server.go 47 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708
  1. package server
  2. import (
  3. "runtime"
  4. "time"
  5. "encoding/base64"
  6. "encoding/json"
  7. "fmt"
  8. "io"
  9. "net"
  10. "net/http"
  11. "os"
  12. "strconv"
  13. "strings"
  14. "code.google.com/p/go.net/websocket"
  15. "github.com/gorilla/mux"
  16. "github.com/Sirupsen/logrus"
  17. "github.com/docker/docker/api"
  18. "github.com/docker/docker/api/types"
  19. "github.com/docker/docker/autogen/dockerversion"
  20. "github.com/docker/docker/builder"
  21. "github.com/docker/docker/cliconfig"
  22. "github.com/docker/docker/daemon"
  23. "github.com/docker/docker/daemon/networkdriver/bridge"
  24. "github.com/docker/docker/engine"
  25. "github.com/docker/docker/graph"
  26. "github.com/docker/docker/pkg/jsonmessage"
  27. "github.com/docker/docker/pkg/parsers"
  28. "github.com/docker/docker/pkg/parsers/filters"
  29. "github.com/docker/docker/pkg/parsers/kernel"
  30. "github.com/docker/docker/pkg/signal"
  31. "github.com/docker/docker/pkg/stdcopy"
  32. "github.com/docker/docker/pkg/streamformatter"
  33. "github.com/docker/docker/pkg/version"
  34. "github.com/docker/docker/runconfig"
  35. "github.com/docker/docker/utils"
  36. )
  37. type ServerConfig struct {
  38. Logging bool
  39. EnableCors bool
  40. CorsHeaders string
  41. Version string
  42. SocketGroup string
  43. Tls bool
  44. TlsVerify bool
  45. TlsCa string
  46. TlsCert string
  47. TlsKey string
  48. }
  49. type Server struct {
  50. daemon *daemon.Daemon
  51. cfg *ServerConfig
  52. router *mux.Router
  53. start chan struct{}
  54. // TODO: delete engine
  55. eng *engine.Engine
  56. }
  57. func New(cfg *ServerConfig, eng *engine.Engine) *Server {
  58. srv := &Server{
  59. cfg: cfg,
  60. start: make(chan struct{}),
  61. eng: eng,
  62. }
  63. r := createRouter(srv, eng)
  64. srv.router = r
  65. return srv
  66. }
  67. func (s *Server) SetDaemon(d *daemon.Daemon) {
  68. s.daemon = d
  69. }
  70. type serverCloser interface {
  71. Serve() error
  72. Close() error
  73. }
  74. // ServeApi loops through all of the protocols sent in to docker and spawns
  75. // off a go routine to setup a serving http.Server for each.
  76. func (s *Server) ServeApi(protoAddrs []string) error {
  77. var chErrors = make(chan error, len(protoAddrs))
  78. for _, protoAddr := range protoAddrs {
  79. protoAddrParts := strings.SplitN(protoAddr, "://", 2)
  80. if len(protoAddrParts) != 2 {
  81. return fmt.Errorf("bad format, expected PROTO://ADDR")
  82. }
  83. go func(proto, addr string) {
  84. logrus.Infof("Listening for HTTP on %s (%s)", proto, addr)
  85. srv, err := s.newServer(proto, addr)
  86. if err != nil {
  87. chErrors <- err
  88. return
  89. }
  90. s.eng.OnShutdown(func() {
  91. if err := srv.Close(); err != nil {
  92. logrus.Error(err)
  93. }
  94. })
  95. if err = srv.Serve(); err != nil && strings.Contains(err.Error(), "use of closed network connection") {
  96. err = nil
  97. }
  98. chErrors <- err
  99. }(protoAddrParts[0], protoAddrParts[1])
  100. }
  101. for i := 0; i < len(protoAddrs); i++ {
  102. err := <-chErrors
  103. if err != nil {
  104. return err
  105. }
  106. }
  107. return nil
  108. }
  109. type HttpServer struct {
  110. srv *http.Server
  111. l net.Listener
  112. }
  113. func (s *HttpServer) Serve() error {
  114. return s.srv.Serve(s.l)
  115. }
  116. func (s *HttpServer) Close() error {
  117. return s.l.Close()
  118. }
  119. type HttpApiFunc func(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error
  120. func hijackServer(w http.ResponseWriter) (io.ReadCloser, io.Writer, error) {
  121. conn, _, err := w.(http.Hijacker).Hijack()
  122. if err != nil {
  123. return nil, nil, err
  124. }
  125. // Flush the options to make sure the client sets the raw mode
  126. conn.Write([]byte{})
  127. return conn, conn, nil
  128. }
  129. func closeStreams(streams ...interface{}) {
  130. for _, stream := range streams {
  131. if tcpc, ok := stream.(interface {
  132. CloseWrite() error
  133. }); ok {
  134. tcpc.CloseWrite()
  135. } else if closer, ok := stream.(io.Closer); ok {
  136. closer.Close()
  137. }
  138. }
  139. }
  140. // Check to make sure request's Content-Type is application/json
  141. func checkForJson(r *http.Request) error {
  142. ct := r.Header.Get("Content-Type")
  143. // No Content-Type header is ok as long as there's no Body
  144. if ct == "" {
  145. if r.Body == nil || r.ContentLength == 0 {
  146. return nil
  147. }
  148. }
  149. // Otherwise it better be json
  150. if api.MatchesContentType(ct, "application/json") {
  151. return nil
  152. }
  153. return fmt.Errorf("Content-Type specified (%s) must be 'application/json'", ct)
  154. }
  155. //If we don't do this, POST method without Content-type (even with empty body) will fail
  156. func parseForm(r *http.Request) error {
  157. if r == nil {
  158. return nil
  159. }
  160. if err := r.ParseForm(); err != nil && !strings.HasPrefix(err.Error(), "mime:") {
  161. return err
  162. }
  163. return nil
  164. }
  165. func parseMultipartForm(r *http.Request) error {
  166. if err := r.ParseMultipartForm(4096); err != nil && !strings.HasPrefix(err.Error(), "mime:") {
  167. return err
  168. }
  169. return nil
  170. }
  171. func httpError(w http.ResponseWriter, err error) {
  172. if err == nil || w == nil {
  173. logrus.WithFields(logrus.Fields{"error": err, "writer": w}).Error("unexpected HTTP error handling")
  174. return
  175. }
  176. statusCode := http.StatusInternalServerError
  177. // FIXME: this is brittle and should not be necessary.
  178. // If we need to differentiate between different possible error types, we should
  179. // create appropriate error types with clearly defined meaning.
  180. errStr := strings.ToLower(err.Error())
  181. for keyword, status := range map[string]int{
  182. "not found": http.StatusNotFound,
  183. "no such": http.StatusNotFound,
  184. "bad parameter": http.StatusBadRequest,
  185. "conflict": http.StatusConflict,
  186. "impossible": http.StatusNotAcceptable,
  187. "wrong login/password": http.StatusUnauthorized,
  188. "hasn't been activated": http.StatusForbidden,
  189. } {
  190. if strings.Contains(errStr, keyword) {
  191. statusCode = status
  192. break
  193. }
  194. }
  195. logrus.WithFields(logrus.Fields{"statusCode": statusCode, "err": err}).Error("HTTP Error")
  196. http.Error(w, err.Error(), statusCode)
  197. }
  198. // writeJSON writes the value v to the http response stream as json with standard
  199. // json encoding.
  200. func writeJSON(w http.ResponseWriter, code int, v interface{}) error {
  201. w.Header().Set("Content-Type", "application/json")
  202. w.WriteHeader(code)
  203. return json.NewEncoder(w).Encode(v)
  204. }
  205. func streamJSON(out *engine.Output, w http.ResponseWriter, flush bool) {
  206. w.Header().Set("Content-Type", "application/json")
  207. if flush {
  208. out.Add(utils.NewWriteFlusher(w))
  209. } else {
  210. out.Add(w)
  211. }
  212. }
  213. func (s *Server) postAuth(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  214. var config *cliconfig.AuthConfig
  215. err := json.NewDecoder(r.Body).Decode(&config)
  216. r.Body.Close()
  217. if err != nil {
  218. return err
  219. }
  220. status, err := s.daemon.RegistryService.Auth(config)
  221. if err != nil {
  222. return err
  223. }
  224. return writeJSON(w, http.StatusOK, &types.AuthResponse{
  225. Status: status,
  226. })
  227. }
  228. func (s *Server) getVersion(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  229. w.Header().Set("Content-Type", "application/json")
  230. v := &types.Version{
  231. Version: dockerversion.VERSION,
  232. ApiVersion: api.APIVERSION,
  233. GitCommit: dockerversion.GITCOMMIT,
  234. GoVersion: runtime.Version(),
  235. Os: runtime.GOOS,
  236. Arch: runtime.GOARCH,
  237. }
  238. if kernelVersion, err := kernel.GetKernelVersion(); err == nil {
  239. v.KernelVersion = kernelVersion.String()
  240. }
  241. return writeJSON(w, http.StatusOK, v)
  242. }
  243. func (s *Server) postContainersKill(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  244. if vars == nil {
  245. return fmt.Errorf("Missing parameter")
  246. }
  247. err := parseForm(r)
  248. if err != nil {
  249. return err
  250. }
  251. var sig uint64
  252. name := vars["name"]
  253. // If we have a signal, look at it. Otherwise, do nothing
  254. if sigStr := vars["signal"]; sigStr != "" {
  255. // Check if we passed the signal as a number:
  256. // The largest legal signal is 31, so let's parse on 5 bits
  257. sig, err = strconv.ParseUint(sigStr, 10, 5)
  258. if err != nil {
  259. // The signal is not a number, treat it as a string (either like
  260. // "KILL" or like "SIGKILL")
  261. sig = uint64(signal.SignalMap[strings.TrimPrefix(sigStr, "SIG")])
  262. }
  263. if sig == 0 {
  264. return fmt.Errorf("Invalid signal: %s", sigStr)
  265. }
  266. }
  267. if err = s.daemon.ContainerKill(name, sig); err != nil {
  268. return err
  269. }
  270. w.WriteHeader(http.StatusNoContent)
  271. return nil
  272. }
  273. func (s *Server) postContainersPause(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  274. if vars == nil {
  275. return fmt.Errorf("Missing parameter")
  276. }
  277. if err := parseForm(r); err != nil {
  278. return err
  279. }
  280. name := vars["name"]
  281. cont, err := s.daemon.Get(name)
  282. if err != nil {
  283. return err
  284. }
  285. if err := cont.Pause(); err != nil {
  286. return fmt.Errorf("Cannot pause container %s: %s", name, err)
  287. }
  288. cont.LogEvent("pause")
  289. w.WriteHeader(http.StatusNoContent)
  290. return nil
  291. }
  292. func (s *Server) postContainersUnpause(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  293. if vars == nil {
  294. return fmt.Errorf("Missing parameter")
  295. }
  296. if err := parseForm(r); err != nil {
  297. return err
  298. }
  299. name := vars["name"]
  300. cont, err := s.daemon.Get(name)
  301. if err != nil {
  302. return err
  303. }
  304. if err := cont.Unpause(); err != nil {
  305. return fmt.Errorf("Cannot unpause container %s: %s", name, err)
  306. }
  307. cont.LogEvent("unpause")
  308. w.WriteHeader(http.StatusNoContent)
  309. return nil
  310. }
  311. func (s *Server) getContainersExport(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  312. if vars == nil {
  313. return fmt.Errorf("Missing parameter")
  314. }
  315. return s.daemon.ContainerExport(vars["name"], w)
  316. }
  317. func (s *Server) getImagesJSON(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  318. if err := parseForm(r); err != nil {
  319. return err
  320. }
  321. imagesConfig := graph.ImagesConfig{
  322. Filters: r.Form.Get("filters"),
  323. // FIXME this parameter could just be a match filter
  324. Filter: r.Form.Get("filter"),
  325. All: boolValue(r, "all"),
  326. }
  327. images, err := s.daemon.Repositories().Images(&imagesConfig)
  328. if err != nil {
  329. return err
  330. }
  331. if version.GreaterThanOrEqualTo("1.7") {
  332. return writeJSON(w, http.StatusOK, images)
  333. }
  334. legacyImages := []types.LegacyImage{}
  335. for _, image := range images {
  336. for _, repoTag := range image.RepoTags {
  337. repo, tag := parsers.ParseRepositoryTag(repoTag)
  338. legacyImage := types.LegacyImage{
  339. Repository: repo,
  340. Tag: tag,
  341. ID: image.ID,
  342. Created: image.Created,
  343. Size: image.Size,
  344. VirtualSize: image.VirtualSize,
  345. }
  346. legacyImages = append(legacyImages, legacyImage)
  347. }
  348. }
  349. return writeJSON(w, http.StatusOK, legacyImages)
  350. }
  351. func (s *Server) getImagesViz(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  352. if version.GreaterThan("1.6") {
  353. w.WriteHeader(http.StatusNotFound)
  354. return fmt.Errorf("This is now implemented in the client.")
  355. }
  356. eng.ServeHTTP(w, r)
  357. return nil
  358. }
  359. func (s *Server) getInfo(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  360. w.Header().Set("Content-Type", "application/json")
  361. info, err := s.daemon.SystemInfo()
  362. if err != nil {
  363. return err
  364. }
  365. return writeJSON(w, http.StatusOK, info)
  366. }
  367. func (s *Server) getEvents(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  368. if err := parseForm(r); err != nil {
  369. return err
  370. }
  371. var since int64 = -1
  372. if r.Form.Get("since") != "" {
  373. s, err := strconv.ParseInt(r.Form.Get("since"), 10, 64)
  374. if err != nil {
  375. return err
  376. }
  377. since = s
  378. }
  379. var until int64 = -1
  380. if r.Form.Get("until") != "" {
  381. u, err := strconv.ParseInt(r.Form.Get("until"), 10, 64)
  382. if err != nil {
  383. return err
  384. }
  385. until = u
  386. }
  387. timer := time.NewTimer(0)
  388. timer.Stop()
  389. if until > 0 {
  390. dur := time.Unix(until, 0).Sub(time.Now())
  391. timer = time.NewTimer(dur)
  392. }
  393. ef, err := filters.FromParam(r.Form.Get("filters"))
  394. if err != nil {
  395. return err
  396. }
  397. isFiltered := func(field string, filter []string) bool {
  398. if len(filter) == 0 {
  399. return false
  400. }
  401. for _, v := range filter {
  402. if v == field {
  403. return false
  404. }
  405. if strings.Contains(field, ":") {
  406. image := strings.Split(field, ":")
  407. if image[0] == v {
  408. return false
  409. }
  410. }
  411. }
  412. return true
  413. }
  414. d := s.daemon
  415. es := d.EventsService
  416. w.Header().Set("Content-Type", "application/json")
  417. enc := json.NewEncoder(utils.NewWriteFlusher(w))
  418. getContainerId := func(cn string) string {
  419. c, err := d.Get(cn)
  420. if err != nil {
  421. return ""
  422. }
  423. return c.ID
  424. }
  425. sendEvent := func(ev *jsonmessage.JSONMessage) error {
  426. //incoming container filter can be name,id or partial id, convert and replace as a full container id
  427. for i, cn := range ef["container"] {
  428. ef["container"][i] = getContainerId(cn)
  429. }
  430. if isFiltered(ev.Status, ef["event"]) || isFiltered(ev.From, ef["image"]) ||
  431. isFiltered(ev.ID, ef["container"]) {
  432. return nil
  433. }
  434. return enc.Encode(ev)
  435. }
  436. current, l := es.Subscribe()
  437. defer es.Evict(l)
  438. for _, ev := range current {
  439. if ev.Time < since {
  440. continue
  441. }
  442. if err := sendEvent(ev); err != nil {
  443. return err
  444. }
  445. }
  446. for {
  447. select {
  448. case ev := <-l:
  449. jev, ok := ev.(*jsonmessage.JSONMessage)
  450. if !ok {
  451. continue
  452. }
  453. if err := sendEvent(jev); err != nil {
  454. return err
  455. }
  456. case <-timer.C:
  457. return nil
  458. }
  459. }
  460. }
  461. func (s *Server) getImagesHistory(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  462. if vars == nil {
  463. return fmt.Errorf("Missing parameter")
  464. }
  465. name := vars["name"]
  466. history, err := s.daemon.Repositories().History(name)
  467. if err != nil {
  468. return err
  469. }
  470. return writeJSON(w, http.StatusOK, history)
  471. }
  472. func (s *Server) getContainersChanges(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  473. if vars == nil {
  474. return fmt.Errorf("Missing parameter")
  475. }
  476. name := vars["name"]
  477. cont, err := s.daemon.Get(name)
  478. if err != nil {
  479. return err
  480. }
  481. changes, err := cont.Changes()
  482. if err != nil {
  483. return err
  484. }
  485. return writeJSON(w, http.StatusOK, changes)
  486. }
  487. func (s *Server) getContainersTop(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  488. if version.LessThan("1.4") {
  489. return fmt.Errorf("top was improved a lot since 1.3, Please upgrade your docker client.")
  490. }
  491. if vars == nil {
  492. return fmt.Errorf("Missing parameter")
  493. }
  494. if err := parseForm(r); err != nil {
  495. return err
  496. }
  497. procList, err := s.daemon.ContainerTop(vars["name"], r.Form.Get("ps_args"))
  498. if err != nil {
  499. return err
  500. }
  501. return writeJSON(w, http.StatusOK, procList)
  502. }
  503. func (s *Server) getContainersJSON(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  504. if err := parseForm(r); err != nil {
  505. return err
  506. }
  507. config := &daemon.ContainersConfig{
  508. All: boolValue(r, "all"),
  509. Size: boolValue(r, "size"),
  510. Since: r.Form.Get("since"),
  511. Before: r.Form.Get("before"),
  512. Filters: r.Form.Get("filters"),
  513. }
  514. if tmpLimit := r.Form.Get("limit"); tmpLimit != "" {
  515. limit, err := strconv.Atoi(tmpLimit)
  516. if err != nil {
  517. return err
  518. }
  519. config.Limit = limit
  520. }
  521. containers, err := s.daemon.Containers(config)
  522. if err != nil {
  523. return err
  524. }
  525. return writeJSON(w, http.StatusOK, containers)
  526. }
  527. func (s *Server) getContainersStats(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  528. if err := parseForm(r); err != nil {
  529. return err
  530. }
  531. if vars == nil {
  532. return fmt.Errorf("Missing parameter")
  533. }
  534. return s.daemon.ContainerStats(vars["name"], utils.NewWriteFlusher(w))
  535. }
  536. func (s *Server) getContainersLogs(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  537. if err := parseForm(r); err != nil {
  538. return err
  539. }
  540. if vars == nil {
  541. return fmt.Errorf("Missing parameter")
  542. }
  543. // Validate args here, because we can't return not StatusOK after job.Run() call
  544. stdout, stderr := boolValue(r, "stdout"), boolValue(r, "stderr")
  545. if !(stdout || stderr) {
  546. return fmt.Errorf("Bad parameters: you must choose at least one stream")
  547. }
  548. logsConfig := &daemon.ContainerLogsConfig{
  549. Follow: boolValue(r, "follow"),
  550. Timestamps: boolValue(r, "timestamps"),
  551. Tail: r.Form.Get("tail"),
  552. UseStdout: stdout,
  553. UseStderr: stderr,
  554. OutStream: utils.NewWriteFlusher(w),
  555. }
  556. if err := s.daemon.ContainerLogs(vars["name"], logsConfig); err != nil {
  557. fmt.Fprintf(w, "Error running logs job: %s\n", err)
  558. }
  559. return nil
  560. }
  561. func (s *Server) postImagesTag(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  562. if err := parseForm(r); err != nil {
  563. return err
  564. }
  565. if vars == nil {
  566. return fmt.Errorf("Missing parameter")
  567. }
  568. repo := r.Form.Get("repo")
  569. tag := r.Form.Get("tag")
  570. force := boolValue(r, "force")
  571. if err := s.daemon.Repositories().Tag(repo, tag, vars["name"], force); err != nil {
  572. return err
  573. }
  574. w.WriteHeader(http.StatusCreated)
  575. return nil
  576. }
  577. func (s *Server) postCommit(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  578. if err := parseForm(r); err != nil {
  579. return err
  580. }
  581. if err := checkForJson(r); err != nil {
  582. return err
  583. }
  584. cont := r.Form.Get("container")
  585. pause := boolValue(r, "pause")
  586. if r.FormValue("pause") == "" && version.GreaterThanOrEqualTo("1.13") {
  587. pause = true
  588. }
  589. c, _, err := runconfig.DecodeContainerConfig(r.Body)
  590. if err != nil && err != io.EOF { //Do not fail if body is empty.
  591. return err
  592. }
  593. if c == nil {
  594. c = &runconfig.Config{}
  595. }
  596. containerCommitConfig := &daemon.ContainerCommitConfig{
  597. Pause: pause,
  598. Repo: r.Form.Get("repo"),
  599. Tag: r.Form.Get("tag"),
  600. Author: r.Form.Get("author"),
  601. Comment: r.Form.Get("comment"),
  602. Changes: r.Form["changes"],
  603. Config: c,
  604. }
  605. imgID, err := builder.Commit(s.daemon, cont, containerCommitConfig)
  606. if err != nil {
  607. return err
  608. }
  609. return writeJSON(w, http.StatusCreated, &types.ContainerCommitResponse{
  610. ID: imgID,
  611. })
  612. }
  613. // Creates an image from Pull or from Import
  614. func (s *Server) postImagesCreate(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  615. if err := parseForm(r); err != nil {
  616. return err
  617. }
  618. var (
  619. image = r.Form.Get("fromImage")
  620. repo = r.Form.Get("repo")
  621. tag = r.Form.Get("tag")
  622. )
  623. authEncoded := r.Header.Get("X-Registry-Auth")
  624. authConfig := &cliconfig.AuthConfig{}
  625. if authEncoded != "" {
  626. authJson := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded))
  627. if err := json.NewDecoder(authJson).Decode(authConfig); err != nil {
  628. // for a pull it is not an error if no auth was given
  629. // to increase compatibility with the existing api it is defaulting to be empty
  630. authConfig = &cliconfig.AuthConfig{}
  631. }
  632. }
  633. var (
  634. opErr error
  635. useJSON = version.GreaterThan("1.0")
  636. )
  637. if useJSON {
  638. w.Header().Set("Content-Type", "application/json")
  639. }
  640. if image != "" { //pull
  641. if tag == "" {
  642. image, tag = parsers.ParseRepositoryTag(image)
  643. }
  644. metaHeaders := map[string][]string{}
  645. for k, v := range r.Header {
  646. if strings.HasPrefix(k, "X-Meta-") {
  647. metaHeaders[k] = v
  648. }
  649. }
  650. imagePullConfig := &graph.ImagePullConfig{
  651. Parallel: version.GreaterThan("1.3"),
  652. MetaHeaders: metaHeaders,
  653. AuthConfig: authConfig,
  654. OutStream: utils.NewWriteFlusher(w),
  655. Json: useJSON,
  656. }
  657. opErr = s.daemon.Repositories().Pull(image, tag, imagePullConfig)
  658. } else { //import
  659. if tag == "" {
  660. repo, tag = parsers.ParseRepositoryTag(repo)
  661. }
  662. src := r.Form.Get("fromSrc")
  663. imageImportConfig := &graph.ImageImportConfig{
  664. Changes: r.Form["changes"],
  665. InConfig: r.Body,
  666. OutStream: utils.NewWriteFlusher(w),
  667. Json: useJSON,
  668. }
  669. newConfig, err := builder.BuildFromConfig(s.daemon, &runconfig.Config{}, imageImportConfig.Changes)
  670. if err != nil {
  671. return err
  672. }
  673. imageImportConfig.ContainerConfig = newConfig
  674. opErr = s.daemon.Repositories().Import(src, repo, tag, imageImportConfig)
  675. }
  676. if opErr != nil {
  677. sf := streamformatter.NewStreamFormatter(useJSON)
  678. return fmt.Errorf(string(sf.FormatError(opErr)))
  679. }
  680. return nil
  681. }
  682. func (s *Server) getImagesSearch(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  683. if err := parseForm(r); err != nil {
  684. return err
  685. }
  686. var (
  687. config *cliconfig.AuthConfig
  688. authEncoded = r.Header.Get("X-Registry-Auth")
  689. headers = map[string][]string{}
  690. )
  691. if authEncoded != "" {
  692. authJson := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded))
  693. if err := json.NewDecoder(authJson).Decode(&config); err != nil {
  694. // for a search it is not an error if no auth was given
  695. // to increase compatibility with the existing api it is defaulting to be empty
  696. config = &cliconfig.AuthConfig{}
  697. }
  698. }
  699. for k, v := range r.Header {
  700. if strings.HasPrefix(k, "X-Meta-") {
  701. headers[k] = v
  702. }
  703. }
  704. query, err := s.daemon.RegistryService.Search(r.Form.Get("term"), config, headers)
  705. if err != nil {
  706. return err
  707. }
  708. return json.NewEncoder(w).Encode(query.Results)
  709. }
  710. func (s *Server) postImagesPush(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  711. if vars == nil {
  712. return fmt.Errorf("Missing parameter")
  713. }
  714. metaHeaders := map[string][]string{}
  715. for k, v := range r.Header {
  716. if strings.HasPrefix(k, "X-Meta-") {
  717. metaHeaders[k] = v
  718. }
  719. }
  720. if err := parseForm(r); err != nil {
  721. return err
  722. }
  723. authConfig := &cliconfig.AuthConfig{}
  724. authEncoded := r.Header.Get("X-Registry-Auth")
  725. if authEncoded != "" {
  726. // the new format is to handle the authConfig as a header
  727. authJson := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded))
  728. if err := json.NewDecoder(authJson).Decode(authConfig); err != nil {
  729. // to increase compatibility to existing api it is defaulting to be empty
  730. authConfig = &cliconfig.AuthConfig{}
  731. }
  732. } else {
  733. // the old format is supported for compatibility if there was no authConfig header
  734. if err := json.NewDecoder(r.Body).Decode(authConfig); err != nil {
  735. return fmt.Errorf("Bad parameters and missing X-Registry-Auth: %v", err)
  736. }
  737. }
  738. useJSON := version.GreaterThan("1.0")
  739. name := vars["name"]
  740. imagePushConfig := &graph.ImagePushConfig{
  741. MetaHeaders: metaHeaders,
  742. AuthConfig: authConfig,
  743. Tag: r.Form.Get("tag"),
  744. OutStream: utils.NewWriteFlusher(w),
  745. Json: useJSON,
  746. }
  747. if useJSON {
  748. w.Header().Set("Content-Type", "application/json")
  749. }
  750. if err := s.daemon.Repositories().Push(name, imagePushConfig); err != nil {
  751. sf := streamformatter.NewStreamFormatter(useJSON)
  752. return fmt.Errorf(string(sf.FormatError(err)))
  753. }
  754. return nil
  755. }
  756. func (s *Server) getImagesGet(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  757. if vars == nil {
  758. return fmt.Errorf("Missing parameter")
  759. }
  760. if err := parseForm(r); err != nil {
  761. return err
  762. }
  763. useJSON := version.GreaterThan("1.0")
  764. if useJSON {
  765. w.Header().Set("Content-Type", "application/x-tar")
  766. }
  767. output := utils.NewWriteFlusher(w)
  768. imageExportConfig := &graph.ImageExportConfig{
  769. Engine: eng,
  770. Outstream: output,
  771. }
  772. if name, ok := vars["name"]; ok {
  773. imageExportConfig.Names = []string{name}
  774. } else {
  775. imageExportConfig.Names = r.Form["names"]
  776. }
  777. if err := s.daemon.Repositories().ImageExport(imageExportConfig); err != nil {
  778. if !output.Flushed() {
  779. return err
  780. }
  781. sf := streamformatter.NewStreamFormatter(useJSON)
  782. output.Write(sf.FormatError(err))
  783. }
  784. return nil
  785. }
  786. func (s *Server) postImagesLoad(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  787. imageLoadConfig := &graph.ImageLoadConfig{
  788. InTar: r.Body,
  789. OutStream: w,
  790. Engine: eng,
  791. }
  792. return s.daemon.Repositories().Load(imageLoadConfig)
  793. }
  794. func (s *Server) postContainersCreate(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  795. if err := parseForm(r); err != nil {
  796. return nil
  797. }
  798. if err := checkForJson(r); err != nil {
  799. return err
  800. }
  801. var (
  802. warnings []string
  803. name = r.Form.Get("name")
  804. )
  805. config, hostConfig, err := runconfig.DecodeContainerConfig(r.Body)
  806. if err != nil {
  807. return err
  808. }
  809. containerId, warnings, err := s.daemon.ContainerCreate(name, config, hostConfig)
  810. if err != nil {
  811. return err
  812. }
  813. return writeJSON(w, http.StatusCreated, &types.ContainerCreateResponse{
  814. ID: containerId,
  815. Warnings: warnings,
  816. })
  817. }
  818. func (s *Server) postContainersRestart(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  819. if err := parseForm(r); err != nil {
  820. return err
  821. }
  822. if vars == nil {
  823. return fmt.Errorf("Missing parameter")
  824. }
  825. timeout, err := strconv.Atoi(r.Form.Get("t"))
  826. if err != nil {
  827. return err
  828. }
  829. if err := s.daemon.ContainerRestart(vars["name"], timeout); err != nil {
  830. return err
  831. }
  832. w.WriteHeader(http.StatusNoContent)
  833. return nil
  834. }
  835. func (s *Server) postContainerRename(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  836. if err := parseForm(r); err != nil {
  837. return err
  838. }
  839. if vars == nil {
  840. return fmt.Errorf("Missing parameter")
  841. }
  842. name := vars["name"]
  843. newName := r.Form.Get("name")
  844. if err := s.daemon.ContainerRename(name, newName); err != nil {
  845. return err
  846. }
  847. w.WriteHeader(http.StatusNoContent)
  848. return nil
  849. }
  850. func (s *Server) deleteContainers(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  851. if err := parseForm(r); err != nil {
  852. return err
  853. }
  854. if vars == nil {
  855. return fmt.Errorf("Missing parameter")
  856. }
  857. name := vars["name"]
  858. config := &daemon.ContainerRmConfig{
  859. ForceRemove: boolValue(r, "force"),
  860. RemoveVolume: boolValue(r, "v"),
  861. RemoveLink: boolValue(r, "link"),
  862. }
  863. if err := s.daemon.ContainerRm(name, config); err != nil {
  864. // Force a 404 for the empty string
  865. if strings.Contains(strings.ToLower(err.Error()), "prefix can't be empty") {
  866. return fmt.Errorf("no such id: \"\"")
  867. }
  868. return err
  869. }
  870. w.WriteHeader(http.StatusNoContent)
  871. return nil
  872. }
  873. func (s *Server) deleteImages(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  874. if err := parseForm(r); err != nil {
  875. return err
  876. }
  877. if vars == nil {
  878. return fmt.Errorf("Missing parameter")
  879. }
  880. name := vars["name"]
  881. force := boolValue(r, "force")
  882. noprune := boolValue(r, "noprune")
  883. list, err := s.daemon.ImageDelete(name, force, noprune)
  884. if err != nil {
  885. return err
  886. }
  887. return writeJSON(w, http.StatusOK, list)
  888. }
  889. func (s *Server) postContainersStart(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  890. if vars == nil {
  891. return fmt.Errorf("Missing parameter")
  892. }
  893. // If contentLength is -1, we can assumed chunked encoding
  894. // or more technically that the length is unknown
  895. // https://golang.org/src/pkg/net/http/request.go#L139
  896. // net/http otherwise seems to swallow any headers related to chunked encoding
  897. // including r.TransferEncoding
  898. // allow a nil body for backwards compatibility
  899. var hostConfig *runconfig.HostConfig
  900. if r.Body != nil && (r.ContentLength > 0 || r.ContentLength == -1) {
  901. if err := checkForJson(r); err != nil {
  902. return err
  903. }
  904. c, err := runconfig.DecodeHostConfig(r.Body)
  905. if err != nil {
  906. return err
  907. }
  908. hostConfig = c
  909. }
  910. if err := s.daemon.ContainerStart(vars["name"], hostConfig); err != nil {
  911. if err.Error() == "Container already started" {
  912. w.WriteHeader(http.StatusNotModified)
  913. return nil
  914. }
  915. return err
  916. }
  917. w.WriteHeader(http.StatusNoContent)
  918. return nil
  919. }
  920. func (s *Server) postContainersStop(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  921. if err := parseForm(r); err != nil {
  922. return err
  923. }
  924. if vars == nil {
  925. return fmt.Errorf("Missing parameter")
  926. }
  927. seconds, err := strconv.Atoi(r.Form.Get("t"))
  928. if err != nil {
  929. return err
  930. }
  931. if err := s.daemon.ContainerStop(vars["name"], seconds); err != nil {
  932. if err.Error() == "Container already stopped" {
  933. w.WriteHeader(http.StatusNotModified)
  934. return nil
  935. }
  936. return err
  937. }
  938. w.WriteHeader(http.StatusNoContent)
  939. return nil
  940. }
  941. func (s *Server) postContainersWait(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  942. if vars == nil {
  943. return fmt.Errorf("Missing parameter")
  944. }
  945. name := vars["name"]
  946. cont, err := s.daemon.Get(name)
  947. if err != nil {
  948. return err
  949. }
  950. status, _ := cont.WaitStop(-1 * time.Second)
  951. return writeJSON(w, http.StatusOK, &types.ContainerWaitResponse{
  952. StatusCode: status,
  953. })
  954. }
  955. func (s *Server) postContainersResize(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  956. if err := parseForm(r); err != nil {
  957. return err
  958. }
  959. if vars == nil {
  960. return fmt.Errorf("Missing parameter")
  961. }
  962. height, err := strconv.Atoi(r.Form.Get("h"))
  963. if err != nil {
  964. return err
  965. }
  966. width, err := strconv.Atoi(r.Form.Get("w"))
  967. if err != nil {
  968. return err
  969. }
  970. cont, err := s.daemon.Get(vars["name"])
  971. if err != nil {
  972. return err
  973. }
  974. return cont.Resize(height, width)
  975. }
  976. func (s *Server) postContainersAttach(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  977. if err := parseForm(r); err != nil {
  978. return err
  979. }
  980. if vars == nil {
  981. return fmt.Errorf("Missing parameter")
  982. }
  983. cont, err := s.daemon.Get(vars["name"])
  984. if err != nil {
  985. return err
  986. }
  987. inStream, outStream, err := hijackServer(w)
  988. if err != nil {
  989. return err
  990. }
  991. defer closeStreams(inStream, outStream)
  992. var errStream io.Writer
  993. if _, ok := r.Header["Upgrade"]; ok {
  994. fmt.Fprintf(outStream, "HTTP/1.1 101 UPGRADED\r\nContent-Type: application/vnd.docker.raw-stream\r\nConnection: Upgrade\r\nUpgrade: tcp\r\n\r\n")
  995. } else {
  996. fmt.Fprintf(outStream, "HTTP/1.1 200 OK\r\nContent-Type: application/vnd.docker.raw-stream\r\n\r\n")
  997. }
  998. if !cont.Config.Tty && version.GreaterThanOrEqualTo("1.6") {
  999. errStream = stdcopy.NewStdWriter(outStream, stdcopy.Stderr)
  1000. outStream = stdcopy.NewStdWriter(outStream, stdcopy.Stdout)
  1001. } else {
  1002. errStream = outStream
  1003. }
  1004. logs := boolValue(r, "logs")
  1005. stream := boolValue(r, "stream")
  1006. var stdin io.ReadCloser
  1007. var stdout, stderr io.Writer
  1008. if boolValue(r, "stdin") {
  1009. stdin = inStream
  1010. }
  1011. if boolValue(r, "stdout") {
  1012. stdout = outStream
  1013. }
  1014. if boolValue(r, "stderr") {
  1015. stderr = errStream
  1016. }
  1017. if err := cont.AttachWithLogs(stdin, stdout, stderr, logs, stream); err != nil {
  1018. fmt.Fprintf(outStream, "Error attaching: %s\n", err)
  1019. }
  1020. return nil
  1021. }
  1022. func (s *Server) wsContainersAttach(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1023. if err := parseForm(r); err != nil {
  1024. return err
  1025. }
  1026. if vars == nil {
  1027. return fmt.Errorf("Missing parameter")
  1028. }
  1029. cont, err := s.daemon.Get(vars["name"])
  1030. if err != nil {
  1031. return err
  1032. }
  1033. h := websocket.Handler(func(ws *websocket.Conn) {
  1034. defer ws.Close()
  1035. logs := r.Form.Get("logs") != ""
  1036. stream := r.Form.Get("stream") != ""
  1037. if err := cont.AttachWithLogs(ws, ws, ws, logs, stream); err != nil {
  1038. logrus.Errorf("Error attaching websocket: %s", err)
  1039. }
  1040. })
  1041. h.ServeHTTP(w, r)
  1042. return nil
  1043. }
  1044. func (s *Server) getContainersByName(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1045. if vars == nil {
  1046. return fmt.Errorf("Missing parameter")
  1047. }
  1048. name := vars["name"]
  1049. if version.LessThan("1.12") {
  1050. containerJSONRaw, err := s.daemon.ContainerInspectRaw(name)
  1051. if err != nil {
  1052. return err
  1053. }
  1054. return writeJSON(w, http.StatusOK, containerJSONRaw)
  1055. }
  1056. containerJSON, err := s.daemon.ContainerInspect(name)
  1057. if err != nil {
  1058. return err
  1059. }
  1060. return writeJSON(w, http.StatusOK, containerJSON)
  1061. }
  1062. func (s *Server) getExecByID(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1063. if vars == nil {
  1064. return fmt.Errorf("Missing parameter 'id'")
  1065. }
  1066. eConfig, err := s.daemon.ContainerExecInspect(vars["id"])
  1067. if err != nil {
  1068. return err
  1069. }
  1070. return writeJSON(w, http.StatusOK, eConfig)
  1071. }
  1072. func (s *Server) getImagesByName(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1073. if vars == nil {
  1074. return fmt.Errorf("Missing parameter")
  1075. }
  1076. var job = eng.Job("image_inspect", vars["name"])
  1077. if version.LessThan("1.12") {
  1078. job.SetenvBool("raw", true)
  1079. }
  1080. streamJSON(job.Stdout, w, false)
  1081. return job.Run()
  1082. }
  1083. func (s *Server) postBuild(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1084. if version.LessThan("1.3") {
  1085. return fmt.Errorf("Multipart upload for build is no longer supported. Please upgrade your docker client.")
  1086. }
  1087. var (
  1088. authEncoded = r.Header.Get("X-Registry-Auth")
  1089. authConfig = &cliconfig.AuthConfig{}
  1090. configFileEncoded = r.Header.Get("X-Registry-Config")
  1091. configFile = &cliconfig.ConfigFile{}
  1092. buildConfig = builder.NewBuildConfig()
  1093. )
  1094. // This block can be removed when API versions prior to 1.9 are deprecated.
  1095. // Both headers will be parsed and sent along to the daemon, but if a non-empty
  1096. // ConfigFile is present, any value provided as an AuthConfig directly will
  1097. // be overridden. See BuildFile::CmdFrom for details.
  1098. if version.LessThan("1.9") && authEncoded != "" {
  1099. authJson := base64.NewDecoder(base64.URLEncoding, strings.NewReader(authEncoded))
  1100. if err := json.NewDecoder(authJson).Decode(authConfig); err != nil {
  1101. // for a pull it is not an error if no auth was given
  1102. // to increase compatibility with the existing api it is defaulting to be empty
  1103. authConfig = &cliconfig.AuthConfig{}
  1104. }
  1105. }
  1106. if configFileEncoded != "" {
  1107. configFileJson := base64.NewDecoder(base64.URLEncoding, strings.NewReader(configFileEncoded))
  1108. if err := json.NewDecoder(configFileJson).Decode(configFile); err != nil {
  1109. // for a pull it is not an error if no auth was given
  1110. // to increase compatibility with the existing api it is defaulting to be empty
  1111. configFile = &cliconfig.ConfigFile{}
  1112. }
  1113. }
  1114. if version.GreaterThanOrEqualTo("1.8") {
  1115. w.Header().Set("Content-Type", "application/json")
  1116. buildConfig.JSONFormat = true
  1117. }
  1118. if boolValue(r, "forcerm") && version.GreaterThanOrEqualTo("1.12") {
  1119. buildConfig.Remove = true
  1120. } else if r.FormValue("rm") == "" && version.GreaterThanOrEqualTo("1.12") {
  1121. buildConfig.Remove = true
  1122. } else {
  1123. buildConfig.Remove = boolValue(r, "rm")
  1124. }
  1125. if boolValue(r, "pull") && version.GreaterThanOrEqualTo("1.16") {
  1126. buildConfig.Pull = true
  1127. }
  1128. output := utils.NewWriteFlusher(w)
  1129. buildConfig.Stdout = output
  1130. buildConfig.Context = r.Body
  1131. buildConfig.RemoteURL = r.FormValue("remote")
  1132. buildConfig.DockerfileName = r.FormValue("dockerfile")
  1133. buildConfig.RepoName = r.FormValue("t")
  1134. buildConfig.SuppressOutput = boolValue(r, "q")
  1135. buildConfig.NoCache = boolValue(r, "nocache")
  1136. buildConfig.ForceRemove = boolValue(r, "forcerm")
  1137. buildConfig.AuthConfig = authConfig
  1138. buildConfig.ConfigFile = configFile
  1139. buildConfig.MemorySwap = int64Value(r, "memswap")
  1140. buildConfig.Memory = int64Value(r, "memory")
  1141. buildConfig.CpuShares = int64Value(r, "cpushares")
  1142. buildConfig.CpuSetCpus = r.FormValue("cpusetcpus")
  1143. buildConfig.CpuSetMems = r.FormValue("cpusetmems")
  1144. // Job cancellation. Note: not all job types support this.
  1145. if closeNotifier, ok := w.(http.CloseNotifier); ok {
  1146. finished := make(chan struct{})
  1147. defer close(finished)
  1148. go func() {
  1149. select {
  1150. case <-finished:
  1151. case <-closeNotifier.CloseNotify():
  1152. logrus.Infof("Client disconnected, cancelling job: build")
  1153. buildConfig.Cancel()
  1154. }
  1155. }()
  1156. }
  1157. if err := builder.Build(s.daemon, buildConfig); err != nil {
  1158. // Do not write the error in the http output if it's still empty.
  1159. // This prevents from writing a 200(OK) when there is an interal error.
  1160. if !output.Flushed() {
  1161. return err
  1162. }
  1163. sf := streamformatter.NewStreamFormatter(version.GreaterThanOrEqualTo("1.8"))
  1164. w.Write(sf.FormatError(err))
  1165. }
  1166. return nil
  1167. }
  1168. func (s *Server) postContainersCopy(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1169. if vars == nil {
  1170. return fmt.Errorf("Missing parameter")
  1171. }
  1172. if err := checkForJson(r); err != nil {
  1173. return err
  1174. }
  1175. cfg := types.CopyConfig{}
  1176. if err := json.NewDecoder(r.Body).Decode(&cfg); err != nil {
  1177. return err
  1178. }
  1179. if cfg.Resource == "" {
  1180. return fmt.Errorf("Path cannot be empty")
  1181. }
  1182. res := cfg.Resource
  1183. if res[0] == '/' {
  1184. res = res[1:]
  1185. }
  1186. cont, err := s.daemon.Get(vars["name"])
  1187. if err != nil {
  1188. logrus.Errorf("%v", err)
  1189. if strings.Contains(strings.ToLower(err.Error()), "no such id") {
  1190. w.WriteHeader(http.StatusNotFound)
  1191. return nil
  1192. }
  1193. }
  1194. data, err := cont.Copy(res)
  1195. if err != nil {
  1196. logrus.Errorf("%v", err)
  1197. if os.IsNotExist(err) {
  1198. return fmt.Errorf("Could not find the file %s in container %s", cfg.Resource, vars["name"])
  1199. }
  1200. return err
  1201. }
  1202. defer data.Close()
  1203. w.Header().Set("Content-Type", "application/x-tar")
  1204. if _, err := io.Copy(w, data); err != nil {
  1205. return err
  1206. }
  1207. return nil
  1208. }
  1209. func (s *Server) postContainerExecCreate(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1210. if err := parseForm(r); err != nil {
  1211. return nil
  1212. }
  1213. name := vars["name"]
  1214. execConfig := &runconfig.ExecConfig{}
  1215. if err := json.NewDecoder(r.Body).Decode(execConfig); err != nil {
  1216. return err
  1217. }
  1218. execConfig.Container = name
  1219. if len(execConfig.Cmd) == 0 {
  1220. return fmt.Errorf("No exec command specified")
  1221. }
  1222. // Register an instance of Exec in container.
  1223. id, err := s.daemon.ContainerExecCreate(execConfig)
  1224. if err != nil {
  1225. logrus.Errorf("Error setting up exec command in container %s: %s", name, err)
  1226. return err
  1227. }
  1228. return writeJSON(w, http.StatusCreated, &types.ContainerExecCreateResponse{
  1229. ID: id,
  1230. })
  1231. }
  1232. // TODO(vishh): Refactor the code to avoid having to specify stream config as part of both create and start.
  1233. func (s *Server) postContainerExecStart(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1234. if err := parseForm(r); err != nil {
  1235. return nil
  1236. }
  1237. var (
  1238. execName = vars["name"]
  1239. stdin io.ReadCloser
  1240. stdout io.Writer
  1241. stderr io.Writer
  1242. )
  1243. execStartCheck := &types.ExecStartCheck{}
  1244. if err := json.NewDecoder(r.Body).Decode(execStartCheck); err != nil {
  1245. return err
  1246. }
  1247. if !execStartCheck.Detach {
  1248. // Setting up the streaming http interface.
  1249. inStream, outStream, err := hijackServer(w)
  1250. if err != nil {
  1251. return err
  1252. }
  1253. defer closeStreams(inStream, outStream)
  1254. var errStream io.Writer
  1255. if _, ok := r.Header["Upgrade"]; ok {
  1256. fmt.Fprintf(outStream, "HTTP/1.1 101 UPGRADED\r\nContent-Type: application/vnd.docker.raw-stream\r\nConnection: Upgrade\r\nUpgrade: tcp\r\n\r\n")
  1257. } else {
  1258. fmt.Fprintf(outStream, "HTTP/1.1 200 OK\r\nContent-Type: application/vnd.docker.raw-stream\r\n\r\n")
  1259. }
  1260. if !execStartCheck.Tty && version.GreaterThanOrEqualTo("1.6") {
  1261. errStream = stdcopy.NewStdWriter(outStream, stdcopy.Stderr)
  1262. outStream = stdcopy.NewStdWriter(outStream, stdcopy.Stdout)
  1263. } else {
  1264. errStream = outStream
  1265. }
  1266. stdin = inStream
  1267. stdout = outStream
  1268. stderr = errStream
  1269. }
  1270. // Now run the user process in container.
  1271. if err := s.daemon.ContainerExecStart(execName, stdin, stdout, stderr); err != nil {
  1272. logrus.Errorf("Error starting exec command in container %s: %s", execName, err)
  1273. return err
  1274. }
  1275. w.WriteHeader(http.StatusNoContent)
  1276. return nil
  1277. }
  1278. func (s *Server) postContainerExecResize(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1279. if err := parseForm(r); err != nil {
  1280. return err
  1281. }
  1282. if vars == nil {
  1283. return fmt.Errorf("Missing parameter")
  1284. }
  1285. height, err := strconv.Atoi(r.Form.Get("h"))
  1286. if err != nil {
  1287. return err
  1288. }
  1289. width, err := strconv.Atoi(r.Form.Get("w"))
  1290. if err != nil {
  1291. return err
  1292. }
  1293. return s.daemon.ContainerExecResize(vars["name"], height, width)
  1294. }
  1295. func (s *Server) optionsHandler(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1296. w.WriteHeader(http.StatusOK)
  1297. return nil
  1298. }
  1299. func writeCorsHeaders(w http.ResponseWriter, r *http.Request, corsHeaders string) {
  1300. logrus.Debugf("CORS header is enabled and set to: %s", corsHeaders)
  1301. w.Header().Add("Access-Control-Allow-Origin", corsHeaders)
  1302. w.Header().Add("Access-Control-Allow-Headers", "Origin, X-Requested-With, Content-Type, Accept, X-Registry-Auth")
  1303. w.Header().Add("Access-Control-Allow-Methods", "GET, POST, DELETE, PUT, OPTIONS")
  1304. }
  1305. func (s *Server) ping(eng *engine.Engine, version version.Version, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  1306. _, err := w.Write([]byte{'O', 'K'})
  1307. return err
  1308. }
  1309. func makeHttpHandler(eng *engine.Engine, logging bool, localMethod string, localRoute string, handlerFunc HttpApiFunc, corsHeaders string, dockerVersion version.Version) http.HandlerFunc {
  1310. return func(w http.ResponseWriter, r *http.Request) {
  1311. // log the request
  1312. logrus.Debugf("Calling %s %s", localMethod, localRoute)
  1313. if logging {
  1314. logrus.Infof("%s %s", r.Method, r.RequestURI)
  1315. }
  1316. if strings.Contains(r.Header.Get("User-Agent"), "Docker-Client/") {
  1317. userAgent := strings.Split(r.Header.Get("User-Agent"), "/")
  1318. if len(userAgent) == 2 && !dockerVersion.Equal(version.Version(userAgent[1])) {
  1319. logrus.Debugf("Warning: client and server don't have the same version (client: %s, server: %s)", userAgent[1], dockerVersion)
  1320. }
  1321. }
  1322. version := version.Version(mux.Vars(r)["version"])
  1323. if version == "" {
  1324. version = api.APIVERSION
  1325. }
  1326. if corsHeaders != "" {
  1327. writeCorsHeaders(w, r, corsHeaders)
  1328. }
  1329. if version.GreaterThan(api.APIVERSION) {
  1330. http.Error(w, fmt.Errorf("client and server don't have same version (client API version: %s, server API version: %s)", version, api.APIVERSION).Error(), http.StatusNotFound)
  1331. return
  1332. }
  1333. if err := handlerFunc(eng, version, w, r, mux.Vars(r)); err != nil {
  1334. logrus.Errorf("Handler for %s %s returned error: %s", localMethod, localRoute, err)
  1335. httpError(w, err)
  1336. }
  1337. }
  1338. }
  1339. // we keep enableCors just for legacy usage, need to be removed in the future
  1340. func createRouter(s *Server, eng *engine.Engine) *mux.Router {
  1341. r := mux.NewRouter()
  1342. if os.Getenv("DEBUG") != "" {
  1343. ProfilerSetup(r, "/debug/")
  1344. }
  1345. m := map[string]map[string]HttpApiFunc{
  1346. "GET": {
  1347. "/_ping": s.ping,
  1348. "/events": s.getEvents,
  1349. "/info": s.getInfo,
  1350. "/version": s.getVersion,
  1351. "/images/json": s.getImagesJSON,
  1352. "/images/viz": s.getImagesViz,
  1353. "/images/search": s.getImagesSearch,
  1354. "/images/get": s.getImagesGet,
  1355. "/images/{name:.*}/get": s.getImagesGet,
  1356. "/images/{name:.*}/history": s.getImagesHistory,
  1357. "/images/{name:.*}/json": s.getImagesByName,
  1358. "/containers/ps": s.getContainersJSON,
  1359. "/containers/json": s.getContainersJSON,
  1360. "/containers/{name:.*}/export": s.getContainersExport,
  1361. "/containers/{name:.*}/changes": s.getContainersChanges,
  1362. "/containers/{name:.*}/json": s.getContainersByName,
  1363. "/containers/{name:.*}/top": s.getContainersTop,
  1364. "/containers/{name:.*}/logs": s.getContainersLogs,
  1365. "/containers/{name:.*}/stats": s.getContainersStats,
  1366. "/containers/{name:.*}/attach/ws": s.wsContainersAttach,
  1367. "/exec/{id:.*}/json": s.getExecByID,
  1368. },
  1369. "POST": {
  1370. "/auth": s.postAuth,
  1371. "/commit": s.postCommit,
  1372. "/build": s.postBuild,
  1373. "/images/create": s.postImagesCreate,
  1374. "/images/load": s.postImagesLoad,
  1375. "/images/{name:.*}/push": s.postImagesPush,
  1376. "/images/{name:.*}/tag": s.postImagesTag,
  1377. "/containers/create": s.postContainersCreate,
  1378. "/containers/{name:.*}/kill": s.postContainersKill,
  1379. "/containers/{name:.*}/pause": s.postContainersPause,
  1380. "/containers/{name:.*}/unpause": s.postContainersUnpause,
  1381. "/containers/{name:.*}/restart": s.postContainersRestart,
  1382. "/containers/{name:.*}/start": s.postContainersStart,
  1383. "/containers/{name:.*}/stop": s.postContainersStop,
  1384. "/containers/{name:.*}/wait": s.postContainersWait,
  1385. "/containers/{name:.*}/resize": s.postContainersResize,
  1386. "/containers/{name:.*}/attach": s.postContainersAttach,
  1387. "/containers/{name:.*}/copy": s.postContainersCopy,
  1388. "/containers/{name:.*}/exec": s.postContainerExecCreate,
  1389. "/exec/{name:.*}/start": s.postContainerExecStart,
  1390. "/exec/{name:.*}/resize": s.postContainerExecResize,
  1391. "/containers/{name:.*}/rename": s.postContainerRename,
  1392. },
  1393. "DELETE": {
  1394. "/containers/{name:.*}": s.deleteContainers,
  1395. "/images/{name:.*}": s.deleteImages,
  1396. },
  1397. "OPTIONS": {
  1398. "": s.optionsHandler,
  1399. },
  1400. }
  1401. // If "api-cors-header" is not given, but "api-enable-cors" is true, we set cors to "*"
  1402. // otherwise, all head values will be passed to HTTP handler
  1403. corsHeaders := s.cfg.CorsHeaders
  1404. if corsHeaders == "" && s.cfg.EnableCors {
  1405. corsHeaders = "*"
  1406. }
  1407. for method, routes := range m {
  1408. for route, fct := range routes {
  1409. logrus.Debugf("Registering %s, %s", method, route)
  1410. // NOTE: scope issue, make sure the variables are local and won't be changed
  1411. localRoute := route
  1412. localFct := fct
  1413. localMethod := method
  1414. // build the handler function
  1415. f := makeHttpHandler(eng, s.cfg.Logging, localMethod, localRoute, localFct, corsHeaders, version.Version(s.cfg.Version))
  1416. // add the new route
  1417. if localRoute == "" {
  1418. r.Methods(localMethod).HandlerFunc(f)
  1419. } else {
  1420. r.Path("/v{version:[0-9.]+}" + localRoute).Methods(localMethod).HandlerFunc(f)
  1421. r.Path(localRoute).Methods(localMethod).HandlerFunc(f)
  1422. }
  1423. }
  1424. }
  1425. return r
  1426. }
  1427. // ServeRequest processes a single http request to the docker remote api.
  1428. // FIXME: refactor this to be part of Server and not require re-creating a new
  1429. // router each time. This requires first moving ListenAndServe into Server.
  1430. func ServeRequest(eng *engine.Engine, apiversion version.Version, w http.ResponseWriter, req *http.Request) {
  1431. cfg := &ServerConfig{
  1432. EnableCors: true,
  1433. Version: string(apiversion),
  1434. }
  1435. api := New(cfg, eng)
  1436. daemon, _ := eng.HackGetGlobalVar("httpapi.daemon").(*daemon.Daemon)
  1437. api.AcceptConnections(daemon)
  1438. router := createRouter(api, eng)
  1439. // Insert APIVERSION into the request as a convenience
  1440. req.URL.Path = fmt.Sprintf("/v%s%s", apiversion, req.URL.Path)
  1441. router.ServeHTTP(w, req)
  1442. }
  1443. func allocateDaemonPort(addr string) error {
  1444. host, port, err := net.SplitHostPort(addr)
  1445. if err != nil {
  1446. return err
  1447. }
  1448. intPort, err := strconv.Atoi(port)
  1449. if err != nil {
  1450. return err
  1451. }
  1452. var hostIPs []net.IP
  1453. if parsedIP := net.ParseIP(host); parsedIP != nil {
  1454. hostIPs = append(hostIPs, parsedIP)
  1455. } else if hostIPs, err = net.LookupIP(host); err != nil {
  1456. return fmt.Errorf("failed to lookup %s address in host specification", host)
  1457. }
  1458. for _, hostIP := range hostIPs {
  1459. if _, err := bridge.RequestPort(hostIP, "tcp", intPort); err != nil {
  1460. return fmt.Errorf("failed to allocate daemon listening port %d (err: %v)", intPort, err)
  1461. }
  1462. }
  1463. return nil
  1464. }