github.com/darren-clark/docker@v1.5.0/daemon/daemon.go (about)

     1  package daemon
     2  
     3  import (
     4  	"bytes"
     5  	"fmt"
     6  	"io"
     7  	"io/ioutil"
     8  	"os"
     9  	"path"
    10  	"path/filepath"
    11  	"regexp"
    12  	"runtime"
    13  	"strings"
    14  	"sync"
    15  	"time"
    16  
    17  	"github.com/docker/libcontainer/label"
    18  
    19  	log "github.com/Sirupsen/logrus"
    20  	"github.com/docker/docker/api"
    21  	"github.com/docker/docker/daemon/execdriver"
    22  	"github.com/docker/docker/daemon/execdriver/execdrivers"
    23  	"github.com/docker/docker/daemon/execdriver/lxc"
    24  	"github.com/docker/docker/daemon/graphdriver"
    25  	_ "github.com/docker/docker/daemon/graphdriver/vfs"
    26  	_ "github.com/docker/docker/daemon/networkdriver/bridge"
    27  	"github.com/docker/docker/daemon/networkdriver/portallocator"
    28  	"github.com/docker/docker/dockerversion"
    29  	"github.com/docker/docker/engine"
    30  	"github.com/docker/docker/graph"
    31  	"github.com/docker/docker/image"
    32  	"github.com/docker/docker/pkg/archive"
    33  	"github.com/docker/docker/pkg/broadcastwriter"
    34  	"github.com/docker/docker/pkg/graphdb"
    35  	"github.com/docker/docker/pkg/ioutils"
    36  	"github.com/docker/docker/pkg/namesgenerator"
    37  	"github.com/docker/docker/pkg/networkfs/resolvconf"
    38  	"github.com/docker/docker/pkg/parsers"
    39  	"github.com/docker/docker/pkg/parsers/kernel"
    40  	"github.com/docker/docker/pkg/sysinfo"
    41  	"github.com/docker/docker/pkg/truncindex"
    42  	"github.com/docker/docker/runconfig"
    43  	"github.com/docker/docker/trust"
    44  	"github.com/docker/docker/utils"
    45  	"github.com/docker/docker/volumes"
    46  
    47  	"github.com/go-fsnotify/fsnotify"
    48  )
    49  
    50  var (
    51  	validContainerNameChars   = `[a-zA-Z0-9][a-zA-Z0-9_.-]`
    52  	validContainerNamePattern = regexp.MustCompile(`^/?` + validContainerNameChars + `+$`)
    53  )
    54  
    55  type contStore struct {
    56  	s map[string]*Container
    57  	sync.Mutex
    58  }
    59  
    60  func (c *contStore) Add(id string, cont *Container) {
    61  	c.Lock()
    62  	c.s[id] = cont
    63  	c.Unlock()
    64  }
    65  
    66  func (c *contStore) Get(id string) *Container {
    67  	c.Lock()
    68  	res := c.s[id]
    69  	c.Unlock()
    70  	return res
    71  }
    72  
    73  func (c *contStore) Delete(id string) {
    74  	c.Lock()
    75  	delete(c.s, id)
    76  	c.Unlock()
    77  }
    78  
    79  func (c *contStore) List() []*Container {
    80  	containers := new(History)
    81  	c.Lock()
    82  	for _, cont := range c.s {
    83  		containers.Add(cont)
    84  	}
    85  	c.Unlock()
    86  	containers.Sort()
    87  	return *containers
    88  }
    89  
    90  type Daemon struct {
    91  	ID             string
    92  	repository     string
    93  	sysInitPath    string
    94  	containers     *contStore
    95  	execCommands   *execStore
    96  	graph          *graph.Graph
    97  	repositories   *graph.TagStore
    98  	idIndex        *truncindex.TruncIndex
    99  	sysInfo        *sysinfo.SysInfo
   100  	volumes        *volumes.Repository
   101  	eng            *engine.Engine
   102  	config         *Config
   103  	containerGraph *graphdb.Database
   104  	driver         graphdriver.Driver
   105  	execDriver     execdriver.Driver
   106  	trustStore     *trust.TrustStore
   107  	statsCollector *statsCollector
   108  }
   109  
   110  // Install installs daemon capabilities to eng.
   111  func (daemon *Daemon) Install(eng *engine.Engine) error {
   112  	// FIXME: remove ImageDelete's dependency on Daemon, then move to graph/
   113  	for name, method := range map[string]engine.Handler{
   114  		"attach":            daemon.ContainerAttach,
   115  		"commit":            daemon.ContainerCommit,
   116  		"container_changes": daemon.ContainerChanges,
   117  		"container_copy":    daemon.ContainerCopy,
   118  		"container_rename":  daemon.ContainerRename,
   119  		"container_inspect": daemon.ContainerInspect,
   120  		"container_stats":   daemon.ContainerStats,
   121  		"containers":        daemon.Containers,
   122  		"create":            daemon.ContainerCreate,
   123  		"rm":                daemon.ContainerRm,
   124  		"export":            daemon.ContainerExport,
   125  		"info":              daemon.CmdInfo,
   126  		"kill":              daemon.ContainerKill,
   127  		"logs":              daemon.ContainerLogs,
   128  		"pause":             daemon.ContainerPause,
   129  		"resize":            daemon.ContainerResize,
   130  		"restart":           daemon.ContainerRestart,
   131  		"start":             daemon.ContainerStart,
   132  		"stop":              daemon.ContainerStop,
   133  		"top":               daemon.ContainerTop,
   134  		"unpause":           daemon.ContainerUnpause,
   135  		"wait":              daemon.ContainerWait,
   136  		"image_delete":      daemon.ImageDelete, // FIXME: see above
   137  		"execCreate":        daemon.ContainerExecCreate,
   138  		"execStart":         daemon.ContainerExecStart,
   139  		"execResize":        daemon.ContainerExecResize,
   140  		"execInspect":       daemon.ContainerExecInspect,
   141  	} {
   142  		if err := eng.Register(name, method); err != nil {
   143  			return err
   144  		}
   145  	}
   146  	if err := daemon.Repositories().Install(eng); err != nil {
   147  		return err
   148  	}
   149  	if err := daemon.trustStore.Install(eng); err != nil {
   150  		return err
   151  	}
   152  	// FIXME: this hack is necessary for legacy integration tests to access
   153  	// the daemon object.
   154  	eng.Hack_SetGlobalVar("httpapi.daemon", daemon)
   155  	return nil
   156  }
   157  
   158  // Get looks for a container by the specified ID or name, and returns it.
   159  // If the container is not found, or if an error occurs, nil is returned.
   160  func (daemon *Daemon) Get(name string) *Container {
   161  	id, err := daemon.idIndex.Get(name)
   162  	if err == nil {
   163  		return daemon.containers.Get(id)
   164  	}
   165  
   166  	if c, _ := daemon.GetByName(name); c != nil {
   167  		return c
   168  	}
   169  
   170  	if err == truncindex.ErrDuplicateID {
   171  		log.Errorf("Short ID %s is ambiguous: please retry with more characters or use the full ID.\n", name)
   172  	}
   173  	return nil
   174  }
   175  
   176  // Exists returns a true if a container of the specified ID or name exists,
   177  // false otherwise.
   178  func (daemon *Daemon) Exists(id string) bool {
   179  	return daemon.Get(id) != nil
   180  }
   181  
   182  func (daemon *Daemon) containerRoot(id string) string {
   183  	return path.Join(daemon.repository, id)
   184  }
   185  
   186  // Load reads the contents of a container from disk
   187  // This is typically done at startup.
   188  func (daemon *Daemon) load(id string) (*Container, error) {
   189  	container := &Container{
   190  		root:         daemon.containerRoot(id),
   191  		State:        NewState(),
   192  		execCommands: newExecStore(),
   193  	}
   194  	if err := container.FromDisk(); err != nil {
   195  		return nil, err
   196  	}
   197  
   198  	if container.ID != id {
   199  		return container, fmt.Errorf("Container %s is stored at %s", container.ID, id)
   200  	}
   201  
   202  	container.readHostConfig()
   203  
   204  	return container, nil
   205  }
   206  
   207  // Register makes a container object usable by the daemon as <container.ID>
   208  // This is a wrapper for register
   209  func (daemon *Daemon) Register(container *Container) error {
   210  	return daemon.register(container, true)
   211  }
   212  
   213  // register makes a container object usable by the daemon as <container.ID>
   214  func (daemon *Daemon) register(container *Container, updateSuffixarray bool) error {
   215  	if container.daemon != nil || daemon.Exists(container.ID) {
   216  		return fmt.Errorf("Container is already loaded")
   217  	}
   218  	if err := validateID(container.ID); err != nil {
   219  		return err
   220  	}
   221  	if err := daemon.ensureName(container); err != nil {
   222  		return err
   223  	}
   224  
   225  	container.daemon = daemon
   226  
   227  	// Attach to stdout and stderr
   228  	container.stderr = broadcastwriter.New()
   229  	container.stdout = broadcastwriter.New()
   230  	// Attach to stdin
   231  	if container.Config.OpenStdin {
   232  		container.stdin, container.stdinPipe = io.Pipe()
   233  	} else {
   234  		container.stdinPipe = ioutils.NopWriteCloser(ioutil.Discard) // Silently drop stdin
   235  	}
   236  	// done
   237  	daemon.containers.Add(container.ID, container)
   238  
   239  	// don't update the Suffixarray if we're starting up
   240  	// we'll waste time if we update it for every container
   241  	daemon.idIndex.Add(container.ID)
   242  
   243  	container.registerVolumes()
   244  
   245  	// FIXME: if the container is supposed to be running but is not, auto restart it?
   246  	//        if so, then we need to restart monitor and init a new lock
   247  	// If the container is supposed to be running, make sure of it
   248  	if container.IsRunning() {
   249  		log.Debugf("killing old running container %s", container.ID)
   250  
   251  		existingPid := container.Pid
   252  		container.SetStopped(&execdriver.ExitStatus{ExitCode: 0})
   253  
   254  		// We only have to handle this for lxc because the other drivers will ensure that
   255  		// no processes are left when docker dies
   256  		if container.ExecDriver == "" || strings.Contains(container.ExecDriver, "lxc") {
   257  			lxc.KillLxc(container.ID, 9)
   258  		} else {
   259  			// use the current driver and ensure that the container is dead x.x
   260  			cmd := &execdriver.Command{
   261  				ID: container.ID,
   262  			}
   263  			var err error
   264  			cmd.ProcessConfig.Process, err = os.FindProcess(existingPid)
   265  			if err != nil {
   266  				log.Debugf("cannot find existing process for %d", existingPid)
   267  			}
   268  			daemon.execDriver.Terminate(cmd)
   269  		}
   270  
   271  		if err := container.Unmount(); err != nil {
   272  			log.Debugf("unmount error %s", err)
   273  		}
   274  		if err := container.ToDisk(); err != nil {
   275  			log.Debugf("saving stopped state to disk %s", err)
   276  		}
   277  
   278  		info := daemon.execDriver.Info(container.ID)
   279  		if !info.IsRunning() {
   280  			log.Debugf("Container %s was supposed to be running but is not.", container.ID)
   281  
   282  			log.Debugf("Marking as stopped")
   283  
   284  			container.SetStopped(&execdriver.ExitStatus{ExitCode: -127})
   285  			if err := container.ToDisk(); err != nil {
   286  				return err
   287  			}
   288  		}
   289  	}
   290  	return nil
   291  }
   292  
   293  func (daemon *Daemon) ensureName(container *Container) error {
   294  	if container.Name == "" {
   295  		name, err := daemon.generateNewName(container.ID)
   296  		if err != nil {
   297  			return err
   298  		}
   299  		container.Name = name
   300  
   301  		if err := container.ToDisk(); err != nil {
   302  			log.Debugf("Error saving container name %s", err)
   303  		}
   304  	}
   305  	return nil
   306  }
   307  
   308  func (daemon *Daemon) LogToDisk(src *broadcastwriter.BroadcastWriter, dst, stream string) error {
   309  	log, err := os.OpenFile(dst, os.O_RDWR|os.O_APPEND|os.O_CREATE, 0600)
   310  	if err != nil {
   311  		return err
   312  	}
   313  	src.AddWriter(log, stream)
   314  	return nil
   315  }
   316  
   317  func (daemon *Daemon) restore() error {
   318  	var (
   319  		debug         = (os.Getenv("DEBUG") != "" || os.Getenv("TEST") != "")
   320  		containers    = make(map[string]*Container)
   321  		currentDriver = daemon.driver.String()
   322  	)
   323  
   324  	if !debug {
   325  		log.Infof("Loading containers: start.")
   326  	}
   327  	dir, err := ioutil.ReadDir(daemon.repository)
   328  	if err != nil {
   329  		return err
   330  	}
   331  
   332  	for _, v := range dir {
   333  		id := v.Name()
   334  		container, err := daemon.load(id)
   335  		if !debug {
   336  			fmt.Print(".")
   337  		}
   338  		if err != nil {
   339  			log.Errorf("Failed to load container %v: %v", id, err)
   340  			continue
   341  		}
   342  
   343  		// Ignore the container if it does not support the current driver being used by the graph
   344  		if (container.Driver == "" && currentDriver == "aufs") || container.Driver == currentDriver {
   345  			log.Debugf("Loaded container %v", container.ID)
   346  
   347  			containers[container.ID] = container
   348  		} else {
   349  			log.Debugf("Cannot load container %s because it was created with another graph driver.", container.ID)
   350  		}
   351  	}
   352  
   353  	registeredContainers := []*Container{}
   354  
   355  	if entities := daemon.containerGraph.List("/", -1); entities != nil {
   356  		for _, p := range entities.Paths() {
   357  			if !debug {
   358  				fmt.Print(".")
   359  			}
   360  
   361  			e := entities[p]
   362  
   363  			if container, ok := containers[e.ID()]; ok {
   364  				if err := daemon.register(container, false); err != nil {
   365  					log.Debugf("Failed to register container %s: %s", container.ID, err)
   366  				}
   367  
   368  				registeredContainers = append(registeredContainers, container)
   369  
   370  				// delete from the map so that a new name is not automatically generated
   371  				delete(containers, e.ID())
   372  			}
   373  		}
   374  	}
   375  
   376  	// Any containers that are left over do not exist in the graph
   377  	for _, container := range containers {
   378  		// Try to set the default name for a container if it exists prior to links
   379  		container.Name, err = daemon.generateNewName(container.ID)
   380  		if err != nil {
   381  			log.Debugf("Setting default id - %s", err)
   382  		}
   383  
   384  		if err := daemon.register(container, false); err != nil {
   385  			log.Debugf("Failed to register container %s: %s", container.ID, err)
   386  		}
   387  
   388  		registeredContainers = append(registeredContainers, container)
   389  	}
   390  
   391  	// check the restart policy on the containers and restart any container with
   392  	// the restart policy of "always"
   393  	if daemon.config.AutoRestart {
   394  		log.Debugf("Restarting containers...")
   395  
   396  		for _, container := range registeredContainers {
   397  			if container.hostConfig.RestartPolicy.Name == "always" ||
   398  				(container.hostConfig.RestartPolicy.Name == "on-failure" && container.ExitCode != 0) {
   399  				log.Debugf("Starting container %s", container.ID)
   400  
   401  				if err := container.Start(); err != nil {
   402  					log.Debugf("Failed to start container %s: %s", container.ID, err)
   403  				}
   404  			}
   405  		}
   406  	}
   407  
   408  	if !debug {
   409  		fmt.Println()
   410  		log.Infof("Loading containers: done.")
   411  	}
   412  
   413  	return nil
   414  }
   415  
   416  // set up the watch on the host's /etc/resolv.conf so that we can update container's
   417  // live resolv.conf when the network changes on the host
   418  func (daemon *Daemon) setupResolvconfWatcher() error {
   419  
   420  	watcher, err := fsnotify.NewWatcher()
   421  	if err != nil {
   422  		return err
   423  	}
   424  
   425  	//this goroutine listens for the events on the watch we add
   426  	//on the resolv.conf file on the host
   427  	go func() {
   428  		for {
   429  			select {
   430  			case event := <-watcher.Events:
   431  				if event.Op&fsnotify.Write == fsnotify.Write {
   432  					// verify a real change happened before we go further--a file write may have happened
   433  					// without an actual change to the file
   434  					updatedResolvConf, newResolvConfHash, err := resolvconf.GetIfChanged()
   435  					if err != nil {
   436  						log.Debugf("Error retrieving updated host resolv.conf: %v", err)
   437  					} else if updatedResolvConf != nil {
   438  						// because the new host resolv.conf might have localhost nameservers..
   439  						updatedResolvConf, modified := resolvconf.FilterResolvDns(updatedResolvConf, daemon.config.EnableIPv6)
   440  						if modified {
   441  							// changes have occurred during localhost cleanup: generate an updated hash
   442  							newHash, err := utils.HashData(bytes.NewReader(updatedResolvConf))
   443  							if err != nil {
   444  								log.Debugf("Error generating hash of new resolv.conf: %v", err)
   445  							} else {
   446  								newResolvConfHash = newHash
   447  							}
   448  						}
   449  						log.Debugf("host network resolv.conf changed--walking container list for updates")
   450  						contList := daemon.containers.List()
   451  						for _, container := range contList {
   452  							if err := container.updateResolvConf(updatedResolvConf, newResolvConfHash); err != nil {
   453  								log.Debugf("Error on resolv.conf update check for container ID: %s: %v", container.ID, err)
   454  							}
   455  						}
   456  					}
   457  				}
   458  			case err := <-watcher.Errors:
   459  				log.Debugf("host resolv.conf notify error: %v", err)
   460  			}
   461  		}
   462  	}()
   463  
   464  	if err := watcher.Add("/etc/resolv.conf"); err != nil {
   465  		return err
   466  	}
   467  	return nil
   468  }
   469  
   470  func (daemon *Daemon) checkDeprecatedExpose(config *runconfig.Config) bool {
   471  	if config != nil {
   472  		if config.PortSpecs != nil {
   473  			for _, p := range config.PortSpecs {
   474  				if strings.Contains(p, ":") {
   475  					return true
   476  				}
   477  			}
   478  		}
   479  	}
   480  	return false
   481  }
   482  
   483  func (daemon *Daemon) mergeAndVerifyConfig(config *runconfig.Config, img *image.Image) ([]string, error) {
   484  	warnings := []string{}
   485  	if (img != nil && daemon.checkDeprecatedExpose(img.Config)) || daemon.checkDeprecatedExpose(config) {
   486  		warnings = append(warnings, "The mapping to public ports on your host via Dockerfile EXPOSE (host:port:port) has been deprecated. Use -p to publish the ports.")
   487  	}
   488  	if img != nil && img.Config != nil {
   489  		if err := runconfig.Merge(config, img.Config); err != nil {
   490  			return nil, err
   491  		}
   492  	}
   493  	if len(config.Entrypoint) == 0 && len(config.Cmd) == 0 {
   494  		return nil, fmt.Errorf("No command specified")
   495  	}
   496  	return warnings, nil
   497  }
   498  
   499  func (daemon *Daemon) generateIdAndName(name string) (string, string, error) {
   500  	var (
   501  		err error
   502  		id  = utils.GenerateRandomID()
   503  	)
   504  
   505  	if name == "" {
   506  		if name, err = daemon.generateNewName(id); err != nil {
   507  			return "", "", err
   508  		}
   509  		return id, name, nil
   510  	}
   511  
   512  	if name, err = daemon.reserveName(id, name); err != nil {
   513  		return "", "", err
   514  	}
   515  
   516  	return id, name, nil
   517  }
   518  
   519  func (daemon *Daemon) reserveName(id, name string) (string, error) {
   520  	if !validContainerNamePattern.MatchString(name) {
   521  		return "", fmt.Errorf("Invalid container name (%s), only %s are allowed", name, validContainerNameChars)
   522  	}
   523  
   524  	if name[0] != '/' {
   525  		name = "/" + name
   526  	}
   527  
   528  	if _, err := daemon.containerGraph.Set(name, id); err != nil {
   529  		if !graphdb.IsNonUniqueNameError(err) {
   530  			return "", err
   531  		}
   532  
   533  		conflictingContainer, err := daemon.GetByName(name)
   534  		if err != nil {
   535  			if strings.Contains(err.Error(), "Could not find entity") {
   536  				return "", err
   537  			}
   538  
   539  			// Remove name and continue starting the container
   540  			if err := daemon.containerGraph.Delete(name); err != nil {
   541  				return "", err
   542  			}
   543  		} else {
   544  			nameAsKnownByUser := strings.TrimPrefix(name, "/")
   545  			return "", fmt.Errorf(
   546  				"Conflict. The name %q is already in use by container %s. You have to delete (or rename) that container to be able to reuse that name.", nameAsKnownByUser,
   547  				utils.TruncateID(conflictingContainer.ID))
   548  		}
   549  	}
   550  	return name, nil
   551  }
   552  
   553  func (daemon *Daemon) generateNewName(id string) (string, error) {
   554  	var name string
   555  	for i := 0; i < 6; i++ {
   556  		name = namesgenerator.GetRandomName(i)
   557  		if name[0] != '/' {
   558  			name = "/" + name
   559  		}
   560  
   561  		if _, err := daemon.containerGraph.Set(name, id); err != nil {
   562  			if !graphdb.IsNonUniqueNameError(err) {
   563  				return "", err
   564  			}
   565  			continue
   566  		}
   567  		return name, nil
   568  	}
   569  
   570  	name = "/" + utils.TruncateID(id)
   571  	if _, err := daemon.containerGraph.Set(name, id); err != nil {
   572  		return "", err
   573  	}
   574  	return name, nil
   575  }
   576  
   577  func (daemon *Daemon) generateHostname(id string, config *runconfig.Config) {
   578  	// Generate default hostname
   579  	// FIXME: the lxc template no longer needs to set a default hostname
   580  	if config.Hostname == "" {
   581  		config.Hostname = id[:12]
   582  	}
   583  }
   584  
   585  func (daemon *Daemon) getEntrypointAndArgs(configEntrypoint, configCmd []string) (string, []string) {
   586  	var (
   587  		entrypoint string
   588  		args       []string
   589  	)
   590  	if len(configEntrypoint) != 0 {
   591  		entrypoint = configEntrypoint[0]
   592  		args = append(configEntrypoint[1:], configCmd...)
   593  	} else {
   594  		entrypoint = configCmd[0]
   595  		args = configCmd[1:]
   596  	}
   597  	return entrypoint, args
   598  }
   599  
   600  func parseSecurityOpt(container *Container, config *runconfig.HostConfig) error {
   601  	var (
   602  		labelOpts []string
   603  		err       error
   604  	)
   605  
   606  	for _, opt := range config.SecurityOpt {
   607  		con := strings.SplitN(opt, ":", 2)
   608  		if len(con) == 1 {
   609  			return fmt.Errorf("Invalid --security-opt: %q", opt)
   610  		}
   611  		switch con[0] {
   612  		case "label":
   613  			labelOpts = append(labelOpts, con[1])
   614  		case "apparmor":
   615  			container.AppArmorProfile = con[1]
   616  		default:
   617  			return fmt.Errorf("Invalid --security-opt: %q", opt)
   618  		}
   619  	}
   620  
   621  	container.ProcessLabel, container.MountLabel, err = label.InitLabels(labelOpts)
   622  	return err
   623  }
   624  
   625  func (daemon *Daemon) newContainer(name string, config *runconfig.Config, imgID string) (*Container, error) {
   626  	var (
   627  		id  string
   628  		err error
   629  	)
   630  	id, name, err = daemon.generateIdAndName(name)
   631  	if err != nil {
   632  		return nil, err
   633  	}
   634  
   635  	daemon.generateHostname(id, config)
   636  	entrypoint, args := daemon.getEntrypointAndArgs(config.Entrypoint, config.Cmd)
   637  
   638  	container := &Container{
   639  		// FIXME: we should generate the ID here instead of receiving it as an argument
   640  		ID:              id,
   641  		Created:         time.Now().UTC(),
   642  		Path:            entrypoint,
   643  		Args:            args, //FIXME: de-duplicate from config
   644  		Config:          config,
   645  		hostConfig:      &runconfig.HostConfig{},
   646  		ImageID:         imgID,
   647  		NetworkSettings: &NetworkSettings{},
   648  		Name:            name,
   649  		Driver:          daemon.driver.String(),
   650  		ExecDriver:      daemon.execDriver.Name(),
   651  		State:           NewState(),
   652  		execCommands:    newExecStore(),
   653  	}
   654  	container.root = daemon.containerRoot(container.ID)
   655  	return container, err
   656  }
   657  
   658  func (daemon *Daemon) createRootfs(container *Container) error {
   659  	// Step 1: create the container directory.
   660  	// This doubles as a barrier to avoid race conditions.
   661  	if err := os.Mkdir(container.root, 0700); err != nil {
   662  		return err
   663  	}
   664  	initID := fmt.Sprintf("%s-init", container.ID)
   665  	if err := daemon.driver.Create(initID, container.ImageID); err != nil {
   666  		return err
   667  	}
   668  	initPath, err := daemon.driver.Get(initID, "")
   669  	if err != nil {
   670  		return err
   671  	}
   672  	defer daemon.driver.Put(initID)
   673  
   674  	if err := graph.SetupInitLayer(initPath); err != nil {
   675  		return err
   676  	}
   677  
   678  	if err := daemon.driver.Create(container.ID, initID); err != nil {
   679  		return err
   680  	}
   681  	return nil
   682  }
   683  
   684  func GetFullContainerName(name string) (string, error) {
   685  	if name == "" {
   686  		return "", fmt.Errorf("Container name cannot be empty")
   687  	}
   688  	if name[0] != '/' {
   689  		name = "/" + name
   690  	}
   691  	return name, nil
   692  }
   693  
   694  func (daemon *Daemon) GetByName(name string) (*Container, error) {
   695  	fullName, err := GetFullContainerName(name)
   696  	if err != nil {
   697  		return nil, err
   698  	}
   699  	entity := daemon.containerGraph.Get(fullName)
   700  	if entity == nil {
   701  		return nil, fmt.Errorf("Could not find entity for %s", name)
   702  	}
   703  	e := daemon.containers.Get(entity.ID())
   704  	if e == nil {
   705  		return nil, fmt.Errorf("Could not find container for entity id %s", entity.ID())
   706  	}
   707  	return e, nil
   708  }
   709  
   710  func (daemon *Daemon) Children(name string) (map[string]*Container, error) {
   711  	name, err := GetFullContainerName(name)
   712  	if err != nil {
   713  		return nil, err
   714  	}
   715  	children := make(map[string]*Container)
   716  
   717  	err = daemon.containerGraph.Walk(name, func(p string, e *graphdb.Entity) error {
   718  		c := daemon.Get(e.ID())
   719  		if c == nil {
   720  			return fmt.Errorf("Could not get container for name %s and id %s", e.ID(), p)
   721  		}
   722  		children[p] = c
   723  		return nil
   724  	}, 0)
   725  
   726  	if err != nil {
   727  		return nil, err
   728  	}
   729  	return children, nil
   730  }
   731  
   732  func (daemon *Daemon) Parents(name string) ([]string, error) {
   733  	name, err := GetFullContainerName(name)
   734  	if err != nil {
   735  		return nil, err
   736  	}
   737  
   738  	return daemon.containerGraph.Parents(name)
   739  }
   740  
   741  func (daemon *Daemon) RegisterLink(parent, child *Container, alias string) error {
   742  	fullName := path.Join(parent.Name, alias)
   743  	if !daemon.containerGraph.Exists(fullName) {
   744  		_, err := daemon.containerGraph.Set(fullName, child.ID)
   745  		return err
   746  	}
   747  	return nil
   748  }
   749  
   750  func (daemon *Daemon) RegisterLinks(container *Container, hostConfig *runconfig.HostConfig) error {
   751  	if hostConfig != nil && hostConfig.Links != nil {
   752  		for _, l := range hostConfig.Links {
   753  			parts, err := parsers.PartParser("name:alias", l)
   754  			if err != nil {
   755  				return err
   756  			}
   757  			child := daemon.Get(parts["name"])
   758  			if child == nil {
   759  				return fmt.Errorf("Could not get container for %s", parts["name"])
   760  			}
   761  			if child.hostConfig.NetworkMode.IsHost() {
   762  				return runconfig.ErrConflictHostNetworkAndLinks
   763  			}
   764  			if err := daemon.RegisterLink(container, child, parts["alias"]); err != nil {
   765  				return err
   766  			}
   767  		}
   768  
   769  		// After we load all the links into the daemon
   770  		// set them to nil on the hostconfig
   771  		hostConfig.Links = nil
   772  		if err := container.WriteHostConfig(); err != nil {
   773  			return err
   774  		}
   775  	}
   776  	return nil
   777  }
   778  
   779  // FIXME: harmonize with NewGraph()
   780  func NewDaemon(config *Config, eng *engine.Engine) (*Daemon, error) {
   781  	daemon, err := NewDaemonFromDirectory(config, eng)
   782  	if err != nil {
   783  		return nil, err
   784  	}
   785  	return daemon, nil
   786  }
   787  
   788  func NewDaemonFromDirectory(config *Config, eng *engine.Engine) (*Daemon, error) {
   789  	if config.Mtu == 0 {
   790  		config.Mtu = getDefaultNetworkMtu()
   791  	}
   792  	// Check for mutually incompatible config options
   793  	if config.BridgeIface != "" && config.BridgeIP != "" {
   794  		return nil, fmt.Errorf("You specified -b & --bip, mutually exclusive options. Please specify only one.")
   795  	}
   796  	if !config.EnableIptables && !config.InterContainerCommunication {
   797  		return nil, fmt.Errorf("You specified --iptables=false with --icc=false. ICC uses iptables to function. Please set --icc or --iptables to true.")
   798  	}
   799  	if !config.EnableIptables && config.EnableIpMasq {
   800  		config.EnableIpMasq = false
   801  	}
   802  	config.DisableNetwork = config.BridgeIface == disableNetworkBridge
   803  
   804  	// Claim the pidfile first, to avoid any and all unexpected race conditions.
   805  	// Some of the init doesn't need a pidfile lock - but let's not try to be smart.
   806  	if config.Pidfile != "" {
   807  		if err := utils.CreatePidFile(config.Pidfile); err != nil {
   808  			return nil, err
   809  		}
   810  		eng.OnShutdown(func() {
   811  			// Always release the pidfile last, just in case
   812  			utils.RemovePidFile(config.Pidfile)
   813  		})
   814  	}
   815  
   816  	// Check that the system is supported and we have sufficient privileges
   817  	if runtime.GOOS != "linux" {
   818  		return nil, fmt.Errorf("The Docker daemon is only supported on linux")
   819  	}
   820  	if os.Geteuid() != 0 {
   821  		return nil, fmt.Errorf("The Docker daemon needs to be run as root")
   822  	}
   823  	if err := checkKernel(); err != nil {
   824  		return nil, err
   825  	}
   826  
   827  	// set up the TempDir to use a canonical path
   828  	tmp, err := utils.TempDir(config.Root)
   829  	if err != nil {
   830  		return nil, fmt.Errorf("Unable to get the TempDir under %s: %s", config.Root, err)
   831  	}
   832  	realTmp, err := utils.ReadSymlinkedDirectory(tmp)
   833  	if err != nil {
   834  		return nil, fmt.Errorf("Unable to get the full path to the TempDir (%s): %s", tmp, err)
   835  	}
   836  	os.Setenv("TMPDIR", realTmp)
   837  	if !config.EnableSelinuxSupport {
   838  		selinuxSetDisabled()
   839  	}
   840  
   841  	// get the canonical path to the Docker root directory
   842  	var realRoot string
   843  	if _, err := os.Stat(config.Root); err != nil && os.IsNotExist(err) {
   844  		realRoot = config.Root
   845  	} else {
   846  		realRoot, err = utils.ReadSymlinkedDirectory(config.Root)
   847  		if err != nil {
   848  			return nil, fmt.Errorf("Unable to get the full path to root (%s): %s", config.Root, err)
   849  		}
   850  	}
   851  	config.Root = realRoot
   852  	// Create the root directory if it doesn't exists
   853  	if err := os.MkdirAll(config.Root, 0700); err != nil && !os.IsExist(err) {
   854  		return nil, err
   855  	}
   856  
   857  	// Set the default driver
   858  	graphdriver.DefaultDriver = config.GraphDriver
   859  
   860  	// Load storage driver
   861  	driver, err := graphdriver.New(config.Root, config.GraphOptions)
   862  	if err != nil {
   863  		return nil, err
   864  	}
   865  	log.Debugf("Using graph driver %s", driver)
   866  
   867  	// As Docker on btrfs and SELinux are incompatible at present, error on both being enabled
   868  	if selinuxEnabled() && config.EnableSelinuxSupport && driver.String() == "btrfs" {
   869  		return nil, fmt.Errorf("SELinux is not supported with the BTRFS graph driver!")
   870  	}
   871  
   872  	daemonRepo := path.Join(config.Root, "containers")
   873  
   874  	if err := os.MkdirAll(daemonRepo, 0700); err != nil && !os.IsExist(err) {
   875  		return nil, err
   876  	}
   877  
   878  	// Migrate the container if it is aufs and aufs is enabled
   879  	if err = migrateIfAufs(driver, config.Root); err != nil {
   880  		return nil, err
   881  	}
   882  
   883  	log.Debugf("Creating images graph")
   884  	g, err := graph.NewGraph(path.Join(config.Root, "graph"), driver)
   885  	if err != nil {
   886  		return nil, err
   887  	}
   888  
   889  	volumesDriver, err := graphdriver.GetDriver("vfs", config.Root, config.GraphOptions)
   890  	if err != nil {
   891  		return nil, err
   892  	}
   893  
   894  	volumes, err := volumes.NewRepository(filepath.Join(config.Root, "volumes"), volumesDriver)
   895  	if err != nil {
   896  		return nil, err
   897  	}
   898  
   899  	trustKey, err := api.LoadOrCreateTrustKey(config.TrustKeyPath)
   900  	if err != nil {
   901  		return nil, err
   902  	}
   903  
   904  	log.Debugf("Creating repository list")
   905  	repositories, err := graph.NewTagStore(path.Join(config.Root, "repositories-"+driver.String()), g, trustKey)
   906  	if err != nil {
   907  		return nil, fmt.Errorf("Couldn't create Tag store: %s", err)
   908  	}
   909  
   910  	trustDir := path.Join(config.Root, "trust")
   911  	if err := os.MkdirAll(trustDir, 0700); err != nil && !os.IsExist(err) {
   912  		return nil, err
   913  	}
   914  	t, err := trust.NewTrustStore(trustDir)
   915  	if err != nil {
   916  		return nil, fmt.Errorf("could not create trust store: %s", err)
   917  	}
   918  
   919  	if !config.DisableNetwork {
   920  		job := eng.Job("init_networkdriver")
   921  
   922  		job.SetenvBool("EnableIptables", config.EnableIptables)
   923  		job.SetenvBool("InterContainerCommunication", config.InterContainerCommunication)
   924  		job.SetenvBool("EnableIpForward", config.EnableIpForward)
   925  		job.SetenvBool("EnableIpMasq", config.EnableIpMasq)
   926  		job.SetenvBool("EnableIPv6", config.EnableIPv6)
   927  		job.Setenv("BridgeIface", config.BridgeIface)
   928  		job.Setenv("BridgeIP", config.BridgeIP)
   929  		job.Setenv("FixedCIDR", config.FixedCIDR)
   930  		job.Setenv("FixedCIDRv6", config.FixedCIDRv6)
   931  		job.Setenv("DefaultBindingIP", config.DefaultIp.String())
   932  
   933  		if err := job.Run(); err != nil {
   934  			return nil, err
   935  		}
   936  	}
   937  
   938  	graphdbPath := path.Join(config.Root, "linkgraph.db")
   939  	graph, err := graphdb.NewSqliteConn(graphdbPath)
   940  	if err != nil {
   941  		return nil, err
   942  	}
   943  
   944  	localCopy := path.Join(config.Root, "init", fmt.Sprintf("dockerinit-%s", dockerversion.VERSION))
   945  	sysInitPath := utils.DockerInitPath(localCopy)
   946  	if sysInitPath == "" {
   947  		return nil, fmt.Errorf("Could not locate dockerinit: This usually means docker was built incorrectly. See http://docs.docker.com/contributing/devenvironment for official build instructions.")
   948  	}
   949  
   950  	if sysInitPath != localCopy {
   951  		// When we find a suitable dockerinit binary (even if it's our local binary), we copy it into config.Root at localCopy for future use (so that the original can go away without that being a problem, for example during a package upgrade).
   952  		if err := os.Mkdir(path.Dir(localCopy), 0700); err != nil && !os.IsExist(err) {
   953  			return nil, err
   954  		}
   955  		if _, err := utils.CopyFile(sysInitPath, localCopy); err != nil {
   956  			return nil, err
   957  		}
   958  		if err := os.Chmod(localCopy, 0700); err != nil {
   959  			return nil, err
   960  		}
   961  		sysInitPath = localCopy
   962  	}
   963  
   964  	sysInfo := sysinfo.New(false)
   965  	ed, err := execdrivers.NewDriver(config.ExecDriver, config.Root, sysInitPath, sysInfo)
   966  	if err != nil {
   967  		return nil, err
   968  	}
   969  
   970  	daemon := &Daemon{
   971  		ID:             trustKey.PublicKey().KeyID(),
   972  		repository:     daemonRepo,
   973  		containers:     &contStore{s: make(map[string]*Container)},
   974  		execCommands:   newExecStore(),
   975  		graph:          g,
   976  		repositories:   repositories,
   977  		idIndex:        truncindex.NewTruncIndex([]string{}),
   978  		sysInfo:        sysInfo,
   979  		volumes:        volumes,
   980  		config:         config,
   981  		containerGraph: graph,
   982  		driver:         driver,
   983  		sysInitPath:    sysInitPath,
   984  		execDriver:     ed,
   985  		eng:            eng,
   986  		trustStore:     t,
   987  		statsCollector: newStatsCollector(1 * time.Second),
   988  	}
   989  	if err := daemon.restore(); err != nil {
   990  		return nil, err
   991  	}
   992  
   993  	// set up filesystem watch on resolv.conf for network changes
   994  	if err := daemon.setupResolvconfWatcher(); err != nil {
   995  		return nil, err
   996  	}
   997  
   998  	// Setup shutdown handlers
   999  	// FIXME: can these shutdown handlers be registered closer to their source?
  1000  	eng.OnShutdown(func() {
  1001  		// FIXME: if these cleanup steps can be called concurrently, register
  1002  		// them as separate handlers to speed up total shutdown time
  1003  		if err := daemon.shutdown(); err != nil {
  1004  			log.Errorf("daemon.shutdown(): %s", err)
  1005  		}
  1006  		if err := portallocator.ReleaseAll(); err != nil {
  1007  			log.Errorf("portallocator.ReleaseAll(): %s", err)
  1008  		}
  1009  		if err := daemon.driver.Cleanup(); err != nil {
  1010  			log.Errorf("daemon.driver.Cleanup(): %s", err.Error())
  1011  		}
  1012  		if err := daemon.containerGraph.Close(); err != nil {
  1013  			log.Errorf("daemon.containerGraph.Close(): %s", err.Error())
  1014  		}
  1015  	})
  1016  
  1017  	return daemon, nil
  1018  }
  1019  
  1020  func (daemon *Daemon) shutdown() error {
  1021  	group := sync.WaitGroup{}
  1022  	log.Debugf("starting clean shutdown of all containers...")
  1023  	for _, container := range daemon.List() {
  1024  		c := container
  1025  		if c.IsRunning() {
  1026  			log.Debugf("stopping %s", c.ID)
  1027  			group.Add(1)
  1028  
  1029  			go func() {
  1030  				defer group.Done()
  1031  				if err := c.KillSig(15); err != nil {
  1032  					log.Debugf("kill 15 error for %s - %s", c.ID, err)
  1033  				}
  1034  				c.WaitStop(-1 * time.Second)
  1035  				log.Debugf("container stopped %s", c.ID)
  1036  			}()
  1037  		}
  1038  	}
  1039  	group.Wait()
  1040  
  1041  	return nil
  1042  }
  1043  
  1044  func (daemon *Daemon) Mount(container *Container) error {
  1045  	dir, err := daemon.driver.Get(container.ID, container.GetMountLabel())
  1046  	if err != nil {
  1047  		return fmt.Errorf("Error getting container %s from driver %s: %s", container.ID, daemon.driver, err)
  1048  	}
  1049  	if container.basefs == "" {
  1050  		container.basefs = dir
  1051  	} else if container.basefs != dir {
  1052  		daemon.driver.Put(container.ID)
  1053  		return fmt.Errorf("Error: driver %s is returning inconsistent paths for container %s ('%s' then '%s')",
  1054  			daemon.driver, container.ID, container.basefs, dir)
  1055  	}
  1056  	return nil
  1057  }
  1058  
  1059  func (daemon *Daemon) Unmount(container *Container) error {
  1060  	daemon.driver.Put(container.ID)
  1061  	return nil
  1062  }
  1063  
  1064  func (daemon *Daemon) Changes(container *Container) ([]archive.Change, error) {
  1065  	initID := fmt.Sprintf("%s-init", container.ID)
  1066  	return daemon.driver.Changes(container.ID, initID)
  1067  }
  1068  
  1069  func (daemon *Daemon) Diff(container *Container) (archive.Archive, error) {
  1070  	initID := fmt.Sprintf("%s-init", container.ID)
  1071  	return daemon.driver.Diff(container.ID, initID)
  1072  }
  1073  
  1074  func (daemon *Daemon) Run(c *Container, pipes *execdriver.Pipes, startCallback execdriver.StartCallback) (execdriver.ExitStatus, error) {
  1075  	return daemon.execDriver.Run(c.command, pipes, startCallback)
  1076  }
  1077  
  1078  func (daemon *Daemon) Pause(c *Container) error {
  1079  	if err := daemon.execDriver.Pause(c.command); err != nil {
  1080  		return err
  1081  	}
  1082  	c.SetPaused()
  1083  	return nil
  1084  }
  1085  
  1086  func (daemon *Daemon) Unpause(c *Container) error {
  1087  	if err := daemon.execDriver.Unpause(c.command); err != nil {
  1088  		return err
  1089  	}
  1090  	c.SetUnpaused()
  1091  	return nil
  1092  }
  1093  
  1094  func (daemon *Daemon) Kill(c *Container, sig int) error {
  1095  	return daemon.execDriver.Kill(c.command, sig)
  1096  }
  1097  
  1098  func (daemon *Daemon) Stats(c *Container) (*execdriver.ResourceStats, error) {
  1099  	return daemon.execDriver.Stats(c.ID)
  1100  }
  1101  
  1102  func (daemon *Daemon) SubscribeToContainerStats(name string) (chan interface{}, error) {
  1103  	c := daemon.Get(name)
  1104  	if c == nil {
  1105  		return nil, fmt.Errorf("no such container")
  1106  	}
  1107  	ch := daemon.statsCollector.collect(c)
  1108  	return ch, nil
  1109  }
  1110  
  1111  func (daemon *Daemon) UnsubscribeToContainerStats(name string, ch chan interface{}) error {
  1112  	c := daemon.Get(name)
  1113  	if c == nil {
  1114  		return fmt.Errorf("no such container")
  1115  	}
  1116  	daemon.statsCollector.unsubscribe(c, ch)
  1117  	return nil
  1118  }
  1119  
  1120  // Nuke kills all containers then removes all content
  1121  // from the content root, including images, volumes and
  1122  // container filesystems.
  1123  // Again: this will remove your entire docker daemon!
  1124  // FIXME: this is deprecated, and only used in legacy
  1125  // tests. Please remove.
  1126  func (daemon *Daemon) Nuke() error {
  1127  	var wg sync.WaitGroup
  1128  	for _, container := range daemon.List() {
  1129  		wg.Add(1)
  1130  		go func(c *Container) {
  1131  			c.Kill()
  1132  			wg.Done()
  1133  		}(container)
  1134  	}
  1135  	wg.Wait()
  1136  
  1137  	return os.RemoveAll(daemon.config.Root)
  1138  }
  1139  
  1140  // FIXME: this is a convenience function for integration tests
  1141  // which need direct access to daemon.graph.
  1142  // Once the tests switch to using engine and jobs, this method
  1143  // can go away.
  1144  func (daemon *Daemon) Graph() *graph.Graph {
  1145  	return daemon.graph
  1146  }
  1147  
  1148  func (daemon *Daemon) Repositories() *graph.TagStore {
  1149  	return daemon.repositories
  1150  }
  1151  
  1152  func (daemon *Daemon) Config() *Config {
  1153  	return daemon.config
  1154  }
  1155  
  1156  func (daemon *Daemon) SystemConfig() *sysinfo.SysInfo {
  1157  	return daemon.sysInfo
  1158  }
  1159  
  1160  func (daemon *Daemon) SystemInitPath() string {
  1161  	return daemon.sysInitPath
  1162  }
  1163  
  1164  func (daemon *Daemon) GraphDriver() graphdriver.Driver {
  1165  	return daemon.driver
  1166  }
  1167  
  1168  func (daemon *Daemon) ExecutionDriver() execdriver.Driver {
  1169  	return daemon.execDriver
  1170  }
  1171  
  1172  func (daemon *Daemon) ContainerGraph() *graphdb.Database {
  1173  	return daemon.containerGraph
  1174  }
  1175  
  1176  func (daemon *Daemon) ImageGetCached(imgID string, config *runconfig.Config) (*image.Image, error) {
  1177  	// Retrieve all images
  1178  	images, err := daemon.Graph().Map()
  1179  	if err != nil {
  1180  		return nil, err
  1181  	}
  1182  
  1183  	// Store the tree in a map of map (map[parentId][childId])
  1184  	imageMap := make(map[string]map[string]struct{})
  1185  	for _, img := range images {
  1186  		if _, exists := imageMap[img.Parent]; !exists {
  1187  			imageMap[img.Parent] = make(map[string]struct{})
  1188  		}
  1189  		imageMap[img.Parent][img.ID] = struct{}{}
  1190  	}
  1191  
  1192  	// Loop on the children of the given image and check the config
  1193  	var match *image.Image
  1194  	for elem := range imageMap[imgID] {
  1195  		img, ok := images[elem]
  1196  		if !ok {
  1197  			return nil, fmt.Errorf("unable to find image %q", elem)
  1198  		}
  1199  		if runconfig.Compare(&img.ContainerConfig, config) {
  1200  			if match == nil || match.Created.Before(img.Created) {
  1201  				match = img
  1202  			}
  1203  		}
  1204  	}
  1205  	return match, nil
  1206  }
  1207  
  1208  func checkKernel() error {
  1209  	// Check for unsupported kernel versions
  1210  	// FIXME: it would be cleaner to not test for specific versions, but rather
  1211  	// test for specific functionalities.
  1212  	// Unfortunately we can't test for the feature "does not cause a kernel panic"
  1213  	// without actually causing a kernel panic, so we need this workaround until
  1214  	// the circumstances of pre-3.8 crashes are clearer.
  1215  	// For details see http://github.com/docker/docker/issues/407
  1216  	if k, err := kernel.GetKernelVersion(); err != nil {
  1217  		log.Infof("WARNING: %s", err)
  1218  	} else {
  1219  		if kernel.CompareKernelVersion(k, &kernel.KernelVersionInfo{Kernel: 3, Major: 8, Minor: 0}) < 0 {
  1220  			if os.Getenv("DOCKER_NOWARN_KERNEL_VERSION") == "" {
  1221  				log.Infof("WARNING: You are running linux kernel version %s, which might be unstable running docker. Please upgrade your kernel to 3.8.0.", k.String())
  1222  			}
  1223  		}
  1224  	}
  1225  	return nil
  1226  }