update.go 2.8 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107
  1. package daemon // import "github.com/docker/docker/daemon"
  2. import (
  3. "context"
  4. "fmt"
  5. "github.com/docker/docker/api/types/container"
  6. "github.com/docker/docker/api/types/events"
  7. "github.com/docker/docker/errdefs"
  8. "github.com/pkg/errors"
  9. )
  10. // ContainerUpdate updates configuration of the container
  11. func (daemon *Daemon) ContainerUpdate(name string, hostConfig *container.HostConfig) (container.ContainerUpdateOKBody, error) {
  12. var warnings []string
  13. daemonCfg := daemon.config()
  14. warnings, err := daemon.verifyContainerSettings(daemonCfg, hostConfig, nil, true)
  15. if err != nil {
  16. return container.ContainerUpdateOKBody{Warnings: warnings}, errdefs.InvalidParameter(err)
  17. }
  18. if err := daemon.update(name, hostConfig); err != nil {
  19. return container.ContainerUpdateOKBody{Warnings: warnings}, err
  20. }
  21. return container.ContainerUpdateOKBody{Warnings: warnings}, nil
  22. }
  23. func (daemon *Daemon) update(name string, hostConfig *container.HostConfig) error {
  24. if hostConfig == nil {
  25. return nil
  26. }
  27. ctr, err := daemon.GetContainer(name)
  28. if err != nil {
  29. return err
  30. }
  31. restoreConfig := false
  32. backupHostConfig := *ctr.HostConfig
  33. defer func() {
  34. if restoreConfig {
  35. ctr.Lock()
  36. if !ctr.RemovalInProgress && !ctr.Dead {
  37. ctr.HostConfig = &backupHostConfig
  38. ctr.CheckpointTo(daemon.containersReplica)
  39. }
  40. ctr.Unlock()
  41. }
  42. }()
  43. ctr.Lock()
  44. if ctr.RemovalInProgress || ctr.Dead {
  45. ctr.Unlock()
  46. return errCannotUpdate(ctr.ID, fmt.Errorf(`container is marked for removal and cannot be "update"`))
  47. }
  48. if err := ctr.UpdateContainer(hostConfig); err != nil {
  49. restoreConfig = true
  50. ctr.Unlock()
  51. return errCannotUpdate(ctr.ID, err)
  52. }
  53. if err := ctr.CheckpointTo(daemon.containersReplica); err != nil {
  54. restoreConfig = true
  55. ctr.Unlock()
  56. return errCannotUpdate(ctr.ID, err)
  57. }
  58. ctr.Unlock()
  59. // if Restart Policy changed, we need to update container monitor
  60. if hostConfig.RestartPolicy.Name != "" {
  61. ctr.UpdateMonitor(hostConfig.RestartPolicy)
  62. }
  63. defer daemon.LogContainerEvent(ctr, events.ActionUpdate)
  64. // If container is not running, update hostConfig struct is enough,
  65. // resources will be updated when the container is started again.
  66. // If container is running (including paused), we need to update configs
  67. // to the real world.
  68. ctr.Lock()
  69. isRestarting := ctr.Restarting
  70. tsk, err := ctr.GetRunningTask()
  71. ctr.Unlock()
  72. if errdefs.IsConflict(err) || isRestarting {
  73. return nil
  74. }
  75. if err != nil {
  76. return err
  77. }
  78. if err := tsk.UpdateResources(context.TODO(), toContainerdResources(hostConfig.Resources)); err != nil {
  79. restoreConfig = true
  80. // TODO: it would be nice if containerd responded with better errors here so we can classify this better.
  81. return errCannotUpdate(ctr.ID, errdefs.System(err))
  82. }
  83. return nil
  84. }
  85. func errCannotUpdate(containerID string, err error) error {
  86. return errors.Wrap(err, "Cannot update container "+containerID)
  87. }