server.go 47 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680
  1. package server
  2. import (
  3. "bufio"
  4. "bytes"
  5. "runtime"
  6. "time"
  7. "encoding/base64"
  8. "encoding/json"
  9. "fmt"
  10. "io"
  11. "net"
  12. "net/http"
  13. "os"
  14. "strconv"
  15. "strings"
  16. "code.google.com/p/go.net/websocket"
  17. "github.com/gorilla/mux"
  18. "github.com/Sirupsen/logrus"
  19. "github.com/docker/docker/api"
  20. "github.com/docker/docker/api/types"
  21. "github.com/docker/docker/autogen/dockerversion"
  22. "github.com/docker/docker/daemon"
  23. "github.com/docker/docker/daemon/networkdriver/bridge"
  24. "github.com/docker/docker/engine"
  25. "github.com/docker/docker/graph"
  26. "github.com/docker/docker/pkg/jsonmessage"
  27. "github.com/docker/docker/pkg/parsers"
  28. "github.com/docker/docker/pkg/parsers/filters"
  29. "github.com/docker/docker/pkg/parsers/kernel"
  30. "github.com/docker/docker/pkg/signal"
  31. "github.com/docker/docker/pkg/stdcopy"
  32. "github.com/docker/docker/pkg/streamformatter"
  33. "github.com/docker/docker/pkg/version"
  34. "github.com/docker/docker/registry"
  35. "github.com/docker/docker/runconfig"
  36. "github.com/docker/docker/utils"
  37. )
  38. type ServerConfig struct {
  39. Logging bool
  40. EnableCors bool
  41. CorsHeaders string
  42. Version string
  43. SocketGroup string
  44. Tls bool
  45. TlsVerify bool
  46. TlsCa string
  47. TlsCert string
  48. TlsKey string
  49. }
  50. type Server struct {
  51. daemon *daemon.Daemon
  52. cfg *ServerConfig
  53. router *mux.Router
  54. start chan struct{}
  55. // TODO: delete engine
  56. eng *engine.Engine
  57. }
  58. func New(cfg *ServerConfig, eng *engine.Engine) *Server {
  59. srv := &Server{
  60. cfg: cfg,
  61. start: make(chan struct{}),
  62. eng: eng,
  63. }
  64. r := createRouter(srv, eng)
  65. srv.router = r
  66. return srv
  67. }
  68. func (s *Server) SetDaemon(d *daemon.Daemon) {
  69. s.daemon = d
  70. }
  71. type serverCloser interface {
  72. Serve() error
  73. Close() error
  74. }
  75. // ServeApi loops through all of the protocols sent in to docker and spawns
  76. // off a go routine to setup a serving http.Server for each.
  77. func (s *Server) ServeApi(protoAddrs []string) error {
  78. var chErrors = make(chan error, len(protoAddrs))
  79. for _, protoAddr := range protoAddrs {
  80. protoAddrParts := strings.SplitN(protoAddr, "://", 2)
  81. if len(protoAddrParts) != 2 {
  82. return fmt.Errorf("bad format, expected PROTO://ADDR")
  83. }
  84. go func(proto, addr string) {
  85. logrus.Infof("Listening for HTTP on %s (%s)", proto, addr)
  86. srv, err := s.newServer(proto, addr)
  87. if err != nil {
  88. chErrors <- err
  89. return
  90. }
  91. s.eng.OnShutdown(func() {
  92. if err := srv.Close(); err != nil {
  93. logrus.Error(err)
  94. }
  95. })
  96. if err = srv.Serve(); err != nil && strings.Contains(err.Error(), "use of closed network connection") {
  97. err = nil
  98. }
  99. chErrors <- err
  100. }(protoAddrParts[0], protoAddrParts[1])
  101. }
  102. for i := 0; i < len(protoAddrs); i++ {
  103. err := <-chErrors
  104. if err != nil {
  105. return err
  106. }
  107. }
  108. return nil
  109. }
  110. type HttpServer struct {
  111. srv *http.Server
  112. l net.Listener
  113. }
  114. func (s *HttpServer) Serve() error {
  115. return s.srv.Serve(s.l)
  116. }
  117. func (s *HttpServer) Close() error {
  118. return s.l.Close()
  119. }
  120. type HttpApiFunc func(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error
  121. func hijackServer(w http.ResponseWriter) (io.ReadCloser, io.Writer, error) {
  122. conn, _, err := w.(http.Hijacker).Hijack()
  123. if err != nil {
  124. return nil, nil, err
  125. }
  126. // Flush the options to make sure the client sets the raw mode
  127. conn.Write([]byte{})
  128. return conn, conn, nil
  129. }
  130. func closeStreams(streams ...interface{}) {
  131. for _, stream := range streams {
  132. if tcpc, ok := stream.(interface {
  133. CloseWrite() error
  134. }); ok {
  135. tcpc.CloseWrite()
  136. } else if closer, ok := stream.(io.Closer); ok {
  137. closer.Close()
  138. }
  139. }
  140. }
  141. // Check to make sure request's Content-Type is application/json
  142. func checkForJson(r *http.Request) error {
  143. ct := r.Header.Get("Content-Type")
  144. // No Content-Type header is ok as long as there's no Body
  145. if ct == "" {
  146. if r.Body == nil || r.ContentLength == 0 {
  147. return nil
  148. }
  149. }
  150. // Otherwise it better be json
  151. if api.MatchesContentType(ct, "application/json") {
  152. return nil
  153. }
  154. return fmt.Errorf("Content-Type specified (%s) must be 'application/json'", ct)
  155. }
  156. //If we don't do this, POST method without Content-type (even with empty body) will fail
  157. func parseForm(r *http.Request) error {
  158. if r == nil {
  159. return nil
  160. }
  161. if err := r.ParseForm(); err != nil && !strings.HasPrefix(err.Error(), "mime:") {
  162. return err
  163. }
  164. return nil
  165. }
  166. func parseMultipartForm(r *http.Request) error {
  167. if err := r.ParseMultipartForm(4096); err != nil && !strings.HasPrefix(err.Error(), "mime:") {
  168. return err
  169. }
  170. return nil
  171. }
  172. func httpError(w http.ResponseWriter, err error) {
  173. if err == nil || w == nil {
  174. logrus.WithFields(logrus.Fields{"error": err, "writer": w}).Error("unexpected HTTP error handling")
  175. return
  176. }
  177. statusCode := http.StatusInternalServerError
  178. // FIXME: this is brittle and should not be necessary.
  179. // If we need to differentiate between different possible error types, we should
  180. // create appropriate error types with clearly defined meaning.
  181. errStr := strings.ToLower(err.Error())
  182. if strings.Contains(errStr, "no such") {
  183. statusCode = http.StatusNotFound
  184. } else if strings.Contains(errStr, "bad parameter") {
  185. statusCode = http.StatusBadRequest
  186. } else if strings.Contains(errStr, "conflict") {
  187. statusCode = http.StatusConflict
  188. } else if strings.Contains(errStr, "impossible") {
  189. statusCode = http.StatusNotAcceptable
  190. } else if strings.Contains(errStr, "wrong login/password") {
  191. statusCode = http.StatusUnauthorized
  192. } else if strings.Contains(errStr, "hasn't been activated") {
  193. statusCode = http.StatusForbidden
  194. }
  195. logrus.WithFields(logrus.Fields{"statusCode": statusCode, "err": err}).Error("HTTP Error")
  196. http.Error(w, err.Error(), statusCode)
  197. }
  198. // writeJSONEnv writes the engine.Env values to the http response stream as a
  199. // json encoded body.
  200. func writeJSONEnv(w http.ResponseWriter, code int, v engine.Env) error {
  201. w.Header().Set("Content-Type", "application/json")
  202. w.WriteHeader(code)
  203. return v.Encode(w)
  204. }
  205. // writeJSON writes the value v to the http response stream as json with standard
  206. // json encoding.
  207. func writeJSON(w http.ResponseWriter, code int, v interface{}) error {
  208. w.Header().Set("Content-Type", "application/json")
  209. w.WriteHeader(code)
  210. return json.NewEncoder(w).Encode(v)
  211. }
  212. func streamJSON(job *engine.Job, w http.ResponseWriter, flush bool) {
  213. w.Header().Set("Content-Type", "application/json")
  214. if flush {
  215. job.Stdout.Add(utils.NewWriteFlusher(w))
  216. } else {
  217. job.Stdout.Add(w)
  218. }
  219. }
  220. func (s *Server) postAuth(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  221. var config *registry.AuthConfig
  222. err := json.NewDecoder(r.Body).Decode(&config)
  223. r.Body.Close()
  224. if err != nil {
  225. return err
  226. }
  227. status, err := s.daemon.RegistryService.Auth(config)
  228. if err != nil {
  229. return err
  230. }
  231. return writeJSON(w, http.StatusOK, &types.AuthResponse{
  232. Status: status,
  233. })
  234. }
  235. func (s *Server) getVersion(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  236. w.Header().Set("Content-Type", "application/json")
  237. v := &types.Version{
  238. Version: dockerversion.VERSION,
  239. ApiVersion: api.APIVERSION,
  240. GitCommit: dockerversion.GITCOMMIT,
  241. GoVersion: runtime.Version(),
  242. Os: runtime.GOOS,
  243. Arch: runtime.GOARCH,
  244. }
  245. if kernelVersion, err := kernel.GetKernelVersion(); err == nil {
  246. v.KernelVersion = kernelVersion.String()
  247. }
  248. return writeJSON(w, http.StatusOK, v)
  249. }
  250. func (s *Server) postContainersKill(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  251. if vars == nil {
  252. return fmt.Errorf("Missing parameter")
  253. }
  254. err := parseForm(r)
  255. if err != nil {
  256. return err
  257. }
  258. var sig uint64
  259. name := vars["name"]
  260. // If we have a signal, look at it. Otherwise, do nothing
  261. if sigStr := vars["signal"]; sigStr != "" {
  262. // Check if we passed the signal as a number:
  263. // The largest legal signal is 31, so let's parse on 5 bits
  264. sig, err = strconv.ParseUint(sigStr, 10, 5)
  265. if err != nil {
  266. // The signal is not a number, treat it as a string (either like
  267. // "KILL" or like "SIGKILL")
  268. sig = uint64(signal.SignalMap[strings.TrimPrefix(sigStr, "SIG")])
  269. }
  270. if sig == 0 {
  271. return fmt.Errorf("Invalid signal: %s", sigStr)
  272. }
  273. }
  274. if err = s.daemon.ContainerKill(name, sig); err != nil {
  275. return err
  276. }
  277. w.WriteHeader(http.StatusNoContent)
  278. return nil
  279. }
  280. func (s *Server) postContainersPause(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  281. if vars == nil {
  282. return fmt.Errorf("Missing parameter")
  283. }
  284. if err := parseForm(r); err != nil {
  285. return err
  286. }
  287. name := vars["name"]
  288. cont, err := s.daemon.Get(name)
  289. if err != nil {
  290. return err
  291. }
  292. if err := cont.Pause(); err != nil {
  293. return fmt.Errorf("Cannot pause container %s: %s", name, err)
  294. }
  295. cont.LogEvent("pause")
  296. w.WriteHeader(http.StatusNoContent)
  297. return nil
  298. }
  299. func (s *Server) postContainersUnpause(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  300. if vars == nil {
  301. return fmt.Errorf("Missing parameter")
  302. }
  303. if err := parseForm(r); err != nil {
  304. return err
  305. }
  306. name := vars["name"]
  307. cont, err := s.daemon.Get(name)
  308. if err != nil {
  309. return err
  310. }
  311. if err := cont.Unpause(); err != nil {
  312. return fmt.Errorf("Cannot unpause container %s: %s", name, err)
  313. }
  314. cont.LogEvent("unpause")
  315. w.WriteHeader(http.StatusNoContent)
  316. return nil
  317. }
  318. func (s *Server) getContainersExport(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  319. if vars == nil {
  320. return fmt.Errorf("Missing parameter")
  321. }
  322. return s.daemon.ContainerExport(vars["name"], w)
  323. }
  324. func (s *Server) getImagesJSON(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  325. if err := parseForm(r); err != nil {
  326. return err
  327. }
  328. imagesConfig := graph.ImagesConfig{
  329. Filters: r.Form.Get("filters"),
  330. // FIXME this parameter could just be a match filter
  331. Filter: r.Form.Get("filter"),
  332. All: toBool(r.Form.Get("all")),
  333. }
  334. images, err := s.daemon.Repositories().Images(&imagesConfig)
  335. if err != nil {
  336. return err
  337. }
  338. if version.GreaterThanOrEqualTo("1.7") {
  339. return writeJSON(w, http.StatusOK, images)
  340. }
  341. legacyImages := []types.LegacyImage{}
  342. for _, image := range images {
  343. for _, repoTag := range image.RepoTags {
  344. repo, tag := parsers.ParseRepositoryTag(repoTag)
  345. legacyImage := types.LegacyImage{
  346. Repository: repo,
  347. Tag: tag,
  348. ID: image.ID,
  349. Created: image.Created,
  350. Size: image.Size,
  351. VirtualSize: image.VirtualSize,
  352. }
  353. legacyImages = append(legacyImages, legacyImage)
  354. }
  355. }
  356. return writeJSON(w, http.StatusOK, legacyImages)
  357. }
  358. func (s *Server) getImagesViz(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  359. if version.GreaterThan("1.6") {
  360. w.WriteHeader(http.StatusNotFound)
  361. return fmt.Errorf("This is now implemented in the client.")
  362. }
  363. eng.ServeHTTP(w, r)
  364. return nil
  365. }
  366. func (s *Server) getInfo(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  367. w.Header().Set("Content-Type", "application/json")
  368. info, err := s.daemon.SystemInfo()
  369. if err != nil {
  370. return err
  371. }
  372. return writeJSON(w, http.StatusOK, info)
  373. }
  374. func (s *Server) getEvents(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  375. if err := parseForm(r); err != nil {
  376. return err
  377. }
  378. var since int64 = -1
  379. if r.Form.Get("since") != "" {
  380. s, err := strconv.ParseInt(r.Form.Get("since"), 10, 64)
  381. if err != nil {
  382. return err
  383. }
  384. since = s
  385. }
  386. var until int64 = -1
  387. if r.Form.Get("until") != "" {
  388. u, err := strconv.ParseInt(r.Form.Get("until"), 10, 64)
  389. if err != nil {
  390. return err
  391. }
  392. until = u
  393. }
  394. timer := time.NewTimer(0)
  395. timer.Stop()
  396. if until > 0 {
  397. dur := time.Unix(until, 0).Sub(time.Now())
  398. timer = time.NewTimer(dur)
  399. }
  400. ef, err := filters.FromParam(r.Form.Get("filters"))
  401. if err != nil {
  402. return err
  403. }
  404. isFiltered := func(field string, filter []string) bool {
  405. if len(filter) == 0 {
  406. return false
  407. }
  408. for _, v := range filter {
  409. if v == field {
  410. return false
  411. }
  412. if strings.Contains(field, ":") {
  413. image := strings.Split(field, ":")
  414. if image[0] == v {
  415. return false
  416. }
  417. }
  418. }
  419. return true
  420. }
  421. d := s.daemon
  422. es := d.EventsService
  423. w.Header().Set("Content-Type", "application/json")
  424. enc := json.NewEncoder(utils.NewWriteFlusher(w))
  425. getContainerId := func(cn string) string {
  426. c, err := d.Get(cn)
  427. if err != nil {
  428. return ""
  429. }
  430. return c.ID
  431. }
  432. sendEvent := func(ev *jsonmessage.JSONMessage) error {
  433. //incoming container filter can be name,id or partial id, convert and replace as a full container id
  434. for i, cn := range ef["container"] {
  435. ef["container"][i] = getContainerId(cn)
  436. }
  437. if isFiltered(ev.Status, ef["event"]) || isFiltered(ev.From, ef["image"]) ||
  438. isFiltered(ev.ID, ef["container"]) {
  439. return nil
  440. }
  441. return enc.Encode(ev)
  442. }
  443. current, l := es.Subscribe()
  444. defer es.Evict(l)
  445. for _, ev := range current {
  446. if ev.Time < since {
  447. continue
  448. }
  449. if err := sendEvent(ev); err != nil {
  450. return err
  451. }
  452. }
  453. for {
  454. select {
  455. case ev := <-l:
  456. jev, ok := ev.(*jsonmessage.JSONMessage)
  457. if !ok {
  458. continue
  459. }
  460. if err := sendEvent(jev); err != nil {
  461. return err
  462. }
  463. case <-timer.C:
  464. return nil
  465. }
  466. }
  467. }
  468. func (s *Server) getImagesHistory(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  469. if vars == nil {
  470. return fmt.Errorf("Missing parameter")
  471. }
  472. name := vars["name"]
  473. history, err := s.daemon.Repositories().History(name)
  474. if err != nil {
  475. return err
  476. }
  477. return writeJSON(w, http.StatusOK, history)
  478. }
  479. func (s *Server) getContainersChanges(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  480. if vars == nil {
  481. return fmt.Errorf("Missing parameter")
  482. }
  483. name := vars["name"]
  484. cont, err := s.daemon.Get(name)
  485. if err != nil {
  486. return err
  487. }
  488. changes, err := cont.Changes()
  489. if err != nil {
  490. return err
  491. }
  492. return writeJSON(w, http.StatusOK, changes)
  493. }
  494. func (s *Server) getContainersTop(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  495. if version.LessThan("1.4") {
  496. return fmt.Errorf("top was improved a lot since 1.3, Please upgrade your docker client.")
  497. }
  498. if vars == nil {
  499. return fmt.Errorf("Missing parameter")
  500. }
  501. if err := parseForm(r); err != nil {
  502. return err
  503. }
  504. procList, err := s.daemon.ContainerTop(vars["name"], r.Form.Get("ps_args"))
  505. if err != nil {
  506. return err
  507. }
  508. return writeJSON(w, http.StatusOK, procList)
  509. }
  510. func (s *Server) getContainersJSON(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  511. if err := parseForm(r); err != nil {
  512. return err
  513. }
  514. config := &daemon.ContainersConfig{
  515. All: toBool(r.Form.Get("all")),
  516. Size: toBool(r.Form.Get("size")),
  517. Since: r.Form.Get("since"),
  518. Before: r.Form.Get("before"),
  519. Filters: r.Form.Get("filters"),
  520. }
  521. if tmpLimit := r.Form.Get("limit"); tmpLimit != "" {
  522. limit, err := strconv.Atoi(tmpLimit)
  523. if err != nil {
  524. return err
  525. }
  526. config.Limit = limit
  527. }
  528. containers, err := s.daemon.Containers(config)
  529. if err != nil {
  530. return err
  531. }
  532. return writeJSON(w, http.StatusOK, containers)
  533. }
  534. func (s *Server) getContainersStats(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  535. if err := parseForm(r); err != nil {
  536. return err
  537. }
  538. if vars == nil {
  539. return fmt.Errorf("Missing parameter")
  540. }
  541. return s.daemon.ContainerStats(vars["name"], utils.NewWriteFlusher(w))
  542. }
  543. func (s *Server) getContainersLogs(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  544. if err := parseForm(r); err != nil {
  545. return err
  546. }
  547. if vars == nil {
  548. return fmt.Errorf("Missing parameter")
  549. }
  550. // Validate args here, because we can't return not StatusOK after job.Run() call
  551. stdout, stderr := toBool(r.Form.Get("stdout")), toBool(r.Form.Get("stderr"))
  552. if !(stdout || stderr) {
  553. return fmt.Errorf("Bad parameters: you must choose at least one stream")
  554. }
  555. logsConfig := &daemon.ContainerLogsConfig{
  556. Follow: toBool(r.Form.Get("follow")),
  557. Timestamps: toBool(r.Form.Get("timestamps")),
  558. Tail: r.Form.Get("tail"),
  559. UseStdout: stdout,
  560. UseStderr: stderr,
  561. OutStream: utils.NewWriteFlusher(w),
  562. }
  563. if err := s.daemon.ContainerLogs(vars["name"], logsConfig); err != nil {
  564. fmt.Fprintf(w, "Error running logs job: %s\n", err)
  565. }
  566. return nil
  567. }
  568. func (s *Server) postImagesTag(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  569. if err := parseForm(r); err != nil {
  570. return err
  571. }
  572. if vars == nil {
  573. return fmt.Errorf("Missing parameter")
  574. }
  575. repo := r.Form.Get("repo")
  576. tag := r.Form.Get("tag")
  577. force := toBool(r.Form.Get("force"))
  578. if err := s.daemon.Repositories().Tag(repo, tag, vars["name"], force); err != nil {
  579. return err
  580. }
  581. w.WriteHeader(http.StatusCreated)
  582. return nil
  583. }
  584. func (s *Server) postCommit(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  585. if err := parseForm(r); err != nil {
  586. return err
  587. }
  588. if err := checkForJson(r); err != nil {
  589. return err
  590. }
  591. cont := r.Form.Get("container")
  592. pause := toBool(r.Form.Get("pause"))
  593. if r.FormValue("pause") == "" && version.GreaterThanOrEqualTo("1.13") {
  594. pause = true
  595. }
  596. containerCommitConfig := &daemon.ContainerCommitConfig{
  597. Pause: pause,
  598. Repo: r.Form.Get("repo"),
  599. Tag: r.Form.Get("tag"),
  600. Author: r.Form.Get("author"),
  601. Comment: r.Form.Get("comment"),
  602. Changes: r.Form["changes"],
  603. Config: r.Body,
  604. }
  605. imgID, err := s.daemon.ContainerCommit(cont, containerCommitConfig)
  606. if err != nil {
  607. return err
  608. }
  609. return writeJSON(w, http.StatusCreated, &types.ContainerCommitResponse{
  610. ID: imgID,
  611. })
  612. }
  613. // Creates an image from Pull or from Import
  614. func (s *Server) postImagesCreate(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  615. if err := parseForm(r); err != nil {
  616. return err
  617. }
  618. var (
  619. image = r.Form.Get("fromImage")
  620. repo = r.Form.Get("repo")
  621. tag = r.Form.Get("tag")
  622. )
  623. authEncoded := r.Header.Get("X-Registry-Auth")
  624. authConfig := &registry.AuthConfig{}
  625. if authEncoded != "" {
  626. authJson := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded))
  627. if err := json.NewDecoder(authJson).Decode(authConfig); err != nil {
  628. // for a pull it is not an error if no auth was given
  629. // to increase compatibility with the existing api it is defaulting to be empty
  630. authConfig = &registry.AuthConfig{}
  631. }
  632. }
  633. if image != "" { //pull
  634. if tag == "" {
  635. image, tag = parsers.ParseRepositoryTag(image)
  636. }
  637. metaHeaders := map[string][]string{}
  638. for k, v := range r.Header {
  639. if strings.HasPrefix(k, "X-Meta-") {
  640. metaHeaders[k] = v
  641. }
  642. }
  643. imagePullConfig := &graph.ImagePullConfig{
  644. Parallel: version.GreaterThan("1.3"),
  645. MetaHeaders: metaHeaders,
  646. AuthConfig: authConfig,
  647. OutStream: utils.NewWriteFlusher(w),
  648. }
  649. if version.GreaterThan("1.0") {
  650. imagePullConfig.Json = true
  651. w.Header().Set("Content-Type", "application/json")
  652. } else {
  653. imagePullConfig.Json = false
  654. }
  655. if err := s.daemon.Repositories().Pull(image, tag, imagePullConfig, eng); err != nil {
  656. return err
  657. }
  658. } else { //import
  659. if tag == "" {
  660. repo, tag = parsers.ParseRepositoryTag(repo)
  661. }
  662. src := r.Form.Get("fromSrc")
  663. imageImportConfig := &graph.ImageImportConfig{
  664. Changes: r.Form["changes"],
  665. InConfig: r.Body,
  666. OutStream: utils.NewWriteFlusher(w),
  667. }
  668. if version.GreaterThan("1.0") {
  669. imageImportConfig.Json = true
  670. w.Header().Set("Content-Type", "application/json")
  671. } else {
  672. imageImportConfig.Json = false
  673. }
  674. if err := s.daemon.Repositories().Import(src, repo, tag, imageImportConfig, eng); err != nil {
  675. return err
  676. }
  677. }
  678. return nil
  679. }
  680. func (s *Server) getImagesSearch(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  681. if err := parseForm(r); err != nil {
  682. return err
  683. }
  684. var (
  685. config *registry.AuthConfig
  686. authEncoded = r.Header.Get("X-Registry-Auth")
  687. headers = map[string][]string{}
  688. )
  689. if authEncoded != "" {
  690. authJson := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded))
  691. if err := json.NewDecoder(authJson).Decode(&config); err != nil {
  692. // for a search it is not an error if no auth was given
  693. // to increase compatibility with the existing api it is defaulting to be empty
  694. config = &registry.AuthConfig{}
  695. }
  696. }
  697. for k, v := range r.Header {
  698. if strings.HasPrefix(k, "X-Meta-") {
  699. headers[k] = v
  700. }
  701. }
  702. query, err := s.daemon.RegistryService.Search(r.Form.Get("term"), config, headers)
  703. if err != nil {
  704. return err
  705. }
  706. return json.NewEncoder(w).Encode(query.Results)
  707. }
  708. func (s *Server) postImagesPush(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  709. if vars == nil {
  710. return fmt.Errorf("Missing parameter")
  711. }
  712. metaHeaders := map[string][]string{}
  713. for k, v := range r.Header {
  714. if strings.HasPrefix(k, "X-Meta-") {
  715. metaHeaders[k] = v
  716. }
  717. }
  718. if err := parseForm(r); err != nil {
  719. return err
  720. }
  721. authConfig := &registry.AuthConfig{}
  722. authEncoded := r.Header.Get("X-Registry-Auth")
  723. if authEncoded != "" {
  724. // the new format is to handle the authConfig as a header
  725. authJson := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded))
  726. if err := json.NewDecoder(authJson).Decode(authConfig); err != nil {
  727. // to increase compatibility to existing api it is defaulting to be empty
  728. authConfig = &registry.AuthConfig{}
  729. }
  730. } else {
  731. // the old format is supported for compatibility if there was no authConfig header
  732. if err := json.NewDecoder(r.Body).Decode(authConfig); err != nil {
  733. return fmt.Errorf("Bad parameters and missing X-Registry-Auth: %v", err)
  734. }
  735. }
  736. job := eng.Job("push", vars["name"])
  737. job.SetenvJson("metaHeaders", metaHeaders)
  738. job.SetenvJson("authConfig", authConfig)
  739. job.Setenv("tag", r.Form.Get("tag"))
  740. if version.GreaterThan("1.0") {
  741. job.SetenvBool("json", true)
  742. streamJSON(job, w, true)
  743. } else {
  744. job.Stdout.Add(utils.NewWriteFlusher(w))
  745. }
  746. if err := job.Run(); err != nil {
  747. if !job.Stdout.Used() {
  748. return err
  749. }
  750. sf := streamformatter.NewStreamFormatter(version.GreaterThan("1.0"))
  751. w.Write(sf.FormatError(err))
  752. }
  753. return nil
  754. }
  755. func (s *Server) getImagesGet(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  756. if vars == nil {
  757. return fmt.Errorf("Missing parameter")
  758. }
  759. if err := parseForm(r); err != nil {
  760. return err
  761. }
  762. if version.GreaterThan("1.0") {
  763. w.Header().Set("Content-Type", "application/x-tar")
  764. }
  765. var job *engine.Job
  766. if name, ok := vars["name"]; ok {
  767. job = eng.Job("image_export", name)
  768. } else {
  769. job = eng.Job("image_export", r.Form["names"]...)
  770. }
  771. job.Stdout.Add(w)
  772. return job.Run()
  773. }
  774. func (s *Server) postImagesLoad(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  775. job := eng.Job("load")
  776. job.Stdin.Add(r.Body)
  777. job.Stdout.Add(w)
  778. return job.Run()
  779. }
  780. func (s *Server) postContainersCreate(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  781. if err := parseForm(r); err != nil {
  782. return nil
  783. }
  784. if err := checkForJson(r); err != nil {
  785. return err
  786. }
  787. var (
  788. warnings []string
  789. name = r.Form.Get("name")
  790. )
  791. config, hostConfig, err := runconfig.DecodeContainerConfig(r.Body)
  792. if err != nil {
  793. return err
  794. }
  795. containerId, warnings, err := s.daemon.ContainerCreate(name, config, hostConfig)
  796. if err != nil {
  797. return err
  798. }
  799. return writeJSON(w, http.StatusCreated, &types.ContainerCreateResponse{
  800. ID: containerId,
  801. Warnings: warnings,
  802. })
  803. }
  804. func (s *Server) postContainersRestart(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  805. if err := parseForm(r); err != nil {
  806. return err
  807. }
  808. if vars == nil {
  809. return fmt.Errorf("Missing parameter")
  810. }
  811. timeout, err := strconv.Atoi(r.Form.Get("t"))
  812. if err != nil {
  813. return err
  814. }
  815. if err := s.daemon.ContainerRestart(vars["name"], timeout); err != nil {
  816. return err
  817. }
  818. w.WriteHeader(http.StatusNoContent)
  819. return nil
  820. }
  821. func (s *Server) postContainerRename(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  822. if err := parseForm(r); err != nil {
  823. return err
  824. }
  825. if vars == nil {
  826. return fmt.Errorf("Missing parameter")
  827. }
  828. name := vars["name"]
  829. newName := r.Form.Get("name")
  830. if err := s.daemon.ContainerRename(name, newName); err != nil {
  831. return err
  832. }
  833. w.WriteHeader(http.StatusNoContent)
  834. return nil
  835. }
  836. func (s *Server) deleteContainers(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  837. if err := parseForm(r); err != nil {
  838. return err
  839. }
  840. if vars == nil {
  841. return fmt.Errorf("Missing parameter")
  842. }
  843. name := vars["name"]
  844. config := &daemon.ContainerRmConfig{
  845. ForceRemove: toBool(r.Form.Get("force")),
  846. RemoveVolume: toBool(r.Form.Get("v")),
  847. RemoveLink: toBool(r.Form.Get("link")),
  848. }
  849. if err := s.daemon.ContainerRm(name, config); err != nil {
  850. // Force a 404 for the empty string
  851. if strings.Contains(strings.ToLower(err.Error()), "prefix can't be empty") {
  852. return fmt.Errorf("no such id: \"\"")
  853. }
  854. return err
  855. }
  856. w.WriteHeader(http.StatusNoContent)
  857. return nil
  858. }
  859. func (s *Server) deleteImages(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  860. if err := parseForm(r); err != nil {
  861. return err
  862. }
  863. if vars == nil {
  864. return fmt.Errorf("Missing parameter")
  865. }
  866. name := vars["name"]
  867. force := toBool(r.Form.Get("force"))
  868. noprune := toBool(r.Form.Get("noprune"))
  869. list, err := s.daemon.ImageDelete(name, force, noprune)
  870. if err != nil {
  871. return err
  872. }
  873. return writeJSON(w, http.StatusOK, list)
  874. }
  875. func (s *Server) postContainersStart(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  876. if vars == nil {
  877. return fmt.Errorf("Missing parameter")
  878. }
  879. // If contentLength is -1, we can assumed chunked encoding
  880. // or more technically that the length is unknown
  881. // https://golang.org/src/pkg/net/http/request.go#L139
  882. // net/http otherwise seems to swallow any headers related to chunked encoding
  883. // including r.TransferEncoding
  884. // allow a nil body for backwards compatibility
  885. var hostConfig *runconfig.HostConfig
  886. if r.Body != nil && (r.ContentLength > 0 || r.ContentLength == -1) {
  887. if err := checkForJson(r); err != nil {
  888. return err
  889. }
  890. c, err := runconfig.DecodeHostConfig(r.Body)
  891. if err != nil {
  892. return err
  893. }
  894. hostConfig = c
  895. }
  896. if err := s.daemon.ContainerStart(vars["name"], hostConfig); err != nil {
  897. if err.Error() == "Container already started" {
  898. w.WriteHeader(http.StatusNotModified)
  899. return nil
  900. }
  901. return err
  902. }
  903. w.WriteHeader(http.StatusNoContent)
  904. return nil
  905. }
  906. func (s *Server) postContainersStop(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  907. if err := parseForm(r); err != nil {
  908. return err
  909. }
  910. if vars == nil {
  911. return fmt.Errorf("Missing parameter")
  912. }
  913. seconds, err := strconv.Atoi(r.Form.Get("t"))
  914. if err != nil {
  915. return err
  916. }
  917. if err := s.daemon.ContainerStop(vars["name"], seconds); err != nil {
  918. if err.Error() == "Container already stopped" {
  919. w.WriteHeader(http.StatusNotModified)
  920. return nil
  921. }
  922. return err
  923. }
  924. w.WriteHeader(http.StatusNoContent)
  925. return nil
  926. }
  927. func (s *Server) postContainersWait(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  928. if vars == nil {
  929. return fmt.Errorf("Missing parameter")
  930. }
  931. name := vars["name"]
  932. cont, err := s.daemon.Get(name)
  933. if err != nil {
  934. return err
  935. }
  936. status, _ := cont.WaitStop(-1 * time.Second)
  937. return writeJSON(w, http.StatusOK, &types.ContainerWaitResponse{
  938. StatusCode: status,
  939. })
  940. }
  941. func (s *Server) postContainersResize(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  942. if err := parseForm(r); err != nil {
  943. return err
  944. }
  945. if vars == nil {
  946. return fmt.Errorf("Missing parameter")
  947. }
  948. height, err := strconv.Atoi(r.Form.Get("h"))
  949. if err != nil {
  950. return err
  951. }
  952. width, err := strconv.Atoi(r.Form.Get("w"))
  953. if err != nil {
  954. return err
  955. }
  956. cont, err := s.daemon.Get(vars["name"])
  957. if err != nil {
  958. return err
  959. }
  960. return cont.Resize(height, width)
  961. }
  962. func (s *Server) postContainersAttach(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  963. if err := parseForm(r); err != nil {
  964. return err
  965. }
  966. if vars == nil {
  967. return fmt.Errorf("Missing parameter")
  968. }
  969. cont, err := s.daemon.Get(vars["name"])
  970. if err != nil {
  971. return err
  972. }
  973. inStream, outStream, err := hijackServer(w)
  974. if err != nil {
  975. return err
  976. }
  977. defer closeStreams(inStream, outStream)
  978. var errStream io.Writer
  979. if _, ok := r.Header["Upgrade"]; ok {
  980. fmt.Fprintf(outStream, "HTTP/1.1 101 UPGRADED\r\nContent-Type: application/vnd.docker.raw-stream\r\nConnection: Upgrade\r\nUpgrade: tcp\r\n\r\n")
  981. } else {
  982. fmt.Fprintf(outStream, "HTTP/1.1 200 OK\r\nContent-Type: application/vnd.docker.raw-stream\r\n\r\n")
  983. }
  984. if !cont.Config.Tty && version.GreaterThanOrEqualTo("1.6") {
  985. errStream = stdcopy.NewStdWriter(outStream, stdcopy.Stderr)
  986. outStream = stdcopy.NewStdWriter(outStream, stdcopy.Stdout)
  987. } else {
  988. errStream = outStream
  989. }
  990. logs := toBool(r.Form.Get("logs"))
  991. stream := toBool(r.Form.Get("stream"))
  992. var stdin io.ReadCloser
  993. var stdout, stderr io.Writer
  994. if toBool(r.Form.Get("stdin")) {
  995. stdin = inStream
  996. }
  997. if toBool(r.Form.Get("stdout")) {
  998. stdout = outStream
  999. }
  1000. if toBool(r.Form.Get("stderr")) {
  1001. stderr = errStream
  1002. }
  1003. if err := cont.AttachWithLogs(stdin, stdout, stderr, logs, stream); err != nil {
  1004. fmt.Fprintf(outStream, "Error attaching: %s\n", err)
  1005. }
  1006. return nil
  1007. }
  1008. func (s *Server) wsContainersAttach(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1009. if err := parseForm(r); err != nil {
  1010. return err
  1011. }
  1012. if vars == nil {
  1013. return fmt.Errorf("Missing parameter")
  1014. }
  1015. cont, err := s.daemon.Get(vars["name"])
  1016. if err != nil {
  1017. return err
  1018. }
  1019. h := websocket.Handler(func(ws *websocket.Conn) {
  1020. defer ws.Close()
  1021. logs := r.Form.Get("logs") != ""
  1022. stream := r.Form.Get("stream") != ""
  1023. if err := cont.AttachWithLogs(ws, ws, ws, logs, stream); err != nil {
  1024. logrus.Errorf("Error attaching websocket: %s", err)
  1025. }
  1026. })
  1027. h.ServeHTTP(w, r)
  1028. return nil
  1029. }
  1030. func (s *Server) getContainersByName(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1031. if vars == nil {
  1032. return fmt.Errorf("Missing parameter")
  1033. }
  1034. var job = eng.Job("container_inspect", vars["name"])
  1035. if version.LessThan("1.12") {
  1036. job.SetenvBool("raw", true)
  1037. }
  1038. streamJSON(job, w, false)
  1039. return job.Run()
  1040. }
  1041. func (s *Server) getExecByID(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1042. if vars == nil {
  1043. return fmt.Errorf("Missing parameter 'id'")
  1044. }
  1045. eConfig, err := s.daemon.ContainerExecInspect(vars["id"])
  1046. if err != nil {
  1047. return err
  1048. }
  1049. return writeJSON(w, http.StatusOK, eConfig)
  1050. }
  1051. func (s *Server) getImagesByName(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1052. if vars == nil {
  1053. return fmt.Errorf("Missing parameter")
  1054. }
  1055. var job = eng.Job("image_inspect", vars["name"])
  1056. if version.LessThan("1.12") {
  1057. job.SetenvBool("raw", true)
  1058. }
  1059. streamJSON(job, w, false)
  1060. return job.Run()
  1061. }
  1062. func (s *Server) postBuild(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1063. if version.LessThan("1.3") {
  1064. return fmt.Errorf("Multipart upload for build is no longer supported. Please upgrade your docker client.")
  1065. }
  1066. var (
  1067. authEncoded = r.Header.Get("X-Registry-Auth")
  1068. authConfig = &registry.AuthConfig{}
  1069. configFileEncoded = r.Header.Get("X-Registry-Config")
  1070. configFile = &registry.ConfigFile{}
  1071. job = eng.Job("build")
  1072. )
  1073. // This block can be removed when API versions prior to 1.9 are deprecated.
  1074. // Both headers will be parsed and sent along to the daemon, but if a non-empty
  1075. // ConfigFile is present, any value provided as an AuthConfig directly will
  1076. // be overridden. See BuildFile::CmdFrom for details.
  1077. if version.LessThan("1.9") && authEncoded != "" {
  1078. authJson := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded))
  1079. if err := json.NewDecoder(authJson).Decode(authConfig); err != nil {
  1080. // for a pull it is not an error if no auth was given
  1081. // to increase compatibility with the existing api it is defaulting to be empty
  1082. authConfig = &registry.AuthConfig{}
  1083. }
  1084. }
  1085. if configFileEncoded != "" {
  1086. configFileJson := base64.NewDecoder(base64.URLEncoding, strings.NewReader(configFileEncoded))
  1087. if err := json.NewDecoder(configFileJson).Decode(configFile); err != nil {
  1088. // for a pull it is not an error if no auth was given
  1089. // to increase compatibility with the existing api it is defaulting to be empty
  1090. configFile = &registry.ConfigFile{}
  1091. }
  1092. }
  1093. if version.GreaterThanOrEqualTo("1.8") {
  1094. job.SetenvBool("json", true)
  1095. streamJSON(job, w, true)
  1096. } else {
  1097. job.Stdout.Add(utils.NewWriteFlusher(w))
  1098. }
  1099. if toBool(r.FormValue("forcerm")) && version.GreaterThanOrEqualTo("1.12") {
  1100. job.Setenv("rm", "1")
  1101. } else if r.FormValue("rm") == "" && version.GreaterThanOrEqualTo("1.12") {
  1102. job.Setenv("rm", "1")
  1103. } else {
  1104. job.Setenv("rm", r.FormValue("rm"))
  1105. }
  1106. if toBool(r.FormValue("pull")) && version.GreaterThanOrEqualTo("1.16") {
  1107. job.Setenv("pull", "1")
  1108. }
  1109. job.Stdin.Add(r.Body)
  1110. job.Setenv("remote", r.FormValue("remote"))
  1111. job.Setenv("dockerfile", r.FormValue("dockerfile"))
  1112. job.Setenv("t", r.FormValue("t"))
  1113. job.Setenv("q", r.FormValue("q"))
  1114. job.Setenv("nocache", r.FormValue("nocache"))
  1115. job.Setenv("forcerm", r.FormValue("forcerm"))
  1116. job.SetenvJson("authConfig", authConfig)
  1117. job.SetenvJson("configFile", configFile)
  1118. job.Setenv("memswap", r.FormValue("memswap"))
  1119. job.Setenv("memory", r.FormValue("memory"))
  1120. job.Setenv("cpusetcpus", r.FormValue("cpusetcpus"))
  1121. job.Setenv("cpusetmems", r.FormValue("cpusetmems"))
  1122. job.Setenv("cpushares", r.FormValue("cpushares"))
  1123. // Job cancellation. Note: not all job types support this.
  1124. if closeNotifier, ok := w.(http.CloseNotifier); ok {
  1125. finished := make(chan struct{})
  1126. defer close(finished)
  1127. go func() {
  1128. select {
  1129. case <-finished:
  1130. case <-closeNotifier.CloseNotify():
  1131. logrus.Infof("Client disconnected, cancelling job: %s", job.Name)
  1132. job.Cancel()
  1133. }
  1134. }()
  1135. }
  1136. if err := job.Run(); err != nil {
  1137. if !job.Stdout.Used() {
  1138. return err
  1139. }
  1140. sf := streamformatter.NewStreamFormatter(version.GreaterThanOrEqualTo("1.8"))
  1141. w.Write(sf.FormatError(err))
  1142. }
  1143. return nil
  1144. }
  1145. func (s *Server) postContainersCopy(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1146. if vars == nil {
  1147. return fmt.Errorf("Missing parameter")
  1148. }
  1149. if err := checkForJson(r); err != nil {
  1150. return err
  1151. }
  1152. cfg := types.CopyConfig{}
  1153. if err := json.NewDecoder(r.Body).Decode(&cfg); err != nil {
  1154. return err
  1155. }
  1156. if cfg.Resource == "" {
  1157. return fmt.Errorf("Path cannot be empty")
  1158. }
  1159. res := cfg.Resource
  1160. if res[0] == '/' {
  1161. res = res[1:]
  1162. }
  1163. cont, err := s.daemon.Get(vars["name"])
  1164. if err != nil {
  1165. logrus.Errorf("%v", err)
  1166. if strings.Contains(strings.ToLower(err.Error()), "no such id") {
  1167. w.WriteHeader(http.StatusNotFound)
  1168. return nil
  1169. }
  1170. }
  1171. data, err := cont.Copy(res)
  1172. if err != nil {
  1173. logrus.Errorf("%v", err)
  1174. if os.IsNotExist(err) {
  1175. return fmt.Errorf("Could not find the file %s in container %s", cfg.Resource, vars["name"])
  1176. }
  1177. return err
  1178. }
  1179. defer data.Close()
  1180. w.Header().Set("Content-Type", "application/x-tar")
  1181. if _, err := io.Copy(w, data); err != nil {
  1182. return err
  1183. }
  1184. return nil
  1185. }
  1186. func (s *Server) postContainerExecCreate(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1187. if err := parseForm(r); err != nil {
  1188. return nil
  1189. }
  1190. var (
  1191. name = vars["name"]
  1192. job = eng.Job("execCreate", name)
  1193. stdoutBuffer = bytes.NewBuffer(nil)
  1194. outWarnings []string
  1195. warnings = bytes.NewBuffer(nil)
  1196. )
  1197. if err := job.DecodeEnv(r.Body); err != nil {
  1198. return err
  1199. }
  1200. job.Stdout.Add(stdoutBuffer)
  1201. // Read warnings from stderr
  1202. job.Stderr.Add(warnings)
  1203. // Register an instance of Exec in container.
  1204. if err := job.Run(); err != nil {
  1205. fmt.Fprintf(os.Stderr, "Error setting up exec command in container %s: %s\n", name, err)
  1206. return err
  1207. }
  1208. // Parse warnings from stderr
  1209. scanner := bufio.NewScanner(warnings)
  1210. for scanner.Scan() {
  1211. outWarnings = append(outWarnings, scanner.Text())
  1212. }
  1213. return writeJSON(w, http.StatusCreated, &types.ContainerExecCreateResponse{
  1214. ID: engine.Tail(stdoutBuffer, 1),
  1215. Warnings: outWarnings,
  1216. })
  1217. }
  1218. // TODO(vishh): Refactor the code to avoid having to specify stream config as part of both create and start.
  1219. func (s *Server) postContainerExecStart(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1220. if err := parseForm(r); err != nil {
  1221. return nil
  1222. }
  1223. var (
  1224. name = vars["name"]
  1225. job = eng.Job("execStart", name)
  1226. errOut io.Writer = os.Stderr
  1227. )
  1228. if err := job.DecodeEnv(r.Body); err != nil {
  1229. return err
  1230. }
  1231. if !job.GetenvBool("Detach") {
  1232. // Setting up the streaming http interface.
  1233. inStream, outStream, err := hijackServer(w)
  1234. if err != nil {
  1235. return err
  1236. }
  1237. defer closeStreams(inStream, outStream)
  1238. var errStream io.Writer
  1239. if _, ok := r.Header["Upgrade"]; ok {
  1240. fmt.Fprintf(outStream, "HTTP/1.1 101 UPGRADED\r\nContent-Type: application/vnd.docker.raw-stream\r\nConnection: Upgrade\r\nUpgrade: tcp\r\n\r\n")
  1241. } else {
  1242. fmt.Fprintf(outStream, "HTTP/1.1 200 OK\r\nContent-Type: application/vnd.docker.raw-stream\r\n\r\n")
  1243. }
  1244. if !job.GetenvBool("Tty") && version.GreaterThanOrEqualTo("1.6") {
  1245. errStream = stdcopy.NewStdWriter(outStream, stdcopy.Stderr)
  1246. outStream = stdcopy.NewStdWriter(outStream, stdcopy.Stdout)
  1247. } else {
  1248. errStream = outStream
  1249. }
  1250. job.Stdin.Add(inStream)
  1251. job.Stdout.Add(outStream)
  1252. job.Stderr.Set(errStream)
  1253. errOut = outStream
  1254. }
  1255. // Now run the user process in container.
  1256. job.SetCloseIO(false)
  1257. if err := job.Run(); err != nil {
  1258. fmt.Fprintf(errOut, "Error starting exec command in container %s: %s\n", name, err)
  1259. return err
  1260. }
  1261. w.WriteHeader(http.StatusNoContent)
  1262. return nil
  1263. }
  1264. func (s *Server) postContainerExecResize(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1265. if err := parseForm(r); err != nil {
  1266. return err
  1267. }
  1268. if vars == nil {
  1269. return fmt.Errorf("Missing parameter")
  1270. }
  1271. height, err := strconv.Atoi(r.Form.Get("h"))
  1272. if err != nil {
  1273. return err
  1274. }
  1275. width, err := strconv.Atoi(r.Form.Get("w"))
  1276. if err != nil {
  1277. return err
  1278. }
  1279. return s.daemon.ContainerExecResize(vars["name"], height, width)
  1280. }
  1281. func (s *Server) optionsHandler(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1282. w.WriteHeader(http.StatusOK)
  1283. return nil
  1284. }
  1285. func writeCorsHeaders(w http.ResponseWriter, r *http.Request, corsHeaders string) {
  1286. logrus.Debugf("CORS header is enabled and set to: %s", corsHeaders)
  1287. w.Header().Add("Access-Control-Allow-Origin", corsHeaders)
  1288. w.Header().Add("Access-Control-Allow-Headers", "Origin, X-Requested-With, Content-Type, Accept, X-Registry-Auth")
  1289. w.Header().Add("Access-Control-Allow-Methods", "GET, POST, DELETE, PUT, OPTIONS")
  1290. }
  1291. func (s *Server) ping(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1292. _, err := w.Write([]byte{'O', 'K'})
  1293. return err
  1294. }
  1295. func makeHttpHandler(eng *engine.Engine, logging bool, localMethod string, localRoute string, handlerFunc HttpApiFunc, corsHeaders string, dockerVersion version.Version) http.HandlerFunc {
  1296. return func(w http.ResponseWriter, r *http.Request) {
  1297. // log the request
  1298. logrus.Debugf("Calling %s %s", localMethod, localRoute)
  1299. if logging {
  1300. logrus.Infof("%s %s", r.Method, r.RequestURI)
  1301. }
  1302. if strings.Contains(r.Header.Get("User-Agent"), "Docker-Client/") {
  1303. userAgent := strings.Split(r.Header.Get("User-Agent"), "/")
  1304. if len(userAgent) == 2 && !dockerVersion.Equal(version.Version(userAgent[1])) {
  1305. logrus.Debugf("Warning: client and server don't have the same version (client: %s, server: %s)", userAgent[1], dockerVersion)
  1306. }
  1307. }
  1308. version := version.Version(mux.Vars(r)["version"])
  1309. if version == "" {
  1310. version = api.APIVERSION
  1311. }
  1312. if corsHeaders != "" {
  1313. writeCorsHeaders(w, r, corsHeaders)
  1314. }
  1315. if version.GreaterThan(api.APIVERSION) {
  1316. http.Error(w, fmt.Errorf("client and server don't have same version (client API version: %s, server API version: %s)", version, api.APIVERSION).Error(), http.StatusNotFound)
  1317. return
  1318. }
  1319. if err := handlerFunc(eng, version, w, r, mux.Vars(r)); err != nil {
  1320. logrus.Errorf("Handler for %s %s returned error: %s", localMethod, localRoute, err)
  1321. httpError(w, err)
  1322. }
  1323. }
  1324. }
  1325. // we keep enableCors just for legacy usage, need to be removed in the future
  1326. func createRouter(s *Server, eng *engine.Engine) *mux.Router {
  1327. r := mux.NewRouter()
  1328. if os.Getenv("DEBUG") != "" {
  1329. ProfilerSetup(r, "/debug/")
  1330. }
  1331. m := map[string]map[string]HttpApiFunc{
  1332. "GET": {
  1333. "/_ping": s.ping,
  1334. "/events": s.getEvents,
  1335. "/info": s.getInfo,
  1336. "/version": s.getVersion,
  1337. "/images/json": s.getImagesJSON,
  1338. "/images/viz": s.getImagesViz,
  1339. "/images/search": s.getImagesSearch,
  1340. "/images/get": s.getImagesGet,
  1341. "/images/{name:.*}/get": s.getImagesGet,
  1342. "/images/{name:.*}/history": s.getImagesHistory,
  1343. "/images/{name:.*}/json": s.getImagesByName,
  1344. "/containers/ps": s.getContainersJSON,
  1345. "/containers/json": s.getContainersJSON,
  1346. "/containers/{name:.*}/export": s.getContainersExport,
  1347. "/containers/{name:.*}/changes": s.getContainersChanges,
  1348. "/containers/{name:.*}/json": s.getContainersByName,
  1349. "/containers/{name:.*}/top": s.getContainersTop,
  1350. "/containers/{name:.*}/logs": s.getContainersLogs,
  1351. "/containers/{name:.*}/stats": s.getContainersStats,
  1352. "/containers/{name:.*}/attach/ws": s.wsContainersAttach,
  1353. "/exec/{id:.*}/json": s.getExecByID,
  1354. },
  1355. "POST": {
  1356. "/auth": s.postAuth,
  1357. "/commit": s.postCommit,
  1358. "/build": s.postBuild,
  1359. "/images/create": s.postImagesCreate,
  1360. "/images/load": s.postImagesLoad,
  1361. "/images/{name:.*}/push": s.postImagesPush,
  1362. "/images/{name:.*}/tag": s.postImagesTag,
  1363. "/containers/create": s.postContainersCreate,
  1364. "/containers/{name:.*}/kill": s.postContainersKill,
  1365. "/containers/{name:.*}/pause": s.postContainersPause,
  1366. "/containers/{name:.*}/unpause": s.postContainersUnpause,
  1367. "/containers/{name:.*}/restart": s.postContainersRestart,
  1368. "/containers/{name:.*}/start": s.postContainersStart,
  1369. "/containers/{name:.*}/stop": s.postContainersStop,
  1370. "/containers/{name:.*}/wait": s.postContainersWait,
  1371. "/containers/{name:.*}/resize": s.postContainersResize,
  1372. "/containers/{name:.*}/attach": s.postContainersAttach,
  1373. "/containers/{name:.*}/copy": s.postContainersCopy,
  1374. "/containers/{name:.*}/exec": s.postContainerExecCreate,
  1375. "/exec/{name:.*}/start": s.postContainerExecStart,
  1376. "/exec/{name:.*}/resize": s.postContainerExecResize,
  1377. "/containers/{name:.*}/rename": s.postContainerRename,
  1378. },
  1379. "DELETE": {
  1380. "/containers/{name:.*}": s.deleteContainers,
  1381. "/images/{name:.*}": s.deleteImages,
  1382. },
  1383. "OPTIONS": {
  1384. "": s.optionsHandler,
  1385. },
  1386. }
  1387. // If "api-cors-header" is not given, but "api-enable-cors" is true, we set cors to "*"
  1388. // otherwise, all head values will be passed to HTTP handler
  1389. corsHeaders := s.cfg.CorsHeaders
  1390. if corsHeaders == "" && s.cfg.EnableCors {
  1391. corsHeaders = "*"
  1392. }
  1393. for method, routes := range m {
  1394. for route, fct := range routes {
  1395. logrus.Debugf("Registering %s, %s", method, route)
  1396. // NOTE: scope issue, make sure the variables are local and won't be changed
  1397. localRoute := route
  1398. localFct := fct
  1399. localMethod := method
  1400. // build the handler function
  1401. f := makeHttpHandler(eng, s.cfg.Logging, localMethod, localRoute, localFct, corsHeaders, version.Version(s.cfg.Version))
  1402. // add the new route
  1403. if localRoute == "" {
  1404. r.Methods(localMethod).HandlerFunc(f)
  1405. } else {
  1406. r.Path("/v{version:[0-9.]+}" + localRoute).Methods(localMethod).HandlerFunc(f)
  1407. r.Path(localRoute).Methods(localMethod).HandlerFunc(f)
  1408. }
  1409. }
  1410. }
  1411. return r
  1412. }
  1413. // ServeRequest processes a single http request to the docker remote api.
  1414. // FIXME: refactor this to be part of Server and not require re-creating a new
  1415. // router each time. This requires first moving ListenAndServe into Server.
  1416. func ServeRequest(eng *engine.Engine, apiversion version.Version, w http.ResponseWriter, req *http.Request) {
  1417. cfg := &ServerConfig{
  1418. EnableCors: true,
  1419. Version: string(apiversion),
  1420. }
  1421. api := New(cfg, eng)
  1422. daemon, _ := eng.HackGetGlobalVar("httpapi.daemon").(*daemon.Daemon)
  1423. api.AcceptConnections(daemon)
  1424. router := createRouter(api, eng)
  1425. // Insert APIVERSION into the request as a convenience
  1426. req.URL.Path = fmt.Sprintf("/v%s%s", apiversion, req.URL.Path)
  1427. router.ServeHTTP(w, req)
  1428. }
  1429. func allocateDaemonPort(addr string) error {
  1430. host, port, err := net.SplitHostPort(addr)
  1431. if err != nil {
  1432. return err
  1433. }
  1434. intPort, err := strconv.Atoi(port)
  1435. if err != nil {
  1436. return err
  1437. }
  1438. var hostIPs []net.IP
  1439. if parsedIP := net.ParseIP(host); parsedIP != nil {
  1440. hostIPs = append(hostIPs, parsedIP)
  1441. } else if hostIPs, err = net.LookupIP(host); err != nil {
  1442. return fmt.Errorf("failed to lookup %s address in host specification", host)
  1443. }
  1444. for _, hostIP := range hostIPs {
  1445. if _, err := bridge.RequestPort(hostIP, "tcp", intPort); err != nil {
  1446. return fmt.Errorf("failed to allocate daemon listening port %d (err: %v)", intPort, err)
  1447. }
  1448. }
  1449. return nil
  1450. }
  1451. func toBool(s string) bool {
  1452. s = strings.ToLower(strings.TrimSpace(s))
  1453. return !(s == "" || s == "0" || s == "no" || s == "false" || s == "none")
  1454. }