2018-02-05 16:05:59 -05:00
|
|
|
package client // import "github.com/docker/docker/client"
|
2016-09-06 14:46:37 -04:00
|
|
|
|
|
|
|
import (
|
2018-04-19 18:30:59 -04:00
|
|
|
"context"
|
2016-09-06 14:46:37 -04:00
|
|
|
"encoding/json"
|
|
|
|
|
|
|
|
"github.com/docker/docker/api/types"
|
2022-06-15 03:28:20 -04:00
|
|
|
"github.com/docker/docker/api/types/versions"
|
2016-09-06 14:46:37 -04:00
|
|
|
)
|
|
|
|
|
|
|
|
// ContainerExecCreate creates a new exec configuration to run an exec process.
|
2016-10-18 18:56:45 -04:00
|
|
|
func (cli *Client) ContainerExecCreate(ctx context.Context, container string, config types.ExecConfig) (types.IDResponse, error) {
|
|
|
|
var response types.IDResponse
|
2016-11-02 20:43:32 -04:00
|
|
|
|
|
|
|
if err := cli.NewVersionError("1.25", "env"); len(config.Env) != 0 && err != nil {
|
|
|
|
return response, err
|
|
|
|
}
|
2022-06-15 03:28:20 -04:00
|
|
|
if versions.LessThan(cli.ClientVersion(), "1.42") {
|
|
|
|
config.ConsoleSize = nil
|
|
|
|
}
|
2016-11-02 20:43:32 -04:00
|
|
|
|
2016-09-06 14:46:37 -04:00
|
|
|
resp, err := cli.post(ctx, "/containers/"+container+"/exec", nil, config, nil)
|
2019-02-11 07:26:12 -05:00
|
|
|
defer ensureReaderClosed(resp)
|
2016-09-06 14:46:37 -04:00
|
|
|
if err != nil {
|
|
|
|
return response, err
|
|
|
|
}
|
|
|
|
err = json.NewDecoder(resp.body).Decode(&response)
|
|
|
|
return response, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// ContainerExecStart starts an exec process already created in the docker host.
|
|
|
|
func (cli *Client) ContainerExecStart(ctx context.Context, execID string, config types.ExecStartCheck) error {
|
2022-06-15 03:28:20 -04:00
|
|
|
if versions.LessThan(cli.ClientVersion(), "1.42") {
|
|
|
|
config.ConsoleSize = nil
|
|
|
|
}
|
2016-09-06 14:46:37 -04:00
|
|
|
resp, err := cli.post(ctx, "/exec/"+execID+"/start", nil, config, nil)
|
|
|
|
ensureReaderClosed(resp)
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
// ContainerExecAttach attaches a connection to an exec process in the server.
|
|
|
|
// It returns a types.HijackedConnection with the hijacked connection
|
|
|
|
// and the a reader to get output. It's up to the called to close
|
|
|
|
// the hijacked connection by calling types.HijackedResponse.Close.
|
2017-10-08 18:08:11 -04:00
|
|
|
func (cli *Client) ContainerExecAttach(ctx context.Context, execID string, config types.ExecStartCheck) (types.HijackedResponse, error) {
|
2022-06-15 03:28:20 -04:00
|
|
|
if versions.LessThan(cli.ClientVersion(), "1.42") {
|
|
|
|
config.ConsoleSize = nil
|
|
|
|
}
|
2019-08-28 07:46:32 -04:00
|
|
|
headers := map[string][]string{
|
|
|
|
"Content-Type": {"application/json"},
|
|
|
|
}
|
2016-09-06 14:46:37 -04:00
|
|
|
return cli.postHijacked(ctx, "/exec/"+execID+"/start", nil, config, headers)
|
|
|
|
}
|
|
|
|
|
|
|
|
// ContainerExecInspect returns information about a specific exec process on the docker host.
|
|
|
|
func (cli *Client) ContainerExecInspect(ctx context.Context, execID string) (types.ContainerExecInspect, error) {
|
|
|
|
var response types.ContainerExecInspect
|
|
|
|
resp, err := cli.get(ctx, "/exec/"+execID+"/json", nil, nil)
|
|
|
|
if err != nil {
|
|
|
|
return response, err
|
|
|
|
}
|
|
|
|
|
|
|
|
err = json.NewDecoder(resp.body).Decode(&response)
|
|
|
|
ensureReaderClosed(resp)
|
|
|
|
return response, err
|
|
|
|
}
|