2013-03-02 23:36:06 +00:00
|
|
|
require "vagrant/util/retryable"
|
|
|
|
require "vagrant/util/subprocess"
|
2013-03-01 23:45:13 +00:00
|
|
|
|
2013-04-05 05:17:19 +00:00
|
|
|
require "vagrant-lxc/errors"
|
|
|
|
require "vagrant-lxc/driver/cli"
|
2017-12-13 21:35:16 +00:00
|
|
|
require "vagrant-lxc/sudo_wrapper"
|
2013-04-05 05:17:19 +00:00
|
|
|
|
2013-09-10 19:57:51 +00:00
|
|
|
require "etc"
|
|
|
|
|
2014-11-05 13:50:46 +00:00
|
|
|
require "tempfile"
|
|
|
|
|
2013-03-01 03:34:51 +00:00
|
|
|
module Vagrant
|
|
|
|
module LXC
|
2013-04-05 05:17:19 +00:00
|
|
|
class Driver
|
2013-03-02 04:18:38 +00:00
|
|
|
# This is raised if the container can't be found when initializing it with
|
2013-03-10 03:39:05 +00:00
|
|
|
# a name.
|
2013-04-05 05:17:19 +00:00
|
|
|
class ContainerNotFound < StandardError; end
|
2013-03-02 04:18:38 +00:00
|
|
|
|
2014-09-23 12:07:03 +00:00
|
|
|
# Default root folder where container configs are stored
|
2013-04-10 02:54:28 +00:00
|
|
|
attr_reader :container_name,
|
|
|
|
:customizations
|
2013-03-02 04:18:38 +00:00
|
|
|
|
2018-02-18 02:53:16 +00:00
|
|
|
def initialize(container_name, sudo_wrapper = nil, cli = nil, privileged: true)
|
2013-04-06 01:28:41 +00:00
|
|
|
@container_name = container_name
|
2018-02-18 02:53:16 +00:00
|
|
|
@sudo_wrapper = sudo_wrapper || SudoWrapper.new(privileged: privileged)
|
2017-12-13 21:35:16 +00:00
|
|
|
@cli = cli || CLI.new(@sudo_wrapper, container_name)
|
2013-04-06 01:28:41 +00:00
|
|
|
@logger = Log4r::Logger.new("vagrant::provider::lxc::driver")
|
2013-04-10 02:54:28 +00:00
|
|
|
@customizations = []
|
2013-03-01 03:34:51 +00:00
|
|
|
end
|
|
|
|
|
2013-03-02 04:18:38 +00:00
|
|
|
def validate!
|
2013-04-06 01:28:41 +00:00
|
|
|
raise ContainerNotFound if @container_name && ! @cli.list.include?(@container_name)
|
2013-03-02 04:18:38 +00:00
|
|
|
end
|
|
|
|
|
2014-09-23 12:07:03 +00:00
|
|
|
# Root folder where container configs are stored
|
|
|
|
def containers_path
|
2018-01-14 01:34:41 +00:00
|
|
|
@containers_path ||= @cli.config('lxc.lxcpath')
|
2014-09-23 12:07:03 +00:00
|
|
|
end
|
|
|
|
|
2014-03-12 13:30:37 +00:00
|
|
|
def all_containers
|
|
|
|
@cli.list
|
|
|
|
end
|
|
|
|
|
2013-03-10 04:54:33 +00:00
|
|
|
def base_path
|
2014-09-23 12:07:03 +00:00
|
|
|
Pathname.new("#{containers_path}/#{@container_name}")
|
2013-03-10 04:54:33 +00:00
|
|
|
end
|
|
|
|
|
2018-01-14 02:03:34 +00:00
|
|
|
def config_path
|
|
|
|
base_path.join('config').to_s
|
|
|
|
end
|
|
|
|
|
2013-03-10 04:54:33 +00:00
|
|
|
def rootfs_path
|
2018-07-24 16:23:25 +00:00
|
|
|
pathtype, path = config_string.match(/^lxc\.rootfs(?:\.path)?\s+=\s+(.+:)?(.+)$/)[1..2]
|
|
|
|
case pathtype
|
|
|
|
when 'overlayfs:'
|
2014-11-06 22:23:08 +00:00
|
|
|
# Split on colon (:), ignoring any colon escaped by an escape character ( \ )
|
|
|
|
# Pays attention to when the escape character is itself escaped.
|
2018-07-24 16:23:25 +00:00
|
|
|
_, overlay_path = config_entry.split(/(?<!\\)(?:\\\\)*:/)
|
2014-11-06 22:23:08 +00:00
|
|
|
if overlay_path
|
|
|
|
Pathname.new(overlay_path)
|
|
|
|
else
|
|
|
|
# Malformed: fall back to prior behaviour
|
2018-07-24 16:23:25 +00:00
|
|
|
Pathname.new(path)
|
2014-11-06 22:23:08 +00:00
|
|
|
end
|
|
|
|
else
|
2018-07-24 16:23:25 +00:00
|
|
|
Pathname.new(path)
|
2014-11-06 22:23:08 +00:00
|
|
|
end
|
2013-03-10 04:54:33 +00:00
|
|
|
end
|
|
|
|
|
2013-07-29 15:08:22 +00:00
|
|
|
def mac_address
|
2014-05-13 02:21:40 +00:00
|
|
|
return @mac_address if @mac_address
|
|
|
|
|
|
|
|
if config_string =~ /^lxc\.network\.hwaddr\s*+=\s*+(.+)$/
|
|
|
|
@mac_address = $1
|
|
|
|
end
|
2013-11-06 21:29:39 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
def config_string
|
2018-01-14 02:03:34 +00:00
|
|
|
@sudo_wrapper.run('cat', config_path)
|
2013-07-29 15:08:22 +00:00
|
|
|
end
|
|
|
|
|
2014-02-18 09:52:54 +00:00
|
|
|
def create(name, backingstore, backingstore_options, template_path, config_file, template_options = {})
|
2013-04-06 01:28:41 +00:00
|
|
|
@cli.name = @container_name = name
|
2013-03-08 03:54:15 +00:00
|
|
|
|
2015-05-14 10:43:47 +00:00
|
|
|
@logger.debug "Creating container..."
|
2018-04-30 02:46:12 +00:00
|
|
|
|
2015-05-14 10:43:47 +00:00
|
|
|
@cli.create template_path, backingstore, backingstore_options, config_file, template_options
|
2013-03-02 19:38:53 +00:00
|
|
|
end
|
|
|
|
|
2013-04-10 02:54:28 +00:00
|
|
|
def share_folders(folders)
|
2014-03-14 02:36:15 +00:00
|
|
|
folders.each do |f|
|
2015-04-06 00:46:22 +00:00
|
|
|
share_folder(f[:hostpath], f[:guestpath], f.fetch(:mount_options, nil))
|
2013-03-04 01:42:18 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2014-03-14 03:21:21 +00:00
|
|
|
def share_folder(host_path, guest_path, mount_options = nil)
|
2015-05-14 10:43:47 +00:00
|
|
|
guest_path = guest_path.gsub(/^\//, '').gsub(' ', '\\\040')
|
2015-04-06 00:46:22 +00:00
|
|
|
mount_options = Array(mount_options || ['bind', 'create=dir'])
|
2014-06-09 02:27:25 +00:00
|
|
|
host_path = host_path.to_s.gsub(' ', '\\\040')
|
2014-03-14 02:36:15 +00:00
|
|
|
@customizations << ['mount.entry', "#{host_path} #{guest_path} none #{mount_options.join(',')} 0 0"]
|
2014-03-12 13:30:37 +00:00
|
|
|
end
|
|
|
|
|
2013-04-10 02:33:30 +00:00
|
|
|
def start(customizations)
|
2013-03-11 00:13:29 +00:00
|
|
|
@logger.info('Starting container...')
|
|
|
|
|
|
|
|
if ENV['LXC_START_LOG_FILE']
|
2013-03-12 18:29:18 +00:00
|
|
|
extra = ['-o', ENV['LXC_START_LOG_FILE'], '-l', 'DEBUG']
|
2013-03-11 00:13:29 +00:00
|
|
|
end
|
|
|
|
|
2013-07-29 15:12:41 +00:00
|
|
|
prune_customizations
|
|
|
|
write_customizations(customizations + @customizations)
|
|
|
|
|
2013-09-12 04:12:07 +00:00
|
|
|
@cli.start(extra)
|
2013-03-01 03:34:51 +00:00
|
|
|
end
|
|
|
|
|
2013-05-07 14:07:35 +00:00
|
|
|
def forced_halt
|
2013-03-11 00:13:29 +00:00
|
|
|
@logger.info('Shutting down container...')
|
2013-05-07 14:07:35 +00:00
|
|
|
@cli.transition_to(:stopped) { |c| c.stop }
|
2013-03-01 03:34:51 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
def destroy
|
2013-03-11 00:13:29 +00:00
|
|
|
@cli.destroy
|
2013-03-01 23:45:13 +00:00
|
|
|
end
|
2014-06-03 15:53:26 +00:00
|
|
|
|
2013-07-29 15:08:22 +00:00
|
|
|
def attach(*command)
|
|
|
|
@cli.attach(*command)
|
|
|
|
end
|
|
|
|
|
2017-12-10 18:11:22 +00:00
|
|
|
def info(*command)
|
|
|
|
@cli.info(*command)
|
|
|
|
end
|
|
|
|
|
2016-01-16 17:49:22 +00:00
|
|
|
def configure_private_network(bridge_name, bridge_ip, container_name, container_interface, address_type, ip)
|
|
|
|
if ! container_interface
|
|
|
|
container_interface = "eth1"
|
|
|
|
end
|
|
|
|
@logger.info "Configuring network interface #{container_interface} for #{container_name} using #{ip} and bridge #{bridge_name}"
|
2015-03-09 02:58:29 +00:00
|
|
|
if ip
|
|
|
|
ip += '/24'
|
|
|
|
end
|
2015-01-11 22:59:38 +00:00
|
|
|
|
2015-07-06 15:44:35 +00:00
|
|
|
if ! bridge_exists?(bridge_name)
|
|
|
|
if not bridge_ip
|
|
|
|
raise "Bridge is missing and no IP was specified!"
|
|
|
|
end
|
|
|
|
|
|
|
|
@logger.info "Creating the bridge #{bridge_name}"
|
|
|
|
cmd = [
|
|
|
|
'brctl',
|
|
|
|
'addbr',
|
|
|
|
bridge_name
|
|
|
|
]
|
|
|
|
@sudo_wrapper.run(*cmd)
|
|
|
|
end
|
|
|
|
|
2015-01-11 22:59:38 +00:00
|
|
|
if ! bridge_has_an_ip?(bridge_name)
|
2015-03-09 02:58:29 +00:00
|
|
|
if not bridge_ip
|
|
|
|
raise "Bridge has no IP and none was specified!"
|
|
|
|
end
|
2015-01-11 22:59:38 +00:00
|
|
|
@logger.info "Adding #{bridge_ip} to the bridge #{bridge_name}"
|
|
|
|
cmd = [
|
|
|
|
'ip',
|
|
|
|
'addr',
|
|
|
|
'add',
|
|
|
|
"#{bridge_ip}/24",
|
|
|
|
'dev',
|
|
|
|
bridge_name
|
|
|
|
]
|
|
|
|
@sudo_wrapper.run(*cmd)
|
2015-08-25 08:18:02 +00:00
|
|
|
@sudo_wrapper.run('ip', 'link', 'set', bridge_name, 'up')
|
2015-01-11 22:59:38 +00:00
|
|
|
end
|
2015-03-09 02:58:29 +00:00
|
|
|
|
|
|
|
cmd = [
|
|
|
|
Vagrant::LXC.source_root.join('scripts/pipework').to_s,
|
|
|
|
bridge_name,
|
2016-01-16 17:49:22 +00:00
|
|
|
"-i",
|
|
|
|
container_interface,
|
2015-03-09 02:58:29 +00:00
|
|
|
container_name,
|
|
|
|
ip ||= "dhcp"
|
|
|
|
]
|
|
|
|
@sudo_wrapper.run(*cmd)
|
2015-01-11 22:59:38 +00:00
|
|
|
end
|
|
|
|
|
|
|
|
def bridge_has_an_ip?(bridge_name)
|
|
|
|
@logger.info "Checking whether the bridge #{bridge_name} has an IP"
|
|
|
|
`ip -4 addr show scope global #{bridge_name}` =~ /^\s+inet ([0-9.]+)\/[0-9]+\s+/
|
|
|
|
end
|
|
|
|
|
2015-07-06 15:44:28 +00:00
|
|
|
def bridge_exists?(bridge_name)
|
|
|
|
@logger.info "Checking whether bridge #{bridge_name} exists"
|
2015-08-25 08:20:21 +00:00
|
|
|
brctl_output = `ip link | egrep -q " #{bridge_name}:"`
|
2015-07-06 15:44:28 +00:00
|
|
|
$?.to_i == 0
|
|
|
|
end
|
|
|
|
|
2015-01-11 22:59:38 +00:00
|
|
|
def bridge_is_in_use?(bridge_name)
|
|
|
|
# REFACTOR: This method is **VERY** hacky
|
|
|
|
@logger.info "Checking if bridge #{bridge_name} is in use"
|
|
|
|
brctl_output = `brctl show #{bridge_name} 2>/dev/null | tail -n +2 | grep -q veth`
|
|
|
|
$?.to_i == 0
|
|
|
|
end
|
|
|
|
|
|
|
|
def remove_bridge(bridge_name)
|
2015-08-25 12:36:59 +00:00
|
|
|
if ['lxcbr0', 'virbr0'].include? bridge_name
|
2015-08-25 12:37:31 +00:00
|
|
|
@logger.info "Skipping removal of system bridge #{bridge_name}"
|
2015-03-16 17:34:40 +00:00
|
|
|
return
|
|
|
|
end
|
|
|
|
|
2015-07-06 15:44:28 +00:00
|
|
|
return unless bridge_exists?(bridge_name)
|
2015-01-11 22:59:38 +00:00
|
|
|
|
|
|
|
@logger.info "Removing bridge #{bridge_name}"
|
2015-08-25 08:18:02 +00:00
|
|
|
@sudo_wrapper.run('ip', 'link', 'set', bridge_name, 'down')
|
2015-01-11 22:59:38 +00:00
|
|
|
@sudo_wrapper.run('brctl', 'delbr', bridge_name)
|
|
|
|
end
|
|
|
|
|
2013-07-29 15:08:22 +00:00
|
|
|
def version
|
2013-07-29 15:10:59 +00:00
|
|
|
@version ||= @cli.version
|
2013-07-29 15:08:22 +00:00
|
|
|
end
|
|
|
|
|
2018-04-30 02:46:12 +00:00
|
|
|
def supports_new_config_format
|
|
|
|
Gem::Version.new(version) >= Gem::Version.new('2.1.0')
|
|
|
|
end
|
|
|
|
|
2013-03-30 22:17:13 +00:00
|
|
|
# TODO: This needs to be reviewed and specs needs to be written
|
|
|
|
def compress_rootfs
|
|
|
|
# TODO: Pass in tmpdir so we can clean up from outside
|
|
|
|
target_path = "#{Dir.mktmpdir}/rootfs.tar.gz"
|
|
|
|
|
2013-11-06 21:29:39 +00:00
|
|
|
@logger.info "Compressing '#{rootfs_path}' rootfs to #{target_path}"
|
2014-04-17 10:56:56 +00:00
|
|
|
@sudo_wrapper.run('tar', '--numeric-owner', '-cvzf', target_path, '-C',
|
|
|
|
rootfs_path.parent.to_s, "./#{rootfs_path.basename.to_s}")
|
2013-11-06 21:29:39 +00:00
|
|
|
|
|
|
|
@logger.info "Changing rootfs tarball owner"
|
|
|
|
user_details = Etc.getpwnam(Etc.getlogin)
|
|
|
|
@sudo_wrapper.run('chown', "#{user_details.uid}:#{user_details.gid}", target_path)
|
2013-03-30 22:17:13 +00:00
|
|
|
|
|
|
|
target_path
|
|
|
|
end
|
|
|
|
|
2013-03-02 03:05:10 +00:00
|
|
|
def state
|
2013-04-06 01:28:41 +00:00
|
|
|
if @container_name
|
2013-03-11 00:13:29 +00:00
|
|
|
@cli.state
|
2013-03-01 03:34:51 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
|
2013-07-29 15:12:41 +00:00
|
|
|
def prune_customizations
|
2013-08-01 01:35:49 +00:00
|
|
|
# Use sed to just strip out the block of code which was inserted by Vagrant
|
2013-07-29 15:12:41 +00:00
|
|
|
@logger.debug 'Prunning vagrant-lxc customizations'
|
2014-04-17 10:56:56 +00:00
|
|
|
contents = config_string
|
2014-05-13 02:06:45 +00:00
|
|
|
contents.gsub! /^# VAGRANT-BEGIN(.|\s)*# VAGRANT-END\n/, ''
|
2014-04-17 10:56:56 +00:00
|
|
|
write_config(contents)
|
2013-07-29 15:12:41 +00:00
|
|
|
end
|
|
|
|
|
2018-05-01 00:45:25 +00:00
|
|
|
def update_config_keys(path = nil)
|
|
|
|
path = path || config_path
|
|
|
|
@cli.update_config(path)
|
2018-01-14 02:03:34 +00:00
|
|
|
rescue Errors::ExecuteError
|
|
|
|
# not on LXC 2.1+. Doesn't matter, ignore.
|
|
|
|
end
|
|
|
|
|
2013-04-05 06:10:38 +00:00
|
|
|
protected
|
|
|
|
|
2013-07-29 15:12:41 +00:00
|
|
|
def write_customizations(customizations)
|
|
|
|
customizations = customizations.map do |key, value|
|
|
|
|
"lxc.#{key}=#{value}"
|
|
|
|
end
|
|
|
|
customizations.unshift '# VAGRANT-BEGIN'
|
2014-05-13 02:06:45 +00:00
|
|
|
customizations << "# VAGRANT-END\n"
|
|
|
|
|
2014-04-17 10:56:56 +00:00
|
|
|
contents = config_string
|
2014-05-13 02:06:45 +00:00
|
|
|
contents << customizations.join("\n")
|
2013-07-29 15:12:41 +00:00
|
|
|
|
2014-04-17 10:56:56 +00:00
|
|
|
write_config(contents)
|
|
|
|
end
|
|
|
|
|
|
|
|
def write_config(contents)
|
2018-02-18 02:53:16 +00:00
|
|
|
confpath = base_path.join('config').to_s
|
|
|
|
begin
|
|
|
|
File.open(confpath, File::RDWR) do |file|
|
|
|
|
file.write contents
|
|
|
|
end
|
|
|
|
rescue
|
|
|
|
# We don't have permissions to write in the conf file. That's probably because it's a
|
|
|
|
# privileged container. Work around that through sudo_wrapper.
|
|
|
|
Tempfile.new('lxc-config').tap do |file|
|
|
|
|
file.chmod 0644
|
|
|
|
file.write contents
|
|
|
|
file.close
|
|
|
|
@sudo_wrapper.run 'cp', '-f', file.path, confpath
|
|
|
|
@sudo_wrapper.run 'chown', 'root:root', confpath
|
|
|
|
end
|
2013-07-29 15:12:41 +00:00
|
|
|
end
|
|
|
|
end
|
2013-03-01 03:34:51 +00:00
|
|
|
end
|
|
|
|
end
|
|
|
|
end
|