10 "github.com/Sirupsen/logrus"
11 "github.com/docker/distribution/reference"
12 "github.com/docker/docker/api/types"
13 "github.com/docker/docker/api/types/filters"
14 timetypes "github.com/docker/docker/api/types/time"
15 "github.com/docker/docker/image"
16 "github.com/docker/docker/layer"
17 "github.com/docker/docker/pkg/directory"
18 "github.com/docker/docker/pkg/system"
19 "github.com/docker/docker/runconfig"
20 "github.com/docker/docker/volume"
21 "github.com/docker/libnetwork"
22 digest "github.com/opencontainers/go-digest"
23 "golang.org/x/net/context"
27 // errPruneRunning is returned when a prune request is received while
29 errPruneRunning = fmt.Errorf("a prune operation is already running")
31 containersAcceptedFilters = map[string]bool{
36 volumesAcceptedFilters = map[string]bool{
40 imagesAcceptedFilters = map[string]bool{
46 networksAcceptedFilters = map[string]bool{
53 // ContainersPrune removes unused containers
54 func (daemon *Daemon) ContainersPrune(ctx context.Context, pruneFilters filters.Args) (*types.ContainersPruneReport, error) {
55 if !atomic.CompareAndSwapInt32(&daemon.pruneRunning, 0, 1) {
56 return nil, errPruneRunning
58 defer atomic.StoreInt32(&daemon.pruneRunning, 0)
60 rep := &types.ContainersPruneReport{}
62 // make sure that only accepted filters have been received
63 err := pruneFilters.Validate(containersAcceptedFilters)
68 until, err := getUntilFromPruneFilters(pruneFilters)
73 allContainers := daemon.List()
74 for _, c := range allContainers {
77 logrus.Warnf("ContainersPrune operation cancelled: %#v", *rep)
83 if !until.IsZero() && c.Created.After(until) {
86 if !matchLabels(pruneFilters, c.Config.Labels) {
89 cSize, _ := daemon.getSize(c.ID)
90 // TODO: sets RmLink to true?
91 err := daemon.ContainerRm(c.ID, &types.ContainerRmConfig{})
93 logrus.Warnf("failed to prune container %s: %v", c.ID, err)
97 rep.SpaceReclaimed += uint64(cSize)
99 rep.ContainersDeleted = append(rep.ContainersDeleted, c.ID)
106 // VolumesPrune removes unused local volumes
107 func (daemon *Daemon) VolumesPrune(ctx context.Context, pruneFilters filters.Args) (*types.VolumesPruneReport, error) {
108 if !atomic.CompareAndSwapInt32(&daemon.pruneRunning, 0, 1) {
109 return nil, errPruneRunning
111 defer atomic.StoreInt32(&daemon.pruneRunning, 0)
113 // make sure that only accepted filters have been received
114 err := pruneFilters.Validate(volumesAcceptedFilters)
119 rep := &types.VolumesPruneReport{}
121 pruneVols := func(v volume.Volume) error {
124 logrus.Warnf("VolumesPrune operation cancelled: %#v", *rep)
130 refs := daemon.volumes.Refs(v)
133 detailedVolume, ok := v.(volume.DetailedVolume)
135 if !matchLabels(pruneFilters, detailedVolume.Labels()) {
139 vSize, err := directory.Size(v.Path())
141 logrus.Warnf("could not determine size of volume %s: %v", name, err)
143 err = daemon.volumes.Remove(v)
145 logrus.Warnf("could not remove volume %s: %v", name, err)
148 rep.SpaceReclaimed += uint64(vSize)
149 rep.VolumesDeleted = append(rep.VolumesDeleted, name)
155 err = daemon.traverseLocalVolumes(pruneVols)
160 // ImagesPrune removes unused images
161 func (daemon *Daemon) ImagesPrune(ctx context.Context, pruneFilters filters.Args) (*types.ImagesPruneReport, error) {
162 // TODO @jhowardmsft LCOW Support: This will need revisiting later.
163 platform := runtime.GOOS
164 if system.LCOWSupported() {
168 if !atomic.CompareAndSwapInt32(&daemon.pruneRunning, 0, 1) {
169 return nil, errPruneRunning
171 defer atomic.StoreInt32(&daemon.pruneRunning, 0)
173 // make sure that only accepted filters have been received
174 err := pruneFilters.Validate(imagesAcceptedFilters)
179 rep := &types.ImagesPruneReport{}
182 if pruneFilters.Include("dangling") {
183 if pruneFilters.ExactMatch("dangling", "false") || pruneFilters.ExactMatch("dangling", "0") {
185 } else if !pruneFilters.ExactMatch("dangling", "true") && !pruneFilters.ExactMatch("dangling", "1") {
186 return nil, fmt.Errorf("Invalid filter 'dangling=%s'", pruneFilters.Get("dangling"))
190 until, err := getUntilFromPruneFilters(pruneFilters)
195 var allImages map[image.ID]*image.Image
197 allImages = daemon.stores[platform].imageStore.Heads()
199 allImages = daemon.stores[platform].imageStore.Map()
201 allContainers := daemon.List()
202 imageRefs := map[string]bool{}
203 for _, c := range allContainers {
206 return nil, ctx.Err()
208 imageRefs[c.ID] = true
212 // Filter intermediary images and get their unique size
213 allLayers := daemon.stores[platform].layerStore.Map()
214 topImages := map[image.ID]*image.Image{}
215 for id, img := range allImages {
218 return nil, ctx.Err()
220 dgst := digest.Digest(id)
221 if len(daemon.stores[platform].referenceStore.References(dgst)) == 0 && len(daemon.stores[platform].imageStore.Children(id)) != 0 {
224 if !until.IsZero() && img.Created.After(until) {
227 if img.Config != nil && !matchLabels(pruneFilters, img.Config.Labels) {
236 for id := range topImages {
239 // we still want to calculate freed size and return the data
241 break deleteImagesLoop
245 dgst := digest.Digest(id)
247 if _, ok := imageRefs[hex]; ok {
251 deletedImages := []types.ImageDeleteResponseItem{}
252 refs := daemon.stores[platform].referenceStore.References(dgst)
254 shouldDelete := !danglingOnly
257 for _, ref := range refs {
258 if _, ok := ref.(reference.NamedTagged); ok {
264 // Only delete if it's untagged (i.e. repo:<none>)
265 shouldDelete = !hasTag
269 for _, ref := range refs {
270 imgDel, err := daemon.ImageDelete(ref.String(), false, true)
272 logrus.Warnf("could not delete reference %s: %v", ref.String(), err)
275 deletedImages = append(deletedImages, imgDel...)
279 imgDel, err := daemon.ImageDelete(hex, false, true)
281 logrus.Warnf("could not delete image %s: %v", hex, err)
284 deletedImages = append(deletedImages, imgDel...)
287 rep.ImagesDeleted = append(rep.ImagesDeleted, deletedImages...)
290 // Compute how much space was freed
291 for _, d := range rep.ImagesDeleted {
293 chid := layer.ChainID(d.Deleted)
294 if l, ok := allLayers[chid]; ok {
295 diffSize, err := l.DiffSize()
297 logrus.Warnf("failed to get layer %s size: %v", chid, err)
300 rep.SpaceReclaimed += uint64(diffSize)
306 logrus.Warnf("ImagesPrune operation cancelled: %#v", *rep)
307 return nil, ctx.Err()
313 // localNetworksPrune removes unused local networks
314 func (daemon *Daemon) localNetworksPrune(ctx context.Context, pruneFilters filters.Args) *types.NetworksPruneReport {
315 rep := &types.NetworksPruneReport{}
317 until, _ := getUntilFromPruneFilters(pruneFilters)
319 // When the function returns true, the walk will stop.
320 l := func(nw libnetwork.Network) bool {
326 if nw.Info().ConfigOnly() {
329 if !until.IsZero() && nw.Info().Created().After(until) {
332 if !matchLabels(pruneFilters, nw.Info().Labels()) {
336 if runconfig.IsPreDefinedNetwork(nwName) {
339 if len(nw.Endpoints()) > 0 {
342 if err := daemon.DeleteNetwork(nw.ID()); err != nil {
343 logrus.Warnf("could not remove local network %s: %v", nwName, err)
346 rep.NetworksDeleted = append(rep.NetworksDeleted, nwName)
349 daemon.netController.WalkNetworks(l)
353 // clusterNetworksPrune removes unused cluster networks
354 func (daemon *Daemon) clusterNetworksPrune(ctx context.Context, pruneFilters filters.Args) (*types.NetworksPruneReport, error) {
355 rep := &types.NetworksPruneReport{}
357 until, _ := getUntilFromPruneFilters(pruneFilters)
359 cluster := daemon.GetCluster()
361 if !cluster.IsManager() {
365 networks, err := cluster.GetNetworks()
369 networkIsInUse := regexp.MustCompile(`network ([[:alnum:]]+) is in use`)
370 for _, nw := range networks {
373 return rep, ctx.Err()
376 // Routing-mesh network removal has to be explicitly invoked by user
379 if !until.IsZero() && nw.Created.After(until) {
382 if !matchLabels(pruneFilters, nw.Labels) {
385 // https://github.com/docker/docker/issues/24186
386 // `docker network inspect` unfortunately displays ONLY those containers that are local to that node.
387 // So we try to remove it anyway and check the error
388 err = cluster.RemoveNetwork(nw.ID)
390 // we can safely ignore the "network .. is in use" error
391 match := networkIsInUse.FindStringSubmatch(err.Error())
392 if len(match) != 2 || match[1] != nw.ID {
393 logrus.Warnf("could not remove cluster network %s: %v", nw.Name, err)
397 rep.NetworksDeleted = append(rep.NetworksDeleted, nw.Name)
403 // NetworksPrune removes unused networks
404 func (daemon *Daemon) NetworksPrune(ctx context.Context, pruneFilters filters.Args) (*types.NetworksPruneReport, error) {
405 if !atomic.CompareAndSwapInt32(&daemon.pruneRunning, 0, 1) {
406 return nil, errPruneRunning
408 defer atomic.StoreInt32(&daemon.pruneRunning, 0)
410 // make sure that only accepted filters have been received
411 err := pruneFilters.Validate(networksAcceptedFilters)
416 if _, err := getUntilFromPruneFilters(pruneFilters); err != nil {
420 rep := &types.NetworksPruneReport{}
422 localRep := daemon.localNetworksPrune(ctx, pruneFilters)
423 rep.NetworksDeleted = append(rep.NetworksDeleted, localRep.NetworksDeleted...)
427 logrus.Warnf("NetworksPrune operation cancelled: %#v", *rep)
428 return nil, ctx.Err()
435 func getUntilFromPruneFilters(pruneFilters filters.Args) (time.Time, error) {
437 if !pruneFilters.Include("until") {
440 untilFilters := pruneFilters.Get("until")
441 if len(untilFilters) > 1 {
442 return until, fmt.Errorf("more than one until filter specified")
444 ts, err := timetypes.GetTimestamp(untilFilters[0], time.Now())
448 seconds, nanoseconds, err := timetypes.ParseTimestamps(ts, 0)
452 until = time.Unix(seconds, nanoseconds)
456 func matchLabels(pruneFilters filters.Args, labels map[string]string) bool {
457 if !pruneFilters.MatchKVList("label", labels) {
460 // By default MatchKVList will return true if field (like 'label!') does not exist
461 // So we have to add additional Include("label!") check
462 if pruneFilters.Include("label!") {
463 if pruneFilters.MatchKVList("label!", labels) {