helpers.go 4.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131
  1. package swarm // import "github.com/docker/docker/api/server/router/swarm"
  2. import (
  3. "context"
  4. "fmt"
  5. "net/http"
  6. "github.com/docker/docker/api/server/httputils"
  7. basictypes "github.com/docker/docker/api/types"
  8. "github.com/docker/docker/api/types/backend"
  9. "github.com/docker/docker/api/types/container"
  10. "github.com/docker/docker/api/types/swarm"
  11. "github.com/docker/docker/api/types/versions"
  12. )
  13. // swarmLogs takes an http response, request, and selector, and writes the logs
  14. // specified by the selector to the response
  15. func (sr *swarmRouter) swarmLogs(ctx context.Context, w http.ResponseWriter, r *http.Request, selector *backend.LogSelector) error {
  16. // Args are validated before the stream starts because when it starts we're
  17. // sending HTTP 200 by writing an empty chunk of data to tell the client that
  18. // daemon is going to stream. By sending this initial HTTP 200 we can't report
  19. // any error after the stream starts (i.e. container not found, wrong parameters)
  20. // with the appropriate status code.
  21. stdout, stderr := httputils.BoolValue(r, "stdout"), httputils.BoolValue(r, "stderr")
  22. if !(stdout || stderr) {
  23. return fmt.Errorf("Bad parameters: you must choose at least one stream")
  24. }
  25. // there is probably a neater way to manufacture the LogsOptions
  26. // struct, probably in the caller, to eliminate the dependency on net/http
  27. logsConfig := &container.LogsOptions{
  28. Follow: httputils.BoolValue(r, "follow"),
  29. Timestamps: httputils.BoolValue(r, "timestamps"),
  30. Since: r.Form.Get("since"),
  31. Tail: r.Form.Get("tail"),
  32. ShowStdout: stdout,
  33. ShowStderr: stderr,
  34. Details: httputils.BoolValue(r, "details"),
  35. }
  36. tty := false
  37. // checking for whether logs are TTY involves iterating over every service
  38. // and task. idk if there is a better way
  39. for _, service := range selector.Services {
  40. s, err := sr.backend.GetService(service, false)
  41. if err != nil {
  42. // maybe should return some context with this error?
  43. return err
  44. }
  45. tty = (s.Spec.TaskTemplate.ContainerSpec != nil && s.Spec.TaskTemplate.ContainerSpec.TTY) || tty
  46. }
  47. for _, task := range selector.Tasks {
  48. t, err := sr.backend.GetTask(task)
  49. if err != nil {
  50. // as above
  51. return err
  52. }
  53. tty = t.Spec.ContainerSpec.TTY || tty
  54. }
  55. msgs, err := sr.backend.ServiceLogs(ctx, selector, logsConfig)
  56. if err != nil {
  57. return err
  58. }
  59. contentType := basictypes.MediaTypeRawStream
  60. if !tty && versions.GreaterThanOrEqualTo(httputils.VersionFromContext(ctx), "1.42") {
  61. contentType = basictypes.MediaTypeMultiplexedStream
  62. }
  63. w.Header().Set("Content-Type", contentType)
  64. httputils.WriteLogStream(ctx, w, msgs, logsConfig, !tty)
  65. return nil
  66. }
  67. // adjustForAPIVersion takes a version and service spec and removes fields to
  68. // make the spec compatible with the specified version.
  69. func adjustForAPIVersion(cliVersion string, service *swarm.ServiceSpec) {
  70. if cliVersion == "" {
  71. return
  72. }
  73. if versions.LessThan(cliVersion, "1.40") {
  74. if service.TaskTemplate.ContainerSpec != nil {
  75. // Sysctls for docker swarm services weren't supported before
  76. // API version 1.40
  77. service.TaskTemplate.ContainerSpec.Sysctls = nil
  78. if service.TaskTemplate.ContainerSpec.Privileges != nil && service.TaskTemplate.ContainerSpec.Privileges.CredentialSpec != nil {
  79. // Support for setting credential-spec through configs was added in API 1.40
  80. service.TaskTemplate.ContainerSpec.Privileges.CredentialSpec.Config = ""
  81. }
  82. for _, config := range service.TaskTemplate.ContainerSpec.Configs {
  83. // support for the Runtime target was added in API 1.40
  84. config.Runtime = nil
  85. }
  86. }
  87. if service.TaskTemplate.Placement != nil {
  88. // MaxReplicas for docker swarm services weren't supported before
  89. // API version 1.40
  90. service.TaskTemplate.Placement.MaxReplicas = 0
  91. }
  92. }
  93. if versions.LessThan(cliVersion, "1.41") {
  94. if service.TaskTemplate.ContainerSpec != nil {
  95. // Capabilities and Ulimits for docker swarm services weren't
  96. // supported before API version 1.41
  97. service.TaskTemplate.ContainerSpec.CapabilityAdd = nil
  98. service.TaskTemplate.ContainerSpec.CapabilityDrop = nil
  99. service.TaskTemplate.ContainerSpec.Ulimits = nil
  100. }
  101. if service.TaskTemplate.Resources != nil && service.TaskTemplate.Resources.Limits != nil {
  102. // Limits.Pids not supported before API version 1.41
  103. service.TaskTemplate.Resources.Limits.Pids = 0
  104. }
  105. // jobs were only introduced in API version 1.41. Nil out both Job
  106. // modes; if the service is one of these modes and subsequently has no
  107. // mode, then something down the pipe will thrown an error.
  108. service.Mode.ReplicatedJob = nil
  109. service.Mode.GlobalJob = nil
  110. }
  111. if versions.LessThan(cliVersion, "1.44") {
  112. // seccomp, apparmor, and no_new_privs were added in 1.44.
  113. if service.TaskTemplate.ContainerSpec != nil && service.TaskTemplate.ContainerSpec.Privileges != nil {
  114. service.TaskTemplate.ContainerSpec.Privileges.Seccomp = nil
  115. service.TaskTemplate.ContainerSpec.Privileges.AppArmor = nil
  116. service.TaskTemplate.ContainerSpec.Privileges.NoNewPrivileges = false
  117. }
  118. }
  119. }