2015-03-24 23:57:23 -04:00
package client
import (
"bufio"
"encoding/base64"
"encoding/json"
"fmt"
"io"
"io/ioutil"
"net/http"
"net/url"
"os"
"os/exec"
"path"
"path/filepath"
"runtime"
"strconv"
"strings"
"github.com/docker/docker/api"
2015-05-11 13:23:32 -04:00
"github.com/docker/docker/graph/tags"
2015-03-24 23:57:23 -04:00
"github.com/docker/docker/pkg/archive"
"github.com/docker/docker/pkg/fileutils"
2015-06-04 09:30:14 -04:00
"github.com/docker/docker/pkg/httputils"
2015-03-17 22:18:41 -04:00
"github.com/docker/docker/pkg/jsonmessage"
2015-03-24 23:57:23 -04:00
flag "github.com/docker/docker/pkg/mflag"
"github.com/docker/docker/pkg/parsers"
"github.com/docker/docker/pkg/progressreader"
2015-03-17 22:18:41 -04:00
"github.com/docker/docker/pkg/streamformatter"
2015-03-24 23:57:23 -04:00
"github.com/docker/docker/pkg/symlink"
"github.com/docker/docker/pkg/units"
"github.com/docker/docker/pkg/urlutil"
"github.com/docker/docker/registry"
"github.com/docker/docker/utils"
)
const (
tarHeaderSize = 512
)
2015-03-25 13:34:41 -04:00
// CmdBuild builds a new image from the source code at a given path.
//
// If '-' is provided instead of a path or URL, Docker will build an image from either a Dockerfile or tar archive read from STDIN.
//
// Usage: docker build [OPTIONS] PATH | URL | -
2015-03-24 23:57:23 -04:00
func ( cli * DockerCli ) CmdBuild ( args ... string ) error {
2015-05-13 22:45:01 -04:00
cmd := cli . Subcmd ( "build" , [ ] string { "PATH | URL | -" } , "Build a new image from the source code at PATH" , true )
2015-03-24 23:57:23 -04:00
tag := cmd . String ( [ ] string { "t" , "-tag" } , "" , "Repository name (and optionally a tag) for the image" )
suppressOutput := cmd . Bool ( [ ] string { "q" , "-quiet" } , false , "Suppress the verbose output generated by the containers" )
noCache := cmd . Bool ( [ ] string { "#no-cache" , "-no-cache" } , false , "Do not use cache when building the image" )
rm := cmd . Bool ( [ ] string { "#rm" , "-rm" } , true , "Remove intermediate containers after a successful build" )
forceRm := cmd . Bool ( [ ] string { "-force-rm" } , false , "Always remove intermediate containers" )
pull := cmd . Bool ( [ ] string { "-pull" } , false , "Always attempt to pull a newer version of the image" )
dockerfileName := cmd . String ( [ ] string { "f" , "-file" } , "" , "Name of the Dockerfile (Default is 'PATH/Dockerfile')" )
flMemoryString := cmd . String ( [ ] string { "m" , "-memory" } , "" , "Memory limit" )
flMemorySwap := cmd . String ( [ ] string { "-memory-swap" } , "" , "Total memory (memory + swap), '-1' to disable swap" )
2015-03-25 22:31:29 -04:00
flCPUShares := cmd . Int64 ( [ ] string { "c" , "-cpu-shares" } , 0 , "CPU shares (relative weight)" )
2015-04-08 04:58:59 -04:00
flCpuPeriod := cmd . Int64 ( [ ] string { "-cpu-period" } , 0 , "Limit the CPU CFS (Completely Fair Scheduler) period" )
2015-04-23 20:54:08 -04:00
flCpuQuota := cmd . Int64 ( [ ] string { "-cpu-quota" } , 0 , "Limit the CPU CFS (Completely Fair Scheduler) quota" )
2015-03-25 22:31:29 -04:00
flCPUSetCpus := cmd . String ( [ ] string { "-cpuset-cpus" } , "" , "CPUs in which to allow execution (0-3, 0,1)" )
2015-04-13 22:00:48 -04:00
flCPUSetMems := cmd . String ( [ ] string { "-cpuset-mems" } , "" , "MEMs in which to allow execution (0-3, 0,1)" )
2015-03-26 19:14:31 -04:00
flCgroupParent := cmd . String ( [ ] string { "-cgroup-parent" } , "" , "Optional parent cgroup for the container" )
2015-03-24 23:57:23 -04:00
cmd . Require ( flag . Exact , 1 )
2015-07-03 05:26:09 -04:00
2015-03-28 21:22:46 -04:00
cmd . ParseFlags ( args , true )
2015-03-24 23:57:23 -04:00
var (
context archive . Archive
isRemote bool
err error
)
_ , err = exec . LookPath ( "git" )
hasGit := err == nil
if cmd . Arg ( 0 ) == "-" {
// As a special case, 'docker build -' will build from either an empty context with the
// contents of stdin as a Dockerfile, or a tar-ed context from stdin.
buf := bufio . NewReader ( cli . in )
magic , err := buf . Peek ( tarHeaderSize )
if err != nil && err != io . EOF {
return fmt . Errorf ( "failed to peek context header from STDIN: %v" , err )
}
if ! archive . IsArchive ( magic ) {
dockerfile , err := ioutil . ReadAll ( buf )
if err != nil {
return fmt . Errorf ( "failed to read Dockerfile from STDIN: %v" , err )
}
// -f option has no meaning when we're reading it from stdin,
// so just use our default Dockerfile name
* dockerfileName = api . DefaultDockerfileName
context , err = archive . Generate ( * dockerfileName , string ( dockerfile ) )
} else {
context = ioutil . NopCloser ( buf )
}
} else if urlutil . IsURL ( cmd . Arg ( 0 ) ) && ( ! urlutil . IsGitURL ( cmd . Arg ( 0 ) ) || ! hasGit ) {
isRemote = true
} else {
root := cmd . Arg ( 0 )
if urlutil . IsGitURL ( root ) {
2015-04-23 13:19:34 -04:00
root , err = utils . GitClone ( root )
2015-03-24 23:57:23 -04:00
if err != nil {
return err
}
defer os . RemoveAll ( root )
}
if _ , err := os . Stat ( root ) ; err != nil {
return err
}
absRoot , err := filepath . Abs ( root )
if err != nil {
return err
}
filename := * dockerfileName // path to Dockerfile
if * dockerfileName == "" {
// No -f/--file was specified so use the default
* dockerfileName = api . DefaultDockerfileName
filename = filepath . Join ( absRoot , * dockerfileName )
// Just to be nice ;-) look for 'dockerfile' too but only
// use it if we found it, otherwise ignore this check
if _ , err = os . Lstat ( filename ) ; os . IsNotExist ( err ) {
tmpFN := path . Join ( absRoot , strings . ToLower ( * dockerfileName ) )
if _ , err = os . Lstat ( tmpFN ) ; err == nil {
* dockerfileName = strings . ToLower ( * dockerfileName )
filename = tmpFN
}
}
}
origDockerfile := * dockerfileName // used for error msg
if filename , err = filepath . Abs ( filename ) ; err != nil {
return err
}
// Verify that 'filename' is within the build context
filename , err = symlink . FollowSymlinkInScope ( filename , absRoot )
if err != nil {
return fmt . Errorf ( "The Dockerfile (%s) must be within the build context (%s)" , origDockerfile , root )
}
// Now reset the dockerfileName to be relative to the build context
* dockerfileName , err = filepath . Rel ( absRoot , filename )
if err != nil {
return err
}
// And canonicalize dockerfile name to a platform-independent one
* dockerfileName , err = archive . CanonicalTarNameForPath ( * dockerfileName )
if err != nil {
2015-04-09 07:59:50 -04:00
return fmt . Errorf ( "Cannot canonicalize dockerfile path %s: %v" , * dockerfileName , err )
2015-03-24 23:57:23 -04:00
}
if _ , err = os . Lstat ( filename ) ; os . IsNotExist ( err ) {
return fmt . Errorf ( "Cannot locate Dockerfile: %s" , origDockerfile )
}
var includes = [ ] string { "." }
excludes , err := utils . ReadDockerIgnore ( path . Join ( root , ".dockerignore" ) )
if err != nil {
return err
}
// If .dockerignore mentions .dockerignore or the Dockerfile
// then make sure we send both files over to the daemon
// because Dockerfile is, obviously, needed no matter what, and
// .dockerignore is needed to know if either one needs to be
// removed. The deamon will remove them for us, if needed, after it
// parses the Dockerfile.
keepThem1 , _ := fileutils . Matches ( ".dockerignore" , excludes )
keepThem2 , _ := fileutils . Matches ( * dockerfileName , excludes )
if keepThem1 || keepThem2 {
includes = append ( includes , ".dockerignore" , * dockerfileName )
}
2015-04-26 12:50:25 -04:00
if err := utils . ValidateContextDirectory ( root , excludes ) ; err != nil {
2015-05-29 22:38:56 -04:00
return fmt . Errorf ( "Error checking context: '%s'." , err )
2015-03-24 23:57:23 -04:00
}
options := & archive . TarOptions {
Compression : archive . Uncompressed ,
ExcludePatterns : excludes ,
IncludeFiles : includes ,
}
context , err = archive . TarWithOptions ( root , options )
if err != nil {
return err
}
}
var body io . Reader
// Setup an upload progress bar
// FIXME: ProgressReader shouldn't be this annoying to use
if context != nil {
2015-05-12 14:18:54 -04:00
sf := streamformatter . NewStreamFormatter ( )
2015-03-24 23:57:23 -04:00
body = progressreader . New ( progressreader . Config {
In : context ,
Out : cli . out ,
Formatter : sf ,
NewLines : true ,
ID : "" ,
Action : "Sending build context to Docker daemon" ,
} )
}
var memory int64
if * flMemoryString != "" {
parsedMemory , err := units . RAMInBytes ( * flMemoryString )
if err != nil {
return err
}
memory = parsedMemory
}
var memorySwap int64
if * flMemorySwap != "" {
if * flMemorySwap == "-1" {
memorySwap = - 1
} else {
parsedMemorySwap , err := units . RAMInBytes ( * flMemorySwap )
if err != nil {
return err
}
memorySwap = parsedMemorySwap
}
}
// Send the build context
v := & url . Values { }
//Check if the given image name can be resolved
if * tag != "" {
repository , tag := parsers . ParseRepositoryTag ( * tag )
if err := registry . ValidateRepositoryName ( repository ) ; err != nil {
return err
}
if len ( tag ) > 0 {
2015-05-11 13:23:32 -04:00
if err := tags . ValidateTagName ( tag ) ; err != nil {
2015-03-24 23:57:23 -04:00
return err
}
}
}
v . Set ( "t" , * tag )
if * suppressOutput {
v . Set ( "q" , "1" )
}
if isRemote {
v . Set ( "remote" , cmd . Arg ( 0 ) )
}
if * noCache {
v . Set ( "nocache" , "1" )
}
if * rm {
v . Set ( "rm" , "1" )
} else {
v . Set ( "rm" , "0" )
}
if * forceRm {
v . Set ( "forcerm" , "1" )
}
if * pull {
v . Set ( "pull" , "1" )
}
2015-03-25 22:31:29 -04:00
v . Set ( "cpusetcpus" , * flCPUSetCpus )
2015-04-13 22:00:48 -04:00
v . Set ( "cpusetmems" , * flCPUSetMems )
2015-03-25 22:31:29 -04:00
v . Set ( "cpushares" , strconv . FormatInt ( * flCPUShares , 10 ) )
2015-04-23 20:54:08 -04:00
v . Set ( "cpuquota" , strconv . FormatInt ( * flCpuQuota , 10 ) )
2015-04-08 04:58:59 -04:00
v . Set ( "cpuperiod" , strconv . FormatInt ( * flCpuPeriod , 10 ) )
2015-03-24 23:57:23 -04:00
v . Set ( "memory" , strconv . FormatInt ( memory , 10 ) )
v . Set ( "memswap" , strconv . FormatInt ( memorySwap , 10 ) )
2015-03-26 19:14:31 -04:00
v . Set ( "cgroupparent" , * flCgroupParent )
2015-03-24 23:57:23 -04:00
v . Set ( "dockerfile" , * dockerfileName )
headers := http . Header ( make ( map [ string ] [ ] string ) )
2015-04-01 18:39:37 -04:00
buf , err := json . Marshal ( cli . configFile . AuthConfigs )
2015-03-24 23:57:23 -04:00
if err != nil {
return err
}
headers . Add ( "X-Registry-Config" , base64 . URLEncoding . EncodeToString ( buf ) )
if context != nil {
headers . Set ( "Content-Type" , "application/tar" )
}
2015-05-01 14:23:44 -04:00
sopts := & streamOpts {
rawTerminal : true ,
in : body ,
out : cli . out ,
headers : headers ,
}
2015-06-04 09:30:14 -04:00
serverResp , err := cli . stream ( "POST" , fmt . Sprintf ( "/build?%s" , v . Encode ( ) ) , sopts )
// Windows: show error message about modified file permissions.
if runtime . GOOS == "windows" {
h , err := httputils . ParseServerHeader ( serverResp . header . Get ( "Server" ) )
if err == nil {
if h . OS != "windows" {
fmt . Fprintln ( cli . err , ` SECURITY WARNING: You are building a Docker image from Windows against a non-Windows Docker host. All files and directories added to build context will have '-rwxr-xr-x' permissions. It is recommended to double check and reset permissions for sensitive files and directories. ` )
}
}
}
2015-03-17 22:18:41 -04:00
if jerr , ok := err . ( * jsonmessage . JSONError ) ; ok {
2015-03-24 23:57:23 -04:00
// If no error code is set, default to 1
if jerr . Code == 0 {
jerr . Code = 1
}
2015-04-15 04:57:52 -04:00
return StatusError { Status : jerr . Message , StatusCode : jerr . Code }
2015-03-24 23:57:23 -04:00
}
return err
}