cadvisor/utils"
|
||||
|
||||
"github.com/opencontainers/runc/libcontainer"
|
||||
"github.com/opencontainers/runc/libcontainer/configs"
|
||||
)
|
||||
|
||||
// State represents a running container's state
|
||||
type preAPIState struct {
|
||||
// InitPid is the init process id in the parent namespace
|
||||
InitPid int `json:"init_pid,omitempty"`
|
||||
|
||||
// InitStartTime is the init process start time
|
||||
InitStartTime string `json:"init_start_time,omitempty"`
|
||||
|
||||
// Network runtime state.
|
||||
NetworkState preAPINetworkState `json:"network_state,omitempty"`
|
||||
|
||||
// Path to all the cgroups setup for a container. Key is cgroup subsystem name.
|
||||
CgroupPaths map[string]string `json:"cgroup_paths,omitempty"`
|
||||
}
|
||||
|
||||
// Struct describing the network specific runtime state that will be maintained by libcontainer for all running containers
|
||||
// Do not depend on it outside of libcontainer.
|
||||
type preAPINetworkState struct {
|
||||
// The name of the veth interface on the Host.
|
||||
VethHost string `json:"veth_host,omitempty"`
|
||||
// The name of the veth interface created inside the container for the child.
|
||||
VethChild string `json:"veth_child,omitempty"`
|
||||
// Net namespace path.
|
||||
NsPath string `json:"ns_path,omitempty"`
|
||||
}
|
||||
|
||||
type preAPIConfig struct {
|
||||
// Pathname to container's root filesystem
|
||||
RootFs string `json:"root_fs,omitempty"`
|
||||
|
||||
// Hostname optionally sets the container's hostname if provided
|
||||
Hostname string `json:"hostname,omitempty"`
|
||||
|
||||
// User will set the uid and gid of the executing process running inside the container
|
||||
User string `json:"user,omitempty"`
|
||||
|
||||
// WorkingDir will change the processes current working directory inside the container's rootfs
|
||||
WorkingDir string `json:"working_dir,omitempty"`
|
||||
|
||||
// Env will populate the processes environment with the provided values
|
||||
// Any values from the parent processes will be cleared before the values
|
||||
// provided in Env are provided to the process
|
||||
Env []string `json:"environment,omitempty"`
|
||||
|
||||
// Tty when true will allocate a pty slave on the host for access by the container's process
|
||||
// and ensure that it is mounted inside the container's rootfs
|
||||
Tty bool `json:"tty,omitempty"`
|
||||
|
||||
// Namespaces specifies the container's namespaces that it should setup when cloning the init process
|
||||
// If a namespace is not provided that namespace is shared from the container's parent process
|
||||
Namespaces []configs.Namespace `json:"namespaces,omitempty"`
|
||||
|
||||
// Capabilities specify the capabilities to keep when executing the process inside the container
|
||||
// All capbilities not specified will be dropped from the processes capability mask
|
||||
Capabilities []string `json:"capabilities,omitempty"`
|
||||
|
||||
// Networks specifies the container's network setup to be created
|
||||
Networks []preAPINetwork `json:"networks,omitempty"`
|
||||
|
||||
// Routes can be specified to create entries in the route table as the container is started
|
||||
Routes []*configs.Route `json:"routes,omitempty"`
|
||||
|
||||
// Cgroups specifies specific cgroup settings for the various subsystems that the container is
|
||||
// placed into to limit the resources the container has available
|
||||
Cgroups *configs.Cgroup `json:"cgroups,omitempty"`
|
||||
|
||||
// AppArmorProfile specifies the profile to apply to the process running in the container and is
|
||||
// change at the time the process is execed
|
||||
AppArmorProfile string `json:"apparmor_profile,omitempty"`
|
||||
|
||||
// ProcessLabel specifies the label to apply to the process running in the container. It is
|
||||
// commonly used by selinux
|
||||
ProcessLabel string `json:"process_label,omitempty"`
|
||||
|
||||
// RestrictSys will remount /proc/sys, /sys, and mask over sysrq-trigger as well as /proc/irq and
|
||||
// /proc/bus
|
||||
RestrictSys bool `json:"restrict_sys,omitempty"`
|
||||
}
|
||||
|
||||
// Network defines configuration for a container's networking stack
|
||||
//
|
||||
// The network configuration can be omited from a container causing the
|
||||
// container to be setup with the host's networking stack
|
||||
type preAPINetwork struct {
|
||||
// Type sets the networks type, commonly veth and loopback
|
||||
Type string `json:"type,omitempty"`
|
||||
|
||||
// The bridge to use.
|
||||
Bridge string `json:"bridge,omitempty"`
|
||||
|
||||
// Prefix for the veth interfaces.
|
||||
VethPrefix string `json:"veth_prefix,omitempty"`
|
||||
|
||||
// MacAddress contains the MAC address to set on the network interface
|
||||
MacAddress string `json:"mac_address,omitempty"`
|
||||
|
||||
// Address contains the IPv4 and mask to set on the network interface
|
||||
Address string `json:"address,omitempty"`
|
||||
|
||||
// IPv6Address contains the IPv6 and mask to set on the network interface
|
||||
IPv6Address string `json:"ipv6_address,omitempty"`
|
||||
|
||||
// Gateway sets the gateway address that is used as the default for the interface
|
||||
Gateway string `json:"gateway,omitempty"`
|
||||
|
||||
// IPv6Gateway sets the ipv6 gateway address that is used as the default for the interface
|
||||
IPv6Gateway string `json:"ipv6_gateway,omitempty"`
|
||||
|
||||
// Mtu sets the mtu value for the interface and will be mirrored on both the host and
|
||||
// container's interfaces if a pair is created, specifically in the case of type veth
|
||||
// Note: This does not apply to loopback interfaces.
|
||||
Mtu int `json:"mtu,omitempty"`
|
||||
|
||||
// TxQueueLen sets the tx_queuelen value for the interface and will be mirrored on both the host and
|
||||
// container's interfaces if a pair is created, specifically in the case of type veth
|
||||
// Note: This does not apply to loopback interfaces.
|
||||
TxQueueLen int `json:"txqueuelen,omitempty"`
|
||||
}
|
||||
|
||||
type v1Cgroup struct {
|
||||
configs.Cgroup
|
||||
|
||||
// Weight per cgroup per device, can override BlkioWeight.
|
||||
BlkioWeightDevice string `json:"blkio_weight_device"`
|
||||
// IO read rate limit per cgroup per device, bytes per second.
|
||||
BlkioThrottleReadBpsDevice string `json:"blkio_throttle_read_bps_device"`
|
||||
|
||||
// IO write rate limit per cgroup per divice, bytes per second.
|
||||
BlkioThrottleWriteBpsDevice string `json:"blkio_throttle_write_bps_device"`
|
||||
|
||||
// IO read rate limit per cgroup per device, IO per second.
|
||||
BlkioThrottleReadIOPSDevice string `json:"blkio_throttle_read_iops_device"`
|
||||
|
||||
// IO write rate limit per cgroup per device, IO per second.
|
||||
BlkioThrottleWriteIOPSDevice string `json:"blkio_throttle_write_iops_device"`
|
||||
}
|
||||
|
||||
type v1Config struct {
|
||||
configs.Config
|
||||
|
||||
// Cgroups specifies specific cgroup settings for the various subsystems that the container is
|
||||
// placed into to limit the resources the container has available
|
||||
Cgroup *v1Cgroup `json:"cgroups"`
|
||||
}
|
||||
|
||||
// State represents a running container's state
|
||||
type v1State struct {
|
||||
libcontainer.State
|
||||
|
||||
// Config is the container's configuration.
|
||||
Config v1Config `json:"config"`
|
||||
}
|
||||
|
||||
const (
|
||||
// Relative path to the libcontainer execdriver directory.
|
||||
libcontainerExecDriverPath = "execdriver/native"
|
||||
@ -185,184 +27,13 @@ const (
|
||||
containerdPath = "/run/containerd"
|
||||
)
|
||||
|
||||
// TODO(vmarmol): Deprecate over time as old Dockers are phased out.
|
||||
func ReadConfig(dockerRoot, dockerRun, containerID string) (*configs.Config, error) {
|
||||
// Try using the new config if it is available.
|
||||
configPath := configPath(dockerRun, containerID)
|
||||
if utils.FileExists(configPath) {
|
||||
out, err := ioutil.ReadFile(configPath)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
var state libcontainer.State
|
||||
if err = json.Unmarshal(out, &state); err != nil {
|
||||
if _, ok := err.(*json.UnmarshalTypeError); ok {
|
||||
// Since some fields changes in Cgroup struct, it will be failed while unmarshalling to libcontainer.State struct.
|
||||
// This failure is caused by a change of runc(https://github.com/opencontainers/runc/commit/c6e406af243fab0c9636539c1cb5f4d60fe0787f).
|
||||
// If we encountered the UnmarshalTypeError, try to unmarshal it again to v1State struct and convert it.
|
||||
var state v1State
|
||||
err2 := json.Unmarshal(out, &state)
|
||||
if err2 != nil {
|
||||
return nil, err
|
||||
}
|
||||
return convertOldConfigToNew(state.Config), nil
|
||||
} else {
|
||||
return nil, err
|
||||
}
|
||||
}
|
||||
return &state.Config, nil
|
||||
}
|
||||
|
||||
// Fallback to reading the old config which is comprised of the state and config files.
|
||||
oldConfigPath := oldConfigPath(dockerRoot, containerID)
|
||||
out, err := ioutil.ReadFile(oldConfigPath)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
// Try reading the preAPIConfig.
|
||||
var config preAPIConfig
|
||||
err = json.Unmarshal(out, &config)
|
||||
if err != nil {
|
||||
// Try to parse the old pre-API config. The main difference is that namespaces used to be a map, now it is a slice of structs.
|
||||
// The JSON marshaler will use the non-nested field before the nested one.
|
||||
type oldLibcontainerConfig struct {
|
||||
preAPIConfig
|
||||
OldNamespaces map[string]bool `json:"namespaces,omitempty"`
|
||||
}
|
||||
var oldConfig oldLibcontainerConfig
|
||||
err2 := json.Unmarshal(out, &oldConfig)
|
||||
if err2 != nil {
|
||||
// Use original error.
|
||||
return nil, err
|
||||
}
|
||||
|
||||
// Translate the old pre-API config into the new config.
|
||||
config = oldConfig.preAPIConfig
|
||||
for ns := range oldConfig.OldNamespaces {
|
||||
config.Namespaces = append(config.Namespaces, configs.Namespace{
|
||||
Type: configs.NamespaceType(ns),
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
// Read the old state file as well.
|
||||
state, err := readState(dockerRoot, containerID)
|
||||
if err != nil {
|
||||
return nil, err
|
||||
}
|
||||
|
||||
// Convert preAPIConfig + old state file to Config.
|
||||
// This only converts some of the fields, the ones we use.
|
||||
// You may need to add fields if the one you're interested in is not available.
|
||||
var result configs.Config
|
||||
result.Cgroups = new(configs.Cgroup)
|
||||
result.Rootfs = config.RootFs
|
||||
result.Hostname = config.Hostname
|
||||
result.Namespaces = config.Namespaces
|
||||
result.Capabilities = config.Capabilities
|
||||
for _, net := range config.Networks {
|
||||
n := &configs.Network{
|
||||
Name: state.NetworkState.VethChild,
|
||||
Bridge: net.Bridge,
|
||||
MacAddress: net.MacAddress,
|
||||
Address: net.Address,
|
||||
Gateway: net.Gateway,
|
||||
IPv6Address: net.IPv6Address,
|
||||
IPv6Gateway: net.IPv6Gateway,
|
||||
HostInterfaceName: state.NetworkState.VethHost,
|
||||
}
|
||||
result.Networks = append(result.Networks, n)
|
||||
}
|
||||
result.Routes = config.Routes
|
||||
if config.Cgroups != nil {
|
||||
result.Cgroups = config.Cgroups
|
||||
}
|
||||
|
||||
return &result, nil
|
||||
}
|
||||
|
||||
func convertOldConfigToNew(config v1Config) *configs.Config {
|
||||
var (
|
||||
result configs.Config
|
||||
old *v1Cgroup = config.Cgroup
|
||||
)
|
||||
result.Rootfs = config.Config.Rootfs
|
||||
result.Hostname = config.Config.Hostname
|
||||
result.Namespaces = config.Config.Namespaces
|
||||
result.Capabilities = config.Config.Capabilities
|
||||
result.Networks = config.Config.Networks
|
||||
result.Routes = config.Config.Routes
|
||||
|
||||
var newCgroup = &configs.Cgroup{
|
||||
Name: old.Name,
|
||||
Parent: old.Parent,
|
||||
Resources: &configs.Resources{
|
||||
AllowAllDevices: old.Resources.AllowAllDevices,
|
||||
AllowedDevices: old.Resources.AllowedDevices,
|
||||
DeniedDevices: old.Resources.DeniedDevices,
|
||||
Memory: old.Resources.Memory,
|
||||
MemoryReservation: old.Resources.MemoryReservation,
|
||||
MemorySwap: old.Resources.MemorySwap,
|
||||
KernelMemory: old.Resources.KernelMemory,
|
||||
CpuShares: old.Resources.CpuShares,
|
||||
CpuQuota: old.Resources.CpuQuota,
|
||||
CpuPeriod: old.Resources.CpuPeriod,
|
||||
CpuRtRuntime: old.Resources.CpuRtRuntime,
|
||||
CpuRtPeriod: old.Resources.CpuRtPeriod,
|
||||
CpusetCpus: old.Resources.CpusetCpus,
|
||||
CpusetMems: old.Resources.CpusetMems,
|
||||
BlkioWeight: old.Resources.BlkioWeight,
|
||||
BlkioLeafWeight: old.Resources.BlkioLeafWeight,
|
||||
Freezer: old.Resources.Freezer,
|
||||
HugetlbLimit: old.Resources.HugetlbLimit,
|
||||
OomKillDisable: old.Resources.OomKillDisable,
|
||||
MemorySwappiness: old.Resources.MemorySwappiness,
|
||||
NetPrioIfpriomap: old.Resources.NetPrioIfpriomap,
|
||||
NetClsClassid: old.Resources.NetClsClassid,
|
||||
},
|
||||
}
|
||||
|
||||
result.Cgroups = newCgroup
|
||||
|
||||
return &result
|
||||
}
|
||||
|
||||
func readState(dockerRoot, containerID string) (preAPIState, error) {
|
||||
// pre-API libcontainer changed how its state was stored, try the old way of a "pid" file
|
||||
statePath := configPath(dockerRoot, containerID)
|
||||
if !utils.FileExists(statePath) {
|
||||
pidPath := path.Join(dockerRoot, libcontainerExecDriverPath, containerID, "pid")
|
||||
if utils.FileExists(pidPath) {
|
||||
// We don't need the old state, return an empty state and we'll gracefully degrade.
|
||||
return preAPIState{}, nil
|
||||
}
|
||||
}
|
||||
out, err := ioutil.ReadFile(statePath)
|
||||
if err != nil {
|
||||
return preAPIState{}, err
|
||||
}
|
||||
|
||||
// Parse the state.
|
||||
var state preAPIState
|
||||
err = json.Unmarshal(out, &state)
|
||||
if err != nil {
|
||||
return preAPIState{}, err
|
||||
}
|
||||
|
||||
return state, nil
|
||||
}
|
||||
|
||||
// Gets the path to the libcontainer configuration.
|
||||
func configPath(dockerRun, containerID string) string {
|
||||
const file = "state.json"
|
||||
cp := path.Join(containerdPath, containerID, file)
|
||||
if utils.FileExists(cp) {
|
||||
return cp
|
||||
}
|
||||
// Fallback to execdriver path.
|
||||
return path.Join(dockerRun, libcontainerExecDriverPath, containerID, file)
|
||||
return path.Join(dockerRun, libcontainerExecDriverPath, containerID, "state.json")
|
||||
}
|
||||
|
||||
func containerdConfigPath(dockerRun, containerID string) string {
|
||||
return path.Join(containerdPath, containerID, "state.json")
|
||||
}
|
||||
|
||||
// Gets the path to the old libcontainer configuration.
|
||||
@ -373,5 +44,7 @@ func oldConfigPath(dockerRoot, containerID string) string {
|
||||
// Gets whether the specified container exists.
|
||||
func Exists(dockerRoot, dockerRun, containerID string) bool {
|
||||
// New or old config must exist for the container to be considered alive.
|
||||
return utils.FileExists(configPath(dockerRun, containerID)) || utils.FileExists(oldConfigPath(dockerRoot, containerID))
|
||||
return utils.FileExists(containerdConfigPath(dockerRun, containerID)) ||
|
||||
utils.FileExists(configPath(dockerRun, containerID)) ||
|
||||
utils.FileExists(oldConfigPath(dockerRoot, containerID))
|
||||
}
|
||||
|
@ -1,56 +0,0 @@
|
||||
// Copyright 2015 Google Inc. All Rights Reserved.
|
||||
//
|
||||
// Licensed under the Apache License, Version 2.0 (the "License");
|
||||
// you may not use this file except in compliance with the License.
|
||||
// You may obtain a copy of the License at
|
||||
//
|
||||
// http://www.apache.org/licenses/LICENSE-2.0
|
||||
//
|
||||
// Unless required by applicable law or agreed to in writing, software
|
||||
// distributed under the License is distributed on an "AS IS" BASIS,
|
||||
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
||||
// See the License for the specific language governing permissions and
|
||||
// limitations under the License.
|
||||
|
||||
package libcontainer
|
||||
|
||||
import (
|
||||
"path/filepath"
|
||||
"testing"
|
||||
)
|
||||
|
||||
func TestReadConfig(t *testing.T) {
|
||||
var (
|
||||
testdata string = "testdata"
|
||||
containerID string = "1"
|
||||
)
|
||||
// Test with using the new config of docker v1.9.0
|
||||
dockerRoot := filepath.Join(testdata, "docker-v1.9.1")
|
||||
dockerRun := filepath.Join(testdata, "docker-v1.9.1")
|
||||
config, err := ReadConfig(dockerRoot, dockerRun, containerID)
|
||||
if err != nil {
|
||||
t.Error(err)
|
||||
}
|
||||
if config.Hostname != containerID {
|
||||
t.Errorf("Expected container hostname is %s, but got %s", containerID, config.Hostname)
|
||||
}
|
||||
|
||||
// Test with using the pre config of docker v1.8.3
|
||||
dockerRoot = filepath.Join(testdata, "docker-v1.8.3")
|
||||
dockerRun = filepath.Join(testdata, "docker-v1.8.3")
|
||||
config, err = ReadConfig(dockerRoot, dockerRun, containerID)
|
||||
if err != nil {
|
||||
t.Error(err)
|
||||
}
|
||||
if config.Hostname != containerID {
|
||||
t.Errorf("Expected container hostname is %s, but got %s", containerID, config.Hostname)
|
||||
}
|
||||
|
||||
// Test with using non-existed old config, return an error
|
||||
dockerRoot = filepath.Join(testdata, "docker-v1.8.0")
|
||||
dockerRun = filepath.Join(testdata, "docker-v1.8.0")
|
||||
config, err = ReadConfig(dockerRoot, dockerRun, containerID)
|
||||
if err == nil {
|
||||
t.Error("Expected an error, but got nil")
|
||||
}
|
||||
}
|
Loading…
Reference in New Issue
Block a user