123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439 |
- package runconfig
- import (
- "fmt"
- "path"
- "strconv"
- "strings"
- "github.com/docker/docker/nat"
- "github.com/docker/docker/opts"
- flag "github.com/docker/docker/pkg/mflag"
- "github.com/docker/docker/pkg/parsers"
- "github.com/docker/docker/pkg/units"
- "github.com/docker/docker/utils"
- )
- var (
- ErrInvalidWorkingDirectory = fmt.Errorf("The working directory is invalid. It needs to be an absolute path.")
- ErrConflictContainerNetworkAndLinks = fmt.Errorf("Conflicting options: --net=container can't be used with links. This would result in undefined behavior.")
- ErrConflictContainerNetworkAndDns = fmt.Errorf("Conflicting options: --net=container can't be used with --dns. This configuration is invalid.")
- ErrConflictNetworkHostname = fmt.Errorf("Conflicting options: -h and the network mode (--net)")
- ErrConflictHostNetworkAndDns = fmt.Errorf("Conflicting options: --net=host can't be used with --dns. This configuration is invalid.")
- ErrConflictHostNetworkAndLinks = fmt.Errorf("Conflicting options: --net=host can't be used with links. This would result in undefined behavior.")
- )
- func Parse(cmd *flag.FlagSet, args []string) (*Config, *HostConfig, *flag.FlagSet, error) {
- var (
- // FIXME: use utils.ListOpts for attach and volumes?
- flAttach = opts.NewListOpts(opts.ValidateAttach)
- flVolumes = opts.NewListOpts(opts.ValidatePath)
- flLinks = opts.NewListOpts(opts.ValidateLink)
- flEnv = opts.NewListOpts(opts.ValidateEnv)
- flDevices = opts.NewListOpts(opts.ValidatePath)
- flPublish = opts.NewListOpts(nil)
- flExpose = opts.NewListOpts(nil)
- flDns = opts.NewListOpts(opts.ValidateIPAddress)
- flDnsSearch = opts.NewListOpts(opts.ValidateDnsSearch)
- flExtraHosts = opts.NewListOpts(opts.ValidateExtraHost)
- flVolumesFrom = opts.NewListOpts(nil)
- flLxcOpts = opts.NewListOpts(nil)
- flEnvFile = opts.NewListOpts(nil)
- flCapAdd = opts.NewListOpts(nil)
- flCapDrop = opts.NewListOpts(nil)
- flSecurityOpt = opts.NewListOpts(nil)
- flNetwork = cmd.Bool([]string{"#n", "#-networking"}, true, "Enable networking for this container")
- flPrivileged = cmd.Bool([]string{"#privileged", "-privileged"}, false, "Give extended privileges to this container")
- flPidMode = cmd.String([]string{"-pid"}, "", "Default is to create a private PID namespace for the container\n'host': use the host PID namespace inside the container. Note: the host mode gives the container full access to processes on the system and is therefore considered insecure.")
- flPublishAll = cmd.Bool([]string{"P", "-publish-all"}, false, "Publish all exposed ports to random ports on the host interfaces")
- flStdin = cmd.Bool([]string{"i", "-interactive"}, false, "Keep STDIN open even if not attached")
- flTty = cmd.Bool([]string{"t", "-tty"}, false, "Allocate a pseudo-TTY")
- flContainerIDFile = cmd.String([]string{"#cidfile", "-cidfile"}, "", "Write the container ID to the file")
- flEntrypoint = cmd.String([]string{"#entrypoint", "-entrypoint"}, "", "Overwrite the default ENTRYPOINT of the image")
- flHostname = cmd.String([]string{"h", "-hostname"}, "", "Container host name")
- flMemoryString = cmd.String([]string{"m", "-memory"}, "", "Memory limit (format: <number><optional unit>, where unit = b, k, m or g)")
- flMemorySwap = cmd.String([]string{"-memory-swap"}, "", "Total memory usage (memory + swap), set '-1' to disable swap (format: <number><optional unit>, where unit = b, k, m or g)")
- flUser = cmd.String([]string{"u", "-user"}, "", "Username or UID")
- flWorkingDir = cmd.String([]string{"w", "-workdir"}, "", "Working directory inside the container")
- flCpuShares = cmd.Int64([]string{"c", "-cpu-shares"}, 0, "CPU shares (relative weight)")
- flCpuset = cmd.String([]string{"-cpuset"}, "", "CPUs in which to allow execution (0-3, 0,1)")
- flNetMode = cmd.String([]string{"-net"}, "bridge", "Set the Network mode for the container\n'bridge': creates a new network stack for the container on the docker bridge\n'none': no networking for this container\n'container:<name|id>': reuses another container network stack\n'host': use the host network stack inside the container. Note: the host mode gives the container full access to local system services such as D-bus and is therefore considered insecure.")
- flMacAddress = cmd.String([]string{"-mac-address"}, "", "Container MAC address (e.g. 92:d0:c6:0a:29:33)")
- flIpcMode = cmd.String([]string{"-ipc"}, "", "Default is to create a private IPC namespace (POSIX SysV IPC) for the container\n'container:<name|id>': reuses another container shared memory, semaphores and message queues\n'host': use the host shared memory,semaphores and message queues inside the container. Note: the host mode gives the container full access to local shared memory and is therefore considered insecure.")
- flRestartPolicy = cmd.String([]string{"-restart"}, "", "Restart policy to apply when a container exits (no, on-failure[:max-retry], always)")
- flReadonlyRootfs = cmd.Bool([]string{"-read-only"}, false, "Mount the container's root filesystem as read only")
- )
- cmd.Var(&flAttach, []string{"a", "-attach"}, "Attach to STDIN, STDOUT or STDERR.")
- cmd.Var(&flVolumes, []string{"v", "-volume"}, "Bind mount a volume (e.g., from the host: -v /host:/container, from Docker: -v /container)")
- cmd.Var(&flLinks, []string{"#link", "-link"}, "Add link to another container in the form of <name|id>:alias")
- cmd.Var(&flDevices, []string{"-device"}, "Add a host device to the container (e.g. --device=/dev/sdc:/dev/xvdc:rwm)")
- cmd.Var(&flEnv, []string{"e", "-env"}, "Set environment variables")
- cmd.Var(&flEnvFile, []string{"-env-file"}, "Read in a line delimited file of environment variables")
- cmd.Var(&flPublish, []string{"p", "-publish"}, fmt.Sprintf("Publish a container's port to the host\nformat: %s\n(use 'docker port' to see the actual mapping)", nat.PortSpecTemplateFormat))
- cmd.Var(&flExpose, []string{"#expose", "-expose"}, "Expose a port or a range of ports (e.g. --expose=3300-3310) from the container without publishing it to your host")
- cmd.Var(&flDns, []string{"#dns", "-dns"}, "Set custom DNS servers")
- cmd.Var(&flDnsSearch, []string{"-dns-search"}, "Set custom DNS search domains (Use --dns-search=. if you don't wish to set the search domain)")
- cmd.Var(&flExtraHosts, []string{"-add-host"}, "Add a custom host-to-IP mapping (host:ip)")
- cmd.Var(&flVolumesFrom, []string{"#volumes-from", "-volumes-from"}, "Mount volumes from the specified container(s)")
- cmd.Var(&flLxcOpts, []string{"#lxc-conf", "-lxc-conf"}, "(lxc exec-driver only) Add custom lxc options --lxc-conf=\"lxc.cgroup.cpuset.cpus = 0,1\"")
- cmd.Var(&flCapAdd, []string{"-cap-add"}, "Add Linux capabilities")
- cmd.Var(&flCapDrop, []string{"-cap-drop"}, "Drop Linux capabilities")
- cmd.Var(&flSecurityOpt, []string{"-security-opt"}, "Security Options")
- cmd.Require(flag.Min, 1)
- if err := utils.ParseFlags(cmd, args, true); err != nil {
- return nil, nil, cmd, err
- }
- // Validate input params
- if *flWorkingDir != "" && !path.IsAbs(*flWorkingDir) {
- return nil, nil, cmd, ErrInvalidWorkingDirectory
- }
- var (
- attachStdin = flAttach.Get("stdin")
- attachStdout = flAttach.Get("stdout")
- attachStderr = flAttach.Get("stderr")
- )
- if *flNetMode != "bridge" && *flNetMode != "none" && *flHostname != "" {
- return nil, nil, cmd, ErrConflictNetworkHostname
- }
- if *flNetMode == "host" && flLinks.Len() > 0 {
- return nil, nil, cmd, ErrConflictHostNetworkAndLinks
- }
- if *flNetMode == "container" && flLinks.Len() > 0 {
- return nil, nil, cmd, ErrConflictContainerNetworkAndLinks
- }
- if *flNetMode == "host" && flDns.Len() > 0 {
- return nil, nil, cmd, ErrConflictHostNetworkAndDns
- }
- if *flNetMode == "container" && flDns.Len() > 0 {
- return nil, nil, cmd, ErrConflictContainerNetworkAndDns
- }
- // If neither -d or -a are set, attach to everything by default
- if flAttach.Len() == 0 {
- attachStdout = true
- attachStderr = true
- if *flStdin {
- attachStdin = true
- }
- }
- var flMemory int64
- if *flMemoryString != "" {
- parsedMemory, err := units.RAMInBytes(*flMemoryString)
- if err != nil {
- return nil, nil, cmd, err
- }
- flMemory = parsedMemory
- }
- var MemorySwap int64
- if *flMemorySwap != "" {
- parsedMemorySwap, err := units.RAMInBytes(*flMemorySwap)
- if err != nil {
- return nil, nil, cmd, err
- }
- MemorySwap = parsedMemorySwap
- }
- var binds []string
- // add any bind targets to the list of container volumes
- for bind := range flVolumes.GetMap() {
- if arr := strings.Split(bind, ":"); len(arr) > 1 {
- if arr[1] == "/" {
- return nil, nil, cmd, fmt.Errorf("Invalid bind mount: destination can't be '/'")
- }
- // after creating the bind mount we want to delete it from the flVolumes values because
- // we do not want bind mounts being committed to image configs
- binds = append(binds, bind)
- flVolumes.Delete(bind)
- } else if bind == "/" {
- return nil, nil, cmd, fmt.Errorf("Invalid volume: path can't be '/'")
- }
- }
- var (
- parsedArgs = cmd.Args()
- runCmd []string
- entrypoint []string
- image = cmd.Arg(0)
- )
- if len(parsedArgs) > 1 {
- runCmd = parsedArgs[1:]
- }
- if *flEntrypoint != "" {
- entrypoint = []string{*flEntrypoint}
- }
- lxcConf, err := parseKeyValueOpts(flLxcOpts)
- if err != nil {
- return nil, nil, cmd, err
- }
- var (
- domainname string
- hostname = *flHostname
- parts = strings.SplitN(hostname, ".", 2)
- )
- if len(parts) > 1 {
- hostname = parts[0]
- domainname = parts[1]
- }
- ports, portBindings, err := nat.ParsePortSpecs(flPublish.GetAll())
- if err != nil {
- return nil, nil, cmd, err
- }
- // Merge in exposed ports to the map of published ports
- for _, e := range flExpose.GetAll() {
- if strings.Contains(e, ":") {
- return nil, nil, cmd, fmt.Errorf("Invalid port format for --expose: %s", e)
- }
- //support two formats for expose, original format <portnum>/[<proto>] or <startport-endport>/[<proto>]
- if strings.Contains(e, "-") {
- proto, port := nat.SplitProtoPort(e)
- //parse the start and end port and create a sequence of ports to expose
- start, end, err := parsers.ParsePortRange(port)
- if err != nil {
- return nil, nil, cmd, fmt.Errorf("Invalid range format for --expose: %s, error: %s", e, err)
- }
- for i := start; i <= end; i++ {
- p := nat.NewPort(proto, strconv.FormatUint(i, 10))
- if _, exists := ports[p]; !exists {
- ports[p] = struct{}{}
- }
- }
- } else {
- p := nat.NewPort(nat.SplitProtoPort(e))
- if _, exists := ports[p]; !exists {
- ports[p] = struct{}{}
- }
- }
- }
- // parse device mappings
- deviceMappings := []DeviceMapping{}
- for _, device := range flDevices.GetAll() {
- deviceMapping, err := ParseDevice(device)
- if err != nil {
- return nil, nil, cmd, err
- }
- deviceMappings = append(deviceMappings, deviceMapping)
- }
- // collect all the environment variables for the container
- envVariables := []string{}
- for _, ef := range flEnvFile.GetAll() {
- parsedVars, err := opts.ParseEnvFile(ef)
- if err != nil {
- return nil, nil, cmd, err
- }
- envVariables = append(envVariables, parsedVars...)
- }
- // parse the '-e' and '--env' after, to allow override
- envVariables = append(envVariables, flEnv.GetAll()...)
- ipcMode := IpcMode(*flIpcMode)
- if !ipcMode.Valid() {
- return nil, nil, cmd, fmt.Errorf("--ipc: invalid IPC mode")
- }
- pidMode := PidMode(*flPidMode)
- if !pidMode.Valid() {
- return nil, nil, cmd, fmt.Errorf("--pid: invalid PID mode")
- }
- netMode, err := parseNetMode(*flNetMode)
- if err != nil {
- return nil, nil, cmd, fmt.Errorf("--net: invalid net mode: %v", err)
- }
- restartPolicy, err := parseRestartPolicy(*flRestartPolicy)
- if err != nil {
- return nil, nil, cmd, err
- }
- config := &Config{
- Hostname: hostname,
- Domainname: domainname,
- PortSpecs: nil, // Deprecated
- ExposedPorts: ports,
- User: *flUser,
- Tty: *flTty,
- NetworkDisabled: !*flNetwork,
- OpenStdin: *flStdin,
- Memory: flMemory,
- MemorySwap: MemorySwap,
- CpuShares: *flCpuShares,
- Cpuset: *flCpuset,
- AttachStdin: attachStdin,
- AttachStdout: attachStdout,
- AttachStderr: attachStderr,
- Env: envVariables,
- Cmd: runCmd,
- Image: image,
- Volumes: flVolumes.GetMap(),
- MacAddress: *flMacAddress,
- Entrypoint: entrypoint,
- WorkingDir: *flWorkingDir,
- }
- hostConfig := &HostConfig{
- Binds: binds,
- ContainerIDFile: *flContainerIDFile,
- LxcConf: lxcConf,
- Privileged: *flPrivileged,
- PortBindings: portBindings,
- Links: flLinks.GetAll(),
- PublishAllPorts: *flPublishAll,
- Dns: flDns.GetAll(),
- DnsSearch: flDnsSearch.GetAll(),
- ExtraHosts: flExtraHosts.GetAll(),
- VolumesFrom: flVolumesFrom.GetAll(),
- NetworkMode: netMode,
- IpcMode: ipcMode,
- PidMode: pidMode,
- Devices: deviceMappings,
- CapAdd: flCapAdd.GetAll(),
- CapDrop: flCapDrop.GetAll(),
- RestartPolicy: restartPolicy,
- SecurityOpt: flSecurityOpt.GetAll(),
- ReadonlyRootfs: *flReadonlyRootfs,
- }
- // When allocating stdin in attached mode, close stdin at client disconnect
- if config.OpenStdin && config.AttachStdin {
- config.StdinOnce = true
- }
- return config, hostConfig, cmd, nil
- }
- // parseRestartPolicy returns the parsed policy or an error indicating what is incorrect
- func parseRestartPolicy(policy string) (RestartPolicy, error) {
- p := RestartPolicy{}
- if policy == "" {
- return p, nil
- }
- var (
- parts = strings.Split(policy, ":")
- name = parts[0]
- )
- switch name {
- case "always":
- p.Name = name
- if len(parts) == 2 {
- return p, fmt.Errorf("maximum restart count not valid with restart policy of \"always\"")
- }
- case "no":
- // do nothing
- case "on-failure":
- p.Name = name
- if len(parts) == 2 {
- count, err := strconv.Atoi(parts[1])
- if err != nil {
- return p, err
- }
- p.MaximumRetryCount = count
- }
- default:
- return p, fmt.Errorf("invalid restart policy %s", name)
- }
- return p, nil
- }
- // options will come in the format of name.key=value or name.option
- func parseDriverOpts(opts opts.ListOpts) (map[string][]string, error) {
- out := make(map[string][]string, len(opts.GetAll()))
- for _, o := range opts.GetAll() {
- parts := strings.SplitN(o, ".", 2)
- if len(parts) < 2 {
- return nil, fmt.Errorf("invalid opt format %s", o)
- } else if strings.TrimSpace(parts[0]) == "" {
- return nil, fmt.Errorf("key cannot be empty %s", o)
- }
- values, exists := out[parts[0]]
- if !exists {
- values = []string{}
- }
- out[parts[0]] = append(values, parts[1])
- }
- return out, nil
- }
- func parseKeyValueOpts(opts opts.ListOpts) ([]utils.KeyValuePair, error) {
- out := make([]utils.KeyValuePair, opts.Len())
- for i, o := range opts.GetAll() {
- k, v, err := parsers.ParseKeyValueOpt(o)
- if err != nil {
- return nil, err
- }
- out[i] = utils.KeyValuePair{Key: k, Value: v}
- }
- return out, nil
- }
- func parseNetMode(netMode string) (NetworkMode, error) {
- parts := strings.Split(netMode, ":")
- switch mode := parts[0]; mode {
- case "bridge", "none", "host":
- case "container":
- if len(parts) < 2 || parts[1] == "" {
- return "", fmt.Errorf("invalid container format container:<name|id>")
- }
- default:
- return "", fmt.Errorf("invalid --net: %s", netMode)
- }
- return NetworkMode(netMode), nil
- }
- func ParseDevice(device string) (DeviceMapping, error) {
- src := ""
- dst := ""
- permissions := "rwm"
- arr := strings.Split(device, ":")
- switch len(arr) {
- case 3:
- permissions = arr[2]
- fallthrough
- case 2:
- dst = arr[1]
- fallthrough
- case 1:
- src = arr[0]
- default:
- return DeviceMapping{}, fmt.Errorf("Invalid device specification: %s", device)
- }
- if dst == "" {
- dst = src
- }
- deviceMapping := DeviceMapping{
- PathOnHost: src,
- PathInContainer: dst,
- CgroupPermissions: permissions,
- }
- return deviceMapping, nil
- }
|