diff --git a/.gitattributes b/.gitattributes index 15671f0cc8..1da452829a 100644 --- a/.gitattributes +++ b/.gitattributes @@ -1,6 +1,7 @@ # Generated files agent/agentcontainers/acmock/acmock.go linguist-generated=true agent/agentcontainers/dcspec/dcspec_gen.go linguist-generated=true +agent/agentcontainers/testdata/devcontainercli/*/*.log linguist-generated=true coderd/apidoc/docs.go linguist-generated=true docs/reference/api/*.md linguist-generated=true docs/reference/cli/*.md linguist-generated=true diff --git a/.github/workflows/typos.toml b/.github/workflows/typos.toml index 7be99fd037..fffd2afbd2 100644 --- a/.github/workflows/typos.toml +++ b/.github/workflows/typos.toml @@ -42,5 +42,6 @@ extend-exclude = [ "site/src/pages/SetupPage/countries.tsx", "provisioner/terraform/testdata/**", # notifications' golden files confuse the detector because of quoted-printable encoding - "coderd/notifications/testdata/**" + "coderd/notifications/testdata/**", + "agent/agentcontainers/testdata/devcontainercli/**" ] diff --git a/agent/agentcontainers/containers.go b/agent/agentcontainers/containers.go index 031d3c7208..edd099dd84 100644 --- a/agent/agentcontainers/containers.go +++ b/agent/agentcontainers/containers.go @@ -9,6 +9,8 @@ import ( "golang.org/x/xerrors" + "github.com/go-chi/chi/v5" + "github.com/coder/coder/v2/coderd/httpapi" "github.com/coder/coder/v2/codersdk" "github.com/coder/quartz" @@ -20,9 +22,10 @@ const ( getContainersTimeout = 5 * time.Second ) -type devcontainersHandler struct { +type Handler struct { cacheDuration time.Duration cl Lister + dccli DevcontainerCLI clock quartz.Clock // lockCh protects the below fields. We use a channel instead of a mutex so we @@ -32,20 +35,26 @@ type devcontainersHandler struct { mtime time.Time } -// Option is a functional option for devcontainersHandler. -type Option func(*devcontainersHandler) +// Option is a functional option for Handler. +type Option func(*Handler) // WithLister sets the agentcontainers.Lister implementation to use. // The default implementation uses the Docker CLI to list containers. func WithLister(cl Lister) Option { - return func(ch *devcontainersHandler) { + return func(ch *Handler) { ch.cl = cl } } -// New returns a new devcontainersHandler with the given options applied. -func New(options ...Option) http.Handler { - ch := &devcontainersHandler{ +func WithDevcontainerCLI(dccli DevcontainerCLI) Option { + return func(ch *Handler) { + ch.dccli = dccli + } +} + +// New returns a new Handler with the given options applied. +func New(options ...Option) *Handler { + ch := &Handler{ lockCh: make(chan struct{}, 1), } for _, opt := range options { @@ -54,7 +63,7 @@ func New(options ...Option) http.Handler { return ch } -func (ch *devcontainersHandler) ServeHTTP(rw http.ResponseWriter, r *http.Request) { +func (ch *Handler) List(rw http.ResponseWriter, r *http.Request) { select { case <-r.Context().Done(): // Client went away. @@ -80,7 +89,7 @@ func (ch *devcontainersHandler) ServeHTTP(rw http.ResponseWriter, r *http.Reques } } -func (ch *devcontainersHandler) getContainers(ctx context.Context) (codersdk.WorkspaceAgentListContainersResponse, error) { +func (ch *Handler) getContainers(ctx context.Context) (codersdk.WorkspaceAgentListContainersResponse, error) { select { case <-ctx.Done(): return codersdk.WorkspaceAgentListContainersResponse{}, ctx.Err() @@ -149,3 +158,61 @@ var _ Lister = NoopLister{} func (NoopLister) List(_ context.Context) (codersdk.WorkspaceAgentListContainersResponse, error) { return codersdk.WorkspaceAgentListContainersResponse{}, nil } + +func (ch *Handler) Recreate(w http.ResponseWriter, r *http.Request) { + ctx := r.Context() + id := chi.URLParam(r, "id") + + if id == "" { + httpapi.Write(ctx, w, http.StatusBadRequest, codersdk.Response{ + Message: "Missing container ID or name", + Detail: "Container ID or name is required to recreate a devcontainer.", + }) + return + } + + containers, err := ch.cl.List(ctx) + if err != nil { + httpapi.Write(ctx, w, http.StatusInternalServerError, codersdk.Response{ + Message: "Could not list containers", + Detail: err.Error(), + }) + return + } + + containerIdx := slices.IndexFunc(containers.Containers, func(c codersdk.WorkspaceAgentContainer) bool { + return c.Match(id) + }) + if containerIdx == -1 { + httpapi.Write(ctx, w, http.StatusNotFound, codersdk.Response{ + Message: "Container not found", + Detail: "Container ID or name not found in the list of containers.", + }) + return + } + + container := containers.Containers[containerIdx] + workspaceFolder := container.Labels[DevcontainerLocalFolderLabel] + configPath := container.Labels[DevcontainerConfigFileLabel] + + // Workspace folder is required to recreate a container, we don't verify + // the config path here because it's optional. + if workspaceFolder == "" { + httpapi.Write(ctx, w, http.StatusBadRequest, codersdk.Response{ + Message: "Missing workspace folder label", + Detail: "The workspace folder label is required to recreate a devcontainer.", + }) + return + } + + _, err = ch.dccli.Up(ctx, workspaceFolder, configPath, WithRemoveExistingContainer()) + if err != nil { + httpapi.Write(ctx, w, http.StatusInternalServerError, codersdk.Response{ + Message: "Could not recreate devcontainer", + Detail: err.Error(), + }) + return + } + + w.WriteHeader(http.StatusNoContent) +} diff --git a/agent/agentcontainers/containers_internal_test.go b/agent/agentcontainers/containers_internal_test.go index 81f73bb0e3..6b59da407f 100644 --- a/agent/agentcontainers/containers_internal_test.go +++ b/agent/agentcontainers/containers_internal_test.go @@ -277,7 +277,7 @@ func TestContainersHandler(t *testing.T) { ctrl = gomock.NewController(t) mockLister = acmock.NewMockLister(ctrl) now = time.Now().UTC() - ch = devcontainersHandler{ + ch = Handler{ cacheDuration: tc.cacheDur, cl: mockLister, clock: clk, diff --git a/agent/agentcontainers/containers_test.go b/agent/agentcontainers/containers_test.go new file mode 100644 index 0000000000..ac479de254 --- /dev/null +++ b/agent/agentcontainers/containers_test.go @@ -0,0 +1,166 @@ +package agentcontainers_test + +import ( + "context" + "net/http" + "net/http/httptest" + "testing" + + "github.com/go-chi/chi/v5" + "github.com/stretchr/testify/assert" + "github.com/stretchr/testify/require" + "golang.org/x/xerrors" + + "github.com/coder/coder/v2/agent/agentcontainers" + "github.com/coder/coder/v2/codersdk" +) + +// fakeLister implements the agentcontainers.Lister interface for +// testing. +type fakeLister struct { + containers codersdk.WorkspaceAgentListContainersResponse + err error +} + +func (f *fakeLister) List(_ context.Context) (codersdk.WorkspaceAgentListContainersResponse, error) { + return f.containers, f.err +} + +// fakeDevcontainerCLI implements the agentcontainers.DevcontainerCLI +// interface for testing. +type fakeDevcontainerCLI struct { + id string + err error +} + +func (f *fakeDevcontainerCLI) Up(_ context.Context, _, _ string, _ ...agentcontainers.DevcontainerCLIUpOptions) (string, error) { + return f.id, f.err +} + +func TestHandler(t *testing.T) { + t.Parallel() + + t.Run("Recreate", func(t *testing.T) { + t.Parallel() + + validContainer := codersdk.WorkspaceAgentContainer{ + ID: "container-id", + FriendlyName: "container-name", + Labels: map[string]string{ + agentcontainers.DevcontainerLocalFolderLabel: "/workspace", + agentcontainers.DevcontainerConfigFileLabel: "/workspace/.devcontainer/devcontainer.json", + }, + } + + missingFolderContainer := codersdk.WorkspaceAgentContainer{ + ID: "missing-folder-container", + FriendlyName: "missing-folder-container", + Labels: map[string]string{}, + } + + tests := []struct { + name string + containerID string + lister *fakeLister + devcontainerCLI *fakeDevcontainerCLI + wantStatus int + wantBody string + }{ + { + name: "Missing ID", + containerID: "", + lister: &fakeLister{}, + devcontainerCLI: &fakeDevcontainerCLI{}, + wantStatus: http.StatusBadRequest, + wantBody: "Missing container ID or name", + }, + { + name: "List error", + containerID: "container-id", + lister: &fakeLister{ + err: xerrors.New("list error"), + }, + devcontainerCLI: &fakeDevcontainerCLI{}, + wantStatus: http.StatusInternalServerError, + wantBody: "Could not list containers", + }, + { + name: "Container not found", + containerID: "nonexistent-container", + lister: &fakeLister{ + containers: codersdk.WorkspaceAgentListContainersResponse{ + Containers: []codersdk.WorkspaceAgentContainer{validContainer}, + }, + }, + devcontainerCLI: &fakeDevcontainerCLI{}, + wantStatus: http.StatusNotFound, + wantBody: "Container not found", + }, + { + name: "Missing workspace folder label", + containerID: "missing-folder-container", + lister: &fakeLister{ + containers: codersdk.WorkspaceAgentListContainersResponse{ + Containers: []codersdk.WorkspaceAgentContainer{missingFolderContainer}, + }, + }, + devcontainerCLI: &fakeDevcontainerCLI{}, + wantStatus: http.StatusBadRequest, + wantBody: "Missing workspace folder label", + }, + { + name: "Devcontainer CLI error", + containerID: "container-id", + lister: &fakeLister{ + containers: codersdk.WorkspaceAgentListContainersResponse{ + Containers: []codersdk.WorkspaceAgentContainer{validContainer}, + }, + }, + devcontainerCLI: &fakeDevcontainerCLI{ + err: xerrors.New("devcontainer CLI error"), + }, + wantStatus: http.StatusInternalServerError, + wantBody: "Could not recreate devcontainer", + }, + { + name: "OK", + containerID: "container-id", + lister: &fakeLister{ + containers: codersdk.WorkspaceAgentListContainersResponse{ + Containers: []codersdk.WorkspaceAgentContainer{validContainer}, + }, + }, + devcontainerCLI: &fakeDevcontainerCLI{}, + wantStatus: http.StatusNoContent, + wantBody: "", + }, + } + + for _, tt := range tests { + t.Run(tt.name, func(t *testing.T) { + t.Parallel() + + // Setup router with the handler under test. + r := chi.NewRouter() + handler := agentcontainers.New( + agentcontainers.WithLister(tt.lister), + agentcontainers.WithDevcontainerCLI(tt.devcontainerCLI), + ) + r.Post("/containers/{id}/recreate", handler.Recreate) + + // Simulate HTTP request to the recreate endpoint. + req := httptest.NewRequest(http.MethodPost, "/containers/"+tt.containerID+"/recreate", nil) + rec := httptest.NewRecorder() + r.ServeHTTP(rec, req) + + // Check the response status code and body. + require.Equal(t, tt.wantStatus, rec.Code, "status code mismatch") + if tt.wantBody != "" { + assert.Contains(t, rec.Body.String(), tt.wantBody, "response body mismatch") + } else if tt.wantStatus == http.StatusNoContent { + assert.Empty(t, rec.Body.String(), "expected empty response body") + } + }) + } + }) +} diff --git a/agent/agentcontainers/devcontainer.go b/agent/agentcontainers/devcontainer.go index 59fa9a5e35..f93e0722c7 100644 --- a/agent/agentcontainers/devcontainer.go +++ b/agent/agentcontainers/devcontainer.go @@ -12,6 +12,15 @@ import ( "github.com/coder/coder/v2/codersdk" ) +const ( + // DevcontainerLocalFolderLabel is the label that contains the path to + // the local workspace folder for a devcontainer. + DevcontainerLocalFolderLabel = "devcontainer.local_folder" + // DevcontainerConfigFileLabel is the label that contains the path to + // the devcontainer.json configuration file. + DevcontainerConfigFileLabel = "devcontainer.config_file" +) + const devcontainerUpScriptTemplate = ` if ! which devcontainer > /dev/null 2>&1; then echo "ERROR: Unable to start devcontainer, @devcontainers/cli is not installed." @@ -52,8 +61,10 @@ ScriptLoop: } func devcontainerStartupScript(dc codersdk.WorkspaceAgentDevcontainer, script codersdk.WorkspaceAgentScript) codersdk.WorkspaceAgentScript { - var args []string - args = append(args, fmt.Sprintf("--workspace-folder %q", dc.WorkspaceFolder)) + args := []string{ + "--log-format json", + fmt.Sprintf("--workspace-folder %q", dc.WorkspaceFolder), + } if dc.ConfigPath != "" { args = append(args, fmt.Sprintf("--config %q", dc.ConfigPath)) } diff --git a/agent/agentcontainers/devcontainer_test.go b/agent/agentcontainers/devcontainer_test.go index eb836af928..5e0f5d8dae 100644 --- a/agent/agentcontainers/devcontainer_test.go +++ b/agent/agentcontainers/devcontainer_test.go @@ -101,12 +101,12 @@ func TestExtractAndInitializeDevcontainerScripts(t *testing.T) { wantDevcontainerScripts: []codersdk.WorkspaceAgentScript{ { ID: devcontainerIDs[0], - Script: "devcontainer up --workspace-folder \"workspace1\"", + Script: "devcontainer up --log-format json --workspace-folder \"workspace1\"", RunOnStart: false, }, { ID: devcontainerIDs[1], - Script: "devcontainer up --workspace-folder \"workspace2\"", + Script: "devcontainer up --log-format json --workspace-folder \"workspace2\"", RunOnStart: false, }, }, @@ -136,12 +136,12 @@ func TestExtractAndInitializeDevcontainerScripts(t *testing.T) { wantDevcontainerScripts: []codersdk.WorkspaceAgentScript{ { ID: devcontainerIDs[0], - Script: "devcontainer up --workspace-folder \"workspace1\" --config \"workspace1/config1\"", + Script: "devcontainer up --log-format json --workspace-folder \"workspace1\" --config \"workspace1/config1\"", RunOnStart: false, }, { ID: devcontainerIDs[1], - Script: "devcontainer up --workspace-folder \"workspace2\" --config \"workspace2/config2\"", + Script: "devcontainer up --log-format json --workspace-folder \"workspace2\" --config \"workspace2/config2\"", RunOnStart: false, }, }, @@ -174,12 +174,12 @@ func TestExtractAndInitializeDevcontainerScripts(t *testing.T) { wantDevcontainerScripts: []codersdk.WorkspaceAgentScript{ { ID: devcontainerIDs[0], - Script: "devcontainer up --workspace-folder \"/home/workspace1\" --config \"/home/workspace1/config1\"", + Script: "devcontainer up --log-format json --workspace-folder \"/home/workspace1\" --config \"/home/workspace1/config1\"", RunOnStart: false, }, { ID: devcontainerIDs[1], - Script: "devcontainer up --workspace-folder \"/home/workspace2\" --config \"/home/workspace2/config2\"", + Script: "devcontainer up --log-format json --workspace-folder \"/home/workspace2\" --config \"/home/workspace2/config2\"", RunOnStart: false, }, }, @@ -216,12 +216,12 @@ func TestExtractAndInitializeDevcontainerScripts(t *testing.T) { wantDevcontainerScripts: []codersdk.WorkspaceAgentScript{ { ID: devcontainerIDs[0], - Script: "devcontainer up --workspace-folder \"/home/workspace1\" --config \"/home/config1\"", + Script: "devcontainer up --log-format json --workspace-folder \"/home/workspace1\" --config \"/home/config1\"", RunOnStart: false, }, { ID: devcontainerIDs[1], - Script: "devcontainer up --workspace-folder \"/home/workspace2\" --config \"/config2\"", + Script: "devcontainer up --log-format json --workspace-folder \"/home/workspace2\" --config \"/config2\"", RunOnStart: false, }, }, diff --git a/agent/agentcontainers/devcontainercli.go b/agent/agentcontainers/devcontainercli.go new file mode 100644 index 0000000000..d6060f862c --- /dev/null +++ b/agent/agentcontainers/devcontainercli.go @@ -0,0 +1,193 @@ +package agentcontainers + +import ( + "bufio" + "bytes" + "context" + "encoding/json" + "errors" + "io" + + "golang.org/x/xerrors" + + "cdr.dev/slog" + "github.com/coder/coder/v2/agent/agentexec" +) + +// DevcontainerCLI is an interface for the devcontainer CLI. +type DevcontainerCLI interface { + Up(ctx context.Context, workspaceFolder, configPath string, opts ...DevcontainerCLIUpOptions) (id string, err error) +} + +// DevcontainerCLIUpOptions are options for the devcontainer CLI up +// command. +type DevcontainerCLIUpOptions func(*devcontainerCLIUpConfig) + +// WithRemoveExistingContainer is an option to remove the existing +// container. +func WithRemoveExistingContainer() DevcontainerCLIUpOptions { + return func(o *devcontainerCLIUpConfig) { + o.removeExistingContainer = true + } +} + +type devcontainerCLIUpConfig struct { + removeExistingContainer bool +} + +func applyDevcontainerCLIUpOptions(opts []DevcontainerCLIUpOptions) devcontainerCLIUpConfig { + conf := devcontainerCLIUpConfig{ + removeExistingContainer: false, + } + for _, opt := range opts { + if opt != nil { + opt(&conf) + } + } + return conf +} + +type devcontainerCLI struct { + logger slog.Logger + execer agentexec.Execer +} + +var _ DevcontainerCLI = &devcontainerCLI{} + +func NewDevcontainerCLI(logger slog.Logger, execer agentexec.Execer) DevcontainerCLI { + return &devcontainerCLI{ + execer: execer, + logger: logger, + } +} + +func (d *devcontainerCLI) Up(ctx context.Context, workspaceFolder, configPath string, opts ...DevcontainerCLIUpOptions) (string, error) { + conf := applyDevcontainerCLIUpOptions(opts) + logger := d.logger.With(slog.F("workspace_folder", workspaceFolder), slog.F("config_path", configPath), slog.F("recreate", conf.removeExistingContainer)) + + args := []string{ + "up", + "--log-format", "json", + "--workspace-folder", workspaceFolder, + } + if configPath != "" { + args = append(args, "--config", configPath) + } + if conf.removeExistingContainer { + args = append(args, "--remove-existing-container") + } + cmd := d.execer.CommandContext(ctx, "devcontainer", args...) + + var stdout bytes.Buffer + cmd.Stdout = io.MultiWriter(&stdout, &devcontainerCLILogWriter{ctx: ctx, logger: logger.With(slog.F("stdout", true))}) + cmd.Stderr = &devcontainerCLILogWriter{ctx: ctx, logger: logger.With(slog.F("stderr", true))} + + if err := cmd.Run(); err != nil { + if _, err2 := parseDevcontainerCLILastLine(ctx, logger, stdout.Bytes()); err2 != nil { + err = errors.Join(err, err2) + } + return "", err + } + + result, err := parseDevcontainerCLILastLine(ctx, logger, stdout.Bytes()) + if err != nil { + return "", err + } + + return result.ContainerID, nil +} + +// parseDevcontainerCLILastLine parses the last line of the devcontainer CLI output +// which is a JSON object. +func parseDevcontainerCLILastLine(ctx context.Context, logger slog.Logger, p []byte) (result devcontainerCLIResult, err error) { + s := bufio.NewScanner(bytes.NewReader(p)) + var lastLine []byte + for s.Scan() { + b := s.Bytes() + if len(b) == 0 || b[0] != '{' { + continue + } + lastLine = b + } + if err = s.Err(); err != nil { + return result, err + } + if len(lastLine) == 0 || lastLine[0] != '{' { + logger.Error(ctx, "devcontainer result is not json", slog.F("result", string(lastLine))) + return result, xerrors.Errorf("devcontainer result is not json: %q", string(lastLine)) + } + if err = json.Unmarshal(lastLine, &result); err != nil { + logger.Error(ctx, "parse devcontainer result failed", slog.Error(err), slog.F("result", string(lastLine))) + return result, err + } + + return result, result.Err() +} + +// devcontainerCLIResult is the result of the devcontainer CLI command. +// It is parsed from the last line of the devcontainer CLI stdout which +// is a JSON object. +type devcontainerCLIResult struct { + Outcome string `json:"outcome"` // "error", "success". + + // The following fields are set if outcome is success. + ContainerID string `json:"containerId"` + RemoteUser string `json:"remoteUser"` + RemoteWorkspaceFolder string `json:"remoteWorkspaceFolder"` + + // The following fields are set if outcome is error. + Message string `json:"message"` + Description string `json:"description"` +} + +func (r devcontainerCLIResult) Err() error { + if r.Outcome == "success" { + return nil + } + return xerrors.Errorf("devcontainer up failed: %s (description: %s, message: %s)", r.Outcome, r.Description, r.Message) +} + +// devcontainerCLIJSONLogLine is a log line from the devcontainer CLI. +type devcontainerCLIJSONLogLine struct { + Type string `json:"type"` // "progress", "raw", "start", "stop", "text", etc. + Level int `json:"level"` // 1, 2, 3. + Timestamp int `json:"timestamp"` // Unix timestamp in milliseconds. + Text string `json:"text"` + + // More fields can be added here as needed. +} + +// devcontainerCLILogWriter splits on newlines and logs each line +// separately. +type devcontainerCLILogWriter struct { + ctx context.Context + logger slog.Logger +} + +func (l *devcontainerCLILogWriter) Write(p []byte) (n int, err error) { + s := bufio.NewScanner(bytes.NewReader(p)) + for s.Scan() { + line := s.Bytes() + if len(line) == 0 { + continue + } + if line[0] != '{' { + l.logger.Debug(l.ctx, "@devcontainer/cli", slog.F("line", string(line))) + continue + } + var logLine devcontainerCLIJSONLogLine + if err := json.Unmarshal(line, &logLine); err != nil { + l.logger.Error(l.ctx, "parse devcontainer json log line failed", slog.Error(err), slog.F("line", string(line))) + continue + } + if logLine.Level >= 3 { + l.logger.Info(l.ctx, "@devcontainer/cli", slog.F("line", string(line))) + continue + } + l.logger.Debug(l.ctx, "@devcontainer/cli", slog.F("line", string(line))) + } + if err := s.Err(); err != nil { + l.logger.Error(l.ctx, "devcontainer log line scan failed", slog.Error(err)) + } + return len(p), nil +} diff --git a/agent/agentcontainers/devcontainercli_test.go b/agent/agentcontainers/devcontainercli_test.go new file mode 100644 index 0000000000..22a81fb8e3 --- /dev/null +++ b/agent/agentcontainers/devcontainercli_test.go @@ -0,0 +1,351 @@ +package agentcontainers_test + +import ( + "bytes" + "context" + "errors" + "flag" + "fmt" + "io" + "os" + "os/exec" + "path/filepath" + "strings" + "testing" + + "github.com/ory/dockertest/v3" + "github.com/ory/dockertest/v3/docker" + "github.com/stretchr/testify/assert" + "github.com/stretchr/testify/require" + + "cdr.dev/slog" + "cdr.dev/slog/sloggers/slogtest" + "github.com/coder/coder/v2/agent/agentcontainers" + "github.com/coder/coder/v2/agent/agentexec" + "github.com/coder/coder/v2/pty" + "github.com/coder/coder/v2/testutil" +) + +func TestDevcontainerCLI_ArgsAndParsing(t *testing.T) { + t.Parallel() + + testExePath, err := os.Executable() + require.NoError(t, err, "get test executable path") + + logger := slogtest.Make(t, &slogtest.Options{IgnoreErrors: true}).Leveled(slog.LevelDebug) + + t.Run("Up", func(t *testing.T) { + t.Parallel() + + tests := []struct { + name string + logFile string + workspace string + config string + opts []agentcontainers.DevcontainerCLIUpOptions + wantArgs string + wantError bool + }{ + { + name: "success", + logFile: "up.log", + workspace: "/test/workspace", + wantArgs: "up --log-format json --workspace-folder /test/workspace", + wantError: false, + }, + { + name: "success with config", + logFile: "up.log", + workspace: "/test/workspace", + config: "/test/config.json", + wantArgs: "up --log-format json --workspace-folder /test/workspace --config /test/config.json", + wantError: false, + }, + { + name: "already exists", + logFile: "up-already-exists.log", + workspace: "/test/workspace", + wantArgs: "up --log-format json --workspace-folder /test/workspace", + wantError: false, + }, + { + name: "docker error", + logFile: "up-error-docker.log", + workspace: "/test/workspace", + wantArgs: "up --log-format json --workspace-folder /test/workspace", + wantError: true, + }, + { + name: "bad outcome", + logFile: "up-error-bad-outcome.log", + workspace: "/test/workspace", + wantArgs: "up --log-format json --workspace-folder /test/workspace", + wantError: true, + }, + { + name: "does not exist", + logFile: "up-error-does-not-exist.log", + workspace: "/test/workspace", + wantArgs: "up --log-format json --workspace-folder /test/workspace", + wantError: true, + }, + { + name: "with remove existing container", + logFile: "up.log", + workspace: "/test/workspace", + opts: []agentcontainers.DevcontainerCLIUpOptions{ + agentcontainers.WithRemoveExistingContainer(), + }, + wantArgs: "up --log-format json --workspace-folder /test/workspace --remove-existing-container", + wantError: false, + }, + } + + for _, tt := range tests { + t.Run(tt.name, func(t *testing.T) { + t.Parallel() + + ctx := testutil.Context(t, testutil.WaitMedium) + + testExecer := &testDevcontainerExecer{ + testExePath: testExePath, + wantArgs: tt.wantArgs, + wantError: tt.wantError, + logFile: filepath.Join("testdata", "devcontainercli", "parse", tt.logFile), + } + + dccli := agentcontainers.NewDevcontainerCLI(logger, testExecer) + containerID, err := dccli.Up(ctx, tt.workspace, tt.config, tt.opts...) + if tt.wantError { + assert.Error(t, err, "want error") + assert.Empty(t, containerID, "expected empty container ID") + } else { + assert.NoError(t, err, "want no error") + assert.NotEmpty(t, containerID, "expected non-empty container ID") + } + }) + } + }) +} + +// testDevcontainerExecer implements the agentexec.Execer interface for testing. +type testDevcontainerExecer struct { + testExePath string + wantArgs string + wantError bool + logFile string +} + +// CommandContext returns a test binary command that simulates devcontainer responses. +func (e *testDevcontainerExecer) CommandContext(ctx context.Context, name string, args ...string) *exec.Cmd { + // Only handle "devcontainer" commands. + if name != "devcontainer" { + // For non-devcontainer commands, use a standard execer. + return agentexec.DefaultExecer.CommandContext(ctx, name, args...) + } + + // Create a command that runs the test binary with special flags + // that tell it to simulate a devcontainer command. + testArgs := []string{ + "-test.run=TestDevcontainerHelperProcess", + "--", + name, + } + testArgs = append(testArgs, args...) + + //nolint:gosec // This is a test binary, so we don't need to worry about command injection. + cmd := exec.CommandContext(ctx, e.testExePath, testArgs...) + // Set this environment variable so the child process knows it's the helper. + cmd.Env = append(os.Environ(), + "TEST_DEVCONTAINER_WANT_HELPER_PROCESS=1", + "TEST_DEVCONTAINER_WANT_ARGS="+e.wantArgs, + "TEST_DEVCONTAINER_WANT_ERROR="+fmt.Sprintf("%v", e.wantError), + "TEST_DEVCONTAINER_LOG_FILE="+e.logFile, + ) + + return cmd +} + +// PTYCommandContext returns a PTY command. +func (*testDevcontainerExecer) PTYCommandContext(_ context.Context, name string, args ...string) *pty.Cmd { + // This method shouldn't be called for our devcontainer tests. + panic("PTYCommandContext not expected in devcontainer tests") +} + +// This is a special test helper that is executed as a subprocess. +// It simulates the behavior of the devcontainer CLI. +// +//nolint:revive,paralleltest // This is a test helper function. +func TestDevcontainerHelperProcess(t *testing.T) { + // If not called by the test as a helper process, do nothing. + if os.Getenv("TEST_DEVCONTAINER_WANT_HELPER_PROCESS") != "1" { + return + } + + helperArgs := flag.Args() + if len(helperArgs) < 1 { + fmt.Fprintf(os.Stderr, "No command\n") + os.Exit(2) + } + + if helperArgs[0] != "devcontainer" { + fmt.Fprintf(os.Stderr, "Unknown command: %s\n", helperArgs[0]) + os.Exit(2) + } + + // Verify arguments against expected arguments and skip + // "devcontainer", it's not included in the input args. + wantArgs := os.Getenv("TEST_DEVCONTAINER_WANT_ARGS") + gotArgs := strings.Join(helperArgs[1:], " ") + if gotArgs != wantArgs { + fmt.Fprintf(os.Stderr, "Arguments don't match.\nWant: %q\nGot: %q\n", + wantArgs, gotArgs) + os.Exit(2) + } + + logFilePath := os.Getenv("TEST_DEVCONTAINER_LOG_FILE") + output, err := os.ReadFile(logFilePath) + if err != nil { + fmt.Fprintf(os.Stderr, "Reading log file %s failed: %v\n", logFilePath, err) + os.Exit(2) + } + + _, _ = io.Copy(os.Stdout, bytes.NewReader(output)) + if os.Getenv("TEST_DEVCONTAINER_WANT_ERROR") == "true" { + os.Exit(1) + } + os.Exit(0) +} + +// TestDockerDevcontainerCLI tests the DevcontainerCLI component with real Docker containers. +// This test verifies that containers can be created and recreated using the actual +// devcontainer CLI and Docker. It is skipped by default and can be run with: +// +// CODER_TEST_USE_DOCKER=1 go test ./agent/agentcontainers -run TestDockerDevcontainerCLI +// +// The test requires Docker to be installed and running. +func TestDockerDevcontainerCLI(t *testing.T) { + t.Parallel() + if os.Getenv("CODER_TEST_USE_DOCKER") != "1" { + t.Skip("skipping Docker test; set CODER_TEST_USE_DOCKER=1 to run") + } + + // Connect to Docker. + pool, err := dockertest.NewPool("") + require.NoError(t, err, "connect to Docker") + + t.Run("ContainerLifecycle", func(t *testing.T) { + t.Parallel() + + // Set up workspace directory with a devcontainer configuration. + workspaceFolder := t.TempDir() + configPath := setupDevcontainerWorkspace(t, workspaceFolder) + + // Use a long timeout because container operations are slow. + ctx := testutil.Context(t, testutil.WaitLong) + logger := slogtest.Make(t, &slogtest.Options{IgnoreErrors: true}).Leveled(slog.LevelDebug) + + // Create the devcontainer CLI under test. + dccli := agentcontainers.NewDevcontainerCLI(logger, agentexec.DefaultExecer) + + // Create a container. + firstID, err := dccli.Up(ctx, workspaceFolder, configPath) + require.NoError(t, err, "create container") + require.NotEmpty(t, firstID, "container ID should not be empty") + defer removeDevcontainerByID(t, pool, firstID) + + // Verify container exists. + firstContainer, found := findDevcontainerByID(t, pool, firstID) + require.True(t, found, "container should exist") + + // Remember the container creation time. + firstCreated := firstContainer.Created + + // Recreate the container. + secondID, err := dccli.Up(ctx, workspaceFolder, configPath, agentcontainers.WithRemoveExistingContainer()) + require.NoError(t, err, "recreate container") + require.NotEmpty(t, secondID, "recreated container ID should not be empty") + defer removeDevcontainerByID(t, pool, secondID) + + // Verify the new container exists and is different. + secondContainer, found := findDevcontainerByID(t, pool, secondID) + require.True(t, found, "recreated container should exist") + + // Verify it's a different container by checking creation time. + secondCreated := secondContainer.Created + assert.NotEqual(t, firstCreated, secondCreated, "recreated container should have different creation time") + + // Verify the first container is removed by the recreation. + _, found = findDevcontainerByID(t, pool, firstID) + assert.False(t, found, "first container should be removed") + }) +} + +// setupDevcontainerWorkspace prepares a test environment with a minimal +// devcontainer.json configuration and returns the path to the config file. +func setupDevcontainerWorkspace(t *testing.T, workspaceFolder string) string { + t.Helper() + + // Create the devcontainer directory structure. + devcontainerDir := filepath.Join(workspaceFolder, ".devcontainer") + err := os.MkdirAll(devcontainerDir, 0o755) + require.NoError(t, err, "create .devcontainer directory") + + // Write a minimal configuration with test labels for identification. + configPath := filepath.Join(devcontainerDir, "devcontainer.json") + content := `{ + "image": "alpine:latest", + "containerEnv": { + "TEST_CONTAINER": "true" + }, + "runArgs": ["--label", "com.coder.test=devcontainercli"] +}` + err = os.WriteFile(configPath, []byte(content), 0o600) + require.NoError(t, err, "create devcontainer.json file") + + return configPath +} + +// findDevcontainerByID locates a container by its ID and verifies it has our +// test label. Returns the container and whether it was found. +func findDevcontainerByID(t *testing.T, pool *dockertest.Pool, id string) (*docker.Container, bool) { + t.Helper() + + container, err := pool.Client.InspectContainer(id) + if err != nil { + t.Logf("Inspect container failed: %v", err) + return nil, false + } + require.Equal(t, "devcontainercli", container.Config.Labels["com.coder.test"], "sanity check failed: container should have the test label") + + return container, true +} + +// removeDevcontainerByID safely cleans up a test container by ID, verifying +// it has our test label before removal to prevent accidental deletion. +func removeDevcontainerByID(t *testing.T, pool *dockertest.Pool, id string) { + t.Helper() + + errNoSuchContainer := &docker.NoSuchContainer{} + + // Check if the container has the expected label. + container, err := pool.Client.InspectContainer(id) + if err != nil { + if errors.As(err, &errNoSuchContainer) { + t.Logf("Container %s not found, skipping removal", id) + return + } + require.NoError(t, err, "inspect container") + } + require.Equal(t, "devcontainercli", container.Config.Labels["com.coder.test"], "sanity check failed: container should have the test label") + + t.Logf("Removing container with ID: %s", id) + err = pool.Client.RemoveContainer(docker.RemoveContainerOptions{ + ID: container.ID, + Force: true, + RemoveVolumes: true, + }) + if err != nil && !errors.As(err, &errNoSuchContainer) { + assert.NoError(t, err, "remove container failed") + } +} diff --git a/agent/agentcontainers/testdata/devcontainercli/parse/up-already-exists.log b/agent/agentcontainers/testdata/devcontainercli/parse/up-already-exists.log new file mode 100644 index 0000000000..de5375e23a --- /dev/null +++ b/agent/agentcontainers/testdata/devcontainercli/parse/up-already-exists.log @@ -0,0 +1,68 @@ +{"type":"text","level":3,"timestamp":1744102135254,"text":"@devcontainers/cli 0.75.0. Node.js v23.9.0. darwin 24.4.0 arm64."} +{"type":"start","level":2,"timestamp":1744102135254,"text":"Run: docker buildx version"} +{"type":"stop","level":2,"timestamp":1744102135300,"text":"Run: docker buildx version","startTimestamp":1744102135254} +{"type":"text","level":2,"timestamp":1744102135300,"text":"github.com/docker/buildx v0.21.2 1360a9e8d25a2c3d03c2776d53ae62e6ff0a843d\r\n"} +{"type":"text","level":2,"timestamp":1744102135300,"text":"\u001b[1m\u001b[31m\u001b[39m\u001b[22m\r\n"} +{"type":"start","level":2,"timestamp":1744102135300,"text":"Run: docker -v"} +{"type":"stop","level":2,"timestamp":1744102135309,"text":"Run: docker -v","startTimestamp":1744102135300} +{"type":"start","level":2,"timestamp":1744102135309,"text":"Resolving Remote"} +{"type":"start","level":2,"timestamp":1744102135311,"text":"Run: git rev-parse --show-cdup"} +{"type":"stop","level":2,"timestamp":1744102135316,"text":"Run: git rev-parse --show-cdup","startTimestamp":1744102135311} +{"type":"start","level":2,"timestamp":1744102135316,"text":"Run: docker ps -q -a --filter label=devcontainer.local_folder=/code/devcontainers-template-starter --filter label=devcontainer.config_file=/code/devcontainers-template-starter/.devcontainer/devcontainer.json"} +{"type":"stop","level":2,"timestamp":1744102135333,"text":"Run: docker ps -q -a --filter label=devcontainer.local_folder=/code/devcontainers-template-starter --filter label=devcontainer.config_file=/code/devcontainers-template-starter/.devcontainer/devcontainer.json","startTimestamp":1744102135316} +{"type":"start","level":2,"timestamp":1744102135333,"text":"Run: docker inspect --type container 4f22413fe134"} +{"type":"stop","level":2,"timestamp":1744102135347,"text":"Run: docker inspect --type container 4f22413fe134","startTimestamp":1744102135333} +{"type":"start","level":2,"timestamp":1744102135348,"text":"Run: docker ps -q -a --filter label=devcontainer.local_folder=/code/devcontainers-template-starter --filter label=devcontainer.config_file=/code/devcontainers-template-starter/.devcontainer/devcontainer.json"} +{"type":"stop","level":2,"timestamp":1744102135364,"text":"Run: docker ps -q -a --filter label=devcontainer.local_folder=/code/devcontainers-template-starter --filter label=devcontainer.config_file=/code/devcontainers-template-starter/.devcontainer/devcontainer.json","startTimestamp":1744102135348} +{"type":"start","level":2,"timestamp":1744102135364,"text":"Run: docker inspect --type container 4f22413fe134"} +{"type":"stop","level":2,"timestamp":1744102135378,"text":"Run: docker inspect --type container 4f22413fe134","startTimestamp":1744102135364} +{"type":"start","level":2,"timestamp":1744102135379,"text":"Inspecting container"} +{"type":"start","level":2,"timestamp":1744102135379,"text":"Run: docker inspect --type container 4f22413fe13472200500a66ca057df5aafba6b45743afd499c3f26fc886eb236"} +{"type":"stop","level":2,"timestamp":1744102135393,"text":"Run: docker inspect --type container 4f22413fe13472200500a66ca057df5aafba6b45743afd499c3f26fc886eb236","startTimestamp":1744102135379} +{"type":"stop","level":2,"timestamp":1744102135393,"text":"Inspecting container","startTimestamp":1744102135379} +{"type":"start","level":2,"timestamp":1744102135393,"text":"Run in container: /bin/sh"} +{"type":"start","level":2,"timestamp":1744102135394,"text":"Run in container: uname -m"} +{"type":"text","level":2,"timestamp":1744102135428,"text":"aarch64\n"} +{"type":"text","level":2,"timestamp":1744102135428,"text":""} +{"type":"stop","level":2,"timestamp":1744102135428,"text":"Run in container: uname -m","startTimestamp":1744102135394} +{"type":"start","level":2,"timestamp":1744102135428,"text":"Run in container: (cat /etc/os-release || cat /usr/lib/os-release) 2>/dev/null"} +{"type":"text","level":2,"timestamp":1744102135428,"text":"PRETTY_NAME=\"Debian GNU/Linux 11 (bullseye)\"\nNAME=\"Debian GNU/Linux\"\nVERSION_ID=\"11\"\nVERSION=\"11 (bullseye)\"\nVERSION_CODENAME=bullseye\nID=debian\nHOME_URL=\"https://www.debian.org/\"\nSUPPORT_URL=\"https://www.debian.org/support\"\nBUG_REPORT_URL=\"https://bugs.debian.org/\"\n"} +{"type":"text","level":2,"timestamp":1744102135428,"text":""} +{"type":"stop","level":2,"timestamp":1744102135428,"text":"Run in container: (cat /etc/os-release || cat /usr/lib/os-release) 2>/dev/null","startTimestamp":1744102135428} +{"type":"start","level":2,"timestamp":1744102135429,"text":"Run in container: (command -v getent >/dev/null 2>&1 && getent passwd 'node' || grep -E '^node|^[^:]*:[^:]*:node:' /etc/passwd || true)"} +{"type":"stop","level":2,"timestamp":1744102135429,"text":"Run in container: (command -v getent >/dev/null 2>&1 && getent passwd 'node' || grep -E '^node|^[^:]*:[^:]*:node:' /etc/passwd || true)","startTimestamp":1744102135429} +{"type":"start","level":2,"timestamp":1744102135430,"text":"Run in container: test -f '/var/devcontainer/.patchEtcEnvironmentMarker'"} +{"type":"text","level":2,"timestamp":1744102135430,"text":""} +{"type":"text","level":2,"timestamp":1744102135430,"text":""} +{"type":"stop","level":2,"timestamp":1744102135430,"text":"Run in container: test -f '/var/devcontainer/.patchEtcEnvironmentMarker'","startTimestamp":1744102135430} +{"type":"start","level":2,"timestamp":1744102135430,"text":"Run in container: test -f '/var/devcontainer/.patchEtcProfileMarker'"} +{"type":"text","level":2,"timestamp":1744102135430,"text":""} +{"type":"text","level":2,"timestamp":1744102135430,"text":""} +{"type":"stop","level":2,"timestamp":1744102135430,"text":"Run in container: test -f '/var/devcontainer/.patchEtcProfileMarker'","startTimestamp":1744102135430} +{"type":"text","level":2,"timestamp":1744102135431,"text":"userEnvProbe: loginInteractiveShell (default)"} +{"type":"text","level":1,"timestamp":1744102135431,"text":"LifecycleCommandExecutionMap: {\n \"onCreateCommand\": [],\n \"updateContentCommand\": [],\n \"postCreateCommand\": [\n {\n \"origin\": \"devcontainer.json\",\n \"command\": \"npm install -g @devcontainers/cli\"\n }\n ],\n \"postStartCommand\": [],\n \"postAttachCommand\": [],\n \"initializeCommand\": []\n}"} +{"type":"text","level":2,"timestamp":1744102135431,"text":"userEnvProbe: not found in cache"} +{"type":"text","level":2,"timestamp":1744102135431,"text":"userEnvProbe shell: /bin/bash"} +{"type":"start","level":2,"timestamp":1744102135431,"text":"Run in container: /bin/bash -lic echo -n 5805f204-cd2b-4911-8a88-96de28d5deb7; cat /proc/self/environ; echo -n 5805f204-cd2b-4911-8a88-96de28d5deb7"} +{"type":"start","level":2,"timestamp":1744102135431,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.onCreateCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-07T09:21:41.201379807Z}\" != '2025-04-07T09:21:41.201379807Z' ] && echo '2025-04-07T09:21:41.201379807Z' > '/home/node/.devcontainer/.onCreateCommandMarker'"} +{"type":"text","level":2,"timestamp":1744102135432,"text":""} +{"type":"text","level":2,"timestamp":1744102135432,"text":""} +{"type":"text","level":2,"timestamp":1744102135432,"text":"Exit code 1"} +{"type":"stop","level":2,"timestamp":1744102135432,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.onCreateCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-07T09:21:41.201379807Z}\" != '2025-04-07T09:21:41.201379807Z' ] && echo '2025-04-07T09:21:41.201379807Z' > '/home/node/.devcontainer/.onCreateCommandMarker'","startTimestamp":1744102135431} +{"type":"start","level":2,"timestamp":1744102135432,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.updateContentCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-07T09:21:41.201379807Z}\" != '2025-04-07T09:21:41.201379807Z' ] && echo '2025-04-07T09:21:41.201379807Z' > '/home/node/.devcontainer/.updateContentCommandMarker'"} +{"type":"text","level":2,"timestamp":1744102135434,"text":""} +{"type":"text","level":2,"timestamp":1744102135434,"text":""} +{"type":"text","level":2,"timestamp":1744102135434,"text":"Exit code 1"} +{"type":"stop","level":2,"timestamp":1744102135434,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.updateContentCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-07T09:21:41.201379807Z}\" != '2025-04-07T09:21:41.201379807Z' ] && echo '2025-04-07T09:21:41.201379807Z' > '/home/node/.devcontainer/.updateContentCommandMarker'","startTimestamp":1744102135432} +{"type":"start","level":2,"timestamp":1744102135434,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.postCreateCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-07T09:21:41.201379807Z}\" != '2025-04-07T09:21:41.201379807Z' ] && echo '2025-04-07T09:21:41.201379807Z' > '/home/node/.devcontainer/.postCreateCommandMarker'"} +{"type":"text","level":2,"timestamp":1744102135435,"text":""} +{"type":"text","level":2,"timestamp":1744102135435,"text":""} +{"type":"text","level":2,"timestamp":1744102135435,"text":"Exit code 1"} +{"type":"stop","level":2,"timestamp":1744102135435,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.postCreateCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-07T09:21:41.201379807Z}\" != '2025-04-07T09:21:41.201379807Z' ] && echo '2025-04-07T09:21:41.201379807Z' > '/home/node/.devcontainer/.postCreateCommandMarker'","startTimestamp":1744102135434} +{"type":"start","level":2,"timestamp":1744102135435,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.postStartCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-08T08:48:29.406495039Z}\" != '2025-04-08T08:48:29.406495039Z' ] && echo '2025-04-08T08:48:29.406495039Z' > '/home/node/.devcontainer/.postStartCommandMarker'"} +{"type":"text","level":2,"timestamp":1744102135436,"text":""} +{"type":"text","level":2,"timestamp":1744102135436,"text":""} +{"type":"text","level":2,"timestamp":1744102135436,"text":"Exit code 1"} +{"type":"stop","level":2,"timestamp":1744102135436,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.postStartCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-08T08:48:29.406495039Z}\" != '2025-04-08T08:48:29.406495039Z' ] && echo '2025-04-08T08:48:29.406495039Z' > '/home/node/.devcontainer/.postStartCommandMarker'","startTimestamp":1744102135435} +{"type":"stop","level":2,"timestamp":1744102135436,"text":"Resolving Remote","startTimestamp":1744102135309} +{"outcome":"success","containerId":"4f22413fe13472200500a66ca057df5aafba6b45743afd499c3f26fc886eb236","remoteUser":"node","remoteWorkspaceFolder":"/workspaces/devcontainers-template-starter"} diff --git a/agent/agentcontainers/testdata/devcontainercli/parse/up-error-bad-outcome.log b/agent/agentcontainers/testdata/devcontainercli/parse/up-error-bad-outcome.log new file mode 100644 index 0000000000..386621d6dc --- /dev/null +++ b/agent/agentcontainers/testdata/devcontainercli/parse/up-error-bad-outcome.log @@ -0,0 +1 @@ +bad outcome diff --git a/agent/agentcontainers/testdata/devcontainercli/parse/up-error-docker.log b/agent/agentcontainers/testdata/devcontainercli/parse/up-error-docker.log new file mode 100644 index 0000000000..d470079f17 --- /dev/null +++ b/agent/agentcontainers/testdata/devcontainercli/parse/up-error-docker.log @@ -0,0 +1,13 @@ +{"type":"text","level":3,"timestamp":1744102042893,"text":"@devcontainers/cli 0.75.0. Node.js v23.9.0. darwin 24.4.0 arm64."} +{"type":"start","level":2,"timestamp":1744102042893,"text":"Run: docker buildx version"} +{"type":"stop","level":2,"timestamp":1744102042941,"text":"Run: docker buildx version","startTimestamp":1744102042893} +{"type":"text","level":2,"timestamp":1744102042941,"text":"github.com/docker/buildx v0.21.2 1360a9e8d25a2c3d03c2776d53ae62e6ff0a843d\r\n"} +{"type":"text","level":2,"timestamp":1744102042941,"text":"\u001b[1m\u001b[31m\u001b[39m\u001b[22m\r\n"} +{"type":"start","level":2,"timestamp":1744102042941,"text":"Run: docker -v"} +{"type":"stop","level":2,"timestamp":1744102042950,"text":"Run: docker -v","startTimestamp":1744102042941} +{"type":"start","level":2,"timestamp":1744102042950,"text":"Resolving Remote"} +{"type":"start","level":2,"timestamp":1744102042952,"text":"Run: git rev-parse --show-cdup"} +{"type":"stop","level":2,"timestamp":1744102042957,"text":"Run: git rev-parse --show-cdup","startTimestamp":1744102042952} +{"type":"start","level":2,"timestamp":1744102042957,"text":"Run: docker ps -q -a --filter label=devcontainer.local_folder=/code/devcontainers-template-starter --filter label=devcontainer.config_file=/code/devcontainers-template-starter/.devcontainer/devcontainer.json"} +{"type":"stop","level":2,"timestamp":1744102042967,"text":"Run: docker ps -q -a --filter label=devcontainer.local_folder=/code/devcontainers-template-starter --filter label=devcontainer.config_file=/code/devcontainers-template-starter/.devcontainer/devcontainer.json","startTimestamp":1744102042957} +{"outcome":"error","message":"Command failed: docker ps -q -a --filter label=devcontainer.local_folder=/code/devcontainers-template-starter --filter label=devcontainer.config_file=/code/devcontainers-template-starter/.devcontainer/devcontainer.json","description":"An error occurred setting up the container."} diff --git a/agent/agentcontainers/testdata/devcontainercli/parse/up-error-does-not-exist.log b/agent/agentcontainers/testdata/devcontainercli/parse/up-error-does-not-exist.log new file mode 100644 index 0000000000..191bfc7fad --- /dev/null +++ b/agent/agentcontainers/testdata/devcontainercli/parse/up-error-does-not-exist.log @@ -0,0 +1,15 @@ +{"type":"text","level":3,"timestamp":1744102555495,"text":"@devcontainers/cli 0.75.0. Node.js v23.9.0. darwin 24.4.0 arm64."} +{"type":"start","level":2,"timestamp":1744102555495,"text":"Run: docker buildx version"} +{"type":"stop","level":2,"timestamp":1744102555539,"text":"Run: docker buildx version","startTimestamp":1744102555495} +{"type":"text","level":2,"timestamp":1744102555539,"text":"github.com/docker/buildx v0.21.2 1360a9e8d25a2c3d03c2776d53ae62e6ff0a843d\r\n"} +{"type":"text","level":2,"timestamp":1744102555539,"text":"\u001b[1m\u001b[31m\u001b[39m\u001b[22m\r\n"} +{"type":"start","level":2,"timestamp":1744102555539,"text":"Run: docker -v"} +{"type":"stop","level":2,"timestamp":1744102555548,"text":"Run: docker -v","startTimestamp":1744102555539} +{"type":"start","level":2,"timestamp":1744102555548,"text":"Resolving Remote"} +Error: Dev container config (/code/devcontainers-template-starter/foo/.devcontainer/devcontainer.json) not found. + at H6 (/opt/homebrew/Cellar/devcontainer/0.75.0/libexec/lib/node_modules/@devcontainers/cli/dist/spec-node/devContainersSpecCLI.js:484:3219) + at async BC (/opt/homebrew/Cellar/devcontainer/0.75.0/libexec/lib/node_modules/@devcontainers/cli/dist/spec-node/devContainersSpecCLI.js:484:4957) + at async d7 (/opt/homebrew/Cellar/devcontainer/0.75.0/libexec/lib/node_modules/@devcontainers/cli/dist/spec-node/devContainersSpecCLI.js:665:202) + at async f7 (/opt/homebrew/Cellar/devcontainer/0.75.0/libexec/lib/node_modules/@devcontainers/cli/dist/spec-node/devContainersSpecCLI.js:664:14804) + at async /opt/homebrew/Cellar/devcontainer/0.75.0/libexec/lib/node_modules/@devcontainers/cli/dist/spec-node/devContainersSpecCLI.js:484:1188 +{"outcome":"error","message":"Dev container config (/code/devcontainers-template-starter/foo/.devcontainer/devcontainer.json) not found.","description":"Dev container config (/code/devcontainers-template-starter/foo/.devcontainer/devcontainer.json) not found."} diff --git a/agent/agentcontainers/testdata/devcontainercli/parse/up-remove-existing.log b/agent/agentcontainers/testdata/devcontainercli/parse/up-remove-existing.log new file mode 100644 index 0000000000..d1ae1b747b --- /dev/null +++ b/agent/agentcontainers/testdata/devcontainercli/parse/up-remove-existing.log @@ -0,0 +1,212 @@ +{"type":"text","level":3,"timestamp":1744115789408,"text":"@devcontainers/cli 0.75.0. Node.js v23.9.0. darwin 24.4.0 arm64."} +{"type":"start","level":2,"timestamp":1744115789408,"text":"Run: docker buildx version"} +{"type":"stop","level":2,"timestamp":1744115789460,"text":"Run: docker buildx version","startTimestamp":1744115789408} +{"type":"text","level":2,"timestamp":1744115789460,"text":"github.com/docker/buildx v0.21.2 1360a9e8d25a2c3d03c2776d53ae62e6ff0a843d\r\n"} +{"type":"text","level":2,"timestamp":1744115789460,"text":"\u001b[1m\u001b[31m\u001b[39m\u001b[22m\r\n"} +{"type":"start","level":2,"timestamp":1744115789460,"text":"Run: docker -v"} +{"type":"stop","level":2,"timestamp":1744115789470,"text":"Run: docker -v","startTimestamp":1744115789460} +{"type":"start","level":2,"timestamp":1744115789470,"text":"Resolving Remote"} +{"type":"start","level":2,"timestamp":1744115789472,"text":"Run: git rev-parse --show-cdup"} +{"type":"stop","level":2,"timestamp":1744115789477,"text":"Run: git rev-parse --show-cdup","startTimestamp":1744115789472} +{"type":"start","level":2,"timestamp":1744115789477,"text":"Run: docker ps -q -a --filter label=devcontainer.local_folder=/Users/maf/Documents/Code/devcontainers-template-starter --filter label=devcontainer.config_file=/Users/maf/Documents/Code/devcontainers-template-starter/.devcontainer/devcontainer.json"} +{"type":"stop","level":2,"timestamp":1744115789523,"text":"Run: docker ps -q -a --filter label=devcontainer.local_folder=/Users/maf/Documents/Code/devcontainers-template-starter --filter label=devcontainer.config_file=/Users/maf/Documents/Code/devcontainers-template-starter/.devcontainer/devcontainer.json","startTimestamp":1744115789477} +{"type":"start","level":2,"timestamp":1744115789523,"text":"Run: docker inspect --type container bc72db8d0c4c"} +{"type":"stop","level":2,"timestamp":1744115789539,"text":"Run: docker inspect --type container bc72db8d0c4c","startTimestamp":1744115789523} +{"type":"start","level":2,"timestamp":1744115789733,"text":"Run: docker ps -q -a --filter label=devcontainer.local_folder=/Users/maf/Documents/Code/devcontainers-template-starter --filter label=devcontainer.config_file=/Users/maf/Documents/Code/devcontainers-template-starter/.devcontainer/devcontainer.json"} +{"type":"stop","level":2,"timestamp":1744115789759,"text":"Run: docker ps -q -a --filter label=devcontainer.local_folder=/Users/maf/Documents/Code/devcontainers-template-starter --filter label=devcontainer.config_file=/Users/maf/Documents/Code/devcontainers-template-starter/.devcontainer/devcontainer.json","startTimestamp":1744115789733} +{"type":"start","level":2,"timestamp":1744115789759,"text":"Run: docker inspect --type container bc72db8d0c4c"} +{"type":"stop","level":2,"timestamp":1744115789779,"text":"Run: docker inspect --type container bc72db8d0c4c","startTimestamp":1744115789759} +{"type":"start","level":2,"timestamp":1744115789779,"text":"Removing Existing Container"} +{"type":"start","level":2,"timestamp":1744115789779,"text":"Run: docker rm -f bc72db8d0c4c4e941bd9ffc341aee64a18d3397fd45b87cd93d4746150967ba8"} +{"type":"stop","level":2,"timestamp":1744115789992,"text":"Run: docker rm -f bc72db8d0c4c4e941bd9ffc341aee64a18d3397fd45b87cd93d4746150967ba8","startTimestamp":1744115789779} +{"type":"stop","level":2,"timestamp":1744115789992,"text":"Removing Existing Container","startTimestamp":1744115789779} +{"type":"start","level":2,"timestamp":1744115789993,"text":"Run: docker inspect --type image mcr.microsoft.com/devcontainers/javascript-node:1-18-bullseye"} +{"type":"stop","level":2,"timestamp":1744115790007,"text":"Run: docker inspect --type image mcr.microsoft.com/devcontainers/javascript-node:1-18-bullseye","startTimestamp":1744115789993} +{"type":"text","level":1,"timestamp":1744115790008,"text":"workspace root: /Users/maf/Documents/Code/devcontainers-template-starter"} +{"type":"text","level":1,"timestamp":1744115790008,"text":"configPath: /Users/maf/Documents/Code/devcontainers-template-starter/.devcontainer/devcontainer.json"} +{"type":"text","level":1,"timestamp":1744115790008,"text":"--- Processing User Features ----"} +{"type":"text","level":1,"timestamp":1744115790009,"text":"[* user-provided] ghcr.io/devcontainers/features/docker-in-docker:2"} +{"type":"text","level":3,"timestamp":1744115790009,"text":"Resolving Feature dependencies for 'ghcr.io/devcontainers/features/docker-in-docker:2'..."} +{"type":"text","level":2,"timestamp":1744115790009,"text":"* Processing feature: ghcr.io/devcontainers/features/docker-in-docker:2"} +{"type":"text","level":1,"timestamp":1744115790009,"text":"> input: ghcr.io/devcontainers/features/docker-in-docker:2"} +{"type":"text","level":1,"timestamp":1744115790009,"text":">"} +{"type":"text","level":1,"timestamp":1744115790009,"text":"> resource: ghcr.io/devcontainers/features/docker-in-docker"} +{"type":"text","level":1,"timestamp":1744115790009,"text":"> id: docker-in-docker"} +{"type":"text","level":1,"timestamp":1744115790009,"text":"> owner: devcontainers"} +{"type":"text","level":1,"timestamp":1744115790009,"text":"> namespace: devcontainers/features"} +{"type":"text","level":1,"timestamp":1744115790009,"text":"> registry: ghcr.io"} +{"type":"text","level":1,"timestamp":1744115790009,"text":"> path: devcontainers/features/docker-in-docker"} +{"type":"text","level":1,"timestamp":1744115790009,"text":">"} +{"type":"text","level":1,"timestamp":1744115790009,"text":"> version: 2"} +{"type":"text","level":1,"timestamp":1744115790009,"text":"> tag?: 2"} +{"type":"text","level":1,"timestamp":1744115790009,"text":"> digest?: undefined"} +{"type":"text","level":1,"timestamp":1744115790009,"text":"manifest url: https://ghcr.io/v2/devcontainers/features/docker-in-docker/manifests/2"} +{"type":"text","level":1,"timestamp":1744115790290,"text":"[httpOci] Attempting to authenticate via 'Bearer' auth."} +{"type":"text","level":1,"timestamp":1744115790292,"text":"[httpOci] Invoking platform default credential helper 'osxkeychain'"} +{"type":"start","level":2,"timestamp":1744115790293,"text":"Run: docker-credential-osxkeychain get"} +{"type":"stop","level":2,"timestamp":1744115790316,"text":"Run: docker-credential-osxkeychain get","startTimestamp":1744115790293} +{"type":"text","level":1,"timestamp":1744115790316,"text":"[httpOci] Failed to query for 'ghcr.io' credential from 'docker-credential-osxkeychain': [object Object]"} +{"type":"text","level":1,"timestamp":1744115790316,"text":"[httpOci] No authentication credentials found for registry 'ghcr.io' via docker config or credential helper."} +{"type":"text","level":1,"timestamp":1744115790316,"text":"[httpOci] No authentication credentials found for registry 'ghcr.io'. Accessing anonymously."} +{"type":"text","level":1,"timestamp":1744115790316,"text":"[httpOci] Attempting to fetch bearer token from: https://ghcr.io/token?service=ghcr.io&scope=repository:devcontainers/features/docker-in-docker:pull"} +{"type":"text","level":1,"timestamp":1744115790843,"text":"[httpOci] 200 on reattempt after auth: https://ghcr.io/v2/devcontainers/features/docker-in-docker/manifests/2"} +{"type":"text","level":1,"timestamp":1744115790845,"text":"> input: ghcr.io/devcontainers/features/docker-in-docker:2"} +{"type":"text","level":1,"timestamp":1744115790845,"text":">"} +{"type":"text","level":1,"timestamp":1744115790845,"text":"> resource: ghcr.io/devcontainers/features/docker-in-docker"} +{"type":"text","level":1,"timestamp":1744115790845,"text":"> id: docker-in-docker"} +{"type":"text","level":1,"timestamp":1744115790845,"text":"> owner: devcontainers"} +{"type":"text","level":1,"timestamp":1744115790845,"text":"> namespace: devcontainers/features"} +{"type":"text","level":1,"timestamp":1744115790845,"text":"> registry: ghcr.io"} +{"type":"text","level":1,"timestamp":1744115790845,"text":"> path: devcontainers/features/docker-in-docker"} +{"type":"text","level":1,"timestamp":1744115790845,"text":">"} +{"type":"text","level":1,"timestamp":1744115790845,"text":"> version: 2"} +{"type":"text","level":1,"timestamp":1744115790845,"text":"> tag?: 2"} +{"type":"text","level":1,"timestamp":1744115790845,"text":"> digest?: undefined"} +{"type":"text","level":2,"timestamp":1744115790846,"text":"* Processing feature: ghcr.io/devcontainers/features/common-utils"} +{"type":"text","level":1,"timestamp":1744115790846,"text":"> input: ghcr.io/devcontainers/features/common-utils"} +{"type":"text","level":1,"timestamp":1744115790846,"text":">"} +{"type":"text","level":1,"timestamp":1744115790846,"text":"> resource: ghcr.io/devcontainers/features/common-utils"} +{"type":"text","level":1,"timestamp":1744115790846,"text":"> id: common-utils"} +{"type":"text","level":1,"timestamp":1744115790846,"text":"> owner: devcontainers"} +{"type":"text","level":1,"timestamp":1744115790846,"text":"> namespace: devcontainers/features"} +{"type":"text","level":1,"timestamp":1744115790846,"text":"> registry: ghcr.io"} +{"type":"text","level":1,"timestamp":1744115790846,"text":"> path: devcontainers/features/common-utils"} +{"type":"text","level":1,"timestamp":1744115790846,"text":">"} +{"type":"text","level":1,"timestamp":1744115790846,"text":"> version: latest"} +{"type":"text","level":1,"timestamp":1744115790846,"text":"> tag?: latest"} +{"type":"text","level":1,"timestamp":1744115790846,"text":"> digest?: undefined"} +{"type":"text","level":1,"timestamp":1744115790846,"text":"manifest url: https://ghcr.io/v2/devcontainers/features/common-utils/manifests/latest"} +{"type":"text","level":1,"timestamp":1744115790846,"text":"[httpOci] Applying cachedAuthHeader for registry ghcr.io..."} +{"type":"text","level":1,"timestamp":1744115791114,"text":"[httpOci] 200 (Cached): https://ghcr.io/v2/devcontainers/features/common-utils/manifests/latest"} +{"type":"text","level":1,"timestamp":1744115791114,"text":"> input: ghcr.io/devcontainers/features/common-utils"} +{"type":"text","level":1,"timestamp":1744115791114,"text":">"} +{"type":"text","level":1,"timestamp":1744115791114,"text":"> resource: ghcr.io/devcontainers/features/common-utils"} +{"type":"text","level":1,"timestamp":1744115791114,"text":"> id: common-utils"} +{"type":"text","level":1,"timestamp":1744115791114,"text":"> owner: devcontainers"} +{"type":"text","level":1,"timestamp":1744115791114,"text":"> namespace: devcontainers/features"} +{"type":"text","level":1,"timestamp":1744115791114,"text":"> registry: ghcr.io"} +{"type":"text","level":1,"timestamp":1744115791114,"text":"> path: devcontainers/features/common-utils"} +{"type":"text","level":1,"timestamp":1744115791114,"text":">"} +{"type":"text","level":1,"timestamp":1744115791114,"text":"> version: latest"} +{"type":"text","level":1,"timestamp":1744115791114,"text":"> tag?: latest"} +{"type":"text","level":1,"timestamp":1744115791114,"text":"> digest?: undefined"} +{"type":"text","level":1,"timestamp":1744115791115,"text":"[* resolved worklist] ghcr.io/devcontainers/features/docker-in-docker:2"} +{"type":"text","level":1,"timestamp":1744115791115,"text":"[\n {\n \"type\": \"user-provided\",\n \"userFeatureId\": \"ghcr.io/devcontainers/features/docker-in-docker:2\",\n \"options\": {},\n \"dependsOn\": [],\n \"installsAfter\": [\n {\n \"type\": \"resolved\",\n \"userFeatureId\": \"ghcr.io/devcontainers/features/common-utils\",\n \"options\": {},\n \"featureSet\": {\n \"sourceInformation\": {\n \"type\": \"oci\",\n \"manifest\": {\n \"schemaVersion\": 2,\n \"mediaType\": \"application/vnd.oci.image.manifest.v1+json\",\n \"config\": {\n \"mediaType\": \"application/vnd.devcontainers\",\n \"digest\": \"sha256:44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a\",\n \"size\": 2\n },\n \"layers\": [\n {\n \"mediaType\": \"application/vnd.devcontainers.layer.v1+tar\",\n \"digest\": \"sha256:1ea70afedad2279cd746a4c0b7ac0e0fb481599303a1cbe1e57c9cb87dbe5de5\",\n \"size\": 50176,\n \"annotations\": {\n \"org.opencontainers.image.title\": \"devcontainer-feature-common-utils.tgz\"\n }\n }\n ],\n \"annotations\": {\n \"dev.containers.metadata\": \"{\\\"id\\\":\\\"common-utils\\\",\\\"version\\\":\\\"2.5.3\\\",\\\"name\\\":\\\"Common Utilities\\\",\\\"documentationURL\\\":\\\"https://github.com/devcontainers/features/tree/main/src/common-utils\\\",\\\"description\\\":\\\"Installs a set of common command line utilities, Oh My Zsh!, and sets up a non-root user.\\\",\\\"options\\\":{\\\"installZsh\\\":{\\\"type\\\":\\\"boolean\\\",\\\"default\\\":true,\\\"description\\\":\\\"Install ZSH?\\\"},\\\"configureZshAsDefaultShell\\\":{\\\"type\\\":\\\"boolean\\\",\\\"default\\\":false,\\\"description\\\":\\\"Change default shell to ZSH?\\\"},\\\"installOhMyZsh\\\":{\\\"type\\\":\\\"boolean\\\",\\\"default\\\":true,\\\"description\\\":\\\"Install Oh My Zsh!?\\\"},\\\"installOhMyZshConfig\\\":{\\\"type\\\":\\\"boolean\\\",\\\"default\\\":true,\\\"description\\\":\\\"Allow installing the default dev container .zshrc templates?\\\"},\\\"upgradePackages\\\":{\\\"type\\\":\\\"boolean\\\",\\\"default\\\":true,\\\"description\\\":\\\"Upgrade OS packages?\\\"},\\\"username\\\":{\\\"type\\\":\\\"string\\\",\\\"proposals\\\":[\\\"devcontainer\\\",\\\"vscode\\\",\\\"codespace\\\",\\\"none\\\",\\\"automatic\\\"],\\\"default\\\":\\\"automatic\\\",\\\"description\\\":\\\"Enter name of a non-root user to configure or none to skip\\\"},\\\"userUid\\\":{\\\"type\\\":\\\"string\\\",\\\"proposals\\\":[\\\"1001\\\",\\\"automatic\\\"],\\\"default\\\":\\\"automatic\\\",\\\"description\\\":\\\"Enter UID for non-root user\\\"},\\\"userGid\\\":{\\\"type\\\":\\\"string\\\",\\\"proposals\\\":[\\\"1001\\\",\\\"automatic\\\"],\\\"default\\\":\\\"automatic\\\",\\\"description\\\":\\\"Enter GID for non-root user\\\"},\\\"nonFreePackages\\\":{\\\"type\\\":\\\"boolean\\\",\\\"default\\\":false,\\\"description\\\":\\\"Add packages from non-free Debian repository? (Debian only)\\\"}}}\",\n \"com.github.package.type\": \"devcontainer_feature\"\n }\n },\n \"manifestDigest\": \"sha256:3cf7ca93154faf9bdb128f3009cf1d1a91750ec97cc52082cf5d4edef5451f85\",\n \"featureRef\": {\n \"id\": \"common-utils\",\n \"owner\": \"devcontainers\",\n \"namespace\": \"devcontainers/features\",\n \"registry\": \"ghcr.io\",\n \"resource\": \"ghcr.io/devcontainers/features/common-utils\",\n \"path\": \"devcontainers/features/common-utils\",\n \"version\": \"latest\",\n \"tag\": \"latest\"\n },\n \"userFeatureId\": \"ghcr.io/devcontainers/features/common-utils\",\n \"userFeatureIdWithoutVersion\": \"ghcr.io/devcontainers/features/common-utils\"\n },\n \"features\": [\n {\n \"id\": \"common-utils\",\n \"included\": true,\n \"value\": {}\n }\n ]\n },\n \"dependsOn\": [],\n \"installsAfter\": [],\n \"roundPriority\": 0,\n \"featureIdAliases\": [\n \"common-utils\"\n ]\n }\n ],\n \"roundPriority\": 0,\n \"featureSet\": {\n \"sourceInformation\": {\n \"type\": \"oci\",\n \"manifest\": {\n \"schemaVersion\": 2,\n \"mediaType\": \"application/vnd.oci.image.manifest.v1+json\",\n \"config\": {\n \"mediaType\": \"application/vnd.devcontainers\",\n \"digest\": \"sha256:44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a\",\n \"size\": 2\n },\n \"layers\": [\n {\n \"mediaType\": \"application/vnd.devcontainers.layer.v1+tar\",\n \"digest\": \"sha256:52d59106dd0809d78a560aa2f71061a7228258364080ac745d68072064ec5a72\",\n \"size\": 40448,\n \"annotations\": {\n \"org.opencontainers.image.title\": \"devcontainer-feature-docker-in-docker.tgz\"\n }\n }\n ],\n \"annotations\": {\n \"dev.containers.metadata\": \"{\\\"id\\\":\\\"docker-in-docker\\\",\\\"version\\\":\\\"2.12.2\\\",\\\"name\\\":\\\"Docker (Docker-in-Docker)\\\",\\\"documentationURL\\\":\\\"https://github.com/devcontainers/features/tree/main/src/docker-in-docker\\\",\\\"description\\\":\\\"Create child containers *inside* a container, independent from the host's docker instance. Installs Docker extension in the container along with needed CLIs.\\\",\\\"options\\\":{\\\"version\\\":{\\\"type\\\":\\\"string\\\",\\\"proposals\\\":[\\\"latest\\\",\\\"none\\\",\\\"20.10\\\"],\\\"default\\\":\\\"latest\\\",\\\"description\\\":\\\"Select or enter a Docker/Moby Engine version. (Availability can vary by OS version.)\\\"},\\\"moby\\\":{\\\"type\\\":\\\"boolean\\\",\\\"default\\\":true,\\\"description\\\":\\\"Install OSS Moby build instead of Docker CE\\\"},\\\"mobyBuildxVersion\\\":{\\\"type\\\":\\\"string\\\",\\\"default\\\":\\\"latest\\\",\\\"description\\\":\\\"Install a specific version of moby-buildx when using Moby\\\"},\\\"dockerDashComposeVersion\\\":{\\\"type\\\":\\\"string\\\",\\\"enum\\\":[\\\"none\\\",\\\"v1\\\",\\\"v2\\\"],\\\"default\\\":\\\"v2\\\",\\\"description\\\":\\\"Default version of Docker Compose (v1, v2 or none)\\\"},\\\"azureDnsAutoDetection\\\":{\\\"type\\\":\\\"boolean\\\",\\\"default\\\":true,\\\"description\\\":\\\"Allow automatically setting the dockerd DNS server when the installation script detects it is running in Azure\\\"},\\\"dockerDefaultAddressPool\\\":{\\\"type\\\":\\\"string\\\",\\\"default\\\":\\\"\\\",\\\"proposals\\\":[],\\\"description\\\":\\\"Define default address pools for Docker networks. e.g. base=192.168.0.0/16,size=24\\\"},\\\"installDockerBuildx\\\":{\\\"type\\\":\\\"boolean\\\",\\\"default\\\":true,\\\"description\\\":\\\"Install Docker Buildx\\\"},\\\"installDockerComposeSwitch\\\":{\\\"type\\\":\\\"boolean\\\",\\\"default\\\":true,\\\"description\\\":\\\"Install Compose Switch (provided docker compose is available) which is a replacement to the Compose V1 docker-compose (python) executable. It translates the command line into Compose V2 docker compose then runs the latter.\\\"},\\\"disableIp6tables\\\":{\\\"type\\\":\\\"boolean\\\",\\\"default\\\":false,\\\"description\\\":\\\"Disable ip6tables (this option is only applicable for Docker versions 27 and greater)\\\"}},\\\"entrypoint\\\":\\\"/usr/local/share/docker-init.sh\\\",\\\"privileged\\\":true,\\\"containerEnv\\\":{\\\"DOCKER_BUILDKIT\\\":\\\"1\\\"},\\\"customizations\\\":{\\\"vscode\\\":{\\\"extensions\\\":[\\\"ms-azuretools.vscode-docker\\\"],\\\"settings\\\":{\\\"github.copilot.chat.codeGeneration.instructions\\\":[{\\\"text\\\":\\\"This dev container includes the Docker CLI (`docker`) pre-installed and available on the `PATH` for running and managing containers using a dedicated Docker daemon running inside the dev container.\\\"}]}}},\\\"mounts\\\":[{\\\"source\\\":\\\"dind-var-lib-docker-${devcontainerId}\\\",\\\"target\\\":\\\"/var/lib/docker\\\",\\\"type\\\":\\\"volume\\\"}],\\\"installsAfter\\\":[\\\"ghcr.io/devcontainers/features/common-utils\\\"]}\",\n \"com.github.package.type\": \"devcontainer_feature\"\n }\n },\n \"manifestDigest\": \"sha256:842d2ed40827dc91b95ef727771e170b0e52272404f00dba063cee94eafac4bb\",\n \"featureRef\": {\n \"id\": \"docker-in-docker\",\n \"owner\": \"devcontainers\",\n \"namespace\": \"devcontainers/features\",\n \"registry\": \"ghcr.io\",\n \"resource\": \"ghcr.io/devcontainers/features/docker-in-docker\",\n \"path\": \"devcontainers/features/docker-in-docker\",\n \"version\": \"2\",\n \"tag\": \"2\"\n },\n \"userFeatureId\": \"ghcr.io/devcontainers/features/docker-in-docker:2\",\n \"userFeatureIdWithoutVersion\": \"ghcr.io/devcontainers/features/docker-in-docker\"\n },\n \"features\": [\n {\n \"id\": \"docker-in-docker\",\n \"included\": true,\n \"value\": {},\n \"version\": \"2.12.2\",\n \"name\": \"Docker (Docker-in-Docker)\",\n \"documentationURL\": \"https://github.com/devcontainers/features/tree/main/src/docker-in-docker\",\n \"description\": \"Create child containers *inside* a container, independent from the host's docker instance. Installs Docker extension in the container along with needed CLIs.\",\n \"options\": {\n \"version\": {\n \"type\": \"string\",\n \"proposals\": [\n \"latest\",\n \"none\",\n \"20.10\"\n ],\n \"default\": \"latest\",\n \"description\": \"Select or enter a Docker/Moby Engine version. (Availability can vary by OS version.)\"\n },\n \"moby\": {\n \"type\": \"boolean\",\n \"default\": true,\n \"description\": \"Install OSS Moby build instead of Docker CE\"\n },\n \"mobyBuildxVersion\": {\n \"type\": \"string\",\n \"default\": \"latest\",\n \"description\": \"Install a specific version of moby-buildx when using Moby\"\n },\n \"dockerDashComposeVersion\": {\n \"type\": \"string\",\n \"enum\": [\n \"none\",\n \"v1\",\n \"v2\"\n ],\n \"default\": \"v2\",\n \"description\": \"Default version of Docker Compose (v1, v2 or none)\"\n },\n \"azureDnsAutoDetection\": {\n \"type\": \"boolean\",\n \"default\": true,\n \"description\": \"Allow automatically setting the dockerd DNS server when the installation script detects it is running in Azure\"\n },\n \"dockerDefaultAddressPool\": {\n \"type\": \"string\",\n \"default\": \"\",\n \"proposals\": [],\n \"description\": \"Define default address pools for Docker networks. e.g. base=192.168.0.0/16,size=24\"\n },\n \"installDockerBuildx\": {\n \"type\": \"boolean\",\n \"default\": true,\n \"description\": \"Install Docker Buildx\"\n },\n \"installDockerComposeSwitch\": {\n \"type\": \"boolean\",\n \"default\": true,\n \"description\": \"Install Compose Switch (provided docker compose is available) which is a replacement to the Compose V1 docker-compose (python) executable. It translates the command line into Compose V2 docker compose then runs the latter.\"\n },\n \"disableIp6tables\": {\n \"type\": \"boolean\",\n \"default\": false,\n \"description\": \"Disable ip6tables (this option is only applicable for Docker versions 27 and greater)\"\n }\n },\n \"entrypoint\": \"/usr/local/share/docker-init.sh\",\n \"privileged\": true,\n \"containerEnv\": {\n \"DOCKER_BUILDKIT\": \"1\"\n },\n \"customizations\": {\n \"vscode\": {\n \"extensions\": [\n \"ms-azuretools.vscode-docker\"\n ],\n \"settings\": {\n \"github.copilot.chat.codeGeneration.instructions\": [\n {\n \"text\": \"This dev container includes the Docker CLI (`docker`) pre-installed and available on the `PATH` for running and managing containers using a dedicated Docker daemon running inside the dev container.\"\n }\n ]\n }\n }\n },\n \"mounts\": [\n {\n \"source\": \"dind-var-lib-docker-${devcontainerId}\",\n \"target\": \"/var/lib/docker\",\n \"type\": \"volume\"\n }\n ],\n \"installsAfter\": [\n \"ghcr.io/devcontainers/features/common-utils\"\n ]\n }\n ]\n },\n \"featureIdAliases\": [\n \"docker-in-docker\"\n ]\n }\n]"} +{"type":"text","level":1,"timestamp":1744115791115,"text":"[raw worklist]: ghcr.io/devcontainers/features/docker-in-docker:2"} +{"type":"text","level":3,"timestamp":1744115791115,"text":"Soft-dependency 'ghcr.io/devcontainers/features/common-utils' is not required. Removing from installation order..."} +{"type":"text","level":1,"timestamp":1744115791115,"text":"[worklist-without-dangling-soft-deps]: ghcr.io/devcontainers/features/docker-in-docker:2"} +{"type":"text","level":1,"timestamp":1744115791115,"text":"Starting round-based Feature install order calculation from worklist..."} +{"type":"text","level":1,"timestamp":1744115791115,"text":"\n[round] ghcr.io/devcontainers/features/docker-in-docker:2"} +{"type":"text","level":1,"timestamp":1744115791115,"text":"[round-candidates] ghcr.io/devcontainers/features/docker-in-docker:2 (0)"} +{"type":"text","level":1,"timestamp":1744115791115,"text":"[round-after-filter-priority] (maxPriority=0) ghcr.io/devcontainers/features/docker-in-docker:2 (0)"} +{"type":"text","level":1,"timestamp":1744115791116,"text":"[round-after-comparesTo] ghcr.io/devcontainers/features/docker-in-docker:2"} +{"type":"text","level":1,"timestamp":1744115791116,"text":"--- Fetching User Features ----"} +{"type":"text","level":2,"timestamp":1744115791116,"text":"* Fetching feature: docker-in-docker_0_oci"} +{"type":"text","level":1,"timestamp":1744115791116,"text":"Fetching from OCI"} +{"type":"text","level":1,"timestamp":1744115791117,"text":"blob url: https://ghcr.io/v2/devcontainers/features/docker-in-docker/blobs/sha256:52d59106dd0809d78a560aa2f71061a7228258364080ac745d68072064ec5a72"} +{"type":"text","level":1,"timestamp":1744115791117,"text":"[httpOci] Applying cachedAuthHeader for registry ghcr.io..."} +{"type":"text","level":1,"timestamp":1744115791543,"text":"[httpOci] 200 (Cached): https://ghcr.io/v2/devcontainers/features/docker-in-docker/blobs/sha256:52d59106dd0809d78a560aa2f71061a7228258364080ac745d68072064ec5a72"} +{"type":"text","level":1,"timestamp":1744115791546,"text":"omitDuringExtraction: '"} +{"type":"text","level":3,"timestamp":1744115791546,"text":"Files to omit: ''"} +{"type":"text","level":1,"timestamp":1744115791551,"text":"Testing './'(Directory)"} +{"type":"text","level":1,"timestamp":1744115791553,"text":"Testing './NOTES.md'(File)"} +{"type":"text","level":1,"timestamp":1744115791554,"text":"Testing './README.md'(File)"} +{"type":"text","level":1,"timestamp":1744115791554,"text":"Testing './devcontainer-feature.json'(File)"} +{"type":"text","level":1,"timestamp":1744115791554,"text":"Testing './install.sh'(File)"} +{"type":"text","level":1,"timestamp":1744115791557,"text":"Files extracted from blob: ./NOTES.md, ./README.md, ./devcontainer-feature.json, ./install.sh"} +{"type":"text","level":2,"timestamp":1744115791559,"text":"* Fetched feature: docker-in-docker_0_oci version 2.12.2"} +{"type":"start","level":3,"timestamp":1744115791565,"text":"Run: docker buildx build --load --build-context dev_containers_feature_content_source=/var/folders/1y/cm8mblxd7_x9cljwl_jvfprh0000gn/T/devcontainercli/container-features/0.75.0-1744115790008 --build-arg _DEV_CONTAINERS_BASE_IMAGE=mcr.microsoft.com/devcontainers/javascript-node:1-18-bullseye --build-arg _DEV_CONTAINERS_IMAGE_USER=root --build-arg _DEV_CONTAINERS_FEATURE_CONTENT_SOURCE=dev_container_feature_content_temp --target dev_containers_target_stage -f /var/folders/1y/cm8mblxd7_x9cljwl_jvfprh0000gn/T/devcontainercli/container-features/0.75.0-1744115790008/Dockerfile.extended -t vsc-devcontainers-template-starter-81d8f17e32abef6d434cbb5a37fe05e5c8a6f8ccede47a61197f002dcbf60566-features /var/folders/1y/cm8mblxd7_x9cljwl_jvfprh0000gn/T/devcontainercli/empty-folder"} +{"type":"raw","level":3,"timestamp":1744115791955,"text":"#0 building with \"orbstack\" instance using docker driver\n\n#1 [internal] load build definition from Dockerfile.extended\n#1 transferring dockerfile: 3.09kB done\n#1 DONE 0.0s\n\n#2 resolve image config for docker-image://docker.io/docker/dockerfile:1.4\n"} +{"type":"raw","level":3,"timestamp":1744115793113,"text":"#2 DONE 1.3s\n"} +{"type":"raw","level":3,"timestamp":1744115793217,"text":"\n#3 docker-image://docker.io/docker/dockerfile:1.4@sha256:9ba7531bd80fb0a858632727cf7a112fbfd19b17e94c4e84ced81e24ef1a0dbc\n#3 CACHED\n\n#4 [internal] load .dockerignore\n#4 transferring context: 2B done\n#4 DONE 0.0s\n\n#5 [internal] load metadata for mcr.microsoft.com/devcontainers/javascript-node:1-18-bullseye\n#5 DONE 0.0s\n\n#6 [context dev_containers_feature_content_source] load .dockerignore\n#6 transferring dev_containers_feature_content_source: 2B done\n"} +{"type":"raw","level":3,"timestamp":1744115793217,"text":"#6 DONE 0.0s\n"} +{"type":"raw","level":3,"timestamp":1744115793307,"text":"\n#7 [dev_containers_feature_content_normalize 1/3] FROM mcr.microsoft.com/devcontainers/javascript-node:1-18-bullseye\n"} +{"type":"raw","level":3,"timestamp":1744115793307,"text":"#7 DONE 0.0s\n\n#8 [context dev_containers_feature_content_source] load from client\n#8 transferring dev_containers_feature_content_source: 46.07kB done\n#8 DONE 0.0s\n\n#9 [dev_containers_target_stage 2/5] RUN mkdir -p /tmp/dev-container-features\n#9 CACHED\n\n#10 [dev_containers_feature_content_normalize 2/3] COPY --from=dev_containers_feature_content_source devcontainer-features.builtin.env /tmp/build-features/\n#10 CACHED\n\n#11 [dev_containers_feature_content_normalize 3/3] RUN chmod -R 0755 /tmp/build-features/\n#11 CACHED\n\n#12 [dev_containers_target_stage 3/5] COPY --from=dev_containers_feature_content_normalize /tmp/build-features/ /tmp/dev-container-features\n#12 CACHED\n\n#13 [dev_containers_target_stage 4/5] RUN echo \"_CONTAINER_USER_HOME=$( (command -v getent >/dev/null 2>&1 && getent passwd 'root' || grep -E '^root|^[^:]*:[^:]*:root:' /etc/passwd || true) | cut -d: -f6)\" >> /tmp/dev-container-features/devcontainer-features.builtin.env && echo \"_REMOTE_USER_HOME=$( (command -v getent >/dev/null 2>&1 && getent passwd 'node' || grep -E '^node|^[^:]*:[^:]*:node:' /etc/passwd || true) | cut -d: -f6)\" >> /tmp/dev-container-features/devcontainer-features.builtin.env\n#13 CACHED\n\n#14 [dev_containers_target_stage 5/5] RUN --mount=type=bind,from=dev_containers_feature_content_source,source=docker-in-docker_0,target=/tmp/build-features-src/docker-in-docker_0 cp -ar /tmp/build-features-src/docker-in-docker_0 /tmp/dev-container-features && chmod -R 0755 /tmp/dev-container-features/docker-in-docker_0 && cd /tmp/dev-container-features/docker-in-docker_0 && chmod +x ./devcontainer-features-install.sh && ./devcontainer-features-install.sh && rm -rf /tmp/dev-container-features/docker-in-docker_0\n#14 CACHED\n\n#15 exporting to image\n#15 exporting layers done\n#15 writing image sha256:275dc193c905d448ef3945e3fc86220cc315fe0cb41013988d6ff9f8d6ef2357 done\n#15 naming to docker.io/library/vsc-devcontainers-template-starter-81d8f17e32abef6d434cbb5a37fe05e5c8a6f8ccede47a61197f002dcbf60566-features done\n#15 DONE 0.0s\n"} +{"type":"stop","level":3,"timestamp":1744115793317,"text":"Run: docker buildx build --load --build-context dev_containers_feature_content_source=/var/folders/1y/cm8mblxd7_x9cljwl_jvfprh0000gn/T/devcontainercli/container-features/0.75.0-1744115790008 --build-arg _DEV_CONTAINERS_BASE_IMAGE=mcr.microsoft.com/devcontainers/javascript-node:1-18-bullseye --build-arg _DEV_CONTAINERS_IMAGE_USER=root --build-arg _DEV_CONTAINERS_FEATURE_CONTENT_SOURCE=dev_container_feature_content_temp --target dev_containers_target_stage -f /var/folders/1y/cm8mblxd7_x9cljwl_jvfprh0000gn/T/devcontainercli/container-features/0.75.0-1744115790008/Dockerfile.extended -t vsc-devcontainers-template-starter-81d8f17e32abef6d434cbb5a37fe05e5c8a6f8ccede47a61197f002dcbf60566-features /var/folders/1y/cm8mblxd7_x9cljwl_jvfprh0000gn/T/devcontainercli/empty-folder","startTimestamp":1744115791565} +{"type":"start","level":2,"timestamp":1744115793322,"text":"Run: docker events --format {{json .}} --filter event=start"} +{"type":"start","level":2,"timestamp":1744115793327,"text":"Starting container"} +{"type":"start","level":3,"timestamp":1744115793327,"text":"Run: docker run --sig-proxy=false -a STDOUT -a STDERR --mount type=bind,source=/Users/maf/Documents/Code/devcontainers-template-starter,target=/workspaces/devcontainers-template-starter,consistency=cached --mount type=volume,src=dind-var-lib-docker-0pctifo8bbg3pd06g3j5s9ae8j7lp5qfcd67m25kuahurel7v7jm,dst=/var/lib/docker -l devcontainer.local_folder=/Users/maf/Documents/Code/devcontainers-template-starter -l devcontainer.config_file=/Users/maf/Documents/Code/devcontainers-template-starter/.devcontainer/devcontainer.json --privileged --entrypoint /bin/sh vsc-devcontainers-template-starter-81d8f17e32abef6d434cbb5a37fe05e5c8a6f8ccede47a61197f002dcbf60566-features -c echo Container started"} +{"type":"raw","level":3,"timestamp":1744115793480,"text":"Container started\n"} +{"type":"stop","level":2,"timestamp":1744115793482,"text":"Starting container","startTimestamp":1744115793327} +{"type":"start","level":2,"timestamp":1744115793483,"text":"Run: docker ps -q -a --filter label=devcontainer.local_folder=/Users/maf/Documents/Code/devcontainers-template-starter --filter label=devcontainer.config_file=/Users/maf/Documents/Code/devcontainers-template-starter/.devcontainer/devcontainer.json"} +{"type":"raw","level":3,"timestamp":1744115793508,"text":"Not setting dockerd DNS manually.\n"} +{"type":"stop","level":2,"timestamp":1744115793508,"text":"Run: docker events --format {{json .}} --filter event=start","startTimestamp":1744115793322} +{"type":"stop","level":2,"timestamp":1744115793522,"text":"Run: docker ps -q -a --filter label=devcontainer.local_folder=/Users/maf/Documents/Code/devcontainers-template-starter --filter label=devcontainer.config_file=/Users/maf/Documents/Code/devcontainers-template-starter/.devcontainer/devcontainer.json","startTimestamp":1744115793483} +{"type":"start","level":2,"timestamp":1744115793522,"text":"Run: docker inspect --type container 2740894d889f"} +{"type":"stop","level":2,"timestamp":1744115793539,"text":"Run: docker inspect --type container 2740894d889f","startTimestamp":1744115793522} +{"type":"start","level":2,"timestamp":1744115793539,"text":"Inspecting container"} +{"type":"start","level":2,"timestamp":1744115793539,"text":"Run: docker inspect --type container 2740894d889f3937b28340a24f096ccdf446b8e3c4aa9e930cce85685b4714d5"} +{"type":"stop","level":2,"timestamp":1744115793554,"text":"Run: docker inspect --type container 2740894d889f3937b28340a24f096ccdf446b8e3c4aa9e930cce85685b4714d5","startTimestamp":1744115793539} +{"type":"stop","level":2,"timestamp":1744115793554,"text":"Inspecting container","startTimestamp":1744115793539} +{"type":"start","level":2,"timestamp":1744115793555,"text":"Run in container: /bin/sh"} +{"type":"start","level":2,"timestamp":1744115793556,"text":"Run in container: uname -m"} +{"type":"text","level":2,"timestamp":1744115793580,"text":"aarch64\n"} +{"type":"text","level":2,"timestamp":1744115793580,"text":""} +{"type":"stop","level":2,"timestamp":1744115793580,"text":"Run in container: uname -m","startTimestamp":1744115793556} +{"type":"start","level":2,"timestamp":1744115793580,"text":"Run in container: (cat /etc/os-release || cat /usr/lib/os-release) 2>/dev/null"} +{"type":"text","level":2,"timestamp":1744115793581,"text":"PRETTY_NAME=\"Debian GNU/Linux 11 (bullseye)\"\nNAME=\"Debian GNU/Linux\"\nVERSION_ID=\"11\"\nVERSION=\"11 (bullseye)\"\nVERSION_CODENAME=bullseye\nID=debian\nHOME_URL=\"https://www.debian.org/\"\nSUPPORT_URL=\"https://www.debian.org/support\"\nBUG_REPORT_URL=\"https://bugs.debian.org/\"\n"} +{"type":"text","level":2,"timestamp":1744115793581,"text":""} +{"type":"stop","level":2,"timestamp":1744115793581,"text":"Run in container: (cat /etc/os-release || cat /usr/lib/os-release) 2>/dev/null","startTimestamp":1744115793580} +{"type":"start","level":2,"timestamp":1744115793581,"text":"Run in container: (command -v getent >/dev/null 2>&1 && getent passwd 'node' || grep -E '^node|^[^:]*:[^:]*:node:' /etc/passwd || true)"} +{"type":"stop","level":2,"timestamp":1744115793582,"text":"Run in container: (command -v getent >/dev/null 2>&1 && getent passwd 'node' || grep -E '^node|^[^:]*:[^:]*:node:' /etc/passwd || true)","startTimestamp":1744115793581} +{"type":"start","level":2,"timestamp":1744115793582,"text":"Run in container: test -f '/var/devcontainer/.patchEtcEnvironmentMarker'"} +{"type":"text","level":2,"timestamp":1744115793583,"text":""} +{"type":"text","level":2,"timestamp":1744115793583,"text":""} +{"type":"text","level":2,"timestamp":1744115793583,"text":"Exit code 1"} +{"type":"stop","level":2,"timestamp":1744115793583,"text":"Run in container: test -f '/var/devcontainer/.patchEtcEnvironmentMarker'","startTimestamp":1744115793582} +{"type":"start","level":2,"timestamp":1744115793583,"text":"Run in container: /bin/sh"} +{"type":"start","level":2,"timestamp":1744115793584,"text":"Run in container: test ! -f '/var/devcontainer/.patchEtcEnvironmentMarker' && set -o noclobber && mkdir -p '/var/devcontainer' && { > '/var/devcontainer/.patchEtcEnvironmentMarker' ; } 2> /dev/null"} +{"type":"text","level":2,"timestamp":1744115793608,"text":""} +{"type":"text","level":2,"timestamp":1744115793608,"text":""} +{"type":"stop","level":2,"timestamp":1744115793608,"text":"Run in container: test ! -f '/var/devcontainer/.patchEtcEnvironmentMarker' && set -o noclobber && mkdir -p '/var/devcontainer' && { > '/var/devcontainer/.patchEtcEnvironmentMarker' ; } 2> /dev/null","startTimestamp":1744115793584} +{"type":"start","level":2,"timestamp":1744115793608,"text":"Run in container: cat >> /etc/environment <<'etcEnvrionmentEOF'"} +{"type":"text","level":2,"timestamp":1744115793609,"text":""} +{"type":"text","level":2,"timestamp":1744115793609,"text":""} +{"type":"stop","level":2,"timestamp":1744115793609,"text":"Run in container: cat >> /etc/environment <<'etcEnvrionmentEOF'","startTimestamp":1744115793608} +{"type":"start","level":2,"timestamp":1744115793609,"text":"Run in container: test -f '/var/devcontainer/.patchEtcProfileMarker'"} +{"type":"text","level":2,"timestamp":1744115793610,"text":""} +{"type":"text","level":2,"timestamp":1744115793610,"text":""} +{"type":"text","level":2,"timestamp":1744115793610,"text":"Exit code 1"} +{"type":"stop","level":2,"timestamp":1744115793610,"text":"Run in container: test -f '/var/devcontainer/.patchEtcProfileMarker'","startTimestamp":1744115793609} +{"type":"start","level":2,"timestamp":1744115793610,"text":"Run in container: test ! -f '/var/devcontainer/.patchEtcProfileMarker' && set -o noclobber && mkdir -p '/var/devcontainer' && { > '/var/devcontainer/.patchEtcProfileMarker' ; } 2> /dev/null"} +{"type":"text","level":2,"timestamp":1744115793611,"text":""} +{"type":"text","level":2,"timestamp":1744115793611,"text":""} +{"type":"stop","level":2,"timestamp":1744115793611,"text":"Run in container: test ! -f '/var/devcontainer/.patchEtcProfileMarker' && set -o noclobber && mkdir -p '/var/devcontainer' && { > '/var/devcontainer/.patchEtcProfileMarker' ; } 2> /dev/null","startTimestamp":1744115793610} +{"type":"start","level":2,"timestamp":1744115793611,"text":"Run in container: sed -i -E 's/((^|\\s)PATH=)([^\\$]*)$/\\1${PATH:-\\3}/g' /etc/profile || true"} +{"type":"text","level":2,"timestamp":1744115793612,"text":""} +{"type":"text","level":2,"timestamp":1744115793612,"text":""} +{"type":"stop","level":2,"timestamp":1744115793612,"text":"Run in container: sed -i -E 's/((^|\\s)PATH=)([^\\$]*)$/\\1${PATH:-\\3}/g' /etc/profile || true","startTimestamp":1744115793611} +{"type":"text","level":2,"timestamp":1744115793612,"text":"userEnvProbe: loginInteractiveShell (default)"} +{"type":"text","level":1,"timestamp":1744115793612,"text":"LifecycleCommandExecutionMap: {\n \"onCreateCommand\": [],\n \"updateContentCommand\": [],\n \"postCreateCommand\": [\n {\n \"origin\": \"devcontainer.json\",\n \"command\": \"npm install -g @devcontainers/cli\"\n }\n ],\n \"postStartCommand\": [],\n \"postAttachCommand\": [],\n \"initializeCommand\": []\n}"} +{"type":"text","level":2,"timestamp":1744115793612,"text":"userEnvProbe: not found in cache"} +{"type":"text","level":2,"timestamp":1744115793612,"text":"userEnvProbe shell: /bin/bash"} +{"type":"start","level":2,"timestamp":1744115793612,"text":"Run in container: /bin/bash -lic echo -n 58a6101c-d261-4fbf-a4f4-a1ed20d698e9; cat /proc/self/environ; echo -n 58a6101c-d261-4fbf-a4f4-a1ed20d698e9"} +{"type":"start","level":2,"timestamp":1744115793613,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.onCreateCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-08T12:36:33.34647456Z}\" != '2025-04-08T12:36:33.34647456Z' ] && echo '2025-04-08T12:36:33.34647456Z' > '/home/node/.devcontainer/.onCreateCommandMarker'"} +{"type":"text","level":2,"timestamp":1744115793616,"text":""} +{"type":"text","level":2,"timestamp":1744115793616,"text":""} +{"type":"stop","level":2,"timestamp":1744115793616,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.onCreateCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-08T12:36:33.34647456Z}\" != '2025-04-08T12:36:33.34647456Z' ] && echo '2025-04-08T12:36:33.34647456Z' > '/home/node/.devcontainer/.onCreateCommandMarker'","startTimestamp":1744115793613} +{"type":"start","level":2,"timestamp":1744115793616,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.updateContentCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-08T12:36:33.34647456Z}\" != '2025-04-08T12:36:33.34647456Z' ] && echo '2025-04-08T12:36:33.34647456Z' > '/home/node/.devcontainer/.updateContentCommandMarker'"} +{"type":"text","level":2,"timestamp":1744115793617,"text":""} +{"type":"text","level":2,"timestamp":1744115793617,"text":""} +{"type":"stop","level":2,"timestamp":1744115793617,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.updateContentCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-08T12:36:33.34647456Z}\" != '2025-04-08T12:36:33.34647456Z' ] && echo '2025-04-08T12:36:33.34647456Z' > '/home/node/.devcontainer/.updateContentCommandMarker'","startTimestamp":1744115793616} +{"type":"start","level":2,"timestamp":1744115793617,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.postCreateCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-08T12:36:33.34647456Z}\" != '2025-04-08T12:36:33.34647456Z' ] && echo '2025-04-08T12:36:33.34647456Z' > '/home/node/.devcontainer/.postCreateCommandMarker'"} +{"type":"text","level":2,"timestamp":1744115793618,"text":""} +{"type":"text","level":2,"timestamp":1744115793618,"text":""} +{"type":"stop","level":2,"timestamp":1744115793618,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.postCreateCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-08T12:36:33.34647456Z}\" != '2025-04-08T12:36:33.34647456Z' ] && echo '2025-04-08T12:36:33.34647456Z' > '/home/node/.devcontainer/.postCreateCommandMarker'","startTimestamp":1744115793617} +{"type":"raw","level":3,"timestamp":1744115793619,"text":"\u001b[1mRunning the postCreateCommand from devcontainer.json...\u001b[0m\r\n\r\n","channel":"postCreate"} +{"type":"progress","name":"Running postCreateCommand...","status":"running","stepDetail":"npm install -g @devcontainers/cli","channel":"postCreate"} +{"type":"stop","level":2,"timestamp":1744115793669,"text":"Run in container: /bin/bash -lic echo -n 58a6101c-d261-4fbf-a4f4-a1ed20d698e9; cat /proc/self/environ; echo -n 58a6101c-d261-4fbf-a4f4-a1ed20d698e9","startTimestamp":1744115793612} +{"type":"text","level":1,"timestamp":1744115793669,"text":"58a6101c-d261-4fbf-a4f4-a1ed20d698e9NVM_RC_VERSION=\u0000HOSTNAME=2740894d889f\u0000YARN_VERSION=1.22.22\u0000PWD=/\u0000HOME=/home/node\u0000LS_COLORS=\u0000NVM_SYMLINK_CURRENT=true\u0000DOCKER_BUILDKIT=1\u0000NVM_DIR=/usr/local/share/nvm\u0000USER=node\u0000SHLVL=1\u0000NVM_CD_FLAGS=\u0000PROMPT_DIRTRIM=4\u0000PATH=/usr/local/share/nvm/current/bin:/usr/local/share/npm-global/bin:/usr/local/share/nvm/current/bin:/usr/local/share/npm-global/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/home/node/.local/bin\u0000NODE_VERSION=18.20.8\u0000_=/bin/cat\u000058a6101c-d261-4fbf-a4f4-a1ed20d698e9"} +{"type":"text","level":1,"timestamp":1744115793670,"text":"\u001b[1m\u001b[31mbash: cannot set terminal process group (-1): Inappropriate ioctl for device\u001b[39m\u001b[22m\r\n\u001b[1m\u001b[31mbash: no job control in this shell\u001b[39m\u001b[22m\r\n\u001b[1m\u001b[31m\u001b[39m\u001b[22m\r\n"} +{"type":"text","level":1,"timestamp":1744115793670,"text":"userEnvProbe parsed: {\n \"NVM_RC_VERSION\": \"\",\n \"HOSTNAME\": \"2740894d889f\",\n \"YARN_VERSION\": \"1.22.22\",\n \"PWD\": \"/\",\n \"HOME\": \"/home/node\",\n \"LS_COLORS\": \"\",\n \"NVM_SYMLINK_CURRENT\": \"true\",\n \"DOCKER_BUILDKIT\": \"1\",\n \"NVM_DIR\": \"/usr/local/share/nvm\",\n \"USER\": \"node\",\n \"SHLVL\": \"1\",\n \"NVM_CD_FLAGS\": \"\",\n \"PROMPT_DIRTRIM\": \"4\",\n \"PATH\": \"/usr/local/share/nvm/current/bin:/usr/local/share/npm-global/bin:/usr/local/share/nvm/current/bin:/usr/local/share/npm-global/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/home/node/.local/bin\",\n \"NODE_VERSION\": \"18.20.8\",\n \"_\": \"/bin/cat\"\n}"} +{"type":"text","level":2,"timestamp":1744115793670,"text":"userEnvProbe PATHs:\nProbe: '/usr/local/share/nvm/current/bin:/usr/local/share/npm-global/bin:/usr/local/share/nvm/current/bin:/usr/local/share/npm-global/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/home/node/.local/bin'\nContainer: '/usr/local/share/nvm/current/bin:/usr/local/share/npm-global/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin'"} +{"type":"start","level":2,"timestamp":1744115793672,"text":"Run in container: /bin/sh -c npm install -g @devcontainers/cli","channel":"postCreate"} +{"type":"raw","level":3,"timestamp":1744115794568,"text":"\nadded 1 package in 806ms\n","channel":"postCreate"} +{"type":"stop","level":2,"timestamp":1744115794579,"text":"Run in container: /bin/sh -c npm install -g @devcontainers/cli","startTimestamp":1744115793672,"channel":"postCreate"} +{"type":"progress","name":"Running postCreateCommand...","status":"succeeded","channel":"postCreate"} +{"type":"start","level":2,"timestamp":1744115794579,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.postStartCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-08T12:36:33.400704421Z}\" != '2025-04-08T12:36:33.400704421Z' ] && echo '2025-04-08T12:36:33.400704421Z' > '/home/node/.devcontainer/.postStartCommandMarker'"} +{"type":"text","level":2,"timestamp":1744115794581,"text":""} +{"type":"text","level":2,"timestamp":1744115794581,"text":""} +{"type":"stop","level":2,"timestamp":1744115794581,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.postStartCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-08T12:36:33.400704421Z}\" != '2025-04-08T12:36:33.400704421Z' ] && echo '2025-04-08T12:36:33.400704421Z' > '/home/node/.devcontainer/.postStartCommandMarker'","startTimestamp":1744115794579} +{"type":"stop","level":2,"timestamp":1744115794582,"text":"Resolving Remote","startTimestamp":1744115789470} +{"outcome":"success","containerId":"2740894d889f3937b28340a24f096ccdf446b8e3c4aa9e930cce85685b4714d5","remoteUser":"node","remoteWorkspaceFolder":"/workspaces/devcontainers-template-starter"} diff --git a/agent/agentcontainers/testdata/devcontainercli/parse/up.log b/agent/agentcontainers/testdata/devcontainercli/parse/up.log new file mode 100644 index 0000000000..ef4c43aa7b --- /dev/null +++ b/agent/agentcontainers/testdata/devcontainercli/parse/up.log @@ -0,0 +1,206 @@ +{"type":"text","level":3,"timestamp":1744102171070,"text":"@devcontainers/cli 0.75.0. Node.js v23.9.0. darwin 24.4.0 arm64."} +{"type":"start","level":2,"timestamp":1744102171070,"text":"Run: docker buildx version"} +{"type":"stop","level":2,"timestamp":1744102171115,"text":"Run: docker buildx version","startTimestamp":1744102171070} +{"type":"text","level":2,"timestamp":1744102171115,"text":"github.com/docker/buildx v0.21.2 1360a9e8d25a2c3d03c2776d53ae62e6ff0a843d\r\n"} +{"type":"text","level":2,"timestamp":1744102171115,"text":"\u001b[1m\u001b[31m\u001b[39m\u001b[22m\r\n"} +{"type":"start","level":2,"timestamp":1744102171115,"text":"Run: docker -v"} +{"type":"stop","level":2,"timestamp":1744102171125,"text":"Run: docker -v","startTimestamp":1744102171115} +{"type":"start","level":2,"timestamp":1744102171125,"text":"Resolving Remote"} +{"type":"start","level":2,"timestamp":1744102171127,"text":"Run: git rev-parse --show-cdup"} +{"type":"stop","level":2,"timestamp":1744102171131,"text":"Run: git rev-parse --show-cdup","startTimestamp":1744102171127} +{"type":"start","level":2,"timestamp":1744102171132,"text":"Run: docker ps -q -a --filter label=devcontainer.local_folder=/code/devcontainers-template-starter --filter label=devcontainer.config_file=/code/devcontainers-template-starter/.devcontainer/devcontainer.json"} +{"type":"stop","level":2,"timestamp":1744102171149,"text":"Run: docker ps -q -a --filter label=devcontainer.local_folder=/code/devcontainers-template-starter --filter label=devcontainer.config_file=/code/devcontainers-template-starter/.devcontainer/devcontainer.json","startTimestamp":1744102171132} +{"type":"start","level":2,"timestamp":1744102171149,"text":"Run: docker ps -q -a --filter label=devcontainer.local_folder=/code/devcontainers-template-starter"} +{"type":"stop","level":2,"timestamp":1744102171162,"text":"Run: docker ps -q -a --filter label=devcontainer.local_folder=/code/devcontainers-template-starter","startTimestamp":1744102171149} +{"type":"start","level":2,"timestamp":1744102171163,"text":"Run: docker ps -q -a --filter label=devcontainer.local_folder=/code/devcontainers-template-starter --filter label=devcontainer.config_file=/code/devcontainers-template-starter/.devcontainer/devcontainer.json"} +{"type":"stop","level":2,"timestamp":1744102171177,"text":"Run: docker ps -q -a --filter label=devcontainer.local_folder=/code/devcontainers-template-starter --filter label=devcontainer.config_file=/code/devcontainers-template-starter/.devcontainer/devcontainer.json","startTimestamp":1744102171163} +{"type":"start","level":2,"timestamp":1744102171177,"text":"Run: docker inspect --type image mcr.microsoft.com/devcontainers/javascript-node:1-18-bullseye"} +{"type":"stop","level":2,"timestamp":1744102171193,"text":"Run: docker inspect --type image mcr.microsoft.com/devcontainers/javascript-node:1-18-bullseye","startTimestamp":1744102171177} +{"type":"text","level":1,"timestamp":1744102171193,"text":"workspace root: /code/devcontainers-template-starter"} +{"type":"text","level":1,"timestamp":1744102171193,"text":"configPath: /code/devcontainers-template-starter/.devcontainer/devcontainer.json"} +{"type":"text","level":1,"timestamp":1744102171194,"text":"--- Processing User Features ----"} +{"type":"text","level":1,"timestamp":1744102171194,"text":"[* user-provided] ghcr.io/devcontainers/features/docker-in-docker:2"} +{"type":"text","level":3,"timestamp":1744102171194,"text":"Resolving Feature dependencies for 'ghcr.io/devcontainers/features/docker-in-docker:2'..."} +{"type":"text","level":2,"timestamp":1744102171194,"text":"* Processing feature: ghcr.io/devcontainers/features/docker-in-docker:2"} +{"type":"text","level":1,"timestamp":1744102171194,"text":"> input: ghcr.io/devcontainers/features/docker-in-docker:2"} +{"type":"text","level":1,"timestamp":1744102171194,"text":">"} +{"type":"text","level":1,"timestamp":1744102171194,"text":"> resource: ghcr.io/devcontainers/features/docker-in-docker"} +{"type":"text","level":1,"timestamp":1744102171194,"text":"> id: docker-in-docker"} +{"type":"text","level":1,"timestamp":1744102171194,"text":"> owner: devcontainers"} +{"type":"text","level":1,"timestamp":1744102171194,"text":"> namespace: devcontainers/features"} +{"type":"text","level":1,"timestamp":1744102171194,"text":"> registry: ghcr.io"} +{"type":"text","level":1,"timestamp":1744102171194,"text":"> path: devcontainers/features/docker-in-docker"} +{"type":"text","level":1,"timestamp":1744102171194,"text":">"} +{"type":"text","level":1,"timestamp":1744102171194,"text":"> version: 2"} +{"type":"text","level":1,"timestamp":1744102171194,"text":"> tag?: 2"} +{"type":"text","level":1,"timestamp":1744102171194,"text":"> digest?: undefined"} +{"type":"text","level":1,"timestamp":1744102171194,"text":"manifest url: https://ghcr.io/v2/devcontainers/features/docker-in-docker/manifests/2"} +{"type":"text","level":1,"timestamp":1744102171519,"text":"[httpOci] Attempting to authenticate via 'Bearer' auth."} +{"type":"text","level":1,"timestamp":1744102171521,"text":"[httpOci] Invoking platform default credential helper 'osxkeychain'"} +{"type":"start","level":2,"timestamp":1744102171521,"text":"Run: docker-credential-osxkeychain get"} +{"type":"stop","level":2,"timestamp":1744102171564,"text":"Run: docker-credential-osxkeychain get","startTimestamp":1744102171521} +{"type":"text","level":1,"timestamp":1744102171564,"text":"[httpOci] Failed to query for 'ghcr.io' credential from 'docker-credential-osxkeychain': [object Object]"} +{"type":"text","level":1,"timestamp":1744102171564,"text":"[httpOci] No authentication credentials found for registry 'ghcr.io' via docker config or credential helper."} +{"type":"text","level":1,"timestamp":1744102171564,"text":"[httpOci] No authentication credentials found for registry 'ghcr.io'. Accessing anonymously."} +{"type":"text","level":1,"timestamp":1744102171564,"text":"[httpOci] Attempting to fetch bearer token from: https://ghcr.io/token?service=ghcr.io&scope=repository:devcontainers/features/docker-in-docker:pull"} +{"type":"text","level":1,"timestamp":1744102172039,"text":"[httpOci] 200 on reattempt after auth: https://ghcr.io/v2/devcontainers/features/docker-in-docker/manifests/2"} +{"type":"text","level":1,"timestamp":1744102172040,"text":"> input: ghcr.io/devcontainers/features/docker-in-docker:2"} +{"type":"text","level":1,"timestamp":1744102172040,"text":">"} +{"type":"text","level":1,"timestamp":1744102172040,"text":"> resource: ghcr.io/devcontainers/features/docker-in-docker"} +{"type":"text","level":1,"timestamp":1744102172040,"text":"> id: docker-in-docker"} +{"type":"text","level":1,"timestamp":1744102172040,"text":"> owner: devcontainers"} +{"type":"text","level":1,"timestamp":1744102172040,"text":"> namespace: devcontainers/features"} +{"type":"text","level":1,"timestamp":1744102172040,"text":"> registry: ghcr.io"} +{"type":"text","level":1,"timestamp":1744102172040,"text":"> path: devcontainers/features/docker-in-docker"} +{"type":"text","level":1,"timestamp":1744102172040,"text":">"} +{"type":"text","level":1,"timestamp":1744102172040,"text":"> version: 2"} +{"type":"text","level":1,"timestamp":1744102172040,"text":"> tag?: 2"} +{"type":"text","level":1,"timestamp":1744102172040,"text":"> digest?: undefined"} +{"type":"text","level":2,"timestamp":1744102172040,"text":"* Processing feature: ghcr.io/devcontainers/features/common-utils"} +{"type":"text","level":1,"timestamp":1744102172040,"text":"> input: ghcr.io/devcontainers/features/common-utils"} +{"type":"text","level":1,"timestamp":1744102172041,"text":">"} +{"type":"text","level":1,"timestamp":1744102172041,"text":"> resource: ghcr.io/devcontainers/features/common-utils"} +{"type":"text","level":1,"timestamp":1744102172041,"text":"> id: common-utils"} +{"type":"text","level":1,"timestamp":1744102172041,"text":"> owner: devcontainers"} +{"type":"text","level":1,"timestamp":1744102172041,"text":"> namespace: devcontainers/features"} +{"type":"text","level":1,"timestamp":1744102172041,"text":"> registry: ghcr.io"} +{"type":"text","level":1,"timestamp":1744102172041,"text":"> path: devcontainers/features/common-utils"} +{"type":"text","level":1,"timestamp":1744102172041,"text":">"} +{"type":"text","level":1,"timestamp":1744102172041,"text":"> version: latest"} +{"type":"text","level":1,"timestamp":1744102172041,"text":"> tag?: latest"} +{"type":"text","level":1,"timestamp":1744102172041,"text":"> digest?: undefined"} +{"type":"text","level":1,"timestamp":1744102172041,"text":"manifest url: https://ghcr.io/v2/devcontainers/features/common-utils/manifests/latest"} +{"type":"text","level":1,"timestamp":1744102172041,"text":"[httpOci] Applying cachedAuthHeader for registry ghcr.io..."} +{"type":"text","level":1,"timestamp":1744102172294,"text":"[httpOci] 200 (Cached): https://ghcr.io/v2/devcontainers/features/common-utils/manifests/latest"} +{"type":"text","level":1,"timestamp":1744102172294,"text":"> input: ghcr.io/devcontainers/features/common-utils"} +{"type":"text","level":1,"timestamp":1744102172294,"text":">"} +{"type":"text","level":1,"timestamp":1744102172294,"text":"> resource: ghcr.io/devcontainers/features/common-utils"} +{"type":"text","level":1,"timestamp":1744102172294,"text":"> id: common-utils"} +{"type":"text","level":1,"timestamp":1744102172294,"text":"> owner: devcontainers"} +{"type":"text","level":1,"timestamp":1744102172294,"text":"> namespace: devcontainers/features"} +{"type":"text","level":1,"timestamp":1744102172294,"text":"> registry: ghcr.io"} +{"type":"text","level":1,"timestamp":1744102172294,"text":"> path: devcontainers/features/common-utils"} +{"type":"text","level":1,"timestamp":1744102172294,"text":">"} +{"type":"text","level":1,"timestamp":1744102172294,"text":"> version: latest"} +{"type":"text","level":1,"timestamp":1744102172294,"text":"> tag?: latest"} +{"type":"text","level":1,"timestamp":1744102172294,"text":"> digest?: undefined"} +{"type":"text","level":1,"timestamp":1744102172294,"text":"[* resolved worklist] ghcr.io/devcontainers/features/docker-in-docker:2"} +{"type":"text","level":1,"timestamp":1744102172295,"text":"[\n {\n \"type\": \"user-provided\",\n \"userFeatureId\": \"ghcr.io/devcontainers/features/docker-in-docker:2\",\n \"options\": {},\n \"dependsOn\": [],\n \"installsAfter\": [\n {\n \"type\": \"resolved\",\n \"userFeatureId\": \"ghcr.io/devcontainers/features/common-utils\",\n \"options\": {},\n \"featureSet\": {\n \"sourceInformation\": {\n \"type\": \"oci\",\n \"manifest\": {\n \"schemaVersion\": 2,\n \"mediaType\": \"application/vnd.oci.image.manifest.v1+json\",\n \"config\": {\n \"mediaType\": \"application/vnd.devcontainers\",\n \"digest\": \"sha256:44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a\",\n \"size\": 2\n },\n \"layers\": [\n {\n \"mediaType\": \"application/vnd.devcontainers.layer.v1+tar\",\n \"digest\": \"sha256:1ea70afedad2279cd746a4c0b7ac0e0fb481599303a1cbe1e57c9cb87dbe5de5\",\n \"size\": 50176,\n \"annotations\": {\n \"org.opencontainers.image.title\": \"devcontainer-feature-common-utils.tgz\"\n }\n }\n ],\n \"annotations\": {\n \"dev.containers.metadata\": \"{\\\"id\\\":\\\"common-utils\\\",\\\"version\\\":\\\"2.5.3\\\",\\\"name\\\":\\\"Common Utilities\\\",\\\"documentationURL\\\":\\\"https://github.com/devcontainers/features/tree/main/src/common-utils\\\",\\\"description\\\":\\\"Installs a set of common command line utilities, Oh My Zsh!, and sets up a non-root user.\\\",\\\"options\\\":{\\\"installZsh\\\":{\\\"type\\\":\\\"boolean\\\",\\\"default\\\":true,\\\"description\\\":\\\"Install ZSH?\\\"},\\\"configureZshAsDefaultShell\\\":{\\\"type\\\":\\\"boolean\\\",\\\"default\\\":false,\\\"description\\\":\\\"Change default shell to ZSH?\\\"},\\\"installOhMyZsh\\\":{\\\"type\\\":\\\"boolean\\\",\\\"default\\\":true,\\\"description\\\":\\\"Install Oh My Zsh!?\\\"},\\\"installOhMyZshConfig\\\":{\\\"type\\\":\\\"boolean\\\",\\\"default\\\":true,\\\"description\\\":\\\"Allow installing the default dev container .zshrc templates?\\\"},\\\"upgradePackages\\\":{\\\"type\\\":\\\"boolean\\\",\\\"default\\\":true,\\\"description\\\":\\\"Upgrade OS packages?\\\"},\\\"username\\\":{\\\"type\\\":\\\"string\\\",\\\"proposals\\\":[\\\"devcontainer\\\",\\\"vscode\\\",\\\"codespace\\\",\\\"none\\\",\\\"automatic\\\"],\\\"default\\\":\\\"automatic\\\",\\\"description\\\":\\\"Enter name of a non-root user to configure or none to skip\\\"},\\\"userUid\\\":{\\\"type\\\":\\\"string\\\",\\\"proposals\\\":[\\\"1001\\\",\\\"automatic\\\"],\\\"default\\\":\\\"automatic\\\",\\\"description\\\":\\\"Enter UID for non-root user\\\"},\\\"userGid\\\":{\\\"type\\\":\\\"string\\\",\\\"proposals\\\":[\\\"1001\\\",\\\"automatic\\\"],\\\"default\\\":\\\"automatic\\\",\\\"description\\\":\\\"Enter GID for non-root user\\\"},\\\"nonFreePackages\\\":{\\\"type\\\":\\\"boolean\\\",\\\"default\\\":false,\\\"description\\\":\\\"Add packages from non-free Debian repository? (Debian only)\\\"}}}\",\n \"com.github.package.type\": \"devcontainer_feature\"\n }\n },\n \"manifestDigest\": \"sha256:3cf7ca93154faf9bdb128f3009cf1d1a91750ec97cc52082cf5d4edef5451f85\",\n \"featureRef\": {\n \"id\": \"common-utils\",\n \"owner\": \"devcontainers\",\n \"namespace\": \"devcontainers/features\",\n \"registry\": \"ghcr.io\",\n \"resource\": \"ghcr.io/devcontainers/features/common-utils\",\n \"path\": \"devcontainers/features/common-utils\",\n \"version\": \"latest\",\n \"tag\": \"latest\"\n },\n \"userFeatureId\": \"ghcr.io/devcontainers/features/common-utils\",\n \"userFeatureIdWithoutVersion\": \"ghcr.io/devcontainers/features/common-utils\"\n },\n \"features\": [\n {\n \"id\": \"common-utils\",\n \"included\": true,\n \"value\": {}\n }\n ]\n },\n \"dependsOn\": [],\n \"installsAfter\": [],\n \"roundPriority\": 0,\n \"featureIdAliases\": [\n \"common-utils\"\n ]\n }\n ],\n \"roundPriority\": 0,\n \"featureSet\": {\n \"sourceInformation\": {\n \"type\": \"oci\",\n \"manifest\": {\n \"schemaVersion\": 2,\n \"mediaType\": \"application/vnd.oci.image.manifest.v1+json\",\n \"config\": {\n \"mediaType\": \"application/vnd.devcontainers\",\n \"digest\": \"sha256:44136fa355b3678a1146ad16f7e8649e94fb4fc21fe77e8310c060f61caaff8a\",\n \"size\": 2\n },\n \"layers\": [\n {\n \"mediaType\": \"application/vnd.devcontainers.layer.v1+tar\",\n \"digest\": \"sha256:52d59106dd0809d78a560aa2f71061a7228258364080ac745d68072064ec5a72\",\n \"size\": 40448,\n \"annotations\": {\n \"org.opencontainers.image.title\": \"devcontainer-feature-docker-in-docker.tgz\"\n }\n }\n ],\n \"annotations\": {\n \"dev.containers.metadata\": \"{\\\"id\\\":\\\"docker-in-docker\\\",\\\"version\\\":\\\"2.12.2\\\",\\\"name\\\":\\\"Docker (Docker-in-Docker)\\\",\\\"documentationURL\\\":\\\"https://github.com/devcontainers/features/tree/main/src/docker-in-docker\\\",\\\"description\\\":\\\"Create child containers *inside* a container, independent from the host's docker instance. Installs Docker extension in the container along with needed CLIs.\\\",\\\"options\\\":{\\\"version\\\":{\\\"type\\\":\\\"string\\\",\\\"proposals\\\":[\\\"latest\\\",\\\"none\\\",\\\"20.10\\\"],\\\"default\\\":\\\"latest\\\",\\\"description\\\":\\\"Select or enter a Docker/Moby Engine version. (Availability can vary by OS version.)\\\"},\\\"moby\\\":{\\\"type\\\":\\\"boolean\\\",\\\"default\\\":true,\\\"description\\\":\\\"Install OSS Moby build instead of Docker CE\\\"},\\\"mobyBuildxVersion\\\":{\\\"type\\\":\\\"string\\\",\\\"default\\\":\\\"latest\\\",\\\"description\\\":\\\"Install a specific version of moby-buildx when using Moby\\\"},\\\"dockerDashComposeVersion\\\":{\\\"type\\\":\\\"string\\\",\\\"enum\\\":[\\\"none\\\",\\\"v1\\\",\\\"v2\\\"],\\\"default\\\":\\\"v2\\\",\\\"description\\\":\\\"Default version of Docker Compose (v1, v2 or none)\\\"},\\\"azureDnsAutoDetection\\\":{\\\"type\\\":\\\"boolean\\\",\\\"default\\\":true,\\\"description\\\":\\\"Allow automatically setting the dockerd DNS server when the installation script detects it is running in Azure\\\"},\\\"dockerDefaultAddressPool\\\":{\\\"type\\\":\\\"string\\\",\\\"default\\\":\\\"\\\",\\\"proposals\\\":[],\\\"description\\\":\\\"Define default address pools for Docker networks. e.g. base=192.168.0.0/16,size=24\\\"},\\\"installDockerBuildx\\\":{\\\"type\\\":\\\"boolean\\\",\\\"default\\\":true,\\\"description\\\":\\\"Install Docker Buildx\\\"},\\\"installDockerComposeSwitch\\\":{\\\"type\\\":\\\"boolean\\\",\\\"default\\\":true,\\\"description\\\":\\\"Install Compose Switch (provided docker compose is available) which is a replacement to the Compose V1 docker-compose (python) executable. It translates the command line into Compose V2 docker compose then runs the latter.\\\"},\\\"disableIp6tables\\\":{\\\"type\\\":\\\"boolean\\\",\\\"default\\\":false,\\\"description\\\":\\\"Disable ip6tables (this option is only applicable for Docker versions 27 and greater)\\\"}},\\\"entrypoint\\\":\\\"/usr/local/share/docker-init.sh\\\",\\\"privileged\\\":true,\\\"containerEnv\\\":{\\\"DOCKER_BUILDKIT\\\":\\\"1\\\"},\\\"customizations\\\":{\\\"vscode\\\":{\\\"extensions\\\":[\\\"ms-azuretools.vscode-docker\\\"],\\\"settings\\\":{\\\"github.copilot.chat.codeGeneration.instructions\\\":[{\\\"text\\\":\\\"This dev container includes the Docker CLI (`docker`) pre-installed and available on the `PATH` for running and managing containers using a dedicated Docker daemon running inside the dev container.\\\"}]}}},\\\"mounts\\\":[{\\\"source\\\":\\\"dind-var-lib-docker-${devcontainerId}\\\",\\\"target\\\":\\\"/var/lib/docker\\\",\\\"type\\\":\\\"volume\\\"}],\\\"installsAfter\\\":[\\\"ghcr.io/devcontainers/features/common-utils\\\"]}\",\n \"com.github.package.type\": \"devcontainer_feature\"\n }\n },\n \"manifestDigest\": \"sha256:842d2ed40827dc91b95ef727771e170b0e52272404f00dba063cee94eafac4bb\",\n \"featureRef\": {\n \"id\": \"docker-in-docker\",\n \"owner\": \"devcontainers\",\n \"namespace\": \"devcontainers/features\",\n \"registry\": \"ghcr.io\",\n \"resource\": \"ghcr.io/devcontainers/features/docker-in-docker\",\n \"path\": \"devcontainers/features/docker-in-docker\",\n \"version\": \"2\",\n \"tag\": \"2\"\n },\n \"userFeatureId\": \"ghcr.io/devcontainers/features/docker-in-docker:2\",\n \"userFeatureIdWithoutVersion\": \"ghcr.io/devcontainers/features/docker-in-docker\"\n },\n \"features\": [\n {\n \"id\": \"docker-in-docker\",\n \"included\": true,\n \"value\": {},\n \"version\": \"2.12.2\",\n \"name\": \"Docker (Docker-in-Docker)\",\n \"documentationURL\": \"https://github.com/devcontainers/features/tree/main/src/docker-in-docker\",\n \"description\": \"Create child containers *inside* a container, independent from the host's docker instance. Installs Docker extension in the container along with needed CLIs.\",\n \"options\": {\n \"version\": {\n \"type\": \"string\",\n \"proposals\": [\n \"latest\",\n \"none\",\n \"20.10\"\n ],\n \"default\": \"latest\",\n \"description\": \"Select or enter a Docker/Moby Engine version. (Availability can vary by OS version.)\"\n },\n \"moby\": {\n \"type\": \"boolean\",\n \"default\": true,\n \"description\": \"Install OSS Moby build instead of Docker CE\"\n },\n \"mobyBuildxVersion\": {\n \"type\": \"string\",\n \"default\": \"latest\",\n \"description\": \"Install a specific version of moby-buildx when using Moby\"\n },\n \"dockerDashComposeVersion\": {\n \"type\": \"string\",\n \"enum\": [\n \"none\",\n \"v1\",\n \"v2\"\n ],\n \"default\": \"v2\",\n \"description\": \"Default version of Docker Compose (v1, v2 or none)\"\n },\n \"azureDnsAutoDetection\": {\n \"type\": \"boolean\",\n \"default\": true,\n \"description\": \"Allow automatically setting the dockerd DNS server when the installation script detects it is running in Azure\"\n },\n \"dockerDefaultAddressPool\": {\n \"type\": \"string\",\n \"default\": \"\",\n \"proposals\": [],\n \"description\": \"Define default address pools for Docker networks. e.g. base=192.168.0.0/16,size=24\"\n },\n \"installDockerBuildx\": {\n \"type\": \"boolean\",\n \"default\": true,\n \"description\": \"Install Docker Buildx\"\n },\n \"installDockerComposeSwitch\": {\n \"type\": \"boolean\",\n \"default\": true,\n \"description\": \"Install Compose Switch (provided docker compose is available) which is a replacement to the Compose V1 docker-compose (python) executable. It translates the command line into Compose V2 docker compose then runs the latter.\"\n },\n \"disableIp6tables\": {\n \"type\": \"boolean\",\n \"default\": false,\n \"description\": \"Disable ip6tables (this option is only applicable for Docker versions 27 and greater)\"\n }\n },\n \"entrypoint\": \"/usr/local/share/docker-init.sh\",\n \"privileged\": true,\n \"containerEnv\": {\n \"DOCKER_BUILDKIT\": \"1\"\n },\n \"customizations\": {\n \"vscode\": {\n \"extensions\": [\n \"ms-azuretools.vscode-docker\"\n ],\n \"settings\": {\n \"github.copilot.chat.codeGeneration.instructions\": [\n {\n \"text\": \"This dev container includes the Docker CLI (`docker`) pre-installed and available on the `PATH` for running and managing containers using a dedicated Docker daemon running inside the dev container.\"\n }\n ]\n }\n }\n },\n \"mounts\": [\n {\n \"source\": \"dind-var-lib-docker-${devcontainerId}\",\n \"target\": \"/var/lib/docker\",\n \"type\": \"volume\"\n }\n ],\n \"installsAfter\": [\n \"ghcr.io/devcontainers/features/common-utils\"\n ]\n }\n ]\n },\n \"featureIdAliases\": [\n \"docker-in-docker\"\n ]\n }\n]"} +{"type":"text","level":1,"timestamp":1744102172295,"text":"[raw worklist]: ghcr.io/devcontainers/features/docker-in-docker:2"} +{"type":"text","level":3,"timestamp":1744102172295,"text":"Soft-dependency 'ghcr.io/devcontainers/features/common-utils' is not required. Removing from installation order..."} +{"type":"text","level":1,"timestamp":1744102172295,"text":"[worklist-without-dangling-soft-deps]: ghcr.io/devcontainers/features/docker-in-docker:2"} +{"type":"text","level":1,"timestamp":1744102172295,"text":"Starting round-based Feature install order calculation from worklist..."} +{"type":"text","level":1,"timestamp":1744102172295,"text":"\n[round] ghcr.io/devcontainers/features/docker-in-docker:2"} +{"type":"text","level":1,"timestamp":1744102172295,"text":"[round-candidates] ghcr.io/devcontainers/features/docker-in-docker:2 (0)"} +{"type":"text","level":1,"timestamp":1744102172295,"text":"[round-after-filter-priority] (maxPriority=0) ghcr.io/devcontainers/features/docker-in-docker:2 (0)"} +{"type":"text","level":1,"timestamp":1744102172295,"text":"[round-after-comparesTo] ghcr.io/devcontainers/features/docker-in-docker:2"} +{"type":"text","level":1,"timestamp":1744102172295,"text":"--- Fetching User Features ----"} +{"type":"text","level":2,"timestamp":1744102172295,"text":"* Fetching feature: docker-in-docker_0_oci"} +{"type":"text","level":1,"timestamp":1744102172295,"text":"Fetching from OCI"} +{"type":"text","level":1,"timestamp":1744102172296,"text":"blob url: https://ghcr.io/v2/devcontainers/features/docker-in-docker/blobs/sha256:52d59106dd0809d78a560aa2f71061a7228258364080ac745d68072064ec5a72"} +{"type":"text","level":1,"timestamp":1744102172296,"text":"[httpOci] Applying cachedAuthHeader for registry ghcr.io..."} +{"type":"text","level":1,"timestamp":1744102172575,"text":"[httpOci] 200 (Cached): https://ghcr.io/v2/devcontainers/features/docker-in-docker/blobs/sha256:52d59106dd0809d78a560aa2f71061a7228258364080ac745d68072064ec5a72"} +{"type":"text","level":1,"timestamp":1744102172576,"text":"omitDuringExtraction: '"} +{"type":"text","level":3,"timestamp":1744102172576,"text":"Files to omit: ''"} +{"type":"text","level":1,"timestamp":1744102172579,"text":"Testing './'(Directory)"} +{"type":"text","level":1,"timestamp":1744102172581,"text":"Testing './NOTES.md'(File)"} +{"type":"text","level":1,"timestamp":1744102172581,"text":"Testing './README.md'(File)"} +{"type":"text","level":1,"timestamp":1744102172581,"text":"Testing './devcontainer-feature.json'(File)"} +{"type":"text","level":1,"timestamp":1744102172581,"text":"Testing './install.sh'(File)"} +{"type":"text","level":1,"timestamp":1744102172583,"text":"Files extracted from blob: ./NOTES.md, ./README.md, ./devcontainer-feature.json, ./install.sh"} +{"type":"text","level":2,"timestamp":1744102172583,"text":"* Fetched feature: docker-in-docker_0_oci version 2.12.2"} +{"type":"start","level":3,"timestamp":1744102172588,"text":"Run: docker buildx build --load --build-context dev_containers_feature_content_source=/var/folders/1y/cm8mblxd7_x9cljwl_jvfprh0000gn/T/devcontainercli/container-features/0.75.0-1744102171193 --build-arg _DEV_CONTAINERS_BASE_IMAGE=mcr.microsoft.com/devcontainers/javascript-node:1-18-bullseye --build-arg _DEV_CONTAINERS_IMAGE_USER=root --build-arg _DEV_CONTAINERS_FEATURE_CONTENT_SOURCE=dev_container_feature_content_temp --target dev_containers_target_stage -f /var/folders/1y/cm8mblxd7_x9cljwl_jvfprh0000gn/T/devcontainercli/container-features/0.75.0-1744102171193/Dockerfile.extended -t vsc-devcontainers-template-starter-81d8f17e32abef6d434cbb5a37fe05e5c8a6f8ccede47a61197f002dcbf60566-features /var/folders/1y/cm8mblxd7_x9cljwl_jvfprh0000gn/T/devcontainercli/empty-folder"} +{"type":"raw","level":3,"timestamp":1744102172928,"text":"#0 building with \"orbstack\" instance using docker driver\n\n#1 [internal] load build definition from Dockerfile.extended\n"} +{"type":"raw","level":3,"timestamp":1744102172928,"text":"#1 transferring dockerfile: 3.09kB done\n#1 DONE 0.0s\n\n#2 resolve image config for docker-image://docker.io/docker/dockerfile:1.4\n"} +{"type":"raw","level":3,"timestamp":1744102174031,"text":"#2 DONE 1.3s\n"} +{"type":"raw","level":3,"timestamp":1744102174136,"text":"\n#3 docker-image://docker.io/docker/dockerfile:1.4@sha256:9ba7531bd80fb0a858632727cf7a112fbfd19b17e94c4e84ced81e24ef1a0dbc\n#3 CACHED\n"} +{"type":"raw","level":3,"timestamp":1744102174243,"text":"\n"} +{"type":"raw","level":3,"timestamp":1744102174243,"text":"#4 [internal] load .dockerignore\n#4 transferring context: 2B done\n#4 DONE 0.0s\n\n#5 [internal] load metadata for mcr.microsoft.com/devcontainers/javascript-node:1-18-bullseye\n#5 DONE 0.0s\n\n#6 [context dev_containers_feature_content_source] load .dockerignore\n#6 transferring dev_containers_feature_content_source: 2B done\n#6 DONE 0.0s\n\n#7 [dev_containers_feature_content_normalize 1/3] FROM mcr.microsoft.com/devcontainers/javascript-node:1-18-bullseye\n#7 DONE 0.0s\n\n#8 [context dev_containers_feature_content_source] load from client\n#8 transferring dev_containers_feature_content_source: 82.11kB 0.0s done\n#8 DONE 0.0s\n\n#9 [dev_containers_feature_content_normalize 2/3] COPY --from=dev_containers_feature_content_source devcontainer-features.builtin.env /tmp/build-features/\n#9 CACHED\n\n#10 [dev_containers_target_stage 2/5] RUN mkdir -p /tmp/dev-container-features\n#10 CACHED\n\n#11 [dev_containers_target_stage 3/5] COPY --from=dev_containers_feature_content_normalize /tmp/build-features/ /tmp/dev-container-features\n#11 CACHED\n\n#12 [dev_containers_target_stage 4/5] RUN echo \"_CONTAINER_USER_HOME=$( (command -v getent >/dev/null 2>&1 && getent passwd 'root' || grep -E '^root|^[^:]*:[^:]*:root:' /etc/passwd || true) | cut -d: -f6)\" >> /tmp/dev-container-features/devcontainer-features.builtin.env && echo \"_REMOTE_USER_HOME=$( (command -v getent >/dev/null 2>&1 && getent passwd 'node' || grep -E '^node|^[^:]*:[^:]*:node:' /etc/passwd || true) | cut -d: -f6)\" >> /tmp/dev-container-features/devcontainer-features.builtin.env\n#12 CACHED\n\n#13 [dev_containers_feature_content_normalize 3/3] RUN chmod -R 0755 /tmp/build-features/\n#13 CACHED\n\n#14 [dev_containers_target_stage 5/5] RUN --mount=type=bind,from=dev_containers_feature_content_source,source=docker-in-docker_0,target=/tmp/build-features-src/docker-in-docker_0 cp -ar /tmp/build-features-src/docker-in-docker_0 /tmp/dev-container-features && chmod -R 0755 /tmp/dev-container-features/docker-in-docker_0 && cd /tmp/dev-container-features/docker-in-docker_0 && chmod +x ./devcontainer-features-install.sh && ./devcontainer-features-install.sh && rm -rf /tmp/dev-container-features/docker-in-docker_0\n#14 CACHED\n\n#15 exporting to image\n#15 exporting layers done\n#15 writing image sha256:275dc193c905d448ef3945e3fc86220cc315fe0cb41013988d6ff9f8d6ef2357 done\n#15 naming to docker.io/library/vsc-devcontainers-template-starter-81d8f17e32abef6d434cbb5a37fe05e5c8a6f8ccede47a61197f002dcbf60566-features done\n#15 DONE 0.0s\n"} +{"type":"stop","level":3,"timestamp":1744102174254,"text":"Run: docker buildx build --load --build-context dev_containers_feature_content_source=/var/folders/1y/cm8mblxd7_x9cljwl_jvfprh0000gn/T/devcontainercli/container-features/0.75.0-1744102171193 --build-arg _DEV_CONTAINERS_BASE_IMAGE=mcr.microsoft.com/devcontainers/javascript-node:1-18-bullseye --build-arg _DEV_CONTAINERS_IMAGE_USER=root --build-arg _DEV_CONTAINERS_FEATURE_CONTENT_SOURCE=dev_container_feature_content_temp --target dev_containers_target_stage -f /var/folders/1y/cm8mblxd7_x9cljwl_jvfprh0000gn/T/devcontainercli/container-features/0.75.0-1744102171193/Dockerfile.extended -t vsc-devcontainers-template-starter-81d8f17e32abef6d434cbb5a37fe05e5c8a6f8ccede47a61197f002dcbf60566-features /var/folders/1y/cm8mblxd7_x9cljwl_jvfprh0000gn/T/devcontainercli/empty-folder","startTimestamp":1744102172588} +{"type":"start","level":2,"timestamp":1744102174259,"text":"Run: docker events --format {{json .}} --filter event=start"} +{"type":"start","level":2,"timestamp":1744102174262,"text":"Starting container"} +{"type":"start","level":3,"timestamp":1744102174263,"text":"Run: docker run --sig-proxy=false -a STDOUT -a STDERR --mount type=bind,source=/code/devcontainers-template-starter,target=/workspaces/devcontainers-template-starter,consistency=cached --mount type=volume,src=dind-var-lib-docker-0pctifo8bbg3pd06g3j5s9ae8j7lp5qfcd67m25kuahurel7v7jm,dst=/var/lib/docker -l devcontainer.local_folder=/code/devcontainers-template-starter -l devcontainer.config_file=/code/devcontainers-template-starter/.devcontainer/devcontainer.json --privileged --entrypoint /bin/sh vsc-devcontainers-template-starter-81d8f17e32abef6d434cbb5a37fe05e5c8a6f8ccede47a61197f002dcbf60566-features -c echo Container started"} +{"type":"raw","level":3,"timestamp":1744102174400,"text":"Container started\n"} +{"type":"stop","level":2,"timestamp":1744102174402,"text":"Starting container","startTimestamp":1744102174262} +{"type":"start","level":2,"timestamp":1744102174402,"text":"Run: docker ps -q -a --filter label=devcontainer.local_folder=/code/devcontainers-template-starter --filter label=devcontainer.config_file=/code/devcontainers-template-starter/.devcontainer/devcontainer.json"} +{"type":"stop","level":2,"timestamp":1744102174405,"text":"Run: docker events --format {{json .}} --filter event=start","startTimestamp":1744102174259} +{"type":"raw","level":3,"timestamp":1744102174407,"text":"Not setting dockerd DNS manually.\n"} +{"type":"stop","level":2,"timestamp":1744102174457,"text":"Run: docker ps -q -a --filter label=devcontainer.local_folder=/code/devcontainers-template-starter --filter label=devcontainer.config_file=/code/devcontainers-template-starter/.devcontainer/devcontainer.json","startTimestamp":1744102174402} +{"type":"start","level":2,"timestamp":1744102174457,"text":"Run: docker inspect --type container bc72db8d0c4c"} +{"type":"stop","level":2,"timestamp":1744102174473,"text":"Run: docker inspect --type container bc72db8d0c4c","startTimestamp":1744102174457} +{"type":"start","level":2,"timestamp":1744102174473,"text":"Inspecting container"} +{"type":"start","level":2,"timestamp":1744102174473,"text":"Run: docker inspect --type container bc72db8d0c4c4e941bd9ffc341aee64a18d3397fd45b87cd93d4746150967ba8"} +{"type":"stop","level":2,"timestamp":1744102174487,"text":"Run: docker inspect --type container bc72db8d0c4c4e941bd9ffc341aee64a18d3397fd45b87cd93d4746150967ba8","startTimestamp":1744102174473} +{"type":"stop","level":2,"timestamp":1744102174487,"text":"Inspecting container","startTimestamp":1744102174473} +{"type":"start","level":2,"timestamp":1744102174488,"text":"Run in container: /bin/sh"} +{"type":"start","level":2,"timestamp":1744102174489,"text":"Run in container: uname -m"} +{"type":"text","level":2,"timestamp":1744102174514,"text":"aarch64\n"} +{"type":"text","level":2,"timestamp":1744102174514,"text":""} +{"type":"stop","level":2,"timestamp":1744102174514,"text":"Run in container: uname -m","startTimestamp":1744102174489} +{"type":"start","level":2,"timestamp":1744102174514,"text":"Run in container: (cat /etc/os-release || cat /usr/lib/os-release) 2>/dev/null"} +{"type":"text","level":2,"timestamp":1744102174515,"text":"PRETTY_NAME=\"Debian GNU/Linux 11 (bullseye)\"\nNAME=\"Debian GNU/Linux\"\nVERSION_ID=\"11\"\nVERSION=\"11 (bullseye)\"\nVERSION_CODENAME=bullseye\nID=debian\nHOME_URL=\"https://www.debian.org/\"\nSUPPORT_URL=\"https://www.debian.org/support\"\nBUG_REPORT_URL=\"https://bugs.debian.org/\"\n"} +{"type":"text","level":2,"timestamp":1744102174515,"text":""} +{"type":"stop","level":2,"timestamp":1744102174515,"text":"Run in container: (cat /etc/os-release || cat /usr/lib/os-release) 2>/dev/null","startTimestamp":1744102174514} +{"type":"start","level":2,"timestamp":1744102174515,"text":"Run in container: (command -v getent >/dev/null 2>&1 && getent passwd 'node' || grep -E '^node|^[^:]*:[^:]*:node:' /etc/passwd || true)"} +{"type":"stop","level":2,"timestamp":1744102174516,"text":"Run in container: (command -v getent >/dev/null 2>&1 && getent passwd 'node' || grep -E '^node|^[^:]*:[^:]*:node:' /etc/passwd || true)","startTimestamp":1744102174515} +{"type":"start","level":2,"timestamp":1744102174516,"text":"Run in container: test -f '/var/devcontainer/.patchEtcEnvironmentMarker'"} +{"type":"text","level":2,"timestamp":1744102174516,"text":""} +{"type":"text","level":2,"timestamp":1744102174516,"text":""} +{"type":"text","level":2,"timestamp":1744102174516,"text":"Exit code 1"} +{"type":"stop","level":2,"timestamp":1744102174516,"text":"Run in container: test -f '/var/devcontainer/.patchEtcEnvironmentMarker'","startTimestamp":1744102174516} +{"type":"start","level":2,"timestamp":1744102174517,"text":"Run in container: /bin/sh"} +{"type":"start","level":2,"timestamp":1744102174517,"text":"Run in container: test ! -f '/var/devcontainer/.patchEtcEnvironmentMarker' && set -o noclobber && mkdir -p '/var/devcontainer' && { > '/var/devcontainer/.patchEtcEnvironmentMarker' ; } 2> /dev/null"} +{"type":"text","level":2,"timestamp":1744102174544,"text":""} +{"type":"text","level":2,"timestamp":1744102174544,"text":""} +{"type":"stop","level":2,"timestamp":1744102174544,"text":"Run in container: test ! -f '/var/devcontainer/.patchEtcEnvironmentMarker' && set -o noclobber && mkdir -p '/var/devcontainer' && { > '/var/devcontainer/.patchEtcEnvironmentMarker' ; } 2> /dev/null","startTimestamp":1744102174517} +{"type":"start","level":2,"timestamp":1744102174544,"text":"Run in container: cat >> /etc/environment <<'etcEnvrionmentEOF'"} +{"type":"text","level":2,"timestamp":1744102174545,"text":""} +{"type":"text","level":2,"timestamp":1744102174545,"text":""} +{"type":"stop","level":2,"timestamp":1744102174545,"text":"Run in container: cat >> /etc/environment <<'etcEnvrionmentEOF'","startTimestamp":1744102174544} +{"type":"start","level":2,"timestamp":1744102174545,"text":"Run in container: test -f '/var/devcontainer/.patchEtcProfileMarker'"} +{"type":"text","level":2,"timestamp":1744102174545,"text":""} +{"type":"text","level":2,"timestamp":1744102174545,"text":""} +{"type":"text","level":2,"timestamp":1744102174545,"text":"Exit code 1"} +{"type":"stop","level":2,"timestamp":1744102174545,"text":"Run in container: test -f '/var/devcontainer/.patchEtcProfileMarker'","startTimestamp":1744102174545} +{"type":"start","level":2,"timestamp":1744102174545,"text":"Run in container: test ! -f '/var/devcontainer/.patchEtcProfileMarker' && set -o noclobber && mkdir -p '/var/devcontainer' && { > '/var/devcontainer/.patchEtcProfileMarker' ; } 2> /dev/null"} +{"type":"text","level":2,"timestamp":1744102174546,"text":""} +{"type":"text","level":2,"timestamp":1744102174546,"text":""} +{"type":"stop","level":2,"timestamp":1744102174546,"text":"Run in container: test ! -f '/var/devcontainer/.patchEtcProfileMarker' && set -o noclobber && mkdir -p '/var/devcontainer' && { > '/var/devcontainer/.patchEtcProfileMarker' ; } 2> /dev/null","startTimestamp":1744102174545} +{"type":"start","level":2,"timestamp":1744102174546,"text":"Run in container: sed -i -E 's/((^|\\s)PATH=)([^\\$]*)$/\\1${PATH:-\\3}/g' /etc/profile || true"} +{"type":"text","level":2,"timestamp":1744102174547,"text":""} +{"type":"text","level":2,"timestamp":1744102174547,"text":""} +{"type":"stop","level":2,"timestamp":1744102174547,"text":"Run in container: sed -i -E 's/((^|\\s)PATH=)([^\\$]*)$/\\1${PATH:-\\3}/g' /etc/profile || true","startTimestamp":1744102174546} +{"type":"text","level":2,"timestamp":1744102174548,"text":"userEnvProbe: loginInteractiveShell (default)"} +{"type":"text","level":1,"timestamp":1744102174548,"text":"LifecycleCommandExecutionMap: {\n \"onCreateCommand\": [],\n \"updateContentCommand\": [],\n \"postCreateCommand\": [\n {\n \"origin\": \"devcontainer.json\",\n \"command\": \"npm install -g @devcontainers/cli\"\n }\n ],\n \"postStartCommand\": [],\n \"postAttachCommand\": [],\n \"initializeCommand\": []\n}"} +{"type":"text","level":2,"timestamp":1744102174548,"text":"userEnvProbe: not found in cache"} +{"type":"text","level":2,"timestamp":1744102174548,"text":"userEnvProbe shell: /bin/bash"} +{"type":"start","level":2,"timestamp":1744102174548,"text":"Run in container: /bin/bash -lic echo -n bcf9079d-76e7-4bc1-a6e2-9da4ca796acf; cat /proc/self/environ; echo -n bcf9079d-76e7-4bc1-a6e2-9da4ca796acf"} +{"type":"start","level":2,"timestamp":1744102174549,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.onCreateCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-08T08:49:34.285146903Z}\" != '2025-04-08T08:49:34.285146903Z' ] && echo '2025-04-08T08:49:34.285146903Z' > '/home/node/.devcontainer/.onCreateCommandMarker'"} +{"type":"text","level":2,"timestamp":1744102174552,"text":""} +{"type":"text","level":2,"timestamp":1744102174552,"text":""} +{"type":"stop","level":2,"timestamp":1744102174552,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.onCreateCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-08T08:49:34.285146903Z}\" != '2025-04-08T08:49:34.285146903Z' ] && echo '2025-04-08T08:49:34.285146903Z' > '/home/node/.devcontainer/.onCreateCommandMarker'","startTimestamp":1744102174549} +{"type":"start","level":2,"timestamp":1744102174552,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.updateContentCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-08T08:49:34.285146903Z}\" != '2025-04-08T08:49:34.285146903Z' ] && echo '2025-04-08T08:49:34.285146903Z' > '/home/node/.devcontainer/.updateContentCommandMarker'"} +{"type":"text","level":2,"timestamp":1744102174554,"text":""} +{"type":"text","level":2,"timestamp":1744102174554,"text":""} +{"type":"stop","level":2,"timestamp":1744102174554,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.updateContentCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-08T08:49:34.285146903Z}\" != '2025-04-08T08:49:34.285146903Z' ] && echo '2025-04-08T08:49:34.285146903Z' > '/home/node/.devcontainer/.updateContentCommandMarker'","startTimestamp":1744102174552} +{"type":"start","level":2,"timestamp":1744102174554,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.postCreateCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-08T08:49:34.285146903Z}\" != '2025-04-08T08:49:34.285146903Z' ] && echo '2025-04-08T08:49:34.285146903Z' > '/home/node/.devcontainer/.postCreateCommandMarker'"} +{"type":"text","level":2,"timestamp":1744102174555,"text":""} +{"type":"text","level":2,"timestamp":1744102174555,"text":""} +{"type":"stop","level":2,"timestamp":1744102174555,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.postCreateCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-08T08:49:34.285146903Z}\" != '2025-04-08T08:49:34.285146903Z' ] && echo '2025-04-08T08:49:34.285146903Z' > '/home/node/.devcontainer/.postCreateCommandMarker'","startTimestamp":1744102174554} +{"type":"raw","level":3,"timestamp":1744102174555,"text":"\u001b[1mRunning the postCreateCommand from devcontainer.json...\u001b[0m\r\n\r\n","channel":"postCreate"} +{"type":"progress","name":"Running postCreateCommand...","status":"running","stepDetail":"npm install -g @devcontainers/cli","channel":"postCreate"} +{"type":"stop","level":2,"timestamp":1744102174604,"text":"Run in container: /bin/bash -lic echo -n bcf9079d-76e7-4bc1-a6e2-9da4ca796acf; cat /proc/self/environ; echo -n bcf9079d-76e7-4bc1-a6e2-9da4ca796acf","startTimestamp":1744102174548} +{"type":"text","level":1,"timestamp":1744102174604,"text":"bcf9079d-76e7-4bc1-a6e2-9da4ca796acfNVM_RC_VERSION=\u0000HOSTNAME=bc72db8d0c4c\u0000YARN_VERSION=1.22.22\u0000PWD=/\u0000HOME=/home/node\u0000LS_COLORS=\u0000NVM_SYMLINK_CURRENT=true\u0000DOCKER_BUILDKIT=1\u0000NVM_DIR=/usr/local/share/nvm\u0000USER=node\u0000SHLVL=1\u0000NVM_CD_FLAGS=\u0000PROMPT_DIRTRIM=4\u0000PATH=/usr/local/share/nvm/current/bin:/usr/local/share/npm-global/bin:/usr/local/share/nvm/current/bin:/usr/local/share/npm-global/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/home/node/.local/bin\u0000NODE_VERSION=18.20.8\u0000_=/bin/cat\u0000bcf9079d-76e7-4bc1-a6e2-9da4ca796acf"} +{"type":"text","level":1,"timestamp":1744102174604,"text":"\u001b[1m\u001b[31mbash: cannot set terminal process group (-1): Inappropriate ioctl for device\u001b[39m\u001b[22m\r\n\u001b[1m\u001b[31mbash: no job control in this shell\u001b[39m\u001b[22m\r\n\u001b[1m\u001b[31m\u001b[39m\u001b[22m\r\n"} +{"type":"text","level":1,"timestamp":1744102174605,"text":"userEnvProbe parsed: {\n \"NVM_RC_VERSION\": \"\",\n \"HOSTNAME\": \"bc72db8d0c4c\",\n \"YARN_VERSION\": \"1.22.22\",\n \"PWD\": \"/\",\n \"HOME\": \"/home/node\",\n \"LS_COLORS\": \"\",\n \"NVM_SYMLINK_CURRENT\": \"true\",\n \"DOCKER_BUILDKIT\": \"1\",\n \"NVM_DIR\": \"/usr/local/share/nvm\",\n \"USER\": \"node\",\n \"SHLVL\": \"1\",\n \"NVM_CD_FLAGS\": \"\",\n \"PROMPT_DIRTRIM\": \"4\",\n \"PATH\": \"/usr/local/share/nvm/current/bin:/usr/local/share/npm-global/bin:/usr/local/share/nvm/current/bin:/usr/local/share/npm-global/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/home/node/.local/bin\",\n \"NODE_VERSION\": \"18.20.8\",\n \"_\": \"/bin/cat\"\n}"} +{"type":"text","level":2,"timestamp":1744102174605,"text":"userEnvProbe PATHs:\nProbe: '/usr/local/share/nvm/current/bin:/usr/local/share/npm-global/bin:/usr/local/share/nvm/current/bin:/usr/local/share/npm-global/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin:/home/node/.local/bin'\nContainer: '/usr/local/share/nvm/current/bin:/usr/local/share/npm-global/bin:/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin:/sbin:/bin'"} +{"type":"start","level":2,"timestamp":1744102174608,"text":"Run in container: /bin/sh -c npm install -g @devcontainers/cli","channel":"postCreate"} +{"type":"raw","level":3,"timestamp":1744102175615,"text":"\nadded 1 package in 784ms\n","channel":"postCreate"} +{"type":"stop","level":2,"timestamp":1744102175622,"text":"Run in container: /bin/sh -c npm install -g @devcontainers/cli","startTimestamp":1744102174608,"channel":"postCreate"} +{"type":"progress","name":"Running postCreateCommand...","status":"succeeded","channel":"postCreate"} +{"type":"start","level":2,"timestamp":1744102175624,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.postStartCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-08T08:49:34.332032445Z}\" != '2025-04-08T08:49:34.332032445Z' ] && echo '2025-04-08T08:49:34.332032445Z' > '/home/node/.devcontainer/.postStartCommandMarker'"} +{"type":"text","level":2,"timestamp":1744102175627,"text":""} +{"type":"text","level":2,"timestamp":1744102175627,"text":""} +{"type":"stop","level":2,"timestamp":1744102175627,"text":"Run in container: mkdir -p '/home/node/.devcontainer' && CONTENT=\"$(cat '/home/node/.devcontainer/.postStartCommandMarker' 2>/dev/null || echo ENOENT)\" && [ \"${CONTENT:-2025-04-08T08:49:34.332032445Z}\" != '2025-04-08T08:49:34.332032445Z' ] && echo '2025-04-08T08:49:34.332032445Z' > '/home/node/.devcontainer/.postStartCommandMarker'","startTimestamp":1744102175624} +{"type":"stop","level":2,"timestamp":1744102175628,"text":"Resolving Remote","startTimestamp":1744102171125} +{"outcome":"success","containerId":"bc72db8d0c4c4e941bd9ffc341aee64a18d3397fd45b87cd93d4746150967ba8","remoteUser":"node","remoteWorkspaceFolder":"/workspaces/devcontainers-template-starter"} diff --git a/agent/api.go b/agent/api.go index 259866797a..375338acfa 100644 --- a/agent/api.go +++ b/agent/api.go @@ -38,7 +38,8 @@ func (a *agent) apiHandler() http.Handler { } ch := agentcontainers.New(agentcontainers.WithLister(a.lister)) promHandler := PrometheusMetricsHandler(a.prometheusRegistry, a.logger) - r.Get("/api/v0/containers", ch.ServeHTTP) + r.Get("/api/v0/containers", ch.List) + r.Post("/api/v0/containers/{id}/recreate", ch.Recreate) r.Get("/api/v0/listening-ports", lp.handler) r.Get("/api/v0/netcheck", a.HandleNetcheck) r.Post("/api/v0/list-directory", a.HandleLS) diff --git a/codersdk/workspaceagents.go b/codersdk/workspaceagents.go index 6e8a32b2e8..ef770712c3 100644 --- a/codersdk/workspaceagents.go +++ b/codersdk/workspaceagents.go @@ -429,6 +429,16 @@ type WorkspaceAgentContainer struct { Volumes map[string]string `json:"volumes"` } +func (c *WorkspaceAgentContainer) Match(idOrName string) bool { + if c.ID == idOrName { + return true + } + if c.FriendlyName == idOrName { + return true + } + return false +} + // WorkspaceAgentContainerPort describes a port as exposed by a container. type WorkspaceAgentContainerPort struct { // Port is the port number *inside* the container.