Compare commits
1050 commits
Author | SHA1 | Date | |
---|---|---|---|
|
175f182937 | ||
|
915f6046bc | ||
|
c529d3d7ee | ||
|
78d18021ec | ||
|
94dfa20066 | ||
|
7779ca4a98 | ||
|
85c245a239 | ||
|
97cd32a6a9 | ||
|
36900f1d03 | ||
|
7392c3b0ce | ||
|
e81486637e | ||
|
5e7229d32d | ||
|
6646fc318f | ||
|
1606fe0c04 | ||
|
e9e3ab6b6a | ||
|
eb6bab3338 | ||
|
1b8209bf6d | ||
|
fea72090a7 | ||
|
58a51648bd | ||
|
660154fafa | ||
|
0e5346df32 | ||
|
02394deb34 | ||
|
5fb9e4926a | ||
|
f6fbe58fbe | ||
|
00ca3caed8 | ||
|
f9bc32067d | ||
|
c80d82a98d | ||
|
55d7080ee6 | ||
|
286f44240c | ||
|
0eb8e727af | ||
|
1564f02e33 | ||
|
fbc5f05beb | ||
|
1a184cf700 | ||
|
39fbd603e9 | ||
|
10b636ce03 | ||
|
b37fda12fb | ||
|
63b4965387 | ||
|
1f6bda6d20 | ||
|
bf1a4d88bc | ||
|
60ff6c6b98 | ||
|
c00b451d46 | ||
|
bff68bc605 | ||
|
09b09c34b3 | ||
|
955c0bde09 | ||
|
a43b40b0d4 | ||
|
ec8c61ee22 | ||
|
9b63991d16 | ||
|
6f3ad4cfc7 | ||
|
fa791da12c | ||
|
1b01e2f1df | ||
|
fb0b19aa2e | ||
|
05f08f771e | ||
|
46cc5c05aa | ||
|
06b34e507d | ||
|
554400b75b | ||
|
6d972ff0f7 | ||
|
39466e3144 | ||
|
073515574d | ||
|
3707a30459 | ||
|
5dab892618 | ||
|
a3cadca8e5 | ||
|
7679e0bdfc | ||
|
f29c255b2c | ||
|
89da30c482 | ||
|
146400425e | ||
|
fe995bdfad | ||
|
4b2b2c0af6 | ||
|
85aa678ad8 | ||
|
0d5bc84d06 | ||
|
dbbcc8f549 | ||
|
c808ae8c5b | ||
|
b7fe9bf7f5 | ||
|
4a13581d57 | ||
|
86ef3fcbbb | ||
|
caa6b86f38 | ||
|
b5e9291a70 | ||
|
bbe7ec7a0a | ||
|
97b6626138 | ||
|
5455138728 | ||
|
7e30cb6e52 | ||
|
f966aae6ae | ||
|
cce6065906 | ||
|
e2b0adeb5c | ||
|
9b70991d10 | ||
|
c084bcd5fd | ||
|
e374126ed1 | ||
|
9d7bae7c5d | ||
|
ed6b8d61c6 | ||
|
4da9f49339 | ||
|
0237ba30b6 | ||
|
d99532f55d | ||
|
560d0d25c1 | ||
|
7613b23a58 | ||
|
f54df35bc0 | ||
|
04825beac4 | ||
|
b01949b19a | ||
|
7b9deca3e0 | ||
|
a751f94ca0 | ||
|
a2a983c770 | ||
|
06092267aa | ||
|
1e69caad8c | ||
|
e136d3ef93 | ||
|
7e98d12157 | ||
|
c17155fbc3 | ||
|
6781d1912d | ||
|
0c3e2e1556 | ||
|
f25e197379 | ||
|
50841b16fe | ||
|
6756f1d160 | ||
|
f90c1625e9 | ||
|
c54e23e38a | ||
|
e3034309b3 | ||
|
403c9b9676 | ||
|
7e902398f9 | ||
|
020915ca30 | ||
|
76d2f1f29b | ||
|
d619f3d669 | ||
|
bfd123b2a9 | ||
|
d77269a802 | ||
|
1d7418f212 | ||
|
6a0ce4924f | ||
|
438d8fa3db | ||
|
5025b97c1d | ||
|
cf60af87f9 | ||
|
6b644ecc19 | ||
|
bad4d1299e | ||
|
e64bf8c3cd | ||
|
ebe2e9cf85 | ||
|
ca151de73c | ||
|
ec98dcb56d | ||
|
a154321efc | ||
|
190a96131c | ||
|
c5ac1fcc29 | ||
|
5c0c9e4587 | ||
|
548f8f0895 | ||
|
d1a1b9692a | ||
|
a8ffa0128c | ||
|
3f21a28ec0 | ||
|
ed879071ec | ||
|
d60a3418d0 | ||
|
3b9269760c | ||
|
defb41068c | ||
|
8bc5f43b14 | ||
|
16f11aef3c | ||
|
7ae3379a64 | ||
|
1552aa3d9a | ||
|
351799f4f0 | ||
|
72875b0d01 | ||
|
659509e40b | ||
|
30a4d7e3db | ||
|
882e8d5d75 | ||
|
109b53d882 | ||
|
bb80604a0b | ||
|
91d8560fc0 | ||
|
feb59d32d7 | ||
|
cb0ca64a34 | ||
|
841c5f9166 | ||
|
026f385aa3 | ||
|
1863675001 | ||
|
3377b4b9b7 | ||
|
d82e3bf952 | ||
|
cb58783630 | ||
|
d72629e18f | ||
|
ad9538afc2 | ||
|
545d909aac | ||
|
0e7c6b8496 | ||
|
d11648696f | ||
|
5d04e28d9e | ||
|
1767966502 | ||
|
5aa44019b0 | ||
|
180d122c5b | ||
|
9975fcbe1c | ||
|
1c0d9a4a90 | ||
|
458bd3663b | ||
|
64ae81609c | ||
|
d29db3a55a | ||
|
0a6b4c2d9c | ||
|
d49c31e3c1 | ||
|
3134c23b55 | ||
|
a114655b56 | ||
|
88ce3d60b9 | ||
|
ed69445474 | ||
|
cd15b2b300 | ||
|
68aca71637 | ||
|
735622fdf4 | ||
|
ca474f7808 | ||
|
c93303b8d7 | ||
|
96b5ec8f50 | ||
|
394ce0c9c1 | ||
|
729717568b | ||
|
fc884da817 | ||
|
9363b42e59 | ||
|
2659333a27 | ||
|
67610e9dea | ||
|
121cd6f9e6 | ||
|
d4288a3212 | ||
|
cdda81146b | ||
|
ddc58225f3 | ||
|
22a3332325 | ||
|
7df1b6a962 | ||
|
7da3e5d0b2 | ||
|
03a4e9a397 | ||
|
5508a82cac | ||
|
0e29518469 | ||
|
3bd4612aaf | ||
|
f81e4e8d57 | ||
|
1edf705917 | ||
|
9a207a7eb7 | ||
|
ac1eb9edd0 | ||
|
f9f6145003 | ||
|
e289fc155a | ||
|
8ae21d6d4d | ||
|
bcc70e52eb | ||
|
c84d8b8360 | ||
|
ae9b46dbd0 | ||
|
7fad9da9f2 | ||
|
a8aaf5bfad | ||
|
c6ba6498b3 | ||
|
af46f0242e | ||
|
c9ce561ac0 | ||
|
792c545f52 | ||
|
cd589e16c8 | ||
|
bc97dc1e50 | ||
|
45bed2cc80 | ||
|
1ec9ca1ca6 | ||
|
707163c38c | ||
|
8f598d9027 | ||
|
3d8e9bfcda | ||
|
2d183336ec | ||
|
e9c655442a | ||
|
f25dffe56a | ||
|
b6943c50f1 | ||
|
d5aaaa7ea3 | ||
|
f2a48d2ff3 | ||
|
32b0633f65 | ||
|
5592ee4d07 | ||
|
f4650e2eb8 | ||
|
5619e72a34 | ||
|
a1d191d91e | ||
|
708a93a800 | ||
|
2be91b121b | ||
|
0dcd2e1a5d | ||
|
e892a54fa1 | ||
|
24df982128 | ||
|
fd7e763e7c | ||
|
132a8e7963 | ||
|
aaaeb84ac6 | ||
|
667c02ce8c | ||
|
38aa258343 | ||
|
727402135d | ||
|
03da508273 | ||
|
e4040acb01 | ||
|
df3209b4d6 | ||
|
0ce34bdb12 | ||
|
ef634b95f4 | ||
|
33e855f8ae | ||
|
07fcfd0c28 | ||
|
1bcc2d9ab7 | ||
|
e646e927ee | ||
|
f885d8ed5c | ||
|
bb45417c91 | ||
|
4da24ca1e3 | ||
|
99ed95cb57 | ||
|
787ed27c32 | ||
|
9ec857ad5a | ||
|
f784166e8a | ||
|
0183b3bf8c | ||
|
8f264db3f1 | ||
|
b23bff1d9f | ||
|
7c8dc9e6d5 | ||
|
c6e7fececb | ||
|
73f256760c | ||
|
01855d37be | ||
|
9366ba2434 | ||
|
49dc97dbc2 | ||
|
7e9c951813 | ||
|
bf637439e7 | ||
|
2a1197037c | ||
|
61c0a019fc | ||
|
2eb9e80547 | ||
|
4cf193bac5 | ||
|
eea99cd001 | ||
|
d95bffff5f | ||
|
8a56561528 | ||
|
dc98c76772 | ||
|
9710d3d9e9 | ||
|
0d800e9a37 | ||
|
be71b62acf | ||
|
c63cdcd948 | ||
|
f1d590c45b | ||
|
a8c297c254 | ||
|
bf7d335513 | ||
|
359f8fe426 | ||
|
11330bf048 | ||
|
bbf49348e2 | ||
|
55f95dd7e8 | ||
|
95bc4519d2 | ||
|
a42e2a0e42 | ||
|
1e9fb2f18e | ||
|
5e4e13e31c | ||
|
748f3ef8e3 | ||
|
e3197e1dfa | ||
|
01de2e76b4 | ||
|
1a57e1b1f5 | ||
|
5c34d579dc | ||
|
931418603e | ||
|
7e2259bb63 | ||
|
b7e9344365 | ||
|
dc0d2166d5 | ||
|
e773b059d1 | ||
|
934d7b83ef | ||
|
755addd56f | ||
|
9c2b789caf | ||
|
abe05f4a29 | ||
|
9bef12dcfd | ||
|
aaa7a58c63 | ||
|
49e863f6d0 | ||
|
44180a48e9 | ||
|
8f0254da41 | ||
|
2aa780abe4 | ||
|
af9378f713 | ||
|
a3098657c3 | ||
|
6e9dd212b9 | ||
|
9234cc38e2 | ||
|
d649ae0370 | ||
|
af2a9ba322 | ||
|
72f1556f62 | ||
|
909f9f5ea8 | ||
|
e98eafcc3c | ||
|
69d3aaa2e2 | ||
|
1f563dd224 | ||
|
5d2e3ad0c9 | ||
|
f1bcb5f10e | ||
|
080891bb11 | ||
|
be94e07b6d | ||
|
ca9bb6e445 | ||
|
7e956837f2 | ||
|
069aa4e11a | ||
|
e097320c92 | ||
|
fdb5140893 | ||
|
63fb3077cc | ||
|
3d4813ffd2 | ||
|
330486c45f | ||
|
dc49ed96cb | ||
|
21e168053f | ||
|
88bd4cb0ea | ||
|
23cf638307 | ||
|
3e4c33365f | ||
|
e8ed523480 | ||
|
5d29b79241 | ||
|
6e7b8f41ca | ||
|
bd8d47e028 | ||
|
c745f4db98 | ||
|
b313230fa8 | ||
|
a193f2995e | ||
|
0f63ddb03d | ||
|
2875711fe7 | ||
|
e24421a6ef | ||
|
e2c8597c8f | ||
|
f436a41d0c | ||
|
fc8a0f4786 | ||
|
9bc8e7858c | ||
|
a30a0b07a4 | ||
|
05e1e65ca7 | ||
|
4534b9e6c3 | ||
|
3da4ac64af | ||
|
13e82f23c8 | ||
|
74cdda0333 | ||
|
236317fa56 | ||
|
f806ae4838 | ||
|
a544fe4b38 | ||
|
09dc9a2a9e | ||
|
f21cdf48f9 | ||
|
651c53f020 | ||
|
64f62a6703 | ||
|
460d8d80ca | ||
|
dd08342103 | ||
|
07e0380379 | ||
|
0c369b1a5c | ||
|
6927a7b263 | ||
|
8dae3ecff0 | ||
|
12ab1ca5eb | ||
|
7889dc71a2 | ||
|
705ebd6fac | ||
|
eae4ba51e5 | ||
|
e005053797 | ||
|
7646aba651 | ||
|
c4428f84d0 | ||
|
5680192346 | ||
|
a019407d3e | ||
|
5dc0715cd2 | ||
|
235d897aaf | ||
|
42fed93a89 | ||
|
a3f2c03ef0 | ||
|
af0f7ad792 | ||
|
16a0c1c374 | ||
|
9623f45fce | ||
|
3048098843 | ||
|
7b95154474 | ||
|
dab3fc3955 | ||
|
f99fd5a3f9 | ||
|
bdf7a55cfe | ||
|
46afae5372 | ||
|
265f7a37bd | ||
|
769c25c416 | ||
|
2f6ca79080 | ||
|
147f1ad348 | ||
|
dff3faf04e | ||
|
25a629574c | ||
|
5cc103e9e9 | ||
|
fdf513e99d | ||
|
e5a4047a62 | ||
|
a345cc11c9 | ||
|
98bbe72549 | ||
|
aaadc511d8 | ||
|
8ef01f724b | ||
|
af77d47c1f | ||
|
c473d14d45 | ||
|
f6d388f5b1 | ||
|
8b9d96d208 | ||
|
c573ad30b9 | ||
|
23b79424c0 | ||
|
2422b48ffb | ||
|
2ac7a9ca9e | ||
|
4dc1afc961 | ||
|
9b759e18b1 | ||
|
b0bff4d8d2 | ||
|
caaf53ad3e | ||
|
b32462e2a4 | ||
|
40baa97ab1 | ||
|
70f0f7a20e | ||
|
aaf3a81086 | ||
|
828a2473c2 | ||
|
9ba749a497 | ||
|
e25a1ca19c | ||
|
cd0a4389e2 | ||
|
d00d9dbbfb | ||
|
282dda382b | ||
|
798e0b07cb | ||
|
4d529895f0 | ||
|
49d9a425d5 | ||
|
a577a06403 | ||
|
bdc0a24156 | ||
|
af4ff2541a | ||
|
151b799147 | ||
|
61fe5dabe3 | ||
|
6e122d9bd5 | ||
|
6a7d5dcf08 | ||
|
ec26e561b0 | ||
|
83e47c15ee | ||
|
6811254691 | ||
|
8cc5797894 | ||
|
7bd1512ad6 | ||
|
4e6e046035 | ||
|
1ad0903ea3 | ||
|
74e965afd8 | ||
|
39d7e266de | ||
|
f558e71cd2 | ||
|
037ad1b174 | ||
|
33cabf2658 | ||
|
c01379f52f | ||
|
d32508f2a1 | ||
|
cfd105cd5b | ||
|
4b9b07f281 | ||
|
fff3dce95f | ||
|
bc967c6ea9 | ||
|
0faacf1180 | ||
|
8e04d5a68c | ||
|
222e44179c | ||
|
85b9530e26 | ||
|
9aabd9c3f4 | ||
|
60db5f060e | ||
|
514c1da2bf | ||
|
5cad6c1df8 | ||
|
d7a01cc60e | ||
|
7ab84e8daf | ||
|
5f38d112fc | ||
|
a4c8fe1cd4 | ||
|
cdfde82612 | ||
|
e118034053 | ||
|
9c2ba289dd | ||
|
5f3b3d651c | ||
|
1a5acb35e7 | ||
|
ddbc9c7d88 | ||
|
8eab29edd8 | ||
|
3c292b6d92 | ||
|
4f369a74fa | ||
|
cd22bb863c | ||
|
eddee8e932 | ||
|
664fcd9f28 | ||
|
f399272f7b | ||
|
29f6886e48 | ||
|
7f6a1d9fb7 | ||
|
c46db363d6 | ||
|
cda10d4d7f | ||
|
3fba11f7c6 | ||
|
b49dd20939 | ||
|
0a4abdb0ac | ||
|
d79bd3010a | ||
|
486d5aa47f | ||
|
55b920c988 | ||
|
05073a911d | ||
|
1f33c33fbe | ||
|
7b7b9078cf | ||
|
c9b38547d5 | ||
|
340ff060a8 | ||
|
d8f3b3f006 | ||
|
398bde913f | ||
|
2f736927a0 | ||
|
69080f423d | ||
|
c62b19f1e3 | ||
|
441b660dd1 | ||
|
2e8165d503 | ||
|
1717c76ff2 | ||
|
b7e1ea51a0 | ||
|
b8333bfd5e | ||
|
ef19b22b85 | ||
|
0bd4111851 | ||
|
81d31af68c | ||
|
9fa212ba59 | ||
|
d6b53d91d7 | ||
|
e97e51d79c | ||
|
a3f206372f | ||
|
626b152944 | ||
|
5b667c7c55 | ||
|
c5531b033a | ||
|
4ed7f63f0d | ||
|
e16a20d11a | ||
|
0e2d7c996c | ||
|
a91bc28e62 | ||
|
0ffa19daa8 | ||
|
c3574dd1ec | ||
|
fe1d39cc96 | ||
|
45c8a3ddd5 | ||
|
8fe03baa41 | ||
|
05444a56af | ||
|
86670cced9 | ||
|
4b986851f7 | ||
|
e111f0c7b2 | ||
|
25cf7999fa | ||
|
678a19ef6b | ||
|
027de801a8 | ||
|
07735b4f0c | ||
|
84eae5d69f | ||
|
0df31ff193 | ||
|
bf024205b7 | ||
|
365d16ed6d | ||
|
bd31863ba7 | ||
|
a3639e6ac6 | ||
|
92cbdfece9 | ||
|
c166b2c9da | ||
|
a688a0ae9d | ||
|
52b078fb37 | ||
|
47b7cf5ceb | ||
|
6142557cba | ||
|
42e97d23e2 | ||
|
ec241bfeaf | ||
|
861fa09131 | ||
|
e9190e0764 | ||
|
14038215d3 | ||
|
82219c7727 | ||
|
c6ff464d43 | ||
|
71d54a4bd3 | ||
|
beffc3e8c0 | ||
|
43193233f8 | ||
|
4cd455a8d9 | ||
|
5aef7cc12d | ||
|
1cc85c1726 | ||
|
a0d1201e02 | ||
|
762a73bf7f | ||
|
38beb3d9ab | ||
|
ea9d74b755 | ||
|
6db1c73da7 | ||
|
e6464aa5ab | ||
|
723073bccb | ||
|
b7a38b19b3 | ||
|
986a968044 | ||
|
9e006577f4 | ||
|
1bb38f1a2b | ||
|
16744cb970 | ||
|
98f1c30e8c | ||
|
ac6d5a01c1 | ||
|
fa89f32b13 | ||
|
9ec67fd8d1 | ||
|
7836221015 | ||
|
83e40c5025 | ||
|
c6cd4b37c7 | ||
|
adeba99c7f | ||
|
b738f3f3e5 | ||
|
05b1803b13 | ||
|
5d7a3f7b5f | ||
|
4d7d354cff | ||
|
33a8310bc8 | ||
|
acfbf72906 | ||
|
51b749e659 | ||
|
f001601c09 | ||
|
5d56800537 | ||
|
9f5465d4e6 | ||
|
6a06d8d94c | ||
|
8e0e7644d8 | ||
|
7876fa1c2d | ||
|
fd231567dc | ||
|
178b6874a1 | ||
|
84e78fe955 | ||
|
8f0ec20157 | ||
|
6dfb916abf | ||
|
2d5716544d | ||
|
9ce976f4f6 | ||
|
06f8cd5f31 | ||
|
7ebba69c43 | ||
|
14835b6834 | ||
|
ece06aee06 | ||
|
33ff331ad7 | ||
|
fd7cabed36 | ||
|
c3a114d4d4 | ||
|
a3d9a99c0e | ||
|
80463d8000 | ||
|
b29a9fdc4b | ||
|
05e6d5f5db | ||
|
61936227d0 | ||
|
05b7fe4170 | ||
|
1b131678da | ||
|
afc64c2d71 | ||
|
b7687cc673 | ||
|
6c717a5744 | ||
|
0649299908 | ||
|
3430f2e756 | ||
|
ea0d7e5271 | ||
|
14aee340f8 | ||
|
fee68def8f | ||
|
45920009cc | ||
|
6c3019702e | ||
|
4845b686b2 | ||
|
f370132a42 | ||
|
47a16dbe31 | ||
|
2456150a52 | ||
|
f3fea0ea88 | ||
|
71a8ee2f49 | ||
|
4d0f6041ad | ||
|
da773af885 | ||
|
3b20018dd0 | ||
|
fc22510aef | ||
|
c04c127ce3 | ||
|
abf9cfe22f | ||
|
4118e0c9ee | ||
|
5fcac2cdfd | ||
|
de2498db0b | ||
|
ebb3cca216 | ||
|
da699d3207 | ||
|
91432080bf | ||
|
285bfa04ac | ||
|
cf2b19a72e | ||
|
2b7c285ddc | ||
|
f0c76fb8d5 | ||
|
3d0cd8442e | ||
|
09b01499b7 | ||
|
63084741f0 | ||
|
e4d263c99b | ||
|
f6dfc0394f | ||
|
cf83ab8e6d | ||
|
211f871092 | ||
|
5f8d7aa0f4 | ||
|
e204600ee1 | ||
|
25caee39a7 | ||
|
4516769d50 | ||
|
c8dec6c2dd | ||
|
12e32363e9 | ||
|
e678d9fb7c | ||
|
9deaa5cc1d | ||
|
ec03307eb2 | ||
|
5bb9640ab8 | ||
|
07bc1eecab | ||
|
e04733a67e | ||
|
a5584f5f41 | ||
|
fc3d339109 | ||
|
fad55b0ea1 | ||
|
1cf4bd4df7 | ||
|
b5f1b77a23 | ||
|
32b12ed57a | ||
|
a769e22b70 | ||
|
a89bd71433 | ||
|
3bd6c0b8dd | ||
|
9f86a9712d | ||
|
d8e9dbf628 | ||
|
7491ebe00a | ||
|
89986cbff4 | ||
|
0ce4630533 | ||
|
cda05164ba | ||
|
dc5f28f4b5 | ||
|
8d7223d991 | ||
|
ca9805f78d | ||
|
eb8bbea3d1 | ||
|
8a810acb1e | ||
|
96247f4277 | ||
|
9b0ebd26e8 | ||
|
fc4c8d927a | ||
|
ccffaddb55 | ||
|
b2334cc79d | ||
|
926d66b50f | ||
|
de6b73a1a8 | ||
|
e4a0dbc472 | ||
|
8ab73b58e7 | ||
|
3cad13f679 | ||
|
e4c35bd74c | ||
|
ff7c84b867 | ||
|
f00c098bf7 | ||
|
c61fa33c23 | ||
|
e3ed7f8c7b | ||
|
31d24fa6a9 | ||
|
98b155379b | ||
|
9a0e0cccfe | ||
|
6ce4e9b50c | ||
|
bc5eb28299 | ||
|
156495f3a6 | ||
|
eaa8821a23 | ||
|
85bb54b988 | ||
|
909e7a2ca5 | ||
|
18f1fc8349 | ||
|
adfeccf06f | ||
|
72274de26e | ||
|
c0a787db2b | ||
|
209f6e27e0 | ||
|
d16f04942f | ||
|
5dafcf2170 | ||
|
56ab840f37 | ||
|
db94be5084 | ||
|
88d82eee4b | ||
|
c164011a4e | ||
|
e7dd82fab0 | ||
|
25b235a1b1 | ||
|
e07a1af84b | ||
|
e0960bd8e7 | ||
|
f17d02c992 | ||
|
2e37061278 | ||
|
e76138c35f | ||
|
adbb169463 | ||
|
b008283a7f | ||
|
82603c3abe | ||
|
df6581abab | ||
|
0450069179 | ||
|
9b5d507804 | ||
|
92b4422572 | ||
|
d8d1573b0d | ||
|
00a988c2ad | ||
|
89bb424ce2 | ||
|
1a45978a2d | ||
|
2bb603aafd | ||
|
b74b71ecb3 | ||
|
65a256f7a8 | ||
|
b1819cb61b | ||
|
52ca6cb63a | ||
|
234861710f | ||
|
e90025aa76 | ||
|
7a09cd2772 | ||
|
a654ab1e89 | ||
|
3c338c7d8a | ||
|
bf2efa3332 | ||
|
d28a8673b5 | ||
|
0a861141fa | ||
|
f831be849b | ||
|
a00d12a8dd | ||
|
23be238414 | ||
|
3b8f724a96 | ||
|
61dc82f423 | ||
|
843b4a93fe | ||
|
272e75f9a0 | ||
|
f331f05f9a | ||
|
0a21d2b8d0 | ||
|
ee1fa5b464 | ||
|
6b30370210 | ||
|
85aefec45a | ||
|
3bf23479cf | ||
|
f7a8a315e7 | ||
|
b18cea6d0f | ||
|
6966df5de7 | ||
|
e8c136169d | ||
|
da2ad48b92 | ||
|
b6349ac163 | ||
|
65c03f1013 | ||
|
fcdaa2d6b3 | ||
|
bbc85af0bd | ||
|
58eb74778b | ||
|
dd7fe47136 | ||
|
d81ed3eb4c | ||
|
ef62360342 | ||
|
3eb83b5b2d | ||
|
e54d291989 | ||
|
9d4117ae18 | ||
|
aa89297297 | ||
|
4cedd8fc23 | ||
|
65e339bed1 | ||
|
a8bd5c65cc | ||
|
8b72a21977 | ||
|
dbdd38e421 | ||
|
46a866ece9 | ||
|
664c75ebba | ||
|
be2bec4ead | ||
|
0e1d691b7f | ||
|
18d85f7db1 | ||
|
98e4b0035a | ||
|
7dc8b036e1 | ||
|
a4bc0cfecb | ||
|
5c9db19be0 | ||
|
15dee375d2 | ||
|
7e086db901 | ||
|
855dc5ba79 | ||
|
bb41792de2 | ||
|
67f4f5d2c4 | ||
|
76aed24192 | ||
|
6387822594 | ||
|
84aa074d18 | ||
|
777c387f1e | ||
|
91e29e815d | ||
|
da6da096b8 | ||
|
0500446b36 | ||
|
ac499dc4bb | ||
|
5199e3960e | ||
|
39bc769113 | ||
|
8a18eac752 | ||
|
f9f7abfffe | ||
|
4905c858db | ||
|
7d835ed934 | ||
|
ae47b00c6c | ||
|
d199f78d18 | ||
|
25c6d432ac | ||
|
c5ddd5bb7f | ||
|
88cb79d400 | ||
|
72a4697cda | ||
|
17939a3159 | ||
|
ddae91f21a | ||
|
9185a0a681 | ||
|
6234af6680 | ||
|
1e30b67b4d | ||
|
06cbb86a29 | ||
|
4d4848ab68 | ||
|
acc31b4448 | ||
|
b34706b152 | ||
|
b375ccfee7 | ||
|
49981f8327 | ||
|
90c272a4f2 | ||
|
bb09b3e5f1 | ||
|
3657275ca0 | ||
|
99cfbbc287 | ||
|
0d061f680a | ||
|
f492978638 | ||
|
1f4e2f33ef | ||
|
7b70250d07 | ||
|
cd0ffa9359 | ||
|
ea03b75b20 | ||
|
d83a27471b | ||
|
5c04eab617 | ||
|
9ce196dc3c | ||
|
bd572fcd8f | ||
|
712cbdbe1f | ||
|
4476697867 | ||
|
43186c4304 | ||
|
79b488d5c4 | ||
|
07bd7b0128 | ||
|
0f1439a065 | ||
|
cab4e108c8 | ||
|
a55b4462d4 | ||
|
246d503dea | ||
|
795390b033 | ||
|
4dc392b213 | ||
|
8ac21ed2d4 | ||
|
6ed3aaf3b6 | ||
|
db9b930abc | ||
|
63ce6b60d5 | ||
|
7a5e247d01 | ||
|
795560dba2 | ||
|
6661a20564 | ||
|
a3b8c1a80e | ||
|
460418f035 | ||
|
ea4d01f22f | ||
|
e5fb8b1fb6 | ||
|
0762cce09a | ||
|
b84206157a | ||
|
8084f80259 | ||
|
77e3708bf7 | ||
|
5ff054ef51 | ||
|
f463560ead | ||
|
d985acae68 | ||
|
72bb109a68 | ||
|
1fdce39622 | ||
|
5c1a76f8da | ||
|
b6b262d8bb | ||
|
eebd6ac4df | ||
|
0ec119e727 | ||
|
de5fd9d641 | ||
|
e546ffb37a | ||
|
c2b195d3c2 | ||
|
3e6c39e2ee | ||
|
71dbab2235 | ||
|
80405bef73 | ||
|
f3da720d8b | ||
|
1641f5e308 | ||
|
d99f4cc83d | ||
|
f4de46d2ac | ||
|
eaf5b17592 | ||
|
6de8049ab5 | ||
|
f312883f39 | ||
|
ada93c7182 | ||
|
e928358dfb | ||
|
ae0648fca8 | ||
|
d4cdc5172c | ||
|
790501e51f | ||
|
7b643a09d5 | ||
|
c6721ada67 | ||
|
3714e9b393 | ||
|
27d64ec8ad | ||
|
43014ea54b | ||
|
3d06cd4910 | ||
|
8691607ade | ||
|
db4153cc90 | ||
|
c984a6cdc8 | ||
|
060b6c4363 | ||
|
6a5a150722 | ||
|
62d50a3f13 | ||
|
56d53adab1 | ||
|
8f677417d1 | ||
|
3d5903a45f | ||
|
ba77356d98 | ||
|
5604fb2362 | ||
|
b23562ea20 | ||
|
0afeae16de | ||
|
749f94e885 | ||
|
5188629256 | ||
|
9117c0dd41 | ||
|
7d72ca329c | ||
|
df987c84de | ||
|
16274ba940 | ||
|
c7d35daad8 | ||
|
1b053efb5a | ||
|
803b4d30a6 | ||
|
c51fced060 | ||
|
aa123b73d1 | ||
|
611bbed2df | ||
|
8a93ff1ffb | ||
|
0641b8ba9c | ||
|
7b0bb3f92c | ||
|
3f276b58a5 | ||
|
75193e58ce | ||
|
a4e3415235 | ||
|
b8b938c61c | ||
|
2899866c63 | ||
|
9157831d16 | ||
|
cabc0df64d | ||
|
c40debc362 | ||
|
1784366694 | ||
|
8a994d4724 | ||
|
abb6e38208 | ||
|
92ffbd2b52 | ||
|
2b45db42b2 | ||
|
fe2a9bea38 | ||
|
dd39dbe79c | ||
|
e8e1fbb72f | ||
|
d546db33ff | ||
|
3c35da6029 | ||
|
e090e2dbd4 | ||
|
6b2cd6e843 | ||
|
0728f28cbe | ||
|
9e1d592de3 | ||
|
f1f2461e09 | ||
|
ffb4daf0fb | ||
|
d5c89ec65e | ||
|
d1c91b41e1 | ||
|
906eacd586 | ||
|
02772750e1 | ||
|
2ba4108c95 | ||
|
11daa3e417 | ||
|
944a8f16c7 | ||
|
70bd46293a | ||
|
6eaac7be89 | ||
|
2ae7330140 | ||
|
1cfd620124 | ||
|
f24e5d79bc | ||
|
a7c925cba4 | ||
|
bbc214fa9b | ||
|
8fdc925338 | ||
|
4b2883fac6 | ||
|
05c32e7f08 | ||
|
82608cd4ce | ||
|
fcdd4d4a52 | ||
|
445f4f2f3e | ||
|
b7a1f1a2d1 | ||
|
aa1f241894 | ||
|
fb364d86fa | ||
|
d747fbc95c | ||
|
0efe76c62b | ||
|
ab6abb799b | ||
|
9647e4d6cc | ||
|
be82ff5c7f | ||
|
efc10a92ef | ||
|
3635938b00 | ||
|
0cac3c4c23 | ||
|
01c5b208e8 | ||
|
528f3ab668 | ||
|
56b253fb3c | ||
|
b3387e96ed | ||
|
42f445565d | ||
|
d9d24b6605 | ||
|
7444bb2c25 | ||
|
fdb5324595 | ||
|
ed01cfc6db | ||
|
213adac2ea | ||
|
83fbaa3cb4 | ||
|
1ad7b517fa | ||
|
6c3d080e83 | ||
|
82453c84ba | ||
|
c73e56fd7f | ||
|
1e5ee1dd37 | ||
|
c3015a22cb | ||
|
01d26abd5c | ||
|
7f4bca0f90 | ||
|
7cc76facba | ||
|
e491dbb38a | ||
|
dd5573bc60 | ||
|
bb8996d62b | ||
|
2401c0223d | ||
|
af3b1c7370 | ||
|
979ad07925 | ||
|
3e44703cae | ||
|
c82f23095a | ||
|
187b6607a4 | ||
|
5e41ec703d | ||
|
ad28216987 | ||
|
d2a9560e71 | ||
|
41d72e28c3 | ||
|
e324ec639b | ||
|
cdb04519e2 | ||
|
38305cb676 | ||
|
2b36087597 | ||
|
7af9b80f23 | ||
|
60a86590aa | ||
|
588b76c2a1 | ||
|
f1d5c3374c | ||
|
ca16a4c81d | ||
|
034d555d30 | ||
|
ce6211d252 | ||
|
92ff142da2 | ||
|
c816f2c905 | ||
|
be67aae778 | ||
|
301f3d776f | ||
|
9eb6e049bd | ||
|
1f136c1f85 | ||
|
c293f64dc0 | ||
|
adbf43fe10 | ||
|
aab402731f | ||
|
e2b7f648f4 | ||
|
427738d81f |
12336 changed files with 808769 additions and 2224000 deletions
|
@ -1,21 +0,0 @@
|
||||||
{
|
|
||||||
"name": "moby",
|
|
||||||
"build": {
|
|
||||||
"context": "..",
|
|
||||||
"dockerfile": "../Dockerfile",
|
|
||||||
"target": "devcontainer"
|
|
||||||
},
|
|
||||||
"workspaceFolder": "/go/src/github.com/docker/docker",
|
|
||||||
"workspaceMount": "source=${localWorkspaceFolder},target=/go/src/github.com/docker/docker,type=bind,consistency=cached",
|
|
||||||
|
|
||||||
"remoteUser": "root",
|
|
||||||
"runArgs": ["--privileged"],
|
|
||||||
|
|
||||||
"customizations": {
|
|
||||||
"vscode": {
|
|
||||||
"extensions": [
|
|
||||||
"golang.go"
|
|
||||||
]
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
|
@ -1,4 +1,3 @@
|
||||||
.git
|
bundles
|
||||||
bundles/
|
.gopath
|
||||||
cli/winresources/**/winres.json
|
vendor/pkg
|
||||||
cli/winresources/**/*.syso
|
|
||||||
|
|
3
.gitattributes
vendored
3
.gitattributes
vendored
|
@ -1,3 +0,0 @@
|
||||||
Dockerfile* linguist-language=Dockerfile
|
|
||||||
vendor.mod linguist-language=Go-Module
|
|
||||||
vendor.sum linguist-language=Go-Checksums
|
|
13
.github/CODEOWNERS
vendored
13
.github/CODEOWNERS
vendored
|
@ -1,13 +0,0 @@
|
||||||
# GitHub code owners
|
|
||||||
# See https://help.github.com/articles/about-codeowners/
|
|
||||||
#
|
|
||||||
# KEEP THIS FILE SORTED. Order is important. Last match takes precedence.
|
|
||||||
|
|
||||||
builder/** @tonistiigi
|
|
||||||
contrib/mkimage/** @tianon
|
|
||||||
daemon/graphdriver/overlay2/** @dmcgowan
|
|
||||||
daemon/graphdriver/windows/** @johnstep
|
|
||||||
daemon/logger/awslogs/** @samuelkarp
|
|
||||||
hack/** @tianon
|
|
||||||
plugin/** @cpuguy83
|
|
||||||
project/** @thaJeztah
|
|
51
.github/ISSUE_TEMPLATE.md
vendored
Normal file
51
.github/ISSUE_TEMPLATE.md
vendored
Normal file
|
@ -0,0 +1,51 @@
|
||||||
|
<!--
|
||||||
|
If you are reporting a new issue, make sure that we do not have any duplicates
|
||||||
|
already open. You can ensure this by searching the issue list for this
|
||||||
|
repository. If there is a duplicate, please close your issue and add a comment
|
||||||
|
to the existing issue instead.
|
||||||
|
|
||||||
|
If you suspect your issue is a bug, please edit your issue description to
|
||||||
|
include the BUG REPORT INFORMATION shown below. If you fail to provide this
|
||||||
|
information within 7 days, we cannot debug your issue and will close it. We
|
||||||
|
will, however, reopen it if you later provide the information.
|
||||||
|
|
||||||
|
For more information about reporting issues, see
|
||||||
|
https://github.com/docker/docker/blob/master/CONTRIBUTING.md#reporting-other-issues
|
||||||
|
|
||||||
|
---------------------------------------------------
|
||||||
|
BUG REPORT INFORMATION
|
||||||
|
---------------------------------------------------
|
||||||
|
Use the commands below to provide key information from your environment:
|
||||||
|
You do NOT have to include this information if this is a FEATURE REQUEST
|
||||||
|
-->
|
||||||
|
|
||||||
|
**Output of `docker version`:**
|
||||||
|
|
||||||
|
```
|
||||||
|
(paste your output here)
|
||||||
|
```
|
||||||
|
|
||||||
|
|
||||||
|
**Output of `docker info`:**
|
||||||
|
|
||||||
|
```
|
||||||
|
(paste your output here)
|
||||||
|
```
|
||||||
|
|
||||||
|
**Additional environment details (AWS, VirtualBox, physical, etc.):**
|
||||||
|
|
||||||
|
|
||||||
|
|
||||||
|
**Steps to reproduce the issue:**
|
||||||
|
1.
|
||||||
|
2.
|
||||||
|
3.
|
||||||
|
|
||||||
|
|
||||||
|
**Describe the results you received:**
|
||||||
|
|
||||||
|
|
||||||
|
**Describe the results you expected:**
|
||||||
|
|
||||||
|
|
||||||
|
**Additional information you deem important (e.g. issue happens only occasionally):**
|
146
.github/ISSUE_TEMPLATE/bug_report.yml
vendored
146
.github/ISSUE_TEMPLATE/bug_report.yml
vendored
|
@ -1,146 +0,0 @@
|
||||||
name: Bug report
|
|
||||||
description: Create a report to help us improve
|
|
||||||
labels:
|
|
||||||
- kind/bug
|
|
||||||
- status/0-triage
|
|
||||||
body:
|
|
||||||
- type: markdown
|
|
||||||
attributes:
|
|
||||||
value: |
|
|
||||||
Thank you for taking the time to report a bug!
|
|
||||||
If this is a security issue please report it to the [Docker Security team](mailto:security@docker.com).
|
|
||||||
- type: textarea
|
|
||||||
id: description
|
|
||||||
attributes:
|
|
||||||
label: Description
|
|
||||||
description: Please give a clear and concise description of the bug
|
|
||||||
validations:
|
|
||||||
required: true
|
|
||||||
- type: textarea
|
|
||||||
id: repro
|
|
||||||
attributes:
|
|
||||||
label: Reproduce
|
|
||||||
description: Steps to reproduce the bug
|
|
||||||
placeholder: |
|
|
||||||
1. docker run ...
|
|
||||||
2. docker kill ...
|
|
||||||
3. docker rm ...
|
|
||||||
validations:
|
|
||||||
required: true
|
|
||||||
- type: textarea
|
|
||||||
id: expected
|
|
||||||
attributes:
|
|
||||||
label: Expected behavior
|
|
||||||
description: What is the expected behavior?
|
|
||||||
placeholder: |
|
|
||||||
E.g. "`docker rm` should remove the container and cleanup all associated data"
|
|
||||||
- type: textarea
|
|
||||||
id: version
|
|
||||||
attributes:
|
|
||||||
label: docker version
|
|
||||||
description: Output of `docker version`
|
|
||||||
render: bash
|
|
||||||
placeholder: |
|
|
||||||
Client:
|
|
||||||
Version: 20.10.17
|
|
||||||
API version: 1.41
|
|
||||||
Go version: go1.17.11
|
|
||||||
Git commit: 100c70180fde3601def79a59cc3e996aa553c9b9
|
|
||||||
Built: Mon Jun 6 21:36:39 UTC 2022
|
|
||||||
OS/Arch: linux/amd64
|
|
||||||
Context: default
|
|
||||||
Experimental: true
|
|
||||||
|
|
||||||
Server:
|
|
||||||
Engine:
|
|
||||||
Version: 20.10.17
|
|
||||||
API version: 1.41 (minimum version 1.12)
|
|
||||||
Go version: go1.17.11
|
|
||||||
Git commit: a89b84221c8560e7a3dee2a653353429e7628424
|
|
||||||
Built: Mon Jun 6 22:32:38 2022
|
|
||||||
OS/Arch: linux/amd64
|
|
||||||
Experimental: true
|
|
||||||
containerd:
|
|
||||||
Version: 1.6.6
|
|
||||||
GitCommit: 10c12954828e7c7c9b6e0ea9b0c02b01407d3ae1
|
|
||||||
runc:
|
|
||||||
Version: 1.1.2
|
|
||||||
GitCommit: a916309fff0f838eb94e928713dbc3c0d0ac7aa4
|
|
||||||
docker-init:
|
|
||||||
Version: 0.19.0
|
|
||||||
GitCommit:
|
|
||||||
validations:
|
|
||||||
required: true
|
|
||||||
- type: textarea
|
|
||||||
id: info
|
|
||||||
attributes:
|
|
||||||
label: docker info
|
|
||||||
description: Output of `docker info`
|
|
||||||
render: bash
|
|
||||||
placeholder: |
|
|
||||||
Client:
|
|
||||||
Context: default
|
|
||||||
Debug Mode: false
|
|
||||||
Plugins:
|
|
||||||
buildx: Docker Buildx (Docker Inc., 0.8.2)
|
|
||||||
compose: Docker Compose (Docker Inc., 2.6.0)
|
|
||||||
|
|
||||||
Server:
|
|
||||||
Containers: 4
|
|
||||||
Running: 2
|
|
||||||
Paused: 0
|
|
||||||
Stopped: 2
|
|
||||||
Images: 80
|
|
||||||
Server Version: 20.10.17
|
|
||||||
Storage Driver: overlay2
|
|
||||||
Backing Filesystem: xfs
|
|
||||||
Supports d_type: true
|
|
||||||
Native Overlay Diff: false
|
|
||||||
userxattr: false
|
|
||||||
Logging Driver: local
|
|
||||||
Cgroup Driver: cgroupfs
|
|
||||||
Cgroup Version: 1
|
|
||||||
Plugins:
|
|
||||||
Volume: local
|
|
||||||
Network: bridge host ipvlan macvlan null overlay
|
|
||||||
Log: awslogs fluentd gcplogs gelf journald json-file local logentries splunk syslog
|
|
||||||
Swarm: inactive
|
|
||||||
Runtimes: runc io.containerd.runc.v2 io.containerd.runtime.v1.linux
|
|
||||||
Default Runtime: runc
|
|
||||||
Init Binary: docker-init
|
|
||||||
containerd version: 10c12954828e7c7c9b6e0ea9b0c02b01407d3ae1
|
|
||||||
runc version: a916309fff0f838eb94e928713dbc3c0d0ac7aa4
|
|
||||||
init version:
|
|
||||||
Security Options:
|
|
||||||
apparmor
|
|
||||||
seccomp
|
|
||||||
Profile: default
|
|
||||||
Kernel Version: 5.13.0-1031-azure
|
|
||||||
Operating System: Ubuntu 20.04.4 LTS
|
|
||||||
OSType: linux
|
|
||||||
Architecture: x86_64
|
|
||||||
CPUs: 4
|
|
||||||
Total Memory: 15.63GiB
|
|
||||||
Name: dev
|
|
||||||
ID: UC44:2RFL:7NQ5:GGFW:34O5:DYRE:CLOH:VLGZ:64AZ:GFXC:PY6H:SAHY
|
|
||||||
Docker Root Dir: /var/lib/docker
|
|
||||||
Debug Mode: true
|
|
||||||
File Descriptors: 46
|
|
||||||
Goroutines: 134
|
|
||||||
System Time: 2022-07-06T18:07:54.812439392Z
|
|
||||||
EventsListeners: 0
|
|
||||||
Registry: https://index.docker.io/v1/
|
|
||||||
Labels:
|
|
||||||
Experimental: true
|
|
||||||
Insecure Registries:
|
|
||||||
127.0.0.0/8
|
|
||||||
Live Restore Enabled: true
|
|
||||||
validations:
|
|
||||||
required: true
|
|
||||||
- type: textarea
|
|
||||||
id: additional
|
|
||||||
attributes:
|
|
||||||
label: Additional Info
|
|
||||||
description: Additional info you want to provide such as logs, system info, environment, etc.
|
|
||||||
validations:
|
|
||||||
required: false
|
|
8
.github/ISSUE_TEMPLATE/config.yml
vendored
8
.github/ISSUE_TEMPLATE/config.yml
vendored
|
@ -1,8 +0,0 @@
|
||||||
blank_issues_enabled: false
|
|
||||||
contact_links:
|
|
||||||
- name: Security and Vulnerabilities
|
|
||||||
url: https://github.com/moby/moby/blob/master/SECURITY.md
|
|
||||||
about: Please report any security issues or vulnerabilities responsibly to the Docker security team. Please do not use the public issue tracker.
|
|
||||||
- name: Questions and Discussions
|
|
||||||
url: https://github.com/moby/moby/discussions/new
|
|
||||||
about: Use Github Discussions to ask questions and/or open discussion topics.
|
|
13
.github/ISSUE_TEMPLATE/feature_request.yml
vendored
13
.github/ISSUE_TEMPLATE/feature_request.yml
vendored
|
@ -1,13 +0,0 @@
|
||||||
name: Feature request
|
|
||||||
description: Missing functionality? Come tell us about it!
|
|
||||||
labels:
|
|
||||||
- kind/feature
|
|
||||||
- status/0-triage
|
|
||||||
body:
|
|
||||||
- type: textarea
|
|
||||||
id: description
|
|
||||||
attributes:
|
|
||||||
label: Description
|
|
||||||
description: What is the feature you want to see?
|
|
||||||
validations:
|
|
||||||
required: true
|
|
7
.github/PULL_REQUEST_TEMPLATE.md
vendored
7
.github/PULL_REQUEST_TEMPLATE.md
vendored
|
@ -1,6 +1,6 @@
|
||||||
<!--
|
<!--
|
||||||
Please make sure you've read and understood our contributing guidelines;
|
Please make sure you've read and understood our contributing guidelines;
|
||||||
https://github.com/moby/moby/blob/master/CONTRIBUTING.md
|
https://github.com/docker/docker/blob/master/CONTRIBUTING.md
|
||||||
|
|
||||||
** Make sure all your commits include a signature generated with `git commit -s` **
|
** Make sure all your commits include a signature generated with `git commit -s` **
|
||||||
|
|
||||||
|
@ -22,12 +22,9 @@ Please provide the following information:
|
||||||
**- Description for the changelog**
|
**- Description for the changelog**
|
||||||
<!--
|
<!--
|
||||||
Write a short (one line) summary that describes the changes in this
|
Write a short (one line) summary that describes the changes in this
|
||||||
pull request for inclusion in the changelog.
|
pull request for inclusion in the changelog:
|
||||||
It must be placed inside the below triple backticks section:
|
|
||||||
-->
|
-->
|
||||||
```markdown changelog
|
|
||||||
|
|
||||||
```
|
|
||||||
|
|
||||||
**- A picture of a cute animal (not mandatory but encouraged)**
|
**- A picture of a cute animal (not mandatory but encouraged)**
|
||||||
|
|
||||||
|
|
27
.github/actions/setup-runner/action.yml
vendored
27
.github/actions/setup-runner/action.yml
vendored
|
@ -1,27 +0,0 @@
|
||||||
name: 'Setup Runner'
|
|
||||||
description: 'Composite action to set up the GitHub Runner for jobs in the test.yml workflow'
|
|
||||||
|
|
||||||
runs:
|
|
||||||
using: composite
|
|
||||||
steps:
|
|
||||||
- run: |
|
|
||||||
sudo modprobe ip_vs
|
|
||||||
sudo modprobe ipv6
|
|
||||||
sudo modprobe ip6table_filter
|
|
||||||
sudo modprobe -r overlay
|
|
||||||
sudo modprobe overlay redirect_dir=off
|
|
||||||
shell: bash
|
|
||||||
- run: |
|
|
||||||
if [ ! -e /etc/docker/daemon.json ]; then
|
|
||||||
echo '{}' | sudo tee /etc/docker/daemon.json >/dev/null
|
|
||||||
fi
|
|
||||||
DOCKERD_CONFIG=$(jq '.+{"experimental":true,"live-restore":true,"ipv6":true,"fixed-cidr-v6":"2001:db8:1::/64"}' /etc/docker/daemon.json)
|
|
||||||
sudo tee /etc/docker/daemon.json <<<"$DOCKERD_CONFIG" >/dev/null
|
|
||||||
sudo service docker restart
|
|
||||||
shell: bash
|
|
||||||
- run: |
|
|
||||||
./contrib/check-config.sh || true
|
|
||||||
shell: bash
|
|
||||||
- run: |
|
|
||||||
docker info
|
|
||||||
shell: bash
|
|
14
.github/actions/setup-tracing/action.yml
vendored
14
.github/actions/setup-tracing/action.yml
vendored
|
@ -1,14 +0,0 @@
|
||||||
name: 'Setup Tracing'
|
|
||||||
description: 'Composite action to set up the tracing for test jobs'
|
|
||||||
|
|
||||||
runs:
|
|
||||||
using: composite
|
|
||||||
steps:
|
|
||||||
- run: |
|
|
||||||
set -e
|
|
||||||
# Jaeger is set up on Windows through an inline run step. If you update Jaeger here, don't forget to update
|
|
||||||
# the version set in .github/workflows/.windows.yml.
|
|
||||||
docker run -d --net=host --name jaeger -e COLLECTOR_OTLP_ENABLED=true jaegertracing/all-in-one:1.46
|
|
||||||
docker0_ip="$(ip -f inet addr show docker0 | grep -Po 'inet \K[\d.]+')"
|
|
||||||
echo "OTEL_EXPORTER_OTLP_ENDPOINT=http://${docker0_ip}:4318" >> "${GITHUB_ENV}"
|
|
||||||
shell: bash
|
|
48
.github/workflows/.dco.yml
vendored
48
.github/workflows/.dco.yml
vendored
|
@ -1,48 +0,0 @@
|
||||||
# reusable workflow
|
|
||||||
name: .dco
|
|
||||||
|
|
||||||
# TODO: hide reusable workflow from the UI. Tracked in https://github.com/community/community/discussions/12025
|
|
||||||
|
|
||||||
on:
|
|
||||||
workflow_call:
|
|
||||||
|
|
||||||
env:
|
|
||||||
ALPINE_VERSION: 3.16
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
run:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
with:
|
|
||||||
fetch-depth: 0
|
|
||||||
-
|
|
||||||
name: Dump context
|
|
||||||
uses: actions/github-script@v7
|
|
||||||
with:
|
|
||||||
script: |
|
|
||||||
console.log(JSON.stringify(context, null, 2));
|
|
||||||
-
|
|
||||||
name: Get base ref
|
|
||||||
id: base-ref
|
|
||||||
uses: actions/github-script@v7
|
|
||||||
with:
|
|
||||||
result-encoding: string
|
|
||||||
script: |
|
|
||||||
if (/^refs\/pull\//.test(context.ref) && context.payload?.pull_request?.base?.ref != undefined) {
|
|
||||||
return context.payload.pull_request.base.ref;
|
|
||||||
}
|
|
||||||
return context.ref.replace(/^refs\/heads\//g, '');
|
|
||||||
-
|
|
||||||
name: Validate
|
|
||||||
run: |
|
|
||||||
docker run --rm \
|
|
||||||
-v "$(pwd):/workspace" \
|
|
||||||
-e VALIDATE_REPO \
|
|
||||||
-e VALIDATE_BRANCH \
|
|
||||||
alpine:${{ env.ALPINE_VERSION }} sh -c 'apk add --no-cache -q bash git openssh-client && git config --system --add safe.directory /workspace && cd /workspace && hack/validate/dco'
|
|
||||||
env:
|
|
||||||
VALIDATE_REPO: ${{ github.server_url }}/${{ github.repository }}.git
|
|
||||||
VALIDATE_BRANCH: ${{ steps.base-ref.outputs.result }}
|
|
35
.github/workflows/.test-prepare.yml
vendored
35
.github/workflows/.test-prepare.yml
vendored
|
@ -1,35 +0,0 @@
|
||||||
# reusable workflow
|
|
||||||
name: .test-prepare
|
|
||||||
|
|
||||||
# TODO: hide reusable workflow from the UI. Tracked in https://github.com/community/community/discussions/12025
|
|
||||||
|
|
||||||
on:
|
|
||||||
workflow_call:
|
|
||||||
outputs:
|
|
||||||
matrix:
|
|
||||||
description: Test matrix
|
|
||||||
value: ${{ jobs.run.outputs.matrix }}
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
run:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
outputs:
|
|
||||||
matrix: ${{ steps.set.outputs.matrix }}
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
-
|
|
||||||
name: Create matrix
|
|
||||||
id: set
|
|
||||||
uses: actions/github-script@v7
|
|
||||||
with:
|
|
||||||
script: |
|
|
||||||
let matrix = ['graphdriver'];
|
|
||||||
if ("${{ contains(github.event.pull_request.labels.*.name, 'containerd-integration') || github.event_name != 'pull_request' }}" == "true") {
|
|
||||||
matrix.push('snapshotter');
|
|
||||||
}
|
|
||||||
await core.group(`Set matrix`, async () => {
|
|
||||||
core.info(`matrix: ${JSON.stringify(matrix)}`);
|
|
||||||
core.setOutput('matrix', JSON.stringify(matrix));
|
|
||||||
});
|
|
445
.github/workflows/.test.yml
vendored
445
.github/workflows/.test.yml
vendored
|
@ -1,445 +0,0 @@
|
||||||
# reusable workflow
|
|
||||||
name: .test
|
|
||||||
|
|
||||||
# TODO: hide reusable workflow from the UI. Tracked in https://github.com/community/community/discussions/12025
|
|
||||||
|
|
||||||
on:
|
|
||||||
workflow_call:
|
|
||||||
inputs:
|
|
||||||
storage:
|
|
||||||
required: true
|
|
||||||
type: string
|
|
||||||
default: "graphdriver"
|
|
||||||
|
|
||||||
env:
|
|
||||||
GO_VERSION: "1.21.9"
|
|
||||||
GOTESTLIST_VERSION: v0.3.1
|
|
||||||
TESTSTAT_VERSION: v0.1.25
|
|
||||||
ITG_CLI_MATRIX_SIZE: 6
|
|
||||||
DOCKER_EXPERIMENTAL: 1
|
|
||||||
DOCKER_GRAPHDRIVER: ${{ inputs.storage == 'snapshotter' && 'overlayfs' || 'overlay2' }}
|
|
||||||
TEST_INTEGRATION_USE_SNAPSHOTTER: ${{ inputs.storage == 'snapshotter' && '1' || '' }}
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
unit:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
continue-on-error: ${{ github.event_name != 'pull_request' }}
|
|
||||||
timeout-minutes: 120
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
-
|
|
||||||
name: Set up runner
|
|
||||||
uses: ./.github/actions/setup-runner
|
|
||||||
-
|
|
||||||
name: Set up Docker Buildx
|
|
||||||
uses: docker/setup-buildx-action@v3
|
|
||||||
-
|
|
||||||
name: Build dev image
|
|
||||||
uses: docker/bake-action@v4
|
|
||||||
with:
|
|
||||||
targets: dev
|
|
||||||
set: |
|
|
||||||
dev.cache-from=type=gha,scope=dev
|
|
||||||
-
|
|
||||||
name: Test
|
|
||||||
run: |
|
|
||||||
make -o build test-unit
|
|
||||||
-
|
|
||||||
name: Prepare reports
|
|
||||||
if: always()
|
|
||||||
run: |
|
|
||||||
mkdir -p bundles /tmp/reports
|
|
||||||
find bundles -path '*/root/*overlay2' -prune -o -type f \( -name '*-report.json' -o -name '*.log' -o -name '*.out' -o -name '*.prof' -o -name '*-report.xml' \) -print | xargs sudo tar -czf /tmp/reports.tar.gz
|
|
||||||
tar -xzf /tmp/reports.tar.gz -C /tmp/reports
|
|
||||||
sudo chown -R $(id -u):$(id -g) /tmp/reports
|
|
||||||
tree -nh /tmp/reports
|
|
||||||
-
|
|
||||||
name: Send to Codecov
|
|
||||||
uses: codecov/codecov-action@v4
|
|
||||||
with:
|
|
||||||
directory: ./bundles
|
|
||||||
env_vars: RUNNER_OS
|
|
||||||
flags: unit
|
|
||||||
token: ${{ secrets.CODECOV_TOKEN }} # used to upload coverage reports: https://github.com/moby/buildkit/pull/4660#issue-2142122533
|
|
||||||
-
|
|
||||||
name: Upload reports
|
|
||||||
if: always()
|
|
||||||
uses: actions/upload-artifact@v4
|
|
||||||
with:
|
|
||||||
name: test-reports-unit-${{ inputs.storage }}
|
|
||||||
path: /tmp/reports/*
|
|
||||||
retention-days: 1
|
|
||||||
|
|
||||||
unit-report:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
continue-on-error: ${{ github.event_name != 'pull_request' }}
|
|
||||||
timeout-minutes: 10
|
|
||||||
if: always()
|
|
||||||
needs:
|
|
||||||
- unit
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Set up Go
|
|
||||||
uses: actions/setup-go@v5
|
|
||||||
with:
|
|
||||||
go-version: ${{ env.GO_VERSION }}
|
|
||||||
-
|
|
||||||
name: Download reports
|
|
||||||
uses: actions/download-artifact@v4
|
|
||||||
with:
|
|
||||||
name: test-reports-unit-${{ inputs.storage }}
|
|
||||||
path: /tmp/reports
|
|
||||||
-
|
|
||||||
name: Install teststat
|
|
||||||
run: |
|
|
||||||
go install github.com/vearutop/teststat@${{ env.TESTSTAT_VERSION }}
|
|
||||||
-
|
|
||||||
name: Create summary
|
|
||||||
run: |
|
|
||||||
find /tmp/reports -type f -name '*-go-test-report.json' -exec teststat -markdown {} \+ >> $GITHUB_STEP_SUMMARY
|
|
||||||
|
|
||||||
docker-py:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
continue-on-error: ${{ github.event_name != 'pull_request' }}
|
|
||||||
timeout-minutes: 120
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
-
|
|
||||||
name: Set up runner
|
|
||||||
uses: ./.github/actions/setup-runner
|
|
||||||
-
|
|
||||||
name: Set up tracing
|
|
||||||
uses: ./.github/actions/setup-tracing
|
|
||||||
-
|
|
||||||
name: Set up Docker Buildx
|
|
||||||
uses: docker/setup-buildx-action@v3
|
|
||||||
-
|
|
||||||
name: Build dev image
|
|
||||||
uses: docker/bake-action@v4
|
|
||||||
with:
|
|
||||||
targets: dev
|
|
||||||
set: |
|
|
||||||
dev.cache-from=type=gha,scope=dev
|
|
||||||
-
|
|
||||||
name: Test
|
|
||||||
run: |
|
|
||||||
make -o build test-docker-py
|
|
||||||
-
|
|
||||||
name: Prepare reports
|
|
||||||
if: always()
|
|
||||||
run: |
|
|
||||||
mkdir -p bundles /tmp/reports
|
|
||||||
find bundles -path '*/root/*overlay2' -prune -o -type f \( -name '*-report.json' -o -name '*.log' -o -name '*.out' -o -name '*.prof' -o -name '*-report.xml' \) -print | xargs sudo tar -czf /tmp/reports.tar.gz
|
|
||||||
tar -xzf /tmp/reports.tar.gz -C /tmp/reports
|
|
||||||
sudo chown -R $(id -u):$(id -g) /tmp/reports
|
|
||||||
tree -nh /tmp/reports
|
|
||||||
|
|
||||||
curl -sSLf localhost:16686/api/traces?service=integration-test-client > /tmp/reports/jaeger-trace.json
|
|
||||||
-
|
|
||||||
name: Test daemon logs
|
|
||||||
if: always()
|
|
||||||
run: |
|
|
||||||
cat bundles/test-docker-py/docker.log
|
|
||||||
-
|
|
||||||
name: Upload reports
|
|
||||||
if: always()
|
|
||||||
uses: actions/upload-artifact@v4
|
|
||||||
with:
|
|
||||||
name: test-reports-docker-py-${{ inputs.storage }}
|
|
||||||
path: /tmp/reports/*
|
|
||||||
retention-days: 1
|
|
||||||
|
|
||||||
integration-flaky:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
continue-on-error: ${{ github.event_name != 'pull_request' }}
|
|
||||||
timeout-minutes: 120
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
-
|
|
||||||
name: Set up runner
|
|
||||||
uses: ./.github/actions/setup-runner
|
|
||||||
-
|
|
||||||
name: Set up Docker Buildx
|
|
||||||
uses: docker/setup-buildx-action@v3
|
|
||||||
-
|
|
||||||
name: Build dev image
|
|
||||||
uses: docker/bake-action@v4
|
|
||||||
with:
|
|
||||||
targets: dev
|
|
||||||
set: |
|
|
||||||
dev.cache-from=type=gha,scope=dev
|
|
||||||
-
|
|
||||||
name: Test
|
|
||||||
run: |
|
|
||||||
make -o build test-integration-flaky
|
|
||||||
env:
|
|
||||||
TEST_SKIP_INTEGRATION_CLI: 1
|
|
||||||
|
|
||||||
integration:
|
|
||||||
runs-on: ${{ matrix.os }}
|
|
||||||
continue-on-error: ${{ github.event_name != 'pull_request' }}
|
|
||||||
timeout-minutes: 120
|
|
||||||
strategy:
|
|
||||||
fail-fast: false
|
|
||||||
matrix:
|
|
||||||
os:
|
|
||||||
- ubuntu-20.04
|
|
||||||
- ubuntu-22.04
|
|
||||||
mode:
|
|
||||||
- ""
|
|
||||||
- rootless
|
|
||||||
- systemd
|
|
||||||
#- rootless-systemd FIXME: https://github.com/moby/moby/issues/44084
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
-
|
|
||||||
name: Set up runner
|
|
||||||
uses: ./.github/actions/setup-runner
|
|
||||||
-
|
|
||||||
name: Set up tracing
|
|
||||||
uses: ./.github/actions/setup-tracing
|
|
||||||
-
|
|
||||||
name: Prepare
|
|
||||||
run: |
|
|
||||||
CACHE_DEV_SCOPE=dev
|
|
||||||
if [[ "${{ matrix.mode }}" == *"rootless"* ]]; then
|
|
||||||
echo "DOCKER_ROOTLESS=1" >> $GITHUB_ENV
|
|
||||||
fi
|
|
||||||
if [[ "${{ matrix.mode }}" == *"systemd"* ]]; then
|
|
||||||
echo "SYSTEMD=true" >> $GITHUB_ENV
|
|
||||||
CACHE_DEV_SCOPE="${CACHE_DEV_SCOPE}systemd"
|
|
||||||
fi
|
|
||||||
echo "CACHE_DEV_SCOPE=${CACHE_DEV_SCOPE}" >> $GITHUB_ENV
|
|
||||||
-
|
|
||||||
name: Set up Docker Buildx
|
|
||||||
uses: docker/setup-buildx-action@v3
|
|
||||||
-
|
|
||||||
name: Build dev image
|
|
||||||
uses: docker/bake-action@v4
|
|
||||||
with:
|
|
||||||
targets: dev
|
|
||||||
set: |
|
|
||||||
dev.cache-from=type=gha,scope=${{ env.CACHE_DEV_SCOPE }}
|
|
||||||
-
|
|
||||||
name: Test
|
|
||||||
run: |
|
|
||||||
make -o build test-integration
|
|
||||||
env:
|
|
||||||
TEST_SKIP_INTEGRATION_CLI: 1
|
|
||||||
TESTCOVERAGE: 1
|
|
||||||
-
|
|
||||||
name: Prepare reports
|
|
||||||
if: always()
|
|
||||||
run: |
|
|
||||||
reportsName=${{ matrix.os }}
|
|
||||||
if [ -n "${{ matrix.mode }}" ]; then
|
|
||||||
reportsName="$reportsName-${{ matrix.mode }}"
|
|
||||||
fi
|
|
||||||
reportsPath="/tmp/reports/$reportsName"
|
|
||||||
echo "TESTREPORTS_NAME=$reportsName" >> $GITHUB_ENV
|
|
||||||
|
|
||||||
mkdir -p bundles $reportsPath
|
|
||||||
find bundles -path '*/root/*overlay2' -prune -o -type f \( -name '*-report.json' -o -name '*.log' -o -name '*.out' -o -name '*.prof' -o -name '*-report.xml' \) -print | xargs sudo tar -czf /tmp/reports.tar.gz
|
|
||||||
tar -xzf /tmp/reports.tar.gz -C $reportsPath
|
|
||||||
sudo chown -R $(id -u):$(id -g) $reportsPath
|
|
||||||
tree -nh $reportsPath
|
|
||||||
|
|
||||||
curl -sSLf localhost:16686/api/traces?service=integration-test-client > $reportsPath/jaeger-trace.json
|
|
||||||
-
|
|
||||||
name: Send to Codecov
|
|
||||||
uses: codecov/codecov-action@v4
|
|
||||||
with:
|
|
||||||
directory: ./bundles/test-integration
|
|
||||||
env_vars: RUNNER_OS
|
|
||||||
flags: integration,${{ matrix.mode }}
|
|
||||||
token: ${{ secrets.CODECOV_TOKEN }} # used to upload coverage reports: https://github.com/moby/buildkit/pull/4660#issue-2142122533
|
|
||||||
-
|
|
||||||
name: Test daemon logs
|
|
||||||
if: always()
|
|
||||||
run: |
|
|
||||||
cat bundles/test-integration/docker.log
|
|
||||||
-
|
|
||||||
name: Upload reports
|
|
||||||
if: always()
|
|
||||||
uses: actions/upload-artifact@v4
|
|
||||||
with:
|
|
||||||
name: test-reports-integration-${{ inputs.storage }}-${{ env.TESTREPORTS_NAME }}
|
|
||||||
path: /tmp/reports/*
|
|
||||||
retention-days: 1
|
|
||||||
|
|
||||||
integration-report:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
continue-on-error: ${{ github.event_name != 'pull_request' }}
|
|
||||||
timeout-minutes: 10
|
|
||||||
if: always()
|
|
||||||
needs:
|
|
||||||
- integration
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Set up Go
|
|
||||||
uses: actions/setup-go@v5
|
|
||||||
with:
|
|
||||||
go-version: ${{ env.GO_VERSION }}
|
|
||||||
-
|
|
||||||
name: Download reports
|
|
||||||
uses: actions/download-artifact@v4
|
|
||||||
with:
|
|
||||||
path: /tmp/reports
|
|
||||||
pattern: test-reports-integration-${{ inputs.storage }}-*
|
|
||||||
merge-multiple: true
|
|
||||||
-
|
|
||||||
name: Install teststat
|
|
||||||
run: |
|
|
||||||
go install github.com/vearutop/teststat@${{ env.TESTSTAT_VERSION }}
|
|
||||||
-
|
|
||||||
name: Create summary
|
|
||||||
run: |
|
|
||||||
find /tmp/reports -type f -name '*-go-test-report.json' -exec teststat -markdown {} \+ >> $GITHUB_STEP_SUMMARY
|
|
||||||
|
|
||||||
integration-cli-prepare:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
continue-on-error: ${{ github.event_name != 'pull_request' }}
|
|
||||||
outputs:
|
|
||||||
matrix: ${{ steps.tests.outputs.matrix }}
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
-
|
|
||||||
name: Set up Go
|
|
||||||
uses: actions/setup-go@v5
|
|
||||||
with:
|
|
||||||
go-version: ${{ env.GO_VERSION }}
|
|
||||||
-
|
|
||||||
name: Install gotestlist
|
|
||||||
run:
|
|
||||||
go install github.com/crazy-max/gotestlist/cmd/gotestlist@${{ env.GOTESTLIST_VERSION }}
|
|
||||||
-
|
|
||||||
name: Create matrix
|
|
||||||
id: tests
|
|
||||||
working-directory: ./integration-cli
|
|
||||||
run: |
|
|
||||||
# This step creates a matrix for integration-cli tests. Tests suites
|
|
||||||
# are distributed in integration-cli job through a matrix. There is
|
|
||||||
# also overrides being added to the matrix like "./..." to run
|
|
||||||
# "Test integration" step exclusively and specific tests suites that
|
|
||||||
# take a long time to run.
|
|
||||||
matrix="$(gotestlist -d ${{ env.ITG_CLI_MATRIX_SIZE }} -o "./..." -o "DockerSwarmSuite" -o "DockerNetworkSuite|DockerExternalVolumeSuite" ./...)"
|
|
||||||
echo "matrix=$matrix" >> $GITHUB_OUTPUT
|
|
||||||
-
|
|
||||||
name: Show matrix
|
|
||||||
run: |
|
|
||||||
echo ${{ steps.tests.outputs.matrix }}
|
|
||||||
|
|
||||||
integration-cli:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
continue-on-error: ${{ github.event_name != 'pull_request' }}
|
|
||||||
timeout-minutes: 120
|
|
||||||
needs:
|
|
||||||
- integration-cli-prepare
|
|
||||||
strategy:
|
|
||||||
fail-fast: false
|
|
||||||
matrix:
|
|
||||||
test: ${{ fromJson(needs.integration-cli-prepare.outputs.matrix) }}
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
-
|
|
||||||
name: Set up runner
|
|
||||||
uses: ./.github/actions/setup-runner
|
|
||||||
-
|
|
||||||
name: Set up tracing
|
|
||||||
uses: ./.github/actions/setup-tracing
|
|
||||||
-
|
|
||||||
name: Set up Docker Buildx
|
|
||||||
uses: docker/setup-buildx-action@v3
|
|
||||||
-
|
|
||||||
name: Build dev image
|
|
||||||
uses: docker/bake-action@v4
|
|
||||||
with:
|
|
||||||
targets: dev
|
|
||||||
set: |
|
|
||||||
dev.cache-from=type=gha,scope=dev
|
|
||||||
-
|
|
||||||
name: Test
|
|
||||||
run: |
|
|
||||||
make -o build test-integration
|
|
||||||
env:
|
|
||||||
TEST_SKIP_INTEGRATION: 1
|
|
||||||
TESTCOVERAGE: 1
|
|
||||||
TESTFLAGS: "-test.run (${{ matrix.test }})/"
|
|
||||||
-
|
|
||||||
name: Prepare reports
|
|
||||||
if: always()
|
|
||||||
run: |
|
|
||||||
reportsName=$(echo -n "${{ matrix.test }}" | sha256sum | cut -d " " -f 1)
|
|
||||||
reportsPath=/tmp/reports/$reportsName
|
|
||||||
echo "TESTREPORTS_NAME=$reportsName" >> $GITHUB_ENV
|
|
||||||
|
|
||||||
mkdir -p bundles $reportsPath
|
|
||||||
echo "${{ matrix.test }}" | tr -s '|' '\n' | tee -a "$reportsPath/tests.txt"
|
|
||||||
find bundles -path '*/root/*overlay2' -prune -o -type f \( -name '*-report.json' -o -name '*.log' -o -name '*.out' -o -name '*.prof' -o -name '*-report.xml' \) -print | xargs sudo tar -czf /tmp/reports.tar.gz
|
|
||||||
tar -xzf /tmp/reports.tar.gz -C $reportsPath
|
|
||||||
sudo chown -R $(id -u):$(id -g) $reportsPath
|
|
||||||
tree -nh $reportsPath
|
|
||||||
|
|
||||||
curl -sSLf localhost:16686/api/traces?service=integration-test-client > $reportsPath/jaeger-trace.json
|
|
||||||
-
|
|
||||||
name: Send to Codecov
|
|
||||||
uses: codecov/codecov-action@v4
|
|
||||||
with:
|
|
||||||
directory: ./bundles/test-integration
|
|
||||||
env_vars: RUNNER_OS
|
|
||||||
flags: integration-cli
|
|
||||||
token: ${{ secrets.CODECOV_TOKEN }} # used to upload coverage reports: https://github.com/moby/buildkit/pull/4660#issue-2142122533
|
|
||||||
-
|
|
||||||
name: Test daemon logs
|
|
||||||
if: always()
|
|
||||||
run: |
|
|
||||||
cat bundles/test-integration/docker.log
|
|
||||||
-
|
|
||||||
name: Upload reports
|
|
||||||
if: always()
|
|
||||||
uses: actions/upload-artifact@v4
|
|
||||||
with:
|
|
||||||
name: test-reports-integration-cli-${{ inputs.storage }}-${{ env.TESTREPORTS_NAME }}
|
|
||||||
path: /tmp/reports/*
|
|
||||||
retention-days: 1
|
|
||||||
|
|
||||||
integration-cli-report:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
continue-on-error: ${{ github.event_name != 'pull_request' }}
|
|
||||||
timeout-minutes: 10
|
|
||||||
if: always()
|
|
||||||
needs:
|
|
||||||
- integration-cli
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Set up Go
|
|
||||||
uses: actions/setup-go@v5
|
|
||||||
with:
|
|
||||||
go-version: ${{ env.GO_VERSION }}
|
|
||||||
-
|
|
||||||
name: Download reports
|
|
||||||
uses: actions/download-artifact@v4
|
|
||||||
with:
|
|
||||||
path: /tmp/reports
|
|
||||||
pattern: test-reports-integration-cli-${{ inputs.storage }}-*
|
|
||||||
merge-multiple: true
|
|
||||||
-
|
|
||||||
name: Install teststat
|
|
||||||
run: |
|
|
||||||
go install github.com/vearutop/teststat@${{ env.TESTSTAT_VERSION }}
|
|
||||||
-
|
|
||||||
name: Create summary
|
|
||||||
run: |
|
|
||||||
find /tmp/reports -type f -name '*-go-test-report.json' -exec teststat -markdown {} \+ >> $GITHUB_STEP_SUMMARY
|
|
551
.github/workflows/.windows.yml
vendored
551
.github/workflows/.windows.yml
vendored
|
@ -1,551 +0,0 @@
|
||||||
# reusable workflow
|
|
||||||
name: .windows
|
|
||||||
|
|
||||||
# TODO: hide reusable workflow from the UI. Tracked in https://github.com/community/community/discussions/12025
|
|
||||||
|
|
||||||
on:
|
|
||||||
workflow_call:
|
|
||||||
inputs:
|
|
||||||
os:
|
|
||||||
required: true
|
|
||||||
type: string
|
|
||||||
storage:
|
|
||||||
required: true
|
|
||||||
type: string
|
|
||||||
default: "graphdriver"
|
|
||||||
send_coverage:
|
|
||||||
required: false
|
|
||||||
type: boolean
|
|
||||||
default: false
|
|
||||||
|
|
||||||
env:
|
|
||||||
GO_VERSION: "1.21.9"
|
|
||||||
GOTESTLIST_VERSION: v0.3.1
|
|
||||||
TESTSTAT_VERSION: v0.1.25
|
|
||||||
WINDOWS_BASE_IMAGE: mcr.microsoft.com/windows/servercore
|
|
||||||
WINDOWS_BASE_TAG_2019: ltsc2019
|
|
||||||
WINDOWS_BASE_TAG_2022: ltsc2022
|
|
||||||
TEST_IMAGE_NAME: moby:test
|
|
||||||
TEST_CTN_NAME: moby
|
|
||||||
DOCKER_BUILDKIT: 0
|
|
||||||
ITG_CLI_MATRIX_SIZE: 6
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
build:
|
|
||||||
runs-on: ${{ inputs.os }}
|
|
||||||
env:
|
|
||||||
GOPATH: ${{ github.workspace }}\go
|
|
||||||
GOBIN: ${{ github.workspace }}\go\bin
|
|
||||||
BIN_OUT: ${{ github.workspace }}\out
|
|
||||||
defaults:
|
|
||||||
run:
|
|
||||||
working-directory: ${{ env.GOPATH }}/src/github.com/docker/docker
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
with:
|
|
||||||
path: ${{ env.GOPATH }}/src/github.com/docker/docker
|
|
||||||
-
|
|
||||||
name: Env
|
|
||||||
run: |
|
|
||||||
Get-ChildItem Env: | Out-String
|
|
||||||
-
|
|
||||||
name: Init
|
|
||||||
run: |
|
|
||||||
New-Item -ItemType "directory" -Path "${{ github.workspace }}\go-build"
|
|
||||||
New-Item -ItemType "directory" -Path "${{ github.workspace }}\go\pkg\mod"
|
|
||||||
If ("${{ inputs.os }}" -eq "windows-2019") {
|
|
||||||
echo "WINDOWS_BASE_IMAGE_TAG=${{ env.WINDOWS_BASE_TAG_2019 }}" | Out-File -FilePath $Env:GITHUB_ENV -Encoding utf-8 -Append
|
|
||||||
} ElseIf ("${{ inputs.os }}" -eq "windows-2022") {
|
|
||||||
echo "WINDOWS_BASE_IMAGE_TAG=${{ env.WINDOWS_BASE_TAG_2022 }}" | Out-File -FilePath $Env:GITHUB_ENV -Encoding utf-8 -Append
|
|
||||||
}
|
|
||||||
-
|
|
||||||
name: Cache
|
|
||||||
uses: actions/cache@v4
|
|
||||||
with:
|
|
||||||
path: |
|
|
||||||
~\AppData\Local\go-build
|
|
||||||
~\go\pkg\mod
|
|
||||||
${{ github.workspace }}\go-build
|
|
||||||
${{ env.GOPATH }}\pkg\mod
|
|
||||||
key: ${{ inputs.os }}-${{ github.job }}-${{ hashFiles('**/vendor.sum') }}
|
|
||||||
restore-keys: |
|
|
||||||
${{ inputs.os }}-${{ github.job }}-
|
|
||||||
-
|
|
||||||
name: Docker info
|
|
||||||
run: |
|
|
||||||
docker info
|
|
||||||
-
|
|
||||||
name: Build base image
|
|
||||||
run: |
|
|
||||||
& docker build `
|
|
||||||
--build-arg WINDOWS_BASE_IMAGE `
|
|
||||||
--build-arg WINDOWS_BASE_IMAGE_TAG `
|
|
||||||
--build-arg GO_VERSION `
|
|
||||||
-t ${{ env.TEST_IMAGE_NAME }} `
|
|
||||||
-f Dockerfile.windows .
|
|
||||||
-
|
|
||||||
name: Build binaries
|
|
||||||
run: |
|
|
||||||
& docker run --name ${{ env.TEST_CTN_NAME }} -e "DOCKER_GITCOMMIT=${{ github.sha }}" `
|
|
||||||
-v "${{ github.workspace }}\go-build:C:\Users\ContainerAdministrator\AppData\Local\go-build" `
|
|
||||||
-v "${{ github.workspace }}\go\pkg\mod:C:\gopath\pkg\mod" `
|
|
||||||
${{ env.TEST_IMAGE_NAME }} hack\make.ps1 -Daemon -Client
|
|
||||||
-
|
|
||||||
name: Copy artifacts
|
|
||||||
run: |
|
|
||||||
New-Item -ItemType "directory" -Path "${{ env.BIN_OUT }}"
|
|
||||||
docker cp "${{ env.TEST_CTN_NAME }}`:c`:\gopath\src\github.com\docker\docker\bundles\docker.exe" ${{ env.BIN_OUT }}\
|
|
||||||
docker cp "${{ env.TEST_CTN_NAME }}`:c`:\gopath\src\github.com\docker\docker\bundles\dockerd.exe" ${{ env.BIN_OUT }}\
|
|
||||||
docker cp "${{ env.TEST_CTN_NAME }}`:c`:\gopath\bin\gotestsum.exe" ${{ env.BIN_OUT }}\
|
|
||||||
docker cp "${{ env.TEST_CTN_NAME }}`:c`:\containerd\bin\containerd.exe" ${{ env.BIN_OUT }}\
|
|
||||||
docker cp "${{ env.TEST_CTN_NAME }}`:c`:\containerd\bin\containerd-shim-runhcs-v1.exe" ${{ env.BIN_OUT }}\
|
|
||||||
-
|
|
||||||
name: Upload artifacts
|
|
||||||
uses: actions/upload-artifact@v4
|
|
||||||
with:
|
|
||||||
name: build-${{ inputs.storage }}-${{ inputs.os }}
|
|
||||||
path: ${{ env.BIN_OUT }}/*
|
|
||||||
if-no-files-found: error
|
|
||||||
retention-days: 2
|
|
||||||
|
|
||||||
unit-test:
|
|
||||||
runs-on: ${{ inputs.os }}
|
|
||||||
timeout-minutes: 120
|
|
||||||
env:
|
|
||||||
GOPATH: ${{ github.workspace }}\go
|
|
||||||
GOBIN: ${{ github.workspace }}\go\bin
|
|
||||||
defaults:
|
|
||||||
run:
|
|
||||||
working-directory: ${{ env.GOPATH }}/src/github.com/docker/docker
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
with:
|
|
||||||
path: ${{ env.GOPATH }}/src/github.com/docker/docker
|
|
||||||
-
|
|
||||||
name: Env
|
|
||||||
run: |
|
|
||||||
Get-ChildItem Env: | Out-String
|
|
||||||
-
|
|
||||||
name: Init
|
|
||||||
run: |
|
|
||||||
New-Item -ItemType "directory" -Path "${{ github.workspace }}\go-build"
|
|
||||||
New-Item -ItemType "directory" -Path "${{ github.workspace }}\go\pkg\mod"
|
|
||||||
New-Item -ItemType "directory" -Path "bundles"
|
|
||||||
If ("${{ inputs.os }}" -eq "windows-2019") {
|
|
||||||
echo "WINDOWS_BASE_IMAGE_TAG=${{ env.WINDOWS_BASE_TAG_2019 }}" | Out-File -FilePath $Env:GITHUB_ENV -Encoding utf-8 -Append
|
|
||||||
} ElseIf ("${{ inputs.os }}" -eq "windows-2022") {
|
|
||||||
echo "WINDOWS_BASE_IMAGE_TAG=${{ env.WINDOWS_BASE_TAG_2022 }}" | Out-File -FilePath $Env:GITHUB_ENV -Encoding utf-8 -Append
|
|
||||||
}
|
|
||||||
-
|
|
||||||
name: Cache
|
|
||||||
uses: actions/cache@v4
|
|
||||||
with:
|
|
||||||
path: |
|
|
||||||
~\AppData\Local\go-build
|
|
||||||
~\go\pkg\mod
|
|
||||||
${{ github.workspace }}\go-build
|
|
||||||
${{ env.GOPATH }}\pkg\mod
|
|
||||||
key: ${{ inputs.os }}-${{ github.job }}-${{ hashFiles('**/vendor.sum') }}
|
|
||||||
restore-keys: |
|
|
||||||
${{ inputs.os }}-${{ github.job }}-
|
|
||||||
-
|
|
||||||
name: Docker info
|
|
||||||
run: |
|
|
||||||
docker info
|
|
||||||
-
|
|
||||||
name: Build base image
|
|
||||||
run: |
|
|
||||||
& docker build `
|
|
||||||
--build-arg WINDOWS_BASE_IMAGE `
|
|
||||||
--build-arg WINDOWS_BASE_IMAGE_TAG `
|
|
||||||
--build-arg GO_VERSION `
|
|
||||||
-t ${{ env.TEST_IMAGE_NAME }} `
|
|
||||||
-f Dockerfile.windows .
|
|
||||||
-
|
|
||||||
name: Test
|
|
||||||
run: |
|
|
||||||
& docker run --name ${{ env.TEST_CTN_NAME }} -e "DOCKER_GITCOMMIT=${{ github.sha }}" `
|
|
||||||
-v "${{ github.workspace }}\go-build:C:\Users\ContainerAdministrator\AppData\Local\go-build" `
|
|
||||||
-v "${{ github.workspace }}\go\pkg\mod:C:\gopath\pkg\mod" `
|
|
||||||
-v "${{ env.GOPATH }}\src\github.com\docker\docker\bundles:C:\gopath\src\github.com\docker\docker\bundles" `
|
|
||||||
${{ env.TEST_IMAGE_NAME }} hack\make.ps1 -TestUnit
|
|
||||||
-
|
|
||||||
name: Send to Codecov
|
|
||||||
if: inputs.send_coverage
|
|
||||||
uses: codecov/codecov-action@v4
|
|
||||||
with:
|
|
||||||
working-directory: ${{ env.GOPATH }}\src\github.com\docker\docker
|
|
||||||
directory: bundles
|
|
||||||
env_vars: RUNNER_OS
|
|
||||||
flags: unit
|
|
||||||
token: ${{ secrets.CODECOV_TOKEN }} # used to upload coverage reports: https://github.com/moby/buildkit/pull/4660#issue-2142122533
|
|
||||||
-
|
|
||||||
name: Upload reports
|
|
||||||
if: always()
|
|
||||||
uses: actions/upload-artifact@v4
|
|
||||||
with:
|
|
||||||
name: ${{ inputs.os }}-${{ inputs.storage }}-unit-reports
|
|
||||||
path: ${{ env.GOPATH }}\src\github.com\docker\docker\bundles\*
|
|
||||||
retention-days: 1
|
|
||||||
|
|
||||||
unit-test-report:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
if: always()
|
|
||||||
needs:
|
|
||||||
- unit-test
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Set up Go
|
|
||||||
uses: actions/setup-go@v5
|
|
||||||
with:
|
|
||||||
go-version: ${{ env.GO_VERSION }}
|
|
||||||
-
|
|
||||||
name: Download artifacts
|
|
||||||
uses: actions/download-artifact@v4
|
|
||||||
with:
|
|
||||||
name: ${{ inputs.os }}-${{ inputs.storage }}-unit-reports
|
|
||||||
path: /tmp/artifacts
|
|
||||||
-
|
|
||||||
name: Install teststat
|
|
||||||
run: |
|
|
||||||
go install github.com/vearutop/teststat@${{ env.TESTSTAT_VERSION }}
|
|
||||||
-
|
|
||||||
name: Create summary
|
|
||||||
run: |
|
|
||||||
find /tmp/artifacts -type f -name '*-go-test-report.json' -exec teststat -markdown {} \+ >> $GITHUB_STEP_SUMMARY
|
|
||||||
|
|
||||||
integration-test-prepare:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
outputs:
|
|
||||||
matrix: ${{ steps.tests.outputs.matrix }}
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
-
|
|
||||||
name: Set up Go
|
|
||||||
uses: actions/setup-go@v5
|
|
||||||
with:
|
|
||||||
go-version: ${{ env.GO_VERSION }}
|
|
||||||
-
|
|
||||||
name: Install gotestlist
|
|
||||||
run:
|
|
||||||
go install github.com/crazy-max/gotestlist/cmd/gotestlist@${{ env.GOTESTLIST_VERSION }}
|
|
||||||
-
|
|
||||||
name: Create matrix
|
|
||||||
id: tests
|
|
||||||
working-directory: ./integration-cli
|
|
||||||
run: |
|
|
||||||
# This step creates a matrix for integration-cli tests. Tests suites
|
|
||||||
# are distributed in integration-test job through a matrix. There is
|
|
||||||
# also an override being added to the matrix like "./..." to run
|
|
||||||
# "Test integration" step exclusively.
|
|
||||||
matrix="$(gotestlist -d ${{ env.ITG_CLI_MATRIX_SIZE }} -o "./..." ./...)"
|
|
||||||
echo "matrix=$matrix" >> $GITHUB_OUTPUT
|
|
||||||
-
|
|
||||||
name: Show matrix
|
|
||||||
run: |
|
|
||||||
echo ${{ steps.tests.outputs.matrix }}
|
|
||||||
|
|
||||||
integration-test:
|
|
||||||
runs-on: ${{ inputs.os }}
|
|
||||||
continue-on-error: ${{ inputs.storage == 'snapshotter' && github.event_name != 'pull_request' }}
|
|
||||||
timeout-minutes: 120
|
|
||||||
needs:
|
|
||||||
- build
|
|
||||||
- integration-test-prepare
|
|
||||||
strategy:
|
|
||||||
fail-fast: false
|
|
||||||
matrix:
|
|
||||||
storage:
|
|
||||||
- ${{ inputs.storage }}
|
|
||||||
runtime:
|
|
||||||
- builtin
|
|
||||||
- containerd
|
|
||||||
test: ${{ fromJson(needs.integration-test-prepare.outputs.matrix) }}
|
|
||||||
exclude:
|
|
||||||
- storage: snapshotter
|
|
||||||
runtime: builtin
|
|
||||||
env:
|
|
||||||
GOPATH: ${{ github.workspace }}\go
|
|
||||||
GOBIN: ${{ github.workspace }}\go\bin
|
|
||||||
BIN_OUT: ${{ github.workspace }}\out
|
|
||||||
defaults:
|
|
||||||
run:
|
|
||||||
working-directory: ${{ env.GOPATH }}/src/github.com/docker/docker
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
with:
|
|
||||||
path: ${{ env.GOPATH }}/src/github.com/docker/docker
|
|
||||||
-
|
|
||||||
name: Set up Jaeger
|
|
||||||
run: |
|
|
||||||
# Jaeger is set up on Linux through the setup-tracing action. If you update Jaeger here, don't forget to
|
|
||||||
# update the version set in .github/actions/setup-tracing/action.yml.
|
|
||||||
Invoke-WebRequest -Uri "https://github.com/jaegertracing/jaeger/releases/download/v1.46.0/jaeger-1.46.0-windows-amd64.tar.gz" -OutFile ".\jaeger-1.46.0-windows-amd64.tar.gz"
|
|
||||||
tar -zxvf ".\jaeger-1.46.0-windows-amd64.tar.gz"
|
|
||||||
Start-Process '.\jaeger-1.46.0-windows-amd64\jaeger-all-in-one.exe'
|
|
||||||
echo "OTEL_EXPORTER_OTLP_ENDPOINT=http://127.0.0.1:4318" | Out-File -FilePath $Env:GITHUB_ENV -Encoding utf-8 -Append
|
|
||||||
shell: pwsh
|
|
||||||
-
|
|
||||||
name: Env
|
|
||||||
run: |
|
|
||||||
Get-ChildItem Env: | Out-String
|
|
||||||
-
|
|
||||||
name: Download artifacts
|
|
||||||
uses: actions/download-artifact@v4
|
|
||||||
with:
|
|
||||||
name: build-${{ inputs.storage }}-${{ inputs.os }}
|
|
||||||
path: ${{ env.BIN_OUT }}
|
|
||||||
-
|
|
||||||
name: Init
|
|
||||||
run: |
|
|
||||||
New-Item -ItemType "directory" -Path "bundles"
|
|
||||||
If ("${{ inputs.os }}" -eq "windows-2019") {
|
|
||||||
echo "WINDOWS_BASE_IMAGE_TAG=${{ env.WINDOWS_BASE_TAG_2019 }}" | Out-File -FilePath $Env:GITHUB_ENV -Encoding utf-8 -Append
|
|
||||||
} ElseIf ("${{ inputs.os }}" -eq "windows-2022") {
|
|
||||||
echo "WINDOWS_BASE_IMAGE_TAG=${{ env.WINDOWS_BASE_TAG_2022 }}" | Out-File -FilePath $Env:GITHUB_ENV -Encoding utf-8 -Append
|
|
||||||
}
|
|
||||||
Write-Output "${{ env.BIN_OUT }}" | Out-File -FilePath $env:GITHUB_PATH -Encoding utf8 -Append
|
|
||||||
|
|
||||||
$testName = ([System.BitConverter]::ToString((New-Object System.Security.Cryptography.SHA256Managed).ComputeHash([System.Text.Encoding]::UTF8.GetBytes("${{ matrix.test }}"))) -replace '-').ToLower()
|
|
||||||
echo "TESTREPORTS_NAME=$testName" | Out-File -FilePath $Env:GITHUB_ENV -Encoding utf-8 -Append
|
|
||||||
-
|
|
||||||
# removes docker service that is currently installed on the runner. we
|
|
||||||
# could use Uninstall-Package but not yet available on Windows runners.
|
|
||||||
# more info: https://github.com/actions/virtual-environments/blob/d3a5bad25f3b4326c5666bab0011ac7f1beec95e/images/win/scripts/Installers/Install-Docker.ps1#L11
|
|
||||||
name: Removing current daemon
|
|
||||||
run: |
|
|
||||||
if (Get-Service docker -ErrorAction SilentlyContinue) {
|
|
||||||
$dockerVersion = (docker version -f "{{.Server.Version}}")
|
|
||||||
Write-Host "Current installed Docker version: $dockerVersion"
|
|
||||||
# remove service
|
|
||||||
Stop-Service -Force -Name docker
|
|
||||||
Remove-Service -Name docker
|
|
||||||
# removes event log entry. we could use "Remove-EventLog -LogName -Source docker"
|
|
||||||
# but this cmd is not available atm
|
|
||||||
$ErrorActionPreference = "SilentlyContinue"
|
|
||||||
& reg delete "HKLM\SYSTEM\CurrentControlSet\Services\EventLog\Application\docker" /f 2>&1 | Out-Null
|
|
||||||
$ErrorActionPreference = "Stop"
|
|
||||||
Write-Host "Service removed"
|
|
||||||
}
|
|
||||||
-
|
|
||||||
name: Starting containerd
|
|
||||||
if: matrix.runtime == 'containerd'
|
|
||||||
run: |
|
|
||||||
Write-Host "Generating config"
|
|
||||||
& "${{ env.BIN_OUT }}\containerd.exe" config default | Out-File "$env:TEMP\ctn.toml" -Encoding ascii
|
|
||||||
Write-Host "Creating service"
|
|
||||||
New-Item -ItemType Directory "$env:TEMP\ctn-root" -ErrorAction SilentlyContinue | Out-Null
|
|
||||||
New-Item -ItemType Directory "$env:TEMP\ctn-state" -ErrorAction SilentlyContinue | Out-Null
|
|
||||||
Start-Process -Wait "${{ env.BIN_OUT }}\containerd.exe" `
|
|
||||||
-ArgumentList "--log-level=debug", `
|
|
||||||
"--config=$env:TEMP\ctn.toml", `
|
|
||||||
"--address=\\.\pipe\containerd-containerd", `
|
|
||||||
"--root=$env:TEMP\ctn-root", `
|
|
||||||
"--state=$env:TEMP\ctn-state", `
|
|
||||||
"--log-file=$env:TEMP\ctn.log", `
|
|
||||||
"--register-service"
|
|
||||||
Write-Host "Starting service"
|
|
||||||
Start-Service -Name containerd
|
|
||||||
Start-Sleep -Seconds 5
|
|
||||||
Write-Host "Service started successfully!"
|
|
||||||
-
|
|
||||||
name: Starting test daemon
|
|
||||||
run: |
|
|
||||||
Write-Host "Creating service"
|
|
||||||
If ("${{ matrix.runtime }}" -eq "containerd") {
|
|
||||||
$runtimeArg="--containerd=\\.\pipe\containerd-containerd"
|
|
||||||
echo "DOCKER_WINDOWS_CONTAINERD_RUNTIME=1" | Out-File -FilePath $Env:GITHUB_ENV -Encoding utf-8 -Append
|
|
||||||
}
|
|
||||||
New-Item -ItemType Directory "$env:TEMP\moby-root" -ErrorAction SilentlyContinue | Out-Null
|
|
||||||
New-Item -ItemType Directory "$env:TEMP\moby-exec" -ErrorAction SilentlyContinue | Out-Null
|
|
||||||
Start-Process -Wait -NoNewWindow "${{ env.BIN_OUT }}\dockerd" `
|
|
||||||
-ArgumentList $runtimeArg, "--debug", `
|
|
||||||
"--host=npipe:////./pipe/docker_engine", `
|
|
||||||
"--data-root=$env:TEMP\moby-root", `
|
|
||||||
"--exec-root=$env:TEMP\moby-exec", `
|
|
||||||
"--pidfile=$env:TEMP\docker.pid", `
|
|
||||||
"--register-service"
|
|
||||||
If ("${{ inputs.storage }}" -eq "snapshotter") {
|
|
||||||
# Make the env-var visible to the service-managed dockerd, as there's no CLI flag for this option.
|
|
||||||
& reg add "HKLM\SYSTEM\CurrentControlSet\Services\docker" /v Environment /t REG_MULTI_SZ /s '@' /d TEST_INTEGRATION_USE_SNAPSHOTTER=1
|
|
||||||
echo "TEST_INTEGRATION_USE_SNAPSHOTTER=1" | Out-File -FilePath $Env:GITHUB_ENV -Encoding utf-8 -Append
|
|
||||||
}
|
|
||||||
Write-Host "Starting service"
|
|
||||||
Start-Service -Name docker
|
|
||||||
Write-Host "Service started successfully!"
|
|
||||||
-
|
|
||||||
name: Waiting for test daemon to start
|
|
||||||
run: |
|
|
||||||
$tries=20
|
|
||||||
Write-Host "Waiting for the test daemon to start..."
|
|
||||||
While ($true) {
|
|
||||||
$ErrorActionPreference = "SilentlyContinue"
|
|
||||||
& "${{ env.BIN_OUT }}\docker" version
|
|
||||||
$ErrorActionPreference = "Stop"
|
|
||||||
If ($LastExitCode -eq 0) {
|
|
||||||
break
|
|
||||||
}
|
|
||||||
$tries--
|
|
||||||
If ($tries -le 0) {
|
|
||||||
Throw "Failed to get a response from the daemon"
|
|
||||||
}
|
|
||||||
Write-Host -NoNewline "."
|
|
||||||
Start-Sleep -Seconds 1
|
|
||||||
}
|
|
||||||
Write-Host "Test daemon started and replied!"
|
|
||||||
env:
|
|
||||||
DOCKER_HOST: npipe:////./pipe/docker_engine
|
|
||||||
-
|
|
||||||
name: Docker info
|
|
||||||
run: |
|
|
||||||
& "${{ env.BIN_OUT }}\docker" info
|
|
||||||
env:
|
|
||||||
DOCKER_HOST: npipe:////./pipe/docker_engine
|
|
||||||
-
|
|
||||||
name: Building contrib/busybox
|
|
||||||
run: |
|
|
||||||
& "${{ env.BIN_OUT }}\docker" build -t busybox `
|
|
||||||
--build-arg WINDOWS_BASE_IMAGE `
|
|
||||||
--build-arg WINDOWS_BASE_IMAGE_TAG `
|
|
||||||
.\contrib\busybox\
|
|
||||||
env:
|
|
||||||
DOCKER_HOST: npipe:////./pipe/docker_engine
|
|
||||||
-
|
|
||||||
name: List images
|
|
||||||
run: |
|
|
||||||
& "${{ env.BIN_OUT }}\docker" images
|
|
||||||
env:
|
|
||||||
DOCKER_HOST: npipe:////./pipe/docker_engine
|
|
||||||
-
|
|
||||||
name: Set up Go
|
|
||||||
uses: actions/setup-go@v5
|
|
||||||
with:
|
|
||||||
go-version: ${{ env.GO_VERSION }}
|
|
||||||
-
|
|
||||||
name: Test integration
|
|
||||||
if: matrix.test == './...'
|
|
||||||
run: |
|
|
||||||
.\hack\make.ps1 -TestIntegration
|
|
||||||
env:
|
|
||||||
DOCKER_HOST: npipe:////./pipe/docker_engine
|
|
||||||
GO111MODULE: "off"
|
|
||||||
TEST_CLIENT_BINARY: ${{ env.BIN_OUT }}\docker
|
|
||||||
-
|
|
||||||
name: Test integration-cli
|
|
||||||
if: matrix.test != './...'
|
|
||||||
run: |
|
|
||||||
.\hack\make.ps1 -TestIntegrationCli
|
|
||||||
env:
|
|
||||||
DOCKER_HOST: npipe:////./pipe/docker_engine
|
|
||||||
GO111MODULE: "off"
|
|
||||||
TEST_CLIENT_BINARY: ${{ env.BIN_OUT }}\docker
|
|
||||||
INTEGRATION_TESTRUN: ${{ matrix.test }}
|
|
||||||
-
|
|
||||||
name: Send to Codecov
|
|
||||||
if: inputs.send_coverage
|
|
||||||
uses: codecov/codecov-action@v4
|
|
||||||
with:
|
|
||||||
working-directory: ${{ env.GOPATH }}\src\github.com\docker\docker
|
|
||||||
directory: bundles
|
|
||||||
env_vars: RUNNER_OS
|
|
||||||
flags: integration,${{ matrix.runtime }}
|
|
||||||
token: ${{ secrets.CODECOV_TOKEN }} # used to upload coverage reports: https://github.com/moby/buildkit/pull/4660#issue-2142122533
|
|
||||||
-
|
|
||||||
name: Docker info
|
|
||||||
run: |
|
|
||||||
& "${{ env.BIN_OUT }}\docker" info
|
|
||||||
env:
|
|
||||||
DOCKER_HOST: npipe:////./pipe/docker_engine
|
|
||||||
-
|
|
||||||
name: Stop containerd
|
|
||||||
if: always() && matrix.runtime == 'containerd'
|
|
||||||
run: |
|
|
||||||
$ErrorActionPreference = "SilentlyContinue"
|
|
||||||
Stop-Service -Force -Name containerd
|
|
||||||
$ErrorActionPreference = "Stop"
|
|
||||||
-
|
|
||||||
name: Containerd logs
|
|
||||||
if: always() && matrix.runtime == 'containerd'
|
|
||||||
run: |
|
|
||||||
Copy-Item "$env:TEMP\ctn.log" -Destination ".\bundles\containerd.log"
|
|
||||||
Get-Content "$env:TEMP\ctn.log" | Out-Host
|
|
||||||
-
|
|
||||||
name: Stop daemon
|
|
||||||
if: always()
|
|
||||||
run: |
|
|
||||||
$ErrorActionPreference = "SilentlyContinue"
|
|
||||||
Stop-Service -Force -Name docker
|
|
||||||
$ErrorActionPreference = "Stop"
|
|
||||||
-
|
|
||||||
# as the daemon is registered as a service we have to check the event
|
|
||||||
# logs against the docker provider.
|
|
||||||
name: Daemon event logs
|
|
||||||
if: always()
|
|
||||||
run: |
|
|
||||||
Get-WinEvent -ea SilentlyContinue `
|
|
||||||
-FilterHashtable @{ProviderName= "docker"; LogName = "application"} |
|
|
||||||
Sort-Object @{Expression="TimeCreated";Descending=$false} |
|
|
||||||
ForEach-Object {"$($_.TimeCreated.ToUniversalTime().ToString("o")) [$($_.LevelDisplayName)] $($_.Message)"} |
|
|
||||||
Tee-Object -file ".\bundles\daemon.log"
|
|
||||||
-
|
|
||||||
name: Download Jaeger traces
|
|
||||||
if: always()
|
|
||||||
run: |
|
|
||||||
Invoke-WebRequest `
|
|
||||||
-Uri "http://127.0.0.1:16686/api/traces?service=integration-test-client" `
|
|
||||||
-OutFile ".\bundles\jaeger-trace.json"
|
|
||||||
-
|
|
||||||
name: Upload reports
|
|
||||||
if: always()
|
|
||||||
uses: actions/upload-artifact@v4
|
|
||||||
with:
|
|
||||||
name: ${{ inputs.os }}-${{ inputs.storage }}-integration-reports-${{ matrix.runtime }}-${{ env.TESTREPORTS_NAME }}
|
|
||||||
path: ${{ env.GOPATH }}\src\github.com\docker\docker\bundles\*
|
|
||||||
retention-days: 1
|
|
||||||
|
|
||||||
integration-test-report:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
continue-on-error: ${{ inputs.storage == 'snapshotter' && github.event_name != 'pull_request' }}
|
|
||||||
if: always()
|
|
||||||
needs:
|
|
||||||
- integration-test
|
|
||||||
strategy:
|
|
||||||
fail-fast: false
|
|
||||||
matrix:
|
|
||||||
storage:
|
|
||||||
- ${{ inputs.storage }}
|
|
||||||
runtime:
|
|
||||||
- builtin
|
|
||||||
- containerd
|
|
||||||
exclude:
|
|
||||||
- storage: snapshotter
|
|
||||||
runtime: builtin
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Set up Go
|
|
||||||
uses: actions/setup-go@v5
|
|
||||||
with:
|
|
||||||
go-version: ${{ env.GO_VERSION }}
|
|
||||||
-
|
|
||||||
name: Download reports
|
|
||||||
uses: actions/download-artifact@v4
|
|
||||||
with:
|
|
||||||
path: /tmp/reports
|
|
||||||
pattern: ${{ inputs.os }}-${{ inputs.storage }}-integration-reports-${{ matrix.runtime }}-*
|
|
||||||
merge-multiple: true
|
|
||||||
-
|
|
||||||
name: Install teststat
|
|
||||||
run: |
|
|
||||||
go install github.com/vearutop/teststat@${{ env.TESTSTAT_VERSION }}
|
|
||||||
-
|
|
||||||
name: Create summary
|
|
||||||
run: |
|
|
||||||
find /tmp/reports -type f -name '*-go-test-report.json' -exec teststat -markdown {} \+ >> $GITHUB_STEP_SUMMARY
|
|
191
.github/workflows/bin-image.yml
vendored
191
.github/workflows/bin-image.yml
vendored
|
@ -1,191 +0,0 @@
|
||||||
name: bin-image
|
|
||||||
|
|
||||||
concurrency:
|
|
||||||
group: ${{ github.workflow }}-${{ github.ref }}
|
|
||||||
cancel-in-progress: true
|
|
||||||
|
|
||||||
on:
|
|
||||||
workflow_dispatch:
|
|
||||||
push:
|
|
||||||
branches:
|
|
||||||
- 'master'
|
|
||||||
- '[0-9]+.[0-9]+'
|
|
||||||
tags:
|
|
||||||
- 'v*'
|
|
||||||
pull_request:
|
|
||||||
|
|
||||||
env:
|
|
||||||
MOBYBIN_REPO_SLUG: moby/moby-bin
|
|
||||||
DOCKER_GITCOMMIT: ${{ github.sha }}
|
|
||||||
VERSION: ${{ github.ref }}
|
|
||||||
PLATFORM: Moby Engine - Nightly
|
|
||||||
PRODUCT: moby-bin
|
|
||||||
PACKAGER_NAME: The Moby Project
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
validate-dco:
|
|
||||||
if: ${{ !startsWith(github.ref, 'refs/tags/v') }}
|
|
||||||
uses: ./.github/workflows/.dco.yml
|
|
||||||
|
|
||||||
prepare:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
outputs:
|
|
||||||
platforms: ${{ steps.platforms.outputs.matrix }}
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
-
|
|
||||||
name: Docker meta
|
|
||||||
id: meta
|
|
||||||
uses: docker/metadata-action@v5
|
|
||||||
with:
|
|
||||||
images: |
|
|
||||||
${{ env.MOBYBIN_REPO_SLUG }}
|
|
||||||
### versioning strategy
|
|
||||||
## push semver tag v23.0.0
|
|
||||||
# moby/moby-bin:23.0.0
|
|
||||||
# moby/moby-bin:latest
|
|
||||||
## push semver prelease tag v23.0.0-beta.1
|
|
||||||
# moby/moby-bin:23.0.0-beta.1
|
|
||||||
## push on master
|
|
||||||
# moby/moby-bin:master
|
|
||||||
## push on 23.0 branch
|
|
||||||
# moby/moby-bin:23.0
|
|
||||||
## any push
|
|
||||||
# moby/moby-bin:sha-ad132f5
|
|
||||||
tags: |
|
|
||||||
type=semver,pattern={{version}}
|
|
||||||
type=ref,event=branch
|
|
||||||
type=ref,event=pr
|
|
||||||
type=sha
|
|
||||||
-
|
|
||||||
name: Rename meta bake definition file
|
|
||||||
# see https://github.com/docker/metadata-action/issues/381#issuecomment-1918607161
|
|
||||||
run: |
|
|
||||||
bakeFile="${{ steps.meta.outputs.bake-file }}"
|
|
||||||
mv "${bakeFile#cwd://}" "/tmp/bake-meta.json"
|
|
||||||
-
|
|
||||||
name: Upload meta bake definition
|
|
||||||
uses: actions/upload-artifact@v4
|
|
||||||
with:
|
|
||||||
name: bake-meta
|
|
||||||
path: /tmp/bake-meta.json
|
|
||||||
if-no-files-found: error
|
|
||||||
retention-days: 1
|
|
||||||
-
|
|
||||||
name: Create platforms matrix
|
|
||||||
id: platforms
|
|
||||||
run: |
|
|
||||||
echo "matrix=$(docker buildx bake bin-image-cross --print | jq -cr '.target."bin-image-cross".platforms')" >>${GITHUB_OUTPUT}
|
|
||||||
|
|
||||||
build:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
needs:
|
|
||||||
- validate-dco
|
|
||||||
- prepare
|
|
||||||
if: always() && !contains(needs.*.result, 'failure') && !contains(needs.*.result, 'cancelled')
|
|
||||||
strategy:
|
|
||||||
fail-fast: false
|
|
||||||
matrix:
|
|
||||||
platform: ${{ fromJson(needs.prepare.outputs.platforms) }}
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Prepare
|
|
||||||
run: |
|
|
||||||
platform=${{ matrix.platform }}
|
|
||||||
echo "PLATFORM_PAIR=${platform//\//-}" >> $GITHUB_ENV
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
with:
|
|
||||||
fetch-depth: 0
|
|
||||||
-
|
|
||||||
name: Download meta bake definition
|
|
||||||
uses: actions/download-artifact@v4
|
|
||||||
with:
|
|
||||||
name: bake-meta
|
|
||||||
path: /tmp
|
|
||||||
-
|
|
||||||
name: Set up QEMU
|
|
||||||
uses: docker/setup-qemu-action@v3
|
|
||||||
-
|
|
||||||
name: Set up Docker Buildx
|
|
||||||
uses: docker/setup-buildx-action@v3
|
|
||||||
-
|
|
||||||
name: Login to Docker Hub
|
|
||||||
if: github.event_name != 'pull_request' && github.repository == 'moby/moby'
|
|
||||||
uses: docker/login-action@v3
|
|
||||||
with:
|
|
||||||
username: ${{ secrets.DOCKERHUB_MOBYBIN_USERNAME }}
|
|
||||||
password: ${{ secrets.DOCKERHUB_MOBYBIN_TOKEN }}
|
|
||||||
-
|
|
||||||
name: Build
|
|
||||||
id: bake
|
|
||||||
uses: docker/bake-action@v4
|
|
||||||
with:
|
|
||||||
files: |
|
|
||||||
./docker-bake.hcl
|
|
||||||
/tmp/bake-meta.json
|
|
||||||
targets: bin-image
|
|
||||||
set: |
|
|
||||||
*.platform=${{ matrix.platform }}
|
|
||||||
*.output=type=image,name=${{ env.MOBYBIN_REPO_SLUG }},push-by-digest=true,name-canonical=true,push=${{ github.event_name != 'pull_request' && github.repository == 'moby/moby' }}
|
|
||||||
*.tags=
|
|
||||||
-
|
|
||||||
name: Export digest
|
|
||||||
if: github.event_name != 'pull_request' && github.repository == 'moby/moby'
|
|
||||||
run: |
|
|
||||||
mkdir -p /tmp/digests
|
|
||||||
digest="${{ fromJSON(steps.bake.outputs.metadata)['bin-image']['containerimage.digest'] }}"
|
|
||||||
touch "/tmp/digests/${digest#sha256:}"
|
|
||||||
-
|
|
||||||
name: Upload digest
|
|
||||||
if: github.event_name != 'pull_request' && github.repository == 'moby/moby'
|
|
||||||
uses: actions/upload-artifact@v4
|
|
||||||
with:
|
|
||||||
name: digests-${{ env.PLATFORM_PAIR }}
|
|
||||||
path: /tmp/digests/*
|
|
||||||
if-no-files-found: error
|
|
||||||
retention-days: 1
|
|
||||||
|
|
||||||
merge:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
needs:
|
|
||||||
- build
|
|
||||||
if: always() && !contains(needs.*.result, 'failure') && !contains(needs.*.result, 'cancelled') && github.event_name != 'pull_request' && github.repository == 'moby/moby'
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Download meta bake definition
|
|
||||||
uses: actions/download-artifact@v4
|
|
||||||
with:
|
|
||||||
name: bake-meta
|
|
||||||
path: /tmp
|
|
||||||
-
|
|
||||||
name: Download digests
|
|
||||||
uses: actions/download-artifact@v4
|
|
||||||
with:
|
|
||||||
path: /tmp/digests
|
|
||||||
pattern: digests-*
|
|
||||||
merge-multiple: true
|
|
||||||
-
|
|
||||||
name: Set up Docker Buildx
|
|
||||||
uses: docker/setup-buildx-action@v3
|
|
||||||
-
|
|
||||||
name: Login to Docker Hub
|
|
||||||
uses: docker/login-action@v3
|
|
||||||
with:
|
|
||||||
username: ${{ secrets.DOCKERHUB_MOBYBIN_USERNAME }}
|
|
||||||
password: ${{ secrets.DOCKERHUB_MOBYBIN_TOKEN }}
|
|
||||||
-
|
|
||||||
name: Create manifest list and push
|
|
||||||
working-directory: /tmp/digests
|
|
||||||
run: |
|
|
||||||
set -x
|
|
||||||
docker buildx imagetools create $(jq -cr '.target."docker-metadata-action".tags | map("-t " + .) | join(" ")' /tmp/bake-meta.json) \
|
|
||||||
$(printf '${{ env.MOBYBIN_REPO_SLUG }}@sha256:%s ' *)
|
|
||||||
-
|
|
||||||
name: Inspect image
|
|
||||||
run: |
|
|
||||||
set -x
|
|
||||||
docker buildx imagetools inspect ${{ env.MOBYBIN_REPO_SLUG }}:$(jq -cr '.target."docker-metadata-action".args.DOCKER_META_VERSION' /tmp/bake-meta.json)
|
|
139
.github/workflows/buildkit.yml
vendored
139
.github/workflows/buildkit.yml
vendored
|
@ -1,139 +0,0 @@
|
||||||
name: buildkit
|
|
||||||
|
|
||||||
concurrency:
|
|
||||||
group: ${{ github.workflow }}-${{ github.ref }}
|
|
||||||
cancel-in-progress: true
|
|
||||||
|
|
||||||
on:
|
|
||||||
workflow_dispatch:
|
|
||||||
push:
|
|
||||||
branches:
|
|
||||||
- 'master'
|
|
||||||
- '[0-9]+.[0-9]+'
|
|
||||||
pull_request:
|
|
||||||
|
|
||||||
env:
|
|
||||||
GO_VERSION: "1.21.9"
|
|
||||||
DESTDIR: ./build
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
validate-dco:
|
|
||||||
uses: ./.github/workflows/.dco.yml
|
|
||||||
|
|
||||||
build:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
needs:
|
|
||||||
- validate-dco
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
-
|
|
||||||
name: Set up Docker Buildx
|
|
||||||
uses: docker/setup-buildx-action@v3
|
|
||||||
-
|
|
||||||
name: Build
|
|
||||||
uses: docker/bake-action@v4
|
|
||||||
with:
|
|
||||||
targets: binary
|
|
||||||
-
|
|
||||||
name: Upload artifacts
|
|
||||||
uses: actions/upload-artifact@v4
|
|
||||||
with:
|
|
||||||
name: binary
|
|
||||||
path: ${{ env.DESTDIR }}
|
|
||||||
if-no-files-found: error
|
|
||||||
retention-days: 1
|
|
||||||
|
|
||||||
test:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
timeout-minutes: 120
|
|
||||||
needs:
|
|
||||||
- build
|
|
||||||
env:
|
|
||||||
TEST_IMAGE_BUILD: "0"
|
|
||||||
TEST_IMAGE_ID: "buildkit-tests"
|
|
||||||
strategy:
|
|
||||||
fail-fast: false
|
|
||||||
matrix:
|
|
||||||
worker:
|
|
||||||
- dockerd
|
|
||||||
- dockerd-containerd
|
|
||||||
pkg:
|
|
||||||
- client
|
|
||||||
- cmd/buildctl
|
|
||||||
- solver
|
|
||||||
- frontend
|
|
||||||
- frontend/dockerfile
|
|
||||||
typ:
|
|
||||||
- integration
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Prepare
|
|
||||||
run: |
|
|
||||||
disabledFeatures="cache_backend_azblob,cache_backend_s3"
|
|
||||||
if [ "${{ matrix.worker }}" = "dockerd" ]; then
|
|
||||||
disabledFeatures="${disabledFeatures},merge_diff"
|
|
||||||
fi
|
|
||||||
echo "BUILDKIT_TEST_DISABLE_FEATURES=${disabledFeatures}" >> $GITHUB_ENV
|
|
||||||
# Expose `ACTIONS_RUNTIME_TOKEN` and `ACTIONS_CACHE_URL`, which is used
|
|
||||||
# in BuildKit's test suite to skip/unskip cache exporters:
|
|
||||||
# https://github.com/moby/buildkit/blob/567a99433ca23402d5e9b9f9124005d2e59b8861/client/client_test.go#L5407-L5411
|
|
||||||
-
|
|
||||||
name: Expose GitHub Runtime
|
|
||||||
uses: crazy-max/ghaction-github-runtime@v3
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
with:
|
|
||||||
path: moby
|
|
||||||
-
|
|
||||||
name: BuildKit ref
|
|
||||||
run: |
|
|
||||||
echo "$(./hack/buildkit-ref)" >> $GITHUB_ENV
|
|
||||||
working-directory: moby
|
|
||||||
-
|
|
||||||
name: Checkout BuildKit ${{ env.BUILDKIT_REF }}
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
with:
|
|
||||||
repository: ${{ env.BUILDKIT_REPO }}
|
|
||||||
ref: ${{ env.BUILDKIT_REF }}
|
|
||||||
path: buildkit
|
|
||||||
-
|
|
||||||
name: Set up QEMU
|
|
||||||
uses: docker/setup-qemu-action@v3
|
|
||||||
-
|
|
||||||
name: Set up Docker Buildx
|
|
||||||
uses: docker/setup-buildx-action@v3
|
|
||||||
-
|
|
||||||
name: Download binary artifacts
|
|
||||||
uses: actions/download-artifact@v4
|
|
||||||
with:
|
|
||||||
name: binary
|
|
||||||
path: ./buildkit/build/moby/
|
|
||||||
-
|
|
||||||
name: Update daemon.json
|
|
||||||
run: |
|
|
||||||
sudo rm -f /etc/docker/daemon.json
|
|
||||||
sudo service docker restart
|
|
||||||
docker version
|
|
||||||
docker info
|
|
||||||
-
|
|
||||||
name: Build test image
|
|
||||||
uses: docker/bake-action@v4
|
|
||||||
with:
|
|
||||||
workdir: ./buildkit
|
|
||||||
targets: integration-tests
|
|
||||||
set: |
|
|
||||||
*.output=type=docker,name=${{ env.TEST_IMAGE_ID }}
|
|
||||||
-
|
|
||||||
name: Test
|
|
||||||
run: |
|
|
||||||
./hack/test ${{ matrix.typ }}
|
|
||||||
env:
|
|
||||||
CONTEXT: "."
|
|
||||||
TEST_DOCKERD: "1"
|
|
||||||
TEST_DOCKERD_BINARY: "./build/moby/dockerd"
|
|
||||||
TESTPKGS: "./${{ matrix.pkg }}"
|
|
||||||
TESTFLAGS: "-v --parallel=1 --timeout=30m --run=//worker=${{ matrix.worker }}$"
|
|
||||||
working-directory: buildkit
|
|
113
.github/workflows/ci.yml
vendored
113
.github/workflows/ci.yml
vendored
|
@ -1,113 +0,0 @@
|
||||||
name: ci
|
|
||||||
|
|
||||||
concurrency:
|
|
||||||
group: ${{ github.workflow }}-${{ github.ref }}
|
|
||||||
cancel-in-progress: true
|
|
||||||
|
|
||||||
on:
|
|
||||||
workflow_dispatch:
|
|
||||||
push:
|
|
||||||
branches:
|
|
||||||
- 'master'
|
|
||||||
- '[0-9]+.[0-9]+'
|
|
||||||
pull_request:
|
|
||||||
|
|
||||||
env:
|
|
||||||
DESTDIR: ./build
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
validate-dco:
|
|
||||||
uses: ./.github/workflows/.dco.yml
|
|
||||||
|
|
||||||
build:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
needs:
|
|
||||||
- validate-dco
|
|
||||||
strategy:
|
|
||||||
fail-fast: false
|
|
||||||
matrix:
|
|
||||||
target:
|
|
||||||
- binary
|
|
||||||
- dynbinary
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
with:
|
|
||||||
fetch-depth: 0
|
|
||||||
-
|
|
||||||
name: Set up Docker Buildx
|
|
||||||
uses: docker/setup-buildx-action@v3
|
|
||||||
-
|
|
||||||
name: Build
|
|
||||||
uses: docker/bake-action@v4
|
|
||||||
with:
|
|
||||||
targets: ${{ matrix.target }}
|
|
||||||
-
|
|
||||||
name: List artifacts
|
|
||||||
run: |
|
|
||||||
tree -nh ${{ env.DESTDIR }}
|
|
||||||
-
|
|
||||||
name: Check artifacts
|
|
||||||
run: |
|
|
||||||
find ${{ env.DESTDIR }} -type f -exec file -e ascii -- {} +
|
|
||||||
|
|
||||||
prepare-cross:
|
|
||||||
runs-on: ubuntu-latest
|
|
||||||
needs:
|
|
||||||
- validate-dco
|
|
||||||
outputs:
|
|
||||||
matrix: ${{ steps.platforms.outputs.matrix }}
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
-
|
|
||||||
name: Create matrix
|
|
||||||
id: platforms
|
|
||||||
run: |
|
|
||||||
matrix="$(docker buildx bake binary-cross --print | jq -cr '.target."binary-cross".platforms')"
|
|
||||||
echo "matrix=$matrix" >> $GITHUB_OUTPUT
|
|
||||||
-
|
|
||||||
name: Show matrix
|
|
||||||
run: |
|
|
||||||
echo ${{ steps.platforms.outputs.matrix }}
|
|
||||||
|
|
||||||
cross:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
needs:
|
|
||||||
- validate-dco
|
|
||||||
- prepare-cross
|
|
||||||
strategy:
|
|
||||||
fail-fast: false
|
|
||||||
matrix:
|
|
||||||
platform: ${{ fromJson(needs.prepare-cross.outputs.matrix) }}
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
with:
|
|
||||||
fetch-depth: 0
|
|
||||||
-
|
|
||||||
name: Prepare
|
|
||||||
run: |
|
|
||||||
platform=${{ matrix.platform }}
|
|
||||||
echo "PLATFORM_PAIR=${platform//\//-}" >> $GITHUB_ENV
|
|
||||||
-
|
|
||||||
name: Set up Docker Buildx
|
|
||||||
uses: docker/setup-buildx-action@v3
|
|
||||||
-
|
|
||||||
name: Build
|
|
||||||
uses: docker/bake-action@v4
|
|
||||||
with:
|
|
||||||
targets: all
|
|
||||||
set: |
|
|
||||||
*.platform=${{ matrix.platform }}
|
|
||||||
-
|
|
||||||
name: List artifacts
|
|
||||||
run: |
|
|
||||||
tree -nh ${{ env.DESTDIR }}
|
|
||||||
-
|
|
||||||
name: Check artifacts
|
|
||||||
run: |
|
|
||||||
find ${{ env.DESTDIR }} -type f -exec file -e ascii -- {} +
|
|
177
.github/workflows/test.yml
vendored
177
.github/workflows/test.yml
vendored
|
@ -1,177 +0,0 @@
|
||||||
name: test
|
|
||||||
|
|
||||||
concurrency:
|
|
||||||
group: ${{ github.workflow }}-${{ github.ref }}
|
|
||||||
cancel-in-progress: true
|
|
||||||
|
|
||||||
on:
|
|
||||||
workflow_dispatch:
|
|
||||||
push:
|
|
||||||
branches:
|
|
||||||
- 'master'
|
|
||||||
- '[0-9]+.[0-9]+'
|
|
||||||
pull_request:
|
|
||||||
|
|
||||||
env:
|
|
||||||
GO_VERSION: "1.21.9"
|
|
||||||
GIT_PAGER: "cat"
|
|
||||||
PAGER: "cat"
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
validate-dco:
|
|
||||||
uses: ./.github/workflows/.dco.yml
|
|
||||||
|
|
||||||
build-dev:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
needs:
|
|
||||||
- validate-dco
|
|
||||||
strategy:
|
|
||||||
fail-fast: false
|
|
||||||
matrix:
|
|
||||||
mode:
|
|
||||||
- ""
|
|
||||||
- systemd
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Prepare
|
|
||||||
run: |
|
|
||||||
if [ "${{ matrix.mode }}" = "systemd" ]; then
|
|
||||||
echo "SYSTEMD=true" >> $GITHUB_ENV
|
|
||||||
fi
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
-
|
|
||||||
name: Set up Docker Buildx
|
|
||||||
uses: docker/setup-buildx-action@v3
|
|
||||||
-
|
|
||||||
name: Build dev image
|
|
||||||
uses: docker/bake-action@v4
|
|
||||||
with:
|
|
||||||
targets: dev
|
|
||||||
set: |
|
|
||||||
*.cache-from=type=gha,scope=dev${{ matrix.mode }}
|
|
||||||
*.cache-to=type=gha,scope=dev${{ matrix.mode }},mode=max
|
|
||||||
*.output=type=cacheonly
|
|
||||||
|
|
||||||
test:
|
|
||||||
needs:
|
|
||||||
- build-dev
|
|
||||||
- validate-dco
|
|
||||||
uses: ./.github/workflows/.test.yml
|
|
||||||
secrets: inherit
|
|
||||||
strategy:
|
|
||||||
fail-fast: false
|
|
||||||
matrix:
|
|
||||||
storage:
|
|
||||||
- graphdriver
|
|
||||||
- snapshotter
|
|
||||||
with:
|
|
||||||
storage: ${{ matrix.storage }}
|
|
||||||
|
|
||||||
validate-prepare:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
needs:
|
|
||||||
- validate-dco
|
|
||||||
outputs:
|
|
||||||
matrix: ${{ steps.scripts.outputs.matrix }}
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
-
|
|
||||||
name: Create matrix
|
|
||||||
id: scripts
|
|
||||||
run: |
|
|
||||||
scripts=$(cd ./hack/validate && jq -nc '$ARGS.positional - ["all", "default", "dco"] | map(select(test("[.]")|not)) + ["generate-files"]' --args *)
|
|
||||||
echo "matrix=$scripts" >> $GITHUB_OUTPUT
|
|
||||||
-
|
|
||||||
name: Show matrix
|
|
||||||
run: |
|
|
||||||
echo ${{ steps.scripts.outputs.matrix }}
|
|
||||||
|
|
||||||
validate:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
timeout-minutes: 120
|
|
||||||
needs:
|
|
||||||
- validate-prepare
|
|
||||||
- build-dev
|
|
||||||
strategy:
|
|
||||||
fail-fast: true
|
|
||||||
matrix:
|
|
||||||
script: ${{ fromJson(needs.validate-prepare.outputs.matrix) }}
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
with:
|
|
||||||
fetch-depth: 0
|
|
||||||
-
|
|
||||||
name: Set up runner
|
|
||||||
uses: ./.github/actions/setup-runner
|
|
||||||
-
|
|
||||||
name: Set up Docker Buildx
|
|
||||||
uses: docker/setup-buildx-action@v3
|
|
||||||
-
|
|
||||||
name: Build dev image
|
|
||||||
uses: docker/bake-action@v4
|
|
||||||
with:
|
|
||||||
targets: dev
|
|
||||||
set: |
|
|
||||||
dev.cache-from=type=gha,scope=dev
|
|
||||||
-
|
|
||||||
name: Validate
|
|
||||||
run: |
|
|
||||||
make -o build validate-${{ matrix.script }}
|
|
||||||
|
|
||||||
smoke-prepare:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
needs:
|
|
||||||
- validate-dco
|
|
||||||
outputs:
|
|
||||||
matrix: ${{ steps.platforms.outputs.matrix }}
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
-
|
|
||||||
name: Create matrix
|
|
||||||
id: platforms
|
|
||||||
run: |
|
|
||||||
matrix="$(docker buildx bake binary-smoketest --print | jq -cr '.target."binary-smoketest".platforms')"
|
|
||||||
echo "matrix=$matrix" >> $GITHUB_OUTPUT
|
|
||||||
-
|
|
||||||
name: Show matrix
|
|
||||||
run: |
|
|
||||||
echo ${{ steps.platforms.outputs.matrix }}
|
|
||||||
|
|
||||||
smoke:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
needs:
|
|
||||||
- smoke-prepare
|
|
||||||
strategy:
|
|
||||||
fail-fast: false
|
|
||||||
matrix:
|
|
||||||
platform: ${{ fromJson(needs.smoke-prepare.outputs.matrix) }}
|
|
||||||
steps:
|
|
||||||
-
|
|
||||||
name: Checkout
|
|
||||||
uses: actions/checkout@v4
|
|
||||||
-
|
|
||||||
name: Prepare
|
|
||||||
run: |
|
|
||||||
platform=${{ matrix.platform }}
|
|
||||||
echo "PLATFORM_PAIR=${platform//\//-}" >> $GITHUB_ENV
|
|
||||||
-
|
|
||||||
name: Set up QEMU
|
|
||||||
uses: docker/setup-qemu-action@v3
|
|
||||||
-
|
|
||||||
name: Set up Docker Buildx
|
|
||||||
uses: docker/setup-buildx-action@v3
|
|
||||||
-
|
|
||||||
name: Test
|
|
||||||
uses: docker/bake-action@v4
|
|
||||||
with:
|
|
||||||
targets: binary-smoketest
|
|
||||||
set: |
|
|
||||||
*.platform=${{ matrix.platform }}
|
|
62
.github/workflows/validate-pr.yml
vendored
62
.github/workflows/validate-pr.yml
vendored
|
@ -1,62 +0,0 @@
|
||||||
name: validate-pr
|
|
||||||
|
|
||||||
on:
|
|
||||||
pull_request:
|
|
||||||
types: [opened, edited, labeled, unlabeled]
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
check-area-label:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
steps:
|
|
||||||
- name: Missing `area/` label
|
|
||||||
if: contains(join(github.event.pull_request.labels.*.name, ','), 'impact/') && !contains(join(github.event.pull_request.labels.*.name, ','), 'area/')
|
|
||||||
run: |
|
|
||||||
echo "::error::Every PR with an 'impact/*' label should also have an 'area/*' label"
|
|
||||||
exit 1
|
|
||||||
- name: OK
|
|
||||||
run: exit 0
|
|
||||||
|
|
||||||
check-changelog:
|
|
||||||
if: contains(join(github.event.pull_request.labels.*.name, ','), 'impact/')
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
env:
|
|
||||||
PR_BODY: |
|
|
||||||
${{ github.event.pull_request.body }}
|
|
||||||
steps:
|
|
||||||
- name: Check changelog description
|
|
||||||
run: |
|
|
||||||
# Extract the `markdown changelog` note code block
|
|
||||||
block=$(echo -n "$PR_BODY" | tr -d '\r' | awk '/^```markdown changelog$/{flag=1;next}/^```$/{flag=0}flag')
|
|
||||||
|
|
||||||
# Strip empty lines
|
|
||||||
desc=$(echo "$block" | awk NF)
|
|
||||||
|
|
||||||
if [ -z "$desc" ]; then
|
|
||||||
echo "::error::Changelog section is empty. Please provide a description for the changelog."
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
len=$(echo -n "$desc" | wc -c)
|
|
||||||
if [[ $len -le 6 ]]; then
|
|
||||||
echo "::error::Description looks too short: $desc"
|
|
||||||
exit 1
|
|
||||||
fi
|
|
||||||
|
|
||||||
echo "This PR will be included in the release notes with the following note:"
|
|
||||||
echo "$desc"
|
|
||||||
|
|
||||||
check-pr-branch:
|
|
||||||
runs-on: ubuntu-20.04
|
|
||||||
env:
|
|
||||||
PR_TITLE: ${{ github.event.pull_request.title }}
|
|
||||||
steps:
|
|
||||||
# Backports or PR that target a release branch directly should mention the target branch in the title, for example:
|
|
||||||
# [X.Y backport] Some change that needs backporting to X.Y
|
|
||||||
# [X.Y] Change directly targeting the X.Y branch
|
|
||||||
- name: Get branch from PR title
|
|
||||||
id: title_branch
|
|
||||||
run: echo "$PR_TITLE" | sed -n 's/^\[\([0-9]*\.[0-9]*\)[^]]*\].*/branch=\1/p' >> $GITHUB_OUTPUT
|
|
||||||
|
|
||||||
- name: Check release branch
|
|
||||||
if: github.event.pull_request.base.ref != steps.title_branch.outputs.branch && !(github.event.pull_request.base.ref == 'master' && steps.title_branch.outputs.branch == '')
|
|
||||||
run: echo "::error::PR title suggests targetting the ${{ steps.title_branch.outputs.branch }} branch, but is opened against ${{ github.event.pull_request.base.ref }}" && exit 1
|
|
33
.github/workflows/windows-2019.yml
vendored
33
.github/workflows/windows-2019.yml
vendored
|
@ -1,33 +0,0 @@
|
||||||
name: windows-2019
|
|
||||||
|
|
||||||
concurrency:
|
|
||||||
group: ${{ github.workflow }}-${{ github.ref }}
|
|
||||||
cancel-in-progress: true
|
|
||||||
|
|
||||||
on:
|
|
||||||
schedule:
|
|
||||||
- cron: '0 10 * * *'
|
|
||||||
workflow_dispatch:
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
validate-dco:
|
|
||||||
uses: ./.github/workflows/.dco.yml
|
|
||||||
|
|
||||||
test-prepare:
|
|
||||||
uses: ./.github/workflows/.test-prepare.yml
|
|
||||||
needs:
|
|
||||||
- validate-dco
|
|
||||||
|
|
||||||
run:
|
|
||||||
needs:
|
|
||||||
- test-prepare
|
|
||||||
uses: ./.github/workflows/.windows.yml
|
|
||||||
secrets: inherit
|
|
||||||
strategy:
|
|
||||||
fail-fast: false
|
|
||||||
matrix:
|
|
||||||
storage: ${{ fromJson(needs.test-prepare.outputs.matrix) }}
|
|
||||||
with:
|
|
||||||
os: windows-2019
|
|
||||||
storage: ${{ matrix.storage }}
|
|
||||||
send_coverage: false
|
|
36
.github/workflows/windows-2022.yml
vendored
36
.github/workflows/windows-2022.yml
vendored
|
@ -1,36 +0,0 @@
|
||||||
name: windows-2022
|
|
||||||
|
|
||||||
concurrency:
|
|
||||||
group: ${{ github.workflow }}-${{ github.ref }}
|
|
||||||
cancel-in-progress: true
|
|
||||||
|
|
||||||
on:
|
|
||||||
workflow_dispatch:
|
|
||||||
push:
|
|
||||||
branches:
|
|
||||||
- 'master'
|
|
||||||
- '[0-9]+.[0-9]+'
|
|
||||||
pull_request:
|
|
||||||
|
|
||||||
jobs:
|
|
||||||
validate-dco:
|
|
||||||
uses: ./.github/workflows/.dco.yml
|
|
||||||
|
|
||||||
test-prepare:
|
|
||||||
uses: ./.github/workflows/.test-prepare.yml
|
|
||||||
needs:
|
|
||||||
- validate-dco
|
|
||||||
|
|
||||||
run:
|
|
||||||
needs:
|
|
||||||
- test-prepare
|
|
||||||
uses: ./.github/workflows/.windows.yml
|
|
||||||
secrets: inherit
|
|
||||||
strategy:
|
|
||||||
fail-fast: false
|
|
||||||
matrix:
|
|
||||||
storage: ${{ fromJson(needs.test-prepare.outputs.matrix) }}
|
|
||||||
with:
|
|
||||||
os: windows-2022
|
|
||||||
storage: ${{ matrix.storage }}
|
|
||||||
send_coverage: true
|
|
48
.gitignore
vendored
48
.gitignore
vendored
|
@ -1,28 +1,30 @@
|
||||||
# If you want to ignore files created by your editor/tools, please consider a
|
# Docker project generated files to ignore
|
||||||
# [global .gitignore](https://help.github.com/articles/ignoring-files).
|
# if you want to ignore files created by your editor/tools,
|
||||||
|
# please consider a global .gitignore https://help.github.com/articles/ignoring-files
|
||||||
*~
|
*.exe
|
||||||
*.bak
|
*.exe~
|
||||||
*.orig
|
*.orig
|
||||||
|
*.test
|
||||||
.*.swp
|
.*.swp
|
||||||
.DS_Store
|
.DS_Store
|
||||||
thumbs.db
|
# a .bashrc may be added to customize the build environment
|
||||||
|
|
||||||
# local repository customization
|
|
||||||
.envrc
|
|
||||||
.bashrc
|
.bashrc
|
||||||
.editorconfig
|
.gopath/
|
||||||
|
autogen/
|
||||||
# build artifacts
|
|
||||||
bundles/
|
bundles/
|
||||||
cli/winresources/*/*.syso
|
cmd/dockerd/dockerd
|
||||||
cli/winresources/*/winres.json
|
cmd/docker/docker
|
||||||
contrib/builder/rpm/*/changelog
|
dockerversion/version_autogen.go
|
||||||
|
docs/AWS_S3_BUCKET
|
||||||
# ci artifacts
|
docs/GITCOMMIT
|
||||||
*.exe
|
docs/GIT_BRANCH
|
||||||
*.gz
|
docs/VERSION
|
||||||
go-test-report.json
|
docs/_build
|
||||||
junit-report.xml
|
docs/_static
|
||||||
profile.out
|
docs/_templates
|
||||||
test.main
|
docs/changed-files
|
||||||
|
# generated by man/md2man-all.sh
|
||||||
|
man/man1
|
||||||
|
man/man5
|
||||||
|
man/man8
|
||||||
|
vendor/pkg/
|
||||||
|
|
137
.golangci.yml
137
.golangci.yml
|
@ -1,137 +0,0 @@
|
||||||
linters:
|
|
||||||
enable:
|
|
||||||
- depguard
|
|
||||||
- dupword # Checks for duplicate words in the source code.
|
|
||||||
- goimports
|
|
||||||
- gosec
|
|
||||||
- gosimple
|
|
||||||
- govet
|
|
||||||
- importas
|
|
||||||
- ineffassign
|
|
||||||
- misspell
|
|
||||||
- revive
|
|
||||||
- staticcheck
|
|
||||||
- typecheck
|
|
||||||
- unconvert
|
|
||||||
- unused
|
|
||||||
|
|
||||||
disable:
|
|
||||||
- errcheck
|
|
||||||
|
|
||||||
run:
|
|
||||||
concurrency: 2
|
|
||||||
modules-download-mode: vendor
|
|
||||||
|
|
||||||
skip-dirs:
|
|
||||||
- docs
|
|
||||||
|
|
||||||
linters-settings:
|
|
||||||
dupword:
|
|
||||||
ignore:
|
|
||||||
- "true" # some tests use this as expected output
|
|
||||||
- "false" # some tests use this as expected output
|
|
||||||
- "root" # for tests using "ls" output with files owned by "root:root"
|
|
||||||
importas:
|
|
||||||
# Do not allow unaliased imports of aliased packages.
|
|
||||||
no-unaliased: true
|
|
||||||
|
|
||||||
alias:
|
|
||||||
# Enforce alias to prevent it accidentally being used instead of our
|
|
||||||
# own errdefs package (or vice-versa).
|
|
||||||
- pkg: github.com/containerd/containerd/errdefs
|
|
||||||
alias: cerrdefs
|
|
||||||
- pkg: github.com/opencontainers/image-spec/specs-go/v1
|
|
||||||
alias: ocispec
|
|
||||||
|
|
||||||
govet:
|
|
||||||
check-shadowing: false
|
|
||||||
depguard:
|
|
||||||
rules:
|
|
||||||
main:
|
|
||||||
deny:
|
|
||||||
- pkg: io/ioutil
|
|
||||||
desc: The io/ioutil package has been deprecated, see https://go.dev/doc/go1.16#ioutil
|
|
||||||
- pkg: "github.com/stretchr/testify/assert"
|
|
||||||
desc: Use "gotest.tools/v3/assert" instead
|
|
||||||
- pkg: "github.com/stretchr/testify/require"
|
|
||||||
desc: Use "gotest.tools/v3/assert" instead
|
|
||||||
- pkg: "github.com/stretchr/testify/suite"
|
|
||||||
desc: Do not use
|
|
||||||
revive:
|
|
||||||
rules:
|
|
||||||
# FIXME make sure all packages have a description. Currently, there's many packages without.
|
|
||||||
- name: package-comments
|
|
||||||
disabled: true
|
|
||||||
issues:
|
|
||||||
# The default exclusion rules are a bit too permissive, so copying the relevant ones below
|
|
||||||
exclude-use-default: false
|
|
||||||
|
|
||||||
exclude-rules:
|
|
||||||
# We prefer to use an "exclude-list" so that new "default" exclusions are not
|
|
||||||
# automatically inherited. We can decide whether or not to follow upstream
|
|
||||||
# defaults when updating golang-ci-lint versions.
|
|
||||||
# Unfortunately, this means we have to copy the whole exclusion pattern, as
|
|
||||||
# (unlike the "include" option), the "exclude" option does not take exclusion
|
|
||||||
# ID's.
|
|
||||||
#
|
|
||||||
# These exclusion patterns are copied from the default excluses at:
|
|
||||||
# https://github.com/golangci/golangci-lint/blob/v1.46.2/pkg/config/issues.go#L10-L104
|
|
||||||
|
|
||||||
# EXC0001
|
|
||||||
- text: "Error return value of .((os\\.)?std(out|err)\\..*|.*Close|.*Flush|os\\.Remove(All)?|.*print(f|ln)?|os\\.(Un)?Setenv). is not checked"
|
|
||||||
linters:
|
|
||||||
- errcheck
|
|
||||||
# EXC0006
|
|
||||||
- text: "Use of unsafe calls should be audited"
|
|
||||||
linters:
|
|
||||||
- gosec
|
|
||||||
# EXC0007
|
|
||||||
- text: "Subprocess launch(ed with variable|ing should be audited)"
|
|
||||||
linters:
|
|
||||||
- gosec
|
|
||||||
# EXC0008
|
|
||||||
# TODO: evaluate these and fix where needed: G307: Deferring unsafe method "*os.File" on type "Close" (gosec)
|
|
||||||
- text: "(G104|G307)"
|
|
||||||
linters:
|
|
||||||
- gosec
|
|
||||||
# EXC0009
|
|
||||||
- text: "(Expect directory permissions to be 0750 or less|Expect file permissions to be 0600 or less)"
|
|
||||||
linters:
|
|
||||||
- gosec
|
|
||||||
# EXC0010
|
|
||||||
- text: "Potential file inclusion via variable"
|
|
||||||
linters:
|
|
||||||
- gosec
|
|
||||||
|
|
||||||
# Looks like the match in "EXC0007" above doesn't catch this one
|
|
||||||
# TODO: consider upstreaming this to golangci-lint's default exclusion rules
|
|
||||||
- text: "G204: Subprocess launched with a potential tainted input or cmd arguments"
|
|
||||||
linters:
|
|
||||||
- gosec
|
|
||||||
# Looks like the match in "EXC0009" above doesn't catch this one
|
|
||||||
# TODO: consider upstreaming this to golangci-lint's default exclusion rules
|
|
||||||
- text: "G306: Expect WriteFile permissions to be 0600 or less"
|
|
||||||
linters:
|
|
||||||
- gosec
|
|
||||||
|
|
||||||
# Exclude some linters from running on tests files.
|
|
||||||
- path: _test\.go
|
|
||||||
linters:
|
|
||||||
- errcheck
|
|
||||||
- gosec
|
|
||||||
|
|
||||||
# Suppress golint complaining about generated types in api/types/
|
|
||||||
- text: "type name will be used as (container|volume)\\.(Container|Volume).* by other packages, and that stutters; consider calling this"
|
|
||||||
path: "api/types/(volume|container)/"
|
|
||||||
linters:
|
|
||||||
- revive
|
|
||||||
# FIXME temporarily suppress these (see https://github.com/gotestyourself/gotest.tools/issues/272)
|
|
||||||
- text: "SA1019: (assert|cmp|is)\\.ErrorType is deprecated"
|
|
||||||
linters:
|
|
||||||
- staticcheck
|
|
||||||
|
|
||||||
# Maximum issues count per one linter. Set to 0 to disable. Default is 50.
|
|
||||||
max-issues-per-linter: 0
|
|
||||||
|
|
||||||
# Maximum count of issues with the same text. Set to 0 to disable. Default is 3.
|
|
||||||
max-same-issues: 0
|
|
989
.mailmap
989
.mailmap
|
@ -1,755 +1,254 @@
|
||||||
# This file lists the canonical name and email of contributors, and is used to
|
# Generate AUTHORS: hack/generate-authors.sh
|
||||||
# generate AUTHORS (in hack/generate-authors.sh).
|
|
||||||
#
|
|
||||||
# To find new duplicates, regenerate AUTHORS and scan for name duplicates, or
|
|
||||||
# run the following to find email duplicates:
|
|
||||||
# git log --format='%aE - %aN' | sort -uf | awk -v IGNORECASE=1 '$1 in a {print a[$1]; print}; {a[$1]=$0}'
|
|
||||||
#
|
|
||||||
# For an explanation of this file format, consult gitmailmap(5).
|
|
||||||
|
|
||||||
Aaron L. Xu <liker.xu@foxmail.com>
|
# Tip for finding duplicates (besides scanning the output of AUTHORS for name
|
||||||
Aaron L. Xu <liker.xu@foxmail.com> <likexu@harmonycloud.cn>
|
# duplicates that aren't also email duplicates): scan the output of:
|
||||||
Aaron Lehmann <alehmann@netflix.com>
|
# git log --format='%aE - %aN' | sort -uf
|
||||||
Aaron Lehmann <alehmann@netflix.com> <aaron.lehmann@docker.com>
|
#
|
||||||
Abhinandan Prativadi <aprativadi@gmail.com>
|
# For explanation on this file format: man git-shortlog
|
||||||
Abhinandan Prativadi <aprativadi@gmail.com> <abhi@docker.com>
|
|
||||||
Abhinandan Prativadi <aprativadi@gmail.com> abhi <user.email>
|
Patrick Stapleton <github@gdi2290.com>
|
||||||
Abhishek Chanda <abhishek.becs@gmail.com>
|
Shishir Mahajan <shishir.mahajan@redhat.com> <smahajan@redhat.com>
|
||||||
Abhishek Chanda <abhishek.becs@gmail.com> <abhishek.chanda@emc.com>
|
Erwin van der Koogh <info@erronis.nl>
|
||||||
Ada Mancini <ada@docker.com>
|
|
||||||
Adam Dobrawy <naczelnik@jawnosc.tk>
|
|
||||||
Adam Dobrawy <naczelnik@jawnosc.tk> <ad-m@users.noreply.github.com>
|
|
||||||
Adrien Gallouët <adrien@gallouet.fr> <angt@users.noreply.github.com>
|
|
||||||
Ahmed Kamal <email.ahmedkamal@googlemail.com>
|
Ahmed Kamal <email.ahmedkamal@googlemail.com>
|
||||||
Ahmet Alp Balkan <ahmetb@microsoft.com> <ahmetalpbalkan@gmail.com>
|
Tejesh Mehta <tejesh.mehta@gmail.com> <tj@init.me>
|
||||||
AJ Bowen <aj@soulshake.net>
|
Cristian Staretu <cristian.staretu@gmail.com>
|
||||||
AJ Bowen <aj@soulshake.net> <aj@gandi.net>
|
Cristian Staretu <cristian.staretu@gmail.com> <unclejacksons@gmail.com>
|
||||||
AJ Bowen <aj@soulshake.net> <amy@gandi.net>
|
Cristian Staretu <cristian.staretu@gmail.com> <unclejack@users.noreply.github.com>
|
||||||
Akihiro Matsushima <amatsusbit@gmail.com> <amatsus@users.noreply.github.com>
|
Marcus Linke <marcus.linke@gmx.de>
|
||||||
Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp>
|
Aleksandrs Fadins <aleks@s-ko.net>
|
||||||
Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp> <suda.akihiro@lab.ntt.co.jp>
|
Christopher Latham <sudosurootdev@gmail.com>
|
||||||
Akihiro Suda <akihiro.suda.cz@hco.ntt.co.jp> <suda.kyoto@gmail.com>
|
Hu Keping <hukeping@huawei.com>
|
||||||
Akshay Moghe <akshay.moghe@gmail.com>
|
Wayne Chang <wayne@neverfear.org>
|
||||||
Albin Kerouanton <albinker@gmail.com>
|
Chen Chao <cc272309126@gmail.com>
|
||||||
Albin Kerouanton <albinker@gmail.com> <albin@akerouanton.name>
|
Daehyeok Mun <daehyeok@gmail.com>
|
||||||
Albin Kerouanton <albinker@gmail.com> <557933+akerouanton@users.noreply.github.com>
|
<daehyeok@gmail.com> <daehyeok@daehyeokui-MacBook-Air.local>
|
||||||
|
<jt@yadutaf.fr> <admin@jtlebi.fr>
|
||||||
|
<jeff@docker.com> <jefferya@programmerq.net>
|
||||||
|
<charles.hooper@dotcloud.com> <chooper@plumata.com>
|
||||||
|
<daniel.mizyrycki@dotcloud.com> <daniel@dotcloud.com>
|
||||||
|
<daniel.mizyrycki@dotcloud.com> <mzdaniel@glidelink.net>
|
||||||
|
Guillaume J. Charmes <guillaume.charmes@docker.com> <charmes.guillaume@gmail.com>
|
||||||
|
<guillaume.charmes@docker.com> <guillaume@dotcloud.com>
|
||||||
|
<guillaume.charmes@docker.com> <guillaume@docker.com>
|
||||||
|
<guillaume.charmes@docker.com> <guillaume.charmes@dotcloud.com>
|
||||||
|
<guillaume.charmes@docker.com> <guillaume@charmes.net>
|
||||||
|
<kencochrane@gmail.com> <KenCochrane@gmail.com>
|
||||||
|
Thatcher Peskens <thatcher@docker.com>
|
||||||
|
Thatcher Peskens <thatcher@docker.com> <thatcher@dotcloud.com>
|
||||||
|
Thatcher Peskens <thatcher@docker.com> dhrp <thatcher@gmx.net>
|
||||||
|
Jérôme Petazzoni <jerome.petazzoni@dotcloud.com> jpetazzo <jerome.petazzoni@dotcloud.com>
|
||||||
|
Jérôme Petazzoni <jerome.petazzoni@dotcloud.com> <jp@enix.org>
|
||||||
|
Joffrey F <joffrey@docker.com>
|
||||||
|
Joffrey F <joffrey@docker.com> <joffrey@dotcloud.com>
|
||||||
|
Joffrey F <joffrey@docker.com> <f.joffrey@gmail.com>
|
||||||
|
Tim Terhorst <mynamewastaken+git@gmail.com>
|
||||||
|
Andy Smith <github@anarkystic.com>
|
||||||
|
<kalessin@kalessin.fr> <louis@dotcloud.com>
|
||||||
|
<victor.vieux@docker.com> <victor.vieux@dotcloud.com>
|
||||||
|
<victor.vieux@docker.com> <victor@dotcloud.com>
|
||||||
|
<victor.vieux@docker.com> <dev@vvieux.com>
|
||||||
|
<victor.vieux@docker.com> <victor@docker.com>
|
||||||
|
<victor.vieux@docker.com> <vieux@docker.com>
|
||||||
|
<victor.vieux@docker.com> <victorvieux@gmail.com>
|
||||||
|
<dominik@honnef.co> <dominikh@fork-bomb.org>
|
||||||
|
<ehanchrow@ine.com> <eric.hanchrow@gmail.com>
|
||||||
|
Walter Stanish <walter@pratyeka.org>
|
||||||
|
<daniel@gasienica.ch> <dgasienica@zynga.com>
|
||||||
|
Roberto Hashioka <roberto_hashioka@hotmail.com>
|
||||||
|
Konstantin Pelykh <kpelykh@zettaset.com>
|
||||||
|
David Sissitka <me@dsissitka.com>
|
||||||
|
Nolan Darilek <nolan@thewordnerd.info>
|
||||||
|
<mastahyeti@gmail.com> <mastahyeti@users.noreply.github.com>
|
||||||
|
Benoit Chesneau <bchesneau@gmail.com>
|
||||||
|
Jordan Arentsen <blissdev@gmail.com>
|
||||||
|
Daniel Garcia <daniel@danielgarcia.info>
|
||||||
|
Miguel Angel Fernández <elmendalerenda@gmail.com>
|
||||||
|
Bhiraj Butala <abhiraj.butala@gmail.com>
|
||||||
|
Faiz Khan <faizkhan00@gmail.com>
|
||||||
|
Victor Lyuboslavsky <victor@victoreda.com>
|
||||||
|
Jean-Baptiste Barth <jeanbaptiste.barth@gmail.com>
|
||||||
|
Matthew Mueller <mattmuelle@gmail.com>
|
||||||
|
<mosoni@ebay.com> <mohitsoni1989@gmail.com>
|
||||||
|
Shih-Yuan Lee <fourdollars@gmail.com>
|
||||||
|
Daniel Mizyrycki <daniel.mizyrycki@dotcloud.com> root <root@vagrant-ubuntu-12.10.vagrantup.com>
|
||||||
|
Jean-Baptiste Dalido <jeanbaptiste@appgratis.com>
|
||||||
|
<proppy@google.com> <proppy@aminche.com>
|
||||||
|
<michael@docker.com> <michael@crosbymichael.com>
|
||||||
|
<michael@docker.com> <crosby.michael@gmail.com>
|
||||||
|
<michael@docker.com> <crosbymichael@gmail.com>
|
||||||
|
<github@developersupport.net> <github@metaliveblog.com>
|
||||||
|
<brandon@ifup.org> <brandon@ifup.co>
|
||||||
|
<dano@spotify.com> <daniel.norberg@gmail.com>
|
||||||
|
<danny@codeaholics.org> <Danny.Yates@mailonline.co.uk>
|
||||||
|
<gurjeet@singh.im> <singh.gurjeet@gmail.com>
|
||||||
|
<shawn@churchofgit.com> <shawnlandden@gmail.com>
|
||||||
|
<sjoerd-github@linuxonly.nl> <sjoerd@byte.nl>
|
||||||
|
<solomon@docker.com> <solomon.hykes@dotcloud.com>
|
||||||
|
<solomon@docker.com> <solomon@dotcloud.com>
|
||||||
|
<solomon@docker.com> <s@docker.com>
|
||||||
|
Sven Dowideit <SvenDowideit@home.org.au>
|
||||||
|
Sven Dowideit <SvenDowideit@home.org.au> <SvenDowideit@fosiki.com>
|
||||||
|
Sven Dowideit <SvenDowideit@home.org.au> <SvenDowideit@docker.com>
|
||||||
|
Sven Dowideit <SvenDowideit@home.org.au> <¨SvenDowideit@home.org.au¨>
|
||||||
|
Sven Dowideit <SvenDowideit@home.org.au> <SvenDowideit@home.org.au>
|
||||||
|
Sven Dowideit <SvenDowideit@home.org.au> <SvenDowideit@users.noreply.github.com>
|
||||||
|
Sven Dowideit <SvenDowideit@home.org.au> <sven@t440s.home.gateway>
|
||||||
|
<alexl@redhat.com> <alexander.larsson@gmail.com>
|
||||||
|
Alexander Morozov <lk4d4@docker.com> <lk4d4math@gmail.com>
|
||||||
|
Alexander Morozov <lk4d4@docker.com>
|
||||||
|
<git.nivoc@neverbox.com> <kuehnle@online.de>
|
||||||
|
O.S. Tezer <ostezer@gmail.com>
|
||||||
|
<ostezer@gmail.com> <ostezer@users.noreply.github.com>
|
||||||
|
Roberto G. Hashioka <roberto.hashioka@docker.com> <roberto_hashioka@hotmail.com>
|
||||||
|
<justin.p.simonelis@gmail.com> <justin.simonelis@PTS-JSIMON2.toronto.exclamation.com>
|
||||||
|
<taim@bosboot.org> <maztaim@users.noreply.github.com>
|
||||||
|
<viktor.vojnovski@amadeus.com> <vojnovski@gmail.com>
|
||||||
|
<vbatts@redhat.com> <vbatts@hashbangbash.com>
|
||||||
|
<altsysrq@gmail.com> <iamironbob@gmail.com>
|
||||||
|
Sridhar Ratnakumar <sridharr@activestate.com>
|
||||||
|
Sridhar Ratnakumar <sridharr@activestate.com> <github@srid.name>
|
||||||
|
Liang-Chi Hsieh <viirya@gmail.com>
|
||||||
Aleksa Sarai <asarai@suse.de>
|
Aleksa Sarai <asarai@suse.de>
|
||||||
Aleksa Sarai <asarai@suse.de> <asarai@suse.com>
|
Aleksa Sarai <asarai@suse.de> <asarai@suse.com>
|
||||||
Aleksa Sarai <asarai@suse.de> <cyphar@cyphar.com>
|
Aleksa Sarai <asarai@suse.de> <cyphar@cyphar.com>
|
||||||
Aleksandrs Fadins <aleks@s-ko.net>
|
Will Weaver <monkey@buildingbananas.com>
|
||||||
Alessandro Boch <aboch@tetrationanalytics.com>
|
Timothy Hobbs <timothyhobbs@seznam.cz>
|
||||||
Alessandro Boch <aboch@tetrationanalytics.com> <aboch@docker.com>
|
|
||||||
Alessandro Boch <aboch@tetrationanalytics.com> <aboch@socketplane.io>
|
|
||||||
Alessandro Boch <aboch@tetrationanalytics.com> <aboch@users.noreply.github.com>
|
|
||||||
Alex Chan <alex@alexwlchan.net>
|
|
||||||
Alex Chan <alex@alexwlchan.net> <alex.chan@metaswitch.com>
|
|
||||||
Alex Chen <alexchenunix@gmail.com> <root@localhost.localdomain>
|
|
||||||
Alex Ellis <alexellis2@gmail.com>
|
|
||||||
Alex Goodman <wagoodman@gmail.com> <wagoodman@users.noreply.github.com>
|
|
||||||
Alexander Larsson <alexl@redhat.com> <alexander.larsson@gmail.com>
|
|
||||||
Alexander Morozov <lk4d4math@gmail.com>
|
|
||||||
Alexander Morozov <lk4d4math@gmail.com> <lk4d4@docker.com>
|
|
||||||
Alexandre Beslic <alexandre.beslic@gmail.com> <abronan@docker.com>
|
|
||||||
Alexandre González <agonzalezro@gmail.com>
|
|
||||||
Alexis Ries <ries.alexis@gmail.com>
|
|
||||||
Alexis Ries <ries.alexis@gmail.com> <alexis.ries.ext@orange.com>
|
|
||||||
Alexis Thomas <fr.alexisthomas@gmail.com>
|
|
||||||
Alicia Lauerman <alicia@eta.im> <allydevour@me.com>
|
|
||||||
Allen Sun <allensun.shl@alibaba-inc.com> <allen.sun@daocloud.io>
|
|
||||||
Allen Sun <allensun.shl@alibaba-inc.com> <shlallen1990@gmail.com>
|
|
||||||
Anca Iordache <anca.iordache@docker.com>
|
|
||||||
Andrea Denisse Gómez <crypto.andrea@protonmail.ch>
|
|
||||||
Andrew Kim <taeyeonkim90@gmail.com>
|
|
||||||
Andrew Kim <taeyeonkim90@gmail.com> <akim01@fortinet.com>
|
|
||||||
Andrew Weiss <andrew.weiss@docker.com> <andrew.weiss@microsoft.com>
|
|
||||||
Andrew Weiss <andrew.weiss@docker.com> <andrew.weiss@outlook.com>
|
|
||||||
Andrey Kolomentsev <andrey.kolomentsev@docker.com>
|
|
||||||
Andrey Kolomentsev <andrey.kolomentsev@docker.com> <andrey.kolomentsev@gmail.com>
|
|
||||||
André Martins <aanm90@gmail.com> <martins@noironetworks.com>
|
|
||||||
Andy Rothfusz <github@developersupport.net> <github@metaliveblog.com>
|
|
||||||
Andy Smith <github@anarkystic.com>
|
|
||||||
Andy Zhang <andy.zhangtao@hotmail.com>
|
|
||||||
Andy Zhang <andy.zhangtao@hotmail.com> <ztao@tibco-support.com>
|
|
||||||
Ankush Agarwal <ankushagarwal11@gmail.com> <ankushagarwal@users.noreply.github.com>
|
|
||||||
Antonio Murdaca <antonio.murdaca@gmail.com> <amurdaca@redhat.com>
|
|
||||||
Antonio Murdaca <antonio.murdaca@gmail.com> <me@runcom.ninja>
|
|
||||||
Antonio Murdaca <antonio.murdaca@gmail.com> <runcom@linux.com>
|
|
||||||
Antonio Murdaca <antonio.murdaca@gmail.com> <runcom@redhat.com>
|
|
||||||
Antonio Murdaca <antonio.murdaca@gmail.com> <runcom@users.noreply.github.com>
|
|
||||||
Anuj Bahuguna <anujbahuguna.dev@gmail.com>
|
|
||||||
Anuj Bahuguna <anujbahuguna.dev@gmail.com> <abahuguna@fiberlink.com>
|
|
||||||
Anusha Ragunathan <anusha.ragunathan@docker.com> <anusha@docker.com>
|
|
||||||
Anyu Wang <wanganyu@outlook.com>
|
|
||||||
Arko Dasgupta <arko@tetrate.io>
|
|
||||||
Arko Dasgupta <arko@tetrate.io> <arko.dasgupta@docker.com>
|
|
||||||
Arko Dasgupta <arko@tetrate.io> <arkodg@users.noreply.github.com>
|
|
||||||
Arnaud Porterie <icecrime@gmail.com>
|
|
||||||
Arnaud Porterie <icecrime@gmail.com> <arnaud.porterie@docker.com>
|
|
||||||
Arnaud Rebillout <arnaud.rebillout@collabora.com>
|
|
||||||
Arnaud Rebillout <arnaud.rebillout@collabora.com> <elboulangero@gmail.com>
|
|
||||||
Arthur Gautier <baloo@gandi.net> <superbaloo+registrations.github@superbaloo.net>
|
|
||||||
Artur Meyster <arthurfbi@yahoo.com>
|
|
||||||
Avi Miller <avi.miller@oracle.com> <avi.miller@gmail.com>
|
|
||||||
Ben Bonnefoy <frenchben@docker.com>
|
|
||||||
Ben Golub <ben.golub@dotcloud.com>
|
|
||||||
Ben Toews <mastahyeti@gmail.com> <mastahyeti@users.noreply.github.com>
|
|
||||||
Benny Ng <benny.tpng@gmail.com>
|
|
||||||
Benoit Chesneau <bchesneau@gmail.com>
|
|
||||||
Bevisy Zhang <binbin36520@gmail.com>
|
|
||||||
Bhiraj Butala <abhiraj.butala@gmail.com>
|
|
||||||
Bhumika Bayani <bhumikabayani@gmail.com>
|
|
||||||
Bilal Amarni <bilal.amarni@gmail.com> <bamarni@users.noreply.github.com>
|
|
||||||
Bill Wang <ozbillwang@gmail.com> <SydOps@users.noreply.github.com>
|
|
||||||
Bily Zhang <xcoder@tenxcloud.com>
|
|
||||||
Bin Liu <liubin0329@gmail.com>
|
|
||||||
Bin Liu <liubin0329@gmail.com> <liubin0329@users.noreply.github.com>
|
|
||||||
Bingshen Wang <bingshen.wbs@alibaba-inc.com>
|
|
||||||
Bjorn Neergaard <bjorn@neersighted.com>
|
|
||||||
Bjorn Neergaard <bjorn@neersighted.com> <bjorn.neergaard@docker.com>
|
|
||||||
Bjorn Neergaard <bjorn@neersighted.com> <bneergaard@mirantis.com>
|
|
||||||
Boaz Shuster <ripcurld.github@gmail.com>
|
|
||||||
Bojun Zhu <bojun.zhu@foxmail.com>
|
|
||||||
Boqin Qin <bobbqqin@gmail.com>
|
|
||||||
Boshi Lian <farmer1992@gmail.com>
|
|
||||||
Brandon Philips <brandon.philips@coreos.com> <brandon@ifup.co>
|
|
||||||
Brandon Philips <brandon.philips@coreos.com> <brandon@ifup.org>
|
|
||||||
Brent Salisbury <brent.salisbury@docker.com> <brent@docker.com>
|
|
||||||
Brian Goff <cpuguy83@gmail.com>
|
|
||||||
Brian Goff <cpuguy83@gmail.com> <bgoff@cpuguy83-mbp.home>
|
|
||||||
Brian Goff <cpuguy83@gmail.com> <bgoff@cpuguy83-mbp.local>
|
|
||||||
Brian Goff <cpuguy83@gmail.com> <brian.goff@microsoft.com>
|
|
||||||
Brian Goff <cpuguy83@gmail.com> <cpuguy@hey.com>
|
|
||||||
Cameron Sparr <gh@sparr.email>
|
|
||||||
Carlos de Paula <me@carlosedp.com>
|
|
||||||
Chander Govindarajan <chandergovind@gmail.com>
|
|
||||||
Chao Wang <wangchao.fnst@cn.fujitsu.com> <chaowang@localhost.localdomain>
|
|
||||||
Charles Hooper <charles.hooper@dotcloud.com> <chooper@plumata.com>
|
|
||||||
Chen Chao <cc272309126@gmail.com>
|
|
||||||
Chen Chuanliang <chen.chuanliang@zte.com.cn>
|
|
||||||
Chen Mingjie <chenmingjie0828@163.com>
|
|
||||||
Chen Qiu <cheney-90@hotmail.com>
|
|
||||||
Chen Qiu <cheney-90@hotmail.com> <21321229@zju.edu.cn>
|
|
||||||
Chengfei Shang <cfshang@alauda.io>
|
|
||||||
Chris Dias <cdias@microsoft.com>
|
|
||||||
Chris McKinnel <chris.mckinnel@tangentlabs.co.uk>
|
|
||||||
Chris Price <cprice@mirantis.com>
|
|
||||||
Chris Price <cprice@mirantis.com> <chris.price@docker.com>
|
|
||||||
Chris Telfer <ctelfer@docker.com>
|
|
||||||
Chris Telfer <ctelfer@docker.com> <ctelfer@users.noreply.github.com>
|
|
||||||
Christopher Biscardi <biscarch@sketcht.com>
|
|
||||||
Christopher Latham <sudosurootdev@gmail.com>
|
|
||||||
Christy Norman <christy@linux.vnet.ibm.com>
|
|
||||||
Chun Chen <ramichen@tencent.com> <chenchun.feed@gmail.com>
|
|
||||||
Corbin Coleman <corbin.coleman@docker.com>
|
|
||||||
Cristian Ariza <dev@cristianrz.com>
|
|
||||||
Cristian Staretu <cristian.staretu@gmail.com>
|
|
||||||
Cristian Staretu <cristian.staretu@gmail.com> <unclejack@users.noreply.github.com>
|
|
||||||
Cristian Staretu <cristian.staretu@gmail.com> <unclejacksons@gmail.com>
|
|
||||||
cui fliter <imcusg@gmail.com>
|
|
||||||
cui fliter <imcusg@gmail.com> cuishuang <imcusg@gmail.com>
|
|
||||||
CUI Wei <ghostplant@qq.com> cuiwei13 <cuiwei13@pku.edu.cn>
|
|
||||||
Daehyeok Mun <daehyeok@gmail.com>
|
|
||||||
Daehyeok Mun <daehyeok@gmail.com> <daehyeok@daehyeok-ui-MacBook-Air.local>
|
|
||||||
Daehyeok Mun <daehyeok@gmail.com> <daehyeok@daehyeokui-MacBook-Air.local>
|
|
||||||
Dan Feldman <danf@jfrog.com>
|
|
||||||
Daniel Dao <dqminh@cloudflare.com>
|
|
||||||
Daniel Dao <dqminh@cloudflare.com> <dqminh89@gmail.com>
|
|
||||||
Daniel Garcia <daniel@danielgarcia.info>
|
|
||||||
Daniel Gasienica <daniel@gasienica.ch> <dgasienica@zynga.com>
|
|
||||||
Daniel Goosen <daniel.goosen@surveysampling.com> <djgoosen@users.noreply.github.com>
|
|
||||||
Daniel Grunwell <mwgrunny@gmail.com>
|
|
||||||
Daniel Hiltgen <daniel.hiltgen@docker.com> <dhiltgen@users.noreply.github.com>
|
|
||||||
Daniel J Walsh <dwalsh@redhat.com>
|
|
||||||
Daniel Mizyrycki <daniel.mizyrycki@dotcloud.com> <daniel@dotcloud.com>
|
|
||||||
Daniel Mizyrycki <daniel.mizyrycki@dotcloud.com> <mzdaniel@glidelink.net>
|
|
||||||
Daniel Mizyrycki <daniel.mizyrycki@dotcloud.com> <root@vagrant-ubuntu-12.10.vagrantup.com>
|
|
||||||
Daniel Nephin <dnephin@docker.com> <dnephin@gmail.com>
|
|
||||||
Daniel Norberg <dano@spotify.com> <daniel.norberg@gmail.com>
|
|
||||||
Daniel Watkins <daniel@daniel-watkins.co.uk>
|
|
||||||
Daniel Zhang <jmzwcn@gmail.com>
|
|
||||||
Danny Yates <danny@codeaholics.org> <Danny.Yates@mailonline.co.uk>
|
|
||||||
Darren Shepherd <darren.s.shepherd@gmail.com> <darren@rancher.com>
|
|
||||||
Dattatraya Kumbhar <dattatraya.kumbhar@gslab.com>
|
|
||||||
Dave Goodchild <buddhamagnet@gmail.com>
|
|
||||||
Dave Henderson <dhenderson@gmail.com> <Dave.Henderson@ca.ibm.com>
|
|
||||||
Dave Tucker <dt@docker.com> <dave@dtucker.co.uk>
|
|
||||||
David Dooling <dooling@gmail.com>
|
|
||||||
David Dooling <dooling@gmail.com> <david.dooling@docker.com>
|
|
||||||
David M. Karr <davidmichaelkarr@gmail.com>
|
|
||||||
David Sheets <dsheets@docker.com> <sheets@alum.mit.edu>
|
|
||||||
David Sissitka <me@dsissitka.com>
|
|
||||||
David Williamson <david.williamson@docker.com> <davidwilliamson@users.noreply.github.com>
|
|
||||||
Derek Ch <denc716@gmail.com>
|
|
||||||
Derek McGowan <derek@mcg.dev>
|
|
||||||
Derek McGowan <derek@mcg.dev> <derek@mcgstyle.net>
|
|
||||||
Deshi Xiao <dxiao@redhat.com> <dsxiao@dataman-inc.com>
|
|
||||||
Deshi Xiao <dxiao@redhat.com> <xiaods@gmail.com>
|
|
||||||
Dhilip Kumars <dhilip.kumar.s@huawei.com>
|
|
||||||
Diego Siqueira <dieg0@live.com>
|
|
||||||
Diogo Monica <diogo@docker.com> <diogo.monica@gmail.com>
|
|
||||||
Dmitry Sharshakov <d3dx12.xx@gmail.com>
|
|
||||||
Dmitry Sharshakov <d3dx12.xx@gmail.com> <sh7dm@outlook.com>
|
|
||||||
Dmytro Iakovliev <dmytro.iakovliev@zodiacsystems.com>
|
|
||||||
Dominic Yin <yindongchao@inspur.com>
|
|
||||||
Dominik Honnef <dominik@honnef.co> <dominikh@fork-bomb.org>
|
|
||||||
Doug Davis <dug@us.ibm.com> <duglin@users.noreply.github.com>
|
|
||||||
Doug Tangren <d.tangren@gmail.com>
|
|
||||||
Drew Erny <derny@mirantis.com>
|
|
||||||
Drew Erny <derny@mirantis.com> <drew.erny@docker.com>
|
|
||||||
Elan Ruusamäe <glen@pld-linux.org>
|
|
||||||
Elan Ruusamäe <glen@pld-linux.org> <glen@delfi.ee>
|
|
||||||
Elango Sivanandam <elango.siva@docker.com>
|
|
||||||
Elango Sivanandam <elango.siva@docker.com> <elango@docker.com>
|
|
||||||
Eli Uriegas <seemethere101@gmail.com>
|
|
||||||
Eli Uriegas <seemethere101@gmail.com> <eli.uriegas@docker.com>
|
|
||||||
Eric G. Noriega <enoriega@vizuri.com> <egnoriega@users.noreply.github.com>
|
|
||||||
Eric Hanchrow <ehanchrow@ine.com> <eric.hanchrow@gmail.com>
|
|
||||||
Eric Rosenberg <ehaydenr@gmail.com> <ehaydenr@users.noreply.github.com>
|
|
||||||
Erica Windisch <erica@windisch.us> <eric@windisch.us>
|
|
||||||
Erica Windisch <erica@windisch.us> <ewindisch@docker.com>
|
|
||||||
Erik Hollensbe <github@hollensbe.org> <erik+github@hollensbe.org>
|
|
||||||
Erwin van der Koogh <info@erronis.nl>
|
|
||||||
Ethan Bell <ebgamer29@gmail.com>
|
|
||||||
Euan Kemp <euan.kemp@coreos.com> <euank@amazon.com>
|
|
||||||
Eugen Krizo <eugen.krizo@gmail.com>
|
|
||||||
Evan Hazlett <ejhazlett@gmail.com> <ehazlett@users.noreply.github.com>
|
|
||||||
Evelyn Xu <evelynhsu21@gmail.com>
|
|
||||||
Evgeny Shmarnev <shmarnev@gmail.com>
|
|
||||||
Faiz Khan <faizkhan00@gmail.com>
|
|
||||||
Fangming Fang <fangming.fang@arm.com>
|
|
||||||
Felix Hupfeld <felix@quobyte.com> <quofelix@users.noreply.github.com>
|
|
||||||
Felix Ruess <felix.ruess@gmail.com> <felix.ruess@roboception.de>
|
|
||||||
Feng Yan <fy2462@gmail.com>
|
|
||||||
Fengtu Wang <wangfengtu@huawei.com> <wangfengtu@huawei.com>
|
|
||||||
Filipe Pina <hzlu1ot0@duck.com>
|
|
||||||
Filipe Pina <hzlu1ot0@duck.com> <636320+fopina@users.noreply.github.com>
|
|
||||||
Francisco Carriedo <fcarriedo@gmail.com>
|
|
||||||
Frank Rosquin <frank.rosquin+github@gmail.com> <frank.rosquin@gmail.com>
|
|
||||||
Frank Yang <yyb196@gmail.com>
|
|
||||||
Frederick F. Kautz IV <fkautz@redhat.com> <fkautz@alumni.cmu.edu>
|
|
||||||
Fu JinLin <withlin@yeah.net>
|
|
||||||
Gabriel Goller <gabrielgoller123@gmail.com>
|
|
||||||
Gabriel Nicolas Avellaneda <avellaneda.gabriel@gmail.com>
|
|
||||||
Gaetan de Villele <gdevillele@gmail.com>
|
|
||||||
Gang Qiao <qiaohai8866@gmail.com> <1373319223@qq.com>
|
|
||||||
Geon Kim <geon0250@gmail.com>
|
|
||||||
George Kontridze <george@bugsnag.com>
|
|
||||||
Gerwim Feiken <g.feiken@tfe.nl> <gerwim@gmail.com>
|
|
||||||
Giampaolo Mancini <giampaolo@trampolineup.com>
|
|
||||||
Giovan Isa Musthofa <giovanism@outlook.co.id>
|
|
||||||
Gopikannan Venugopalsamy <gopikannan.venugopalsamy@gmail.com>
|
|
||||||
Gou Rao <gou@portworx.com> <gourao@users.noreply.github.com>
|
|
||||||
Grant Millar <rid@cylo.io>
|
|
||||||
Grant Millar <rid@cylo.io> <grant@cylo.io>
|
|
||||||
Grant Millar <rid@cylo.io> <grant@seednet.eu>
|
|
||||||
Greg Stephens <greg@udon.org>
|
|
||||||
Guillaume J. Charmes <guillaume.charmes@docker.com> <charmes.guillaume@gmail.com>
|
|
||||||
Guillaume J. Charmes <guillaume.charmes@docker.com> <guillaume.charmes@dotcloud.com>
|
|
||||||
Guillaume J. Charmes <guillaume.charmes@docker.com> <guillaume@charmes.net>
|
|
||||||
Guillaume J. Charmes <guillaume.charmes@docker.com> <guillaume@docker.com>
|
|
||||||
Guillaume J. Charmes <guillaume.charmes@docker.com> <guillaume@dotcloud.com>
|
|
||||||
Gunadhya S. <6939749+gunadhya@users.noreply.github.com>
|
|
||||||
Guoqiang QI <guoqiang.qi1@gmail.com>
|
|
||||||
Guri <odg0318@gmail.com>
|
|
||||||
Gurjeet Singh <gurjeet@singh.im> <singh.gurjeet@gmail.com>
|
|
||||||
Gustav Sinder <gustav.sinder@gmail.com>
|
|
||||||
Günther Jungbluth <gunther@gameslabs.net>
|
|
||||||
Hakan Özler <hakan.ozler@kodcu.com>
|
|
||||||
Hao Shu Wei <haoshuwei24@gmail.com>
|
|
||||||
Hao Shu Wei <haoshuwei24@gmail.com> <haoshuwei1989@163.com>
|
|
||||||
Hao Shu Wei <haoshuwei24@gmail.com> <haosw@cn.ibm.com>
|
|
||||||
Harald Albers <github@albersweb.de> <albers@users.noreply.github.com>
|
|
||||||
Harald Niesche <harald@niesche.de>
|
|
||||||
Harold Cooper <hrldcpr@gmail.com>
|
|
||||||
Harry Zhang <harryz@hyper.sh>
|
|
||||||
Harry Zhang <harryz@hyper.sh> <harryzhang@zju.edu.cn>
|
|
||||||
Harry Zhang <harryz@hyper.sh> <resouer@163.com>
|
|
||||||
Harry Zhang <harryz@hyper.sh> <resouer@gmail.com>
|
|
||||||
Harshal Patil <harshal.patil@in.ibm.com> <harche@users.noreply.github.com>
|
|
||||||
He Simei <hesimei@zju.edu.cn>
|
|
||||||
Helen Xie <chenjg@harmonycloud.cn>
|
|
||||||
Hiroyuki Sasagawa <hs19870702@gmail.com>
|
|
||||||
Hollie Teal <hollie@docker.com>
|
|
||||||
Hollie Teal <hollie@docker.com> <hollie.teal@docker.com>
|
|
||||||
Hollie Teal <hollie@docker.com> <hollietealok@users.noreply.github.com>
|
|
||||||
hsinko <21551195@zju.edu.cn> <hsinko@users.noreply.github.com>
|
|
||||||
Hu Keping <hukeping@huawei.com>
|
|
||||||
Huajin Tong <fliterdashen@gmail.com>
|
|
||||||
Hui Kang <hkang.sunysb@gmail.com>
|
|
||||||
Hui Kang <hkang.sunysb@gmail.com> <kangh@us.ibm.com>
|
|
||||||
Huu Nguyen <huu@prismskylabs.com> <whoshuu@gmail.com>
|
|
||||||
Hyeongkyu Lee <hyeongkyu.lee@navercorp.com>
|
|
||||||
Hyzhou Zhy <hyzhou.zhy@alibaba-inc.com>
|
|
||||||
Hyzhou Zhy <hyzhou.zhy@alibaba-inc.com> <1187766782@qq.com>
|
|
||||||
Ian Campbell <ian.campbell@docker.com>
|
|
||||||
Ian Campbell <ian.campbell@docker.com> <ijc@docker.com>
|
|
||||||
Ilya Khlopotov <ilya.khlopotov@gmail.com>
|
|
||||||
Iskander Sharipov <quasilyte@gmail.com>
|
|
||||||
Ivan Babrou <ibobrik@gmail.com>
|
|
||||||
Ivan Markin <sw@nogoegst.net> <twim@riseup.net>
|
|
||||||
Jack Laxson <jackjrabbit@gmail.com>
|
|
||||||
Jacob Atzen <jacob@jacobatzen.dk> <jatzen@gmail.com>
|
|
||||||
Jacob Tomlinson <jacob@tom.linson.uk> <jacobtomlinson@users.noreply.github.com>
|
|
||||||
Jaivish Kothari <janonymous.codevulture@gmail.com>
|
|
||||||
Jake Moshenko <jake@devtable.com>
|
|
||||||
Jakub Drahos <jdrahos@pulsepoint.com>
|
|
||||||
Jakub Drahos <jdrahos@pulsepoint.com> <jack.drahos@gmail.com>
|
|
||||||
James Nesbitt <jnesbitt@mirantis.com>
|
|
||||||
James Nesbitt <jnesbitt@mirantis.com> <james.nesbitt@wunderkraut.com>
|
|
||||||
Jamie Hannaford <jamie@limetree.org> <jamie.hannaford@rackspace.com>
|
|
||||||
Jan Götte <jaseg@jaseg.net>
|
|
||||||
Jana Radhakrishnan <mrjana@docker.com>
|
|
||||||
Jana Radhakrishnan <mrjana@docker.com> <mrjana@socketplane.io>
|
|
||||||
Javier Bassi <javierbassi@gmail.com>
|
|
||||||
Javier Bassi <javierbassi@gmail.com> <CrimsonGlory@users.noreply.github.com>
|
|
||||||
Jay Lim <jay@imjching.com>
|
|
||||||
Jay Lim <jay@imjching.com> <imjching@hotmail.com>
|
|
||||||
Jean Rouge <rougej+github@gmail.com> <jer329@cornell.edu>
|
|
||||||
Jean-Baptiste Barth <jeanbaptiste.barth@gmail.com>
|
|
||||||
Jean-Baptiste Dalido <jeanbaptiste@appgratis.com>
|
|
||||||
Jean-Tiare Le Bigot <jt@yadutaf.fr> <admin@jtlebi.fr>
|
|
||||||
Jeff Anderson <jeff@docker.com> <jefferya@programmerq.net>
|
|
||||||
Jeff Nickoloff <jeff.nickoloff@gmail.com> <jeff@allingeek.com>
|
|
||||||
Jeroen Franse <jeroenfranse@gmail.com>
|
|
||||||
Jessica Frazelle <jess@oxide.computer>
|
|
||||||
Jessica Frazelle <jess@oxide.computer> <acidburn@docker.com>
|
|
||||||
Jessica Frazelle <jess@oxide.computer> <acidburn@google.com>
|
|
||||||
Jessica Frazelle <jess@oxide.computer> <acidburn@microsoft.com>
|
|
||||||
Jessica Frazelle <jess@oxide.computer> <jess@docker.com>
|
|
||||||
Jessica Frazelle <jess@oxide.computer> <jess@mesosphere.com>
|
|
||||||
Jessica Frazelle <jess@oxide.computer> <jessfraz@google.com>
|
|
||||||
Jessica Frazelle <jess@oxide.computer> <jfrazelle@users.noreply.github.com>
|
|
||||||
Jessica Frazelle <jess@oxide.computer> <me@jessfraz.com>
|
|
||||||
Jessica Frazelle <jess@oxide.computer> <princess@docker.com>
|
|
||||||
Jian Liao <jliao@alauda.io>
|
|
||||||
Jiang Jinyang <jjyruby@gmail.com>
|
|
||||||
Jiang Jinyang <jjyruby@gmail.com> <jiangjinyang@outlook.com>
|
|
||||||
Jim Galasyn <jim.galasyn@docker.com>
|
|
||||||
Jiuyue Ma <majiuyue@huawei.com>
|
|
||||||
Joey Geiger <jgeiger@gmail.com>
|
|
||||||
Joffrey F <joffrey@docker.com>
|
|
||||||
Joffrey F <joffrey@docker.com> <f.joffrey@gmail.com>
|
|
||||||
Joffrey F <joffrey@docker.com> <joffrey@dotcloud.com>
|
|
||||||
Johan Euphrosine <proppy@google.com> <proppy@aminche.com>
|
|
||||||
John Harris <john@johnharris.io>
|
|
||||||
John Howard <github@lowenna.com>
|
|
||||||
John Howard <github@lowenna.com> <10522484+lowenna@users.noreply.github.com>
|
|
||||||
John Howard <github@lowenna.com> <jhoward@microsoft.com>
|
|
||||||
John Howard <github@lowenna.com> <jhoward@ntdev.microsoft.com>
|
|
||||||
John Howard <github@lowenna.com> <jhowardmsft@users.noreply.github.com>
|
|
||||||
John Howard <github@lowenna.com> <john.howard@microsoft.com>
|
|
||||||
John Howard <github@lowenna.com> <john@lowenna.com>
|
|
||||||
John Stephens <johnstep@docker.com> <johnstep@users.noreply.github.com>
|
|
||||||
Jon Surrell <jon.surrell@gmail.com> <jon.surrell@automattic.com>
|
|
||||||
Jonathan Choy <jonathan.j.choy@gmail.com>
|
|
||||||
Jonathan Choy <jonathan.j.choy@gmail.com> <oni@tetsujinlabs.com>
|
|
||||||
Jordan Arentsen <blissdev@gmail.com>
|
|
||||||
Jordan Jennings <jjn2009@gmail.com> <jjn2009@users.noreply.github.com>
|
|
||||||
Jorit Kleine-Möllhoff <joppich@bricknet.de> <joppich@users.noreply.github.com>
|
|
||||||
Jose Diaz-Gonzalez <email@josediazgonzalez.com>
|
|
||||||
Jose Diaz-Gonzalez <email@josediazgonzalez.com> <jose@seatgeek.com>
|
|
||||||
Jose Diaz-Gonzalez <email@josediazgonzalez.com> <josegonzalez@users.noreply.github.com>
|
|
||||||
Josh Bonczkowski <josh.bonczkowski@gmail.com>
|
|
||||||
Josh Eveleth <joshe@opendns.com> <jeveleth@users.noreply.github.com>
|
|
||||||
Josh Hawn <josh.hawn@docker.com> <jlhawn@berkeley.edu>
|
|
||||||
Josh Horwitz <horwitz@addthis.com> <horwitzja@gmail.com>
|
|
||||||
Josh Soref <jsoref@gmail.com> <jsoref@users.noreply.github.com>
|
|
||||||
Josh Wilson <josh.wilson@fivestars.com> <jcwilson@users.noreply.github.com>
|
|
||||||
Joyce Jang <mail@joycejang.com>
|
|
||||||
Julien Bordellier <julienbordellier@gmail.com> <git@julienbordellier.com>
|
|
||||||
Julien Bordellier <julienbordellier@gmail.com> <me@julienbordellier.com>
|
|
||||||
Jun Du <dujun5@huawei.com>
|
|
||||||
Justin Cormack <justin.cormack@docker.com>
|
|
||||||
Justin Cormack <justin.cormack@docker.com> <justin.cormack@unikernel.com>
|
|
||||||
Justin Cormack <justin.cormack@docker.com> <justin@specialbusservice.com>
|
|
||||||
Justin Keller <85903732+jk-vb@users.noreply.github.com>
|
|
||||||
Justin Keller <85903732+jk-vb@users.noreply.github.com> <jkeller@vb-jkeller-mbp.local>
|
|
||||||
Justin Simonelis <justin.p.simonelis@gmail.com> <justin.simonelis@PTS-JSIMON2.toronto.exclamation.com>
|
|
||||||
Justin Terry <juterry@microsoft.com>
|
|
||||||
Jérôme Petazzoni <jerome.petazzoni@docker.com> <jerome.petazzoni@dotcloud.com>
|
|
||||||
Jérôme Petazzoni <jerome.petazzoni@docker.com> <jerome.petazzoni@gmail.com>
|
|
||||||
Jérôme Petazzoni <jerome.petazzoni@docker.com> <jp@enix.org>
|
|
||||||
K. Heller <pestophagous@gmail.com> <pestophagous@users.noreply.github.com>
|
|
||||||
Kai Qiang Wu (Kennan) <wkq5325@gmail.com>
|
|
||||||
Kai Qiang Wu (Kennan) <wkq5325@gmail.com> <wkqwu@cn.ibm.com>
|
|
||||||
Kamil Domański <kamil@domanski.co>
|
|
||||||
Kamjar Gerami <kami.gerami@gmail.com>
|
|
||||||
Karthik Nayak <karthik.188@gmail.com>
|
|
||||||
Karthik Nayak <karthik.188@gmail.com> <Karthik.188@gmail.com>
|
|
||||||
Ken Cochrane <kencochrane@gmail.com> <KenCochrane@gmail.com>
|
|
||||||
Ken Herner <kherner@progress.com> <chosenken@gmail.com>
|
|
||||||
Ken Reese <krrgithub@gmail.com>
|
|
||||||
Kenfe-Mickaël Laventure <mickael.laventure@gmail.com>
|
|
||||||
Kevin Alvarez <github@crazymax.dev>
|
|
||||||
Kevin Alvarez <github@crazymax.dev> <1951866+crazy-max@users.noreply.github.com>
|
|
||||||
Kevin Alvarez <github@crazymax.dev> <crazy-max@users.noreply.github.com>
|
|
||||||
Kevin Feyrer <kevin.feyrer@btinternet.com> <kevinfeyrer@users.noreply.github.com>
|
|
||||||
Kevin Kern <kaiwentan@harmonycloud.cn>
|
|
||||||
Kevin Meredith <kevin.m.meredith@gmail.com>
|
|
||||||
Kir Kolyshkin <kolyshkin@gmail.com>
|
|
||||||
Kir Kolyshkin <kolyshkin@gmail.com> <kir@openvz.org>
|
|
||||||
Kir Kolyshkin <kolyshkin@gmail.com> <kolyshkin@users.noreply.github.com>
|
|
||||||
Konrad Kleine <konrad.wilhelm.kleine@gmail.com> <kwk@users.noreply.github.com>
|
|
||||||
Konstantin Gribov <grossws@gmail.com>
|
|
||||||
Konstantin Pelykh <kpelykh@zettaset.com>
|
|
||||||
Kotaro Yoshimatsu <kotaro.yoshimatsu@gmail.com>
|
|
||||||
Kunal Kushwaha <kushwaha_kunal_v7@lab.ntt.co.jp>
|
|
||||||
Kunal Kushwaha <kushwaha_kunal_v7@lab.ntt.co.jp> <btkushuwahak@KUNAL-PC.swh.swh.nttdata.co.jp>
|
|
||||||
Kunal Kushwaha <kushwaha_kunal_v7@lab.ntt.co.jp> <kunal.kushwaha@gmail.com>
|
|
||||||
Kyle Squizzato <ksquizz@gmail.com>
|
|
||||||
Kyle Squizzato <ksquizz@gmail.com> <kyle.squizzato@docker.com>
|
|
||||||
Lajos Papp <lajos.papp@sequenceiq.com> <lalyos@yahoo.com>
|
|
||||||
Lei Gong <lgong@alauda.io>
|
|
||||||
Lei Jitang <leijitang@huawei.com>
|
|
||||||
Lei Jitang <leijitang@huawei.com> <leijitang@gmail.com>
|
|
||||||
Lei Jitang <leijitang@huawei.com> <leijitang@outlook.com>
|
|
||||||
Leiiwang <u2takey@gmail.com>
|
|
||||||
Liang Mingqiang <mqliang.zju@gmail.com>
|
|
||||||
Liang-Chi Hsieh <viirya@gmail.com>
|
|
||||||
Liao Qingwei <liaoqingwei@huawei.com>
|
|
||||||
Linus Heckemann <lheckemann@twig-world.com>
|
|
||||||
Linus Heckemann <lheckemann@twig-world.com> <anonymouse2048@gmail.com>
|
|
||||||
Lokesh Mandvekar <lsm5@fedoraproject.org> <lsm5@redhat.com>
|
|
||||||
Lorenzo Fontana <fontanalorenz@gmail.com> <fontanalorenzo@me.com>
|
|
||||||
Lorenzo Fontana <fontanalorenz@gmail.com> <lo@linux.com>
|
|
||||||
Louis Opter <kalessin@kalessin.fr>
|
|
||||||
Louis Opter <kalessin@kalessin.fr> <louis@dotcloud.com>
|
|
||||||
Luca Favatella <luca.favatella@erlang-solutions.com> <lucafavatella@users.noreply.github.com>
|
|
||||||
Luke Marsden <me@lukemarsden.net> <luke@digital-crocus.com>
|
|
||||||
Lyn <energylyn@zju.edu.cn>
|
|
||||||
Lynda O'Leary <lyndaoleary29@gmail.com>
|
|
||||||
Lynda O'Leary <lyndaoleary29@gmail.com> <lyndaoleary@hotmail.com>
|
|
||||||
Ma Müller <mueller-ma@users.noreply.github.com>
|
|
||||||
Madhan Raj Mookkandy <MadhanRaj.Mookkandy@microsoft.com>
|
|
||||||
Madhan Raj Mookkandy <MadhanRaj.Mookkandy@microsoft.com> <madhanm@corp.microsoft.com>
|
|
||||||
Madhan Raj Mookkandy <MadhanRaj.Mookkandy@microsoft.com> <madhanm@microsoft.com>
|
|
||||||
Madhu Venugopal <mavenugo@gmail.com> <madhu@docker.com>
|
|
||||||
Madhu Venugopal <mavenugo@gmail.com> <madhu@socketplane.io>
|
|
||||||
Mageee <fangpuyi@foxmail.com> <21521230.zju.edu.cn>
|
|
||||||
Mansi Nahar <mmn4185@rit.edu> <mansi.nahar@macbookpro-mansinahar.local>
|
|
||||||
Mansi Nahar <mmn4185@rit.edu> <mansinahar@users.noreply.github.com>
|
|
||||||
Marc Abramowitz <marc@marc-abramowitz.com> <msabramo@gmail.com>
|
|
||||||
Marcelo Horacio Fortino <info@fortinux.com> <fortinux@users.noreply.github.com>
|
|
||||||
Marcus Linke <marcus.linke@gmx.de>
|
|
||||||
Marianna Tessel <mtesselh@gmail.com>
|
|
||||||
Mark Oates <fl0yd@me.com>
|
|
||||||
Markan Patel <mpatel678@gmail.com>
|
|
||||||
Markus Kortlang <hyp3rdino@googlemail.com> <markus.kortlang@lhsystems.com>
|
|
||||||
Martin Redmond <redmond.martin@gmail.com> <martin@tinychat.com>
|
|
||||||
Martin Redmond <redmond.martin@gmail.com> <xgithub@redmond5.com>
|
|
||||||
Maru Newby <mnewby@thesprawl.net>
|
|
||||||
Mary Anthony <mary.anthony@docker.com> <mary@docker.com>
|
|
||||||
Mary Anthony <mary.anthony@docker.com> <moxieandmore@gmail.com>
|
|
||||||
Mary Anthony <mary.anthony@docker.com> moxiegirl <mary@docker.com>
|
|
||||||
Masato Ohba <over.rye@gmail.com>
|
|
||||||
Mathieu Paturel <mathieu.paturel@gmail.com>
|
|
||||||
Matt Bentley <matt.bentley@docker.com> <mbentley@mbentley.net>
|
|
||||||
Matt Schurenko <matt.schurenko@gmail.com>
|
|
||||||
Matt Williams <mattyw@me.com>
|
|
||||||
Matt Williams <mattyw@me.com> <gh@mattyw.net>
|
|
||||||
Matthew Heon <mheon@redhat.com> <mheon@mheonlaptop.redhat.com>
|
|
||||||
Matthew Mosesohn <raytrac3r@gmail.com>
|
|
||||||
Matthew Mueller <mattmuelle@gmail.com>
|
|
||||||
Matthias Kühnle <git.nivoc@neverbox.com> <kuehnle@online.de>
|
|
||||||
Mauricio Garavaglia <mauricio@medallia.com> <mauriciogaravaglia@gmail.com>
|
|
||||||
Maxwell <csuhp007@gmail.com>
|
|
||||||
Maxwell <csuhp007@gmail.com> <csuhqg@foxmail.com>
|
|
||||||
Menghui Chen <menghui.chen@alibaba-inc.com>
|
|
||||||
Michael Beskin <mrbeskin@gmail.com>
|
|
||||||
Michael Crosby <crosbymichael@gmail.com>
|
|
||||||
Michael Crosby <crosbymichael@gmail.com> <crosby.michael@gmail.com>
|
|
||||||
Michael Crosby <crosbymichael@gmail.com> <michael@crosbymichael.com>
|
|
||||||
Michael Crosby <crosbymichael@gmail.com> <michael@docker.com>
|
|
||||||
Michael Crosby <crosbymichael@gmail.com> <michael@thepasture.io>
|
|
||||||
Michael Hudson-Doyle <michael.hudson@canonical.com> <michael.hudson@linaro.org>
|
|
||||||
Michael Huettermann <michael@huettermann.net>
|
|
||||||
Michael Käufl <docker@c.michael-kaeufl.de> <michael-k@users.noreply.github.com>
|
|
||||||
Michael Nussbaum <michael.nussbaum@getbraintree.com>
|
|
||||||
Michael Nussbaum <michael.nussbaum@getbraintree.com> <code@getbraintree.com>
|
|
||||||
Michael Spetsiotis <michael_spets@hotmail.com>
|
|
||||||
Michael Stapelberg <michael+gh@stapelberg.de>
|
|
||||||
Michael Stapelberg <michael+gh@stapelberg.de> <stapelberg@google.com>
|
|
||||||
Michal Kostrzewa <michal.kostrzewa@codilime.com>
|
|
||||||
Michal Kostrzewa <michal.kostrzewa@codilime.com> <kostrzewa.michal@o2.pl>
|
|
||||||
Michal Minář <miminar@redhat.com>
|
|
||||||
Michał Gryko <github@odkurzacz.org>
|
|
||||||
Michiel de Jong <michiel@unhosted.org>
|
|
||||||
Mickaël Fortunato <morsi.morsicus@gmail.com>
|
|
||||||
Miguel Angel Alvarez Cabrerizo <doncicuto@gmail.com> <30386061+doncicuto@users.noreply.github.com>
|
|
||||||
Miguel Angel Fernández <elmendalerenda@gmail.com>
|
|
||||||
Mihai Borobocea <MihaiBorob@gmail.com> <MihaiBorobocea@gmail.com>
|
|
||||||
Mikael Davranche <mikael.davranche@corp.ovh.com>
|
|
||||||
Mikael Davranche <mikael.davranche@corp.ovh.com> <mikael.davranche@corp.ovh.net>
|
|
||||||
Mike Casas <mkcsas0@gmail.com> <mikecasas@users.noreply.github.com>
|
|
||||||
Mike Goelzer <mike.goelzer@docker.com> <mgoelzer@docker.com>
|
|
||||||
Milas Bowman <devnull@milas.dev>
|
|
||||||
Milas Bowman <devnull@milas.dev> <milasb@gmail.com>
|
|
||||||
Milas Bowman <devnull@milas.dev> <milas.bowman@docker.com>
|
|
||||||
Milind Chawre <milindchawre@gmail.com>
|
|
||||||
Misty Stanley-Jones <misty@docker.com> <misty@apache.org>
|
|
||||||
Mohammad Banikazemi <MBanikazemi@gmail.com>
|
|
||||||
Mohammad Banikazemi <MBanikazemi@gmail.com> <mb@us.ibm.com>
|
|
||||||
Mohd Sadiq <mohdsadiq058@gmail.com> <mohdsadiq058@gmail.com>
|
|
||||||
Mohd Sadiq <mohdsadiq058@gmail.com> <42430865+msadiq058@users.noreply.github.com>
|
|
||||||
Mohit Soni <mosoni@ebay.com> <mohitsoni1989@gmail.com>
|
|
||||||
Moorthy RS <rsmoorthy@gmail.com> <rsmoorthy@users.noreply.github.com>
|
|
||||||
Moysés Borges <moysesb@gmail.com>
|
|
||||||
Moysés Borges <moysesb@gmail.com> <moyses.furtado@wplex.com.br>
|
|
||||||
mrfly <mr.wrfly@gmail.com> <wrfly@users.noreply.github.com>
|
|
||||||
Nace Oroz <orkica@gmail.com>
|
|
||||||
Natasha Jarus <linuxmercedes@gmail.com>
|
|
||||||
Nathan LeClaire <nathan.leclaire@docker.com> <nathan.leclaire@gmail.com>
|
Nathan LeClaire <nathan.leclaire@docker.com> <nathan.leclaire@gmail.com>
|
||||||
Nathan LeClaire <nathan.leclaire@docker.com> <nathanleclaire@gmail.com>
|
Nathan LeClaire <nathan.leclaire@docker.com> <nathanleclaire@gmail.com>
|
||||||
Neil Horman <nhorman@tuxdriver.com> <nhorman@hmswarspite.think-freely.org>
|
<github@hollensbe.org> <erik+github@hollensbe.org>
|
||||||
Nick Russo <nicholasjamesrusso@gmail.com> <nicholasrusso@icloud.com>
|
<github@albersweb.de> <albers@users.noreply.github.com>
|
||||||
Nicolas Borboën <ponsfrilus@gmail.com> <ponsfrilus@users.noreply.github.com>
|
<lsm5@fedoraproject.org> <lsm5@redhat.com>
|
||||||
Nigel Poulton <nigelpoulton@hotmail.com>
|
<marc@marc-abramowitz.com> <msabramo@gmail.com>
|
||||||
Nik Nyby <nikolas@gnu.org> <nnyby@columbia.edu>
|
Matthew Heon <mheon@redhat.com> <mheon@mheonlaptop.redhat.com>
|
||||||
Nolan Darilek <nolan@thewordnerd.info>
|
<bernat@luffy.cx> <vincent@bernat.im>
|
||||||
O.S. Tezer <ostezer@gmail.com>
|
<bernat@luffy.cx> <Vincent.Bernat@exoscale.ch>
|
||||||
O.S. Tezer <ostezer@gmail.com> <ostezer@users.noreply.github.com>
|
<p@pwaller.net> <peter@scraperwiki.com>
|
||||||
Oh Jinkyun <tintypemolly@gmail.com> <tintypemolly@Ohui-MacBook-Pro.local>
|
<andrew.weiss@outlook.com> <andrew.weiss@microsoft.com>
|
||||||
Oliver Reason <oli@overrateddev.co>
|
Francisco Carriedo <fcarriedo@gmail.com>
|
||||||
Olli Janatuinen <olli.janatuinen@gmail.com>
|
<julienbordellier@gmail.com> <git@julienbordellier.com>
|
||||||
Olli Janatuinen <olli.janatuinen@gmail.com> <olljanat@users.noreply.github.com>
|
<ahmetb@microsoft.com> <ahmetalpbalkan@gmail.com>
|
||||||
Onur Filiz <onur.filiz@microsoft.com>
|
<arnaud.porterie@docker.com> <icecrime@gmail.com>
|
||||||
Onur Filiz <onur.filiz@microsoft.com> <ofiliz@users.noreply.github.com>
|
<baloo@gandi.net> <superbaloo+registrations.github@superbaloo.net>
|
||||||
Ouyang Liduo <oyld0210@163.com>
|
Brian Goff <cpuguy83@gmail.com>
|
||||||
Patrick Stapleton <github@gdi2290.com>
|
<cpuguy83@gmail.com> <bgoff@cpuguy83-mbp.home>
|
||||||
Paul Liljenberg <liljenberg.paul@gmail.com> <letters@paulnotcom.se>
|
<eric@windisch.us> <ewindisch@docker.com>
|
||||||
Pavel Tikhomirov <ptikhomirov@virtuozzo.com> <ptikhomirov@parallels.com>
|
<frank.rosquin+github@gmail.com> <frank.rosquin@gmail.com>
|
||||||
Pawel Konczalski <mail@konczalski.de>
|
Hollie Teal <hollie@docker.com>
|
||||||
Peter Choi <phkchoi89@gmail.com> <reikani@Peters-MacBook-Pro.local>
|
<hollie@docker.com> <hollie.teal@docker.com>
|
||||||
Peter Dave Hello <hsu@peterdavehello.org> <PeterDaveHello@users.noreply.github.com>
|
<hollie@docker.com> <hollietealok@users.noreply.github.com>
|
||||||
Peter Jaffe <pjaffe@nevo.com>
|
<huu@prismskylabs.com> <whoshuu@gmail.com>
|
||||||
Peter Nagy <xificurC@gmail.com> <pnagy@gratex.com>
|
Jessica Frazelle <jess@mesosphere.com>
|
||||||
Peter Waller <p@pwaller.net> <peter@scraperwiki.com>
|
Jessica Frazelle <jess@mesosphere.com> <jfrazelle@users.noreply.github.com>
|
||||||
Phil Estes <estesp@gmail.com>
|
Jessica Frazelle <jess@mesosphere.com> <acidburn@docker.com>
|
||||||
Phil Estes <estesp@gmail.com> <estesp@amazon.com>
|
Jessica Frazelle <jess@mesosphere.com> <jess@docker.com>
|
||||||
Phil Estes <estesp@gmail.com> <estesp@linux.vnet.ibm.com>
|
Jessica Frazelle <jess@mesosphere.com> <princess@docker.com>
|
||||||
Philip Alexander Etling <paetling@gmail.com>
|
<konrad.wilhelm.kleine@gmail.com> <kwk@users.noreply.github.com>
|
||||||
Philipp Gillé <philipp.gille@gmail.com> <philippgille@users.noreply.github.com>
|
<tintypemolly@gmail.com> <tintypemolly@Ohui-MacBook-Pro.local>
|
||||||
Prasanna Gautam <prasannagautam@gmail.com>
|
<estesp@linux.vnet.ibm.com> <estesp@gmail.com>
|
||||||
Puneet Pruthi <puneet.pruthi@oracle.com>
|
<github@gone.nl> <thaJeztah@users.noreply.github.com>
|
||||||
Puneet Pruthi <puneet.pruthi@oracle.com> <puneetpruthi@gmail.com>
|
Thomas LEVEIL <thomasleveil@gmail.com> Thomas LÉVEIL <thomasleveil@users.noreply.github.com>
|
||||||
Qiang Huang <h.huangqiang@huawei.com>
|
<oi@truffles.me.uk> <timruffles@googlemail.com>
|
||||||
Qiang Huang <h.huangqiang@huawei.com> <qhuang@10.0.2.15>
|
<Vincent.Bernat@exoscale.ch> <bernat@luffy.cx>
|
||||||
Qin TianHuan <tianhuan@bingotree.cn>
|
Antonio Murdaca <antonio.murdaca@gmail.com> <amurdaca@redhat.com>
|
||||||
Ray Tsang <rayt@google.com> <saturnism@users.noreply.github.com>
|
Antonio Murdaca <antonio.murdaca@gmail.com> <runcom@redhat.com>
|
||||||
Renaud Gaubert <rgaubert@nvidia.com> <renaud.gaubert@gmail.com>
|
Antonio Murdaca <antonio.murdaca@gmail.com> <me@runcom.ninja>
|
||||||
Richard Scothern <richard.scothern@gmail.com>
|
Antonio Murdaca <antonio.murdaca@gmail.com> <runcom@linux.com>
|
||||||
Robert Terhaar <rterhaar@atlanticdynamic.com> <robbyt@users.noreply.github.com>
|
Antonio Murdaca <antonio.murdaca@gmail.com> <runcom@users.noreply.github.com>
|
||||||
Roberto G. Hashioka <roberto.hashioka@docker.com> <roberto_hashioka@hotmail.com>
|
Darren Shepherd <darren.s.shepherd@gmail.com> <darren@rancher.com>
|
||||||
Roberto Muñoz Fernández <robertomf@gmail.com> <roberto.munoz.fernandez.contractor@bbva.com>
|
Deshi Xiao <dxiao@redhat.com> <dsxiao@dataman-inc.com>
|
||||||
Robin Thoni <robin@rthoni.com>
|
Deshi Xiao <dxiao@redhat.com> <xiaods@gmail.com>
|
||||||
Roman Dudin <katrmr@gmail.com> <decadent@users.noreply.github.com>
|
Doug Davis <dug@us.ibm.com> <duglin@users.noreply.github.com>
|
||||||
Rong Zhang <rongzhang@alauda.io>
|
Jacob Atzen <jacob@jacobatzen.dk> <jatzen@gmail.com>
|
||||||
Rongxiang Song <tinysong1226@gmail.com>
|
Jeff Nickoloff <jeff.nickoloff@gmail.com> <jeff@allingeek.com>
|
||||||
Rony Weng <ronyweng@synology.com>
|
John Howard (VM) <John.Howard@microsoft.com> <jhowardmsft@users.noreply.github.com>
|
||||||
Ross Boucher <rboucher@gmail.com>
|
John Howard (VM) <John.Howard@microsoft.com>
|
||||||
Rui Cao <ruicao@alauda.io>
|
John Howard (VM) <John.Howard@microsoft.com> <john.howard@microsoft.com>
|
||||||
Runshen Zhu <runshen.zhu@gmail.com>
|
John Howard (VM) <John.Howard@microsoft.com> <jhoward@microsoft.com>
|
||||||
Ryan Stelly <ryan.stelly@live.com>
|
Madhu Venugopal <madhu@socketplane.io> <madhu@docker.com>
|
||||||
Ryoga Saito <contact@proelbtn.com>
|
Mary Anthony <mary.anthony@docker.com> <mary@docker.com>
|
||||||
Ryoga Saito <contact@proelbtn.com> <proelbtn@users.noreply.github.com>
|
Mary Anthony <mary.anthony@docker.com> moxiegirl <mary@docker.com>
|
||||||
Sainath Grandhi <sainath.grandhi@intel.com>
|
Mary Anthony <mary.anthony@docker.com> <moxieandmore@gmail.com>
|
||||||
Sainath Grandhi <sainath.grandhi@intel.com> <saiallforums@gmail.com>
|
mattyw <mattyw@me.com> <gh@mattyw.net>
|
||||||
Sakeven Jiang <jc5930@sina.cn>
|
resouer <resouer@163.com> <resouer@gmail.com>
|
||||||
Samuel Karp <me@samuelkarp.com> <skarp@amazon.com>
|
AJ Bowen <aj@gandi.net> soulshake <amy@gandi.net>
|
||||||
Sandeep Bansal <sabansal@microsoft.com>
|
AJ Bowen <aj@gandi.net> soulshake <aj@gandi.net>
|
||||||
Sandeep Bansal <sabansal@microsoft.com> <msabansal@microsoft.com>
|
|
||||||
Santhosh Manohar <santhosh@docker.com>
|
|
||||||
Sargun Dhillon <sargun@netflix.com> <sargun@sargun.me>
|
|
||||||
Satoshi Tagomori <tagomoris@gmail.com>
|
|
||||||
Sean Lee <seanlee@tw.ibm.com> <scaleoutsean@users.noreply.github.com>
|
|
||||||
Sebastiaan van Stijn <github@gone.nl>
|
|
||||||
Sebastiaan van Stijn <github@gone.nl> <moby@example.com>
|
|
||||||
Sebastiaan van Stijn <github@gone.nl> <sebastiaan@ws-key-sebas3.dpi1.dpi>
|
|
||||||
Sebastiaan van Stijn <github@gone.nl> <thaJeztah@users.noreply.github.com>
|
|
||||||
Sebastian Thomschke <sebthom@users.noreply.github.com>
|
|
||||||
Seongyeol Lim <seongyeol37@gmail.com>
|
|
||||||
Serhii Nakon <serhii.n@thescimus.com>
|
|
||||||
Shaun Kaasten <shaunk@gmail.com>
|
|
||||||
Shawn Landden <shawn@churchofgit.com> <shawnlandden@gmail.com>
|
|
||||||
Shengbo Song <thomassong@tencent.com>
|
|
||||||
Shengbo Song <thomassong@tencent.com> <mymneo@163.com>
|
|
||||||
Shih-Yuan Lee <fourdollars@gmail.com>
|
|
||||||
Shishir Mahajan <shishir.mahajan@redhat.com> <smahajan@redhat.com>
|
|
||||||
Shu-Wai Chow <shu-wai.chow@seattlechildrens.org>
|
|
||||||
Shukui Yang <yangshukui@huawei.com>
|
|
||||||
Sidhartha Mani <sidharthamn@gmail.com>
|
|
||||||
Sjoerd Langkemper <sjoerd-github@linuxonly.nl> <sjoerd@byte.nl>
|
|
||||||
Smark Meng <smark@freecoop.net>
|
|
||||||
Smark Meng <smark@freecoop.net> <smarkm@users.noreply.github.com>
|
|
||||||
Solomon Hykes <solomon@docker.com> <s@docker.com>
|
|
||||||
Solomon Hykes <solomon@docker.com> <solomon.hykes@dotcloud.com>
|
|
||||||
Solomon Hykes <solomon@docker.com> <solomon@dotcloud.com>
|
|
||||||
Soshi Katsuta <soshi.katsuta@gmail.com>
|
|
||||||
Soshi Katsuta <soshi.katsuta@gmail.com> <katsuta_soshi@cyberagent.co.jp>
|
|
||||||
Sridhar Ratnakumar <sridharr@activestate.com>
|
|
||||||
Sridhar Ratnakumar <sridharr@activestate.com> <github@srid.name>
|
|
||||||
Srini Brahmaroutu <srbrahma@us.ibm.com> <sbrahma@us.ibm.com>
|
|
||||||
Srinivasan Srivatsan <srinivasan.srivatsan@hpe.com> <srinsriv@users.noreply.github.com>
|
|
||||||
Stefan Berger <stefanb@linux.vnet.ibm.com>
|
|
||||||
Stefan Berger <stefanb@linux.vnet.ibm.com> <stefanb@us.ibm.com>
|
|
||||||
Stefan J. Wernli <swernli@microsoft.com> <swernli@ntdev.microsoft.com>
|
|
||||||
Stefan S. <tronicum@user.github.com>
|
|
||||||
Stefan Scherer <stefan.scherer@docker.com>
|
|
||||||
Stefan Scherer <stefan.scherer@docker.com> <scherer_stefan@icloud.com>
|
|
||||||
Stephan Spindler <shutefan@gmail.com> <shutefan@users.noreply.github.com>
|
|
||||||
Stephen Day <stevvooe@gmail.com>
|
|
||||||
Stephen Day <stevvooe@gmail.com> <stephen.day@docker.com>
|
|
||||||
Stephen Day <stevvooe@gmail.com> <stevvooe@users.noreply.github.com>
|
|
||||||
Steve Desmond <steve@vtsv.ca> <stevedesmond-ca@users.noreply.github.com>
|
|
||||||
Sun Gengze <690388648@qq.com>
|
|
||||||
Sun Jianbo <wonderflow.sun@gmail.com>
|
|
||||||
Sun Jianbo <wonderflow.sun@gmail.com> <wonderflow@zju.edu.cn>
|
|
||||||
Sven Dowideit <SvenDowideit@home.org.au>
|
|
||||||
Sven Dowideit <SvenDowideit@home.org.au> <sven@t440s.home.gateway>
|
|
||||||
Sven Dowideit <SvenDowideit@home.org.au> <SvenDowideit@docker.com>
|
|
||||||
Sven Dowideit <SvenDowideit@home.org.au> <SvenDowideit@fosiki.com>
|
|
||||||
Sven Dowideit <SvenDowideit@home.org.au> <SvenDowideit@home.org.au>
|
|
||||||
Sven Dowideit <SvenDowideit@home.org.au> <SvenDowideit@users.noreply.github.com>
|
|
||||||
Sven Dowideit <SvenDowideit@home.org.au> <¨SvenDowideit@home.org.au¨>
|
|
||||||
Sylvain Baubeau <lebauce@gmail.com>
|
|
||||||
Sylvain Baubeau <lebauce@gmail.com> <sbaubeau@redhat.com>
|
|
||||||
Sylvain Bellemare <sylvain@ascribe.io>
|
|
||||||
Sylvain Bellemare <sylvain@ascribe.io> <sylvain.bellemare@ezeep.com>
|
|
||||||
Takuto Sato <tockn.jp@gmail.com>
|
|
||||||
Tangi Colin <tangicolin@gmail.com>
|
|
||||||
Tejesh Mehta <tejesh.mehta@gmail.com> <tj@init.me>
|
|
||||||
Terry Chu <zue.hterry@gmail.com>
|
|
||||||
Terry Chu <zue.hterry@gmail.com> <jubosh.tw@gmail.com>
|
|
||||||
Thatcher Peskens <thatcher@docker.com>
|
|
||||||
Thatcher Peskens <thatcher@docker.com> <thatcher@dotcloud.com>
|
|
||||||
Thatcher Peskens <thatcher@docker.com> <thatcher@gmx.net>
|
|
||||||
Thiago Alves Silva <thiago.alves@aurea.com>
|
|
||||||
Thiago Alves Silva <thiago.alves@aurea.com> <thiagoalves@users.noreply.github.com>
|
|
||||||
Thomas Gazagnaire <thomas@gazagnaire.org> <thomas@gazagnaire.com>
|
|
||||||
Thomas Ledos <thomas.ledos92@gmail.com>
|
|
||||||
Thomas Léveil <thomasleveil@gmail.com>
|
|
||||||
Thomas Léveil <thomasleveil@gmail.com> <thomasleveil@users.noreply.github.com>
|
|
||||||
Tibor Vass <teabee89@gmail.com> <tibor@docker.com>
|
Tibor Vass <teabee89@gmail.com> <tibor@docker.com>
|
||||||
Tibor Vass <teabee89@gmail.com> <tiborvass@users.noreply.github.com>
|
Tibor Vass <teabee89@gmail.com> <tiborvass@users.noreply.github.com>
|
||||||
Till Claassen <pixelistik@users.noreply.github.com>
|
Vincent Bernat <bernat@luffy.cx> <Vincent.Bernat@exoscale.ch>
|
||||||
Tim Bart <tim@fewagainstmany.com>
|
|
||||||
Tim Bosse <taim@bosboot.org> <maztaim@users.noreply.github.com>
|
|
||||||
Tim Potter <tpot@hpe.com>
|
|
||||||
Tim Potter <tpot@hpe.com> <tpot@Tims-MacBook-Pro.local>
|
|
||||||
Tim Ruffles <oi@truffles.me.uk> <timruffles@googlemail.com>
|
|
||||||
Tim Terhorst <mynamewastaken+git@gmail.com>
|
|
||||||
Tim Wagner <tim.wagner@freenet.ag>
|
|
||||||
Tim Wagner <tim.wagner@freenet.ag> <33624860+herrwagner@users.noreply.github.com>
|
|
||||||
Tim Zju <21651152@zju.edu.cn>
|
|
||||||
Timothy Hobbs <timothyhobbs@seznam.cz>
|
|
||||||
Toli Kuznets <toli@docker.com>
|
|
||||||
Tom Barlow <tomwbarlow@gmail.com>
|
|
||||||
Tom Denham <tom@tomdee.co.uk>
|
|
||||||
Tom Denham <tom@tomdee.co.uk> <tom.denham@metaswitch.com>
|
|
||||||
Tom Sweeney <tsweeney@redhat.com>
|
|
||||||
Tom Wilkie <tom.wilkie@gmail.com>
|
|
||||||
Tom Wilkie <tom.wilkie@gmail.com> <tom@weave.works>
|
|
||||||
Tõnis Tiigi <tonistiigi@gmail.com>
|
|
||||||
Trace Andreason <tandreason@gmail.com>
|
|
||||||
Trapier Marshall <tmarshall@mirantis.com>
|
|
||||||
Trapier Marshall <tmarshall@mirantis.com> <trapier.marshall@docker.com>
|
|
||||||
Trishna Guha <trishnaguha17@gmail.com>
|
|
||||||
Tristan Carel <tristan@cogniteev.com>
|
|
||||||
Tristan Carel <tristan@cogniteev.com> <tristan.carel@gmail.com>
|
|
||||||
Tyler Brown <tylers.pile@gmail.com>
|
|
||||||
Umesh Yadav <umesh4257@gmail.com>
|
|
||||||
Umesh Yadav <umesh4257@gmail.com> <dungeonmaster18@users.noreply.github.com>
|
|
||||||
Victor Lyuboslavsky <victor@victoreda.com>
|
|
||||||
Victor Vieux <victor.vieux@docker.com> <dev@vvieux.com>
|
|
||||||
Victor Vieux <victor.vieux@docker.com> <victor.vieux@dotcloud.com>
|
|
||||||
Victor Vieux <victor.vieux@docker.com> <victor@docker.com>
|
|
||||||
Victor Vieux <victor.vieux@docker.com> <victor@dotcloud.com>
|
|
||||||
Victor Vieux <victor.vieux@docker.com> <victorvieux@gmail.com>
|
|
||||||
Victor Vieux <victor.vieux@docker.com> <vieux@docker.com>
|
|
||||||
Vikas Choudhary <choudharyvikas16@gmail.com>
|
|
||||||
Vikram bir Singh <vsingh@mirantis.com>
|
|
||||||
Vikram bir Singh <vsingh@mirantis.com> <vikrambir.singh@docker.com>
|
|
||||||
Viktor Vojnovski <viktor.vojnovski@amadeus.com> <vojnovski@gmail.com>
|
|
||||||
Vincent Batts <vbatts@redhat.com> <vbatts@hashbangbash.com>
|
|
||||||
Vincent Bernat <vincent@bernat.ch>
|
|
||||||
Vincent Bernat <vincent@bernat.ch> <bernat@luffy.cx>
|
|
||||||
Vincent Bernat <vincent@bernat.ch> <Vincent.Bernat@exoscale.ch>
|
|
||||||
Vincent Bernat <vincent@bernat.ch> <vincent@bernat.im>
|
|
||||||
Vincent Boulineau <vincent.boulineau@datadoghq.com>
|
|
||||||
Vincent Demeester <vincent.demeester@docker.com> <vincent+github@demeester.fr>
|
|
||||||
Vincent Demeester <vincent.demeester@docker.com> <vincent@demeester.fr>
|
|
||||||
Vincent Demeester <vincent.demeester@docker.com> <vincent@sbr.pm>
|
|
||||||
Vishnu Kannan <vishnuk@google.com>
|
|
||||||
Vitaly Ostrosablin <vostrosablin@virtuozzo.com>
|
|
||||||
Vitaly Ostrosablin <vostrosablin@virtuozzo.com> <tmp6154@yandex.ru>
|
|
||||||
Vladimir Rutsky <altsysrq@gmail.com> <iamironbob@gmail.com>
|
|
||||||
Vladislav Kolesnikov <vkolesnikov@beget.ru>
|
|
||||||
Vladislav Kolesnikov <vkolesnikov@beget.ru> <prime@vladqa.ru>
|
|
||||||
Walter Stanish <walter@pratyeka.org>
|
|
||||||
Wang Chao <chao.wang@ucloud.cn>
|
|
||||||
Wang Chao <chao.wang@ucloud.cn> <wcwxyz@gmail.com>
|
|
||||||
Wang Guoliang <liangcszzu@163.com>
|
|
||||||
Wang Jie <wangjie5@chinaskycloud.com>
|
|
||||||
Wang Ping <present.wp@icloud.com>
|
|
||||||
Wang Xing <hzwangxing@corp.netease.com> <root@localhost>
|
|
||||||
Wang Yuexiao <wang.yuexiao@zte.com.cn>
|
|
||||||
Wayne Chang <wayne@neverfear.org>
|
|
||||||
Wayne Song <wsong@docker.com> <wsong@users.noreply.github.com>
|
|
||||||
Wei Wu <wuwei4455@gmail.com> cizixs <cizixs@163.com>
|
|
||||||
Wei-Ting Kuo <waitingkuo0527@gmail.com>
|
|
||||||
Wen Cheng Ma <wenchma@cn.ibm.com>
|
|
||||||
Wenjun Tang <tangwj2@lenovo.com> <dodia@163.com>
|
|
||||||
Wewang Xiaorenfine <wang.xiaoren@zte.com.cn>
|
|
||||||
Will Weaver <monkey@buildingbananas.com>
|
|
||||||
Wing-Kam Wong <wingkwong.code@gmail.com>
|
|
||||||
WuLonghui <wlh6666@qq.com>
|
|
||||||
Xian Chaobo <xianchaobo@huawei.com>
|
|
||||||
Xian Chaobo <xianchaobo@huawei.com> <jimmyxian2004@yahoo.com.cn>
|
|
||||||
Xianglin Gao <xlgao@zju.edu.cn>
|
|
||||||
Xianjie <guxianjie@gmail.com>
|
|
||||||
Xianjie <guxianjie@gmail.com> <datastream@datastream-laptop.local>
|
|
||||||
Xianlu Bird <xianlubird@gmail.com>
|
|
||||||
Xiao YongBiao <xyb4638@gmail.com>
|
|
||||||
Xiao Zhang <xiaozhang0210@hotmail.com>
|
|
||||||
Xiaodong Liu <liuxiaodong@loongson.cn>
|
|
||||||
Xiaodong Zhang <a4012017@sina.com>
|
|
||||||
Xiaohua Ding <xiao_hua_ding@sina.cn>
|
|
||||||
Xiaoyu Zhang <zhang.xiaoyu33@zte.com.cn>
|
|
||||||
Xinfeng Liu <XinfengLiu@icloud.com>
|
|
||||||
Xinfeng Liu <XinfengLiu@icloud.com> <xinfeng.liu@gmail.com>
|
|
||||||
Xuecong Liao <satorulogic@gmail.com>
|
|
||||||
Yamasaki Masahide <masahide.y@gmail.com>
|
|
||||||
Yao Zaiyong <yaozaiyong@hotmail.com>
|
|
||||||
Yassine Tijani <yasstij11@gmail.com>
|
|
||||||
Yazhong Liu <yorkiefixer@gmail.com>
|
|
||||||
Yestin Sun <sunyi0804@gmail.com> <yestin.sun@polyera.com>
|
Yestin Sun <sunyi0804@gmail.com> <yestin.sun@polyera.com>
|
||||||
Yi EungJun <eungjun.yi@navercorp.com> <semtlenori@gmail.com>
|
bin liu <liubin0329@users.noreply.github.com> <liubin0329@gmail.com>
|
||||||
Ying Li <ying.li@docker.com>
|
John Howard (VM) <John.Howard@microsoft.com> jhowardmsft <jhoward@microsoft.com>
|
||||||
Ying Li <ying.li@docker.com> <cyli@twistedmatrix.com>
|
Ankush Agarwal <ankushagarwal11@gmail.com> <ankushagarwal@users.noreply.github.com>
|
||||||
Yong Tang <yong.tang.github@outlook.com> <yongtang@users.noreply.github.com>
|
Tangi COLIN <tangicolin@gmail.com> tangicolin <tangicolin@gmail.com>
|
||||||
Yongxin Li <yxli@alauda.io>
|
Allen Sun <allen.sun@daocloud.io>
|
||||||
Yosef Fertel <yfertel@gmail.com> <frosforever@users.noreply.github.com>
|
Adrien Gallouët <adrien@gallouet.fr> <angt@users.noreply.github.com>
|
||||||
Yu Changchun <yuchangchun1@huawei.com>
|
<aanm90@gmail.com> <martins@noironetworks.com>
|
||||||
Yu Chengxia <yuchengxia@huawei.com>
|
Anuj Bahuguna <anujbahuguna.dev@gmail.com>
|
||||||
Yu Peng <yu.peng36@zte.com.cn>
|
Anusha Ragunathan <anusha.ragunathan@docker.com> <anusha@docker.com>
|
||||||
Yu Peng <yu.peng36@zte.com.cn> <yupeng36@zte.com.cn>
|
Avi Miller <avi.miller@oracle.com> <avi.miller@gmail.com>
|
||||||
Yuan Sun <sunyuan3@huawei.com>
|
Brent Salisbury <brent.salisbury@docker.com> <brent@docker.com>
|
||||||
Yue Zhang <zy675793960@yeah.net>
|
Chander G <chandergovind@gmail.com>
|
||||||
Yufei Xiong <yufei.xiong@qq.com>
|
Chun Chen <ramichen@tencent.com> <chenchun.feed@gmail.com>
|
||||||
Zach Gershman <zachgersh@gmail.com>
|
Ying Li <cyli@twistedmatrix.com>
|
||||||
Zach Gershman <zachgersh@gmail.com> <zachgersh@users.noreply.github.com>
|
Daehyeok Mun <daehyeok@gmail.com> <daehyeok@daehyeok-ui-MacBook-Air.local>
|
||||||
Zachary Jaffee <zjaffee@us.ibm.com> <zij@case.edu>
|
<dqminh@cloudflare.com> <dqminh89@gmail.com>
|
||||||
Zachary Jaffee <zjaffee@us.ibm.com> <zjaffee@apache.org>
|
Daniel, Dao Quang Minh <dqminh@cloudflare.com>
|
||||||
Zhang Kun <zkazure@gmail.com>
|
Daniel Nephin <dnephin@docker.com> <dnephin@gmail.com>
|
||||||
Zhang Wentao <zhangwentao234@huawei.com>
|
Dave Tucker <dt@docker.com> <dave@dtucker.co.uk>
|
||||||
ZhangHang <stevezhang2014@gmail.com>
|
Doug Tangren <d.tangren@gmail.com>
|
||||||
Zhenkun Bi <bi.zhenkun@zte.com.cn>
|
Frederick F. Kautz IV <fkautz@redhat.com> <fkautz@alumni.cmu.edu>
|
||||||
Zhou Hao <zhouhao@cn.fujitsu.com>
|
Ben Golub <ben.golub@dotcloud.com>
|
||||||
Zhoulin Xie <zhoulin.xie@daocloud.io>
|
Harold Cooper <hrldcpr@gmail.com>
|
||||||
Zhu Kunjia <zhu.kunjia@zte.com.cn>
|
hsinko <21551195@zju.edu.cn> <hsinko@users.noreply.github.com>
|
||||||
Ziheng Liu <lzhfromustc@gmail.com>
|
Josh Hawn <josh.hawn@docker.com> <jlhawn@berkeley.edu>
|
||||||
Zou Yu <zouyu7@huawei.com>
|
Justin Cormack <justin.cormack@docker.com>
|
||||||
Zuhayr Elahi <zuhayr.elahi@docker.com>
|
<justin.cormack@docker.com> <justin.cormack@unikernel.com>
|
||||||
Zuhayr Elahi <zuhayr.elahi@docker.com> <elahi.zuhayr@gmail.com>
|
<justin.cormack@docker.com> <justin@specialbusservice.com>
|
||||||
정재영 <jjy600901@gmail.com>
|
Kamil Domański <kamil@domanski.co>
|
||||||
정재영 <jjy600901@gmail.com> <43400316+J-jaeyoung@users.noreply.github.com>
|
Lei Jitang <leijitang@huawei.com>
|
||||||
|
<leijitang@huawei.com> <leijitang@gmail.com>
|
||||||
|
Linus Heckemann <lheckemann@twig-world.com>
|
||||||
|
<lheckemann@twig-world.com> <anonymouse2048@gmail.com>
|
||||||
|
Lynda O'Leary <lyndaoleary29@gmail.com>
|
||||||
|
<lyndaoleary29@gmail.com> <lyndaoleary@hotmail.com>
|
||||||
|
Marianna Tessel <mtesselh@gmail.com>
|
||||||
|
Michael Huettermann <michael@huettermann.net>
|
||||||
|
Moysés Borges <moysesb@gmail.com>
|
||||||
|
<moysesb@gmail.com> <moyses.furtado@wplex.com.br>
|
||||||
|
Nigel Poulton <nigelpoulton@hotmail.com>
|
||||||
|
Qiang Huang <h.huangqiang@huawei.com>
|
||||||
|
<h.huangqiang@huawei.com> <qhuang@10.0.2.15>
|
||||||
|
Boaz Shuster <ripcurld.github@gmail.com>
|
||||||
|
Shuwei Hao <haosw@cn.ibm.com>
|
||||||
|
<haosw@cn.ibm.com> <haoshuwei24@gmail.com>
|
||||||
|
Soshi Katsuta <soshi.katsuta@gmail.com>
|
||||||
|
<soshi.katsuta@gmail.com> <katsuta_soshi@cyberagent.co.jp>
|
||||||
|
Stefan Berger <stefanb@linux.vnet.ibm.com>
|
||||||
|
<stefanb@linux.vnet.ibm.com> <stefanb@us.ibm.com>
|
||||||
|
Stephen Day <stephen.day@docker.com>
|
||||||
|
<stephen.day@docker.com> <stevvooe@users.noreply.github.com>
|
||||||
|
Toli Kuznets <toli@docker.com>
|
||||||
|
Tristan Carel <tristan@cogniteev.com>
|
||||||
|
<tristan@cogniteev.com> <tristan.carel@gmail.com>
|
||||||
|
Vincent Demeester <vincent@sbr.pm>
|
||||||
|
<vincent@sbr.pm> <vincent+github@demeester.fr>
|
||||||
|
Vishnu Kannan <vishnuk@google.com>
|
||||||
|
xlgao-zju <xlgao@zju.edu.cn> xlgao <xlgao@zju.edu.cn>
|
||||||
|
yuchangchun <yuchangchun1@huawei.com> y00277921 <yuchangchun1@huawei.com>
|
||||||
|
<zij@case.edu> <zjaffee@us.ibm.com>
|
||||||
|
<anujbahuguna.dev@gmail.com> <abahuguna@fiberlink.com>
|
||||||
|
<eungjun.yi@navercorp.com> <semtlenori@gmail.com>
|
||||||
|
<haosw@cn.ibm.com> <haoshuwei1989@163.com>
|
||||||
|
Hao Shu Wei <haosw@cn.ibm.com>
|
||||||
|
<matt.bentley@docker.com> <mbentley@mbentley.net>
|
||||||
|
<MihaiBorob@gmail.com> <MihaiBorobocea@gmail.com>
|
||||||
|
<redmond.martin@gmail.com> <xgithub@redmond5.com>
|
||||||
|
<redmond.martin@gmail.com> <martin@tinychat.com>
|
||||||
|
<srbrahma@us.ibm.com> <sbrahma@us.ibm.com>
|
||||||
|
<suda.akihiro@lab.ntt.co.jp> <suda.kyoto@gmail.com>
|
||||||
|
<thomas@gazagnaire.org> <thomas@gazagnaire.com>
|
||||||
|
Shengbo Song <thomassong@tencent.com> mYmNeo <mymneo@163.com>
|
||||||
|
Shengbo Song <thomassong@tencent.com>
|
||||||
|
<sylvain@ascribe.io> <sylvain.bellemare@ezeep.com>
|
||||||
|
Sylvain Bellemare <sylvain@ascribe.io>
|
||||||
|
|
||||||
|
|
3054
CHANGELOG.md
Normal file
3054
CHANGELOG.md
Normal file
File diff suppressed because it is too large
Load diff
177
CONTRIBUTING.md
177
CONTRIBUTING.md
|
@ -1,14 +1,14 @@
|
||||||
# Contribute to the Moby Project
|
# Contributing to Docker
|
||||||
|
|
||||||
Want to hack on the Moby Project? Awesome! We have a contributor's guide that explains
|
Want to hack on Docker? Awesome! We have a contributor's guide that explains
|
||||||
[setting up a development environment and the contribution
|
[setting up a Docker development environment and the contribution
|
||||||
process](docs/contributing/).
|
process](https://docs.docker.com/opensource/project/who-written-for/).
|
||||||
|
|
||||||
[![Contributors guide](docs/static_files/contributors.png)](https://docs.docker.com/opensource/project/who-written-for/)
|
[![Contributors guide](docs/static_files/contributors.png)](https://docs.docker.com/opensource/project/who-written-for/)
|
||||||
|
|
||||||
This page contains information about reporting issues as well as some tips and
|
This page contains information about reporting issues as well as some tips and
|
||||||
guidelines useful to experienced open source contributors. Finally, make sure
|
guidelines useful to experienced open source contributors. Finally, make sure
|
||||||
you read our [community guidelines](#moby-community-guidelines) before you
|
you read our [community guidelines](#docker-community-guidelines) before you
|
||||||
start participating.
|
start participating.
|
||||||
|
|
||||||
## Topics
|
## Topics
|
||||||
|
@ -17,20 +17,20 @@ start participating.
|
||||||
* [Design and Cleanup Proposals](#design-and-cleanup-proposals)
|
* [Design and Cleanup Proposals](#design-and-cleanup-proposals)
|
||||||
* [Reporting Issues](#reporting-other-issues)
|
* [Reporting Issues](#reporting-other-issues)
|
||||||
* [Quick Contribution Tips and Guidelines](#quick-contribution-tips-and-guidelines)
|
* [Quick Contribution Tips and Guidelines](#quick-contribution-tips-and-guidelines)
|
||||||
* [Community Guidelines](#moby-community-guidelines)
|
* [Community Guidelines](#docker-community-guidelines)
|
||||||
|
|
||||||
## Reporting security issues
|
## Reporting security issues
|
||||||
|
|
||||||
The Moby maintainers take security seriously. If you discover a security
|
The Docker maintainers take security seriously. If you discover a security
|
||||||
issue, please bring it to their attention right away!
|
issue, please bring it to their attention right away!
|
||||||
|
|
||||||
Please **DO NOT** file a public issue, instead send your report privately to
|
Please **DO NOT** file a public issue, instead send your report privately to
|
||||||
[security@docker.com](mailto:security@docker.com).
|
[security@docker.com](mailto:security@docker.com).
|
||||||
|
|
||||||
Security reports are greatly appreciated and we will publicly thank you for it,
|
Security reports are greatly appreciated and we will publicly thank you for it.
|
||||||
although we keep your name confidential if you request it. We also like to send
|
We also like to send gifts—if you're into Docker schwag, make sure to let
|
||||||
gifts—if you're into schwag, make sure to let us know. We currently do not
|
us know. We currently do not offer a paid security bounty program, but are not
|
||||||
offer a paid security bounty program, but are not ruling it out in the future.
|
ruling it out in the future.
|
||||||
|
|
||||||
|
|
||||||
## Reporting other issues
|
## Reporting other issues
|
||||||
|
@ -39,7 +39,7 @@ A great way to contribute to the project is to send a detailed report when you
|
||||||
encounter an issue. We always appreciate a well-written, thorough bug report,
|
encounter an issue. We always appreciate a well-written, thorough bug report,
|
||||||
and will thank you for it!
|
and will thank you for it!
|
||||||
|
|
||||||
Check that [our issue database](https://github.com/moby/moby/issues)
|
Check that [our issue database](https://github.com/docker/docker/issues)
|
||||||
doesn't already include that problem or suggestion before submitting an issue.
|
doesn't already include that problem or suggestion before submitting an issue.
|
||||||
If you find a match, you can use the "subscribe" button to get notified on
|
If you find a match, you can use the "subscribe" button to get notified on
|
||||||
updates. Do *not* leave random "+1" or "I have this too" comments, as they
|
updates. Do *not* leave random "+1" or "I have this too" comments, as they
|
||||||
|
@ -66,13 +66,13 @@ This section gives the experienced contributor some tips and guidelines.
|
||||||
|
|
||||||
Not sure if that typo is worth a pull request? Found a bug and know how to fix
|
Not sure if that typo is worth a pull request? Found a bug and know how to fix
|
||||||
it? Do it! We will appreciate it. Any significant improvement should be
|
it? Do it! We will appreciate it. Any significant improvement should be
|
||||||
documented as [a GitHub issue](https://github.com/moby/moby/issues) before
|
documented as [a GitHub issue](https://github.com/docker/docker/issues) before
|
||||||
anybody starts working on it.
|
anybody starts working on it.
|
||||||
|
|
||||||
We are always thrilled to receive pull requests. We do our best to process them
|
We are always thrilled to receive pull requests. We do our best to process them
|
||||||
quickly. If your pull request is not accepted on the first try,
|
quickly. If your pull request is not accepted on the first try,
|
||||||
don't get discouraged! Our contributor's guide explains [the review process we
|
don't get discouraged! Our contributor's guide explains [the review process we
|
||||||
use for simple changes](https://docs.docker.com/contribute/overview/).
|
use for simple changes](https://docs.docker.com/opensource/workflow/make-a-contribution/).
|
||||||
|
|
||||||
### Design and cleanup proposals
|
### Design and cleanup proposals
|
||||||
|
|
||||||
|
@ -83,7 +83,11 @@ contributions, see [the advanced contribution
|
||||||
section](https://docs.docker.com/opensource/workflow/advanced-contributing/) in
|
section](https://docs.docker.com/opensource/workflow/advanced-contributing/) in
|
||||||
the contributors guide.
|
the contributors guide.
|
||||||
|
|
||||||
### Connect with other Moby Project contributors
|
We try hard to keep Docker lean and focused. Docker can't do everything for
|
||||||
|
everybody. This means that we might decide against incorporating a new feature.
|
||||||
|
However, there might be a way to implement that feature *on top of* Docker.
|
||||||
|
|
||||||
|
### Talking to other Docker users and contributors
|
||||||
|
|
||||||
<table class="tg">
|
<table class="tg">
|
||||||
<col width="45%">
|
<col width="45%">
|
||||||
|
@ -92,28 +96,52 @@ the contributors guide.
|
||||||
<td>Forums</td>
|
<td>Forums</td>
|
||||||
<td>
|
<td>
|
||||||
A public forum for users to discuss questions and explore current design patterns and
|
A public forum for users to discuss questions and explore current design patterns and
|
||||||
best practices about all the Moby projects. To participate, log in with your Github
|
best practices about Docker and related projects in the Docker Ecosystem. To participate,
|
||||||
account or create an account at <a href="https://forums.mobyproject.org" target="_blank">https://forums.mobyproject.org</a>.
|
just log in with your Docker Hub account on <a href="https://forums.docker.com" target="_blank">https://forums.docker.com</a>.
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>Slack</td>
|
<td>Internet Relay Chat (IRC)</td>
|
||||||
<td>
|
<td>
|
||||||
<p>
|
<p>
|
||||||
Register for the Docker Community Slack at
|
IRC a direct line to our most knowledgeable Docker users; we have
|
||||||
<a href="https://dockr.ly/comm-slack" target="_blank">https://dockr.ly/comm-slack</a>.
|
both the <code>#docker</code> and <code>#docker-dev</code> group on
|
||||||
We use the #moby-project channel for general discussion, and there are separate channels for other Moby projects such as #containerd.
|
<strong>irc.freenode.net</strong>.
|
||||||
|
IRC is a rich chat protocol but it can overwhelm new users. You can search
|
||||||
|
<a href="https://botbot.me/freenode/docker/#" target="_blank">our chat archives</a>.
|
||||||
</p>
|
</p>
|
||||||
|
<p>
|
||||||
|
Read our <a href="https://docs.docker.com/opensource/get-help/#irc-quickstart" target="_blank">IRC quickstart guide</a>
|
||||||
|
for an easy way to get started.
|
||||||
|
</p>
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Google Group</td>
|
||||||
|
<td>
|
||||||
|
The <a href="https://groups.google.com/forum/#!forum/docker-dev" target="_blank">docker-dev</a>
|
||||||
|
group is for contributors and other people contributing to the Docker project.
|
||||||
|
You can join them without a google account by sending an email to
|
||||||
|
<a href="mailto:docker-dev+subscribe@googlegroups.com">docker-dev+subscribe@googlegroups.com</a>.
|
||||||
|
After receiving the join-request message, you can simply reply to that to confirm the subscribtion.
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
<tr>
|
<tr>
|
||||||
<td>Twitter</td>
|
<td>Twitter</td>
|
||||||
<td>
|
<td>
|
||||||
You can follow <a href="https://twitter.com/moby/" target="_blank">Moby Project Twitter feed</a>
|
You can follow <a href="https://twitter.com/docker/" target="_blank">Docker's Twitter feed</a>
|
||||||
to get updates on our products. You can also tweet us questions or just
|
to get updates on our products. You can also tweet us questions or just
|
||||||
share blogs or stories.
|
share blogs or stories.
|
||||||
</td>
|
</td>
|
||||||
</tr>
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Stack Overflow</td>
|
||||||
|
<td>
|
||||||
|
Stack Overflow has over 17000 Docker questions listed. We regularly
|
||||||
|
monitor <a href="https://stackoverflow.com/search?tab=newest&q=docker" target="_blank">Docker questions</a>
|
||||||
|
and so do many other knowledgeable Docker users.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
</table>
|
</table>
|
||||||
|
|
||||||
|
|
||||||
|
@ -127,11 +155,10 @@ Fork the repository and make changes on your fork in a feature branch:
|
||||||
your intentions, and name it XXXX-something where XXXX is the number of the
|
your intentions, and name it XXXX-something where XXXX is the number of the
|
||||||
issue.
|
issue.
|
||||||
|
|
||||||
Submit tests for your changes. See [TESTING.md](./TESTING.md) for details.
|
Submit unit tests for your changes. Go has a great test framework built in; use
|
||||||
|
it! Take a look at existing tests for inspiration. [Run the full test
|
||||||
If your changes need integration tests, write them against the API. The `cli`
|
suite](https://docs.docker.com/opensource/project/test-and-docs/) on your branch before
|
||||||
integration tests are slowly either migrated to API tests or moved away as unit
|
submitting a pull request.
|
||||||
tests in `docker/cli` and end-to-end tests for Docker.
|
|
||||||
|
|
||||||
Update the documentation when creating or modifying features. Test your
|
Update the documentation when creating or modifying features. Test your
|
||||||
documentation changes for clarity, concision, and correctness, as well as a
|
documentation changes for clarity, concision, and correctness, as well as a
|
||||||
|
@ -146,64 +173,10 @@ committing your changes. Most editors have plug-ins that do this automatically.
|
||||||
Pull request descriptions should be as clear as possible and include a reference
|
Pull request descriptions should be as clear as possible and include a reference
|
||||||
to all the issues that they address.
|
to all the issues that they address.
|
||||||
|
|
||||||
### Successful Changes
|
|
||||||
|
|
||||||
Before contributing large or high impact changes, make the effort to coordinate
|
|
||||||
with the maintainers of the project before submitting a pull request. This
|
|
||||||
prevents you from doing extra work that may or may not be merged.
|
|
||||||
|
|
||||||
Large PRs that are just submitted without any prior communication are unlikely
|
|
||||||
to be successful.
|
|
||||||
|
|
||||||
While pull requests are the methodology for submitting changes to code, changes
|
|
||||||
are much more likely to be accepted if they are accompanied by additional
|
|
||||||
engineering work. While we don't define this explicitly, most of these goals
|
|
||||||
are accomplished through communication of the design goals and subsequent
|
|
||||||
solutions. Often times, it helps to first state the problem before presenting
|
|
||||||
solutions.
|
|
||||||
|
|
||||||
Typically, the best methods of accomplishing this are to submit an issue,
|
|
||||||
stating the problem. This issue can include a problem statement and a
|
|
||||||
checklist with requirements. If solutions are proposed, alternatives should be
|
|
||||||
listed and eliminated. Even if the criteria for elimination of a solution is
|
|
||||||
frivolous, say so.
|
|
||||||
|
|
||||||
Larger changes typically work best with design documents. These are focused on
|
|
||||||
providing context to the design at the time the feature was conceived and can
|
|
||||||
inform future documentation contributions.
|
|
||||||
|
|
||||||
### Commit Messages
|
|
||||||
|
|
||||||
Commit messages must start with a capitalized and short summary (max. 50 chars)
|
Commit messages must start with a capitalized and short summary (max. 50 chars)
|
||||||
written in the imperative, followed by an optional, more detailed explanatory
|
written in the imperative, followed by an optional, more detailed explanatory
|
||||||
text which is separated from the summary by an empty line.
|
text which is separated from the summary by an empty line.
|
||||||
|
|
||||||
Commit messages should follow best practices, including explaining the context
|
|
||||||
of the problem and how it was solved, including in caveats or follow up changes
|
|
||||||
required. They should tell the story of the change and provide readers
|
|
||||||
understanding of what led to it.
|
|
||||||
|
|
||||||
If you're lost about what this even means, please see [How to Write a Git
|
|
||||||
Commit Message](http://chris.beams.io/posts/git-commit/) for a start.
|
|
||||||
|
|
||||||
In practice, the best approach to maintaining a nice commit message is to
|
|
||||||
leverage a `git add -p` and `git commit --amend` to formulate a solid
|
|
||||||
changeset. This allows one to piece together a change, as information becomes
|
|
||||||
available.
|
|
||||||
|
|
||||||
If you squash a series of commits, don't just submit that. Re-write the commit
|
|
||||||
message, as if the series of commits was a single stroke of brilliance.
|
|
||||||
|
|
||||||
That said, there is no requirement to have a single commit for a PR, as long as
|
|
||||||
each commit tells the story. For example, if there is a feature that requires a
|
|
||||||
package, it might make sense to have the package in a separate commit then have
|
|
||||||
a subsequent commit that uses it.
|
|
||||||
|
|
||||||
Remember, you're telling part of the story with the commit message. Don't make
|
|
||||||
your chapter weird.
|
|
||||||
|
|
||||||
### Review
|
|
||||||
|
|
||||||
Code review comments may be added to your pull request. Discuss, then make the
|
Code review comments may be added to your pull request. Discuss, then make the
|
||||||
suggested modifications and push additional commits to your feature branch. Post
|
suggested modifications and push additional commits to your feature branch. Post
|
||||||
a comment after pushing. New commits show up in the pull request automatically,
|
a comment after pushing. New commits show up in the pull request automatically,
|
||||||
|
@ -224,9 +197,10 @@ calling it in another file constitute a single logical unit of work. The very
|
||||||
high majority of submissions should have a single commit, so if in doubt: squash
|
high majority of submissions should have a single commit, so if in doubt: squash
|
||||||
down to one.
|
down to one.
|
||||||
|
|
||||||
After every commit, [make sure the test suite passes](./TESTING.md). Include
|
After every commit, [make sure the test suite passes]
|
||||||
documentation changes in the same pull request so that a revert would remove
|
(https://docs.docker.com/opensource/project/test-and-docs/). Include documentation
|
||||||
all traces of the feature or fix.
|
changes in the same pull request so that a revert would remove all traces of
|
||||||
|
the feature or fix.
|
||||||
|
|
||||||
Include an issue reference like `Closes #XXXX` or `Fixes #XXXX` in commits that
|
Include an issue reference like `Closes #XXXX` or `Fixes #XXXX` in commits that
|
||||||
close an issue. Including references automatically closes the issue on a merge.
|
close an issue. Including references automatically closes the issue on a merge.
|
||||||
|
@ -238,11 +212,15 @@ Please see the [Coding Style](#coding-style) for further guidelines.
|
||||||
|
|
||||||
### Merge approval
|
### Merge approval
|
||||||
|
|
||||||
Moby maintainers use LGTM (Looks Good To Me) in comments on the code review to
|
Docker maintainers use LGTM (Looks Good To Me) in comments on the code review to
|
||||||
indicate acceptance, or use the Github review approval feature.
|
indicate acceptance.
|
||||||
|
|
||||||
For an explanation of the review and approval process see the
|
A change requires LGTMs from an absolute majority of the maintainers of each
|
||||||
[REVIEWING](project/REVIEWING.md) page.
|
component affected. For example, if a change affects `docs/` and `registry/`, it
|
||||||
|
needs an absolute majority from the maintainers of `docs/` AND, separately, an
|
||||||
|
absolute majority of the maintainers of `registry/`.
|
||||||
|
|
||||||
|
For more details, see the [MAINTAINERS](MAINTAINERS) page.
|
||||||
|
|
||||||
### Sign your work
|
### Sign your work
|
||||||
|
|
||||||
|
@ -256,9 +234,8 @@ Developer Certificate of Origin
|
||||||
Version 1.1
|
Version 1.1
|
||||||
|
|
||||||
Copyright (C) 2004, 2006 The Linux Foundation and its contributors.
|
Copyright (C) 2004, 2006 The Linux Foundation and its contributors.
|
||||||
1 Letterman Drive
|
660 York Street, Suite 102,
|
||||||
Suite D4700
|
San Francisco, CA 94110 USA
|
||||||
San Francisco, CA, 94129
|
|
||||||
|
|
||||||
Everyone is permitted to copy and distribute verbatim copies of this
|
Everyone is permitted to copy and distribute verbatim copies of this
|
||||||
license document, but changing it is not allowed.
|
license document, but changing it is not allowed.
|
||||||
|
@ -302,16 +279,17 @@ commit automatically with `git commit -s`.
|
||||||
### How can I become a maintainer?
|
### How can I become a maintainer?
|
||||||
|
|
||||||
The procedures for adding new maintainers are explained in the
|
The procedures for adding new maintainers are explained in the
|
||||||
[/project/GOVERNANCE.md](/project/GOVERNANCE.md)
|
global [MAINTAINERS](https://github.com/docker/opensource/blob/master/MAINTAINERS)
|
||||||
file in this repository.
|
file in the [https://github.com/docker/opensource/](https://github.com/docker/opensource/)
|
||||||
|
repository.
|
||||||
|
|
||||||
Don't forget: being a maintainer is a time investment. Make sure you
|
Don't forget: being a maintainer is a time investment. Make sure you
|
||||||
will have time to make yourself available. You don't have to be a
|
will have time to make yourself available. You don't have to be a
|
||||||
maintainer to make a difference on the project!
|
maintainer to make a difference on the project!
|
||||||
|
|
||||||
## Moby community guidelines
|
## Docker community guidelines
|
||||||
|
|
||||||
We want to keep the Moby community awesome, growing and collaborative. We need
|
We want to keep the Docker community awesome, growing and collaborative. We need
|
||||||
your help to keep it that way. To help with this we've come up with some general
|
your help to keep it that way. To help with this we've come up with some general
|
||||||
guidelines for the community as a whole:
|
guidelines for the community as a whole:
|
||||||
|
|
||||||
|
@ -339,11 +317,6 @@ guidelines for the community as a whole:
|
||||||
used to ping maintainers to review a pull request, a proposal or an
|
used to ping maintainers to review a pull request, a proposal or an
|
||||||
issue.
|
issue.
|
||||||
|
|
||||||
The open source governance for this repository is handled via the [Moby Technical Steering Committee (TSC)](https://github.com/moby/tsc)
|
|
||||||
charter. For any concerns with the community process regarding technical contributions,
|
|
||||||
please contact the TSC. More information on project governance is available in
|
|
||||||
our [project/GOVERNANCE.md](/project/GOVERNANCE.md) document.
|
|
||||||
|
|
||||||
### Guideline violations — 3 strikes method
|
### Guideline violations — 3 strikes method
|
||||||
|
|
||||||
The point of this section is not to find opportunities to punish people, but we
|
The point of this section is not to find opportunities to punish people, but we
|
||||||
|
@ -422,6 +395,6 @@ The rules:
|
||||||
guidelines. Since you've read all the rules, you now know that.
|
guidelines. Since you've read all the rules, you now know that.
|
||||||
|
|
||||||
If you are having trouble getting into the mood of idiomatic Go, we recommend
|
If you are having trouble getting into the mood of idiomatic Go, we recommend
|
||||||
reading through [Effective Go](https://go.dev/doc/effective_go). The
|
reading through [Effective Go](https://golang.org/doc/effective_go.html). The
|
||||||
[Go Blog](https://go.dev/blog/) is also a great resource. Drinking the
|
[Go Blog](https://blog.golang.org) is also a great resource. Drinking the
|
||||||
kool-aid is a lot easier than going thirsty.
|
kool-aid is a lot easier than going thirsty.
|
||||||
|
|
929
Dockerfile
929
Dockerfile
|
@ -1,671 +1,272 @@
|
||||||
# syntax=docker/dockerfile:1.7
|
# This file describes the standard way to build Docker, using docker
|
||||||
|
|
||||||
ARG GO_VERSION=1.21.9
|
|
||||||
ARG BASE_DEBIAN_DISTRO="bookworm"
|
|
||||||
ARG GOLANG_IMAGE="golang:${GO_VERSION}-${BASE_DEBIAN_DISTRO}"
|
|
||||||
ARG XX_VERSION=1.4.0
|
|
||||||
|
|
||||||
ARG VPNKIT_VERSION=0.5.0
|
|
||||||
|
|
||||||
ARG DOCKERCLI_REPOSITORY="https://github.com/docker/cli.git"
|
|
||||||
ARG DOCKERCLI_VERSION=v26.0.0
|
|
||||||
# cli version used for integration-cli tests
|
|
||||||
ARG DOCKERCLI_INTEGRATION_REPOSITORY="https://github.com/docker/cli.git"
|
|
||||||
ARG DOCKERCLI_INTEGRATION_VERSION=v17.06.2-ce
|
|
||||||
ARG BUILDX_VERSION=0.13.1
|
|
||||||
ARG COMPOSE_VERSION=v2.25.0
|
|
||||||
|
|
||||||
ARG SYSTEMD="false"
|
|
||||||
ARG DOCKER_STATIC=1
|
|
||||||
|
|
||||||
# REGISTRY_VERSION specifies the version of the registry to download from
|
|
||||||
# https://hub.docker.com/r/distribution/distribution. This version of
|
|
||||||
# the registry is used to test schema 2 manifests. Generally, the version
|
|
||||||
# specified here should match a current release.
|
|
||||||
ARG REGISTRY_VERSION=2.8.3
|
|
||||||
|
|
||||||
# delve is currently only supported on linux/amd64 and linux/arm64;
|
|
||||||
# https://github.com/go-delve/delve/blob/v1.8.1/pkg/proc/native/support_sentinel.go#L1-L6
|
|
||||||
ARG DELVE_SUPPORTED=${TARGETPLATFORM#linux/amd64} DELVE_SUPPORTED=${DELVE_SUPPORTED#linux/arm64}
|
|
||||||
ARG DELVE_SUPPORTED=${DELVE_SUPPORTED:+"unsupported"}
|
|
||||||
ARG DELVE_SUPPORTED=${DELVE_SUPPORTED:-"supported"}
|
|
||||||
|
|
||||||
# cross compilation helper
|
|
||||||
FROM --platform=$BUILDPLATFORM tonistiigi/xx:${XX_VERSION} AS xx
|
|
||||||
|
|
||||||
# dummy stage to make sure the image is built for deps that don't support some
|
|
||||||
# architectures
|
|
||||||
FROM --platform=$BUILDPLATFORM busybox AS build-dummy
|
|
||||||
RUN mkdir -p /build
|
|
||||||
FROM scratch AS binary-dummy
|
|
||||||
COPY --from=build-dummy /build /build
|
|
||||||
|
|
||||||
# base
|
|
||||||
FROM --platform=$BUILDPLATFORM ${GOLANG_IMAGE} AS base
|
|
||||||
COPY --from=xx / /
|
|
||||||
RUN echo 'Binary::apt::APT::Keep-Downloaded-Packages "true";' > /etc/apt/apt.conf.d/keep-cache
|
|
||||||
RUN apt-get update && apt-get install --no-install-recommends -y file
|
|
||||||
ENV GO111MODULE=off
|
|
||||||
ENV GOTOOLCHAIN=local
|
|
||||||
|
|
||||||
FROM base AS criu
|
|
||||||
ADD --chmod=0644 https://download.opensuse.org/repositories/devel:/tools:/criu/Debian_11/Release.key /etc/apt/trusted.gpg.d/criu.gpg.asc
|
|
||||||
RUN --mount=type=cache,sharing=locked,id=moby-criu-aptlib,target=/var/lib/apt \
|
|
||||||
--mount=type=cache,sharing=locked,id=moby-criu-aptcache,target=/var/cache/apt \
|
|
||||||
echo 'deb https://download.opensuse.org/repositories/devel:/tools:/criu/Debian_12/ /' > /etc/apt/sources.list.d/criu.list \
|
|
||||||
&& apt-get update \
|
|
||||||
&& apt-get install -y --no-install-recommends criu \
|
|
||||||
&& install -D /usr/sbin/criu /build/criu \
|
|
||||||
&& /build/criu --version
|
|
||||||
|
|
||||||
# registry
|
|
||||||
FROM base AS registry-src
|
|
||||||
WORKDIR /usr/src/registry
|
|
||||||
RUN git init . && git remote add origin "https://github.com/distribution/distribution.git"
|
|
||||||
|
|
||||||
FROM base AS registry
|
|
||||||
WORKDIR /go/src/github.com/docker/distribution
|
|
||||||
|
|
||||||
# REGISTRY_VERSION_SCHEMA1 specifies the version of the registry to build and
|
|
||||||
# install from the https://github.com/docker/distribution repository. This is
|
|
||||||
# an older (pre v2.3.0) version of the registry that only supports schema1
|
|
||||||
# manifests. This version of the registry is not working on arm64, so installation
|
|
||||||
# is skipped on that architecture.
|
|
||||||
ARG REGISTRY_VERSION_SCHEMA1=v2.1.0
|
|
||||||
ARG TARGETPLATFORM
|
|
||||||
RUN --mount=from=registry-src,src=/usr/src/registry,rw \
|
|
||||||
--mount=type=cache,target=/root/.cache/go-build,id=registry-build-$TARGETPLATFORM \
|
|
||||||
--mount=type=cache,target=/go/pkg/mod \
|
|
||||||
--mount=type=tmpfs,target=/go/src <<EOT
|
|
||||||
set -ex
|
|
||||||
export GOPATH="/go/src/github.com/docker/distribution/Godeps/_workspace:$GOPATH"
|
|
||||||
# Make the /build directory no matter what so that it doesn't fail on arm64 or
|
|
||||||
# any other platform where we don't build this registry
|
|
||||||
mkdir /build
|
|
||||||
case $TARGETPLATFORM in
|
|
||||||
linux/amd64|linux/arm/v7|linux/ppc64le|linux/s390x)
|
|
||||||
git fetch -q --depth 1 origin "${REGISTRY_VERSION_SCHEMA1}" +refs/tags/*:refs/tags/*
|
|
||||||
git checkout -q FETCH_HEAD
|
|
||||||
CGO_ENABLED=0 xx-go build -o /build/registry-v2-schema1 -v ./cmd/registry
|
|
||||||
xx-verify /build/registry-v2-schema1
|
|
||||||
;;
|
|
||||||
esac
|
|
||||||
EOT
|
|
||||||
|
|
||||||
FROM distribution/distribution:$REGISTRY_VERSION AS registry-v2
|
|
||||||
RUN mkdir /build && mv /bin/registry /build/registry-v2
|
|
||||||
|
|
||||||
# go-swagger
|
|
||||||
FROM base AS swagger-src
|
|
||||||
WORKDIR /usr/src/swagger
|
|
||||||
# Currently uses a fork from https://github.com/kolyshkin/go-swagger/tree/golang-1.13-fix
|
|
||||||
# TODO: move to under moby/ or fix upstream go-swagger to work for us.
|
|
||||||
RUN git init . && git remote add origin "https://github.com/kolyshkin/go-swagger.git"
|
|
||||||
# GO_SWAGGER_COMMIT specifies the version of the go-swagger binary to build and
|
|
||||||
# install. Go-swagger is used in CI for validating swagger.yaml in hack/validate/swagger-gen
|
|
||||||
ARG GO_SWAGGER_COMMIT=c56166c036004ba7a3a321e5951ba472b9ae298c
|
|
||||||
RUN git fetch -q --depth 1 origin "${GO_SWAGGER_COMMIT}" && git checkout -q FETCH_HEAD
|
|
||||||
|
|
||||||
FROM base AS swagger
|
|
||||||
WORKDIR /go/src/github.com/go-swagger/go-swagger
|
|
||||||
ARG TARGETPLATFORM
|
|
||||||
RUN --mount=from=swagger-src,src=/usr/src/swagger,rw \
|
|
||||||
--mount=type=cache,target=/root/.cache/go-build,id=swagger-build-$TARGETPLATFORM \
|
|
||||||
--mount=type=cache,target=/go/pkg/mod \
|
|
||||||
--mount=type=tmpfs,target=/go/src/ <<EOT
|
|
||||||
set -e
|
|
||||||
xx-go build -o /build/swagger ./cmd/swagger
|
|
||||||
xx-verify /build/swagger
|
|
||||||
EOT
|
|
||||||
|
|
||||||
# frozen-images
|
|
||||||
# See also frozenImages in "testutil/environment/protect.go" (which needs to
|
|
||||||
# be updated when adding images to this list)
|
|
||||||
FROM debian:${BASE_DEBIAN_DISTRO} AS frozen-images
|
|
||||||
RUN --mount=type=cache,sharing=locked,id=moby-frozen-images-aptlib,target=/var/lib/apt \
|
|
||||||
--mount=type=cache,sharing=locked,id=moby-frozen-images-aptcache,target=/var/cache/apt \
|
|
||||||
apt-get update && apt-get install -y --no-install-recommends \
|
|
||||||
ca-certificates \
|
|
||||||
curl \
|
|
||||||
jq
|
|
||||||
# Get useful and necessary Hub images so we can "docker load" locally instead of pulling
|
|
||||||
COPY contrib/download-frozen-image-v2.sh /
|
|
||||||
ARG TARGETARCH
|
|
||||||
ARG TARGETVARIANT
|
|
||||||
RUN /download-frozen-image-v2.sh /build \
|
|
||||||
busybox:latest@sha256:95cf004f559831017cdf4628aaf1bb30133677be8702a8c5f2994629f637a209 \
|
|
||||||
busybox:glibc@sha256:1f81263701cddf6402afe9f33fca0266d9fff379e59b1748f33d3072da71ee85 \
|
|
||||||
debian:bookworm-slim@sha256:2bc5c236e9b262645a323e9088dfa3bb1ecb16cc75811daf40a23a824d665be9 \
|
|
||||||
hello-world:latest@sha256:d58e752213a51785838f9eed2b7a498ffa1cb3aa7f946dda11af39286c3db9a9 \
|
|
||||||
arm32v7/hello-world:latest@sha256:50b8560ad574c779908da71f7ce370c0a2471c098d44d1c8f6b513c5a55eeeb1
|
|
||||||
|
|
||||||
# delve
|
|
||||||
FROM base AS delve-src
|
|
||||||
WORKDIR /usr/src/delve
|
|
||||||
RUN git init . && git remote add origin "https://github.com/go-delve/delve.git"
|
|
||||||
# DELVE_VERSION specifies the version of the Delve debugger binary
|
|
||||||
# from the https://github.com/go-delve/delve repository.
|
|
||||||
# It can be used to run Docker with a possibility of
|
|
||||||
# attaching debugger to it.
|
|
||||||
ARG DELVE_VERSION=v1.21.1
|
|
||||||
RUN git fetch -q --depth 1 origin "${DELVE_VERSION}" +refs/tags/*:refs/tags/* && git checkout -q FETCH_HEAD
|
|
||||||
|
|
||||||
FROM base AS delve-supported
|
|
||||||
WORKDIR /usr/src/delve
|
|
||||||
ARG TARGETPLATFORM
|
|
||||||
RUN --mount=from=delve-src,src=/usr/src/delve,rw \
|
|
||||||
--mount=type=cache,target=/root/.cache/go-build,id=delve-build-$TARGETPLATFORM \
|
|
||||||
--mount=type=cache,target=/go/pkg/mod <<EOT
|
|
||||||
set -e
|
|
||||||
GO111MODULE=on xx-go build -o /build/dlv ./cmd/dlv
|
|
||||||
xx-verify /build/dlv
|
|
||||||
EOT
|
|
||||||
|
|
||||||
FROM binary-dummy AS delve-unsupported
|
|
||||||
FROM delve-${DELVE_SUPPORTED} AS delve
|
|
||||||
|
|
||||||
FROM base AS tomll
|
|
||||||
# GOTOML_VERSION specifies the version of the tomll binary to build and install
|
|
||||||
# from the https://github.com/pelletier/go-toml repository. This binary is used
|
|
||||||
# in CI in the hack/validate/toml script.
|
|
||||||
#
|
#
|
||||||
# When updating this version, consider updating the github.com/pelletier/go-toml
|
# Usage:
|
||||||
# dependency in vendor.mod accordingly.
|
#
|
||||||
ARG GOTOML_VERSION=v1.8.1
|
# # Assemble the full dev environment. This is slow the first time.
|
||||||
RUN --mount=type=cache,target=/root/.cache/go-build \
|
# docker build -t docker .
|
||||||
--mount=type=cache,target=/go/pkg/mod \
|
#
|
||||||
GOBIN=/build/ GO111MODULE=on go install "github.com/pelletier/go-toml/cmd/tomll@${GOTOML_VERSION}" \
|
# # Mount your source in an interactive container for quick testing:
|
||||||
&& /build/tomll --help
|
# docker run -v `pwd`:/go/src/github.com/docker/docker --privileged -i -t docker bash
|
||||||
|
#
|
||||||
FROM base AS gowinres
|
# # Run the test suite:
|
||||||
# GOWINRES_VERSION defines go-winres tool version
|
# docker run --privileged docker hack/make.sh test
|
||||||
ARG GOWINRES_VERSION=v0.3.1
|
#
|
||||||
RUN --mount=type=cache,target=/root/.cache/go-build \
|
# # Publish a release:
|
||||||
--mount=type=cache,target=/go/pkg/mod \
|
# docker run --privileged \
|
||||||
GOBIN=/build/ GO111MODULE=on go install "github.com/tc-hib/go-winres@${GOWINRES_VERSION}" \
|
# -e AWS_S3_BUCKET=baz \
|
||||||
&& /build/go-winres --help
|
# -e AWS_ACCESS_KEY=foo \
|
||||||
|
# -e AWS_SECRET_KEY=bar \
|
||||||
# containerd
|
# -e GPG_PASSPHRASE=gloubiboulga \
|
||||||
FROM base AS containerd-src
|
# docker hack/release.sh
|
||||||
WORKDIR /usr/src/containerd
|
#
|
||||||
RUN git init . && git remote add origin "https://github.com/containerd/containerd.git"
|
# Note: AppArmor used to mess with privileged mode, but this is no longer
|
||||||
# CONTAINERD_VERSION is used to build containerd binaries, and used for the
|
# the case. Therefore, you don't have to disable it anymore.
|
||||||
# integration tests. The distributed docker .deb and .rpm packages depend on a
|
|
||||||
# separate (containerd.io) package, which may be a different version as is
|
|
||||||
# specified here. The containerd golang package is also pinned in vendor.mod.
|
|
||||||
# When updating the binary version you may also need to update the vendor
|
|
||||||
# version to pick up bug fixes or new APIs, however, usually the Go packages
|
|
||||||
# are built from a commit from the master branch.
|
|
||||||
ARG CONTAINERD_VERSION=v1.7.15
|
|
||||||
RUN git fetch -q --depth 1 origin "${CONTAINERD_VERSION}" +refs/tags/*:refs/tags/* && git checkout -q FETCH_HEAD
|
|
||||||
|
|
||||||
FROM base AS containerd-build
|
|
||||||
WORKDIR /go/src/github.com/containerd/containerd
|
|
||||||
ARG TARGETPLATFORM
|
|
||||||
RUN --mount=type=cache,sharing=locked,id=moby-containerd-aptlib,target=/var/lib/apt \
|
|
||||||
--mount=type=cache,sharing=locked,id=moby-containerd-aptcache,target=/var/cache/apt \
|
|
||||||
apt-get update && xx-apt-get install -y --no-install-recommends \
|
|
||||||
gcc \
|
|
||||||
libbtrfs-dev \
|
|
||||||
libsecret-1-dev \
|
|
||||||
pkg-config
|
|
||||||
ARG DOCKER_STATIC
|
|
||||||
RUN --mount=from=containerd-src,src=/usr/src/containerd,rw \
|
|
||||||
--mount=type=cache,target=/root/.cache/go-build,id=containerd-build-$TARGETPLATFORM <<EOT
|
|
||||||
set -e
|
|
||||||
export CC=$(xx-info)-gcc
|
|
||||||
export CGO_ENABLED=$([ "$DOCKER_STATIC" = "1" ] && echo "0" || echo "1")
|
|
||||||
xx-go --wrap
|
|
||||||
make $([ "$DOCKER_STATIC" = "1" ] && echo "STATIC=1") binaries
|
|
||||||
xx-verify $([ "$DOCKER_STATIC" = "1" ] && echo "--static") bin/containerd
|
|
||||||
xx-verify $([ "$DOCKER_STATIC" = "1" ] && echo "--static") bin/containerd-shim-runc-v2
|
|
||||||
xx-verify $([ "$DOCKER_STATIC" = "1" ] && echo "--static") bin/ctr
|
|
||||||
mkdir /build
|
|
||||||
mv bin/containerd bin/containerd-shim-runc-v2 bin/ctr /build
|
|
||||||
EOT
|
|
||||||
|
|
||||||
FROM containerd-build AS containerd-linux
|
|
||||||
FROM binary-dummy AS containerd-windows
|
|
||||||
FROM containerd-${TARGETOS} AS containerd
|
|
||||||
|
|
||||||
FROM base AS golangci_lint
|
|
||||||
ARG GOLANGCI_LINT_VERSION=v1.55.2
|
|
||||||
RUN --mount=type=cache,target=/root/.cache/go-build \
|
|
||||||
--mount=type=cache,target=/go/pkg/mod \
|
|
||||||
GOBIN=/build/ GO111MODULE=on go install "github.com/golangci/golangci-lint/cmd/golangci-lint@${GOLANGCI_LINT_VERSION}" \
|
|
||||||
&& /build/golangci-lint --version
|
|
||||||
|
|
||||||
FROM base AS gotestsum
|
|
||||||
ARG GOTESTSUM_VERSION=v1.8.2
|
|
||||||
RUN --mount=type=cache,target=/root/.cache/go-build \
|
|
||||||
--mount=type=cache,target=/go/pkg/mod \
|
|
||||||
GOBIN=/build/ GO111MODULE=on go install "gotest.tools/gotestsum@${GOTESTSUM_VERSION}" \
|
|
||||||
&& /build/gotestsum --version
|
|
||||||
|
|
||||||
FROM base AS shfmt
|
|
||||||
ARG SHFMT_VERSION=v3.8.0
|
|
||||||
RUN --mount=type=cache,target=/root/.cache/go-build \
|
|
||||||
--mount=type=cache,target=/go/pkg/mod \
|
|
||||||
GOBIN=/build/ GO111MODULE=on go install "mvdan.cc/sh/v3/cmd/shfmt@${SHFMT_VERSION}" \
|
|
||||||
&& /build/shfmt --version
|
|
||||||
|
|
||||||
FROM base AS gopls
|
|
||||||
RUN --mount=type=cache,target=/root/.cache/go-build \
|
|
||||||
--mount=type=cache,target=/go/pkg/mod \
|
|
||||||
GOBIN=/build/ GO111MODULE=on go install "golang.org/x/tools/gopls@latest" \
|
|
||||||
&& /build/gopls version
|
|
||||||
|
|
||||||
FROM base AS dockercli
|
|
||||||
WORKDIR /go/src/github.com/docker/cli
|
|
||||||
ARG DOCKERCLI_REPOSITORY
|
|
||||||
ARG DOCKERCLI_VERSION
|
|
||||||
ARG TARGETPLATFORM
|
|
||||||
RUN --mount=source=hack/dockerfile/cli.sh,target=/download-or-build-cli.sh \
|
|
||||||
--mount=type=cache,id=dockercli-git-$TARGETPLATFORM,sharing=locked,target=./.git \
|
|
||||||
--mount=type=cache,target=/root/.cache/go-build,id=dockercli-build-$TARGETPLATFORM \
|
|
||||||
rm -f ./.git/*.lock \
|
|
||||||
&& /download-or-build-cli.sh ${DOCKERCLI_VERSION} ${DOCKERCLI_REPOSITORY} /build \
|
|
||||||
&& /build/docker --version
|
|
||||||
|
|
||||||
FROM base AS dockercli-integration
|
|
||||||
WORKDIR /go/src/github.com/docker/cli
|
|
||||||
ARG DOCKERCLI_INTEGRATION_REPOSITORY
|
|
||||||
ARG DOCKERCLI_INTEGRATION_VERSION
|
|
||||||
ARG TARGETPLATFORM
|
|
||||||
RUN --mount=source=hack/dockerfile/cli.sh,target=/download-or-build-cli.sh \
|
|
||||||
--mount=type=cache,id=dockercli-git-$TARGETPLATFORM,sharing=locked,target=./.git \
|
|
||||||
--mount=type=cache,target=/root/.cache/go-build,id=dockercli-build-$TARGETPLATFORM \
|
|
||||||
rm -f ./.git/*.lock \
|
|
||||||
&& /download-or-build-cli.sh ${DOCKERCLI_INTEGRATION_VERSION} ${DOCKERCLI_INTEGRATION_REPOSITORY} /build \
|
|
||||||
&& /build/docker --version
|
|
||||||
|
|
||||||
# runc
|
|
||||||
FROM base AS runc-src
|
|
||||||
WORKDIR /usr/src/runc
|
|
||||||
RUN git init . && git remote add origin "https://github.com/opencontainers/runc.git"
|
|
||||||
# RUNC_VERSION should match the version that is used by the containerd version
|
|
||||||
# that is used. If you need to update runc, open a pull request in the containerd
|
|
||||||
# project first, and update both after that is merged. When updating RUNC_VERSION,
|
|
||||||
# consider updating runc in vendor.mod accordingly.
|
|
||||||
ARG RUNC_VERSION=v1.1.12
|
|
||||||
RUN git fetch -q --depth 1 origin "${RUNC_VERSION}" +refs/tags/*:refs/tags/* && git checkout -q FETCH_HEAD
|
|
||||||
|
|
||||||
FROM base AS runc-build
|
|
||||||
WORKDIR /go/src/github.com/opencontainers/runc
|
|
||||||
ARG TARGETPLATFORM
|
|
||||||
RUN --mount=type=cache,sharing=locked,id=moby-runc-aptlib,target=/var/lib/apt \
|
|
||||||
--mount=type=cache,sharing=locked,id=moby-runc-aptcache,target=/var/cache/apt \
|
|
||||||
apt-get update && xx-apt-get install -y --no-install-recommends \
|
|
||||||
dpkg-dev \
|
|
||||||
gcc \
|
|
||||||
libc6-dev \
|
|
||||||
libseccomp-dev \
|
|
||||||
pkg-config
|
|
||||||
ARG DOCKER_STATIC
|
|
||||||
RUN --mount=from=runc-src,src=/usr/src/runc,rw \
|
|
||||||
--mount=type=cache,target=/root/.cache/go-build,id=runc-build-$TARGETPLATFORM <<EOT
|
|
||||||
set -e
|
|
||||||
xx-go --wrap
|
|
||||||
CGO_ENABLED=1 make "$([ "$DOCKER_STATIC" = "1" ] && echo "static" || echo "runc")"
|
|
||||||
xx-verify $([ "$DOCKER_STATIC" = "1" ] && echo "--static") runc
|
|
||||||
mkdir /build
|
|
||||||
mv runc /build/
|
|
||||||
EOT
|
|
||||||
|
|
||||||
FROM runc-build AS runc-linux
|
|
||||||
FROM binary-dummy AS runc-windows
|
|
||||||
FROM runc-${TARGETOS} AS runc
|
|
||||||
|
|
||||||
# tini
|
|
||||||
FROM base AS tini-src
|
|
||||||
WORKDIR /usr/src/tini
|
|
||||||
RUN git init . && git remote add origin "https://github.com/krallin/tini.git"
|
|
||||||
# TINI_VERSION specifies the version of tini (docker-init) to build. This
|
|
||||||
# binary is used when starting containers with the `--init` option.
|
|
||||||
ARG TINI_VERSION=v0.19.0
|
|
||||||
RUN git fetch -q --depth 1 origin "${TINI_VERSION}" +refs/tags/*:refs/tags/* && git checkout -q FETCH_HEAD
|
|
||||||
|
|
||||||
FROM base AS tini-build
|
|
||||||
WORKDIR /go/src/github.com/krallin/tini
|
|
||||||
RUN --mount=type=cache,sharing=locked,id=moby-tini-aptlib,target=/var/lib/apt \
|
|
||||||
--mount=type=cache,sharing=locked,id=moby-tini-aptcache,target=/var/cache/apt \
|
|
||||||
apt-get update && apt-get install -y --no-install-recommends cmake
|
|
||||||
ARG TARGETPLATFORM
|
|
||||||
RUN --mount=type=cache,sharing=locked,id=moby-tini-aptlib,target=/var/lib/apt \
|
|
||||||
--mount=type=cache,sharing=locked,id=moby-tini-aptcache,target=/var/cache/apt \
|
|
||||||
xx-apt-get install -y --no-install-recommends \
|
|
||||||
gcc \
|
|
||||||
libc6-dev \
|
|
||||||
pkg-config
|
|
||||||
RUN --mount=from=tini-src,src=/usr/src/tini,rw \
|
|
||||||
--mount=type=cache,target=/root/.cache/go-build,id=tini-build-$TARGETPLATFORM <<EOT
|
|
||||||
set -e
|
|
||||||
CC=$(xx-info)-gcc cmake .
|
|
||||||
make tini-static
|
|
||||||
xx-verify --static tini-static
|
|
||||||
mkdir /build
|
|
||||||
mv tini-static /build/docker-init
|
|
||||||
EOT
|
|
||||||
|
|
||||||
FROM tini-build AS tini-linux
|
|
||||||
FROM binary-dummy AS tini-windows
|
|
||||||
FROM tini-${TARGETOS} AS tini
|
|
||||||
|
|
||||||
# rootlesskit
|
|
||||||
FROM base AS rootlesskit-src
|
|
||||||
WORKDIR /usr/src/rootlesskit
|
|
||||||
RUN git init . && git remote add origin "https://github.com/rootless-containers/rootlesskit.git"
|
|
||||||
# When updating, also update vendor.mod and hack/dockerfile/install/rootlesskit.installer accordingly.
|
|
||||||
ARG ROOTLESSKIT_VERSION=v2.0.2
|
|
||||||
RUN git fetch -q --depth 1 origin "${ROOTLESSKIT_VERSION}" +refs/tags/*:refs/tags/* && git checkout -q FETCH_HEAD
|
|
||||||
|
|
||||||
FROM base AS rootlesskit-build
|
|
||||||
WORKDIR /go/src/github.com/rootless-containers/rootlesskit
|
|
||||||
ARG TARGETPLATFORM
|
|
||||||
RUN --mount=type=cache,sharing=locked,id=moby-rootlesskit-aptlib,target=/var/lib/apt \
|
|
||||||
--mount=type=cache,sharing=locked,id=moby-rootlesskit-aptcache,target=/var/cache/apt \
|
|
||||||
apt-get update && xx-apt-get install -y --no-install-recommends \
|
|
||||||
gcc \
|
|
||||||
libc6-dev \
|
|
||||||
pkg-config
|
|
||||||
ENV GO111MODULE=on
|
|
||||||
ARG DOCKER_STATIC
|
|
||||||
RUN --mount=from=rootlesskit-src,src=/usr/src/rootlesskit,rw \
|
|
||||||
--mount=type=cache,target=/go/pkg/mod \
|
|
||||||
--mount=type=cache,target=/root/.cache/go-build,id=rootlesskit-build-$TARGETPLATFORM <<EOT
|
|
||||||
set -e
|
|
||||||
export CGO_ENABLED=$([ "$DOCKER_STATIC" = "1" ] && echo "0" || echo "1")
|
|
||||||
xx-go build -o /build/rootlesskit -ldflags="$([ "$DOCKER_STATIC" != "1" ] && echo "-linkmode=external")" ./cmd/rootlesskit
|
|
||||||
xx-verify $([ "$DOCKER_STATIC" = "1" ] && echo "--static") /build/rootlesskit
|
|
||||||
xx-go build -o /build/rootlesskit-docker-proxy -ldflags="$([ "$DOCKER_STATIC" != "1" ] && echo "-linkmode=external")" ./cmd/rootlesskit-docker-proxy
|
|
||||||
xx-verify $([ "$DOCKER_STATIC" = "1" ] && echo "--static") /build/rootlesskit-docker-proxy
|
|
||||||
EOT
|
|
||||||
COPY --link ./contrib/dockerd-rootless.sh /build/
|
|
||||||
COPY --link ./contrib/dockerd-rootless-setuptool.sh /build/
|
|
||||||
|
|
||||||
FROM rootlesskit-build AS rootlesskit-linux
|
|
||||||
FROM binary-dummy AS rootlesskit-windows
|
|
||||||
FROM rootlesskit-${TARGETOS} AS rootlesskit
|
|
||||||
|
|
||||||
FROM base AS crun
|
|
||||||
ARG CRUN_VERSION=1.12
|
|
||||||
RUN --mount=type=cache,sharing=locked,id=moby-crun-aptlib,target=/var/lib/apt \
|
|
||||||
--mount=type=cache,sharing=locked,id=moby-crun-aptcache,target=/var/cache/apt \
|
|
||||||
apt-get update && apt-get install -y --no-install-recommends \
|
|
||||||
autoconf \
|
|
||||||
automake \
|
|
||||||
build-essential \
|
|
||||||
libcap-dev \
|
|
||||||
libprotobuf-c-dev \
|
|
||||||
libseccomp-dev \
|
|
||||||
libsystemd-dev \
|
|
||||||
libtool \
|
|
||||||
libudev-dev \
|
|
||||||
libyajl-dev \
|
|
||||||
python3 \
|
|
||||||
;
|
|
||||||
RUN --mount=type=tmpfs,target=/tmp/crun-build \
|
|
||||||
git clone https://github.com/containers/crun.git /tmp/crun-build && \
|
|
||||||
cd /tmp/crun-build && \
|
|
||||||
git checkout -q "${CRUN_VERSION}" && \
|
|
||||||
./autogen.sh && \
|
|
||||||
./configure --bindir=/build && \
|
|
||||||
make -j install
|
|
||||||
|
|
||||||
# vpnkit
|
|
||||||
# use dummy scratch stage to avoid build to fail for unsupported platforms
|
|
||||||
FROM scratch AS vpnkit-windows
|
|
||||||
FROM scratch AS vpnkit-linux-386
|
|
||||||
FROM scratch AS vpnkit-linux-arm
|
|
||||||
FROM scratch AS vpnkit-linux-ppc64le
|
|
||||||
FROM scratch AS vpnkit-linux-riscv64
|
|
||||||
FROM scratch AS vpnkit-linux-s390x
|
|
||||||
FROM djs55/vpnkit:${VPNKIT_VERSION} AS vpnkit-linux-amd64
|
|
||||||
FROM djs55/vpnkit:${VPNKIT_VERSION} AS vpnkit-linux-arm64
|
|
||||||
FROM vpnkit-linux-${TARGETARCH} AS vpnkit-linux
|
|
||||||
FROM vpnkit-${TARGETOS} AS vpnkit
|
|
||||||
|
|
||||||
# containerutility
|
|
||||||
FROM base AS containerutil-src
|
|
||||||
WORKDIR /usr/src/containerutil
|
|
||||||
RUN git init . && git remote add origin "https://github.com/docker-archive/windows-container-utility.git"
|
|
||||||
ARG CONTAINERUTILITY_VERSION=aa1ba87e99b68e0113bd27ec26c60b88f9d4ccd9
|
|
||||||
RUN git fetch -q --depth 1 origin "${CONTAINERUTILITY_VERSION}" +refs/tags/*:refs/tags/* && git checkout -q FETCH_HEAD
|
|
||||||
|
|
||||||
FROM base AS containerutil-build
|
|
||||||
WORKDIR /usr/src/containerutil
|
|
||||||
ARG TARGETPLATFORM
|
|
||||||
RUN xx-apt-get install -y --no-install-recommends \
|
|
||||||
gcc \
|
|
||||||
g++ \
|
|
||||||
libc6-dev \
|
|
||||||
pkg-config
|
|
||||||
RUN --mount=from=containerutil-src,src=/usr/src/containerutil,rw \
|
|
||||||
--mount=type=cache,target=/root/.cache/go-build,id=containerutil-build-$TARGETPLATFORM <<EOT
|
|
||||||
set -e
|
|
||||||
CC="$(xx-info)-gcc" CXX="$(xx-info)-g++" make
|
|
||||||
xx-verify --static containerutility.exe
|
|
||||||
mkdir /build
|
|
||||||
mv containerutility.exe /build/
|
|
||||||
EOT
|
|
||||||
|
|
||||||
FROM binary-dummy AS containerutil-linux
|
|
||||||
FROM containerutil-build AS containerutil-windows-amd64
|
|
||||||
FROM containerutil-windows-${TARGETARCH} AS containerutil-windows
|
|
||||||
FROM containerutil-${TARGETOS} AS containerutil
|
|
||||||
FROM docker/buildx-bin:${BUILDX_VERSION} as buildx
|
|
||||||
FROM docker/compose-bin:${COMPOSE_VERSION} as compose
|
|
||||||
|
|
||||||
FROM base AS dev-systemd-false
|
|
||||||
COPY --link --from=frozen-images /build/ /docker-frozen-images
|
|
||||||
COPY --link --from=swagger /build/ /usr/local/bin/
|
|
||||||
COPY --link --from=delve /build/ /usr/local/bin/
|
|
||||||
COPY --link --from=tomll /build/ /usr/local/bin/
|
|
||||||
COPY --link --from=gowinres /build/ /usr/local/bin/
|
|
||||||
COPY --link --from=tini /build/ /usr/local/bin/
|
|
||||||
COPY --link --from=registry /build/ /usr/local/bin/
|
|
||||||
COPY --link --from=registry-v2 /build/ /usr/local/bin/
|
|
||||||
|
|
||||||
# Skip the CRIU stage for now, as the opensuse package repository is sometimes
|
|
||||||
# unstable, and we're currently not using it in CI.
|
|
||||||
#
|
#
|
||||||
# FIXME(thaJeztah): re-enable this stage when https://github.com/moby/moby/issues/38963 is resolved (see https://github.com/moby/moby/pull/38984)
|
|
||||||
# COPY --link --from=criu /build/ /usr/local/bin/
|
|
||||||
COPY --link --from=gotestsum /build/ /usr/local/bin/
|
|
||||||
COPY --link --from=golangci_lint /build/ /usr/local/bin/
|
|
||||||
COPY --link --from=shfmt /build/ /usr/local/bin/
|
|
||||||
COPY --link --from=runc /build/ /usr/local/bin/
|
|
||||||
COPY --link --from=containerd /build/ /usr/local/bin/
|
|
||||||
COPY --link --from=rootlesskit /build/ /usr/local/bin/
|
|
||||||
COPY --link --from=vpnkit / /usr/local/bin/
|
|
||||||
COPY --link --from=containerutil /build/ /usr/local/bin/
|
|
||||||
COPY --link --from=crun /build/ /usr/local/bin/
|
|
||||||
COPY --link hack/dockerfile/etc/docker/ /etc/docker/
|
|
||||||
COPY --link --from=buildx /buildx /usr/local/libexec/docker/cli-plugins/docker-buildx
|
|
||||||
COPY --link --from=compose /docker-compose /usr/libexec/docker/cli-plugins/docker-compose
|
|
||||||
|
|
||||||
ENV PATH=/usr/local/cli:$PATH
|
FROM debian:jessie
|
||||||
ENV TEST_CLIENT_BINARY=/usr/local/cli-integration/docker
|
|
||||||
ENV CONTAINERD_ADDRESS=/run/docker/containerd/containerd.sock
|
# add zfs ppa
|
||||||
ENV CONTAINERD_NAMESPACE=moby
|
RUN apt-key adv --keyserver hkp://p80.pool.sks-keyservers.net:80 --recv-keys E871F18B51E0147C77796AC81196BA81F6B0FC61 \
|
||||||
WORKDIR /go/src/github.com/docker/docker
|
|| apt-key adv --keyserver hkp://pgp.mit.edu:80 --recv-keys E871F18B51E0147C77796AC81196BA81F6B0FC61
|
||||||
|
RUN echo deb http://ppa.launchpad.net/zfs-native/stable/ubuntu trusty main > /etc/apt/sources.list.d/zfs.list
|
||||||
|
|
||||||
|
|
||||||
|
# allow replacing httpredir mirror
|
||||||
|
ARG APT_MIRROR=httpredir.debian.org
|
||||||
|
RUN sed -i s/httpredir.debian.org/$APT_MIRROR/g /etc/apt/sources.list
|
||||||
|
|
||||||
|
# Packaged dependencies
|
||||||
|
RUN apt-get update && apt-get install -y \
|
||||||
|
apparmor \
|
||||||
|
apt-utils \
|
||||||
|
aufs-tools \
|
||||||
|
automake \
|
||||||
|
bash-completion \
|
||||||
|
binutils-mingw-w64 \
|
||||||
|
bsdmainutils \
|
||||||
|
btrfs-tools \
|
||||||
|
build-essential \
|
||||||
|
clang \
|
||||||
|
createrepo \
|
||||||
|
curl \
|
||||||
|
dpkg-sig \
|
||||||
|
gcc-mingw-w64 \
|
||||||
|
git \
|
||||||
|
iptables \
|
||||||
|
jq \
|
||||||
|
libapparmor-dev \
|
||||||
|
libcap-dev \
|
||||||
|
libltdl-dev \
|
||||||
|
libsqlite3-dev \
|
||||||
|
libsystemd-journal-dev \
|
||||||
|
libtool \
|
||||||
|
mercurial \
|
||||||
|
net-tools \
|
||||||
|
pkg-config \
|
||||||
|
python-dev \
|
||||||
|
python-mock \
|
||||||
|
python-pip \
|
||||||
|
python-websocket \
|
||||||
|
ubuntu-zfs \
|
||||||
|
xfsprogs \
|
||||||
|
libzfs-dev \
|
||||||
|
tar \
|
||||||
|
zip \
|
||||||
|
--no-install-recommends \
|
||||||
|
&& pip install awscli==1.10.15
|
||||||
|
# Get lvm2 source for compiling statically
|
||||||
|
ENV LVM2_VERSION 2.02.103
|
||||||
|
RUN mkdir -p /usr/local/lvm2 \
|
||||||
|
&& curl -fsSL "https://mirrors.kernel.org/sourceware/lvm2/LVM2.${LVM2_VERSION}.tgz" \
|
||||||
|
| tar -xzC /usr/local/lvm2 --strip-components=1
|
||||||
|
# see https://git.fedorahosted.org/cgit/lvm2.git/refs/tags for release tags
|
||||||
|
|
||||||
|
# Compile and install lvm2
|
||||||
|
RUN cd /usr/local/lvm2 \
|
||||||
|
&& ./configure \
|
||||||
|
--build="$(gcc -print-multiarch)" \
|
||||||
|
--enable-static_link \
|
||||||
|
&& make device-mapper \
|
||||||
|
&& make install_device-mapper
|
||||||
|
# see https://git.fedorahosted.org/cgit/lvm2.git/tree/INSTALL
|
||||||
|
|
||||||
|
# Configure the container for OSX cross compilation
|
||||||
|
ENV OSX_SDK MacOSX10.11.sdk
|
||||||
|
ENV OSX_CROSS_COMMIT 8aa9b71a394905e6c5f4b59e2b97b87a004658a4
|
||||||
|
RUN set -x \
|
||||||
|
&& export OSXCROSS_PATH="/osxcross" \
|
||||||
|
&& git clone https://github.com/tpoechtrager/osxcross.git $OSXCROSS_PATH \
|
||||||
|
&& ( cd $OSXCROSS_PATH && git checkout -q $OSX_CROSS_COMMIT) \
|
||||||
|
&& curl -sSL https://s3.dockerproject.org/darwin/v2/${OSX_SDK}.tar.xz -o "${OSXCROSS_PATH}/tarballs/${OSX_SDK}.tar.xz" \
|
||||||
|
&& UNATTENDED=yes OSX_VERSION_MIN=10.6 ${OSXCROSS_PATH}/build.sh
|
||||||
|
ENV PATH /osxcross/target/bin:$PATH
|
||||||
|
|
||||||
|
# install seccomp: the version shipped in trusty is too old
|
||||||
|
ENV SECCOMP_VERSION 2.3.1
|
||||||
|
RUN set -x \
|
||||||
|
&& export SECCOMP_PATH="$(mktemp -d)" \
|
||||||
|
&& curl -fsSL "https://github.com/seccomp/libseccomp/releases/download/v${SECCOMP_VERSION}/libseccomp-${SECCOMP_VERSION}.tar.gz" \
|
||||||
|
| tar -xzC "$SECCOMP_PATH" --strip-components=1 \
|
||||||
|
&& ( \
|
||||||
|
cd "$SECCOMP_PATH" \
|
||||||
|
&& ./configure --prefix=/usr/local \
|
||||||
|
&& make \
|
||||||
|
&& make install \
|
||||||
|
&& ldconfig \
|
||||||
|
) \
|
||||||
|
&& rm -rf "$SECCOMP_PATH"
|
||||||
|
|
||||||
|
# Install Go
|
||||||
|
# IMPORTANT: If the version of Go is updated, the Windows to Linux CI machines
|
||||||
|
# will need updating, to avoid errors. Ping #docker-maintainers on IRC
|
||||||
|
# with a heads-up.
|
||||||
|
ENV GO_VERSION 1.6.4
|
||||||
|
|
||||||
|
# Compile Go for cross compilation
|
||||||
|
ENV DOCKER_CROSSPLATFORMS \
|
||||||
|
linux/386 linux/arm \
|
||||||
|
darwin/amd64 \
|
||||||
|
freebsd/amd64 freebsd/386 freebsd/arm \
|
||||||
|
windows/amd64 windows/386
|
||||||
|
|
||||||
|
RUN curl -fsSL "https://storage.googleapis.com/golang/go1.4.3.linux-amd64.tar.gz" \
|
||||||
|
| tar -xzC /root && \
|
||||||
|
mv /root/go /root/go1.4 && \
|
||||||
|
cd /usr/local && \
|
||||||
|
curl -fsSL "https://storage.googleapis.com/golang/go$GO_VERSION.src.tar.gz" \
|
||||||
|
| tar -xzC /usr/local && \
|
||||||
|
cd go && \
|
||||||
|
printf 'diff --git a/src/runtime/sys_darwin_amd64.s b/src/runtime/sys_darwin_amd64.s\nindex e09b906..fa8ff2f 100644\n--- a/src/runtime/sys_darwin_amd64.s\n+++ b/src/runtime/sys_darwin_amd64.s\n@@ -157,6 +157,7 @@ systime:\n\t// Fall back to system call (usually first call in this thread).\n\tMOVQ\tSP, DI\n\tMOVQ\t$0, SI\n+\tMOVQ\t$0, DX // required as of Sierra; Issue 16570\n\tMOVL\t$(0x2000000+116), AX\n\tSYSCALL\n\tCMPQ\tAX, $0\n' | patch -p1 && \
|
||||||
|
cd src && \
|
||||||
|
./make.bash
|
||||||
|
|
||||||
|
ENV PATH /go/bin:/usr/local/go/bin:$PATH
|
||||||
|
ENV GOPATH /go:/go/src/github.com/docker/docker/vendor
|
||||||
|
|
||||||
|
# This has been commented out and kept as reference because we don't support compiling with older Go anymore.
|
||||||
|
# ENV GOFMT_VERSION 1.3.3
|
||||||
|
# RUN curl -sSL https://storage.googleapis.com/golang/go${GOFMT_VERSION}.$(go env GOOS)-$(go env GOARCH).tar.gz | tar -C /go/bin -xz --strip-components=2 go/bin/gofmt
|
||||||
|
|
||||||
|
ENV GO_TOOLS_COMMIT 823804e1ae08dbb14eb807afc7db9993bc9e3cc3
|
||||||
|
# Grab Go's cover tool for dead-simple code coverage testing
|
||||||
|
# Grab Go's vet tool for examining go code to find suspicious constructs
|
||||||
|
# and help prevent errors that the compiler might not catch
|
||||||
|
RUN git clone https://github.com/golang/tools.git /go/src/golang.org/x/tools \
|
||||||
|
&& (cd /go/src/golang.org/x/tools && git checkout -q $GO_TOOLS_COMMIT) \
|
||||||
|
&& go install -v golang.org/x/tools/cmd/cover \
|
||||||
|
&& go install -v golang.org/x/tools/cmd/vet
|
||||||
|
# Grab Go's lint tool
|
||||||
|
ENV GO_LINT_COMMIT 32a87160691b3c96046c0c678fe57c5bef761456
|
||||||
|
RUN git clone https://github.com/golang/lint.git /go/src/github.com/golang/lint \
|
||||||
|
&& (cd /go/src/github.com/golang/lint && git checkout -q $GO_LINT_COMMIT) \
|
||||||
|
&& go install -v github.com/golang/lint/golint
|
||||||
|
|
||||||
|
# Install two versions of the registry. The first is an older version that
|
||||||
|
# only supports schema1 manifests. The second is a newer version that supports
|
||||||
|
# both. This allows integration-cli tests to cover push/pull with both schema1
|
||||||
|
# and schema2 manifests.
|
||||||
|
ENV REGISTRY_COMMIT_SCHEMA1 ec87e9b6971d831f0eff752ddb54fb64693e51cd
|
||||||
|
ENV REGISTRY_COMMIT 47a064d4195a9b56133891bbb13620c3ac83a827
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/distribution.git "$GOPATH/src/github.com/docker/distribution" \
|
||||||
|
&& (cd "$GOPATH/src/github.com/docker/distribution" && git checkout -q "$REGISTRY_COMMIT") \
|
||||||
|
&& GOPATH="$GOPATH/src/github.com/docker/distribution/Godeps/_workspace:$GOPATH" \
|
||||||
|
go build -o /usr/local/bin/registry-v2 github.com/docker/distribution/cmd/registry \
|
||||||
|
&& (cd "$GOPATH/src/github.com/docker/distribution" && git checkout -q "$REGISTRY_COMMIT_SCHEMA1") \
|
||||||
|
&& GOPATH="$GOPATH/src/github.com/docker/distribution/Godeps/_workspace:$GOPATH" \
|
||||||
|
go build -o /usr/local/bin/registry-v2-schema1 github.com/docker/distribution/cmd/registry \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Install notary and notary-server
|
||||||
|
ENV NOTARY_VERSION v0.3.0
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/notary.git "$GOPATH/src/github.com/docker/notary" \
|
||||||
|
&& (cd "$GOPATH/src/github.com/docker/notary" && git checkout -q "$NOTARY_VERSION") \
|
||||||
|
&& GOPATH="$GOPATH/src/github.com/docker/notary/vendor:$GOPATH" \
|
||||||
|
go build -o /usr/local/bin/notary-server github.com/docker/notary/cmd/notary-server \
|
||||||
|
&& GOPATH="$GOPATH/src/github.com/docker/notary/vendor:$GOPATH" \
|
||||||
|
go build -o /usr/local/bin/notary github.com/docker/notary/cmd/notary \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Get the "docker-py" source so we can run their integration tests
|
||||||
|
ENV DOCKER_PY_COMMIT 7befe694bd21e3c54bb1d7825270ea4bd6864c13
|
||||||
|
RUN git clone https://github.com/docker/docker-py.git /docker-py \
|
||||||
|
&& cd /docker-py \
|
||||||
|
&& git checkout -q $DOCKER_PY_COMMIT \
|
||||||
|
&& pip install -r test-requirements.txt
|
||||||
|
|
||||||
|
# Set user.email so crosbymichael's in-container merge commits go smoothly
|
||||||
|
RUN git config --global user.email 'docker-dummy@example.com'
|
||||||
|
|
||||||
|
# Add an unprivileged user to be used for tests which need it
|
||||||
|
RUN groupadd -r docker
|
||||||
|
RUN useradd --create-home --gid docker unprivilegeduser
|
||||||
|
|
||||||
VOLUME /var/lib/docker
|
VOLUME /var/lib/docker
|
||||||
VOLUME /home/unprivilegeduser/.local/share/docker
|
WORKDIR /go/src/github.com/docker/docker
|
||||||
|
ENV DOCKER_BUILDTAGS apparmor pkcs11 seccomp selinux
|
||||||
|
|
||||||
|
# Let us use a .bashrc file
|
||||||
|
RUN ln -sfv $PWD/.bashrc ~/.bashrc
|
||||||
|
|
||||||
|
# Register Docker's bash completion.
|
||||||
|
RUN ln -sv $PWD/contrib/completion/bash/docker /etc/bash_completion.d/docker
|
||||||
|
|
||||||
|
# Get useful and necessary Hub images so we can "docker load" locally instead of pulling
|
||||||
|
COPY contrib/download-frozen-image-v2.sh /go/src/github.com/docker/docker/contrib/
|
||||||
|
RUN ./contrib/download-frozen-image-v2.sh /docker-frozen-images \
|
||||||
|
buildpack-deps:jessie@sha256:25785f89240fbcdd8a74bdaf30dd5599a9523882c6dfc567f2e9ef7cf6f79db6 \
|
||||||
|
busybox:latest@sha256:e4f93f6ed15a0cdd342f5aae387886fba0ab98af0a102da6276eaf24d6e6ade0 \
|
||||||
|
debian:jessie@sha256:f968f10b4b523737e253a97eac59b0d1420b5c19b69928d35801a6373ffe330e \
|
||||||
|
hello-world:latest@sha256:8be990ef2aeb16dbcb9271ddfe2610fa6658d13f6dfb8bc72074cc1ca36966a7
|
||||||
|
# see also "hack/make/.ensure-frozen-images" (which needs to be updated any time this list is)
|
||||||
|
|
||||||
|
# Download man page generator
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone --depth 1 -b v1.0.5 https://github.com/cpuguy83/go-md2man.git "$GOPATH/src/github.com/cpuguy83/go-md2man" \
|
||||||
|
&& git clone --depth 1 -b v1.4 https://github.com/russross/blackfriday.git "$GOPATH/src/github.com/russross/blackfriday" \
|
||||||
|
&& go get -v -d github.com/cpuguy83/go-md2man \
|
||||||
|
&& go build -v -o /usr/local/bin/go-md2man github.com/cpuguy83/go-md2man \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Download toml validator
|
||||||
|
ENV TOMLV_COMMIT 9baf8a8a9f2ed20a8e54160840c492f937eeaf9a
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/BurntSushi/toml.git "$GOPATH/src/github.com/BurntSushi/toml" \
|
||||||
|
&& (cd "$GOPATH/src/github.com/BurntSushi/toml" && git checkout -q "$TOMLV_COMMIT") \
|
||||||
|
&& go build -v -o /usr/local/bin/tomlv github.com/BurntSushi/toml/cmd/tomlv \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Install runc
|
||||||
|
ENV RUNC_COMMIT 50a19c6ff828c58e5dab13830bd3dacde268afe5
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/runc.git "$GOPATH/src/github.com/opencontainers/runc" \
|
||||||
|
&& cd "$GOPATH/src/github.com/opencontainers/runc" \
|
||||||
|
&& git checkout -q "$RUNC_COMMIT" \
|
||||||
|
&& make static BUILDTAGS="seccomp apparmor selinux" \
|
||||||
|
&& cp runc /usr/local/bin/docker-runc \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Install containerd
|
||||||
|
ENV CONTAINERD_COMMIT 2a5e70cbf65457815ee76b7e5dd2a01292d9eca8
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/containerd.git "$GOPATH/src/github.com/docker/containerd" \
|
||||||
|
&& cd "$GOPATH/src/github.com/docker/containerd" \
|
||||||
|
&& git checkout -q "$CONTAINERD_COMMIT" \
|
||||||
|
&& make static \
|
||||||
|
&& cp bin/containerd /usr/local/bin/docker-containerd \
|
||||||
|
&& cp bin/containerd-shim /usr/local/bin/docker-containerd-shim \
|
||||||
|
&& cp bin/ctr /usr/local/bin/docker-containerd-ctr \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
# Wrap all commands in the "docker-in-docker" script to allow nested containers
|
# Wrap all commands in the "docker-in-docker" script to allow nested containers
|
||||||
ENTRYPOINT ["hack/dind"]
|
ENTRYPOINT ["hack/dind"]
|
||||||
|
|
||||||
FROM dev-systemd-false AS dev-systemd-true
|
# Upload docker source
|
||||||
RUN --mount=type=cache,sharing=locked,id=moby-dev-aptlib,target=/var/lib/apt \
|
COPY . /go/src/github.com/docker/docker
|
||||||
--mount=type=cache,sharing=locked,id=moby-dev-aptcache,target=/var/cache/apt \
|
|
||||||
apt-get update && apt-get install -y --no-install-recommends \
|
|
||||||
dbus \
|
|
||||||
dbus-user-session \
|
|
||||||
systemd \
|
|
||||||
systemd-sysv
|
|
||||||
ENTRYPOINT ["hack/dind-systemd"]
|
|
||||||
|
|
||||||
FROM dev-systemd-${SYSTEMD} AS dev-base
|
|
||||||
RUN groupadd -r docker
|
|
||||||
RUN useradd --create-home --gid docker unprivilegeduser \
|
|
||||||
&& mkdir -p /home/unprivilegeduser/.local/share/docker \
|
|
||||||
&& chown -R unprivilegeduser /home/unprivilegeduser
|
|
||||||
# Let us use a .bashrc file
|
|
||||||
RUN ln -sfv /go/src/github.com/docker/docker/.bashrc ~/.bashrc
|
|
||||||
# Activate bash completion and include Docker's completion if mounted with DOCKER_BASH_COMPLETION_PATH
|
|
||||||
RUN echo "source /usr/share/bash-completion/bash_completion" >> /etc/bash.bashrc
|
|
||||||
RUN ln -s /usr/local/completion/bash/docker /etc/bash_completion.d/docker
|
|
||||||
RUN ldconfig
|
|
||||||
# Set dev environment as safe git directory to prevent "dubious ownership" errors
|
|
||||||
# when bind-mounting the source into the dev-container. See https://github.com/moby/moby/pull/44930
|
|
||||||
RUN git config --global --add safe.directory $GOPATH/src/github.com/docker/docker
|
|
||||||
# This should only install packages that are specifically needed for the dev environment and nothing else
|
|
||||||
# Do you really need to add another package here? Can it be done in a different build stage?
|
|
||||||
RUN --mount=type=cache,sharing=locked,id=moby-dev-aptlib,target=/var/lib/apt \
|
|
||||||
--mount=type=cache,sharing=locked,id=moby-dev-aptcache,target=/var/cache/apt \
|
|
||||||
apt-get update && apt-get install -y --no-install-recommends \
|
|
||||||
apparmor \
|
|
||||||
bash-completion \
|
|
||||||
bzip2 \
|
|
||||||
inetutils-ping \
|
|
||||||
iproute2 \
|
|
||||||
iptables \
|
|
||||||
jq \
|
|
||||||
libcap2-bin \
|
|
||||||
libnet1 \
|
|
||||||
libnl-3-200 \
|
|
||||||
libprotobuf-c1 \
|
|
||||||
libyajl2 \
|
|
||||||
net-tools \
|
|
||||||
patch \
|
|
||||||
pigz \
|
|
||||||
sudo \
|
|
||||||
systemd-journal-remote \
|
|
||||||
thin-provisioning-tools \
|
|
||||||
uidmap \
|
|
||||||
vim \
|
|
||||||
vim-common \
|
|
||||||
xfsprogs \
|
|
||||||
xz-utils \
|
|
||||||
zip \
|
|
||||||
zstd
|
|
||||||
# Switch to use iptables instead of nftables (to match the CI hosts)
|
|
||||||
# TODO use some kind of runtime auto-detection instead if/when nftables is supported (https://github.com/moby/moby/issues/26824)
|
|
||||||
RUN update-alternatives --set iptables /usr/sbin/iptables-legacy || true \
|
|
||||||
&& update-alternatives --set ip6tables /usr/sbin/ip6tables-legacy || true \
|
|
||||||
&& update-alternatives --set arptables /usr/sbin/arptables-legacy || true
|
|
||||||
RUN --mount=type=cache,sharing=locked,id=moby-dev-aptlib,target=/var/lib/apt \
|
|
||||||
--mount=type=cache,sharing=locked,id=moby-dev-aptcache,target=/var/cache/apt \
|
|
||||||
apt-get update && apt-get install --no-install-recommends -y \
|
|
||||||
gcc \
|
|
||||||
pkg-config \
|
|
||||||
dpkg-dev \
|
|
||||||
libapparmor-dev \
|
|
||||||
libseccomp-dev \
|
|
||||||
libsecret-1-dev \
|
|
||||||
libsystemd-dev \
|
|
||||||
libudev-dev \
|
|
||||||
yamllint
|
|
||||||
COPY --link --from=dockercli /build/ /usr/local/cli
|
|
||||||
COPY --link --from=dockercli-integration /build/ /usr/local/cli-integration
|
|
||||||
|
|
||||||
FROM base AS build
|
|
||||||
COPY --from=gowinres /build/ /usr/local/bin/
|
|
||||||
WORKDIR /go/src/github.com/docker/docker
|
|
||||||
ENV GO111MODULE=off
|
|
||||||
ENV CGO_ENABLED=1
|
|
||||||
RUN --mount=type=cache,sharing=locked,id=moby-build-aptlib,target=/var/lib/apt \
|
|
||||||
--mount=type=cache,sharing=locked,id=moby-build-aptcache,target=/var/cache/apt \
|
|
||||||
apt-get update && apt-get install --no-install-recommends -y \
|
|
||||||
clang \
|
|
||||||
lld \
|
|
||||||
llvm
|
|
||||||
ARG TARGETPLATFORM
|
|
||||||
RUN --mount=type=cache,sharing=locked,id=moby-build-aptlib,target=/var/lib/apt \
|
|
||||||
--mount=type=cache,sharing=locked,id=moby-build-aptcache,target=/var/cache/apt \
|
|
||||||
xx-apt-get install --no-install-recommends -y \
|
|
||||||
dpkg-dev \
|
|
||||||
gcc \
|
|
||||||
libapparmor-dev \
|
|
||||||
libc6-dev \
|
|
||||||
libseccomp-dev \
|
|
||||||
libsecret-1-dev \
|
|
||||||
libsystemd-dev \
|
|
||||||
libudev-dev \
|
|
||||||
pkg-config
|
|
||||||
ARG DOCKER_BUILDTAGS
|
|
||||||
ARG DOCKER_DEBUG
|
|
||||||
ARG DOCKER_GITCOMMIT=HEAD
|
|
||||||
ARG DOCKER_LDFLAGS
|
|
||||||
ARG DOCKER_STATIC
|
|
||||||
ARG VERSION
|
|
||||||
ARG PLATFORM
|
|
||||||
ARG PRODUCT
|
|
||||||
ARG DEFAULT_PRODUCT_LICENSE
|
|
||||||
ARG PACKAGER_NAME
|
|
||||||
# PREFIX overrides DEST dir in make.sh script otherwise it fails because of
|
|
||||||
# read only mount in current work dir
|
|
||||||
ENV PREFIX=/tmp
|
|
||||||
RUN <<EOT
|
|
||||||
# in bullseye arm64 target does not link with lld so configure it to use ld instead
|
|
||||||
if [ "$(xx-info arch)" = "arm64" ]; then
|
|
||||||
XX_CC_PREFER_LINKER=ld xx-clang --setup-target-triple
|
|
||||||
fi
|
|
||||||
EOT
|
|
||||||
RUN --mount=type=bind,target=.,rw \
|
|
||||||
--mount=type=tmpfs,target=cli/winresources/dockerd \
|
|
||||||
--mount=type=tmpfs,target=cli/winresources/docker-proxy \
|
|
||||||
--mount=type=cache,target=/root/.cache/go-build,id=moby-build-$TARGETPLATFORM <<EOT
|
|
||||||
set -e
|
|
||||||
target=$([ "$DOCKER_STATIC" = "1" ] && echo "binary" || echo "dynbinary")
|
|
||||||
xx-go --wrap
|
|
||||||
PKG_CONFIG=$(xx-go env PKG_CONFIG) ./hack/make.sh $target
|
|
||||||
xx-verify $([ "$DOCKER_STATIC" = "1" ] && echo "--static") /tmp/bundles/${target}-daemon/dockerd$([ "$(xx-info os)" = "windows" ] && echo ".exe")
|
|
||||||
xx-verify $([ "$DOCKER_STATIC" = "1" ] && echo "--static") /tmp/bundles/${target}-daemon/docker-proxy$([ "$(xx-info os)" = "windows" ] && echo ".exe")
|
|
||||||
mkdir /build
|
|
||||||
mv /tmp/bundles/${target}-daemon/* /build/
|
|
||||||
EOT
|
|
||||||
|
|
||||||
# usage:
|
|
||||||
# > docker buildx bake binary
|
|
||||||
# > DOCKER_STATIC=0 docker buildx bake binary
|
|
||||||
# or
|
|
||||||
# > make binary
|
|
||||||
# > make dynbinary
|
|
||||||
FROM scratch AS binary
|
|
||||||
COPY --from=build /build/ /
|
|
||||||
|
|
||||||
# usage:
|
|
||||||
# > docker buildx bake all
|
|
||||||
FROM scratch AS all
|
|
||||||
COPY --link --from=tini /build/ /
|
|
||||||
COPY --link --from=runc /build/ /
|
|
||||||
COPY --link --from=containerd /build/ /
|
|
||||||
COPY --link --from=rootlesskit /build/ /
|
|
||||||
COPY --link --from=containerutil /build/ /
|
|
||||||
COPY --link --from=vpnkit / /
|
|
||||||
COPY --link --from=build /build /
|
|
||||||
|
|
||||||
# smoke tests
|
|
||||||
# usage:
|
|
||||||
# > docker buildx bake binary-smoketest
|
|
||||||
FROM --platform=$TARGETPLATFORM base AS smoketest
|
|
||||||
WORKDIR /usr/local/bin
|
|
||||||
COPY --from=build /build .
|
|
||||||
RUN <<EOT
|
|
||||||
set -ex
|
|
||||||
file dockerd
|
|
||||||
dockerd --version
|
|
||||||
file docker-proxy
|
|
||||||
docker-proxy --version
|
|
||||||
EOT
|
|
||||||
|
|
||||||
# devcontainer is a stage used by .devcontainer/devcontainer.json
|
|
||||||
FROM dev-base AS devcontainer
|
|
||||||
COPY --link . .
|
|
||||||
COPY --link --from=gopls /build/ /usr/local/bin/
|
|
||||||
|
|
||||||
# usage:
|
|
||||||
# > make shell
|
|
||||||
# > SYSTEMD=true make shell
|
|
||||||
FROM dev-base AS dev
|
|
||||||
COPY --link . .
|
|
||||||
|
|
211
Dockerfile.aarch64
Normal file
211
Dockerfile.aarch64
Normal file
|
@ -0,0 +1,211 @@
|
||||||
|
# This file describes the standard way to build Docker on aarch64, using docker
|
||||||
|
#
|
||||||
|
# Usage:
|
||||||
|
#
|
||||||
|
# # Assemble the full dev environment. This is slow the first time.
|
||||||
|
# docker build -t docker -f Dockerfile.aarch64 .
|
||||||
|
#
|
||||||
|
# # Mount your source in an interactive container for quick testing:
|
||||||
|
# docker run -v `pwd`:/go/src/github.com/docker/docker --privileged -i -t docker bash
|
||||||
|
#
|
||||||
|
# # Run the test suite:
|
||||||
|
# docker run --privileged docker hack/make.sh test
|
||||||
|
#
|
||||||
|
# Note: AppArmor used to mess with privileged mode, but this is no longer
|
||||||
|
# the case. Therefore, you don't have to disable it anymore.
|
||||||
|
#
|
||||||
|
|
||||||
|
FROM aarch64/ubuntu:wily
|
||||||
|
|
||||||
|
# Packaged dependencies
|
||||||
|
RUN apt-get update && apt-get install -y \
|
||||||
|
apparmor \
|
||||||
|
aufs-tools \
|
||||||
|
automake \
|
||||||
|
bash-completion \
|
||||||
|
btrfs-tools \
|
||||||
|
build-essential \
|
||||||
|
createrepo \
|
||||||
|
curl \
|
||||||
|
dpkg-sig \
|
||||||
|
g++ \
|
||||||
|
gcc \
|
||||||
|
git \
|
||||||
|
iptables \
|
||||||
|
jq \
|
||||||
|
libapparmor-dev \
|
||||||
|
libc6-dev \
|
||||||
|
libcap-dev \
|
||||||
|
libltdl-dev \
|
||||||
|
libsqlite3-dev \
|
||||||
|
libsystemd-dev \
|
||||||
|
mercurial \
|
||||||
|
net-tools \
|
||||||
|
parallel \
|
||||||
|
pkg-config \
|
||||||
|
python-dev \
|
||||||
|
python-mock \
|
||||||
|
python-pip \
|
||||||
|
python-websocket \
|
||||||
|
gccgo \
|
||||||
|
--no-install-recommends
|
||||||
|
|
||||||
|
# Install armhf loader to use armv6 binaries on armv8
|
||||||
|
RUN dpkg --add-architecture armhf \
|
||||||
|
&& apt-get update \
|
||||||
|
&& apt-get install -y libc6:armhf
|
||||||
|
|
||||||
|
# Get lvm2 source for compiling statically
|
||||||
|
ENV LVM2_VERSION 2.02.103
|
||||||
|
RUN mkdir -p /usr/local/lvm2 \
|
||||||
|
&& curl -fsSL "https://mirrors.kernel.org/sourceware/lvm2/LVM2.${LVM2_VERSION}.tgz" \
|
||||||
|
| tar -xzC /usr/local/lvm2 --strip-components=1
|
||||||
|
# see https://git.fedorahosted.org/cgit/lvm2.git/refs/tags for release tags
|
||||||
|
|
||||||
|
# fix platform enablement in lvm2 to support aarch64 properly
|
||||||
|
RUN set -e \
|
||||||
|
&& for f in config.guess config.sub; do \
|
||||||
|
curl -fsSL -o "/usr/local/lvm2/autoconf/$f" "http://git.savannah.gnu.org/gitweb/?p=config.git;a=blob_plain;f=$f;hb=HEAD"; \
|
||||||
|
done
|
||||||
|
# "arch.c:78:2: error: #error the arch code needs to know about your machine type"
|
||||||
|
|
||||||
|
# Compile and install lvm2
|
||||||
|
RUN cd /usr/local/lvm2 \
|
||||||
|
&& ./configure \
|
||||||
|
--build="$(gcc -print-multiarch)" \
|
||||||
|
--enable-static_link \
|
||||||
|
&& make device-mapper \
|
||||||
|
&& make install_device-mapper
|
||||||
|
# see https://git.fedorahosted.org/cgit/lvm2.git/tree/INSTALL
|
||||||
|
|
||||||
|
# install seccomp: the version shipped in trusty is too old
|
||||||
|
ENV SECCOMP_VERSION 2.3.1
|
||||||
|
RUN set -x \
|
||||||
|
&& export SECCOMP_PATH="$(mktemp -d)" \
|
||||||
|
&& curl -fsSL "https://github.com/seccomp/libseccomp/releases/download/v${SECCOMP_VERSION}/libseccomp-${SECCOMP_VERSION}.tar.gz" \
|
||||||
|
| tar -xzC "$SECCOMP_PATH" --strip-components=1 \
|
||||||
|
&& ( \
|
||||||
|
cd "$SECCOMP_PATH" \
|
||||||
|
&& ./configure --prefix=/usr/local \
|
||||||
|
&& make \
|
||||||
|
&& make install \
|
||||||
|
&& ldconfig \
|
||||||
|
) \
|
||||||
|
&& rm -rf "$SECCOMP_PATH"
|
||||||
|
|
||||||
|
# Install Go
|
||||||
|
# We don't have official binary tarballs for ARM64, eigher for Go or bootstrap,
|
||||||
|
# so we use the official armv6 released binaries as a GOROOT_BOOTSTRAP, and
|
||||||
|
# build Go from source code.
|
||||||
|
ENV GO_VERSION 1.6.4
|
||||||
|
RUN mkdir /usr/src/go && curl -fsSL https://storage.googleapis.com/golang/go${GO_VERSION}.src.tar.gz | tar -v -C /usr/src/go -xz --strip-components=1 \
|
||||||
|
&& cd /usr/src/go/src \
|
||||||
|
&& GOOS=linux GOARCH=arm64 GOROOT_BOOTSTRAP="$(go env GOROOT)" ./make.bash
|
||||||
|
|
||||||
|
ENV PATH /usr/src/go/bin:$PATH
|
||||||
|
ENV GOPATH /go:/go/src/github.com/docker/docker/vendor
|
||||||
|
|
||||||
|
# Only install one version of the registry, because old version which support
|
||||||
|
# schema1 manifests is not working on ARM64, we should skip integration-cli
|
||||||
|
# tests for schema1 manifests on ARM64.
|
||||||
|
ENV REGISTRY_COMMIT 47a064d4195a9b56133891bbb13620c3ac83a827
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/distribution.git "$GOPATH/src/github.com/docker/distribution" \
|
||||||
|
&& (cd "$GOPATH/src/github.com/docker/distribution" && git checkout -q "$REGISTRY_COMMIT") \
|
||||||
|
&& GOPATH="$GOPATH/src/github.com/docker/distribution/Godeps/_workspace:$GOPATH" \
|
||||||
|
go build -o /usr/local/bin/registry-v2 github.com/docker/distribution/cmd/registry \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Install notary and notary-server
|
||||||
|
ENV NOTARY_VERSION v0.3.0
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/notary.git "$GOPATH/src/github.com/docker/notary" \
|
||||||
|
&& (cd "$GOPATH/src/github.com/docker/notary" && git checkout -q "$NOTARY_VERSION") \
|
||||||
|
&& GOPATH="$GOPATH/src/github.com/docker/notary/vendor:$GOPATH" \
|
||||||
|
go build -o /usr/local/bin/notary-server github.com/docker/notary/cmd/notary-server \
|
||||||
|
&& GOPATH="$GOPATH/src/github.com/docker/notary/vendor:$GOPATH" \
|
||||||
|
go build -o /usr/local/bin/notary github.com/docker/notary/cmd/notary \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Get the "docker-py" source so we can run their integration tests
|
||||||
|
ENV DOCKER_PY_COMMIT 7befe694bd21e3c54bb1d7825270ea4bd6864c13
|
||||||
|
RUN git clone https://github.com/docker/docker-py.git /docker-py \
|
||||||
|
&& cd /docker-py \
|
||||||
|
&& git checkout -q $DOCKER_PY_COMMIT \
|
||||||
|
&& pip install -r test-requirements.txt
|
||||||
|
|
||||||
|
# Set user.email so crosbymichael's in-container merge commits go smoothly
|
||||||
|
RUN git config --global user.email 'docker-dummy@example.com'
|
||||||
|
|
||||||
|
# Add an unprivileged user to be used for tests which need it
|
||||||
|
RUN groupadd -r docker
|
||||||
|
RUN useradd --create-home --gid docker unprivilegeduser
|
||||||
|
|
||||||
|
VOLUME /var/lib/docker
|
||||||
|
WORKDIR /go/src/github.com/docker/docker
|
||||||
|
ENV DOCKER_BUILDTAGS apparmor pkcs11 seccomp selinux
|
||||||
|
|
||||||
|
# Let us use a .bashrc file
|
||||||
|
RUN ln -sfv $PWD/.bashrc ~/.bashrc
|
||||||
|
|
||||||
|
# Register Docker's bash completion.
|
||||||
|
RUN ln -sv $PWD/contrib/completion/bash/docker /etc/bash_completion.d/docker
|
||||||
|
|
||||||
|
# Get useful and necessary Hub images so we can "docker load" locally instead of pulling
|
||||||
|
COPY contrib/download-frozen-image-v2.sh /go/src/github.com/docker/docker/contrib/
|
||||||
|
RUN ./contrib/download-frozen-image-v2.sh /docker-frozen-images \
|
||||||
|
aarch64/buildpack-deps:jessie@sha256:6aa1d6910791b7ac78265fd0798e5abd6cb3f27ae992f6f960f6c303ec9535f2 \
|
||||||
|
aarch64/busybox:latest@sha256:b23a6a37cf269dff6e46d2473b6e227afa42b037e6d23435f1d2bc40fc8c2828 \
|
||||||
|
aarch64/debian:jessie@sha256:4be74a41a7c70ebe887b634b11ffe516cf4fcd56864a54941e56bb49883c3170 \
|
||||||
|
aarch64/hello-world:latest@sha256:65a4a158587b307bb02db4de41b836addb0c35175bdc801367b1ac1ddeb9afda
|
||||||
|
# see also "hack/make/.ensure-frozen-images" (which needs to be updated any time this list is)
|
||||||
|
|
||||||
|
# Download man page generator
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone --depth 1 -b v1.0.5 https://github.com/cpuguy83/go-md2man.git "$GOPATH/src/github.com/cpuguy83/go-md2man" \
|
||||||
|
&& git clone --depth 1 -b v1.4 https://github.com/russross/blackfriday.git "$GOPATH/src/github.com/russross/blackfriday" \
|
||||||
|
&& go get -v -d github.com/cpuguy83/go-md2man \
|
||||||
|
&& go build -v -o /usr/local/bin/go-md2man github.com/cpuguy83/go-md2man \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Download toml validator
|
||||||
|
ENV TOMLV_COMMIT 9baf8a8a9f2ed20a8e54160840c492f937eeaf9a
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/BurntSushi/toml.git "$GOPATH/src/github.com/BurntSushi/toml" \
|
||||||
|
&& (cd "$GOPATH/src/github.com/BurntSushi/toml" && git checkout -q "$TOMLV_COMMIT") \
|
||||||
|
&& go build -v -o /usr/local/bin/tomlv github.com/BurntSushi/toml/cmd/tomlv \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Install runc
|
||||||
|
ENV RUNC_COMMIT 50a19c6ff828c58e5dab13830bd3dacde268afe5
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/runc.git "$GOPATH/src/github.com/opencontainers/runc" \
|
||||||
|
&& cd "$GOPATH/src/github.com/opencontainers/runc" \
|
||||||
|
&& git checkout -q "$RUNC_COMMIT" \
|
||||||
|
&& make static BUILDTAGS="seccomp apparmor selinux" \
|
||||||
|
&& cp runc /usr/local/bin/docker-runc \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Install containerd
|
||||||
|
ENV CONTAINERD_COMMIT 2a5e70cbf65457815ee76b7e5dd2a01292d9eca8
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/containerd.git "$GOPATH/src/github.com/docker/containerd" \
|
||||||
|
&& cd "$GOPATH/src/github.com/docker/containerd" \
|
||||||
|
&& git checkout -q "$CONTAINERD_COMMIT" \
|
||||||
|
&& make static \
|
||||||
|
&& cp bin/containerd /usr/local/bin/docker-containerd \
|
||||||
|
&& cp bin/containerd-shim /usr/local/bin/docker-containerd-shim \
|
||||||
|
&& cp bin/ctr /usr/local/bin/docker-containerd-ctr \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Wrap all commands in the "docker-in-docker" script to allow nested containers
|
||||||
|
ENTRYPOINT ["hack/dind"]
|
||||||
|
|
||||||
|
# Upload docker source
|
||||||
|
COPY . /go/src/github.com/docker/docker
|
219
Dockerfile.armhf
Normal file
219
Dockerfile.armhf
Normal file
|
@ -0,0 +1,219 @@
|
||||||
|
# This file describes the standard way to build Docker on ARMv7, using docker
|
||||||
|
#
|
||||||
|
# Usage:
|
||||||
|
#
|
||||||
|
# # Assemble the full dev environment. This is slow the first time.
|
||||||
|
# docker build -t docker -f Dockerfile.armhf .
|
||||||
|
#
|
||||||
|
# # Mount your source in an interactive container for quick testing:
|
||||||
|
# docker run -v `pwd`:/go/src/github.com/docker/docker --privileged -i -t docker bash
|
||||||
|
#
|
||||||
|
# # Run the test suite:
|
||||||
|
# docker run --privileged docker hack/make.sh test
|
||||||
|
#
|
||||||
|
# Note: AppArmor used to mess with privileged mode, but this is no longer
|
||||||
|
# the case. Therefore, you don't have to disable it anymore.
|
||||||
|
#
|
||||||
|
|
||||||
|
FROM armhf/debian:jessie
|
||||||
|
|
||||||
|
# Packaged dependencies
|
||||||
|
RUN apt-get update && apt-get install -y \
|
||||||
|
apparmor \
|
||||||
|
aufs-tools \
|
||||||
|
automake \
|
||||||
|
bash-completion \
|
||||||
|
btrfs-tools \
|
||||||
|
build-essential \
|
||||||
|
createrepo \
|
||||||
|
curl \
|
||||||
|
dpkg-sig \
|
||||||
|
git \
|
||||||
|
iptables \
|
||||||
|
jq \
|
||||||
|
net-tools \
|
||||||
|
libapparmor-dev \
|
||||||
|
libcap-dev \
|
||||||
|
libltdl-dev \
|
||||||
|
libsqlite3-dev \
|
||||||
|
libsystemd-journal-dev \
|
||||||
|
libtool \
|
||||||
|
mercurial \
|
||||||
|
pkg-config \
|
||||||
|
python-dev \
|
||||||
|
python-mock \
|
||||||
|
python-pip \
|
||||||
|
python-websocket \
|
||||||
|
xfsprogs \
|
||||||
|
tar \
|
||||||
|
--no-install-recommends \
|
||||||
|
&& pip install awscli==1.10.15
|
||||||
|
|
||||||
|
# Get lvm2 source for compiling statically
|
||||||
|
ENV LVM2_VERSION 2.02.103
|
||||||
|
RUN mkdir -p /usr/local/lvm2 \
|
||||||
|
&& curl -fsSL "https://mirrors.kernel.org/sourceware/lvm2/LVM2.${LVM2_VERSION}.tgz" \
|
||||||
|
| tar -xzC /usr/local/lvm2 --strip-components=1
|
||||||
|
# see https://git.fedorahosted.org/cgit/lvm2.git/refs/tags for release tags
|
||||||
|
|
||||||
|
# Compile and install lvm2
|
||||||
|
RUN cd /usr/local/lvm2 \
|
||||||
|
&& ./configure \
|
||||||
|
--build="$(gcc -print-multiarch)" \
|
||||||
|
--enable-static_link \
|
||||||
|
&& make device-mapper \
|
||||||
|
&& make install_device-mapper
|
||||||
|
# see https://git.fedorahosted.org/cgit/lvm2.git/tree/INSTALL
|
||||||
|
|
||||||
|
# Install Go
|
||||||
|
ENV GO_VERSION 1.6.4
|
||||||
|
RUN curl -fsSL "https://storage.googleapis.com/golang/go${GO_VERSION}.linux-armv6l.tar.gz" \
|
||||||
|
| tar -xzC /usr/local
|
||||||
|
ENV PATH /go/bin:/usr/local/go/bin:$PATH
|
||||||
|
ENV GOPATH /go:/go/src/github.com/docker/docker/vendor
|
||||||
|
|
||||||
|
# we're building for armhf, which is ARMv7, so let's be explicit about that
|
||||||
|
ENV GOARCH arm
|
||||||
|
ENV GOARM 7
|
||||||
|
|
||||||
|
# This has been commented out and kept as reference because we don't support compiling with older Go anymore.
|
||||||
|
# ENV GOFMT_VERSION 1.3.3
|
||||||
|
# RUN curl -sSL https://storage.googleapis.com/golang/go${GOFMT_VERSION}.$(go env GOOS)-$(go env GOARCH).tar.gz | tar -C /go/bin -xz --strip-components=2 go/bin/gofmt
|
||||||
|
|
||||||
|
ENV GO_TOOLS_COMMIT 823804e1ae08dbb14eb807afc7db9993bc9e3cc3
|
||||||
|
# Grab Go's cover tool for dead-simple code coverage testing
|
||||||
|
# Grab Go's vet tool for examining go code to find suspicious constructs
|
||||||
|
# and help prevent errors that the compiler might not catch
|
||||||
|
RUN git clone https://github.com/golang/tools.git /go/src/golang.org/x/tools \
|
||||||
|
&& (cd /go/src/golang.org/x/tools && git checkout -q $GO_TOOLS_COMMIT) \
|
||||||
|
&& go install -v golang.org/x/tools/cmd/cover \
|
||||||
|
&& go install -v golang.org/x/tools/cmd/vet
|
||||||
|
# Grab Go's lint tool
|
||||||
|
ENV GO_LINT_COMMIT 32a87160691b3c96046c0c678fe57c5bef761456
|
||||||
|
RUN git clone https://github.com/golang/lint.git /go/src/github.com/golang/lint \
|
||||||
|
&& (cd /go/src/github.com/golang/lint && git checkout -q $GO_LINT_COMMIT) \
|
||||||
|
&& go install -v github.com/golang/lint/golint
|
||||||
|
|
||||||
|
# install seccomp: the version shipped in trusty is too old
|
||||||
|
ENV SECCOMP_VERSION 2.3.1
|
||||||
|
RUN set -x \
|
||||||
|
&& export SECCOMP_PATH="$(mktemp -d)" \
|
||||||
|
&& curl -fsSL "https://github.com/seccomp/libseccomp/releases/download/v${SECCOMP_VERSION}/libseccomp-${SECCOMP_VERSION}.tar.gz" \
|
||||||
|
| tar -xzC "$SECCOMP_PATH" --strip-components=1 \
|
||||||
|
&& ( \
|
||||||
|
cd "$SECCOMP_PATH" \
|
||||||
|
&& ./configure --prefix=/usr/local \
|
||||||
|
&& make \
|
||||||
|
&& make install \
|
||||||
|
&& ldconfig \
|
||||||
|
) \
|
||||||
|
&& rm -rf "$SECCOMP_PATH"
|
||||||
|
|
||||||
|
# Install two versions of the registry. The first is an older version that
|
||||||
|
# only supports schema1 manifests. The second is a newer version that supports
|
||||||
|
# both. This allows integration-cli tests to cover push/pull with both schema1
|
||||||
|
# and schema2 manifests.
|
||||||
|
ENV REGISTRY_COMMIT_SCHEMA1 ec87e9b6971d831f0eff752ddb54fb64693e51cd
|
||||||
|
ENV REGISTRY_COMMIT cb08de17d74bef86ce6c5abe8b240e282f5750be
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/distribution.git "$GOPATH/src/github.com/docker/distribution" \
|
||||||
|
&& (cd "$GOPATH/src/github.com/docker/distribution" && git checkout -q "$REGISTRY_COMMIT") \
|
||||||
|
&& GOPATH="$GOPATH/src/github.com/docker/distribution/Godeps/_workspace:$GOPATH" \
|
||||||
|
go build -o /usr/local/bin/registry-v2 github.com/docker/distribution/cmd/registry \
|
||||||
|
&& (cd "$GOPATH/src/github.com/docker/distribution" && git checkout -q "$REGISTRY_COMMIT_SCHEMA1") \
|
||||||
|
&& GOPATH="$GOPATH/src/github.com/docker/distribution/Godeps/_workspace:$GOPATH" \
|
||||||
|
go build -o /usr/local/bin/registry-v2-schema1 github.com/docker/distribution/cmd/registry \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Install notary and notary-server
|
||||||
|
ENV NOTARY_VERSION v0.3.0
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/notary.git "$GOPATH/src/github.com/docker/notary" \
|
||||||
|
&& (cd "$GOPATH/src/github.com/docker/notary" && git checkout -q "$NOTARY_VERSION") \
|
||||||
|
&& GOPATH="$GOPATH/src/github.com/docker/notary/vendor:$GOPATH" \
|
||||||
|
go build -o /usr/local/bin/notary-server github.com/docker/notary/cmd/notary-server \
|
||||||
|
&& GOPATH="$GOPATH/src/github.com/docker/notary/vendor:$GOPATH" \
|
||||||
|
go build -o /usr/local/bin/notary github.com/docker/notary/cmd/notary \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Get the "docker-py" source so we can run their integration tests
|
||||||
|
ENV DOCKER_PY_COMMIT 7befe694bd21e3c54bb1d7825270ea4bd6864c13
|
||||||
|
RUN git clone https://github.com/docker/docker-py.git /docker-py \
|
||||||
|
&& cd /docker-py \
|
||||||
|
&& git checkout -q $DOCKER_PY_COMMIT \
|
||||||
|
&& pip install -r test-requirements.txt
|
||||||
|
|
||||||
|
# Set user.email so crosbymichael's in-container merge commits go smoothly
|
||||||
|
RUN git config --global user.email 'docker-dummy@example.com'
|
||||||
|
|
||||||
|
# Add an unprivileged user to be used for tests which need it
|
||||||
|
RUN groupadd -r docker
|
||||||
|
RUN useradd --create-home --gid docker unprivilegeduser
|
||||||
|
|
||||||
|
VOLUME /var/lib/docker
|
||||||
|
WORKDIR /go/src/github.com/docker/docker
|
||||||
|
ENV DOCKER_BUILDTAGS apparmor pkcs11 seccomp selinux
|
||||||
|
|
||||||
|
# Let us use a .bashrc file
|
||||||
|
RUN ln -sfv $PWD/.bashrc ~/.bashrc
|
||||||
|
|
||||||
|
# Register Docker's bash completion.
|
||||||
|
RUN ln -sv $PWD/contrib/completion/bash/docker /etc/bash_completion.d/docker
|
||||||
|
|
||||||
|
# Get useful and necessary Hub images so we can "docker load" locally instead of pulling
|
||||||
|
COPY contrib/download-frozen-image-v2.sh /go/src/github.com/docker/docker/contrib/
|
||||||
|
RUN ./contrib/download-frozen-image-v2.sh /docker-frozen-images \
|
||||||
|
armhf/buildpack-deps:jessie@sha256:ca6cce8e5bf5c952129889b5cc15cd6aa8d995d77e55e3749bbaadae50e476cb \
|
||||||
|
armhf/busybox:latest@sha256:d98a7343ac750ffe387e3d514f8521ba69846c216778919b01414b8617cfb3d4 \
|
||||||
|
armhf/debian:jessie@sha256:4a2187483f04a84f9830910fe3581d69b3c985cc045d9f01d8e2f3795b28107b \
|
||||||
|
armhf/hello-world:latest@sha256:161dcecea0225975b2ad5f768058212c1e0d39e8211098666ffa1ac74cfb7791
|
||||||
|
# see also "hack/make/.ensure-frozen-images" (which needs to be updated any time this list is)
|
||||||
|
|
||||||
|
# Download man page generator
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone --depth 1 -b v1.0.5 https://github.com/cpuguy83/go-md2man.git "$GOPATH/src/github.com/cpuguy83/go-md2man" \
|
||||||
|
&& git clone --depth 1 -b v1.4 https://github.com/russross/blackfriday.git "$GOPATH/src/github.com/russross/blackfriday" \
|
||||||
|
&& go get -v -d github.com/cpuguy83/go-md2man \
|
||||||
|
&& go build -v -o /usr/local/bin/go-md2man github.com/cpuguy83/go-md2man \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Download toml validator
|
||||||
|
ENV TOMLV_COMMIT 9baf8a8a9f2ed20a8e54160840c492f937eeaf9a
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/BurntSushi/toml.git "$GOPATH/src/github.com/BurntSushi/toml" \
|
||||||
|
&& (cd "$GOPATH/src/github.com/BurntSushi/toml" && git checkout -q "$TOMLV_COMMIT") \
|
||||||
|
&& go build -v -o /usr/local/bin/tomlv github.com/BurntSushi/toml/cmd/tomlv \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Install runc
|
||||||
|
ENV RUNC_COMMIT 50a19c6ff828c58e5dab13830bd3dacde268afe5
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/runc.git "$GOPATH/src/github.com/opencontainers/runc" \
|
||||||
|
&& cd "$GOPATH/src/github.com/opencontainers/runc" \
|
||||||
|
&& git checkout -q "$RUNC_COMMIT" \
|
||||||
|
&& make static BUILDTAGS="seccomp apparmor selinux" \
|
||||||
|
&& cp runc /usr/local/bin/docker-runc \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Install containerd
|
||||||
|
ENV CONTAINERD_COMMIT 2a5e70cbf65457815ee76b7e5dd2a01292d9eca8
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/containerd.git "$GOPATH/src/github.com/docker/containerd" \
|
||||||
|
&& cd "$GOPATH/src/github.com/docker/containerd" \
|
||||||
|
&& git checkout -q "$CONTAINERD_COMMIT" \
|
||||||
|
&& make static \
|
||||||
|
&& cp bin/containerd /usr/local/bin/docker-containerd \
|
||||||
|
&& cp bin/containerd-shim /usr/local/bin/docker-containerd-shim \
|
||||||
|
&& cp bin/ctr /usr/local/bin/docker-containerd-ctr \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
ENTRYPOINT ["hack/dind"]
|
||||||
|
|
||||||
|
# Upload docker source
|
||||||
|
COPY . /go/src/github.com/docker/docker
|
104
Dockerfile.gccgo
Normal file
104
Dockerfile.gccgo
Normal file
|
@ -0,0 +1,104 @@
|
||||||
|
# This file describes the standard way to build Docker, using docker
|
||||||
|
#
|
||||||
|
# Usage:
|
||||||
|
#
|
||||||
|
# # Assemble the full dev environment. This is slow the first time.
|
||||||
|
# docker build -t docker -f Dockerfile.gccgo .
|
||||||
|
#
|
||||||
|
|
||||||
|
FROM gcc:6.1
|
||||||
|
|
||||||
|
# Packaged dependencies
|
||||||
|
RUN apt-get update && apt-get install -y \
|
||||||
|
apparmor \
|
||||||
|
aufs-tools \
|
||||||
|
btrfs-tools \
|
||||||
|
build-essential \
|
||||||
|
curl \
|
||||||
|
git \
|
||||||
|
iptables \
|
||||||
|
jq \
|
||||||
|
net-tools \
|
||||||
|
libapparmor-dev \
|
||||||
|
libcap-dev \
|
||||||
|
libsqlite3-dev \
|
||||||
|
mercurial \
|
||||||
|
net-tools \
|
||||||
|
parallel \
|
||||||
|
python-dev \
|
||||||
|
python-mock \
|
||||||
|
python-pip \
|
||||||
|
python-websocket \
|
||||||
|
--no-install-recommends
|
||||||
|
|
||||||
|
# Get lvm2 source for compiling statically
|
||||||
|
RUN git clone -b v2_02_103 https://git.fedorahosted.org/git/lvm2.git /usr/local/lvm2
|
||||||
|
# see https://git.fedorahosted.org/cgit/lvm2.git/refs/tags for release tags
|
||||||
|
|
||||||
|
# Compile and install lvm2
|
||||||
|
RUN cd /usr/local/lvm2 \
|
||||||
|
&& ./configure --enable-static_link \
|
||||||
|
&& make device-mapper \
|
||||||
|
&& make install_device-mapper
|
||||||
|
# see https://git.fedorahosted.org/cgit/lvm2.git/tree/INSTALL
|
||||||
|
|
||||||
|
# install seccomp: the version shipped in jessie is too old
|
||||||
|
ENV SECCOMP_VERSION v2.3.1
|
||||||
|
RUN set -x \
|
||||||
|
&& export SECCOMP_PATH=$(mktemp -d) \
|
||||||
|
&& git clone https://github.com/seccomp/libseccomp.git "$SECCOMP_PATH" \
|
||||||
|
&& ( \
|
||||||
|
cd "$SECCOMP_PATH" \
|
||||||
|
&& git checkout "$SECCOMP_VERSION" \
|
||||||
|
&& ./autogen.sh \
|
||||||
|
&& ./configure --prefix=/usr \
|
||||||
|
&& make \
|
||||||
|
&& make install \
|
||||||
|
) \
|
||||||
|
&& rm -rf "$SECCOMP_PATH"
|
||||||
|
|
||||||
|
ENV GOPATH /go:/go/src/github.com/docker/docker/vendor
|
||||||
|
|
||||||
|
# Get the "docker-py" source so we can run their integration tests
|
||||||
|
ENV DOCKER_PY_COMMIT 7befe694bd21e3c54bb1d7825270ea4bd6864c13
|
||||||
|
RUN git clone https://github.com/docker/docker-py.git /docker-py \
|
||||||
|
&& cd /docker-py \
|
||||||
|
&& git checkout -q $DOCKER_PY_COMMIT
|
||||||
|
|
||||||
|
# Add an unprivileged user to be used for tests which need it
|
||||||
|
RUN groupadd -r docker
|
||||||
|
RUN useradd --create-home --gid docker unprivilegeduser
|
||||||
|
|
||||||
|
VOLUME /var/lib/docker
|
||||||
|
WORKDIR /go/src/github.com/docker/docker
|
||||||
|
ENV DOCKER_BUILDTAGS apparmor seccomp selinux
|
||||||
|
|
||||||
|
# Install runc
|
||||||
|
ENV RUNC_COMMIT 50a19c6ff828c58e5dab13830bd3dacde268afe5
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/runc.git "$GOPATH/src/github.com/opencontainers/runc" \
|
||||||
|
&& cd "$GOPATH/src/github.com/opencontainers/runc" \
|
||||||
|
&& git checkout -q "$RUNC_COMMIT" \
|
||||||
|
&& make static BUILDTAGS="seccomp apparmor selinux" \
|
||||||
|
&& cp runc /usr/local/bin/docker-runc \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Install containerd
|
||||||
|
ENV CONTAINERD_COMMIT 2a5e70cbf65457815ee76b7e5dd2a01292d9eca8
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/containerd.git "$GOPATH/src/github.com/docker/containerd" \
|
||||||
|
&& cd "$GOPATH/src/github.com/docker/containerd" \
|
||||||
|
&& git checkout -q "$CONTAINERD_COMMIT" \
|
||||||
|
&& make static \
|
||||||
|
&& cp bin/containerd /usr/local/bin/docker-containerd \
|
||||||
|
&& cp bin/containerd-shim /usr/local/bin/docker-containerd-shim \
|
||||||
|
&& cp bin/ctr /usr/local/bin/docker-containerd-ctr \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Wrap all commands in the "docker-in-docker" script to allow nested containers
|
||||||
|
ENTRYPOINT ["hack/dind"]
|
||||||
|
|
||||||
|
# Upload docker source
|
||||||
|
COPY . /go/src/github.com/docker/docker
|
225
Dockerfile.ppc64le
Normal file
225
Dockerfile.ppc64le
Normal file
|
@ -0,0 +1,225 @@
|
||||||
|
# This file describes the standard way to build Docker on ppc64le, using docker
|
||||||
|
#
|
||||||
|
# Usage:
|
||||||
|
#
|
||||||
|
# # Assemble the full dev environment. This is slow the first time.
|
||||||
|
# docker build -t docker -f Dockerfile.ppc64le .
|
||||||
|
#
|
||||||
|
# # Mount your source in an interactive container for quick testing:
|
||||||
|
# docker run -v `pwd`:/go/src/github.com/docker/docker --privileged -i -t docker bash
|
||||||
|
#
|
||||||
|
# # Run the test suite:
|
||||||
|
# docker run --privileged docker hack/make.sh test
|
||||||
|
#
|
||||||
|
# Note: AppArmor used to mess with privileged mode, but this is no longer
|
||||||
|
# the case. Therefore, you don't have to disable it anymore.
|
||||||
|
#
|
||||||
|
|
||||||
|
FROM ppc64le/debian:jessie
|
||||||
|
|
||||||
|
# Packaged dependencies
|
||||||
|
RUN apt-get update && apt-get install -y \
|
||||||
|
apparmor \
|
||||||
|
aufs-tools \
|
||||||
|
automake \
|
||||||
|
bash-completion \
|
||||||
|
btrfs-tools \
|
||||||
|
build-essential \
|
||||||
|
createrepo \
|
||||||
|
curl \
|
||||||
|
dpkg-sig \
|
||||||
|
git \
|
||||||
|
iptables \
|
||||||
|
jq \
|
||||||
|
net-tools \
|
||||||
|
libapparmor-dev \
|
||||||
|
libcap-dev \
|
||||||
|
libltdl-dev \
|
||||||
|
libsqlite3-dev \
|
||||||
|
libsystemd-journal-dev \
|
||||||
|
libtool \
|
||||||
|
mercurial \
|
||||||
|
pkg-config \
|
||||||
|
python-dev \
|
||||||
|
python-mock \
|
||||||
|
python-pip \
|
||||||
|
python-websocket \
|
||||||
|
xfsprogs \
|
||||||
|
tar \
|
||||||
|
--no-install-recommends
|
||||||
|
|
||||||
|
# Get lvm2 source for compiling statically
|
||||||
|
ENV LVM2_VERSION 2.02.103
|
||||||
|
RUN mkdir -p /usr/local/lvm2 \
|
||||||
|
&& curl -fsSL "https://mirrors.kernel.org/sourceware/lvm2/LVM2.${LVM2_VERSION}.tgz" \
|
||||||
|
| tar -xzC /usr/local/lvm2 --strip-components=1
|
||||||
|
# see https://git.fedorahosted.org/cgit/lvm2.git/refs/tags for release tags
|
||||||
|
|
||||||
|
# fix platform enablement in lvm2 to support ppc64le properly
|
||||||
|
RUN set -e \
|
||||||
|
&& for f in config.guess config.sub; do \
|
||||||
|
curl -fsSL -o "/usr/local/lvm2/autoconf/$f" "http://git.savannah.gnu.org/gitweb/?p=config.git;a=blob_plain;f=$f;hb=HEAD"; \
|
||||||
|
done
|
||||||
|
# "arch.c:78:2: error: #error the arch code needs to know about your machine type"
|
||||||
|
|
||||||
|
# Compile and install lvm2
|
||||||
|
RUN cd /usr/local/lvm2 \
|
||||||
|
&& ./configure \
|
||||||
|
--build="$(gcc -print-multiarch)" \
|
||||||
|
--enable-static_link \
|
||||||
|
&& make device-mapper \
|
||||||
|
&& make install_device-mapper
|
||||||
|
# see https://git.fedorahosted.org/cgit/lvm2.git/tree/INSTALL
|
||||||
|
|
||||||
|
# install seccomp: the version shipped in jessie is too old
|
||||||
|
ENV SECCOMP_VERSION 2.3.1
|
||||||
|
RUN set -x \
|
||||||
|
&& export SECCOMP_PATH="$(mktemp -d)" \
|
||||||
|
&& curl -fsSL "https://github.com/seccomp/libseccomp/releases/download/v${SECCOMP_VERSION}/libseccomp-${SECCOMP_VERSION}.tar.gz" \
|
||||||
|
| tar -xzC "$SECCOMP_PATH" --strip-components=1 \
|
||||||
|
&& ( \
|
||||||
|
cd "$SECCOMP_PATH" \
|
||||||
|
&& ./configure --prefix=/usr/local \
|
||||||
|
&& make \
|
||||||
|
&& make install \
|
||||||
|
&& ldconfig \
|
||||||
|
) \
|
||||||
|
&& rm -rf "$SECCOMP_PATH"
|
||||||
|
|
||||||
|
|
||||||
|
# Install Go
|
||||||
|
# NOTE: official ppc64le go binaries weren't available until go 1.6.4 and 1.7.4
|
||||||
|
ENV GO_VERSION 1.6.4
|
||||||
|
RUN curl -fsSL "https://golang.org/dl/go${GO_VERSION}.linux-ppc64le.tar.gz" \
|
||||||
|
| tar -xzC /usr/local
|
||||||
|
|
||||||
|
ENV PATH /go/bin:/usr/local/go/bin:$PATH
|
||||||
|
ENV GOPATH /go:/go/src/github.com/docker/docker/vendor
|
||||||
|
|
||||||
|
# This has been commented out and kept as reference because we don't support compiling with older Go anymore.
|
||||||
|
# ENV GOFMT_VERSION 1.3.3
|
||||||
|
# RUN curl -sSL https://storage.googleapis.com/golang/go${GOFMT_VERSION}.$(go env GOOS)-$(go env GOARCH).tar.gz | tar -C /go/bin -xz --strip-components=2 go/bin/gofmt
|
||||||
|
|
||||||
|
ENV GO_TOOLS_COMMIT 823804e1ae08dbb14eb807afc7db9993bc9e3cc3
|
||||||
|
# Grab Go's cover tool for dead-simple code coverage testing
|
||||||
|
# Grab Go's vet tool for examining go code to find suspicious constructs
|
||||||
|
# and help prevent errors that the compiler might not catch
|
||||||
|
RUN git clone https://github.com/golang/tools.git /go/src/golang.org/x/tools \
|
||||||
|
&& (cd /go/src/golang.org/x/tools && git checkout -q $GO_TOOLS_COMMIT) \
|
||||||
|
&& go install -v golang.org/x/tools/cmd/cover \
|
||||||
|
&& go install -v golang.org/x/tools/cmd/vet
|
||||||
|
# Grab Go's lint tool
|
||||||
|
ENV GO_LINT_COMMIT 32a87160691b3c96046c0c678fe57c5bef761456
|
||||||
|
RUN git clone https://github.com/golang/lint.git /go/src/github.com/golang/lint \
|
||||||
|
&& (cd /go/src/github.com/golang/lint && git checkout -q $GO_LINT_COMMIT) \
|
||||||
|
&& go install -v github.com/golang/lint/golint
|
||||||
|
|
||||||
|
# Install two versions of the registry. The first is an older version that
|
||||||
|
# only supports schema1 manifests. The second is a newer version that supports
|
||||||
|
# both. This allows integration-cli tests to cover push/pull with both schema1
|
||||||
|
# and schema2 manifests.
|
||||||
|
ENV REGISTRY_COMMIT_SCHEMA1 ec87e9b6971d831f0eff752ddb54fb64693e51cd
|
||||||
|
ENV REGISTRY_COMMIT 47a064d4195a9b56133891bbb13620c3ac83a827
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/distribution.git "$GOPATH/src/github.com/docker/distribution" \
|
||||||
|
&& (cd "$GOPATH/src/github.com/docker/distribution" && git checkout -q "$REGISTRY_COMMIT") \
|
||||||
|
&& GOPATH="$GOPATH/src/github.com/docker/distribution/Godeps/_workspace:$GOPATH" \
|
||||||
|
go build -o /usr/local/bin/registry-v2 github.com/docker/distribution/cmd/registry \
|
||||||
|
&& (cd "$GOPATH/src/github.com/docker/distribution" && git checkout -q "$REGISTRY_COMMIT_SCHEMA1") \
|
||||||
|
&& GOPATH="$GOPATH/src/github.com/docker/distribution/Godeps/_workspace:$GOPATH" \
|
||||||
|
go build -o /usr/local/bin/registry-v2-schema1 github.com/docker/distribution/cmd/registry \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Install notary and notary-server
|
||||||
|
ENV NOTARY_VERSION v0.3.0
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/notary.git "$GOPATH/src/github.com/docker/notary" \
|
||||||
|
&& (cd "$GOPATH/src/github.com/docker/notary" && git checkout -q "$NOTARY_VERSION") \
|
||||||
|
&& GOPATH="$GOPATH/src/github.com/docker/notary/Godeps/_workspace:$GOPATH" \
|
||||||
|
go build -o /usr/local/bin/notary-server github.com/docker/notary/cmd/notary-server \
|
||||||
|
&& GOPATH="$GOPATH/src/github.com/docker/notary/Godeps/_workspace:$GOPATH" \
|
||||||
|
go build -o /usr/local/bin/notary github.com/docker/notary/cmd/notary \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Get the "docker-py" source so we can run their integration tests
|
||||||
|
ENV DOCKER_PY_COMMIT 7befe694bd21e3c54bb1d7825270ea4bd6864c13
|
||||||
|
RUN git clone https://github.com/docker/docker-py.git /docker-py \
|
||||||
|
&& cd /docker-py \
|
||||||
|
&& git checkout -q $DOCKER_PY_COMMIT \
|
||||||
|
&& pip install -r test-requirements.txt
|
||||||
|
|
||||||
|
# Set user.email so crosbymichael's in-container merge commits go smoothly
|
||||||
|
RUN git config --global user.email 'docker-dummy@example.com'
|
||||||
|
|
||||||
|
# Add an unprivileged user to be used for tests which need it
|
||||||
|
RUN groupadd -r docker
|
||||||
|
RUN useradd --create-home --gid docker unprivilegeduser
|
||||||
|
|
||||||
|
VOLUME /var/lib/docker
|
||||||
|
WORKDIR /go/src/github.com/docker/docker
|
||||||
|
ENV DOCKER_BUILDTAGS apparmor pkcs11 seccomp selinux
|
||||||
|
|
||||||
|
# Let us use a .bashrc file
|
||||||
|
RUN ln -sfv $PWD/.bashrc ~/.bashrc
|
||||||
|
|
||||||
|
# Register Docker's bash completion.
|
||||||
|
RUN ln -sv $PWD/contrib/completion/bash/docker /etc/bash_completion.d/docker
|
||||||
|
|
||||||
|
# Get useful and necessary Hub images so we can "docker load" locally instead of pulling
|
||||||
|
COPY contrib/download-frozen-image-v2.sh /go/src/github.com/docker/docker/contrib/
|
||||||
|
RUN ./contrib/download-frozen-image-v2.sh /docker-frozen-images \
|
||||||
|
ppc64le/buildpack-deps:jessie@sha256:902bfe4ef1389f94d143d64516dd50a2de75bca2e66d4a44b1d73f63ddf05dda \
|
||||||
|
ppc64le/busybox:latest@sha256:38bb82085248d5a3c24bd7a5dc146f2f2c191e189da0441f1c2ca560e3fc6f1b \
|
||||||
|
ppc64le/debian:jessie@sha256:412845f51b6ab662afba71bc7a716e20fdb9b84f185d180d4c7504f8a75c4f91 \
|
||||||
|
ppc64le/hello-world:latest@sha256:186a40a9a02ca26df0b6c8acdfb8ac2f3ae6678996a838f977e57fac9d963974
|
||||||
|
# see also "hack/make/.ensure-frozen-images" (which needs to be updated any time this list is)
|
||||||
|
|
||||||
|
# Download man page generator
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone --depth 1 -b v1.0.5 https://github.com/cpuguy83/go-md2man.git "$GOPATH/src/github.com/cpuguy83/go-md2man" \
|
||||||
|
&& git clone --depth 1 -b v1.4 https://github.com/russross/blackfriday.git "$GOPATH/src/github.com/russross/blackfriday" \
|
||||||
|
&& go get -v -d github.com/cpuguy83/go-md2man \
|
||||||
|
&& go build -v -o /usr/local/bin/go-md2man github.com/cpuguy83/go-md2man \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Download toml validator
|
||||||
|
ENV TOMLV_COMMIT 9baf8a8a9f2ed20a8e54160840c492f937eeaf9a
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/BurntSushi/toml.git "$GOPATH/src/github.com/BurntSushi/toml" \
|
||||||
|
&& (cd "$GOPATH/src/github.com/BurntSushi/toml" && git checkout -q "$TOMLV_COMMIT") \
|
||||||
|
&& go build -v -o /usr/local/bin/tomlv github.com/BurntSushi/toml/cmd/tomlv \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Install runc
|
||||||
|
ENV RUNC_COMMIT 50a19c6ff828c58e5dab13830bd3dacde268afe5
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/runc.git "$GOPATH/src/github.com/opencontainers/runc" \
|
||||||
|
&& cd "$GOPATH/src/github.com/opencontainers/runc" \
|
||||||
|
&& git checkout -q "$RUNC_COMMIT" \
|
||||||
|
&& make static BUILDTAGS="apparmor seccomp selinux" \
|
||||||
|
&& cp runc /usr/local/bin/docker-runc \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Install containerd
|
||||||
|
ENV CONTAINERD_COMMIT 2a5e70cbf65457815ee76b7e5dd2a01292d9eca8
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/containerd.git "$GOPATH/src/github.com/docker/containerd" \
|
||||||
|
&& cd "$GOPATH/src/github.com/docker/containerd" \
|
||||||
|
&& git checkout -q "$CONTAINERD_COMMIT" \
|
||||||
|
&& make static \
|
||||||
|
&& cp bin/containerd /usr/local/bin/docker-containerd \
|
||||||
|
&& cp bin/containerd-shim /usr/local/bin/docker-containerd-shim \
|
||||||
|
&& cp bin/ctr /usr/local/bin/docker-containerd-ctr \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Wrap all commands in the "docker-in-docker" script to allow nested containers
|
||||||
|
ENTRYPOINT ["hack/dind"]
|
||||||
|
|
||||||
|
# Upload docker source
|
||||||
|
COPY . /go/src/github.com/docker/docker
|
227
Dockerfile.s390x
Normal file
227
Dockerfile.s390x
Normal file
|
@ -0,0 +1,227 @@
|
||||||
|
# This file describes the standard way to build Docker on s390x, using docker
|
||||||
|
#
|
||||||
|
# Usage:
|
||||||
|
#
|
||||||
|
# # Assemble the full dev environment. This is slow the first time.
|
||||||
|
# docker build -t docker -f Dockerfile.s390x .
|
||||||
|
#
|
||||||
|
# # Mount your source in an interactive container for quick testing:
|
||||||
|
# docker run -v `pwd`:/go/src/github.com/docker/docker --privileged -i -t docker bash
|
||||||
|
#
|
||||||
|
# # Run the test suite:
|
||||||
|
# docker run --privileged docker hack/make.sh test
|
||||||
|
#
|
||||||
|
# Note: AppArmor used to mess with privileged mode, but this is no longer
|
||||||
|
# the case. Therefore, you don't have to disable it anymore.
|
||||||
|
#
|
||||||
|
|
||||||
|
FROM s390x/gcc:6.1
|
||||||
|
|
||||||
|
# Packaged dependencies
|
||||||
|
RUN apt-get update && apt-get install -y \
|
||||||
|
apparmor \
|
||||||
|
aufs-tools \
|
||||||
|
automake \
|
||||||
|
bash-completion \
|
||||||
|
btrfs-tools \
|
||||||
|
build-essential \
|
||||||
|
createrepo \
|
||||||
|
curl \
|
||||||
|
dpkg-sig \
|
||||||
|
git \
|
||||||
|
iptables \
|
||||||
|
jq \
|
||||||
|
net-tools \
|
||||||
|
libapparmor-dev \
|
||||||
|
libcap-dev \
|
||||||
|
libltdl-dev \
|
||||||
|
libsqlite3-dev \
|
||||||
|
libsystemd-journal-dev \
|
||||||
|
libtool \
|
||||||
|
mercurial \
|
||||||
|
pkg-config \
|
||||||
|
python-dev \
|
||||||
|
python-mock \
|
||||||
|
python-pip \
|
||||||
|
python-websocket \
|
||||||
|
xfsprogs \
|
||||||
|
tar \
|
||||||
|
--no-install-recommends
|
||||||
|
|
||||||
|
# install seccomp: the version shipped in jessie is too old
|
||||||
|
ENV SECCOMP_VERSION 2.3.1
|
||||||
|
RUN set -x \
|
||||||
|
&& export SECCOMP_PATH="$(mktemp -d)" \
|
||||||
|
&& curl -fsSL "https://github.com/seccomp/libseccomp/releases/download/v${SECCOMP_VERSION}/libseccomp-${SECCOMP_VERSION}.tar.gz" \
|
||||||
|
| tar -xzC "$SECCOMP_PATH" --strip-components=1 \
|
||||||
|
&& ( \
|
||||||
|
cd "$SECCOMP_PATH" \
|
||||||
|
&& ./configure --prefix=/usr/local \
|
||||||
|
&& make \
|
||||||
|
&& make install \
|
||||||
|
&& ldconfig \
|
||||||
|
) \
|
||||||
|
&& rm -rf "$SECCOMP_PATH"
|
||||||
|
|
||||||
|
# Get lvm2 source for compiling statically
|
||||||
|
ENV LVM2_VERSION 2.02.103
|
||||||
|
RUN mkdir -p /usr/local/lvm2 \
|
||||||
|
&& curl -fsSL "https://mirrors.kernel.org/sourceware/lvm2/LVM2.${LVM2_VERSION}.tgz" \
|
||||||
|
| tar -xzC /usr/local/lvm2 --strip-components=1
|
||||||
|
# see https://git.fedorahosted.org/cgit/lvm2.git/refs/tags for release tags
|
||||||
|
|
||||||
|
# fix platform enablement in lvm2 to support s390x properly
|
||||||
|
RUN set -e \
|
||||||
|
&& for f in config.guess config.sub; do \
|
||||||
|
curl -fsSL -o "/usr/local/lvm2/autoconf/$f" "http://git.savannah.gnu.org/gitweb/?p=config.git;a=blob_plain;f=$f;hb=HEAD"; \
|
||||||
|
done
|
||||||
|
# "arch.c:78:2: error: #error the arch code needs to know about your machine type"
|
||||||
|
|
||||||
|
# Compile and install lvm2
|
||||||
|
RUN cd /usr/local/lvm2 \
|
||||||
|
&& ./configure \
|
||||||
|
--build="$(gcc -print-multiarch)" \
|
||||||
|
--enable-static_link \
|
||||||
|
&& make device-mapper \
|
||||||
|
&& make install_device-mapper
|
||||||
|
# see https://git.fedorahosted.org/cgit/lvm2.git/tree/INSTALL
|
||||||
|
|
||||||
|
# Note: Go comes from the base image (gccgo, specifically)
|
||||||
|
# We can't compile Go proper because s390x isn't an officially supported architecture yet.
|
||||||
|
|
||||||
|
ENV PATH /go/bin:$PATH
|
||||||
|
ENV GOPATH /go:/go/src/github.com/docker/docker/vendor
|
||||||
|
|
||||||
|
# This has been commented out and kept as reference because we don't support compiling with older Go anymore.
|
||||||
|
# ENV GOFMT_VERSION 1.3.3
|
||||||
|
# RUN curl -sSL https://storage.googleapis.com/golang/go${GOFMT_VERSION}.$(go env GOOS)-$(go env GOARCH).tar.gz | tar -C /go/bin -xz --strip-components=2 go/bin/gofmt
|
||||||
|
|
||||||
|
# TODO update this sha when we upgrade to Go 1.5+
|
||||||
|
ENV GO_TOOLS_COMMIT 069d2f3bcb68257b627205f0486d6cc69a231ff9
|
||||||
|
# Grab Go's cover tool for dead-simple code coverage testing
|
||||||
|
# Grab Go's vet tool for examining go code to find suspicious constructs
|
||||||
|
# and help prevent errors that the compiler might not catch
|
||||||
|
RUN git clone https://github.com/golang/tools.git /go/src/golang.org/x/tools \
|
||||||
|
&& (cd /go/src/golang.org/x/tools && git checkout -q $GO_TOOLS_COMMIT) \
|
||||||
|
&& go install -v golang.org/x/tools/cmd/cover \
|
||||||
|
&& go install -v golang.org/x/tools/cmd/vet
|
||||||
|
# Grab Go's lint tool
|
||||||
|
ENV GO_LINT_COMMIT f42f5c1c440621302702cb0741e9d2ca547ae80f
|
||||||
|
RUN git clone https://github.com/golang/lint.git /go/src/github.com/golang/lint \
|
||||||
|
&& (cd /go/src/github.com/golang/lint && git checkout -q $GO_LINT_COMMIT) \
|
||||||
|
&& go install -v github.com/golang/lint/golint
|
||||||
|
|
||||||
|
|
||||||
|
# Install two versions of the registry. The first is an older version that
|
||||||
|
# only supports schema1 manifests. The second is a newer version that supports
|
||||||
|
# both. This allows integration-cli tests to cover push/pull with both schema1
|
||||||
|
# and schema2 manifests.
|
||||||
|
ENV REGISTRY_COMMIT_SCHEMA1 ec87e9b6971d831f0eff752ddb54fb64693e51cd
|
||||||
|
ENV REGISTRY_COMMIT 47a064d4195a9b56133891bbb13620c3ac83a827
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/distribution.git "$GOPATH/src/github.com/docker/distribution" \
|
||||||
|
&& (cd "$GOPATH/src/github.com/docker/distribution" && git checkout -q "$REGISTRY_COMMIT") \
|
||||||
|
&& GOPATH="$GOPATH/src/github.com/docker/distribution/Godeps/_workspace:$GOPATH" \
|
||||||
|
go build -o /usr/local/bin/registry-v2 github.com/docker/distribution/cmd/registry \
|
||||||
|
&& (cd "$GOPATH/src/github.com/docker/distribution" && git checkout -q "$REGISTRY_COMMIT_SCHEMA1") \
|
||||||
|
&& GOPATH="$GOPATH/src/github.com/docker/distribution/Godeps/_workspace:$GOPATH" \
|
||||||
|
go build -o /usr/local/bin/registry-v2-schema1 github.com/docker/distribution/cmd/registry \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Install notary and notary-server
|
||||||
|
#
|
||||||
|
# Note: We have to explicitly set GO15VENDOREXPERIMENT=0 because gccgo does not
|
||||||
|
# support vendoring: https://github.com/golang/go/issues/15628
|
||||||
|
ENV NOTARY_VERSION v0.3.0
|
||||||
|
RUN set -x \
|
||||||
|
&& export GO15VENDOREXPERIMENT=0 \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/notary.git "$GOPATH/src/github.com/docker/notary" \
|
||||||
|
&& (cd "$GOPATH/src/github.com/docker/notary" && git checkout -q "$NOTARY_VERSION" && ln -s . vendor/src) \
|
||||||
|
&& GOPATH="$GOPATH/src/github.com/docker/notary/vendor:$GOPATH" \
|
||||||
|
go build -o /usr/local/bin/notary-server github.com/docker/notary/cmd/notary-server \
|
||||||
|
&& GOPATH="$GOPATH/src/github.com/docker/notary/vendor:$GOPATH" \
|
||||||
|
go build -o /usr/local/bin/notary github.com/docker/notary/cmd/notary \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Get the "docker-py" source so we can run their integration tests
|
||||||
|
ENV DOCKER_PY_COMMIT 7befe694bd21e3c54bb1d7825270ea4bd6864c13
|
||||||
|
RUN git clone https://github.com/docker/docker-py.git /docker-py \
|
||||||
|
&& cd /docker-py \
|
||||||
|
&& git checkout -q $DOCKER_PY_COMMIT \
|
||||||
|
&& pip install -r test-requirements.txt
|
||||||
|
|
||||||
|
# Set user.email so crosbymichael's in-container merge commits go smoothly
|
||||||
|
RUN git config --global user.email 'docker-dummy@example.com'
|
||||||
|
|
||||||
|
# Add an unprivileged user to be used for tests which need it
|
||||||
|
RUN groupadd -r docker
|
||||||
|
RUN useradd --create-home --gid docker unprivilegeduser
|
||||||
|
|
||||||
|
VOLUME /var/lib/docker
|
||||||
|
WORKDIR /go/src/github.com/docker/docker
|
||||||
|
ENV DOCKER_BUILDTAGS apparmor selinux seccomp
|
||||||
|
|
||||||
|
# Let us use a .bashrc file
|
||||||
|
RUN ln -sfv $PWD/.bashrc ~/.bashrc
|
||||||
|
|
||||||
|
# Register Docker's bash completion.
|
||||||
|
RUN ln -sv $PWD/contrib/completion/bash/docker /etc/bash_completion.d/docker
|
||||||
|
|
||||||
|
# Get useful and necessary Hub images so we can "docker load" locally instead of pulling
|
||||||
|
COPY contrib/download-frozen-image-v2.sh /go/src/github.com/docker/docker/contrib/
|
||||||
|
RUN ./contrib/download-frozen-image-v2.sh /docker-frozen-images \
|
||||||
|
s390x/buildpack-deps:jessie@sha256:4d1381224acaca6c4bfe3604de3af6972083a8558a99672cb6989c7541780099 \
|
||||||
|
s390x/busybox:latest@sha256:dd61522c983884a66ed72d60301925889028c6d2d5e0220a8fe1d9b4c6a4f01b \
|
||||||
|
s390x/debian:jessie@sha256:b74c863400909eff3c5e196cac9bfd1f6333ce47aae6a38398d87d5875da170a \
|
||||||
|
s390x/hello-world:latest@sha256:780d80b3a7677c3788c0d5cd9168281320c8d4a6d9183892d8ee5cdd610f5699
|
||||||
|
# see also "hack/make/.ensure-frozen-images" (which needs to be updated any time this list is)
|
||||||
|
|
||||||
|
# Download man page generator
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone --depth 1 -b v1.0.5 https://github.com/cpuguy83/go-md2man.git "$GOPATH/src/github.com/cpuguy83/go-md2man" \
|
||||||
|
&& git clone --depth 1 -b v1.4 https://github.com/russross/blackfriday.git "$GOPATH/src/github.com/russross/blackfriday" \
|
||||||
|
&& go get -v -d github.com/cpuguy83/go-md2man \
|
||||||
|
&& go build -v -o /usr/local/bin/go-md2man github.com/cpuguy83/go-md2man \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Download toml validator
|
||||||
|
ENV TOMLV_COMMIT 9baf8a8a9f2ed20a8e54160840c492f937eeaf9a
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/BurntSushi/toml.git "$GOPATH/src/github.com/BurntSushi/toml" \
|
||||||
|
&& (cd "$GOPATH/src/github.com/BurntSushi/toml" && git checkout -q "$TOMLV_COMMIT") \
|
||||||
|
&& go build -v -o /usr/local/bin/tomlv github.com/BurntSushi/toml/cmd/tomlv \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Install runc
|
||||||
|
ENV RUNC_COMMIT 50a19c6ff828c58e5dab13830bd3dacde268afe5
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/runc.git "$GOPATH/src/github.com/opencontainers/runc" \
|
||||||
|
&& cd "$GOPATH/src/github.com/opencontainers/runc" \
|
||||||
|
&& git checkout -q "$RUNC_COMMIT" \
|
||||||
|
&& make static BUILDTAGS="seccomp apparmor selinux" \
|
||||||
|
&& cp runc /usr/local/bin/docker-runc \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Install containerd
|
||||||
|
ENV CONTAINERD_COMMIT 2a5e70cbf65457815ee76b7e5dd2a01292d9eca8
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/containerd.git "$GOPATH/src/github.com/docker/containerd" \
|
||||||
|
&& cd "$GOPATH/src/github.com/docker/containerd" \
|
||||||
|
&& git checkout -q "$CONTAINERD_COMMIT" \
|
||||||
|
&& make static \
|
||||||
|
&& cp bin/containerd /usr/local/bin/docker-containerd \
|
||||||
|
&& cp bin/containerd-shim /usr/local/bin/docker-containerd-shim \
|
||||||
|
&& cp bin/ctr /usr/local/bin/docker-containerd-ctr \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Wrap all commands in the "docker-in-docker" script to allow nested containers
|
||||||
|
ENTRYPOINT ["hack/dind"]
|
||||||
|
|
||||||
|
# Upload docker source
|
||||||
|
COPY . /go/src/github.com/docker/docker
|
|
@ -1,48 +1,84 @@
|
||||||
# docker build -t docker:simple -f Dockerfile.simple .
|
# docker build -t docker:simple -f Dockerfile.simple .
|
||||||
# docker run --rm docker:simple hack/make.sh dynbinary
|
# docker run --rm docker:simple hack/make.sh dynbinary
|
||||||
# docker run --rm --privileged docker:simple hack/dind hack/make.sh test-unit
|
# docker run --rm --privileged docker:simple hack/dind hack/make.sh test-unit
|
||||||
# docker run --rm --privileged -v /var/lib/docker docker:simple hack/dind hack/make.sh dynbinary test-integration
|
# docker run --rm --privileged -v /var/lib/docker docker:simple hack/dind hack/make.sh dynbinary test-integration-cli
|
||||||
|
|
||||||
# This represents the bare minimum required to build and test Docker.
|
# This represents the bare minimum required to build and test Docker.
|
||||||
|
|
||||||
ARG GO_VERSION=1.21.9
|
FROM debian:jessie
|
||||||
|
|
||||||
ARG BASE_DEBIAN_DISTRO="bookworm"
|
# compile and runtime deps
|
||||||
ARG GOLANG_IMAGE="golang:${GO_VERSION}-${BASE_DEBIAN_DISTRO}"
|
|
||||||
|
|
||||||
FROM ${GOLANG_IMAGE}
|
|
||||||
ENV GO111MODULE=off
|
|
||||||
ENV GOTOOLCHAIN=local
|
|
||||||
|
|
||||||
# Compile and runtime deps
|
|
||||||
# https://github.com/docker/docker/blob/master/project/PACKAGERS.md#build-dependencies
|
# https://github.com/docker/docker/blob/master/project/PACKAGERS.md#build-dependencies
|
||||||
# https://github.com/docker/docker/blob/master/project/PACKAGERS.md#runtime-dependencies
|
# https://github.com/docker/docker/blob/master/project/PACKAGERS.md#runtime-dependencies
|
||||||
RUN apt-get update && apt-get install -y --no-install-recommends \
|
RUN apt-get update && apt-get install -y --no-install-recommends \
|
||||||
|
btrfs-tools \
|
||||||
build-essential \
|
build-essential \
|
||||||
curl \
|
curl \
|
||||||
cmake \
|
gcc \
|
||||||
git \
|
git \
|
||||||
libapparmor-dev \
|
libapparmor-dev \
|
||||||
libseccomp-dev \
|
libdevmapper-dev \
|
||||||
|
libsqlite3-dev \
|
||||||
|
\
|
||||||
ca-certificates \
|
ca-certificates \
|
||||||
e2fsprogs \
|
e2fsprogs \
|
||||||
iptables \
|
iptables \
|
||||||
pkg-config \
|
|
||||||
pigz \
|
|
||||||
procps \
|
procps \
|
||||||
xfsprogs \
|
xfsprogs \
|
||||||
xz-utils \
|
xz-utils \
|
||||||
\
|
\
|
||||||
vim-common \
|
aufs-tools \
|
||||||
&& rm -rf /var/lib/apt/lists/*
|
&& rm -rf /var/lib/apt/lists/*
|
||||||
|
|
||||||
# Install runc, containerd, tini and docker-proxy
|
# install seccomp: the version shipped in trusty is too old
|
||||||
# Please edit hack/dockerfile/install/<name>.installer to update them.
|
ENV SECCOMP_VERSION 2.3.1
|
||||||
COPY hack/dockerfile/install hack/dockerfile/install
|
RUN set -x \
|
||||||
RUN for i in runc containerd tini proxy dockercli; \
|
&& export SECCOMP_PATH="$(mktemp -d)" \
|
||||||
do hack/dockerfile/install/install.sh $i; \
|
&& curl -fsSL "https://github.com/seccomp/libseccomp/releases/download/v${SECCOMP_VERSION}/libseccomp-${SECCOMP_VERSION}.tar.gz" \
|
||||||
done
|
| tar -xzC "$SECCOMP_PATH" --strip-components=1 \
|
||||||
ENV PATH=/usr/local/cli:$PATH
|
&& ( \
|
||||||
|
cd "$SECCOMP_PATH" \
|
||||||
|
&& ./configure --prefix=/usr/local \
|
||||||
|
&& make \
|
||||||
|
&& make install \
|
||||||
|
&& ldconfig \
|
||||||
|
) \
|
||||||
|
&& rm -rf "$SECCOMP_PATH"
|
||||||
|
|
||||||
|
# Install Go
|
||||||
|
# IMPORTANT: If the version of Go is updated, the Windows to Linux CI machines
|
||||||
|
# will need updating, to avoid errors. Ping #docker-maintainers on IRC
|
||||||
|
# with a heads-up.
|
||||||
|
ENV GO_VERSION 1.6.4
|
||||||
|
RUN curl -fsSL "https://storage.googleapis.com/golang/go${GO_VERSION}.linux-amd64.tar.gz" \
|
||||||
|
| tar -xzC /usr/local
|
||||||
|
ENV PATH /go/bin:/usr/local/go/bin:$PATH
|
||||||
|
ENV GOPATH /go:/go/src/github.com/docker/docker/vendor
|
||||||
|
ENV CGO_LDFLAGS -L/lib
|
||||||
|
|
||||||
|
# Install runc
|
||||||
|
ENV RUNC_COMMIT 50a19c6ff828c58e5dab13830bd3dacde268afe5
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/runc.git "$GOPATH/src/github.com/opencontainers/runc" \
|
||||||
|
&& cd "$GOPATH/src/github.com/opencontainers/runc" \
|
||||||
|
&& git checkout -q "$RUNC_COMMIT" \
|
||||||
|
&& make static BUILDTAGS="seccomp apparmor selinux" \
|
||||||
|
&& cp runc /usr/local/bin/docker-runc \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
|
# Install containerd
|
||||||
|
ENV CONTAINERD_COMMIT 2a5e70cbf65457815ee76b7e5dd2a01292d9eca8
|
||||||
|
RUN set -x \
|
||||||
|
&& export GOPATH="$(mktemp -d)" \
|
||||||
|
&& git clone https://github.com/docker/containerd.git "$GOPATH/src/github.com/docker/containerd" \
|
||||||
|
&& cd "$GOPATH/src/github.com/docker/containerd" \
|
||||||
|
&& git checkout -q "$CONTAINERD_COMMIT" \
|
||||||
|
&& make static \
|
||||||
|
&& cp bin/containerd /usr/local/bin/docker-containerd \
|
||||||
|
&& cp bin/containerd-shim /usr/local/bin/docker-containerd-shim \
|
||||||
|
&& cp bin/ctr /usr/local/bin/docker-containerd-ctr \
|
||||||
|
&& rm -rf "$GOPATH"
|
||||||
|
|
||||||
ENV AUTO_GOPATH 1
|
ENV AUTO_GOPATH 1
|
||||||
WORKDIR /usr/src/docker
|
WORKDIR /usr/src/docker
|
||||||
|
|
|
@ -1,314 +1,89 @@
|
||||||
# escape=`
|
# This file describes the standard way to build Docker, using a docker container on Windows
|
||||||
|
# Server 2016
|
||||||
# -----------------------------------------------------------------------------------------
|
|
||||||
# This file describes the standard way to build Docker in a container on Windows
|
|
||||||
# Server 2016 or Windows 10.
|
|
||||||
#
|
#
|
||||||
# Maintainer: @jhowardmsft
|
|
||||||
# -----------------------------------------------------------------------------------------
|
|
||||||
|
|
||||||
|
|
||||||
# Prerequisites:
|
|
||||||
# --------------
|
|
||||||
#
|
|
||||||
# 1. Windows Server 2016 or Windows 10 with all Windows updates applied. The major
|
|
||||||
# build number must be at least 14393. This can be confirmed, for example, by
|
|
||||||
# running the following from an elevated PowerShell prompt - this sample output
|
|
||||||
# is from a fully up to date machine as at mid-November 2016:
|
|
||||||
#
|
|
||||||
# >> PS C:\> $(gin).WindowsBuildLabEx
|
|
||||||
# >> 14393.447.amd64fre.rs1_release_inmarket.161102-0100
|
|
||||||
#
|
|
||||||
# 2. Git for Windows (or another git client) must be installed. https://git-scm.com/download/win.
|
|
||||||
#
|
|
||||||
# 3. The machine must be configured to run containers. For example, by following
|
|
||||||
# the quick start guidance at https://msdn.microsoft.com/en-us/virtualization/windowscontainers/quick_start/quick_start or
|
|
||||||
# https://github.com/docker/labs/blob/master/windows/windows-containers/Setup.md
|
|
||||||
#
|
|
||||||
# 4. If building in a Hyper-V VM: For Windows Server 2016 using Windows Server
|
|
||||||
# containers as the default option, it is recommended you have at least 1GB
|
|
||||||
# of memory assigned; For Windows 10 where Hyper-V Containers are employed, you
|
|
||||||
# should have at least 4GB of memory assigned. Note also, to run Hyper-V
|
|
||||||
# containers in a VM, it is necessary to configure the VM for nested virtualization.
|
|
||||||
|
|
||||||
# -----------------------------------------------------------------------------------------
|
|
||||||
|
|
||||||
|
|
||||||
# Usage:
|
# Usage:
|
||||||
# -----
|
|
||||||
#
|
#
|
||||||
# The following steps should be run from an (elevated*) Windows PowerShell prompt.
|
# # Assemble the full dev environment. This is slow the first time. Run this from
|
||||||
|
# # a directory containing the sources you are validating. For example from
|
||||||
|
# # c:\go\src\github.com\docker\docker
|
||||||
#
|
#
|
||||||
# (*In a default installation of containers on Windows following the quick-start guidance at
|
# docker build -t docker -f Dockerfile.windows .
|
||||||
# https://msdn.microsoft.com/en-us/virtualization/windowscontainers/quick_start/quick_start,
|
|
||||||
# the docker.exe client must run elevated to be able to connect to the daemon).
|
|
||||||
#
|
|
||||||
# 1. Clone the sources from github.com:
|
|
||||||
#
|
|
||||||
# >> git clone https://github.com/docker/docker.git C:\gopath\src\github.com\docker\docker
|
|
||||||
# >> Cloning into 'C:\gopath\src\github.com\docker\docker'...
|
|
||||||
# >> remote: Counting objects: 186216, done.
|
|
||||||
# >> remote: Compressing objects: 100% (21/21), done.
|
|
||||||
# >> remote: Total 186216 (delta 5), reused 0 (delta 0), pack-reused 186195
|
|
||||||
# >> Receiving objects: 100% (186216/186216), 104.32 MiB | 8.18 MiB/s, done.
|
|
||||||
# >> Resolving deltas: 100% (123139/123139), done.
|
|
||||||
# >> Checking connectivity... done.
|
|
||||||
# >> Checking out files: 100% (3912/3912), done.
|
|
||||||
# >> PS C:\>
|
|
||||||
#
|
#
|
||||||
#
|
#
|
||||||
# 2. Change directory to the cloned docker sources:
|
# # Build docker in a container. Run the following from a Windows cmd command prommpt,
|
||||||
|
# # replacing c:\built with the directory you want the binaries to be placed on the
|
||||||
|
# # host system.
|
||||||
#
|
#
|
||||||
# >> cd C:\gopath\src\github.com\docker\docker
|
# docker run --rm -v "c:\built:c:\target" docker sh -c 'cd /c/go/src/github.com/docker/docker; hack/make.sh binary; ec=$?; if [ $ec -eq 0 ]; then robocopy /c/go/src/github.com/docker/docker/bundles/$(cat VERSION)/binary /c/target/binary; fi; exit $ec'
|
||||||
#
|
#
|
||||||
#
|
|
||||||
# 3. Build a docker image with the components required to build the docker binaries from source
|
|
||||||
# by running one of the following:
|
|
||||||
#
|
|
||||||
# >> docker build -t nativebuildimage -f Dockerfile.windows .
|
|
||||||
# >> docker build -t nativebuildimage -f Dockerfile.windows -m 2GB . (if using Hyper-V containers)
|
|
||||||
#
|
|
||||||
#
|
|
||||||
# 4. Build the docker executable binaries by running one of the following:
|
|
||||||
#
|
|
||||||
# >> $DOCKER_GITCOMMIT=(git rev-parse --short HEAD)
|
|
||||||
# >> docker run --name binaries -e DOCKER_GITCOMMIT=$DOCKER_GITCOMMIT nativebuildimage hack\make.ps1 -Binary
|
|
||||||
# >> docker run --name binaries -e DOCKER_GITCOMMIT=$DOCKER_GITCOMMIT -m 2GB nativebuildimage hack\make.ps1 -Binary (if using Hyper-V containers)
|
|
||||||
#
|
|
||||||
#
|
|
||||||
# 5. Copy the binaries out of the container, replacing HostPath with an appropriate destination
|
|
||||||
# folder on the host system where you want the binaries to be located.
|
|
||||||
#
|
|
||||||
# >> docker cp binaries:C:\gopath\src\github.com\docker\docker\bundles\docker.exe C:\HostPath\docker.exe
|
|
||||||
# >> docker cp binaries:C:\gopath\src\github.com\docker\docker\bundles\dockerd.exe C:\HostPath\dockerd.exe
|
|
||||||
#
|
|
||||||
#
|
|
||||||
# 6. (Optional) Remove the interim container holding the built executable binaries:
|
|
||||||
#
|
|
||||||
# >> docker rm binaries
|
|
||||||
#
|
|
||||||
#
|
|
||||||
# 7. (Optional) Remove the image used for the container in which the executable
|
|
||||||
# binaries are build. Tip - it may be useful to keep this image around if you need to
|
|
||||||
# build multiple times. Then you can take advantage of the builder cache to have an
|
|
||||||
# image which has all the components required to build the binaries already installed.
|
|
||||||
#
|
|
||||||
# >> docker rmi nativebuildimage
|
|
||||||
#
|
|
||||||
|
|
||||||
# -----------------------------------------------------------------------------------------
|
|
||||||
|
|
||||||
|
|
||||||
# The validation tests can only run directly on the host. This is because they calculate
|
|
||||||
# information from the git repo, but the .git directory is not passed into the image as
|
|
||||||
# it is excluded via .dockerignore. Run the following from a Windows PowerShell prompt
|
|
||||||
# (elevation is not required): (Note Go must be installed to run these tests)
|
|
||||||
#
|
|
||||||
# >> hack\make.ps1 -DCO -PkgImports -GoFormat
|
|
||||||
|
|
||||||
|
|
||||||
# -----------------------------------------------------------------------------------------
|
|
||||||
|
|
||||||
|
|
||||||
# To run unit tests, ensure you have created the nativebuildimage above. Then run one of
|
|
||||||
# the following from an (elevated) Windows PowerShell prompt:
|
|
||||||
#
|
|
||||||
# >> docker run --rm nativebuildimage hack\make.ps1 -TestUnit
|
|
||||||
# >> docker run --rm -m 2GB nativebuildimage hack\make.ps1 -TestUnit (if using Hyper-V containers)
|
|
||||||
|
|
||||||
|
|
||||||
# -----------------------------------------------------------------------------------------
|
|
||||||
|
|
||||||
|
|
||||||
# To run unit tests and binary build, ensure you have created the nativebuildimage above. Then
|
|
||||||
# run one of the following from an (elevated) Windows PowerShell prompt:
|
|
||||||
#
|
|
||||||
# >> docker run nativebuildimage hack\make.ps1 -All
|
|
||||||
# >> docker run -m 2GB nativebuildimage hack\make.ps1 -All (if using Hyper-V containers)
|
|
||||||
|
|
||||||
# -----------------------------------------------------------------------------------------
|
|
||||||
|
|
||||||
|
|
||||||
# Important notes:
|
# Important notes:
|
||||||
# ---------------
|
# ---------------
|
||||||
#
|
#
|
||||||
# Don't attempt to use a bind mount to pass a local directory as the bundles target
|
# The posix utilities from GIT aren't usable interactively as at January 2016. This
|
||||||
# directory. It does not work (golang attempts for follow a mapped folder incorrectly).
|
# is because they require a console window which isn't present in a container in Windows.
|
||||||
# Instead, use docker cp as per the example.
|
# See the example at the top of this file. Do NOT use -it in that docker run!!!
|
||||||
#
|
#
|
||||||
# go.zip is not removed from the image as it is used by the Windows CI servers
|
# Don't try to use a volume for passing the source through. The posix utilities will
|
||||||
# to ensure the host and image are running consistent versions of go.
|
# balk at reparse points. Again, see the example at the top of this file on how use a volume
|
||||||
|
# to get the built binary out of the container.
|
||||||
#
|
#
|
||||||
# Nanoserver support is a work in progress. Although the image will build if the
|
# The steps are minimised dramatically to improve performance
|
||||||
# FROM statement is updated, it will not work when running autogen through hack\make.ps1.
|
|
||||||
# It is suspected that the required GCC utilities (eg gcc, windres, windmc) silently
|
|
||||||
# quit due to the use of console hooks which are not available.
|
|
||||||
#
|
|
||||||
# The docker integration tests do not currently run in a container on Windows, predominantly
|
|
||||||
# due to Windows not supporting privileged mode, so anything using a volume would fail.
|
|
||||||
# They (along with the rest of the docker CI suite) can be run using
|
|
||||||
# https://github.com/kevpar/docker-w2wCIScripts/blob/master/runCI/Invoke-DockerCI.ps1.
|
|
||||||
#
|
|
||||||
# -----------------------------------------------------------------------------------------
|
|
||||||
|
|
||||||
|
FROM windowsservercore
|
||||||
# The number of build steps below are explicitly minimised to improve performance.
|
|
||||||
|
|
||||||
ARG WINDOWS_BASE_IMAGE=mcr.microsoft.com/windows/servercore
|
|
||||||
ARG WINDOWS_BASE_IMAGE_TAG=ltsc2022
|
|
||||||
FROM ${WINDOWS_BASE_IMAGE}:${WINDOWS_BASE_IMAGE_TAG}
|
|
||||||
|
|
||||||
# Use PowerShell as the default shell
|
|
||||||
SHELL ["powershell", "-Command", "$ErrorActionPreference = 'Stop'; $ProgressPreference = 'SilentlyContinue';"]
|
|
||||||
|
|
||||||
ARG GO_VERSION=1.21.9
|
|
||||||
ARG GOTESTSUM_VERSION=v1.8.2
|
|
||||||
ARG GOWINRES_VERSION=v0.3.1
|
|
||||||
ARG CONTAINERD_VERSION=v1.7.15
|
|
||||||
|
|
||||||
# Environment variable notes:
|
# Environment variable notes:
|
||||||
# - GO_VERSION must be consistent with 'Dockerfile' used by Linux.
|
# - GO_VERSION must consistent with 'Dockerfile' used by Linux'.
|
||||||
# - CONTAINERD_VERSION must be consistent with 'hack/dockerfile/install/containerd.installer' used by Linux.
|
|
||||||
# - FROM_DOCKERFILE is used for detection of building within a container.
|
# - FROM_DOCKERFILE is used for detection of building within a container.
|
||||||
ENV GO_VERSION=${GO_VERSION} `
|
ENV GO_VERSION=1.6.4 \
|
||||||
CONTAINERD_VERSION=${CONTAINERD_VERSION} `
|
GIT_LOCATION=https://github.com/git-for-windows/git/releases/download/v2.7.2.windows.1/Git-2.7.2-64-bit.exe \
|
||||||
GIT_VERSION=2.11.1 `
|
GOPATH=C:/go;C:/go/src/github.com/docker/docker/vendor \
|
||||||
GOPATH=C:\gopath `
|
FROM_DOCKERFILE=1
|
||||||
GO111MODULE=off `
|
|
||||||
GOTOOLCHAIN=local `
|
|
||||||
FROM_DOCKERFILE=1 `
|
|
||||||
GOTESTSUM_VERSION=${GOTESTSUM_VERSION} `
|
|
||||||
GOWINRES_VERSION=${GOWINRES_VERSION}
|
|
||||||
|
|
||||||
RUN `
|
WORKDIR c:/
|
||||||
Function Test-Nano() { `
|
|
||||||
$EditionId = (Get-ItemProperty -Path 'HKLM:\SOFTWARE\Microsoft\Windows NT\CurrentVersion' -Name 'EditionID').EditionId; `
|
|
||||||
return (($EditionId -eq 'ServerStandardNano') -or ($EditionId -eq 'ServerDataCenterNano') -or ($EditionId -eq 'NanoServer')); `
|
|
||||||
}`
|
|
||||||
`
|
|
||||||
Function Download-File([string] $source, [string] $target) { `
|
|
||||||
if (Test-Nano) { `
|
|
||||||
$handler = New-Object System.Net.Http.HttpClientHandler; `
|
|
||||||
$client = New-Object System.Net.Http.HttpClient($handler); `
|
|
||||||
$client.Timeout = New-Object System.TimeSpan(0, 30, 0); `
|
|
||||||
$cancelTokenSource = [System.Threading.CancellationTokenSource]::new(); `
|
|
||||||
$responseMsg = $client.GetAsync([System.Uri]::new($source), $cancelTokenSource.Token); `
|
|
||||||
$responseMsg.Wait(); `
|
|
||||||
if (!$responseMsg.IsCanceled) { `
|
|
||||||
$response = $responseMsg.Result; `
|
|
||||||
if ($response.IsSuccessStatusCode) { `
|
|
||||||
$downloadedFileStream = [System.IO.FileStream]::new($target, [System.IO.FileMode]::Create, [System.IO.FileAccess]::Write); `
|
|
||||||
$copyStreamOp = $response.Content.CopyToAsync($downloadedFileStream); `
|
|
||||||
$copyStreamOp.Wait(); `
|
|
||||||
$downloadedFileStream.Close(); `
|
|
||||||
if ($copyStreamOp.Exception -ne $null) { throw $copyStreamOp.Exception } `
|
|
||||||
} `
|
|
||||||
} else { `
|
|
||||||
Throw ("Failed to download " + $source) `
|
|
||||||
}`
|
|
||||||
} else { `
|
|
||||||
[Net.ServicePointManager]::SecurityProtocol = [Net.SecurityProtocolType]::Tls12; `
|
|
||||||
$webClient = New-Object System.Net.WebClient; `
|
|
||||||
$webClient.DownloadFile($source, $target); `
|
|
||||||
} `
|
|
||||||
} `
|
|
||||||
`
|
|
||||||
setx /M PATH $('C:\git\cmd;C:\git\usr\bin;'+$Env:PATH+';C:\gcc\bin;C:\go\bin;C:\containerd\bin'); `
|
|
||||||
`
|
|
||||||
Write-Host INFO: Downloading git...; `
|
|
||||||
$location='https://www.nuget.org/api/v2/package/GitForWindows/'+$Env:GIT_VERSION; `
|
|
||||||
Download-File $location C:\gitsetup.zip; `
|
|
||||||
`
|
|
||||||
Write-Host INFO: Downloading go...; `
|
|
||||||
$dlGoVersion=$Env:GO_VERSION; `
|
|
||||||
Download-File "https://go.dev/dl/go${dlGoVersion}.windows-amd64.zip" C:\go.zip; `
|
|
||||||
`
|
|
||||||
Write-Host INFO: Downloading compiler 1 of 3...; `
|
|
||||||
Download-File https://raw.githubusercontent.com/moby/docker-tdmgcc/master/gcc.zip C:\gcc.zip; `
|
|
||||||
`
|
|
||||||
Write-Host INFO: Downloading compiler 2 of 3...; `
|
|
||||||
Download-File https://raw.githubusercontent.com/moby/docker-tdmgcc/master/runtime.zip C:\runtime.zip; `
|
|
||||||
`
|
|
||||||
Write-Host INFO: Downloading compiler 3 of 3...; `
|
|
||||||
Download-File https://raw.githubusercontent.com/moby/docker-tdmgcc/master/binutils.zip C:\binutils.zip; `
|
|
||||||
`
|
|
||||||
Write-Host INFO: Extracting git...; `
|
|
||||||
Expand-Archive C:\gitsetup.zip C:\git-tmp; `
|
|
||||||
New-Item -Type Directory C:\git | Out-Null; `
|
|
||||||
Move-Item C:\git-tmp\tools\* C:\git\.; `
|
|
||||||
Remove-Item -Recurse -Force C:\git-tmp; `
|
|
||||||
`
|
|
||||||
Write-Host INFO: Expanding go...; `
|
|
||||||
Expand-Archive C:\go.zip -DestinationPath C:\; `
|
|
||||||
`
|
|
||||||
Write-Host INFO: Expanding compiler 1 of 3...; `
|
|
||||||
Expand-Archive C:\gcc.zip -DestinationPath C:\gcc -Force; `
|
|
||||||
Write-Host INFO: Expanding compiler 2 of 3...; `
|
|
||||||
Expand-Archive C:\runtime.zip -DestinationPath C:\gcc -Force; `
|
|
||||||
Write-Host INFO: Expanding compiler 3 of 3...; `
|
|
||||||
Expand-Archive C:\binutils.zip -DestinationPath C:\gcc -Force; `
|
|
||||||
`
|
|
||||||
Write-Host INFO: Removing downloaded files...; `
|
|
||||||
Remove-Item C:\gcc.zip; `
|
|
||||||
Remove-Item C:\runtime.zip; `
|
|
||||||
Remove-Item C:\binutils.zip; `
|
|
||||||
Remove-Item C:\gitsetup.zip; `
|
|
||||||
`
|
|
||||||
Write-Host INFO: Downloading containerd; `
|
|
||||||
Install-Package -Force 7Zip4PowerShell; `
|
|
||||||
$location='https://github.com/containerd/containerd/releases/download/'+$Env:CONTAINERD_VERSION+'/containerd-'+$Env:CONTAINERD_VERSION.TrimStart('v')+'-windows-amd64.tar.gz'; `
|
|
||||||
Download-File $location C:\containerd.tar.gz; `
|
|
||||||
New-Item -Path C:\containerd -ItemType Directory; `
|
|
||||||
Expand-7Zip C:\containerd.tar.gz C:\; `
|
|
||||||
Expand-7Zip C:\containerd.tar C:\containerd; `
|
|
||||||
Remove-Item C:\containerd.tar.gz; `
|
|
||||||
Remove-Item C:\containerd.tar; `
|
|
||||||
`
|
|
||||||
# Ensure all directories exist that we will require below....
|
|
||||||
$srcDir = """$Env:GOPATH`\src\github.com\docker\docker\bundles"""; `
|
|
||||||
Write-Host INFO: Ensuring existence of directory $srcDir...; `
|
|
||||||
New-Item -Force -ItemType Directory -Path $srcDir | Out-Null; `
|
|
||||||
`
|
|
||||||
Write-Host INFO: Configuring git core.autocrlf...; `
|
|
||||||
C:\git\cmd\git config --global core.autocrlf true;
|
|
||||||
|
|
||||||
RUN `
|
# Everything downloaded/installed in one go (better performance, esp on TP4)
|
||||||
Function Install-GoTestSum() { `
|
RUN \
|
||||||
$Env:GO111MODULE = 'on'; `
|
setx /M Path "c:\git\cmd;c:\git\bin;c:\git\usr\bin;%Path%;c:\gcc\bin;c:\go\bin" && \
|
||||||
$tmpGobin = "${Env:GOBIN_TMP}"; `
|
setx GOROOT "c:\go" && \
|
||||||
$Env:GOBIN = """${Env:GOPATH}`\bin"""; `
|
powershell -command \
|
||||||
Write-Host "INFO: Installing gotestsum version $Env:GOTESTSUM_VERSION in $Env:GOBIN"; `
|
$ErrorActionPreference = 'Stop'; \
|
||||||
&go install "gotest.tools/gotestsum@${Env:GOTESTSUM_VERSION}"; `
|
Function Download-File([string] $source, [string] $target) { \
|
||||||
$Env:GOBIN = "${tmpGobin}"; `
|
$wc = New-Object net.webclient; $wc.Downloadfile($source, $target) \
|
||||||
$Env:GO111MODULE = 'off'; `
|
} \
|
||||||
if ($LASTEXITCODE -ne 0) { `
|
\
|
||||||
Throw '"gotestsum install failed..."'; `
|
Write-Host INFO: Downloading git...; \
|
||||||
} `
|
Download-File %GIT_LOCATION% gitsetup.exe; \
|
||||||
} `
|
\
|
||||||
`
|
Write-Host INFO: Downloading go...; \
|
||||||
Install-GoTestSum
|
Download-File https://storage.googleapis.com/golang/go%GO_VERSION%.windows-amd64.msi go.msi; \
|
||||||
|
\
|
||||||
|
Write-Host INFO: Downloading compiler 1 of 3...; \
|
||||||
|
Download-File https://raw.githubusercontent.com/jhowardmsft/docker-tdmgcc/master/gcc.zip gcc.zip; \
|
||||||
|
\
|
||||||
|
Write-Host INFO: Downloading compiler 2 of 3...; \
|
||||||
|
Download-File https://raw.githubusercontent.com/jhowardmsft/docker-tdmgcc/master/runtime.zip runtime.zip; \
|
||||||
|
\
|
||||||
|
Write-Host INFO: Downloading compiler 3 of 3...; \
|
||||||
|
Download-File https://raw.githubusercontent.com/jhowardmsft/docker-tdmgcc/master/binutils.zip binutils.zip; \
|
||||||
|
\
|
||||||
|
Write-Host INFO: Installing git...; \
|
||||||
|
Start-Process gitsetup.exe -ArgumentList '/VERYSILENT /SUPPRESSMSGBOXES /CLOSEAPPLICATIONS /DIR=c:\git\' -Wait; \
|
||||||
|
\
|
||||||
|
Write-Host INFO: Installing go..."; \
|
||||||
|
Start-Process msiexec -ArgumentList '-i go.msi -quiet' -Wait; \
|
||||||
|
\
|
||||||
|
Write-Host INFO: Unzipping compiler...; \
|
||||||
|
c:\git\usr\bin\unzip.exe -q -o gcc.zip -d /c/gcc; \
|
||||||
|
c:\git\usr\bin\unzip.exe -q -o runtime.zip -d /c/gcc; \
|
||||||
|
c:\git\usr\bin\unzip.exe -q -o binutils.zip -d /c/gcc"; \
|
||||||
|
\
|
||||||
|
Write-Host INFO: Removing interim files; \
|
||||||
|
Remove-Item *.zip; \
|
||||||
|
Remove-Item go.msi; \
|
||||||
|
Remove-Item gitsetup.exe; \
|
||||||
|
\
|
||||||
|
Write-Host INFO: Completed
|
||||||
|
|
||||||
RUN `
|
# Prepare for building
|
||||||
Function Install-GoWinres() { `
|
COPY . /go/src/github.com/docker/docker
|
||||||
$Env:GO111MODULE = 'on'; `
|
|
||||||
$tmpGobin = "${Env:GOBIN_TMP}"; `
|
|
||||||
$Env:GOBIN = """${Env:GOPATH}`\bin"""; `
|
|
||||||
Write-Host "INFO: Installing go-winres version $Env:GOWINRES_VERSION in $Env:GOBIN"; `
|
|
||||||
&go install "github.com/tc-hib/go-winres@${Env:GOWINRES_VERSION}"; `
|
|
||||||
$Env:GOBIN = "${tmpGobin}"; `
|
|
||||||
$Env:GO111MODULE = 'off'; `
|
|
||||||
if ($LASTEXITCODE -ne 0) { `
|
|
||||||
Throw '"go-winres install failed..."'; `
|
|
||||||
} `
|
|
||||||
} `
|
|
||||||
`
|
|
||||||
Install-GoWinres
|
|
||||||
|
|
||||||
# Make PowerShell the default entrypoint
|
|
||||||
ENTRYPOINT ["powershell.exe"]
|
|
||||||
|
|
||||||
# Set the working directory to the location of the sources
|
|
||||||
WORKDIR ${GOPATH}\src\github.com\docker\docker
|
|
||||||
|
|
||||||
# Copy the sources into the container
|
|
||||||
COPY . .
|
|
||||||
|
|
165
Jenkinsfile
vendored
165
Jenkinsfile
vendored
|
@ -1,165 +0,0 @@
|
||||||
#!groovy
|
|
||||||
pipeline {
|
|
||||||
agent none
|
|
||||||
|
|
||||||
options {
|
|
||||||
buildDiscarder(logRotator(daysToKeepStr: '30'))
|
|
||||||
timeout(time: 2, unit: 'HOURS')
|
|
||||||
timestamps()
|
|
||||||
}
|
|
||||||
parameters {
|
|
||||||
booleanParam(name: 'arm64', defaultValue: true, description: 'ARM (arm64) Build/Test')
|
|
||||||
booleanParam(name: 'dco', defaultValue: true, description: 'Run the DCO check')
|
|
||||||
}
|
|
||||||
environment {
|
|
||||||
DOCKER_BUILDKIT = '1'
|
|
||||||
DOCKER_EXPERIMENTAL = '1'
|
|
||||||
DOCKER_GRAPHDRIVER = 'overlay2'
|
|
||||||
CHECK_CONFIG_COMMIT = '33a3680e08d1007e72c3b3f1454f823d8e9948ee'
|
|
||||||
TESTDEBUG = '0'
|
|
||||||
TIMEOUT = '120m'
|
|
||||||
}
|
|
||||||
stages {
|
|
||||||
stage('pr-hack') {
|
|
||||||
when { changeRequest() }
|
|
||||||
steps {
|
|
||||||
script {
|
|
||||||
echo "Workaround for PR auto-cancel feature. Borrowed from https://issues.jenkins-ci.org/browse/JENKINS-43353"
|
|
||||||
def buildNumber = env.BUILD_NUMBER as int
|
|
||||||
if (buildNumber > 1) milestone(buildNumber - 1)
|
|
||||||
milestone(buildNumber)
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
stage('DCO-check') {
|
|
||||||
when {
|
|
||||||
beforeAgent true
|
|
||||||
expression { params.dco }
|
|
||||||
}
|
|
||||||
agent { label 'arm64 && ubuntu-2004' }
|
|
||||||
steps {
|
|
||||||
sh '''
|
|
||||||
docker run --rm \
|
|
||||||
-v "$WORKSPACE:/workspace" \
|
|
||||||
-e VALIDATE_REPO=${GIT_URL} \
|
|
||||||
-e VALIDATE_BRANCH=${CHANGE_TARGET} \
|
|
||||||
alpine sh -c 'apk add --no-cache -q bash git openssh-client && git config --system --add safe.directory /workspace && cd /workspace && hack/validate/dco'
|
|
||||||
'''
|
|
||||||
}
|
|
||||||
}
|
|
||||||
stage('Build') {
|
|
||||||
parallel {
|
|
||||||
stage('arm64') {
|
|
||||||
when {
|
|
||||||
beforeAgent true
|
|
||||||
expression { params.arm64 }
|
|
||||||
}
|
|
||||||
agent { label 'arm64 && ubuntu-2004' }
|
|
||||||
environment {
|
|
||||||
TEST_SKIP_INTEGRATION_CLI = '1'
|
|
||||||
}
|
|
||||||
|
|
||||||
stages {
|
|
||||||
stage("Print info") {
|
|
||||||
steps {
|
|
||||||
sh 'docker version'
|
|
||||||
sh 'docker info'
|
|
||||||
sh '''
|
|
||||||
echo "check-config.sh version: ${CHECK_CONFIG_COMMIT}"
|
|
||||||
curl -fsSL -o ${WORKSPACE}/check-config.sh "https://raw.githubusercontent.com/moby/moby/${CHECK_CONFIG_COMMIT}/contrib/check-config.sh" \
|
|
||||||
&& bash ${WORKSPACE}/check-config.sh || true
|
|
||||||
'''
|
|
||||||
}
|
|
||||||
}
|
|
||||||
stage("Build dev image") {
|
|
||||||
steps {
|
|
||||||
sh 'docker build --force-rm -t docker:${GIT_COMMIT} .'
|
|
||||||
}
|
|
||||||
}
|
|
||||||
stage("Unit tests") {
|
|
||||||
steps {
|
|
||||||
sh '''
|
|
||||||
sudo modprobe ip6table_filter
|
|
||||||
'''
|
|
||||||
sh '''
|
|
||||||
docker run --rm -t --privileged \
|
|
||||||
-v "$WORKSPACE/bundles:/go/src/github.com/docker/docker/bundles" \
|
|
||||||
--name docker-pr$BUILD_NUMBER \
|
|
||||||
-e DOCKER_EXPERIMENTAL \
|
|
||||||
-e DOCKER_GITCOMMIT=${GIT_COMMIT} \
|
|
||||||
-e DOCKER_GRAPHDRIVER \
|
|
||||||
-e VALIDATE_REPO=${GIT_URL} \
|
|
||||||
-e VALIDATE_BRANCH=${CHANGE_TARGET} \
|
|
||||||
docker:${GIT_COMMIT} \
|
|
||||||
hack/test/unit
|
|
||||||
'''
|
|
||||||
}
|
|
||||||
post {
|
|
||||||
always {
|
|
||||||
junit testResults: 'bundles/junit-report*.xml', allowEmptyResults: true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
stage("Integration tests") {
|
|
||||||
environment { TEST_SKIP_INTEGRATION_CLI = '1' }
|
|
||||||
steps {
|
|
||||||
sh '''
|
|
||||||
docker run --rm -t --privileged \
|
|
||||||
-v "$WORKSPACE/bundles:/go/src/github.com/docker/docker/bundles" \
|
|
||||||
--name docker-pr$BUILD_NUMBER \
|
|
||||||
-e DOCKER_EXPERIMENTAL \
|
|
||||||
-e DOCKER_GITCOMMIT=${GIT_COMMIT} \
|
|
||||||
-e DOCKER_GRAPHDRIVER \
|
|
||||||
-e TESTDEBUG \
|
|
||||||
-e TEST_INTEGRATION_USE_SNAPSHOTTER \
|
|
||||||
-e TEST_SKIP_INTEGRATION_CLI \
|
|
||||||
-e TIMEOUT \
|
|
||||||
-e VALIDATE_REPO=${GIT_URL} \
|
|
||||||
-e VALIDATE_BRANCH=${CHANGE_TARGET} \
|
|
||||||
docker:${GIT_COMMIT} \
|
|
||||||
hack/make.sh \
|
|
||||||
dynbinary \
|
|
||||||
test-integration
|
|
||||||
'''
|
|
||||||
}
|
|
||||||
post {
|
|
||||||
always {
|
|
||||||
junit testResults: 'bundles/**/*-report.xml', allowEmptyResults: true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
|
|
||||||
post {
|
|
||||||
always {
|
|
||||||
sh '''
|
|
||||||
echo "Ensuring container killed."
|
|
||||||
docker rm -vf docker-pr$BUILD_NUMBER || true
|
|
||||||
'''
|
|
||||||
|
|
||||||
sh '''
|
|
||||||
echo "Chowning /workspace to jenkins user"
|
|
||||||
docker run --rm -v "$WORKSPACE:/workspace" busybox chown -R "$(id -u):$(id -g)" /workspace
|
|
||||||
'''
|
|
||||||
|
|
||||||
catchError(buildResult: 'SUCCESS', stageResult: 'FAILURE', message: 'Failed to create bundles.tar.gz') {
|
|
||||||
sh '''
|
|
||||||
bundleName=arm64-integration
|
|
||||||
echo "Creating ${bundleName}-bundles.tar.gz"
|
|
||||||
# exclude overlay2 directories
|
|
||||||
find bundles -path '*/root/*overlay2' -prune -o -type f \\( -name '*-report.json' -o -name '*.log' -o -name '*.prof' -o -name '*-report.xml' \\) -print | xargs tar -czf ${bundleName}-bundles.tar.gz
|
|
||||||
'''
|
|
||||||
|
|
||||||
archiveArtifacts artifacts: '*-bundles.tar.gz', allowEmptyArchive: true
|
|
||||||
}
|
|
||||||
}
|
|
||||||
cleanup {
|
|
||||||
sh 'make clean'
|
|
||||||
deleteDir()
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
||||||
}
|
|
2
LICENSE
2
LICENSE
|
@ -176,7 +176,7 @@
|
||||||
|
|
||||||
END OF TERMS AND CONDITIONS
|
END OF TERMS AND CONDITIONS
|
||||||
|
|
||||||
Copyright 2013-2018 Docker, Inc.
|
Copyright 2013-2016 Docker, Inc.
|
||||||
|
|
||||||
Licensed under the Apache License, Version 2.0 (the "License");
|
Licensed under the Apache License, Version 2.0 (the "License");
|
||||||
you may not use this file except in compliance with the License.
|
you may not use this file except in compliance with the License.
|
||||||
|
|
391
MAINTAINERS
391
MAINTAINERS
|
@ -1,14 +1,12 @@
|
||||||
# Moby maintainers file
|
# Docker maintainers file
|
||||||
#
|
#
|
||||||
# This file describes the maintainer groups within the moby/moby project.
|
# This file describes who runs the docker/docker project and how.
|
||||||
# More detail on Moby project governance is available in the
|
# This is a living document - if you see something out of date or missing, speak up!
|
||||||
# project/GOVERNANCE.md file found in this repository.
|
|
||||||
#
|
#
|
||||||
# It is structured to be consumable by both humans and programs.
|
# It is structured to be consumable by both humans and programs.
|
||||||
# To extract its contents programmatically, use any TOML-compliant
|
# To extract its contents programmatically, use any TOML-compliant
|
||||||
# parser.
|
# parser.
|
||||||
#
|
#
|
||||||
# TODO(estesp): This file should not necessarily depend on docker/opensource
|
|
||||||
# This file is compiled into the MAINTAINERS file in docker/opensource.
|
# This file is compiled into the MAINTAINERS file in docker/opensource.
|
||||||
#
|
#
|
||||||
[Org]
|
[Org]
|
||||||
|
@ -23,34 +21,41 @@
|
||||||
# a subsystem, they are responsible for doing so and holding the
|
# a subsystem, they are responsible for doing so and holding the
|
||||||
# subsystem maintainers accountable. If ownership is unclear, they are the de facto owners.
|
# subsystem maintainers accountable. If ownership is unclear, they are the de facto owners.
|
||||||
|
|
||||||
|
# For each release (including minor releases), a "release captain" is assigned from the
|
||||||
|
# pool of core maintainers. Rotation is encouraged across all maintainers, to ensure
|
||||||
|
# the release process is clear and up-to-date.
|
||||||
|
|
||||||
people = [
|
people = [
|
||||||
"akerouanton",
|
"aaronlehmann",
|
||||||
"akihirosuda",
|
"calavera",
|
||||||
"anusha",
|
|
||||||
"coolljt0725",
|
"coolljt0725",
|
||||||
"corhere",
|
|
||||||
"cpuguy83",
|
"cpuguy83",
|
||||||
"crazy-max",
|
"crosbymichael",
|
||||||
|
"duglin",
|
||||||
"estesp",
|
"estesp",
|
||||||
"johnstep",
|
"icecrime",
|
||||||
|
"jhowardmsft",
|
||||||
"justincormack",
|
"justincormack",
|
||||||
"kolyshkin",
|
"lk4d4",
|
||||||
"laurazard",
|
"mavenugo",
|
||||||
"mhbauer",
|
"mhbauer",
|
||||||
"neersighted",
|
|
||||||
"rumpl",
|
|
||||||
"runcom",
|
"runcom",
|
||||||
"samuelkarp",
|
|
||||||
"stevvooe",
|
|
||||||
"thajeztah",
|
|
||||||
"tianon",
|
"tianon",
|
||||||
"tibor",
|
"tibor",
|
||||||
"tonistiigi",
|
"tonistiigi",
|
||||||
"unclejack",
|
"unclejack",
|
||||||
"vdemeester",
|
"vdemeester"
|
||||||
"vieux",
|
]
|
||||||
"vvoland",
|
|
||||||
"yongtang"
|
[Org."Docs maintainers"]
|
||||||
|
|
||||||
|
# TODO Describe the docs maintainers role.
|
||||||
|
|
||||||
|
people = [
|
||||||
|
"jamtur01",
|
||||||
|
"moxiegirl",
|
||||||
|
"sven",
|
||||||
|
"thajeztah"
|
||||||
]
|
]
|
||||||
|
|
||||||
[Org.Curators]
|
[Org.Curators]
|
||||||
|
@ -66,18 +71,7 @@
|
||||||
# - close an issue or pull request when it's inappropriate or off-topic
|
# - close an issue or pull request when it's inappropriate or off-topic
|
||||||
|
|
||||||
people = [
|
people = [
|
||||||
"alexellis",
|
|
||||||
"andrewhsu",
|
|
||||||
"bsousaa",
|
|
||||||
"dmcgowan",
|
|
||||||
"fntlnz",
|
|
||||||
"gianarb",
|
|
||||||
"olljanat",
|
|
||||||
"programmerq",
|
"programmerq",
|
||||||
"ripcurld",
|
|
||||||
"robmry",
|
|
||||||
"sam-thibault",
|
|
||||||
"samwhited",
|
|
||||||
"thajeztah"
|
"thajeztah"
|
||||||
]
|
]
|
||||||
|
|
||||||
|
@ -88,55 +82,6 @@
|
||||||
# Thank you!
|
# Thank you!
|
||||||
|
|
||||||
people = [
|
people = [
|
||||||
# Aaron Lehmann was a maintainer for swarmkit, the registry, and the engine,
|
|
||||||
# and contributed many improvements, features, and bugfixes in those areas,
|
|
||||||
# among which "automated service rollbacks", templated secrets and configs,
|
|
||||||
# and resumable image layer downloads.
|
|
||||||
"aaronlehmann",
|
|
||||||
|
|
||||||
# Harald Albers is the mastermind behind the bash completion scripts for the
|
|
||||||
# Docker CLI. The completion scripts moved to the Docker CLI repository, so
|
|
||||||
# you can now find him perform his magic in the https://github.com/docker/cli repository.
|
|
||||||
"albers",
|
|
||||||
|
|
||||||
# Andrea Luzzardi started contributing to the Docker codebase in the "dotCloud"
|
|
||||||
# era, even before it was called "Docker". He is one of the architects of both
|
|
||||||
# Swarm and SwarmKit, and its integration into the Docker engine.
|
|
||||||
"aluzzardi",
|
|
||||||
|
|
||||||
# David Calavera contributed many features to Docker, such as an improved
|
|
||||||
# event system, dynamic configuration reloading, volume plugins, fancy
|
|
||||||
# new templating options, and an external client credential store. As a
|
|
||||||
# maintainer, David was release captain for Docker 1.8, and competing
|
|
||||||
# with Jess Frazelle to be "top dream killer".
|
|
||||||
# David is now doing amazing stuff as CTO for https://www.netlify.com,
|
|
||||||
# and tweets as @calavera.
|
|
||||||
"calavera",
|
|
||||||
|
|
||||||
# Michael Crosby was "chief maintainer" of the Docker project.
|
|
||||||
# During his time as a maintainer, Michael contributed to many
|
|
||||||
# milestones of the project; he was release captain of Docker v1.0.0,
|
|
||||||
# started the development of "libcontainer" (what later became runc)
|
|
||||||
# and containerd, as well as demoing cool hacks such as live migrating
|
|
||||||
# a game server container with checkpoint/restore.
|
|
||||||
#
|
|
||||||
# Michael is currently a maintainer of containerd, but you may see
|
|
||||||
# him around in other projects on GitHub.
|
|
||||||
"crosbymichael",
|
|
||||||
|
|
||||||
# Before becoming a maintainer, Daniel Nephin was a core contributor
|
|
||||||
# to "Fig" (now known as Docker Compose). As a maintainer for both the
|
|
||||||
# Engine and Docker CLI, Daniel contributed many features, among which
|
|
||||||
# the `docker stack` commands, allowing users to deploy their Docker
|
|
||||||
# Compose projects as a Swarm service.
|
|
||||||
"dnephin",
|
|
||||||
|
|
||||||
# Doug Davis contributed many features and fixes for the classic builder,
|
|
||||||
# such as "wildcard" copy, the dockerignore file, custom paths/names
|
|
||||||
# for the Dockerfile, as well as enhancements to the API and documentation.
|
|
||||||
# Follow Doug on Twitter, where he tweets as @duginabox.
|
|
||||||
"duglin",
|
|
||||||
|
|
||||||
# As a maintainer, Erik was responsible for the "builder", and
|
# As a maintainer, Erik was responsible for the "builder", and
|
||||||
# started the first designs for the new networking model in
|
# started the first designs for the new networking model in
|
||||||
# Docker. Erik is now working on all kinds of plugins for Docker
|
# Docker. Erik is now working on all kinds of plugins for Docker
|
||||||
|
@ -145,113 +90,25 @@
|
||||||
# still stumble into him in our issue tracker, or on IRC.
|
# still stumble into him in our issue tracker, or on IRC.
|
||||||
"erikh",
|
"erikh",
|
||||||
|
|
||||||
# Evan Hazlett is the creator of the Shipyard and Interlock open source projects,
|
|
||||||
# and the author of "Orca", which became the foundation of Docker Universal Control
|
|
||||||
# Plane (UCP). As a maintainer, Evan helped integrating SwarmKit (secrets, tasks)
|
|
||||||
# into the Docker engine.
|
|
||||||
"ehazlett",
|
|
||||||
|
|
||||||
# Arnaud Porterie (AKA "icecrime") was in charge of maintaining the maintainers.
|
|
||||||
# As a maintainer, he made life easier for contributors to the Docker open-source
|
|
||||||
# projects, bringing order in the chaos by designing a triage- and review workflow
|
|
||||||
# using labels (see https://icecrime.net/technology/a-structured-approach-to-labeling/),
|
|
||||||
# and automating the hell out of things with his buddies GordonTheTurtle and Poule
|
|
||||||
# (a chicken!).
|
|
||||||
#
|
|
||||||
# A lesser-known fact is that he created the first commit in the libnetwork repository
|
|
||||||
# even though he didn't know anything about it. Some say, he's now selling stuff on
|
|
||||||
# the internet ;-)
|
|
||||||
"icecrime",
|
|
||||||
|
|
||||||
# After a false start with his first PR being rejected, James Turnbull became a frequent
|
|
||||||
# contributor to the documentation, and became a docs maintainer on December 5, 2013. As
|
|
||||||
# a maintainer, James lifted the docs to a higher standard, and introduced the community
|
|
||||||
# guidelines ("three strikes"). James is currently changing the world as CTO of https://www.empatico.org,
|
|
||||||
# meanwhile authoring various books that are worth checking out. You can find him on Twitter,
|
|
||||||
# rambling as @kartar, and although no longer active as a maintainer, he's always "game" to
|
|
||||||
# help out reviewing docs PRs, so you may still see him around in the repository.
|
|
||||||
"jamtur01",
|
|
||||||
|
|
||||||
# Jessica Frazelle, also known as the "Keyser Söze of containers",
|
# Jessica Frazelle, also known as the "Keyser Söze of containers",
|
||||||
# runs *everything* in containers. She started contributing to
|
# runs *everything* in containers. She started contributing to
|
||||||
# Docker with a (fun fun) change involving both iptables and regular
|
# Docker with a (fun fun) change involving both iptables and regular
|
||||||
# expressions (coz, YOLO!) on July 10, 2014
|
# expressions (coz, YOLO!) on July 10, 2014
|
||||||
# https://github.com/docker/docker/pull/6950/commits/f3a68ffa390fb851115c77783fa4031f1d3b2995.
|
# https://github.com/docker/docker/pull/6950/commits/f3a68ffa390fb851115c77783fa4031f1d3b2995.
|
||||||
# Jess was Release Captain for Docker 1.4, 1.6 and 1.7, and contributed
|
# Jess was Release Captain for Docker 1.4, 1.6 and 1.7, and contributed
|
||||||
# many features and improvement, among which "seccomp profiles" (making
|
# many features and improvement, among which "seccomp profiles" (making
|
||||||
# containers a lot more secure). Besides being a maintainer, she
|
# containers a lot more secure). Besides being a maintainer, she
|
||||||
# set up the CI infrastructure for the project, giving everyone
|
# set up the CI infrastructure for the project, giving everyone
|
||||||
# something to shout at if a PR failed ("noooo Janky!").
|
# something to shout at if a PR failed ("noooo Janky!").
|
||||||
|
# Jess is currently working on the DCOS security team at Mesosphere,
|
||||||
|
# and contributing to various open source projects.
|
||||||
# Be sure you don't miss her talks at a conference near you (a must-see),
|
# Be sure you don't miss her talks at a conference near you (a must-see),
|
||||||
# read her blog at https://blog.jessfraz.com (a must-read), and
|
# read her blog at https://blog.jessfraz.com (a must-read), and
|
||||||
# check out her open source projects on GitHub https://github.com/jessfraz (a must-try).
|
# check out her open source projects on GitHub https://github.com/jfrazelle (a must-try).
|
||||||
"jessfraz",
|
"jfrazelle",
|
||||||
|
|
||||||
# As a maintainer, John Howard managed to make the impossible possible;
|
|
||||||
# to run Docker on Windows. After facing many challenges, teaching
|
|
||||||
# fellow-maintainers that 'Windows is not Linux', and many changes in
|
|
||||||
# Windows Server to facilitate containers, native Windows containers
|
|
||||||
# saw the light of day in 2015.
|
|
||||||
#
|
|
||||||
# John is now enjoying life without containers: playing piano, painting,
|
|
||||||
# and walking his dogs, but you may occasionally see him drop by on GitHub.
|
|
||||||
"lowenna",
|
|
||||||
|
|
||||||
# Alexander Morozov contributed many features to Docker, worked on the premise of
|
|
||||||
# what later became containerd (and worked on that too), and made a "stupid" Go
|
|
||||||
# vendor tool specifically for docker/docker needs: vndr (https://github.com/LK4D4/vndr).
|
|
||||||
# Not many know that Alexander is a master negotiator, being able to change course
|
|
||||||
# of action with a single "Nope, we're not gonna do that".
|
|
||||||
"lk4d4",
|
|
||||||
|
|
||||||
# Madhu Venugopal was part of the SocketPlane team that joined Docker.
|
|
||||||
# As a maintainer, he was working with Jana for the Container Network
|
|
||||||
# Model (CNM) implemented through libnetwork, and the "routing mesh" powering
|
|
||||||
# Swarm mode networking.
|
|
||||||
"mavenugo",
|
|
||||||
|
|
||||||
# As a maintainer, Kenfe-Mickaël Laventure worked on the container runtime,
|
|
||||||
# integrating containerd 1.0 with the daemon, and adding support for custom
|
|
||||||
# OCI runtimes, as well as implementing the `docker prune` subcommands,
|
|
||||||
# which was a welcome feature to be added. You can keep up with Mickaél on
|
|
||||||
# Twitter (@kmlaventure).
|
|
||||||
"mlaventure",
|
|
||||||
|
|
||||||
# As a docs maintainer, Mary Anthony contributed greatly to the Docker
|
|
||||||
# docs. She wrote the Docker Contributor Guide and Getting Started
|
|
||||||
# Guides. She helped create a doc build system independent of
|
|
||||||
# docker/docker project, and implemented a new docs.docker.com theme and
|
|
||||||
# nav for 2015 Dockercon. Fun fact: the most inherited layer in DockerHub
|
|
||||||
# public repositories was originally referenced in
|
|
||||||
# maryatdocker/docker-whale back in May 2015.
|
|
||||||
"moxiegirl",
|
|
||||||
|
|
||||||
# Jana Radhakrishnan was part of the SocketPlane team that joined Docker.
|
|
||||||
# As a maintainer, he was the lead architect for the Container Network
|
|
||||||
# Model (CNM) implemented through libnetwork, and the "routing mesh" powering
|
|
||||||
# Swarm mode networking.
|
|
||||||
#
|
|
||||||
# Jana started new adventures in networking, but you can find him tweeting as @mrjana,
|
|
||||||
# coding on GitHub https://github.com/mrjana, and he may be hiding on the Docker Community
|
|
||||||
# slack channel :-)
|
|
||||||
"mrjana",
|
|
||||||
|
|
||||||
# Sven Dowideit became a well known person in the Docker ecosphere, building
|
|
||||||
# boot2docker, and became a regular contributor to the project, starting as
|
|
||||||
# early as October 2013 (https://github.com/docker/docker/pull/2119), to become
|
|
||||||
# a maintainer less than two months later (https://github.com/docker/docker/pull/3061).
|
|
||||||
#
|
|
||||||
# As a maintainer, Sven took on the task to convert the documentation from
|
|
||||||
# ReStructuredText to Markdown, migrate to Hugo for generating the docs, and
|
|
||||||
# writing tooling for building, testing, and publishing them.
|
|
||||||
#
|
|
||||||
# If you're not in the occasion to visit "the Australian office", you
|
|
||||||
# can keep up with Sven on Twitter (@SvenDowideit), his blog http://fosiki.com,
|
|
||||||
# and of course on GitHub.
|
|
||||||
"sven",
|
|
||||||
|
|
||||||
# Vincent "vbatts!" Batts made his first contribution to the project
|
# Vincent "vbatts!" Batts made his first contribution to the project
|
||||||
# in November 2013, to become a maintainer a few months later, on
|
# in November 2013, to become a maintainer a few months later, on
|
||||||
# May 10, 2014 (https://github.com/docker/docker/commit/d6e666a87a01a5634c250358a94c814bf26cb778).
|
# May 10, 2014 (https://github.com/docker/docker/commit/d6e666a87a01a5634c250358a94c814bf26cb778).
|
||||||
# As a maintainer, Vincent made important contributions to core elements
|
# As a maintainer, Vincent made important contributions to core elements
|
||||||
# of Docker, such as "distribution" (tarsum) and graphdrivers (btrfs, devicemapper).
|
# of Docker, such as "distribution" (tarsum) and graphdrivers (btrfs, devicemapper).
|
||||||
|
@ -264,6 +121,15 @@
|
||||||
# for a chat, as he's always a lot of fun.
|
# for a chat, as he's always a lot of fun.
|
||||||
"vbatts",
|
"vbatts",
|
||||||
|
|
||||||
|
# Victor is one of the earliest contributors to Docker, having worked on the
|
||||||
|
# project when it was still "dotCloud" in April 2013. He's been responsible
|
||||||
|
# for multiple releases (https://github.com/docker/docker/pulls?q=is%3Apr+bump+in%3Atitle+author%3Avieux),
|
||||||
|
# and up until today (2015), our number 2 contributor. Although he's no longer
|
||||||
|
# a maintainer for the Docker "Engine", he's still actively involved in other
|
||||||
|
# Docker projects, and most likely can be found in the Docker Swarm repository,
|
||||||
|
# for which he's a core maintainer.
|
||||||
|
"vieux",
|
||||||
|
|
||||||
# Vishnu became a maintainer to help out on the daemon codebase and
|
# Vishnu became a maintainer to help out on the daemon codebase and
|
||||||
# libcontainer integration. He's currently involved in the
|
# libcontainer integration. He's currently involved in the
|
||||||
# Open Containers Initiative, working on the specifications,
|
# Open Containers Initiative, working on the specifications,
|
||||||
|
@ -284,46 +150,6 @@
|
||||||
Email = "aaron.lehmann@docker.com"
|
Email = "aaron.lehmann@docker.com"
|
||||||
GitHub = "aaronlehmann"
|
GitHub = "aaronlehmann"
|
||||||
|
|
||||||
[people.akerouanton]
|
|
||||||
Name = "Albin Kerouanton"
|
|
||||||
Email = "albinker@gmail.com"
|
|
||||||
GitHub = "akerouanton"
|
|
||||||
|
|
||||||
[people.alexellis]
|
|
||||||
Name = "Alex Ellis"
|
|
||||||
Email = "alexellis2@gmail.com"
|
|
||||||
GitHub = "alexellis"
|
|
||||||
|
|
||||||
[people.akihirosuda]
|
|
||||||
Name = "Akihiro Suda"
|
|
||||||
Email = "akihiro.suda.cz@hco.ntt.co.jp"
|
|
||||||
GitHub = "AkihiroSuda"
|
|
||||||
|
|
||||||
[people.aluzzardi]
|
|
||||||
Name = "Andrea Luzzardi"
|
|
||||||
Email = "al@docker.com"
|
|
||||||
GitHub = "aluzzardi"
|
|
||||||
|
|
||||||
[people.albers]
|
|
||||||
Name = "Harald Albers"
|
|
||||||
Email = "github@albersweb.de"
|
|
||||||
GitHub = "albers"
|
|
||||||
|
|
||||||
[people.andrewhsu]
|
|
||||||
Name = "Andrew Hsu"
|
|
||||||
Email = "andrewhsu@docker.com"
|
|
||||||
GitHub = "andrewhsu"
|
|
||||||
|
|
||||||
[people.anusha]
|
|
||||||
Name = "Anusha Ragunathan"
|
|
||||||
Email = "anusha@docker.com"
|
|
||||||
GitHub = "anusha-ragunathan"
|
|
||||||
|
|
||||||
[people.bsousaa]
|
|
||||||
Name = "Bruno de Sousa"
|
|
||||||
Email = "bruno.sousa@docker.com"
|
|
||||||
GitHub = "bsousaa"
|
|
||||||
|
|
||||||
[people.calavera]
|
[people.calavera]
|
||||||
Name = "David Calavera"
|
Name = "David Calavera"
|
||||||
Email = "david.calavera@gmail.com"
|
Email = "david.calavera@gmail.com"
|
||||||
|
@ -334,46 +160,21 @@
|
||||||
Email = "leijitang@huawei.com"
|
Email = "leijitang@huawei.com"
|
||||||
GitHub = "coolljt0725"
|
GitHub = "coolljt0725"
|
||||||
|
|
||||||
[people.corhere]
|
|
||||||
Name = "Cory Snider"
|
|
||||||
Email = "csnider@mirantis.com"
|
|
||||||
GitHub = "corhere"
|
|
||||||
|
|
||||||
[people.cpuguy83]
|
[people.cpuguy83]
|
||||||
Name = "Brian Goff"
|
Name = "Brian Goff"
|
||||||
Email = "cpuguy83@gmail.com"
|
Email = "cpuguy83@gmail.com"
|
||||||
GitHub = "cpuguy83"
|
Github = "cpuguy83"
|
||||||
|
|
||||||
[people.crazy-max]
|
|
||||||
Name = "Kevin Alvarez"
|
|
||||||
Email = "contact@crazymax.dev"
|
|
||||||
GitHub = "crazy-max"
|
|
||||||
|
|
||||||
[people.crosbymichael]
|
[people.crosbymichael]
|
||||||
Name = "Michael Crosby"
|
Name = "Michael Crosby"
|
||||||
Email = "crosbymichael@gmail.com"
|
Email = "crosbymichael@gmail.com"
|
||||||
GitHub = "crosbymichael"
|
GitHub = "crosbymichael"
|
||||||
|
|
||||||
[people.dnephin]
|
|
||||||
Name = "Daniel Nephin"
|
|
||||||
Email = "dnephin@gmail.com"
|
|
||||||
GitHub = "dnephin"
|
|
||||||
|
|
||||||
[people.dmcgowan]
|
|
||||||
Name = "Derek McGowan"
|
|
||||||
Email = "derek@mcgstyle.net"
|
|
||||||
GitHub = "dmcgowan"
|
|
||||||
|
|
||||||
[people.duglin]
|
[people.duglin]
|
||||||
Name = "Doug Davis"
|
Name = "Doug Davis"
|
||||||
Email = "dug@us.ibm.com"
|
Email = "dug@us.ibm.com"
|
||||||
GitHub = "duglin"
|
GitHub = "duglin"
|
||||||
|
|
||||||
[people.ehazlett]
|
|
||||||
Name = "Evan Hazlett"
|
|
||||||
Email = "ejhazlett@gmail.com"
|
|
||||||
GitHub = "ehazlett"
|
|
||||||
|
|
||||||
[people.erikh]
|
[people.erikh]
|
||||||
Name = "Erik Hollensbe"
|
Name = "Erik Hollensbe"
|
||||||
Email = "erik@docker.com"
|
Email = "erik@docker.com"
|
||||||
|
@ -384,19 +185,9 @@
|
||||||
Email = "estesp@linux.vnet.ibm.com"
|
Email = "estesp@linux.vnet.ibm.com"
|
||||||
GitHub = "estesp"
|
GitHub = "estesp"
|
||||||
|
|
||||||
[people.fntlnz]
|
|
||||||
Name = "Lorenzo Fontana"
|
|
||||||
Email = "fontanalorenz@gmail.com"
|
|
||||||
GitHub = "fntlnz"
|
|
||||||
|
|
||||||
[people.gianarb]
|
|
||||||
Name = "Gianluca Arbezzano"
|
|
||||||
Email = "ga@thumpflow.com"
|
|
||||||
GitHub = "gianarb"
|
|
||||||
|
|
||||||
[people.icecrime]
|
[people.icecrime]
|
||||||
Name = "Arnaud Porterie"
|
Name = "Arnaud Porterie"
|
||||||
Email = "icecrime@gmail.com"
|
Email = "arnaud@docker.com"
|
||||||
GitHub = "icecrime"
|
GitHub = "icecrime"
|
||||||
|
|
||||||
[people.jamtur01]
|
[people.jamtur01]
|
||||||
|
@ -404,41 +195,26 @@
|
||||||
Email = "james@lovedthanlost.net"
|
Email = "james@lovedthanlost.net"
|
||||||
GitHub = "jamtur01"
|
GitHub = "jamtur01"
|
||||||
|
|
||||||
[people.jessfraz]
|
[people.jhowardmsft]
|
||||||
|
Name = "John Howard"
|
||||||
|
Email = "jhoward@microsoft.com"
|
||||||
|
GitHub = "jhowardmsft"
|
||||||
|
|
||||||
|
[people.jfrazelle]
|
||||||
Name = "Jessie Frazelle"
|
Name = "Jessie Frazelle"
|
||||||
Email = "jess@linux.com"
|
Email = "jess@linux.com"
|
||||||
GitHub = "jessfraz"
|
GitHub = "jfrazelle"
|
||||||
|
|
||||||
[people.johnstep]
|
|
||||||
Name = "John Stephens"
|
|
||||||
Email = "johnstep@docker.com"
|
|
||||||
GitHub = "johnstep"
|
|
||||||
|
|
||||||
[people.justincormack]
|
[people.justincormack]
|
||||||
Name = "Justin Cormack"
|
Name = "Justin Cormack"
|
||||||
Email = "justin.cormack@docker.com"
|
Email = "justin.cormack@docker.com"
|
||||||
GitHub = "justincormack"
|
GitHub = "justincormack"
|
||||||
|
|
||||||
[people.kolyshkin]
|
|
||||||
Name = "Kir Kolyshkin"
|
|
||||||
Email = "kolyshkin@gmail.com"
|
|
||||||
GitHub = "kolyshkin"
|
|
||||||
|
|
||||||
[people.laurazard]
|
|
||||||
Name = "Laura Brehm"
|
|
||||||
Email = "laura.brehm@docker.com"
|
|
||||||
GitHub = "laurazard"
|
|
||||||
|
|
||||||
[people.lk4d4]
|
[people.lk4d4]
|
||||||
Name = "Alexander Morozov"
|
Name = "Alexander Morozov"
|
||||||
Email = "lk4d4@docker.com"
|
Email = "lk4d4@docker.com"
|
||||||
GitHub = "lk4d4"
|
GitHub = "lk4d4"
|
||||||
|
|
||||||
[people.lowenna]
|
|
||||||
Name = "John Howard"
|
|
||||||
Email = "github@lowenna.com"
|
|
||||||
GitHub = "lowenna"
|
|
||||||
|
|
||||||
[people.mavenugo]
|
[people.mavenugo]
|
||||||
Name = "Madhu Venugopal"
|
Name = "Madhu Venugopal"
|
||||||
Email = "madhu@docker.com"
|
Email = "madhu@docker.com"
|
||||||
|
@ -449,81 +225,26 @@
|
||||||
Email = "mbauer@us.ibm.com"
|
Email = "mbauer@us.ibm.com"
|
||||||
GitHub = "mhbauer"
|
GitHub = "mhbauer"
|
||||||
|
|
||||||
[people.mlaventure]
|
|
||||||
Name = "Kenfe-Mickaël Laventure"
|
|
||||||
Email = "mickael.laventure@gmail.com"
|
|
||||||
GitHub = "mlaventure"
|
|
||||||
|
|
||||||
[people.moxiegirl]
|
[people.moxiegirl]
|
||||||
Name = "Mary Anthony"
|
Name = "Mary Anthony"
|
||||||
Email = "mary.anthony@docker.com"
|
Email = "mary.anthony@docker.com"
|
||||||
GitHub = "moxiegirl"
|
GitHub = "moxiegirl"
|
||||||
|
|
||||||
[people.mrjana]
|
|
||||||
Name = "Jana Radhakrishnan"
|
|
||||||
Email = "mrjana@docker.com"
|
|
||||||
GitHub = "mrjana"
|
|
||||||
|
|
||||||
[people.neersighted]
|
|
||||||
Name = "Bjorn Neergaard"
|
|
||||||
Email = "bjorn@neersighted.com"
|
|
||||||
GitHub = "neersighted"
|
|
||||||
|
|
||||||
[people.olljanat]
|
|
||||||
Name = "Olli Janatuinen"
|
|
||||||
Email = "olli.janatuinen@gmail.com"
|
|
||||||
GitHub = "olljanat"
|
|
||||||
|
|
||||||
[people.programmerq]
|
[people.programmerq]
|
||||||
Name = "Jeff Anderson"
|
Name = "Jeff Anderson"
|
||||||
Email = "jeff@docker.com"
|
Email = "jeff@docker.com"
|
||||||
GitHub = "programmerq"
|
GitHub = "programmerq"
|
||||||
|
|
||||||
[people.robmry]
|
|
||||||
Name = "Rob Murray"
|
|
||||||
Email = "rob.murray@docker.com"
|
|
||||||
GitHub = "robmry"
|
|
||||||
|
|
||||||
[people.ripcurld]
|
|
||||||
Name = "Boaz Shuster"
|
|
||||||
Email = "ripcurld.github@gmail.com"
|
|
||||||
GitHub = "ripcurld"
|
|
||||||
|
|
||||||
[people.rumpl]
|
|
||||||
Name = "Djordje Lukic"
|
|
||||||
Email = "djordje.lukic@docker.com"
|
|
||||||
GitHub = "rumpl"
|
|
||||||
|
|
||||||
[people.runcom]
|
[people.runcom]
|
||||||
Name = "Antonio Murdaca"
|
Name = "Antonio Murdaca"
|
||||||
Email = "runcom@redhat.com"
|
Email = "runcom@redhat.com"
|
||||||
GitHub = "runcom"
|
GitHub = "runcom"
|
||||||
|
|
||||||
[people.sam-thibault]
|
|
||||||
Name = "Sam Thibault"
|
|
||||||
Email = "sam.thibault@docker.com"
|
|
||||||
GitHub = "sam-thibault"
|
|
||||||
|
|
||||||
[people.samuelkarp]
|
|
||||||
Name = "Samuel Karp"
|
|
||||||
Email = "me@samuelkarp.com"
|
|
||||||
GitHub = "samuelkarp"
|
|
||||||
|
|
||||||
[people.samwhited]
|
|
||||||
Name = "Sam Whited"
|
|
||||||
Email = "sam@samwhited.com"
|
|
||||||
GitHub = "samwhited"
|
|
||||||
|
|
||||||
[people.shykes]
|
[people.shykes]
|
||||||
Name = "Solomon Hykes"
|
Name = "Solomon Hykes"
|
||||||
Email = "solomon@docker.com"
|
Email = "solomon@docker.com"
|
||||||
GitHub = "shykes"
|
GitHub = "shykes"
|
||||||
|
|
||||||
[people.stevvooe]
|
|
||||||
Name = "Stephen Day"
|
|
||||||
Email = "stephen.day@docker.com"
|
|
||||||
GitHub = "stevvooe"
|
|
||||||
|
|
||||||
[people.sven]
|
[people.sven]
|
||||||
Name = "Sven Dowideit"
|
Name = "Sven Dowideit"
|
||||||
Email = "SvenDowideit@home.org.au"
|
Email = "SvenDowideit@home.org.au"
|
||||||
|
@ -573,13 +294,3 @@
|
||||||
Name = "Vishnu Kannan"
|
Name = "Vishnu Kannan"
|
||||||
Email = "vishnuk@google.com"
|
Email = "vishnuk@google.com"
|
||||||
GitHub = "vishh"
|
GitHub = "vishh"
|
||||||
|
|
||||||
[people.vvoland]
|
|
||||||
Name = "Paweł Gronowski"
|
|
||||||
Email = "pawel.gronowski@docker.com"
|
|
||||||
GitHub = "vvoland"
|
|
||||||
|
|
||||||
[people.yongtang]
|
|
||||||
Name = "Yong Tang"
|
|
||||||
Email = "yong.tang.github@outlook.com"
|
|
||||||
GitHub = "yongtang"
|
|
||||||
|
|
250
Makefile
250
Makefile
|
@ -1,128 +1,50 @@
|
||||||
.PHONY: all binary dynbinary build cross help install manpages run shell test test-docker-py test-integration test-unit validate validate-% win
|
.PHONY: all binary build build-gccgo cross default docs docs-build docs-shell shell gccgo test test-docker-py test-integration-cli test-unit validate help
|
||||||
|
|
||||||
DOCKER ?= docker
|
|
||||||
BUILDX ?= $(DOCKER) buildx
|
|
||||||
|
|
||||||
# set the graph driver as the current graphdriver if not set
|
# set the graph driver as the current graphdriver if not set
|
||||||
DOCKER_GRAPHDRIVER := $(if $(DOCKER_GRAPHDRIVER),$(DOCKER_GRAPHDRIVER),$(shell docker info -f '{{ .Driver }}' 2>&1))
|
DOCKER_GRAPHDRIVER := $(if $(DOCKER_GRAPHDRIVER),$(DOCKER_GRAPHDRIVER),$(shell docker info 2>&1 | grep "Storage Driver" | sed 's/.*: //'))
|
||||||
export DOCKER_GRAPHDRIVER
|
|
||||||
|
|
||||||
DOCKER_GITCOMMIT := $(shell git rev-parse HEAD)
|
# get OS/Arch of docker engine
|
||||||
export DOCKER_GITCOMMIT
|
DOCKER_OSARCH := $(shell bash -c 'source hack/make/.detect-daemon-osarch && echo $${DOCKER_ENGINE_OSARCH:-$$DOCKER_CLIENT_OSARCH}')
|
||||||
|
DOCKERFILE := $(shell bash -c 'source hack/make/.detect-daemon-osarch && echo $${DOCKERFILE}')
|
||||||
# allow overriding the repository and branch that validation scripts are running
|
|
||||||
# against these are used in hack/validate/.validate to check what changed in the PR.
|
|
||||||
export VALIDATE_REPO
|
|
||||||
export VALIDATE_BRANCH
|
|
||||||
export VALIDATE_ORIGIN_BRANCH
|
|
||||||
|
|
||||||
export PAGER
|
|
||||||
export GIT_PAGER
|
|
||||||
|
|
||||||
# env vars passed through directly to Docker's build scripts
|
# env vars passed through directly to Docker's build scripts
|
||||||
# to allow things like `make KEEPBUNDLE=1 binary` easily
|
# to allow things like `make KEEPBUNDLE=1 binary` easily
|
||||||
# `project/PACKAGERS.md` have some limited documentation of some of these
|
# `docs/sources/contributing/devenvironment.md ` and `project/PACKAGERS.md` have some limited documentation of some of these
|
||||||
#
|
|
||||||
# DOCKER_LDFLAGS can be used to pass additional parameters to -ldflags
|
|
||||||
# option of "go build". For example, a built-in graphdriver priority list
|
|
||||||
# can be changed during build time like this:
|
|
||||||
#
|
|
||||||
# make DOCKER_LDFLAGS="-X github.com/docker/docker/daemon/graphdriver.priority=overlay2,zfs" dynbinary
|
|
||||||
#
|
|
||||||
DOCKER_ENVS := \
|
DOCKER_ENVS := \
|
||||||
-e BUILDFLAGS \
|
-e BUILDFLAGS \
|
||||||
-e KEEPBUNDLE \
|
-e KEEPBUNDLE \
|
||||||
-e DOCKER_BUILD_ARGS \
|
|
||||||
-e DOCKER_BUILD_GOGC \
|
-e DOCKER_BUILD_GOGC \
|
||||||
-e DOCKER_BUILD_OPTS \
|
|
||||||
-e DOCKER_BUILD_PKGS \
|
-e DOCKER_BUILD_PKGS \
|
||||||
-e DOCKER_BUILDKIT \
|
|
||||||
-e DOCKER_BASH_COMPLETION_PATH \
|
|
||||||
-e DOCKER_CLI_PATH \
|
|
||||||
-e DOCKERCLI_VERSION \
|
|
||||||
-e DOCKERCLI_REPOSITORY \
|
|
||||||
-e DOCKERCLI_INTEGRATION_VERSION \
|
|
||||||
-e DOCKERCLI_INTEGRATION_REPOSITORY \
|
|
||||||
-e DOCKER_DEBUG \
|
-e DOCKER_DEBUG \
|
||||||
-e DOCKER_EXPERIMENTAL \
|
-e DOCKER_EXPERIMENTAL \
|
||||||
-e DOCKER_GITCOMMIT \
|
-e DOCKER_GITCOMMIT \
|
||||||
-e DOCKER_GRAPHDRIVER \
|
-e DOCKER_GRAPHDRIVER=$(DOCKER_GRAPHDRIVER) \
|
||||||
-e DOCKER_LDFLAGS \
|
-e DOCKER_INCREMENTAL_BINARY \
|
||||||
-e DOCKER_PORT \
|
|
||||||
-e DOCKER_REMAP_ROOT \
|
-e DOCKER_REMAP_ROOT \
|
||||||
-e DOCKER_ROOTLESS \
|
|
||||||
-e DOCKER_STORAGE_OPTS \
|
-e DOCKER_STORAGE_OPTS \
|
||||||
-e DOCKER_TEST_HOST \
|
|
||||||
-e DOCKER_USERLANDPROXY \
|
-e DOCKER_USERLANDPROXY \
|
||||||
-e DOCKERD_ARGS \
|
|
||||||
-e DELVE_PORT \
|
|
||||||
-e GITHUB_ACTIONS \
|
|
||||||
-e TEST_FORCE_VALIDATE \
|
|
||||||
-e TEST_INTEGRATION_DIR \
|
|
||||||
-e TEST_INTEGRATION_USE_SNAPSHOTTER \
|
|
||||||
-e TEST_INTEGRATION_FAIL_FAST \
|
|
||||||
-e TEST_SKIP_INTEGRATION \
|
|
||||||
-e TEST_SKIP_INTEGRATION_CLI \
|
|
||||||
-e TEST_IGNORE_CGROUP_CHECK \
|
|
||||||
-e TESTCOVERAGE \
|
|
||||||
-e TESTDEBUG \
|
|
||||||
-e TESTDIRS \
|
-e TESTDIRS \
|
||||||
-e TESTFLAGS \
|
-e TESTFLAGS \
|
||||||
-e TESTFLAGS_INTEGRATION \
|
-e TIMEOUT
|
||||||
-e TESTFLAGS_INTEGRATION_CLI \
|
|
||||||
-e TEST_FILTER \
|
|
||||||
-e TIMEOUT \
|
|
||||||
-e VALIDATE_REPO \
|
|
||||||
-e VALIDATE_BRANCH \
|
|
||||||
-e VALIDATE_ORIGIN_BRANCH \
|
|
||||||
-e VERSION \
|
|
||||||
-e PLATFORM \
|
|
||||||
-e DEFAULT_PRODUCT_LICENSE \
|
|
||||||
-e PRODUCT \
|
|
||||||
-e PACKAGER_NAME \
|
|
||||||
-e PAGER \
|
|
||||||
-e GIT_PAGER \
|
|
||||||
-e OTEL_EXPORTER_OTLP_ENDPOINT \
|
|
||||||
-e OTEL_EXPORTER_OTLP_PROTOCOL \
|
|
||||||
-e OTEL_SERVICE_NAME
|
|
||||||
# note: we _cannot_ add "-e DOCKER_BUILDTAGS" here because even if it's unset in the shell, that would shadow the "ENV DOCKER_BUILDTAGS" set in our Dockerfile, which is very important for our official builds
|
# note: we _cannot_ add "-e DOCKER_BUILDTAGS" here because even if it's unset in the shell, that would shadow the "ENV DOCKER_BUILDTAGS" set in our Dockerfile, which is very important for our official builds
|
||||||
|
|
||||||
# to allow `make BIND_DIR=. shell` or `make BIND_DIR= test`
|
# to allow `make BIND_DIR=. shell` or `make BIND_DIR= test`
|
||||||
# (default to no bind mount if DOCKER_HOST is set)
|
# (default to no bind mount if DOCKER_HOST is set)
|
||||||
# note: BINDDIR is supported for backwards-compatibility here
|
# note: BINDDIR is supported for backwards-compatibility here
|
||||||
BIND_DIR := $(if $(BINDDIR),$(BINDDIR),$(if $(DOCKER_HOST),,bundles))
|
BIND_DIR := $(if $(BINDDIR),$(BINDDIR),$(if $(DOCKER_HOST),,bundles))
|
||||||
|
|
||||||
# DOCKER_MOUNT can be overriden, but use at your own risk!
|
|
||||||
ifndef DOCKER_MOUNT
|
|
||||||
DOCKER_MOUNT := $(if $(BIND_DIR),-v "$(CURDIR)/$(BIND_DIR):/go/src/github.com/docker/docker/$(BIND_DIR)")
|
DOCKER_MOUNT := $(if $(BIND_DIR),-v "$(CURDIR)/$(BIND_DIR):/go/src/github.com/docker/docker/$(BIND_DIR)")
|
||||||
DOCKER_MOUNT := $(if $(DOCKER_BINDDIR_MOUNT_OPTS),$(DOCKER_MOUNT):$(DOCKER_BINDDIR_MOUNT_OPTS),$(DOCKER_MOUNT))
|
|
||||||
|
|
||||||
# This allows the test suite to be able to run without worrying about the underlying fs used by the container running the daemon (e.g. aufs-on-aufs), so long as the host running the container is running a supported fs.
|
# This allows the test suite to be able to run without worrying about the underlying fs used by the container running the daemon (e.g. aufs-on-aufs), so long as the host running the container is running a supported fs.
|
||||||
# The volume will be cleaned up when the container is removed due to `--rm`.
|
# The volume will be cleaned up when the container is removed due to `--rm`.
|
||||||
# Note that `BIND_DIR` will already be set to `bundles` if `DOCKER_HOST` is not set (see above BIND_DIR line), in such case this will do nothing since `DOCKER_MOUNT` will already be set.
|
# Note that `BIND_DIR` will already be set to `bundles` if `DOCKER_HOST` is not set (see above BIND_DIR line), in such case this will do nothing since `DOCKER_MOUNT` will already be set.
|
||||||
DOCKER_MOUNT := $(if $(DOCKER_MOUNT),$(DOCKER_MOUNT),-v /go/src/github.com/docker/docker/bundles) -v "$(CURDIR)/.git:/go/src/github.com/docker/docker/.git"
|
DOCKER_MOUNT := $(if $(DOCKER_MOUNT),$(DOCKER_MOUNT),-v "/go/src/github.com/docker/docker/bundles")
|
||||||
|
|
||||||
DOCKER_MOUNT_CACHE := -v docker-dev-cache:/root/.cache -v docker-mod-cache:/go/pkg/mod/
|
GIT_BRANCH := $(shell git rev-parse --abbrev-ref HEAD 2>/dev/null)
|
||||||
DOCKER_MOUNT_CLI := $(if $(DOCKER_CLI_PATH),-v $(shell dirname $(DOCKER_CLI_PATH)):/usr/local/cli,)
|
GIT_BRANCH_CLEAN := $(shell echo $(GIT_BRANCH) | sed -e "s/[^[:alnum:]]/-/g")
|
||||||
DOCKER_MOUNT_BASH_COMPLETION := $(if $(DOCKER_BASH_COMPLETION_PATH),-v $(shell dirname $(DOCKER_BASH_COMPLETION_PATH)):/usr/local/completion/bash,)
|
DOCKER_IMAGE := docker-dev$(if $(GIT_BRANCH_CLEAN),:$(GIT_BRANCH_CLEAN))
|
||||||
DOCKER_MOUNT := $(DOCKER_MOUNT) $(DOCKER_MOUNT_CACHE) $(DOCKER_MOUNT_CLI) $(DOCKER_MOUNT_BASH_COMPLETION)
|
DOCKER_DOCS_IMAGE := docker-docs$(if $(GIT_BRANCH_CLEAN),:$(GIT_BRANCH_CLEAN))
|
||||||
endif # ifndef DOCKER_MOUNT
|
|
||||||
|
|
||||||
# This allows to set the docker-dev container name
|
DOCKER_FLAGS := docker run --rm -i --privileged $(DOCKER_ENVS) $(DOCKER_MOUNT)
|
||||||
DOCKER_CONTAINER_NAME := $(if $(CONTAINER_NAME),--name $(CONTAINER_NAME),)
|
|
||||||
|
|
||||||
DOCKER_IMAGE := docker-dev
|
|
||||||
DOCKER_PORT_FORWARD := $(if $(DOCKER_PORT),-p "$(DOCKER_PORT)",)
|
|
||||||
DELVE_PORT_FORWARD := $(if $(DELVE_PORT),-p "$(DELVE_PORT)",)
|
|
||||||
|
|
||||||
DOCKER_FLAGS := $(DOCKER) run --rm --privileged $(DOCKER_CONTAINER_NAME) $(DOCKER_ENVS) $(DOCKER_MOUNT) $(DOCKER_PORT_FORWARD) $(DELVE_PORT_FORWARD)
|
|
||||||
|
|
||||||
SWAGGER_DOCS_PORT ?= 9000
|
|
||||||
|
|
||||||
define \n
|
|
||||||
|
|
||||||
|
|
||||||
endef
|
|
||||||
|
|
||||||
# if this session isn't interactive, then we don't want to allocate a
|
# if this session isn't interactive, then we don't want to allocate a
|
||||||
# TTY, which would fail, but if it is interactive, we do want to attach
|
# TTY, which would fail, but if it is interactive, we do want to attach
|
||||||
|
@ -132,135 +54,73 @@ ifeq ($(INTERACTIVE), 1)
|
||||||
DOCKER_FLAGS += -t
|
DOCKER_FLAGS += -t
|
||||||
endif
|
endif
|
||||||
|
|
||||||
# on GitHub Runners input device is not a TTY but we allocate a pseudo-one,
|
|
||||||
# otherwise keep STDIN open even if not attached if not a GitHub Runner.
|
|
||||||
ifeq ($(GITHUB_ACTIONS),true)
|
|
||||||
DOCKER_FLAGS += -t
|
|
||||||
else
|
|
||||||
DOCKER_FLAGS += -i
|
|
||||||
endif
|
|
||||||
|
|
||||||
DOCKER_RUN_DOCKER := $(DOCKER_FLAGS) "$(DOCKER_IMAGE)"
|
DOCKER_RUN_DOCKER := $(DOCKER_FLAGS) "$(DOCKER_IMAGE)"
|
||||||
|
|
||||||
DOCKER_BUILD_ARGS += --build-arg=GO_VERSION
|
|
||||||
DOCKER_BUILD_ARGS += --build-arg=DOCKERCLI_VERSION
|
|
||||||
DOCKER_BUILD_ARGS += --build-arg=DOCKERCLI_REPOSITORY
|
|
||||||
DOCKER_BUILD_ARGS += --build-arg=DOCKERCLI_INTEGRATION_VERSION
|
|
||||||
DOCKER_BUILD_ARGS += --build-arg=DOCKERCLI_INTEGRATION_REPOSITORY
|
|
||||||
ifdef DOCKER_SYSTEMD
|
|
||||||
DOCKER_BUILD_ARGS += --build-arg=SYSTEMD=true
|
|
||||||
endif
|
|
||||||
|
|
||||||
BUILD_OPTS := ${DOCKER_BUILD_ARGS} ${DOCKER_BUILD_OPTS}
|
|
||||||
BUILD_CMD := $(BUILDX) build
|
|
||||||
BAKE_CMD := $(BUILDX) bake
|
|
||||||
|
|
||||||
default: binary
|
default: binary
|
||||||
|
|
||||||
all: build ## validate all checks, build linux binaries, run all tests,\ncross build non-linux binaries, and generate archives
|
all: build ## validate all checks, build linux binaries, run all tests\ncross build non-linux binaries and generate archives
|
||||||
$(DOCKER_RUN_DOCKER) bash -c 'hack/validate/default && hack/make.sh'
|
$(DOCKER_RUN_DOCKER) hack/make.sh
|
||||||
|
|
||||||
binary: bundles ## build statically linked linux binaries
|
binary: build ## build the linux binaries
|
||||||
$(BAKE_CMD) binary
|
$(DOCKER_RUN_DOCKER) hack/make.sh binary
|
||||||
|
|
||||||
dynbinary: bundles ## build dynamically linked linux binaries
|
build: bundles
|
||||||
$(BAKE_CMD) dynbinary
|
docker build ${DOCKER_BUILD_ARGS} -t "$(DOCKER_IMAGE)" -f "$(DOCKERFILE)" .
|
||||||
|
|
||||||
cross: bundles ## cross build the binaries
|
build-gccgo: bundles
|
||||||
$(BAKE_CMD) binary-cross
|
docker build ${DOCKER_BUILD_ARGS} -t "$(DOCKER_IMAGE)-gccgo" -f Dockerfile.gccgo .
|
||||||
|
|
||||||
bundles:
|
bundles:
|
||||||
mkdir bundles
|
mkdir bundles
|
||||||
|
|
||||||
.PHONY: clean
|
cross: build ## cross build the binaries for darwin, freebsd and\nwindows
|
||||||
clean: clean-cache
|
$(DOCKER_RUN_DOCKER) hack/make.sh dynbinary binary cross
|
||||||
|
|
||||||
.PHONY: clean-cache
|
win: build ## cross build the binary for windows
|
||||||
clean-cache: ## remove the docker volumes that are used for caching in the dev-container
|
$(DOCKER_RUN_DOCKER) hack/make.sh win
|
||||||
docker volume rm -f docker-dev-cache docker-mod-cache
|
|
||||||
|
|
||||||
help: ## this help
|
tgz: build ## build the archives (.zip on windows and .tgz\notherwise) containing the binaries
|
||||||
@awk 'BEGIN {FS = ":.*?## "} /^[a-zA-Z0-9_-]+:.*?## / {gsub("\\\\n",sprintf("\n%22c",""), $$2);printf "\033[36m%-20s\033[0m %s\n", $$1, $$2}' $(MAKEFILE_LIST)
|
$(DOCKER_RUN_DOCKER) hack/make.sh dynbinary binary cross tgz
|
||||||
|
|
||||||
|
deb: build ## build the deb packages
|
||||||
|
$(DOCKER_RUN_DOCKER) hack/make.sh dynbinary build-deb
|
||||||
|
|
||||||
|
docs: ## build the docs
|
||||||
|
$(MAKE) -C docs docs
|
||||||
|
|
||||||
|
gccgo: build-gccgo ## build the gcc-go linux binaries
|
||||||
|
$(DOCKER_FLAGS) "$(DOCKER_IMAGE)-gccgo" hack/make.sh gccgo
|
||||||
|
|
||||||
install: ## install the linux binaries
|
install: ## install the linux binaries
|
||||||
KEEPBUNDLE=1 hack/make.sh install-binary
|
KEEPBUNDLE=1 hack/make.sh install-binary
|
||||||
|
|
||||||
run: build ## run the docker daemon in a container
|
rpm: build ## build the rpm packages
|
||||||
$(DOCKER_RUN_DOCKER) sh -c "KEEPBUNDLE=1 hack/make.sh install-binary run"
|
$(DOCKER_RUN_DOCKER) hack/make.sh dynbinary build-rpm
|
||||||
|
|
||||||
.PHONY: build
|
|
||||||
ifeq ($(BIND_DIR), .)
|
|
||||||
build: shell_target := --target=dev-base
|
|
||||||
else
|
|
||||||
build: shell_target := --target=dev
|
|
||||||
endif
|
|
||||||
build: bundles
|
|
||||||
$(BUILD_CMD) $(BUILD_OPTS) $(shell_target) --load -t "$(DOCKER_IMAGE)" .
|
|
||||||
|
|
||||||
shell: build ## start a shell inside the build env
|
shell: build ## start a shell inside the build env
|
||||||
$(DOCKER_RUN_DOCKER) bash
|
$(DOCKER_RUN_DOCKER) bash
|
||||||
|
|
||||||
test: build test-unit ## run the unit, integration and docker-py tests
|
test: build ## run the unit, integration and docker-py tests
|
||||||
$(DOCKER_RUN_DOCKER) hack/make.sh dynbinary test-integration test-docker-py
|
$(DOCKER_RUN_DOCKER) hack/make.sh dynbinary cross test-unit test-integration-cli test-docker-py
|
||||||
|
|
||||||
test-docker-py: build ## run the docker-py tests
|
test-docker-py: build ## run the docker-py tests
|
||||||
$(DOCKER_RUN_DOCKER) hack/make.sh dynbinary test-docker-py
|
$(DOCKER_RUN_DOCKER) hack/make.sh dynbinary test-docker-py
|
||||||
|
|
||||||
test-integration-cli: test-integration ## (DEPRECATED) use test-integration
|
test-integration-cli: build ## run the integration tests
|
||||||
|
$(DOCKER_RUN_DOCKER) hack/make.sh dynbinary test-integration-cli
|
||||||
ifneq ($(and $(TEST_SKIP_INTEGRATION),$(TEST_SKIP_INTEGRATION_CLI)),)
|
|
||||||
test-integration:
|
|
||||||
@echo Both integrations suites skipped per environment variables
|
|
||||||
else
|
|
||||||
test-integration: build ## run the integration tests
|
|
||||||
$(DOCKER_RUN_DOCKER) hack/make.sh dynbinary test-integration
|
|
||||||
endif
|
|
||||||
|
|
||||||
test-integration-flaky: build ## run the stress test for all new integration tests
|
|
||||||
$(DOCKER_RUN_DOCKER) hack/make.sh dynbinary test-integration-flaky
|
|
||||||
|
|
||||||
test-unit: build ## run the unit tests
|
test-unit: build ## run the unit tests
|
||||||
$(DOCKER_RUN_DOCKER) hack/test/unit
|
$(DOCKER_RUN_DOCKER) hack/make.sh test-unit
|
||||||
|
|
||||||
validate: build ## validate DCO, Seccomp profile generation, gofmt,\n./pkg/ isolation, golint, tests, tomls, go vet and vendor
|
validate: build ## validate DCO, Seccomp profile generation, gofmt,\n./pkg/ isolation, golint, tests, tomls, go vet and vendor
|
||||||
$(DOCKER_RUN_DOCKER) hack/validate/all
|
$(DOCKER_RUN_DOCKER) hack/make.sh validate-dco validate-default-seccomp validate-gofmt validate-pkg validate-lint validate-test validate-toml validate-vet validate-vendor
|
||||||
|
|
||||||
validate-generate-files:
|
manpages: ## Generate man pages from go source and markdown
|
||||||
$(BUILD_CMD) --target "validate" \
|
docker build -t docker-manpage-dev -f "man/$(DOCKERFILE)" ./man
|
||||||
--output "type=cacheonly" \
|
docker run \
|
||||||
--file "./hack/dockerfiles/generate-files.Dockerfile" .
|
-v $(PWD):/go/src/github.com/docker/docker/ \
|
||||||
|
docker-manpage-dev
|
||||||
|
|
||||||
validate-%: build ## validate specific check
|
help: ## this help
|
||||||
$(DOCKER_RUN_DOCKER) hack/validate/$*
|
@awk 'BEGIN {FS = ":.*?## "} /^[a-zA-Z_-]+:.*?## / {sub("\\\\n",sprintf("\n%22c"," "), $$2);printf "\033[36m%-20s\033[0m %s\n", $$1, $$2}' $(MAKEFILE_LIST)
|
||||||
|
|
||||||
win: bundles ## cross build the binary for windows
|
|
||||||
$(BAKE_CMD) --set *.platform=windows/amd64 binary
|
|
||||||
|
|
||||||
.PHONY: swagger-gen
|
|
||||||
swagger-gen:
|
|
||||||
docker run --rm -v $(PWD):/go/src/github.com/docker/docker \
|
|
||||||
-w /go/src/github.com/docker/docker \
|
|
||||||
--entrypoint hack/generate-swagger-api.sh \
|
|
||||||
-e GOPATH=/go \
|
|
||||||
quay.io/goswagger/swagger:0.7.4
|
|
||||||
|
|
||||||
.PHONY: swagger-docs
|
|
||||||
swagger-docs: ## preview the API documentation
|
|
||||||
@echo "API docs preview will be running at http://localhost:$(SWAGGER_DOCS_PORT)"
|
|
||||||
@docker run --rm -v $(PWD)/api/swagger.yaml:/usr/share/nginx/html/swagger.yaml \
|
|
||||||
-e 'REDOC_OPTIONS=hide-hostname="true" lazy-rendering' \
|
|
||||||
-p $(SWAGGER_DOCS_PORT):80 \
|
|
||||||
bfirsh/redoc:1.14.0
|
|
||||||
|
|
||||||
.PHONY: generate-files
|
|
||||||
generate-files:
|
|
||||||
$(eval $@_TMP_OUT := $(shell mktemp -d -t moby-output.XXXXXXXXXX))
|
|
||||||
@if [ -z "$($@_TMP_OUT)" ]; then \
|
|
||||||
echo "Temp dir is not set"; \
|
|
||||||
exit 1; \
|
|
||||||
fi
|
|
||||||
$(BUILD_CMD) --target "update" \
|
|
||||||
--output "type=local,dest=$($@_TMP_OUT)" \
|
|
||||||
--file "./hack/dockerfiles/generate-files.Dockerfile" .
|
|
||||||
cp -R "$($@_TMP_OUT)"/. .
|
|
||||||
rm -rf "$($@_TMP_OUT)"/*
|
|
||||||
|
|
4
NOTICE
4
NOTICE
|
@ -1,9 +1,9 @@
|
||||||
Docker
|
Docker
|
||||||
Copyright 2012-2017 Docker, Inc.
|
Copyright 2012-2016 Docker, Inc.
|
||||||
|
|
||||||
This product includes software developed at Docker, Inc. (https://www.docker.com).
|
This product includes software developed at Docker, Inc. (https://www.docker.com).
|
||||||
|
|
||||||
This product contains software (https://github.com/creack/pty) developed
|
This product contains software (https://github.com/kr/pty) developed
|
||||||
by Keith Rarick, licensed under the MIT License.
|
by Keith Rarick, licensed under the MIT License.
|
||||||
|
|
||||||
The following is courtesy of our legal counsel:
|
The following is courtesy of our legal counsel:
|
||||||
|
|
309
README.md
309
README.md
|
@ -1,48 +1,270 @@
|
||||||
The Moby Project
|
Docker: the container engine [![Release](https://img.shields.io/github/release/docker/docker.svg)](https://github.com/docker/docker/releases/latest)
|
||||||
================
|
============================
|
||||||
|
|
||||||
![Moby Project logo](docs/static_files/moby-project-logo.png "The Moby Project")
|
Docker is an open source project to pack, ship and run any application
|
||||||
|
as a lightweight container.
|
||||||
|
|
||||||
Moby is an open-source project created by Docker to enable and accelerate software containerization.
|
Docker containers are both *hardware-agnostic* and *platform-agnostic*.
|
||||||
|
This means they can run anywhere, from your laptop to the largest
|
||||||
|
cloud compute instance and everything in between - and they don't require
|
||||||
|
you to use a particular language, framework or packaging system. That
|
||||||
|
makes them great building blocks for deploying and scaling web apps,
|
||||||
|
databases, and backend services without depending on a particular stack
|
||||||
|
or provider.
|
||||||
|
|
||||||
It provides a "Lego set" of toolkit components, the framework for assembling them into custom container-based systems, and a place for all container enthusiasts and professionals to experiment and exchange ideas.
|
Docker began as an open-source implementation of the deployment engine which
|
||||||
Components include container build tools, a container registry, orchestration tools, a runtime and more, and these can be used as building blocks in conjunction with other tools and projects.
|
powered [dotCloud](http://web.archive.org/web/20130530031104/https://www.dotcloud.com/),
|
||||||
|
a popular Platform-as-a-Service. It benefits directly from the experience
|
||||||
|
accumulated over several years of large-scale operation and support of hundreds
|
||||||
|
of thousands of applications and databases.
|
||||||
|
|
||||||
## Principles
|
![Docker logo](docs/static_files/docker-logo-compressed.png "Docker")
|
||||||
|
|
||||||
Moby is an open project guided by strong principles, aiming to be modular, flexible and without too strong an opinion on user experience.
|
## Security Disclosure
|
||||||
It is open to the community to help set its direction.
|
|
||||||
|
|
||||||
- Modular: the project includes lots of components that have well-defined functions and APIs that work together.
|
Security is very important to us. If you have any issue regarding security,
|
||||||
- Batteries included but swappable: Moby includes enough components to build fully featured container systems, but its modular architecture ensures that most of the components can be swapped by different implementations.
|
please disclose the information responsibly by sending an email to
|
||||||
- Usable security: Moby provides secure defaults without compromising usability.
|
security@docker.com and not by creating a github issue.
|
||||||
- Developer focused: The APIs are intended to be functional and useful to build powerful tools.
|
|
||||||
They are not necessarily intended as end user tools but as components aimed at developers.
|
|
||||||
Documentation and UX is aimed at developers not end users.
|
|
||||||
|
|
||||||
## Audience
|
## Better than VMs
|
||||||
|
|
||||||
The Moby Project is intended for engineers, integrators and enthusiasts looking to modify, hack, fix, experiment, invent and build systems based on containers.
|
A common method for distributing applications and sandboxing their
|
||||||
It is not for people looking for a commercially supported system, but for people who want to work and learn with open source code.
|
execution is to use virtual machines, or VMs. Typical VM formats are
|
||||||
|
VMware's vmdk, Oracle VirtualBox's vdi, and Amazon EC2's ami. In theory
|
||||||
|
these formats should allow every developer to automatically package
|
||||||
|
their application into a "machine" for easy distribution and deployment.
|
||||||
|
In practice, that almost never happens, for a few reasons:
|
||||||
|
|
||||||
## Relationship with Docker
|
* *Size*: VMs are very large which makes them impractical to store
|
||||||
|
and transfer.
|
||||||
|
* *Performance*: running VMs consumes significant CPU and memory,
|
||||||
|
which makes them impractical in many scenarios, for example local
|
||||||
|
development of multi-tier applications, and large-scale deployment
|
||||||
|
of cpu and memory-intensive applications on large numbers of
|
||||||
|
machines.
|
||||||
|
* *Portability*: competing VM environments don't play well with each
|
||||||
|
other. Although conversion tools do exist, they are limited and
|
||||||
|
add even more overhead.
|
||||||
|
* *Hardware-centric*: VMs were designed with machine operators in
|
||||||
|
mind, not software developers. As a result, they offer very
|
||||||
|
limited tooling for what developers need most: building, testing
|
||||||
|
and running their software. For example, VMs offer no facilities
|
||||||
|
for application versioning, monitoring, configuration, logging or
|
||||||
|
service discovery.
|
||||||
|
|
||||||
The components and tools in the Moby Project are initially the open source components that Docker and the community have built for the Docker Project.
|
By contrast, Docker relies on a different sandboxing method known as
|
||||||
New projects can be added if they fit with the community goals. Docker is committed to using Moby as the upstream for the Docker Product.
|
*containerization*. Unlike traditional virtualization, containerization
|
||||||
However, other projects are also encouraged to use Moby as an upstream, and to reuse the components in diverse ways, and all these uses will be treated in the same way. External maintainers and contributors are welcomed.
|
takes place at the kernel level. Most modern operating system kernels
|
||||||
|
now support the primitives necessary for containerization, including
|
||||||
|
Linux with [openvz](https://openvz.org),
|
||||||
|
[vserver](http://linux-vserver.org) and more recently
|
||||||
|
[lxc](https://linuxcontainers.org/), Solaris with
|
||||||
|
[zones](https://docs.oracle.com/cd/E26502_01/html/E29024/preface-1.html#scrolltoc),
|
||||||
|
and FreeBSD with
|
||||||
|
[Jails](https://www.freebsd.org/doc/handbook/jails.html).
|
||||||
|
|
||||||
The Moby project is not intended as a location for support or feature requests for Docker products, but as a place for contributors to work on open source code, fix bugs, and make the code more useful.
|
Docker builds on top of these low-level primitives to offer developers a
|
||||||
The releases are supported by the maintainers, community and users, on a best efforts basis only, and are not intended for customers who want enterprise or commercial support; Docker EE is the appropriate product for these use cases.
|
portable format and runtime environment that solves all four problems.
|
||||||
|
Docker containers are small (and their transfer can be optimized with
|
||||||
|
layers), they have basically zero memory and cpu overhead, they are
|
||||||
|
completely portable, and are designed from the ground up with an
|
||||||
|
application-centric design.
|
||||||
|
|
||||||
-----
|
Perhaps best of all, because Docker operates at the OS level, it can still be
|
||||||
|
run inside a VM!
|
||||||
|
|
||||||
Legal
|
## Plays well with others
|
||||||
=====
|
|
||||||
|
Docker does not require you to buy into a particular programming
|
||||||
|
language, framework, packaging system, or configuration language.
|
||||||
|
|
||||||
|
Is your application a Unix process? Does it use files, tcp connections,
|
||||||
|
environment variables, standard Unix streams and command-line arguments
|
||||||
|
as inputs and outputs? Then Docker can run it.
|
||||||
|
|
||||||
|
Can your application's build be expressed as a sequence of such
|
||||||
|
commands? Then Docker can build it.
|
||||||
|
|
||||||
|
## Escape dependency hell
|
||||||
|
|
||||||
|
A common problem for developers is the difficulty of managing all
|
||||||
|
their application's dependencies in a simple and automated way.
|
||||||
|
|
||||||
|
This is usually difficult for several reasons:
|
||||||
|
|
||||||
|
* *Cross-platform dependencies*. Modern applications often depend on
|
||||||
|
a combination of system libraries and binaries, language-specific
|
||||||
|
packages, framework-specific modules, internal components
|
||||||
|
developed for another project, etc. These dependencies live in
|
||||||
|
different "worlds" and require different tools - these tools
|
||||||
|
typically don't work well with each other, requiring awkward
|
||||||
|
custom integrations.
|
||||||
|
|
||||||
|
* *Conflicting dependencies*. Different applications may depend on
|
||||||
|
different versions of the same dependency. Packaging tools handle
|
||||||
|
these situations with various degrees of ease - but they all
|
||||||
|
handle them in different and incompatible ways, which again forces
|
||||||
|
the developer to do extra work.
|
||||||
|
|
||||||
|
* *Custom dependencies*. A developer may need to prepare a custom
|
||||||
|
version of their application's dependency. Some packaging systems
|
||||||
|
can handle custom versions of a dependency, others can't - and all
|
||||||
|
of them handle it differently.
|
||||||
|
|
||||||
|
|
||||||
|
Docker solves the problem of dependency hell by giving the developer a simple
|
||||||
|
way to express *all* their application's dependencies in one place, while
|
||||||
|
streamlining the process of assembling them. If this makes you think of
|
||||||
|
[XKCD 927](https://xkcd.com/927/), don't worry. Docker doesn't
|
||||||
|
*replace* your favorite packaging systems. It simply orchestrates
|
||||||
|
their use in a simple and repeatable way. How does it do that? With
|
||||||
|
layers.
|
||||||
|
|
||||||
|
Docker defines a build as running a sequence of Unix commands, one
|
||||||
|
after the other, in the same container. Build commands modify the
|
||||||
|
contents of the container (usually by installing new files on the
|
||||||
|
filesystem), the next command modifies it some more, etc. Since each
|
||||||
|
build command inherits the result of the previous commands, the
|
||||||
|
*order* in which the commands are executed expresses *dependencies*.
|
||||||
|
|
||||||
|
Here's a typical Docker build process:
|
||||||
|
|
||||||
|
```bash
|
||||||
|
FROM ubuntu:12.04
|
||||||
|
RUN apt-get update && apt-get install -y python python-pip curl
|
||||||
|
RUN curl -sSL https://github.com/shykes/helloflask/archive/master.tar.gz | tar -xzv
|
||||||
|
RUN cd helloflask-master && pip install -r requirements.txt
|
||||||
|
```
|
||||||
|
|
||||||
|
Note that Docker doesn't care *how* dependencies are built - as long
|
||||||
|
as they can be built by running a Unix command in a container.
|
||||||
|
|
||||||
|
|
||||||
|
Getting started
|
||||||
|
===============
|
||||||
|
|
||||||
|
Docker can be installed either on your computer for building applications or
|
||||||
|
on servers for running them. To get started, [check out the installation
|
||||||
|
instructions in the
|
||||||
|
documentation](https://docs.docker.com/engine/installation/).
|
||||||
|
|
||||||
|
Usage examples
|
||||||
|
==============
|
||||||
|
|
||||||
|
Docker can be used to run short-lived commands, long-running daemons
|
||||||
|
(app servers, databases, etc.), interactive shell sessions, etc.
|
||||||
|
|
||||||
|
You can find a [list of real-world
|
||||||
|
examples](https://docs.docker.com/engine/examples/) in the
|
||||||
|
documentation.
|
||||||
|
|
||||||
|
Under the hood
|
||||||
|
--------------
|
||||||
|
|
||||||
|
Under the hood, Docker is built on the following components:
|
||||||
|
|
||||||
|
* The
|
||||||
|
[cgroups](https://www.kernel.org/doc/Documentation/cgroup-v1/cgroups.txt)
|
||||||
|
and
|
||||||
|
[namespaces](http://man7.org/linux/man-pages/man7/namespaces.7.html)
|
||||||
|
capabilities of the Linux kernel
|
||||||
|
* The [Go](https://golang.org) programming language
|
||||||
|
* The [Docker Image Specification](https://github.com/docker/docker/blob/master/image/spec/v1.md)
|
||||||
|
* The [Libcontainer Specification](https://github.com/opencontainers/runc/blob/master/libcontainer/SPEC.md)
|
||||||
|
|
||||||
|
Contributing to Docker [![GoDoc](https://godoc.org/github.com/docker/docker?status.svg)](https://godoc.org/github.com/docker/docker)
|
||||||
|
======================
|
||||||
|
|
||||||
|
| **Master** (Linux) | **Experimental** (linux) | **Windows** | **FreeBSD** |
|
||||||
|
|------------------|----------------------|---------|---------|
|
||||||
|
| [![Jenkins Build Status](https://jenkins.dockerproject.org/view/Docker/job/Docker%20Master/badge/icon)](https://jenkins.dockerproject.org/view/Docker/job/Docker%20Master/) | [![Jenkins Build Status](https://jenkins.dockerproject.org/view/Docker/job/Docker%20Master%20%28experimental%29/badge/icon)](https://jenkins.dockerproject.org/view/Docker/job/Docker%20Master%20%28experimental%29/) | [![Build Status](http://jenkins.dockerproject.org/job/Docker%20Master%20(windows)/badge/icon)](http://jenkins.dockerproject.org/job/Docker%20Master%20(windows)/) | [![Build Status](http://jenkins.dockerproject.org/job/Docker%20Master%20(freebsd)/badge/icon)](http://jenkins.dockerproject.org/job/Docker%20Master%20(freebsd)/) |
|
||||||
|
|
||||||
|
Want to hack on Docker? Awesome! We have [instructions to help you get
|
||||||
|
started contributing code or documentation](https://docs.docker.com/opensource/project/who-written-for/).
|
||||||
|
|
||||||
|
These instructions are probably not perfect, please let us know if anything
|
||||||
|
feels wrong or incomplete. Better yet, submit a PR and improve them yourself.
|
||||||
|
|
||||||
|
Getting the development builds
|
||||||
|
==============================
|
||||||
|
|
||||||
|
Want to run Docker from a master build? You can download
|
||||||
|
master builds at [master.dockerproject.org](https://master.dockerproject.org).
|
||||||
|
They are updated with each commit merged into the master branch.
|
||||||
|
|
||||||
|
Don't know how to use that super cool new feature in the master build? Check
|
||||||
|
out the master docs at
|
||||||
|
[docs.master.dockerproject.org](http://docs.master.dockerproject.org).
|
||||||
|
|
||||||
|
How the project is run
|
||||||
|
======================
|
||||||
|
|
||||||
|
Docker is a very, very active project. If you want to learn more about how it is run,
|
||||||
|
or want to get more involved, the best place to start is [the project directory](https://github.com/docker/docker/tree/master/project).
|
||||||
|
|
||||||
|
We are always open to suggestions on process improvements, and are always looking for more maintainers.
|
||||||
|
|
||||||
|
### Talking to other Docker users and contributors
|
||||||
|
|
||||||
|
<table class="tg">
|
||||||
|
<col width="45%">
|
||||||
|
<col width="65%">
|
||||||
|
<tr>
|
||||||
|
<td>Internet Relay Chat (IRC)</td>
|
||||||
|
<td>
|
||||||
|
<p>
|
||||||
|
IRC is a direct line to our most knowledgeable Docker users; we have
|
||||||
|
both the <code>#docker</code> and <code>#docker-dev</code> group on
|
||||||
|
<strong>irc.freenode.net</strong>.
|
||||||
|
IRC is a rich chat protocol but it can overwhelm new users. You can search
|
||||||
|
<a href="https://botbot.me/freenode/docker/#" target="_blank">our chat archives</a>.
|
||||||
|
</p>
|
||||||
|
Read our <a href="https://docs.docker.com/project/get-help/#irc-quickstart" target="_blank">IRC quickstart guide</a> for an easy way to get started.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Docker Community Forums</td>
|
||||||
|
<td>
|
||||||
|
The <a href="https://forums.docker.com/c/open-source-projects/de" target="_blank">Docker Engine</a>
|
||||||
|
group is for users of the Docker Engine project.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Google Groups</td>
|
||||||
|
<td>
|
||||||
|
The <a href="https://groups.google.com/forum/#!forum/docker-dev"
|
||||||
|
target="_blank">docker-dev</a> group is for contributors and other people
|
||||||
|
contributing to the Docker project. You can join this group without a
|
||||||
|
Google account by sending an email to <a
|
||||||
|
href="mailto:docker-dev+subscribe@googlegroups.com">docker-dev+subscribe@googlegroups.com</a>.
|
||||||
|
You'll receive a join-request message; simply reply to the message to
|
||||||
|
confirm your subscribtion.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Twitter</td>
|
||||||
|
<td>
|
||||||
|
You can follow <a href="https://twitter.com/docker/" target="_blank">Docker's Twitter feed</a>
|
||||||
|
to get updates on our products. You can also tweet us questions or just
|
||||||
|
share blogs or stories.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
<tr>
|
||||||
|
<td>Stack Overflow</td>
|
||||||
|
<td>
|
||||||
|
Stack Overflow has over 7000 Docker questions listed. We regularly
|
||||||
|
monitor <a href="https://stackoverflow.com/search?tab=newest&q=docker" target="_blank">Docker questions</a>
|
||||||
|
and so do many other knowledgeable Docker users.
|
||||||
|
</td>
|
||||||
|
</tr>
|
||||||
|
</table>
|
||||||
|
|
||||||
|
### Legal
|
||||||
|
|
||||||
*Brought to you courtesy of our legal counsel. For more context,
|
*Brought to you courtesy of our legal counsel. For more context,
|
||||||
please see the [NOTICE](https://github.com/moby/moby/blob/master/NOTICE) document in this repo.*
|
please see the [NOTICE](https://github.com/docker/docker/blob/master/NOTICE) document in this repo.*
|
||||||
|
|
||||||
Use and transfer of Moby may be subject to certain restrictions by the
|
Use and transfer of Docker may be subject to certain restrictions by the
|
||||||
United States and other governments.
|
United States and other governments.
|
||||||
|
|
||||||
It is your responsibility to ensure that your use and/or transfer does not
|
It is your responsibility to ensure that your use and/or transfer does not
|
||||||
|
@ -50,8 +272,33 @@ violate applicable laws.
|
||||||
|
|
||||||
For more information, please see https://www.bis.doc.gov
|
For more information, please see https://www.bis.doc.gov
|
||||||
|
|
||||||
|
|
||||||
Licensing
|
Licensing
|
||||||
=========
|
=========
|
||||||
Moby is licensed under the Apache License, Version 2.0. See
|
Docker is licensed under the Apache License, Version 2.0. See
|
||||||
[LICENSE](https://github.com/moby/moby/blob/master/LICENSE) for the full
|
[LICENSE](https://github.com/docker/docker/blob/master/LICENSE) for the full
|
||||||
license text.
|
license text.
|
||||||
|
|
||||||
|
Other Docker Related Projects
|
||||||
|
=============================
|
||||||
|
There are a number of projects under development that are based on Docker's
|
||||||
|
core technology. These projects expand the tooling built around the
|
||||||
|
Docker platform to broaden its application and utility.
|
||||||
|
|
||||||
|
* [Docker Registry](https://github.com/docker/distribution): Registry
|
||||||
|
server for Docker (hosting/delivery of repositories and images)
|
||||||
|
* [Docker Machine](https://github.com/docker/machine): Machine management
|
||||||
|
for a container-centric world
|
||||||
|
* [Docker Swarm](https://github.com/docker/swarm): A Docker-native clustering
|
||||||
|
system
|
||||||
|
* [Docker Compose](https://github.com/docker/compose) (formerly Fig):
|
||||||
|
Define and run multi-container apps
|
||||||
|
* [Kitematic](https://github.com/docker/kitematic): The easiest way to use
|
||||||
|
Docker on Mac and Windows
|
||||||
|
|
||||||
|
If you know of another project underway that should be listed here, please help
|
||||||
|
us keep this list up-to-date by submitting a PR.
|
||||||
|
|
||||||
|
Awesome-Docker
|
||||||
|
==============
|
||||||
|
You can find more projects, tools and articles related to Docker on the [awesome-docker list](https://github.com/veggiemonk/awesome-docker). Add your project there.
|
||||||
|
|
167
ROADMAP.md
167
ROADMAP.md
|
@ -1,117 +1,140 @@
|
||||||
Moby Project Roadmap
|
Docker Engine Roadmap
|
||||||
====================
|
=====================
|
||||||
|
|
||||||
### How should I use this document?
|
### How should I use this document?
|
||||||
|
|
||||||
This document provides description of items that the project decided to prioritize. This should
|
This document provides description of items that the project decided to prioritize. This should
|
||||||
serve as a reference point for Moby contributors to understand where the project is going, and
|
serve as a reference point for Docker contributors to understand where the project is going, and
|
||||||
help determine if a contribution could be conflicting with some longer term plans.
|
help determine if a contribution could be conflicting with some longer terms plans.
|
||||||
|
|
||||||
The fact that a feature isn't listed here doesn't mean that a patch for it will automatically be
|
The fact that a feature isn't listed here doesn't mean that a patch for it will automatically be
|
||||||
refused! We are always happy to receive patches for new cool features we haven't thought about,
|
refused (except for those mentioned as "frozen features" below)! We are always happy to receive
|
||||||
or didn't judge to be a priority. Please however understand that such patches might take longer
|
patches for new cool features we haven't thought about, or didn't judge priority. Please however
|
||||||
for us to review.
|
understand that such patches might take longer for us to review.
|
||||||
|
|
||||||
### How can I help?
|
### How can I help?
|
||||||
|
|
||||||
Short term objectives are listed in
|
Short term objectives are listed in the [wiki](https://github.com/docker/docker/wiki) and described
|
||||||
[Issues](https://github.com/moby/moby/issues?q=is%3Aopen+is%3Aissue+label%3Aroadmap). Our
|
in [Issues](https://github.com/docker/docker/issues?q=is%3Aopen+is%3Aissue+label%3Aroadmap). Our
|
||||||
goal is to split down the workload in such way that anybody can jump in and help. Please comment on
|
goal is to split down the workload in such way that anybody can jump in and help. Please comment on
|
||||||
issues if you want to work on it to avoid duplicating effort! Similarly, if a maintainer is already
|
issues if you want to take it to avoid duplicating effort! Similarly, if a maintainer is already
|
||||||
assigned on an issue you'd like to participate in, pinging him on GitHub to offer your help is
|
assigned on an issue you'd like to participate in, pinging him on IRC or GitHub to offer your help is
|
||||||
the best way to go.
|
the best way to go.
|
||||||
|
|
||||||
### How can I add something to the roadmap?
|
### How can I add something to the roadmap?
|
||||||
|
|
||||||
The roadmap process is new to the Moby Project: we are only beginning to structure and document the
|
The roadmap process is new to the Docker Engine: we are only beginning to structure and document the
|
||||||
project objectives. Our immediate goal is to be more transparent, and work with our community to
|
project objectives. Our immediate goal is to be more transparent, and work with our community to
|
||||||
focus our efforts on fewer prioritized topics.
|
focus our efforts on fewer prioritized topics.
|
||||||
|
|
||||||
We hope to offer in the near future a process allowing anyone to propose a topic to the roadmap, but
|
We hope to offer in the near future a process allowing anyone to propose a topic to the roadmap, but
|
||||||
we are not quite there yet. For the time being, it is best to discuss with the maintainers on an
|
we are not quite there yet. For the time being, the BDFL remains the keeper of the roadmap, and we
|
||||||
issue, in the Slack channel, or in person at the Moby Summits that happen every few months.
|
won't be accepting pull requests adding or removing items from this file.
|
||||||
|
|
||||||
# 1. Features and refactoring
|
# 1. Features and refactoring
|
||||||
|
|
||||||
## 1.1 Runtime improvements
|
## 1.1 Runtime improvements
|
||||||
|
|
||||||
Over time we have accumulated a lot of functionality in the container runtime
|
We recently introduced [`runC`](https://runc.io) as a standalone low-level tool for container
|
||||||
aspect of Moby while also growing in other areas. Much of the container runtime
|
execution. The initial goal was to integrate runC as a replacement in the Engine for the traditional
|
||||||
pieces are now duplicated work available in other, lower level components such
|
default libcontainer `execdriver`, but the Engine internals were not ready for this.
|
||||||
as [containerd](https://containerd.io).
|
|
||||||
|
|
||||||
Moby currently only utilizes containerd for basic runtime state management, e.g. starting
|
As runC continued evolving, and the OCI specification along with it, we created
|
||||||
and stopping a container, which is what the pre-containerd 1.0 daemon provided.
|
[`containerd`](https://containerd.tools/), a daemon to control and monitor multiple `runC`. This is
|
||||||
Now that containerd is a full-fledged container runtime which supports full
|
the new target for Engine integration, as it can entirely replace the whole `execdriver`
|
||||||
container life-cycle management, we would like to start relying more on containerd
|
architecture, and container monitoring along with it.
|
||||||
and removing the bits in Moby which are now duplicated. This will necessitate
|
|
||||||
a significant effort to refactor and even remove large parts of Moby's codebase.
|
|
||||||
|
|
||||||
Tracking issues:
|
Docker Engine will rely on a long-running `containerd` companion daemon for all container execution
|
||||||
|
related operations. This could open the door in the future for Engine restarts without interrupting
|
||||||
|
running containers.
|
||||||
|
|
||||||
- [#38043](https://github.com/moby/moby/issues/38043) Proposal: containerd image integration
|
## 1.2 Plugins improvements
|
||||||
|
|
||||||
## 1.2 Image Builder
|
Docker Engine 1.7.0 introduced plugin support, initially for the use cases of volumes and networks
|
||||||
|
extensions. The plugin infrastructure was kept minimal as we were collecting use cases and real
|
||||||
|
world feedback before optimizing for any particular workflow.
|
||||||
|
|
||||||
Work is ongoing to integrate [BuildKit](https://github.com/moby/buildkit) into
|
In the future, we'd like plugins to become first class citizens, and encourage an ecosystem of
|
||||||
Moby and replace the "v0" build implementation. Buildkit offers better cache
|
plugins. This implies in particular making it trivially easy to distribute plugins as containers
|
||||||
management, parallelizable build steps, and better extensibility while also
|
through any Registry instance, as well as solving the commonly heard pain points of plugins needing
|
||||||
keeping builds portable, a chief tenent of Moby's builder.
|
to be treated as somewhat special (being active at all time, started before any other user
|
||||||
|
containers, and not as easily dismissed).
|
||||||
|
|
||||||
Upon completion of this effort, users will have a builder that performs better
|
## 1.3 Internal decoupling
|
||||||
while also being more extensible, enabling users to provide their own custom
|
|
||||||
syntax which can be either Dockerfile-like or something completely different.
|
|
||||||
|
|
||||||
See [buildpacks on buildkit](https://github.com/tonistiigi/buildkit-pack) as an
|
A lot of work has been done in trying to decouple the Docker Engine's internals. In particular, the
|
||||||
example of this extensibility.
|
API implementation has been refactored and ongoing work is happening to move the code to a separate
|
||||||
|
repository ([`docker/engine-api`](https://github.com/docker/engine-api)), and the Builder side of
|
||||||
|
the daemon is now [fully independent](https://github.com/docker/docker/tree/master/builder) while
|
||||||
|
still residing in the same repository.
|
||||||
|
|
||||||
New features for the builder and Dockerfile should be implemented first in the
|
We are exploring ways to go further with that decoupling, capitalizing on the work introduced by the
|
||||||
BuildKit backend using an external Dockerfile implementation from the container
|
runtime renovation and plugins improvement efforts. Indeed, the combination of `containerd` support
|
||||||
images. This allows everyone to test and evaluate the feature without upgrading
|
with the concept of "special" containers opens the door for bootstrapping more Engine internals
|
||||||
their daemon. New features should go to the experimental channel first, and can be
|
using the same facilities.
|
||||||
part of the `docker/dockerfile:experimental` image. From there they graduate to
|
|
||||||
`docker/dockerfile:latest` and binary releases. The Dockerfile frontend source
|
|
||||||
code is temporarily located at
|
|
||||||
[https://github.com/moby/buildkit/tree/master/frontend/dockerfile](https://github.com/moby/buildkit/tree/master/frontend/dockerfile)
|
|
||||||
with separate new features defined with go build tags.
|
|
||||||
|
|
||||||
Tracking issues:
|
## 1.4 Cluster capable Engine
|
||||||
|
|
||||||
- [#32925](https://github.com/moby/moby/issues/32925) discussion: builder future: buildkit
|
The community has been pushing for a more cluster capable Docker Engine, and a huge effort was spent
|
||||||
|
adding features such as multihost networking, and node discovery down at the Engine level. Yet, the
|
||||||
|
Engine is currently incapable of taking scheduling decisions alone, and continues relying on Swarm
|
||||||
|
for that.
|
||||||
|
|
||||||
## 1.3 Rootless Mode
|
We plan to complete this effort and make Engine fully cluster capable. Multiple instances of the
|
||||||
|
Docker Engine being already capable of discovering each other and establish overlay networking for
|
||||||
|
their container to communicate, the next step is for a given Engine to gain ability to dispatch work
|
||||||
|
to another node in the cluster. This will be introduced in a backward compatible way, such that a
|
||||||
|
`docker run` invocation on a particular node remains fully deterministic.
|
||||||
|
|
||||||
Running the daemon requires elevated privileges for many tasks. We would like to
|
# 2 Frozen features
|
||||||
support running the daemon as a normal, unprivileged user without requiring `suid`
|
|
||||||
binaries.
|
|
||||||
|
|
||||||
Tracking issues:
|
## 2.1 Docker exec
|
||||||
|
|
||||||
- [#37375](https://github.com/moby/moby/issues/37375) Proposal: allow running `dockerd` as an unprivileged user (aka rootless mode)
|
We won't accept patches expanding the surface of `docker exec`, which we intend to keep as a
|
||||||
|
*debugging* feature, as well as being strongly dependent on the Runtime ingredient effort.
|
||||||
|
|
||||||
## 1.4 Testing
|
## 2.2 Dockerfile syntax
|
||||||
|
|
||||||
Moby has many tests, both unit and integration. Moby needs more tests which can
|
The Dockerfile syntax as we know it is simple, and has proven successful in supporting all our
|
||||||
cover the full spectrum functionality and edge cases out there.
|
[official images](https://github.com/docker-library/official-images). Although this is *not* a
|
||||||
|
definitive move, we temporarily won't accept more patches to the Dockerfile syntax for several
|
||||||
|
reasons:
|
||||||
|
|
||||||
Tests in the `integration-cli` folder should also be migrated into (both in
|
- Long term impact of syntax changes is a sensitive matter that require an amount of attention the
|
||||||
location and style) the `integration` folder. These newer tests are simpler to
|
volume of Engine codebase and activity today doesn't allow us to provide.
|
||||||
run in isolation, simpler to read, simpler to write, and more fully exercise the
|
- Allowing the Builder to be implemented as a separate utility consuming the Engine's API will
|
||||||
API. Meanwhile tests of the docker CLI should generally live in docker/cli.
|
open the door for many possibilities, such as offering alternate syntaxes or DSL for existing
|
||||||
|
languages without cluttering the Engine's codebase.
|
||||||
|
- A standalone Builder will also offer the opportunity for a better dedicated group of maintainers
|
||||||
|
to own the Dockerfile syntax and decide collectively on the direction to give it.
|
||||||
|
- Our experience with official images tend to show that no new instruction or syntax expansion is
|
||||||
|
*strictly* necessary for the majority of use cases, and although we are aware many things are
|
||||||
|
still lacking for many, we cannot make it a priority yet for the above reasons.
|
||||||
|
|
||||||
Tracking issues:
|
Again, this is not about saying that the Dockerfile syntax is done, it's about making choices about
|
||||||
|
what we want to do first!
|
||||||
|
|
||||||
- [#32866](https://github.com/moby/moby/issues/32866) Replace integration-cli suite with API test suite
|
## 2.3 Remote Registry Operations
|
||||||
|
|
||||||
## 1.5 Internal decoupling
|
A large amount of work is ongoing in the area of image distribution and provenance. This includes
|
||||||
|
moving to the V2 Registry API and heavily refactoring the code that powers these features. The
|
||||||
|
desired result is more secure, reliable and easier to use image distribution.
|
||||||
|
|
||||||
A lot of work has been done in trying to decouple Moby internals. This process of creating
|
Part of the problem with this part of the code base is the lack of a stable and flexible interface.
|
||||||
standalone projects with a well defined function that attract a dedicated community should continue.
|
If new features are added that access the registry without solidifying these interfaces, achieving
|
||||||
As well as integrating `containerd` we would like to integrate [BuildKit](https://github.com/moby/buildkit)
|
feature parity will continue to be elusive. While we get a handle on this situation, we are imposing
|
||||||
as the next standalone component.
|
a moratorium on new code that accesses the Registry API in commands that don't already make remote
|
||||||
We see gRPC as the natural communication layer between decoupled components.
|
calls.
|
||||||
|
|
||||||
In addition to pushing out large components into other projects, much of the
|
Currently, only the following commands cause interaction with a remote registry:
|
||||||
internal code structure, and in particular the
|
|
||||||
["Daemon"](https://godoc.org/github.com/docker/docker/daemon#Daemon) object,
|
- push
|
||||||
should be split into smaller, more manageable, and more testable components.
|
- pull
|
||||||
|
- run
|
||||||
|
- build
|
||||||
|
- search
|
||||||
|
- login
|
||||||
|
|
||||||
|
In the interest of stabilizing the registry access model during this ongoing work, we are not
|
||||||
|
accepting additions to other commands that will cause remote interaction with the Registry API. This
|
||||||
|
moratorium will lift when the goals of the distribution project have been met.
|
||||||
|
|
|
@ -1,9 +0,0 @@
|
||||||
# Reporting security issues
|
|
||||||
|
|
||||||
The Moby maintainers take security seriously. If you discover a security issue, please bring it to their attention right away!
|
|
||||||
|
|
||||||
### Reporting a Vulnerability
|
|
||||||
|
|
||||||
Please **DO NOT** file a public issue, instead send your report privately to security@docker.com.
|
|
||||||
|
|
||||||
Security reports are greatly appreciated and we will publicly thank you for it, although we keep your name confidential if you request it. We also like to send gifts—if you're into schwag, make sure to let us know. We currently do not offer a paid security bounty program, but are not ruling it out in the future.
|
|
126
TESTING.md
126
TESTING.md
|
@ -1,126 +0,0 @@
|
||||||
# Testing
|
|
||||||
|
|
||||||
This document contains the Moby code testing guidelines. It should answer any
|
|
||||||
questions you may have as an aspiring Moby contributor.
|
|
||||||
|
|
||||||
## Test suites
|
|
||||||
|
|
||||||
Moby has two test suites (and one legacy test suite):
|
|
||||||
|
|
||||||
* Unit tests - use standard `go test` and
|
|
||||||
[gotest.tools/assert](https://godoc.org/gotest.tools/assert) assertions. They are located in
|
|
||||||
the package they test. Unit tests should be fast and test only their own
|
|
||||||
package.
|
|
||||||
* API integration tests - use standard `go test` and
|
|
||||||
[gotest.tools/assert](https://godoc.org/gotest.tools/assert) assertions. They are located in
|
|
||||||
`./integration/<component>` directories, where `component` is: container,
|
|
||||||
image, volume, etc. These tests perform HTTP requests to an API endpoint and
|
|
||||||
check the HTTP response and daemon state after the call.
|
|
||||||
|
|
||||||
The legacy test suite `integration-cli/` is deprecated. No new tests will be
|
|
||||||
added to this suite. Any tests in this suite which require updates should be
|
|
||||||
ported to either the unit test suite or the new API integration test suite.
|
|
||||||
|
|
||||||
## Writing new tests
|
|
||||||
|
|
||||||
Most code changes will fall into one of the following categories.
|
|
||||||
|
|
||||||
### Writing tests for new features
|
|
||||||
|
|
||||||
New code should be covered by unit tests. If the code is difficult to test with
|
|
||||||
unit tests, then that is a good sign that it should be refactored to make it
|
|
||||||
easier to reuse and maintain. Consider accepting unexported interfaces instead
|
|
||||||
of structs so that fakes can be provided for dependencies.
|
|
||||||
|
|
||||||
If the new feature includes a completely new API endpoint then a new API
|
|
||||||
integration test should be added to cover the success case of that endpoint.
|
|
||||||
|
|
||||||
If the new feature does not include a completely new API endpoint consider
|
|
||||||
adding the new API fields to the existing test for that endpoint. A new
|
|
||||||
integration test should **not** be added for every new API field or API error
|
|
||||||
case. Error cases should be handled by unit tests.
|
|
||||||
|
|
||||||
### Writing tests for bug fixes
|
|
||||||
|
|
||||||
Bugs fixes should include a unit test case which exercises the bug.
|
|
||||||
|
|
||||||
A bug fix may also include new assertions in existing integration tests for the
|
|
||||||
API endpoint.
|
|
||||||
|
|
||||||
### Writing new integration tests
|
|
||||||
|
|
||||||
Note the `integration-cli` tests are deprecated; new tests will be rejected by
|
|
||||||
the CI.
|
|
||||||
|
|
||||||
Instead, implement new tests under `integration/`.
|
|
||||||
|
|
||||||
### Integration tests environment considerations
|
|
||||||
|
|
||||||
When adding new tests or modifying existing tests under `integration/`, testing
|
|
||||||
environment should be properly considered. `skip.If` from
|
|
||||||
[gotest.tools/skip](https://godoc.org/gotest.tools/skip) can be used to make the
|
|
||||||
test run conditionally. Full testing environment conditions can be found at
|
|
||||||
[environment.go](https://github.com/moby/moby/blob/6b6eeed03b963a27085ea670f40cd5ff8a61f32e/testutil/environment/environment.go)
|
|
||||||
|
|
||||||
Here is a quick example. If the test needs to interact with a docker daemon on
|
|
||||||
the same host, the following condition should be checked within the test code
|
|
||||||
|
|
||||||
```go
|
|
||||||
skip.If(t, testEnv.IsRemoteDaemon())
|
|
||||||
// your integration test code
|
|
||||||
```
|
|
||||||
|
|
||||||
If a remote daemon is detected, the test will be skipped.
|
|
||||||
|
|
||||||
## Running tests
|
|
||||||
|
|
||||||
### Unit Tests
|
|
||||||
|
|
||||||
To run the unit test suite:
|
|
||||||
|
|
||||||
```
|
|
||||||
make test-unit
|
|
||||||
```
|
|
||||||
|
|
||||||
or `hack/test/unit` from inside a `BINDDIR=. make shell` container or properly
|
|
||||||
configured environment.
|
|
||||||
|
|
||||||
The following environment variables may be used to run a subset of tests:
|
|
||||||
|
|
||||||
* `TESTDIRS` - paths to directories to be tested, defaults to `./...`
|
|
||||||
* `TESTFLAGS` - flags passed to `go test`, to run tests which match a pattern
|
|
||||||
use `TESTFLAGS="-test.run TestNameOrPrefix"`
|
|
||||||
|
|
||||||
### Integration Tests
|
|
||||||
|
|
||||||
To run the integration test suite:
|
|
||||||
|
|
||||||
```
|
|
||||||
make test-integration
|
|
||||||
```
|
|
||||||
|
|
||||||
This make target runs both the "integration" suite and the "integration-cli"
|
|
||||||
suite.
|
|
||||||
|
|
||||||
You can specify which integration test dirs to build and run by specifying
|
|
||||||
the list of dirs in the TEST_INTEGRATION_DIR environment variable.
|
|
||||||
|
|
||||||
You can also explicitly skip either suite by setting (any value) in
|
|
||||||
TEST_SKIP_INTEGRATION and/or TEST_SKIP_INTEGRATION_CLI environment variables.
|
|
||||||
|
|
||||||
Flags specific to each suite can be set in the TESTFLAGS_INTEGRATION and
|
|
||||||
TESTFLAGS_INTEGRATION_CLI environment variables.
|
|
||||||
|
|
||||||
If all you want is to specify a test filter to run, you can set the
|
|
||||||
`TEST_FILTER` environment variable. This ends up getting passed directly to `go
|
|
||||||
test -run` (or `go test -check-f`, depending on the test suite). It will also
|
|
||||||
automatically set the other above mentioned environment variables accordingly.
|
|
||||||
|
|
||||||
### Go Version
|
|
||||||
|
|
||||||
You can change a version of golang used for building stuff that is being tested
|
|
||||||
by setting `GO_VERSION` variable, for example:
|
|
||||||
|
|
||||||
```
|
|
||||||
make GO_VERSION=1.12.8 test
|
|
||||||
```
|
|
13
VENDORING.md
13
VENDORING.md
|
@ -20,20 +20,19 @@ Each repo should:
|
||||||
github releases file.
|
github releases file.
|
||||||
|
|
||||||
The goal here is for consuming repos to be able to use the tag version and
|
The goal here is for consuming repos to be able to use the tag version and
|
||||||
changelog updates to determine whether the vendoring will cause any breaking or
|
changelog updates to determine whether the vendoring will cause any breaking or
|
||||||
backward incompatible changes. This also means that repos can specify having
|
backward incompatible changes. This also means that repos can specify having
|
||||||
dependency on a package of a specific version or greater up to the next major
|
dependency on a package of a specific version or greater up to the next major
|
||||||
release, without encountering breaking changes.
|
release, without encountering breaking changes.
|
||||||
|
|
||||||
## Semantic Versioning
|
## Semantic Versioning
|
||||||
Annotated version tags should follow [Semantic Versioning](http://semver.org) policies:
|
Annotated version tags should follow Schema Versioning policies.
|
||||||
|
According to http://semver.org:
|
||||||
|
|
||||||
"Given a version number MAJOR.MINOR.PATCH, increment the:
|
"Given a version number MAJOR.MINOR.PATCH, increment the:
|
||||||
|
MAJOR version when you make incompatible API changes,
|
||||||
1. MAJOR version when you make incompatible API changes,
|
MINOR version when you add functionality in a backwards-compatible manner, and
|
||||||
2. MINOR version when you add functionality in a backwards-compatible manner, and
|
PATCH version when you make backwards-compatible bug fixes.
|
||||||
3. PATCH version when you make backwards-compatible bug fixes.
|
|
||||||
|
|
||||||
Additional labels for pre-release and build metadata are available as extensions
|
Additional labels for pre-release and build metadata are available as extensions
|
||||||
to the MAJOR.MINOR.PATCH format."
|
to the MAJOR.MINOR.PATCH format."
|
||||||
|
|
||||||
|
|
1
VERSION
Normal file
1
VERSION
Normal file
|
@ -0,0 +1 @@
|
||||||
|
1.12.6
|
|
@ -1,42 +1,5 @@
|
||||||
# Working on the Engine API
|
This directory contains code pertaining to the Docker API:
|
||||||
|
|
||||||
The Engine API is an HTTP API used by the command-line client to communicate with the daemon. It can also be used by third-party software to control the daemon.
|
- Used by the docker client when communicating with the docker daemon
|
||||||
|
|
||||||
It consists of various components in this repository:
|
- Used by third party tools wishing to interface with the docker daemon
|
||||||
|
|
||||||
- `api/swagger.yaml` A Swagger definition of the API.
|
|
||||||
- `api/types/` Types shared by both the client and server, representing various objects, options, responses, etc. Most are written manually, but some are automatically generated from the Swagger definition. See [#27919](https://github.com/docker/docker/issues/27919) for progress on this.
|
|
||||||
- `cli/` The command-line client.
|
|
||||||
- `client/` The Go client used by the command-line client. It can also be used by third-party Go programs.
|
|
||||||
- `daemon/` The daemon, which serves the API.
|
|
||||||
|
|
||||||
## Swagger definition
|
|
||||||
|
|
||||||
The API is defined by the [Swagger](http://swagger.io/specification/) definition in `api/swagger.yaml`. This definition can be used to:
|
|
||||||
|
|
||||||
1. Automatically generate documentation.
|
|
||||||
2. Automatically generate the Go server and client. (A work-in-progress.)
|
|
||||||
3. Provide a machine readable version of the API for introspecting what it can do, automatically generating clients for other languages, etc.
|
|
||||||
|
|
||||||
## Updating the API documentation
|
|
||||||
|
|
||||||
The API documentation is generated entirely from `api/swagger.yaml`. If you make updates to the API, edit this file to represent the change in the documentation.
|
|
||||||
|
|
||||||
The file is split into two main sections:
|
|
||||||
|
|
||||||
- `definitions`, which defines re-usable objects used in requests and responses
|
|
||||||
- `paths`, which defines the API endpoints (and some inline objects which don't need to be reusable)
|
|
||||||
|
|
||||||
To make an edit, first look for the endpoint you want to edit under `paths`, then make the required edits. Endpoints may reference reusable objects with `$ref`, which can be found in the `definitions` section.
|
|
||||||
|
|
||||||
There is hopefully enough example material in the file for you to copy a similar pattern from elsewhere in the file (e.g. adding new fields or endpoints), but for the full reference, see the [Swagger specification](https://github.com/docker/docker/issues/27919).
|
|
||||||
|
|
||||||
`swagger.yaml` is validated by `hack/validate/swagger` to ensure it is a valid Swagger definition. This is useful when making edits to ensure you are doing the right thing.
|
|
||||||
|
|
||||||
## Viewing the API documentation
|
|
||||||
|
|
||||||
When you make edits to `swagger.yaml`, you may want to check the generated API documentation to ensure it renders correctly.
|
|
||||||
|
|
||||||
Run `make swagger-docs` and a preview will be running at `http://localhost:9000`. Some of the styling may be incorrect, but you'll be able to ensure that it is generating the correct documentation.
|
|
||||||
|
|
||||||
The production documentation is generated by vendoring `swagger.yaml` into [docker/docker.github.io](https://github.com/docker/docker.github.io).
|
|
||||||
|
|
71
api/client/bundlefile/bundlefile.go
Normal file
71
api/client/bundlefile/bundlefile.go
Normal file
|
@ -0,0 +1,71 @@
|
||||||
|
// +build experimental
|
||||||
|
|
||||||
|
package bundlefile
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Bundlefile stores the contents of a bundlefile
|
||||||
|
type Bundlefile struct {
|
||||||
|
Version string
|
||||||
|
Services map[string]Service
|
||||||
|
}
|
||||||
|
|
||||||
|
// Service is a service from a bundlefile
|
||||||
|
type Service struct {
|
||||||
|
Image string
|
||||||
|
Command []string `json:",omitempty"`
|
||||||
|
Args []string `json:",omitempty"`
|
||||||
|
Env []string `json:",omitempty"`
|
||||||
|
Labels map[string]string `json:",omitempty"`
|
||||||
|
Ports []Port `json:",omitempty"`
|
||||||
|
WorkingDir *string `json:",omitempty"`
|
||||||
|
User *string `json:",omitempty"`
|
||||||
|
Networks []string `json:",omitempty"`
|
||||||
|
}
|
||||||
|
|
||||||
|
// Port is a port as defined in a bundlefile
|
||||||
|
type Port struct {
|
||||||
|
Protocol string
|
||||||
|
Port uint32
|
||||||
|
}
|
||||||
|
|
||||||
|
// LoadFile loads a bundlefile from a path to the file
|
||||||
|
func LoadFile(reader io.Reader) (*Bundlefile, error) {
|
||||||
|
bundlefile := &Bundlefile{}
|
||||||
|
|
||||||
|
decoder := json.NewDecoder(reader)
|
||||||
|
if err := decoder.Decode(bundlefile); err != nil {
|
||||||
|
switch jsonErr := err.(type) {
|
||||||
|
case *json.SyntaxError:
|
||||||
|
return nil, fmt.Errorf(
|
||||||
|
"JSON syntax error at byte %v: %s",
|
||||||
|
jsonErr.Offset,
|
||||||
|
jsonErr.Error())
|
||||||
|
case *json.UnmarshalTypeError:
|
||||||
|
return nil, fmt.Errorf(
|
||||||
|
"Unexpected type at byte %v. Expected %s but received %s.",
|
||||||
|
jsonErr.Offset,
|
||||||
|
jsonErr.Type,
|
||||||
|
jsonErr.Value)
|
||||||
|
}
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return bundlefile, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Print writes the contents of the bundlefile to the output writer
|
||||||
|
// as human readable json
|
||||||
|
func Print(out io.Writer, bundle *Bundlefile) error {
|
||||||
|
bytes, err := json.MarshalIndent(*bundle, "", " ")
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = out.Write(bytes)
|
||||||
|
return err
|
||||||
|
}
|
79
api/client/bundlefile/bundlefile_test.go
Normal file
79
api/client/bundlefile/bundlefile_test.go
Normal file
|
@ -0,0 +1,79 @@
|
||||||
|
// +build experimental
|
||||||
|
|
||||||
|
package bundlefile
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/docker/docker/pkg/testutil/assert"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestLoadFileV01Success(t *testing.T) {
|
||||||
|
reader := strings.NewReader(`{
|
||||||
|
"Version": "0.1",
|
||||||
|
"Services": {
|
||||||
|
"redis": {
|
||||||
|
"Image": "redis@sha256:4b24131101fa0117bcaa18ac37055fffd9176aa1a240392bb8ea85e0be50f2ce",
|
||||||
|
"Networks": ["default"]
|
||||||
|
},
|
||||||
|
"web": {
|
||||||
|
"Image": "dockercloud/hello-world@sha256:fe79a2cfbd17eefc344fb8419420808df95a1e22d93b7f621a7399fd1e9dca1d",
|
||||||
|
"Networks": ["default"],
|
||||||
|
"User": "web"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`)
|
||||||
|
|
||||||
|
bundle, err := LoadFile(reader)
|
||||||
|
assert.NilError(t, err)
|
||||||
|
assert.Equal(t, bundle.Version, "0.1")
|
||||||
|
assert.Equal(t, len(bundle.Services), 2)
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestLoadFileSyntaxError(t *testing.T) {
|
||||||
|
reader := strings.NewReader(`{
|
||||||
|
"Version": "0.1",
|
||||||
|
"Services": unquoted string
|
||||||
|
}`)
|
||||||
|
|
||||||
|
_, err := LoadFile(reader)
|
||||||
|
assert.Error(t, err, "syntax error at byte 37: invalid character 'u'")
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestLoadFileTypeError(t *testing.T) {
|
||||||
|
reader := strings.NewReader(`{
|
||||||
|
"Version": "0.1",
|
||||||
|
"Services": {
|
||||||
|
"web": {
|
||||||
|
"Image": "redis",
|
||||||
|
"Networks": "none"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}`)
|
||||||
|
|
||||||
|
_, err := LoadFile(reader)
|
||||||
|
assert.Error(t, err, "Unexpected type at byte 94. Expected []string but received string")
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestPrint(t *testing.T) {
|
||||||
|
var buffer bytes.Buffer
|
||||||
|
bundle := &Bundlefile{
|
||||||
|
Version: "0.1",
|
||||||
|
Services: map[string]Service{
|
||||||
|
"web": {
|
||||||
|
Image: "image",
|
||||||
|
Command: []string{"echo", "something"},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
assert.NilError(t, Print(&buffer, bundle))
|
||||||
|
output := buffer.String()
|
||||||
|
assert.Contains(t, output, "\"Image\": \"image\"")
|
||||||
|
assert.Contains(t, output,
|
||||||
|
`"Command": [
|
||||||
|
"echo",
|
||||||
|
"something"
|
||||||
|
]`)
|
||||||
|
}
|
281
api/client/cli.go
Normal file
281
api/client/cli.go
Normal file
|
@ -0,0 +1,281 @@
|
||||||
|
package client
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"net/http"
|
||||||
|
"os"
|
||||||
|
"runtime"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api"
|
||||||
|
cliflags "github.com/docker/docker/cli/flags"
|
||||||
|
"github.com/docker/docker/cliconfig"
|
||||||
|
"github.com/docker/docker/cliconfig/configfile"
|
||||||
|
"github.com/docker/docker/cliconfig/credentials"
|
||||||
|
"github.com/docker/docker/dockerversion"
|
||||||
|
"github.com/docker/docker/opts"
|
||||||
|
"github.com/docker/docker/pkg/term"
|
||||||
|
"github.com/docker/engine-api/client"
|
||||||
|
"github.com/docker/go-connections/sockets"
|
||||||
|
"github.com/docker/go-connections/tlsconfig"
|
||||||
|
)
|
||||||
|
|
||||||
|
// DockerCli represents the docker command line client.
|
||||||
|
// Instances of the client can be returned from NewDockerCli.
|
||||||
|
type DockerCli struct {
|
||||||
|
// initializing closure
|
||||||
|
init func() error
|
||||||
|
|
||||||
|
// configFile has the client configuration file
|
||||||
|
configFile *configfile.ConfigFile
|
||||||
|
// in holds the input stream and closer (io.ReadCloser) for the client.
|
||||||
|
in io.ReadCloser
|
||||||
|
// out holds the output stream (io.Writer) for the client.
|
||||||
|
out io.Writer
|
||||||
|
// err holds the error stream (io.Writer) for the client.
|
||||||
|
err io.Writer
|
||||||
|
// keyFile holds the key file as a string.
|
||||||
|
keyFile string
|
||||||
|
// inFd holds the file descriptor of the client's STDIN (if valid).
|
||||||
|
inFd uintptr
|
||||||
|
// outFd holds file descriptor of the client's STDOUT (if valid).
|
||||||
|
outFd uintptr
|
||||||
|
// isTerminalIn indicates whether the client's STDIN is a TTY
|
||||||
|
isTerminalIn bool
|
||||||
|
// isTerminalOut indicates whether the client's STDOUT is a TTY
|
||||||
|
isTerminalOut bool
|
||||||
|
// client is the http client that performs all API operations
|
||||||
|
client client.APIClient
|
||||||
|
// state holds the terminal input state
|
||||||
|
inState *term.State
|
||||||
|
// outState holds the terminal output state
|
||||||
|
outState *term.State
|
||||||
|
}
|
||||||
|
|
||||||
|
// Initialize calls the init function that will setup the configuration for the client
|
||||||
|
// such as the TLS, tcp and other parameters used to run the client.
|
||||||
|
func (cli *DockerCli) Initialize() error {
|
||||||
|
if cli.init == nil {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return cli.init()
|
||||||
|
}
|
||||||
|
|
||||||
|
// Client returns the APIClient
|
||||||
|
func (cli *DockerCli) Client() client.APIClient {
|
||||||
|
return cli.client
|
||||||
|
}
|
||||||
|
|
||||||
|
// Out returns the writer used for stdout
|
||||||
|
func (cli *DockerCli) Out() io.Writer {
|
||||||
|
return cli.out
|
||||||
|
}
|
||||||
|
|
||||||
|
// Err returns the writer used for stderr
|
||||||
|
func (cli *DockerCli) Err() io.Writer {
|
||||||
|
return cli.err
|
||||||
|
}
|
||||||
|
|
||||||
|
// In returns the reader used for stdin
|
||||||
|
func (cli *DockerCli) In() io.ReadCloser {
|
||||||
|
return cli.in
|
||||||
|
}
|
||||||
|
|
||||||
|
// ConfigFile returns the ConfigFile
|
||||||
|
func (cli *DockerCli) ConfigFile() *configfile.ConfigFile {
|
||||||
|
return cli.configFile
|
||||||
|
}
|
||||||
|
|
||||||
|
// IsTerminalOut returns true if the clients stdin is a TTY
|
||||||
|
func (cli *DockerCli) IsTerminalOut() bool {
|
||||||
|
return cli.isTerminalOut
|
||||||
|
}
|
||||||
|
|
||||||
|
// OutFd returns the fd for the stdout stream
|
||||||
|
func (cli *DockerCli) OutFd() uintptr {
|
||||||
|
return cli.outFd
|
||||||
|
}
|
||||||
|
|
||||||
|
// CheckTtyInput checks if we are trying to attach to a container tty
|
||||||
|
// from a non-tty client input stream, and if so, returns an error.
|
||||||
|
func (cli *DockerCli) CheckTtyInput(attachStdin, ttyMode bool) error {
|
||||||
|
// In order to attach to a container tty, input stream for the client must
|
||||||
|
// be a tty itself: redirecting or piping the client standard input is
|
||||||
|
// incompatible with `docker run -t`, `docker exec -t` or `docker attach`.
|
||||||
|
if ttyMode && attachStdin && !cli.isTerminalIn {
|
||||||
|
eText := "the input device is not a TTY"
|
||||||
|
if runtime.GOOS == "windows" {
|
||||||
|
return errors.New(eText + ". If you are using mintty, try prefixing the command with 'winpty'")
|
||||||
|
}
|
||||||
|
return errors.New(eText)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// PsFormat returns the format string specified in the configuration.
|
||||||
|
// String contains columns and format specification, for example {{ID}}\t{{Name}}.
|
||||||
|
func (cli *DockerCli) PsFormat() string {
|
||||||
|
return cli.configFile.PsFormat
|
||||||
|
}
|
||||||
|
|
||||||
|
// ImagesFormat returns the format string specified in the configuration.
|
||||||
|
// String contains columns and format specification, for example {{ID}}\t{{Name}}.
|
||||||
|
func (cli *DockerCli) ImagesFormat() string {
|
||||||
|
return cli.configFile.ImagesFormat
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cli *DockerCli) setRawTerminal() error {
|
||||||
|
if os.Getenv("NORAW") == "" {
|
||||||
|
if cli.isTerminalIn {
|
||||||
|
state, err := term.SetRawTerminal(cli.inFd)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
cli.inState = state
|
||||||
|
}
|
||||||
|
if cli.isTerminalOut {
|
||||||
|
state, err := term.SetRawTerminalOutput(cli.outFd)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
cli.outState = state
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cli *DockerCli) restoreTerminal(in io.Closer) error {
|
||||||
|
if cli.inState != nil {
|
||||||
|
term.RestoreTerminal(cli.inFd, cli.inState)
|
||||||
|
}
|
||||||
|
if cli.outState != nil {
|
||||||
|
term.RestoreTerminal(cli.outFd, cli.outState)
|
||||||
|
}
|
||||||
|
// WARNING: DO NOT REMOVE THE OS CHECK !!!
|
||||||
|
// For some reason this Close call blocks on darwin..
|
||||||
|
// As the client exists right after, simply discard the close
|
||||||
|
// until we find a better solution.
|
||||||
|
if in != nil && runtime.GOOS != "darwin" {
|
||||||
|
return in.Close()
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewDockerCli returns a DockerCli instance with IO output and error streams set by in, out and err.
|
||||||
|
// The key file, protocol (i.e. unix) and address are passed in as strings, along with the tls.Config. If the tls.Config
|
||||||
|
// is set the client scheme will be set to https.
|
||||||
|
// The client will be given a 32-second timeout (see https://github.com/docker/docker/pull/8035).
|
||||||
|
func NewDockerCli(in io.ReadCloser, out, err io.Writer, clientFlags *cliflags.ClientFlags) *DockerCli {
|
||||||
|
cli := &DockerCli{
|
||||||
|
in: in,
|
||||||
|
out: out,
|
||||||
|
err: err,
|
||||||
|
keyFile: clientFlags.Common.TrustKey,
|
||||||
|
}
|
||||||
|
|
||||||
|
cli.init = func() error {
|
||||||
|
clientFlags.PostParse()
|
||||||
|
cli.configFile = LoadDefaultConfigFile(err)
|
||||||
|
|
||||||
|
client, err := NewAPIClientFromFlags(clientFlags, cli.configFile)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
cli.client = client
|
||||||
|
|
||||||
|
if cli.in != nil {
|
||||||
|
cli.inFd, cli.isTerminalIn = term.GetFdInfo(cli.in)
|
||||||
|
}
|
||||||
|
if cli.out != nil {
|
||||||
|
cli.outFd, cli.isTerminalOut = term.GetFdInfo(cli.out)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
return cli
|
||||||
|
}
|
||||||
|
|
||||||
|
// LoadDefaultConfigFile attempts to load the default config file and returns
|
||||||
|
// an initialized ConfigFile struct if none is found.
|
||||||
|
func LoadDefaultConfigFile(err io.Writer) *configfile.ConfigFile {
|
||||||
|
configFile, e := cliconfig.Load(cliconfig.ConfigDir())
|
||||||
|
if e != nil {
|
||||||
|
fmt.Fprintf(err, "WARNING: Error loading config file:%v\n", e)
|
||||||
|
}
|
||||||
|
if !configFile.ContainsAuth() {
|
||||||
|
credentials.DetectDefaultStore(configFile)
|
||||||
|
}
|
||||||
|
return configFile
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewAPIClientFromFlags creates a new APIClient from command line flags
|
||||||
|
func NewAPIClientFromFlags(clientFlags *cliflags.ClientFlags, configFile *configfile.ConfigFile) (client.APIClient, error) {
|
||||||
|
host, err := getServerHost(clientFlags.Common.Hosts, clientFlags.Common.TLSOptions)
|
||||||
|
if err != nil {
|
||||||
|
return &client.Client{}, err
|
||||||
|
}
|
||||||
|
|
||||||
|
customHeaders := configFile.HTTPHeaders
|
||||||
|
if customHeaders == nil {
|
||||||
|
customHeaders = map[string]string{}
|
||||||
|
}
|
||||||
|
customHeaders["User-Agent"] = clientUserAgent()
|
||||||
|
|
||||||
|
verStr := api.DefaultVersion
|
||||||
|
if tmpStr := os.Getenv("DOCKER_API_VERSION"); tmpStr != "" {
|
||||||
|
verStr = tmpStr
|
||||||
|
}
|
||||||
|
|
||||||
|
httpClient, err := newHTTPClient(host, clientFlags.Common.TLSOptions)
|
||||||
|
if err != nil {
|
||||||
|
return &client.Client{}, err
|
||||||
|
}
|
||||||
|
|
||||||
|
return client.NewClient(host, verStr, httpClient, customHeaders)
|
||||||
|
}
|
||||||
|
|
||||||
|
func getServerHost(hosts []string, tlsOptions *tlsconfig.Options) (host string, err error) {
|
||||||
|
switch len(hosts) {
|
||||||
|
case 0:
|
||||||
|
host = os.Getenv("DOCKER_HOST")
|
||||||
|
case 1:
|
||||||
|
host = hosts[0]
|
||||||
|
default:
|
||||||
|
return "", errors.New("Please specify only one -H")
|
||||||
|
}
|
||||||
|
|
||||||
|
host, err = opts.ParseHost(tlsOptions != nil, host)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func newHTTPClient(host string, tlsOptions *tlsconfig.Options) (*http.Client, error) {
|
||||||
|
if tlsOptions == nil {
|
||||||
|
// let the api client configure the default transport.
|
||||||
|
return nil, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
config, err := tlsconfig.Client(*tlsOptions)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
tr := &http.Transport{
|
||||||
|
TLSClientConfig: config,
|
||||||
|
}
|
||||||
|
proto, addr, _, err := client.ParseHost(host)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
sockets.ConfigureTransport(tr, proto, addr)
|
||||||
|
|
||||||
|
return &http.Client{
|
||||||
|
Transport: tr,
|
||||||
|
}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func clientUserAgent() string {
|
||||||
|
return "Docker-Client/" + dockerversion.Version + " (" + runtime.GOOS + ")"
|
||||||
|
}
|
5
api/client/client.go
Normal file
5
api/client/client.go
Normal file
|
@ -0,0 +1,5 @@
|
||||||
|
// Package client provides a command-line interface for Docker.
|
||||||
|
//
|
||||||
|
// Run "docker help SUBCOMMAND" or "docker SUBCOMMAND --help" to see more information on any Docker subcommand, including the full list of options supported for the subcommand.
|
||||||
|
// See https://docs.docker.com/installation/ for instructions on installing Docker.
|
||||||
|
package client
|
11
api/client/commands.go
Normal file
11
api/client/commands.go
Normal file
|
@ -0,0 +1,11 @@
|
||||||
|
package client
|
||||||
|
|
||||||
|
// Command returns a cli command handler if one exists
|
||||||
|
func (cli *DockerCli) Command(name string) func(...string) error {
|
||||||
|
return map[string]func(...string) error{
|
||||||
|
"exec": cli.CmdExec,
|
||||||
|
"info": cli.CmdInfo,
|
||||||
|
"inspect": cli.CmdInspect,
|
||||||
|
"update": cli.CmdUpdate,
|
||||||
|
}[name]
|
||||||
|
}
|
129
api/client/container/attach.go
Normal file
129
api/client/container/attach.go
Normal file
|
@ -0,0 +1,129 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"net/http/httputil"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/Sirupsen/logrus"
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/docker/docker/pkg/signal"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type attachOptions struct {
|
||||||
|
noStdin bool
|
||||||
|
proxy bool
|
||||||
|
detachKeys string
|
||||||
|
|
||||||
|
container string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewAttachCommand creats a new cobra.Command for `docker attach`
|
||||||
|
func NewAttachCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts attachOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "attach [OPTIONS] CONTAINER",
|
||||||
|
Short: "Attach to a running container",
|
||||||
|
Args: cli.ExactArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.container = args[0]
|
||||||
|
return runAttach(dockerCli, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
flags.BoolVar(&opts.noStdin, "no-stdin", false, "Do not attach STDIN")
|
||||||
|
flags.BoolVar(&opts.proxy, "sig-proxy", true, "Proxy all received signals to the process")
|
||||||
|
flags.StringVar(&opts.detachKeys, "detach-keys", "", "Override the key sequence for detaching a container")
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runAttach(dockerCli *client.DockerCli, opts *attachOptions) error {
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
c, err := dockerCli.Client().ContainerInspect(ctx, opts.container)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if !c.State.Running {
|
||||||
|
return fmt.Errorf("You cannot attach to a stopped container, start it first")
|
||||||
|
}
|
||||||
|
|
||||||
|
if c.State.Paused {
|
||||||
|
return fmt.Errorf("You cannot attach to a paused container, unpause it first")
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := dockerCli.CheckTtyInput(!opts.noStdin, c.Config.Tty); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if opts.detachKeys != "" {
|
||||||
|
dockerCli.ConfigFile().DetachKeys = opts.detachKeys
|
||||||
|
}
|
||||||
|
|
||||||
|
options := types.ContainerAttachOptions{
|
||||||
|
Stream: true,
|
||||||
|
Stdin: !opts.noStdin && c.Config.OpenStdin,
|
||||||
|
Stdout: true,
|
||||||
|
Stderr: true,
|
||||||
|
DetachKeys: dockerCli.ConfigFile().DetachKeys,
|
||||||
|
}
|
||||||
|
|
||||||
|
var in io.ReadCloser
|
||||||
|
if options.Stdin {
|
||||||
|
in = dockerCli.In()
|
||||||
|
}
|
||||||
|
|
||||||
|
if opts.proxy && !c.Config.Tty {
|
||||||
|
sigc := dockerCli.ForwardAllSignals(ctx, opts.container)
|
||||||
|
defer signal.StopCatch(sigc)
|
||||||
|
}
|
||||||
|
|
||||||
|
resp, errAttach := dockerCli.Client().ContainerAttach(ctx, opts.container, options)
|
||||||
|
if errAttach != nil && errAttach != httputil.ErrPersistEOF {
|
||||||
|
// ContainerAttach returns an ErrPersistEOF (connection closed)
|
||||||
|
// means server met an error and put it in Hijacked connection
|
||||||
|
// keep the error and read detailed error message from hijacked connection later
|
||||||
|
return errAttach
|
||||||
|
}
|
||||||
|
defer resp.Close()
|
||||||
|
|
||||||
|
if c.Config.Tty && dockerCli.IsTerminalOut() {
|
||||||
|
height, width := dockerCli.GetTtySize()
|
||||||
|
// To handle the case where a user repeatedly attaches/detaches without resizing their
|
||||||
|
// terminal, the only way to get the shell prompt to display for attaches 2+ is to artificially
|
||||||
|
// resize it, then go back to normal. Without this, every attach after the first will
|
||||||
|
// require the user to manually resize or hit enter.
|
||||||
|
dockerCli.ResizeTtyTo(ctx, opts.container, height+1, width+1, false)
|
||||||
|
|
||||||
|
// After the above resizing occurs, the call to MonitorTtySize below will handle resetting back
|
||||||
|
// to the actual size.
|
||||||
|
if err := dockerCli.MonitorTtySize(ctx, opts.container, false); err != nil {
|
||||||
|
logrus.Debugf("Error monitoring TTY size: %s", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if err := dockerCli.HoldHijackedConnection(ctx, c.Config.Tty, in, dockerCli.Out(), dockerCli.Err(), resp); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if errAttach != nil {
|
||||||
|
return errAttach
|
||||||
|
}
|
||||||
|
|
||||||
|
_, status, err := getExitCode(dockerCli, ctx, opts.container)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if status != 0 {
|
||||||
|
return cli.StatusError{StatusCode: status}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
92
api/client/container/commit.go
Normal file
92
api/client/container/commit.go
Normal file
|
@ -0,0 +1,92 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
dockeropts "github.com/docker/docker/opts"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
containertypes "github.com/docker/engine-api/types/container"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type commitOptions struct {
|
||||||
|
container string
|
||||||
|
reference string
|
||||||
|
|
||||||
|
pause bool
|
||||||
|
comment string
|
||||||
|
author string
|
||||||
|
changes dockeropts.ListOpts
|
||||||
|
config string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCommitCommand creats a new cobra.Command for `docker commit`
|
||||||
|
func NewCommitCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts commitOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "commit [OPTIONS] CONTAINER [REPOSITORY[:TAG]]",
|
||||||
|
Short: "Create a new image from a container's changes",
|
||||||
|
Args: cli.RequiresRangeArgs(1, 2),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.container = args[0]
|
||||||
|
if len(args) > 1 {
|
||||||
|
opts.reference = args[1]
|
||||||
|
}
|
||||||
|
return runCommit(dockerCli, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
flags.SetInterspersed(false)
|
||||||
|
|
||||||
|
flags.BoolVarP(&opts.pause, "pause", "p", true, "Pause container during commit")
|
||||||
|
flags.StringVarP(&opts.comment, "message", "m", "", "Commit message")
|
||||||
|
flags.StringVarP(&opts.author, "author", "a", "", "Author (e.g., \"John Hannibal Smith <hannibal@a-team.com>\")")
|
||||||
|
|
||||||
|
opts.changes = dockeropts.NewListOpts(nil)
|
||||||
|
flags.VarP(&opts.changes, "change", "c", "Apply Dockerfile instruction to the created image")
|
||||||
|
|
||||||
|
// FIXME: --run is deprecated, it will be replaced with inline Dockerfile commands.
|
||||||
|
flags.StringVar(&opts.config, "run", "", "This option is deprecated and will be removed in a future version in favor of inline Dockerfile-compatible commands")
|
||||||
|
flags.MarkDeprecated("run", "it will be replaced with inline Dockerfile commands.")
|
||||||
|
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runCommit(dockerCli *client.DockerCli, opts *commitOptions) error {
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
name := opts.container
|
||||||
|
reference := opts.reference
|
||||||
|
|
||||||
|
var config *containertypes.Config
|
||||||
|
if opts.config != "" {
|
||||||
|
config = &containertypes.Config{}
|
||||||
|
if err := json.Unmarshal([]byte(opts.config), config); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
options := types.ContainerCommitOptions{
|
||||||
|
Reference: reference,
|
||||||
|
Comment: opts.comment,
|
||||||
|
Author: opts.author,
|
||||||
|
Changes: opts.changes.GetAll(),
|
||||||
|
Pause: opts.pause,
|
||||||
|
Config: config,
|
||||||
|
}
|
||||||
|
|
||||||
|
response, err := dockerCli.Client().ContainerCommit(ctx, name, options)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
fmt.Fprintln(dockerCli.Out(), response.ID)
|
||||||
|
return nil
|
||||||
|
}
|
303
api/client/container/cp.go
Normal file
303
api/client/container/cp.go
Normal file
|
@ -0,0 +1,303 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/docker/docker/pkg/archive"
|
||||||
|
"github.com/docker/docker/pkg/system"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type copyOptions struct {
|
||||||
|
source string
|
||||||
|
destination string
|
||||||
|
followLink bool
|
||||||
|
}
|
||||||
|
|
||||||
|
type copyDirection int
|
||||||
|
|
||||||
|
const (
|
||||||
|
fromContainer copyDirection = (1 << iota)
|
||||||
|
toContainer
|
||||||
|
acrossContainers = fromContainer | toContainer
|
||||||
|
)
|
||||||
|
|
||||||
|
type cpConfig struct {
|
||||||
|
followLink bool
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCopyCommand creates a new `docker cp` command
|
||||||
|
func NewCopyCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts copyOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: `cp [OPTIONS] CONTAINER:SRC_PATH DEST_PATH|-
|
||||||
|
docker cp [OPTIONS] SRC_PATH|- CONTAINER:DEST_PATH`,
|
||||||
|
Short: "Copy files/folders between a container and the local filesystem",
|
||||||
|
Long: strings.Join([]string{
|
||||||
|
"Copy files/folders between a container and the local filesystem\n",
|
||||||
|
"\nUse '-' as the source to read a tar archive from stdin\n",
|
||||||
|
"and extract it to a directory destination in a container.\n",
|
||||||
|
"Use '-' as the destination to stream a tar archive of a\n",
|
||||||
|
"container source to stdout.",
|
||||||
|
}, ""),
|
||||||
|
Args: cli.ExactArgs(2),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
if args[0] == "" {
|
||||||
|
return fmt.Errorf("source can not be empty")
|
||||||
|
}
|
||||||
|
if args[1] == "" {
|
||||||
|
return fmt.Errorf("destination can not be empty")
|
||||||
|
}
|
||||||
|
opts.source = args[0]
|
||||||
|
opts.destination = args[1]
|
||||||
|
return runCopy(dockerCli, opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
|
||||||
|
flags.BoolVarP(&opts.followLink, "follow-link", "L", false, "Always follow symbol link in SRC_PATH")
|
||||||
|
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runCopy(dockerCli *client.DockerCli, opts copyOptions) error {
|
||||||
|
srcContainer, srcPath := splitCpArg(opts.source)
|
||||||
|
dstContainer, dstPath := splitCpArg(opts.destination)
|
||||||
|
|
||||||
|
var direction copyDirection
|
||||||
|
if srcContainer != "" {
|
||||||
|
direction |= fromContainer
|
||||||
|
}
|
||||||
|
if dstContainer != "" {
|
||||||
|
direction |= toContainer
|
||||||
|
}
|
||||||
|
|
||||||
|
cpParam := &cpConfig{
|
||||||
|
followLink: opts.followLink,
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
switch direction {
|
||||||
|
case fromContainer:
|
||||||
|
return copyFromContainer(ctx, dockerCli, srcContainer, srcPath, dstPath, cpParam)
|
||||||
|
case toContainer:
|
||||||
|
return copyToContainer(ctx, dockerCli, srcPath, dstContainer, dstPath, cpParam)
|
||||||
|
case acrossContainers:
|
||||||
|
// Copying between containers isn't supported.
|
||||||
|
return fmt.Errorf("copying between containers is not supported")
|
||||||
|
default:
|
||||||
|
// User didn't specify any container.
|
||||||
|
return fmt.Errorf("must specify at least one container source")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func statContainerPath(ctx context.Context, dockerCli *client.DockerCli, containerName, path string) (types.ContainerPathStat, error) {
|
||||||
|
return dockerCli.Client().ContainerStatPath(ctx, containerName, path)
|
||||||
|
}
|
||||||
|
|
||||||
|
func resolveLocalPath(localPath string) (absPath string, err error) {
|
||||||
|
if absPath, err = filepath.Abs(localPath); err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
return archive.PreserveTrailingDotOrSeparator(absPath, localPath), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func copyFromContainer(ctx context.Context, dockerCli *client.DockerCli, srcContainer, srcPath, dstPath string, cpParam *cpConfig) (err error) {
|
||||||
|
if dstPath != "-" {
|
||||||
|
// Get an absolute destination path.
|
||||||
|
dstPath, err = resolveLocalPath(dstPath)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// if client requests to follow symbol link, then must decide target file to be copied
|
||||||
|
var rebaseName string
|
||||||
|
if cpParam.followLink {
|
||||||
|
srcStat, err := statContainerPath(ctx, dockerCli, srcContainer, srcPath)
|
||||||
|
|
||||||
|
// If the destination is a symbolic link, we should follow it.
|
||||||
|
if err == nil && srcStat.Mode&os.ModeSymlink != 0 {
|
||||||
|
linkTarget := srcStat.LinkTarget
|
||||||
|
if !system.IsAbs(linkTarget) {
|
||||||
|
// Join with the parent directory.
|
||||||
|
srcParent, _ := archive.SplitPathDirEntry(srcPath)
|
||||||
|
linkTarget = filepath.Join(srcParent, linkTarget)
|
||||||
|
}
|
||||||
|
|
||||||
|
linkTarget, rebaseName = archive.GetRebaseName(srcPath, linkTarget)
|
||||||
|
srcPath = linkTarget
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
content, stat, err := dockerCli.Client().CopyFromContainer(ctx, srcContainer, srcPath)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer content.Close()
|
||||||
|
|
||||||
|
if dstPath == "-" {
|
||||||
|
// Send the response to STDOUT.
|
||||||
|
_, err = io.Copy(os.Stdout, content)
|
||||||
|
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Prepare source copy info.
|
||||||
|
srcInfo := archive.CopyInfo{
|
||||||
|
Path: srcPath,
|
||||||
|
Exists: true,
|
||||||
|
IsDir: stat.Mode.IsDir(),
|
||||||
|
RebaseName: rebaseName,
|
||||||
|
}
|
||||||
|
|
||||||
|
preArchive := content
|
||||||
|
if len(srcInfo.RebaseName) != 0 {
|
||||||
|
_, srcBase := archive.SplitPathDirEntry(srcInfo.Path)
|
||||||
|
preArchive = archive.RebaseArchiveEntries(content, srcBase, srcInfo.RebaseName)
|
||||||
|
}
|
||||||
|
// See comments in the implementation of `archive.CopyTo` for exactly what
|
||||||
|
// goes into deciding how and whether the source archive needs to be
|
||||||
|
// altered for the correct copy behavior.
|
||||||
|
return archive.CopyTo(preArchive, srcInfo, dstPath)
|
||||||
|
}
|
||||||
|
|
||||||
|
func copyToContainer(ctx context.Context, dockerCli *client.DockerCli, srcPath, dstContainer, dstPath string, cpParam *cpConfig) (err error) {
|
||||||
|
if srcPath != "-" {
|
||||||
|
// Get an absolute source path.
|
||||||
|
srcPath, err = resolveLocalPath(srcPath)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// In order to get the copy behavior right, we need to know information
|
||||||
|
// about both the source and destination. The API is a simple tar
|
||||||
|
// archive/extract API but we can use the stat info header about the
|
||||||
|
// destination to be more informed about exactly what the destination is.
|
||||||
|
|
||||||
|
// Prepare destination copy info by stat-ing the container path.
|
||||||
|
dstInfo := archive.CopyInfo{Path: dstPath}
|
||||||
|
dstStat, err := statContainerPath(ctx, dockerCli, dstContainer, dstPath)
|
||||||
|
|
||||||
|
// If the destination is a symbolic link, we should evaluate it.
|
||||||
|
if err == nil && dstStat.Mode&os.ModeSymlink != 0 {
|
||||||
|
linkTarget := dstStat.LinkTarget
|
||||||
|
if !system.IsAbs(linkTarget) {
|
||||||
|
// Join with the parent directory.
|
||||||
|
dstParent, _ := archive.SplitPathDirEntry(dstPath)
|
||||||
|
linkTarget = filepath.Join(dstParent, linkTarget)
|
||||||
|
}
|
||||||
|
|
||||||
|
dstInfo.Path = linkTarget
|
||||||
|
dstStat, err = statContainerPath(ctx, dockerCli, dstContainer, linkTarget)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Ignore any error and assume that the parent directory of the destination
|
||||||
|
// path exists, in which case the copy may still succeed. If there is any
|
||||||
|
// type of conflict (e.g., non-directory overwriting an existing directory
|
||||||
|
// or vice versa) the extraction will fail. If the destination simply did
|
||||||
|
// not exist, but the parent directory does, the extraction will still
|
||||||
|
// succeed.
|
||||||
|
if err == nil {
|
||||||
|
dstInfo.Exists, dstInfo.IsDir = true, dstStat.Mode.IsDir()
|
||||||
|
}
|
||||||
|
|
||||||
|
var (
|
||||||
|
content io.Reader
|
||||||
|
resolvedDstPath string
|
||||||
|
)
|
||||||
|
|
||||||
|
if srcPath == "-" {
|
||||||
|
// Use STDIN.
|
||||||
|
content = os.Stdin
|
||||||
|
resolvedDstPath = dstInfo.Path
|
||||||
|
if !dstInfo.IsDir {
|
||||||
|
return fmt.Errorf("destination %q must be a directory", fmt.Sprintf("%s:%s", dstContainer, dstPath))
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
// Prepare source copy info.
|
||||||
|
srcInfo, err := archive.CopyInfoSourcePath(srcPath, cpParam.followLink)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
srcArchive, err := archive.TarResource(srcInfo)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer srcArchive.Close()
|
||||||
|
|
||||||
|
// With the stat info about the local source as well as the
|
||||||
|
// destination, we have enough information to know whether we need to
|
||||||
|
// alter the archive that we upload so that when the server extracts
|
||||||
|
// it to the specified directory in the container we get the desired
|
||||||
|
// copy behavior.
|
||||||
|
|
||||||
|
// See comments in the implementation of `archive.PrepareArchiveCopy`
|
||||||
|
// for exactly what goes into deciding how and whether the source
|
||||||
|
// archive needs to be altered for the correct copy behavior when it is
|
||||||
|
// extracted. This function also infers from the source and destination
|
||||||
|
// info which directory to extract to, which may be the parent of the
|
||||||
|
// destination that the user specified.
|
||||||
|
dstDir, preparedArchive, err := archive.PrepareArchiveCopy(srcArchive, srcInfo, dstInfo)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer preparedArchive.Close()
|
||||||
|
|
||||||
|
resolvedDstPath = dstDir
|
||||||
|
content = preparedArchive
|
||||||
|
}
|
||||||
|
|
||||||
|
options := types.CopyToContainerOptions{
|
||||||
|
AllowOverwriteDirWithFile: false,
|
||||||
|
}
|
||||||
|
|
||||||
|
return dockerCli.Client().CopyToContainer(ctx, dstContainer, resolvedDstPath, content, options)
|
||||||
|
}
|
||||||
|
|
||||||
|
// We use `:` as a delimiter between CONTAINER and PATH, but `:` could also be
|
||||||
|
// in a valid LOCALPATH, like `file:name.txt`. We can resolve this ambiguity by
|
||||||
|
// requiring a LOCALPATH with a `:` to be made explicit with a relative or
|
||||||
|
// absolute path:
|
||||||
|
// `/path/to/file:name.txt` or `./file:name.txt`
|
||||||
|
//
|
||||||
|
// This is apparently how `scp` handles this as well:
|
||||||
|
// http://www.cyberciti.biz/faq/rsync-scp-file-name-with-colon-punctuation-in-it/
|
||||||
|
//
|
||||||
|
// We can't simply check for a filepath separator because container names may
|
||||||
|
// have a separator, e.g., "host0/cname1" if container is in a Docker cluster,
|
||||||
|
// so we have to check for a `/` or `.` prefix. Also, in the case of a Windows
|
||||||
|
// client, a `:` could be part of an absolute Windows path, in which case it
|
||||||
|
// is immediately proceeded by a backslash.
|
||||||
|
func splitCpArg(arg string) (container, path string) {
|
||||||
|
if system.IsAbs(arg) {
|
||||||
|
// Explicit local absolute path, e.g., `C:\foo` or `/foo`.
|
||||||
|
return "", arg
|
||||||
|
}
|
||||||
|
|
||||||
|
parts := strings.SplitN(arg, ":", 2)
|
||||||
|
|
||||||
|
if len(parts) == 1 || strings.HasPrefix(parts[0], ".") {
|
||||||
|
// Either there's no `:` in the arg
|
||||||
|
// OR it's an explicit local relative path like `./file:name.txt`.
|
||||||
|
return "", arg
|
||||||
|
}
|
||||||
|
|
||||||
|
return parts[0], parts[1]
|
||||||
|
}
|
217
api/client/container/create.go
Normal file
217
api/client/container/create.go
Normal file
|
@ -0,0 +1,217 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"os"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/docker/docker/pkg/jsonmessage"
|
||||||
|
// FIXME migrate to docker/distribution/reference
|
||||||
|
"github.com/docker/docker/reference"
|
||||||
|
"github.com/docker/docker/registry"
|
||||||
|
runconfigopts "github.com/docker/docker/runconfig/opts"
|
||||||
|
apiclient "github.com/docker/engine-api/client"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
"github.com/docker/engine-api/types/container"
|
||||||
|
networktypes "github.com/docker/engine-api/types/network"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
"github.com/spf13/pflag"
|
||||||
|
)
|
||||||
|
|
||||||
|
type createOptions struct {
|
||||||
|
name string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewCreateCommand creats a new cobra.Command for `docker create`
|
||||||
|
func NewCreateCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts createOptions
|
||||||
|
var copts *runconfigopts.ContainerOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "create [OPTIONS] IMAGE [COMMAND] [ARG...]",
|
||||||
|
Short: "Create a new container",
|
||||||
|
Args: cli.RequiresMinArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
copts.Image = args[0]
|
||||||
|
if len(args) > 1 {
|
||||||
|
copts.Args = args[1:]
|
||||||
|
}
|
||||||
|
return runCreate(dockerCli, cmd.Flags(), &opts, copts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
flags.SetInterspersed(false)
|
||||||
|
|
||||||
|
flags.StringVar(&opts.name, "name", "", "Assign a name to the container")
|
||||||
|
|
||||||
|
// Add an explicit help that doesn't have a `-h` to prevent the conflict
|
||||||
|
// with hostname
|
||||||
|
flags.Bool("help", false, "Print usage")
|
||||||
|
|
||||||
|
client.AddTrustedFlags(flags, true)
|
||||||
|
copts = runconfigopts.AddFlags(flags)
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runCreate(dockerCli *client.DockerCli, flags *pflag.FlagSet, opts *createOptions, copts *runconfigopts.ContainerOptions) error {
|
||||||
|
config, hostConfig, networkingConfig, err := runconfigopts.Parse(flags, copts)
|
||||||
|
if err != nil {
|
||||||
|
reportError(dockerCli.Err(), "create", err.Error(), true)
|
||||||
|
return cli.StatusError{StatusCode: 125}
|
||||||
|
}
|
||||||
|
response, err := createContainer(context.Background(), dockerCli, config, hostConfig, networkingConfig, hostConfig.ContainerIDFile, opts.name)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
fmt.Fprintf(dockerCli.Out(), "%s\n", response.ID)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func pullImage(ctx context.Context, dockerCli *client.DockerCli, image string, out io.Writer) error {
|
||||||
|
ref, err := reference.ParseNamed(image)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Resolve the Repository name from fqn to RepositoryInfo
|
||||||
|
repoInfo, err := registry.ParseRepositoryInfo(ref)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
authConfig := dockerCli.ResolveAuthConfig(ctx, repoInfo.Index)
|
||||||
|
encodedAuth, err := client.EncodeAuthToBase64(authConfig)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
options := types.ImageCreateOptions{
|
||||||
|
RegistryAuth: encodedAuth,
|
||||||
|
}
|
||||||
|
|
||||||
|
responseBody, err := dockerCli.Client().ImageCreate(ctx, image, options)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer responseBody.Close()
|
||||||
|
|
||||||
|
return jsonmessage.DisplayJSONMessagesStream(
|
||||||
|
responseBody,
|
||||||
|
out,
|
||||||
|
dockerCli.OutFd(),
|
||||||
|
dockerCli.IsTerminalOut(),
|
||||||
|
nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
type cidFile struct {
|
||||||
|
path string
|
||||||
|
file *os.File
|
||||||
|
written bool
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cid *cidFile) Close() error {
|
||||||
|
cid.file.Close()
|
||||||
|
|
||||||
|
if !cid.written {
|
||||||
|
if err := os.Remove(cid.path); err != nil {
|
||||||
|
return fmt.Errorf("failed to remove the CID file '%s': %s \n", cid.path, err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cid *cidFile) Write(id string) error {
|
||||||
|
if _, err := cid.file.Write([]byte(id)); err != nil {
|
||||||
|
return fmt.Errorf("Failed to write the container ID to the file: %s", err)
|
||||||
|
}
|
||||||
|
cid.written = true
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func newCIDFile(path string) (*cidFile, error) {
|
||||||
|
if _, err := os.Stat(path); err == nil {
|
||||||
|
return nil, fmt.Errorf("Container ID file found, make sure the other container isn't running or delete %s", path)
|
||||||
|
}
|
||||||
|
|
||||||
|
f, err := os.Create(path)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("Failed to create the container ID file: %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
return &cidFile{path: path, file: f}, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func createContainer(ctx context.Context, dockerCli *client.DockerCli, config *container.Config, hostConfig *container.HostConfig, networkingConfig *networktypes.NetworkingConfig, cidfile, name string) (*types.ContainerCreateResponse, error) {
|
||||||
|
stderr := dockerCli.Err()
|
||||||
|
|
||||||
|
var containerIDFile *cidFile
|
||||||
|
if cidfile != "" {
|
||||||
|
var err error
|
||||||
|
if containerIDFile, err = newCIDFile(cidfile); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
defer containerIDFile.Close()
|
||||||
|
}
|
||||||
|
|
||||||
|
var trustedRef reference.Canonical
|
||||||
|
_, ref, err := reference.ParseIDOrReference(config.Image)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if ref != nil {
|
||||||
|
ref = reference.WithDefaultTag(ref)
|
||||||
|
|
||||||
|
if ref, ok := ref.(reference.NamedTagged); ok && client.IsTrusted() {
|
||||||
|
var err error
|
||||||
|
trustedRef, err = dockerCli.TrustedReference(ctx, ref)
|
||||||
|
if err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
config.Image = trustedRef.String()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
//create the container
|
||||||
|
response, err := dockerCli.Client().ContainerCreate(ctx, config, hostConfig, networkingConfig, name)
|
||||||
|
|
||||||
|
//if image not found try to pull it
|
||||||
|
if err != nil {
|
||||||
|
if apiclient.IsErrImageNotFound(err) && ref != nil {
|
||||||
|
fmt.Fprintf(stderr, "Unable to find image '%s' locally\n", ref.String())
|
||||||
|
|
||||||
|
// we don't want to write to stdout anything apart from container.ID
|
||||||
|
if err = pullImage(ctx, dockerCli, config.Image, stderr); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
if ref, ok := ref.(reference.NamedTagged); ok && trustedRef != nil {
|
||||||
|
if err := dockerCli.TagTrusted(ctx, trustedRef, ref); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
// Retry
|
||||||
|
var retryErr error
|
||||||
|
response, retryErr = dockerCli.Client().ContainerCreate(ctx, config, hostConfig, networkingConfig, name)
|
||||||
|
if retryErr != nil {
|
||||||
|
return nil, retryErr
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, warning := range response.Warnings {
|
||||||
|
fmt.Fprintf(stderr, "WARNING: %s\n", warning)
|
||||||
|
}
|
||||||
|
if containerIDFile != nil {
|
||||||
|
if err = containerIDFile.Write(response.ID); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return &response, nil
|
||||||
|
}
|
60
api/client/container/diff.go
Normal file
60
api/client/container/diff.go
Normal file
|
@ -0,0 +1,60 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/docker/docker/pkg/archive"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type diffOptions struct {
|
||||||
|
container string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewDiffCommand creates a new cobra.Command for `docker diff`
|
||||||
|
func NewDiffCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts diffOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "diff CONTAINER",
|
||||||
|
Short: "Inspect changes on a container's filesystem",
|
||||||
|
Args: cli.ExactArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.container = args[0]
|
||||||
|
return runDiff(dockerCli, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runDiff(dockerCli *client.DockerCli, opts *diffOptions) error {
|
||||||
|
if opts.container == "" {
|
||||||
|
return fmt.Errorf("Container name cannot be empty")
|
||||||
|
}
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
changes, err := dockerCli.Client().ContainerDiff(ctx, opts.container)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, change := range changes {
|
||||||
|
var kind string
|
||||||
|
switch change.Kind {
|
||||||
|
case archive.ChangeModify:
|
||||||
|
kind = "C"
|
||||||
|
case archive.ChangeAdd:
|
||||||
|
kind = "A"
|
||||||
|
case archive.ChangeDelete:
|
||||||
|
kind = "D"
|
||||||
|
}
|
||||||
|
fmt.Fprintf(dockerCli.Out(), "%s %s\n", kind, change.Path)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
59
api/client/container/export.go
Normal file
59
api/client/container/export.go
Normal file
|
@ -0,0 +1,59 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
"io"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type exportOptions struct {
|
||||||
|
container string
|
||||||
|
output string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewExportCommand creates a new `docker export` command
|
||||||
|
func NewExportCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts exportOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "export [OPTIONS] CONTAINER",
|
||||||
|
Short: "Export a container's filesystem as a tar archive",
|
||||||
|
Args: cli.ExactArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.container = args[0]
|
||||||
|
return runExport(dockerCli, opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
|
||||||
|
flags.StringVarP(&opts.output, "output", "o", "", "Write to a file, instead of STDOUT")
|
||||||
|
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runExport(dockerCli *client.DockerCli, opts exportOptions) error {
|
||||||
|
if opts.output == "" && dockerCli.IsTerminalOut() {
|
||||||
|
return errors.New("Cowardly refusing to save to a terminal. Use the -o flag or redirect.")
|
||||||
|
}
|
||||||
|
|
||||||
|
clnt := dockerCli.Client()
|
||||||
|
|
||||||
|
responseBody, err := clnt.ContainerExport(context.Background(), opts.container)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer responseBody.Close()
|
||||||
|
|
||||||
|
if opts.output == "" {
|
||||||
|
_, err := io.Copy(dockerCli.Out(), responseBody)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return client.CopyToFile(opts.output, responseBody)
|
||||||
|
}
|
53
api/client/container/kill.go
Normal file
53
api/client/container/kill.go
Normal file
|
@ -0,0 +1,53 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type killOptions struct {
|
||||||
|
signal string
|
||||||
|
|
||||||
|
containers []string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewKillCommand creats a new cobra.Command for `docker kill`
|
||||||
|
func NewKillCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts killOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "kill [OPTIONS] CONTAINER [CONTAINER...]",
|
||||||
|
Short: "Kill one or more running containers",
|
||||||
|
Args: cli.RequiresMinArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.containers = args
|
||||||
|
return runKill(dockerCli, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
flags.StringVarP(&opts.signal, "signal", "s", "KILL", "Signal to send to the container")
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runKill(dockerCli *client.DockerCli, opts *killOptions) error {
|
||||||
|
var errs []string
|
||||||
|
ctx := context.Background()
|
||||||
|
for _, name := range opts.containers {
|
||||||
|
if err := dockerCli.Client().ContainerKill(ctx, name, opts.signal); err != nil {
|
||||||
|
errs = append(errs, err.Error())
|
||||||
|
} else {
|
||||||
|
fmt.Fprintf(dockerCli.Out(), "%s\n", name)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if len(errs) > 0 {
|
||||||
|
return fmt.Errorf("%s", strings.Join(errs, "\n"))
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
87
api/client/container/logs.go
Normal file
87
api/client/container/logs.go
Normal file
|
@ -0,0 +1,87 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/docker/docker/pkg/stdcopy"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
var validDrivers = map[string]bool{
|
||||||
|
"json-file": true,
|
||||||
|
"journald": true,
|
||||||
|
}
|
||||||
|
|
||||||
|
type logsOptions struct {
|
||||||
|
follow bool
|
||||||
|
since string
|
||||||
|
timestamps bool
|
||||||
|
details bool
|
||||||
|
tail string
|
||||||
|
|
||||||
|
container string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewLogsCommand creats a new cobra.Command for `docker logs`
|
||||||
|
func NewLogsCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts logsOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "logs [OPTIONS] CONTAINER",
|
||||||
|
Short: "Fetch the logs of a container",
|
||||||
|
Args: cli.ExactArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.container = args[0]
|
||||||
|
return runLogs(dockerCli, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
flags.BoolVarP(&opts.follow, "follow", "f", false, "Follow log output")
|
||||||
|
flags.StringVar(&opts.since, "since", "", "Show logs since timestamp")
|
||||||
|
flags.BoolVarP(&opts.timestamps, "timestamps", "t", false, "Show timestamps")
|
||||||
|
flags.BoolVar(&opts.details, "details", false, "Show extra details provided to logs")
|
||||||
|
flags.StringVar(&opts.tail, "tail", "all", "Number of lines to show from the end of the logs")
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runLogs(dockerCli *client.DockerCli, opts *logsOptions) error {
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
c, err := dockerCli.Client().ContainerInspect(ctx, opts.container)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if !validDrivers[c.HostConfig.LogConfig.Type] {
|
||||||
|
return fmt.Errorf("\"logs\" command is supported only for \"json-file\" and \"journald\" logging drivers (got: %s)", c.HostConfig.LogConfig.Type)
|
||||||
|
}
|
||||||
|
|
||||||
|
options := types.ContainerLogsOptions{
|
||||||
|
ShowStdout: true,
|
||||||
|
ShowStderr: true,
|
||||||
|
Since: opts.since,
|
||||||
|
Timestamps: opts.timestamps,
|
||||||
|
Follow: opts.follow,
|
||||||
|
Tail: opts.tail,
|
||||||
|
Details: opts.details,
|
||||||
|
}
|
||||||
|
responseBody, err := dockerCli.Client().ContainerLogs(ctx, opts.container, options)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer responseBody.Close()
|
||||||
|
|
||||||
|
if c.Config.Tty {
|
||||||
|
_, err = io.Copy(dockerCli.Out(), responseBody)
|
||||||
|
} else {
|
||||||
|
_, err = stdcopy.StdCopy(dockerCli.Out(), dockerCli.Err(), responseBody)
|
||||||
|
}
|
||||||
|
return err
|
||||||
|
}
|
50
api/client/container/pause.go
Normal file
50
api/client/container/pause.go
Normal file
|
@ -0,0 +1,50 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type pauseOptions struct {
|
||||||
|
containers []string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewPauseCommand creats a new cobra.Command for `docker pause`
|
||||||
|
func NewPauseCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts pauseOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "pause CONTAINER [CONTAINER...]",
|
||||||
|
Short: "Pause all processes within one or more containers",
|
||||||
|
Args: cli.RequiresMinArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.containers = args
|
||||||
|
return runPause(dockerCli, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runPause(dockerCli *client.DockerCli, opts *pauseOptions) error {
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
var errs []string
|
||||||
|
for _, container := range opts.containers {
|
||||||
|
if err := dockerCli.Client().ContainerPause(ctx, container); err != nil {
|
||||||
|
errs = append(errs, err.Error())
|
||||||
|
} else {
|
||||||
|
fmt.Fprintf(dockerCli.Out(), "%s\n", container)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if len(errs) > 0 {
|
||||||
|
return fmt.Errorf("%s", strings.Join(errs, "\n"))
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
79
api/client/container/port.go
Normal file
79
api/client/container/port.go
Normal file
|
@ -0,0 +1,79 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/docker/go-connections/nat"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type portOptions struct {
|
||||||
|
container string
|
||||||
|
|
||||||
|
port string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewPortCommand creats a new cobra.Command for `docker port`
|
||||||
|
func NewPortCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts portOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "port CONTAINER [PRIVATE_PORT[/PROTO]]",
|
||||||
|
Short: "List port mappings or a specific mapping for the container",
|
||||||
|
Args: cli.RequiresRangeArgs(1, 2),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.container = args[0]
|
||||||
|
if len(args) > 1 {
|
||||||
|
opts.port = args[1]
|
||||||
|
}
|
||||||
|
return runPort(dockerCli, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runPort(dockerCli *client.DockerCli, opts *portOptions) error {
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
c, err := dockerCli.Client().ContainerInspect(ctx, opts.container)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if opts.port != "" {
|
||||||
|
port := opts.port
|
||||||
|
proto := "tcp"
|
||||||
|
parts := strings.SplitN(port, "/", 2)
|
||||||
|
|
||||||
|
if len(parts) == 2 && len(parts[1]) != 0 {
|
||||||
|
port = parts[0]
|
||||||
|
proto = parts[1]
|
||||||
|
}
|
||||||
|
natPort := port + "/" + proto
|
||||||
|
newP, err := nat.NewPort(proto, port)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if frontends, exists := c.NetworkSettings.Ports[newP]; exists && frontends != nil {
|
||||||
|
for _, frontend := range frontends {
|
||||||
|
fmt.Fprintf(dockerCli.Out(), "%s:%s\n", frontend.HostIP, frontend.HostPort)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return fmt.Errorf("Error: No public port '%s' published for %s", natPort, opts.container)
|
||||||
|
}
|
||||||
|
|
||||||
|
for from, frontends := range c.NetworkSettings.Ports {
|
||||||
|
for _, frontend := range frontends {
|
||||||
|
fmt.Fprintf(dockerCli.Out(), "%s -> %s:%s\n", from, frontend.HostIP, frontend.HostPort)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
125
api/client/container/ps.go
Normal file
125
api/client/container/ps.go
Normal file
|
@ -0,0 +1,125 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/api/client/formatter"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
"github.com/docker/engine-api/types/filters"
|
||||||
|
|
||||||
|
"github.com/docker/docker/utils/templates"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
"io/ioutil"
|
||||||
|
)
|
||||||
|
|
||||||
|
type psOptions struct {
|
||||||
|
quiet bool
|
||||||
|
size bool
|
||||||
|
all bool
|
||||||
|
noTrunc bool
|
||||||
|
nLatest bool
|
||||||
|
last int
|
||||||
|
format string
|
||||||
|
filter []string
|
||||||
|
}
|
||||||
|
|
||||||
|
type preProcessor struct {
|
||||||
|
opts *types.ContainerListOptions
|
||||||
|
}
|
||||||
|
|
||||||
|
// Size sets the size option when called by a template execution.
|
||||||
|
func (p *preProcessor) Size() bool {
|
||||||
|
p.opts.Size = true
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewPsCommand creates a new cobra.Command for `docker ps`
|
||||||
|
func NewPsCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts psOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "ps [OPTIONS]",
|
||||||
|
Short: "List containers",
|
||||||
|
Args: cli.NoArgs,
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
return runPs(dockerCli, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
|
||||||
|
flags.BoolVarP(&opts.quiet, "quiet", "q", false, "Only display numeric IDs")
|
||||||
|
flags.BoolVarP(&opts.size, "size", "s", false, "Display total file sizes")
|
||||||
|
flags.BoolVarP(&opts.all, "all", "a", false, "Show all containers (default shows just running)")
|
||||||
|
flags.BoolVar(&opts.noTrunc, "no-trunc", false, "Don't truncate output")
|
||||||
|
flags.BoolVarP(&opts.nLatest, "latest", "l", false, "Show the latest created container (includes all states)")
|
||||||
|
flags.IntVarP(&opts.last, "last", "n", -1, "Show n last created containers (includes all states)")
|
||||||
|
flags.StringVarP(&opts.format, "format", "", "", "Pretty-print containers using a Go template")
|
||||||
|
flags.StringSliceVarP(&opts.filter, "filter", "f", []string{}, "Filter output based on conditions provided")
|
||||||
|
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runPs(dockerCli *client.DockerCli, opts *psOptions) error {
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
if opts.nLatest && opts.last == -1 {
|
||||||
|
opts.last = 1
|
||||||
|
}
|
||||||
|
|
||||||
|
containerFilterArgs := filters.NewArgs()
|
||||||
|
for _, f := range opts.filter {
|
||||||
|
var err error
|
||||||
|
containerFilterArgs, err = filters.ParseFlag(f, containerFilterArgs)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
options := types.ContainerListOptions{
|
||||||
|
All: opts.all,
|
||||||
|
Limit: opts.last,
|
||||||
|
Size: opts.size,
|
||||||
|
Filter: containerFilterArgs,
|
||||||
|
}
|
||||||
|
|
||||||
|
pre := &preProcessor{opts: &options}
|
||||||
|
tmpl, err := templates.Parse(opts.format)
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
_ = tmpl.Execute(ioutil.Discard, pre)
|
||||||
|
|
||||||
|
containers, err := dockerCli.Client().ContainerList(ctx, options)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
f := opts.format
|
||||||
|
if len(f) == 0 {
|
||||||
|
if len(dockerCli.PsFormat()) > 0 && !opts.quiet {
|
||||||
|
f = dockerCli.PsFormat()
|
||||||
|
} else {
|
||||||
|
f = "table"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
psCtx := formatter.ContainerContext{
|
||||||
|
Context: formatter.Context{
|
||||||
|
Output: dockerCli.Out(),
|
||||||
|
Format: f,
|
||||||
|
Quiet: opts.quiet,
|
||||||
|
Trunc: !opts.noTrunc,
|
||||||
|
},
|
||||||
|
Size: opts.size,
|
||||||
|
Containers: containers,
|
||||||
|
}
|
||||||
|
|
||||||
|
psCtx.Write()
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
52
api/client/container/rename.go
Normal file
52
api/client/container/rename.go
Normal file
|
@ -0,0 +1,52 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type renameOptions struct {
|
||||||
|
oldName string
|
||||||
|
newName string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewRenameCommand creats a new cobra.Command for `docker rename`
|
||||||
|
func NewRenameCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts renameOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "rename CONTAINER NEW_NAME",
|
||||||
|
Short: "Rename a container",
|
||||||
|
Args: cli.ExactArgs(2),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.oldName = args[0]
|
||||||
|
opts.newName = args[1]
|
||||||
|
return runRename(dockerCli, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runRename(dockerCli *client.DockerCli, opts *renameOptions) error {
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
oldName := strings.TrimSpace(opts.oldName)
|
||||||
|
newName := strings.TrimSpace(opts.newName)
|
||||||
|
|
||||||
|
if oldName == "" || newName == "" {
|
||||||
|
return fmt.Errorf("Error: Neither old nor new names may be empty")
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := dockerCli.Client().ContainerRename(ctx, oldName, newName); err != nil {
|
||||||
|
fmt.Fprintf(dockerCli.Err(), "%s\n", err)
|
||||||
|
return fmt.Errorf("Error: failed to rename container named %s", oldName)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
55
api/client/container/restart.go
Normal file
55
api/client/container/restart.go
Normal file
|
@ -0,0 +1,55 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type restartOptions struct {
|
||||||
|
nSeconds int
|
||||||
|
|
||||||
|
containers []string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewRestartCommand creates a new cobra.Command for `docker restart`
|
||||||
|
func NewRestartCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts restartOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "restart [OPTIONS] CONTAINER [CONTAINER...]",
|
||||||
|
Short: "Restart a container",
|
||||||
|
Args: cli.RequiresMinArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.containers = args
|
||||||
|
return runRestart(dockerCli, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
flags.IntVarP(&opts.nSeconds, "time", "t", 10, "Seconds to wait for stop before killing the container")
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runRestart(dockerCli *client.DockerCli, opts *restartOptions) error {
|
||||||
|
ctx := context.Background()
|
||||||
|
var errs []string
|
||||||
|
for _, name := range opts.containers {
|
||||||
|
timeout := time.Duration(opts.nSeconds) * time.Second
|
||||||
|
if err := dockerCli.Client().ContainerRestart(ctx, name, &timeout); err != nil {
|
||||||
|
errs = append(errs, err.Error())
|
||||||
|
} else {
|
||||||
|
fmt.Fprintf(dockerCli.Out(), "%s\n", name)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if len(errs) > 0 {
|
||||||
|
return fmt.Errorf("%s", strings.Join(errs, "\n"))
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
76
api/client/container/rm.go
Normal file
76
api/client/container/rm.go
Normal file
|
@ -0,0 +1,76 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type rmOptions struct {
|
||||||
|
rmVolumes bool
|
||||||
|
rmLink bool
|
||||||
|
force bool
|
||||||
|
|
||||||
|
containers []string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewRmCommand creates a new cobra.Command for `docker rm`
|
||||||
|
func NewRmCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts rmOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "rm [OPTIONS] CONTAINER [CONTAINER...]",
|
||||||
|
Short: "Remove one or more containers",
|
||||||
|
Args: cli.RequiresMinArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.containers = args
|
||||||
|
return runRm(dockerCli, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
flags.BoolVarP(&opts.rmVolumes, "volumes", "v", false, "Remove the volumes associated with the container")
|
||||||
|
flags.BoolVarP(&opts.rmLink, "link", "l", false, "Remove the specified link")
|
||||||
|
flags.BoolVarP(&opts.force, "force", "f", false, "Force the removal of a running container (uses SIGKILL)")
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runRm(dockerCli *client.DockerCli, opts *rmOptions) error {
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
var errs []string
|
||||||
|
for _, name := range opts.containers {
|
||||||
|
if name == "" {
|
||||||
|
return fmt.Errorf("Container name cannot be empty")
|
||||||
|
}
|
||||||
|
name = strings.Trim(name, "/")
|
||||||
|
|
||||||
|
if err := removeContainer(dockerCli, ctx, name, opts.rmVolumes, opts.rmLink, opts.force); err != nil {
|
||||||
|
errs = append(errs, err.Error())
|
||||||
|
} else {
|
||||||
|
fmt.Fprintf(dockerCli.Out(), "%s\n", name)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if len(errs) > 0 {
|
||||||
|
return fmt.Errorf("%s", strings.Join(errs, "\n"))
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func removeContainer(dockerCli *client.DockerCli, ctx context.Context, container string, removeVolumes, removeLinks, force bool) error {
|
||||||
|
options := types.ContainerRemoveOptions{
|
||||||
|
RemoveVolumes: removeVolumes,
|
||||||
|
RemoveLinks: removeLinks,
|
||||||
|
Force: force,
|
||||||
|
}
|
||||||
|
if err := dockerCli.Client().ContainerRemove(ctx, container, options); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
326
api/client/container/run.go
Normal file
326
api/client/container/run.go
Normal file
|
@ -0,0 +1,326 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"net/http/httputil"
|
||||||
|
"os"
|
||||||
|
"runtime"
|
||||||
|
"strings"
|
||||||
|
"syscall"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/Sirupsen/logrus"
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
opttypes "github.com/docker/docker/opts"
|
||||||
|
"github.com/docker/docker/pkg/promise"
|
||||||
|
"github.com/docker/docker/pkg/signal"
|
||||||
|
runconfigopts "github.com/docker/docker/runconfig/opts"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
"github.com/docker/libnetwork/resolvconf/dns"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
"github.com/spf13/pflag"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
errCmdNotFound = "not found or does not exist"
|
||||||
|
errCmdCouldNotBeInvoked = "could not be invoked"
|
||||||
|
)
|
||||||
|
|
||||||
|
type runOptions struct {
|
||||||
|
autoRemove bool
|
||||||
|
detach bool
|
||||||
|
sigProxy bool
|
||||||
|
name string
|
||||||
|
detachKeys string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewRunCommand create a new `docker run` command
|
||||||
|
func NewRunCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts runOptions
|
||||||
|
var copts *runconfigopts.ContainerOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "run [OPTIONS] IMAGE [COMMAND] [ARG...]",
|
||||||
|
Short: "Run a command in a new container",
|
||||||
|
Args: cli.RequiresMinArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
copts.Image = args[0]
|
||||||
|
if len(args) > 1 {
|
||||||
|
copts.Args = args[1:]
|
||||||
|
}
|
||||||
|
return runRun(dockerCli, cmd.Flags(), &opts, copts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
flags.SetInterspersed(false)
|
||||||
|
|
||||||
|
// These are flags not stored in Config/HostConfig
|
||||||
|
flags.BoolVar(&opts.autoRemove, "rm", false, "Automatically remove the container when it exits")
|
||||||
|
flags.BoolVarP(&opts.detach, "detach", "d", false, "Run container in background and print container ID")
|
||||||
|
flags.BoolVar(&opts.sigProxy, "sig-proxy", true, "Proxy received signals to the process")
|
||||||
|
flags.StringVar(&opts.name, "name", "", "Assign a name to the container")
|
||||||
|
flags.StringVar(&opts.detachKeys, "detach-keys", "", "Override the key sequence for detaching a container")
|
||||||
|
|
||||||
|
// Add an explicit help that doesn't have a `-h` to prevent the conflict
|
||||||
|
// with hostname
|
||||||
|
flags.Bool("help", false, "Print usage")
|
||||||
|
|
||||||
|
client.AddTrustedFlags(flags, true)
|
||||||
|
copts = runconfigopts.AddFlags(flags)
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runRun(dockerCli *client.DockerCli, flags *pflag.FlagSet, opts *runOptions, copts *runconfigopts.ContainerOptions) error {
|
||||||
|
stdout, stderr, stdin := dockerCli.Out(), dockerCli.Err(), dockerCli.In()
|
||||||
|
client := dockerCli.Client()
|
||||||
|
// TODO: pass this as an argument
|
||||||
|
cmdPath := "run"
|
||||||
|
|
||||||
|
var (
|
||||||
|
flAttach *opttypes.ListOpts
|
||||||
|
ErrConflictAttachDetach = fmt.Errorf("Conflicting options: -a and -d")
|
||||||
|
ErrConflictRestartPolicyAndAutoRemove = fmt.Errorf("Conflicting options: --restart and --rm")
|
||||||
|
ErrConflictDetachAutoRemove = fmt.Errorf("Conflicting options: --rm and -d")
|
||||||
|
)
|
||||||
|
|
||||||
|
config, hostConfig, networkingConfig, err := runconfigopts.Parse(flags, copts)
|
||||||
|
|
||||||
|
// just in case the Parse does not exit
|
||||||
|
if err != nil {
|
||||||
|
reportError(stderr, cmdPath, err.Error(), true)
|
||||||
|
return cli.StatusError{StatusCode: 125}
|
||||||
|
}
|
||||||
|
|
||||||
|
if hostConfig.OomKillDisable != nil && *hostConfig.OomKillDisable && hostConfig.Memory == 0 {
|
||||||
|
fmt.Fprintf(stderr, "WARNING: Disabling the OOM killer on containers without setting a '-m/--memory' limit may be dangerous.\n")
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(hostConfig.DNS) > 0 {
|
||||||
|
// check the DNS settings passed via --dns against
|
||||||
|
// localhost regexp to warn if they are trying to
|
||||||
|
// set a DNS to a localhost address
|
||||||
|
for _, dnsIP := range hostConfig.DNS {
|
||||||
|
if dns.IsLocalhost(dnsIP) {
|
||||||
|
fmt.Fprintf(stderr, "WARNING: Localhost DNS setting (--dns=%s) may fail in containers.\n", dnsIP)
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
config.ArgsEscaped = false
|
||||||
|
|
||||||
|
if !opts.detach {
|
||||||
|
if err := dockerCli.CheckTtyInput(config.AttachStdin, config.Tty); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
if fl := flags.Lookup("attach"); fl != nil {
|
||||||
|
flAttach = fl.Value.(*opttypes.ListOpts)
|
||||||
|
if flAttach.Len() != 0 {
|
||||||
|
return ErrConflictAttachDetach
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if opts.autoRemove {
|
||||||
|
return ErrConflictDetachAutoRemove
|
||||||
|
}
|
||||||
|
|
||||||
|
config.AttachStdin = false
|
||||||
|
config.AttachStdout = false
|
||||||
|
config.AttachStderr = false
|
||||||
|
config.StdinOnce = false
|
||||||
|
}
|
||||||
|
|
||||||
|
// Disable sigProxy when in TTY mode
|
||||||
|
if config.Tty {
|
||||||
|
opts.sigProxy = false
|
||||||
|
}
|
||||||
|
|
||||||
|
// Telling the Windows daemon the initial size of the tty during start makes
|
||||||
|
// a far better user experience rather than relying on subsequent resizes
|
||||||
|
// to cause things to catch up.
|
||||||
|
if runtime.GOOS == "windows" {
|
||||||
|
hostConfig.ConsoleSize[0], hostConfig.ConsoleSize[1] = dockerCli.GetTtySize()
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx, cancelFun := context.WithCancel(context.Background())
|
||||||
|
|
||||||
|
createResponse, err := createContainer(ctx, dockerCli, config, hostConfig, networkingConfig, hostConfig.ContainerIDFile, opts.name)
|
||||||
|
if err != nil {
|
||||||
|
reportError(stderr, cmdPath, err.Error(), true)
|
||||||
|
return runStartContainerErr(err)
|
||||||
|
}
|
||||||
|
if opts.sigProxy {
|
||||||
|
sigc := dockerCli.ForwardAllSignals(ctx, createResponse.ID)
|
||||||
|
defer signal.StopCatch(sigc)
|
||||||
|
}
|
||||||
|
var (
|
||||||
|
waitDisplayID chan struct{}
|
||||||
|
errCh chan error
|
||||||
|
)
|
||||||
|
if !config.AttachStdout && !config.AttachStderr {
|
||||||
|
// Make this asynchronous to allow the client to write to stdin before having to read the ID
|
||||||
|
waitDisplayID = make(chan struct{})
|
||||||
|
go func() {
|
||||||
|
defer close(waitDisplayID)
|
||||||
|
fmt.Fprintf(stdout, "%s\n", createResponse.ID)
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
if opts.autoRemove && (hostConfig.RestartPolicy.IsAlways() || hostConfig.RestartPolicy.IsOnFailure()) {
|
||||||
|
return ErrConflictRestartPolicyAndAutoRemove
|
||||||
|
}
|
||||||
|
attach := config.AttachStdin || config.AttachStdout || config.AttachStderr
|
||||||
|
if attach {
|
||||||
|
var (
|
||||||
|
out, cerr io.Writer
|
||||||
|
in io.ReadCloser
|
||||||
|
)
|
||||||
|
if config.AttachStdin {
|
||||||
|
in = stdin
|
||||||
|
}
|
||||||
|
if config.AttachStdout {
|
||||||
|
out = stdout
|
||||||
|
}
|
||||||
|
if config.AttachStderr {
|
||||||
|
if config.Tty {
|
||||||
|
cerr = stdout
|
||||||
|
} else {
|
||||||
|
cerr = stderr
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if opts.detachKeys != "" {
|
||||||
|
dockerCli.ConfigFile().DetachKeys = opts.detachKeys
|
||||||
|
}
|
||||||
|
|
||||||
|
options := types.ContainerAttachOptions{
|
||||||
|
Stream: true,
|
||||||
|
Stdin: config.AttachStdin,
|
||||||
|
Stdout: config.AttachStdout,
|
||||||
|
Stderr: config.AttachStderr,
|
||||||
|
DetachKeys: dockerCli.ConfigFile().DetachKeys,
|
||||||
|
}
|
||||||
|
|
||||||
|
resp, errAttach := client.ContainerAttach(ctx, createResponse.ID, options)
|
||||||
|
if errAttach != nil && errAttach != httputil.ErrPersistEOF {
|
||||||
|
// ContainerAttach returns an ErrPersistEOF (connection closed)
|
||||||
|
// means server met an error and put it in Hijacked connection
|
||||||
|
// keep the error and read detailed error message from hijacked connection later
|
||||||
|
return errAttach
|
||||||
|
}
|
||||||
|
defer resp.Close()
|
||||||
|
|
||||||
|
errCh = promise.Go(func() error {
|
||||||
|
errHijack := dockerCli.HoldHijackedConnection(ctx, config.Tty, in, out, cerr, resp)
|
||||||
|
if errHijack == nil {
|
||||||
|
return errAttach
|
||||||
|
}
|
||||||
|
return errHijack
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
if opts.autoRemove {
|
||||||
|
defer func() {
|
||||||
|
// Explicitly not sharing the context as it could be "Done" (by calling cancelFun)
|
||||||
|
// and thus the container would not be removed.
|
||||||
|
if err := removeContainer(dockerCli, context.Background(), createResponse.ID, true, false, true); err != nil {
|
||||||
|
fmt.Fprintf(stderr, "%v\n", err)
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
|
||||||
|
//start the container
|
||||||
|
if err := client.ContainerStart(ctx, createResponse.ID, types.ContainerStartOptions{}); err != nil {
|
||||||
|
// If we have holdHijackedConnection, we should notify
|
||||||
|
// holdHijackedConnection we are going to exit and wait
|
||||||
|
// to avoid the terminal are not restored.
|
||||||
|
if attach {
|
||||||
|
cancelFun()
|
||||||
|
<-errCh
|
||||||
|
}
|
||||||
|
|
||||||
|
reportError(stderr, cmdPath, err.Error(), false)
|
||||||
|
return runStartContainerErr(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if (config.AttachStdin || config.AttachStdout || config.AttachStderr) && config.Tty && dockerCli.IsTerminalOut() {
|
||||||
|
if err := dockerCli.MonitorTtySize(ctx, createResponse.ID, false); err != nil {
|
||||||
|
fmt.Fprintf(stderr, "Error monitoring TTY size: %s\n", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if errCh != nil {
|
||||||
|
if err := <-errCh; err != nil {
|
||||||
|
logrus.Debugf("Error hijack: %s", err)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Detached mode: wait for the id to be displayed and return.
|
||||||
|
if !config.AttachStdout && !config.AttachStderr {
|
||||||
|
// Detached mode
|
||||||
|
<-waitDisplayID
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
var status int
|
||||||
|
|
||||||
|
// Attached mode
|
||||||
|
if opts.autoRemove {
|
||||||
|
// Autoremove: wait for the container to finish, retrieve
|
||||||
|
// the exit code and remove the container
|
||||||
|
if status, err = client.ContainerWait(ctx, createResponse.ID); err != nil {
|
||||||
|
return runStartContainerErr(err)
|
||||||
|
}
|
||||||
|
if _, status, err = getExitCode(dockerCli, ctx, createResponse.ID); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
// No Autoremove: Simply retrieve the exit code
|
||||||
|
if !config.Tty && hostConfig.RestartPolicy.IsNone() {
|
||||||
|
// In non-TTY mode, we can't detach, so we must wait for container exit
|
||||||
|
if status, err = client.ContainerWait(ctx, createResponse.ID); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
// In TTY mode, there is a race: if the process dies too slowly, the state could
|
||||||
|
// be updated after the getExitCode call and result in the wrong exit code being reported
|
||||||
|
if _, status, err = getExitCode(dockerCli, ctx, createResponse.ID); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if status != 0 {
|
||||||
|
return cli.StatusError{StatusCode: status}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// reportError is a utility method that prints a user-friendly message
|
||||||
|
// containing the error that occurred during parsing and a suggestion to get help
|
||||||
|
func reportError(stderr io.Writer, name string, str string, withHelp bool) {
|
||||||
|
if withHelp {
|
||||||
|
str += ".\nSee '" + os.Args[0] + " " + name + " --help'"
|
||||||
|
}
|
||||||
|
fmt.Fprintf(stderr, "%s: %s.\n", os.Args[0], str)
|
||||||
|
}
|
||||||
|
|
||||||
|
// if container start fails with 'not found'/'no such' error, return 127
|
||||||
|
// if container start fails with 'permission denied' error, return 126
|
||||||
|
// return 125 for generic docker daemon failures
|
||||||
|
func runStartContainerErr(err error) error {
|
||||||
|
trimmedErr := strings.TrimPrefix(err.Error(), "Error response from daemon: ")
|
||||||
|
statusError := cli.StatusError{StatusCode: 125}
|
||||||
|
if strings.Contains(trimmedErr, "executable file not found") ||
|
||||||
|
strings.Contains(trimmedErr, "no such file or directory") ||
|
||||||
|
strings.Contains(trimmedErr, "system cannot find the file specified") {
|
||||||
|
statusError = cli.StatusError{StatusCode: 127}
|
||||||
|
} else if strings.Contains(trimmedErr, syscall.EACCES.Error()) {
|
||||||
|
statusError = cli.StatusError{StatusCode: 126}
|
||||||
|
}
|
||||||
|
|
||||||
|
return statusError
|
||||||
|
}
|
152
api/client/container/start.go
Normal file
152
api/client/container/start.go
Normal file
|
@ -0,0 +1,152 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"net/http/httputil"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/docker/docker/pkg/promise"
|
||||||
|
"github.com/docker/docker/pkg/signal"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type startOptions struct {
|
||||||
|
attach bool
|
||||||
|
openStdin bool
|
||||||
|
detachKeys string
|
||||||
|
|
||||||
|
containers []string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewStartCommand creats a new cobra.Command for `docker start`
|
||||||
|
func NewStartCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts startOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "start [OPTIONS] CONTAINER [CONTAINER...]",
|
||||||
|
Short: "Start one or more stopped containers",
|
||||||
|
Args: cli.RequiresMinArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.containers = args
|
||||||
|
return runStart(dockerCli, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
flags.BoolVarP(&opts.attach, "attach", "a", false, "Attach STDOUT/STDERR and forward signals")
|
||||||
|
flags.BoolVarP(&opts.openStdin, "interactive", "i", false, "Attach container's STDIN")
|
||||||
|
flags.StringVar(&opts.detachKeys, "detach-keys", "", "Override the key sequence for detaching a container")
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runStart(dockerCli *client.DockerCli, opts *startOptions) error {
|
||||||
|
ctx, cancelFun := context.WithCancel(context.Background())
|
||||||
|
|
||||||
|
if opts.attach || opts.openStdin {
|
||||||
|
// We're going to attach to a container.
|
||||||
|
// 1. Ensure we only have one container.
|
||||||
|
if len(opts.containers) > 1 {
|
||||||
|
return fmt.Errorf("You cannot start and attach multiple containers at once.")
|
||||||
|
}
|
||||||
|
|
||||||
|
// 2. Attach to the container.
|
||||||
|
container := opts.containers[0]
|
||||||
|
c, err := dockerCli.Client().ContainerInspect(ctx, container)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// We always use c.ID instead of container to maintain consistency during `docker start`
|
||||||
|
if !c.Config.Tty {
|
||||||
|
sigc := dockerCli.ForwardAllSignals(ctx, c.ID)
|
||||||
|
defer signal.StopCatch(sigc)
|
||||||
|
}
|
||||||
|
|
||||||
|
if opts.detachKeys != "" {
|
||||||
|
dockerCli.ConfigFile().DetachKeys = opts.detachKeys
|
||||||
|
}
|
||||||
|
|
||||||
|
options := types.ContainerAttachOptions{
|
||||||
|
Stream: true,
|
||||||
|
Stdin: opts.openStdin && c.Config.OpenStdin,
|
||||||
|
Stdout: true,
|
||||||
|
Stderr: true,
|
||||||
|
DetachKeys: dockerCli.ConfigFile().DetachKeys,
|
||||||
|
}
|
||||||
|
|
||||||
|
var in io.ReadCloser
|
||||||
|
|
||||||
|
if options.Stdin {
|
||||||
|
in = dockerCli.In()
|
||||||
|
}
|
||||||
|
|
||||||
|
resp, errAttach := dockerCli.Client().ContainerAttach(ctx, c.ID, options)
|
||||||
|
if errAttach != nil && errAttach != httputil.ErrPersistEOF {
|
||||||
|
// ContainerAttach return an ErrPersistEOF (connection closed)
|
||||||
|
// means server met an error and put it in Hijacked connection
|
||||||
|
// keep the error and read detailed error message from hijacked connection
|
||||||
|
return errAttach
|
||||||
|
}
|
||||||
|
defer resp.Close()
|
||||||
|
cErr := promise.Go(func() error {
|
||||||
|
errHijack := dockerCli.HoldHijackedConnection(ctx, c.Config.Tty, in, dockerCli.Out(), dockerCli.Err(), resp)
|
||||||
|
if errHijack == nil {
|
||||||
|
return errAttach
|
||||||
|
}
|
||||||
|
return errHijack
|
||||||
|
})
|
||||||
|
|
||||||
|
// 3. Start the container.
|
||||||
|
if err := dockerCli.Client().ContainerStart(ctx, c.ID, types.ContainerStartOptions{}); err != nil {
|
||||||
|
cancelFun()
|
||||||
|
<-cErr
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// 4. Wait for attachment to break.
|
||||||
|
if c.Config.Tty && dockerCli.IsTerminalOut() {
|
||||||
|
if err := dockerCli.MonitorTtySize(ctx, c.ID, false); err != nil {
|
||||||
|
fmt.Fprintf(dockerCli.Err(), "Error monitoring TTY size: %s\n", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if attchErr := <-cErr; attchErr != nil {
|
||||||
|
return attchErr
|
||||||
|
}
|
||||||
|
_, status, err := getExitCode(dockerCli, ctx, c.ID)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if status != 0 {
|
||||||
|
return cli.StatusError{StatusCode: status}
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
// We're not going to attach to anything.
|
||||||
|
// Start as many containers as we want.
|
||||||
|
return startContainersWithoutAttachments(dockerCli, ctx, opts.containers)
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func startContainersWithoutAttachments(dockerCli *client.DockerCli, ctx context.Context, containers []string) error {
|
||||||
|
var failedContainers []string
|
||||||
|
for _, container := range containers {
|
||||||
|
if err := dockerCli.Client().ContainerStart(ctx, container, types.ContainerStartOptions{}); err != nil {
|
||||||
|
fmt.Fprintf(dockerCli.Err(), "%s\n", err)
|
||||||
|
failedContainers = append(failedContainers, container)
|
||||||
|
} else {
|
||||||
|
fmt.Fprintf(dockerCli.Out(), "%s\n", container)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(failedContainers) > 0 {
|
||||||
|
return fmt.Errorf("Error: failed to start containers: %v", strings.Join(failedContainers, ", "))
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
233
api/client/container/stats.go
Normal file
233
api/client/container/stats.go
Normal file
|
@ -0,0 +1,233 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"strings"
|
||||||
|
"sync"
|
||||||
|
"text/tabwriter"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/Sirupsen/logrus"
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/api/client/system"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
"github.com/docker/engine-api/types/events"
|
||||||
|
"github.com/docker/engine-api/types/filters"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type statsOptions struct {
|
||||||
|
all bool
|
||||||
|
noStream bool
|
||||||
|
|
||||||
|
containers []string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewStatsCommand creats a new cobra.Command for `docker stats`
|
||||||
|
func NewStatsCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts statsOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "stats [OPTIONS] [CONTAINER...]",
|
||||||
|
Short: "Display a live stream of container(s) resource usage statistics",
|
||||||
|
Args: cli.RequiresMinArgs(0),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.containers = args
|
||||||
|
return runStats(dockerCli, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
flags.BoolVarP(&opts.all, "all", "a", false, "Show all containers (default shows just running)")
|
||||||
|
flags.BoolVar(&opts.noStream, "no-stream", false, "Disable streaming stats and only pull the first result")
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
// runStats displays a live stream of resource usage statistics for one or more containers.
|
||||||
|
// This shows real-time information on CPU usage, memory usage, and network I/O.
|
||||||
|
func runStats(dockerCli *client.DockerCli, opts *statsOptions) error {
|
||||||
|
showAll := len(opts.containers) == 0
|
||||||
|
closeChan := make(chan error)
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
// monitorContainerEvents watches for container creation and removal (only
|
||||||
|
// used when calling `docker stats` without arguments).
|
||||||
|
monitorContainerEvents := func(started chan<- struct{}, c chan events.Message) {
|
||||||
|
f := filters.NewArgs()
|
||||||
|
f.Add("type", "container")
|
||||||
|
options := types.EventsOptions{
|
||||||
|
Filters: f,
|
||||||
|
}
|
||||||
|
resBody, err := dockerCli.Client().Events(ctx, options)
|
||||||
|
// Whether we successfully subscribed to events or not, we can now
|
||||||
|
// unblock the main goroutine.
|
||||||
|
close(started)
|
||||||
|
if err != nil {
|
||||||
|
closeChan <- err
|
||||||
|
return
|
||||||
|
}
|
||||||
|
defer resBody.Close()
|
||||||
|
|
||||||
|
system.DecodeEvents(resBody, func(event events.Message, err error) error {
|
||||||
|
if err != nil {
|
||||||
|
closeChan <- err
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
c <- event
|
||||||
|
return nil
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
// waitFirst is a WaitGroup to wait first stat data's reach for each container
|
||||||
|
waitFirst := &sync.WaitGroup{}
|
||||||
|
|
||||||
|
cStats := stats{}
|
||||||
|
// getContainerList simulates creation event for all previously existing
|
||||||
|
// containers (only used when calling `docker stats` without arguments).
|
||||||
|
getContainerList := func() {
|
||||||
|
options := types.ContainerListOptions{
|
||||||
|
All: opts.all,
|
||||||
|
}
|
||||||
|
cs, err := dockerCli.Client().ContainerList(ctx, options)
|
||||||
|
if err != nil {
|
||||||
|
closeChan <- err
|
||||||
|
}
|
||||||
|
for _, container := range cs {
|
||||||
|
s := &containerStats{Name: container.ID[:12]}
|
||||||
|
if cStats.add(s) {
|
||||||
|
waitFirst.Add(1)
|
||||||
|
go s.Collect(ctx, dockerCli.Client(), !opts.noStream, waitFirst)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if showAll {
|
||||||
|
// If no names were specified, start a long running goroutine which
|
||||||
|
// monitors container events. We make sure we're subscribed before
|
||||||
|
// retrieving the list of running containers to avoid a race where we
|
||||||
|
// would "miss" a creation.
|
||||||
|
started := make(chan struct{})
|
||||||
|
eh := system.InitEventHandler()
|
||||||
|
eh.Handle("create", func(e events.Message) {
|
||||||
|
if opts.all {
|
||||||
|
s := &containerStats{Name: e.ID[:12]}
|
||||||
|
if cStats.add(s) {
|
||||||
|
waitFirst.Add(1)
|
||||||
|
go s.Collect(ctx, dockerCli.Client(), !opts.noStream, waitFirst)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
eh.Handle("start", func(e events.Message) {
|
||||||
|
s := &containerStats{Name: e.ID[:12]}
|
||||||
|
if cStats.add(s) {
|
||||||
|
waitFirst.Add(1)
|
||||||
|
go s.Collect(ctx, dockerCli.Client(), !opts.noStream, waitFirst)
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
eh.Handle("die", func(e events.Message) {
|
||||||
|
if !opts.all {
|
||||||
|
cStats.remove(e.ID[:12])
|
||||||
|
}
|
||||||
|
})
|
||||||
|
|
||||||
|
eventChan := make(chan events.Message)
|
||||||
|
go eh.Watch(eventChan)
|
||||||
|
go monitorContainerEvents(started, eventChan)
|
||||||
|
defer close(eventChan)
|
||||||
|
<-started
|
||||||
|
|
||||||
|
// Start a short-lived goroutine to retrieve the initial list of
|
||||||
|
// containers.
|
||||||
|
getContainerList()
|
||||||
|
} else {
|
||||||
|
// Artificially send creation events for the containers we were asked to
|
||||||
|
// monitor (same code path than we use when monitoring all containers).
|
||||||
|
for _, name := range opts.containers {
|
||||||
|
s := &containerStats{Name: name}
|
||||||
|
if cStats.add(s) {
|
||||||
|
waitFirst.Add(1)
|
||||||
|
go s.Collect(ctx, dockerCli.Client(), !opts.noStream, waitFirst)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// We don't expect any asynchronous errors: closeChan can be closed.
|
||||||
|
close(closeChan)
|
||||||
|
|
||||||
|
// Do a quick pause to detect any error with the provided list of
|
||||||
|
// container names.
|
||||||
|
time.Sleep(1500 * time.Millisecond)
|
||||||
|
var errs []string
|
||||||
|
cStats.mu.Lock()
|
||||||
|
for _, c := range cStats.cs {
|
||||||
|
c.mu.Lock()
|
||||||
|
if c.err != nil {
|
||||||
|
errs = append(errs, fmt.Sprintf("%s: %v", c.Name, c.err))
|
||||||
|
}
|
||||||
|
c.mu.Unlock()
|
||||||
|
}
|
||||||
|
cStats.mu.Unlock()
|
||||||
|
if len(errs) > 0 {
|
||||||
|
return fmt.Errorf("%s", strings.Join(errs, ", "))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// before print to screen, make sure each container get at least one valid stat data
|
||||||
|
waitFirst.Wait()
|
||||||
|
|
||||||
|
w := tabwriter.NewWriter(dockerCli.Out(), 20, 1, 3, ' ', 0)
|
||||||
|
printHeader := func() {
|
||||||
|
if !opts.noStream {
|
||||||
|
fmt.Fprint(dockerCli.Out(), "\033[2J")
|
||||||
|
fmt.Fprint(dockerCli.Out(), "\033[H")
|
||||||
|
}
|
||||||
|
io.WriteString(w, "CONTAINER\tCPU %\tMEM USAGE / LIMIT\tMEM %\tNET I/O\tBLOCK I/O\tPIDS\n")
|
||||||
|
}
|
||||||
|
|
||||||
|
for range time.Tick(500 * time.Millisecond) {
|
||||||
|
printHeader()
|
||||||
|
toRemove := []string{}
|
||||||
|
cStats.mu.Lock()
|
||||||
|
for _, s := range cStats.cs {
|
||||||
|
if err := s.Display(w); err != nil && !opts.noStream {
|
||||||
|
logrus.Debugf("stats: got error for %s: %v", s.Name, err)
|
||||||
|
if err == io.EOF {
|
||||||
|
toRemove = append(toRemove, s.Name)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
cStats.mu.Unlock()
|
||||||
|
for _, name := range toRemove {
|
||||||
|
cStats.remove(name)
|
||||||
|
}
|
||||||
|
if len(cStats.cs) == 0 && !showAll {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
w.Flush()
|
||||||
|
if opts.noStream {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
select {
|
||||||
|
case err, ok := <-closeChan:
|
||||||
|
if ok {
|
||||||
|
if err != nil {
|
||||||
|
// this is suppressing "unexpected EOF" in the cli when the
|
||||||
|
// daemon restarts so it shutdowns cleanly
|
||||||
|
if err == io.ErrUnexpectedEOF {
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
default:
|
||||||
|
// just skip
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
238
api/client/container/stats_helpers.go
Normal file
238
api/client/container/stats_helpers.go
Normal file
|
@ -0,0 +1,238 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"encoding/json"
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"strings"
|
||||||
|
"sync"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/Sirupsen/logrus"
|
||||||
|
"github.com/docker/engine-api/client"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
"github.com/docker/go-units"
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
)
|
||||||
|
|
||||||
|
type containerStats struct {
|
||||||
|
Name string
|
||||||
|
CPUPercentage float64
|
||||||
|
Memory float64
|
||||||
|
MemoryLimit float64
|
||||||
|
MemoryPercentage float64
|
||||||
|
NetworkRx float64
|
||||||
|
NetworkTx float64
|
||||||
|
BlockRead float64
|
||||||
|
BlockWrite float64
|
||||||
|
PidsCurrent uint64
|
||||||
|
mu sync.Mutex
|
||||||
|
err error
|
||||||
|
}
|
||||||
|
|
||||||
|
type stats struct {
|
||||||
|
mu sync.Mutex
|
||||||
|
cs []*containerStats
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *stats) add(cs *containerStats) bool {
|
||||||
|
s.mu.Lock()
|
||||||
|
defer s.mu.Unlock()
|
||||||
|
if _, exists := s.isKnownContainer(cs.Name); !exists {
|
||||||
|
s.cs = append(s.cs, cs)
|
||||||
|
return true
|
||||||
|
}
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *stats) remove(id string) {
|
||||||
|
s.mu.Lock()
|
||||||
|
if i, exists := s.isKnownContainer(id); exists {
|
||||||
|
s.cs = append(s.cs[:i], s.cs[i+1:]...)
|
||||||
|
}
|
||||||
|
s.mu.Unlock()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *stats) isKnownContainer(cid string) (int, bool) {
|
||||||
|
for i, c := range s.cs {
|
||||||
|
if c.Name == cid {
|
||||||
|
return i, true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return -1, false
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *containerStats) Collect(ctx context.Context, cli client.APIClient, streamStats bool, waitFirst *sync.WaitGroup) {
|
||||||
|
logrus.Debugf("collecting stats for %s", s.Name)
|
||||||
|
var (
|
||||||
|
getFirst bool
|
||||||
|
previousCPU uint64
|
||||||
|
previousSystem uint64
|
||||||
|
u = make(chan error, 1)
|
||||||
|
)
|
||||||
|
|
||||||
|
defer func() {
|
||||||
|
// if error happens and we get nothing of stats, release wait group whatever
|
||||||
|
if !getFirst {
|
||||||
|
getFirst = true
|
||||||
|
waitFirst.Done()
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
responseBody, err := cli.ContainerStats(ctx, s.Name, streamStats)
|
||||||
|
if err != nil {
|
||||||
|
s.mu.Lock()
|
||||||
|
s.err = err
|
||||||
|
s.mu.Unlock()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
defer responseBody.Close()
|
||||||
|
|
||||||
|
dec := json.NewDecoder(responseBody)
|
||||||
|
go func() {
|
||||||
|
for {
|
||||||
|
var v *types.StatsJSON
|
||||||
|
|
||||||
|
if err := dec.Decode(&v); err != nil {
|
||||||
|
dec = json.NewDecoder(io.MultiReader(dec.Buffered(), responseBody))
|
||||||
|
u <- err
|
||||||
|
if err == io.EOF {
|
||||||
|
break
|
||||||
|
}
|
||||||
|
time.Sleep(100 * time.Millisecond)
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
|
||||||
|
var memPercent = 0.0
|
||||||
|
var cpuPercent = 0.0
|
||||||
|
|
||||||
|
// MemoryStats.Limit will never be 0 unless the container is not running and we haven't
|
||||||
|
// got any data from cgroup
|
||||||
|
if v.MemoryStats.Limit != 0 {
|
||||||
|
memPercent = float64(v.MemoryStats.Usage) / float64(v.MemoryStats.Limit) * 100.0
|
||||||
|
}
|
||||||
|
|
||||||
|
previousCPU = v.PreCPUStats.CPUUsage.TotalUsage
|
||||||
|
previousSystem = v.PreCPUStats.SystemUsage
|
||||||
|
cpuPercent = calculateCPUPercent(previousCPU, previousSystem, v)
|
||||||
|
blkRead, blkWrite := calculateBlockIO(v.BlkioStats)
|
||||||
|
s.mu.Lock()
|
||||||
|
s.CPUPercentage = cpuPercent
|
||||||
|
s.Memory = float64(v.MemoryStats.Usage)
|
||||||
|
s.MemoryLimit = float64(v.MemoryStats.Limit)
|
||||||
|
s.MemoryPercentage = memPercent
|
||||||
|
s.NetworkRx, s.NetworkTx = calculateNetwork(v.Networks)
|
||||||
|
s.BlockRead = float64(blkRead)
|
||||||
|
s.BlockWrite = float64(blkWrite)
|
||||||
|
s.PidsCurrent = v.PidsStats.Current
|
||||||
|
s.mu.Unlock()
|
||||||
|
u <- nil
|
||||||
|
if !streamStats {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
for {
|
||||||
|
select {
|
||||||
|
case <-time.After(2 * time.Second):
|
||||||
|
// zero out the values if we have not received an update within
|
||||||
|
// the specified duration.
|
||||||
|
s.mu.Lock()
|
||||||
|
s.CPUPercentage = 0
|
||||||
|
s.Memory = 0
|
||||||
|
s.MemoryPercentage = 0
|
||||||
|
s.MemoryLimit = 0
|
||||||
|
s.NetworkRx = 0
|
||||||
|
s.NetworkTx = 0
|
||||||
|
s.BlockRead = 0
|
||||||
|
s.BlockWrite = 0
|
||||||
|
s.PidsCurrent = 0
|
||||||
|
s.err = errors.New("timeout waiting for stats")
|
||||||
|
s.mu.Unlock()
|
||||||
|
// if this is the first stat you get, release WaitGroup
|
||||||
|
if !getFirst {
|
||||||
|
getFirst = true
|
||||||
|
waitFirst.Done()
|
||||||
|
}
|
||||||
|
case err := <-u:
|
||||||
|
if err != nil {
|
||||||
|
s.mu.Lock()
|
||||||
|
s.err = err
|
||||||
|
s.mu.Unlock()
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
s.err = nil
|
||||||
|
// if this is the first stat you get, release WaitGroup
|
||||||
|
if !getFirst {
|
||||||
|
getFirst = true
|
||||||
|
waitFirst.Done()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if !streamStats {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (s *containerStats) Display(w io.Writer) error {
|
||||||
|
s.mu.Lock()
|
||||||
|
defer s.mu.Unlock()
|
||||||
|
// NOTE: if you change this format, you must also change the err format below!
|
||||||
|
format := "%s\t%.2f%%\t%s / %s\t%.2f%%\t%s / %s\t%s / %s\t%d\n"
|
||||||
|
if s.err != nil {
|
||||||
|
format = "%s\t%s\t%s / %s\t%s\t%s / %s\t%s / %s\t%s\n"
|
||||||
|
errStr := "--"
|
||||||
|
fmt.Fprintf(w, format,
|
||||||
|
s.Name, errStr, errStr, errStr, errStr, errStr, errStr, errStr, errStr, errStr,
|
||||||
|
)
|
||||||
|
err := s.err
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
fmt.Fprintf(w, format,
|
||||||
|
s.Name,
|
||||||
|
s.CPUPercentage,
|
||||||
|
units.BytesSize(s.Memory), units.BytesSize(s.MemoryLimit),
|
||||||
|
s.MemoryPercentage,
|
||||||
|
units.HumanSize(s.NetworkRx), units.HumanSize(s.NetworkTx),
|
||||||
|
units.HumanSize(s.BlockRead), units.HumanSize(s.BlockWrite),
|
||||||
|
s.PidsCurrent)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func calculateCPUPercent(previousCPU, previousSystem uint64, v *types.StatsJSON) float64 {
|
||||||
|
var (
|
||||||
|
cpuPercent = 0.0
|
||||||
|
// calculate the change for the cpu usage of the container in between readings
|
||||||
|
cpuDelta = float64(v.CPUStats.CPUUsage.TotalUsage) - float64(previousCPU)
|
||||||
|
// calculate the change for the entire system between readings
|
||||||
|
systemDelta = float64(v.CPUStats.SystemUsage) - float64(previousSystem)
|
||||||
|
)
|
||||||
|
|
||||||
|
if systemDelta > 0.0 && cpuDelta > 0.0 {
|
||||||
|
cpuPercent = (cpuDelta / systemDelta) * float64(len(v.CPUStats.CPUUsage.PercpuUsage)) * 100.0
|
||||||
|
}
|
||||||
|
return cpuPercent
|
||||||
|
}
|
||||||
|
|
||||||
|
func calculateBlockIO(blkio types.BlkioStats) (blkRead uint64, blkWrite uint64) {
|
||||||
|
for _, bioEntry := range blkio.IoServiceBytesRecursive {
|
||||||
|
switch strings.ToLower(bioEntry.Op) {
|
||||||
|
case "read":
|
||||||
|
blkRead = blkRead + bioEntry.Value
|
||||||
|
case "write":
|
||||||
|
blkWrite = blkWrite + bioEntry.Value
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
func calculateNetwork(network map[string]types.NetworkStats) (float64, float64) {
|
||||||
|
var rx, tx float64
|
||||||
|
|
||||||
|
for _, v := range network {
|
||||||
|
rx += float64(v.RxBytes)
|
||||||
|
tx += float64(v.TxBytes)
|
||||||
|
}
|
||||||
|
return rx, tx
|
||||||
|
}
|
45
api/client/container/stats_unit_test.go
Normal file
45
api/client/container/stats_unit_test.go
Normal file
|
@ -0,0 +1,45 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestDisplay(t *testing.T) {
|
||||||
|
c := &containerStats{
|
||||||
|
Name: "app",
|
||||||
|
CPUPercentage: 30.0,
|
||||||
|
Memory: 100 * 1024 * 1024.0,
|
||||||
|
MemoryLimit: 2048 * 1024 * 1024.0,
|
||||||
|
MemoryPercentage: 100.0 / 2048.0 * 100.0,
|
||||||
|
NetworkRx: 100 * 1024 * 1024,
|
||||||
|
NetworkTx: 800 * 1024 * 1024,
|
||||||
|
BlockRead: 100 * 1024 * 1024,
|
||||||
|
BlockWrite: 800 * 1024 * 1024,
|
||||||
|
PidsCurrent: 1,
|
||||||
|
}
|
||||||
|
var b bytes.Buffer
|
||||||
|
if err := c.Display(&b); err != nil {
|
||||||
|
t.Fatalf("c.Display() gave error: %s", err)
|
||||||
|
}
|
||||||
|
got := b.String()
|
||||||
|
want := "app\t30.00%\t100 MiB / 2 GiB\t4.88%\t104.9 MB / 838.9 MB\t104.9 MB / 838.9 MB\t1\n"
|
||||||
|
if got != want {
|
||||||
|
t.Fatalf("c.Display() = %q, want %q", got, want)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestCalculBlockIO(t *testing.T) {
|
||||||
|
blkio := types.BlkioStats{
|
||||||
|
IoServiceBytesRecursive: []types.BlkioStatEntry{{8, 0, "read", 1234}, {8, 1, "read", 4567}, {8, 0, "write", 123}, {8, 1, "write", 456}},
|
||||||
|
}
|
||||||
|
blkRead, blkWrite := calculateBlockIO(blkio)
|
||||||
|
if blkRead != 5801 {
|
||||||
|
t.Fatalf("blkRead = %d, want 5801", blkRead)
|
||||||
|
}
|
||||||
|
if blkWrite != 579 {
|
||||||
|
t.Fatalf("blkWrite = %d, want 579", blkWrite)
|
||||||
|
}
|
||||||
|
}
|
56
api/client/container/stop.go
Normal file
56
api/client/container/stop.go
Normal file
|
@ -0,0 +1,56 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type stopOptions struct {
|
||||||
|
time int
|
||||||
|
|
||||||
|
containers []string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewStopCommand creats a new cobra.Command for `docker stop`
|
||||||
|
func NewStopCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts stopOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "stop [OPTIONS] CONTAINER [CONTAINER...]",
|
||||||
|
Short: "Stop one or more running containers",
|
||||||
|
Args: cli.RequiresMinArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.containers = args
|
||||||
|
return runStop(dockerCli, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
flags.IntVarP(&opts.time, "time", "t", 10, "Seconds to wait for stop before killing it")
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runStop(dockerCli *client.DockerCli, opts *stopOptions) error {
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
var errs []string
|
||||||
|
for _, container := range opts.containers {
|
||||||
|
timeout := time.Duration(opts.time) * time.Second
|
||||||
|
if err := dockerCli.Client().ContainerStop(ctx, container, &timeout); err != nil {
|
||||||
|
errs = append(errs, err.Error())
|
||||||
|
} else {
|
||||||
|
fmt.Fprintf(dockerCli.Out(), "%s\n", container)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if len(errs) > 0 {
|
||||||
|
return fmt.Errorf("%s", strings.Join(errs, "\n"))
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
58
api/client/container/top.go
Normal file
58
api/client/container/top.go
Normal file
|
@ -0,0 +1,58 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
"text/tabwriter"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type topOptions struct {
|
||||||
|
container string
|
||||||
|
|
||||||
|
args []string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewTopCommand creates a new cobra.Command for `docker top`
|
||||||
|
func NewTopCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts topOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "top CONTAINER [ps OPTIONS]",
|
||||||
|
Short: "Display the running processes of a container",
|
||||||
|
Args: cli.RequiresMinArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.container = args[0]
|
||||||
|
opts.args = args[1:]
|
||||||
|
return runTop(dockerCli, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
flags.SetInterspersed(false)
|
||||||
|
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runTop(dockerCli *client.DockerCli, opts *topOptions) error {
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
procList, err := dockerCli.Client().ContainerTop(ctx, opts.container, opts.args)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
w := tabwriter.NewWriter(dockerCli.Out(), 20, 1, 3, ' ', 0)
|
||||||
|
fmt.Fprintln(w, strings.Join(procList.Titles, "\t"))
|
||||||
|
|
||||||
|
for _, proc := range procList.Processes {
|
||||||
|
fmt.Fprintln(w, strings.Join(proc, "\t"))
|
||||||
|
}
|
||||||
|
w.Flush()
|
||||||
|
return nil
|
||||||
|
}
|
50
api/client/container/unpause.go
Normal file
50
api/client/container/unpause.go
Normal file
|
@ -0,0 +1,50 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type unpauseOptions struct {
|
||||||
|
containers []string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewUnpauseCommand creats a new cobra.Command for `docker unpause`
|
||||||
|
func NewUnpauseCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts unpauseOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "unpause CONTAINER [CONTAINER...]",
|
||||||
|
Short: "Unpause all processes within one or more containers",
|
||||||
|
Args: cli.RequiresMinArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.containers = args
|
||||||
|
return runUnpause(dockerCli, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runUnpause(dockerCli *client.DockerCli, opts *unpauseOptions) error {
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
var errs []string
|
||||||
|
for _, container := range opts.containers {
|
||||||
|
if err := dockerCli.Client().ContainerUnpause(ctx, container); err != nil {
|
||||||
|
errs = append(errs, err.Error())
|
||||||
|
} else {
|
||||||
|
fmt.Fprintf(dockerCli.Out(), "%s\n", container)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if len(errs) > 0 {
|
||||||
|
return fmt.Errorf("%s", strings.Join(errs, "\n"))
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
22
api/client/container/utils.go
Normal file
22
api/client/container/utils.go
Normal file
|
@ -0,0 +1,22 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
clientapi "github.com/docker/engine-api/client"
|
||||||
|
)
|
||||||
|
|
||||||
|
// getExitCode performs an inspect on the container. It returns
|
||||||
|
// the running state and the exit code.
|
||||||
|
func getExitCode(dockerCli *client.DockerCli, ctx context.Context, containerID string) (bool, int, error) {
|
||||||
|
c, err := dockerCli.Client().ContainerInspect(ctx, containerID)
|
||||||
|
if err != nil {
|
||||||
|
// If we can't connect, then the daemon probably died.
|
||||||
|
if err != clientapi.ErrConnectionFailed {
|
||||||
|
return false, -1, err
|
||||||
|
}
|
||||||
|
return false, -1, nil
|
||||||
|
}
|
||||||
|
return c.State.Running, c.State.ExitCode, nil
|
||||||
|
}
|
51
api/client/container/wait.go
Normal file
51
api/client/container/wait.go
Normal file
|
@ -0,0 +1,51 @@
|
||||||
|
package container
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type waitOptions struct {
|
||||||
|
containers []string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewWaitCommand creates a new cobra.Command for `docker wait`
|
||||||
|
func NewWaitCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts waitOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "wait CONTAINER [CONTAINER...]",
|
||||||
|
Short: "Block until a container stops, then print its exit code",
|
||||||
|
Args: cli.RequiresMinArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.containers = args
|
||||||
|
return runWait(dockerCli, &opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runWait(dockerCli *client.DockerCli, opts *waitOptions) error {
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
var errs []string
|
||||||
|
for _, container := range opts.containers {
|
||||||
|
status, err := dockerCli.Client().ContainerWait(ctx, container)
|
||||||
|
if err != nil {
|
||||||
|
errs = append(errs, err.Error())
|
||||||
|
} else {
|
||||||
|
fmt.Fprintf(dockerCli.Out(), "%d\n", status)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if len(errs) > 0 {
|
||||||
|
return fmt.Errorf("%s", strings.Join(errs, "\n"))
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
44
api/client/credentials.go
Normal file
44
api/client/credentials.go
Normal file
|
@ -0,0 +1,44 @@
|
||||||
|
package client
|
||||||
|
|
||||||
|
import (
|
||||||
|
"github.com/docker/docker/cliconfig/configfile"
|
||||||
|
"github.com/docker/docker/cliconfig/credentials"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
// GetCredentials loads the user credentials from a credentials store.
|
||||||
|
// The store is determined by the config file settings.
|
||||||
|
func GetCredentials(c *configfile.ConfigFile, serverAddress string) (types.AuthConfig, error) {
|
||||||
|
s := LoadCredentialsStore(c)
|
||||||
|
return s.Get(serverAddress)
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetAllCredentials loads all credentials from a credentials store.
|
||||||
|
// The store is determined by the config file settings.
|
||||||
|
func GetAllCredentials(c *configfile.ConfigFile) (map[string]types.AuthConfig, error) {
|
||||||
|
s := LoadCredentialsStore(c)
|
||||||
|
return s.GetAll()
|
||||||
|
}
|
||||||
|
|
||||||
|
// StoreCredentials saves the user credentials in a credentials store.
|
||||||
|
// The store is determined by the config file settings.
|
||||||
|
func StoreCredentials(c *configfile.ConfigFile, auth types.AuthConfig) error {
|
||||||
|
s := LoadCredentialsStore(c)
|
||||||
|
return s.Store(auth)
|
||||||
|
}
|
||||||
|
|
||||||
|
// EraseCredentials removes the user credentials from a credentials store.
|
||||||
|
// The store is determined by the config file settings.
|
||||||
|
func EraseCredentials(c *configfile.ConfigFile, serverAddress string) error {
|
||||||
|
s := LoadCredentialsStore(c)
|
||||||
|
return s.Erase(serverAddress)
|
||||||
|
}
|
||||||
|
|
||||||
|
// LoadCredentialsStore initializes a new credentials store based
|
||||||
|
// in the settings provided in the configuration file.
|
||||||
|
func LoadCredentialsStore(c *configfile.ConfigFile) credentials.Store {
|
||||||
|
if c.CredentialsStore != "" {
|
||||||
|
return credentials.NewNativeStore(c)
|
||||||
|
}
|
||||||
|
return credentials.NewFileStore(c)
|
||||||
|
}
|
160
api/client/exec.go
Normal file
160
api/client/exec.go
Normal file
|
@ -0,0 +1,160 @@
|
||||||
|
package client
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/Sirupsen/logrus"
|
||||||
|
Cli "github.com/docker/docker/cli"
|
||||||
|
flag "github.com/docker/docker/pkg/mflag"
|
||||||
|
"github.com/docker/docker/pkg/promise"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
// CmdExec runs a command in a running container.
|
||||||
|
//
|
||||||
|
// Usage: docker exec [OPTIONS] CONTAINER COMMAND [ARG...]
|
||||||
|
func (cli *DockerCli) CmdExec(args ...string) error {
|
||||||
|
cmd := Cli.Subcmd("exec", []string{"[OPTIONS] CONTAINER COMMAND [ARG...]"}, Cli.DockerCommands["exec"].Description, true)
|
||||||
|
detachKeys := cmd.String([]string{"-detach-keys"}, "", "Override the key sequence for detaching a container")
|
||||||
|
|
||||||
|
execConfig, err := ParseExec(cmd, args)
|
||||||
|
container := cmd.Arg(0)
|
||||||
|
// just in case the ParseExec does not exit
|
||||||
|
if container == "" || err != nil {
|
||||||
|
return Cli.StatusError{StatusCode: 1}
|
||||||
|
}
|
||||||
|
|
||||||
|
if *detachKeys != "" {
|
||||||
|
cli.configFile.DetachKeys = *detachKeys
|
||||||
|
}
|
||||||
|
|
||||||
|
// Send client escape keys
|
||||||
|
execConfig.DetachKeys = cli.configFile.DetachKeys
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
response, err := cli.client.ContainerExecCreate(ctx, container, *execConfig)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
execID := response.ID
|
||||||
|
if execID == "" {
|
||||||
|
fmt.Fprintf(cli.out, "exec ID empty")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
//Temp struct for execStart so that we don't need to transfer all the execConfig
|
||||||
|
if !execConfig.Detach {
|
||||||
|
if err := cli.CheckTtyInput(execConfig.AttachStdin, execConfig.Tty); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
execStartCheck := types.ExecStartCheck{
|
||||||
|
Detach: execConfig.Detach,
|
||||||
|
Tty: execConfig.Tty,
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := cli.client.ContainerExecStart(ctx, execID, execStartCheck); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
// For now don't print this - wait for when we support exec wait()
|
||||||
|
// fmt.Fprintf(cli.out, "%s\n", execID)
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Interactive exec requested.
|
||||||
|
var (
|
||||||
|
out, stderr io.Writer
|
||||||
|
in io.ReadCloser
|
||||||
|
errCh chan error
|
||||||
|
)
|
||||||
|
|
||||||
|
if execConfig.AttachStdin {
|
||||||
|
in = cli.in
|
||||||
|
}
|
||||||
|
if execConfig.AttachStdout {
|
||||||
|
out = cli.out
|
||||||
|
}
|
||||||
|
if execConfig.AttachStderr {
|
||||||
|
if execConfig.Tty {
|
||||||
|
stderr = cli.out
|
||||||
|
} else {
|
||||||
|
stderr = cli.err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
resp, err := cli.client.ContainerExecAttach(ctx, execID, *execConfig)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer resp.Close()
|
||||||
|
errCh = promise.Go(func() error {
|
||||||
|
return cli.HoldHijackedConnection(ctx, execConfig.Tty, in, out, stderr, resp)
|
||||||
|
})
|
||||||
|
|
||||||
|
if execConfig.Tty && cli.isTerminalIn {
|
||||||
|
if err := cli.MonitorTtySize(ctx, execID, true); err != nil {
|
||||||
|
fmt.Fprintf(cli.err, "Error monitoring TTY size: %s\n", err)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := <-errCh; err != nil {
|
||||||
|
logrus.Debugf("Error hijack: %s", err)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
var status int
|
||||||
|
if _, status, err = cli.getExecExitCode(ctx, execID); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
if status != 0 {
|
||||||
|
return Cli.StatusError{StatusCode: status}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// ParseExec parses the specified args for the specified command and generates
|
||||||
|
// an ExecConfig from it.
|
||||||
|
// If the minimal number of specified args is not right or if specified args are
|
||||||
|
// not valid, it will return an error.
|
||||||
|
func ParseExec(cmd *flag.FlagSet, args []string) (*types.ExecConfig, error) {
|
||||||
|
var (
|
||||||
|
flStdin = cmd.Bool([]string{"i", "-interactive"}, false, "Keep STDIN open even if not attached")
|
||||||
|
flTty = cmd.Bool([]string{"t", "-tty"}, false, "Allocate a pseudo-TTY")
|
||||||
|
flDetach = cmd.Bool([]string{"d", "-detach"}, false, "Detached mode: run command in the background")
|
||||||
|
flUser = cmd.String([]string{"u", "-user"}, "", "Username or UID (format: <name|uid>[:<group|gid>])")
|
||||||
|
flPrivileged = cmd.Bool([]string{"-privileged"}, false, "Give extended privileges to the command")
|
||||||
|
execCmd []string
|
||||||
|
)
|
||||||
|
cmd.Require(flag.Min, 2)
|
||||||
|
if err := cmd.ParseFlags(args, true); err != nil {
|
||||||
|
return nil, err
|
||||||
|
}
|
||||||
|
parsedArgs := cmd.Args()
|
||||||
|
execCmd = parsedArgs[1:]
|
||||||
|
|
||||||
|
execConfig := &types.ExecConfig{
|
||||||
|
User: *flUser,
|
||||||
|
Privileged: *flPrivileged,
|
||||||
|
Tty: *flTty,
|
||||||
|
Cmd: execCmd,
|
||||||
|
Detach: *flDetach,
|
||||||
|
}
|
||||||
|
|
||||||
|
// If -d is not set, attach to everything by default
|
||||||
|
if !*flDetach {
|
||||||
|
execConfig.AttachStdout = true
|
||||||
|
execConfig.AttachStderr = true
|
||||||
|
if *flStdin {
|
||||||
|
execConfig.AttachStdin = true
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return execConfig, nil
|
||||||
|
}
|
122
api/client/exec_test.go
Normal file
122
api/client/exec_test.go
Normal file
|
@ -0,0 +1,122 @@
|
||||||
|
package client
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"io/ioutil"
|
||||||
|
"testing"
|
||||||
|
|
||||||
|
flag "github.com/docker/docker/pkg/mflag"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
type arguments struct {
|
||||||
|
args []string
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestParseExec(t *testing.T) {
|
||||||
|
invalids := map[*arguments]error{
|
||||||
|
&arguments{[]string{"-unknown"}}: fmt.Errorf("flag provided but not defined: -unknown"),
|
||||||
|
&arguments{[]string{"-u"}}: fmt.Errorf("flag needs an argument: -u"),
|
||||||
|
&arguments{[]string{"--user"}}: fmt.Errorf("flag needs an argument: --user"),
|
||||||
|
}
|
||||||
|
valids := map[*arguments]*types.ExecConfig{
|
||||||
|
&arguments{
|
||||||
|
[]string{"container", "command"},
|
||||||
|
}: {
|
||||||
|
Cmd: []string{"command"},
|
||||||
|
AttachStdout: true,
|
||||||
|
AttachStderr: true,
|
||||||
|
},
|
||||||
|
&arguments{
|
||||||
|
[]string{"container", "command1", "command2"},
|
||||||
|
}: {
|
||||||
|
Cmd: []string{"command1", "command2"},
|
||||||
|
AttachStdout: true,
|
||||||
|
AttachStderr: true,
|
||||||
|
},
|
||||||
|
&arguments{
|
||||||
|
[]string{"-i", "-t", "-u", "uid", "container", "command"},
|
||||||
|
}: {
|
||||||
|
User: "uid",
|
||||||
|
AttachStdin: true,
|
||||||
|
AttachStdout: true,
|
||||||
|
AttachStderr: true,
|
||||||
|
Tty: true,
|
||||||
|
Cmd: []string{"command"},
|
||||||
|
},
|
||||||
|
&arguments{
|
||||||
|
[]string{"-d", "container", "command"},
|
||||||
|
}: {
|
||||||
|
AttachStdin: false,
|
||||||
|
AttachStdout: false,
|
||||||
|
AttachStderr: false,
|
||||||
|
Detach: true,
|
||||||
|
Cmd: []string{"command"},
|
||||||
|
},
|
||||||
|
&arguments{
|
||||||
|
[]string{"-t", "-i", "-d", "container", "command"},
|
||||||
|
}: {
|
||||||
|
AttachStdin: false,
|
||||||
|
AttachStdout: false,
|
||||||
|
AttachStderr: false,
|
||||||
|
Detach: true,
|
||||||
|
Tty: true,
|
||||||
|
Cmd: []string{"command"},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
for invalid, expectedError := range invalids {
|
||||||
|
cmd := flag.NewFlagSet("exec", flag.ContinueOnError)
|
||||||
|
cmd.ShortUsage = func() {}
|
||||||
|
cmd.SetOutput(ioutil.Discard)
|
||||||
|
_, err := ParseExec(cmd, invalid.args)
|
||||||
|
if err == nil || err.Error() != expectedError.Error() {
|
||||||
|
t.Fatalf("Expected an error [%v] for %v, got %v", expectedError, invalid, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
for valid, expectedExecConfig := range valids {
|
||||||
|
cmd := flag.NewFlagSet("exec", flag.ContinueOnError)
|
||||||
|
cmd.ShortUsage = func() {}
|
||||||
|
cmd.SetOutput(ioutil.Discard)
|
||||||
|
execConfig, err := ParseExec(cmd, valid.args)
|
||||||
|
if err != nil {
|
||||||
|
t.Fatal(err)
|
||||||
|
}
|
||||||
|
if !compareExecConfig(expectedExecConfig, execConfig) {
|
||||||
|
t.Fatalf("Expected [%v] for %v, got [%v]", expectedExecConfig, valid, execConfig)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func compareExecConfig(config1 *types.ExecConfig, config2 *types.ExecConfig) bool {
|
||||||
|
if config1.AttachStderr != config2.AttachStderr {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if config1.AttachStdin != config2.AttachStdin {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if config1.AttachStdout != config2.AttachStdout {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if config1.Detach != config2.Detach {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if config1.Privileged != config2.Privileged {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if config1.Tty != config2.Tty {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if config1.User != config2.User {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
if len(config1.Cmd) != len(config2.Cmd) {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
for index, value := range config1.Cmd {
|
||||||
|
if value != config2.Cmd[index] {
|
||||||
|
return false
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return true
|
||||||
|
}
|
243
api/client/formatter/custom.go
Normal file
243
api/client/formatter/custom.go
Normal file
|
@ -0,0 +1,243 @@
|
||||||
|
package formatter
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api"
|
||||||
|
"github.com/docker/docker/pkg/stringid"
|
||||||
|
"github.com/docker/docker/pkg/stringutils"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
"github.com/docker/go-units"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
tableKey = "table"
|
||||||
|
|
||||||
|
containerIDHeader = "CONTAINER ID"
|
||||||
|
imageHeader = "IMAGE"
|
||||||
|
namesHeader = "NAMES"
|
||||||
|
commandHeader = "COMMAND"
|
||||||
|
createdSinceHeader = "CREATED"
|
||||||
|
createdAtHeader = "CREATED AT"
|
||||||
|
runningForHeader = "CREATED"
|
||||||
|
statusHeader = "STATUS"
|
||||||
|
portsHeader = "PORTS"
|
||||||
|
sizeHeader = "SIZE"
|
||||||
|
labelsHeader = "LABELS"
|
||||||
|
imageIDHeader = "IMAGE ID"
|
||||||
|
repositoryHeader = "REPOSITORY"
|
||||||
|
tagHeader = "TAG"
|
||||||
|
digestHeader = "DIGEST"
|
||||||
|
mountsHeader = "MOUNTS"
|
||||||
|
)
|
||||||
|
|
||||||
|
type containerContext struct {
|
||||||
|
baseSubContext
|
||||||
|
trunc bool
|
||||||
|
c types.Container
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *containerContext) ID() string {
|
||||||
|
c.addHeader(containerIDHeader)
|
||||||
|
if c.trunc {
|
||||||
|
return stringid.TruncateID(c.c.ID)
|
||||||
|
}
|
||||||
|
return c.c.ID
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *containerContext) Names() string {
|
||||||
|
c.addHeader(namesHeader)
|
||||||
|
names := stripNamePrefix(c.c.Names)
|
||||||
|
if c.trunc {
|
||||||
|
for _, name := range names {
|
||||||
|
if len(strings.Split(name, "/")) == 1 {
|
||||||
|
names = []string{name}
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return strings.Join(names, ",")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *containerContext) Image() string {
|
||||||
|
c.addHeader(imageHeader)
|
||||||
|
if c.c.Image == "" {
|
||||||
|
return "<no image>"
|
||||||
|
}
|
||||||
|
if c.trunc {
|
||||||
|
if trunc := stringid.TruncateID(c.c.ImageID); trunc == stringid.TruncateID(c.c.Image) {
|
||||||
|
return trunc
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return c.c.Image
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *containerContext) Command() string {
|
||||||
|
c.addHeader(commandHeader)
|
||||||
|
command := c.c.Command
|
||||||
|
if c.trunc {
|
||||||
|
command = stringutils.Truncate(command, 20)
|
||||||
|
}
|
||||||
|
return strconv.Quote(command)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *containerContext) CreatedAt() string {
|
||||||
|
c.addHeader(createdAtHeader)
|
||||||
|
return time.Unix(int64(c.c.Created), 0).String()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *containerContext) RunningFor() string {
|
||||||
|
c.addHeader(runningForHeader)
|
||||||
|
createdAt := time.Unix(int64(c.c.Created), 0)
|
||||||
|
return units.HumanDuration(time.Now().UTC().Sub(createdAt))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *containerContext) Ports() string {
|
||||||
|
c.addHeader(portsHeader)
|
||||||
|
return api.DisplayablePorts(c.c.Ports)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *containerContext) Status() string {
|
||||||
|
c.addHeader(statusHeader)
|
||||||
|
return c.c.Status
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *containerContext) Size() string {
|
||||||
|
c.addHeader(sizeHeader)
|
||||||
|
srw := units.HumanSize(float64(c.c.SizeRw))
|
||||||
|
sv := units.HumanSize(float64(c.c.SizeRootFs))
|
||||||
|
|
||||||
|
sf := srw
|
||||||
|
if c.c.SizeRootFs > 0 {
|
||||||
|
sf = fmt.Sprintf("%s (virtual %s)", srw, sv)
|
||||||
|
}
|
||||||
|
return sf
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *containerContext) Labels() string {
|
||||||
|
c.addHeader(labelsHeader)
|
||||||
|
if c.c.Labels == nil {
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
|
||||||
|
var joinLabels []string
|
||||||
|
for k, v := range c.c.Labels {
|
||||||
|
joinLabels = append(joinLabels, fmt.Sprintf("%s=%s", k, v))
|
||||||
|
}
|
||||||
|
return strings.Join(joinLabels, ",")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *containerContext) Label(name string) string {
|
||||||
|
n := strings.Split(name, ".")
|
||||||
|
r := strings.NewReplacer("-", " ", "_", " ")
|
||||||
|
h := r.Replace(n[len(n)-1])
|
||||||
|
|
||||||
|
c.addHeader(h)
|
||||||
|
|
||||||
|
if c.c.Labels == nil {
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
return c.c.Labels[name]
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *containerContext) Mounts() string {
|
||||||
|
c.addHeader(mountsHeader)
|
||||||
|
|
||||||
|
var name string
|
||||||
|
var mounts []string
|
||||||
|
for _, m := range c.c.Mounts {
|
||||||
|
if m.Name == "" {
|
||||||
|
name = m.Source
|
||||||
|
} else {
|
||||||
|
name = m.Name
|
||||||
|
}
|
||||||
|
if c.trunc {
|
||||||
|
name = stringutils.Truncate(name, 15)
|
||||||
|
}
|
||||||
|
mounts = append(mounts, name)
|
||||||
|
}
|
||||||
|
return strings.Join(mounts, ",")
|
||||||
|
}
|
||||||
|
|
||||||
|
type imageContext struct {
|
||||||
|
baseSubContext
|
||||||
|
trunc bool
|
||||||
|
i types.Image
|
||||||
|
repo string
|
||||||
|
tag string
|
||||||
|
digest string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *imageContext) ID() string {
|
||||||
|
c.addHeader(imageIDHeader)
|
||||||
|
if c.trunc {
|
||||||
|
return stringid.TruncateID(c.i.ID)
|
||||||
|
}
|
||||||
|
return c.i.ID
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *imageContext) Repository() string {
|
||||||
|
c.addHeader(repositoryHeader)
|
||||||
|
return c.repo
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *imageContext) Tag() string {
|
||||||
|
c.addHeader(tagHeader)
|
||||||
|
return c.tag
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *imageContext) Digest() string {
|
||||||
|
c.addHeader(digestHeader)
|
||||||
|
return c.digest
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *imageContext) CreatedSince() string {
|
||||||
|
c.addHeader(createdSinceHeader)
|
||||||
|
createdAt := time.Unix(int64(c.i.Created), 0)
|
||||||
|
return units.HumanDuration(time.Now().UTC().Sub(createdAt))
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *imageContext) CreatedAt() string {
|
||||||
|
c.addHeader(createdAtHeader)
|
||||||
|
return time.Unix(int64(c.i.Created), 0).String()
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *imageContext) Size() string {
|
||||||
|
c.addHeader(sizeHeader)
|
||||||
|
return units.HumanSize(float64(c.i.Size))
|
||||||
|
}
|
||||||
|
|
||||||
|
type subContext interface {
|
||||||
|
fullHeader() string
|
||||||
|
addHeader(header string)
|
||||||
|
}
|
||||||
|
|
||||||
|
type baseSubContext struct {
|
||||||
|
header []string
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *baseSubContext) fullHeader() string {
|
||||||
|
if c.header == nil {
|
||||||
|
return ""
|
||||||
|
}
|
||||||
|
return strings.Join(c.header, "\t")
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *baseSubContext) addHeader(header string) {
|
||||||
|
if c.header == nil {
|
||||||
|
c.header = []string{}
|
||||||
|
}
|
||||||
|
c.header = append(c.header, strings.ToUpper(header))
|
||||||
|
}
|
||||||
|
|
||||||
|
func stripNamePrefix(ss []string) []string {
|
||||||
|
sss := make([]string, len(ss))
|
||||||
|
for i, s := range ss {
|
||||||
|
sss[i] = s[1:]
|
||||||
|
}
|
||||||
|
|
||||||
|
return sss
|
||||||
|
}
|
192
api/client/formatter/custom_test.go
Normal file
192
api/client/formatter/custom_test.go
Normal file
|
@ -0,0 +1,192 @@
|
||||||
|
package formatter
|
||||||
|
|
||||||
|
import (
|
||||||
|
"reflect"
|
||||||
|
"strings"
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/docker/docker/pkg/stringid"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestContainerPsContext(t *testing.T) {
|
||||||
|
containerID := stringid.GenerateRandomID()
|
||||||
|
unix := time.Now().Add(-65 * time.Second).Unix()
|
||||||
|
|
||||||
|
var ctx containerContext
|
||||||
|
cases := []struct {
|
||||||
|
container types.Container
|
||||||
|
trunc bool
|
||||||
|
expValue string
|
||||||
|
expHeader string
|
||||||
|
call func() string
|
||||||
|
}{
|
||||||
|
{types.Container{ID: containerID}, true, stringid.TruncateID(containerID), containerIDHeader, ctx.ID},
|
||||||
|
{types.Container{ID: containerID}, false, containerID, containerIDHeader, ctx.ID},
|
||||||
|
{types.Container{Names: []string{"/foobar_baz"}}, true, "foobar_baz", namesHeader, ctx.Names},
|
||||||
|
{types.Container{Image: "ubuntu"}, true, "ubuntu", imageHeader, ctx.Image},
|
||||||
|
{types.Container{Image: "verylongimagename"}, true, "verylongimagename", imageHeader, ctx.Image},
|
||||||
|
{types.Container{Image: "verylongimagename"}, false, "verylongimagename", imageHeader, ctx.Image},
|
||||||
|
{types.Container{
|
||||||
|
Image: "a5a665ff33eced1e0803148700880edab4",
|
||||||
|
ImageID: "a5a665ff33eced1e0803148700880edab4269067ed77e27737a708d0d293fbf5",
|
||||||
|
},
|
||||||
|
true,
|
||||||
|
"a5a665ff33ec",
|
||||||
|
imageHeader,
|
||||||
|
ctx.Image,
|
||||||
|
},
|
||||||
|
{types.Container{
|
||||||
|
Image: "a5a665ff33eced1e0803148700880edab4",
|
||||||
|
ImageID: "a5a665ff33eced1e0803148700880edab4269067ed77e27737a708d0d293fbf5",
|
||||||
|
},
|
||||||
|
false,
|
||||||
|
"a5a665ff33eced1e0803148700880edab4",
|
||||||
|
imageHeader,
|
||||||
|
ctx.Image,
|
||||||
|
},
|
||||||
|
{types.Container{Image: ""}, true, "<no image>", imageHeader, ctx.Image},
|
||||||
|
{types.Container{Command: "sh -c 'ls -la'"}, true, `"sh -c 'ls -la'"`, commandHeader, ctx.Command},
|
||||||
|
{types.Container{Created: unix}, true, time.Unix(unix, 0).String(), createdAtHeader, ctx.CreatedAt},
|
||||||
|
{types.Container{Ports: []types.Port{{PrivatePort: 8080, PublicPort: 8080, Type: "tcp"}}}, true, "8080/tcp", portsHeader, ctx.Ports},
|
||||||
|
{types.Container{Status: "RUNNING"}, true, "RUNNING", statusHeader, ctx.Status},
|
||||||
|
{types.Container{SizeRw: 10}, true, "10 B", sizeHeader, ctx.Size},
|
||||||
|
{types.Container{SizeRw: 10, SizeRootFs: 20}, true, "10 B (virtual 20 B)", sizeHeader, ctx.Size},
|
||||||
|
{types.Container{}, true, "", labelsHeader, ctx.Labels},
|
||||||
|
{types.Container{Labels: map[string]string{"cpu": "6", "storage": "ssd"}}, true, "cpu=6,storage=ssd", labelsHeader, ctx.Labels},
|
||||||
|
{types.Container{Created: unix}, true, "About a minute", runningForHeader, ctx.RunningFor},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, c := range cases {
|
||||||
|
ctx = containerContext{c: c.container, trunc: c.trunc}
|
||||||
|
v := c.call()
|
||||||
|
if strings.Contains(v, ",") {
|
||||||
|
compareMultipleValues(t, v, c.expValue)
|
||||||
|
} else if v != c.expValue {
|
||||||
|
t.Fatalf("Expected %s, was %s\n", c.expValue, v)
|
||||||
|
}
|
||||||
|
|
||||||
|
h := ctx.fullHeader()
|
||||||
|
if h != c.expHeader {
|
||||||
|
t.Fatalf("Expected %s, was %s\n", c.expHeader, h)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
c1 := types.Container{Labels: map[string]string{"com.docker.swarm.swarm-id": "33", "com.docker.swarm.node_name": "ubuntu"}}
|
||||||
|
ctx = containerContext{c: c1, trunc: true}
|
||||||
|
|
||||||
|
sid := ctx.Label("com.docker.swarm.swarm-id")
|
||||||
|
node := ctx.Label("com.docker.swarm.node_name")
|
||||||
|
if sid != "33" {
|
||||||
|
t.Fatalf("Expected 33, was %s\n", sid)
|
||||||
|
}
|
||||||
|
|
||||||
|
if node != "ubuntu" {
|
||||||
|
t.Fatalf("Expected ubuntu, was %s\n", node)
|
||||||
|
}
|
||||||
|
|
||||||
|
h := ctx.fullHeader()
|
||||||
|
if h != "SWARM ID\tNODE NAME" {
|
||||||
|
t.Fatalf("Expected %s, was %s\n", "SWARM ID\tNODE NAME", h)
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
c2 := types.Container{}
|
||||||
|
ctx = containerContext{c: c2, trunc: true}
|
||||||
|
|
||||||
|
label := ctx.Label("anything.really")
|
||||||
|
if label != "" {
|
||||||
|
t.Fatalf("Expected an empty string, was %s", label)
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx = containerContext{c: c2, trunc: true}
|
||||||
|
fullHeader := ctx.fullHeader()
|
||||||
|
if fullHeader != "" {
|
||||||
|
t.Fatalf("Expected fullHeader to be empty, was %s", fullHeader)
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestImagesContext(t *testing.T) {
|
||||||
|
imageID := stringid.GenerateRandomID()
|
||||||
|
unix := time.Now().Unix()
|
||||||
|
|
||||||
|
var ctx imageContext
|
||||||
|
cases := []struct {
|
||||||
|
imageCtx imageContext
|
||||||
|
expValue string
|
||||||
|
expHeader string
|
||||||
|
call func() string
|
||||||
|
}{
|
||||||
|
{imageContext{
|
||||||
|
i: types.Image{ID: imageID},
|
||||||
|
trunc: true,
|
||||||
|
}, stringid.TruncateID(imageID), imageIDHeader, ctx.ID},
|
||||||
|
{imageContext{
|
||||||
|
i: types.Image{ID: imageID},
|
||||||
|
trunc: false,
|
||||||
|
}, imageID, imageIDHeader, ctx.ID},
|
||||||
|
{imageContext{
|
||||||
|
i: types.Image{Size: 10},
|
||||||
|
trunc: true,
|
||||||
|
}, "10 B", sizeHeader, ctx.Size},
|
||||||
|
{imageContext{
|
||||||
|
i: types.Image{Created: unix},
|
||||||
|
trunc: true,
|
||||||
|
}, time.Unix(unix, 0).String(), createdAtHeader, ctx.CreatedAt},
|
||||||
|
// FIXME
|
||||||
|
// {imageContext{
|
||||||
|
// i: types.Image{Created: unix},
|
||||||
|
// trunc: true,
|
||||||
|
// }, units.HumanDuration(time.Unix(unix, 0)), createdSinceHeader, ctx.CreatedSince},
|
||||||
|
{imageContext{
|
||||||
|
i: types.Image{},
|
||||||
|
repo: "busybox",
|
||||||
|
}, "busybox", repositoryHeader, ctx.Repository},
|
||||||
|
{imageContext{
|
||||||
|
i: types.Image{},
|
||||||
|
tag: "latest",
|
||||||
|
}, "latest", tagHeader, ctx.Tag},
|
||||||
|
{imageContext{
|
||||||
|
i: types.Image{},
|
||||||
|
digest: "sha256:d149ab53f8718e987c3a3024bb8aa0e2caadf6c0328f1d9d850b2a2a67f2819a",
|
||||||
|
}, "sha256:d149ab53f8718e987c3a3024bb8aa0e2caadf6c0328f1d9d850b2a2a67f2819a", digestHeader, ctx.Digest},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, c := range cases {
|
||||||
|
ctx = c.imageCtx
|
||||||
|
v := c.call()
|
||||||
|
if strings.Contains(v, ",") {
|
||||||
|
compareMultipleValues(t, v, c.expValue)
|
||||||
|
} else if v != c.expValue {
|
||||||
|
t.Fatalf("Expected %s, was %s\n", c.expValue, v)
|
||||||
|
}
|
||||||
|
|
||||||
|
h := ctx.fullHeader()
|
||||||
|
if h != c.expHeader {
|
||||||
|
t.Fatalf("Expected %s, was %s\n", c.expHeader, h)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func compareMultipleValues(t *testing.T, value, expected string) {
|
||||||
|
// comma-separated values means probably a map input, which won't
|
||||||
|
// be guaranteed to have the same order as our expected value
|
||||||
|
// We'll create maps and use reflect.DeepEquals to check instead:
|
||||||
|
entriesMap := make(map[string]string)
|
||||||
|
expMap := make(map[string]string)
|
||||||
|
entries := strings.Split(value, ",")
|
||||||
|
expectedEntries := strings.Split(expected, ",")
|
||||||
|
for _, entry := range entries {
|
||||||
|
keyval := strings.Split(entry, "=")
|
||||||
|
entriesMap[keyval[0]] = keyval[1]
|
||||||
|
}
|
||||||
|
for _, expected := range expectedEntries {
|
||||||
|
keyval := strings.Split(expected, "=")
|
||||||
|
expMap[keyval[0]] = keyval[1]
|
||||||
|
}
|
||||||
|
if !reflect.DeepEqual(expMap, entriesMap) {
|
||||||
|
t.Fatalf("Expected entries: %v, got: %v", expected, value)
|
||||||
|
}
|
||||||
|
}
|
307
api/client/formatter/formatter.go
Normal file
307
api/client/formatter/formatter.go
Normal file
|
@ -0,0 +1,307 @@
|
||||||
|
package formatter
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"strings"
|
||||||
|
"text/tabwriter"
|
||||||
|
"text/template"
|
||||||
|
|
||||||
|
"github.com/docker/docker/reference"
|
||||||
|
"github.com/docker/docker/utils/templates"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
const (
|
||||||
|
tableFormatKey = "table"
|
||||||
|
rawFormatKey = "raw"
|
||||||
|
|
||||||
|
defaultContainerTableFormat = "table {{.ID}}\t{{.Image}}\t{{.Command}}\t{{.RunningFor}} ago\t{{.Status}}\t{{.Ports}}\t{{.Names}}"
|
||||||
|
defaultImageTableFormat = "table {{.Repository}}\t{{.Tag}}\t{{.ID}}\t{{.CreatedSince}} ago\t{{.Size}}"
|
||||||
|
defaultImageTableFormatWithDigest = "table {{.Repository}}\t{{.Tag}}\t{{.Digest}}\t{{.ID}}\t{{.CreatedSince}} ago\t{{.Size}}"
|
||||||
|
defaultQuietFormat = "{{.ID}}"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Context contains information required by the formatter to print the output as desired.
|
||||||
|
type Context struct {
|
||||||
|
// Output is the output stream to which the formatted string is written.
|
||||||
|
Output io.Writer
|
||||||
|
// Format is used to choose raw, table or custom format for the output.
|
||||||
|
Format string
|
||||||
|
// Quiet when set to true will simply print minimal information.
|
||||||
|
Quiet bool
|
||||||
|
// Trunc when set to true will truncate the output of certain fields such as Container ID.
|
||||||
|
Trunc bool
|
||||||
|
|
||||||
|
// internal element
|
||||||
|
table bool
|
||||||
|
finalFormat string
|
||||||
|
header string
|
||||||
|
buffer *bytes.Buffer
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Context) preformat() {
|
||||||
|
c.finalFormat = c.Format
|
||||||
|
|
||||||
|
if strings.HasPrefix(c.Format, tableKey) {
|
||||||
|
c.table = true
|
||||||
|
c.finalFormat = c.finalFormat[len(tableKey):]
|
||||||
|
}
|
||||||
|
|
||||||
|
c.finalFormat = strings.Trim(c.finalFormat, " ")
|
||||||
|
r := strings.NewReplacer(`\t`, "\t", `\n`, "\n")
|
||||||
|
c.finalFormat = r.Replace(c.finalFormat)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Context) parseFormat() (*template.Template, error) {
|
||||||
|
tmpl, err := templates.Parse(c.finalFormat)
|
||||||
|
if err != nil {
|
||||||
|
c.buffer.WriteString(fmt.Sprintf("Template parsing error: %v\n", err))
|
||||||
|
c.buffer.WriteTo(c.Output)
|
||||||
|
}
|
||||||
|
return tmpl, err
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Context) postformat(tmpl *template.Template, subContext subContext) {
|
||||||
|
if c.table {
|
||||||
|
if len(c.header) == 0 {
|
||||||
|
// if we still don't have a header, we didn't have any containers so we need to fake it to get the right headers from the template
|
||||||
|
tmpl.Execute(bytes.NewBufferString(""), subContext)
|
||||||
|
c.header = subContext.fullHeader()
|
||||||
|
}
|
||||||
|
|
||||||
|
t := tabwriter.NewWriter(c.Output, 20, 1, 3, ' ', 0)
|
||||||
|
t.Write([]byte(c.header))
|
||||||
|
t.Write([]byte("\n"))
|
||||||
|
c.buffer.WriteTo(t)
|
||||||
|
t.Flush()
|
||||||
|
} else {
|
||||||
|
c.buffer.WriteTo(c.Output)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (c *Context) contextFormat(tmpl *template.Template, subContext subContext) error {
|
||||||
|
if err := tmpl.Execute(c.buffer, subContext); err != nil {
|
||||||
|
c.buffer = bytes.NewBufferString(fmt.Sprintf("Template parsing error: %v\n", err))
|
||||||
|
c.buffer.WriteTo(c.Output)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if c.table && len(c.header) == 0 {
|
||||||
|
c.header = subContext.fullHeader()
|
||||||
|
}
|
||||||
|
c.buffer.WriteString("\n")
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// ContainerContext contains container specific information required by the formater, encapsulate a Context struct.
|
||||||
|
type ContainerContext struct {
|
||||||
|
Context
|
||||||
|
// Size when set to true will display the size of the output.
|
||||||
|
Size bool
|
||||||
|
// Containers
|
||||||
|
Containers []types.Container
|
||||||
|
}
|
||||||
|
|
||||||
|
// ImageContext contains image specific information required by the formater, encapsulate a Context struct.
|
||||||
|
type ImageContext struct {
|
||||||
|
Context
|
||||||
|
Digest bool
|
||||||
|
// Images
|
||||||
|
Images []types.Image
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ctx ContainerContext) Write() {
|
||||||
|
switch ctx.Format {
|
||||||
|
case tableFormatKey:
|
||||||
|
if ctx.Quiet {
|
||||||
|
ctx.Format = defaultQuietFormat
|
||||||
|
} else {
|
||||||
|
ctx.Format = defaultContainerTableFormat
|
||||||
|
if ctx.Size {
|
||||||
|
ctx.Format += `\t{{.Size}}`
|
||||||
|
}
|
||||||
|
}
|
||||||
|
case rawFormatKey:
|
||||||
|
if ctx.Quiet {
|
||||||
|
ctx.Format = `container_id: {{.ID}}`
|
||||||
|
} else {
|
||||||
|
ctx.Format = `container_id: {{.ID}}\nimage: {{.Image}}\ncommand: {{.Command}}\ncreated_at: {{.CreatedAt}}\nstatus: {{.Status}}\nnames: {{.Names}}\nlabels: {{.Labels}}\nports: {{.Ports}}\n`
|
||||||
|
if ctx.Size {
|
||||||
|
ctx.Format += `size: {{.Size}}\n`
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx.buffer = bytes.NewBufferString("")
|
||||||
|
ctx.preformat()
|
||||||
|
|
||||||
|
tmpl, err := ctx.parseFormat()
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, container := range ctx.Containers {
|
||||||
|
containerCtx := &containerContext{
|
||||||
|
trunc: ctx.Trunc,
|
||||||
|
c: container,
|
||||||
|
}
|
||||||
|
err = ctx.contextFormat(tmpl, containerCtx)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx.postformat(tmpl, &containerContext{})
|
||||||
|
}
|
||||||
|
|
||||||
|
func isDangling(image types.Image) bool {
|
||||||
|
return len(image.RepoTags) == 1 && image.RepoTags[0] == "<none>:<none>" && len(image.RepoDigests) == 1 && image.RepoDigests[0] == "<none>@<none>"
|
||||||
|
}
|
||||||
|
|
||||||
|
func (ctx ImageContext) Write() {
|
||||||
|
switch ctx.Format {
|
||||||
|
case tableFormatKey:
|
||||||
|
ctx.Format = defaultImageTableFormat
|
||||||
|
if ctx.Digest {
|
||||||
|
ctx.Format = defaultImageTableFormatWithDigest
|
||||||
|
}
|
||||||
|
if ctx.Quiet {
|
||||||
|
ctx.Format = defaultQuietFormat
|
||||||
|
}
|
||||||
|
case rawFormatKey:
|
||||||
|
if ctx.Quiet {
|
||||||
|
ctx.Format = `image_id: {{.ID}}`
|
||||||
|
} else {
|
||||||
|
if ctx.Digest {
|
||||||
|
ctx.Format = `repository: {{ .Repository }}
|
||||||
|
tag: {{.Tag}}
|
||||||
|
digest: {{.Digest}}
|
||||||
|
image_id: {{.ID}}
|
||||||
|
created_at: {{.CreatedAt}}
|
||||||
|
virtual_size: {{.Size}}
|
||||||
|
`
|
||||||
|
} else {
|
||||||
|
ctx.Format = `repository: {{ .Repository }}
|
||||||
|
tag: {{.Tag}}
|
||||||
|
image_id: {{.ID}}
|
||||||
|
created_at: {{.CreatedAt}}
|
||||||
|
virtual_size: {{.Size}}
|
||||||
|
`
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx.buffer = bytes.NewBufferString("")
|
||||||
|
ctx.preformat()
|
||||||
|
if ctx.table && ctx.Digest && !strings.Contains(ctx.Format, "{{.Digest}}") {
|
||||||
|
ctx.finalFormat += "\t{{.Digest}}"
|
||||||
|
}
|
||||||
|
|
||||||
|
tmpl, err := ctx.parseFormat()
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, image := range ctx.Images {
|
||||||
|
images := []*imageContext{}
|
||||||
|
if isDangling(image) {
|
||||||
|
images = append(images, &imageContext{
|
||||||
|
trunc: ctx.Trunc,
|
||||||
|
i: image,
|
||||||
|
repo: "<none>",
|
||||||
|
tag: "<none>",
|
||||||
|
digest: "<none>",
|
||||||
|
})
|
||||||
|
} else {
|
||||||
|
repoTags := map[string][]string{}
|
||||||
|
repoDigests := map[string][]string{}
|
||||||
|
|
||||||
|
for _, refString := range append(image.RepoTags) {
|
||||||
|
ref, err := reference.ParseNamed(refString)
|
||||||
|
if err != nil {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if nt, ok := ref.(reference.NamedTagged); ok {
|
||||||
|
repoTags[ref.Name()] = append(repoTags[ref.Name()], nt.Tag())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
for _, refString := range append(image.RepoDigests) {
|
||||||
|
ref, err := reference.ParseNamed(refString)
|
||||||
|
if err != nil {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
if c, ok := ref.(reference.Canonical); ok {
|
||||||
|
repoDigests[ref.Name()] = append(repoDigests[ref.Name()], c.Digest().String())
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for repo, tags := range repoTags {
|
||||||
|
digests := repoDigests[repo]
|
||||||
|
|
||||||
|
// Do not display digests as their own row
|
||||||
|
delete(repoDigests, repo)
|
||||||
|
|
||||||
|
if !ctx.Digest {
|
||||||
|
// Ignore digest references, just show tag once
|
||||||
|
digests = nil
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, tag := range tags {
|
||||||
|
if len(digests) == 0 {
|
||||||
|
images = append(images, &imageContext{
|
||||||
|
trunc: ctx.Trunc,
|
||||||
|
i: image,
|
||||||
|
repo: repo,
|
||||||
|
tag: tag,
|
||||||
|
digest: "<none>",
|
||||||
|
})
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
// Display the digests for each tag
|
||||||
|
for _, dgst := range digests {
|
||||||
|
images = append(images, &imageContext{
|
||||||
|
trunc: ctx.Trunc,
|
||||||
|
i: image,
|
||||||
|
repo: repo,
|
||||||
|
tag: tag,
|
||||||
|
digest: dgst,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Show rows for remaining digest only references
|
||||||
|
for repo, digests := range repoDigests {
|
||||||
|
// If digests are displayed, show row per digest
|
||||||
|
if ctx.Digest {
|
||||||
|
for _, dgst := range digests {
|
||||||
|
images = append(images, &imageContext{
|
||||||
|
trunc: ctx.Trunc,
|
||||||
|
i: image,
|
||||||
|
repo: repo,
|
||||||
|
tag: "<none>",
|
||||||
|
digest: dgst,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
images = append(images, &imageContext{
|
||||||
|
trunc: ctx.Trunc,
|
||||||
|
i: image,
|
||||||
|
repo: repo,
|
||||||
|
tag: "<none>",
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
for _, imageCtx := range images {
|
||||||
|
err = ctx.contextFormat(tmpl, imageCtx)
|
||||||
|
if err != nil {
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx.postformat(tmpl, &imageContext{})
|
||||||
|
}
|
537
api/client/formatter/formatter_test.go
Normal file
537
api/client/formatter/formatter_test.go
Normal file
|
@ -0,0 +1,537 @@
|
||||||
|
package formatter
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"fmt"
|
||||||
|
"testing"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
func TestContainerContextWrite(t *testing.T) {
|
||||||
|
unixTime := time.Now().AddDate(0, 0, -1).Unix()
|
||||||
|
expectedTime := time.Unix(unixTime, 0).String()
|
||||||
|
|
||||||
|
contexts := []struct {
|
||||||
|
context ContainerContext
|
||||||
|
expected string
|
||||||
|
}{
|
||||||
|
// Errors
|
||||||
|
{
|
||||||
|
ContainerContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "{{InvalidFunction}}",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
`Template parsing error: template: :1: function "InvalidFunction" not defined
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ContainerContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "{{nil}}",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
`Template parsing error: template: :1:2: executing "" at <nil>: nil is not a command
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
// Table Format
|
||||||
|
{
|
||||||
|
ContainerContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "table",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
`CONTAINER ID IMAGE COMMAND CREATED STATUS PORTS NAMES
|
||||||
|
containerID1 ubuntu "" 24 hours ago foobar_baz
|
||||||
|
containerID2 ubuntu "" 24 hours ago foobar_bar
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ContainerContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "table {{.Image}}",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"IMAGE\nubuntu\nubuntu\n",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ContainerContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "table {{.Image}}",
|
||||||
|
},
|
||||||
|
Size: true,
|
||||||
|
},
|
||||||
|
"IMAGE\nubuntu\nubuntu\n",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ContainerContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "table {{.Image}}",
|
||||||
|
Quiet: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"IMAGE\nubuntu\nubuntu\n",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ContainerContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "table",
|
||||||
|
Quiet: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"containerID1\ncontainerID2\n",
|
||||||
|
},
|
||||||
|
// Raw Format
|
||||||
|
{
|
||||||
|
ContainerContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "raw",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
fmt.Sprintf(`container_id: containerID1
|
||||||
|
image: ubuntu
|
||||||
|
command: ""
|
||||||
|
created_at: %s
|
||||||
|
status:
|
||||||
|
names: foobar_baz
|
||||||
|
labels:
|
||||||
|
ports:
|
||||||
|
|
||||||
|
container_id: containerID2
|
||||||
|
image: ubuntu
|
||||||
|
command: ""
|
||||||
|
created_at: %s
|
||||||
|
status:
|
||||||
|
names: foobar_bar
|
||||||
|
labels:
|
||||||
|
ports:
|
||||||
|
|
||||||
|
`, expectedTime, expectedTime),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ContainerContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "raw",
|
||||||
|
},
|
||||||
|
Size: true,
|
||||||
|
},
|
||||||
|
fmt.Sprintf(`container_id: containerID1
|
||||||
|
image: ubuntu
|
||||||
|
command: ""
|
||||||
|
created_at: %s
|
||||||
|
status:
|
||||||
|
names: foobar_baz
|
||||||
|
labels:
|
||||||
|
ports:
|
||||||
|
size: 0 B
|
||||||
|
|
||||||
|
container_id: containerID2
|
||||||
|
image: ubuntu
|
||||||
|
command: ""
|
||||||
|
created_at: %s
|
||||||
|
status:
|
||||||
|
names: foobar_bar
|
||||||
|
labels:
|
||||||
|
ports:
|
||||||
|
size: 0 B
|
||||||
|
|
||||||
|
`, expectedTime, expectedTime),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ContainerContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "raw",
|
||||||
|
Quiet: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"container_id: containerID1\ncontainer_id: containerID2\n",
|
||||||
|
},
|
||||||
|
// Custom Format
|
||||||
|
{
|
||||||
|
ContainerContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "{{.Image}}",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"ubuntu\nubuntu\n",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ContainerContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "{{.Image}}",
|
||||||
|
},
|
||||||
|
Size: true,
|
||||||
|
},
|
||||||
|
"ubuntu\nubuntu\n",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, context := range contexts {
|
||||||
|
containers := []types.Container{
|
||||||
|
{ID: "containerID1", Names: []string{"/foobar_baz"}, Image: "ubuntu", Created: unixTime},
|
||||||
|
{ID: "containerID2", Names: []string{"/foobar_bar"}, Image: "ubuntu", Created: unixTime},
|
||||||
|
}
|
||||||
|
out := bytes.NewBufferString("")
|
||||||
|
context.context.Output = out
|
||||||
|
context.context.Containers = containers
|
||||||
|
context.context.Write()
|
||||||
|
actual := out.String()
|
||||||
|
if actual != context.expected {
|
||||||
|
t.Fatalf("Expected \n%s, got \n%s", context.expected, actual)
|
||||||
|
}
|
||||||
|
// Clean buffer
|
||||||
|
out.Reset()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestContainerContextWriteWithNoContainers(t *testing.T) {
|
||||||
|
out := bytes.NewBufferString("")
|
||||||
|
containers := []types.Container{}
|
||||||
|
|
||||||
|
contexts := []struct {
|
||||||
|
context ContainerContext
|
||||||
|
expected string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
ContainerContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "{{.Image}}",
|
||||||
|
Output: out,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ContainerContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "table {{.Image}}",
|
||||||
|
Output: out,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"IMAGE\n",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ContainerContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "{{.Image}}",
|
||||||
|
Output: out,
|
||||||
|
},
|
||||||
|
Size: true,
|
||||||
|
},
|
||||||
|
"",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ContainerContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "table {{.Image}}",
|
||||||
|
Output: out,
|
||||||
|
},
|
||||||
|
Size: true,
|
||||||
|
},
|
||||||
|
"IMAGE\n",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ContainerContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "table {{.Image}}\t{{.Size}}",
|
||||||
|
Output: out,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"IMAGE SIZE\n",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ContainerContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "table {{.Image}}\t{{.Size}}",
|
||||||
|
Output: out,
|
||||||
|
},
|
||||||
|
Size: true,
|
||||||
|
},
|
||||||
|
"IMAGE SIZE\n",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, context := range contexts {
|
||||||
|
context.context.Containers = containers
|
||||||
|
context.context.Write()
|
||||||
|
actual := out.String()
|
||||||
|
if actual != context.expected {
|
||||||
|
t.Fatalf("Expected \n%s, got \n%s", context.expected, actual)
|
||||||
|
}
|
||||||
|
// Clean buffer
|
||||||
|
out.Reset()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestImageContextWrite(t *testing.T) {
|
||||||
|
unixTime := time.Now().AddDate(0, 0, -1).Unix()
|
||||||
|
expectedTime := time.Unix(unixTime, 0).String()
|
||||||
|
|
||||||
|
contexts := []struct {
|
||||||
|
context ImageContext
|
||||||
|
expected string
|
||||||
|
}{
|
||||||
|
// Errors
|
||||||
|
{
|
||||||
|
ImageContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "{{InvalidFunction}}",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
`Template parsing error: template: :1: function "InvalidFunction" not defined
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ImageContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "{{nil}}",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
`Template parsing error: template: :1:2: executing "" at <nil>: nil is not a command
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
// Table Format
|
||||||
|
{
|
||||||
|
ImageContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "table",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
`REPOSITORY TAG IMAGE ID CREATED SIZE
|
||||||
|
image tag1 imageID1 24 hours ago 0 B
|
||||||
|
image tag2 imageID2 24 hours ago 0 B
|
||||||
|
<none> <none> imageID3 24 hours ago 0 B
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ImageContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "table {{.Repository}}",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"REPOSITORY\nimage\nimage\n<none>\n",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ImageContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "table {{.Repository}}",
|
||||||
|
},
|
||||||
|
Digest: true,
|
||||||
|
},
|
||||||
|
`REPOSITORY DIGEST
|
||||||
|
image sha256:cbbf2f9a99b47fc460d422812b6a5adff7dfee951d8fa2e4a98caa0382cfbdbf
|
||||||
|
image <none>
|
||||||
|
<none> <none>
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ImageContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "table {{.Repository}}",
|
||||||
|
Quiet: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"REPOSITORY\nimage\nimage\n<none>\n",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ImageContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "table",
|
||||||
|
Quiet: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"imageID1\nimageID2\nimageID3\n",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ImageContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "table",
|
||||||
|
Quiet: false,
|
||||||
|
},
|
||||||
|
Digest: true,
|
||||||
|
},
|
||||||
|
`REPOSITORY TAG DIGEST IMAGE ID CREATED SIZE
|
||||||
|
image tag1 sha256:cbbf2f9a99b47fc460d422812b6a5adff7dfee951d8fa2e4a98caa0382cfbdbf imageID1 24 hours ago 0 B
|
||||||
|
image tag2 <none> imageID2 24 hours ago 0 B
|
||||||
|
<none> <none> <none> imageID3 24 hours ago 0 B
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ImageContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "table",
|
||||||
|
Quiet: true,
|
||||||
|
},
|
||||||
|
Digest: true,
|
||||||
|
},
|
||||||
|
"imageID1\nimageID2\nimageID3\n",
|
||||||
|
},
|
||||||
|
// Raw Format
|
||||||
|
{
|
||||||
|
ImageContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "raw",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
fmt.Sprintf(`repository: image
|
||||||
|
tag: tag1
|
||||||
|
image_id: imageID1
|
||||||
|
created_at: %s
|
||||||
|
virtual_size: 0 B
|
||||||
|
|
||||||
|
repository: image
|
||||||
|
tag: tag2
|
||||||
|
image_id: imageID2
|
||||||
|
created_at: %s
|
||||||
|
virtual_size: 0 B
|
||||||
|
|
||||||
|
repository: <none>
|
||||||
|
tag: <none>
|
||||||
|
image_id: imageID3
|
||||||
|
created_at: %s
|
||||||
|
virtual_size: 0 B
|
||||||
|
|
||||||
|
`, expectedTime, expectedTime, expectedTime),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ImageContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "raw",
|
||||||
|
},
|
||||||
|
Digest: true,
|
||||||
|
},
|
||||||
|
fmt.Sprintf(`repository: image
|
||||||
|
tag: tag1
|
||||||
|
digest: sha256:cbbf2f9a99b47fc460d422812b6a5adff7dfee951d8fa2e4a98caa0382cfbdbf
|
||||||
|
image_id: imageID1
|
||||||
|
created_at: %s
|
||||||
|
virtual_size: 0 B
|
||||||
|
|
||||||
|
repository: image
|
||||||
|
tag: tag2
|
||||||
|
digest: <none>
|
||||||
|
image_id: imageID2
|
||||||
|
created_at: %s
|
||||||
|
virtual_size: 0 B
|
||||||
|
|
||||||
|
repository: <none>
|
||||||
|
tag: <none>
|
||||||
|
digest: <none>
|
||||||
|
image_id: imageID3
|
||||||
|
created_at: %s
|
||||||
|
virtual_size: 0 B
|
||||||
|
|
||||||
|
`, expectedTime, expectedTime, expectedTime),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ImageContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "raw",
|
||||||
|
Quiet: true,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
`image_id: imageID1
|
||||||
|
image_id: imageID2
|
||||||
|
image_id: imageID3
|
||||||
|
`,
|
||||||
|
},
|
||||||
|
// Custom Format
|
||||||
|
{
|
||||||
|
ImageContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "{{.Repository}}",
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"image\nimage\n<none>\n",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ImageContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "{{.Repository}}",
|
||||||
|
},
|
||||||
|
Digest: true,
|
||||||
|
},
|
||||||
|
"image\nimage\n<none>\n",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, context := range contexts {
|
||||||
|
images := []types.Image{
|
||||||
|
{ID: "imageID1", RepoTags: []string{"image:tag1"}, RepoDigests: []string{"image@sha256:cbbf2f9a99b47fc460d422812b6a5adff7dfee951d8fa2e4a98caa0382cfbdbf"}, Created: unixTime},
|
||||||
|
{ID: "imageID2", RepoTags: []string{"image:tag2"}, Created: unixTime},
|
||||||
|
{ID: "imageID3", RepoTags: []string{"<none>:<none>"}, RepoDigests: []string{"<none>@<none>"}, Created: unixTime},
|
||||||
|
}
|
||||||
|
out := bytes.NewBufferString("")
|
||||||
|
context.context.Output = out
|
||||||
|
context.context.Images = images
|
||||||
|
context.context.Write()
|
||||||
|
actual := out.String()
|
||||||
|
if actual != context.expected {
|
||||||
|
t.Fatalf("Expected \n%s, got \n%s", context.expected, actual)
|
||||||
|
}
|
||||||
|
// Clean buffer
|
||||||
|
out.Reset()
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func TestImageContextWriteWithNoImage(t *testing.T) {
|
||||||
|
out := bytes.NewBufferString("")
|
||||||
|
images := []types.Image{}
|
||||||
|
|
||||||
|
contexts := []struct {
|
||||||
|
context ImageContext
|
||||||
|
expected string
|
||||||
|
}{
|
||||||
|
{
|
||||||
|
ImageContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "{{.Repository}}",
|
||||||
|
Output: out,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ImageContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "table {{.Repository}}",
|
||||||
|
Output: out,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
"REPOSITORY\n",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ImageContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "{{.Repository}}",
|
||||||
|
Output: out,
|
||||||
|
},
|
||||||
|
Digest: true,
|
||||||
|
},
|
||||||
|
"",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
ImageContext{
|
||||||
|
Context: Context{
|
||||||
|
Format: "table {{.Repository}}",
|
||||||
|
Output: out,
|
||||||
|
},
|
||||||
|
Digest: true,
|
||||||
|
},
|
||||||
|
"REPOSITORY DIGEST\n",
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, context := range contexts {
|
||||||
|
context.context.Images = images
|
||||||
|
context.context.Write()
|
||||||
|
actual := out.String()
|
||||||
|
if actual != context.expected {
|
||||||
|
t.Fatalf("Expected \n%s, got \n%s", context.expected, actual)
|
||||||
|
}
|
||||||
|
// Clean buffer
|
||||||
|
out.Reset()
|
||||||
|
}
|
||||||
|
}
|
95
api/client/hijack.go
Normal file
95
api/client/hijack.go
Normal file
|
@ -0,0 +1,95 @@
|
||||||
|
package client
|
||||||
|
|
||||||
|
import (
|
||||||
|
"io"
|
||||||
|
"sync"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/Sirupsen/logrus"
|
||||||
|
"github.com/docker/docker/pkg/stdcopy"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
)
|
||||||
|
|
||||||
|
// HoldHijackedConnection handles copying input to and output from streams to the
|
||||||
|
// connection
|
||||||
|
func (cli *DockerCli) HoldHijackedConnection(ctx context.Context, tty bool, inputStream io.ReadCloser, outputStream, errorStream io.Writer, resp types.HijackedResponse) error {
|
||||||
|
var (
|
||||||
|
err error
|
||||||
|
restoreOnce sync.Once
|
||||||
|
)
|
||||||
|
if inputStream != nil && tty {
|
||||||
|
if err := cli.setRawTerminal(); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer func() {
|
||||||
|
restoreOnce.Do(func() {
|
||||||
|
cli.restoreTerminal(inputStream)
|
||||||
|
})
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
|
||||||
|
receiveStdout := make(chan error, 1)
|
||||||
|
if outputStream != nil || errorStream != nil {
|
||||||
|
go func() {
|
||||||
|
// When TTY is ON, use regular copy
|
||||||
|
if tty && outputStream != nil {
|
||||||
|
_, err = io.Copy(outputStream, resp.Reader)
|
||||||
|
// we should restore the terminal as soon as possible once connection end
|
||||||
|
// so any following print messages will be in normal type.
|
||||||
|
if inputStream != nil {
|
||||||
|
restoreOnce.Do(func() {
|
||||||
|
cli.restoreTerminal(inputStream)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
} else {
|
||||||
|
_, err = stdcopy.StdCopy(outputStream, errorStream, resp.Reader)
|
||||||
|
}
|
||||||
|
|
||||||
|
logrus.Debug("[hijack] End of stdout")
|
||||||
|
receiveStdout <- err
|
||||||
|
}()
|
||||||
|
}
|
||||||
|
|
||||||
|
stdinDone := make(chan struct{})
|
||||||
|
go func() {
|
||||||
|
if inputStream != nil {
|
||||||
|
io.Copy(resp.Conn, inputStream)
|
||||||
|
// we should restore the terminal as soon as possible once connection end
|
||||||
|
// so any following print messages will be in normal type.
|
||||||
|
if tty {
|
||||||
|
restoreOnce.Do(func() {
|
||||||
|
cli.restoreTerminal(inputStream)
|
||||||
|
})
|
||||||
|
}
|
||||||
|
logrus.Debug("[hijack] End of stdin")
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := resp.CloseWrite(); err != nil {
|
||||||
|
logrus.Debugf("Couldn't send EOF: %s", err)
|
||||||
|
}
|
||||||
|
close(stdinDone)
|
||||||
|
}()
|
||||||
|
|
||||||
|
select {
|
||||||
|
case err := <-receiveStdout:
|
||||||
|
if err != nil {
|
||||||
|
logrus.Debugf("Error receiveStdout: %s", err)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
case <-stdinDone:
|
||||||
|
if outputStream != nil || errorStream != nil {
|
||||||
|
select {
|
||||||
|
case err := <-receiveStdout:
|
||||||
|
if err != nil {
|
||||||
|
logrus.Debugf("Error receiveStdout: %s", err)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
case <-ctx.Done():
|
||||||
|
}
|
||||||
|
}
|
||||||
|
case <-ctx.Done():
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
70
api/client/idresolver/idresolver.go
Normal file
70
api/client/idresolver/idresolver.go
Normal file
|
@ -0,0 +1,70 @@
|
||||||
|
package idresolver
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/engine-api/client"
|
||||||
|
"github.com/docker/engine-api/types/swarm"
|
||||||
|
)
|
||||||
|
|
||||||
|
// IDResolver provides ID to Name resolution.
|
||||||
|
type IDResolver struct {
|
||||||
|
client client.APIClient
|
||||||
|
noResolve bool
|
||||||
|
cache map[string]string
|
||||||
|
}
|
||||||
|
|
||||||
|
// New creates a new IDResolver.
|
||||||
|
func New(client client.APIClient, noResolve bool) *IDResolver {
|
||||||
|
return &IDResolver{
|
||||||
|
client: client,
|
||||||
|
noResolve: noResolve,
|
||||||
|
cache: make(map[string]string),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (r *IDResolver) get(ctx context.Context, t interface{}, id string) (string, error) {
|
||||||
|
switch t.(type) {
|
||||||
|
case swarm.Node:
|
||||||
|
node, _, err := r.client.NodeInspectWithRaw(ctx, id)
|
||||||
|
if err != nil {
|
||||||
|
return id, nil
|
||||||
|
}
|
||||||
|
if node.Spec.Annotations.Name != "" {
|
||||||
|
return node.Spec.Annotations.Name, nil
|
||||||
|
}
|
||||||
|
if node.Description.Hostname != "" {
|
||||||
|
return node.Description.Hostname, nil
|
||||||
|
}
|
||||||
|
return id, nil
|
||||||
|
case swarm.Service:
|
||||||
|
service, _, err := r.client.ServiceInspectWithRaw(ctx, id)
|
||||||
|
if err != nil {
|
||||||
|
return id, nil
|
||||||
|
}
|
||||||
|
return service.Spec.Annotations.Name, nil
|
||||||
|
default:
|
||||||
|
return "", fmt.Errorf("unsupported type")
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
|
||||||
|
// Resolve will attempt to resolve an ID to a Name by querying the manager.
|
||||||
|
// Results are stored into a cache.
|
||||||
|
// If the `-n` flag is used in the command-line, resolution is disabled.
|
||||||
|
func (r *IDResolver) Resolve(ctx context.Context, t interface{}, id string) (string, error) {
|
||||||
|
if r.noResolve {
|
||||||
|
return id, nil
|
||||||
|
}
|
||||||
|
if name, ok := r.cache[id]; ok {
|
||||||
|
return name, nil
|
||||||
|
}
|
||||||
|
name, err := r.get(ctx, t, id)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
r.cache[id] = name
|
||||||
|
return name, nil
|
||||||
|
}
|
433
api/client/image/build.go
Normal file
433
api/client/image/build.go
Normal file
|
@ -0,0 +1,433 @@
|
||||||
|
package image
|
||||||
|
|
||||||
|
import (
|
||||||
|
"archive/tar"
|
||||||
|
"bufio"
|
||||||
|
"bytes"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"os"
|
||||||
|
"path/filepath"
|
||||||
|
"regexp"
|
||||||
|
"runtime"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api"
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/builder"
|
||||||
|
"github.com/docker/docker/builder/dockerignore"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/docker/docker/opts"
|
||||||
|
"github.com/docker/docker/pkg/archive"
|
||||||
|
"github.com/docker/docker/pkg/fileutils"
|
||||||
|
"github.com/docker/docker/pkg/jsonmessage"
|
||||||
|
"github.com/docker/docker/pkg/progress"
|
||||||
|
"github.com/docker/docker/pkg/streamformatter"
|
||||||
|
"github.com/docker/docker/pkg/urlutil"
|
||||||
|
"github.com/docker/docker/reference"
|
||||||
|
runconfigopts "github.com/docker/docker/runconfig/opts"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
"github.com/docker/engine-api/types/container"
|
||||||
|
"github.com/docker/go-units"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type buildOptions struct {
|
||||||
|
context string
|
||||||
|
dockerfileName string
|
||||||
|
tags opts.ListOpts
|
||||||
|
labels opts.ListOpts
|
||||||
|
buildArgs opts.ListOpts
|
||||||
|
ulimits *runconfigopts.UlimitOpt
|
||||||
|
memory string
|
||||||
|
memorySwap string
|
||||||
|
shmSize string
|
||||||
|
cpuShares int64
|
||||||
|
cpuPeriod int64
|
||||||
|
cpuQuota int64
|
||||||
|
cpuSetCpus string
|
||||||
|
cpuSetMems string
|
||||||
|
cgroupParent string
|
||||||
|
isolation string
|
||||||
|
quiet bool
|
||||||
|
noCache bool
|
||||||
|
rm bool
|
||||||
|
forceRm bool
|
||||||
|
pull bool
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewBuildCommand creates a new `docker build` command
|
||||||
|
func NewBuildCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
ulimits := make(map[string]*units.Ulimit)
|
||||||
|
options := buildOptions{
|
||||||
|
tags: opts.NewListOpts(validateTag),
|
||||||
|
buildArgs: opts.NewListOpts(runconfigopts.ValidateEnv),
|
||||||
|
ulimits: runconfigopts.NewUlimitOpt(&ulimits),
|
||||||
|
labels: opts.NewListOpts(runconfigopts.ValidateEnv),
|
||||||
|
}
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "build [OPTIONS] PATH | URL | -",
|
||||||
|
Short: "Build an image from a Dockerfile",
|
||||||
|
Args: cli.ExactArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
options.context = args[0]
|
||||||
|
return runBuild(dockerCli, options)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
|
||||||
|
flags.VarP(&options.tags, "tag", "t", "Name and optionally a tag in the 'name:tag' format")
|
||||||
|
flags.Var(&options.buildArgs, "build-arg", "Set build-time variables")
|
||||||
|
flags.Var(options.ulimits, "ulimit", "Ulimit options")
|
||||||
|
flags.StringVarP(&options.dockerfileName, "file", "f", "", "Name of the Dockerfile (Default is 'PATH/Dockerfile')")
|
||||||
|
flags.StringVarP(&options.memory, "memory", "m", "", "Memory limit")
|
||||||
|
flags.StringVar(&options.memorySwap, "memory-swap", "", "Swap limit equal to memory plus swap: '-1' to enable unlimited swap")
|
||||||
|
flags.StringVar(&options.shmSize, "shm-size", "", "Size of /dev/shm, default value is 64MB")
|
||||||
|
flags.Int64VarP(&options.cpuShares, "cpu-shares", "c", 0, "CPU shares (relative weight)")
|
||||||
|
flags.Int64Var(&options.cpuPeriod, "cpu-period", 0, "Limit the CPU CFS (Completely Fair Scheduler) period")
|
||||||
|
flags.Int64Var(&options.cpuQuota, "cpu-quota", 0, "Limit the CPU CFS (Completely Fair Scheduler) quota")
|
||||||
|
flags.StringVar(&options.cpuSetCpus, "cpuset-cpus", "", "CPUs in which to allow execution (0-3, 0,1)")
|
||||||
|
flags.StringVar(&options.cpuSetMems, "cpuset-mems", "", "MEMs in which to allow execution (0-3, 0,1)")
|
||||||
|
flags.StringVar(&options.cgroupParent, "cgroup-parent", "", "Optional parent cgroup for the container")
|
||||||
|
flags.StringVar(&options.isolation, "isolation", "", "Container isolation technology")
|
||||||
|
flags.Var(&options.labels, "label", "Set metadata for an image")
|
||||||
|
flags.BoolVar(&options.noCache, "no-cache", false, "Do not use cache when building the image")
|
||||||
|
flags.BoolVar(&options.rm, "rm", true, "Remove intermediate containers after a successful build")
|
||||||
|
flags.BoolVar(&options.forceRm, "force-rm", false, "Always remove intermediate containers")
|
||||||
|
flags.BoolVarP(&options.quiet, "quiet", "q", false, "Suppress the build output and print image ID on success")
|
||||||
|
flags.BoolVar(&options.pull, "pull", false, "Always attempt to pull a newer version of the image")
|
||||||
|
|
||||||
|
client.AddTrustedFlags(flags, true)
|
||||||
|
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runBuild(dockerCli *client.DockerCli, options buildOptions) error {
|
||||||
|
|
||||||
|
var (
|
||||||
|
buildCtx io.ReadCloser
|
||||||
|
err error
|
||||||
|
)
|
||||||
|
|
||||||
|
specifiedContext := options.context
|
||||||
|
|
||||||
|
var (
|
||||||
|
contextDir string
|
||||||
|
tempDir string
|
||||||
|
relDockerfile string
|
||||||
|
progBuff io.Writer
|
||||||
|
buildBuff io.Writer
|
||||||
|
)
|
||||||
|
|
||||||
|
progBuff = dockerCli.Out()
|
||||||
|
buildBuff = dockerCli.Out()
|
||||||
|
if options.quiet {
|
||||||
|
progBuff = bytes.NewBuffer(nil)
|
||||||
|
buildBuff = bytes.NewBuffer(nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
switch {
|
||||||
|
case specifiedContext == "-":
|
||||||
|
buildCtx, relDockerfile, err = builder.GetContextFromReader(dockerCli.In(), options.dockerfileName)
|
||||||
|
case urlutil.IsGitURL(specifiedContext):
|
||||||
|
tempDir, relDockerfile, err = builder.GetContextFromGitURL(specifiedContext, options.dockerfileName)
|
||||||
|
case urlutil.IsURL(specifiedContext):
|
||||||
|
buildCtx, relDockerfile, err = builder.GetContextFromURL(progBuff, specifiedContext, options.dockerfileName)
|
||||||
|
default:
|
||||||
|
contextDir, relDockerfile, err = builder.GetContextFromLocalDir(specifiedContext, options.dockerfileName)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err != nil {
|
||||||
|
if options.quiet && urlutil.IsURL(specifiedContext) {
|
||||||
|
fmt.Fprintln(dockerCli.Err(), progBuff)
|
||||||
|
}
|
||||||
|
return fmt.Errorf("unable to prepare context: %s", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if tempDir != "" {
|
||||||
|
defer os.RemoveAll(tempDir)
|
||||||
|
contextDir = tempDir
|
||||||
|
}
|
||||||
|
|
||||||
|
if buildCtx == nil {
|
||||||
|
// And canonicalize dockerfile name to a platform-independent one
|
||||||
|
relDockerfile, err = archive.CanonicalTarNameForPath(relDockerfile)
|
||||||
|
if err != nil {
|
||||||
|
return fmt.Errorf("cannot canonicalize dockerfile path %s: %v", relDockerfile, err)
|
||||||
|
}
|
||||||
|
|
||||||
|
f, err := os.Open(filepath.Join(contextDir, ".dockerignore"))
|
||||||
|
if err != nil && !os.IsNotExist(err) {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
var excludes []string
|
||||||
|
if err == nil {
|
||||||
|
excludes, err = dockerignore.ReadAll(f)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := builder.ValidateContextDirectory(contextDir, excludes); err != nil {
|
||||||
|
return fmt.Errorf("Error checking context: '%s'.", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
// If .dockerignore mentions .dockerignore or the Dockerfile
|
||||||
|
// then make sure we send both files over to the daemon
|
||||||
|
// because Dockerfile is, obviously, needed no matter what, and
|
||||||
|
// .dockerignore is needed to know if either one needs to be
|
||||||
|
// removed. The daemon will remove them for us, if needed, after it
|
||||||
|
// parses the Dockerfile. Ignore errors here, as they will have been
|
||||||
|
// caught by validateContextDirectory above.
|
||||||
|
var includes = []string{"."}
|
||||||
|
keepThem1, _ := fileutils.Matches(".dockerignore", excludes)
|
||||||
|
keepThem2, _ := fileutils.Matches(relDockerfile, excludes)
|
||||||
|
if keepThem1 || keepThem2 {
|
||||||
|
includes = append(includes, ".dockerignore", relDockerfile)
|
||||||
|
}
|
||||||
|
|
||||||
|
buildCtx, err = archive.TarWithOptions(contextDir, &archive.TarOptions{
|
||||||
|
Compression: archive.Uncompressed,
|
||||||
|
ExcludePatterns: excludes,
|
||||||
|
IncludeFiles: includes,
|
||||||
|
})
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
var resolvedTags []*resolvedTag
|
||||||
|
if client.IsTrusted() {
|
||||||
|
// Wrap the tar archive to replace the Dockerfile entry with the rewritten
|
||||||
|
// Dockerfile which uses trusted pulls.
|
||||||
|
buildCtx = replaceDockerfileTarWrapper(ctx, buildCtx, relDockerfile, dockerCli.TrustedReference, &resolvedTags)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Setup an upload progress bar
|
||||||
|
progressOutput := streamformatter.NewStreamFormatter().NewProgressOutput(progBuff, true)
|
||||||
|
|
||||||
|
var body io.Reader = progress.NewProgressReader(buildCtx, progressOutput, 0, "", "Sending build context to Docker daemon")
|
||||||
|
|
||||||
|
var memory int64
|
||||||
|
if options.memory != "" {
|
||||||
|
parsedMemory, err := units.RAMInBytes(options.memory)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
memory = parsedMemory
|
||||||
|
}
|
||||||
|
|
||||||
|
var memorySwap int64
|
||||||
|
if options.memorySwap != "" {
|
||||||
|
if options.memorySwap == "-1" {
|
||||||
|
memorySwap = -1
|
||||||
|
} else {
|
||||||
|
parsedMemorySwap, err := units.RAMInBytes(options.memorySwap)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
memorySwap = parsedMemorySwap
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
var shmSize int64
|
||||||
|
if options.shmSize != "" {
|
||||||
|
shmSize, err = units.RAMInBytes(options.shmSize)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
buildOptions := types.ImageBuildOptions{
|
||||||
|
Memory: memory,
|
||||||
|
MemorySwap: memorySwap,
|
||||||
|
Tags: options.tags.GetAll(),
|
||||||
|
SuppressOutput: options.quiet,
|
||||||
|
NoCache: options.noCache,
|
||||||
|
Remove: options.rm,
|
||||||
|
ForceRemove: options.forceRm,
|
||||||
|
PullParent: options.pull,
|
||||||
|
Isolation: container.Isolation(options.isolation),
|
||||||
|
CPUSetCPUs: options.cpuSetCpus,
|
||||||
|
CPUSetMems: options.cpuSetMems,
|
||||||
|
CPUShares: options.cpuShares,
|
||||||
|
CPUQuota: options.cpuQuota,
|
||||||
|
CPUPeriod: options.cpuPeriod,
|
||||||
|
CgroupParent: options.cgroupParent,
|
||||||
|
Dockerfile: relDockerfile,
|
||||||
|
ShmSize: shmSize,
|
||||||
|
Ulimits: options.ulimits.GetList(),
|
||||||
|
BuildArgs: runconfigopts.ConvertKVStringsToMap(options.buildArgs.GetAll()),
|
||||||
|
AuthConfigs: dockerCli.RetrieveAuthConfigs(),
|
||||||
|
Labels: runconfigopts.ConvertKVStringsToMap(options.labels.GetAll()),
|
||||||
|
}
|
||||||
|
|
||||||
|
response, err := dockerCli.Client().ImageBuild(ctx, body, buildOptions)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer response.Body.Close()
|
||||||
|
|
||||||
|
err = jsonmessage.DisplayJSONMessagesStream(response.Body, buildBuff, dockerCli.OutFd(), dockerCli.IsTerminalOut(), nil)
|
||||||
|
if err != nil {
|
||||||
|
if jerr, ok := err.(*jsonmessage.JSONError); ok {
|
||||||
|
// If no error code is set, default to 1
|
||||||
|
if jerr.Code == 0 {
|
||||||
|
jerr.Code = 1
|
||||||
|
}
|
||||||
|
if options.quiet {
|
||||||
|
fmt.Fprintf(dockerCli.Err(), "%s%s", progBuff, buildBuff)
|
||||||
|
}
|
||||||
|
return cli.StatusError{Status: jerr.Message, StatusCode: jerr.Code}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Windows: show error message about modified file permissions if the
|
||||||
|
// daemon isn't running Windows.
|
||||||
|
if response.OSType != "windows" && runtime.GOOS == "windows" {
|
||||||
|
fmt.Fprintln(dockerCli.Err(), `SECURITY WARNING: You are building a Docker image from Windows against a non-Windows Docker host. All files and directories added to build context will have '-rwxr-xr-x' permissions. It is recommended to double check and reset permissions for sensitive files and directories.`)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Everything worked so if -q was provided the output from the daemon
|
||||||
|
// should be just the image ID and we'll print that to stdout.
|
||||||
|
if options.quiet {
|
||||||
|
fmt.Fprintf(dockerCli.Out(), "%s", buildBuff)
|
||||||
|
}
|
||||||
|
|
||||||
|
if client.IsTrusted() {
|
||||||
|
// Since the build was successful, now we must tag any of the resolved
|
||||||
|
// images from the above Dockerfile rewrite.
|
||||||
|
for _, resolved := range resolvedTags {
|
||||||
|
if err := dockerCli.TagTrusted(ctx, resolved.digestRef, resolved.tagRef); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
type translatorFunc func(context.Context, reference.NamedTagged) (reference.Canonical, error)
|
||||||
|
|
||||||
|
// validateTag checks if the given image name can be resolved.
|
||||||
|
func validateTag(rawRepo string) (string, error) {
|
||||||
|
_, err := reference.ParseNamed(rawRepo)
|
||||||
|
if err != nil {
|
||||||
|
return "", err
|
||||||
|
}
|
||||||
|
|
||||||
|
return rawRepo, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
var dockerfileFromLinePattern = regexp.MustCompile(`(?i)^[\s]*FROM[ \f\r\t\v]+(?P<image>[^ \f\r\t\v\n#]+)`)
|
||||||
|
|
||||||
|
// resolvedTag records the repository, tag, and resolved digest reference
|
||||||
|
// from a Dockerfile rewrite.
|
||||||
|
type resolvedTag struct {
|
||||||
|
digestRef reference.Canonical
|
||||||
|
tagRef reference.NamedTagged
|
||||||
|
}
|
||||||
|
|
||||||
|
// rewriteDockerfileFrom rewrites the given Dockerfile by resolving images in
|
||||||
|
// "FROM <image>" instructions to a digest reference. `translator` is a
|
||||||
|
// function that takes a repository name and tag reference and returns a
|
||||||
|
// trusted digest reference.
|
||||||
|
func rewriteDockerfileFrom(ctx context.Context, dockerfile io.Reader, translator translatorFunc) (newDockerfile []byte, resolvedTags []*resolvedTag, err error) {
|
||||||
|
scanner := bufio.NewScanner(dockerfile)
|
||||||
|
buf := bytes.NewBuffer(nil)
|
||||||
|
|
||||||
|
// Scan the lines of the Dockerfile, looking for a "FROM" line.
|
||||||
|
for scanner.Scan() {
|
||||||
|
line := scanner.Text()
|
||||||
|
|
||||||
|
matches := dockerfileFromLinePattern.FindStringSubmatch(line)
|
||||||
|
if matches != nil && matches[1] != api.NoBaseImageSpecifier {
|
||||||
|
// Replace the line with a resolved "FROM repo@digest"
|
||||||
|
ref, err := reference.ParseNamed(matches[1])
|
||||||
|
if err != nil {
|
||||||
|
return nil, nil, err
|
||||||
|
}
|
||||||
|
ref = reference.WithDefaultTag(ref)
|
||||||
|
if ref, ok := ref.(reference.NamedTagged); ok && client.IsTrusted() {
|
||||||
|
trustedRef, err := translator(ctx, ref)
|
||||||
|
if err != nil {
|
||||||
|
return nil, nil, err
|
||||||
|
}
|
||||||
|
|
||||||
|
line = dockerfileFromLinePattern.ReplaceAllLiteralString(line, fmt.Sprintf("FROM %s", trustedRef.String()))
|
||||||
|
resolvedTags = append(resolvedTags, &resolvedTag{
|
||||||
|
digestRef: trustedRef,
|
||||||
|
tagRef: ref,
|
||||||
|
})
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err := fmt.Fprintln(buf, line)
|
||||||
|
if err != nil {
|
||||||
|
return nil, nil, err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
return buf.Bytes(), resolvedTags, scanner.Err()
|
||||||
|
}
|
||||||
|
|
||||||
|
// replaceDockerfileTarWrapper wraps the given input tar archive stream and
|
||||||
|
// replaces the entry with the given Dockerfile name with the contents of the
|
||||||
|
// new Dockerfile. Returns a new tar archive stream with the replaced
|
||||||
|
// Dockerfile.
|
||||||
|
func replaceDockerfileTarWrapper(ctx context.Context, inputTarStream io.ReadCloser, dockerfileName string, translator translatorFunc, resolvedTags *[]*resolvedTag) io.ReadCloser {
|
||||||
|
pipeReader, pipeWriter := io.Pipe()
|
||||||
|
go func() {
|
||||||
|
tarReader := tar.NewReader(inputTarStream)
|
||||||
|
tarWriter := tar.NewWriter(pipeWriter)
|
||||||
|
|
||||||
|
defer inputTarStream.Close()
|
||||||
|
|
||||||
|
for {
|
||||||
|
hdr, err := tarReader.Next()
|
||||||
|
if err == io.EOF {
|
||||||
|
// Signals end of archive.
|
||||||
|
tarWriter.Close()
|
||||||
|
pipeWriter.Close()
|
||||||
|
return
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
pipeWriter.CloseWithError(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
var content io.Reader = tarReader
|
||||||
|
if hdr.Name == dockerfileName {
|
||||||
|
// This entry is the Dockerfile. Since the tar archive was
|
||||||
|
// generated from a directory on the local filesystem, the
|
||||||
|
// Dockerfile will only appear once in the archive.
|
||||||
|
var newDockerfile []byte
|
||||||
|
newDockerfile, *resolvedTags, err = rewriteDockerfileFrom(ctx, content, translator)
|
||||||
|
if err != nil {
|
||||||
|
pipeWriter.CloseWithError(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
hdr.Size = int64(len(newDockerfile))
|
||||||
|
content = bytes.NewBuffer(newDockerfile)
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := tarWriter.WriteHeader(hdr); err != nil {
|
||||||
|
pipeWriter.CloseWithError(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, err := io.Copy(tarWriter, content); err != nil {
|
||||||
|
pipeWriter.CloseWithError(err)
|
||||||
|
return
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}()
|
||||||
|
|
||||||
|
return pipeReader
|
||||||
|
}
|
99
api/client/image/history.go
Normal file
99
api/client/image/history.go
Normal file
|
@ -0,0 +1,99 @@
|
||||||
|
package image
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"strconv"
|
||||||
|
"strings"
|
||||||
|
"text/tabwriter"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/docker/docker/pkg/stringid"
|
||||||
|
"github.com/docker/docker/pkg/stringutils"
|
||||||
|
"github.com/docker/go-units"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type historyOptions struct {
|
||||||
|
image string
|
||||||
|
|
||||||
|
human bool
|
||||||
|
quiet bool
|
||||||
|
noTrunc bool
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewHistoryCommand create a new `docker history` command
|
||||||
|
func NewHistoryCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts historyOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "history [OPTIONS] IMAGE",
|
||||||
|
Short: "Show the history of an image",
|
||||||
|
Args: cli.ExactArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.image = args[0]
|
||||||
|
return runHistory(dockerCli, opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
|
||||||
|
flags.BoolVarP(&opts.human, "human", "H", true, "Print sizes and dates in human readable format")
|
||||||
|
flags.BoolVarP(&opts.quiet, "quiet", "q", false, "Only show numeric IDs")
|
||||||
|
flags.BoolVar(&opts.noTrunc, "no-trunc", false, "Don't truncate output")
|
||||||
|
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runHistory(dockerCli *client.DockerCli, opts historyOptions) error {
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
history, err := dockerCli.Client().ImageHistory(ctx, opts.image)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
w := tabwriter.NewWriter(dockerCli.Out(), 20, 1, 3, ' ', 0)
|
||||||
|
|
||||||
|
if opts.quiet {
|
||||||
|
for _, entry := range history {
|
||||||
|
if opts.noTrunc {
|
||||||
|
fmt.Fprintf(w, "%s\n", entry.ID)
|
||||||
|
} else {
|
||||||
|
fmt.Fprintf(w, "%s\n", stringid.TruncateID(entry.ID))
|
||||||
|
}
|
||||||
|
}
|
||||||
|
w.Flush()
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
var imageID string
|
||||||
|
var createdBy string
|
||||||
|
var created string
|
||||||
|
var size string
|
||||||
|
|
||||||
|
fmt.Fprintln(w, "IMAGE\tCREATED\tCREATED BY\tSIZE\tCOMMENT")
|
||||||
|
for _, entry := range history {
|
||||||
|
imageID = entry.ID
|
||||||
|
createdBy = strings.Replace(entry.CreatedBy, "\t", " ", -1)
|
||||||
|
if opts.noTrunc == false {
|
||||||
|
createdBy = stringutils.Truncate(createdBy, 45)
|
||||||
|
imageID = stringid.TruncateID(entry.ID)
|
||||||
|
}
|
||||||
|
|
||||||
|
if opts.human {
|
||||||
|
created = units.HumanDuration(time.Now().UTC().Sub(time.Unix(entry.Created, 0))) + " ago"
|
||||||
|
size = units.HumanSize(float64(entry.Size))
|
||||||
|
} else {
|
||||||
|
created = time.Unix(entry.Created, 0).Format(time.RFC3339)
|
||||||
|
size = strconv.FormatInt(entry.Size, 10)
|
||||||
|
}
|
||||||
|
|
||||||
|
fmt.Fprintf(w, "%s\t%s\t%s\t%s\t%s\n", imageID, created, createdBy, size, entry.Comment)
|
||||||
|
}
|
||||||
|
w.Flush()
|
||||||
|
return nil
|
||||||
|
}
|
103
api/client/image/images.go
Normal file
103
api/client/image/images.go
Normal file
|
@ -0,0 +1,103 @@
|
||||||
|
package image
|
||||||
|
|
||||||
|
import (
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/api/client/formatter"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
"github.com/docker/engine-api/types/filters"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type imagesOptions struct {
|
||||||
|
matchName string
|
||||||
|
|
||||||
|
quiet bool
|
||||||
|
all bool
|
||||||
|
noTrunc bool
|
||||||
|
showDigests bool
|
||||||
|
format string
|
||||||
|
filter []string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewImagesCommand create a new `docker images` command
|
||||||
|
func NewImagesCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts imagesOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "images [OPTIONS] [REPOSITORY[:TAG]]",
|
||||||
|
Short: "List images",
|
||||||
|
Args: cli.RequiresMaxArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
if len(args) > 0 {
|
||||||
|
opts.matchName = args[0]
|
||||||
|
}
|
||||||
|
return runImages(dockerCli, opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
|
||||||
|
flags.BoolVarP(&opts.quiet, "quiet", "q", false, "Only show numeric IDs")
|
||||||
|
flags.BoolVarP(&opts.all, "all", "a", false, "Show all images (default hides intermediate images)")
|
||||||
|
flags.BoolVar(&opts.noTrunc, "no-trunc", false, "Don't truncate output")
|
||||||
|
flags.BoolVar(&opts.showDigests, "digests", false, "Show digests")
|
||||||
|
flags.StringVar(&opts.format, "format", "", "Pretty-print images using a Go template")
|
||||||
|
flags.StringSliceVarP(&opts.filter, "filter", "f", []string{}, "Filter output based on conditions provided")
|
||||||
|
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runImages(dockerCli *client.DockerCli, opts imagesOptions) error {
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
// Consolidate all filter flags, and sanity check them early.
|
||||||
|
// They'll get process in the daemon/server.
|
||||||
|
imageFilterArgs := filters.NewArgs()
|
||||||
|
for _, f := range opts.filter {
|
||||||
|
var err error
|
||||||
|
imageFilterArgs, err = filters.ParseFlag(f, imageFilterArgs)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
matchName := opts.matchName
|
||||||
|
|
||||||
|
options := types.ImageListOptions{
|
||||||
|
MatchName: matchName,
|
||||||
|
All: opts.all,
|
||||||
|
Filters: imageFilterArgs,
|
||||||
|
}
|
||||||
|
|
||||||
|
images, err := dockerCli.Client().ImageList(ctx, options)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
f := opts.format
|
||||||
|
if len(f) == 0 {
|
||||||
|
if len(dockerCli.ImagesFormat()) > 0 && !opts.quiet {
|
||||||
|
f = dockerCli.ImagesFormat()
|
||||||
|
} else {
|
||||||
|
f = "table"
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
imagesCtx := formatter.ImageContext{
|
||||||
|
Context: formatter.Context{
|
||||||
|
Output: dockerCli.Out(),
|
||||||
|
Format: f,
|
||||||
|
Quiet: opts.quiet,
|
||||||
|
Trunc: !opts.noTrunc,
|
||||||
|
},
|
||||||
|
Digest: opts.showDigests,
|
||||||
|
Images: images,
|
||||||
|
}
|
||||||
|
|
||||||
|
imagesCtx.Write()
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
86
api/client/image/import.go
Normal file
86
api/client/image/import.go
Normal file
|
@ -0,0 +1,86 @@
|
||||||
|
package image
|
||||||
|
|
||||||
|
import (
|
||||||
|
"io"
|
||||||
|
"os"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/docker/docker/pkg/jsonmessage"
|
||||||
|
"github.com/docker/docker/pkg/urlutil"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type importOptions struct {
|
||||||
|
source string
|
||||||
|
reference string
|
||||||
|
changes []string
|
||||||
|
message string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewImportCommand creates a new `docker import` command
|
||||||
|
func NewImportCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts importOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "import [OPTIONS] file|URL|- [REPOSITORY[:TAG]]",
|
||||||
|
Short: "Import the contents from a tarball to create a filesystem image",
|
||||||
|
Args: cli.RequiresMinArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.source = args[0]
|
||||||
|
if len(args) > 1 {
|
||||||
|
opts.reference = args[1]
|
||||||
|
}
|
||||||
|
return runImport(dockerCli, opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
|
||||||
|
flags.StringSliceVarP(&opts.changes, "change", "c", []string{}, "Apply Dockerfile instruction to the created image")
|
||||||
|
flags.StringVarP(&opts.message, "message", "m", "", "Set commit message for imported image")
|
||||||
|
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runImport(dockerCli *client.DockerCli, opts importOptions) error {
|
||||||
|
var (
|
||||||
|
in io.Reader
|
||||||
|
srcName = opts.source
|
||||||
|
)
|
||||||
|
|
||||||
|
if opts.source == "-" {
|
||||||
|
in = dockerCli.In()
|
||||||
|
} else if !urlutil.IsURL(opts.source) {
|
||||||
|
srcName = "-"
|
||||||
|
file, err := os.Open(opts.source)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer file.Close()
|
||||||
|
in = file
|
||||||
|
}
|
||||||
|
|
||||||
|
source := types.ImageImportSource{
|
||||||
|
Source: in,
|
||||||
|
SourceName: srcName,
|
||||||
|
}
|
||||||
|
|
||||||
|
options := types.ImageImportOptions{
|
||||||
|
Message: opts.message,
|
||||||
|
Changes: opts.changes,
|
||||||
|
}
|
||||||
|
|
||||||
|
clnt := dockerCli.Client()
|
||||||
|
|
||||||
|
responseBody, err := clnt.ImageImport(context.Background(), source, opts.reference, options)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer responseBody.Close()
|
||||||
|
|
||||||
|
return jsonmessage.DisplayJSONMessagesStream(responseBody, dockerCli.Out(), dockerCli.OutFd(), dockerCli.IsTerminalOut(), nil)
|
||||||
|
}
|
67
api/client/image/load.go
Normal file
67
api/client/image/load.go
Normal file
|
@ -0,0 +1,67 @@
|
||||||
|
package image
|
||||||
|
|
||||||
|
import (
|
||||||
|
"io"
|
||||||
|
"os"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/docker/docker/pkg/jsonmessage"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type loadOptions struct {
|
||||||
|
input string
|
||||||
|
quiet bool
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewLoadCommand creates a new `docker load` command
|
||||||
|
func NewLoadCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts loadOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "load [OPTIONS]",
|
||||||
|
Short: "Load an image from a tar archive or STDIN",
|
||||||
|
Args: cli.NoArgs,
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
return runLoad(dockerCli, opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
|
||||||
|
flags.StringVarP(&opts.input, "input", "i", "", "Read from tar archive file, instead of STDIN")
|
||||||
|
flags.BoolVarP(&opts.quiet, "quiet", "q", false, "Suppress the load output")
|
||||||
|
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runLoad(dockerCli *client.DockerCli, opts loadOptions) error {
|
||||||
|
|
||||||
|
var input io.Reader = dockerCli.In()
|
||||||
|
if opts.input != "" {
|
||||||
|
file, err := os.Open(opts.input)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer file.Close()
|
||||||
|
input = file
|
||||||
|
}
|
||||||
|
if !dockerCli.IsTerminalOut() {
|
||||||
|
opts.quiet = true
|
||||||
|
}
|
||||||
|
response, err := dockerCli.Client().ImageLoad(context.Background(), input, opts.quiet)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer response.Body.Close()
|
||||||
|
|
||||||
|
if response.Body != nil && response.JSON {
|
||||||
|
return jsonmessage.DisplayJSONMessagesStream(response.Body, dockerCli.Out(), dockerCli.OutFd(), dockerCli.IsTerminalOut(), nil)
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err = io.Copy(dockerCli.Out(), response.Body)
|
||||||
|
return err
|
||||||
|
}
|
89
api/client/image/pull.go
Normal file
89
api/client/image/pull.go
Normal file
|
@ -0,0 +1,89 @@
|
||||||
|
package image
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/docker/docker/reference"
|
||||||
|
"github.com/docker/docker/registry"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type pullOptions struct {
|
||||||
|
remote string
|
||||||
|
all bool
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewPullCommand creates a new `docker pull` command
|
||||||
|
func NewPullCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts pullOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "pull [OPTIONS] NAME[:TAG|@DIGEST]",
|
||||||
|
Short: "Pull an image or a repository from a registry",
|
||||||
|
Args: cli.ExactArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.remote = args[0]
|
||||||
|
return runPull(dockerCli, opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
|
||||||
|
flags.BoolVarP(&opts.all, "all-tags", "a", false, "Download all tagged images in the repository")
|
||||||
|
client.AddTrustedFlags(flags, true)
|
||||||
|
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runPull(dockerCli *client.DockerCli, opts pullOptions) error {
|
||||||
|
distributionRef, err := reference.ParseNamed(opts.remote)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
if opts.all && !reference.IsNameOnly(distributionRef) {
|
||||||
|
return errors.New("tag can't be used with --all-tags/-a")
|
||||||
|
}
|
||||||
|
|
||||||
|
if !opts.all && reference.IsNameOnly(distributionRef) {
|
||||||
|
distributionRef = reference.WithDefaultTag(distributionRef)
|
||||||
|
fmt.Fprintf(dockerCli.Out(), "Using default tag: %s\n", reference.DefaultTag)
|
||||||
|
}
|
||||||
|
|
||||||
|
var tag string
|
||||||
|
switch x := distributionRef.(type) {
|
||||||
|
case reference.Canonical:
|
||||||
|
tag = x.Digest().String()
|
||||||
|
case reference.NamedTagged:
|
||||||
|
tag = x.Tag()
|
||||||
|
}
|
||||||
|
|
||||||
|
registryRef := registry.ParseReference(tag)
|
||||||
|
|
||||||
|
// Resolve the Repository name from fqn to RepositoryInfo
|
||||||
|
repoInfo, err := registry.ParseRepositoryInfo(distributionRef)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
authConfig := dockerCli.ResolveAuthConfig(ctx, repoInfo.Index)
|
||||||
|
requestPrivilege := dockerCli.RegistryAuthenticationPrivilegedFunc(repoInfo.Index, "pull")
|
||||||
|
|
||||||
|
if client.IsTrusted() && !registryRef.HasDigest() {
|
||||||
|
// Check if tag is digest
|
||||||
|
err = dockerCli.TrustedPull(ctx, repoInfo, registryRef, authConfig, requestPrivilege)
|
||||||
|
} else {
|
||||||
|
err = dockerCli.ImagePullPrivileged(ctx, authConfig, distributionRef.String(), requestPrivilege, opts.all)
|
||||||
|
}
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return nil
|
||||||
|
}
|
62
api/client/image/push.go
Normal file
62
api/client/image/push.go
Normal file
|
@ -0,0 +1,62 @@
|
||||||
|
package image
|
||||||
|
|
||||||
|
import (
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/docker/docker/pkg/jsonmessage"
|
||||||
|
"github.com/docker/docker/reference"
|
||||||
|
"github.com/docker/docker/registry"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
// NewPushCommand creates a new `docker push` command
|
||||||
|
func NewPushCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "push [OPTIONS] NAME[:TAG]",
|
||||||
|
Short: "Push an image or a repository to a registry",
|
||||||
|
Args: cli.ExactArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
return runPush(dockerCli, args[0])
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
|
||||||
|
client.AddTrustedFlags(flags, true)
|
||||||
|
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runPush(dockerCli *client.DockerCli, remote string) error {
|
||||||
|
ref, err := reference.ParseNamed(remote)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// Resolve the Repository name from fqn to RepositoryInfo
|
||||||
|
repoInfo, err := registry.ParseRepositoryInfo(ref)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
// Resolve the Auth config relevant for this server
|
||||||
|
authConfig := dockerCli.ResolveAuthConfig(ctx, repoInfo.Index)
|
||||||
|
requestPrivilege := dockerCli.RegistryAuthenticationPrivilegedFunc(repoInfo.Index, "push")
|
||||||
|
|
||||||
|
if client.IsTrusted() {
|
||||||
|
return dockerCli.TrustedPush(ctx, repoInfo, ref, authConfig, requestPrivilege)
|
||||||
|
}
|
||||||
|
|
||||||
|
responseBody, err := dockerCli.ImagePushPrivileged(ctx, authConfig, ref.String(), requestPrivilege)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
defer responseBody.Close()
|
||||||
|
|
||||||
|
return jsonmessage.DisplayJSONMessagesStream(responseBody, dockerCli.Out(), dockerCli.OutFd(), dockerCli.IsTerminalOut(), nil)
|
||||||
|
}
|
70
api/client/image/remove.go
Normal file
70
api/client/image/remove.go
Normal file
|
@ -0,0 +1,70 @@
|
||||||
|
package image
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type removeOptions struct {
|
||||||
|
force bool
|
||||||
|
noPrune bool
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewRemoveCommand create a new `docker remove` command
|
||||||
|
func NewRemoveCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts removeOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "rmi [OPTIONS] IMAGE [IMAGE...]",
|
||||||
|
Short: "Remove one or more images",
|
||||||
|
Args: cli.RequiresMinArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
return runRemove(dockerCli, opts, args)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
|
||||||
|
flags.BoolVarP(&opts.force, "force", "f", false, "Force removal of the image")
|
||||||
|
flags.BoolVar(&opts.noPrune, "no-prune", false, "Do not delete untagged parents")
|
||||||
|
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runRemove(dockerCli *client.DockerCli, opts removeOptions, images []string) error {
|
||||||
|
client := dockerCli.Client()
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
options := types.ImageRemoveOptions{
|
||||||
|
Force: opts.force,
|
||||||
|
PruneChildren: !opts.noPrune,
|
||||||
|
}
|
||||||
|
|
||||||
|
var errs []string
|
||||||
|
for _, image := range images {
|
||||||
|
dels, err := client.ImageRemove(ctx, image, options)
|
||||||
|
if err != nil {
|
||||||
|
errs = append(errs, err.Error())
|
||||||
|
} else {
|
||||||
|
for _, del := range dels {
|
||||||
|
if del.Deleted != "" {
|
||||||
|
fmt.Fprintf(dockerCli.Out(), "Deleted: %s\n", del.Deleted)
|
||||||
|
} else {
|
||||||
|
fmt.Fprintf(dockerCli.Out(), "Untagged: %s\n", del.Untagged)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(errs) > 0 {
|
||||||
|
return fmt.Errorf("%s", strings.Join(errs, "\n"))
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
57
api/client/image/save.go
Normal file
57
api/client/image/save.go
Normal file
|
@ -0,0 +1,57 @@
|
||||||
|
package image
|
||||||
|
|
||||||
|
import (
|
||||||
|
"errors"
|
||||||
|
"io"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type saveOptions struct {
|
||||||
|
images []string
|
||||||
|
output string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewSaveCommand creates a new `docker save` command
|
||||||
|
func NewSaveCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts saveOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "save [OPTIONS] IMAGE [IMAGE...]",
|
||||||
|
Short: "Save one or more images to a tar archive (streamed to STDOUT by default)",
|
||||||
|
Args: cli.RequiresMinArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.images = args
|
||||||
|
return runSave(dockerCli, opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
|
||||||
|
flags.StringVarP(&opts.output, "output", "o", "", "Write to a file, instead of STDOUT")
|
||||||
|
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runSave(dockerCli *client.DockerCli, opts saveOptions) error {
|
||||||
|
if opts.output == "" && dockerCli.IsTerminalOut() {
|
||||||
|
return errors.New("Cowardly refusing to save to a terminal. Use the -o flag or redirect.")
|
||||||
|
}
|
||||||
|
|
||||||
|
responseBody, err := dockerCli.Client().ImageSave(context.Background(), opts.images)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
defer responseBody.Close()
|
||||||
|
|
||||||
|
if opts.output == "" {
|
||||||
|
_, err := io.Copy(dockerCli.Out(), responseBody)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
return client.CopyToFile(opts.output, responseBody)
|
||||||
|
}
|
135
api/client/image/search.go
Normal file
135
api/client/image/search.go
Normal file
|
@ -0,0 +1,135 @@
|
||||||
|
package image
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"sort"
|
||||||
|
"strings"
|
||||||
|
"text/tabwriter"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/docker/docker/pkg/stringutils"
|
||||||
|
"github.com/docker/docker/registry"
|
||||||
|
"github.com/docker/engine-api/types"
|
||||||
|
"github.com/docker/engine-api/types/filters"
|
||||||
|
registrytypes "github.com/docker/engine-api/types/registry"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type searchOptions struct {
|
||||||
|
term string
|
||||||
|
noTrunc bool
|
||||||
|
limit int
|
||||||
|
filter []string
|
||||||
|
|
||||||
|
// Deprecated
|
||||||
|
stars uint
|
||||||
|
automated bool
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewSearchCommand create a new `docker search` command
|
||||||
|
func NewSearchCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts searchOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "search [OPTIONS] TERM",
|
||||||
|
Short: "Search the Docker Hub for images",
|
||||||
|
Args: cli.ExactArgs(1),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.term = args[0]
|
||||||
|
return runSearch(dockerCli, opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
|
||||||
|
flags.BoolVar(&opts.noTrunc, "no-trunc", false, "Don't truncate output")
|
||||||
|
flags.StringSliceVarP(&opts.filter, "filter", "f", []string{}, "Filter output based on conditions provided")
|
||||||
|
flags.IntVar(&opts.limit, "limit", registry.DefaultSearchLimit, "Max number of search results")
|
||||||
|
|
||||||
|
flags.BoolVar(&opts.automated, "automated", false, "Only show automated builds")
|
||||||
|
flags.UintVarP(&opts.stars, "stars", "s", 0, "Only displays with at least x stars")
|
||||||
|
|
||||||
|
flags.MarkDeprecated("automated", "use --filter=automated=true instead")
|
||||||
|
flags.MarkDeprecated("stars", "use --filter=stars=3 instead")
|
||||||
|
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runSearch(dockerCli *client.DockerCli, opts searchOptions) error {
|
||||||
|
indexInfo, err := registry.ParseSearchIndexInfo(opts.term)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
authConfig := dockerCli.ResolveAuthConfig(ctx, indexInfo)
|
||||||
|
requestPrivilege := dockerCli.RegistryAuthenticationPrivilegedFunc(indexInfo, "search")
|
||||||
|
|
||||||
|
encodedAuth, err := client.EncodeAuthToBase64(authConfig)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
searchFilters := filters.NewArgs()
|
||||||
|
for _, f := range opts.filter {
|
||||||
|
var err error
|
||||||
|
searchFilters, err = filters.ParseFlag(f, searchFilters)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
options := types.ImageSearchOptions{
|
||||||
|
RegistryAuth: encodedAuth,
|
||||||
|
PrivilegeFunc: requestPrivilege,
|
||||||
|
Filters: searchFilters,
|
||||||
|
Limit: opts.limit,
|
||||||
|
}
|
||||||
|
|
||||||
|
clnt := dockerCli.Client()
|
||||||
|
|
||||||
|
unorderedResults, err := clnt.ImageSearch(ctx, opts.term, options)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
results := searchResultsByStars(unorderedResults)
|
||||||
|
sort.Sort(results)
|
||||||
|
|
||||||
|
w := tabwriter.NewWriter(dockerCli.Out(), 10, 1, 3, ' ', 0)
|
||||||
|
fmt.Fprintf(w, "NAME\tDESCRIPTION\tSTARS\tOFFICIAL\tAUTOMATED\n")
|
||||||
|
for _, res := range results {
|
||||||
|
// --automated and -s, --stars are deprecated since Docker 1.12
|
||||||
|
if (opts.automated && !res.IsAutomated) || (int(opts.stars) > res.StarCount) {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
desc := strings.Replace(res.Description, "\n", " ", -1)
|
||||||
|
desc = strings.Replace(desc, "\r", " ", -1)
|
||||||
|
if !opts.noTrunc && len(desc) > 45 {
|
||||||
|
desc = stringutils.Truncate(desc, 42) + "..."
|
||||||
|
}
|
||||||
|
fmt.Fprintf(w, "%s\t%s\t%d\t", res.Name, desc, res.StarCount)
|
||||||
|
if res.IsOfficial {
|
||||||
|
fmt.Fprint(w, "[OK]")
|
||||||
|
|
||||||
|
}
|
||||||
|
fmt.Fprint(w, "\t")
|
||||||
|
if res.IsAutomated {
|
||||||
|
fmt.Fprint(w, "[OK]")
|
||||||
|
}
|
||||||
|
fmt.Fprint(w, "\n")
|
||||||
|
}
|
||||||
|
w.Flush()
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// SearchResultsByStars sorts search results in descending order by number of stars.
|
||||||
|
type searchResultsByStars []registrytypes.SearchResult
|
||||||
|
|
||||||
|
func (r searchResultsByStars) Len() int { return len(r) }
|
||||||
|
func (r searchResultsByStars) Swap(i, j int) { r[i], r[j] = r[j], r[i] }
|
||||||
|
func (r searchResultsByStars) Less(i, j int) bool { return r[j].StarCount < r[i].StarCount }
|
41
api/client/image/tag.go
Normal file
41
api/client/image/tag.go
Normal file
|
@ -0,0 +1,41 @@
|
||||||
|
package image
|
||||||
|
|
||||||
|
import (
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/spf13/cobra"
|
||||||
|
)
|
||||||
|
|
||||||
|
type tagOptions struct {
|
||||||
|
image string
|
||||||
|
name string
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewTagCommand create a new `docker tag` command
|
||||||
|
func NewTagCommand(dockerCli *client.DockerCli) *cobra.Command {
|
||||||
|
var opts tagOptions
|
||||||
|
|
||||||
|
cmd := &cobra.Command{
|
||||||
|
Use: "tag IMAGE[:TAG] IMAGE[:TAG]",
|
||||||
|
Short: "Tag an image into a repository",
|
||||||
|
Args: cli.ExactArgs(2),
|
||||||
|
RunE: func(cmd *cobra.Command, args []string) error {
|
||||||
|
opts.image = args[0]
|
||||||
|
opts.name = args[1]
|
||||||
|
return runTag(dockerCli, opts)
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
flags := cmd.Flags()
|
||||||
|
flags.SetInterspersed(false)
|
||||||
|
|
||||||
|
return cmd
|
||||||
|
}
|
||||||
|
|
||||||
|
func runTag(dockerCli *client.DockerCli, opts tagOptions) error {
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
return dockerCli.Client().ImageTag(ctx, opts.image, opts.name)
|
||||||
|
}
|
215
api/client/info.go
Normal file
215
api/client/info.go
Normal file
|
@ -0,0 +1,215 @@
|
||||||
|
package client
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
"strings"
|
||||||
|
"time"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
Cli "github.com/docker/docker/cli"
|
||||||
|
"github.com/docker/docker/pkg/ioutils"
|
||||||
|
flag "github.com/docker/docker/pkg/mflag"
|
||||||
|
"github.com/docker/docker/utils"
|
||||||
|
"github.com/docker/engine-api/types/swarm"
|
||||||
|
"github.com/docker/go-units"
|
||||||
|
)
|
||||||
|
|
||||||
|
// CmdInfo displays system-wide information.
|
||||||
|
//
|
||||||
|
// Usage: docker info
|
||||||
|
func (cli *DockerCli) CmdInfo(args ...string) error {
|
||||||
|
cmd := Cli.Subcmd("info", nil, Cli.DockerCommands["info"].Description, true)
|
||||||
|
cmd.Require(flag.Exact, 0)
|
||||||
|
|
||||||
|
cmd.ParseFlags(args, true)
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
info, err := cli.client.Info(ctx)
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
fmt.Fprintf(cli.out, "Containers: %d\n", info.Containers)
|
||||||
|
fmt.Fprintf(cli.out, " Running: %d\n", info.ContainersRunning)
|
||||||
|
fmt.Fprintf(cli.out, " Paused: %d\n", info.ContainersPaused)
|
||||||
|
fmt.Fprintf(cli.out, " Stopped: %d\n", info.ContainersStopped)
|
||||||
|
fmt.Fprintf(cli.out, "Images: %d\n", info.Images)
|
||||||
|
ioutils.FprintfIfNotEmpty(cli.out, "Server Version: %s\n", info.ServerVersion)
|
||||||
|
ioutils.FprintfIfNotEmpty(cli.out, "Storage Driver: %s\n", info.Driver)
|
||||||
|
if info.DriverStatus != nil {
|
||||||
|
for _, pair := range info.DriverStatus {
|
||||||
|
fmt.Fprintf(cli.out, " %s: %s\n", pair[0], pair[1])
|
||||||
|
|
||||||
|
// print a warning if devicemapper is using a loopback file
|
||||||
|
if pair[0] == "Data loop file" {
|
||||||
|
fmt.Fprintln(cli.err, " WARNING: Usage of loopback devices is strongly discouraged for production use. Use `--storage-opt dm.thinpooldev` to specify a custom block storage device.")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
}
|
||||||
|
if info.SystemStatus != nil {
|
||||||
|
for _, pair := range info.SystemStatus {
|
||||||
|
fmt.Fprintf(cli.out, "%s: %s\n", pair[0], pair[1])
|
||||||
|
}
|
||||||
|
}
|
||||||
|
ioutils.FprintfIfNotEmpty(cli.out, "Logging Driver: %s\n", info.LoggingDriver)
|
||||||
|
ioutils.FprintfIfNotEmpty(cli.out, "Cgroup Driver: %s\n", info.CgroupDriver)
|
||||||
|
|
||||||
|
fmt.Fprintf(cli.out, "Plugins:\n")
|
||||||
|
fmt.Fprintf(cli.out, " Volume:")
|
||||||
|
fmt.Fprintf(cli.out, " %s", strings.Join(info.Plugins.Volume, " "))
|
||||||
|
fmt.Fprintf(cli.out, "\n")
|
||||||
|
fmt.Fprintf(cli.out, " Network:")
|
||||||
|
fmt.Fprintf(cli.out, " %s", strings.Join(info.Plugins.Network, " "))
|
||||||
|
fmt.Fprintf(cli.out, "\n")
|
||||||
|
|
||||||
|
if len(info.Plugins.Authorization) != 0 {
|
||||||
|
fmt.Fprintf(cli.out, " Authorization:")
|
||||||
|
fmt.Fprintf(cli.out, " %s", strings.Join(info.Plugins.Authorization, " "))
|
||||||
|
fmt.Fprintf(cli.out, "\n")
|
||||||
|
}
|
||||||
|
|
||||||
|
fmt.Fprintf(cli.out, "Swarm: %v\n", info.Swarm.LocalNodeState)
|
||||||
|
if info.Swarm.LocalNodeState != swarm.LocalNodeStateInactive {
|
||||||
|
fmt.Fprintf(cli.out, " NodeID: %s\n", info.Swarm.NodeID)
|
||||||
|
if info.Swarm.Error != "" {
|
||||||
|
fmt.Fprintf(cli.out, " Error: %v\n", info.Swarm.Error)
|
||||||
|
}
|
||||||
|
fmt.Fprintf(cli.out, " Is Manager: %v\n", info.Swarm.ControlAvailable)
|
||||||
|
if info.Swarm.ControlAvailable {
|
||||||
|
fmt.Fprintf(cli.out, " ClusterID: %s\n", info.Swarm.Cluster.ID)
|
||||||
|
fmt.Fprintf(cli.out, " Managers: %d\n", info.Swarm.Managers)
|
||||||
|
fmt.Fprintf(cli.out, " Nodes: %d\n", info.Swarm.Nodes)
|
||||||
|
fmt.Fprintf(cli.out, " Orchestration:\n")
|
||||||
|
fmt.Fprintf(cli.out, " Task History Retention Limit: %d\n", info.Swarm.Cluster.Spec.Orchestration.TaskHistoryRetentionLimit)
|
||||||
|
fmt.Fprintf(cli.out, " Raft:\n")
|
||||||
|
fmt.Fprintf(cli.out, " Snapshot Interval: %d\n", info.Swarm.Cluster.Spec.Raft.SnapshotInterval)
|
||||||
|
fmt.Fprintf(cli.out, " Heartbeat Tick: %d\n", info.Swarm.Cluster.Spec.Raft.HeartbeatTick)
|
||||||
|
fmt.Fprintf(cli.out, " Election Tick: %d\n", info.Swarm.Cluster.Spec.Raft.ElectionTick)
|
||||||
|
fmt.Fprintf(cli.out, " Dispatcher:\n")
|
||||||
|
fmt.Fprintf(cli.out, " Heartbeat Period: %s\n", units.HumanDuration(time.Duration(info.Swarm.Cluster.Spec.Dispatcher.HeartbeatPeriod)))
|
||||||
|
fmt.Fprintf(cli.out, " CA Configuration:\n")
|
||||||
|
fmt.Fprintf(cli.out, " Expiry Duration: %s\n", units.HumanDuration(info.Swarm.Cluster.Spec.CAConfig.NodeCertExpiry))
|
||||||
|
if len(info.Swarm.Cluster.Spec.CAConfig.ExternalCAs) > 0 {
|
||||||
|
fmt.Fprintf(cli.out, " External CAs:\n")
|
||||||
|
for _, entry := range info.Swarm.Cluster.Spec.CAConfig.ExternalCAs {
|
||||||
|
fmt.Fprintf(cli.out, " %s: %s\n", entry.Protocol, entry.URL)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
fmt.Fprintf(cli.out, " Node Address: %s\n", info.Swarm.NodeAddr)
|
||||||
|
}
|
||||||
|
|
||||||
|
if len(info.Runtimes) > 0 {
|
||||||
|
fmt.Fprintf(cli.out, "Runtimes:")
|
||||||
|
for name := range info.Runtimes {
|
||||||
|
fmt.Fprintf(cli.out, " %s", name)
|
||||||
|
}
|
||||||
|
fmt.Fprint(cli.out, "\n")
|
||||||
|
fmt.Fprintf(cli.out, "Default Runtime: %s\n", info.DefaultRuntime)
|
||||||
|
}
|
||||||
|
|
||||||
|
fmt.Fprintf(cli.out, "Security Options:")
|
||||||
|
ioutils.FprintfIfNotEmpty(cli.out, " %s", strings.Join(info.SecurityOptions, " "))
|
||||||
|
fmt.Fprintf(cli.out, "\n")
|
||||||
|
|
||||||
|
ioutils.FprintfIfNotEmpty(cli.out, "Kernel Version: %s\n", info.KernelVersion)
|
||||||
|
ioutils.FprintfIfNotEmpty(cli.out, "Operating System: %s\n", info.OperatingSystem)
|
||||||
|
ioutils.FprintfIfNotEmpty(cli.out, "OSType: %s\n", info.OSType)
|
||||||
|
ioutils.FprintfIfNotEmpty(cli.out, "Architecture: %s\n", info.Architecture)
|
||||||
|
fmt.Fprintf(cli.out, "CPUs: %d\n", info.NCPU)
|
||||||
|
fmt.Fprintf(cli.out, "Total Memory: %s\n", units.BytesSize(float64(info.MemTotal)))
|
||||||
|
ioutils.FprintfIfNotEmpty(cli.out, "Name: %s\n", info.Name)
|
||||||
|
ioutils.FprintfIfNotEmpty(cli.out, "ID: %s\n", info.ID)
|
||||||
|
fmt.Fprintf(cli.out, "Docker Root Dir: %s\n", info.DockerRootDir)
|
||||||
|
fmt.Fprintf(cli.out, "Debug Mode (client): %v\n", utils.IsDebugEnabled())
|
||||||
|
fmt.Fprintf(cli.out, "Debug Mode (server): %v\n", info.Debug)
|
||||||
|
|
||||||
|
if info.Debug {
|
||||||
|
fmt.Fprintf(cli.out, " File Descriptors: %d\n", info.NFd)
|
||||||
|
fmt.Fprintf(cli.out, " Goroutines: %d\n", info.NGoroutines)
|
||||||
|
fmt.Fprintf(cli.out, " System Time: %s\n", info.SystemTime)
|
||||||
|
fmt.Fprintf(cli.out, " EventsListeners: %d\n", info.NEventsListener)
|
||||||
|
}
|
||||||
|
|
||||||
|
ioutils.FprintfIfNotEmpty(cli.out, "Http Proxy: %s\n", info.HTTPProxy)
|
||||||
|
ioutils.FprintfIfNotEmpty(cli.out, "Https Proxy: %s\n", info.HTTPSProxy)
|
||||||
|
ioutils.FprintfIfNotEmpty(cli.out, "No Proxy: %s\n", info.NoProxy)
|
||||||
|
|
||||||
|
if info.IndexServerAddress != "" {
|
||||||
|
u := cli.configFile.AuthConfigs[info.IndexServerAddress].Username
|
||||||
|
if len(u) > 0 {
|
||||||
|
fmt.Fprintf(cli.out, "Username: %v\n", u)
|
||||||
|
}
|
||||||
|
fmt.Fprintf(cli.out, "Registry: %v\n", info.IndexServerAddress)
|
||||||
|
}
|
||||||
|
|
||||||
|
// Only output these warnings if the server does not support these features
|
||||||
|
if info.OSType != "windows" {
|
||||||
|
if !info.MemoryLimit {
|
||||||
|
fmt.Fprintln(cli.err, "WARNING: No memory limit support")
|
||||||
|
}
|
||||||
|
if !info.SwapLimit {
|
||||||
|
fmt.Fprintln(cli.err, "WARNING: No swap limit support")
|
||||||
|
}
|
||||||
|
if !info.KernelMemory {
|
||||||
|
fmt.Fprintln(cli.err, "WARNING: No kernel memory limit support")
|
||||||
|
}
|
||||||
|
if !info.OomKillDisable {
|
||||||
|
fmt.Fprintln(cli.err, "WARNING: No oom kill disable support")
|
||||||
|
}
|
||||||
|
if !info.CPUCfsQuota {
|
||||||
|
fmt.Fprintln(cli.err, "WARNING: No cpu cfs quota support")
|
||||||
|
}
|
||||||
|
if !info.CPUCfsPeriod {
|
||||||
|
fmt.Fprintln(cli.err, "WARNING: No cpu cfs period support")
|
||||||
|
}
|
||||||
|
if !info.CPUShares {
|
||||||
|
fmt.Fprintln(cli.err, "WARNING: No cpu shares support")
|
||||||
|
}
|
||||||
|
if !info.CPUSet {
|
||||||
|
fmt.Fprintln(cli.err, "WARNING: No cpuset support")
|
||||||
|
}
|
||||||
|
if !info.IPv4Forwarding {
|
||||||
|
fmt.Fprintln(cli.err, "WARNING: IPv4 forwarding is disabled")
|
||||||
|
}
|
||||||
|
if !info.BridgeNfIptables {
|
||||||
|
fmt.Fprintln(cli.err, "WARNING: bridge-nf-call-iptables is disabled")
|
||||||
|
}
|
||||||
|
if !info.BridgeNfIP6tables {
|
||||||
|
fmt.Fprintln(cli.err, "WARNING: bridge-nf-call-ip6tables is disabled")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if info.Labels != nil {
|
||||||
|
fmt.Fprintln(cli.out, "Labels:")
|
||||||
|
for _, attribute := range info.Labels {
|
||||||
|
fmt.Fprintf(cli.out, " %s\n", attribute)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
ioutils.FprintfIfTrue(cli.out, "Experimental: %v\n", info.ExperimentalBuild)
|
||||||
|
if info.ClusterStore != "" {
|
||||||
|
fmt.Fprintf(cli.out, "Cluster Store: %s\n", info.ClusterStore)
|
||||||
|
}
|
||||||
|
|
||||||
|
if info.ClusterAdvertise != "" {
|
||||||
|
fmt.Fprintf(cli.out, "Cluster Advertise: %s\n", info.ClusterAdvertise)
|
||||||
|
}
|
||||||
|
|
||||||
|
if info.RegistryConfig != nil && (len(info.RegistryConfig.InsecureRegistryCIDRs) > 0 || len(info.RegistryConfig.IndexConfigs) > 0) {
|
||||||
|
fmt.Fprintln(cli.out, "Insecure Registries:")
|
||||||
|
for _, registry := range info.RegistryConfig.IndexConfigs {
|
||||||
|
if registry.Secure == false {
|
||||||
|
fmt.Fprintf(cli.out, " %s\n", registry.Name)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
for _, registry := range info.RegistryConfig.InsecureRegistryCIDRs {
|
||||||
|
mask, _ := registry.Mask.Size()
|
||||||
|
fmt.Fprintf(cli.out, " %s/%d\n", registry.IP.String(), mask)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
95
api/client/inspect.go
Normal file
95
api/client/inspect.go
Normal file
|
@ -0,0 +1,95 @@
|
||||||
|
package client
|
||||||
|
|
||||||
|
import (
|
||||||
|
"fmt"
|
||||||
|
|
||||||
|
"golang.org/x/net/context"
|
||||||
|
|
||||||
|
"github.com/docker/docker/api/client/inspect"
|
||||||
|
Cli "github.com/docker/docker/cli"
|
||||||
|
flag "github.com/docker/docker/pkg/mflag"
|
||||||
|
"github.com/docker/engine-api/client"
|
||||||
|
)
|
||||||
|
|
||||||
|
// CmdInspect displays low-level information on one or more containers, images or tasks.
|
||||||
|
//
|
||||||
|
// Usage: docker inspect [OPTIONS] CONTAINER|IMAGE|TASK [CONTAINER|IMAGE|TASK...]
|
||||||
|
func (cli *DockerCli) CmdInspect(args ...string) error {
|
||||||
|
cmd := Cli.Subcmd("inspect", []string{"[OPTIONS] CONTAINER|IMAGE|TASK [CONTAINER|IMAGE|TASK...]"}, Cli.DockerCommands["inspect"].Description, true)
|
||||||
|
tmplStr := cmd.String([]string{"f", "-format"}, "", "Format the output using the given go template")
|
||||||
|
inspectType := cmd.String([]string{"-type"}, "", "Return JSON for specified type, (e.g image, container or task)")
|
||||||
|
size := cmd.Bool([]string{"s", "-size"}, false, "Display total file sizes if the type is container")
|
||||||
|
cmd.Require(flag.Min, 1)
|
||||||
|
|
||||||
|
cmd.ParseFlags(args, true)
|
||||||
|
|
||||||
|
if *inspectType != "" && *inspectType != "container" && *inspectType != "image" && *inspectType != "task" {
|
||||||
|
return fmt.Errorf("%q is not a valid value for --type", *inspectType)
|
||||||
|
}
|
||||||
|
|
||||||
|
ctx := context.Background()
|
||||||
|
|
||||||
|
var elementSearcher inspect.GetRefFunc
|
||||||
|
switch *inspectType {
|
||||||
|
case "container":
|
||||||
|
elementSearcher = cli.inspectContainers(ctx, *size)
|
||||||
|
case "image":
|
||||||
|
elementSearcher = cli.inspectImages(ctx, *size)
|
||||||
|
case "task":
|
||||||
|
if *size {
|
||||||
|
fmt.Fprintln(cli.err, "WARNING: --size ignored for tasks")
|
||||||
|
}
|
||||||
|
elementSearcher = cli.inspectTasks(ctx)
|
||||||
|
default:
|
||||||
|
elementSearcher = cli.inspectAll(ctx, *size)
|
||||||
|
}
|
||||||
|
|
||||||
|
return inspect.Inspect(cli.out, cmd.Args(), *tmplStr, elementSearcher)
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cli *DockerCli) inspectContainers(ctx context.Context, getSize bool) inspect.GetRefFunc {
|
||||||
|
return func(ref string) (interface{}, []byte, error) {
|
||||||
|
return cli.client.ContainerInspectWithRaw(ctx, ref, getSize)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cli *DockerCli) inspectImages(ctx context.Context, getSize bool) inspect.GetRefFunc {
|
||||||
|
return func(ref string) (interface{}, []byte, error) {
|
||||||
|
return cli.client.ImageInspectWithRaw(ctx, ref, getSize)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cli *DockerCli) inspectTasks(ctx context.Context) inspect.GetRefFunc {
|
||||||
|
return func(ref string) (interface{}, []byte, error) {
|
||||||
|
return cli.client.TaskInspectWithRaw(ctx, ref)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
func (cli *DockerCli) inspectAll(ctx context.Context, getSize bool) inspect.GetRefFunc {
|
||||||
|
return func(ref string) (interface{}, []byte, error) {
|
||||||
|
c, rawContainer, err := cli.client.ContainerInspectWithRaw(ctx, ref, getSize)
|
||||||
|
if err != nil {
|
||||||
|
// Search for image with that id if a container doesn't exist.
|
||||||
|
if client.IsErrContainerNotFound(err) {
|
||||||
|
i, rawImage, err := cli.client.ImageInspectWithRaw(ctx, ref, getSize)
|
||||||
|
if err != nil {
|
||||||
|
if client.IsErrImageNotFound(err) {
|
||||||
|
// Search for task with that id if an image doesn't exists.
|
||||||
|
t, rawTask, err := cli.client.TaskInspectWithRaw(ctx, ref)
|
||||||
|
if err != nil {
|
||||||
|
return nil, nil, fmt.Errorf("Error: No such image, container or task: %s", ref)
|
||||||
|
}
|
||||||
|
if getSize {
|
||||||
|
fmt.Fprintln(cli.err, "WARNING: --size ignored for tasks")
|
||||||
|
}
|
||||||
|
return t, rawTask, nil
|
||||||
|
}
|
||||||
|
return nil, nil, err
|
||||||
|
}
|
||||||
|
return i, rawImage, nil
|
||||||
|
}
|
||||||
|
return nil, nil, err
|
||||||
|
}
|
||||||
|
return c, rawContainer, nil
|
||||||
|
}
|
||||||
|
}
|
195
api/client/inspect/inspector.go
Normal file
195
api/client/inspect/inspector.go
Normal file
|
@ -0,0 +1,195 @@
|
||||||
|
package inspect
|
||||||
|
|
||||||
|
import (
|
||||||
|
"bytes"
|
||||||
|
"encoding/json"
|
||||||
|
"fmt"
|
||||||
|
"io"
|
||||||
|
"text/template"
|
||||||
|
|
||||||
|
"github.com/Sirupsen/logrus"
|
||||||
|
"github.com/docker/docker/cli"
|
||||||
|
"github.com/docker/docker/utils/templates"
|
||||||
|
)
|
||||||
|
|
||||||
|
// Inspector defines an interface to implement to process elements
|
||||||
|
type Inspector interface {
|
||||||
|
Inspect(typedElement interface{}, rawElement []byte) error
|
||||||
|
Flush() error
|
||||||
|
}
|
||||||
|
|
||||||
|
// TemplateInspector uses a text template to inspect elements.
|
||||||
|
type TemplateInspector struct {
|
||||||
|
outputStream io.Writer
|
||||||
|
buffer *bytes.Buffer
|
||||||
|
tmpl *template.Template
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewTemplateInspector creates a new inspector with a template.
|
||||||
|
func NewTemplateInspector(outputStream io.Writer, tmpl *template.Template) Inspector {
|
||||||
|
return &TemplateInspector{
|
||||||
|
outputStream: outputStream,
|
||||||
|
buffer: new(bytes.Buffer),
|
||||||
|
tmpl: tmpl,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewTemplateInspectorFromString creates a new TemplateInspector from a string
|
||||||
|
// which is compiled into a template.
|
||||||
|
func NewTemplateInspectorFromString(out io.Writer, tmplStr string) (Inspector, error) {
|
||||||
|
if tmplStr == "" {
|
||||||
|
return NewIndentedInspector(out), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
tmpl, err := templates.Parse(tmplStr)
|
||||||
|
if err != nil {
|
||||||
|
return nil, fmt.Errorf("Template parsing error: %s", err)
|
||||||
|
}
|
||||||
|
return NewTemplateInspector(out, tmpl), nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// GetRefFunc is a function which used by Inspect to fetch an object from a
|
||||||
|
// reference
|
||||||
|
type GetRefFunc func(ref string) (interface{}, []byte, error)
|
||||||
|
|
||||||
|
// Inspect fetches objects by reference using GetRefFunc and writes the json
|
||||||
|
// representation to the output writer.
|
||||||
|
func Inspect(out io.Writer, references []string, tmplStr string, getRef GetRefFunc) error {
|
||||||
|
inspector, err := NewTemplateInspectorFromString(out, tmplStr)
|
||||||
|
if err != nil {
|
||||||
|
return cli.StatusError{StatusCode: 64, Status: err.Error()}
|
||||||
|
}
|
||||||
|
|
||||||
|
var inspectErr error
|
||||||
|
for _, ref := range references {
|
||||||
|
element, raw, err := getRef(ref)
|
||||||
|
if err != nil {
|
||||||
|
inspectErr = err
|
||||||
|
break
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := inspector.Inspect(element, raw); err != nil {
|
||||||
|
inspectErr = err
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
if err := inspector.Flush(); err != nil {
|
||||||
|
logrus.Errorf("%s\n", err)
|
||||||
|
}
|
||||||
|
|
||||||
|
if inspectErr != nil {
|
||||||
|
return cli.StatusError{StatusCode: 1, Status: inspectErr.Error()}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Inspect executes the inspect template.
|
||||||
|
// It decodes the raw element into a map if the initial execution fails.
|
||||||
|
// This allows docker cli to parse inspect structs injected with Swarm fields.
|
||||||
|
func (i *TemplateInspector) Inspect(typedElement interface{}, rawElement []byte) error {
|
||||||
|
buffer := new(bytes.Buffer)
|
||||||
|
if err := i.tmpl.Execute(buffer, typedElement); err != nil {
|
||||||
|
if rawElement == nil {
|
||||||
|
return fmt.Errorf("Template parsing error: %v", err)
|
||||||
|
}
|
||||||
|
return i.tryRawInspectFallback(rawElement)
|
||||||
|
}
|
||||||
|
i.buffer.Write(buffer.Bytes())
|
||||||
|
i.buffer.WriteByte('\n')
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// tryRawInspectFallback executes the inspect template with a raw interface.
|
||||||
|
// This allows docker cli to parse inspect structs injected with Swarm fields.
|
||||||
|
func (i *TemplateInspector) tryRawInspectFallback(rawElement []byte) error {
|
||||||
|
var raw interface{}
|
||||||
|
buffer := new(bytes.Buffer)
|
||||||
|
rdr := bytes.NewReader(rawElement)
|
||||||
|
dec := json.NewDecoder(rdr)
|
||||||
|
|
||||||
|
if rawErr := dec.Decode(&raw); rawErr != nil {
|
||||||
|
return fmt.Errorf("unable to read inspect data: %v", rawErr)
|
||||||
|
}
|
||||||
|
|
||||||
|
tmplMissingKey := i.tmpl.Option("missingkey=error")
|
||||||
|
if rawErr := tmplMissingKey.Execute(buffer, raw); rawErr != nil {
|
||||||
|
return fmt.Errorf("Template parsing error: %v", rawErr)
|
||||||
|
}
|
||||||
|
|
||||||
|
i.buffer.Write(buffer.Bytes())
|
||||||
|
i.buffer.WriteByte('\n')
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Flush write the result of inspecting all elements into the output stream.
|
||||||
|
func (i *TemplateInspector) Flush() error {
|
||||||
|
if i.buffer.Len() == 0 {
|
||||||
|
_, err := io.WriteString(i.outputStream, "\n")
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
_, err := io.Copy(i.outputStream, i.buffer)
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
// IndentedInspector uses a buffer to stop the indented representation of an element.
|
||||||
|
type IndentedInspector struct {
|
||||||
|
outputStream io.Writer
|
||||||
|
elements []interface{}
|
||||||
|
rawElements [][]byte
|
||||||
|
}
|
||||||
|
|
||||||
|
// NewIndentedInspector generates a new IndentedInspector.
|
||||||
|
func NewIndentedInspector(outputStream io.Writer) Inspector {
|
||||||
|
return &IndentedInspector{
|
||||||
|
outputStream: outputStream,
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
// Inspect writes the raw element with an indented json format.
|
||||||
|
func (i *IndentedInspector) Inspect(typedElement interface{}, rawElement []byte) error {
|
||||||
|
if rawElement != nil {
|
||||||
|
i.rawElements = append(i.rawElements, rawElement)
|
||||||
|
} else {
|
||||||
|
i.elements = append(i.elements, typedElement)
|
||||||
|
}
|
||||||
|
return nil
|
||||||
|
}
|
||||||
|
|
||||||
|
// Flush write the result of inspecting all elements into the output stream.
|
||||||
|
func (i *IndentedInspector) Flush() error {
|
||||||
|
if len(i.elements) == 0 && len(i.rawElements) == 0 {
|
||||||
|
_, err := io.WriteString(i.outputStream, "[]\n")
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
|
||||||
|
var buffer io.Reader
|
||||||
|
if len(i.rawElements) > 0 {
|
||||||
|
bytesBuffer := new(bytes.Buffer)
|
||||||
|
bytesBuffer.WriteString("[")
|
||||||
|
for idx, r := range i.rawElements {
|
||||||
|
bytesBuffer.Write(r)
|
||||||
|
if idx < len(i.rawElements)-1 {
|
||||||
|
bytesBuffer.WriteString(",")
|
||||||
|
}
|
||||||
|
}
|
||||||
|
bytesBuffer.WriteString("]")
|
||||||
|
indented := new(bytes.Buffer)
|
||||||
|
if err := json.Indent(indented, bytesBuffer.Bytes(), "", " "); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
buffer = indented
|
||||||
|
} else {
|
||||||
|
b, err := json.MarshalIndent(i.elements, "", " ")
|
||||||
|
if err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
buffer = bytes.NewReader(b)
|
||||||
|
}
|
||||||
|
|
||||||
|
if _, err := io.Copy(i.outputStream, buffer); err != nil {
|
||||||
|
return err
|
||||||
|
}
|
||||||
|
_, err := io.WriteString(i.outputStream, "\n")
|
||||||
|
return err
|
||||||
|
}
|
Some files were not shown because too many files have changed in this diff Show more
Loading…
Reference in a new issue