prune.go 7.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259
  1. package daemon // import "github.com/docker/docker/daemon"
  2. import (
  3. "context"
  4. "regexp"
  5. "strconv"
  6. "sync/atomic"
  7. "time"
  8. "github.com/containerd/log"
  9. "github.com/docker/docker/api/types"
  10. "github.com/docker/docker/api/types/backend"
  11. "github.com/docker/docker/api/types/events"
  12. "github.com/docker/docker/api/types/filters"
  13. timetypes "github.com/docker/docker/api/types/time"
  14. "github.com/docker/docker/errdefs"
  15. "github.com/docker/docker/libnetwork"
  16. "github.com/docker/docker/runconfig"
  17. "github.com/pkg/errors"
  18. )
  19. var (
  20. // errPruneRunning is returned when a prune request is received while
  21. // one is in progress
  22. errPruneRunning = errdefs.Conflict(errors.New("a prune operation is already running"))
  23. containersAcceptedFilters = map[string]bool{
  24. "label": true,
  25. "label!": true,
  26. "until": true,
  27. }
  28. networksAcceptedFilters = map[string]bool{
  29. "label": true,
  30. "label!": true,
  31. "until": true,
  32. }
  33. )
  34. // ContainersPrune removes unused containers
  35. func (daemon *Daemon) ContainersPrune(ctx context.Context, pruneFilters filters.Args) (*types.ContainersPruneReport, error) {
  36. if !atomic.CompareAndSwapInt32(&daemon.pruneRunning, 0, 1) {
  37. return nil, errPruneRunning
  38. }
  39. defer atomic.StoreInt32(&daemon.pruneRunning, 0)
  40. rep := &types.ContainersPruneReport{}
  41. // make sure that only accepted filters have been received
  42. err := pruneFilters.Validate(containersAcceptedFilters)
  43. if err != nil {
  44. return nil, err
  45. }
  46. until, err := getUntilFromPruneFilters(pruneFilters)
  47. if err != nil {
  48. return nil, err
  49. }
  50. cfg := &daemon.config().Config
  51. allContainers := daemon.List()
  52. for _, c := range allContainers {
  53. select {
  54. case <-ctx.Done():
  55. log.G(ctx).Debugf("ContainersPrune operation cancelled: %#v", *rep)
  56. return rep, nil
  57. default:
  58. }
  59. if !c.IsRunning() {
  60. if !until.IsZero() && c.Created.After(until) {
  61. continue
  62. }
  63. if !matchLabels(pruneFilters, c.Config.Labels) {
  64. continue
  65. }
  66. cSize, _, err := daemon.imageService.GetContainerLayerSize(ctx, c.ID)
  67. if err != nil {
  68. return nil, err
  69. }
  70. // TODO: sets RmLink to true?
  71. err = daemon.containerRm(cfg, c.ID, &backend.ContainerRmConfig{})
  72. if err != nil {
  73. log.G(ctx).Warnf("failed to prune container %s: %v", c.ID, err)
  74. continue
  75. }
  76. if cSize > 0 {
  77. rep.SpaceReclaimed += uint64(cSize)
  78. }
  79. rep.ContainersDeleted = append(rep.ContainersDeleted, c.ID)
  80. }
  81. }
  82. daemon.EventsService.Log(events.ActionPrune, events.ContainerEventType, events.Actor{
  83. Attributes: map[string]string{"reclaimed": strconv.FormatUint(rep.SpaceReclaimed, 10)},
  84. })
  85. return rep, nil
  86. }
  87. // localNetworksPrune removes unused local networks
  88. func (daemon *Daemon) localNetworksPrune(ctx context.Context, pruneFilters filters.Args) *types.NetworksPruneReport {
  89. rep := &types.NetworksPruneReport{}
  90. until, _ := getUntilFromPruneFilters(pruneFilters)
  91. // When the function returns true, the walk will stop.
  92. daemon.netController.WalkNetworks(func(nw *libnetwork.Network) bool {
  93. select {
  94. case <-ctx.Done():
  95. // context cancelled
  96. return true
  97. default:
  98. }
  99. if nw.ConfigOnly() {
  100. return false
  101. }
  102. if !until.IsZero() && nw.Created().After(until) {
  103. return false
  104. }
  105. if !matchLabels(pruneFilters, nw.Labels()) {
  106. return false
  107. }
  108. nwName := nw.Name()
  109. if runconfig.IsPreDefinedNetwork(nwName) {
  110. return false
  111. }
  112. if len(nw.Endpoints()) > 0 {
  113. return false
  114. }
  115. if err := daemon.DeleteNetwork(nw.ID()); err != nil {
  116. log.G(ctx).Warnf("could not remove local network %s: %v", nwName, err)
  117. return false
  118. }
  119. rep.NetworksDeleted = append(rep.NetworksDeleted, nwName)
  120. return false
  121. })
  122. return rep
  123. }
  124. // clusterNetworksPrune removes unused cluster networks
  125. func (daemon *Daemon) clusterNetworksPrune(ctx context.Context, pruneFilters filters.Args) (*types.NetworksPruneReport, error) {
  126. rep := &types.NetworksPruneReport{}
  127. until, _ := getUntilFromPruneFilters(pruneFilters)
  128. cluster := daemon.GetCluster()
  129. if !cluster.IsManager() {
  130. return rep, nil
  131. }
  132. networks, err := cluster.GetNetworks(pruneFilters)
  133. if err != nil {
  134. return rep, err
  135. }
  136. networkIsInUse := regexp.MustCompile(`network ([[:alnum:]]+) is in use`)
  137. for _, nw := range networks {
  138. select {
  139. case <-ctx.Done():
  140. return rep, nil
  141. default:
  142. if nw.Ingress {
  143. // Routing-mesh network removal has to be explicitly invoked by user
  144. continue
  145. }
  146. if !until.IsZero() && nw.Created.After(until) {
  147. continue
  148. }
  149. if !matchLabels(pruneFilters, nw.Labels) {
  150. continue
  151. }
  152. // https://github.com/docker/docker/issues/24186
  153. // `docker network inspect` unfortunately displays ONLY those containers that are local to that node.
  154. // So we try to remove it anyway and check the error
  155. err = cluster.RemoveNetwork(nw.ID)
  156. if err != nil {
  157. // we can safely ignore the "network .. is in use" error
  158. match := networkIsInUse.FindStringSubmatch(err.Error())
  159. if len(match) != 2 || match[1] != nw.ID {
  160. log.G(ctx).Warnf("could not remove cluster network %s: %v", nw.Name, err)
  161. }
  162. continue
  163. }
  164. rep.NetworksDeleted = append(rep.NetworksDeleted, nw.Name)
  165. }
  166. }
  167. return rep, nil
  168. }
  169. // NetworksPrune removes unused networks
  170. func (daemon *Daemon) NetworksPrune(ctx context.Context, pruneFilters filters.Args) (*types.NetworksPruneReport, error) {
  171. if !atomic.CompareAndSwapInt32(&daemon.pruneRunning, 0, 1) {
  172. return nil, errPruneRunning
  173. }
  174. defer atomic.StoreInt32(&daemon.pruneRunning, 0)
  175. // make sure that only accepted filters have been received
  176. err := pruneFilters.Validate(networksAcceptedFilters)
  177. if err != nil {
  178. return nil, err
  179. }
  180. if _, err := getUntilFromPruneFilters(pruneFilters); err != nil {
  181. return nil, err
  182. }
  183. rep := &types.NetworksPruneReport{}
  184. if clusterRep, err := daemon.clusterNetworksPrune(ctx, pruneFilters); err == nil {
  185. rep.NetworksDeleted = append(rep.NetworksDeleted, clusterRep.NetworksDeleted...)
  186. }
  187. localRep := daemon.localNetworksPrune(ctx, pruneFilters)
  188. rep.NetworksDeleted = append(rep.NetworksDeleted, localRep.NetworksDeleted...)
  189. select {
  190. case <-ctx.Done():
  191. log.G(ctx).Debugf("NetworksPrune operation cancelled: %#v", *rep)
  192. return rep, nil
  193. default:
  194. }
  195. daemon.EventsService.Log(events.ActionPrune, events.NetworkEventType, events.Actor{
  196. Attributes: map[string]string{"reclaimed": "0"},
  197. })
  198. return rep, nil
  199. }
  200. func getUntilFromPruneFilters(pruneFilters filters.Args) (time.Time, error) {
  201. until := time.Time{}
  202. if !pruneFilters.Contains("until") {
  203. return until, nil
  204. }
  205. untilFilters := pruneFilters.Get("until")
  206. if len(untilFilters) > 1 {
  207. return until, errdefs.InvalidParameter(errors.New("more than one until filter specified"))
  208. }
  209. ts, err := timetypes.GetTimestamp(untilFilters[0], time.Now())
  210. if err != nil {
  211. return until, errdefs.InvalidParameter(err)
  212. }
  213. seconds, nanoseconds, err := timetypes.ParseTimestamps(ts, 0)
  214. if err != nil {
  215. return until, errdefs.InvalidParameter(err)
  216. }
  217. until = time.Unix(seconds, nanoseconds)
  218. return until, nil
  219. }
  220. func matchLabels(pruneFilters filters.Args, labels map[string]string) bool {
  221. if !pruneFilters.MatchKVList("label", labels) {
  222. return false
  223. }
  224. // By default MatchKVList will return true if field (like 'label!') does not exist
  225. // So we have to add additional Contains("label!") check
  226. if pruneFilters.Contains("label!") {
  227. if pruneFilters.MatchKVList("label!", labels) {
  228. return false
  229. }
  230. }
  231. return true
  232. }