2018-02-05 16:05:59 -05:00
package container // import "github.com/docker/docker/container"
2013-01-18 19:13:39 -05:00
import (
2017-04-06 13:43:10 -04:00
"bytes"
2018-04-19 18:30:59 -04:00
"context"
2013-01-18 19:13:39 -05:00
"encoding/json"
2013-03-21 03:25:00 -04:00
"fmt"
2014-04-28 17:36:04 -04:00
"io"
"os"
2014-05-11 16:49:46 -04:00
"path/filepath"
2017-05-16 17:19:19 -04:00
"runtime"
2016-03-09 23:33:21 -05:00
"strings"
2015-05-05 16:25:05 -04:00
"sync"
2014-04-28 17:36:04 -04:00
"syscall"
"time"
2017-11-29 19:15:20 -05:00
"github.com/containerd/containerd/cio"
2016-09-06 14:18:12 -04:00
containertypes "github.com/docker/docker/api/types/container"
Add new `HostConfig` field, `Mounts`.
`Mounts` allows users to specify in a much safer way the volumes they
want to use in the container.
This replaces `Binds` and `Volumes`, which both still exist, but
`Mounts` and `Binds`/`Volumes` are exclussive.
The CLI will continue to use `Binds` and `Volumes` due to concerns with
parsing the volume specs on the client side and cross-platform support
(for now).
The new API follows exactly the services mount API.
Example usage of `Mounts`:
```
$ curl -XPOST localhost:2375/containers/create -d '{
"Image": "alpine:latest",
"HostConfig": {
"Mounts": [{
"Type": "Volume",
"Target": "/foo"
},{
"Type": "bind",
"Source": "/var/run/docker.sock",
"Target": "/var/run/docker.sock",
},{
"Type": "volume",
"Name": "important_data",
"Target": "/var/data",
"ReadOnly": true,
"VolumeOptions": {
"DriverConfig": {
Name: "awesomeStorage",
Options: {"size": "10m"},
Labels: {"some":"label"}
}
}]
}
}'
```
There are currently 2 types of mounts:
- **bind**: Paths on the host that get mounted into the
container. Paths must exist prior to creating the container.
- **volume**: Volumes that persist after the
container is removed.
Not all fields are available in each type, and validation is done to
ensure these fields aren't mixed up between types.
Signed-off-by: Brian Goff <cpuguy83@gmail.com>
2016-04-26 14:25:35 -04:00
mounttypes "github.com/docker/docker/api/types/mount"
2016-11-15 10:04:36 -05:00
swarmtypes "github.com/docker/docker/api/types/swarm"
2016-11-14 15:15:09 -05:00
"github.com/docker/docker/container/stream"
2015-02-04 14:04:58 -05:00
"github.com/docker/docker/daemon/logger"
"github.com/docker/docker/daemon/logger/jsonfilelog"
2018-04-05 12:41:35 -04:00
"github.com/docker/docker/daemon/logger/local"
2018-04-05 12:42:31 -04:00
"github.com/docker/docker/daemon/logger/loggerutils/cache"
2015-04-04 00:06:48 -04:00
"github.com/docker/docker/daemon/network"
2018-04-05 12:41:35 -04:00
"github.com/docker/docker/errdefs"
2015-11-18 17:20:54 -05:00
"github.com/docker/docker/image"
"github.com/docker/docker/layer"
2022-05-10 15:59:00 -04:00
libcontainerdtypes "github.com/docker/docker/libcontainerd/types"
2017-08-03 20:22:00 -04:00
"github.com/docker/docker/pkg/containerfs"
2016-03-08 10:40:30 -05:00
"github.com/docker/docker/pkg/idtools"
2016-04-20 20:08:47 -04:00
"github.com/docker/docker/pkg/ioutils"
2017-05-26 19:14:18 -04:00
"github.com/docker/docker/pkg/system"
2016-03-18 14:50:19 -04:00
"github.com/docker/docker/restartmanager"
2015-05-19 16:05:25 -04:00
"github.com/docker/docker/volume"
2018-04-17 16:50:28 -04:00
volumemounts "github.com/docker/docker/volume/mounts"
2019-08-05 10:37:47 -04:00
units "github.com/docker/go-units"
2022-04-21 17:33:07 -04:00
agentexec "github.com/moby/swarmkit/v2/agent/exec"
2021-07-09 18:11:57 -04:00
"github.com/moby/sys/signal"
2020-10-29 19:54:10 -04:00
"github.com/moby/sys/symlink"
2017-07-19 10:20:13 -04:00
"github.com/pkg/errors"
2017-07-26 17:42:13 -04:00
"github.com/sirupsen/logrus"
2013-01-18 19:13:39 -05:00
)
2020-11-02 04:32:59 -05:00
const (
configFileName = "config.v2.json"
hostConfigFileName = "hostconfig.json"
)
2015-11-18 17:20:54 -05:00
2017-09-22 09:52:41 -04:00
// ExitStatus provides exit reasons for a container.
type ExitStatus struct {
// The exit code with which the container exited.
ExitCode int
// Time at which the container died
ExitedAt time . Time
}
2017-04-25 15:03:45 -04:00
// Container holds the structure defining a container object.
type Container struct {
2016-11-14 15:15:09 -05:00
StreamConfig * stream . Config
2015-07-30 17:01:53 -04:00
// embed for Container to support states directly.
2022-09-23 14:21:31 -04:00
* State ` json:"State" ` // Needed for Engine API version <= 1.11
Root string ` json:"-" ` // Path to the "home" of the container, including metadata.
BaseFS string ` json:"-" ` // Path to the graphdriver mountpoint
RWLayer layer . RWLayer ` json:"-" `
2015-07-30 17:01:53 -04:00
ID string
Created time . Time
2016-06-13 22:52:49 -04:00
Managed bool
2015-07-30 17:01:53 -04:00
Path string
Args [ ] string
2015-12-18 13:36:17 -05:00
Config * containertypes . Config
2015-11-18 17:20:54 -05:00
ImageID image . ID ` json:"Image" `
2015-07-30 17:01:53 -04:00
NetworkSettings * network . Settings
LogPath string
Name string
Driver string
2017-08-08 15:43:48 -04:00
OS string
2015-07-30 17:01:53 -04:00
// MountLabel contains the options for the 'mount' command
2022-07-19 06:59:46 -04:00
MountLabel string
ProcessLabel string
RestartCount int
HasBeenStartedBefore bool
HasBeenManuallyStopped bool // used for unless-stopped restart policy
HasBeenManuallyRestarted bool ` json:"-" ` // used to distinguish restart caused by restart policy from the manual one
MountPoints map [ string ] * volumemounts . MountPoint
HostConfig * containertypes . HostConfig ` json:"-" ` // do not serialize the host config in the json, otherwise we'll make the container unportable
2022-05-10 15:59:00 -04:00
ExecCommands * ExecStore ` json:"-" `
2022-07-19 06:59:46 -04:00
DependencyStore agentexec . DependencyGetter ` json:"-" `
SecretReferences [ ] * swarmtypes . SecretReference
ConfigReferences [ ] * swarmtypes . ConfigReference
2015-02-04 14:04:58 -05:00
// logDriver for closing
2016-03-18 14:50:19 -04:00
LogDriver logger . Logger ` json:"-" `
LogCopier * logger . Copier ` json:"-" `
restartManager restartmanager . RestartManager
attachContext * attachContext
2017-04-25 15:03:45 -04:00
// Fields here are specific to Unix platforms
AppArmorProfile string
HostnamePath string
HostsPath string
ShmPath string
ResolvConfPath string
SeccompProfile string
NoNewPrivileges bool
// Fields here are specific to Windows
2018-04-05 12:42:31 -04:00
NetworkSharedContainerID string ` json:"-" `
SharedEndpointList [ ] string ` json:"-" `
LocalLogCacheMeta localLogCacheMeta ` json:",omitempty" `
}
type localLogCacheMeta struct {
HaveNotifyEnabled bool
2013-01-18 19:13:39 -05:00
}
2015-11-12 14:55:17 -05:00
// NewBaseContainer creates a new container with its
2015-11-18 05:04:23 -05:00
// basic configuration.
2015-11-12 14:55:17 -05:00
func NewBaseContainer ( id , root string ) * Container {
2015-11-18 05:04:23 -05:00
return & Container {
2017-04-25 15:03:45 -04:00
ID : id ,
State : NewState ( ) ,
2022-05-10 15:59:00 -04:00
ExecCommands : NewExecStore ( ) ,
2017-04-25 15:03:45 -04:00
Root : root ,
2018-04-17 16:50:28 -04:00
MountPoints : make ( map [ string ] * volumemounts . MountPoint ) ,
2017-04-25 15:03:45 -04:00
StreamConfig : stream . NewConfig ( ) ,
attachContext : & attachContext { } ,
2015-11-18 05:04:23 -05:00
}
}
2015-11-12 14:55:17 -05:00
// FromDisk loads the container configuration stored in the host.
func ( container * Container ) FromDisk ( ) error {
pth , err := container . ConfigPath ( )
2014-05-27 22:15:42 -04:00
if err != nil {
return err
}
2014-11-04 08:43:58 -05:00
jsonSource , err := os . Open ( pth )
2013-01-25 17:39:02 -05:00
if err != nil {
return err
}
2014-11-04 08:43:58 -05:00
defer jsonSource . Close ( )
dec := json . NewDecoder ( jsonSource )
2013-03-21 03:25:00 -04:00
// Load container settings
2015-09-03 05:01:55 -04:00
if err := dec . Decode ( container ) ; err != nil {
2013-01-25 17:39:02 -05:00
return err
}
2014-04-28 17:36:04 -04:00
2017-08-08 15:43:48 -04:00
// Ensure the operating system is set if blank. Assume it is the OS of the
// host OS if not, to ensure containers created before multiple-OS
2017-05-16 17:19:19 -04:00
// support are migrated
2017-08-08 15:43:48 -04:00
if container . OS == "" {
container . OS = runtime . GOOS
2017-05-16 17:19:19 -04:00
}
2013-10-31 17:58:43 -04:00
return container . readHostConfig ( )
2013-01-25 17:39:02 -05:00
}
2020-11-02 04:32:59 -05:00
// toDisk writes the container's configuration (config.v2.json, hostconfig.json)
// to disk and returns a deep copy.
2017-04-06 13:43:10 -04:00
func ( container * Container ) toDisk ( ) ( * Container , error ) {
2015-11-12 14:55:17 -05:00
pth , err := container . ConfigPath ( )
2013-01-18 19:13:39 -05:00
if err != nil {
2017-04-06 13:43:10 -04:00
return nil , err
2013-01-18 19:13:39 -05:00
}
2014-05-27 22:15:42 -04:00
2017-04-06 13:43:10 -04:00
// Save container settings
2017-08-07 06:10:08 -04:00
f , err := ioutils . NewAtomicFileWriter ( pth , 0600 )
2013-10-31 17:58:43 -04:00
if err != nil {
2017-04-06 13:43:10 -04:00
return nil , err
2014-05-27 22:15:42 -04:00
}
2017-04-06 13:43:10 -04:00
defer f . Close ( )
2015-10-30 12:04:25 -04:00
2020-11-02 04:32:59 -05:00
var buf bytes . Buffer
2017-04-06 13:43:10 -04:00
w := io . MultiWriter ( & buf , f )
if err := json . NewEncoder ( w ) . Encode ( container ) ; err != nil {
return nil , err
}
2014-05-27 22:15:42 -04:00
2020-11-02 04:32:59 -05:00
var deepCopy Container
2017-04-06 13:43:10 -04:00
if err := json . NewDecoder ( & buf ) . Decode ( & deepCopy ) ; err != nil {
return nil , err
}
deepCopy . HostConfig , err = container . WriteHostConfig ( )
if err != nil {
return nil , err
2013-10-31 17:58:43 -04:00
}
2017-04-06 13:43:10 -04:00
return & deepCopy , nil
2013-01-18 19:13:39 -05:00
}
2017-03-27 13:18:53 -04:00
// CheckpointTo makes the Container's current state visible to queries, and persists state.
2017-02-23 18:12:18 -05:00
// Callers must hold a Container lock.
2022-09-21 06:20:13 -04:00
func ( container * Container ) CheckpointTo ( store * ViewDB ) error {
2017-04-06 13:43:10 -04:00
deepCopy , err := container . toDisk ( )
if err != nil {
2017-02-23 18:12:18 -05:00
return err
}
2017-04-06 13:43:10 -04:00
return store . Save ( deepCopy )
2017-02-23 18:12:18 -05:00
}
2015-11-12 14:55:17 -05:00
// readHostConfig reads the host configuration from disk for the container.
2013-10-31 17:58:43 -04:00
func ( container * Container ) readHostConfig ( ) error {
2015-12-18 13:36:17 -05:00
container . HostConfig = & containertypes . HostConfig { }
2013-10-31 17:58:43 -04:00
// If the hostconfig file does not exist, do not read it.
2015-11-12 14:55:17 -05:00
// (We still have to initialize container.HostConfig,
2013-10-31 17:58:43 -04:00
// but that's OK, since we just did that above.)
2015-11-12 14:55:17 -05:00
pth , err := container . HostConfigPath ( )
2014-05-27 22:15:42 -04:00
if err != nil {
return err
}
2015-04-21 15:59:59 -04:00
f , err := os . Open ( pth )
2013-07-02 08:19:25 -04:00
if err != nil {
2015-10-30 17:54:09 -04:00
if os . IsNotExist ( err ) {
return nil
}
2013-10-31 17:58:43 -04:00
return err
2013-07-02 08:19:25 -04:00
}
2015-04-21 15:59:59 -04:00
defer f . Close ( )
2015-11-12 14:55:17 -05:00
if err := json . NewDecoder ( f ) . Decode ( & container . HostConfig ) ; err != nil {
2015-11-06 17:22:48 -05:00
return err
}
2015-11-12 14:55:17 -05:00
container . InitDNSHostConfig ( )
2015-11-06 17:22:48 -05:00
return nil
2013-07-02 08:19:25 -04:00
}
2017-04-06 13:43:10 -04:00
// WriteHostConfig saves the host configuration on disk for the container,
// and returns a deep copy of the saved object. Callers must hold a Container lock.
func ( container * Container ) WriteHostConfig ( ) ( * containertypes . HostConfig , error ) {
var (
buf bytes . Buffer
deepCopy containertypes . HostConfig
)
2015-11-12 14:55:17 -05:00
pth , err := container . HostConfigPath ( )
2013-07-02 08:19:25 -04:00
if err != nil {
2017-04-06 13:43:10 -04:00
return nil , err
2013-07-02 08:19:25 -04:00
}
2014-05-27 22:15:42 -04:00
2020-11-02 04:27:51 -05:00
f , err := ioutils . NewAtomicFileWriter ( pth , 0600 )
2014-05-27 22:15:42 -04:00
if err != nil {
2017-04-06 13:43:10 -04:00
return nil , err
2014-05-27 22:15:42 -04:00
}
2015-10-30 17:45:35 -04:00
defer f . Close ( )
2014-05-27 22:15:42 -04:00
2017-04-06 13:43:10 -04:00
w := io . MultiWriter ( & buf , f )
if err := json . NewEncoder ( w ) . Encode ( & container . HostConfig ) ; err != nil {
return nil , err
}
if err := json . NewDecoder ( & buf ) . Decode ( & deepCopy ) ; err != nil {
return nil , err
}
return & deepCopy , nil
2013-07-02 08:19:25 -04:00
}
2016-01-27 16:03:09 -05:00
// SetupWorkingDirectory sets up the container's working directory as set in container.Config.WorkingDir
2017-11-16 01:20:33 -05:00
func ( container * Container ) SetupWorkingDirectory ( rootIdentity idtools . Identity ) error {
2016-01-27 16:03:09 -05:00
if container . Config . WorkingDir == "" {
return nil
}
2016-03-01 13:23:43 -05:00
2016-05-26 16:24:22 -04:00
container . Config . WorkingDir = filepath . Clean ( container . Config . WorkingDir )
2016-01-27 16:03:09 -05:00
pth , err := container . GetResourcePath ( container . Config . WorkingDir )
if err != nil {
return err
}
2017-11-16 01:20:33 -05:00
if err := idtools . MkdirAllAndChownNew ( pth , 0755 , rootIdentity ) ; err != nil {
2016-01-27 16:03:09 -05:00
pthInfo , err2 := os . Stat ( pth )
if err2 == nil && pthInfo != nil && ! pthInfo . IsDir ( ) {
2017-07-19 10:20:13 -04:00
return errors . Errorf ( "Cannot mkdir: %s is not a directory" , container . Config . WorkingDir )
2016-01-27 16:03:09 -05:00
}
return err
}
return nil
}
2015-11-12 14:55:17 -05:00
// GetResourcePath evaluates `path` in the scope of the container's BaseFS, with proper path
// sanitisation. Symlinks are all scoped to the BaseFS of the container, as
// though the container's BaseFS was `/`.
2015-03-05 20:53:06 -05:00
//
2015-11-12 14:55:17 -05:00
// The BaseFS of a container is the host-facing path which is bind-mounted as
2015-03-05 20:53:06 -05:00
// `/` inside the container. This method is essentially used to access a
// particular path inside the container as though you were a process in that
// container.
//
2022-07-08 12:27:07 -04:00
// # NOTE
// The returned path is *only* safely scoped inside the container's BaseFS
// if no component of the returned path changes (such as a component
// symlinking to a different path) between using this method and using the
// path. See symlink.FollowSymlinkInScope for more details.
2015-03-05 20:53:06 -05:00
func ( container * Container ) GetResourcePath ( path string ) ( string , error ) {
2022-09-23 12:25:19 -04:00
if container . BaseFS == "" {
return "" , errors . New ( "GetResourcePath: BaseFS of container " + container . ID + " is unexpectedly empty" )
2018-03-13 22:45:21 -04:00
}
2015-06-01 19:42:27 -04:00
// IMPORTANT - These are paths on the OS where the daemon is running, hence
// any filepath operations must be done in an OS agnostic way.
2022-09-23 14:09:51 -04:00
r , e := containerfs . ResolveScopedPath ( container . BaseFS , containerfs . CleanScopedPath ( path ) )
2016-04-19 23:55:30 -04:00
// Log this here on the daemon side as there's otherwise no indication apart
// from the error being propagated all the way back to the client. This makes
// debugging significantly easier and clearly indicates the error comes from the daemon.
if e != nil {
2022-09-23 14:09:51 -04:00
logrus . Errorf ( "Failed to ResolveScopedPath BaseFS %s path %s %s\n" , container . BaseFS , path , e )
2016-04-19 23:55:30 -04:00
}
2015-06-01 19:42:27 -04:00
return r , e
2014-05-11 16:49:46 -04:00
}
2015-11-12 14:55:17 -05:00
// GetRootResourcePath evaluates `path` in the scope of the container's root, with proper path
2015-03-05 20:53:06 -05:00
// sanitisation. Symlinks are all scoped to the root of the container, as
// though the container's root was `/`.
//
// The root of a container is the host-facing configuration metadata directory.
// Only use this method to safely access the container's `container.json` or
// other metadata files. If in doubt, use container.GetResourcePath.
//
2022-07-08 12:27:07 -04:00
// # NOTE
// The returned path is *only* safely scoped inside the container's root
// if no component of the returned path changes (such as a component
// symlinking to a different path) between using this method and using the
// path. See symlink.FollowSymlinkInScope for more details.
2015-11-12 14:55:17 -05:00
func ( container * Container ) GetRootResourcePath ( path string ) ( string , error ) {
2015-06-01 19:42:27 -04:00
// IMPORTANT - These are paths on the OS where the daemon is running, hence
// any filepath operations must be done in an OS agnostic way.
cleanPath := filepath . Join ( string ( os . PathSeparator ) , path )
2015-11-12 14:55:17 -05:00
return symlink . FollowSymlinkInScope ( filepath . Join ( container . Root , cleanPath ) , container . Root )
2014-05-11 16:49:46 -04:00
}
2015-11-02 18:25:26 -05:00
// ExitOnNext signals to the monitor that it should not restart the container
// after we send the kill signal.
func ( container * Container ) ExitOnNext ( ) {
2016-10-05 16:29:56 -04:00
container . RestartManager ( ) . Cancel ( )
2013-05-23 22:33:28 -04:00
}
2015-11-12 14:55:17 -05:00
// HostConfigPath returns the path to the container's JSON hostconfig
func ( container * Container ) HostConfigPath ( ) ( string , error ) {
2020-11-02 04:32:59 -05:00
return container . GetRootResourcePath ( hostConfigFileName )
2013-03-21 03:25:00 -04:00
}
2015-11-12 14:55:17 -05:00
// ConfigPath returns the path to the container's JSON config
func ( container * Container ) ConfigPath ( ) ( string , error ) {
return container . GetRootResourcePath ( configFileName )
2013-03-21 03:25:00 -04:00
}
2016-05-12 10:52:00 -04:00
// CheckpointDir returns the directory checkpoints are stored in
func ( container * Container ) CheckpointDir ( ) string {
return filepath . Join ( container . Root , "checkpoints" )
}
2015-11-03 13:45:12 -05:00
// StartLogger starts a new logger driver for the container.
2016-11-22 06:40:54 -05:00
func ( container * Container ) StartLogger ( ) ( logger . Logger , error ) {
cfg := container . HostConfig . LogConfig
2016-11-22 21:55:27 -05:00
initDriver , err := logger . GetLogDriver ( cfg . Type )
2015-04-09 00:23:30 -04:00
if err != nil {
2017-07-19 10:20:13 -04:00
return nil , errors . Wrap ( err , "failed to get logging factory" )
2015-04-09 00:23:30 -04:00
}
2016-11-26 00:08:34 -05:00
info := logger . Info {
2015-05-29 17:00:46 -04:00
Config : cfg . Config ,
ContainerID : container . ID ,
ContainerName : container . Name ,
ContainerEntrypoint : container . Path ,
ContainerArgs : container . Args ,
2015-11-18 17:20:54 -05:00
ContainerImageID : container . ImageID . String ( ) ,
2015-05-29 17:00:46 -04:00
ContainerImageName : container . Config . Image ,
ContainerCreated : container . Created ,
2015-08-11 07:27:19 -04:00
ContainerEnv : container . Config . Env ,
ContainerLabels : container . Config . Labels ,
2016-04-27 22:46:54 -04:00
DaemonName : "docker" ,
2015-04-09 00:23:30 -04:00
}
// Set logging file for "json-logger"
2018-04-05 12:41:35 -04:00
// TODO(@cpuguy83): Setup here based on log driver is a little weird.
switch cfg . Type {
case jsonfilelog . Name :
2016-11-26 00:08:34 -05:00
info . LogPath , err = container . GetRootResourcePath ( fmt . Sprintf ( "%s-json.log" , container . ID ) )
2015-04-20 14:26:39 -04:00
if err != nil {
2015-04-09 00:23:30 -04:00
return nil , err
2015-04-20 14:26:39 -04:00
}
2018-02-09 19:03:47 -05:00
container . LogPath = info . LogPath
2018-04-05 12:41:35 -04:00
case local . Name :
// Do not set container.LogPath for the local driver
// This would expose the value to the API, which should not be done as it means
// that the log file implementation would become a stable API that cannot change.
logDir , err := container . GetRootResourcePath ( "local-logs" )
if err != nil {
return nil , err
}
if err := os . MkdirAll ( logDir , 0700 ) ; err != nil {
return nil , errdefs . System ( errors . Wrap ( err , "error creating local logs dir" ) )
}
info . LogPath = filepath . Join ( logDir , "container.log" )
2015-04-09 00:23:30 -04:00
}
2016-11-22 21:55:27 -05:00
l , err := initDriver ( info )
if err != nil {
return nil , err
}
if containertypes . LogMode ( cfg . Config [ "mode" ] ) == containertypes . LogModeNonBlock {
bufferSize := int64 ( - 1 )
if s , exists := cfg . Config [ "max-buffer-size" ] ; exists {
bufferSize , err = units . RAMInBytes ( s )
if err != nil {
return nil , err
}
}
l = logger . NewRingLogger ( l , info , bufferSize )
}
2018-04-05 12:42:31 -04:00
if _ , ok := l . ( logger . LogReader ) ; ! ok {
2018-04-09 15:35:24 -04:00
if cache . ShouldUseCache ( cfg . Config ) {
logPath , err := container . GetRootResourcePath ( "container-cached.log" )
if err != nil {
return nil , err
}
2018-04-05 12:42:31 -04:00
2018-04-09 15:35:24 -04:00
if ! container . LocalLogCacheMeta . HaveNotifyEnabled {
logrus . WithField ( "container" , container . ID ) . WithField ( "driver" , container . HostConfig . LogConfig . Type ) . Info ( "Configured log driver does not support reads, enabling local file cache for container logs" )
container . LocalLogCacheMeta . HaveNotifyEnabled = true
}
info . LogPath = logPath
l , err = cache . WithLocalCache ( l , info )
if err != nil {
return nil , errors . Wrap ( err , "error setting up local container log cache" )
}
2018-04-05 12:42:31 -04:00
}
}
2016-11-22 21:55:27 -05:00
return l , nil
2015-04-09 00:23:30 -04:00
}
2015-11-12 14:55:17 -05:00
// GetProcessLabel returns the process label for the container.
func ( container * Container ) GetProcessLabel ( ) string {
2014-04-29 04:08:19 -04:00
// even if we have a process label return "" if we are running
// in privileged mode
2015-11-12 14:55:17 -05:00
if container . HostConfig . Privileged {
2014-04-29 04:08:19 -04:00
return ""
}
return container . ProcessLabel
}
2015-11-12 14:55:17 -05:00
// GetMountLabel returns the mounting label for the container.
// This label is empty if the container is privileged.
func ( container * Container ) GetMountLabel ( ) string {
2014-04-29 04:08:19 -04:00
return container . MountLabel
}
2014-05-02 19:59:28 -04:00
2015-11-12 14:55:17 -05:00
// GetExecIDs returns the list of exec commands running on the container.
func ( container * Container ) GetExecIDs ( ) [ ] string {
return container . ExecCommands . List ( )
2015-05-04 08:39:51 -04:00
}
2015-11-12 14:55:17 -05:00
// ShouldRestart decides whether the daemon should restart the container or not.
// This is based on the container's restart policy.
func ( container * Container ) ShouldRestart ( ) bool {
2016-10-05 16:29:56 -04:00
shouldRestart , _ , _ := container . RestartManager ( ) . ShouldRestart ( uint32 ( container . ExitCode ( ) ) , container . HasBeenManuallyStopped , container . FinishedAt . Sub ( container . StartedAt ) )
2016-03-22 11:46:40 -04:00
return shouldRestart
2015-05-19 16:05:25 -04:00
}
2015-05-22 13:37:00 -04:00
2015-11-12 14:55:17 -05:00
// AddMountPointWithVolume adds a new mount point configured with a volume to the container.
func ( container * Container ) AddMountPointWithVolume ( destination string , vol volume . Volume , rw bool ) {
2021-06-11 15:01:18 -04:00
volumeParser := volumemounts . NewParser ( )
2018-04-17 16:50:28 -04:00
container . MountPoints [ destination ] = & volumemounts . MountPoint {
Add new `HostConfig` field, `Mounts`.
`Mounts` allows users to specify in a much safer way the volumes they
want to use in the container.
This replaces `Binds` and `Volumes`, which both still exist, but
`Mounts` and `Binds`/`Volumes` are exclussive.
The CLI will continue to use `Binds` and `Volumes` due to concerns with
parsing the volume specs on the client side and cross-platform support
(for now).
The new API follows exactly the services mount API.
Example usage of `Mounts`:
```
$ curl -XPOST localhost:2375/containers/create -d '{
"Image": "alpine:latest",
"HostConfig": {
"Mounts": [{
"Type": "Volume",
"Target": "/foo"
},{
"Type": "bind",
"Source": "/var/run/docker.sock",
"Target": "/var/run/docker.sock",
},{
"Type": "volume",
"Name": "important_data",
"Target": "/var/data",
"ReadOnly": true,
"VolumeOptions": {
"DriverConfig": {
Name: "awesomeStorage",
Options: {"size": "10m"},
Labels: {"some":"label"}
}
}]
}
}'
```
There are currently 2 types of mounts:
- **bind**: Paths on the host that get mounted into the
container. Paths must exist prior to creating the container.
- **volume**: Volumes that persist after the
container is removed.
Not all fields are available in each type, and validation is done to
ensure these fields aren't mixed up between types.
Signed-off-by: Brian Goff <cpuguy83@gmail.com>
2016-04-26 14:25:35 -04:00
Type : mounttypes . TypeVolume ,
2015-09-09 22:23:06 -04:00
Name : vol . Name ( ) ,
Driver : vol . DriverName ( ) ,
Destination : destination ,
RW : rw ,
Volume : vol ,
2017-08-01 13:32:44 -04:00
CopyData : volumeParser . DefaultCopyMode ( ) ,
2015-09-09 22:23:06 -04:00
}
}
2016-10-03 13:53:06 -04:00
// UnmountVolumes unmounts all volumes
func ( container * Container ) UnmountVolumes ( volumeEventLog func ( name , action string , attributes map [ string ] string ) ) error {
var errors [ ] string
for _ , volumeMount := range container . MountPoints {
2017-04-27 23:33:33 -04:00
if volumeMount . Volume == nil {
continue
}
2016-10-03 13:53:06 -04:00
2017-04-27 23:33:33 -04:00
if err := volumeMount . Cleanup ( ) ; err != nil {
errors = append ( errors , err . Error ( ) )
continue
}
attributes := map [ string ] string {
"driver" : volumeMount . Volume . DriverName ( ) ,
"container" : container . ID ,
2016-10-03 13:53:06 -04:00
}
2017-04-27 23:33:33 -04:00
volumeEventLog ( volumeMount . Volume . Name ( ) , "unmount" , attributes )
2016-10-03 13:53:06 -04:00
}
if len ( errors ) > 0 {
return fmt . Errorf ( "error while unmounting volumes for container %s: %s" , container . ID , strings . Join ( errors , "; " ) )
}
return nil
}
2015-12-13 11:00:39 -05:00
// IsDestinationMounted checks whether a path is mounted on the container or not.
2015-11-12 14:55:17 -05:00
func ( container * Container ) IsDestinationMounted ( destination string ) bool {
2015-09-09 22:23:06 -04:00
return container . MountPoints [ destination ] != nil
2015-05-22 13:37:00 -04:00
}
2015-08-04 16:51:48 -04:00
2015-11-12 14:55:17 -05:00
// StopSignal returns the signal used to stop the container.
2022-05-01 19:16:56 -04:00
func ( container * Container ) StopSignal ( ) syscall . Signal {
2015-08-04 16:51:48 -04:00
var stopSignal syscall . Signal
if container . Config . StopSignal != "" {
stopSignal , _ = signal . ParseSignal ( container . Config . StopSignal )
}
2022-05-01 19:16:56 -04:00
if stopSignal == 0 {
pkg/signal: remove DefaultStopSignal const
This const was previously living in pkg/signal, but with that package
being moved to its own module, it didn't make much sense to put docker's
defaults in a generic module.
The const from the "signal" package is currenlty used *both* by the CLI
and the daemon as a default value when creating containers. This put up
some questions:
a. should the default be non-exported, and private to the container
package? After all, it's a _default_ (so should be used if _NOT_ set).
b. should the client actually setting a default, or instead just omit
the value, unless specified by the user? having the client set a
default also means that the daemon cannot change the default value
because the client (or older clients) will override it.
c. consider defaults from the client and defaults of the daemon to be
separate things, and create a default const in the CLI.
This patch implements option "a" (option "b" will be done separately,
as it involves the CLI code). This still leaves "c" open as an option,
if the CLI wants to set its own default.
Unfortunately, this change means we'll have to drop the alias for the
deprecated pkg/signal.DefaultStopSignal const, but a comment was left
instead, which can assist consumers of the const to find why it's no
longer there (a search showed the Docker CLI as the only consumer though).
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
2021-08-06 12:50:56 -04:00
stopSignal , _ = signal . ParseSignal ( defaultStopSignal )
2015-08-04 16:51:48 -04:00
}
2022-05-01 19:16:56 -04:00
return stopSignal
2015-08-04 16:51:48 -04:00
}
2015-11-30 17:44:34 -05:00
2016-05-26 16:34:48 -04:00
// StopTimeout returns the timeout (in seconds) used to stop the container.
func ( container * Container ) StopTimeout ( ) int {
if container . Config . StopTimeout != nil {
return * container . Config . StopTimeout
}
2021-08-06 04:24:09 -04:00
return defaultStopTimeout
2016-05-26 16:34:48 -04:00
}
2015-11-12 14:55:17 -05:00
// InitDNSHostConfig ensures that the dns fields are never nil.
2015-11-30 17:44:34 -05:00
// New containers don't ever have those fields nil,
// but pre created containers can still have those nil values.
// The non-recommended host configuration in the start api can
// make these fields nil again, this corrects that issue until
// we remove that behavior for good.
// See https://github.com/docker/docker/pull/17779
// for a more detailed explanation on why we don't want that.
2015-11-12 14:55:17 -05:00
func ( container * Container ) InitDNSHostConfig ( ) {
2015-12-10 21:33:13 -05:00
container . Lock ( )
defer container . Unlock ( )
2015-11-12 14:55:17 -05:00
if container . HostConfig . DNS == nil {
container . HostConfig . DNS = make ( [ ] string , 0 )
2015-11-30 17:44:34 -05:00
}
2015-11-12 14:55:17 -05:00
if container . HostConfig . DNSSearch == nil {
container . HostConfig . DNSSearch = make ( [ ] string , 0 )
2015-11-30 17:44:34 -05:00
}
2015-11-12 14:55:17 -05:00
if container . HostConfig . DNSOptions == nil {
container . HostConfig . DNSOptions = make ( [ ] string , 0 )
2015-11-30 17:44:34 -05:00
}
}
2016-01-04 10:58:20 -05:00
// UpdateMonitor updates monitor configure for running container
func ( container * Container ) UpdateMonitor ( restartPolicy containertypes . RestartPolicy ) {
2016-03-18 14:50:19 -04:00
type policySetter interface {
SetPolicy ( containertypes . RestartPolicy )
}
2016-10-05 16:29:56 -04:00
if rm , ok := container . RestartManager ( ) . ( policySetter ) ; ok {
2016-03-18 14:50:19 -04:00
rm . SetPolicy ( restartPolicy )
}
}
// FullHostname returns hostname and optional domain appended to it.
func ( container * Container ) FullHostname ( ) string {
fullHostname := container . Config . Hostname
if container . Config . Domainname != "" {
fullHostname = fmt . Sprintf ( "%s.%s" , fullHostname , container . Config . Domainname )
2016-01-04 10:58:20 -05:00
}
2016-03-18 14:50:19 -04:00
return fullHostname
}
2016-01-04 10:58:20 -05:00
2016-04-08 10:08:58 -04:00
// RestartManager returns the current restartmanager instance connected to container.
2016-10-05 16:29:56 -04:00
func ( container * Container ) RestartManager ( ) restartmanager . RestartManager {
2016-03-18 14:50:19 -04:00
if container . restartManager == nil {
2016-03-22 11:46:40 -04:00
container . restartManager = restartmanager . New ( container . HostConfig . RestartPolicy , container . RestartCount )
2016-01-04 10:58:20 -05:00
}
2016-03-18 14:50:19 -04:00
return container . restartManager
2016-01-04 10:58:20 -05:00
}
2016-03-08 19:54:33 -05:00
2016-10-05 16:29:56 -04:00
// ResetRestartManager initializes new restartmanager based on container config
func ( container * Container ) ResetRestartManager ( resetCount bool ) {
if container . restartManager != nil {
container . restartManager . Cancel ( )
}
if resetCount {
container . RestartCount = 0
}
container . restartManager = nil
}
2016-03-08 19:54:33 -05:00
type attachContext struct {
ctx context . Context
cancel context . CancelFunc
mu sync . Mutex
}
2016-09-04 03:17:58 -04:00
// InitAttachContext initializes or returns existing context for attach calls to
2016-03-08 19:54:33 -05:00
// track container liveness.
func ( container * Container ) InitAttachContext ( ) context . Context {
container . attachContext . mu . Lock ( )
defer container . attachContext . mu . Unlock ( )
if container . attachContext . ctx == nil {
container . attachContext . ctx , container . attachContext . cancel = context . WithCancel ( context . Background ( ) )
}
return container . attachContext . ctx
}
2016-09-04 03:17:58 -04:00
// CancelAttachContext cancels attach context. All attach calls should detach
2016-03-08 19:54:33 -05:00
// after this call.
func ( container * Container ) CancelAttachContext ( ) {
container . attachContext . mu . Lock ( )
if container . attachContext . ctx != nil {
container . attachContext . cancel ( )
container . attachContext . ctx = nil
}
container . attachContext . mu . Unlock ( )
}
2016-10-17 17:39:52 -04:00
func ( container * Container ) startLogging ( ) error {
if container . HostConfig . LogConfig . Type == "none" {
return nil // do not start logging routines
}
2016-11-22 06:40:54 -05:00
l , err := container . StartLogger ( )
2016-10-17 17:39:52 -04:00
if err != nil {
2016-11-22 06:40:54 -05:00
return fmt . Errorf ( "failed to initialize logging driver: %v" , err )
2016-10-17 17:39:52 -04:00
}
copier := logger . NewCopier ( map [ string ] io . Reader { "stdout" : container . StdoutPipe ( ) , "stderr" : container . StderrPipe ( ) } , l )
container . LogCopier = copier
copier . Run ( )
container . LogDriver = l
return nil
}
2016-11-14 15:15:09 -05:00
// StdinPipe gets the stdin stream of the container
func ( container * Container ) StdinPipe ( ) io . WriteCloser {
return container . StreamConfig . StdinPipe ( )
}
// StdoutPipe gets the stdout stream of the container
func ( container * Container ) StdoutPipe ( ) io . ReadCloser {
return container . StreamConfig . StdoutPipe ( )
}
// StderrPipe gets the stderr stream of the container
func ( container * Container ) StderrPipe ( ) io . ReadCloser {
return container . StreamConfig . StderrPipe ( )
}
// CloseStreams closes the container's stdio streams
func ( container * Container ) CloseStreams ( ) error {
return container . StreamConfig . CloseStreams ( )
}
2016-10-17 17:39:52 -04:00
// InitializeStdio is called by libcontainerd to connect the stdio.
2017-12-07 14:26:27 -05:00
func ( container * Container ) InitializeStdio ( iop * cio . DirectIO ) ( cio . IO , error ) {
2016-10-17 17:39:52 -04:00
if err := container . startLogging ( ) ; err != nil {
container . Reset ( false )
2017-09-22 09:52:41 -04:00
return nil , err
2016-10-17 17:39:52 -04:00
}
container . StreamConfig . CopyToPipe ( iop )
2016-11-14 15:15:09 -05:00
if container . StreamConfig . Stdin ( ) == nil && ! container . Config . Tty {
2016-10-17 17:39:52 -04:00
if iop . Stdin != nil {
if err := iop . Stdin . Close ( ) ; err != nil {
2016-10-25 21:34:35 -04:00
logrus . Warnf ( "error closing stdin: %+v" , err )
2016-10-17 17:39:52 -04:00
}
}
}
2017-11-29 19:15:20 -05:00
return & rio { IO : iop , sc : container . StreamConfig } , nil
2016-10-17 17:39:52 -04:00
}
2017-04-11 13:34:19 -04:00
2017-12-18 16:02:23 -05:00
// MountsResourcePath returns the path where mounts are stored for the given mount
func ( container * Container ) MountsResourcePath ( mount string ) ( string , error ) {
return container . GetRootResourcePath ( filepath . Join ( "mounts" , mount ) )
}
2017-04-11 13:34:19 -04:00
// SecretMountPath returns the path of the secret mount for the container
2017-12-18 16:02:23 -05:00
func ( container * Container ) SecretMountPath ( ) ( string , error ) {
return container . MountsResourcePath ( "secrets" )
2017-04-11 13:34:19 -04:00
}
2017-04-28 14:48:52 -04:00
// SecretFilePath returns the path to the location of a secret on the host.
2017-12-18 16:02:23 -05:00
func ( container * Container ) SecretFilePath ( secretRef swarmtypes . SecretReference ) ( string , error ) {
secrets , err := container . SecretMountPath ( )
if err != nil {
return "" , err
}
return filepath . Join ( secrets , secretRef . SecretID ) , nil
2017-04-11 13:34:19 -04:00
}
func getSecretTargetPath ( r * swarmtypes . SecretReference ) string {
if filepath . IsAbs ( r . File . Name ) {
return r . File . Name
}
return filepath . Join ( containerSecretMountPath , r . File . Name )
}
2017-03-16 17:23:33 -04:00
2021-05-01 15:41:34 -04:00
// getConfigTargetPath makes sure that config paths inside the container are
// absolute, as required by the runtime spec, and enforced by runc >= 1.0.0-rc94.
// see https://github.com/opencontainers/runc/issues/2928
func getConfigTargetPath ( r * swarmtypes . ConfigReference ) string {
if filepath . IsAbs ( r . File . Name ) {
return r . File . Name
}
return filepath . Join ( containerConfigMountPath , r . File . Name )
}
2017-05-26 19:14:18 -04:00
// CreateDaemonEnvironment creates a new environment variable slice for this container.
func ( container * Container ) CreateDaemonEnvironment ( tty bool , linkedEnv [ ] string ) [ ] string {
// Setup environment
2021-07-27 07:26:52 -04:00
ctrOS := container . OS
if ctrOS == "" {
ctrOS = runtime . GOOS
2017-05-26 19:14:18 -04:00
}
2020-04-22 13:51:03 -04:00
// Figure out what size slice we need so we can allocate this all at once.
envSize := len ( container . Config . Env )
2021-07-27 07:26:52 -04:00
if runtime . GOOS != "windows" {
2020-04-22 13:51:03 -04:00
envSize += 2 + len ( linkedEnv )
}
if tty {
envSize ++
}
env := make ( [ ] string , 0 , envSize )
2021-03-18 16:01:46 -04:00
if runtime . GOOS != "windows" {
2021-07-27 07:26:52 -04:00
env = append ( env , "PATH=" + system . DefaultPathEnv ( ctrOS ) )
2020-04-22 13:51:03 -04:00
env = append ( env , "HOSTNAME=" + container . Config . Hostname )
2017-05-26 19:14:18 -04:00
if tty {
env = append ( env , "TERM=xterm" )
}
env = append ( env , linkedEnv ... )
}
// because the env on the container can override certain default values
// we need to replace the 'env' keys where they match and append anything
// else.
2017-06-26 12:11:54 -04:00
env = ReplaceOrAppendEnvValues ( env , container . Config . Env )
return env
2017-05-26 19:14:18 -04:00
}
2017-09-22 09:52:41 -04:00
2022-05-10 15:59:00 -04:00
// RestoreTask restores the containerd container and task handles and reattaches
// the IO for the running task. Container state is not synced with containerd's
// state.
//
// An errdefs.NotFound error is returned if the container does not exist in
// containerd. However, a nil error is returned if the task does not exist in
// containerd.
func ( container * Container ) RestoreTask ( ctx context . Context , client libcontainerdtypes . Client ) error {
container . Lock ( )
defer container . Unlock ( )
var err error
container . ctr , err = client . LoadContainer ( ctx , container . ID )
if err != nil {
return err
}
container . task , err = container . ctr . AttachTask ( ctx , container . InitializeStdio )
if err != nil && ! errdefs . IsNotFound ( err ) {
return err
}
return nil
}
// GetRunningTask asserts that the container is running and returns the Task for
// the container. An errdefs.Conflict error is returned if the container is not
// in the Running state.
//
// A system error is returned if container is in a bad state: Running is true
// but has a nil Task.
//
// The container lock must be held when calling this method.
func ( container * Container ) GetRunningTask ( ) ( libcontainerdtypes . Task , error ) {
if ! container . Running {
return nil , errdefs . Conflict ( fmt . Errorf ( "container %s is not running" , container . ID ) )
}
tsk , ok := container . Task ( )
if ! ok {
return nil , errdefs . System ( errors . WithStack ( fmt . Errorf ( "container %s is in Running state but has no containerd Task set" , container . ID ) ) )
}
return tsk , nil
}
2017-11-29 19:15:20 -05:00
type rio struct {
cio . IO
2017-09-22 09:52:41 -04:00
sc * stream . Config
}
2017-11-29 19:15:20 -05:00
func ( i * rio ) Close ( ) error {
2017-09-22 09:52:41 -04:00
i . IO . Close ( )
return i . sc . CloseStreams ( )
}
2017-11-29 19:15:20 -05:00
func ( i * rio ) Wait ( ) {
2019-06-20 16:21:42 -04:00
i . sc . Wait ( context . Background ( ) )
2017-09-22 09:52:41 -04:00
i . IO . Wait ( )
}