mirror of
https://github.com/aljazceru/kata-containers.git
synced 2025-12-26 10:34:24 +01:00
VMCache is a new function that creates VMs as caches before using it. It helps speed up new container creation. The function consists of a server and some clients communicating through Unix socket. The protocol is gRPC in protocols/cache/cache.proto. The VMCache server will create some VMs and cache them by factory cache. It will convert the VM to gRPC format and transport it when gets requestion from clients. Factory grpccache is the VMCache client. It will request gRPC format VM and convert it back to a VM. If VMCache function is enabled, kata-runtime will request VM from factory grpccache when it creates a new sandbox. VMCache has two options. vm_cache_number specifies the number of caches of VMCache: unspecified or == 0 --> VMCache is disabled > 0 --> will be set to the specified number vm_cache_endpoint specifies the address of the Unix socket. This commit just includes the core and the client of VMCache. Currently, VM cache still cannot work with VM templating and vsock. And just support qemu. Fixes: #52 Signed-off-by: Hui Zhu <teawater@hyper.sh>
267 lines
8.9 KiB
Go
267 lines
8.9 KiB
Go
// Copyright (c) 2016 Intel Corporation
|
|
//
|
|
// SPDX-License-Identifier: Apache-2.0
|
|
//
|
|
|
|
package virtcontainers
|
|
|
|
import (
|
|
"fmt"
|
|
"syscall"
|
|
"time"
|
|
|
|
"github.com/kata-containers/agent/protocols/grpc"
|
|
vcTypes "github.com/kata-containers/runtime/virtcontainers/pkg/types"
|
|
"github.com/kata-containers/runtime/virtcontainers/types"
|
|
"github.com/mitchellh/mapstructure"
|
|
specs "github.com/opencontainers/runtime-spec/specs-go"
|
|
"golang.org/x/net/context"
|
|
)
|
|
|
|
// AgentType describes the type of guest agent a Sandbox should run.
|
|
type AgentType string
|
|
|
|
// ProcessListOptions contains the options used to list running
|
|
// processes inside the container
|
|
type ProcessListOptions struct {
|
|
// Format describes the output format to list the running processes.
|
|
// Formats are unrelated to ps(1) formats, only two formats can be specified:
|
|
// "json" and "table"
|
|
Format string
|
|
|
|
// Args contains the list of arguments to run ps(1) command.
|
|
// If Args is empty the agent will use "-ef" as options to ps(1).
|
|
Args []string
|
|
}
|
|
|
|
// ProcessList represents the list of running processes inside the container
|
|
type ProcessList []byte
|
|
|
|
const (
|
|
// NoopAgentType is the No-Op agent.
|
|
NoopAgentType AgentType = "noop"
|
|
|
|
// HyperstartAgent is the Hyper hyperstart agent.
|
|
HyperstartAgent AgentType = "hyperstart"
|
|
|
|
// KataContainersAgent is the Kata Containers agent.
|
|
KataContainersAgent AgentType = "kata"
|
|
|
|
// SocketTypeVSOCK is a VSOCK socket type for talking to an agent.
|
|
SocketTypeVSOCK = "vsock"
|
|
|
|
// SocketTypeUNIX is a UNIX socket type for talking to an agent.
|
|
// It typically means the agent is living behind a host proxy.
|
|
SocketTypeUNIX = "unix"
|
|
)
|
|
|
|
// Set sets an agent type based on the input string.
|
|
func (agentType *AgentType) Set(value string) error {
|
|
switch value {
|
|
case "noop":
|
|
*agentType = NoopAgentType
|
|
return nil
|
|
case "hyperstart":
|
|
*agentType = HyperstartAgent
|
|
return nil
|
|
case "kata":
|
|
*agentType = KataContainersAgent
|
|
return nil
|
|
default:
|
|
return fmt.Errorf("Unknown agent type %s", value)
|
|
}
|
|
}
|
|
|
|
// String converts an agent type to a string.
|
|
func (agentType *AgentType) String() string {
|
|
switch *agentType {
|
|
case NoopAgentType:
|
|
return string(NoopAgentType)
|
|
case HyperstartAgent:
|
|
return string(HyperstartAgent)
|
|
case KataContainersAgent:
|
|
return string(KataContainersAgent)
|
|
default:
|
|
return ""
|
|
}
|
|
}
|
|
|
|
// newAgent returns an agent from an agent type.
|
|
func newAgent(agentType AgentType) agent {
|
|
switch agentType {
|
|
case NoopAgentType:
|
|
return &noopAgent{}
|
|
case HyperstartAgent:
|
|
return &hyper{}
|
|
case KataContainersAgent:
|
|
return &kataAgent{}
|
|
default:
|
|
return &noopAgent{}
|
|
}
|
|
}
|
|
|
|
// newAgentConfig returns an agent config from a generic SandboxConfig interface.
|
|
func newAgentConfig(agentType AgentType, agentConfig interface{}) interface{} {
|
|
switch agentType {
|
|
case NoopAgentType:
|
|
return nil
|
|
case HyperstartAgent:
|
|
var hyperConfig HyperConfig
|
|
err := mapstructure.Decode(agentConfig, &hyperConfig)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return hyperConfig
|
|
case KataContainersAgent:
|
|
var kataAgentConfig KataAgentConfig
|
|
err := mapstructure.Decode(agentConfig, &kataAgentConfig)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
return kataAgentConfig
|
|
default:
|
|
return nil
|
|
}
|
|
}
|
|
|
|
// agent is the virtcontainers agent interface.
|
|
// Agents are running in the guest VM and handling
|
|
// communications between the host and guest.
|
|
type agent interface {
|
|
// init is used to pass agent specific configuration to the agent implementation.
|
|
// agent implementations also will typically start listening for agent events from
|
|
// init().
|
|
// After init() is called, agent implementations should be initialized and ready
|
|
// to handle all other Agent interface methods.
|
|
init(ctx context.Context, sandbox *Sandbox, config interface{}) error
|
|
|
|
// capabilities should return a structure that specifies the capabilities
|
|
// supported by the agent.
|
|
capabilities() types.Capabilities
|
|
|
|
// check will check the agent liveness
|
|
check() error
|
|
|
|
// disconnect will disconnect the connection to the agent
|
|
disconnect() error
|
|
|
|
// start the proxy
|
|
startProxy(sandbox *Sandbox) error
|
|
|
|
// set to use an existing proxy
|
|
setProxy(sandbox *Sandbox, proxy proxy, pid int, url string) error
|
|
|
|
// set to use an existing proxy from Grpc
|
|
setProxyFromGrpc(proxy proxy, pid int, url string)
|
|
|
|
// get agent url
|
|
getAgentURL() (string, error)
|
|
|
|
// update the agent using some elements from another agent
|
|
reuseAgent(agent agent) error
|
|
|
|
// createSandbox will tell the agent to perform necessary setup for a Sandbox.
|
|
createSandbox(sandbox *Sandbox) error
|
|
|
|
// exec will tell the agent to run a command in an already running container.
|
|
exec(sandbox *Sandbox, c Container, cmd types.Cmd) (*Process, error)
|
|
|
|
// startSandbox will tell the agent to start all containers related to the Sandbox.
|
|
startSandbox(sandbox *Sandbox) error
|
|
|
|
// stopSandbox will tell the agent to stop all containers related to the Sandbox.
|
|
stopSandbox(sandbox *Sandbox) error
|
|
|
|
// createContainer will tell the agent to create a container related to a Sandbox.
|
|
createContainer(sandbox *Sandbox, c *Container) (*Process, error)
|
|
|
|
// startContainer will tell the agent to start a container related to a Sandbox.
|
|
startContainer(sandbox *Sandbox, c *Container) error
|
|
|
|
// stopContainer will tell the agent to stop a container related to a Sandbox.
|
|
stopContainer(sandbox *Sandbox, c Container) error
|
|
|
|
// signalProcess will tell the agent to send a signal to a
|
|
// container or a process related to a Sandbox. If all is true, all processes in
|
|
// the container will be sent the signal.
|
|
signalProcess(c *Container, processID string, signal syscall.Signal, all bool) error
|
|
|
|
// winsizeProcess will tell the agent to set a process' tty size
|
|
winsizeProcess(c *Container, processID string, height, width uint32) error
|
|
|
|
// writeProcessStdin will tell the agent to write a process stdin
|
|
writeProcessStdin(c *Container, ProcessID string, data []byte) (int, error)
|
|
|
|
// closeProcessStdin will tell the agent to close a process stdin
|
|
closeProcessStdin(c *Container, ProcessID string) error
|
|
|
|
// readProcessStdout will tell the agent to read a process stdout
|
|
readProcessStdout(c *Container, processID string, data []byte) (int, error)
|
|
|
|
// readProcessStderr will tell the agent to read a process stderr
|
|
readProcessStderr(c *Container, processID string, data []byte) (int, error)
|
|
|
|
// processListContainer will list the processes running inside the container
|
|
processListContainer(sandbox *Sandbox, c Container, options ProcessListOptions) (ProcessList, error)
|
|
|
|
// updateContainer will update the resources of a running container
|
|
updateContainer(sandbox *Sandbox, c Container, resources specs.LinuxResources) error
|
|
|
|
// waitProcess will wait for the exit code of a process
|
|
waitProcess(c *Container, processID string) (int32, error)
|
|
|
|
// onlineCPUMem will online CPUs and Memory inside the Sandbox.
|
|
// This function should be called after hot adding vCPUs or Memory.
|
|
// cpus specifies the number of CPUs that were added and the agent should online
|
|
// cpuOnly specifies that we should online cpu or online memory or both
|
|
onlineCPUMem(cpus uint32, cpuOnly bool) error
|
|
|
|
// statsContainer will tell the agent to get stats from a container related to a Sandbox
|
|
statsContainer(sandbox *Sandbox, c Container) (*ContainerStats, error)
|
|
|
|
// pauseContainer will pause a container
|
|
pauseContainer(sandbox *Sandbox, c Container) error
|
|
|
|
// resumeContainer will resume a paused container
|
|
resumeContainer(sandbox *Sandbox, c Container) error
|
|
|
|
// configure will update agent settings based on provided arguments
|
|
configure(h hypervisor, id, sharePath string, builtin bool, config interface{}) error
|
|
|
|
// configureFromGrpc will update agent settings based on provided arguments which from Grpc
|
|
configureFromGrpc(id string, builtin bool, config interface{}) error
|
|
|
|
// getVMPath will return the agent vm socket's directory path
|
|
getVMPath(id string) string
|
|
|
|
// getSharePath will return the agent 9pfs share mount path
|
|
getSharePath(id string) string
|
|
|
|
// reseedRNG will reseed the guest random number generator
|
|
reseedRNG(data []byte) error
|
|
|
|
// updateInterface will tell the agent to update a nic for an existed Sandbox.
|
|
updateInterface(inf *vcTypes.Interface) (*vcTypes.Interface, error)
|
|
|
|
// listInterfaces will tell the agent to list interfaces of an existed Sandbox
|
|
listInterfaces() ([]*vcTypes.Interface, error)
|
|
|
|
// updateRoutes will tell the agent to update route table for an existed Sandbox.
|
|
updateRoutes(routes []*vcTypes.Route) ([]*vcTypes.Route, error)
|
|
|
|
// listRoutes will tell the agent to list routes of an existed Sandbox
|
|
listRoutes() ([]*vcTypes.Route, error)
|
|
|
|
// getGuestDetails will tell the agent to get some information of guest
|
|
getGuestDetails(*grpc.GuestDetailsRequest) (*grpc.GuestDetailsResponse, error)
|
|
|
|
// setGuestDateTime asks the agent to set guest time to the provided one
|
|
setGuestDateTime(time.Time) error
|
|
|
|
// copyFile copies file from host to container's rootfs
|
|
copyFile(src, dst string) error
|
|
|
|
// cleanup removes all on disk information generated by the agent
|
|
cleanup(id string)
|
|
}
|