prune.go 7.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258
  1. package daemon // import "github.com/docker/docker/daemon"
  2. import (
  3. "context"
  4. "regexp"
  5. "strconv"
  6. "sync/atomic"
  7. "time"
  8. "github.com/containerd/containerd/log"
  9. "github.com/docker/docker/api/types"
  10. "github.com/docker/docker/api/types/events"
  11. "github.com/docker/docker/api/types/filters"
  12. timetypes "github.com/docker/docker/api/types/time"
  13. "github.com/docker/docker/errdefs"
  14. "github.com/docker/docker/libnetwork"
  15. "github.com/docker/docker/runconfig"
  16. "github.com/pkg/errors"
  17. )
  18. var (
  19. // errPruneRunning is returned when a prune request is received while
  20. // one is in progress
  21. errPruneRunning = errdefs.Conflict(errors.New("a prune operation is already running"))
  22. containersAcceptedFilters = map[string]bool{
  23. "label": true,
  24. "label!": true,
  25. "until": true,
  26. }
  27. networksAcceptedFilters = map[string]bool{
  28. "label": true,
  29. "label!": true,
  30. "until": true,
  31. }
  32. )
  33. // ContainersPrune removes unused containers
  34. func (daemon *Daemon) ContainersPrune(ctx context.Context, pruneFilters filters.Args) (*types.ContainersPruneReport, error) {
  35. if !atomic.CompareAndSwapInt32(&daemon.pruneRunning, 0, 1) {
  36. return nil, errPruneRunning
  37. }
  38. defer atomic.StoreInt32(&daemon.pruneRunning, 0)
  39. rep := &types.ContainersPruneReport{}
  40. // make sure that only accepted filters have been received
  41. err := pruneFilters.Validate(containersAcceptedFilters)
  42. if err != nil {
  43. return nil, err
  44. }
  45. until, err := getUntilFromPruneFilters(pruneFilters)
  46. if err != nil {
  47. return nil, err
  48. }
  49. cfg := &daemon.config().Config
  50. allContainers := daemon.List()
  51. for _, c := range allContainers {
  52. select {
  53. case <-ctx.Done():
  54. log.G(ctx).Debugf("ContainersPrune operation cancelled: %#v", *rep)
  55. return rep, nil
  56. default:
  57. }
  58. if !c.IsRunning() {
  59. if !until.IsZero() && c.Created.After(until) {
  60. continue
  61. }
  62. if !matchLabels(pruneFilters, c.Config.Labels) {
  63. continue
  64. }
  65. cSize, _, err := daemon.imageService.GetContainerLayerSize(ctx, c.ID)
  66. if err != nil {
  67. return nil, err
  68. }
  69. // TODO: sets RmLink to true?
  70. err = daemon.containerRm(cfg, c.ID, &types.ContainerRmConfig{})
  71. if err != nil {
  72. log.G(ctx).Warnf("failed to prune container %s: %v", c.ID, err)
  73. continue
  74. }
  75. if cSize > 0 {
  76. rep.SpaceReclaimed += uint64(cSize)
  77. }
  78. rep.ContainersDeleted = append(rep.ContainersDeleted, c.ID)
  79. }
  80. }
  81. daemon.EventsService.Log("prune", events.ContainerEventType, events.Actor{
  82. Attributes: map[string]string{"reclaimed": strconv.FormatUint(rep.SpaceReclaimed, 10)},
  83. })
  84. return rep, nil
  85. }
  86. // localNetworksPrune removes unused local networks
  87. func (daemon *Daemon) localNetworksPrune(ctx context.Context, pruneFilters filters.Args) *types.NetworksPruneReport {
  88. rep := &types.NetworksPruneReport{}
  89. until, _ := getUntilFromPruneFilters(pruneFilters)
  90. // When the function returns true, the walk will stop.
  91. daemon.netController.WalkNetworks(func(nw *libnetwork.Network) bool {
  92. select {
  93. case <-ctx.Done():
  94. // context cancelled
  95. return true
  96. default:
  97. }
  98. if nw.Info().ConfigOnly() {
  99. return false
  100. }
  101. if !until.IsZero() && nw.Info().Created().After(until) {
  102. return false
  103. }
  104. if !matchLabels(pruneFilters, nw.Info().Labels()) {
  105. return false
  106. }
  107. nwName := nw.Name()
  108. if runconfig.IsPreDefinedNetwork(nwName) {
  109. return false
  110. }
  111. if len(nw.Endpoints()) > 0 {
  112. return false
  113. }
  114. if err := daemon.DeleteNetwork(nw.ID()); err != nil {
  115. log.G(ctx).Warnf("could not remove local network %s: %v", nwName, err)
  116. return false
  117. }
  118. rep.NetworksDeleted = append(rep.NetworksDeleted, nwName)
  119. return false
  120. })
  121. return rep
  122. }
  123. // clusterNetworksPrune removes unused cluster networks
  124. func (daemon *Daemon) clusterNetworksPrune(ctx context.Context, pruneFilters filters.Args) (*types.NetworksPruneReport, error) {
  125. rep := &types.NetworksPruneReport{}
  126. until, _ := getUntilFromPruneFilters(pruneFilters)
  127. cluster := daemon.GetCluster()
  128. if !cluster.IsManager() {
  129. return rep, nil
  130. }
  131. networks, err := cluster.GetNetworks(pruneFilters)
  132. if err != nil {
  133. return rep, err
  134. }
  135. networkIsInUse := regexp.MustCompile(`network ([[:alnum:]]+) is in use`)
  136. for _, nw := range networks {
  137. select {
  138. case <-ctx.Done():
  139. return rep, nil
  140. default:
  141. if nw.Ingress {
  142. // Routing-mesh network removal has to be explicitly invoked by user
  143. continue
  144. }
  145. if !until.IsZero() && nw.Created.After(until) {
  146. continue
  147. }
  148. if !matchLabels(pruneFilters, nw.Labels) {
  149. continue
  150. }
  151. // https://github.com/docker/docker/issues/24186
  152. // `docker network inspect` unfortunately displays ONLY those containers that are local to that node.
  153. // So we try to remove it anyway and check the error
  154. err = cluster.RemoveNetwork(nw.ID)
  155. if err != nil {
  156. // we can safely ignore the "network .. is in use" error
  157. match := networkIsInUse.FindStringSubmatch(err.Error())
  158. if len(match) != 2 || match[1] != nw.ID {
  159. log.G(ctx).Warnf("could not remove cluster network %s: %v", nw.Name, err)
  160. }
  161. continue
  162. }
  163. rep.NetworksDeleted = append(rep.NetworksDeleted, nw.Name)
  164. }
  165. }
  166. return rep, nil
  167. }
  168. // NetworksPrune removes unused networks
  169. func (daemon *Daemon) NetworksPrune(ctx context.Context, pruneFilters filters.Args) (*types.NetworksPruneReport, error) {
  170. if !atomic.CompareAndSwapInt32(&daemon.pruneRunning, 0, 1) {
  171. return nil, errPruneRunning
  172. }
  173. defer atomic.StoreInt32(&daemon.pruneRunning, 0)
  174. // make sure that only accepted filters have been received
  175. err := pruneFilters.Validate(networksAcceptedFilters)
  176. if err != nil {
  177. return nil, err
  178. }
  179. if _, err := getUntilFromPruneFilters(pruneFilters); err != nil {
  180. return nil, err
  181. }
  182. rep := &types.NetworksPruneReport{}
  183. if clusterRep, err := daemon.clusterNetworksPrune(ctx, pruneFilters); err == nil {
  184. rep.NetworksDeleted = append(rep.NetworksDeleted, clusterRep.NetworksDeleted...)
  185. }
  186. localRep := daemon.localNetworksPrune(ctx, pruneFilters)
  187. rep.NetworksDeleted = append(rep.NetworksDeleted, localRep.NetworksDeleted...)
  188. select {
  189. case <-ctx.Done():
  190. log.G(ctx).Debugf("NetworksPrune operation cancelled: %#v", *rep)
  191. return rep, nil
  192. default:
  193. }
  194. daemon.EventsService.Log("prune", events.NetworkEventType, events.Actor{
  195. Attributes: map[string]string{"reclaimed": "0"},
  196. })
  197. return rep, nil
  198. }
  199. func getUntilFromPruneFilters(pruneFilters filters.Args) (time.Time, error) {
  200. until := time.Time{}
  201. if !pruneFilters.Contains("until") {
  202. return until, nil
  203. }
  204. untilFilters := pruneFilters.Get("until")
  205. if len(untilFilters) > 1 {
  206. return until, errdefs.InvalidParameter(errors.New("more than one until filter specified"))
  207. }
  208. ts, err := timetypes.GetTimestamp(untilFilters[0], time.Now())
  209. if err != nil {
  210. return until, errdefs.InvalidParameter(err)
  211. }
  212. seconds, nanoseconds, err := timetypes.ParseTimestamps(ts, 0)
  213. if err != nil {
  214. return until, errdefs.InvalidParameter(err)
  215. }
  216. until = time.Unix(seconds, nanoseconds)
  217. return until, nil
  218. }
  219. func matchLabels(pruneFilters filters.Args, labels map[string]string) bool {
  220. if !pruneFilters.MatchKVList("label", labels) {
  221. return false
  222. }
  223. // By default MatchKVList will return true if field (like 'label!') does not exist
  224. // So we have to add additional Contains("label!") check
  225. if pruneFilters.Contains("label!") {
  226. if pruneFilters.MatchKVList("label!", labels) {
  227. return false
  228. }
  229. }
  230. return true
  231. }