server.go 43 KB

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758596061626364656667686970717273747576777879808182838485868788899091929394959697989910010110210310410510610710810911011111211311411511611711811912012112212312412512612712812913013113213313413513613713813914014114214314414514614714814915015115215315415515615715815916016116216316416516616716816917017117217317417517617717817918018118218318418518618718818919019119219319419519619719819920020120220320420520620720820921021121221321421521621721821922022122222322422522622722822923023123223323423523623723823924024124224324424524624724824925025125225325425525625725825926026126226326426526626726826927027127227327427527627727827928028128228328428528628728828929029129229329429529629729829930030130230330430530630730830931031131231331431531631731831932032132232332432532632732832933033133233333433533633733833934034134234334434534634734834935035135235335435535635735835936036136236336436536636736836937037137237337437537637737837938038138238338438538638738838939039139239339439539639739839940040140240340440540640740840941041141241341441541641741841942042142242342442542642742842943043143243343443543643743843944044144244344444544644744844945045145245345445545645745845946046146246346446546646746846947047147247347447547647747847948048148248348448548648748848949049149249349449549649749849950050150250350450550650750850951051151251351451551651751851952052152252352452552652752852953053153253353453553653753853954054154254354454554654754854955055155255355455555655755855956056156256356456556656756856957057157257357457557657757857958058158258358458558658758858959059159259359459559659759859960060160260360460560660760860961061161261361461561661761861962062162262362462562662762862963063163263363463563663763863964064164264364464564664764864965065165265365465565665765865966066166266366466566666766866967067167267367467567667767867968068168268368468568668768868969069169269369469569669769869970070170270370470570670770870971071171271371471571671771871972072172272372472572672772872973073173273373473573673773873974074174274374474574674774874975075175275375475575675775875976076176276376476576676776876977077177277377477577677777877978078178278378478578678778878979079179279379479579679779879980080180280380480580680780880981081181281381481581681781881982082182282382482582682782882983083183283383483583683783883984084184284384484584684784884985085185285385485585685785885986086186286386486586686786886987087187287387487587687787887988088188288388488588688788888989089189289389489589689789889990090190290390490590690790890991091191291391491591691791891992092192292392492592692792892993093193293393493593693793893994094194294394494594694794894995095195295395495595695795895996096196296396496596696796896997097197297397497597697797897998098198298398498598698798898999099199299399499599699799899910001001100210031004100510061007100810091010101110121013101410151016101710181019102010211022102310241025102610271028102910301031103210331034103510361037103810391040104110421043104410451046104710481049105010511052105310541055105610571058105910601061106210631064106510661067106810691070107110721073107410751076107710781079108010811082108310841085108610871088108910901091109210931094109510961097109810991100110111021103110411051106110711081109111011111112111311141115111611171118111911201121112211231124112511261127112811291130113111321133113411351136113711381139114011411142114311441145114611471148114911501151115211531154115511561157115811591160116111621163116411651166116711681169117011711172117311741175117611771178117911801181118211831184118511861187118811891190119111921193119411951196119711981199120012011202120312041205120612071208120912101211121212131214121512161217121812191220122112221223122412251226122712281229123012311232123312341235123612371238123912401241124212431244124512461247124812491250125112521253125412551256125712581259126012611262126312641265126612671268126912701271127212731274127512761277127812791280128112821283128412851286128712881289129012911292129312941295129612971298129913001301130213031304130513061307130813091310131113121313131413151316131713181319132013211322132313241325132613271328132913301331133213331334133513361337133813391340134113421343134413451346134713481349135013511352135313541355135613571358135913601361136213631364136513661367136813691370137113721373137413751376137713781379138013811382138313841385138613871388138913901391139213931394139513961397139813991400140114021403140414051406140714081409141014111412141314141415141614171418141914201421142214231424142514261427142814291430143114321433143414351436143714381439144014411442144314441445144614471448144914501451145214531454145514561457145814591460146114621463146414651466146714681469147014711472147314741475147614771478147914801481148214831484148514861487148814891490149114921493149414951496149714981499150015011502150315041505150615071508150915101511151215131514151515161517151815191520152115221523152415251526152715281529153015311532153315341535153615371538153915401541154215431544154515461547154815491550155115521553155415551556155715581559156015611562156315641565156615671568156915701571157215731574157515761577157815791580158115821583
  1. package server
  2. import (
  3. "crypto/tls"
  4. "encoding/base64"
  5. "encoding/json"
  6. "fmt"
  7. "io"
  8. "net"
  9. "net/http"
  10. "os"
  11. "runtime"
  12. "strconv"
  13. "strings"
  14. "time"
  15. "code.google.com/p/go.net/websocket"
  16. "github.com/gorilla/mux"
  17. "github.com/Sirupsen/logrus"
  18. "github.com/docker/docker/api"
  19. "github.com/docker/docker/api/types"
  20. "github.com/docker/docker/autogen/dockerversion"
  21. "github.com/docker/docker/builder"
  22. "github.com/docker/docker/cliconfig"
  23. "github.com/docker/docker/daemon"
  24. "github.com/docker/docker/graph"
  25. "github.com/docker/docker/pkg/ioutils"
  26. "github.com/docker/docker/pkg/jsonmessage"
  27. "github.com/docker/docker/pkg/parsers"
  28. "github.com/docker/docker/pkg/parsers/filters"
  29. "github.com/docker/docker/pkg/parsers/kernel"
  30. "github.com/docker/docker/pkg/signal"
  31. "github.com/docker/docker/pkg/sockets"
  32. "github.com/docker/docker/pkg/stdcopy"
  33. "github.com/docker/docker/pkg/streamformatter"
  34. "github.com/docker/docker/pkg/version"
  35. "github.com/docker/docker/runconfig"
  36. "github.com/docker/docker/utils"
  37. )
  38. type ServerConfig struct {
  39. Logging bool
  40. EnableCors bool
  41. CorsHeaders string
  42. Version string
  43. SocketGroup string
  44. TLSConfig *tls.Config
  45. }
  46. type Server struct {
  47. daemon *daemon.Daemon
  48. cfg *ServerConfig
  49. router *mux.Router
  50. start chan struct{}
  51. servers []serverCloser
  52. }
  53. func New(cfg *ServerConfig) *Server {
  54. srv := &Server{
  55. cfg: cfg,
  56. start: make(chan struct{}),
  57. }
  58. r := createRouter(srv)
  59. srv.router = r
  60. return srv
  61. }
  62. func (s *Server) Close() {
  63. for _, srv := range s.servers {
  64. if err := srv.Close(); err != nil {
  65. logrus.Error(err)
  66. }
  67. }
  68. }
  69. type serverCloser interface {
  70. Serve() error
  71. Close() error
  72. }
  73. // ServeApi loops through all of the protocols sent in to docker and spawns
  74. // off a go routine to setup a serving http.Server for each.
  75. func (s *Server) ServeApi(protoAddrs []string) error {
  76. var chErrors = make(chan error, len(protoAddrs))
  77. for _, protoAddr := range protoAddrs {
  78. protoAddrParts := strings.SplitN(protoAddr, "://", 2)
  79. if len(protoAddrParts) != 2 {
  80. return fmt.Errorf("bad format, expected PROTO://ADDR")
  81. }
  82. srv, err := s.newServer(protoAddrParts[0], protoAddrParts[1])
  83. if err != nil {
  84. return err
  85. }
  86. s.servers = append(s.servers, srv...)
  87. for _, s := range srv {
  88. logrus.Infof("Listening for HTTP on %s (%s)", protoAddrParts[0], protoAddrParts[1])
  89. go func(s serverCloser) {
  90. if err := s.Serve(); err != nil && strings.Contains(err.Error(), "use of closed network connection") {
  91. err = nil
  92. }
  93. chErrors <- err
  94. }(s)
  95. }
  96. }
  97. for i := 0; i < len(protoAddrs); i++ {
  98. err := <-chErrors
  99. if err != nil {
  100. return err
  101. }
  102. }
  103. return nil
  104. }
  105. type HttpServer struct {
  106. srv *http.Server
  107. l net.Listener
  108. }
  109. func (s *HttpServer) Serve() error {
  110. return s.srv.Serve(s.l)
  111. }
  112. func (s *HttpServer) Close() error {
  113. return s.l.Close()
  114. }
  115. type HttpApiFunc func(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error
  116. func hijackServer(w http.ResponseWriter) (io.ReadCloser, io.Writer, error) {
  117. conn, _, err := w.(http.Hijacker).Hijack()
  118. if err != nil {
  119. return nil, nil, err
  120. }
  121. // Flush the options to make sure the client sets the raw mode
  122. conn.Write([]byte{})
  123. return conn, conn, nil
  124. }
  125. func closeStreams(streams ...interface{}) {
  126. for _, stream := range streams {
  127. if tcpc, ok := stream.(interface {
  128. CloseWrite() error
  129. }); ok {
  130. tcpc.CloseWrite()
  131. } else if closer, ok := stream.(io.Closer); ok {
  132. closer.Close()
  133. }
  134. }
  135. }
  136. // Check to make sure request's Content-Type is application/json
  137. func checkForJson(r *http.Request) error {
  138. ct := r.Header.Get("Content-Type")
  139. // No Content-Type header is ok as long as there's no Body
  140. if ct == "" {
  141. if r.Body == nil || r.ContentLength == 0 {
  142. return nil
  143. }
  144. }
  145. // Otherwise it better be json
  146. if api.MatchesContentType(ct, "application/json") {
  147. return nil
  148. }
  149. return fmt.Errorf("Content-Type specified (%s) must be 'application/json'", ct)
  150. }
  151. //If we don't do this, POST method without Content-type (even with empty body) will fail
  152. func parseForm(r *http.Request) error {
  153. if r == nil {
  154. return nil
  155. }
  156. if err := r.ParseForm(); err != nil && !strings.HasPrefix(err.Error(), "mime:") {
  157. return err
  158. }
  159. return nil
  160. }
  161. func parseMultipartForm(r *http.Request) error {
  162. if err := r.ParseMultipartForm(4096); err != nil && !strings.HasPrefix(err.Error(), "mime:") {
  163. return err
  164. }
  165. return nil
  166. }
  167. func httpError(w http.ResponseWriter, err error) {
  168. if err == nil || w == nil {
  169. logrus.WithFields(logrus.Fields{"error": err, "writer": w}).Error("unexpected HTTP error handling")
  170. return
  171. }
  172. statusCode := http.StatusInternalServerError
  173. // FIXME: this is brittle and should not be necessary.
  174. // If we need to differentiate between different possible error types, we should
  175. // create appropriate error types with clearly defined meaning.
  176. errStr := strings.ToLower(err.Error())
  177. for keyword, status := range map[string]int{
  178. "not found": http.StatusNotFound,
  179. "no such": http.StatusNotFound,
  180. "bad parameter": http.StatusBadRequest,
  181. "conflict": http.StatusConflict,
  182. "impossible": http.StatusNotAcceptable,
  183. "wrong login/password": http.StatusUnauthorized,
  184. "hasn't been activated": http.StatusForbidden,
  185. } {
  186. if strings.Contains(errStr, keyword) {
  187. statusCode = status
  188. break
  189. }
  190. }
  191. logrus.WithFields(logrus.Fields{"statusCode": statusCode, "err": err}).Error("HTTP Error")
  192. http.Error(w, err.Error(), statusCode)
  193. }
  194. // writeJSON writes the value v to the http response stream as json with standard
  195. // json encoding.
  196. func writeJSON(w http.ResponseWriter, code int, v interface{}) error {
  197. w.Header().Set("Content-Type", "application/json")
  198. w.WriteHeader(code)
  199. return json.NewEncoder(w).Encode(v)
  200. }
  201. func (s *Server) postAuth(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  202. var config *cliconfig.AuthConfig
  203. err := json.NewDecoder(r.Body).Decode(&config)
  204. r.Body.Close()
  205. if err != nil {
  206. return err
  207. }
  208. status, err := s.daemon.RegistryService.Auth(config)
  209. if err != nil {
  210. return err
  211. }
  212. return writeJSON(w, http.StatusOK, &types.AuthResponse{
  213. Status: status,
  214. })
  215. }
  216. func (s *Server) getVersion(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  217. v := &types.Version{
  218. Version: dockerversion.VERSION,
  219. ApiVersion: api.APIVERSION,
  220. GitCommit: dockerversion.GITCOMMIT,
  221. GoVersion: runtime.Version(),
  222. Os: runtime.GOOS,
  223. Arch: runtime.GOARCH,
  224. }
  225. if version.GreaterThanOrEqualTo("1.19") {
  226. v.Experimental = utils.ExperimentalBuild()
  227. }
  228. if kernelVersion, err := kernel.GetKernelVersion(); err == nil {
  229. v.KernelVersion = kernelVersion.String()
  230. }
  231. return writeJSON(w, http.StatusOK, v)
  232. }
  233. func (s *Server) postContainersKill(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  234. if vars == nil {
  235. return fmt.Errorf("Missing parameter")
  236. }
  237. if err := parseForm(r); err != nil {
  238. return err
  239. }
  240. var sig uint64
  241. name := vars["name"]
  242. // If we have a signal, look at it. Otherwise, do nothing
  243. if sigStr := r.Form.Get("signal"); sigStr != "" {
  244. // Check if we passed the signal as a number:
  245. // The largest legal signal is 31, so let's parse on 5 bits
  246. sigN, err := strconv.ParseUint(sigStr, 10, 5)
  247. if err != nil {
  248. // The signal is not a number, treat it as a string (either like
  249. // "KILL" or like "SIGKILL")
  250. syscallSig, ok := signal.SignalMap[strings.TrimPrefix(sigStr, "SIG")]
  251. if !ok {
  252. return fmt.Errorf("Invalid signal: %s", sigStr)
  253. }
  254. sig = uint64(syscallSig)
  255. } else {
  256. sig = sigN
  257. }
  258. if sig == 0 {
  259. return fmt.Errorf("Invalid signal: %s", sigStr)
  260. }
  261. }
  262. if err := s.daemon.ContainerKill(name, sig); err != nil {
  263. return err
  264. }
  265. w.WriteHeader(http.StatusNoContent)
  266. return nil
  267. }
  268. func (s *Server) postContainersPause(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  269. if vars == nil {
  270. return fmt.Errorf("Missing parameter")
  271. }
  272. if err := parseForm(r); err != nil {
  273. return err
  274. }
  275. if err := s.daemon.ContainerPause(vars["name"]); err != nil {
  276. return err
  277. }
  278. w.WriteHeader(http.StatusNoContent)
  279. return nil
  280. }
  281. func (s *Server) postContainersUnpause(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  282. if vars == nil {
  283. return fmt.Errorf("Missing parameter")
  284. }
  285. if err := parseForm(r); err != nil {
  286. return err
  287. }
  288. if err := s.daemon.ContainerUnpause(vars["name"]); err != nil {
  289. return err
  290. }
  291. w.WriteHeader(http.StatusNoContent)
  292. return nil
  293. }
  294. func (s *Server) getContainersExport(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  295. if vars == nil {
  296. return fmt.Errorf("Missing parameter")
  297. }
  298. return s.daemon.ContainerExport(vars["name"], w)
  299. }
  300. func (s *Server) getImagesJSON(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  301. if err := parseForm(r); err != nil {
  302. return err
  303. }
  304. imagesConfig := graph.ImagesConfig{
  305. Filters: r.Form.Get("filters"),
  306. // FIXME this parameter could just be a match filter
  307. Filter: r.Form.Get("filter"),
  308. All: boolValue(r, "all"),
  309. }
  310. images, err := s.daemon.Repositories().Images(&imagesConfig)
  311. if err != nil {
  312. return err
  313. }
  314. return writeJSON(w, http.StatusOK, images)
  315. }
  316. func (s *Server) getInfo(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  317. info, err := s.daemon.SystemInfo()
  318. if err != nil {
  319. return err
  320. }
  321. return writeJSON(w, http.StatusOK, info)
  322. }
  323. func (s *Server) getEvents(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  324. if err := parseForm(r); err != nil {
  325. return err
  326. }
  327. var since int64 = -1
  328. if r.Form.Get("since") != "" {
  329. s, err := strconv.ParseInt(r.Form.Get("since"), 10, 64)
  330. if err != nil {
  331. return err
  332. }
  333. since = s
  334. }
  335. var until int64 = -1
  336. if r.Form.Get("until") != "" {
  337. u, err := strconv.ParseInt(r.Form.Get("until"), 10, 64)
  338. if err != nil {
  339. return err
  340. }
  341. until = u
  342. }
  343. timer := time.NewTimer(0)
  344. timer.Stop()
  345. if until > 0 {
  346. dur := time.Unix(until, 0).Sub(time.Now())
  347. timer = time.NewTimer(dur)
  348. }
  349. ef, err := filters.FromParam(r.Form.Get("filters"))
  350. if err != nil {
  351. return err
  352. }
  353. isFiltered := func(field string, filter []string) bool {
  354. if len(filter) == 0 {
  355. return false
  356. }
  357. for _, v := range filter {
  358. if v == field {
  359. return false
  360. }
  361. if strings.Contains(field, ":") {
  362. image := strings.Split(field, ":")
  363. if image[0] == v {
  364. return false
  365. }
  366. }
  367. }
  368. return true
  369. }
  370. d := s.daemon
  371. es := d.EventsService
  372. w.Header().Set("Content-Type", "application/json")
  373. enc := json.NewEncoder(ioutils.NewWriteFlusher(w))
  374. getContainerId := func(cn string) string {
  375. c, err := d.Get(cn)
  376. if err != nil {
  377. return ""
  378. }
  379. return c.ID
  380. }
  381. sendEvent := func(ev *jsonmessage.JSONMessage) error {
  382. //incoming container filter can be name,id or partial id, convert and replace as a full container id
  383. for i, cn := range ef["container"] {
  384. ef["container"][i] = getContainerId(cn)
  385. }
  386. if isFiltered(ev.Status, ef["event"]) || isFiltered(ev.From, ef["image"]) ||
  387. isFiltered(ev.ID, ef["container"]) {
  388. return nil
  389. }
  390. return enc.Encode(ev)
  391. }
  392. current, l := es.Subscribe()
  393. if since == -1 {
  394. current = nil
  395. }
  396. defer es.Evict(l)
  397. for _, ev := range current {
  398. if ev.Time < since {
  399. continue
  400. }
  401. if err := sendEvent(ev); err != nil {
  402. return err
  403. }
  404. }
  405. var closeNotify <-chan bool
  406. if closeNotifier, ok := w.(http.CloseNotifier); ok {
  407. closeNotify = closeNotifier.CloseNotify()
  408. }
  409. for {
  410. select {
  411. case ev := <-l:
  412. jev, ok := ev.(*jsonmessage.JSONMessage)
  413. if !ok {
  414. continue
  415. }
  416. if err := sendEvent(jev); err != nil {
  417. return err
  418. }
  419. case <-timer.C:
  420. return nil
  421. case <-closeNotify:
  422. logrus.Debug("Client disconnected, stop sending events")
  423. return nil
  424. }
  425. }
  426. }
  427. func (s *Server) getImagesHistory(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  428. if vars == nil {
  429. return fmt.Errorf("Missing parameter")
  430. }
  431. name := vars["name"]
  432. history, err := s.daemon.Repositories().History(name)
  433. if err != nil {
  434. return err
  435. }
  436. return writeJSON(w, http.StatusOK, history)
  437. }
  438. func (s *Server) getContainersChanges(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  439. if vars == nil {
  440. return fmt.Errorf("Missing parameter")
  441. }
  442. changes, err := s.daemon.ContainerChanges(vars["name"])
  443. if err != nil {
  444. return err
  445. }
  446. return writeJSON(w, http.StatusOK, changes)
  447. }
  448. func (s *Server) getContainersTop(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  449. if vars == nil {
  450. return fmt.Errorf("Missing parameter")
  451. }
  452. if err := parseForm(r); err != nil {
  453. return err
  454. }
  455. procList, err := s.daemon.ContainerTop(vars["name"], r.Form.Get("ps_args"))
  456. if err != nil {
  457. return err
  458. }
  459. return writeJSON(w, http.StatusOK, procList)
  460. }
  461. func (s *Server) getContainersJSON(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  462. if err := parseForm(r); err != nil {
  463. return err
  464. }
  465. config := &daemon.ContainersConfig{
  466. All: boolValue(r, "all"),
  467. Size: boolValue(r, "size"),
  468. Since: r.Form.Get("since"),
  469. Before: r.Form.Get("before"),
  470. Filters: r.Form.Get("filters"),
  471. }
  472. if tmpLimit := r.Form.Get("limit"); tmpLimit != "" {
  473. limit, err := strconv.Atoi(tmpLimit)
  474. if err != nil {
  475. return err
  476. }
  477. config.Limit = limit
  478. }
  479. containers, err := s.daemon.Containers(config)
  480. if err != nil {
  481. return err
  482. }
  483. return writeJSON(w, http.StatusOK, containers)
  484. }
  485. func (s *Server) getContainersStats(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  486. if err := parseForm(r); err != nil {
  487. return err
  488. }
  489. if vars == nil {
  490. return fmt.Errorf("Missing parameter")
  491. }
  492. stream := boolValueOrDefault(r, "stream", true)
  493. var out io.Writer
  494. if !stream {
  495. w.Header().Set("Content-Type", "application/json")
  496. out = w
  497. } else {
  498. out = ioutils.NewWriteFlusher(w)
  499. }
  500. return s.daemon.ContainerStats(vars["name"], stream, out)
  501. }
  502. func (s *Server) getContainersLogs(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  503. if err := parseForm(r); err != nil {
  504. return err
  505. }
  506. if vars == nil {
  507. return fmt.Errorf("Missing parameter")
  508. }
  509. // Validate args here, because we can't return not StatusOK after job.Run() call
  510. stdout, stderr := boolValue(r, "stdout"), boolValue(r, "stderr")
  511. if !(stdout || stderr) {
  512. return fmt.Errorf("Bad parameters: you must choose at least one stream")
  513. }
  514. var since time.Time
  515. if r.Form.Get("since") != "" {
  516. s, err := strconv.ParseInt(r.Form.Get("since"), 10, 64)
  517. if err != nil {
  518. return err
  519. }
  520. since = time.Unix(s, 0)
  521. }
  522. var closeNotifier <-chan bool
  523. if notifier, ok := w.(http.CloseNotifier); ok {
  524. closeNotifier = notifier.CloseNotify()
  525. }
  526. logsConfig := &daemon.ContainerLogsConfig{
  527. Follow: boolValue(r, "follow"),
  528. Timestamps: boolValue(r, "timestamps"),
  529. Since: since,
  530. Tail: r.Form.Get("tail"),
  531. UseStdout: stdout,
  532. UseStderr: stderr,
  533. OutStream: ioutils.NewWriteFlusher(w),
  534. Stop: closeNotifier,
  535. }
  536. if err := s.daemon.ContainerLogs(vars["name"], logsConfig); err != nil {
  537. fmt.Fprintf(w, "Error running logs job: %s\n", err)
  538. }
  539. return nil
  540. }
  541. func (s *Server) postImagesTag(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  542. if err := parseForm(r); err != nil {
  543. return err
  544. }
  545. if vars == nil {
  546. return fmt.Errorf("Missing parameter")
  547. }
  548. repo := r.Form.Get("repo")
  549. tag := r.Form.Get("tag")
  550. force := boolValue(r, "force")
  551. name := vars["name"]
  552. if err := s.daemon.Repositories().Tag(repo, tag, name, force); err != nil {
  553. return err
  554. }
  555. s.daemon.EventsService.Log("tag", utils.ImageReference(repo, tag), "")
  556. w.WriteHeader(http.StatusCreated)
  557. return nil
  558. }
  559. func (s *Server) postCommit(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  560. if err := parseForm(r); err != nil {
  561. return err
  562. }
  563. if err := checkForJson(r); err != nil {
  564. return err
  565. }
  566. cont := r.Form.Get("container")
  567. pause := boolValue(r, "pause")
  568. if r.FormValue("pause") == "" && version.GreaterThanOrEqualTo("1.13") {
  569. pause = true
  570. }
  571. c, _, err := runconfig.DecodeContainerConfig(r.Body)
  572. if err != nil && err != io.EOF { //Do not fail if body is empty.
  573. return err
  574. }
  575. containerCommitConfig := &daemon.ContainerCommitConfig{
  576. Pause: pause,
  577. Repo: r.Form.Get("repo"),
  578. Tag: r.Form.Get("tag"),
  579. Author: r.Form.Get("author"),
  580. Comment: r.Form.Get("comment"),
  581. Changes: r.Form["changes"],
  582. Config: c,
  583. }
  584. imgID, err := builder.Commit(s.daemon, cont, containerCommitConfig)
  585. if err != nil {
  586. return err
  587. }
  588. return writeJSON(w, http.StatusCreated, &types.ContainerCommitResponse{
  589. ID: imgID,
  590. })
  591. }
  592. // Creates an image from Pull or from Import
  593. func (s *Server) postImagesCreate(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  594. if err := parseForm(r); err != nil {
  595. return err
  596. }
  597. var (
  598. image = r.Form.Get("fromImage")
  599. repo = r.Form.Get("repo")
  600. tag = r.Form.Get("tag")
  601. )
  602. authEncoded := r.Header.Get("X-Registry-Auth")
  603. authConfig := &cliconfig.AuthConfig{}
  604. if authEncoded != "" {
  605. authJson := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded))
  606. if err := json.NewDecoder(authJson).Decode(authConfig); err != nil {
  607. // for a pull it is not an error if no auth was given
  608. // to increase compatibility with the existing api it is defaulting to be empty
  609. authConfig = &cliconfig.AuthConfig{}
  610. }
  611. }
  612. var (
  613. err error
  614. output = ioutils.NewWriteFlusher(w)
  615. )
  616. w.Header().Set("Content-Type", "application/json")
  617. if image != "" { //pull
  618. if tag == "" {
  619. image, tag = parsers.ParseRepositoryTag(image)
  620. }
  621. metaHeaders := map[string][]string{}
  622. for k, v := range r.Header {
  623. if strings.HasPrefix(k, "X-Meta-") {
  624. metaHeaders[k] = v
  625. }
  626. }
  627. imagePullConfig := &graph.ImagePullConfig{
  628. MetaHeaders: metaHeaders,
  629. AuthConfig: authConfig,
  630. OutStream: output,
  631. }
  632. err = s.daemon.Repositories().Pull(image, tag, imagePullConfig)
  633. } else { //import
  634. if tag == "" {
  635. repo, tag = parsers.ParseRepositoryTag(repo)
  636. }
  637. src := r.Form.Get("fromSrc")
  638. imageImportConfig := &graph.ImageImportConfig{
  639. Changes: r.Form["changes"],
  640. InConfig: r.Body,
  641. OutStream: output,
  642. }
  643. // 'err' MUST NOT be defined within this block, we need any error
  644. // generated from the download to be available to the output
  645. // stream processing below
  646. var newConfig *runconfig.Config
  647. newConfig, err = builder.BuildFromConfig(s.daemon, &runconfig.Config{}, imageImportConfig.Changes)
  648. if err != nil {
  649. return err
  650. }
  651. imageImportConfig.ContainerConfig = newConfig
  652. err = s.daemon.Repositories().Import(src, repo, tag, imageImportConfig)
  653. }
  654. if err != nil {
  655. if !output.Flushed() {
  656. return err
  657. }
  658. sf := streamformatter.NewJSONStreamFormatter()
  659. output.Write(sf.FormatError(err))
  660. }
  661. return nil
  662. }
  663. func (s *Server) getImagesSearch(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  664. if err := parseForm(r); err != nil {
  665. return err
  666. }
  667. var (
  668. config *cliconfig.AuthConfig
  669. authEncoded = r.Header.Get("X-Registry-Auth")
  670. headers = map[string][]string{}
  671. )
  672. if authEncoded != "" {
  673. authJson := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded))
  674. if err := json.NewDecoder(authJson).Decode(&config); err != nil {
  675. // for a search it is not an error if no auth was given
  676. // to increase compatibility with the existing api it is defaulting to be empty
  677. config = &cliconfig.AuthConfig{}
  678. }
  679. }
  680. for k, v := range r.Header {
  681. if strings.HasPrefix(k, "X-Meta-") {
  682. headers[k] = v
  683. }
  684. }
  685. query, err := s.daemon.RegistryService.Search(r.Form.Get("term"), config, headers)
  686. if err != nil {
  687. return err
  688. }
  689. return json.NewEncoder(w).Encode(query.Results)
  690. }
  691. func (s *Server) postImagesPush(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  692. if vars == nil {
  693. return fmt.Errorf("Missing parameter")
  694. }
  695. metaHeaders := map[string][]string{}
  696. for k, v := range r.Header {
  697. if strings.HasPrefix(k, "X-Meta-") {
  698. metaHeaders[k] = v
  699. }
  700. }
  701. if err := parseForm(r); err != nil {
  702. return err
  703. }
  704. authConfig := &cliconfig.AuthConfig{}
  705. authEncoded := r.Header.Get("X-Registry-Auth")
  706. if authEncoded != "" {
  707. // the new format is to handle the authConfig as a header
  708. authJson := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded))
  709. if err := json.NewDecoder(authJson).Decode(authConfig); err != nil {
  710. // to increase compatibility to existing api it is defaulting to be empty
  711. authConfig = &cliconfig.AuthConfig{}
  712. }
  713. } else {
  714. // the old format is supported for compatibility if there was no authConfig header
  715. if err := json.NewDecoder(r.Body).Decode(authConfig); err != nil {
  716. return fmt.Errorf("Bad parameters and missing X-Registry-Auth: %v", err)
  717. }
  718. }
  719. name := vars["name"]
  720. output := ioutils.NewWriteFlusher(w)
  721. imagePushConfig := &graph.ImagePushConfig{
  722. MetaHeaders: metaHeaders,
  723. AuthConfig: authConfig,
  724. Tag: r.Form.Get("tag"),
  725. OutStream: output,
  726. }
  727. w.Header().Set("Content-Type", "application/json")
  728. if err := s.daemon.Repositories().Push(name, imagePushConfig); err != nil {
  729. if !output.Flushed() {
  730. return err
  731. }
  732. sf := streamformatter.NewJSONStreamFormatter()
  733. output.Write(sf.FormatError(err))
  734. }
  735. return nil
  736. }
  737. func (s *Server) getImagesGet(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  738. if vars == nil {
  739. return fmt.Errorf("Missing parameter")
  740. }
  741. if err := parseForm(r); err != nil {
  742. return err
  743. }
  744. w.Header().Set("Content-Type", "application/x-tar")
  745. output := ioutils.NewWriteFlusher(w)
  746. imageExportConfig := &graph.ImageExportConfig{Outstream: output}
  747. if name, ok := vars["name"]; ok {
  748. imageExportConfig.Names = []string{name}
  749. } else {
  750. imageExportConfig.Names = r.Form["names"]
  751. }
  752. if err := s.daemon.Repositories().ImageExport(imageExportConfig); err != nil {
  753. if !output.Flushed() {
  754. return err
  755. }
  756. sf := streamformatter.NewJSONStreamFormatter()
  757. output.Write(sf.FormatError(err))
  758. }
  759. return nil
  760. }
  761. func (s *Server) postImagesLoad(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  762. return s.daemon.Repositories().Load(r.Body, w)
  763. }
  764. func (s *Server) postContainersCreate(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  765. if err := parseForm(r); err != nil {
  766. return err
  767. }
  768. if err := checkForJson(r); err != nil {
  769. return err
  770. }
  771. var (
  772. warnings []string
  773. name = r.Form.Get("name")
  774. )
  775. config, hostConfig, err := runconfig.DecodeContainerConfig(r.Body)
  776. if err != nil {
  777. return err
  778. }
  779. adjustCpuShares(version, hostConfig)
  780. containerId, warnings, err := s.daemon.ContainerCreate(name, config, hostConfig)
  781. if err != nil {
  782. return err
  783. }
  784. return writeJSON(w, http.StatusCreated, &types.ContainerCreateResponse{
  785. ID: containerId,
  786. Warnings: warnings,
  787. })
  788. }
  789. func (s *Server) postContainersRestart(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  790. if err := parseForm(r); err != nil {
  791. return err
  792. }
  793. if vars == nil {
  794. return fmt.Errorf("Missing parameter")
  795. }
  796. timeout, _ := strconv.Atoi(r.Form.Get("t"))
  797. if err := s.daemon.ContainerRestart(vars["name"], timeout); err != nil {
  798. return err
  799. }
  800. w.WriteHeader(http.StatusNoContent)
  801. return nil
  802. }
  803. func (s *Server) postContainerRename(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  804. if err := parseForm(r); err != nil {
  805. return err
  806. }
  807. if vars == nil {
  808. return fmt.Errorf("Missing parameter")
  809. }
  810. name := vars["name"]
  811. newName := r.Form.Get("name")
  812. if err := s.daemon.ContainerRename(name, newName); err != nil {
  813. return err
  814. }
  815. w.WriteHeader(http.StatusNoContent)
  816. return nil
  817. }
  818. func (s *Server) deleteContainers(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  819. if err := parseForm(r); err != nil {
  820. return err
  821. }
  822. if vars == nil {
  823. return fmt.Errorf("Missing parameter")
  824. }
  825. name := vars["name"]
  826. config := &daemon.ContainerRmConfig{
  827. ForceRemove: boolValue(r, "force"),
  828. RemoveVolume: boolValue(r, "v"),
  829. RemoveLink: boolValue(r, "link"),
  830. }
  831. if err := s.daemon.ContainerRm(name, config); err != nil {
  832. // Force a 404 for the empty string
  833. if strings.Contains(strings.ToLower(err.Error()), "prefix can't be empty") {
  834. return fmt.Errorf("no such id: \"\"")
  835. }
  836. return err
  837. }
  838. w.WriteHeader(http.StatusNoContent)
  839. return nil
  840. }
  841. func (s *Server) deleteImages(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  842. if err := parseForm(r); err != nil {
  843. return err
  844. }
  845. if vars == nil {
  846. return fmt.Errorf("Missing parameter")
  847. }
  848. name := vars["name"]
  849. force := boolValue(r, "force")
  850. noprune := boolValue(r, "noprune")
  851. list, err := s.daemon.ImageDelete(name, force, noprune)
  852. if err != nil {
  853. return err
  854. }
  855. return writeJSON(w, http.StatusOK, list)
  856. }
  857. func (s *Server) postContainersStart(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  858. if vars == nil {
  859. return fmt.Errorf("Missing parameter")
  860. }
  861. // If contentLength is -1, we can assumed chunked encoding
  862. // or more technically that the length is unknown
  863. // https://golang.org/src/pkg/net/http/request.go#L139
  864. // net/http otherwise seems to swallow any headers related to chunked encoding
  865. // including r.TransferEncoding
  866. // allow a nil body for backwards compatibility
  867. var hostConfig *runconfig.HostConfig
  868. if r.Body != nil && (r.ContentLength > 0 || r.ContentLength == -1) {
  869. if err := checkForJson(r); err != nil {
  870. return err
  871. }
  872. c, err := runconfig.DecodeHostConfig(r.Body)
  873. if err != nil {
  874. return err
  875. }
  876. hostConfig = c
  877. }
  878. if err := s.daemon.ContainerStart(vars["name"], hostConfig); err != nil {
  879. if err.Error() == "Container already started" {
  880. w.WriteHeader(http.StatusNotModified)
  881. return nil
  882. }
  883. return err
  884. }
  885. w.WriteHeader(http.StatusNoContent)
  886. return nil
  887. }
  888. func (s *Server) postContainersStop(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  889. if err := parseForm(r); err != nil {
  890. return err
  891. }
  892. if vars == nil {
  893. return fmt.Errorf("Missing parameter")
  894. }
  895. seconds, _ := strconv.Atoi(r.Form.Get("t"))
  896. if err := s.daemon.ContainerStop(vars["name"], seconds); err != nil {
  897. if err.Error() == "Container already stopped" {
  898. w.WriteHeader(http.StatusNotModified)
  899. return nil
  900. }
  901. return err
  902. }
  903. w.WriteHeader(http.StatusNoContent)
  904. return nil
  905. }
  906. func (s *Server) postContainersWait(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  907. if vars == nil {
  908. return fmt.Errorf("Missing parameter")
  909. }
  910. status, err := s.daemon.ContainerWait(vars["name"], -1*time.Second)
  911. if err != nil {
  912. return err
  913. }
  914. return writeJSON(w, http.StatusOK, &types.ContainerWaitResponse{
  915. StatusCode: status,
  916. })
  917. }
  918. func (s *Server) postContainersResize(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  919. if err := parseForm(r); err != nil {
  920. return err
  921. }
  922. if vars == nil {
  923. return fmt.Errorf("Missing parameter")
  924. }
  925. height, err := strconv.Atoi(r.Form.Get("h"))
  926. if err != nil {
  927. return err
  928. }
  929. width, err := strconv.Atoi(r.Form.Get("w"))
  930. if err != nil {
  931. return err
  932. }
  933. return s.daemon.ContainerResize(vars["name"], height, width)
  934. }
  935. func (s *Server) postContainersAttach(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  936. if err := parseForm(r); err != nil {
  937. return err
  938. }
  939. if vars == nil {
  940. return fmt.Errorf("Missing parameter")
  941. }
  942. inStream, outStream, err := hijackServer(w)
  943. if err != nil {
  944. return err
  945. }
  946. defer closeStreams(inStream, outStream)
  947. if _, ok := r.Header["Upgrade"]; ok {
  948. fmt.Fprintf(outStream, "HTTP/1.1 101 UPGRADED\r\nContent-Type: application/vnd.docker.raw-stream\r\nConnection: Upgrade\r\nUpgrade: tcp\r\n\r\n")
  949. } else {
  950. fmt.Fprintf(outStream, "HTTP/1.1 200 OK\r\nContent-Type: application/vnd.docker.raw-stream\r\n\r\n")
  951. }
  952. attachWithLogsConfig := &daemon.ContainerAttachWithLogsConfig{
  953. InStream: inStream,
  954. OutStream: outStream,
  955. UseStdin: boolValue(r, "stdin"),
  956. UseStdout: boolValue(r, "stdout"),
  957. UseStderr: boolValue(r, "stderr"),
  958. Logs: boolValue(r, "logs"),
  959. Stream: boolValue(r, "stream"),
  960. Multiplex: version.GreaterThanOrEqualTo("1.6"),
  961. }
  962. if err := s.daemon.ContainerAttachWithLogs(vars["name"], attachWithLogsConfig); err != nil {
  963. fmt.Fprintf(outStream, "Error attaching: %s\n", err)
  964. }
  965. return nil
  966. }
  967. func (s *Server) wsContainersAttach(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  968. if err := parseForm(r); err != nil {
  969. return err
  970. }
  971. if vars == nil {
  972. return fmt.Errorf("Missing parameter")
  973. }
  974. h := websocket.Handler(func(ws *websocket.Conn) {
  975. defer ws.Close()
  976. wsAttachWithLogsConfig := &daemon.ContainerWsAttachWithLogsConfig{
  977. InStream: ws,
  978. OutStream: ws,
  979. ErrStream: ws,
  980. Logs: boolValue(r, "logs"),
  981. Stream: boolValue(r, "stream"),
  982. }
  983. if err := s.daemon.ContainerWsAttachWithLogs(vars["name"], wsAttachWithLogsConfig); err != nil {
  984. logrus.Errorf("Error attaching websocket: %s", err)
  985. }
  986. })
  987. h.ServeHTTP(w, r)
  988. return nil
  989. }
  990. func (s *Server) getContainersByName(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  991. if vars == nil {
  992. return fmt.Errorf("Missing parameter")
  993. }
  994. if version.LessThan("1.19") {
  995. containerJSONRaw, err := s.daemon.ContainerInspectRaw(vars["name"])
  996. if err != nil {
  997. return err
  998. }
  999. return writeJSON(w, http.StatusOK, containerJSONRaw)
  1000. }
  1001. containerJSON, err := s.daemon.ContainerInspect(vars["name"])
  1002. if err != nil {
  1003. return err
  1004. }
  1005. return writeJSON(w, http.StatusOK, containerJSON)
  1006. }
  1007. func (s *Server) getExecByID(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1008. if vars == nil {
  1009. return fmt.Errorf("Missing parameter 'id'")
  1010. }
  1011. eConfig, err := s.daemon.ContainerExecInspect(vars["id"])
  1012. if err != nil {
  1013. return err
  1014. }
  1015. return writeJSON(w, http.StatusOK, eConfig)
  1016. }
  1017. func (s *Server) getImagesByName(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1018. if vars == nil {
  1019. return fmt.Errorf("Missing parameter")
  1020. }
  1021. imageInspect, err := s.daemon.Repositories().Lookup(vars["name"])
  1022. if err != nil {
  1023. return err
  1024. }
  1025. return writeJSON(w, http.StatusOK, imageInspect)
  1026. }
  1027. func (s *Server) postBuild(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1028. var (
  1029. authConfig = &cliconfig.AuthConfig{}
  1030. configFileEncoded = r.Header.Get("X-Registry-Config")
  1031. configFile = &cliconfig.ConfigFile{}
  1032. buildConfig = builder.NewBuildConfig()
  1033. )
  1034. if configFileEncoded != "" {
  1035. configFileJson := base64.NewDecoder(base64.URLEncoding, strings.NewReader(configFileEncoded))
  1036. if err := json.NewDecoder(configFileJson).Decode(configFile); err != nil {
  1037. // for a pull it is not an error if no auth was given
  1038. // to increase compatibility with the existing api it is defaulting to be empty
  1039. configFile = &cliconfig.ConfigFile{}
  1040. }
  1041. }
  1042. w.Header().Set("Content-Type", "application/json")
  1043. if boolValue(r, "forcerm") && version.GreaterThanOrEqualTo("1.12") {
  1044. buildConfig.Remove = true
  1045. } else if r.FormValue("rm") == "" && version.GreaterThanOrEqualTo("1.12") {
  1046. buildConfig.Remove = true
  1047. } else {
  1048. buildConfig.Remove = boolValue(r, "rm")
  1049. }
  1050. if boolValue(r, "pull") && version.GreaterThanOrEqualTo("1.16") {
  1051. buildConfig.Pull = true
  1052. }
  1053. output := ioutils.NewWriteFlusher(w)
  1054. buildConfig.Stdout = output
  1055. buildConfig.Context = r.Body
  1056. buildConfig.RemoteURL = r.FormValue("remote")
  1057. buildConfig.DockerfileName = r.FormValue("dockerfile")
  1058. buildConfig.RepoName = r.FormValue("t")
  1059. buildConfig.SuppressOutput = boolValue(r, "q")
  1060. buildConfig.NoCache = boolValue(r, "nocache")
  1061. buildConfig.ForceRemove = boolValue(r, "forcerm")
  1062. buildConfig.AuthConfig = authConfig
  1063. buildConfig.ConfigFile = configFile
  1064. buildConfig.MemorySwap = int64ValueOrZero(r, "memswap")
  1065. buildConfig.Memory = int64ValueOrZero(r, "memory")
  1066. buildConfig.CpuShares = int64ValueOrZero(r, "cpushares")
  1067. buildConfig.CpuPeriod = int64ValueOrZero(r, "cpuperiod")
  1068. buildConfig.CpuQuota = int64ValueOrZero(r, "cpuquota")
  1069. buildConfig.CpuSetCpus = r.FormValue("cpusetcpus")
  1070. buildConfig.CpuSetMems = r.FormValue("cpusetmems")
  1071. buildConfig.CgroupParent = r.FormValue("cgroupparent")
  1072. // Job cancellation. Note: not all job types support this.
  1073. if closeNotifier, ok := w.(http.CloseNotifier); ok {
  1074. finished := make(chan struct{})
  1075. defer close(finished)
  1076. go func() {
  1077. select {
  1078. case <-finished:
  1079. case <-closeNotifier.CloseNotify():
  1080. logrus.Infof("Client disconnected, cancelling job: build")
  1081. buildConfig.Cancel()
  1082. }
  1083. }()
  1084. }
  1085. if err := builder.Build(s.daemon, buildConfig); err != nil {
  1086. // Do not write the error in the http output if it's still empty.
  1087. // This prevents from writing a 200(OK) when there is an interal error.
  1088. if !output.Flushed() {
  1089. return err
  1090. }
  1091. sf := streamformatter.NewJSONStreamFormatter()
  1092. w.Write(sf.FormatError(err))
  1093. }
  1094. return nil
  1095. }
  1096. func (s *Server) postContainersCopy(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1097. if vars == nil {
  1098. return fmt.Errorf("Missing parameter")
  1099. }
  1100. if err := checkForJson(r); err != nil {
  1101. return err
  1102. }
  1103. cfg := types.CopyConfig{}
  1104. if err := json.NewDecoder(r.Body).Decode(&cfg); err != nil {
  1105. return err
  1106. }
  1107. if cfg.Resource == "" {
  1108. return fmt.Errorf("Path cannot be empty")
  1109. }
  1110. data, err := s.daemon.ContainerCopy(vars["name"], cfg.Resource)
  1111. if err != nil {
  1112. if strings.Contains(strings.ToLower(err.Error()), "no such id") {
  1113. w.WriteHeader(http.StatusNotFound)
  1114. return nil
  1115. }
  1116. if os.IsNotExist(err) {
  1117. return fmt.Errorf("Could not find the file %s in container %s", cfg.Resource, vars["name"])
  1118. }
  1119. return err
  1120. }
  1121. defer data.Close()
  1122. w.Header().Set("Content-Type", "application/x-tar")
  1123. if _, err := io.Copy(w, data); err != nil {
  1124. return err
  1125. }
  1126. return nil
  1127. }
  1128. func (s *Server) postContainerExecCreate(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1129. if err := parseForm(r); err != nil {
  1130. return err
  1131. }
  1132. name := vars["name"]
  1133. execConfig := &runconfig.ExecConfig{}
  1134. if err := json.NewDecoder(r.Body).Decode(execConfig); err != nil {
  1135. return err
  1136. }
  1137. execConfig.Container = name
  1138. if len(execConfig.Cmd) == 0 {
  1139. return fmt.Errorf("No exec command specified")
  1140. }
  1141. // Register an instance of Exec in container.
  1142. id, err := s.daemon.ContainerExecCreate(execConfig)
  1143. if err != nil {
  1144. logrus.Errorf("Error setting up exec command in container %s: %s", name, err)
  1145. return err
  1146. }
  1147. return writeJSON(w, http.StatusCreated, &types.ContainerExecCreateResponse{
  1148. ID: id,
  1149. })
  1150. }
  1151. // TODO(vishh): Refactor the code to avoid having to specify stream config as part of both create and start.
  1152. func (s *Server) postContainerExecStart(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1153. if err := parseForm(r); err != nil {
  1154. return err
  1155. }
  1156. var (
  1157. execName = vars["name"]
  1158. stdin io.ReadCloser
  1159. stdout io.Writer
  1160. stderr io.Writer
  1161. )
  1162. execStartCheck := &types.ExecStartCheck{}
  1163. if err := json.NewDecoder(r.Body).Decode(execStartCheck); err != nil {
  1164. return err
  1165. }
  1166. if !execStartCheck.Detach {
  1167. // Setting up the streaming http interface.
  1168. inStream, outStream, err := hijackServer(w)
  1169. if err != nil {
  1170. return err
  1171. }
  1172. defer closeStreams(inStream, outStream)
  1173. var errStream io.Writer
  1174. if _, ok := r.Header["Upgrade"]; ok {
  1175. fmt.Fprintf(outStream, "HTTP/1.1 101 UPGRADED\r\nContent-Type: application/vnd.docker.raw-stream\r\nConnection: Upgrade\r\nUpgrade: tcp\r\n\r\n")
  1176. } else {
  1177. fmt.Fprintf(outStream, "HTTP/1.1 200 OK\r\nContent-Type: application/vnd.docker.raw-stream\r\n\r\n")
  1178. }
  1179. if !execStartCheck.Tty {
  1180. errStream = stdcopy.NewStdWriter(outStream, stdcopy.Stderr)
  1181. outStream = stdcopy.NewStdWriter(outStream, stdcopy.Stdout)
  1182. }
  1183. stdin = inStream
  1184. stdout = outStream
  1185. stderr = errStream
  1186. }
  1187. // Now run the user process in container.
  1188. if err := s.daemon.ContainerExecStart(execName, stdin, stdout, stderr); err != nil {
  1189. logrus.Errorf("Error starting exec command in container %s: %s", execName, err)
  1190. return err
  1191. }
  1192. w.WriteHeader(http.StatusNoContent)
  1193. return nil
  1194. }
  1195. func (s *Server) postContainerExecResize(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1196. if err := parseForm(r); err != nil {
  1197. return err
  1198. }
  1199. if vars == nil {
  1200. return fmt.Errorf("Missing parameter")
  1201. }
  1202. height, err := strconv.Atoi(r.Form.Get("h"))
  1203. if err != nil {
  1204. return err
  1205. }
  1206. width, err := strconv.Atoi(r.Form.Get("w"))
  1207. if err != nil {
  1208. return err
  1209. }
  1210. return s.daemon.ContainerExecResize(vars["name"], height, width)
  1211. }
  1212. func (s *Server) optionsHandler(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1213. w.WriteHeader(http.StatusOK)
  1214. return nil
  1215. }
  1216. func writeCorsHeaders(w http.ResponseWriter, r *http.Request, corsHeaders string) {
  1217. logrus.Debugf("CORS header is enabled and set to: %s", corsHeaders)
  1218. w.Header().Add("Access-Control-Allow-Origin", corsHeaders)
  1219. w.Header().Add("Access-Control-Allow-Headers", "Origin, X-Requested-With, Content-Type, Accept, X-Registry-Auth")
  1220. w.Header().Add("Access-Control-Allow-Methods", "GET, POST, DELETE, PUT, OPTIONS")
  1221. }
  1222. func (s *Server) ping(version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1223. _, err := w.Write([]byte{'O', 'K'})
  1224. return err
  1225. }
  1226. func (s *Server) initTcpSocket(addr string) (l net.Listener, err error) {
  1227. if s.cfg.TLSConfig == nil || s.cfg.TLSConfig.ClientAuth != tls.RequireAndVerifyClientCert {
  1228. logrus.Warn("/!\\ DON'T BIND ON ANY IP ADDRESS WITHOUT setting -tlsverify IF YOU DON'T KNOW WHAT YOU'RE DOING /!\\")
  1229. }
  1230. if l, err = sockets.NewTcpSocket(addr, s.cfg.TLSConfig, s.start); err != nil {
  1231. return nil, err
  1232. }
  1233. if err := allocateDaemonPort(addr); err != nil {
  1234. return nil, err
  1235. }
  1236. return
  1237. }
  1238. func makeHttpHandler(logging bool, localMethod string, localRoute string, handlerFunc HttpApiFunc, corsHeaders string, dockerVersion version.Version) http.HandlerFunc {
  1239. return func(w http.ResponseWriter, r *http.Request) {
  1240. // log the request
  1241. logrus.Debugf("Calling %s %s", localMethod, localRoute)
  1242. if logging {
  1243. logrus.Infof("%s %s", r.Method, r.RequestURI)
  1244. }
  1245. if strings.Contains(r.Header.Get("User-Agent"), "Docker-Client/") {
  1246. userAgent := strings.Split(r.Header.Get("User-Agent"), "/")
  1247. if len(userAgent) == 2 && !dockerVersion.Equal(version.Version(userAgent[1])) {
  1248. logrus.Debugf("Warning: client and server don't have the same version (client: %s, server: %s)", userAgent[1], dockerVersion)
  1249. }
  1250. }
  1251. version := version.Version(mux.Vars(r)["version"])
  1252. if version == "" {
  1253. version = api.APIVERSION
  1254. }
  1255. if corsHeaders != "" {
  1256. writeCorsHeaders(w, r, corsHeaders)
  1257. }
  1258. if version.GreaterThan(api.APIVERSION) {
  1259. http.Error(w, fmt.Errorf("client is newer than server (client API version: %s, server API version: %s)", version, api.APIVERSION).Error(), http.StatusBadRequest)
  1260. return
  1261. }
  1262. if err := handlerFunc(version, w, r, mux.Vars(r)); err != nil {
  1263. logrus.Errorf("Handler for %s %s returned error: %s", localMethod, localRoute, err)
  1264. httpError(w, err)
  1265. }
  1266. }
  1267. }
  1268. // we keep enableCors just for legacy usage, need to be removed in the future
  1269. func createRouter(s *Server) *mux.Router {
  1270. r := mux.NewRouter()
  1271. if os.Getenv("DEBUG") != "" {
  1272. ProfilerSetup(r, "/debug/")
  1273. }
  1274. m := map[string]map[string]HttpApiFunc{
  1275. "GET": {
  1276. "/_ping": s.ping,
  1277. "/events": s.getEvents,
  1278. "/info": s.getInfo,
  1279. "/version": s.getVersion,
  1280. "/images/json": s.getImagesJSON,
  1281. "/images/search": s.getImagesSearch,
  1282. "/images/get": s.getImagesGet,
  1283. "/images/{name:.*}/get": s.getImagesGet,
  1284. "/images/{name:.*}/history": s.getImagesHistory,
  1285. "/images/{name:.*}/json": s.getImagesByName,
  1286. "/containers/ps": s.getContainersJSON,
  1287. "/containers/json": s.getContainersJSON,
  1288. "/containers/{name:.*}/export": s.getContainersExport,
  1289. "/containers/{name:.*}/changes": s.getContainersChanges,
  1290. "/containers/{name:.*}/json": s.getContainersByName,
  1291. "/containers/{name:.*}/top": s.getContainersTop,
  1292. "/containers/{name:.*}/logs": s.getContainersLogs,
  1293. "/containers/{name:.*}/stats": s.getContainersStats,
  1294. "/containers/{name:.*}/attach/ws": s.wsContainersAttach,
  1295. "/exec/{id:.*}/json": s.getExecByID,
  1296. },
  1297. "POST": {
  1298. "/auth": s.postAuth,
  1299. "/commit": s.postCommit,
  1300. "/build": s.postBuild,
  1301. "/images/create": s.postImagesCreate,
  1302. "/images/load": s.postImagesLoad,
  1303. "/images/{name:.*}/push": s.postImagesPush,
  1304. "/images/{name:.*}/tag": s.postImagesTag,
  1305. "/containers/create": s.postContainersCreate,
  1306. "/containers/{name:.*}/kill": s.postContainersKill,
  1307. "/containers/{name:.*}/pause": s.postContainersPause,
  1308. "/containers/{name:.*}/unpause": s.postContainersUnpause,
  1309. "/containers/{name:.*}/restart": s.postContainersRestart,
  1310. "/containers/{name:.*}/start": s.postContainersStart,
  1311. "/containers/{name:.*}/stop": s.postContainersStop,
  1312. "/containers/{name:.*}/wait": s.postContainersWait,
  1313. "/containers/{name:.*}/resize": s.postContainersResize,
  1314. "/containers/{name:.*}/attach": s.postContainersAttach,
  1315. "/containers/{name:.*}/copy": s.postContainersCopy,
  1316. "/containers/{name:.*}/exec": s.postContainerExecCreate,
  1317. "/exec/{name:.*}/start": s.postContainerExecStart,
  1318. "/exec/{name:.*}/resize": s.postContainerExecResize,
  1319. "/containers/{name:.*}/rename": s.postContainerRename,
  1320. },
  1321. "DELETE": {
  1322. "/containers/{name:.*}": s.deleteContainers,
  1323. "/images/{name:.*}": s.deleteImages,
  1324. },
  1325. "OPTIONS": {
  1326. "": s.optionsHandler,
  1327. },
  1328. }
  1329. // If "api-cors-header" is not given, but "api-enable-cors" is true, we set cors to "*"
  1330. // otherwise, all head values will be passed to HTTP handler
  1331. corsHeaders := s.cfg.CorsHeaders
  1332. if corsHeaders == "" && s.cfg.EnableCors {
  1333. corsHeaders = "*"
  1334. }
  1335. for method, routes := range m {
  1336. for route, fct := range routes {
  1337. logrus.Debugf("Registering %s, %s", method, route)
  1338. // NOTE: scope issue, make sure the variables are local and won't be changed
  1339. localRoute := route
  1340. localFct := fct
  1341. localMethod := method
  1342. // build the handler function
  1343. f := makeHttpHandler(s.cfg.Logging, localMethod, localRoute, localFct, corsHeaders, version.Version(s.cfg.Version))
  1344. // add the new route
  1345. if localRoute == "" {
  1346. r.Methods(localMethod).HandlerFunc(f)
  1347. } else {
  1348. r.Path("/v{version:[0-9.]+}" + localRoute).Methods(localMethod).HandlerFunc(f)
  1349. r.Path(localRoute).Methods(localMethod).HandlerFunc(f)
  1350. }
  1351. }
  1352. }
  1353. return r
  1354. }