summaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorSebastiaan van Stijn <thaJeztah@users.noreply.github.com>2023-05-10 18:01:45 +0200
committerGitHub <noreply@github.com>2023-05-10 18:01:45 +0200
commitf70d9933d160b12b8d6247c77e721c94fae9eefe (patch)
treed714ae67ee2d0482b6a74503ac39a88634b48070
parent3f7fde76c2e4e7c234e85c9a8634e2d7639f4f6d (diff)
parentcad97135b32bbede9e38d0ac4d8f16b49fa4b3ee (diff)
downloaddocker-f70d9933d160b12b8d6247c77e721c94fae9eefe.tar.gz
Merge pull request #45427 from laurazard/c8d-fix-incomplete-images
c8d: implement missing image delete logic
-rw-r--r--daemon/containerd/image_children.go68
-rw-r--r--daemon/containerd/image_delete.go280
2 files changed, 334 insertions, 14 deletions
diff --git a/daemon/containerd/image_children.go b/daemon/containerd/image_children.go
index ced4637aeb..ba8c939549 100644
--- a/daemon/containerd/image_children.go
+++ b/daemon/containerd/image_children.go
@@ -127,3 +127,71 @@ func isRootfsChildOf(child ocispec.RootFS, parent ocispec.RootFS) bool {
return true
}
+
+// parents returns a slice of image IDs whose entire rootfs contents match,
+// in order, the childs first layers, excluding images with the exact same
+// rootfs.
+//
+// Called from image_delete.go to prune dangling parents.
+func (i *ImageService) parents(ctx context.Context, id image.ID) ([]imageWithRootfs, error) {
+ target, err := i.resolveDescriptor(ctx, id.String())
+ if err != nil {
+ return nil, errors.Wrap(err, "failed to get child image")
+ }
+
+ cs := i.client.ContentStore()
+
+ allPlatforms, err := containerdimages.Platforms(ctx, cs, target)
+ if err != nil {
+ return nil, errdefs.System(errors.Wrap(err, "failed to list platforms supported by image"))
+ }
+
+ var childRootFS []ocispec.RootFS
+ for _, platform := range allPlatforms {
+ rootfs, err := platformRootfs(ctx, cs, target, platform)
+ if err != nil {
+ if cerrdefs.IsNotFound(err) {
+ continue
+ }
+ return nil, errdefs.System(errors.Wrap(err, "failed to get platform-specific rootfs"))
+ }
+
+ childRootFS = append(childRootFS, rootfs)
+ }
+
+ imgs, err := i.client.ImageService().List(ctx)
+ if err != nil {
+ return nil, errdefs.System(errors.Wrap(err, "failed to list all images"))
+ }
+
+ var parents []imageWithRootfs
+ for _, img := range imgs {
+ nextImage:
+ for _, platform := range allPlatforms {
+ rootfs, err := platformRootfs(ctx, cs, img.Target, platform)
+ if err != nil {
+ if cerrdefs.IsNotFound(err) {
+ continue
+ }
+ return nil, errdefs.System(errors.Wrap(err, "failed to get platform-specific rootfs"))
+ }
+
+ for _, childRoot := range childRootFS {
+ if isRootfsChildOf(childRoot, rootfs) {
+ parents = append(parents, imageWithRootfs{
+ img: img,
+ rootfs: rootfs,
+ })
+ break nextImage
+ }
+ }
+ }
+ }
+
+ return parents, nil
+}
+
+type imageWithRootfs struct {
+ img containerdimages.Image
+ rootfs ocispec.RootFS
+}
diff --git a/daemon/containerd/image_delete.go b/daemon/containerd/image_delete.go
index 1fd13cf420..3d55dba394 100644
--- a/daemon/containerd/image_delete.go
+++ b/daemon/containerd/image_delete.go
@@ -2,10 +2,16 @@ package containerd
import (
"context"
+ "fmt"
+ "sort"
+ "strings"
"github.com/containerd/containerd/images"
"github.com/docker/distribution/reference"
"github.com/docker/docker/api/types"
+ "github.com/docker/docker/container"
+ "github.com/docker/docker/image"
+ "github.com/docker/docker/pkg/stringid"
"github.com/opencontainers/go-digest"
ocispec "github.com/opencontainers/image-spec/specs-go/v1"
"github.com/sirupsen/logrus"
@@ -30,8 +36,6 @@ import (
// are divided into two categories grouped by their severity:
//
// Hard Conflict:
-// - a pull or build using the image.
-// - any descendant image.
// - any running container using the image.
//
// Soft Conflict:
@@ -45,8 +49,6 @@ import (
// meaning any delete conflicts will cause the image to not be deleted and the
// conflict will not be reported.
//
-// TODO(thaJeztah): implement ImageDelete "force" options; see https://github.com/moby/moby/issues/43850
-// TODO(thaJeztah): implement ImageDelete "prune" options; see https://github.com/moby/moby/issues/43849
// TODO(thaJeztah): image delete should send prometheus counters; see https://github.com/moby/moby/issues/45268
func (i *ImageService) ImageDelete(ctx context.Context, imageRef string, force, prune bool) ([]types.ImageDeleteResponseItem, error) {
parsedRef, err := reference.ParseNormalizedNamed(imageRef)
@@ -59,28 +61,278 @@ func (i *ImageService) ImageDelete(ctx context.Context, imageRef string, force,
return nil, err
}
+ imgID := image.ID(img.Target.Digest)
+
+ if isImageIDPrefix(imgID.String(), imageRef) {
+ return i.deleteAll(ctx, img, force, prune)
+ }
+
+ singleRef, err := i.isSingleReference(ctx, img)
+ if err != nil {
+ return nil, err
+ }
+ if !singleRef {
+ err := i.client.ImageService().Delete(ctx, img.Name)
+ if err != nil {
+ return nil, err
+ }
+ i.LogImageEvent(imgID.String(), imgID.String(), "untag")
+ records := []types.ImageDeleteResponseItem{{Untagged: reference.FamiliarString(reference.TagNameOnly(parsedRef))}}
+ return records, nil
+ }
+
+ using := func(c *container.Container) bool {
+ return c.ImageID == imgID
+ }
+ ctr := i.containers.First(using)
+ if ctr != nil {
+ if !force {
+ // If we removed the repository reference then
+ // this image would remain "dangling" and since
+ // we really want to avoid that the client must
+ // explicitly force its removal.
+ refString := reference.FamiliarString(reference.TagNameOnly(parsedRef))
+ err := &imageDeleteConflict{
+ reference: refString,
+ used: true,
+ message: fmt.Sprintf("container %s is using its referenced image %s",
+ stringid.TruncateID(ctr.ID),
+ stringid.TruncateID(imgID.String())),
+ }
+ return nil, err
+ }
+
+ err := i.softImageDelete(ctx, img)
+ if err != nil {
+ return nil, err
+ }
+
+ i.LogImageEvent(imgID.String(), imgID.String(), "untag")
+ records := []types.ImageDeleteResponseItem{{Untagged: reference.FamiliarString(reference.TagNameOnly(parsedRef))}}
+ return records, nil
+ }
+
+ return i.deleteAll(ctx, img, force, prune)
+}
+
+// deleteAll deletes the image from the daemon, and if prune is true,
+// also deletes dangling parents if there is no conflict in doing so.
+// Parent images are removed quietly, and if there is any issue/conflict
+// it is logged but does not halt execution/an error is not returned.
+func (i *ImageService) deleteAll(ctx context.Context, img images.Image, force, prune bool) ([]types.ImageDeleteResponseItem, error) {
+ var records []types.ImageDeleteResponseItem
+
+ // Workaround for: https://github.com/moby/buildkit/issues/3797
possiblyDeletedConfigs := map[digest.Digest]struct{}{}
- if err := i.walkPresentChildren(ctx, img.Target, func(_ context.Context, d ocispec.Descriptor) {
+ err := i.walkPresentChildren(ctx, img.Target, func(_ context.Context, d ocispec.Descriptor) {
if images.IsConfigType(d.MediaType) {
possiblyDeletedConfigs[d.Digest] = struct{}{}
}
- }); err != nil {
+ })
+ if err != nil {
return nil, err
}
+ defer func() {
+ if err := i.unleaseSnapshotsFromDeletedConfigs(context.Background(), possiblyDeletedConfigs); err != nil {
+ logrus.WithError(err).Warn("failed to unlease snapshots")
+ }
+ }()
- err = i.client.ImageService().Delete(ctx, img.Name, images.SynchronousDelete())
+ imgID := img.Target.Digest.String()
+
+ var parents []imageWithRootfs
+ if prune {
+ parents, err = i.parents(ctx, image.ID(imgID))
+ if err != nil {
+ logrus.WithError(err).Warn("failed to get image parents")
+ }
+ sortParentsByAffinity(parents)
+ }
+
+ imageRefs, err := i.client.ImageService().List(ctx, "target.digest=="+imgID)
if err != nil {
return nil, err
}
+ for _, imageRef := range imageRefs {
+ if err := i.imageDeleteHelper(ctx, imageRef, &records, force); err != nil {
+ return records, err
+ }
+ }
+ i.LogImageEvent(imgID, imgID, "delete")
+ records = append(records, types.ImageDeleteResponseItem{Deleted: imgID})
- // Workaround for: https://github.com/moby/buildkit/issues/3797
- if err := i.unleaseSnapshotsFromDeletedConfigs(context.Background(), possiblyDeletedConfigs); err != nil {
- logrus.WithError(err).Warn("failed to unlease snapshots")
+ for _, parent := range parents {
+ if !isDanglingImage(parent.img) {
+ break
+ }
+ err = i.imageDeleteHelper(ctx, parent.img, &records, false)
+ if err != nil {
+ logrus.WithError(err).Warn("failed to remove image parent")
+ break
+ }
+ parentID := parent.img.Target.Digest.String()
+ i.LogImageEvent(parentID, parentID, "delete")
+ records = append(records, types.ImageDeleteResponseItem{Deleted: parentID})
}
- imgID := string(img.Target.Digest)
- i.LogImageEvent(imgID, imgID, "untag")
- i.LogImageEvent(imgID, imgID, "delete")
+ return records, nil
+}
+
+// isImageIDPrefix returns whether the given
+// possiblePrefix is a prefix of the given imageID.
+func isImageIDPrefix(imageID, possiblePrefix string) bool {
+ if strings.HasPrefix(imageID, possiblePrefix) {
+ return true
+ }
+ if i := strings.IndexRune(imageID, ':'); i >= 0 {
+ return strings.HasPrefix(imageID[i+1:], possiblePrefix)
+ }
+ return false
+}
+
+func sortParentsByAffinity(parents []imageWithRootfs) {
+ sort.Slice(parents, func(i, j int) bool {
+ lenRootfsI := len(parents[i].rootfs.DiffIDs)
+ lenRootfsJ := len(parents[j].rootfs.DiffIDs)
+ if lenRootfsI == lenRootfsJ {
+ return isDanglingImage(parents[i].img)
+ }
+ return lenRootfsI > lenRootfsJ
+ })
+}
+
+// isSingleReference returns true if there are no other images in the
+// daemon targeting the same content as `img` that are not dangling.
+func (i *ImageService) isSingleReference(ctx context.Context, img images.Image) (bool, error) {
+ refs, err := i.client.ImageService().List(ctx, "target.digest=="+img.Target.Digest.String())
+ if err != nil {
+ return false, err
+ }
+ for _, ref := range refs {
+ if !isDanglingImage(ref) && ref.Name != img.Name {
+ return false, nil
+ }
+ }
+ return true, nil
+}
+
+type conflictType int
+
+const (
+ conflictRunningContainer conflictType = 1 << iota
+ conflictActiveReference
+ conflictStoppedContainer
+ conflictHard = conflictRunningContainer
+ conflictSoft = conflictActiveReference | conflictStoppedContainer
+)
+
+// imageDeleteHelper attempts to delete the given image from this daemon.
+// If the image has any hard delete conflicts (running containers using
+// the image) then it cannot be deleted. If the image has any soft delete
+// conflicts (any tags/digests referencing the image or any stopped container
+// using the image) then it can only be deleted if force is true. Any deleted
+// images and untagged references are appended to the given records. If any
+// error or conflict is encountered, it will be returned immediately without
+// deleting the image.
+func (i *ImageService) imageDeleteHelper(ctx context.Context, img images.Image, records *[]types.ImageDeleteResponseItem, force bool) error {
+ // First, determine if this image has any conflicts. Ignore soft conflicts
+ // if force is true.
+ c := conflictHard
+ if !force {
+ c |= conflictSoft
+ }
+
+ imgID := image.ID(img.Target.Digest)
+
+ err := i.checkImageDeleteConflict(ctx, imgID, c)
+ if err != nil {
+ return err
+ }
+
+ untaggedRef, err := reference.ParseAnyReference(img.Name)
+ if err != nil {
+ return err
+ }
+ err = i.client.ImageService().Delete(ctx, img.Name, images.SynchronousDelete())
+ if err != nil {
+ return err
+ }
+
+ i.LogImageEvent(imgID.String(), imgID.String(), "untag")
+ *records = append(*records, types.ImageDeleteResponseItem{Untagged: reference.FamiliarString(untaggedRef)})
+
+ return nil
+}
+
+// ImageDeleteConflict holds a soft or hard conflict and associated
+// error. A hard conflict represents a running container using the
+// image, while a soft conflict is any tags/digests referencing the
+// given image or any stopped container using the image.
+// Implements the error interface.
+type imageDeleteConflict struct {
+ hard bool
+ used bool
+ reference string
+ message string
+}
+
+func (idc *imageDeleteConflict) Error() string {
+ var forceMsg string
+ if idc.hard {
+ forceMsg = "cannot be forced"
+ } else {
+ forceMsg = "must be forced"
+ }
+ return fmt.Sprintf("conflict: unable to delete %s (%s) - %s", idc.reference, forceMsg, idc.message)
+}
+
+func (imageDeleteConflict) Conflict() {}
+
+// checkImageDeleteConflict returns a conflict representing
+// any issue preventing deletion of the given image ID, and
+// nil if there are none. It takes a bitmask representing a
+// filter for which conflict types the caller cares about,
+// and will only check for these conflict types.
+func (i *ImageService) checkImageDeleteConflict(ctx context.Context, imgID image.ID, mask conflictType) error {
+ if mask&conflictRunningContainer != 0 {
+ running := func(c *container.Container) bool {
+ return c.ImageID == imgID && c.IsRunning()
+ }
+ if ctr := i.containers.First(running); ctr != nil {
+ return &imageDeleteConflict{
+ reference: stringid.TruncateID(imgID.String()),
+ hard: true,
+ used: true,
+ message: fmt.Sprintf("image is being used by running container %s", stringid.TruncateID(ctr.ID)),
+ }
+ }
+ }
+
+ if mask&conflictStoppedContainer != 0 {
+ stopped := func(c *container.Container) bool {
+ return !c.IsRunning() && c.ImageID == imgID
+ }
+ if ctr := i.containers.First(stopped); ctr != nil {
+ return &imageDeleteConflict{
+ reference: stringid.TruncateID(imgID.String()),
+ used: true,
+ message: fmt.Sprintf("image is being used by stopped container %s", stringid.TruncateID(ctr.ID)),
+ }
+ }
+ }
+
+ if mask&conflictActiveReference != 0 {
+ refs, err := i.client.ImageService().List(ctx, "target.digest=="+imgID.String())
+ if err != nil {
+ return err
+ }
+ if len(refs) > 1 {
+ return &imageDeleteConflict{
+ reference: stringid.TruncateID(imgID.String()),
+ message: "image is referenced in multiple repositories",
+ }
+ }
+ }
- return []types.ImageDeleteResponseItem{{Untagged: reference.FamiliarString(parsedRef)}}, nil
+ return nil
}