| package container |
| |
| import ( |
| "encoding/json" |
| "fmt" |
| "io" |
| "net/http" |
| "strconv" |
| "syscall" |
| "time" |
| |
| "github.com/Sirupsen/logrus" |
| "github.com/docker/docker/api/server/httputils" |
| "github.com/docker/docker/api/types" |
| "github.com/docker/docker/api/types/backend" |
| "github.com/docker/docker/api/types/container" |
| "github.com/docker/docker/api/types/filters" |
| "github.com/docker/docker/api/types/versions" |
| "github.com/docker/docker/pkg/ioutils" |
| "github.com/docker/docker/pkg/signal" |
| "golang.org/x/net/context" |
| "golang.org/x/net/websocket" |
| ) |
| |
| func (s *containerRouter) getContainersJSON(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| filter, err := filters.FromParam(r.Form.Get("filters")) |
| if err != nil { |
| return err |
| } |
| |
| config := &types.ContainerListOptions{ |
| All: httputils.BoolValue(r, "all"), |
| Size: httputils.BoolValue(r, "size"), |
| Since: r.Form.Get("since"), |
| Before: r.Form.Get("before"), |
| Filters: filter, |
| } |
| |
| if tmpLimit := r.Form.Get("limit"); tmpLimit != "" { |
| limit, err := strconv.Atoi(tmpLimit) |
| if err != nil { |
| return err |
| } |
| config.Limit = limit |
| } |
| |
| containers, err := s.backend.Containers(config) |
| if err != nil { |
| return err |
| } |
| |
| return httputils.WriteJSON(w, http.StatusOK, containers) |
| } |
| |
| func (s *containerRouter) getContainersStats(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| stream := httputils.BoolValueOrDefault(r, "stream", true) |
| if !stream { |
| w.Header().Set("Content-Type", "application/json") |
| } |
| |
| config := &backend.ContainerStatsConfig{ |
| Stream: stream, |
| OutStream: w, |
| Version: string(httputils.VersionFromContext(ctx)), |
| } |
| |
| return s.backend.ContainerStats(ctx, vars["name"], config) |
| } |
| |
| func (s *containerRouter) getContainersLogs(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| // Args are validated before the stream starts because when it starts we're |
| // sending HTTP 200 by writing an empty chunk of data to tell the client that |
| // daemon is going to stream. By sending this initial HTTP 200 we can't report |
| // any error after the stream starts (i.e. container not found, wrong parameters) |
| // with the appropriate status code. |
| stdout, stderr := httputils.BoolValue(r, "stdout"), httputils.BoolValue(r, "stderr") |
| if !(stdout || stderr) { |
| return fmt.Errorf("Bad parameters: you must choose at least one stream") |
| } |
| |
| containerName := vars["name"] |
| logsConfig := &backend.ContainerLogsConfig{ |
| ContainerLogsOptions: types.ContainerLogsOptions{ |
| Follow: httputils.BoolValue(r, "follow"), |
| Timestamps: httputils.BoolValue(r, "timestamps"), |
| Since: r.Form.Get("since"), |
| Tail: r.Form.Get("tail"), |
| ShowStdout: stdout, |
| ShowStderr: stderr, |
| Details: httputils.BoolValue(r, "details"), |
| }, |
| OutStream: w, |
| } |
| |
| chStarted := make(chan struct{}) |
| if err := s.backend.ContainerLogs(ctx, containerName, logsConfig, chStarted); err != nil { |
| select { |
| case <-chStarted: |
| // The client may be expecting all of the data we're sending to |
| // be multiplexed, so send it through OutStream, which will |
| // have been set up to handle that if needed. |
| fmt.Fprintf(logsConfig.OutStream, "Error running logs job: %v\n", err) |
| default: |
| return err |
| } |
| } |
| |
| return nil |
| } |
| |
| func (s *containerRouter) getContainersExport(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| return s.backend.ContainerExport(vars["name"], w) |
| } |
| |
| func (s *containerRouter) postContainersStart(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| // If contentLength is -1, we can assumed chunked encoding |
| // or more technically that the length is unknown |
| // https://golang.org/src/pkg/net/http/request.go#L139 |
| // net/http otherwise seems to swallow any headers related to chunked encoding |
| // including r.TransferEncoding |
| // allow a nil body for backwards compatibility |
| |
| version := httputils.VersionFromContext(ctx) |
| var hostConfig *container.HostConfig |
| // A non-nil json object is at least 7 characters. |
| if r.ContentLength > 7 || r.ContentLength == -1 { |
| if versions.GreaterThanOrEqualTo(version, "1.24") { |
| return validationError{fmt.Errorf("starting container with non-empty request body was deprecated since v1.10 and removed in v1.12")} |
| } |
| |
| if err := httputils.CheckForJSON(r); err != nil { |
| return err |
| } |
| |
| c, err := s.decoder.DecodeHostConfig(r.Body) |
| if err != nil { |
| return err |
| } |
| hostConfig = c |
| } |
| |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| checkpoint := r.Form.Get("checkpoint") |
| checkpointDir := r.Form.Get("checkpoint-dir") |
| if err := s.backend.ContainerStart(vars["name"], hostConfig, checkpoint, checkpointDir); err != nil { |
| return err |
| } |
| |
| w.WriteHeader(http.StatusNoContent) |
| return nil |
| } |
| |
| func (s *containerRouter) postContainersStop(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| var seconds *int |
| if tmpSeconds := r.Form.Get("t"); tmpSeconds != "" { |
| valSeconds, err := strconv.Atoi(tmpSeconds) |
| if err != nil { |
| return err |
| } |
| seconds = &valSeconds |
| } |
| |
| if err := s.backend.ContainerStop(vars["name"], seconds); err != nil { |
| return err |
| } |
| w.WriteHeader(http.StatusNoContent) |
| |
| return nil |
| } |
| |
| type errContainerIsRunning interface { |
| ContainerIsRunning() bool |
| } |
| |
| func (s *containerRouter) postContainersKill(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| var sig syscall.Signal |
| name := vars["name"] |
| |
| // If we have a signal, look at it. Otherwise, do nothing |
| if sigStr := r.Form.Get("signal"); sigStr != "" { |
| var err error |
| if sig, err = signal.ParseSignal(sigStr); err != nil { |
| return err |
| } |
| } |
| |
| if err := s.backend.ContainerKill(name, uint64(sig)); err != nil { |
| var isStopped bool |
| if e, ok := err.(errContainerIsRunning); ok { |
| isStopped = !e.ContainerIsRunning() |
| } |
| |
| // Return error that's not caused because the container is stopped. |
| // Return error if the container is not running and the api is >= 1.20 |
| // to keep backwards compatibility. |
| version := httputils.VersionFromContext(ctx) |
| if versions.GreaterThanOrEqualTo(version, "1.20") || !isStopped { |
| return fmt.Errorf("Cannot kill container %s: %v", name, err) |
| } |
| } |
| |
| w.WriteHeader(http.StatusNoContent) |
| return nil |
| } |
| |
| func (s *containerRouter) postContainersRestart(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| var seconds *int |
| if tmpSeconds := r.Form.Get("t"); tmpSeconds != "" { |
| valSeconds, err := strconv.Atoi(tmpSeconds) |
| if err != nil { |
| return err |
| } |
| seconds = &valSeconds |
| } |
| |
| if err := s.backend.ContainerRestart(vars["name"], seconds); err != nil { |
| return err |
| } |
| |
| w.WriteHeader(http.StatusNoContent) |
| |
| return nil |
| } |
| |
| func (s *containerRouter) postContainersPause(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| if err := s.backend.ContainerPause(vars["name"]); err != nil { |
| return err |
| } |
| |
| w.WriteHeader(http.StatusNoContent) |
| |
| return nil |
| } |
| |
| func (s *containerRouter) postContainersUnpause(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| if err := s.backend.ContainerUnpause(vars["name"]); err != nil { |
| return err |
| } |
| |
| w.WriteHeader(http.StatusNoContent) |
| |
| return nil |
| } |
| |
| func (s *containerRouter) postContainersWait(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| status, err := s.backend.ContainerWait(vars["name"], -1*time.Second) |
| if err != nil { |
| return err |
| } |
| |
| return httputils.WriteJSON(w, http.StatusOK, &container.ContainerWaitOKBody{ |
| StatusCode: int64(status), |
| }) |
| } |
| |
| func (s *containerRouter) getContainersChanges(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| changes, err := s.backend.ContainerChanges(vars["name"]) |
| if err != nil { |
| return err |
| } |
| |
| return httputils.WriteJSON(w, http.StatusOK, changes) |
| } |
| |
| func (s *containerRouter) getContainersTop(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| procList, err := s.backend.ContainerTop(vars["name"], r.Form.Get("ps_args")) |
| if err != nil { |
| return err |
| } |
| |
| return httputils.WriteJSON(w, http.StatusOK, procList) |
| } |
| |
| func (s *containerRouter) postContainerRename(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| name := vars["name"] |
| newName := r.Form.Get("name") |
| if err := s.backend.ContainerRename(name, newName); err != nil { |
| return err |
| } |
| w.WriteHeader(http.StatusNoContent) |
| return nil |
| } |
| |
| func (s *containerRouter) postContainerUpdate(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| if err := httputils.CheckForJSON(r); err != nil { |
| return err |
| } |
| |
| var updateConfig container.UpdateConfig |
| |
| decoder := json.NewDecoder(r.Body) |
| if err := decoder.Decode(&updateConfig); err != nil { |
| return err |
| } |
| |
| hostConfig := &container.HostConfig{ |
| Resources: updateConfig.Resources, |
| RestartPolicy: updateConfig.RestartPolicy, |
| } |
| |
| name := vars["name"] |
| resp, err := s.backend.ContainerUpdate(name, hostConfig) |
| if err != nil { |
| return err |
| } |
| |
| return httputils.WriteJSON(w, http.StatusOK, resp) |
| } |
| |
| func (s *containerRouter) postContainersCreate(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| if err := httputils.CheckForJSON(r); err != nil { |
| return err |
| } |
| |
| name := r.Form.Get("name") |
| |
| config, hostConfig, networkingConfig, err := s.decoder.DecodeConfig(r.Body) |
| if err != nil { |
| return err |
| } |
| version := httputils.VersionFromContext(ctx) |
| adjustCPUShares := versions.LessThan(version, "1.19") |
| |
| ccr, err := s.backend.ContainerCreate(types.ContainerCreateConfig{ |
| Name: name, |
| Config: config, |
| HostConfig: hostConfig, |
| NetworkingConfig: networkingConfig, |
| AdjustCPUShares: adjustCPUShares, |
| }) |
| if err != nil { |
| return err |
| } |
| |
| return httputils.WriteJSON(w, http.StatusCreated, ccr) |
| } |
| |
| func (s *containerRouter) deleteContainers(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| name := vars["name"] |
| config := &types.ContainerRmConfig{ |
| ForceRemove: httputils.BoolValue(r, "force"), |
| RemoveVolume: httputils.BoolValue(r, "v"), |
| RemoveLink: httputils.BoolValue(r, "link"), |
| } |
| |
| if err := s.backend.ContainerRm(name, config); err != nil { |
| return err |
| } |
| |
| w.WriteHeader(http.StatusNoContent) |
| |
| return nil |
| } |
| |
| func (s *containerRouter) postContainersResize(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| height, err := strconv.Atoi(r.Form.Get("h")) |
| if err != nil { |
| return err |
| } |
| width, err := strconv.Atoi(r.Form.Get("w")) |
| if err != nil { |
| return err |
| } |
| |
| return s.backend.ContainerResize(vars["name"], height, width) |
| } |
| |
| func (s *containerRouter) postContainersAttach(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| err := httputils.ParseForm(r) |
| if err != nil { |
| return err |
| } |
| containerName := vars["name"] |
| |
| _, upgrade := r.Header["Upgrade"] |
| detachKeys := r.FormValue("detachKeys") |
| |
| hijacker, ok := w.(http.Hijacker) |
| if !ok { |
| return fmt.Errorf("error attaching to container %s, hijack connection missing", containerName) |
| } |
| |
| setupStreams := func() (io.ReadCloser, io.Writer, io.Writer, error) { |
| conn, _, err := hijacker.Hijack() |
| if err != nil { |
| return nil, nil, nil, err |
| } |
| |
| // set raw mode |
| conn.Write([]byte{}) |
| |
| if upgrade { |
| fmt.Fprintf(conn, "HTTP/1.1 101 UPGRADED\r\nContent-Type: application/vnd.docker.raw-stream\r\nConnection: Upgrade\r\nUpgrade: tcp\r\n\r\n") |
| } else { |
| fmt.Fprintf(conn, "HTTP/1.1 200 OK\r\nContent-Type: application/vnd.docker.raw-stream\r\n\r\n") |
| } |
| |
| closer := func() error { |
| httputils.CloseStreams(conn) |
| return nil |
| } |
| return ioutils.NewReadCloserWrapper(conn, closer), conn, conn, nil |
| } |
| |
| attachConfig := &backend.ContainerAttachConfig{ |
| GetStreams: setupStreams, |
| UseStdin: httputils.BoolValue(r, "stdin"), |
| UseStdout: httputils.BoolValue(r, "stdout"), |
| UseStderr: httputils.BoolValue(r, "stderr"), |
| Logs: httputils.BoolValue(r, "logs"), |
| Stream: httputils.BoolValue(r, "stream"), |
| DetachKeys: detachKeys, |
| MuxStreams: true, |
| } |
| |
| if err = s.backend.ContainerAttach(containerName, attachConfig); err != nil { |
| logrus.Errorf("Handler for %s %s returned error: %v", r.Method, r.URL.Path, err) |
| // Remember to close stream if error happens |
| conn, _, errHijack := hijacker.Hijack() |
| if errHijack == nil { |
| statusCode := httputils.GetHTTPErrorStatusCode(err) |
| statusText := http.StatusText(statusCode) |
| fmt.Fprintf(conn, "HTTP/1.1 %d %s\r\nContent-Type: application/vnd.docker.raw-stream\r\n\r\n%s\r\n", statusCode, statusText, err.Error()) |
| httputils.CloseStreams(conn) |
| } else { |
| logrus.Errorf("Error Hijacking: %v", err) |
| } |
| } |
| return nil |
| } |
| |
| func (s *containerRouter) wsContainersAttach(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| containerName := vars["name"] |
| |
| var err error |
| detachKeys := r.FormValue("detachKeys") |
| |
| done := make(chan struct{}) |
| started := make(chan struct{}) |
| |
| setupStreams := func() (io.ReadCloser, io.Writer, io.Writer, error) { |
| wsChan := make(chan *websocket.Conn) |
| h := func(conn *websocket.Conn) { |
| wsChan <- conn |
| <-done |
| } |
| |
| srv := websocket.Server{Handler: h, Handshake: nil} |
| go func() { |
| close(started) |
| srv.ServeHTTP(w, r) |
| }() |
| |
| conn := <-wsChan |
| return conn, conn, conn, nil |
| } |
| |
| attachConfig := &backend.ContainerAttachConfig{ |
| GetStreams: setupStreams, |
| Logs: httputils.BoolValue(r, "logs"), |
| Stream: httputils.BoolValue(r, "stream"), |
| DetachKeys: detachKeys, |
| UseStdin: true, |
| UseStdout: true, |
| UseStderr: true, |
| MuxStreams: false, // TODO: this should be true since it's a single stream for both stdout and stderr |
| } |
| |
| err = s.backend.ContainerAttach(containerName, attachConfig) |
| close(done) |
| select { |
| case <-started: |
| logrus.Errorf("Error attaching websocket: %s", err) |
| return nil |
| default: |
| } |
| return err |
| } |
| |
| func (s *containerRouter) postContainersPrune(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error { |
| if err := httputils.ParseForm(r); err != nil { |
| return err |
| } |
| |
| pruneFilters, err := filters.FromParam(r.Form.Get("filters")) |
| if err != nil { |
| return err |
| } |
| |
| pruneReport, err := s.backend.ContainersPrune(pruneFilters) |
| if err != nil { |
| return err |
| } |
| return httputils.WriteJSON(w, http.StatusOK, pruneReport) |
| } |