config.py 42 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308
  1. from __future__ import absolute_import
  2. from __future__ import unicode_literals
  3. import functools
  4. import logging
  5. import os
  6. import string
  7. import sys
  8. from collections import namedtuple
  9. import six
  10. import yaml
  11. from cached_property import cached_property
  12. from . import types
  13. from .. import const
  14. from ..const import COMPOSEFILE_V1 as V1
  15. from ..const import COMPOSEFILE_V2_1 as V2_1
  16. from ..const import COMPOSEFILE_V3_0 as V3_0
  17. from ..const import COMPOSEFILE_V3_4 as V3_4
  18. from ..utils import build_string_dict
  19. from ..utils import parse_bytes
  20. from ..utils import parse_nanoseconds_int
  21. from ..utils import splitdrive
  22. from ..version import ComposeVersion
  23. from .environment import env_vars_from_file
  24. from .environment import Environment
  25. from .environment import split_env
  26. from .errors import CircularReference
  27. from .errors import ComposeFileNotFound
  28. from .errors import ConfigurationError
  29. from .errors import DuplicateOverrideFileFound
  30. from .errors import VERSION_EXPLANATION
  31. from .interpolation import interpolate_environment_variables
  32. from .sort_services import get_container_name_from_network_mode
  33. from .sort_services import get_service_name_from_network_mode
  34. from .sort_services import sort_service_dicts
  35. from .types import MountSpec
  36. from .types import parse_extra_hosts
  37. from .types import parse_restart_spec
  38. from .types import ServiceLink
  39. from .types import ServicePort
  40. from .types import VolumeFromSpec
  41. from .types import VolumeSpec
  42. from .validation import match_named_volumes
  43. from .validation import validate_against_config_schema
  44. from .validation import validate_config_section
  45. from .validation import validate_cpu
  46. from .validation import validate_depends_on
  47. from .validation import validate_extends_file_path
  48. from .validation import validate_healthcheck
  49. from .validation import validate_links
  50. from .validation import validate_network_mode
  51. from .validation import validate_pid_mode
  52. from .validation import validate_service_constraints
  53. from .validation import validate_top_level_object
  54. from .validation import validate_ulimits
  55. DOCKER_CONFIG_KEYS = [
  56. 'cap_add',
  57. 'cap_drop',
  58. 'cgroup_parent',
  59. 'command',
  60. 'cpu_count',
  61. 'cpu_percent',
  62. 'cpu_quota',
  63. 'cpu_shares',
  64. 'cpus',
  65. 'cpuset',
  66. 'detach',
  67. 'devices',
  68. 'dns',
  69. 'dns_search',
  70. 'dns_opt',
  71. 'domainname',
  72. 'entrypoint',
  73. 'env_file',
  74. 'environment',
  75. 'extra_hosts',
  76. 'group_add',
  77. 'hostname',
  78. 'healthcheck',
  79. 'image',
  80. 'ipc',
  81. 'labels',
  82. 'links',
  83. 'mac_address',
  84. 'mem_limit',
  85. 'mem_reservation',
  86. 'memswap_limit',
  87. 'mem_swappiness',
  88. 'net',
  89. 'oom_score_adj',
  90. 'oom_kill_disable',
  91. 'pid',
  92. 'ports',
  93. 'privileged',
  94. 'read_only',
  95. 'restart',
  96. 'secrets',
  97. 'security_opt',
  98. 'shm_size',
  99. 'pids_limit',
  100. 'stdin_open',
  101. 'stop_signal',
  102. 'sysctls',
  103. 'tty',
  104. 'user',
  105. 'userns_mode',
  106. 'volume_driver',
  107. 'volumes',
  108. 'volumes_from',
  109. 'working_dir',
  110. ]
  111. ALLOWED_KEYS = DOCKER_CONFIG_KEYS + [
  112. 'blkio_config',
  113. 'build',
  114. 'container_name',
  115. 'credential_spec',
  116. 'dockerfile',
  117. 'log_driver',
  118. 'log_opt',
  119. 'logging',
  120. 'network_mode',
  121. 'init',
  122. 'scale',
  123. ]
  124. DOCKER_VALID_URL_PREFIXES = (
  125. 'http://',
  126. 'https://',
  127. 'git://',
  128. 'github.com/',
  129. 'git@',
  130. )
  131. SUPPORTED_FILENAMES = [
  132. 'docker-compose.yml',
  133. 'docker-compose.yaml',
  134. ]
  135. DEFAULT_OVERRIDE_FILENAMES = ('docker-compose.override.yml', 'docker-compose.override.yaml')
  136. log = logging.getLogger(__name__)
  137. class ConfigDetails(namedtuple('_ConfigDetails', 'working_dir config_files environment')):
  138. """
  139. :param working_dir: the directory to use for relative paths in the config
  140. :type working_dir: string
  141. :param config_files: list of configuration files to load
  142. :type config_files: list of :class:`ConfigFile`
  143. :param environment: computed environment values for this project
  144. :type environment: :class:`environment.Environment`
  145. """
  146. def __new__(cls, working_dir, config_files, environment=None):
  147. if environment is None:
  148. environment = Environment.from_env_file(working_dir)
  149. return super(ConfigDetails, cls).__new__(
  150. cls, working_dir, config_files, environment
  151. )
  152. class ConfigFile(namedtuple('_ConfigFile', 'filename config')):
  153. """
  154. :param filename: filename of the config file
  155. :type filename: string
  156. :param config: contents of the config file
  157. :type config: :class:`dict`
  158. """
  159. @classmethod
  160. def from_filename(cls, filename):
  161. return cls(filename, load_yaml(filename))
  162. @cached_property
  163. def version(self):
  164. if 'version' not in self.config:
  165. return V1
  166. version = self.config['version']
  167. if isinstance(version, dict):
  168. log.warn('Unexpected type for "version" key in "{}". Assuming '
  169. '"version" is the name of a service, and defaulting to '
  170. 'Compose file version 1.'.format(self.filename))
  171. return V1
  172. if not isinstance(version, six.string_types):
  173. raise ConfigurationError(
  174. 'Version in "{}" is invalid - it should be a string.'
  175. .format(self.filename))
  176. if version == '1':
  177. raise ConfigurationError(
  178. 'Version in "{}" is invalid. {}'
  179. .format(self.filename, VERSION_EXPLANATION)
  180. )
  181. if version == '2':
  182. return const.COMPOSEFILE_V2_0
  183. if version == '3':
  184. return const.COMPOSEFILE_V3_0
  185. return ComposeVersion(version)
  186. def get_service(self, name):
  187. return self.get_service_dicts()[name]
  188. def get_service_dicts(self):
  189. return self.config if self.version == V1 else self.config.get('services', {})
  190. def get_volumes(self):
  191. return {} if self.version == V1 else self.config.get('volumes', {})
  192. def get_networks(self):
  193. return {} if self.version == V1 else self.config.get('networks', {})
  194. def get_secrets(self):
  195. return {} if self.version < const.COMPOSEFILE_V3_1 else self.config.get('secrets', {})
  196. def get_configs(self):
  197. return {} if self.version < const.COMPOSEFILE_V3_3 else self.config.get('configs', {})
  198. class Config(namedtuple('_Config', 'version services volumes networks secrets configs')):
  199. """
  200. :param version: configuration version
  201. :type version: int
  202. :param services: List of service description dictionaries
  203. :type services: :class:`list`
  204. :param volumes: Dictionary mapping volume names to description dictionaries
  205. :type volumes: :class:`dict`
  206. :param networks: Dictionary mapping network names to description dictionaries
  207. :type networks: :class:`dict`
  208. :param secrets: Dictionary mapping secret names to description dictionaries
  209. :type secrets: :class:`dict`
  210. :param configs: Dictionary mapping config names to description dictionaries
  211. :type configs: :class:`dict`
  212. """
  213. class ServiceConfig(namedtuple('_ServiceConfig', 'working_dir filename name config')):
  214. @classmethod
  215. def with_abs_paths(cls, working_dir, filename, name, config):
  216. if not working_dir:
  217. raise ValueError("No working_dir for ServiceConfig.")
  218. return cls(
  219. os.path.abspath(working_dir),
  220. os.path.abspath(filename) if filename else filename,
  221. name,
  222. config)
  223. def find(base_dir, filenames, environment, override_dir=None):
  224. if filenames == ['-']:
  225. return ConfigDetails(
  226. os.path.abspath(override_dir) if override_dir else os.getcwd(),
  227. [ConfigFile(None, yaml.safe_load(sys.stdin))],
  228. environment
  229. )
  230. if filenames:
  231. filenames = [os.path.join(base_dir, f) for f in filenames]
  232. else:
  233. filenames = get_default_config_files(base_dir)
  234. log.debug("Using configuration files: {}".format(",".join(filenames)))
  235. return ConfigDetails(
  236. override_dir if override_dir else os.path.dirname(filenames[0]),
  237. [ConfigFile.from_filename(f) for f in filenames],
  238. environment
  239. )
  240. def validate_config_version(config_files):
  241. main_file = config_files[0]
  242. validate_top_level_object(main_file)
  243. for next_file in config_files[1:]:
  244. validate_top_level_object(next_file)
  245. if main_file.version != next_file.version:
  246. raise ConfigurationError(
  247. "Version mismatch: file {0} specifies version {1} but "
  248. "extension file {2} uses version {3}".format(
  249. main_file.filename,
  250. main_file.version,
  251. next_file.filename,
  252. next_file.version))
  253. def get_default_config_files(base_dir):
  254. (candidates, path) = find_candidates_in_parent_dirs(SUPPORTED_FILENAMES, base_dir)
  255. if not candidates:
  256. raise ComposeFileNotFound(SUPPORTED_FILENAMES)
  257. winner = candidates[0]
  258. if len(candidates) > 1:
  259. log.warn("Found multiple config files with supported names: %s", ", ".join(candidates))
  260. log.warn("Using %s\n", winner)
  261. return [os.path.join(path, winner)] + get_default_override_file(path)
  262. def get_default_override_file(path):
  263. override_files_in_path = [os.path.join(path, override_filename) for override_filename
  264. in DEFAULT_OVERRIDE_FILENAMES
  265. if os.path.exists(os.path.join(path, override_filename))]
  266. if len(override_files_in_path) > 1:
  267. raise DuplicateOverrideFileFound(override_files_in_path)
  268. return override_files_in_path
  269. def find_candidates_in_parent_dirs(filenames, path):
  270. """
  271. Given a directory path to start, looks for filenames in the
  272. directory, and then each parent directory successively,
  273. until found.
  274. Returns tuple (candidates, path).
  275. """
  276. candidates = [filename for filename in filenames
  277. if os.path.exists(os.path.join(path, filename))]
  278. if not candidates:
  279. parent_dir = os.path.join(path, '..')
  280. if os.path.abspath(parent_dir) != os.path.abspath(path):
  281. return find_candidates_in_parent_dirs(filenames, parent_dir)
  282. return (candidates, path)
  283. def check_swarm_only_config(service_dicts):
  284. warning_template = (
  285. "Some services ({services}) use the '{key}' key, which will be ignored. "
  286. "Compose does not support '{key}' configuration - use "
  287. "`docker stack deploy` to deploy to a swarm."
  288. )
  289. def check_swarm_only_key(service_dicts, key):
  290. services = [s for s in service_dicts if s.get(key)]
  291. if services:
  292. log.warn(
  293. warning_template.format(
  294. services=", ".join(sorted(s['name'] for s in services)),
  295. key=key
  296. )
  297. )
  298. check_swarm_only_key(service_dicts, 'deploy')
  299. check_swarm_only_key(service_dicts, 'credential_spec')
  300. check_swarm_only_key(service_dicts, 'configs')
  301. def load(config_details):
  302. """Load the configuration from a working directory and a list of
  303. configuration files. Files are loaded in order, and merged on top
  304. of each other to create the final configuration.
  305. Return a fully interpolated, extended and validated configuration.
  306. """
  307. validate_config_version(config_details.config_files)
  308. processed_files = [
  309. process_config_file(config_file, config_details.environment)
  310. for config_file in config_details.config_files
  311. ]
  312. config_details = config_details._replace(config_files=processed_files)
  313. main_file = config_details.config_files[0]
  314. volumes = load_mapping(
  315. config_details.config_files, 'get_volumes', 'Volume'
  316. )
  317. networks = load_mapping(
  318. config_details.config_files, 'get_networks', 'Network'
  319. )
  320. secrets = load_mapping(
  321. config_details.config_files, 'get_secrets', 'Secret', config_details.working_dir
  322. )
  323. configs = load_mapping(
  324. config_details.config_files, 'get_configs', 'Config', config_details.working_dir
  325. )
  326. service_dicts = load_services(config_details, main_file)
  327. if main_file.version != V1:
  328. for service_dict in service_dicts:
  329. match_named_volumes(service_dict, volumes)
  330. check_swarm_only_config(service_dicts)
  331. return Config(main_file.version, service_dicts, volumes, networks, secrets, configs)
  332. def load_mapping(config_files, get_func, entity_type, working_dir=None):
  333. mapping = {}
  334. for config_file in config_files:
  335. for name, config in getattr(config_file, get_func)().items():
  336. mapping[name] = config or {}
  337. if not config:
  338. continue
  339. external = config.get('external')
  340. if external:
  341. name_field = 'name' if entity_type == 'Volume' else 'external_name'
  342. validate_external(entity_type, name, config, config_file.version)
  343. if isinstance(external, dict):
  344. config[name_field] = external.get('name')
  345. elif not config.get('name'):
  346. config[name_field] = name
  347. if 'driver_opts' in config:
  348. config['driver_opts'] = build_string_dict(
  349. config['driver_opts']
  350. )
  351. if 'labels' in config:
  352. config['labels'] = parse_labels(config['labels'])
  353. if 'file' in config:
  354. config['file'] = expand_path(working_dir, config['file'])
  355. return mapping
  356. def validate_external(entity_type, name, config, version):
  357. if (version < V2_1 or (version >= V3_0 and version < V3_4)) and len(config.keys()) > 1:
  358. raise ConfigurationError(
  359. "{} {} declared as external but specifies additional attributes "
  360. "({}).".format(
  361. entity_type, name, ', '.join(k for k in config if k != 'external')))
  362. def load_services(config_details, config_file):
  363. def build_service(service_name, service_dict, service_names):
  364. service_config = ServiceConfig.with_abs_paths(
  365. config_details.working_dir,
  366. config_file.filename,
  367. service_name,
  368. service_dict)
  369. resolver = ServiceExtendsResolver(
  370. service_config, config_file, environment=config_details.environment
  371. )
  372. service_dict = process_service(resolver.run())
  373. service_config = service_config._replace(config=service_dict)
  374. validate_service(service_config, service_names, config_file)
  375. service_dict = finalize_service(
  376. service_config,
  377. service_names,
  378. config_file.version,
  379. config_details.environment)
  380. return service_dict
  381. def build_services(service_config):
  382. service_names = service_config.keys()
  383. return sort_service_dicts([
  384. build_service(name, service_dict, service_names)
  385. for name, service_dict in service_config.items()
  386. ])
  387. def merge_services(base, override):
  388. all_service_names = set(base) | set(override)
  389. return {
  390. name: merge_service_dicts_from_files(
  391. base.get(name, {}),
  392. override.get(name, {}),
  393. config_file.version)
  394. for name in all_service_names
  395. }
  396. service_configs = [
  397. file.get_service_dicts() for file in config_details.config_files
  398. ]
  399. service_config = service_configs[0]
  400. for next_config in service_configs[1:]:
  401. service_config = merge_services(service_config, next_config)
  402. return build_services(service_config)
  403. def interpolate_config_section(config_file, config, section, environment):
  404. validate_config_section(config_file.filename, config, section)
  405. return interpolate_environment_variables(
  406. config_file.version,
  407. config,
  408. section,
  409. environment
  410. )
  411. def process_config_file(config_file, environment, service_name=None):
  412. services = interpolate_config_section(
  413. config_file,
  414. config_file.get_service_dicts(),
  415. 'service',
  416. environment)
  417. if config_file.version > V1:
  418. processed_config = dict(config_file.config)
  419. processed_config['services'] = services
  420. processed_config['volumes'] = interpolate_config_section(
  421. config_file,
  422. config_file.get_volumes(),
  423. 'volume',
  424. environment)
  425. processed_config['networks'] = interpolate_config_section(
  426. config_file,
  427. config_file.get_networks(),
  428. 'network',
  429. environment)
  430. if config_file.version >= const.COMPOSEFILE_V3_1:
  431. processed_config['secrets'] = interpolate_config_section(
  432. config_file,
  433. config_file.get_secrets(),
  434. 'secret',
  435. environment)
  436. if config_file.version >= const.COMPOSEFILE_V3_3:
  437. processed_config['configs'] = interpolate_config_section(
  438. config_file,
  439. config_file.get_configs(),
  440. 'config',
  441. environment
  442. )
  443. else:
  444. processed_config = services
  445. config_file = config_file._replace(config=processed_config)
  446. validate_against_config_schema(config_file)
  447. if service_name and service_name not in services:
  448. raise ConfigurationError(
  449. "Cannot extend service '{}' in {}: Service not found".format(
  450. service_name, config_file.filename))
  451. return config_file
  452. class ServiceExtendsResolver(object):
  453. def __init__(self, service_config, config_file, environment, already_seen=None):
  454. self.service_config = service_config
  455. self.working_dir = service_config.working_dir
  456. self.already_seen = already_seen or []
  457. self.config_file = config_file
  458. self.environment = environment
  459. @property
  460. def signature(self):
  461. return self.service_config.filename, self.service_config.name
  462. def detect_cycle(self):
  463. if self.signature in self.already_seen:
  464. raise CircularReference(self.already_seen + [self.signature])
  465. def run(self):
  466. self.detect_cycle()
  467. if 'extends' in self.service_config.config:
  468. service_dict = self.resolve_extends(*self.validate_and_construct_extends())
  469. return self.service_config._replace(config=service_dict)
  470. return self.service_config
  471. def validate_and_construct_extends(self):
  472. extends = self.service_config.config['extends']
  473. if not isinstance(extends, dict):
  474. extends = {'service': extends}
  475. config_path = self.get_extended_config_path(extends)
  476. service_name = extends['service']
  477. if config_path == self.config_file.filename:
  478. try:
  479. service_config = self.config_file.get_service(service_name)
  480. except KeyError:
  481. raise ConfigurationError(
  482. "Cannot extend service '{}' in {}: Service not found".format(
  483. service_name, config_path)
  484. )
  485. else:
  486. extends_file = ConfigFile.from_filename(config_path)
  487. validate_config_version([self.config_file, extends_file])
  488. extended_file = process_config_file(
  489. extends_file, self.environment, service_name=service_name
  490. )
  491. service_config = extended_file.get_service(service_name)
  492. return config_path, service_config, service_name
  493. def resolve_extends(self, extended_config_path, service_dict, service_name):
  494. resolver = ServiceExtendsResolver(
  495. ServiceConfig.with_abs_paths(
  496. os.path.dirname(extended_config_path),
  497. extended_config_path,
  498. service_name,
  499. service_dict),
  500. self.config_file,
  501. already_seen=self.already_seen + [self.signature],
  502. environment=self.environment
  503. )
  504. service_config = resolver.run()
  505. other_service_dict = process_service(service_config)
  506. validate_extended_service_dict(
  507. other_service_dict,
  508. extended_config_path,
  509. service_name)
  510. return merge_service_dicts(
  511. other_service_dict,
  512. self.service_config.config,
  513. self.config_file.version)
  514. def get_extended_config_path(self, extends_options):
  515. """Service we are extending either has a value for 'file' set, which we
  516. need to obtain a full path too or we are extending from a service
  517. defined in our own file.
  518. """
  519. filename = self.service_config.filename
  520. validate_extends_file_path(
  521. self.service_config.name,
  522. extends_options,
  523. filename)
  524. if 'file' in extends_options:
  525. return expand_path(self.working_dir, extends_options['file'])
  526. return filename
  527. def resolve_environment(service_dict, environment=None):
  528. """Unpack any environment variables from an env_file, if set.
  529. Interpolate environment values if set.
  530. """
  531. env = {}
  532. for env_file in service_dict.get('env_file', []):
  533. env.update(env_vars_from_file(env_file))
  534. env.update(parse_environment(service_dict.get('environment')))
  535. return dict(resolve_env_var(k, v, environment) for k, v in six.iteritems(env))
  536. def resolve_build_args(buildargs, environment):
  537. args = parse_build_arguments(buildargs)
  538. return dict(resolve_env_var(k, v, environment) for k, v in six.iteritems(args))
  539. def validate_extended_service_dict(service_dict, filename, service):
  540. error_prefix = "Cannot extend service '%s' in %s:" % (service, filename)
  541. if 'links' in service_dict:
  542. raise ConfigurationError(
  543. "%s services with 'links' cannot be extended" % error_prefix)
  544. if 'volumes_from' in service_dict:
  545. raise ConfigurationError(
  546. "%s services with 'volumes_from' cannot be extended" % error_prefix)
  547. if 'net' in service_dict:
  548. if get_container_name_from_network_mode(service_dict['net']):
  549. raise ConfigurationError(
  550. "%s services with 'net: container' cannot be extended" % error_prefix)
  551. if 'network_mode' in service_dict:
  552. if get_service_name_from_network_mode(service_dict['network_mode']):
  553. raise ConfigurationError(
  554. "%s services with 'network_mode: service' cannot be extended" % error_prefix)
  555. if 'depends_on' in service_dict:
  556. raise ConfigurationError(
  557. "%s services with 'depends_on' cannot be extended" % error_prefix)
  558. def validate_service(service_config, service_names, config_file):
  559. service_dict, service_name = service_config.config, service_config.name
  560. validate_service_constraints(service_dict, service_name, config_file)
  561. validate_paths(service_dict)
  562. validate_cpu(service_config)
  563. validate_ulimits(service_config)
  564. validate_network_mode(service_config, service_names)
  565. validate_pid_mode(service_config, service_names)
  566. validate_depends_on(service_config, service_names)
  567. validate_links(service_config, service_names)
  568. validate_healthcheck(service_config)
  569. if not service_dict.get('image') and has_uppercase(service_name):
  570. raise ConfigurationError(
  571. "Service '{name}' contains uppercase characters which are not valid "
  572. "as part of an image name. Either use a lowercase service name or "
  573. "use the `image` field to set a custom name for the service image."
  574. .format(name=service_name))
  575. def process_service(service_config):
  576. working_dir = service_config.working_dir
  577. service_dict = dict(service_config.config)
  578. if 'env_file' in service_dict:
  579. service_dict['env_file'] = [
  580. expand_path(working_dir, path)
  581. for path in to_list(service_dict['env_file'])
  582. ]
  583. if 'build' in service_dict:
  584. process_build_section(service_dict, working_dir)
  585. if 'volumes' in service_dict and service_dict.get('volume_driver') is None:
  586. service_dict['volumes'] = resolve_volume_paths(working_dir, service_dict)
  587. if 'sysctls' in service_dict:
  588. service_dict['sysctls'] = build_string_dict(parse_sysctls(service_dict['sysctls']))
  589. if 'labels' in service_dict:
  590. service_dict['labels'] = parse_labels(service_dict['labels'])
  591. service_dict = process_depends_on(service_dict)
  592. for field in ['dns', 'dns_search', 'tmpfs']:
  593. if field in service_dict:
  594. service_dict[field] = to_list(service_dict[field])
  595. service_dict = process_blkio_config(process_ports(
  596. process_healthcheck(service_dict)
  597. ))
  598. return service_dict
  599. def process_build_section(service_dict, working_dir):
  600. if isinstance(service_dict['build'], six.string_types):
  601. service_dict['build'] = resolve_build_path(working_dir, service_dict['build'])
  602. elif isinstance(service_dict['build'], dict):
  603. if 'context' in service_dict['build']:
  604. path = service_dict['build']['context']
  605. service_dict['build']['context'] = resolve_build_path(working_dir, path)
  606. if 'labels' in service_dict['build']:
  607. service_dict['build']['labels'] = parse_labels(service_dict['build']['labels'])
  608. def process_ports(service_dict):
  609. if 'ports' not in service_dict:
  610. return service_dict
  611. ports = []
  612. for port_definition in service_dict['ports']:
  613. if isinstance(port_definition, ServicePort):
  614. ports.append(port_definition)
  615. else:
  616. ports.extend(ServicePort.parse(port_definition))
  617. service_dict['ports'] = ports
  618. return service_dict
  619. def process_depends_on(service_dict):
  620. if 'depends_on' in service_dict and not isinstance(service_dict['depends_on'], dict):
  621. service_dict['depends_on'] = dict([
  622. (svc, {'condition': 'service_started'}) for svc in service_dict['depends_on']
  623. ])
  624. return service_dict
  625. def process_blkio_config(service_dict):
  626. if not service_dict.get('blkio_config'):
  627. return service_dict
  628. for field in ['device_read_bps', 'device_write_bps']:
  629. if field in service_dict['blkio_config']:
  630. for v in service_dict['blkio_config'].get(field, []):
  631. rate = v.get('rate', 0)
  632. v['rate'] = parse_bytes(rate)
  633. if v['rate'] is None:
  634. raise ConfigurationError('Invalid format for bytes value: "{}"'.format(rate))
  635. for field in ['device_read_iops', 'device_write_iops']:
  636. if field in service_dict['blkio_config']:
  637. for v in service_dict['blkio_config'].get(field, []):
  638. try:
  639. v['rate'] = int(v.get('rate', 0))
  640. except ValueError:
  641. raise ConfigurationError(
  642. 'Invalid IOPS value: "{}". Must be a positive integer.'.format(v.get('rate'))
  643. )
  644. return service_dict
  645. def process_healthcheck(service_dict):
  646. if 'healthcheck' not in service_dict:
  647. return service_dict
  648. hc = service_dict['healthcheck']
  649. if 'disable' in hc:
  650. del hc['disable']
  651. hc['test'] = ['NONE']
  652. for field in ['interval', 'timeout', 'start_period']:
  653. if field not in hc or isinstance(hc[field], six.integer_types):
  654. continue
  655. hc[field] = parse_nanoseconds_int(hc[field])
  656. return service_dict
  657. def finalize_service_volumes(service_dict, environment):
  658. if 'volumes' in service_dict:
  659. finalized_volumes = []
  660. normalize = environment.get_boolean('COMPOSE_CONVERT_WINDOWS_PATHS')
  661. for v in service_dict['volumes']:
  662. if isinstance(v, dict):
  663. finalized_volumes.append(MountSpec.parse(v, normalize))
  664. else:
  665. finalized_volumes.append(VolumeSpec.parse(v, normalize))
  666. service_dict['volumes'] = finalized_volumes
  667. return service_dict
  668. def finalize_service(service_config, service_names, version, environment):
  669. service_dict = dict(service_config.config)
  670. if 'environment' in service_dict or 'env_file' in service_dict:
  671. service_dict['environment'] = resolve_environment(service_dict, environment)
  672. service_dict.pop('env_file', None)
  673. if 'volumes_from' in service_dict:
  674. service_dict['volumes_from'] = [
  675. VolumeFromSpec.parse(vf, service_names, version)
  676. for vf in service_dict['volumes_from']
  677. ]
  678. service_dict = finalize_service_volumes(service_dict, environment)
  679. if 'net' in service_dict:
  680. network_mode = service_dict.pop('net')
  681. container_name = get_container_name_from_network_mode(network_mode)
  682. if container_name and container_name in service_names:
  683. service_dict['network_mode'] = 'service:{}'.format(container_name)
  684. else:
  685. service_dict['network_mode'] = network_mode
  686. if 'networks' in service_dict:
  687. service_dict['networks'] = parse_networks(service_dict['networks'])
  688. if 'restart' in service_dict:
  689. service_dict['restart'] = parse_restart_spec(service_dict['restart'])
  690. if 'secrets' in service_dict:
  691. service_dict['secrets'] = [
  692. types.ServiceSecret.parse(s) for s in service_dict['secrets']
  693. ]
  694. if 'configs' in service_dict:
  695. service_dict['configs'] = [
  696. types.ServiceConfig.parse(c) for c in service_dict['configs']
  697. ]
  698. normalize_build(service_dict, service_config.working_dir, environment)
  699. service_dict['name'] = service_config.name
  700. return normalize_v1_service_format(service_dict)
  701. def normalize_v1_service_format(service_dict):
  702. if 'log_driver' in service_dict or 'log_opt' in service_dict:
  703. if 'logging' not in service_dict:
  704. service_dict['logging'] = {}
  705. if 'log_driver' in service_dict:
  706. service_dict['logging']['driver'] = service_dict['log_driver']
  707. del service_dict['log_driver']
  708. if 'log_opt' in service_dict:
  709. service_dict['logging']['options'] = service_dict['log_opt']
  710. del service_dict['log_opt']
  711. if 'dockerfile' in service_dict:
  712. service_dict['build'] = service_dict.get('build', {})
  713. service_dict['build'].update({
  714. 'dockerfile': service_dict.pop('dockerfile')
  715. })
  716. return service_dict
  717. def merge_service_dicts_from_files(base, override, version):
  718. """When merging services from multiple files we need to merge the `extends`
  719. field. This is not handled by `merge_service_dicts()` which is used to
  720. perform the `extends`.
  721. """
  722. new_service = merge_service_dicts(base, override, version)
  723. if 'extends' in override:
  724. new_service['extends'] = override['extends']
  725. elif 'extends' in base:
  726. new_service['extends'] = base['extends']
  727. return new_service
  728. class MergeDict(dict):
  729. """A dict-like object responsible for merging two dicts into one."""
  730. def __init__(self, base, override):
  731. self.base = base
  732. self.override = override
  733. def needs_merge(self, field):
  734. return field in self.base or field in self.override
  735. def merge_field(self, field, merge_func, default=None):
  736. if not self.needs_merge(field):
  737. return
  738. self[field] = merge_func(
  739. self.base.get(field, default),
  740. self.override.get(field, default))
  741. def merge_mapping(self, field, parse_func):
  742. if not self.needs_merge(field):
  743. return
  744. self[field] = parse_func(self.base.get(field))
  745. self[field].update(parse_func(self.override.get(field)))
  746. def merge_sequence(self, field, parse_func):
  747. def parse_sequence_func(seq):
  748. return to_mapping((parse_func(item) for item in seq), 'merge_field')
  749. if not self.needs_merge(field):
  750. return
  751. merged = parse_sequence_func(self.base.get(field, []))
  752. merged.update(parse_sequence_func(self.override.get(field, [])))
  753. self[field] = [item.repr() for item in sorted(merged.values())]
  754. def merge_scalar(self, field):
  755. if self.needs_merge(field):
  756. self[field] = self.override.get(field, self.base.get(field))
  757. def merge_service_dicts(base, override, version):
  758. md = MergeDict(base, override)
  759. md.merge_mapping('environment', parse_environment)
  760. md.merge_mapping('labels', parse_labels)
  761. md.merge_mapping('ulimits', parse_flat_dict)
  762. md.merge_mapping('networks', parse_networks)
  763. md.merge_mapping('sysctls', parse_sysctls)
  764. md.merge_mapping('depends_on', parse_depends_on)
  765. md.merge_sequence('links', ServiceLink.parse)
  766. md.merge_sequence('secrets', types.ServiceSecret.parse)
  767. md.merge_sequence('configs', types.ServiceConfig.parse)
  768. md.merge_mapping('deploy', parse_deploy)
  769. md.merge_mapping('extra_hosts', parse_extra_hosts)
  770. for field in ['volumes', 'devices']:
  771. md.merge_field(field, merge_path_mappings)
  772. for field in [
  773. 'cap_add', 'cap_drop', 'expose', 'external_links',
  774. 'security_opt', 'volumes_from',
  775. ]:
  776. md.merge_field(field, merge_unique_items_lists, default=[])
  777. for field in ['dns', 'dns_search', 'env_file', 'tmpfs']:
  778. md.merge_field(field, merge_list_or_string)
  779. md.merge_field('logging', merge_logging, default={})
  780. merge_ports(md, base, override)
  781. md.merge_field('blkio_config', merge_blkio_config, default={})
  782. md.merge_field('healthcheck', merge_healthchecks, default={})
  783. for field in set(ALLOWED_KEYS) - set(md):
  784. md.merge_scalar(field)
  785. if version == V1:
  786. legacy_v1_merge_image_or_build(md, base, override)
  787. elif md.needs_merge('build'):
  788. md['build'] = merge_build(md, base, override)
  789. return dict(md)
  790. def merge_unique_items_lists(base, override):
  791. override = [str(o) for o in override]
  792. base = [str(b) for b in base]
  793. return sorted(set().union(base, override))
  794. def merge_healthchecks(base, override):
  795. if override.get('disabled') is True:
  796. return override
  797. result = base.copy()
  798. result.update(override)
  799. return result
  800. def merge_ports(md, base, override):
  801. def parse_sequence_func(seq):
  802. acc = []
  803. for item in seq:
  804. acc.extend(ServicePort.parse(item))
  805. return to_mapping(acc, 'merge_field')
  806. field = 'ports'
  807. if not md.needs_merge(field):
  808. return
  809. merged = parse_sequence_func(md.base.get(field, []))
  810. merged.update(parse_sequence_func(md.override.get(field, [])))
  811. md[field] = [item for item in sorted(merged.values(), key=lambda x: x.target)]
  812. def merge_build(output, base, override):
  813. def to_dict(service):
  814. build_config = service.get('build', {})
  815. if isinstance(build_config, six.string_types):
  816. return {'context': build_config}
  817. return build_config
  818. md = MergeDict(to_dict(base), to_dict(override))
  819. md.merge_scalar('context')
  820. md.merge_scalar('dockerfile')
  821. md.merge_scalar('network')
  822. md.merge_scalar('target')
  823. md.merge_scalar('shm_size')
  824. md.merge_mapping('args', parse_build_arguments)
  825. md.merge_field('cache_from', merge_unique_items_lists, default=[])
  826. md.merge_mapping('labels', parse_labels)
  827. md.merge_mapping('extra_hosts', parse_extra_hosts)
  828. return dict(md)
  829. def merge_blkio_config(base, override):
  830. md = MergeDict(base, override)
  831. md.merge_scalar('weight')
  832. def merge_blkio_limits(base, override):
  833. index = dict((b['path'], b) for b in base)
  834. for o in override:
  835. index[o['path']] = o
  836. return sorted(list(index.values()), key=lambda x: x['path'])
  837. for field in [
  838. "device_read_bps", "device_read_iops", "device_write_bps",
  839. "device_write_iops", "weight_device",
  840. ]:
  841. md.merge_field(field, merge_blkio_limits, default=[])
  842. return dict(md)
  843. def merge_logging(base, override):
  844. md = MergeDict(base, override)
  845. md.merge_scalar('driver')
  846. if md.get('driver') == base.get('driver') or base.get('driver') is None:
  847. md.merge_mapping('options', lambda m: m or {})
  848. elif override.get('options'):
  849. md['options'] = override.get('options', {})
  850. return dict(md)
  851. def legacy_v1_merge_image_or_build(output, base, override):
  852. output.pop('image', None)
  853. output.pop('build', None)
  854. if 'image' in override:
  855. output['image'] = override['image']
  856. elif 'build' in override:
  857. output['build'] = override['build']
  858. elif 'image' in base:
  859. output['image'] = base['image']
  860. elif 'build' in base:
  861. output['build'] = base['build']
  862. def merge_environment(base, override):
  863. env = parse_environment(base)
  864. env.update(parse_environment(override))
  865. return env
  866. def merge_labels(base, override):
  867. labels = parse_labels(base)
  868. labels.update(parse_labels(override))
  869. return labels
  870. def split_kv(kvpair):
  871. if '=' in kvpair:
  872. return kvpair.split('=', 1)
  873. else:
  874. return kvpair, ''
  875. def parse_dict_or_list(split_func, type_name, arguments):
  876. if not arguments:
  877. return {}
  878. if isinstance(arguments, list):
  879. return dict(split_func(e) for e in arguments)
  880. if isinstance(arguments, dict):
  881. return dict(arguments)
  882. raise ConfigurationError(
  883. "%s \"%s\" must be a list or mapping," %
  884. (type_name, arguments)
  885. )
  886. parse_build_arguments = functools.partial(parse_dict_or_list, split_env, 'build arguments')
  887. parse_environment = functools.partial(parse_dict_or_list, split_env, 'environment')
  888. parse_labels = functools.partial(parse_dict_or_list, split_kv, 'labels')
  889. parse_networks = functools.partial(parse_dict_or_list, lambda k: (k, None), 'networks')
  890. parse_sysctls = functools.partial(parse_dict_or_list, split_kv, 'sysctls')
  891. parse_depends_on = functools.partial(
  892. parse_dict_or_list, lambda k: (k, {'condition': 'service_started'}), 'depends_on'
  893. )
  894. parse_deploy = functools.partial(parse_dict_or_list, split_kv, 'deploy')
  895. def parse_flat_dict(d):
  896. if not d:
  897. return {}
  898. if isinstance(d, dict):
  899. return dict(d)
  900. raise ConfigurationError("Invalid type: expected mapping")
  901. def resolve_env_var(key, val, environment):
  902. if val is not None:
  903. return key, val
  904. elif environment and key in environment:
  905. return key, environment[key]
  906. else:
  907. return key, None
  908. def resolve_volume_paths(working_dir, service_dict):
  909. return [
  910. resolve_volume_path(working_dir, volume)
  911. for volume in service_dict['volumes']
  912. ]
  913. def resolve_volume_path(working_dir, volume):
  914. if isinstance(volume, dict):
  915. if volume.get('source', '').startswith('.') and volume['type'] == 'mount':
  916. volume['source'] = expand_path(working_dir, volume['source'])
  917. return volume
  918. mount_params = None
  919. container_path, mount_params = split_path_mapping(volume)
  920. if mount_params is not None:
  921. host_path, mode = mount_params
  922. if host_path is None:
  923. return container_path
  924. if host_path.startswith('.'):
  925. host_path = expand_path(working_dir, host_path)
  926. host_path = os.path.expanduser(host_path)
  927. return u"{}:{}{}".format(host_path, container_path, (':' + mode if mode else ''))
  928. return container_path
  929. def normalize_build(service_dict, working_dir, environment):
  930. if 'build' in service_dict:
  931. build = {}
  932. # Shortcut where specifying a string is treated as the build context
  933. if isinstance(service_dict['build'], six.string_types):
  934. build['context'] = service_dict.pop('build')
  935. else:
  936. build.update(service_dict['build'])
  937. if 'args' in build:
  938. build['args'] = build_string_dict(
  939. resolve_build_args(build.get('args'), environment)
  940. )
  941. service_dict['build'] = build
  942. def resolve_build_path(working_dir, build_path):
  943. if is_url(build_path):
  944. return build_path
  945. return expand_path(working_dir, build_path)
  946. def is_url(build_path):
  947. return build_path.startswith(DOCKER_VALID_URL_PREFIXES)
  948. def validate_paths(service_dict):
  949. if 'build' in service_dict:
  950. build = service_dict.get('build', {})
  951. if isinstance(build, six.string_types):
  952. build_path = build
  953. elif isinstance(build, dict) and 'context' in build:
  954. build_path = build['context']
  955. else:
  956. # We have a build section but no context, so nothing to validate
  957. return
  958. if (
  959. not is_url(build_path) and
  960. (not os.path.exists(build_path) or not os.access(build_path, os.R_OK))
  961. ):
  962. raise ConfigurationError(
  963. "build path %s either does not exist, is not accessible, "
  964. "or is not a valid URL." % build_path)
  965. def merge_path_mappings(base, override):
  966. d = dict_from_path_mappings(base)
  967. d.update(dict_from_path_mappings(override))
  968. return path_mappings_from_dict(d)
  969. def dict_from_path_mappings(path_mappings):
  970. if path_mappings:
  971. return dict(split_path_mapping(v) for v in path_mappings)
  972. else:
  973. return {}
  974. def path_mappings_from_dict(d):
  975. return [join_path_mapping(v) for v in sorted(d.items())]
  976. def split_path_mapping(volume_path):
  977. """
  978. Ascertain if the volume_path contains a host path as well as a container
  979. path. Using splitdrive so windows absolute paths won't cause issues with
  980. splitting on ':'.
  981. """
  982. if isinstance(volume_path, dict):
  983. return (volume_path.get('target'), volume_path)
  984. drive, volume_config = splitdrive(volume_path)
  985. if ':' in volume_config:
  986. (host, container) = volume_config.split(':', 1)
  987. container_drive, container_path = splitdrive(container)
  988. mode = None
  989. if ':' in container_path:
  990. container_path, mode = container_path.rsplit(':', 1)
  991. return (container_drive + container_path, (drive + host, mode))
  992. else:
  993. return (volume_path, None)
  994. def join_path_mapping(pair):
  995. (container, host) = pair
  996. if isinstance(host, dict):
  997. return host
  998. elif host is None:
  999. return container
  1000. else:
  1001. host, mode = host
  1002. result = ":".join((host, container))
  1003. if mode:
  1004. result += ":" + mode
  1005. return result
  1006. def expand_path(working_dir, path):
  1007. return os.path.abspath(os.path.join(working_dir, os.path.expanduser(path)))
  1008. def merge_list_or_string(base, override):
  1009. return to_list(base) + to_list(override)
  1010. def to_list(value):
  1011. if value is None:
  1012. return []
  1013. elif isinstance(value, six.string_types):
  1014. return [value]
  1015. else:
  1016. return value
  1017. def to_mapping(sequence, key_field):
  1018. return {getattr(item, key_field): item for item in sequence}
  1019. def has_uppercase(name):
  1020. return any(char in string.ascii_uppercase for char in name)
  1021. def load_yaml(filename):
  1022. try:
  1023. with open(filename, 'r') as fh:
  1024. return yaml.safe_load(fh)
  1025. except (IOError, yaml.YAMLError) as e:
  1026. error_name = getattr(e, '__module__', '') + '.' + e.__class__.__name__
  1027. raise ConfigurationError(u"{}: {}".format(error_name, e))