123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523 |
- package dockerfile
- // internals for handling commands. Covers many areas and a lot of
- // non-contiguous functionality. Please read the comments.
- import (
- "crypto/sha256"
- "encoding/hex"
- "fmt"
- "io"
- "os"
- "path"
- "path/filepath"
- "strconv"
- "strings"
- "github.com/docker/docker/api/types"
- "github.com/docker/docker/api/types/backend"
- "github.com/docker/docker/api/types/container"
- "github.com/docker/docker/image"
- "github.com/docker/docker/pkg/archive"
- "github.com/docker/docker/pkg/chrootarchive"
- "github.com/docker/docker/pkg/containerfs"
- "github.com/docker/docker/pkg/idtools"
- "github.com/docker/docker/pkg/stringid"
- "github.com/docker/docker/pkg/symlink"
- "github.com/docker/docker/pkg/system"
- lcUser "github.com/opencontainers/runc/libcontainer/user"
- "github.com/pkg/errors"
- )
- // Archiver defines an interface for copying files from one destination to
- // another using Tar/Untar.
- type Archiver interface {
- TarUntar(src, dst string) error
- UntarPath(src, dst string) error
- CopyWithTar(src, dst string) error
- CopyFileWithTar(src, dst string) error
- IDMappings() *idtools.IDMappings
- }
- // The builder will use the following interfaces if the container fs implements
- // these for optimized copies to and from the container.
- type extractor interface {
- ExtractArchive(src io.Reader, dst string, opts *archive.TarOptions) error
- }
- type archiver interface {
- ArchivePath(src string, opts *archive.TarOptions) (io.ReadCloser, error)
- }
- // helper functions to get tar/untar func
- func untarFunc(i interface{}) containerfs.UntarFunc {
- if ea, ok := i.(extractor); ok {
- return ea.ExtractArchive
- }
- return chrootarchive.Untar
- }
- func tarFunc(i interface{}) containerfs.TarFunc {
- if ap, ok := i.(archiver); ok {
- return ap.ArchivePath
- }
- return archive.TarWithOptions
- }
- func (b *Builder) getArchiver(src, dst containerfs.Driver) Archiver {
- t, u := tarFunc(src), untarFunc(dst)
- return &containerfs.Archiver{
- SrcDriver: src,
- DstDriver: dst,
- Tar: t,
- Untar: u,
- IDMappingsVar: b.idMappings,
- }
- }
- func (b *Builder) commit(dispatchState *dispatchState, comment string) error {
- if b.disableCommit {
- return nil
- }
- if !dispatchState.hasFromImage() {
- return errors.New("Please provide a source image with `from` prior to commit")
- }
- runConfigWithCommentCmd := copyRunConfig(dispatchState.runConfig, withCmdComment(comment, b.platform))
- hit, err := b.probeCache(dispatchState, runConfigWithCommentCmd)
- if err != nil || hit {
- return err
- }
- id, err := b.create(runConfigWithCommentCmd)
- if err != nil {
- return err
- }
- return b.commitContainer(dispatchState, id, runConfigWithCommentCmd)
- }
- func (b *Builder) commitContainer(dispatchState *dispatchState, id string, containerConfig *container.Config) error {
- if b.disableCommit {
- return nil
- }
- commitCfg := &backend.ContainerCommitConfig{
- ContainerCommitConfig: types.ContainerCommitConfig{
- Author: dispatchState.maintainer,
- Pause: true,
- // TODO: this should be done by Commit()
- Config: copyRunConfig(dispatchState.runConfig),
- },
- ContainerConfig: containerConfig,
- }
- // Commit the container
- imageID, err := b.docker.Commit(id, commitCfg)
- if err != nil {
- return err
- }
- dispatchState.imageID = imageID
- return nil
- }
- func (b *Builder) exportImage(state *dispatchState, imageMount *imageMount, runConfig *container.Config) error {
- newLayer, err := imageMount.Layer().Commit(b.platform)
- if err != nil {
- return err
- }
- // add an image mount without an image so the layer is properly unmounted
- // if there is an error before we can add the full mount with image
- b.imageSources.Add(newImageMount(nil, newLayer))
- parentImage, ok := imageMount.Image().(*image.Image)
- if !ok {
- return errors.Errorf("unexpected image type")
- }
- newImage := image.NewChildImage(parentImage, image.ChildConfig{
- Author: state.maintainer,
- ContainerConfig: runConfig,
- DiffID: newLayer.DiffID(),
- Config: copyRunConfig(state.runConfig),
- }, parentImage.OS)
- // TODO: it seems strange to marshal this here instead of just passing in the
- // image struct
- config, err := newImage.MarshalJSON()
- if err != nil {
- return errors.Wrap(err, "failed to encode image config")
- }
- exportedImage, err := b.docker.CreateImage(config, state.imageID, parentImage.OS)
- if err != nil {
- return errors.Wrapf(err, "failed to export image")
- }
- state.imageID = exportedImage.ImageID()
- b.imageSources.Add(newImageMount(exportedImage, newLayer))
- return nil
- }
- func (b *Builder) performCopy(state *dispatchState, inst copyInstruction) error {
- srcHash := getSourceHashFromInfos(inst.infos)
- var chownComment string
- if inst.chownStr != "" {
- chownComment = fmt.Sprintf("--chown=%s", inst.chownStr)
- }
- commentStr := fmt.Sprintf("%s %s%s in %s ", inst.cmdName, chownComment, srcHash, inst.dest)
- // TODO: should this have been using origPaths instead of srcHash in the comment?
- runConfigWithCommentCmd := copyRunConfig(
- state.runConfig,
- withCmdCommentString(commentStr, b.platform))
- hit, err := b.probeCache(state, runConfigWithCommentCmd)
- if err != nil || hit {
- return err
- }
- imageMount, err := b.imageSources.Get(state.imageID, true)
- if err != nil {
- return errors.Wrapf(err, "failed to get destination image %q", state.imageID)
- }
- destInfo, err := createDestInfo(state.runConfig.WorkingDir, inst, imageMount, b.platform)
- if err != nil {
- return err
- }
- chownPair := b.idMappings.RootPair()
- // if a chown was requested, perform the steps to get the uid, gid
- // translated (if necessary because of user namespaces), and replace
- // the root pair with the chown pair for copy operations
- if inst.chownStr != "" {
- chownPair, err = parseChownFlag(inst.chownStr, destInfo.root.Path(), b.idMappings)
- if err != nil {
- return errors.Wrapf(err, "unable to convert uid/gid chown string to host mapping")
- }
- }
- for _, info := range inst.infos {
- opts := copyFileOptions{
- decompress: inst.allowLocalDecompression,
- archiver: b.getArchiver(info.root, destInfo.root),
- chownPair: chownPair,
- }
- if err := performCopyForInfo(destInfo, info, opts); err != nil {
- return errors.Wrapf(err, "failed to copy files")
- }
- }
- return b.exportImage(state, imageMount, runConfigWithCommentCmd)
- }
- func parseChownFlag(chown, ctrRootPath string, idMappings *idtools.IDMappings) (idtools.IDPair, error) {
- var userStr, grpStr string
- parts := strings.Split(chown, ":")
- if len(parts) > 2 {
- return idtools.IDPair{}, errors.New("invalid chown string format: " + chown)
- }
- if len(parts) == 1 {
- // if no group specified, use the user spec as group as well
- userStr, grpStr = parts[0], parts[0]
- } else {
- userStr, grpStr = parts[0], parts[1]
- }
- passwdPath, err := symlink.FollowSymlinkInScope(filepath.Join(ctrRootPath, "etc", "passwd"), ctrRootPath)
- if err != nil {
- return idtools.IDPair{}, errors.Wrapf(err, "can't resolve /etc/passwd path in container rootfs")
- }
- groupPath, err := symlink.FollowSymlinkInScope(filepath.Join(ctrRootPath, "etc", "group"), ctrRootPath)
- if err != nil {
- return idtools.IDPair{}, errors.Wrapf(err, "can't resolve /etc/group path in container rootfs")
- }
- uid, err := lookupUser(userStr, passwdPath)
- if err != nil {
- return idtools.IDPair{}, errors.Wrapf(err, "can't find uid for user "+userStr)
- }
- gid, err := lookupGroup(grpStr, groupPath)
- if err != nil {
- return idtools.IDPair{}, errors.Wrapf(err, "can't find gid for group "+grpStr)
- }
- // convert as necessary because of user namespaces
- chownPair, err := idMappings.ToHost(idtools.IDPair{UID: uid, GID: gid})
- if err != nil {
- return idtools.IDPair{}, errors.Wrapf(err, "unable to convert uid/gid to host mapping")
- }
- return chownPair, nil
- }
- func lookupUser(userStr, filepath string) (int, error) {
- // if the string is actually a uid integer, parse to int and return
- // as we don't need to translate with the help of files
- uid, err := strconv.Atoi(userStr)
- if err == nil {
- return uid, nil
- }
- users, err := lcUser.ParsePasswdFileFilter(filepath, func(u lcUser.User) bool {
- return u.Name == userStr
- })
- if err != nil {
- return 0, err
- }
- if len(users) == 0 {
- return 0, errors.New("no such user: " + userStr)
- }
- return users[0].Uid, nil
- }
- func lookupGroup(groupStr, filepath string) (int, error) {
- // if the string is actually a gid integer, parse to int and return
- // as we don't need to translate with the help of files
- gid, err := strconv.Atoi(groupStr)
- if err == nil {
- return gid, nil
- }
- groups, err := lcUser.ParseGroupFileFilter(filepath, func(g lcUser.Group) bool {
- return g.Name == groupStr
- })
- if err != nil {
- return 0, err
- }
- if len(groups) == 0 {
- return 0, errors.New("no such group: " + groupStr)
- }
- return groups[0].Gid, nil
- }
- func createDestInfo(workingDir string, inst copyInstruction, imageMount *imageMount, platform string) (copyInfo, error) {
- // Twiddle the destination when it's a relative path - meaning, make it
- // relative to the WORKINGDIR
- dest, err := normalizeDest(workingDir, inst.dest, platform)
- if err != nil {
- return copyInfo{}, errors.Wrapf(err, "invalid %s", inst.cmdName)
- }
- destMount, err := imageMount.Source()
- if err != nil {
- return copyInfo{}, errors.Wrapf(err, "failed to mount copy source")
- }
- return newCopyInfoFromSource(destMount, dest, ""), nil
- }
- // normalizeDest normalises the destination of a COPY/ADD command in a
- // platform semantically consistent way.
- func normalizeDest(workingDir, requested string, platform string) (string, error) {
- dest := fromSlash(requested, platform)
- endsInSlash := strings.HasSuffix(dest, string(separator(platform)))
- if platform != "windows" {
- if !path.IsAbs(requested) {
- dest = path.Join("/", filepath.ToSlash(workingDir), dest)
- // Make sure we preserve any trailing slash
- if endsInSlash {
- dest += "/"
- }
- }
- return dest, nil
- }
- // We are guaranteed that the working directory is already consistent,
- // However, Windows also has, for now, the limitation that ADD/COPY can
- // only be done to the system drive, not any drives that might be present
- // as a result of a bind mount.
- //
- // So... if the path requested is Linux-style absolute (/foo or \\foo),
- // we assume it is the system drive. If it is a Windows-style absolute
- // (DRIVE:\\foo), error if DRIVE is not C. And finally, ensure we
- // strip any configured working directories drive letter so that it
- // can be subsequently legitimately converted to a Windows volume-style
- // pathname.
- // Not a typo - filepath.IsAbs, not system.IsAbs on this next check as
- // we only want to validate where the DriveColon part has been supplied.
- if filepath.IsAbs(dest) {
- if strings.ToUpper(string(dest[0])) != "C" {
- return "", fmt.Errorf("Windows does not support destinations not on the system drive (C:)")
- }
- dest = dest[2:] // Strip the drive letter
- }
- // Cannot handle relative where WorkingDir is not the system drive.
- if len(workingDir) > 0 {
- if ((len(workingDir) > 1) && !system.IsAbs(workingDir[2:])) || (len(workingDir) == 1) {
- return "", fmt.Errorf("Current WorkingDir %s is not platform consistent", workingDir)
- }
- if !system.IsAbs(dest) {
- if string(workingDir[0]) != "C" {
- return "", fmt.Errorf("Windows does not support relative paths when WORKDIR is not the system drive")
- }
- dest = filepath.Join(string(os.PathSeparator), workingDir[2:], dest)
- // Make sure we preserve any trailing slash
- if endsInSlash {
- dest += string(os.PathSeparator)
- }
- }
- }
- return dest, nil
- }
- // For backwards compat, if there's just one info then use it as the
- // cache look-up string, otherwise hash 'em all into one
- func getSourceHashFromInfos(infos []copyInfo) string {
- if len(infos) == 1 {
- return infos[0].hash
- }
- var hashs []string
- for _, info := range infos {
- hashs = append(hashs, info.hash)
- }
- return hashStringSlice("multi", hashs)
- }
- func hashStringSlice(prefix string, slice []string) string {
- hasher := sha256.New()
- hasher.Write([]byte(strings.Join(slice, ",")))
- return prefix + ":" + hex.EncodeToString(hasher.Sum(nil))
- }
- type runConfigModifier func(*container.Config)
- func copyRunConfig(runConfig *container.Config, modifiers ...runConfigModifier) *container.Config {
- copy := *runConfig
- for _, modifier := range modifiers {
- modifier(©)
- }
- return ©
- }
- func withCmd(cmd []string) runConfigModifier {
- return func(runConfig *container.Config) {
- runConfig.Cmd = cmd
- }
- }
- // withCmdComment sets Cmd to a nop comment string. See withCmdCommentString for
- // why there are two almost identical versions of this.
- func withCmdComment(comment string, platform string) runConfigModifier {
- return func(runConfig *container.Config) {
- runConfig.Cmd = append(getShell(runConfig, platform), "#(nop) ", comment)
- }
- }
- // withCmdCommentString exists to maintain compatibility with older versions.
- // A few instructions (workdir, copy, add) used a nop comment that is a single arg
- // where as all the other instructions used a two arg comment string. This
- // function implements the single arg version.
- func withCmdCommentString(comment string, platform string) runConfigModifier {
- return func(runConfig *container.Config) {
- runConfig.Cmd = append(getShell(runConfig, platform), "#(nop) "+comment)
- }
- }
- func withEnv(env []string) runConfigModifier {
- return func(runConfig *container.Config) {
- runConfig.Env = env
- }
- }
- // withEntrypointOverride sets an entrypoint on runConfig if the command is
- // not empty. The entrypoint is left unmodified if command is empty.
- //
- // The dockerfile RUN instruction expect to run without an entrypoint
- // so the runConfig entrypoint needs to be modified accordingly. ContainerCreate
- // will change a []string{""} entrypoint to nil, so we probe the cache with the
- // nil entrypoint.
- func withEntrypointOverride(cmd []string, entrypoint []string) runConfigModifier {
- return func(runConfig *container.Config) {
- if len(cmd) > 0 {
- runConfig.Entrypoint = entrypoint
- }
- }
- }
- // getShell is a helper function which gets the right shell for prefixing the
- // shell-form of RUN, ENTRYPOINT and CMD instructions
- func getShell(c *container.Config, platform string) []string {
- if 0 == len(c.Shell) {
- return append([]string{}, defaultShellForPlatform(platform)[:]...)
- }
- return append([]string{}, c.Shell[:]...)
- }
- func (b *Builder) probeCache(dispatchState *dispatchState, runConfig *container.Config) (bool, error) {
- cachedID, err := b.imageProber.Probe(dispatchState.imageID, runConfig)
- if cachedID == "" || err != nil {
- return false, err
- }
- fmt.Fprint(b.Stdout, " ---> Using cache\n")
- dispatchState.imageID = cachedID
- return true, nil
- }
- var defaultLogConfig = container.LogConfig{Type: "none"}
- func (b *Builder) probeAndCreate(dispatchState *dispatchState, runConfig *container.Config) (string, error) {
- if hit, err := b.probeCache(dispatchState, runConfig); err != nil || hit {
- return "", err
- }
- // Set a log config to override any default value set on the daemon
- hostConfig := &container.HostConfig{LogConfig: defaultLogConfig}
- container, err := b.containerManager.Create(runConfig, hostConfig, b.platform)
- return container.ID, err
- }
- func (b *Builder) create(runConfig *container.Config) (string, error) {
- hostConfig := hostConfigFromOptions(b.options)
- container, err := b.containerManager.Create(runConfig, hostConfig, b.platform)
- if err != nil {
- return "", err
- }
- // TODO: could this be moved into containerManager.Create() ?
- for _, warning := range container.Warnings {
- fmt.Fprintf(b.Stdout, " ---> [Warning] %s\n", warning)
- }
- fmt.Fprintf(b.Stdout, " ---> Running in %s\n", stringid.TruncateID(container.ID))
- return container.ID, nil
- }
- func hostConfigFromOptions(options *types.ImageBuildOptions) *container.HostConfig {
- resources := container.Resources{
- CgroupParent: options.CgroupParent,
- CPUShares: options.CPUShares,
- CPUPeriod: options.CPUPeriod,
- CPUQuota: options.CPUQuota,
- CpusetCpus: options.CPUSetCPUs,
- CpusetMems: options.CPUSetMems,
- Memory: options.Memory,
- MemorySwap: options.MemorySwap,
- Ulimits: options.Ulimits,
- }
- return &container.HostConfig{
- SecurityOpt: options.SecurityOpt,
- Isolation: options.Isolation,
- ShmSize: options.ShmSize,
- Resources: resources,
- NetworkMode: container.NetworkMode(options.NetworkMode),
- // Set a log config to override any default value set on the daemon
- LogConfig: defaultLogConfig,
- ExtraHosts: options.ExtraHosts,
- }
- }
- // fromSlash works like filepath.FromSlash but with a given OS platform field
- func fromSlash(path, platform string) string {
- if platform == "windows" {
- return strings.Replace(path, "/", "\\", -1)
- }
- return path
- }
- // separator returns a OS path separator for the given OS platform
- func separator(platform string) byte {
- if platform == "windows" {
- return '\\'
- }
- return '/'
- }
|