2015-09-03 10:38:36 +00:00
|
|
|
package driver
|
|
|
|
|
|
|
|
import (
|
|
|
|
"encoding/json"
|
|
|
|
"fmt"
|
|
|
|
"log"
|
2015-11-05 18:47:41 +00:00
|
|
|
"net"
|
2015-10-15 23:40:07 +00:00
|
|
|
"path/filepath"
|
2015-09-24 02:29:53 +00:00
|
|
|
"strconv"
|
2015-09-03 10:38:36 +00:00
|
|
|
"strings"
|
|
|
|
|
2015-09-08 19:43:02 +00:00
|
|
|
docker "github.com/fsouza/go-dockerclient"
|
|
|
|
|
2015-10-15 23:40:07 +00:00
|
|
|
"github.com/hashicorp/nomad/client/allocdir"
|
2015-09-03 10:38:36 +00:00
|
|
|
"github.com/hashicorp/nomad/client/config"
|
2015-10-15 23:40:07 +00:00
|
|
|
"github.com/hashicorp/nomad/client/driver/args"
|
2015-11-17 00:05:28 +00:00
|
|
|
cstructs "github.com/hashicorp/nomad/client/driver/structs"
|
2015-11-05 21:46:02 +00:00
|
|
|
"github.com/hashicorp/nomad/client/fingerprint"
|
2015-09-03 10:38:36 +00:00
|
|
|
"github.com/hashicorp/nomad/nomad/structs"
|
2015-11-14 02:09:42 +00:00
|
|
|
"github.com/mitchellh/mapstructure"
|
2015-09-03 10:38:36 +00:00
|
|
|
)
|
|
|
|
|
|
|
|
type DockerDriver struct {
|
2015-09-10 01:06:23 +00:00
|
|
|
DriverContext
|
2015-11-05 21:46:02 +00:00
|
|
|
fingerprint.StaticFingerprinter
|
2015-09-03 10:38:36 +00:00
|
|
|
}
|
|
|
|
|
2015-11-18 09:37:42 +00:00
|
|
|
type DockerDriverAuth struct {
|
|
|
|
Username string `mapstructure:"username"` // username for the registry
|
|
|
|
Password string `mapstructure:"password"` // password to access the registry
|
|
|
|
Email string `mapstructure:"email"` // email address of the user who is allowed to access the registry
|
|
|
|
ServerAddress string `mapstructure:"server_address"` // server address of the registry
|
2015-11-16 04:25:57 +00:00
|
|
|
}
|
|
|
|
|
2015-11-14 04:22:49 +00:00
|
|
|
type DockerDriverConfig struct {
|
2015-11-18 05:41:00 +00:00
|
|
|
ImageName string `mapstructure:"image"` // Container's Image Name
|
|
|
|
Command string `mapstructure:"command"` // The Command/Entrypoint to run when the container starts up
|
2015-11-18 23:16:42 +00:00
|
|
|
Args []string `mapstructure:"args"` // The arguments to the Command/Entrypoint
|
2015-11-18 05:41:00 +00:00
|
|
|
NetworkMode string `mapstructure:"network_mode"` // The network mode of the container - host, net and none
|
|
|
|
PortMap []map[string]int `mapstructure:"port_map"` // A map of host port labels and the ports exposed on the container
|
|
|
|
Privileged bool `mapstructure:"privileged"` // Flag to run the container in priviledged mode
|
|
|
|
DNSServers []string `mapstructure:"dns_servers"` // DNS Server for containers
|
|
|
|
DNSSearchDomains []string `mapstructure:"dns_search_domains"` // DNS Search domains for containers
|
|
|
|
Hostname string `mapstructure:"hostname"` // Hostname for containers
|
|
|
|
Labels []map[string]string `mapstructure:"labels"` // Labels to set when the container starts up
|
2015-11-18 18:31:06 +00:00
|
|
|
Auth []DockerDriverAuth `mapstructure:"auth"` // Authentication credentials for a private Docker registry
|
2015-11-14 02:09:42 +00:00
|
|
|
}
|
|
|
|
|
2015-11-14 04:22:49 +00:00
|
|
|
func (c *DockerDriverConfig) Validate() error {
|
2015-11-14 02:09:42 +00:00
|
|
|
if c.ImageName == "" {
|
|
|
|
return fmt.Errorf("Docker Driver needs an image name")
|
|
|
|
}
|
2015-11-15 10:58:46 +00:00
|
|
|
|
|
|
|
if len(c.PortMap) > 1 {
|
|
|
|
return fmt.Errorf("Only one port_map block is allowed in the docker driver config")
|
|
|
|
}
|
2015-11-17 13:12:49 +00:00
|
|
|
|
|
|
|
if len(c.Labels) > 1 {
|
|
|
|
return fmt.Errorf("Only one labels block is allowed in the docker driver config")
|
|
|
|
}
|
2015-11-14 02:09:42 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-09-03 10:38:36 +00:00
|
|
|
type dockerPID struct {
|
2015-09-04 04:00:16 +00:00
|
|
|
ImageID string
|
|
|
|
ContainerID string
|
2015-09-03 10:38:36 +00:00
|
|
|
}
|
|
|
|
|
2015-11-19 22:20:41 +00:00
|
|
|
type DockerHandle struct {
|
2015-09-27 20:59:38 +00:00
|
|
|
client *docker.Client
|
|
|
|
logger *log.Logger
|
|
|
|
cleanupContainer bool
|
|
|
|
cleanupImage bool
|
|
|
|
imageID string
|
|
|
|
containerID string
|
2015-11-14 06:07:13 +00:00
|
|
|
waitCh chan *cstructs.WaitResult
|
2015-09-27 20:59:38 +00:00
|
|
|
doneCh chan struct{}
|
2015-09-03 10:38:36 +00:00
|
|
|
}
|
|
|
|
|
2015-09-10 01:06:23 +00:00
|
|
|
func NewDockerDriver(ctx *DriverContext) Driver {
|
2015-11-05 21:46:02 +00:00
|
|
|
return &DockerDriver{DriverContext: *ctx}
|
2015-09-03 10:38:36 +00:00
|
|
|
}
|
|
|
|
|
2015-10-07 00:53:05 +00:00
|
|
|
// dockerClient creates *docker.Client. In test / dev mode we can use ENV vars
|
|
|
|
// to connect to the docker daemon. In production mode we will read
|
|
|
|
// docker.endpoint from the config file.
|
2015-10-06 23:26:31 +00:00
|
|
|
func (d *DockerDriver) dockerClient() (*docker.Client, error) {
|
2015-11-10 23:54:31 +00:00
|
|
|
// Default to using whatever is configured in docker.endpoint. If this is
|
|
|
|
// not specified we'll fall back on NewClientFromEnv which reads config from
|
|
|
|
// the DOCKER_* environment variables DOCKER_HOST, DOCKER_TLS_VERIFY, and
|
|
|
|
// DOCKER_CERT_PATH. This allows us to lock down the config in production
|
|
|
|
// but also accept the standard ENV configs for dev and test.
|
|
|
|
dockerEndpoint := d.config.Read("docker.endpoint")
|
|
|
|
if dockerEndpoint != "" {
|
|
|
|
return docker.NewClient(dockerEndpoint)
|
2015-10-07 00:53:05 +00:00
|
|
|
}
|
|
|
|
|
2015-11-10 23:54:31 +00:00
|
|
|
return docker.NewClientFromEnv()
|
2015-10-06 23:26:31 +00:00
|
|
|
}
|
|
|
|
|
2015-09-03 10:38:36 +00:00
|
|
|
func (d *DockerDriver) Fingerprint(cfg *config.Config, node *structs.Node) (bool, error) {
|
2015-09-26 06:13:40 +00:00
|
|
|
// Initialize docker API client
|
2015-09-28 23:54:32 +00:00
|
|
|
client, err := d.dockerClient()
|
2015-09-03 10:38:36 +00:00
|
|
|
if err != nil {
|
2015-11-18 05:17:51 +00:00
|
|
|
d.logger.Printf("[INFO] driver.docker: failed to initialize client: %s", err)
|
2015-09-03 10:38:36 +00:00
|
|
|
return false, nil
|
|
|
|
}
|
|
|
|
|
2015-11-18 00:58:23 +00:00
|
|
|
privileged := d.config.ReadBoolDefault("docker.privileged.enabled", false)
|
|
|
|
if privileged {
|
2015-11-18 00:49:01 +00:00
|
|
|
d.logger.Println("[INFO] driver.docker: privileged containers are enabled")
|
2015-11-06 00:40:20 +00:00
|
|
|
node.Attributes["docker.privileged.enabled"] = "1"
|
2015-11-17 03:55:49 +00:00
|
|
|
} else {
|
2015-11-18 00:49:01 +00:00
|
|
|
d.logger.Println("[INFO] driver.docker: privileged containers are disabled")
|
2015-09-27 01:53:15 +00:00
|
|
|
}
|
|
|
|
|
2015-11-11 00:18:52 +00:00
|
|
|
// This is the first operation taken on the client so we'll try to
|
|
|
|
// establish a connection to the Docker daemon. If this fails it means
|
|
|
|
// Docker isn't available so we'll simply disable the docker driver.
|
2015-09-26 06:13:40 +00:00
|
|
|
env, err := client.Version()
|
2015-09-26 06:55:01 +00:00
|
|
|
if err != nil {
|
2015-11-18 05:17:51 +00:00
|
|
|
d.logger.Printf("[INFO] driver.docker: could not connect to docker daemon at %s: %s", client.Endpoint(), err)
|
2015-11-11 00:18:52 +00:00
|
|
|
return false, nil
|
2015-09-26 06:13:40 +00:00
|
|
|
}
|
2015-10-12 20:15:37 +00:00
|
|
|
node.Attributes["driver.docker"] = "1"
|
2015-09-26 06:55:01 +00:00
|
|
|
node.Attributes["driver.docker.version"] = env.Get("Version")
|
2015-09-03 10:38:36 +00:00
|
|
|
|
|
|
|
return true, nil
|
|
|
|
}
|
|
|
|
|
2015-10-16 00:47:14 +00:00
|
|
|
func (d *DockerDriver) containerBinds(alloc *allocdir.AllocDir, task *structs.Task) ([]string, error) {
|
2015-10-15 23:40:07 +00:00
|
|
|
shared := alloc.SharedDir
|
|
|
|
local, ok := alloc.TaskDirs[task.Name]
|
|
|
|
if !ok {
|
|
|
|
return nil, fmt.Errorf("Failed to find task local directory: %v", task.Name)
|
|
|
|
}
|
|
|
|
|
|
|
|
return []string{
|
2015-11-03 14:40:24 +00:00
|
|
|
// "z" and "Z" option is to allocate directory with SELinux label.
|
|
|
|
fmt.Sprintf("%s:/%s:rw,z", shared, allocdir.SharedAllocName),
|
|
|
|
// capital "Z" will label with Multi-Category Security (MCS) labels
|
|
|
|
fmt.Sprintf("%s:/%s:rw,Z", local, allocdir.TaskLocal),
|
2015-10-15 23:40:07 +00:00
|
|
|
}, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// createContainer initializes a struct needed to call docker.client.CreateContainer()
|
2015-11-14 04:22:49 +00:00
|
|
|
func (d *DockerDriver) createContainer(ctx *ExecContext, task *structs.Task, driverConfig *DockerDriverConfig) (docker.CreateContainerOptions, error) {
|
2015-10-15 23:40:07 +00:00
|
|
|
var c docker.CreateContainerOptions
|
|
|
|
if task.Resources == nil {
|
2015-11-17 03:55:49 +00:00
|
|
|
// Guard against missing resources. We should never have been able to
|
|
|
|
// schedule a job without specifying this.
|
2015-11-18 00:49:01 +00:00
|
|
|
d.logger.Println("[ERR] driver.docker: task.Resources is empty")
|
2015-11-17 03:55:49 +00:00
|
|
|
return c, fmt.Errorf("task.Resources is empty")
|
2015-10-15 23:40:07 +00:00
|
|
|
}
|
|
|
|
|
2015-10-16 00:47:14 +00:00
|
|
|
binds, err := d.containerBinds(ctx.AllocDir, task)
|
2015-10-15 23:40:07 +00:00
|
|
|
if err != nil {
|
|
|
|
return c, err
|
|
|
|
}
|
|
|
|
|
2015-11-13 01:23:04 +00:00
|
|
|
// Create environment variables.
|
|
|
|
env := TaskEnvironmentVariables(ctx, task)
|
|
|
|
env.SetAllocDir(filepath.Join("/", allocdir.SharedAllocName))
|
|
|
|
env.SetTaskLocalDir(filepath.Join("/", allocdir.TaskLocal))
|
|
|
|
|
|
|
|
config := &docker.Config{
|
2015-11-17 06:44:44 +00:00
|
|
|
Image: driverConfig.ImageName,
|
|
|
|
Hostname: driverConfig.Hostname,
|
2015-11-13 01:23:04 +00:00
|
|
|
}
|
|
|
|
|
2015-10-15 23:40:07 +00:00
|
|
|
hostConfig := &docker.HostConfig{
|
2015-09-09 08:08:31 +00:00
|
|
|
// Convert MB to bytes. This is an absolute value.
|
|
|
|
//
|
|
|
|
// This value represents the total amount of memory a process can use.
|
|
|
|
// Swap is added to total memory and is managed by the OS, not docker.
|
|
|
|
// Since this may cause other processes to swap and cause system
|
|
|
|
// instability, we will simply not use swap.
|
|
|
|
//
|
|
|
|
// See: https://www.kernel.org/doc/Documentation/cgroups/memory.txt
|
|
|
|
Memory: int64(task.Resources.MemoryMB) * 1024 * 1024,
|
|
|
|
MemorySwap: -1,
|
|
|
|
// Convert Mhz to shares. This is a relative value.
|
|
|
|
//
|
|
|
|
// There are two types of CPU limiters available: Shares and Quotas. A
|
|
|
|
// Share allows a particular process to have a proportion of CPU time
|
|
|
|
// relative to other processes; 1024 by default. A CPU Quota is enforced
|
|
|
|
// over a Period of time and is a HARD limit on the amount of CPU time a
|
|
|
|
// process can use. Processes with quotas cannot burst, while processes
|
|
|
|
// with shares can, so we'll use shares.
|
|
|
|
//
|
|
|
|
// The simplest scale is 1 share to 1 MHz so 1024 = 1GHz. This means any
|
|
|
|
// given process will have at least that amount of resources, but likely
|
|
|
|
// more since it is (probably) rare that the machine will run at 100%
|
|
|
|
// CPU. This scale will cease to work if a node is overprovisioned.
|
|
|
|
//
|
|
|
|
// See:
|
|
|
|
// - https://www.kernel.org/doc/Documentation/scheduler/sched-bwc.txt
|
|
|
|
// - https://www.kernel.org/doc/Documentation/scheduler/sched-design-CFS.txt
|
|
|
|
CPUShares: int64(task.Resources.CPU),
|
2015-09-26 01:22:10 +00:00
|
|
|
|
2015-10-15 23:40:07 +00:00
|
|
|
// Binds are used to mount a host volume into the container. We mount a
|
|
|
|
// local directory for storage and a shared alloc directory that can be
|
|
|
|
// used to share data between different tasks in the same task group.
|
|
|
|
Binds: binds,
|
2015-09-26 01:22:10 +00:00
|
|
|
}
|
|
|
|
|
2015-11-18 05:17:51 +00:00
|
|
|
d.logger.Printf("[DEBUG] driver.docker: using %d bytes memory for %s", hostConfig.Memory, task.Config["image"])
|
|
|
|
d.logger.Printf("[DEBUG] driver.docker: using %d cpu shares for %s", hostConfig.CPUShares, task.Config["image"])
|
|
|
|
d.logger.Printf("[DEBUG] driver.docker: binding directories %#v for %s", hostConfig.Binds, task.Config["image"])
|
2015-09-09 08:08:31 +00:00
|
|
|
|
2015-11-06 00:40:20 +00:00
|
|
|
// set privileged mode
|
2015-11-17 03:55:49 +00:00
|
|
|
hostPrivileged := d.config.ReadBoolDefault("docker.privileged.enabled", false)
|
|
|
|
if driverConfig.Privileged && !hostPrivileged {
|
2015-11-18 04:50:14 +00:00
|
|
|
return c, fmt.Errorf(`Docker privileged mode is disabled on this Nomad agent`)
|
2015-11-06 00:40:20 +00:00
|
|
|
}
|
2015-11-17 03:55:49 +00:00
|
|
|
hostConfig.Privileged = hostPrivileged
|
2015-11-05 18:47:41 +00:00
|
|
|
|
|
|
|
// set DNS servers
|
2015-11-18 05:41:00 +00:00
|
|
|
for _, ip := range driverConfig.DNSServers {
|
|
|
|
if net.ParseIP(ip) != nil {
|
|
|
|
hostConfig.DNS = append(hostConfig.DNS, ip)
|
|
|
|
} else {
|
2015-11-18 05:43:04 +00:00
|
|
|
d.logger.Printf("[ERR] driver.docker: invalid ip address for container dns server: %s", ip)
|
2015-11-05 18:47:41 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// set DNS search domains
|
2015-11-18 05:41:00 +00:00
|
|
|
for _, domain := range driverConfig.DNSSearchDomains {
|
|
|
|
hostConfig.DNSSearch = append(hostConfig.DNSSearch, domain)
|
2015-11-05 18:47:41 +00:00
|
|
|
}
|
|
|
|
|
2015-11-17 22:27:58 +00:00
|
|
|
hostConfig.NetworkMode = driverConfig.NetworkMode
|
2015-11-17 22:25:10 +00:00
|
|
|
if hostConfig.NetworkMode == "" {
|
2015-10-02 17:54:04 +00:00
|
|
|
// docker default
|
2015-11-18 04:04:10 +00:00
|
|
|
d.logger.Println("[DEBUG] driver.docker: networking mode not specified; defaulting to bridge")
|
2015-11-17 22:25:10 +00:00
|
|
|
hostConfig.NetworkMode = "bridge"
|
2015-10-02 17:54:04 +00:00
|
|
|
}
|
|
|
|
|
2015-11-13 01:23:04 +00:00
|
|
|
// Setup port mapping and exposed ports
|
2015-09-24 01:01:08 +00:00
|
|
|
if len(task.Resources.Networks) == 0 {
|
2015-11-18 00:49:01 +00:00
|
|
|
d.logger.Println("[DEBUG] driver.docker: No network interfaces are available")
|
2015-11-18 03:21:36 +00:00
|
|
|
if len(driverConfig.PortMap) == 1 && len(driverConfig.PortMap[0]) > 0 {
|
2015-11-17 22:51:38 +00:00
|
|
|
return c, fmt.Errorf("Trying to map ports but no network interface is available")
|
2015-11-17 03:55:49 +00:00
|
|
|
}
|
2015-09-24 01:01:08 +00:00
|
|
|
} else {
|
2015-11-13 01:23:04 +00:00
|
|
|
// TODO add support for more than one network
|
2015-09-24 01:01:08 +00:00
|
|
|
network := task.Resources.Networks[0]
|
2015-11-13 01:23:04 +00:00
|
|
|
publishedPorts := map[docker.Port][]docker.PortBinding{}
|
|
|
|
exposedPorts := map[docker.Port]struct{}{}
|
2015-09-24 01:01:08 +00:00
|
|
|
|
2015-11-14 02:09:42 +00:00
|
|
|
for _, port := range network.ReservedPorts {
|
2015-11-20 03:08:21 +00:00
|
|
|
// By default we will map the allocated port 1:1 to the container
|
|
|
|
containerPortInt := port.Value
|
|
|
|
|
|
|
|
// If the user has mapped a port using port_map we'll change it here
|
|
|
|
if len(driverConfig.PortMap) == 1 {
|
|
|
|
mapped, ok := driverConfig.PortMap[0][port.Label]
|
|
|
|
if ok {
|
|
|
|
containerPortInt = mapped
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-11-18 00:31:47 +00:00
|
|
|
hostPortStr := strconv.Itoa(port.Value)
|
2015-11-20 03:08:21 +00:00
|
|
|
containerPort := docker.Port(strconv.Itoa(containerPortInt))
|
2015-11-17 03:55:49 +00:00
|
|
|
|
2015-11-18 05:34:07 +00:00
|
|
|
publishedPorts[containerPort+"/tcp"] = []docker.PortBinding{docker.PortBinding{HostIP: network.IP, HostPort: hostPortStr}}
|
|
|
|
publishedPorts[containerPort+"/udp"] = []docker.PortBinding{docker.PortBinding{HostIP: network.IP, HostPort: hostPortStr}}
|
2015-11-18 05:17:51 +00:00
|
|
|
d.logger.Printf("[DEBUG] driver.docker: allocated port %s:%d -> %d (static)", network.IP, port.Value, port.Value)
|
2015-11-17 03:55:49 +00:00
|
|
|
|
2015-11-18 05:34:07 +00:00
|
|
|
exposedPorts[containerPort+"/tcp"] = struct{}{}
|
|
|
|
exposedPorts[containerPort+"/udp"] = struct{}{}
|
2015-11-18 05:17:51 +00:00
|
|
|
d.logger.Printf("[DEBUG] driver.docker: exposed port %d", port.Value)
|
2015-09-24 06:45:34 +00:00
|
|
|
}
|
|
|
|
|
2015-11-14 02:09:42 +00:00
|
|
|
for _, port := range network.DynamicPorts {
|
2015-11-18 03:21:36 +00:00
|
|
|
// By default we will map the allocated port 1:1 to the container
|
2015-11-18 05:34:07 +00:00
|
|
|
containerPortInt := port.Value
|
2015-11-18 03:21:36 +00:00
|
|
|
|
|
|
|
// If the user has mapped a port using port_map we'll change it here
|
|
|
|
if len(driverConfig.PortMap) == 1 {
|
|
|
|
mapped, ok := driverConfig.PortMap[0][port.Label]
|
|
|
|
if ok {
|
2015-11-18 05:34:07 +00:00
|
|
|
containerPortInt = mapped
|
2015-11-18 03:21:36 +00:00
|
|
|
}
|
2015-09-24 01:01:08 +00:00
|
|
|
}
|
2015-11-17 03:55:49 +00:00
|
|
|
|
|
|
|
hostPortStr := strconv.Itoa(port.Value)
|
2015-11-19 18:15:25 +00:00
|
|
|
containerPort := docker.Port(strconv.Itoa(containerPortInt))
|
2015-11-17 03:55:49 +00:00
|
|
|
|
2015-11-18 05:34:07 +00:00
|
|
|
publishedPorts[containerPort+"/tcp"] = []docker.PortBinding{docker.PortBinding{HostIP: network.IP, HostPort: hostPortStr}}
|
|
|
|
publishedPorts[containerPort+"/udp"] = []docker.PortBinding{docker.PortBinding{HostIP: network.IP, HostPort: hostPortStr}}
|
|
|
|
d.logger.Printf("[DEBUG] driver.docker: allocated port %s:%d -> %d (mapped)", network.IP, port.Value, containerPortInt)
|
2015-11-17 03:55:49 +00:00
|
|
|
|
2015-11-18 05:34:07 +00:00
|
|
|
exposedPorts[containerPort+"/tcp"] = struct{}{}
|
|
|
|
exposedPorts[containerPort+"/udp"] = struct{}{}
|
2015-11-20 03:08:21 +00:00
|
|
|
d.logger.Printf("[DEBUG] driver.docker: exposed port %s", containerPort)
|
2015-09-24 01:01:08 +00:00
|
|
|
}
|
|
|
|
|
2015-11-20 03:08:21 +00:00
|
|
|
// This was set above in a call to TaskEnvironmentVariables but if we
|
|
|
|
// have mapped any ports we will need to override them.
|
|
|
|
//
|
|
|
|
// TODO refactor the implementation in TaskEnvironmentVariables to match
|
|
|
|
// the 0.2 ports world view. Docker seems to be the only place where
|
|
|
|
// this is actually needed, but this is kinda hacky.
|
|
|
|
if len(driverConfig.PortMap) == 1 {
|
|
|
|
env.SetPorts(network.MapLabelToValues(driverConfig.PortMap[0]))
|
|
|
|
}
|
2015-11-13 01:23:04 +00:00
|
|
|
hostConfig.PortBindings = publishedPorts
|
|
|
|
config.ExposedPorts = exposedPorts
|
2015-09-26 01:22:10 +00:00
|
|
|
}
|
|
|
|
|
2015-11-18 23:16:42 +00:00
|
|
|
parsedArgs := args.ParseAndReplace(driverConfig.Args, env.Map())
|
2015-10-15 23:40:07 +00:00
|
|
|
|
2015-11-13 01:23:04 +00:00
|
|
|
// If the user specified a custom command to run as their entrypoint, we'll
|
|
|
|
// inject it here.
|
2015-11-17 03:29:06 +00:00
|
|
|
if driverConfig.Command != "" {
|
|
|
|
cmd := []string{driverConfig.Command}
|
2015-11-18 23:16:42 +00:00
|
|
|
if len(driverConfig.Args) != 0 {
|
2015-10-15 23:40:07 +00:00
|
|
|
cmd = append(cmd, parsedArgs...)
|
|
|
|
}
|
2015-11-18 05:17:51 +00:00
|
|
|
d.logger.Printf("[DEBUG] driver.docker: setting container startup command to: %s", strings.Join(cmd, " "))
|
2015-10-15 23:40:07 +00:00
|
|
|
config.Cmd = cmd
|
2015-11-18 23:16:42 +00:00
|
|
|
} else if len(driverConfig.Args) != 0 {
|
2015-11-17 03:55:49 +00:00
|
|
|
d.logger.Println("[DEBUG] driver.docker: ignoring command arguments because command is not specified")
|
2015-09-26 01:22:10 +00:00
|
|
|
}
|
|
|
|
|
2015-11-17 13:12:49 +00:00
|
|
|
if len(driverConfig.Labels) == 1 {
|
|
|
|
config.Labels = driverConfig.Labels[0]
|
2015-11-18 05:17:51 +00:00
|
|
|
d.logger.Printf("[DEBUG] driver.docker: applied labels on the container: %+v", config.Labels)
|
2015-11-17 13:12:49 +00:00
|
|
|
}
|
|
|
|
|
2015-11-14 02:09:42 +00:00
|
|
|
config.Env = env.List()
|
2015-11-18 04:04:10 +00:00
|
|
|
|
|
|
|
containerName := fmt.Sprintf("%s-%s", task.Name, ctx.AllocID)
|
2015-11-18 05:17:51 +00:00
|
|
|
d.logger.Printf("[DEBUG] driver.docker: setting container name to: %s", containerName)
|
2015-11-18 04:04:10 +00:00
|
|
|
|
2015-09-09 08:08:31 +00:00
|
|
|
return docker.CreateContainerOptions{
|
2015-11-18 04:04:10 +00:00
|
|
|
Name: containerName,
|
2015-09-26 01:22:10 +00:00
|
|
|
Config: config,
|
2015-09-24 06:57:04 +00:00
|
|
|
HostConfig: hostConfig,
|
2015-10-13 06:57:16 +00:00
|
|
|
}, nil
|
2015-09-09 08:08:31 +00:00
|
|
|
}
|
|
|
|
|
2015-09-03 10:38:36 +00:00
|
|
|
func (d *DockerDriver) Start(ctx *ExecContext, task *structs.Task) (DriverHandle, error) {
|
2015-11-14 04:22:49 +00:00
|
|
|
var driverConfig DockerDriverConfig
|
2015-11-14 02:09:42 +00:00
|
|
|
if err := mapstructure.WeakDecode(task.Config, &driverConfig); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
image := driverConfig.ImageName
|
|
|
|
|
|
|
|
if err := driverConfig.Validate(); err != nil {
|
|
|
|
return nil, err
|
2015-09-03 10:38:36 +00:00
|
|
|
}
|
2015-09-09 08:08:31 +00:00
|
|
|
if task.Resources == nil {
|
|
|
|
return nil, fmt.Errorf("Resources are not specified")
|
|
|
|
}
|
2015-09-09 20:35:10 +00:00
|
|
|
if task.Resources.MemoryMB == 0 {
|
|
|
|
return nil, fmt.Errorf("Memory limit cannot be zero")
|
|
|
|
}
|
|
|
|
if task.Resources.CPU == 0 {
|
2015-09-10 18:35:03 +00:00
|
|
|
return nil, fmt.Errorf("CPU limit cannot be zero")
|
2015-09-09 20:35:10 +00:00
|
|
|
}
|
2015-09-09 08:08:31 +00:00
|
|
|
|
2015-11-18 00:58:23 +00:00
|
|
|
cleanupContainer := d.config.ReadBoolDefault("docker.cleanup.container", true)
|
|
|
|
cleanupImage := d.config.ReadBoolDefault("docker.cleanup.image", true)
|
2015-09-27 20:59:38 +00:00
|
|
|
|
2015-09-09 08:08:31 +00:00
|
|
|
// Initialize docker API client
|
2015-09-28 23:54:32 +00:00
|
|
|
client, err := d.dockerClient()
|
2015-09-09 08:08:31 +00:00
|
|
|
if err != nil {
|
2015-10-07 02:09:59 +00:00
|
|
|
return nil, fmt.Errorf("Failed to connect to docker daemon: %s", err)
|
2015-09-09 08:08:31 +00:00
|
|
|
}
|
2015-09-03 10:38:36 +00:00
|
|
|
|
2015-09-26 01:22:10 +00:00
|
|
|
repo, tag := docker.ParseRepositoryTag(image)
|
|
|
|
// Make sure tag is always explicitly set. We'll default to "latest" if it
|
|
|
|
// isn't, which is the expected behavior.
|
|
|
|
if tag == "" {
|
|
|
|
tag = "latest"
|
|
|
|
}
|
|
|
|
|
|
|
|
var dockerImage *docker.Image
|
|
|
|
// We're going to check whether the image is already downloaded. If the tag
|
2015-09-26 06:28:23 +00:00
|
|
|
// is "latest" we have to check for a new version every time so we don't
|
|
|
|
// bother to check and cache the id here. We'll download first, then cache.
|
2015-09-26 01:22:10 +00:00
|
|
|
if tag != "latest" {
|
|
|
|
dockerImage, err = client.InspectImage(image)
|
2015-09-03 10:38:36 +00:00
|
|
|
}
|
|
|
|
|
2015-09-26 01:22:10 +00:00
|
|
|
// Download the image
|
|
|
|
if dockerImage == nil {
|
|
|
|
pullOptions := docker.PullImageOptions{
|
|
|
|
Repository: repo,
|
|
|
|
Tag: tag,
|
|
|
|
}
|
2015-11-05 18:47:41 +00:00
|
|
|
|
2015-11-18 09:37:42 +00:00
|
|
|
authOptions := docker.AuthConfiguration{}
|
|
|
|
if len(driverConfig.Auth) != 0 {
|
|
|
|
authOptions = docker.AuthConfiguration{
|
|
|
|
Username: driverConfig.Auth[0].Username,
|
|
|
|
Password: driverConfig.Auth[0].Password,
|
|
|
|
Email: driverConfig.Auth[0].Email,
|
|
|
|
ServerAddress: driverConfig.Auth[0].ServerAddress,
|
|
|
|
}
|
2015-11-05 18:47:41 +00:00
|
|
|
}
|
|
|
|
|
2015-09-26 01:22:10 +00:00
|
|
|
err = client.PullImage(pullOptions, authOptions)
|
|
|
|
if err != nil {
|
2015-11-18 05:17:51 +00:00
|
|
|
d.logger.Printf("[ERR] driver.docker: failed pulling container %s:%s: %s", repo, tag, err)
|
2015-09-26 01:22:10 +00:00
|
|
|
return nil, fmt.Errorf("Failed to pull `%s`: %s", image, err)
|
|
|
|
}
|
2015-11-18 05:17:51 +00:00
|
|
|
d.logger.Printf("[DEBUG] driver.docker: docker pull %s:%s succeeded", repo, tag)
|
2015-09-26 01:22:10 +00:00
|
|
|
|
|
|
|
// Now that we have the image we can get the image id
|
|
|
|
dockerImage, err = client.InspectImage(image)
|
|
|
|
if err != nil {
|
2015-11-18 05:17:51 +00:00
|
|
|
d.logger.Printf("[ERR] driver.docker: failed getting image id for %s: %s", image, err)
|
2015-09-26 01:22:10 +00:00
|
|
|
return nil, fmt.Errorf("Failed to determine image id for `%s`: %s", image, err)
|
|
|
|
}
|
2015-09-03 10:38:36 +00:00
|
|
|
}
|
2015-11-18 05:17:51 +00:00
|
|
|
d.logger.Printf("[DEBUG] driver.docker: identified image %s as %s", image, dockerImage.ID)
|
2015-09-03 10:38:36 +00:00
|
|
|
|
2015-11-14 02:09:42 +00:00
|
|
|
config, err := d.createContainer(ctx, task, &driverConfig)
|
2015-10-13 23:21:16 +00:00
|
|
|
if err != nil {
|
2015-11-18 05:17:51 +00:00
|
|
|
d.logger.Printf("[ERR] driver.docker: failed to create container configuration for image %s: %s", image, err)
|
2015-11-17 23:17:44 +00:00
|
|
|
return nil, fmt.Errorf("Failed to create container configuration for image %s: %s", image, err)
|
2015-10-13 23:21:16 +00:00
|
|
|
}
|
2015-09-03 10:38:36 +00:00
|
|
|
// Create a container
|
2015-10-13 06:57:16 +00:00
|
|
|
container, err := client.CreateContainer(config)
|
2015-09-03 10:38:36 +00:00
|
|
|
if err != nil {
|
2015-11-18 04:50:14 +00:00
|
|
|
// If the container already exists because of a previous failure we'll
|
|
|
|
// try to purge it and re-create it.
|
2015-11-18 05:36:23 +00:00
|
|
|
if strings.Contains(err.Error(), "container already exists") {
|
2015-11-18 04:50:14 +00:00
|
|
|
// Get the ID of the existing container so we can delete it
|
|
|
|
containers, err := client.ListContainers(docker.ListContainersOptions{
|
|
|
|
// The image might be in use by a stopped container, so check everything
|
|
|
|
All: true,
|
|
|
|
Filters: map[string][]string{
|
|
|
|
"name": []string{config.Name},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
if err != nil {
|
2015-11-18 05:17:51 +00:00
|
|
|
log.Printf("[ERR] driver.docker: failed to query list of containers matching name:%s", config.Name)
|
2015-11-18 04:50:14 +00:00
|
|
|
return nil, fmt.Errorf("Failed to query list of containers: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if len(containers) != 1 {
|
2015-11-18 05:17:51 +00:00
|
|
|
log.Printf("[ERR] driver.docker: failed to get id for container %s", config.Name)
|
2015-11-18 23:16:42 +00:00
|
|
|
return nil, fmt.Errorf("Failed to get id for container %s", config.Name)
|
2015-11-18 04:50:14 +00:00
|
|
|
}
|
|
|
|
|
2015-11-18 05:17:51 +00:00
|
|
|
log.Printf("[INFO] driver.docker: a container with the name %s already exists; will attempt to purge and re-create", config.Name)
|
2015-11-18 04:50:14 +00:00
|
|
|
err = client.RemoveContainer(docker.RemoveContainerOptions{
|
|
|
|
ID: containers[0].ID,
|
|
|
|
})
|
|
|
|
if err != nil {
|
2015-11-18 05:17:51 +00:00
|
|
|
log.Printf("[ERR] driver.docker: failed to purge container %s", config.Name)
|
2015-11-18 04:50:14 +00:00
|
|
|
return nil, fmt.Errorf("Failed to purge container %s: %s", config.Name, err)
|
|
|
|
}
|
2015-11-18 05:17:51 +00:00
|
|
|
log.Printf("[INFO] driver.docker: purged container %s", config.Name)
|
2015-11-18 04:50:14 +00:00
|
|
|
container, err = client.CreateContainer(config)
|
|
|
|
if err != nil {
|
2015-11-18 05:17:51 +00:00
|
|
|
log.Printf("[ERR] driver.docker: failed to re-create container %s; aborting", config.Name)
|
2015-11-18 04:50:14 +00:00
|
|
|
return nil, fmt.Errorf("Failed to re-create container %s; aborting", config.Name)
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
// We failed to create the container for some other reason.
|
2015-11-18 05:17:51 +00:00
|
|
|
d.logger.Printf("[ERR] driver.docker: failed to create container from image %s: %s", image, err)
|
2015-11-18 04:50:14 +00:00
|
|
|
return nil, fmt.Errorf("Failed to create container from image %s: %s", image, err)
|
|
|
|
}
|
2015-09-03 10:38:36 +00:00
|
|
|
}
|
2015-11-18 05:17:51 +00:00
|
|
|
d.logger.Printf("[INFO] driver.docker: created container %s", container.ID)
|
2015-09-08 19:43:02 +00:00
|
|
|
|
2015-09-09 08:08:31 +00:00
|
|
|
// Start the container
|
2015-10-02 17:43:37 +00:00
|
|
|
err = client.StartContainer(container.ID, container.HostConfig)
|
2015-09-03 10:38:36 +00:00
|
|
|
if err != nil {
|
2015-11-18 05:17:51 +00:00
|
|
|
d.logger.Printf("[ERR] driver.docker: failed to start container %s: %s", container.ID, err)
|
2015-11-18 03:21:36 +00:00
|
|
|
return nil, fmt.Errorf("Failed to start container %s: %s", container.ID, err)
|
2015-09-03 10:38:36 +00:00
|
|
|
}
|
2015-11-18 05:17:51 +00:00
|
|
|
d.logger.Printf("[INFO] driver.docker: started container %s", container.ID)
|
2015-09-03 10:38:36 +00:00
|
|
|
|
|
|
|
// Return a driver handle
|
2015-11-19 22:20:41 +00:00
|
|
|
h := &DockerHandle{
|
2015-09-27 20:59:38 +00:00
|
|
|
client: client,
|
|
|
|
cleanupContainer: cleanupContainer,
|
|
|
|
cleanupImage: cleanupImage,
|
|
|
|
logger: d.logger,
|
|
|
|
imageID: dockerImage.ID,
|
|
|
|
containerID: container.ID,
|
|
|
|
doneCh: make(chan struct{}),
|
2015-11-14 06:07:13 +00:00
|
|
|
waitCh: make(chan *cstructs.WaitResult, 1),
|
2015-09-03 10:38:36 +00:00
|
|
|
}
|
2015-09-04 04:00:16 +00:00
|
|
|
go h.run()
|
2015-09-03 10:38:36 +00:00
|
|
|
return h, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
func (d *DockerDriver) Open(ctx *ExecContext, handleID string) (DriverHandle, error) {
|
2015-11-18 00:58:23 +00:00
|
|
|
cleanupContainer := d.config.ReadBoolDefault("docker.cleanup.container", true)
|
|
|
|
cleanupImage := d.config.ReadBoolDefault("docker.cleanup.image", true)
|
2015-09-27 20:59:38 +00:00
|
|
|
|
2015-09-03 10:38:36 +00:00
|
|
|
// Split the handle
|
2015-09-04 04:00:16 +00:00
|
|
|
pidBytes := []byte(strings.TrimPrefix(handleID, "DOCKER:"))
|
2015-09-03 10:38:36 +00:00
|
|
|
pid := &dockerPID{}
|
2015-11-18 01:12:45 +00:00
|
|
|
if err := json.Unmarshal(pidBytes, pid); err != nil {
|
2015-09-03 10:38:36 +00:00
|
|
|
return nil, fmt.Errorf("Failed to parse handle '%s': %v", handleID, err)
|
|
|
|
}
|
2015-11-18 05:17:51 +00:00
|
|
|
d.logger.Printf("[INFO] driver.docker: re-attaching to docker process: %s", handleID)
|
2015-09-03 10:38:36 +00:00
|
|
|
|
2015-09-26 03:01:03 +00:00
|
|
|
// Initialize docker API client
|
2015-09-28 23:54:32 +00:00
|
|
|
client, err := d.dockerClient()
|
2015-09-26 03:01:03 +00:00
|
|
|
if err != nil {
|
2015-10-07 02:09:59 +00:00
|
|
|
return nil, fmt.Errorf("Failed to connect to docker daemon: %s", err)
|
2015-09-26 03:01:03 +00:00
|
|
|
}
|
|
|
|
|
2015-09-03 10:38:36 +00:00
|
|
|
// Look for a running container with this ID
|
2015-09-26 06:13:40 +00:00
|
|
|
containers, err := client.ListContainers(docker.ListContainersOptions{
|
|
|
|
Filters: map[string][]string{
|
|
|
|
"id": []string{pid.ContainerID},
|
|
|
|
},
|
|
|
|
})
|
2015-09-04 04:00:16 +00:00
|
|
|
if err != nil {
|
2015-09-26 06:13:40 +00:00
|
|
|
return nil, fmt.Errorf("Failed to query for container %s: %v", pid.ContainerID, err)
|
|
|
|
}
|
|
|
|
|
|
|
|
found := false
|
|
|
|
for _, container := range containers {
|
|
|
|
if container.ID == pid.ContainerID {
|
|
|
|
found = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if !found {
|
2015-09-04 04:00:16 +00:00
|
|
|
return nil, fmt.Errorf("Failed to find container %s: %v", pid.ContainerID, err)
|
2015-09-03 10:38:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Return a driver handle
|
2015-11-19 22:20:41 +00:00
|
|
|
h := &DockerHandle{
|
2015-09-27 20:59:38 +00:00
|
|
|
client: client,
|
|
|
|
cleanupContainer: cleanupContainer,
|
|
|
|
cleanupImage: cleanupImage,
|
|
|
|
logger: d.logger,
|
|
|
|
imageID: pid.ImageID,
|
|
|
|
containerID: pid.ContainerID,
|
|
|
|
doneCh: make(chan struct{}),
|
2015-11-14 06:07:13 +00:00
|
|
|
waitCh: make(chan *cstructs.WaitResult, 1),
|
2015-09-03 10:38:36 +00:00
|
|
|
}
|
|
|
|
go h.run()
|
|
|
|
return h, nil
|
|
|
|
}
|
|
|
|
|
2015-11-19 22:20:41 +00:00
|
|
|
func (h *DockerHandle) ID() string {
|
2015-09-03 10:38:36 +00:00
|
|
|
// Return a handle to the PID
|
|
|
|
pid := dockerPID{
|
2015-09-04 04:00:16 +00:00
|
|
|
ImageID: h.imageID,
|
|
|
|
ContainerID: h.containerID,
|
2015-09-03 10:38:36 +00:00
|
|
|
}
|
|
|
|
data, err := json.Marshal(pid)
|
|
|
|
if err != nil {
|
2015-11-18 05:17:51 +00:00
|
|
|
h.logger.Printf("[ERR] driver.docker: failed to marshal docker PID to JSON: %s", err)
|
2015-09-03 10:38:36 +00:00
|
|
|
}
|
|
|
|
return fmt.Sprintf("DOCKER:%s", string(data))
|
|
|
|
}
|
|
|
|
|
2015-11-19 22:20:41 +00:00
|
|
|
func (h *DockerHandle) ContainerID() string {
|
2015-11-19 21:57:18 +00:00
|
|
|
return h.containerID
|
|
|
|
}
|
|
|
|
|
2015-11-19 22:20:41 +00:00
|
|
|
func (h *DockerHandle) WaitCh() chan *cstructs.WaitResult {
|
2015-09-03 10:38:36 +00:00
|
|
|
return h.waitCh
|
|
|
|
}
|
|
|
|
|
2015-11-19 22:20:41 +00:00
|
|
|
func (h *DockerHandle) Update(task *structs.Task) error {
|
2015-09-03 10:38:36 +00:00
|
|
|
// Update is not possible
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-09-04 04:00:16 +00:00
|
|
|
// Kill is used to terminate the task. This uses docker stop -t 5
|
2015-11-19 22:20:41 +00:00
|
|
|
func (h *DockerHandle) Kill() error {
|
2015-09-03 10:38:36 +00:00
|
|
|
// Stop the container
|
2015-09-26 03:01:03 +00:00
|
|
|
err := h.client.StopContainer(h.containerID, 5)
|
2015-09-03 10:38:36 +00:00
|
|
|
if err != nil {
|
2015-11-17 23:17:44 +00:00
|
|
|
log.Printf("[ERR] driver.docker: failed to stop container %s", h.containerID)
|
2015-09-03 10:38:36 +00:00
|
|
|
return fmt.Errorf("Failed to stop container %s: %s", h.containerID, err)
|
|
|
|
}
|
2015-09-09 20:35:10 +00:00
|
|
|
log.Printf("[INFO] driver.docker: stopped container %s", h.containerID)
|
2015-09-03 10:38:36 +00:00
|
|
|
|
|
|
|
// Cleanup container
|
2015-09-27 20:59:38 +00:00
|
|
|
if h.cleanupContainer {
|
2015-09-27 01:53:15 +00:00
|
|
|
err = h.client.RemoveContainer(docker.RemoveContainerOptions{
|
|
|
|
ID: h.containerID,
|
|
|
|
RemoveVolumes: true,
|
|
|
|
})
|
|
|
|
if err != nil {
|
2015-11-17 23:17:44 +00:00
|
|
|
log.Printf("[ERR] driver.docker: failed to remove container %s", h.containerID)
|
2015-09-27 01:53:15 +00:00
|
|
|
return fmt.Errorf("Failed to remove container %s: %s", h.containerID, err)
|
|
|
|
}
|
|
|
|
log.Printf("[INFO] driver.docker: removed container %s", h.containerID)
|
2015-09-03 10:38:36 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
// Cleanup image. This operation may fail if the image is in use by another
|
|
|
|
// job. That is OK. Will we log a message but continue.
|
2015-09-27 20:59:38 +00:00
|
|
|
if h.cleanupImage {
|
2015-09-27 01:53:15 +00:00
|
|
|
err = h.client.RemoveImage(h.imageID)
|
2015-09-26 07:34:57 +00:00
|
|
|
if err != nil {
|
2015-09-27 01:53:15 +00:00
|
|
|
containers, err := h.client.ListContainers(docker.ListContainersOptions{
|
2015-10-07 00:53:05 +00:00
|
|
|
// The image might be in use by a stopped container, so check everything
|
2015-09-27 04:52:02 +00:00
|
|
|
All: true,
|
2015-09-27 01:53:15 +00:00
|
|
|
Filters: map[string][]string{
|
|
|
|
"image": []string{h.imageID},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
if err != nil {
|
2015-11-18 05:17:51 +00:00
|
|
|
log.Printf("[ERR] driver.docker: failed to query list of containers matching image:%s", h.imageID)
|
2015-11-18 04:50:14 +00:00
|
|
|
return fmt.Errorf("Failed to query list of containers: %s", err)
|
2015-09-27 01:53:15 +00:00
|
|
|
}
|
|
|
|
inUse := len(containers)
|
|
|
|
if inUse > 0 {
|
2015-11-18 05:17:51 +00:00
|
|
|
log.Printf("[INFO] driver.docker: image %s is still in use by %d container(s)", h.imageID, inUse)
|
2015-09-27 01:53:15 +00:00
|
|
|
} else {
|
|
|
|
return fmt.Errorf("Failed to remove image %s", h.imageID)
|
|
|
|
}
|
2015-09-26 07:34:57 +00:00
|
|
|
} else {
|
2015-11-18 05:17:51 +00:00
|
|
|
log.Printf("[INFO] driver.docker: removed image %s", h.imageID)
|
2015-09-26 07:34:57 +00:00
|
|
|
}
|
2015-09-03 10:38:36 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
2015-11-19 22:20:41 +00:00
|
|
|
func (h *DockerHandle) run() {
|
2015-09-03 10:38:36 +00:00
|
|
|
// Wait for it...
|
2015-09-26 05:43:19 +00:00
|
|
|
exitCode, err := h.client.WaitContainer(h.containerID)
|
2015-09-03 10:38:36 +00:00
|
|
|
if err != nil {
|
2015-11-18 05:17:51 +00:00
|
|
|
h.logger.Printf("[ERR] driver.docker: failed to wait for %s; container already terminated", h.containerID)
|
2015-09-03 10:38:36 +00:00
|
|
|
}
|
|
|
|
|
2015-09-26 05:43:19 +00:00
|
|
|
if exitCode != 0 {
|
|
|
|
err = fmt.Errorf("Docker container exited with non-zero exit code: %d", exitCode)
|
|
|
|
}
|
|
|
|
|
2015-09-03 10:38:36 +00:00
|
|
|
close(h.doneCh)
|
2015-11-14 06:07:13 +00:00
|
|
|
h.waitCh <- cstructs.NewWaitResult(exitCode, 0, err)
|
2015-09-03 10:38:36 +00:00
|
|
|
close(h.waitCh)
|
|
|
|
}
|