2016-03-25 19:38:00 -04:00
|
|
|
// +build !windows,!solaris
|
2015-07-16 17:14:58 -04:00
|
|
|
|
|
|
|
package daemon
|
|
|
|
|
2015-09-24 16:56:57 -04:00
|
|
|
import (
|
2016-09-06 14:18:12 -04:00
|
|
|
"github.com/docker/docker/api/types"
|
2016-02-10 15:16:59 -05:00
|
|
|
"github.com/docker/docker/api/types/backend"
|
2016-09-06 14:18:12 -04:00
|
|
|
"github.com/docker/docker/api/types/versions/v1p19"
|
2015-11-12 14:55:17 -05:00
|
|
|
"github.com/docker/docker/container"
|
2016-02-10 15:16:59 -05:00
|
|
|
"github.com/docker/docker/daemon/exec"
|
2015-09-24 16:56:57 -04:00
|
|
|
)
|
2015-07-16 17:14:58 -04:00
|
|
|
|
|
|
|
// This sets platform-specific fields
|
2015-11-12 14:55:17 -05:00
|
|
|
func setPlatformSpecificContainerFields(container *container.Container, contJSONBase *types.ContainerJSONBase) *types.ContainerJSONBase {
|
2015-07-16 17:14:58 -04:00
|
|
|
contJSONBase.AppArmorProfile = container.AppArmorProfile
|
|
|
|
contJSONBase.ResolvConfPath = container.ResolvConfPath
|
|
|
|
contJSONBase.HostnamePath = container.HostnamePath
|
|
|
|
contJSONBase.HostsPath = container.HostsPath
|
|
|
|
|
|
|
|
return contJSONBase
|
|
|
|
}
|
|
|
|
|
2015-11-24 12:55:45 -05:00
|
|
|
// containerInspectPre120 gets containers for pre 1.20 APIs.
|
|
|
|
func (daemon *Daemon) containerInspectPre120(name string) (*v1p19.ContainerJSON, error) {
|
2015-12-11 12:39:28 -05:00
|
|
|
container, err := daemon.GetContainer(name)
|
2015-07-16 17:14:58 -04:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
container.Lock()
|
|
|
|
defer container.Unlock()
|
|
|
|
|
2017-02-18 21:11:48 -05:00
|
|
|
base, err := daemon.getInspectData(container)
|
2015-07-16 17:14:58 -04:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
volumes := make(map[string]string)
|
|
|
|
volumesRW := make(map[string]bool)
|
|
|
|
for _, m := range container.MountPoints {
|
|
|
|
volumes[m.Destination] = m.Path()
|
|
|
|
volumesRW[m.Destination] = m.RW
|
|
|
|
}
|
|
|
|
|
2015-09-24 16:56:57 -04:00
|
|
|
config := &v1p19.ContainerConfig{
|
2015-11-02 11:28:34 -05:00
|
|
|
Config: container.Config,
|
|
|
|
MacAddress: container.Config.MacAddress,
|
|
|
|
NetworkDisabled: container.Config.NetworkDisabled,
|
|
|
|
ExposedPorts: container.Config.ExposedPorts,
|
2015-11-12 14:55:17 -05:00
|
|
|
VolumeDriver: container.HostConfig.VolumeDriver,
|
|
|
|
Memory: container.HostConfig.Memory,
|
|
|
|
MemorySwap: container.HostConfig.MemorySwap,
|
|
|
|
CPUShares: container.HostConfig.CPUShares,
|
|
|
|
CPUSet: container.HostConfig.CpusetCpus,
|
2015-07-16 17:14:58 -04:00
|
|
|
}
|
2015-10-30 14:57:15 -04:00
|
|
|
networkSettings := daemon.getBackwardsCompatibleNetworkSettings(container.NetworkSettings)
|
2015-07-16 17:14:58 -04:00
|
|
|
|
2015-11-02 11:28:34 -05:00
|
|
|
return &v1p19.ContainerJSON{
|
|
|
|
ContainerJSONBase: base,
|
|
|
|
Volumes: volumes,
|
|
|
|
VolumesRW: volumesRW,
|
|
|
|
Config: config,
|
|
|
|
NetworkSettings: networkSettings,
|
|
|
|
}, nil
|
2015-07-16 17:14:58 -04:00
|
|
|
}
|
|
|
|
|
2015-11-12 14:55:17 -05:00
|
|
|
func addMountPoints(container *container.Container) []types.MountPoint {
|
2015-07-16 17:14:58 -04:00
|
|
|
mountPoints := make([]types.MountPoint, 0, len(container.MountPoints))
|
|
|
|
for _, m := range container.MountPoints {
|
|
|
|
mountPoints = append(mountPoints, types.MountPoint{
|
Add new `HostConfig` field, `Mounts`.
`Mounts` allows users to specify in a much safer way the volumes they
want to use in the container.
This replaces `Binds` and `Volumes`, which both still exist, but
`Mounts` and `Binds`/`Volumes` are exclussive.
The CLI will continue to use `Binds` and `Volumes` due to concerns with
parsing the volume specs on the client side and cross-platform support
(for now).
The new API follows exactly the services mount API.
Example usage of `Mounts`:
```
$ curl -XPOST localhost:2375/containers/create -d '{
"Image": "alpine:latest",
"HostConfig": {
"Mounts": [{
"Type": "Volume",
"Target": "/foo"
},{
"Type": "bind",
"Source": "/var/run/docker.sock",
"Target": "/var/run/docker.sock",
},{
"Type": "volume",
"Name": "important_data",
"Target": "/var/data",
"ReadOnly": true,
"VolumeOptions": {
"DriverConfig": {
Name: "awesomeStorage",
Options: {"size": "10m"},
Labels: {"some":"label"}
}
}]
}
}'
```
There are currently 2 types of mounts:
- **bind**: Paths on the host that get mounted into the
container. Paths must exist prior to creating the container.
- **volume**: Volumes that persist after the
container is removed.
Not all fields are available in each type, and validation is done to
ensure these fields aren't mixed up between types.
Signed-off-by: Brian Goff <cpuguy83@gmail.com>
2016-04-26 14:25:35 -04:00
|
|
|
Type: m.Type,
|
2015-07-16 17:14:58 -04:00
|
|
|
Name: m.Name,
|
|
|
|
Source: m.Path(),
|
|
|
|
Destination: m.Destination,
|
|
|
|
Driver: m.Driver,
|
|
|
|
Mode: m.Mode,
|
|
|
|
RW: m.RW,
|
2015-10-23 16:57:57 -04:00
|
|
|
Propagation: m.Propagation,
|
2015-07-16 17:14:58 -04:00
|
|
|
})
|
|
|
|
}
|
|
|
|
return mountPoints
|
|
|
|
}
|
2016-02-10 15:16:59 -05:00
|
|
|
|
|
|
|
func inspectExecProcessConfig(e *exec.Config) *backend.ExecProcessConfig {
|
|
|
|
return &backend.ExecProcessConfig{
|
2016-03-18 14:50:19 -04:00
|
|
|
Tty: e.Tty,
|
|
|
|
Entrypoint: e.Entrypoint,
|
|
|
|
Arguments: e.Args,
|
|
|
|
Privileged: &e.Privileged,
|
|
|
|
User: e.User,
|
2016-02-10 15:16:59 -05:00
|
|
|
}
|
|
|
|
}
|