2016-11-22 22:23:01 +00:00
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2016-12-06 12:17:54 +00:00
|
|
|
"os"
|
2016-11-22 22:23:01 +00:00
|
|
|
|
|
|
|
"github.com/Sirupsen/logrus"
|
|
|
|
"github.com/kubernetes-incubator/cri-o/oci"
|
|
|
|
"golang.org/x/net/context"
|
|
|
|
pb "k8s.io/kubernetes/pkg/kubelet/api/v1alpha1/runtime"
|
|
|
|
)
|
|
|
|
|
|
|
|
// StopPodSandbox stops the sandbox. If there are any running containers in the
|
|
|
|
// sandbox, they should be force terminated.
|
|
|
|
func (s *Server) StopPodSandbox(ctx context.Context, req *pb.StopPodSandboxRequest) (*pb.StopPodSandboxResponse, error) {
|
|
|
|
logrus.Debugf("StopPodSandboxRequest %+v", req)
|
2016-10-18 14:48:33 +00:00
|
|
|
s.Update()
|
2017-02-03 14:41:28 +00:00
|
|
|
sb, err := s.getPodSandboxFromRequest(req.PodSandboxId)
|
2016-11-22 22:23:01 +00:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
podNamespace := ""
|
|
|
|
podInfraContainer := sb.infraContainer
|
|
|
|
netnsPath, err := podInfraContainer.NetNsPath()
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2016-12-06 12:17:54 +00:00
|
|
|
if _, err := os.Stat(netnsPath); err == nil {
|
|
|
|
if err2 := s.netPlugin.TearDownPod(netnsPath, podNamespace, sb.id, podInfraContainer.Name()); err2 != nil {
|
|
|
|
return nil, fmt.Errorf("failed to destroy network for container %s in sandbox %s: %v",
|
|
|
|
podInfraContainer.Name(), sb.id, err2)
|
|
|
|
}
|
|
|
|
} else if !os.IsNotExist(err) { // it's ok for netnsPath to *not* exist
|
|
|
|
return nil, fmt.Errorf("failed to stat netns path for container %s in sandbox %s before tearing down the network: %v",
|
2016-11-22 22:23:01 +00:00
|
|
|
podInfraContainer.Name(), sb.id, err)
|
|
|
|
}
|
|
|
|
|
2016-11-23 17:16:21 +00:00
|
|
|
// Close the sandbox networking namespace.
|
|
|
|
if err := sb.netNsRemove(); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
2016-11-22 22:23:01 +00:00
|
|
|
containers := sb.containers.List()
|
|
|
|
containers = append(containers, podInfraContainer)
|
|
|
|
|
|
|
|
for _, c := range containers {
|
2016-12-06 11:39:38 +00:00
|
|
|
if err := s.runtime.UpdateStatus(c); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2016-11-22 22:23:01 +00:00
|
|
|
cStatus := s.runtime.ContainerStatus(c)
|
|
|
|
if cStatus.Status != oci.ContainerStateStopped {
|
|
|
|
if err := s.runtime.StopContainer(c); err != nil {
|
2016-10-18 14:48:33 +00:00
|
|
|
return nil, fmt.Errorf("failed to stop container %s in pod sandbox %s: %v", c.Name(), sb.id, err)
|
2016-11-22 22:23:01 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
resp := &pb.StopPodSandboxResponse{}
|
|
|
|
logrus.Debugf("StopPodSandboxResponse: %+v", resp)
|
|
|
|
return resp, nil
|
|
|
|
}
|