| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269 | /*   Copyright 2020 Docker Compose CLI authors   Licensed under the Apache License, Version 2.0 (the "License");   you may not use this file except in compliance with the License.   You may obtain a copy of the License at       http://www.apache.org/licenses/LICENSE-2.0   Unless required by applicable law or agreed to in writing, software   distributed under the License is distributed on an "AS IS" BASIS,   WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.   See the License for the specific language governing permissions and   limitations under the License.*/package composeimport (	"bytes"	"context"	"encoding/json"	"fmt"	"os"	"path"	"path/filepath"	"strconv"	"strings"	moby "github.com/docker/docker/api/types"	"github.com/docker/docker/api/types/blkiodev"	"github.com/docker/docker/api/types/container"	"github.com/docker/docker/api/types/filters"	"github.com/docker/docker/api/types/mount"	"github.com/docker/docker/api/types/network"	"github.com/docker/docker/api/types/strslice"	volume_api "github.com/docker/docker/api/types/volume"	"github.com/docker/docker/errdefs"	"github.com/docker/go-connections/nat"	"github.com/docker/go-units"	"github.com/pkg/errors"	"github.com/sirupsen/logrus"	"github.com/compose-spec/compose-go/types"	"github.com/docker/compose/v2/pkg/api"	"github.com/docker/compose/v2/pkg/progress"	"github.com/docker/compose/v2/pkg/utils")type createOptions struct {	AutoRemove        bool	AttachStdin       bool	UseNetworkAliases bool	Labels            types.Labels}type createConfigs struct {	Container *container.Config	Host      *container.HostConfig	Network   *network.NetworkingConfig	Links     []string}func (s *composeService) Create(ctx context.Context, project *types.Project, options api.CreateOptions) error {	return progress.RunWithTitle(ctx, func(ctx context.Context) error {		return s.create(ctx, project, options)	}, s.stdinfo(), "Creating")}func (s *composeService) create(ctx context.Context, project *types.Project, options api.CreateOptions) error {	if len(options.Services) == 0 {		options.Services = project.ServiceNames()	}	var observedState Containers	observedState, err := s.getContainers(ctx, project.Name, oneOffInclude, true)	if err != nil {		return err	}	err = s.ensureImagesExists(ctx, project, options.QuietPull)	if err != nil {		return err	}	prepareNetworks(project)	err = prepareVolumes(project)	if err != nil {		return err	}	if err := s.ensureNetworks(ctx, project.Networks); err != nil {		return err	}	if err := s.ensureProjectVolumes(ctx, project); err != nil {		return err	}	allServices := project.AllServices()	allServiceNames := []string{}	for _, service := range allServices {		allServiceNames = append(allServiceNames, service.Name)	}	orphans := observedState.filter(isNotService(allServiceNames...))	if len(orphans) > 0 && !options.IgnoreOrphans {		if options.RemoveOrphans {			w := progress.ContextWriter(ctx)			err := s.removeContainers(ctx, w, orphans, nil, false)			if err != nil {				return err			}		} else {			logrus.Warnf("Found orphan containers (%s) for this project. If "+				"you removed or renamed this service in your compose "+				"file, you can run this command with the "+				"--remove-orphans flag to clean it up.", orphans.names())		}	}	return newConvergence(options.Services, observedState, s).apply(ctx, project, options)}func prepareVolumes(p *types.Project) error {	for i := range p.Services {		volumesFrom, dependServices, err := getVolumesFrom(p, p.Services[i].VolumesFrom)		if err != nil {			return err		}		p.Services[i].VolumesFrom = volumesFrom		if len(dependServices) > 0 {			if p.Services[i].DependsOn == nil {				p.Services[i].DependsOn = make(types.DependsOnConfig, len(dependServices))			}			for _, service := range p.Services {				if utils.StringContains(dependServices, service.Name) &&					p.Services[i].DependsOn[service.Name].Condition == "" {					p.Services[i].DependsOn[service.Name] = types.ServiceDependency{						Condition: types.ServiceConditionStarted,						Required:  true,					}				}			}		}	}	return nil}func prepareNetworks(project *types.Project) {	for k, network := range project.Networks {		network.Labels = network.Labels.Add(api.NetworkLabel, k)		network.Labels = network.Labels.Add(api.ProjectLabel, project.Name)		network.Labels = network.Labels.Add(api.VersionLabel, api.ComposeVersion)		project.Networks[k] = network	}}func (s *composeService) ensureNetworks(ctx context.Context, networks types.Networks) error {	for i, network := range networks {		err := s.ensureNetwork(ctx, &network)		if err != nil {			return err		}		networks[i] = network	}	return nil}func (s *composeService) ensureProjectVolumes(ctx context.Context, project *types.Project) error {	for k, volume := range project.Volumes {		volume.Labels = volume.Labels.Add(api.VolumeLabel, k)		volume.Labels = volume.Labels.Add(api.ProjectLabel, project.Name)		volume.Labels = volume.Labels.Add(api.VersionLabel, api.ComposeVersion)		err := s.ensureVolume(ctx, volume, project.Name)		if err != nil {			return err		}	}	return nil}func (s *composeService) getCreateConfigs(ctx context.Context,	p *types.Project,	service types.ServiceConfig,	number int,	inherit *moby.Container,	opts createOptions,) (createConfigs, error) {	labels, err := s.prepareLabels(opts.Labels, service, number)	if err != nil {		return createConfigs{}, err	}	var (		runCmd     strslice.StrSlice		entrypoint strslice.StrSlice	)	if service.Command != nil {		runCmd = strslice.StrSlice(service.Command)	}	if service.Entrypoint != nil {		entrypoint = strslice.StrSlice(service.Entrypoint)	}	var (		tty       = service.Tty		stdinOpen = service.StdinOpen	)	proxyConfig := types.MappingWithEquals(s.configFile().ParseProxyConfig(s.apiClient().DaemonHost(), nil))	env := proxyConfig.OverrideBy(service.Environment)	containerConfig := container.Config{		Hostname:        service.Hostname,		Domainname:      service.DomainName,		User:            service.User,		ExposedPorts:    buildContainerPorts(service),		Tty:             tty,		OpenStdin:       stdinOpen,		StdinOnce:       opts.AttachStdin && stdinOpen,		AttachStdin:     opts.AttachStdin,		AttachStderr:    true,		AttachStdout:    true,		Cmd:             runCmd,		Image:           api.GetImageNameOrDefault(service, p.Name),		WorkingDir:      service.WorkingDir,		Entrypoint:      entrypoint,		NetworkDisabled: service.NetworkMode == "disabled",		MacAddress:      service.MacAddress,		Labels:          labels,		StopSignal:      service.StopSignal,		Env:             ToMobyEnv(env),		Healthcheck:     ToMobyHealthCheck(service.HealthCheck),		StopTimeout:     ToSeconds(service.StopGracePeriod),	}	// VOLUMES/MOUNTS/FILESYSTEMS	tmpfs := map[string]string{}	for _, t := range service.Tmpfs {		if arr := strings.SplitN(t, ":", 2); len(arr) > 1 {			tmpfs[arr[0]] = arr[1]		} else {			tmpfs[arr[0]] = ""		}	}	binds, mounts, err := s.buildContainerVolumes(ctx, *p, service, inherit)	if err != nil {		return createConfigs{}, err	}	var volumesFrom []string	for _, v := range service.VolumesFrom {		if !strings.HasPrefix(v, "container:") {			return createConfigs{}, fmt.Errorf("invalid volume_from: %s", v)		}		volumesFrom = append(volumesFrom, v[len("container:"):])	}	// NETWORKING	links, err := s.getLinks(ctx, p.Name, service, number)	if err != nil {		return createConfigs{}, err	}	networkMode, networkingConfig := defaultNetworkSettings(p, service, number, links, opts.UseNetworkAliases)	portBindings := buildContainerPortBindingOptions(service)	// MISC	resources := getDeployResources(service)	var logConfig container.LogConfig	if service.Logging != nil {		logConfig = container.LogConfig{			Type:   service.Logging.Driver,			Config: service.Logging.Options,		}	}	securityOpts, unconfined, err := parseSecurityOpts(p, service.SecurityOpt)	if err != nil {		return createConfigs{}, err	}	hostConfig := container.HostConfig{		AutoRemove:     opts.AutoRemove,		Binds:          binds,		Mounts:         mounts,		CapAdd:         strslice.StrSlice(service.CapAdd),		CapDrop:        strslice.StrSlice(service.CapDrop),		NetworkMode:    networkMode,		Init:           service.Init,		IpcMode:        container.IpcMode(service.Ipc),		CgroupnsMode:   container.CgroupnsMode(service.Cgroup),		ReadonlyRootfs: service.ReadOnly,		RestartPolicy:  getRestartPolicy(service),		ShmSize:        int64(service.ShmSize),		Sysctls:        service.Sysctls,		PortBindings:   portBindings,		Resources:      resources,		VolumeDriver:   service.VolumeDriver,		VolumesFrom:    volumesFrom,		DNS:            service.DNS,		DNSSearch:      service.DNSSearch,		DNSOptions:     service.DNSOpts,		ExtraHosts:     service.ExtraHosts.AsList(),		SecurityOpt:    securityOpts,		UsernsMode:     container.UsernsMode(service.UserNSMode),		UTSMode:        container.UTSMode(service.Uts),		Privileged:     service.Privileged,		PidMode:        container.PidMode(service.Pid),		Tmpfs:          tmpfs,		Isolation:      container.Isolation(service.Isolation),		Runtime:        service.Runtime,		LogConfig:      logConfig,		GroupAdd:       service.GroupAdd,		Links:          links,		OomScoreAdj:    int(service.OomScoreAdj),	}	if unconfined {		hostConfig.MaskedPaths = []string{}		hostConfig.ReadonlyPaths = []string{}	}	cfgs := createConfigs{		Container: &containerConfig,		Host:      &hostConfig,		Network:   networkingConfig,		Links:     links,	}	return cfgs, nil}func getAliases(project *types.Project, service types.ServiceConfig, serviceIndex int, networkKey string, useNetworkAliases bool) []string {	aliases := []string{getContainerName(project.Name, service, serviceIndex)}	if useNetworkAliases {		aliases = append(aliases, service.Name)		if cfg := service.Networks[networkKey]; cfg != nil {			aliases = append(aliases, cfg.Aliases...)		}	}	return aliases}func createEndpointSettings(p *types.Project, service types.ServiceConfig, serviceIndex int, networkKey string, links []string, useNetworkAliases bool) *network.EndpointSettings {	config := service.Networks[networkKey]	var ipam *network.EndpointIPAMConfig	var (		ipv4Address string		ipv6Address string	)	if config != nil {		ipv4Address = config.Ipv4Address		ipv6Address = config.Ipv6Address		ipam = &network.EndpointIPAMConfig{			IPv4Address:  ipv4Address,			IPv6Address:  ipv6Address,			LinkLocalIPs: config.LinkLocalIPs,		}	}	return &network.EndpointSettings{		Aliases:     getAliases(p, service, serviceIndex, networkKey, useNetworkAliases),		Links:       links,		IPAddress:   ipv4Address,		IPv6Gateway: ipv6Address,		IPAMConfig:  ipam,	}}// copy/pasted from https://github.com/docker/cli/blob/9de1b162f/cli/command/container/opts.go#L673-L697 + RelativePath// TODO find so way to share this code with docker/clifunc parseSecurityOpts(p *types.Project, securityOpts []string) ([]string, bool, error) {	var (		unconfined bool		parsed     []string	)	for _, opt := range securityOpts {		if opt == "systempaths=unconfined" {			unconfined = true			continue		}		con := strings.SplitN(opt, "=", 2)		if len(con) == 1 && con[0] != "no-new-privileges" {			if strings.Contains(opt, ":") {				con = strings.SplitN(opt, ":", 2)			} else {				return securityOpts, false, errors.Errorf("Invalid security-opt: %q", opt)			}		}		if con[0] == "seccomp" && con[1] != "unconfined" {			f, err := os.ReadFile(p.RelativePath(con[1]))			if err != nil {				return securityOpts, false, errors.Errorf("opening seccomp profile (%s) failed: %v", con[1], err)			}			b := bytes.NewBuffer(nil)			if err := json.Compact(b, f); err != nil {				return securityOpts, false, errors.Errorf("compacting json for seccomp profile (%s) failed: %v", con[1], err)			}			parsed = append(parsed, fmt.Sprintf("seccomp=%s", b.Bytes()))		} else {			parsed = append(parsed, opt)		}	}	return parsed, unconfined, nil}func (s *composeService) prepareLabels(labels types.Labels, service types.ServiceConfig, number int) (map[string]string, error) {	hash, err := ServiceHash(service)	if err != nil {		return nil, err	}	labels[api.ConfigHashLabel] = hash	labels[api.ContainerNumberLabel] = strconv.Itoa(number)	var dependencies []string	for s, d := range service.DependsOn {		dependencies = append(dependencies, fmt.Sprintf("%s:%s:%t", s, d.Condition, d.Restart))	}	labels[api.DependenciesLabel] = strings.Join(dependencies, ",")	return labels, nil}// defaultNetworkSettings determines the container.NetworkMode and corresponding network.NetworkingConfig (nil if not applicable).func defaultNetworkSettings(	project *types.Project,	service types.ServiceConfig,	serviceIndex int,	links []string,	useNetworkAliases bool,) (container.NetworkMode, *network.NetworkingConfig) {	if service.NetworkMode != "" {		return container.NetworkMode(service.NetworkMode), nil	}	if len(project.Networks) == 0 {		return "none", nil	}	var networkKey string	if len(service.Networks) > 0 {		networkKey = service.NetworksByPriority()[0]	} else {		networkKey = "default"	}	mobyNetworkName := project.Networks[networkKey].Name	epSettings := createEndpointSettings(project, service, serviceIndex, networkKey, links, useNetworkAliases)	networkConfig := &network.NetworkingConfig{		EndpointsConfig: map[string]*network.EndpointSettings{			mobyNetworkName: epSettings,		},	}	// From the Engine API docs:	// > Supported standard values are: bridge, host, none, and container:<name|id>.	// > Any other value is taken as a custom network's name to which this container should connect to.	return container.NetworkMode(mobyNetworkName), networkConfig}func getRestartPolicy(service types.ServiceConfig) container.RestartPolicy {	var restart container.RestartPolicy	if service.Restart != "" {		split := strings.Split(service.Restart, ":")		var attempts int		if len(split) > 1 {			attempts, _ = strconv.Atoi(split[1])		}		restart = container.RestartPolicy{			Name:              split[0],			MaximumRetryCount: attempts,		}	}	if service.Deploy != nil && service.Deploy.RestartPolicy != nil {		policy := *service.Deploy.RestartPolicy		var attempts int		if policy.MaxAttempts != nil {			attempts = int(*policy.MaxAttempts)		}		restart = container.RestartPolicy{			Name:              mapRestartPolicyCondition(policy.Condition),			MaximumRetryCount: attempts,		}	}	return restart}func mapRestartPolicyCondition(condition string) string {	// map definitions of deploy.restart_policy to engine definitions	switch condition {	case "none", "no":		return "no"	case "on-failure", "unless-stopped":		return condition	case "any", "always":		return "always"	default:		return condition	}}func getDeployResources(s types.ServiceConfig) container.Resources {	var swappiness *int64	if s.MemSwappiness != 0 {		val := int64(s.MemSwappiness)		swappiness = &val	}	resources := container.Resources{		CgroupParent:       s.CgroupParent,		Memory:             int64(s.MemLimit),		MemorySwap:         int64(s.MemSwapLimit),		MemorySwappiness:   swappiness,		MemoryReservation:  int64(s.MemReservation),		OomKillDisable:     &s.OomKillDisable,		CPUCount:           s.CPUCount,		CPUPeriod:          s.CPUPeriod,		CPUQuota:           s.CPUQuota,		CPURealtimePeriod:  s.CPURTPeriod,		CPURealtimeRuntime: s.CPURTRuntime,		CPUShares:          s.CPUShares,		NanoCPUs:           int64(s.CPUS * 1e9),		CPUPercent:         int64(s.CPUPercent * 100),		CpusetCpus:         s.CPUSet,		DeviceCgroupRules:  s.DeviceCgroupRules,	}	if s.PidsLimit != 0 {		resources.PidsLimit = &s.PidsLimit	}	setBlkio(s.BlkioConfig, &resources)	if s.Deploy != nil {		setLimits(s.Deploy.Resources.Limits, &resources)		setReservations(s.Deploy.Resources.Reservations, &resources)	}	for _, device := range s.Devices {		// FIXME should use docker/cli parseDevice, unfortunately private		src := ""		dst := ""		permissions := "rwm"		arr := strings.Split(device, ":")		switch len(arr) {		case 3:			permissions = arr[2]			fallthrough		case 2:			dst = arr[1]			fallthrough		case 1:			src = arr[0]		}		if dst == "" {			dst = src		}		resources.Devices = append(resources.Devices, container.DeviceMapping{			PathOnHost:        src,			PathInContainer:   dst,			CgroupPermissions: permissions,		})	}	for name, u := range s.Ulimits {		soft := u.Single		if u.Soft != 0 {			soft = u.Soft		}		hard := u.Single		if u.Hard != 0 {			hard = u.Hard		}		resources.Ulimits = append(resources.Ulimits, &units.Ulimit{			Name: name,			Hard: int64(hard),			Soft: int64(soft),		})	}	return resources}func setReservations(reservations *types.Resource, resources *container.Resources) {	if reservations == nil {		return	}	// Cpu reservation is a swarm option and PIDs is only a limit	// So we only need to map memory reservation and devices	if reservations.MemoryBytes != 0 {		resources.MemoryReservation = int64(reservations.MemoryBytes)	}	for _, device := range reservations.Devices {		resources.DeviceRequests = append(resources.DeviceRequests, container.DeviceRequest{			Capabilities: [][]string{device.Capabilities},			Count:        int(device.Count),			DeviceIDs:    device.IDs,			Driver:       device.Driver,		})	}}func setLimits(limits *types.Resource, resources *container.Resources) {	if limits == nil {		return	}	if limits.MemoryBytes != 0 {		resources.Memory = int64(limits.MemoryBytes)	}	if limits.NanoCPUs != "" {		if f, err := strconv.ParseFloat(limits.NanoCPUs, 64); err == nil {			resources.NanoCPUs = int64(f * 1e9)		}	}	if limits.Pids > 0 {		resources.PidsLimit = &limits.Pids	}}func setBlkio(blkio *types.BlkioConfig, resources *container.Resources) {	if blkio == nil {		return	}	resources.BlkioWeight = blkio.Weight	for _, b := range blkio.WeightDevice {		resources.BlkioWeightDevice = append(resources.BlkioWeightDevice, &blkiodev.WeightDevice{			Path:   b.Path,			Weight: b.Weight,		})	}	for _, b := range blkio.DeviceReadBps {		resources.BlkioDeviceReadBps = append(resources.BlkioDeviceReadBps, &blkiodev.ThrottleDevice{			Path: b.Path,			Rate: uint64(b.Rate),		})	}	for _, b := range blkio.DeviceReadIOps {		resources.BlkioDeviceReadIOps = append(resources.BlkioDeviceReadIOps, &blkiodev.ThrottleDevice{			Path: b.Path,			Rate: uint64(b.Rate),		})	}	for _, b := range blkio.DeviceWriteBps {		resources.BlkioDeviceWriteBps = append(resources.BlkioDeviceWriteBps, &blkiodev.ThrottleDevice{			Path: b.Path,			Rate: uint64(b.Rate),		})	}	for _, b := range blkio.DeviceWriteIOps {		resources.BlkioDeviceWriteIOps = append(resources.BlkioDeviceWriteIOps, &blkiodev.ThrottleDevice{			Path: b.Path,			Rate: uint64(b.Rate),		})	}}func buildContainerPorts(s types.ServiceConfig) nat.PortSet {	ports := nat.PortSet{}	for _, s := range s.Expose {		p := nat.Port(s)		ports[p] = struct{}{}	}	for _, p := range s.Ports {		p := nat.Port(fmt.Sprintf("%d/%s", p.Target, p.Protocol))		ports[p] = struct{}{}	}	return ports}func buildContainerPortBindingOptions(s types.ServiceConfig) nat.PortMap {	bindings := nat.PortMap{}	for _, port := range s.Ports {		p := nat.Port(fmt.Sprintf("%d/%s", port.Target, port.Protocol))		binding := nat.PortBinding{			HostIP:   port.HostIP,			HostPort: port.Published,		}		bindings[p] = append(bindings[p], binding)	}	return bindings}func getVolumesFrom(project *types.Project, volumesFrom []string) ([]string, []string, error) {	var volumes = []string{}	var services = []string{}	// parse volumes_from	if len(volumesFrom) == 0 {		return volumes, services, nil	}	for _, vol := range volumesFrom {		spec := strings.Split(vol, ":")		if len(spec) == 0 {			continue		}		if spec[0] == "container" {			volumes = append(volumes, vol)			continue		}		serviceName := spec[0]		services = append(services, serviceName)		service, err := project.GetService(serviceName)		if err != nil {			return nil, nil, err		}		firstContainer := getContainerName(project.Name, service, 1)		v := fmt.Sprintf("container:%s", firstContainer)		if len(spec) > 2 {			v = fmt.Sprintf("container:%s:%s", firstContainer, strings.Join(spec[1:], ":"))		}		volumes = append(volumes, v)	}	return volumes, services, nil}func getDependentServiceFromMode(mode string) string {	if strings.HasPrefix(		mode,		types.NetworkModeServicePrefix,	) {		return mode[len(types.NetworkModeServicePrefix):]	}	return ""}func (s *composeService) buildContainerVolumes(	ctx context.Context,	p types.Project,	service types.ServiceConfig,	inherit *moby.Container,) ([]string, []mount.Mount, error) {	var mounts []mount.Mount	var binds []string	image := api.GetImageNameOrDefault(service, p.Name)	imgInspect, _, err := s.apiClient().ImageInspectWithRaw(ctx, image)	if err != nil {		return nil, nil, err	}	mountOptions, err := buildContainerMountOptions(p, service, imgInspect, inherit)	if err != nil {		return nil, nil, err	}MOUNTS:	for _, m := range mountOptions {		if m.Type == mount.TypeNamedPipe {			mounts = append(mounts, m)			continue		}		if m.Type == mount.TypeBind {			// `Mount` is preferred but does not offer option to created host path if missing			// so `Bind` API is used here with raw volume string			// see https://github.com/moby/moby/issues/43483			for _, v := range service.Volumes {				if v.Target == m.Target {					switch {					case string(m.Type) != v.Type:						v.Source = m.Source						fallthrough					case v.Bind != nil && v.Bind.CreateHostPath:						binds = append(binds, v.String())						continue MOUNTS					}				}			}		}		mounts = append(mounts, m)	}	return binds, mounts, nil}func buildContainerMountOptions(p types.Project, s types.ServiceConfig, img moby.ImageInspect, inherit *moby.Container) ([]mount.Mount, error) {	var mounts = map[string]mount.Mount{}	if inherit != nil {		for _, m := range inherit.Mounts {			if m.Type == "tmpfs" {				continue			}			src := m.Source			if m.Type == "volume" {				src = m.Name			}			m.Destination = path.Clean(m.Destination)			if img.Config != nil {				if _, ok := img.Config.Volumes[m.Destination]; ok {					// inherit previous container's anonymous volume					mounts[m.Destination] = mount.Mount{						Type:     m.Type,						Source:   src,						Target:   m.Destination,						ReadOnly: !m.RW,					}				}			}			volumes := []types.ServiceVolumeConfig{}			for _, v := range s.Volumes {				if v.Target != m.Destination || v.Source != "" {					volumes = append(volumes, v)					continue				}				// inherit previous container's anonymous volume				mounts[m.Destination] = mount.Mount{					Type:     m.Type,					Source:   src,					Target:   m.Destination,					ReadOnly: !m.RW,				}			}			s.Volumes = volumes		}	}	mounts, err := fillBindMounts(p, s, mounts)	if err != nil {		return nil, err	}	values := make([]mount.Mount, 0, len(mounts))	for _, v := range mounts {		values = append(values, v)	}	return values, nil}func fillBindMounts(p types.Project, s types.ServiceConfig, m map[string]mount.Mount) (map[string]mount.Mount, error) {	for _, v := range s.Volumes {		bindMount, err := buildMount(p, v)		if err != nil {			return nil, err		}		m[bindMount.Target] = bindMount	}	secrets, err := buildContainerSecretMounts(p, s)	if err != nil {		return nil, err	}	for _, s := range secrets {		if _, found := m[s.Target]; found {			continue		}		m[s.Target] = s	}	configs, err := buildContainerConfigMounts(p, s)	if err != nil {		return nil, err	}	for _, c := range configs {		if _, found := m[c.Target]; found {			continue		}		m[c.Target] = c	}	return m, nil}func buildContainerConfigMounts(p types.Project, s types.ServiceConfig) ([]mount.Mount, error) {	var mounts = map[string]mount.Mount{}	configsBaseDir := "/"	for _, config := range s.Configs {		target := config.Target		if config.Target == "" {			target = configsBaseDir + config.Source		} else if !isAbsTarget(config.Target) {			target = configsBaseDir + config.Target		}		definedConfig := p.Configs[config.Source]		if definedConfig.External.External {			return nil, fmt.Errorf("unsupported external config %s", definedConfig.Name)		}		bindMount, err := buildMount(p, types.ServiceVolumeConfig{			Type:     types.VolumeTypeBind,			Source:   definedConfig.File,			Target:   target,			ReadOnly: true,		})		if err != nil {			return nil, err		}		mounts[target] = bindMount	}	values := make([]mount.Mount, 0, len(mounts))	for _, v := range mounts {		values = append(values, v)	}	return values, nil}func buildContainerSecretMounts(p types.Project, s types.ServiceConfig) ([]mount.Mount, error) {	var mounts = map[string]mount.Mount{}	secretsDir := "/run/secrets/"	for _, secret := range s.Secrets {		target := secret.Target		if secret.Target == "" {			target = secretsDir + secret.Source		} else if !isAbsTarget(secret.Target) {			target = secretsDir + secret.Target		}		definedSecret := p.Secrets[secret.Source]		if definedSecret.External.External {			return nil, fmt.Errorf("unsupported external secret %s", definedSecret.Name)		}		if definedSecret.Environment != "" {			continue		}		mnt, err := buildMount(p, types.ServiceVolumeConfig{			Type:     types.VolumeTypeBind,			Source:   definedSecret.File,			Target:   target,			ReadOnly: true,		})		if err != nil {			return nil, err		}		mounts[target] = mnt	}	values := make([]mount.Mount, 0, len(mounts))	for _, v := range mounts {		values = append(values, v)	}	return values, nil}func isAbsTarget(p string) bool {	return isUnixAbs(p) || isWindowsAbs(p)}func isUnixAbs(p string) bool {	return strings.HasPrefix(p, "/")}func isWindowsAbs(p string) bool {	if strings.HasPrefix(p, "\\\\") {		return true	}	if len(p) > 2 && p[1] == ':' {		return p[2] == '\\'	}	return false}func buildMount(project types.Project, volume types.ServiceVolumeConfig) (mount.Mount, error) {	source := volume.Source	// on windows, filepath.IsAbs(source) is false for unix style abs path like /var/run/docker.sock.	// do not replace these with  filepath.Abs(source) that will include a default drive.	if volume.Type == types.VolumeTypeBind && !filepath.IsAbs(source) && !strings.HasPrefix(source, "/") {		// volume source has already been prefixed with workdir if required, by compose-go project loader		var err error		source, err = filepath.Abs(source)		if err != nil {			return mount.Mount{}, err		}	}	if volume.Type == types.VolumeTypeVolume {		if volume.Source != "" {			pVolume, ok := project.Volumes[volume.Source]			if ok {				source = pVolume.Name			}		}	}	bind, vol, tmpfs := buildMountOptions(project, volume)	volume.Target = path.Clean(volume.Target)	if bind != nil {		volume.Type = types.VolumeTypeBind	}	return mount.Mount{		Type:          mount.Type(volume.Type),		Source:        source,		Target:        volume.Target,		ReadOnly:      volume.ReadOnly,		Consistency:   mount.Consistency(volume.Consistency),		BindOptions:   bind,		VolumeOptions: vol,		TmpfsOptions:  tmpfs,	}, nil}func buildMountOptions(project types.Project, volume types.ServiceVolumeConfig) (*mount.BindOptions, *mount.VolumeOptions, *mount.TmpfsOptions) {	switch volume.Type {	case "bind":		if volume.Volume != nil {			logrus.Warnf("mount of type `bind` should not define `volume` option")		}		if volume.Tmpfs != nil {			logrus.Warnf("mount of type `bind` should not define `tmpfs` option")		}		return buildBindOption(volume.Bind), nil, nil	case "volume":		if volume.Bind != nil {			logrus.Warnf("mount of type `volume` should not define `bind` option")		}		if volume.Tmpfs != nil {			logrus.Warnf("mount of type `volume` should not define `tmpfs` option")		}		if v, ok := project.Volumes[volume.Source]; ok && v.DriverOpts["o"] == types.VolumeTypeBind {			return buildBindOption(&types.ServiceVolumeBind{				CreateHostPath: true,			}), nil, nil		}		return nil, buildVolumeOptions(volume.Volume), nil	case "tmpfs":		if volume.Bind != nil {			logrus.Warnf("mount of type `tmpfs` should not define `bind` option")		}		if volume.Volume != nil {			logrus.Warnf("mount of type `tmpfs` should not define `volume` option")		}		return nil, nil, buildTmpfsOptions(volume.Tmpfs)	}	return nil, nil, nil}func buildBindOption(bind *types.ServiceVolumeBind) *mount.BindOptions {	if bind == nil {		return nil	}	return &mount.BindOptions{		Propagation: mount.Propagation(bind.Propagation),		// NonRecursive: false, FIXME missing from model ?	}}func buildVolumeOptions(vol *types.ServiceVolumeVolume) *mount.VolumeOptions {	if vol == nil {		return nil	}	return &mount.VolumeOptions{		NoCopy: vol.NoCopy,		// Labels:       , // FIXME missing from model ?		// DriverConfig: , // FIXME missing from model ?	}}func buildTmpfsOptions(tmpfs *types.ServiceVolumeTmpfs) *mount.TmpfsOptions {	if tmpfs == nil {		return nil	}	return &mount.TmpfsOptions{		SizeBytes: int64(tmpfs.Size),		Mode:      os.FileMode(tmpfs.Mode),	}}func (s *composeService) ensureNetwork(ctx context.Context, n *types.NetworkConfig) error {	if n.External.External {		return s.resolveExternalNetwork(ctx, n)	}	err := s.resolveOrCreateNetwork(ctx, n)	if errdefs.IsConflict(err) {		// Maybe another execution of `docker compose up|run` created same network		// let's retry once		return s.resolveOrCreateNetwork(ctx, n)	}	return err}func (s *composeService) resolveOrCreateNetwork(ctx context.Context, n *types.NetworkConfig) error { //nolint:gocyclo	expectedNetworkLabel := n.Labels[api.NetworkLabel]	expectedProjectLabel := n.Labels[api.ProjectLabel]	// First, try to find a unique network matching by name or ID	inspect, err := s.apiClient().NetworkInspect(ctx, n.Name, moby.NetworkInspectOptions{})	if err == nil {		// NetworkInspect will match on ID prefix, so double check we get the expected one		// as looking for network named `db` we could erroneously matched network ID `db9086999caf`		if inspect.Name == n.Name || inspect.ID == n.Name {			p, ok := inspect.Labels[api.ProjectLabel]			if !ok {				logrus.Warnf("a network with name %s exists but was not created by compose.\n"+					"Set `external: true` to use an existing network", n.Name)			} else if p != expectedProjectLabel {				logrus.Warnf("a network with name %s exists but was not created for project %q.\n"+					"Set `external: true` to use an existing network", n.Name, expectedProjectLabel)			}			if inspect.Labels[api.NetworkLabel] != expectedNetworkLabel {				return fmt.Errorf("network %s was found but has incorrect label %s set to %q", n.Name, api.NetworkLabel, inspect.Labels[api.NetworkLabel])			}			return nil		}	}	// ignore other errors. Typically, an ambiguous request by name results in some generic `invalidParameter` error	// Either not found, or name is ambiguous - use NetworkList to list by name	networks, err := s.apiClient().NetworkList(ctx, moby.NetworkListOptions{		Filters: filters.NewArgs(filters.Arg("name", n.Name)),	})	if err != nil {		return err	}	// NetworkList Matches all or part of a network name, so we have to filter for a strict match	networks = utils.Filter(networks, func(net moby.NetworkResource) bool {		return net.Name == n.Name	})	for _, net := range networks {		if net.Labels[api.ProjectLabel] == expectedProjectLabel &&			net.Labels[api.NetworkLabel] == expectedNetworkLabel {			return nil		}	}	// we could have set NetworkList with a projectFilter and networkFilter but not doing so allows to catch this	// scenario were a network with same name exists but doesn't have label, and use of `CheckDuplicate: true`	// prevents to create another one.	if len(networks) > 0 {		logrus.Warnf("a network with name %s exists but was not created by compose.\n"+			"Set `external: true` to use an existing network", n.Name)		return nil	}	var ipam *network.IPAM	if n.Ipam.Config != nil {		var config []network.IPAMConfig		for _, pool := range n.Ipam.Config {			config = append(config, network.IPAMConfig{				Subnet:     pool.Subnet,				IPRange:    pool.IPRange,				Gateway:    pool.Gateway,				AuxAddress: pool.AuxiliaryAddresses,			})		}		ipam = &network.IPAM{			Driver: n.Ipam.Driver,			Config: config,		}	}	createOpts := moby.NetworkCreate{		CheckDuplicate: true,		Labels:         n.Labels,		Driver:         n.Driver,		Options:        n.DriverOpts,		Internal:       n.Internal,		Attachable:     n.Attachable,		IPAM:           ipam,		EnableIPv6:     n.EnableIPv6,	}	if n.Ipam.Driver != "" || len(n.Ipam.Config) > 0 {		createOpts.IPAM = &network.IPAM{}	}	if n.Ipam.Driver != "" {		createOpts.IPAM.Driver = n.Ipam.Driver	}	for _, ipamConfig := range n.Ipam.Config {		config := network.IPAMConfig{			Subnet:     ipamConfig.Subnet,			IPRange:    ipamConfig.IPRange,			Gateway:    ipamConfig.Gateway,			AuxAddress: ipamConfig.AuxiliaryAddresses,		}		createOpts.IPAM.Config = append(createOpts.IPAM.Config, config)	}	networkEventName := fmt.Sprintf("Network %s", n.Name)	w := progress.ContextWriter(ctx)	w.Event(progress.CreatingEvent(networkEventName))	_, err = s.apiClient().NetworkCreate(ctx, n.Name, createOpts)	if err != nil {		w.Event(progress.ErrorEvent(networkEventName))		return errors.Wrapf(err, "failed to create network %s", n.Name)	}	w.Event(progress.CreatedEvent(networkEventName))	return nil}func (s *composeService) resolveExternalNetwork(ctx context.Context, n *types.NetworkConfig) error {	// NetworkInspect will match on ID prefix, so NetworkList with a name	// filter is used to look for an exact match to prevent e.g. a network	// named `db` from getting erroneously matched to a network with an ID	// like `db9086999caf`	networks, err := s.apiClient().NetworkList(ctx, moby.NetworkListOptions{		Filters: filters.NewArgs(filters.Arg("name", n.Name)),	})	if err != nil {		return err	}	// NetworkList API doesn't return the exact name match, so we can retrieve more than one network with a request	networks = utils.Filter(networks, func(net moby.NetworkResource) bool {		return net.Name == n.Name	})	switch len(networks) {	case 1:		n.Name = networks[0].ID		return nil	case 0:		if n.Driver == "overlay" {			// Swarm nodes do not register overlay networks that were			// created on a different node unless they're in use.			// Here we assume `driver` is relevant for a network we don't manage			// which is a non-sense, but this is our legacy ¯\(ツ)/¯			// networkAttach will later fail anyway if network actually doesn't exists			enabled, err := s.isSWarmEnabled(ctx)			if err != nil {				return err			}			if enabled {				return nil			}		}		return fmt.Errorf("network %s declared as external, but could not be found", n.Name)	default:		return fmt.Errorf("multiple networks with name %q were found. Use network ID as `name` to avoid ambiguity", n.Name)	}}func (s *composeService) ensureVolume(ctx context.Context, volume types.VolumeConfig, project string) error {	inspected, err := s.apiClient().VolumeInspect(ctx, volume.Name)	if err != nil {		if !errdefs.IsNotFound(err) {			return err		}		if volume.External.External {			return fmt.Errorf("external volume %q not found", volume.Name)		}		err := s.createVolume(ctx, volume)		return err	}	if volume.External.External {		return nil	}	// Volume exists with name, but let's double-check this is the expected one	p, ok := inspected.Labels[api.ProjectLabel]	if !ok {		logrus.Warnf("volume %q already exists but was not created by Docker Compose. Use `external: true` to use an existing volume", volume.Name)	}	if ok && p != project {		logrus.Warnf("volume %q already exists but was created for project %q (expected %q). Use `external: true` to use an existing volume", volume.Name, p, project)	}	return nil}func (s *composeService) createVolume(ctx context.Context, volume types.VolumeConfig) error {	eventName := fmt.Sprintf("Volume %q", volume.Name)	w := progress.ContextWriter(ctx)	w.Event(progress.CreatingEvent(eventName))	_, err := s.apiClient().VolumeCreate(ctx, volume_api.CreateOptions{		Labels:     volume.Labels,		Name:       volume.Name,		Driver:     volume.Driver,		DriverOpts: volume.DriverOpts,	})	if err != nil {		w.Event(progress.ErrorEvent(eventName))		return err	}	w.Event(progress.CreatedEvent(eventName))	return nil}
 |