exec.go 5.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176
  1. package container // import "github.com/docker/docker/api/server/router/container"
  2. import (
  3. "context"
  4. "fmt"
  5. "io"
  6. "net/http"
  7. "strconv"
  8. "github.com/containerd/log"
  9. "github.com/docker/docker/api/server/httputils"
  10. "github.com/docker/docker/api/types"
  11. "github.com/docker/docker/api/types/container"
  12. "github.com/docker/docker/api/types/versions"
  13. "github.com/docker/docker/errdefs"
  14. "github.com/docker/docker/pkg/stdcopy"
  15. )
  16. func (s *containerRouter) getExecByID(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  17. eConfig, err := s.backend.ContainerExecInspect(vars["id"])
  18. if err != nil {
  19. return err
  20. }
  21. return httputils.WriteJSON(w, http.StatusOK, eConfig)
  22. }
  23. type execCommandError struct{}
  24. func (execCommandError) Error() string {
  25. return "No exec command specified"
  26. }
  27. func (execCommandError) InvalidParameter() {}
  28. func (s *containerRouter) postContainerExecCreate(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  29. if err := httputils.ParseForm(r); err != nil {
  30. return err
  31. }
  32. execConfig := &types.ExecConfig{}
  33. if err := httputils.ReadJSON(r, execConfig); err != nil {
  34. return err
  35. }
  36. if len(execConfig.Cmd) == 0 {
  37. return execCommandError{}
  38. }
  39. version := httputils.VersionFromContext(ctx)
  40. if versions.LessThan(version, "1.42") {
  41. // Not supported by API versions before 1.42
  42. execConfig.ConsoleSize = nil
  43. }
  44. // Register an instance of Exec in container.
  45. id, err := s.backend.ContainerExecCreate(vars["name"], execConfig)
  46. if err != nil {
  47. log.G(ctx).Errorf("Error setting up exec command in container %s: %v", vars["name"], err)
  48. return err
  49. }
  50. return httputils.WriteJSON(w, http.StatusCreated, &types.IDResponse{
  51. ID: id,
  52. })
  53. }
  54. // TODO(vishh): Refactor the code to avoid having to specify stream config as part of both create and start.
  55. func (s *containerRouter) postContainerExecStart(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  56. if err := httputils.ParseForm(r); err != nil {
  57. return err
  58. }
  59. version := httputils.VersionFromContext(ctx)
  60. if versions.LessThan(version, "1.22") {
  61. // API versions before 1.22 did not enforce application/json content-type.
  62. // Allow older clients to work by patching the content-type.
  63. if r.Header.Get("Content-Type") != "application/json" {
  64. r.Header.Set("Content-Type", "application/json")
  65. }
  66. }
  67. var (
  68. execName = vars["name"]
  69. stdin, inStream io.ReadCloser
  70. stdout, stderr, outStream io.Writer
  71. )
  72. execStartCheck := &types.ExecStartCheck{}
  73. if err := httputils.ReadJSON(r, execStartCheck); err != nil {
  74. return err
  75. }
  76. if exists, err := s.backend.ExecExists(execName); !exists {
  77. return err
  78. }
  79. if execStartCheck.ConsoleSize != nil {
  80. // Not supported before 1.42
  81. if versions.LessThan(version, "1.42") {
  82. execStartCheck.ConsoleSize = nil
  83. }
  84. // No console without tty
  85. if !execStartCheck.Tty {
  86. execStartCheck.ConsoleSize = nil
  87. }
  88. }
  89. if !execStartCheck.Detach {
  90. var err error
  91. // Setting up the streaming http interface.
  92. inStream, outStream, err = httputils.HijackConnection(w)
  93. if err != nil {
  94. return err
  95. }
  96. defer httputils.CloseStreams(inStream, outStream)
  97. if _, ok := r.Header["Upgrade"]; ok {
  98. contentType := types.MediaTypeRawStream
  99. if !execStartCheck.Tty && versions.GreaterThanOrEqualTo(httputils.VersionFromContext(ctx), "1.42") {
  100. contentType = types.MediaTypeMultiplexedStream
  101. }
  102. fmt.Fprint(outStream, "HTTP/1.1 101 UPGRADED\r\nContent-Type: "+contentType+"\r\nConnection: Upgrade\r\nUpgrade: tcp\r\n")
  103. } else {
  104. fmt.Fprint(outStream, "HTTP/1.1 200 OK\r\nContent-Type: application/vnd.docker.raw-stream\r\n")
  105. }
  106. // copy headers that were removed as part of hijack
  107. if err := w.Header().WriteSubset(outStream, nil); err != nil {
  108. return err
  109. }
  110. fmt.Fprint(outStream, "\r\n")
  111. stdin = inStream
  112. stdout = outStream
  113. if !execStartCheck.Tty {
  114. stderr = stdcopy.NewStdWriter(outStream, stdcopy.Stderr)
  115. stdout = stdcopy.NewStdWriter(outStream, stdcopy.Stdout)
  116. }
  117. }
  118. options := container.ExecStartOptions{
  119. Stdin: stdin,
  120. Stdout: stdout,
  121. Stderr: stderr,
  122. ConsoleSize: execStartCheck.ConsoleSize,
  123. }
  124. // Now run the user process in container.
  125. // Maybe we should we pass ctx here if we're not detaching?
  126. if err := s.backend.ContainerExecStart(context.Background(), execName, options); err != nil {
  127. if execStartCheck.Detach {
  128. return err
  129. }
  130. stdout.Write([]byte(err.Error() + "\r\n"))
  131. log.G(ctx).Errorf("Error running exec %s in container: %v", execName, err)
  132. }
  133. return nil
  134. }
  135. func (s *containerRouter) postContainerExecResize(ctx context.Context, w http.ResponseWriter, r *http.Request, vars map[string]string) error {
  136. if err := httputils.ParseForm(r); err != nil {
  137. return err
  138. }
  139. height, err := strconv.Atoi(r.Form.Get("h"))
  140. if err != nil {
  141. return errdefs.InvalidParameter(err)
  142. }
  143. width, err := strconv.Atoi(r.Form.Get("w"))
  144. if err != nil {
  145. return errdefs.InvalidParameter(err)
  146. }
  147. return s.backend.ContainerExecResize(vars["name"], height, width)
  148. }