create.go 4.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148
  1. package daemon
  2. import (
  3. "fmt"
  4. "strings"
  5. "github.com/docker/docker/engine"
  6. "github.com/docker/docker/graph"
  7. "github.com/docker/docker/image"
  8. "github.com/docker/docker/pkg/parsers"
  9. "github.com/docker/docker/runconfig"
  10. "github.com/docker/libcontainer/label"
  11. )
  12. func (daemon *Daemon) ContainerCreate(job *engine.Job) error {
  13. var name string
  14. if len(job.Args) == 1 {
  15. name = job.Args[0]
  16. } else if len(job.Args) > 1 {
  17. return fmt.Errorf("Usage: %s", job.Name)
  18. }
  19. config := runconfig.ContainerConfigFromJob(job)
  20. hostConfig := runconfig.ContainerHostConfigFromJob(job)
  21. if len(hostConfig.LxcConf) > 0 && !strings.Contains(daemon.ExecutionDriver().Name(), "lxc") {
  22. return fmt.Errorf("Cannot use --lxc-conf with execdriver: %s", daemon.ExecutionDriver().Name())
  23. }
  24. if hostConfig.Memory != 0 && hostConfig.Memory < 4194304 {
  25. return fmt.Errorf("Minimum memory limit allowed is 4MB")
  26. }
  27. if hostConfig.Memory > 0 && !daemon.SystemConfig().MemoryLimit {
  28. job.Errorf("Your kernel does not support memory limit capabilities. Limitation discarded.\n")
  29. hostConfig.Memory = 0
  30. }
  31. if hostConfig.Memory > 0 && hostConfig.MemorySwap != -1 && !daemon.SystemConfig().SwapLimit {
  32. job.Errorf("Your kernel does not support swap limit capabilities. Limitation discarded.\n")
  33. hostConfig.MemorySwap = -1
  34. }
  35. if hostConfig.Memory > 0 && hostConfig.MemorySwap > 0 && hostConfig.MemorySwap < hostConfig.Memory {
  36. return fmt.Errorf("Minimum memoryswap limit should be larger than memory limit, see usage.\n")
  37. }
  38. if hostConfig.Memory == 0 && hostConfig.MemorySwap > 0 {
  39. return fmt.Errorf("You should always set the Memory limit when using Memoryswap limit, see usage.\n")
  40. }
  41. container, buildWarnings, err := daemon.Create(config, hostConfig, name)
  42. if err != nil {
  43. if daemon.Graph().IsNotExist(err) {
  44. _, tag := parsers.ParseRepositoryTag(config.Image)
  45. if tag == "" {
  46. tag = graph.DEFAULTTAG
  47. }
  48. return fmt.Errorf("No such image: %s (tag: %s)", config.Image, tag)
  49. }
  50. return err
  51. }
  52. if !container.Config.NetworkDisabled && daemon.SystemConfig().IPv4ForwardingDisabled {
  53. job.Errorf("IPv4 forwarding is disabled.\n")
  54. }
  55. container.LogEvent("create")
  56. job.Printf("%s\n", container.ID)
  57. for _, warning := range buildWarnings {
  58. job.Errorf("%s\n", warning)
  59. }
  60. return nil
  61. }
  62. // Create creates a new container from the given configuration with a given name.
  63. func (daemon *Daemon) Create(config *runconfig.Config, hostConfig *runconfig.HostConfig, name string) (*Container, []string, error) {
  64. var (
  65. container *Container
  66. warnings []string
  67. img *image.Image
  68. imgID string
  69. err error
  70. )
  71. if config.Image != "" {
  72. img, err = daemon.repositories.LookupImage(config.Image)
  73. if err != nil {
  74. return nil, nil, err
  75. }
  76. if err = img.CheckDepth(); err != nil {
  77. return nil, nil, err
  78. }
  79. imgID = img.ID
  80. }
  81. if warnings, err = daemon.mergeAndVerifyConfig(config, img); err != nil {
  82. return nil, nil, err
  83. }
  84. if hostConfig == nil {
  85. hostConfig = &runconfig.HostConfig{}
  86. }
  87. if hostConfig.SecurityOpt == nil {
  88. hostConfig.SecurityOpt, err = daemon.GenerateSecurityOpt(hostConfig.IpcMode, hostConfig.PidMode)
  89. if err != nil {
  90. return nil, nil, err
  91. }
  92. }
  93. if container, err = daemon.newContainer(name, config, imgID); err != nil {
  94. return nil, nil, err
  95. }
  96. if err := daemon.Register(container); err != nil {
  97. return nil, nil, err
  98. }
  99. if err := daemon.createRootfs(container); err != nil {
  100. return nil, nil, err
  101. }
  102. if hostConfig != nil {
  103. if err := daemon.setHostConfig(container, hostConfig); err != nil {
  104. return nil, nil, err
  105. }
  106. }
  107. if err := container.Mount(); err != nil {
  108. return nil, nil, err
  109. }
  110. defer container.Unmount()
  111. if err := container.prepareVolumes(); err != nil {
  112. return nil, nil, err
  113. }
  114. if err := container.ToDisk(); err != nil {
  115. return nil, nil, err
  116. }
  117. return container, warnings, nil
  118. }
  119. func (daemon *Daemon) GenerateSecurityOpt(ipcMode runconfig.IpcMode, pidMode runconfig.PidMode) ([]string, error) {
  120. if ipcMode.IsHost() || pidMode.IsHost() {
  121. return label.DisableSecOpt(), nil
  122. }
  123. if ipcContainer := ipcMode.Container(); ipcContainer != "" {
  124. c, err := daemon.Get(ipcContainer)
  125. if err != nil {
  126. return nil, err
  127. }
  128. if !c.IsRunning() {
  129. return nil, fmt.Errorf("cannot join IPC of a non running container: %s", ipcContainer)
  130. }
  131. return label.DupSecOpt(c.ProcessLabel), nil
  132. }
  133. return nil, nil
  134. }