|
|
@@ -977,10 +977,6 @@ func buildContainerConfigMounts(p types.Project, s types.ServiceConfig) ([]mount
|
|
|
target = configsBaseDir + config.Target
|
|
|
}
|
|
|
|
|
|
- if config.UID != "" || config.GID != "" || config.Mode != nil {
|
|
|
- logrus.Warn("config `uid`, `gid` and `mode` are not supported, they will be ignored")
|
|
|
- }
|
|
|
-
|
|
|
definedConfig := p.Configs[config.Source]
|
|
|
if definedConfig.External {
|
|
|
return nil, fmt.Errorf("unsupported external config %s", definedConfig.Name)
|
|
|
@@ -997,6 +993,10 @@ func buildContainerConfigMounts(p types.Project, s types.ServiceConfig) ([]mount
|
|
|
continue
|
|
|
}
|
|
|
|
|
|
+ if config.UID != "" || config.GID != "" || config.Mode != nil {
|
|
|
+ logrus.Warn("config `uid`, `gid` and `mode` are not supported, they will be ignored")
|
|
|
+ }
|
|
|
+
|
|
|
bindMount, err := buildMount(p, types.ServiceVolumeConfig{
|
|
|
Type: types.VolumeTypeBind,
|
|
|
Source: definedConfig.File,
|
|
|
@@ -1027,10 +1027,6 @@ func buildContainerSecretMounts(p types.Project, s types.ServiceConfig) ([]mount
|
|
|
target = secretsDir + secret.Target
|
|
|
}
|
|
|
|
|
|
- if secret.UID != "" || secret.GID != "" || secret.Mode != nil {
|
|
|
- logrus.Warn("secrets `uid`, `gid` and `mode` are not supported, they will be ignored")
|
|
|
- }
|
|
|
-
|
|
|
definedSecret := p.Secrets[secret.Source]
|
|
|
if definedSecret.External {
|
|
|
return nil, fmt.Errorf("unsupported external secret %s", definedSecret.Name)
|
|
|
@@ -1047,6 +1043,10 @@ func buildContainerSecretMounts(p types.Project, s types.ServiceConfig) ([]mount
|
|
|
continue
|
|
|
}
|
|
|
|
|
|
+ if secret.UID != "" || secret.GID != "" || secret.Mode != nil {
|
|
|
+ logrus.Warn("secrets `uid`, `gid` and `mode` are not supported, they will be ignored")
|
|
|
+ }
|
|
|
+
|
|
|
if _, err := os.Stat(definedSecret.File); os.IsNotExist(err) {
|
|
|
logrus.Warnf("secret file %s does not exist", definedSecret.Name)
|
|
|
}
|