mirror of
				https://github.com/linuxkit/linuxkit.git
				synced 2025-10-31 01:08:46 +00:00 
			
		
		
		
	Generated largely from the specified config; small parts taken from `docker image inspect`, such as the command line. Renamed some of the yaml keys to match the OCI spec rather than Docker Compose as we decided they are more readable, no more underscores. Add some extra functionality - tmpfs specification - fully general mount specification - no new privileges can be specified now For nostalgic reasons, using engine-api to talk to the docker cli as we only need an old API version, and it is nice and easy to vendor... Signed-off-by: Justin Cormack <justin.cormack@docker.com>
		
			
				
	
	
		
			50 lines
		
	
	
		
			1.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
			
		
		
	
	
			50 lines
		
	
	
		
			1.9 KiB
		
	
	
	
		
			Go
		
	
	
	
	
	
| package client
 | |
| 
 | |
| import (
 | |
| 	"encoding/json"
 | |
| 
 | |
| 	"github.com/docker/engine-api/types"
 | |
| 	"golang.org/x/net/context"
 | |
| )
 | |
| 
 | |
| // ContainerExecCreate creates a new exec configuration to run an exec process.
 | |
| func (cli *Client) ContainerExecCreate(ctx context.Context, container string, config types.ExecConfig) (types.ContainerExecCreateResponse, error) {
 | |
| 	var response types.ContainerExecCreateResponse
 | |
| 	resp, err := cli.post(ctx, "/containers/"+container+"/exec", nil, config, nil)
 | |
| 	if err != nil {
 | |
| 		return response, err
 | |
| 	}
 | |
| 	err = json.NewDecoder(resp.body).Decode(&response)
 | |
| 	ensureReaderClosed(resp)
 | |
| 	return response, err
 | |
| }
 | |
| 
 | |
| // ContainerExecStart starts an exec process already created in the docker host.
 | |
| func (cli *Client) ContainerExecStart(ctx context.Context, execID string, config types.ExecStartCheck) error {
 | |
| 	resp, err := cli.post(ctx, "/exec/"+execID+"/start", nil, config, nil)
 | |
| 	ensureReaderClosed(resp)
 | |
| 	return err
 | |
| }
 | |
| 
 | |
| // ContainerExecAttach attaches a connection to an exec process in the server.
 | |
| // It returns a types.HijackedConnection with the hijacked connection
 | |
| // and the a reader to get output. It's up to the called to close
 | |
| // the hijacked connection by calling types.HijackedResponse.Close.
 | |
| func (cli *Client) ContainerExecAttach(ctx context.Context, execID string, config types.ExecConfig) (types.HijackedResponse, error) {
 | |
| 	headers := map[string][]string{"Content-Type": {"application/json"}}
 | |
| 	return cli.postHijacked(ctx, "/exec/"+execID+"/start", nil, config, headers)
 | |
| }
 | |
| 
 | |
| // ContainerExecInspect returns information about a specific exec process on the docker host.
 | |
| func (cli *Client) ContainerExecInspect(ctx context.Context, execID string) (types.ContainerExecInspect, error) {
 | |
| 	var response types.ContainerExecInspect
 | |
| 	resp, err := cli.get(ctx, "/exec/"+execID+"/json", nil, nil)
 | |
| 	if err != nil {
 | |
| 		return response, err
 | |
| 	}
 | |
| 
 | |
| 	err = json.NewDecoder(resp.body).Decode(&response)
 | |
| 	ensureReaderClosed(resp)
 | |
| 	return response, err
 | |
| }
 |