| | |
| |
|
| | |
| | |
| | |
| |
|
| | |
| |
|
| | |
| | |
| | |
| | |
| | |
| |
|
| | import base64 |
| | import io |
| | import os |
| | import os.path |
| | import json |
| | import shlex |
| | import tarfile |
| | import tempfile |
| | import warnings |
| | from distutils.version import StrictVersion |
| | from fnmatch import fnmatch |
| | from datetime import datetime |
| |
|
| | import requests |
| | import six |
| |
|
| | from .. import constants |
| | from .. import errors |
| | from .. import tls |
| | from .types import Ulimit, LogConfig |
| |
|
| |
|
| | DEFAULT_HTTP_HOST = "127.0.0.1" |
| | DEFAULT_UNIX_SOCKET = "http+unix://var/run/docker.sock" |
| | BYTE_UNITS = { |
| | 'b': 1, |
| | 'k': 1024, |
| | 'm': 1024 * 1024, |
| | 'g': 1024 * 1024 * 1024 |
| | } |
| |
|
| |
|
| | def create_ipam_pool(subnet=None, iprange=None, gateway=None, |
| | aux_addresses=None): |
| | return { |
| | 'Subnet': subnet, |
| | 'IPRange': iprange, |
| | 'Gateway': gateway, |
| | 'AuxiliaryAddresses': aux_addresses |
| | } |
| |
|
| |
|
| | def create_ipam_config(driver='default', pool_configs=None): |
| | return { |
| | 'Driver': driver, |
| | 'Config': pool_configs or [] |
| | } |
| |
|
| |
|
| | def mkbuildcontext(dockerfile): |
| | f = tempfile.NamedTemporaryFile() |
| | t = tarfile.open(mode='w', fileobj=f) |
| | if isinstance(dockerfile, io.StringIO): |
| | dfinfo = tarfile.TarInfo('Dockerfile') |
| | if six.PY3: |
| | raise TypeError('Please use io.BytesIO to create in-memory ' |
| | 'Dockerfiles with Python 3') |
| | else: |
| | dfinfo.size = len(dockerfile.getvalue()) |
| | dockerfile.seek(0) |
| | elif isinstance(dockerfile, io.BytesIO): |
| | dfinfo = tarfile.TarInfo('Dockerfile') |
| | dfinfo.size = len(dockerfile.getvalue()) |
| | dockerfile.seek(0) |
| | else: |
| | dfinfo = t.gettarinfo(fileobj=dockerfile, arcname='Dockerfile') |
| | t.addfile(dfinfo, dockerfile) |
| | t.close() |
| | f.seek(0) |
| | return f |
| |
|
| |
|
| | def decode_json_header(header): |
| | data = base64.b64decode(header) |
| | if six.PY3: |
| | data = data.decode('utf-8') |
| | return json.loads(data) |
| |
|
| |
|
| | def tar(path, exclude=None, dockerfile=None, fileobj=None): |
| | if not fileobj: |
| | fileobj = tempfile.NamedTemporaryFile() |
| | t = tarfile.open(mode='w', fileobj=fileobj) |
| |
|
| | root = os.path.abspath(path) |
| | exclude = exclude or [] |
| |
|
| | for path in sorted(exclude_paths(root, exclude, dockerfile=dockerfile)): |
| | t.add(os.path.join(root, path), arcname=path, recursive=False) |
| |
|
| | t.close() |
| | fileobj.seek(0) |
| | return fileobj |
| |
|
| |
|
| | def exclude_paths(root, patterns, dockerfile=None): |
| | """ |
| | Given a root directory path and a list of .dockerignore patterns, return |
| | an iterator of all paths (both regular files and directories) in the root |
| | directory that do *not* match any of the patterns. |
| | |
| | All paths returned are relative to the root. |
| | """ |
| | if dockerfile is None: |
| | dockerfile = 'Dockerfile' |
| |
|
| | exceptions = [p for p in patterns if p.startswith('!')] |
| |
|
| | include_patterns = [p[1:] for p in exceptions] |
| | include_patterns += [dockerfile, '.dockerignore'] |
| |
|
| | exclude_patterns = list(set(patterns) - set(exceptions)) |
| |
|
| | paths = get_paths(root, exclude_patterns, include_patterns, |
| | has_exceptions=len(exceptions) > 0) |
| |
|
| | return set(paths).union( |
| | |
| | |
| | |
| | set([dockerfile]) |
| | if os.path.exists(os.path.join(root, dockerfile)) else set() |
| | ) |
| |
|
| |
|
| | def should_include(path, exclude_patterns, include_patterns): |
| | """ |
| | Given a path, a list of exclude patterns, and a list of inclusion patterns: |
| | |
| | 1. Returns True if the path doesn't match any exclusion pattern |
| | 2. Returns False if the path matches an exclusion pattern and doesn't match |
| | an inclusion pattern |
| | 3. Returns true if the path matches an exclusion pattern and matches an |
| | inclusion pattern |
| | """ |
| | for pattern in exclude_patterns: |
| | if match_path(path, pattern): |
| | for pattern in include_patterns: |
| | if match_path(path, pattern): |
| | return True |
| | return False |
| | return True |
| |
|
| |
|
| | def get_paths(root, exclude_patterns, include_patterns, has_exceptions=False): |
| | paths = [] |
| |
|
| | for parent, dirs, files in os.walk(root, topdown=True, followlinks=False): |
| | parent = os.path.relpath(parent, root) |
| | if parent == '.': |
| | parent = '' |
| |
|
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| | |
| |
|
| | if not has_exceptions: |
| |
|
| | |
| | |
| | |
| | |
| |
|
| | dirs[:] = [d for d in dirs if |
| | should_include(os.path.join(parent, d), |
| | exclude_patterns, include_patterns)] |
| |
|
| | for path in dirs: |
| | if should_include(os.path.join(parent, path), |
| | exclude_patterns, include_patterns): |
| | paths.append(os.path.join(parent, path)) |
| |
|
| | for path in files: |
| | if should_include(os.path.join(parent, path), |
| | exclude_patterns, include_patterns): |
| | paths.append(os.path.join(parent, path)) |
| |
|
| | return paths |
| |
|
| |
|
| | def match_path(path, pattern): |
| | pattern = pattern.rstrip('/') |
| | pattern_components = pattern.split('/') |
| | path_components = path.split('/')[:len(pattern_components)] |
| | return fnmatch('/'.join(path_components), pattern) |
| |
|
| |
|
| | def compare_version(v1, v2): |
| | """Compare docker versions |
| | |
| | >>> v1 = '1.9' |
| | >>> v2 = '1.10' |
| | >>> compare_version(v1, v2) |
| | 1 |
| | >>> compare_version(v2, v1) |
| | -1 |
| | >>> compare_version(v2, v2) |
| | 0 |
| | """ |
| | s1 = StrictVersion(v1) |
| | s2 = StrictVersion(v2) |
| | if s1 == s2: |
| | return 0 |
| | elif s1 > s2: |
| | return -1 |
| | else: |
| | return 1 |
| |
|
| |
|
| | def version_lt(v1, v2): |
| | return compare_version(v1, v2) > 0 |
| |
|
| |
|
| | def version_gte(v1, v2): |
| | return not version_lt(v1, v2) |
| |
|
| |
|
| | def ping_registry(url): |
| | warnings.warn( |
| | 'The `ping_registry` method is deprecated and will be removed.', |
| | DeprecationWarning |
| | ) |
| |
|
| | return ping(url + '/v2/', [401]) or ping(url + '/v1/_ping') |
| |
|
| |
|
| | def ping(url, valid_4xx_statuses=None): |
| | try: |
| | res = requests.get(url, timeout=3) |
| | except Exception: |
| | return False |
| | else: |
| | |
| | |
| | return ( |
| | res.status_code < 400 or |
| | (valid_4xx_statuses and res.status_code in valid_4xx_statuses) |
| | ) |
| |
|
| |
|
| | def _convert_port_binding(binding): |
| | result = {'HostIp': '', 'HostPort': ''} |
| | if isinstance(binding, tuple): |
| | if len(binding) == 2: |
| | result['HostPort'] = binding[1] |
| | result['HostIp'] = binding[0] |
| | elif isinstance(binding[0], six.string_types): |
| | result['HostIp'] = binding[0] |
| | else: |
| | result['HostPort'] = binding[0] |
| | elif isinstance(binding, dict): |
| | if 'HostPort' in binding: |
| | result['HostPort'] = binding['HostPort'] |
| | if 'HostIp' in binding: |
| | result['HostIp'] = binding['HostIp'] |
| | else: |
| | raise ValueError(binding) |
| | else: |
| | result['HostPort'] = binding |
| |
|
| | if result['HostPort'] is None: |
| | result['HostPort'] = '' |
| | else: |
| | result['HostPort'] = str(result['HostPort']) |
| |
|
| | return result |
| |
|
| |
|
| | def convert_port_bindings(port_bindings): |
| | result = {} |
| | for k, v in six.iteritems(port_bindings): |
| | key = str(k) |
| | if '/' not in key: |
| | key += '/tcp' |
| | if isinstance(v, list): |
| | result[key] = [_convert_port_binding(binding) for binding in v] |
| | else: |
| | result[key] = [_convert_port_binding(v)] |
| | return result |
| |
|
| |
|
| | def convert_volume_binds(binds): |
| | if isinstance(binds, list): |
| | return binds |
| |
|
| | result = [] |
| | for k, v in binds.items(): |
| | if isinstance(k, six.binary_type): |
| | k = k.decode('utf-8') |
| |
|
| | if isinstance(v, dict): |
| | if 'ro' in v and 'mode' in v: |
| | raise ValueError( |
| | 'Binding cannot contain both "ro" and "mode": {}' |
| | .format(repr(v)) |
| | ) |
| |
|
| | bind = v['bind'] |
| | if isinstance(bind, six.binary_type): |
| | bind = bind.decode('utf-8') |
| |
|
| | if 'ro' in v: |
| | mode = 'ro' if v['ro'] else 'rw' |
| | elif 'mode' in v: |
| | mode = v['mode'] |
| | else: |
| | mode = 'rw' |
| |
|
| | result.append( |
| | six.text_type('{0}:{1}:{2}').format(k, bind, mode) |
| | ) |
| | else: |
| | if isinstance(v, six.binary_type): |
| | v = v.decode('utf-8') |
| | result.append( |
| | six.text_type('{0}:{1}:rw').format(k, v) |
| | ) |
| | return result |
| |
|
| |
|
| | def parse_repository_tag(repo_name): |
| | parts = repo_name.rsplit('@', 1) |
| | if len(parts) == 2: |
| | return tuple(parts) |
| | parts = repo_name.rsplit(':', 1) |
| | if len(parts) == 2 and '/' not in parts[1]: |
| | return tuple(parts) |
| | return repo_name, None |
| |
|
| |
|
| | |
| | |
| | |
| | |
| | def parse_host(addr, platform=None, tls=False): |
| | proto = "http+unix" |
| | host = DEFAULT_HTTP_HOST |
| | port = None |
| | path = '' |
| |
|
| | if not addr and platform == 'win32': |
| | addr = '{0}:{1}'.format(DEFAULT_HTTP_HOST, 2375) |
| |
|
| | if not addr or addr.strip() == 'unix://': |
| | return DEFAULT_UNIX_SOCKET |
| |
|
| | addr = addr.strip() |
| | if addr.startswith('http://'): |
| | addr = addr.replace('http://', 'tcp://') |
| | if addr.startswith('http+unix://'): |
| | addr = addr.replace('http+unix://', 'unix://') |
| |
|
| | if addr == 'tcp://': |
| | raise errors.DockerException( |
| | "Invalid bind address format: {0}".format(addr)) |
| | elif addr.startswith('unix://'): |
| | addr = addr[7:] |
| | elif addr.startswith('tcp://'): |
| | proto = "http" |
| | addr = addr[6:] |
| | elif addr.startswith('https://'): |
| | proto = "https" |
| | addr = addr[8:] |
| | elif addr.startswith('fd://'): |
| | raise errors.DockerException("fd protocol is not implemented") |
| | else: |
| | if "://" in addr: |
| | raise errors.DockerException( |
| | "Invalid bind address protocol: {0}".format(addr) |
| | ) |
| | proto = "https" if tls else "http" |
| |
|
| | if proto != "http+unix" and ":" in addr: |
| | host_parts = addr.split(':') |
| | if len(host_parts) != 2: |
| | raise errors.DockerException( |
| | "Invalid bind address format: {0}".format(addr) |
| | ) |
| | if host_parts[0]: |
| | host = host_parts[0] |
| |
|
| | port = host_parts[1] |
| | if '/' in port: |
| | port, path = port.split('/', 1) |
| | path = '/{0}'.format(path) |
| | try: |
| | port = int(port) |
| | except Exception: |
| | raise errors.DockerException( |
| | "Invalid port: {0}".format(addr) |
| | ) |
| |
|
| | elif proto in ("http", "https") and ':' not in addr: |
| | raise errors.DockerException( |
| | "Bind address needs a port: {0}".format(addr)) |
| | else: |
| | host = addr |
| |
|
| | if proto == "http+unix": |
| | return "{0}://{1}".format(proto, host) |
| | return "{0}://{1}:{2}{3}".format(proto, host, port, path) |
| |
|
| |
|
| | def parse_devices(devices): |
| | device_list = [] |
| | for device in devices: |
| | if isinstance(device, dict): |
| | device_list.append(device) |
| | continue |
| | if not isinstance(device, six.string_types): |
| | raise errors.DockerException( |
| | 'Invalid device type {0}'.format(type(device)) |
| | ) |
| | device_mapping = device.split(':') |
| | if device_mapping: |
| | path_on_host = device_mapping[0] |
| | if len(device_mapping) > 1: |
| | path_in_container = device_mapping[1] |
| | else: |
| | path_in_container = path_on_host |
| | if len(device_mapping) > 2: |
| | permissions = device_mapping[2] |
| | else: |
| | permissions = 'rwm' |
| | device_list.append({ |
| | 'PathOnHost': path_on_host, |
| | 'PathInContainer': path_in_container, |
| | 'CgroupPermissions': permissions |
| | }) |
| | return device_list |
| |
|
| |
|
| | def kwargs_from_env(ssl_version=None, assert_hostname=None): |
| | host = os.environ.get('DOCKER_HOST') |
| |
|
| | |
| | cert_path = os.environ.get('DOCKER_CERT_PATH') or None |
| |
|
| | |
| | |
| | tls_verify = os.environ.get('DOCKER_TLS_VERIFY') |
| | if tls_verify == '': |
| | tls_verify = False |
| | else: |
| | tls_verify = tls_verify is not None |
| | enable_tls = cert_path or tls_verify |
| |
|
| | params = {} |
| |
|
| | if host: |
| | params['base_url'] = ( |
| | host.replace('tcp://', 'https://') if enable_tls else host |
| | ) |
| |
|
| | if not enable_tls: |
| | return params |
| |
|
| | if not cert_path: |
| | cert_path = os.path.join(os.path.expanduser('~'), '.docker') |
| |
|
| | if not tls_verify and assert_hostname is None: |
| | |
| | |
| | assert_hostname = False |
| |
|
| | params['tls'] = tls.TLSConfig( |
| | client_cert=(os.path.join(cert_path, 'cert.pem'), |
| | os.path.join(cert_path, 'key.pem')), |
| | ca_cert=os.path.join(cert_path, 'ca.pem'), |
| | verify=tls_verify, |
| | ssl_version=ssl_version, |
| | assert_hostname=assert_hostname, |
| | ) |
| |
|
| | return params |
| |
|
| |
|
| | def convert_filters(filters): |
| | result = {} |
| | for k, v in six.iteritems(filters): |
| | if isinstance(v, bool): |
| | v = 'true' if v else 'false' |
| | if not isinstance(v, list): |
| | v = [v, ] |
| | result[k] = v |
| | return json.dumps(result) |
| |
|
| |
|
| | def datetime_to_timestamp(dt): |
| | """Convert a UTC datetime to a Unix timestamp""" |
| | delta = dt - datetime.utcfromtimestamp(0) |
| | return delta.seconds + delta.days * 24 * 3600 |
| |
|
| |
|
| | def longint(n): |
| | if six.PY3: |
| | return int(n) |
| | return long(n) |
| |
|
| |
|
| | def parse_bytes(s): |
| | if isinstance(s, six.integer_types + (float,)): |
| | return s |
| | if len(s) == 0: |
| | return 0 |
| |
|
| | if s[-2:-1].isalpha() and s[-1].isalpha(): |
| | if s[-1] == "b" or s[-1] == "B": |
| | s = s[:-1] |
| | units = BYTE_UNITS |
| | suffix = s[-1].lower() |
| |
|
| | |
| | |
| | if suffix.isdigit(): |
| | digits_part = s |
| | suffix = 'b' |
| | else: |
| | digits_part = s[:-1] |
| |
|
| | if suffix in units.keys() or suffix.isdigit(): |
| | try: |
| | digits = longint(digits_part) |
| | except ValueError: |
| | raise errors.DockerException( |
| | 'Failed converting the string value for memory ({0}) to' |
| | ' an integer.'.format(digits_part) |
| | ) |
| |
|
| | |
| | s = longint(digits * units[suffix]) |
| | else: |
| | raise errors.DockerException( |
| | 'The specified value for memory ({0}) should specify the' |
| | ' units. The postfix should be one of the `b` `k` `m` `g`' |
| | ' characters'.format(s) |
| | ) |
| |
|
| | return s |
| |
|
| |
|
| | def host_config_type_error(param, param_value, expected): |
| | error_msg = 'Invalid type for {0} param: expected {1} but found {2}' |
| | return TypeError(error_msg.format(param, expected, type(param_value))) |
| |
|
| |
|
| | def host_config_version_error(param, version, less_than=True): |
| | operator = '<' if less_than else '>' |
| | error_msg = '{0} param is not supported in API versions {1} {2}' |
| | return errors.InvalidVersion(error_msg.format(param, operator, version)) |
| |
|
| |
|
| | def host_config_value_error(param, param_value): |
| | error_msg = 'Invalid value for {0} param: {1}' |
| | return ValueError(error_msg.format(param, param_value)) |
| |
|
| |
|
| | def create_host_config(binds=None, port_bindings=None, lxc_conf=None, |
| | publish_all_ports=False, links=None, privileged=False, |
| | dns=None, dns_search=None, volumes_from=None, |
| | network_mode=None, restart_policy=None, cap_add=None, |
| | cap_drop=None, devices=None, extra_hosts=None, |
| | read_only=None, pid_mode=None, ipc_mode=None, |
| | security_opt=None, ulimits=None, log_config=None, |
| | mem_limit=None, memswap_limit=None, mem_swappiness=None, |
| | cgroup_parent=None, group_add=None, cpu_quota=None, |
| | cpu_period=None, oom_kill_disable=False, shm_size=None, |
| | version=None): |
| |
|
| | host_config = {} |
| |
|
| | if not version: |
| | warnings.warn( |
| | 'docker.utils.create_host_config() is deprecated. Please use ' |
| | 'Client.create_host_config() instead.' |
| | ) |
| | version = constants.DEFAULT_DOCKER_API_VERSION |
| |
|
| | if mem_limit is not None: |
| | host_config['Memory'] = parse_bytes(mem_limit) |
| |
|
| | if memswap_limit is not None: |
| | host_config['MemorySwap'] = parse_bytes(memswap_limit) |
| |
|
| | if mem_swappiness is not None: |
| | if version_lt(version, '1.20'): |
| | raise host_config_version_error('mem_swappiness', '1.20') |
| | if not isinstance(mem_swappiness, int): |
| | raise host_config_type_error( |
| | 'mem_swappiness', mem_swappiness, 'int' |
| | ) |
| |
|
| | host_config['MemorySwappiness'] = mem_swappiness |
| |
|
| | if shm_size is not None: |
| | if isinstance(shm_size, six.string_types): |
| | shm_size = parse_bytes(shm_size) |
| |
|
| | host_config['ShmSize'] = shm_size |
| |
|
| | if pid_mode not in (None, 'host'): |
| | raise host_config_value_error('pid_mode', pid_mode) |
| | elif pid_mode: |
| | host_config['PidMode'] = pid_mode |
| |
|
| | if ipc_mode: |
| | host_config['IpcMode'] = ipc_mode |
| |
|
| | if privileged: |
| | host_config['Privileged'] = privileged |
| |
|
| | if oom_kill_disable: |
| | if version_lt(version, '1.20'): |
| | raise host_config_version_error('oom_kill_disable', '1.19') |
| |
|
| | host_config['OomKillDisable'] = oom_kill_disable |
| |
|
| | if publish_all_ports: |
| | host_config['PublishAllPorts'] = publish_all_ports |
| |
|
| | if read_only is not None: |
| | host_config['ReadonlyRootfs'] = read_only |
| |
|
| | if dns_search: |
| | host_config['DnsSearch'] = dns_search |
| |
|
| | if network_mode: |
| | host_config['NetworkMode'] = network_mode |
| | elif network_mode is None and compare_version('1.19', version) > 0: |
| | host_config['NetworkMode'] = 'default' |
| |
|
| | if restart_policy: |
| | if not isinstance(restart_policy, dict): |
| | raise host_config_type_error( |
| | 'restart_policy', restart_policy, 'dict' |
| | ) |
| |
|
| | host_config['RestartPolicy'] = restart_policy |
| |
|
| | if cap_add: |
| | host_config['CapAdd'] = cap_add |
| |
|
| | if cap_drop: |
| | host_config['CapDrop'] = cap_drop |
| |
|
| | if devices: |
| | host_config['Devices'] = parse_devices(devices) |
| |
|
| | if group_add: |
| | if version_lt(version, '1.20'): |
| | raise host_config_version_error('group_add', '1.20') |
| |
|
| | host_config['GroupAdd'] = [six.text_type(grp) for grp in group_add] |
| |
|
| | if dns is not None: |
| | host_config['Dns'] = dns |
| |
|
| | if security_opt is not None: |
| | if not isinstance(security_opt, list): |
| | raise host_config_type_error('security_opt', security_opt, 'list') |
| |
|
| | host_config['SecurityOpt'] = security_opt |
| |
|
| | if volumes_from is not None: |
| | if isinstance(volumes_from, six.string_types): |
| | volumes_from = volumes_from.split(',') |
| |
|
| | host_config['VolumesFrom'] = volumes_from |
| |
|
| | if binds is not None: |
| | host_config['Binds'] = convert_volume_binds(binds) |
| |
|
| | if port_bindings is not None: |
| | host_config['PortBindings'] = convert_port_bindings(port_bindings) |
| |
|
| | if extra_hosts is not None: |
| | if isinstance(extra_hosts, dict): |
| | extra_hosts = [ |
| | '{0}:{1}'.format(k, v) |
| | for k, v in sorted(six.iteritems(extra_hosts)) |
| | ] |
| |
|
| | host_config['ExtraHosts'] = extra_hosts |
| |
|
| | if links is not None: |
| | host_config['Links'] = normalize_links(links) |
| |
|
| | if isinstance(lxc_conf, dict): |
| | formatted = [] |
| | for k, v in six.iteritems(lxc_conf): |
| | formatted.append({'Key': k, 'Value': str(v)}) |
| | lxc_conf = formatted |
| |
|
| | if lxc_conf is not None: |
| | host_config['LxcConf'] = lxc_conf |
| |
|
| | if cgroup_parent is not None: |
| | host_config['CgroupParent'] = cgroup_parent |
| |
|
| | if ulimits is not None: |
| | if not isinstance(ulimits, list): |
| | raise host_config_type_error('ulimits', ulimits, 'list') |
| | host_config['Ulimits'] = [] |
| | for l in ulimits: |
| | if not isinstance(l, Ulimit): |
| | l = Ulimit(**l) |
| | host_config['Ulimits'].append(l) |
| |
|
| | if log_config is not None: |
| | if not isinstance(log_config, LogConfig): |
| | if not isinstance(log_config, dict): |
| | raise host_config_type_error( |
| | 'log_config', log_config, 'LogConfig' |
| | ) |
| | log_config = LogConfig(**log_config) |
| |
|
| | host_config['LogConfig'] = log_config |
| |
|
| | if cpu_quota: |
| | if not isinstance(cpu_quota, int): |
| | raise host_config_type_error('cpu_quota', cpu_quota, 'int') |
| | if version_lt(version, '1.19'): |
| | raise host_config_version_error('cpu_quota', '1.19') |
| |
|
| | host_config['CpuQuota'] = cpu_quota |
| |
|
| | if cpu_period: |
| | if not isinstance(cpu_period, int): |
| | raise host_config_type_error('cpu_period', cpu_period, 'int') |
| | if version_lt(version, '1.19'): |
| | raise host_config_version_error('cpu_period', '1.19') |
| |
|
| | host_config['CpuPeriod'] = cpu_period |
| |
|
| | return host_config |
| |
|
| |
|
| | def normalize_links(links): |
| | if isinstance(links, dict): |
| | links = six.iteritems(links) |
| |
|
| | return ['{0}:{1}'.format(k, v) for k, v in sorted(links)] |
| |
|
| |
|
| | def create_networking_config(endpoints_config=None): |
| | networking_config = {} |
| |
|
| | if endpoints_config: |
| | networking_config["EndpointsConfig"] = endpoints_config |
| |
|
| | return networking_config |
| |
|
| |
|
| | def create_endpoint_config(version, aliases=None, links=None): |
| | endpoint_config = {} |
| |
|
| | if aliases: |
| | if version_lt(version, '1.22'): |
| | raise host_config_version_error('endpoint_config.aliases', '1.22') |
| | endpoint_config["Aliases"] = aliases |
| |
|
| | if links: |
| | if version_lt(version, '1.22'): |
| | raise host_config_version_error('endpoint_config.links', '1.22') |
| | endpoint_config["Links"] = normalize_links(links) |
| |
|
| | return endpoint_config |
| |
|
| |
|
| | def parse_env_file(env_file): |
| | """ |
| | Reads a line-separated environment file. |
| | The format of each line should be "key=value". |
| | """ |
| | environment = {} |
| |
|
| | with open(env_file, 'r') as f: |
| | for line in f: |
| |
|
| | if line[0] == '#': |
| | continue |
| |
|
| | parse_line = line.strip().split('=') |
| | if len(parse_line) == 2: |
| | k, v = parse_line |
| | environment[k] = v |
| | else: |
| | raise errors.DockerException( |
| | 'Invalid line in environment file {0}:\n{1}'.format( |
| | env_file, line)) |
| |
|
| | return environment |
| |
|
| |
|
| | def split_command(command): |
| | if six.PY2 and not isinstance(command, six.binary_type): |
| | command = command.encode('utf-8') |
| | return shlex.split(command) |
| |
|
| |
|
| | def format_environment(environment): |
| | def format_env(key, value): |
| | if value is None: |
| | return key |
| | return '{key}={value}'.format(key=key, value=value) |
| | return [format_env(*var) for var in six.iteritems(environment)] |
| |
|
| |
|
| | def create_container_config( |
| | version, image, command, hostname=None, user=None, detach=False, |
| | stdin_open=False, tty=False, mem_limit=None, ports=None, environment=None, |
| | dns=None, volumes=None, volumes_from=None, network_disabled=False, |
| | entrypoint=None, cpu_shares=None, working_dir=None, domainname=None, |
| | memswap_limit=None, cpuset=None, host_config=None, mac_address=None, |
| | labels=None, volume_driver=None, stop_signal=None, networking_config=None, |
| | ): |
| | if isinstance(command, six.string_types): |
| | command = split_command(command) |
| |
|
| | if isinstance(entrypoint, six.string_types): |
| | entrypoint = split_command(entrypoint) |
| |
|
| | if isinstance(environment, dict): |
| | environment = format_environment(environment) |
| |
|
| | if labels is not None and compare_version('1.18', version) < 0: |
| | raise errors.InvalidVersion( |
| | 'labels were only introduced in API version 1.18' |
| | ) |
| |
|
| | if stop_signal is not None and compare_version('1.21', version) < 0: |
| | raise errors.InvalidVersion( |
| | 'stop_signal was only introduced in API version 1.21' |
| | ) |
| |
|
| | if compare_version('1.19', version) < 0: |
| | if volume_driver is not None: |
| | raise errors.InvalidVersion( |
| | 'Volume drivers were only introduced in API version 1.19' |
| | ) |
| | mem_limit = mem_limit if mem_limit is not None else 0 |
| | memswap_limit = memswap_limit if memswap_limit is not None else 0 |
| | else: |
| | if mem_limit is not None: |
| | raise errors.InvalidVersion( |
| | 'mem_limit has been moved to host_config in API version 1.19' |
| | ) |
| |
|
| | if memswap_limit is not None: |
| | raise errors.InvalidVersion( |
| | 'memswap_limit has been moved to host_config in API ' |
| | 'version 1.19' |
| | ) |
| |
|
| | if isinstance(labels, list): |
| | labels = dict((lbl, six.text_type('')) for lbl in labels) |
| |
|
| | if mem_limit is not None: |
| | mem_limit = parse_bytes(mem_limit) |
| | if memswap_limit is not None: |
| | memswap_limit = parse_bytes(memswap_limit) |
| |
|
| | if isinstance(ports, list): |
| | exposed_ports = {} |
| | for port_definition in ports: |
| | port = port_definition |
| | proto = 'tcp' |
| | if isinstance(port_definition, tuple): |
| | if len(port_definition) == 2: |
| | proto = port_definition[1] |
| | port = port_definition[0] |
| | exposed_ports['{0}/{1}'.format(port, proto)] = {} |
| | ports = exposed_ports |
| |
|
| | if isinstance(volumes, six.string_types): |
| | volumes = [volumes, ] |
| |
|
| | if isinstance(volumes, list): |
| | volumes_dict = {} |
| | for vol in volumes: |
| | volumes_dict[vol] = {} |
| | volumes = volumes_dict |
| |
|
| | if volumes_from: |
| | if not isinstance(volumes_from, six.string_types): |
| | volumes_from = ','.join(volumes_from) |
| | else: |
| | |
| | volumes_from = None |
| |
|
| | attach_stdin = False |
| | attach_stdout = False |
| | attach_stderr = False |
| | stdin_once = False |
| |
|
| | if not detach: |
| | attach_stdout = True |
| | attach_stderr = True |
| |
|
| | if stdin_open: |
| | attach_stdin = True |
| | stdin_once = True |
| |
|
| | if compare_version('1.10', version) >= 0: |
| | message = ('{0!r} parameter has no effect on create_container().' |
| | ' It has been moved to host_config') |
| | if dns is not None: |
| | raise errors.InvalidVersion(message.format('dns')) |
| | if volumes_from is not None: |
| | raise errors.InvalidVersion(message.format('volumes_from')) |
| |
|
| | return { |
| | 'Hostname': hostname, |
| | 'Domainname': domainname, |
| | 'ExposedPorts': ports, |
| | 'User': six.text_type(user) if user else None, |
| | 'Tty': tty, |
| | 'OpenStdin': stdin_open, |
| | 'StdinOnce': stdin_once, |
| | 'Memory': mem_limit, |
| | 'AttachStdin': attach_stdin, |
| | 'AttachStdout': attach_stdout, |
| | 'AttachStderr': attach_stderr, |
| | 'Env': environment, |
| | 'Cmd': command, |
| | 'Dns': dns, |
| | 'Image': image, |
| | 'Volumes': volumes, |
| | 'VolumesFrom': volumes_from, |
| | 'NetworkDisabled': network_disabled, |
| | 'Entrypoint': entrypoint, |
| | 'CpuShares': cpu_shares, |
| | 'Cpuset': cpuset, |
| | 'CpusetCpus': cpuset, |
| | 'WorkingDir': working_dir, |
| | 'MemorySwap': memswap_limit, |
| | 'HostConfig': host_config, |
| | 'NetworkingConfig': networking_config, |
| | 'MacAddress': mac_address, |
| | 'Labels': labels, |
| | 'VolumeDriver': volume_driver, |
| | 'StopSignal': stop_signal |
| | } |
| |
|