server.go 47 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692
  1. package server
  2. import (
  3. "bufio"
  4. "bytes"
  5. "runtime"
  6. "time"
  7. "encoding/base64"
  8. "encoding/json"
  9. "fmt"
  10. "io"
  11. "net"
  12. "net/http"
  13. "os"
  14. "strconv"
  15. "strings"
  16. "code.google.com/p/go.net/websocket"
  17. "github.com/gorilla/mux"
  18. "github.com/Sirupsen/logrus"
  19. "github.com/docker/docker/api"
  20. "github.com/docker/docker/api/types"
  21. "github.com/docker/docker/autogen/dockerversion"
  22. "github.com/docker/docker/builder"
  23. "github.com/docker/docker/daemon"
  24. "github.com/docker/docker/daemon/networkdriver/bridge"
  25. "github.com/docker/docker/engine"
  26. "github.com/docker/docker/graph"
  27. "github.com/docker/docker/pkg/jsonmessage"
  28. "github.com/docker/docker/pkg/parsers"
  29. "github.com/docker/docker/pkg/parsers/filters"
  30. "github.com/docker/docker/pkg/parsers/kernel"
  31. "github.com/docker/docker/pkg/signal"
  32. "github.com/docker/docker/pkg/stdcopy"
  33. "github.com/docker/docker/pkg/streamformatter"
  34. "github.com/docker/docker/pkg/version"
  35. "github.com/docker/docker/registry"
  36. "github.com/docker/docker/runconfig"
  37. "github.com/docker/docker/utils"
  38. )
  39. type ServerConfig struct {
  40. Logging bool
  41. EnableCors bool
  42. CorsHeaders string
  43. Version string
  44. SocketGroup string
  45. Tls bool
  46. TlsVerify bool
  47. TlsCa string
  48. TlsCert string
  49. TlsKey string
  50. }
  51. type Server struct {
  52. daemon *daemon.Daemon
  53. cfg *ServerConfig
  54. router *mux.Router
  55. start chan struct{}
  56. // TODO: delete engine
  57. eng *engine.Engine
  58. }
  59. func New(cfg *ServerConfig, eng *engine.Engine) *Server {
  60. srv := &Server{
  61. cfg: cfg,
  62. start: make(chan struct{}),
  63. eng: eng,
  64. }
  65. r := createRouter(srv, eng)
  66. srv.router = r
  67. return srv
  68. }
  69. func (s *Server) SetDaemon(d *daemon.Daemon) {
  70. s.daemon = d
  71. }
  72. type serverCloser interface {
  73. Serve() error
  74. Close() error
  75. }
  76. // ServeApi loops through all of the protocols sent in to docker and spawns
  77. // off a go routine to setup a serving http.Server for each.
  78. func (s *Server) ServeApi(protoAddrs []string) error {
  79. var chErrors = make(chan error, len(protoAddrs))
  80. for _, protoAddr := range protoAddrs {
  81. protoAddrParts := strings.SplitN(protoAddr, "://", 2)
  82. if len(protoAddrParts) != 2 {
  83. return fmt.Errorf("bad format, expected PROTO://ADDR")
  84. }
  85. go func(proto, addr string) {
  86. logrus.Infof("Listening for HTTP on %s (%s)", proto, addr)
  87. srv, err := s.newServer(proto, addr)
  88. if err != nil {
  89. chErrors <- err
  90. return
  91. }
  92. s.eng.OnShutdown(func() {
  93. if err := srv.Close(); err != nil {
  94. logrus.Error(err)
  95. }
  96. })
  97. if err = srv.Serve(); err != nil && strings.Contains(err.Error(), "use of closed network connection") {
  98. err = nil
  99. }
  100. chErrors <- err
  101. }(protoAddrParts[0], protoAddrParts[1])
  102. }
  103. for i := 0; i < len(protoAddrs); i++ {
  104. err := <-chErrors
  105. if err != nil {
  106. return err
  107. }
  108. }
  109. return nil
  110. }
  111. type HttpServer struct {
  112. srv *http.Server
  113. l net.Listener
  114. }
  115. func (s *HttpServer) Serve() error {
  116. return s.srv.Serve(s.l)
  117. }
  118. func (s *HttpServer) Close() error {
  119. return s.l.Close()
  120. }
  121. type HttpApiFunc func(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error
  122. func hijackServer(w http.ResponseWriter) (io.ReadCloser, io.Writer, error) {
  123. conn, _, err := w.(http.Hijacker).Hijack()
  124. if err != nil {
  125. return nil, nil, err
  126. }
  127. // Flush the options to make sure the client sets the raw mode
  128. conn.Write([]byte{})
  129. return conn, conn, nil
  130. }
  131. func closeStreams(streams ...interface{}) {
  132. for _, stream := range streams {
  133. if tcpc, ok := stream.(interface {
  134. CloseWrite() error
  135. }); ok {
  136. tcpc.CloseWrite()
  137. } else if closer, ok := stream.(io.Closer); ok {
  138. closer.Close()
  139. }
  140. }
  141. }
  142. // Check to make sure request's Content-Type is application/json
  143. func checkForJson(r *http.Request) error {
  144. ct := r.Header.Get("Content-Type")
  145. // No Content-Type header is ok as long as there's no Body
  146. if ct == "" {
  147. if r.Body == nil || r.ContentLength == 0 {
  148. return nil
  149. }
  150. }
  151. // Otherwise it better be json
  152. if api.MatchesContentType(ct, "application/json") {
  153. return nil
  154. }
  155. return fmt.Errorf("Content-Type specified (%s) must be 'application/json'", ct)
  156. }
  157. //If we don't do this, POST method without Content-type (even with empty body) will fail
  158. func parseForm(r *http.Request) error {
  159. if r == nil {
  160. return nil
  161. }
  162. if err := r.ParseForm(); err != nil && !strings.HasPrefix(err.Error(), "mime:") {
  163. return err
  164. }
  165. return nil
  166. }
  167. func parseMultipartForm(r *http.Request) error {
  168. if err := r.ParseMultipartForm(4096); err != nil && !strings.HasPrefix(err.Error(), "mime:") {
  169. return err
  170. }
  171. return nil
  172. }
  173. func httpError(w http.ResponseWriter, err error) {
  174. statusCode := http.StatusInternalServerError
  175. // FIXME: this is brittle and should not be necessary.
  176. // If we need to differentiate between different possible error types, we should
  177. // create appropriate error types with clearly defined meaning.
  178. errStr := strings.ToLower(err.Error())
  179. if strings.Contains(errStr, "no such") {
  180. statusCode = http.StatusNotFound
  181. } else if strings.Contains(errStr, "bad parameter") {
  182. statusCode = http.StatusBadRequest
  183. } else if strings.Contains(errStr, "conflict") {
  184. statusCode = http.StatusConflict
  185. } else if strings.Contains(errStr, "impossible") {
  186. statusCode = http.StatusNotAcceptable
  187. } else if strings.Contains(errStr, "wrong login/password") {
  188. statusCode = http.StatusUnauthorized
  189. } else if strings.Contains(errStr, "hasn't been activated") {
  190. statusCode = http.StatusForbidden
  191. }
  192. if err != nil {
  193. logrus.Errorf("HTTP Error: statusCode=%d %v", statusCode, err)
  194. http.Error(w, err.Error(), statusCode)
  195. }
  196. }
  197. // writeJSONEnv writes the engine.Env values to the http response stream as a
  198. // json encoded body.
  199. func writeJSONEnv(w http.ResponseWriter, code int, v engine.Env) error {
  200. w.Header().Set("Content-Type", "application/json")
  201. w.WriteHeader(code)
  202. return v.Encode(w)
  203. }
  204. // writeJSON writes the value v to the http response stream as json with standard
  205. // json encoding.
  206. func writeJSON(w http.ResponseWriter, code int, v interface{}) error {
  207. w.Header().Set("Content-Type", "application/json")
  208. w.WriteHeader(code)
  209. return json.NewEncoder(w).Encode(v)
  210. }
  211. func streamJSON(out *engine.Output, w http.ResponseWriter, flush bool) {
  212. w.Header().Set("Content-Type", "application/json")
  213. if flush {
  214. out.Add(utils.NewWriteFlusher(w))
  215. } else {
  216. out.Add(w)
  217. }
  218. }
  219. func (s *Server) postAuth(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  220. var config *registry.AuthConfig
  221. err := json.NewDecoder(r.Body).Decode(&config)
  222. r.Body.Close()
  223. if err != nil {
  224. return err
  225. }
  226. status, err := s.daemon.RegistryService.Auth(config)
  227. if err != nil {
  228. return err
  229. }
  230. return writeJSON(w, http.StatusOK, &types.AuthResponse{
  231. Status: status,
  232. })
  233. }
  234. func (s *Server) getVersion(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  235. w.Header().Set("Content-Type", "application/json")
  236. v := &types.Version{
  237. Version: dockerversion.VERSION,
  238. ApiVersion: api.APIVERSION,
  239. GitCommit: dockerversion.GITCOMMIT,
  240. GoVersion: runtime.Version(),
  241. Os: runtime.GOOS,
  242. Arch: runtime.GOARCH,
  243. }
  244. if kernelVersion, err := kernel.GetKernelVersion(); err == nil {
  245. v.KernelVersion = kernelVersion.String()
  246. }
  247. return writeJSON(w, http.StatusOK, v)
  248. }
  249. func (s *Server) postContainersKill(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  250. if vars == nil {
  251. return fmt.Errorf("Missing parameter")
  252. }
  253. err := parseForm(r)
  254. if err != nil {
  255. return err
  256. }
  257. var sig uint64
  258. name := vars["name"]
  259. // If we have a signal, look at it. Otherwise, do nothing
  260. if sigStr := vars["signal"]; sigStr != "" {
  261. // Check if we passed the signal as a number:
  262. // The largest legal signal is 31, so let's parse on 5 bits
  263. sig, err = strconv.ParseUint(sigStr, 10, 5)
  264. if err != nil {
  265. // The signal is not a number, treat it as a string (either like
  266. // "KILL" or like "SIGKILL")
  267. sig = uint64(signal.SignalMap[strings.TrimPrefix(sigStr, "SIG")])
  268. }
  269. if sig == 0 {
  270. return fmt.Errorf("Invalid signal: %s", sigStr)
  271. }
  272. }
  273. if err = s.daemon.ContainerKill(name, sig); err != nil {
  274. return err
  275. }
  276. w.WriteHeader(http.StatusNoContent)
  277. return nil
  278. }
  279. func (s *Server) postContainersPause(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  280. if vars == nil {
  281. return fmt.Errorf("Missing parameter")
  282. }
  283. if err := parseForm(r); err != nil {
  284. return err
  285. }
  286. name := vars["name"]
  287. cont, err := s.daemon.Get(name)
  288. if err != nil {
  289. return err
  290. }
  291. if err := cont.Pause(); err != nil {
  292. return fmt.Errorf("Cannot pause container %s: %s", name, err)
  293. }
  294. cont.LogEvent("pause")
  295. w.WriteHeader(http.StatusNoContent)
  296. return nil
  297. }
  298. func (s *Server) postContainersUnpause(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  299. if vars == nil {
  300. return fmt.Errorf("Missing parameter")
  301. }
  302. if err := parseForm(r); err != nil {
  303. return err
  304. }
  305. name := vars["name"]
  306. cont, err := s.daemon.Get(name)
  307. if err != nil {
  308. return err
  309. }
  310. if err := cont.Unpause(); err != nil {
  311. return fmt.Errorf("Cannot unpause container %s: %s", name, err)
  312. }
  313. cont.LogEvent("unpause")
  314. w.WriteHeader(http.StatusNoContent)
  315. return nil
  316. }
  317. func (s *Server) getContainersExport(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  318. if vars == nil {
  319. return fmt.Errorf("Missing parameter")
  320. }
  321. return s.daemon.ContainerExport(vars["name"], w)
  322. }
  323. func (s *Server) getImagesJSON(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  324. if err := parseForm(r); err != nil {
  325. return err
  326. }
  327. imagesConfig := graph.ImagesConfig{
  328. Filters: r.Form.Get("filters"),
  329. // FIXME this parameter could just be a match filter
  330. Filter: r.Form.Get("filter"),
  331. All: boolValue(r, "all"),
  332. }
  333. images, err := s.daemon.Repositories().Images(&imagesConfig)
  334. if err != nil {
  335. return err
  336. }
  337. if version.GreaterThanOrEqualTo("1.7") {
  338. return writeJSON(w, http.StatusOK, images)
  339. }
  340. legacyImages := []types.LegacyImage{}
  341. for _, image := range images {
  342. for _, repoTag := range image.RepoTags {
  343. repo, tag := parsers.ParseRepositoryTag(repoTag)
  344. legacyImage := types.LegacyImage{
  345. Repository: repo,
  346. Tag: tag,
  347. ID: image.ID,
  348. Created: image.Created,
  349. Size: image.Size,
  350. VirtualSize: image.VirtualSize,
  351. }
  352. legacyImages = append(legacyImages, legacyImage)
  353. }
  354. }
  355. return writeJSON(w, http.StatusOK, legacyImages)
  356. }
  357. func (s *Server) getImagesViz(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  358. if version.GreaterThan("1.6") {
  359. w.WriteHeader(http.StatusNotFound)
  360. return fmt.Errorf("This is now implemented in the client.")
  361. }
  362. eng.ServeHTTP(w, r)
  363. return nil
  364. }
  365. func (s *Server) getInfo(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  366. w.Header().Set("Content-Type", "application/json")
  367. info, err := s.daemon.SystemInfo()
  368. if err != nil {
  369. return err
  370. }
  371. return writeJSON(w, http.StatusOK, info)
  372. }
  373. func (s *Server) getEvents(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  374. if err := parseForm(r); err != nil {
  375. return err
  376. }
  377. var since int64 = -1
  378. if r.Form.Get("since") != "" {
  379. s, err := strconv.ParseInt(r.Form.Get("since"), 10, 64)
  380. if err != nil {
  381. return err
  382. }
  383. since = s
  384. }
  385. var until int64 = -1
  386. if r.Form.Get("until") != "" {
  387. u, err := strconv.ParseInt(r.Form.Get("until"), 10, 64)
  388. if err != nil {
  389. return err
  390. }
  391. until = u
  392. }
  393. timer := time.NewTimer(0)
  394. timer.Stop()
  395. if until > 0 {
  396. dur := time.Unix(until, 0).Sub(time.Now())
  397. timer = time.NewTimer(dur)
  398. }
  399. ef, err := filters.FromParam(r.Form.Get("filters"))
  400. if err != nil {
  401. return err
  402. }
  403. isFiltered := func(field string, filter []string) bool {
  404. if len(filter) == 0 {
  405. return false
  406. }
  407. for _, v := range filter {
  408. if v == field {
  409. return false
  410. }
  411. if strings.Contains(field, ":") {
  412. image := strings.Split(field, ":")
  413. if image[0] == v {
  414. return false
  415. }
  416. }
  417. }
  418. return true
  419. }
  420. d := s.daemon
  421. es := d.EventsService
  422. w.Header().Set("Content-Type", "application/json")
  423. enc := json.NewEncoder(utils.NewWriteFlusher(w))
  424. getContainerId := func(cn string) string {
  425. c, err := d.Get(cn)
  426. if err != nil {
  427. return ""
  428. }
  429. return c.ID
  430. }
  431. sendEvent := func(ev *jsonmessage.JSONMessage) error {
  432. //incoming container filter can be name,id or partial id, convert and replace as a full container id
  433. for i, cn := range ef["container"] {
  434. ef["container"][i] = getContainerId(cn)
  435. }
  436. if isFiltered(ev.Status, ef["event"]) || isFiltered(ev.From, ef["image"]) ||
  437. isFiltered(ev.ID, ef["container"]) {
  438. return nil
  439. }
  440. return enc.Encode(ev)
  441. }
  442. current, l := es.Subscribe()
  443. defer es.Evict(l)
  444. for _, ev := range current {
  445. if ev.Time < since {
  446. continue
  447. }
  448. if err := sendEvent(ev); err != nil {
  449. return err
  450. }
  451. }
  452. for {
  453. select {
  454. case ev := <-l:
  455. jev, ok := ev.(*jsonmessage.JSONMessage)
  456. if !ok {
  457. continue
  458. }
  459. if err := sendEvent(jev); err != nil {
  460. return err
  461. }
  462. case <-timer.C:
  463. return nil
  464. }
  465. }
  466. }
  467. func (s *Server) getImagesHistory(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  468. if vars == nil {
  469. return fmt.Errorf("Missing parameter")
  470. }
  471. name := vars["name"]
  472. history, err := s.daemon.Repositories().History(name)
  473. if err != nil {
  474. return err
  475. }
  476. return writeJSON(w, http.StatusOK, history)
  477. }
  478. func (s *Server) getContainersChanges(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  479. if vars == nil {
  480. return fmt.Errorf("Missing parameter")
  481. }
  482. name := vars["name"]
  483. cont, err := s.daemon.Get(name)
  484. if err != nil {
  485. return err
  486. }
  487. changes, err := cont.Changes()
  488. if err != nil {
  489. return err
  490. }
  491. return writeJSON(w, http.StatusOK, changes)
  492. }
  493. func (s *Server) getContainersTop(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  494. if version.LessThan("1.4") {
  495. return fmt.Errorf("top was improved a lot since 1.3, Please upgrade your docker client.")
  496. }
  497. if vars == nil {
  498. return fmt.Errorf("Missing parameter")
  499. }
  500. if err := parseForm(r); err != nil {
  501. return err
  502. }
  503. procList, err := s.daemon.ContainerTop(vars["name"], r.Form.Get("ps_args"))
  504. if err != nil {
  505. return err
  506. }
  507. return writeJSON(w, http.StatusOK, procList)
  508. }
  509. func (s *Server) getContainersJSON(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  510. if err := parseForm(r); err != nil {
  511. return err
  512. }
  513. config := &daemon.ContainersConfig{
  514. All: boolValue(r, "all"),
  515. Size: boolValue(r, "size"),
  516. Since: r.Form.Get("since"),
  517. Before: r.Form.Get("before"),
  518. Filters: r.Form.Get("filters"),
  519. }
  520. if tmpLimit := r.Form.Get("limit"); tmpLimit != "" {
  521. limit, err := strconv.Atoi(tmpLimit)
  522. if err != nil {
  523. return err
  524. }
  525. config.Limit = limit
  526. }
  527. containers, err := s.daemon.Containers(config)
  528. if err != nil {
  529. return err
  530. }
  531. return writeJSON(w, http.StatusOK, containers)
  532. }
  533. func (s *Server) getContainersStats(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  534. if err := parseForm(r); err != nil {
  535. return err
  536. }
  537. if vars == nil {
  538. return fmt.Errorf("Missing parameter")
  539. }
  540. return s.daemon.ContainerStats(vars["name"], utils.NewWriteFlusher(w))
  541. }
  542. func (s *Server) getContainersLogs(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  543. if err := parseForm(r); err != nil {
  544. return err
  545. }
  546. if vars == nil {
  547. return fmt.Errorf("Missing parameter")
  548. }
  549. // Validate args here, because we can't return not StatusOK after job.Run() call
  550. stdout, stderr := boolValue(r, "stdout"), boolValue(r, "stderr")
  551. if !(stdout || stderr) {
  552. return fmt.Errorf("Bad parameters: you must choose at least one stream")
  553. }
  554. logsConfig := &daemon.ContainerLogsConfig{
  555. Follow: boolValue(r, "follow"),
  556. Timestamps: boolValue(r, "timestamps"),
  557. Tail: r.Form.Get("tail"),
  558. UseStdout: stdout,
  559. UseStderr: stderr,
  560. OutStream: utils.NewWriteFlusher(w),
  561. }
  562. if err := s.daemon.ContainerLogs(vars["name"], logsConfig); err != nil {
  563. fmt.Fprintf(w, "Error running logs job: %s\n", err)
  564. }
  565. return nil
  566. }
  567. func (s *Server) postImagesTag(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  568. if err := parseForm(r); err != nil {
  569. return err
  570. }
  571. if vars == nil {
  572. return fmt.Errorf("Missing parameter")
  573. }
  574. repo := r.Form.Get("repo")
  575. tag := r.Form.Get("tag")
  576. force := boolValue(r, "force")
  577. if err := s.daemon.Repositories().Tag(repo, tag, vars["name"], force); err != nil {
  578. return err
  579. }
  580. w.WriteHeader(http.StatusCreated)
  581. return nil
  582. }
  583. func (s *Server) postCommit(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  584. if err := parseForm(r); err != nil {
  585. return err
  586. }
  587. if err := checkForJson(r); err != nil {
  588. return err
  589. }
  590. cont := r.Form.Get("container")
  591. pause := boolValue(r, "pause")
  592. if r.FormValue("pause") == "" && version.GreaterThanOrEqualTo("1.13") {
  593. pause = true
  594. }
  595. c, _, err := runconfig.DecodeContainerConfig(r.Body)
  596. if err != nil && err != io.EOF { //Do not fail if body is empty.
  597. return err
  598. }
  599. if c == nil {
  600. c = &runconfig.Config{}
  601. }
  602. containerCommitConfig := &daemon.ContainerCommitConfig{
  603. Pause: pause,
  604. Repo: r.Form.Get("repo"),
  605. Tag: r.Form.Get("tag"),
  606. Author: r.Form.Get("author"),
  607. Comment: r.Form.Get("comment"),
  608. Changes: r.Form["changes"],
  609. Config: c,
  610. }
  611. imgID, err := builder.Commit(s.daemon, eng, cont, containerCommitConfig)
  612. if err != nil {
  613. return err
  614. }
  615. return writeJSON(w, http.StatusCreated, &types.ContainerCommitResponse{
  616. ID: imgID,
  617. })
  618. }
  619. // Creates an image from Pull or from Import
  620. func (s *Server) postImagesCreate(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  621. if err := parseForm(r); err != nil {
  622. return err
  623. }
  624. var (
  625. image = r.Form.Get("fromImage")
  626. repo = r.Form.Get("repo")
  627. tag = r.Form.Get("tag")
  628. )
  629. authEncoded := r.Header.Get("X-Registry-Auth")
  630. authConfig := &registry.AuthConfig{}
  631. if authEncoded != "" {
  632. authJson := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded))
  633. if err := json.NewDecoder(authJson).Decode(authConfig); err != nil {
  634. // for a pull it is not an error if no auth was given
  635. // to increase compatibility with the existing api it is defaulting to be empty
  636. authConfig = &registry.AuthConfig{}
  637. }
  638. }
  639. if image != "" { //pull
  640. if tag == "" {
  641. image, tag = parsers.ParseRepositoryTag(image)
  642. }
  643. metaHeaders := map[string][]string{}
  644. for k, v := range r.Header {
  645. if strings.HasPrefix(k, "X-Meta-") {
  646. metaHeaders[k] = v
  647. }
  648. }
  649. imagePullConfig := &graph.ImagePullConfig{
  650. Parallel: version.GreaterThan("1.3"),
  651. MetaHeaders: metaHeaders,
  652. AuthConfig: authConfig,
  653. OutStream: utils.NewWriteFlusher(w),
  654. }
  655. if version.GreaterThan("1.0") {
  656. imagePullConfig.Json = true
  657. w.Header().Set("Content-Type", "application/json")
  658. } else {
  659. imagePullConfig.Json = false
  660. }
  661. if err := s.daemon.Repositories().Pull(image, tag, imagePullConfig, eng); err != nil {
  662. return err
  663. }
  664. } else { //import
  665. if tag == "" {
  666. repo, tag = parsers.ParseRepositoryTag(repo)
  667. }
  668. src := r.Form.Get("fromSrc")
  669. imageImportConfig := &graph.ImageImportConfig{
  670. Changes: r.Form["changes"],
  671. InConfig: r.Body,
  672. OutStream: utils.NewWriteFlusher(w),
  673. }
  674. if version.GreaterThan("1.0") {
  675. imageImportConfig.Json = true
  676. w.Header().Set("Content-Type", "application/json")
  677. } else {
  678. imageImportConfig.Json = false
  679. }
  680. newConfig, err := builder.BuildFromConfig(s.daemon, eng, &runconfig.Config{}, imageImportConfig.Changes)
  681. if err != nil {
  682. return err
  683. }
  684. imageImportConfig.ContainerConfig = newConfig
  685. if err := s.daemon.Repositories().Import(src, repo, tag, imageImportConfig); err != nil {
  686. return err
  687. }
  688. }
  689. return nil
  690. }
  691. func (s *Server) getImagesSearch(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  692. if err := parseForm(r); err != nil {
  693. return err
  694. }
  695. var (
  696. config *registry.AuthConfig
  697. authEncoded = r.Header.Get("X-Registry-Auth")
  698. headers = map[string][]string{}
  699. )
  700. if authEncoded != "" {
  701. authJson := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded))
  702. if err := json.NewDecoder(authJson).Decode(&config); err != nil {
  703. // for a search it is not an error if no auth was given
  704. // to increase compatibility with the existing api it is defaulting to be empty
  705. config = &registry.AuthConfig{}
  706. }
  707. }
  708. for k, v := range r.Header {
  709. if strings.HasPrefix(k, "X-Meta-") {
  710. headers[k] = v
  711. }
  712. }
  713. query, err := s.daemon.RegistryService.Search(r.Form.Get("term"), config, headers)
  714. if err != nil {
  715. return err
  716. }
  717. return json.NewEncoder(w).Encode(query.Results)
  718. }
  719. func (s *Server) postImagesPush(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  720. if vars == nil {
  721. return fmt.Errorf("Missing parameter")
  722. }
  723. metaHeaders := map[string][]string{}
  724. for k, v := range r.Header {
  725. if strings.HasPrefix(k, "X-Meta-") {
  726. metaHeaders[k] = v
  727. }
  728. }
  729. if err := parseForm(r); err != nil {
  730. return err
  731. }
  732. authConfig := &registry.AuthConfig{}
  733. authEncoded := r.Header.Get("X-Registry-Auth")
  734. if authEncoded != "" {
  735. // the new format is to handle the authConfig as a header
  736. authJson := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded))
  737. if err := json.NewDecoder(authJson).Decode(authConfig); err != nil {
  738. // to increase compatibility to existing api it is defaulting to be empty
  739. authConfig = &registry.AuthConfig{}
  740. }
  741. } else {
  742. // the old format is supported for compatibility if there was no authConfig header
  743. if err := json.NewDecoder(r.Body).Decode(authConfig); err != nil {
  744. return fmt.Errorf("Bad parameters and missing X-Registry-Auth: %v", err)
  745. }
  746. }
  747. job := eng.Job("push", vars["name"])
  748. job.SetenvJson("metaHeaders", metaHeaders)
  749. job.SetenvJson("authConfig", authConfig)
  750. job.Setenv("tag", r.Form.Get("tag"))
  751. if version.GreaterThan("1.0") {
  752. job.SetenvBool("json", true)
  753. streamJSON(job.Stdout, w, true)
  754. } else {
  755. job.Stdout.Add(utils.NewWriteFlusher(w))
  756. }
  757. if err := job.Run(); err != nil {
  758. if !job.Stdout.Used() {
  759. return err
  760. }
  761. sf := streamformatter.NewStreamFormatter(version.GreaterThan("1.0"))
  762. w.Write(sf.FormatError(err))
  763. }
  764. return nil
  765. }
  766. func (s *Server) getImagesGet(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  767. if vars == nil {
  768. return fmt.Errorf("Missing parameter")
  769. }
  770. if err := parseForm(r); err != nil {
  771. return err
  772. }
  773. if version.GreaterThan("1.0") {
  774. w.Header().Set("Content-Type", "application/x-tar")
  775. }
  776. var job *engine.Job
  777. if name, ok := vars["name"]; ok {
  778. job = eng.Job("image_export", name)
  779. } else {
  780. job = eng.Job("image_export", r.Form["names"]...)
  781. }
  782. job.Stdout.Add(w)
  783. return job.Run()
  784. }
  785. func (s *Server) postImagesLoad(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  786. job := eng.Job("load")
  787. job.Stdin.Add(r.Body)
  788. job.Stdout.Add(w)
  789. return job.Run()
  790. }
  791. func (s *Server) postContainersCreate(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  792. if err := parseForm(r); err != nil {
  793. return nil
  794. }
  795. if err := checkForJson(r); err != nil {
  796. return err
  797. }
  798. var (
  799. warnings []string
  800. name = r.Form.Get("name")
  801. )
  802. config, hostConfig, err := runconfig.DecodeContainerConfig(r.Body)
  803. if err != nil {
  804. return err
  805. }
  806. containerId, warnings, err := s.daemon.ContainerCreate(name, config, hostConfig)
  807. if err != nil {
  808. return err
  809. }
  810. return writeJSON(w, http.StatusCreated, &types.ContainerCreateResponse{
  811. ID: containerId,
  812. Warnings: warnings,
  813. })
  814. }
  815. func (s *Server) postContainersRestart(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  816. if err := parseForm(r); err != nil {
  817. return err
  818. }
  819. if vars == nil {
  820. return fmt.Errorf("Missing parameter")
  821. }
  822. timeout, err := strconv.Atoi(r.Form.Get("t"))
  823. if err != nil {
  824. return err
  825. }
  826. if err := s.daemon.ContainerRestart(vars["name"], timeout); err != nil {
  827. return err
  828. }
  829. w.WriteHeader(http.StatusNoContent)
  830. return nil
  831. }
  832. func (s *Server) postContainerRename(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  833. if err := parseForm(r); err != nil {
  834. return err
  835. }
  836. if vars == nil {
  837. return fmt.Errorf("Missing parameter")
  838. }
  839. name := vars["name"]
  840. newName := r.Form.Get("name")
  841. if err := s.daemon.ContainerRename(name, newName); err != nil {
  842. return err
  843. }
  844. w.WriteHeader(http.StatusNoContent)
  845. return nil
  846. }
  847. func (s *Server) deleteContainers(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  848. if err := parseForm(r); err != nil {
  849. return err
  850. }
  851. if vars == nil {
  852. return fmt.Errorf("Missing parameter")
  853. }
  854. name := vars["name"]
  855. config := &daemon.ContainerRmConfig{
  856. ForceRemove: boolValue(r, "force"),
  857. RemoveVolume: boolValue(r, "v"),
  858. RemoveLink: boolValue(r, "link"),
  859. }
  860. if err := s.daemon.ContainerRm(name, config); err != nil {
  861. // Force a 404 for the empty string
  862. if strings.Contains(strings.ToLower(err.Error()), "prefix can't be empty") {
  863. return fmt.Errorf("no such id: \"\"")
  864. }
  865. return err
  866. }
  867. w.WriteHeader(http.StatusNoContent)
  868. return nil
  869. }
  870. func (s *Server) deleteImages(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  871. if err := parseForm(r); err != nil {
  872. return err
  873. }
  874. if vars == nil {
  875. return fmt.Errorf("Missing parameter")
  876. }
  877. name := vars["name"]
  878. force := boolValue(r, "force")
  879. noprune := boolValue(r, "noprune")
  880. list, err := s.daemon.ImageDelete(name, force, noprune)
  881. if err != nil {
  882. return err
  883. }
  884. return writeJSON(w, http.StatusOK, list)
  885. }
  886. func (s *Server) postContainersStart(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  887. if vars == nil {
  888. return fmt.Errorf("Missing parameter")
  889. }
  890. // If contentLength is -1, we can assumed chunked encoding
  891. // or more technically that the length is unknown
  892. // https://golang.org/src/pkg/net/http/request.go#L139
  893. // net/http otherwise seems to swallow any headers related to chunked encoding
  894. // including r.TransferEncoding
  895. // allow a nil body for backwards compatibility
  896. var hostConfig *runconfig.HostConfig
  897. if r.Body != nil && (r.ContentLength > 0 || r.ContentLength == -1) {
  898. if err := checkForJson(r); err != nil {
  899. return err
  900. }
  901. c, err := runconfig.DecodeHostConfig(r.Body)
  902. if err != nil {
  903. return err
  904. }
  905. hostConfig = c
  906. }
  907. if err := s.daemon.ContainerStart(vars["name"], hostConfig); err != nil {
  908. if err.Error() == "Container already started" {
  909. w.WriteHeader(http.StatusNotModified)
  910. return nil
  911. }
  912. return err
  913. }
  914. w.WriteHeader(http.StatusNoContent)
  915. return nil
  916. }
  917. func (s *Server) postContainersStop(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  918. if err := parseForm(r); err != nil {
  919. return err
  920. }
  921. if vars == nil {
  922. return fmt.Errorf("Missing parameter")
  923. }
  924. seconds, err := strconv.Atoi(r.Form.Get("t"))
  925. if err != nil {
  926. return err
  927. }
  928. if err := s.daemon.ContainerStop(vars["name"], seconds); err != nil {
  929. if err.Error() == "Container already stopped" {
  930. w.WriteHeader(http.StatusNotModified)
  931. return nil
  932. }
  933. return err
  934. }
  935. w.WriteHeader(http.StatusNoContent)
  936. return nil
  937. }
  938. func (s *Server) postContainersWait(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  939. if vars == nil {
  940. return fmt.Errorf("Missing parameter")
  941. }
  942. name := vars["name"]
  943. cont, err := s.daemon.Get(name)
  944. if err != nil {
  945. return err
  946. }
  947. status, _ := cont.WaitStop(-1 * time.Second)
  948. return writeJSON(w, http.StatusOK, &types.ContainerWaitResponse{
  949. StatusCode: status,
  950. })
  951. }
  952. func (s *Server) postContainersResize(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  953. if err := parseForm(r); err != nil {
  954. return err
  955. }
  956. if vars == nil {
  957. return fmt.Errorf("Missing parameter")
  958. }
  959. height, err := strconv.Atoi(r.Form.Get("h"))
  960. if err != nil {
  961. return err
  962. }
  963. width, err := strconv.Atoi(r.Form.Get("w"))
  964. if err != nil {
  965. return err
  966. }
  967. cont, err := s.daemon.Get(vars["name"])
  968. if err != nil {
  969. return err
  970. }
  971. return cont.Resize(height, width)
  972. }
  973. func (s *Server) postContainersAttach(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  974. if err := parseForm(r); err != nil {
  975. return err
  976. }
  977. if vars == nil {
  978. return fmt.Errorf("Missing parameter")
  979. }
  980. cont, err := s.daemon.Get(vars["name"])
  981. if err != nil {
  982. return err
  983. }
  984. inStream, outStream, err := hijackServer(w)
  985. if err != nil {
  986. return err
  987. }
  988. defer closeStreams(inStream, outStream)
  989. var errStream io.Writer
  990. if _, ok := r.Header["Upgrade"]; ok {
  991. fmt.Fprintf(outStream, "HTTP/1.1 101 UPGRADED\r\nContent-Type: application/vnd.docker.raw-stream\r\nConnection: Upgrade\r\nUpgrade: tcp\r\n\r\n")
  992. } else {
  993. fmt.Fprintf(outStream, "HTTP/1.1 200 OK\r\nContent-Type: application/vnd.docker.raw-stream\r\n\r\n")
  994. }
  995. if !cont.Config.Tty && version.GreaterThanOrEqualTo("1.6") {
  996. errStream = stdcopy.NewStdWriter(outStream, stdcopy.Stderr)
  997. outStream = stdcopy.NewStdWriter(outStream, stdcopy.Stdout)
  998. } else {
  999. errStream = outStream
  1000. }
  1001. logs := boolValue(r, "logs")
  1002. stream := boolValue(r, "stream")
  1003. var stdin io.ReadCloser
  1004. var stdout, stderr io.Writer
  1005. if boolValue(r, "stdin") {
  1006. stdin = inStream
  1007. }
  1008. if boolValue(r, "stdout") {
  1009. stdout = outStream
  1010. }
  1011. if boolValue(r, "stderr") {
  1012. stderr = errStream
  1013. }
  1014. if err := cont.AttachWithLogs(stdin, stdout, stderr, logs, stream); err != nil {
  1015. fmt.Fprintf(outStream, "Error attaching: %s\n", err)
  1016. }
  1017. return nil
  1018. }
  1019. func (s *Server) wsContainersAttach(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1020. if err := parseForm(r); err != nil {
  1021. return err
  1022. }
  1023. if vars == nil {
  1024. return fmt.Errorf("Missing parameter")
  1025. }
  1026. cont, err := s.daemon.Get(vars["name"])
  1027. if err != nil {
  1028. return err
  1029. }
  1030. h := websocket.Handler(func(ws *websocket.Conn) {
  1031. defer ws.Close()
  1032. logs := r.Form.Get("logs") != ""
  1033. stream := r.Form.Get("stream") != ""
  1034. if err := cont.AttachWithLogs(ws, ws, ws, logs, stream); err != nil {
  1035. logrus.Errorf("Error attaching websocket: %s", err)
  1036. }
  1037. })
  1038. h.ServeHTTP(w, r)
  1039. return nil
  1040. }
  1041. func (s *Server) getContainersByName(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1042. if vars == nil {
  1043. return fmt.Errorf("Missing parameter")
  1044. }
  1045. var job = eng.Job("container_inspect", vars["name"])
  1046. if version.LessThan("1.12") {
  1047. job.SetenvBool("raw", true)
  1048. }
  1049. streamJSON(job.Stdout, w, false)
  1050. return job.Run()
  1051. }
  1052. func (s *Server) getExecByID(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1053. if vars == nil {
  1054. return fmt.Errorf("Missing parameter 'id'")
  1055. }
  1056. eConfig, err := s.daemon.ContainerExecInspect(vars["id"])
  1057. if err != nil {
  1058. return err
  1059. }
  1060. return writeJSON(w, http.StatusOK, eConfig)
  1061. }
  1062. func (s *Server) getImagesByName(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1063. if vars == nil {
  1064. return fmt.Errorf("Missing parameter")
  1065. }
  1066. var job = eng.Job("image_inspect", vars["name"])
  1067. if version.LessThan("1.12") {
  1068. job.SetenvBool("raw", true)
  1069. }
  1070. streamJSON(job.Stdout, w, false)
  1071. return job.Run()
  1072. }
  1073. func (s *Server) postBuild(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1074. if version.LessThan("1.3") {
  1075. return fmt.Errorf("Multipart upload for build is no longer supported. Please upgrade your docker client.")
  1076. }
  1077. var (
  1078. authEncoded = r.Header.Get("X-Registry-Auth")
  1079. authConfig = &registry.AuthConfig{}
  1080. configFileEncoded = r.Header.Get("X-Registry-Config")
  1081. configFile = &registry.ConfigFile{}
  1082. buildConfig = builder.NewBuildConfig()
  1083. )
  1084. // This block can be removed when API versions prior to 1.9 are deprecated.
  1085. // Both headers will be parsed and sent along to the daemon, but if a non-empty
  1086. // ConfigFile is present, any value provided as an AuthConfig directly will
  1087. // be overridden. See BuildFile::CmdFrom for details.
  1088. if version.LessThan("1.9") && authEncoded != "" {
  1089. authJson := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded))
  1090. if err := json.NewDecoder(authJson).Decode(authConfig); err != nil {
  1091. // for a pull it is not an error if no auth was given
  1092. // to increase compatibility with the existing api it is defaulting to be empty
  1093. authConfig = &registry.AuthConfig{}
  1094. }
  1095. }
  1096. if configFileEncoded != "" {
  1097. configFileJson := base64.NewDecoder(base64.URLEncoding, strings.NewReader(configFileEncoded))
  1098. if err := json.NewDecoder(configFileJson).Decode(configFile); err != nil {
  1099. // for a pull it is not an error if no auth was given
  1100. // to increase compatibility with the existing api it is defaulting to be empty
  1101. configFile = &registry.ConfigFile{}
  1102. }
  1103. }
  1104. if version.GreaterThanOrEqualTo("1.8") {
  1105. w.Header().Set("Content-Type", "application/json")
  1106. buildConfig.JSONFormat = true
  1107. }
  1108. if boolValue(r, "forcerm") && version.GreaterThanOrEqualTo("1.12") {
  1109. buildConfig.Remove = true
  1110. } else if r.FormValue("rm") == "" && version.GreaterThanOrEqualTo("1.12") {
  1111. buildConfig.Remove = true
  1112. } else {
  1113. buildConfig.Remove = boolValue(r, "rm")
  1114. }
  1115. if boolValue(r, "pull") && version.GreaterThanOrEqualTo("1.16") {
  1116. buildConfig.Pull = true
  1117. }
  1118. output := utils.NewWriteFlusher(w)
  1119. buildConfig.Stdout = output
  1120. buildConfig.Context = r.Body
  1121. buildConfig.RemoteURL = r.FormValue("remote")
  1122. buildConfig.DockerfileName = r.FormValue("dockerfile")
  1123. buildConfig.RepoName = r.FormValue("t")
  1124. buildConfig.SuppressOutput = boolValue(r, "q")
  1125. buildConfig.NoCache = boolValue(r, "nocache")
  1126. buildConfig.ForceRemove = boolValue(r, "forcerm")
  1127. buildConfig.AuthConfig = authConfig
  1128. buildConfig.ConfigFile = configFile
  1129. buildConfig.MemorySwap = int64Value(r, "memswap")
  1130. buildConfig.Memory = int64Value(r, "memory")
  1131. buildConfig.CpuShares = int64Value(r, "cpushares")
  1132. buildConfig.CpuSetCpus = r.FormValue("cpusetcpus")
  1133. buildConfig.CpuSetMems = r.FormValue("cpusetmems")
  1134. // Job cancellation. Note: not all job types support this.
  1135. if closeNotifier, ok := w.(http.CloseNotifier); ok {
  1136. finished := make(chan struct{})
  1137. defer close(finished)
  1138. go func() {
  1139. select {
  1140. case <-finished:
  1141. case <-closeNotifier.CloseNotify():
  1142. logrus.Infof("Client disconnected, cancelling job: build")
  1143. buildConfig.Cancel()
  1144. }
  1145. }()
  1146. }
  1147. if err := builder.Build(s.daemon, eng, buildConfig); err != nil {
  1148. // Do not write the error in the http output if it's still empty.
  1149. // This prevents from writing a 200(OK) when there is an interal error.
  1150. if !output.Flushed() {
  1151. return err
  1152. }
  1153. sf := streamformatter.NewStreamFormatter(version.GreaterThanOrEqualTo("1.8"))
  1154. w.Write(sf.FormatError(err))
  1155. }
  1156. return nil
  1157. }
  1158. func (s *Server) postContainersCopy(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1159. if vars == nil {
  1160. return fmt.Errorf("Missing parameter")
  1161. }
  1162. if err := checkForJson(r); err != nil {
  1163. return err
  1164. }
  1165. cfg := types.CopyConfig{}
  1166. if err := json.NewDecoder(r.Body).Decode(&cfg); err != nil {
  1167. return err
  1168. }
  1169. if cfg.Resource == "" {
  1170. return fmt.Errorf("Path cannot be empty")
  1171. }
  1172. res := cfg.Resource
  1173. if res[0] == '/' {
  1174. res = res[1:]
  1175. }
  1176. cont, err := s.daemon.Get(vars["name"])
  1177. if err != nil {
  1178. logrus.Errorf("%v", err)
  1179. if strings.Contains(strings.ToLower(err.Error()), "no such id") {
  1180. w.WriteHeader(http.StatusNotFound)
  1181. return nil
  1182. }
  1183. }
  1184. data, err := cont.Copy(res)
  1185. if err != nil {
  1186. logrus.Errorf("%v", err)
  1187. if os.IsNotExist(err) {
  1188. return fmt.Errorf("Could not find the file %s in container %s", cfg.Resource, vars["name"])
  1189. }
  1190. return err
  1191. }
  1192. defer data.Close()
  1193. w.Header().Set("Content-Type", "application/x-tar")
  1194. if _, err := io.Copy(w, data); err != nil {
  1195. return err
  1196. }
  1197. return nil
  1198. }
  1199. func (s *Server) postContainerExecCreate(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1200. if err := parseForm(r); err != nil {
  1201. return nil
  1202. }
  1203. var (
  1204. name = vars["name"]
  1205. job = eng.Job("execCreate", name)
  1206. stdoutBuffer = bytes.NewBuffer(nil)
  1207. outWarnings []string
  1208. warnings = bytes.NewBuffer(nil)
  1209. )
  1210. if err := job.DecodeEnv(r.Body); err != nil {
  1211. return err
  1212. }
  1213. job.Stdout.Add(stdoutBuffer)
  1214. // Read warnings from stderr
  1215. job.Stderr.Add(warnings)
  1216. // Register an instance of Exec in container.
  1217. if err := job.Run(); err != nil {
  1218. fmt.Fprintf(os.Stderr, "Error setting up exec command in container %s: %s\n", name, err)
  1219. return err
  1220. }
  1221. // Parse warnings from stderr
  1222. scanner := bufio.NewScanner(warnings)
  1223. for scanner.Scan() {
  1224. outWarnings = append(outWarnings, scanner.Text())
  1225. }
  1226. return writeJSON(w, http.StatusCreated, &types.ContainerExecCreateResponse{
  1227. ID: engine.Tail(stdoutBuffer, 1),
  1228. Warnings: outWarnings,
  1229. })
  1230. }
  1231. // TODO(vishh): Refactor the code to avoid having to specify stream config as part of both create and start.
  1232. func (s *Server) postContainerExecStart(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1233. if err := parseForm(r); err != nil {
  1234. return nil
  1235. }
  1236. var (
  1237. name = vars["name"]
  1238. job = eng.Job("execStart", name)
  1239. errOut io.Writer = os.Stderr
  1240. )
  1241. if err := job.DecodeEnv(r.Body); err != nil {
  1242. return err
  1243. }
  1244. if !job.GetenvBool("Detach") {
  1245. // Setting up the streaming http interface.
  1246. inStream, outStream, err := hijackServer(w)
  1247. if err != nil {
  1248. return err
  1249. }
  1250. defer closeStreams(inStream, outStream)
  1251. var errStream io.Writer
  1252. if _, ok := r.Header["Upgrade"]; ok {
  1253. fmt.Fprintf(outStream, "HTTP/1.1 101 UPGRADED\r\nContent-Type: application/vnd.docker.raw-stream\r\nConnection: Upgrade\r\nUpgrade: tcp\r\n\r\n")
  1254. } else {
  1255. fmt.Fprintf(outStream, "HTTP/1.1 200 OK\r\nContent-Type: application/vnd.docker.raw-stream\r\n\r\n")
  1256. }
  1257. if !job.GetenvBool("Tty") && version.GreaterThanOrEqualTo("1.6") {
  1258. errStream = stdcopy.NewStdWriter(outStream, stdcopy.Stderr)
  1259. outStream = stdcopy.NewStdWriter(outStream, stdcopy.Stdout)
  1260. } else {
  1261. errStream = outStream
  1262. }
  1263. job.Stdin.Add(inStream)
  1264. job.Stdout.Add(outStream)
  1265. job.Stderr.Set(errStream)
  1266. errOut = outStream
  1267. }
  1268. // Now run the user process in container.
  1269. job.SetCloseIO(false)
  1270. if err := job.Run(); err != nil {
  1271. fmt.Fprintf(errOut, "Error starting exec command in container %s: %s\n", name, err)
  1272. return err
  1273. }
  1274. w.WriteHeader(http.StatusNoContent)
  1275. return nil
  1276. }
  1277. func (s *Server) postContainerExecResize(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1278. if err := parseForm(r); err != nil {
  1279. return err
  1280. }
  1281. if vars == nil {
  1282. return fmt.Errorf("Missing parameter")
  1283. }
  1284. height, err := strconv.Atoi(r.Form.Get("h"))
  1285. if err != nil {
  1286. return err
  1287. }
  1288. width, err := strconv.Atoi(r.Form.Get("w"))
  1289. if err != nil {
  1290. return err
  1291. }
  1292. return s.daemon.ContainerExecResize(vars["name"], height, width)
  1293. }
  1294. func (s *Server) optionsHandler(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1295. w.WriteHeader(http.StatusOK)
  1296. return nil
  1297. }
  1298. func writeCorsHeaders(w http.ResponseWriter, r *http.Request, corsHeaders string) {
  1299. logrus.Debugf("CORS header is enabled and set to: %s", corsHeaders)
  1300. w.Header().Add("Access-Control-Allow-Origin", corsHeaders)
  1301. w.Header().Add("Access-Control-Allow-Headers", "Origin, X-Requested-With, Content-Type, Accept, X-Registry-Auth")
  1302. w.Header().Add("Access-Control-Allow-Methods", "GET, POST, DELETE, PUT, OPTIONS")
  1303. }
  1304. func (s *Server) ping(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1305. _, err := w.Write([]byte{'O', 'K'})
  1306. return err
  1307. }
  1308. func makeHttpHandler(eng *engine.Engine, logging bool, localMethod string, localRoute string, handlerFunc HttpApiFunc, corsHeaders string, dockerVersion version.Version) http.HandlerFunc {
  1309. return func(w http.ResponseWriter, r *http.Request) {
  1310. // log the request
  1311. logrus.Debugf("Calling %s %s", localMethod, localRoute)
  1312. if logging {
  1313. logrus.Infof("%s %s", r.Method, r.RequestURI)
  1314. }
  1315. if strings.Contains(r.Header.Get("User-Agent"), "Docker-Client/") {
  1316. userAgent := strings.Split(r.Header.Get("User-Agent"), "/")
  1317. if len(userAgent) == 2 && !dockerVersion.Equal(version.Version(userAgent[1])) {
  1318. logrus.Debugf("Warning: client and server don't have the same version (client: %s, server: %s)", userAgent[1], dockerVersion)
  1319. }
  1320. }
  1321. version := version.Version(mux.Vars(r)["version"])
  1322. if version == "" {
  1323. version = api.APIVERSION
  1324. }
  1325. if corsHeaders != "" {
  1326. writeCorsHeaders(w, r, corsHeaders)
  1327. }
  1328. if version.GreaterThan(api.APIVERSION) {
  1329. http.Error(w, fmt.Errorf("client and server don't have same version (client API version: %s, server API version: %s)", version, api.APIVERSION).Error(), http.StatusNotFound)
  1330. return
  1331. }
  1332. if err := handlerFunc(eng, version, w, r, mux.Vars(r)); err != nil {
  1333. logrus.Errorf("Handler for %s %s returned error: %s", localMethod, localRoute, err)
  1334. httpError(w, err)
  1335. }
  1336. }
  1337. }
  1338. // we keep enableCors just for legacy usage, need to be removed in the future
  1339. func createRouter(s *Server, eng *engine.Engine) *mux.Router {
  1340. r := mux.NewRouter()
  1341. if os.Getenv("DEBUG") != "" {
  1342. ProfilerSetup(r, "/debug/")
  1343. }
  1344. m := map[string]map[string]HttpApiFunc{
  1345. "GET": {
  1346. "/_ping": s.ping,
  1347. "/events": s.getEvents,
  1348. "/info": s.getInfo,
  1349. "/version": s.getVersion,
  1350. "/images/json": s.getImagesJSON,
  1351. "/images/viz": s.getImagesViz,
  1352. "/images/search": s.getImagesSearch,
  1353. "/images/get": s.getImagesGet,
  1354. "/images/{name:.*}/get": s.getImagesGet,
  1355. "/images/{name:.*}/history": s.getImagesHistory,
  1356. "/images/{name:.*}/json": s.getImagesByName,
  1357. "/containers/ps": s.getContainersJSON,
  1358. "/containers/json": s.getContainersJSON,
  1359. "/containers/{name:.*}/export": s.getContainersExport,
  1360. "/containers/{name:.*}/changes": s.getContainersChanges,
  1361. "/containers/{name:.*}/json": s.getContainersByName,
  1362. "/containers/{name:.*}/top": s.getContainersTop,
  1363. "/containers/{name:.*}/logs": s.getContainersLogs,
  1364. "/containers/{name:.*}/stats": s.getContainersStats,
  1365. "/containers/{name:.*}/attach/ws": s.wsContainersAttach,
  1366. "/exec/{id:.*}/json": s.getExecByID,
  1367. },
  1368. "POST": {
  1369. "/auth": s.postAuth,
  1370. "/commit": s.postCommit,
  1371. "/build": s.postBuild,
  1372. "/images/create": s.postImagesCreate,
  1373. "/images/load": s.postImagesLoad,
  1374. "/images/{name:.*}/push": s.postImagesPush,
  1375. "/images/{name:.*}/tag": s.postImagesTag,
  1376. "/containers/create": s.postContainersCreate,
  1377. "/containers/{name:.*}/kill": s.postContainersKill,
  1378. "/containers/{name:.*}/pause": s.postContainersPause,
  1379. "/containers/{name:.*}/unpause": s.postContainersUnpause,
  1380. "/containers/{name:.*}/restart": s.postContainersRestart,
  1381. "/containers/{name:.*}/start": s.postContainersStart,
  1382. "/containers/{name:.*}/stop": s.postContainersStop,
  1383. "/containers/{name:.*}/wait": s.postContainersWait,
  1384. "/containers/{name:.*}/resize": s.postContainersResize,
  1385. "/containers/{name:.*}/attach": s.postContainersAttach,
  1386. "/containers/{name:.*}/copy": s.postContainersCopy,
  1387. "/containers/{name:.*}/exec": s.postContainerExecCreate,
  1388. "/exec/{name:.*}/start": s.postContainerExecStart,
  1389. "/exec/{name:.*}/resize": s.postContainerExecResize,
  1390. "/containers/{name:.*}/rename": s.postContainerRename,
  1391. },
  1392. "DELETE": {
  1393. "/containers/{name:.*}": s.deleteContainers,
  1394. "/images/{name:.*}": s.deleteImages,
  1395. },
  1396. "OPTIONS": {
  1397. "": s.optionsHandler,
  1398. },
  1399. }
  1400. // If "api-cors-header" is not given, but "api-enable-cors" is true, we set cors to "*"
  1401. // otherwise, all head values will be passed to HTTP handler
  1402. corsHeaders := s.cfg.CorsHeaders
  1403. if corsHeaders == "" && s.cfg.EnableCors {
  1404. corsHeaders = "*"
  1405. }
  1406. for method, routes := range m {
  1407. for route, fct := range routes {
  1408. logrus.Debugf("Registering %s, %s", method, route)
  1409. // NOTE: scope issue, make sure the variables are local and won't be changed
  1410. localRoute := route
  1411. localFct := fct
  1412. localMethod := method
  1413. // build the handler function
  1414. f := makeHttpHandler(eng, s.cfg.Logging, localMethod, localRoute, localFct, corsHeaders, version.Version(s.cfg.Version))
  1415. // add the new route
  1416. if localRoute == "" {
  1417. r.Methods(localMethod).HandlerFunc(f)
  1418. } else {
  1419. r.Path("/v{version:[0-9.]+}" + localRoute).Methods(localMethod).HandlerFunc(f)
  1420. r.Path(localRoute).Methods(localMethod).HandlerFunc(f)
  1421. }
  1422. }
  1423. }
  1424. return r
  1425. }
  1426. // ServeRequest processes a single http request to the docker remote api.
  1427. // FIXME: refactor this to be part of Server and not require re-creating a new
  1428. // router each time. This requires first moving ListenAndServe into Server.
  1429. func ServeRequest(eng *engine.Engine, apiversion version.Version, w http.ResponseWriter, req *http.Request) {
  1430. cfg := &ServerConfig{
  1431. EnableCors: true,
  1432. Version: string(apiversion),
  1433. }
  1434. api := New(cfg, eng)
  1435. daemon, _ := eng.HackGetGlobalVar("httpapi.daemon").(*daemon.Daemon)
  1436. api.AcceptConnections(daemon)
  1437. router := createRouter(api, eng)
  1438. // Insert APIVERSION into the request as a convenience
  1439. req.URL.Path = fmt.Sprintf("/v%s%s", apiversion, req.URL.Path)
  1440. router.ServeHTTP(w, req)
  1441. }
  1442. func allocateDaemonPort(addr string) error {
  1443. host, port, err := net.SplitHostPort(addr)
  1444. if err != nil {
  1445. return err
  1446. }
  1447. intPort, err := strconv.Atoi(port)
  1448. if err != nil {
  1449. return err
  1450. }
  1451. var hostIPs []net.IP
  1452. if parsedIP := net.ParseIP(host); parsedIP != nil {
  1453. hostIPs = append(hostIPs, parsedIP)
  1454. } else if hostIPs, err = net.LookupIP(host); err != nil {
  1455. return fmt.Errorf("failed to lookup %s address in host specification", host)
  1456. }
  1457. for _, hostIP := range hostIPs {
  1458. if _, err := bridge.RequestPort(hostIP, "tcp", intPort); err != nil {
  1459. return fmt.Errorf("failed to allocate daemon listening port %d (err: %v)", intPort, err)
  1460. }
  1461. }
  1462. return nil
  1463. }