// ContainerRename changes the name of a container, using the oldName // to find the container. An error is returned if newName is already // reserved. func (daemon *Daemon) ContainerRename(oldName, newName string) error { var ( sid string sb libnetwork.Sandbox ) if oldName == "" || newName == "" { return fmt.Errorf("Neither old nor new names may be empty") } if newName[0] != '/' { newName = "/" + newName } container, err := daemon.GetContainer(oldName) if err != nil { return err } oldName = container.Name oldIsAnonymousEndpoint := container.NetworkSettings.IsAnonymousEndpoint container.Lock() defer container.Unlock() if oldName == newName { return fmt.Errorf("Renaming a container with the same name as its current name") } if newName, err = daemon.reserveName(container.ID, newName); err != nil { return fmt.Errorf("Error when allocating new name: %v", err) } container.Name = newName container.NetworkSettings.IsAnonymousEndpoint = false defer func() { if err != nil { container.Name = oldName container.NetworkSettings.IsAnonymousEndpoint = oldIsAnonymousEndpoint daemon.reserveName(container.ID, oldName) daemon.releaseName(newName) } }() daemon.releaseName(oldName) if err = container.ToDisk(); err != nil { return err } attributes := map[string]string{ "oldName": oldName, } if !container.Running { daemon.LogContainerEventWithAttributes(container, "rename", attributes) return nil } defer func() { if err != nil { container.Name = oldName container.NetworkSettings.IsAnonymousEndpoint = oldIsAnonymousEndpoint if e := container.ToDisk(); e != nil { logrus.Errorf("%s: Failed in writing to Disk on rename failure: %v", container.ID, e) } } }() sid = container.NetworkSettings.SandboxID if daemon.netController != nil { sb, err = daemon.netController.SandboxByID(sid) if err != nil { return err } err = sb.Rename(strings.TrimPrefix(container.Name, "/")) if err != nil { return err } } daemon.LogContainerEventWithAttributes(container, "rename", attributes) return nil }
// ContainerRename changes the name of a container, using the oldName // to find the container. An error is returned if newName is already // reserved. func (daemon *Daemon) ContainerRename(oldName, newName string) error { var ( sid string sb libnetwork.Sandbox ) if oldName == "" || newName == "" { return derr.ErrorCodeEmptyRename } container, err := daemon.GetContainer(oldName) if err != nil { return err } oldName = container.Name container.Lock() defer container.Unlock() if newName, err = daemon.reserveName(container.ID, newName); err != nil { return derr.ErrorCodeRenameTaken.WithArgs(err) } container.Name = newName defer func() { if err != nil { container.Name = oldName daemon.reserveName(container.ID, oldName) daemon.containerGraphDB.Delete(newName) } }() if err = daemon.containerGraphDB.Delete(oldName); err != nil { return derr.ErrorCodeRenameDelete.WithArgs(oldName, err) } if err = container.ToDisk(); err != nil { return err } if !container.Running { daemon.LogContainerEvent(container, "rename") return nil } defer func() { if err != nil { container.Name = oldName if e := container.ToDisk(); e != nil { logrus.Errorf("%s: Failed in writing to Disk on rename failure: %v", container.ID, e) } } }() sid = container.NetworkSettings.SandboxID sb, err = daemon.netController.SandboxByID(sid) if err != nil { return err } err = sb.Rename(strings.TrimPrefix(container.Name, "/")) if err != nil { return err } daemon.LogContainerEvent(container, "rename") return nil }
// ContainerRename changes the name of a container, using the oldName // to find the container. An error is returned if newName is already // reserved. func (daemon *Daemon) ContainerRename(oldName, newName string) error { var ( sid string sb libnetwork.Sandbox ) if oldName == "" || newName == "" { return errors.New("Neither old nor new names may be empty") } if newName[0] != '/' { newName = "/" + newName } container, err := daemon.GetContainer(oldName) if err != nil { return err } oldName = container.Name oldIsAnonymousEndpoint := container.NetworkSettings.IsAnonymousEndpoint if oldName == newName { return errors.New("Renaming a container with the same name as its current name") } container.Lock() defer container.Unlock() links := map[string]*dockercontainer.Container{} for k, v := range daemon.linkIndex.children(container) { if !strings.HasPrefix(k, oldName) { return fmt.Errorf("Linked container %s does not match parent %s", k, oldName) } links[strings.TrimPrefix(k, oldName)] = v } if newName, err = daemon.reserveName(container.ID, newName); err != nil { return fmt.Errorf("Error when allocating new name: %v", err) } for k, v := range links { daemon.nameIndex.Reserve(newName+k, v.ID) daemon.linkIndex.link(container, v, newName+k) } container.Name = newName container.NetworkSettings.IsAnonymousEndpoint = false defer func() { if err != nil { container.Name = oldName container.NetworkSettings.IsAnonymousEndpoint = oldIsAnonymousEndpoint daemon.reserveName(container.ID, oldName) for k, v := range links { daemon.nameIndex.Reserve(oldName+k, v.ID) daemon.linkIndex.link(container, v, oldName+k) daemon.linkIndex.unlink(newName+k, v, container) daemon.nameIndex.Release(newName + k) } daemon.releaseName(newName) } }() for k, v := range links { daemon.linkIndex.unlink(oldName+k, v, container) daemon.nameIndex.Release(oldName + k) } daemon.releaseName(oldName) if err = container.ToDisk(); err != nil { return err } attributes := map[string]string{ "oldName": oldName, } if !container.Running { daemon.LogContainerEventWithAttributes(container, "rename", attributes) return nil } defer func() { if err != nil { container.Name = oldName container.NetworkSettings.IsAnonymousEndpoint = oldIsAnonymousEndpoint if e := container.ToDisk(); e != nil { logrus.Errorf("%s: Failed in writing to Disk on rename failure: %v", container.ID, e) } } }() sid = container.NetworkSettings.SandboxID if daemon.netController != nil { sb, err = daemon.netController.SandboxByID(sid) if err != nil { return err } err = sb.Rename(strings.TrimPrefix(container.Name, "/")) if err != nil { return err } } daemon.LogContainerEventWithAttributes(container, "rename", attributes) return nil }