feat: add poc implementation for container run command

This commit is contained in:
Guilherme Ananias
2025-06-13 18:50:15 -03:00
parent 02af722c7d
commit 59c29b5e19
7 changed files with 397 additions and 0 deletions

1
.gitignore vendored Normal file
View File

@@ -0,0 +1 @@
/target

138
Cargo.lock generated Normal file
View File

@@ -0,0 +1,138 @@
# This file is automatically @generated by Cargo.
# It is not intended for manual editing.
version = 4
[[package]]
name = "container-compose"
version = "0.1.0"
dependencies = [
"serde",
"serde_json",
"serde_yaml",
]
[[package]]
name = "equivalent"
version = "1.0.2"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "877a4ace8713b0bcf2a4e7eec82529c029f1d0619886d18145fea96c3ffe5c0f"
[[package]]
name = "hashbrown"
version = "0.15.4"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "5971ac85611da7067dbfcabef3c70ebb5606018acd9e2a3903a0da507521e0d5"
[[package]]
name = "indexmap"
version = "2.9.0"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "cea70ddb795996207ad57735b50c5982d8844f38ba9ee5f1aedcfb708a2aa11e"
dependencies = [
"equivalent",
"hashbrown",
]
[[package]]
name = "itoa"
version = "1.0.15"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "4a5f13b858c8d314ee3e8f639011f7ccefe71f97f96e50151fb991f267928e2c"
[[package]]
name = "memchr"
version = "2.7.5"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "32a282da65faaf38286cf3be983213fcf1d2e2a58700e808f83f4ea9a4804bc0"
[[package]]
name = "proc-macro2"
version = "1.0.95"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "02b3e5e68a3a1a02aad3ec490a98007cbc13c37cbe84a3cd7b8e406d76e7f778"
dependencies = [
"unicode-ident",
]
[[package]]
name = "quote"
version = "1.0.40"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "1885c039570dc00dcb4ff087a89e185fd56bae234ddc7f056a945bf36467248d"
dependencies = [
"proc-macro2",
]
[[package]]
name = "ryu"
version = "1.0.20"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "28d3b2b1366ec20994f1fd18c3c594f05c5dd4bc44d8bb0c1c632c8d6829481f"
[[package]]
name = "serde"
version = "1.0.219"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "5f0e2c6ed6606019b4e29e69dbaba95b11854410e5347d525002456dbbb786b6"
dependencies = [
"serde_derive",
]
[[package]]
name = "serde_derive"
version = "1.0.219"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "5b0276cf7f2c73365f7157c8123c21cd9a50fbbd844757af28ca1f5925fc2a00"
dependencies = [
"proc-macro2",
"quote",
"syn",
]
[[package]]
name = "serde_json"
version = "1.0.140"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "20068b6e96dc6c9bd23e01df8827e6c7e1f2fddd43c21810382803c136b99373"
dependencies = [
"itoa",
"memchr",
"ryu",
"serde",
]
[[package]]
name = "serde_yaml"
version = "0.9.34+deprecated"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "6a8b1a1a2ebf674015cc02edccce75287f1a0130d394307b36743c2f5d504b47"
dependencies = [
"indexmap",
"itoa",
"ryu",
"serde",
"unsafe-libyaml",
]
[[package]]
name = "syn"
version = "2.0.103"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "e4307e30089d6fd6aff212f2da3a1f9e32f3223b1f010fb09b7c95f90f3ca1e8"
dependencies = [
"proc-macro2",
"quote",
"unicode-ident",
]
[[package]]
name = "unicode-ident"
version = "1.0.18"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "5a5f39404a5da50712a4c1eecf25e90dd62b613502b7e925fd4e4d19b5c96512"
[[package]]
name = "unsafe-libyaml"
version = "0.2.11"
source = "registry+https://github.com/rust-lang/crates.io-index"
checksum = "673aac59facbab8a9007c7f6108d11f63b603f7cabff99fabf650fea5c32b861"

9
Cargo.toml Normal file
View File

@@ -0,0 +1,9 @@
[package]
name = "container-compose"
version = "0.1.0"
edition = "2024"
[dependencies]
serde = { version = "1.0.219", features = ["derive"] }
serde_json = "1.0.140"
serde_yaml = "0.9.34"

View File

@@ -0,0 +1,9 @@
version: '3.8'
services:
postgres:
image: postgres:15
ports:
- 5432:5432
environment:
- POSTGRES_PASSWORD=postgres

97
src/container.rs Normal file
View File

@@ -0,0 +1,97 @@
use serde::Deserialize;
use std::collections::HashMap;
#[allow(dead_code, unused_variables)]
#[derive(Debug, Deserialize, Clone)]
pub struct Container {
pub networks: Vec<Network>,
pub status: String,
pub configuration: Configuration,
}
#[derive(Debug, Deserialize, Clone)]
pub struct Network {
pub address: String,
pub gateway: String,
pub network: String,
pub hostname: String,
}
#[derive(Debug, Deserialize, Clone)]
pub struct Configuration {
pub resources: Resources,
pub labels: HashMap<String, String>,
pub hostname: String,
pub sysctls: HashMap<String, String>,
pub networks: Vec<String>,
pub initProcess: InitProcess,
pub id: String,
pub rosetta: bool,
pub runtimeHandler: String,
pub platform: Platform,
pub mounts: Vec<Mount>,
pub image: Image,
pub dns: Dns,
}
#[derive(Debug, Deserialize, Clone)]
pub struct Resources {
pub cpus: u32,
pub memoryInBytes: u64,
}
#[derive(Debug, Deserialize, Clone)]
pub struct InitProcess {
pub environment: Vec<String>,
pub arguments: Vec<String>,
pub executable: String,
pub workingDirectory: String,
pub terminal: bool,
pub user: User,
pub supplementalGroups: Vec<u32>,
pub rlimits: Vec<String>,
}
#[derive(Debug, Deserialize, Clone)]
pub struct User {
pub id: Id,
}
#[derive(Debug, Deserialize, Clone)]
pub struct Id {
pub uid: u32,
pub gid: u32,
}
#[derive(Debug, Deserialize, Clone)]
pub struct Platform {
pub os: String,
pub architecture: String,
}
#[derive(Debug, Deserialize, Clone)]
pub struct Mount {
// Fill in fields as needed
}
#[derive(Debug, Deserialize, Clone)]
pub struct Image {
pub reference: String,
pub descriptor: Descriptor,
}
#[derive(Debug, Deserialize, Clone)]
pub struct Descriptor {
pub size: u64,
pub digest: String,
// pub annotations: HashMap<String, String>,
// pub media_type: String,
}
#[derive(Debug, Deserialize, Clone)]
pub struct Dns {
pub nameservers: Vec<String>,
// pub search_domains: Vec<String>,
pub options: Vec<String>,
}

71
src/deserializer.rs Normal file
View File

@@ -0,0 +1,71 @@
use std::collections::HashMap;
use serde::{Deserialize};
use serde::de::{self, Deserializer, MapAccess, SeqAccess, Visitor};
use std::fmt;
#[derive(Debug, Deserialize)]
pub struct Service {
pub name: Option<String>,
pub image: String,
pub ports: Vec<String>,
#[serde(deserialize_with = "deserialize_environment")]
pub environment: HashMap<String, String>,
}
#[derive(Debug, Deserialize)]
pub struct Compose {
pub version: String,
pub services: HashMap<String, Service>,
}
pub fn deserialize_yaml(yaml: &str) -> Result<Compose, serde_yaml::Error> {
match serde_yaml::from_str(yaml) {
Ok(compose) => Ok(compose),
Err(e) => Err(e),
}
}
fn deserialize_environment<'a, D>(deserializer: D) -> Result<HashMap<String, String>, D::Error>
where
D: Deserializer<'a>,
{
struct EnvVisitor;
impl<'a> Visitor<'a> for EnvVisitor {
type Value = HashMap<String, String>;
fn expecting(&self, formatter: &mut fmt::Formatter) -> fmt::Result {
formatter.write_str("a map or a list of key=value strings")
}
fn visit_map<M>(self, mut access: M) -> Result<Self::Value, M::Error>
where
M: MapAccess<'a>,
{
let mut map = HashMap::new();
while let Some((key, value)) = access.next_entry()? {
map.insert(key, value);
}
Ok(map)
}
fn visit_seq<A>(self, mut seq: A) -> Result<Self::Value, A::Error>
where
A: SeqAccess<'a>,
{
let mut map = HashMap::new();
while let Some(entry) = seq.next_element::<String>()? {
let parts: Vec<&str> = entry.splitn(2, '=').collect();
if parts.len() == 2 {
map.insert(parts[0].to_string(), parts[1].to_string());
} else {
return Err(de::Error::custom(format!("Invalid environment variable: {}", entry)));
}
}
Ok(map)
}
}
deserializer.deserialize_any(EnvVisitor)
}

72
src/main.rs Normal file
View File

@@ -0,0 +1,72 @@
use std::{fs, process::Command};
mod deserializer;
mod container;
fn main() {
let yaml = fs::read_to_string("examples/docker-compose.yaml").unwrap();
let compose = deserializer::deserialize_yaml(&yaml).unwrap();
println!("{:?}", compose);
for (name, service) in compose.services.iter() {
let command = format!("docker run -d --name {} {}", name, service.image);
println!("{}", command);
let container_name = service.name.clone().unwrap_or(name.clone());
// call a command in terminal
let mut output = Command::new("container");
output
.arg("run")
.arg("--name")
.arg(container_name.clone());
for (key, value) in service.environment.iter() {
let env_var = format!("{}={}", key, value);
println!("-e env {}", env_var);
output.arg("-e");
output.arg(env_var);
}
let output = output
.arg("-d")
.arg(service.image.clone());
let output = dbg!(output);
let output = output.output().expect("Failed to execute process");
println!("{}", String::from_utf8(output.stdout).unwrap());
println!("{}", String::from_utf8(output.stderr).unwrap());
if service.ports.len() > 0 {
println!("Found ports in service, container does not support mapping port yet. Running socat fallback.)");
let command = Command::new("container")
.arg("inspect")
.arg(container_name.clone())
.output()
.expect("Failed to execute process");
let value = String::from_utf8(command.stdout).unwrap();
let container = serde_json::from_str::<Vec<container::Container>>(&value).unwrap()[0].clone();
for port in service.ports.iter() {
let port = port.split(":").collect::<Vec<&str>>();
let host_port = port[0].parse::<u16>().unwrap();
let container_port = port[1].parse::<u16>().unwrap();
let container_ip = format!("{}:{}", container.configuration.networks[0], container_port);
let output = Command::new("socat")
.arg(format!("TCP-LISTEN:{},fork", host_port))
.arg(format!("TCP:{}", container_ip))
.output()
.expect("Failed to execute process");
println!("success: {}", String::from_utf8(output.stdout).unwrap());
println!("error: {}", String::from_utf8(output.stderr).unwrap());
}
}
}
}