c0333b102b
Use containers/storage to store images, pod sandboxes, and containers. A pod sandbox's infrastructure container has the same ID as the pod to which it belongs, and all containers also keep track of their pod's ID. The container configuration that we build using the data in a CreateContainerRequest is stored in the container's ContainerDirectory and ContainerRunDirectory. We catch SIGTERM and SIGINT, and when we receive either, we gracefully exit the grpc loop. If we also think that there aren't any container filesystems in use, we attempt to do a clean shutdown of the storage driver. The test harness now waits for ocid to exit before attempting to delete the storage root directory. Signed-off-by: Nalin Dahyabhai <nalin@redhat.com>
62 lines
1.9 KiB
Go
62 lines
1.9 KiB
Go
package server
|
|
|
|
import (
|
|
"fmt"
|
|
"os"
|
|
|
|
"github.com/Sirupsen/logrus"
|
|
"github.com/kubernetes-incubator/cri-o/oci"
|
|
"golang.org/x/net/context"
|
|
pb "k8s.io/kubernetes/pkg/kubelet/api/v1alpha1/runtime"
|
|
)
|
|
|
|
// StopPodSandbox stops the sandbox. If there are any running containers in the
|
|
// sandbox, they should be force terminated.
|
|
func (s *Server) StopPodSandbox(ctx context.Context, req *pb.StopPodSandboxRequest) (*pb.StopPodSandboxResponse, error) {
|
|
logrus.Debugf("StopPodSandboxRequest %+v", req)
|
|
s.Update()
|
|
sb, err := s.getPodSandboxFromRequest(req)
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
podNamespace := ""
|
|
podInfraContainer := sb.infraContainer
|
|
netnsPath, err := podInfraContainer.NetNsPath()
|
|
if err != nil {
|
|
return nil, err
|
|
}
|
|
if _, err := os.Stat(netnsPath); err == nil {
|
|
if err2 := s.netPlugin.TearDownPod(netnsPath, podNamespace, sb.id, podInfraContainer.Name()); err2 != nil {
|
|
return nil, fmt.Errorf("failed to destroy network for container %s in sandbox %s: %v",
|
|
podInfraContainer.Name(), sb.id, err2)
|
|
}
|
|
} else if !os.IsNotExist(err) { // it's ok for netnsPath to *not* exist
|
|
return nil, fmt.Errorf("failed to stat netns path for container %s in sandbox %s before tearing down the network: %v",
|
|
podInfraContainer.Name(), sb.id, err)
|
|
}
|
|
|
|
// Close the sandbox networking namespace.
|
|
if err := sb.netNsRemove(); err != nil {
|
|
return nil, err
|
|
}
|
|
|
|
containers := sb.containers.List()
|
|
containers = append(containers, podInfraContainer)
|
|
|
|
for _, c := range containers {
|
|
if err := s.runtime.UpdateStatus(c); err != nil {
|
|
return nil, err
|
|
}
|
|
cStatus := s.runtime.ContainerStatus(c)
|
|
if cStatus.Status != oci.ContainerStateStopped {
|
|
if err := s.runtime.StopContainer(c); err != nil {
|
|
return nil, fmt.Errorf("failed to stop container %s in pod sandbox %s: %v", c.Name(), sb.id, err)
|
|
}
|
|
}
|
|
}
|
|
|
|
resp := &pb.StopPodSandboxResponse{}
|
|
logrus.Debugf("StopPodSandboxResponse: %+v", resp)
|
|
return resp, nil
|
|
}
|