123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323 |
- import json
- import logging
- import os
- import sys
- import six
- from docker.utils.ports import split_port
- from jsonschema import Draft4Validator
- from jsonschema import FormatChecker
- from jsonschema import RefResolver
- from jsonschema import ValidationError
- from .errors import ConfigurationError
- log = logging.getLogger(__name__)
- DOCKER_CONFIG_HINTS = {
- 'cpu_share': 'cpu_shares',
- 'add_host': 'extra_hosts',
- 'hosts': 'extra_hosts',
- 'extra_host': 'extra_hosts',
- 'device': 'devices',
- 'link': 'links',
- 'memory_swap': 'memswap_limit',
- 'port': 'ports',
- 'privilege': 'privileged',
- 'priviliged': 'privileged',
- 'privilige': 'privileged',
- 'volume': 'volumes',
- 'workdir': 'working_dir',
- }
- VALID_NAME_CHARS = '[a-zA-Z0-9\._\-]'
- @FormatChecker.cls_checks(
- format="ports",
- raises=ValidationError(
- "Invalid port formatting, it should be "
- "'[[remote_ip:]remote_port:]port[/protocol]'"))
- def format_ports(instance):
- try:
- split_port(instance)
- except ValueError:
- return False
- return True
- @FormatChecker.cls_checks(format="environment")
- def format_boolean_in_environment(instance):
- """
- Check if there is a boolean in the environment and display a warning.
- Always return True here so the validation won't raise an error.
- """
- if isinstance(instance, bool):
- log.warn(
- "There is a boolean value in the 'environment' key.\n"
- "Environment variables can only be strings.\n"
- "Please add quotes to any boolean values to make them string "
- "(eg, 'True', 'yes', 'N').\n"
- "This warning will become an error in a future release. \r\n"
- )
- return True
- def validate_service_names(config):
- for service_name in config.keys():
- if not isinstance(service_name, six.string_types):
- raise ConfigurationError(
- "Service name: {} needs to be a string, eg '{}'".format(
- service_name,
- service_name))
- def validate_top_level_object(config):
- if not isinstance(config, dict):
- raise ConfigurationError(
- "Top level object needs to be a dictionary. Check your .yml file "
- "that you have defined a service at the top level.")
- validate_service_names(config)
- def validate_extends_file_path(service_name, extends_options, filename):
- """
- The service to be extended must either be defined in the config key 'file',
- or within 'filename'.
- """
- error_prefix = "Invalid 'extends' configuration for %s:" % service_name
- if 'file' not in extends_options and filename is None:
- raise ConfigurationError(
- "%s you need to specify a 'file', e.g. 'file: something.yml'" % error_prefix
- )
- def validate_extended_service_exists(extended_service_name, full_extended_config, extended_config_path):
- if extended_service_name not in full_extended_config:
- msg = (
- "Cannot extend service '%s' in %s: Service not found"
- ) % (extended_service_name, extended_config_path)
- raise ConfigurationError(msg)
- def get_unsupported_config_msg(service_name, error_key):
- msg = "Unsupported config option for '{}' service: '{}'".format(service_name, error_key)
- if error_key in DOCKER_CONFIG_HINTS:
- msg += " (did you mean '{}'?)".format(DOCKER_CONFIG_HINTS[error_key])
- return msg
- def anglicize_validator(validator):
- if validator in ["array", "object"]:
- return 'an ' + validator
- return 'a ' + validator
- def process_errors(errors, service_name=None):
- """
- jsonschema gives us an error tree full of information to explain what has
- gone wrong. Process each error and pull out relevant information and re-write
- helpful error messages that are relevant.
- """
- def _parse_key_from_error_msg(error):
- return error.message.split("'")[1]
- def _clean_error_message(message):
- return message.replace("u'", "'")
- def _parse_valid_types_from_validator(validator):
- """
- A validator value can be either an array of valid types or a string of
- a valid type. Parse the valid types and prefix with the correct article.
- """
- if isinstance(validator, list):
- if len(validator) >= 2:
- first_type = anglicize_validator(validator[0])
- last_type = anglicize_validator(validator[-1])
- types_from_validator = ", ".join([first_type] + validator[1:-1])
- msg = "{} or {}".format(
- types_from_validator,
- last_type
- )
- else:
- msg = "{}".format(anglicize_validator(validator[0]))
- else:
- msg = "{}".format(anglicize_validator(validator))
- return msg
- def _parse_oneof_validator(error):
- """
- oneOf has multiple schemas, so we need to reason about which schema, sub
- schema or constraint the validation is failing on.
- Inspecting the context value of a ValidationError gives us information about
- which sub schema failed and which kind of error it is.
- """
- required = [context for context in error.context if context.validator == 'required']
- if required:
- return required[0].message
- additionalProperties = [context for context in error.context if context.validator == 'additionalProperties']
- if additionalProperties:
- invalid_config_key = _parse_key_from_error_msg(additionalProperties[0])
- return "contains unsupported option: '{}'".format(invalid_config_key)
- constraint = [context for context in error.context if len(context.path) > 0]
- if constraint:
- valid_types = _parse_valid_types_from_validator(constraint[0].validator_value)
- invalid_config_key = "".join(
- "'{}' ".format(fragment) for fragment in constraint[0].path
- if isinstance(fragment, six.string_types)
- )
- msg = "{}contains {}, which is an invalid type, it should be {}".format(
- invalid_config_key,
- constraint[0].instance,
- valid_types
- )
- return msg
- uniqueness = [context for context in error.context if context.validator == 'uniqueItems']
- if uniqueness:
- msg = "contains non unique items, please remove duplicates from {}".format(
- uniqueness[0].instance
- )
- return msg
- types = [context.validator_value for context in error.context if context.validator == 'type']
- valid_types = _parse_valid_types_from_validator(types)
- msg = "contains an invalid type, it should be {}".format(valid_types)
- return msg
- root_msgs = []
- invalid_keys = []
- required = []
- type_errors = []
- other_errors = []
- for error in errors:
- # handle root level errors
- if len(error.path) == 0 and not error.instance.get('name'):
- if error.validator == 'type':
- msg = "Top level object needs to be a dictionary. Check your .yml file that you have defined a service at the top level."
- root_msgs.append(msg)
- elif error.validator == 'additionalProperties':
- invalid_service_name = _parse_key_from_error_msg(error)
- msg = "Invalid service name '{}' - only {} characters are allowed".format(invalid_service_name, VALID_NAME_CHARS)
- root_msgs.append(msg)
- else:
- root_msgs.append(_clean_error_message(error.message))
- else:
- if not service_name:
- # field_schema errors will have service name on the path
- service_name = error.path[0]
- error.path.popleft()
- else:
- # service_schema errors have the service name passed in, as that
- # is not available on error.path or necessarily error.instance
- service_name = service_name
- if error.validator == 'additionalProperties':
- invalid_config_key = _parse_key_from_error_msg(error)
- invalid_keys.append(get_unsupported_config_msg(service_name, invalid_config_key))
- elif error.validator == 'anyOf':
- if 'image' in error.instance and 'build' in error.instance:
- required.append(
- "Service '{}' has both an image and build path specified. "
- "A service can either be built to image or use an existing "
- "image, not both.".format(service_name))
- elif 'image' not in error.instance and 'build' not in error.instance:
- required.append(
- "Service '{}' has neither an image nor a build path "
- "specified. Exactly one must be provided.".format(service_name))
- elif 'image' in error.instance and 'dockerfile' in error.instance:
- required.append(
- "Service '{}' has both an image and alternate Dockerfile. "
- "A service can either be built to image or use an existing "
- "image, not both.".format(service_name))
- else:
- required.append(_clean_error_message(error.message))
- elif error.validator == 'oneOf':
- config_key = error.path[0]
- msg = _parse_oneof_validator(error)
- type_errors.append("Service '{}' configuration key '{}' {}".format(
- service_name, config_key, msg)
- )
- elif error.validator == 'type':
- msg = _parse_valid_types_from_validator(error.validator_value)
- if len(error.path) > 0:
- config_key = " ".join(["'%s'" % k for k in error.path])
- type_errors.append(
- "Service '{}' configuration key {} contains an invalid "
- "type, it should be {}".format(
- service_name,
- config_key,
- msg))
- else:
- root_msgs.append(
- "Service '{}' doesn\'t have any configuration options. "
- "All top level keys in your docker-compose.yml must map "
- "to a dictionary of configuration options.'".format(service_name))
- elif error.validator == 'required':
- config_key = error.path[0]
- required.append(
- "Service '{}' option '{}' is invalid, {}".format(
- service_name,
- config_key,
- _clean_error_message(error.message)))
- elif error.validator == 'dependencies':
- dependency_key = list(error.validator_value.keys())[0]
- required_keys = ",".join(error.validator_value[dependency_key])
- required.append("Invalid '{}' configuration for '{}' service: when defining '{}' you must set '{}' as well".format(
- dependency_key, service_name, dependency_key, required_keys))
- else:
- config_key = " ".join(["'%s'" % k for k in error.path])
- err_msg = "Service '{}' configuration key {} value {}".format(service_name, config_key, error.message)
- other_errors.append(err_msg)
- return "\n".join(root_msgs + invalid_keys + required + type_errors + other_errors)
- def validate_against_fields_schema(config):
- schema_filename = "fields_schema.json"
- format_checkers = ["ports", "environment"]
- return _validate_against_schema(config, schema_filename, format_checkers)
- def validate_against_service_schema(config, service_name):
- schema_filename = "service_schema.json"
- format_checkers = ["ports"]
- return _validate_against_schema(config, schema_filename, format_checkers, service_name)
- def _validate_against_schema(config, schema_filename, format_checker=[], service_name=None):
- config_source_dir = os.path.dirname(os.path.abspath(__file__))
- if sys.platform == "win32":
- file_pre_fix = "///"
- config_source_dir = config_source_dir.replace('\\', '/')
- else:
- file_pre_fix = "//"
- resolver_full_path = "file:{}{}/".format(file_pre_fix, config_source_dir)
- schema_file = os.path.join(config_source_dir, schema_filename)
- with open(schema_file, "r") as schema_fh:
- schema = json.load(schema_fh)
- resolver = RefResolver(resolver_full_path, schema)
- validation_output = Draft4Validator(schema, resolver=resolver, format_checker=FormatChecker(format_checker))
- errors = [error for error in sorted(validation_output.iter_errors(config), key=str)]
- if errors:
- error_msg = process_errors(errors, service_name)
- raise ConfigurationError("Validation failed, reason(s):\n{}".format(error_msg))
|