| 1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450 | from __future__ import absolute_importfrom __future__ import unicode_literalsimport functoolsimport ioimport loggingimport osimport stringimport sysfrom collections import namedtupleimport siximport yamlfrom cached_property import cached_propertyfrom . import typesfrom .. import constfrom ..const import COMPOSEFILE_V1 as V1from ..const import COMPOSEFILE_V2_1 as V2_1from ..const import COMPOSEFILE_V2_3 as V2_3from ..const import COMPOSEFILE_V3_0 as V3_0from ..const import COMPOSEFILE_V3_4 as V3_4from ..utils import build_string_dictfrom ..utils import json_hashfrom ..utils import parse_bytesfrom ..utils import parse_nanoseconds_intfrom ..utils import splitdrivefrom ..version import ComposeVersionfrom .environment import env_vars_from_filefrom .environment import Environmentfrom .environment import split_envfrom .errors import CircularReferencefrom .errors import ComposeFileNotFoundfrom .errors import ConfigurationErrorfrom .errors import DuplicateOverrideFileFoundfrom .errors import VERSION_EXPLANATIONfrom .interpolation import interpolate_environment_variablesfrom .sort_services import get_container_name_from_network_modefrom .sort_services import get_service_name_from_network_modefrom .sort_services import sort_service_dictsfrom .types import MountSpecfrom .types import parse_extra_hostsfrom .types import parse_restart_specfrom .types import SecurityOptfrom .types import ServiceLinkfrom .types import ServicePortfrom .types import VolumeFromSpecfrom .types import VolumeSpecfrom .validation import match_named_volumesfrom .validation import validate_against_config_schemafrom .validation import validate_config_sectionfrom .validation import validate_cpufrom .validation import validate_depends_onfrom .validation import validate_extends_file_pathfrom .validation import validate_healthcheckfrom .validation import validate_linksfrom .validation import validate_network_modefrom .validation import validate_pid_modefrom .validation import validate_service_constraintsfrom .validation import validate_top_level_objectfrom .validation import validate_ulimitsDOCKER_CONFIG_KEYS = [    'cap_add',    'cap_drop',    'cgroup_parent',    'command',    'cpu_count',    'cpu_percent',    'cpu_period',    'cpu_quota',    'cpu_rt_period',    'cpu_rt_runtime',    'cpu_shares',    'cpus',    'cpuset',    'detach',    'device_cgroup_rules',    'devices',    'dns',    'dns_search',    'dns_opt',    'domainname',    'entrypoint',    'env_file',    'environment',    'extra_hosts',    'group_add',    'hostname',    'healthcheck',    'image',    'ipc',    'labels',    'links',    'mac_address',    'mem_limit',    'mem_reservation',    'memswap_limit',    'mem_swappiness',    'net',    'oom_score_adj',    'oom_kill_disable',    'pid',    'ports',    'privileged',    'read_only',    'restart',    'runtime',    'secrets',    'security_opt',    'shm_size',    'pids_limit',    'stdin_open',    'stop_signal',    'sysctls',    'tty',    'user',    'userns_mode',    'volume_driver',    'volumes',    'volumes_from',    'working_dir',]ALLOWED_KEYS = DOCKER_CONFIG_KEYS + [    'blkio_config',    'build',    'container_name',    'credential_spec',    'dockerfile',    'init',    'log_driver',    'log_opt',    'logging',    'network_mode',    'platform',    'scale',    'stop_grace_period',]DOCKER_VALID_URL_PREFIXES = (    'http://',    'https://',    'git://',    'github.com/',    'git@',)SUPPORTED_FILENAMES = [    'docker-compose.yml',    'docker-compose.yaml',]DEFAULT_OVERRIDE_FILENAMES = ('docker-compose.override.yml', 'docker-compose.override.yaml')log = logging.getLogger(__name__)class ConfigDetails(namedtuple('_ConfigDetails', 'working_dir config_files environment')):    """    :param working_dir: the directory to use for relative paths in the config    :type  working_dir: string    :param config_files: list of configuration files to load    :type  config_files: list of :class:`ConfigFile`    :param environment: computed environment values for this project    :type  environment: :class:`environment.Environment`     """    def __new__(cls, working_dir, config_files, environment=None):        if environment is None:            environment = Environment.from_env_file(working_dir)        return super(ConfigDetails, cls).__new__(            cls, working_dir, config_files, environment        )class ConfigFile(namedtuple('_ConfigFile', 'filename config')):    """    :param filename: filename of the config file    :type  filename: string    :param config: contents of the config file    :type  config: :class:`dict`    """    @classmethod    def from_filename(cls, filename):        return cls(filename, load_yaml(filename))    @cached_property    def version(self):        if 'version' not in self.config:            return V1        version = self.config['version']        if isinstance(version, dict):            log.warn('Unexpected type for "version" key in "{}". Assuming '                     '"version" is the name of a service, and defaulting to '                     'Compose file version 1.'.format(self.filename))            return V1        if not isinstance(version, six.string_types):            raise ConfigurationError(                'Version in "{}" is invalid - it should be a string.'                .format(self.filename))        if version == '1':            raise ConfigurationError(                'Version in "{}" is invalid. {}'                .format(self.filename, VERSION_EXPLANATION)            )        if version == '2':            return const.COMPOSEFILE_V2_0        if version == '3':            return const.COMPOSEFILE_V3_0        return ComposeVersion(version)    def get_service(self, name):        return self.get_service_dicts()[name]    def get_service_dicts(self):        return self.config if self.version == V1 else self.config.get('services', {})    def get_volumes(self):        return {} if self.version == V1 else self.config.get('volumes', {})    def get_networks(self):        return {} if self.version == V1 else self.config.get('networks', {})    def get_secrets(self):        return {} if self.version < const.COMPOSEFILE_V3_1 else self.config.get('secrets', {})    def get_configs(self):        return {} if self.version < const.COMPOSEFILE_V3_3 else self.config.get('configs', {})class Config(namedtuple('_Config', 'version services volumes networks secrets configs')):    """    :param version: configuration version    :type  version: int    :param services: List of service description dictionaries    :type  services: :class:`list`    :param volumes: Dictionary mapping volume names to description dictionaries    :type  volumes: :class:`dict`    :param networks: Dictionary mapping network names to description dictionaries    :type  networks: :class:`dict`    :param secrets: Dictionary mapping secret names to description dictionaries    :type secrets: :class:`dict`    :param configs: Dictionary mapping config names to description dictionaries    :type configs: :class:`dict`    """class ServiceConfig(namedtuple('_ServiceConfig', 'working_dir filename name config')):    @classmethod    def with_abs_paths(cls, working_dir, filename, name, config):        if not working_dir:            raise ValueError("No working_dir for ServiceConfig.")        return cls(            os.path.abspath(working_dir),            os.path.abspath(filename) if filename else filename,            name,            config)def find(base_dir, filenames, environment, override_dir=None):    if filenames == ['-']:        return ConfigDetails(            os.path.abspath(override_dir) if override_dir else os.getcwd(),            [ConfigFile(None, yaml.safe_load(sys.stdin))],            environment        )    if filenames:        filenames = [os.path.join(base_dir, f) for f in filenames]    else:        filenames = get_default_config_files(base_dir)    log.debug("Using configuration files: {}".format(",".join(filenames)))    return ConfigDetails(        override_dir if override_dir else os.path.dirname(filenames[0]),        [ConfigFile.from_filename(f) for f in filenames],        environment    )def validate_config_version(config_files):    main_file = config_files[0]    validate_top_level_object(main_file)    for next_file in config_files[1:]:        validate_top_level_object(next_file)        if main_file.version != next_file.version:            raise ConfigurationError(                "Version mismatch: file {0} specifies version {1} but "                "extension file {2} uses version {3}".format(                    main_file.filename,                    main_file.version,                    next_file.filename,                    next_file.version))def get_default_config_files(base_dir):    (candidates, path) = find_candidates_in_parent_dirs(SUPPORTED_FILENAMES, base_dir)    if not candidates:        raise ComposeFileNotFound(SUPPORTED_FILENAMES)    winner = candidates[0]    if len(candidates) > 1:        log.warn("Found multiple config files with supported names: %s", ", ".join(candidates))        log.warn("Using %s\n", winner)    return [os.path.join(path, winner)] + get_default_override_file(path)def get_default_override_file(path):    override_files_in_path = [os.path.join(path, override_filename) for override_filename                              in DEFAULT_OVERRIDE_FILENAMES                              if os.path.exists(os.path.join(path, override_filename))]    if len(override_files_in_path) > 1:        raise DuplicateOverrideFileFound(override_files_in_path)    return override_files_in_pathdef find_candidates_in_parent_dirs(filenames, path):    """    Given a directory path to start, looks for filenames in the    directory, and then each parent directory successively,    until found.    Returns tuple (candidates, path).    """    candidates = [filename for filename in filenames                  if os.path.exists(os.path.join(path, filename))]    if not candidates:        parent_dir = os.path.join(path, '..')        if os.path.abspath(parent_dir) != os.path.abspath(path):            return find_candidates_in_parent_dirs(filenames, parent_dir)    return (candidates, path)def check_swarm_only_config(service_dicts, compatibility=False):    warning_template = (        "Some services ({services}) use the '{key}' key, which will be ignored. "        "Compose does not support '{key}' configuration - use "        "`docker stack deploy` to deploy to a swarm."    )    def check_swarm_only_key(service_dicts, key):        services = [s for s in service_dicts if s.get(key)]        if services:            log.warn(                warning_template.format(                    services=", ".join(sorted(s['name'] for s in services)),                    key=key                )            )    if not compatibility:        check_swarm_only_key(service_dicts, 'deploy')    check_swarm_only_key(service_dicts, 'credential_spec')    check_swarm_only_key(service_dicts, 'configs')def load(config_details, compatibility=False):    """Load the configuration from a working directory and a list of    configuration files.  Files are loaded in order, and merged on top    of each other to create the final configuration.    Return a fully interpolated, extended and validated configuration.    """    validate_config_version(config_details.config_files)    processed_files = [        process_config_file(config_file, config_details.environment)        for config_file in config_details.config_files    ]    config_details = config_details._replace(config_files=processed_files)    main_file = config_details.config_files[0]    volumes = load_mapping(        config_details.config_files, 'get_volumes', 'Volume'    )    networks = load_mapping(        config_details.config_files, 'get_networks', 'Network'    )    secrets = load_mapping(        config_details.config_files, 'get_secrets', 'Secret', config_details.working_dir    )    configs = load_mapping(        config_details.config_files, 'get_configs', 'Config', config_details.working_dir    )    service_dicts = load_services(config_details, main_file, compatibility)    if main_file.version != V1:        for service_dict in service_dicts:            match_named_volumes(service_dict, volumes)    check_swarm_only_config(service_dicts, compatibility)    version = V2_3 if compatibility and main_file.version >= V3_0 else main_file.version    return Config(version, service_dicts, volumes, networks, secrets, configs)def load_mapping(config_files, get_func, entity_type, working_dir=None):    mapping = {}    for config_file in config_files:        for name, config in getattr(config_file, get_func)().items():            mapping[name] = config or {}            if not config:                continue            external = config.get('external')            if external:                validate_external(entity_type, name, config, config_file.version)                if isinstance(external, dict):                    config['name'] = external.get('name')                elif not config.get('name'):                    config['name'] = name            if 'driver_opts' in config:                config['driver_opts'] = build_string_dict(                    config['driver_opts']                )            if 'labels' in config:                config['labels'] = parse_labels(config['labels'])            if 'file' in config:                config['file'] = expand_path(working_dir, config['file'])    return mappingdef validate_external(entity_type, name, config, version):    if (version < V2_1 or (version >= V3_0 and version < V3_4)) and len(config.keys()) > 1:        raise ConfigurationError(            "{} {} declared as external but specifies additional attributes "            "({}).".format(                entity_type, name, ', '.join(k for k in config if k != 'external')))def load_services(config_details, config_file, compatibility=False):    def build_service(service_name, service_dict, service_names):        service_config = ServiceConfig.with_abs_paths(            config_details.working_dir,            config_file.filename,            service_name,            service_dict)        resolver = ServiceExtendsResolver(            service_config, config_file, environment=config_details.environment        )        service_dict = process_service(resolver.run())        service_config = service_config._replace(config=service_dict)        validate_service(service_config, service_names, config_file)        service_dict = finalize_service(            service_config,            service_names,            config_file.version,            config_details.environment,            compatibility        )        return service_dict    def build_services(service_config):        service_names = service_config.keys()        return sort_service_dicts([            build_service(name, service_dict, service_names)            for name, service_dict in service_config.items()        ])    def merge_services(base, override):        all_service_names = set(base) | set(override)        return {            name: merge_service_dicts_from_files(                base.get(name, {}),                override.get(name, {}),                config_file.version)            for name in all_service_names        }    service_configs = [        file.get_service_dicts() for file in config_details.config_files    ]    service_config = service_configs[0]    for next_config in service_configs[1:]:        service_config = merge_services(service_config, next_config)    return build_services(service_config)def interpolate_config_section(config_file, config, section, environment):    validate_config_section(config_file.filename, config, section)    return interpolate_environment_variables(        config_file.version,        config,        section,        environment    )def process_config_file(config_file, environment, service_name=None):    services = interpolate_config_section(        config_file,        config_file.get_service_dicts(),        'service',        environment)    if config_file.version > V1:        processed_config = dict(config_file.config)        processed_config['services'] = services        processed_config['volumes'] = interpolate_config_section(            config_file,            config_file.get_volumes(),            'volume',            environment)        processed_config['networks'] = interpolate_config_section(            config_file,            config_file.get_networks(),            'network',            environment)        if config_file.version >= const.COMPOSEFILE_V3_1:            processed_config['secrets'] = interpolate_config_section(                config_file,                config_file.get_secrets(),                'secret',                environment)        if config_file.version >= const.COMPOSEFILE_V3_3:            processed_config['configs'] = interpolate_config_section(                config_file,                config_file.get_configs(),                'config',                environment            )    else:        processed_config = services    config_file = config_file._replace(config=processed_config)    validate_against_config_schema(config_file)    if service_name and service_name not in services:        raise ConfigurationError(            "Cannot extend service '{}' in {}: Service not found".format(                service_name, config_file.filename))    return config_fileclass ServiceExtendsResolver(object):    def __init__(self, service_config, config_file, environment, already_seen=None):        self.service_config = service_config        self.working_dir = service_config.working_dir        self.already_seen = already_seen or []        self.config_file = config_file        self.environment = environment    @property    def signature(self):        return self.service_config.filename, self.service_config.name    def detect_cycle(self):        if self.signature in self.already_seen:            raise CircularReference(self.already_seen + [self.signature])    def run(self):        self.detect_cycle()        if 'extends' in self.service_config.config:            service_dict = self.resolve_extends(*self.validate_and_construct_extends())            return self.service_config._replace(config=service_dict)        return self.service_config    def validate_and_construct_extends(self):        extends = self.service_config.config['extends']        if not isinstance(extends, dict):            extends = {'service': extends}        config_path = self.get_extended_config_path(extends)        service_name = extends['service']        if config_path == self.config_file.filename:            try:                service_config = self.config_file.get_service(service_name)            except KeyError:                raise ConfigurationError(                    "Cannot extend service '{}' in {}: Service not found".format(                        service_name, config_path)                )        else:            extends_file = ConfigFile.from_filename(config_path)            validate_config_version([self.config_file, extends_file])            extended_file = process_config_file(                extends_file, self.environment, service_name=service_name            )            service_config = extended_file.get_service(service_name)        return config_path, service_config, service_name    def resolve_extends(self, extended_config_path, service_dict, service_name):        resolver = ServiceExtendsResolver(            ServiceConfig.with_abs_paths(                os.path.dirname(extended_config_path),                extended_config_path,                service_name,                service_dict),            self.config_file,            already_seen=self.already_seen + [self.signature],            environment=self.environment        )        service_config = resolver.run()        other_service_dict = process_service(service_config)        validate_extended_service_dict(            other_service_dict,            extended_config_path,            service_name)        return merge_service_dicts(            other_service_dict,            self.service_config.config,            self.config_file.version)    def get_extended_config_path(self, extends_options):        """Service we are extending either has a value for 'file' set, which we        need to obtain a full path too or we are extending from a service        defined in our own file.        """        filename = self.service_config.filename        validate_extends_file_path(            self.service_config.name,            extends_options,            filename)        if 'file' in extends_options:            return expand_path(self.working_dir, extends_options['file'])        return filenamedef resolve_environment(service_dict, environment=None):    """Unpack any environment variables from an env_file, if set.    Interpolate environment values if set.    """    env = {}    for env_file in service_dict.get('env_file', []):        env.update(env_vars_from_file(env_file))    env.update(parse_environment(service_dict.get('environment')))    return dict(resolve_env_var(k, v, environment) for k, v in six.iteritems(env))def resolve_build_args(buildargs, environment):    args = parse_build_arguments(buildargs)    return dict(resolve_env_var(k, v, environment) for k, v in six.iteritems(args))def validate_extended_service_dict(service_dict, filename, service):    error_prefix = "Cannot extend service '%s' in %s:" % (service, filename)    if 'links' in service_dict:        raise ConfigurationError(            "%s services with 'links' cannot be extended" % error_prefix)    if 'volumes_from' in service_dict:        raise ConfigurationError(            "%s services with 'volumes_from' cannot be extended" % error_prefix)    if 'net' in service_dict:        if get_container_name_from_network_mode(service_dict['net']):            raise ConfigurationError(                "%s services with 'net: container' cannot be extended" % error_prefix)    if 'network_mode' in service_dict:        if get_service_name_from_network_mode(service_dict['network_mode']):            raise ConfigurationError(                "%s services with 'network_mode: service' cannot be extended" % error_prefix)    if 'depends_on' in service_dict:        raise ConfigurationError(            "%s services with 'depends_on' cannot be extended" % error_prefix)def validate_service(service_config, service_names, config_file):    service_dict, service_name = service_config.config, service_config.name    validate_service_constraints(service_dict, service_name, config_file)    validate_paths(service_dict)    validate_cpu(service_config)    validate_ulimits(service_config)    validate_network_mode(service_config, service_names)    validate_pid_mode(service_config, service_names)    validate_depends_on(service_config, service_names)    validate_links(service_config, service_names)    validate_healthcheck(service_config)    if not service_dict.get('image') and has_uppercase(service_name):        raise ConfigurationError(            "Service '{name}' contains uppercase characters which are not valid "            "as part of an image name. Either use a lowercase service name or "            "use the `image` field to set a custom name for the service image."            .format(name=service_name))def process_service(service_config):    working_dir = service_config.working_dir    service_dict = dict(service_config.config)    if 'env_file' in service_dict:        service_dict['env_file'] = [            expand_path(working_dir, path)            for path in to_list(service_dict['env_file'])        ]    if 'build' in service_dict:        process_build_section(service_dict, working_dir)    if 'volumes' in service_dict and service_dict.get('volume_driver') is None:        service_dict['volumes'] = resolve_volume_paths(working_dir, service_dict)    if 'sysctls' in service_dict:        service_dict['sysctls'] = build_string_dict(parse_sysctls(service_dict['sysctls']))    if 'labels' in service_dict:        service_dict['labels'] = parse_labels(service_dict['labels'])    service_dict = process_depends_on(service_dict)    for field in ['dns', 'dns_search', 'tmpfs']:        if field in service_dict:            service_dict[field] = to_list(service_dict[field])    service_dict = process_security_opt(process_blkio_config(process_ports(        process_healthcheck(service_dict)    )))    return service_dictdef process_build_section(service_dict, working_dir):    if isinstance(service_dict['build'], six.string_types):        service_dict['build'] = resolve_build_path(working_dir, service_dict['build'])    elif isinstance(service_dict['build'], dict):        if 'context' in service_dict['build']:            path = service_dict['build']['context']            service_dict['build']['context'] = resolve_build_path(working_dir, path)        if 'labels' in service_dict['build']:            service_dict['build']['labels'] = parse_labels(service_dict['build']['labels'])def process_ports(service_dict):    if 'ports' not in service_dict:        return service_dict    ports = []    for port_definition in service_dict['ports']:        if isinstance(port_definition, ServicePort):            ports.append(port_definition)        else:            ports.extend(ServicePort.parse(port_definition))    service_dict['ports'] = ports    return service_dictdef process_depends_on(service_dict):    if 'depends_on' in service_dict and not isinstance(service_dict['depends_on'], dict):        service_dict['depends_on'] = dict([            (svc, {'condition': 'service_started'}) for svc in service_dict['depends_on']        ])    return service_dictdef process_blkio_config(service_dict):    if not service_dict.get('blkio_config'):        return service_dict    for field in ['device_read_bps', 'device_write_bps']:        if field in service_dict['blkio_config']:            for v in service_dict['blkio_config'].get(field, []):                rate = v.get('rate', 0)                v['rate'] = parse_bytes(rate)                if v['rate'] is None:                    raise ConfigurationError('Invalid format for bytes value: "{}"'.format(rate))    for field in ['device_read_iops', 'device_write_iops']:        if field in service_dict['blkio_config']:            for v in service_dict['blkio_config'].get(field, []):                try:                    v['rate'] = int(v.get('rate', 0))                except ValueError:                    raise ConfigurationError(                        'Invalid IOPS value: "{}". Must be a positive integer.'.format(v.get('rate'))                    )    return service_dictdef process_healthcheck(service_dict):    if 'healthcheck' not in service_dict:        return service_dict    hc = service_dict['healthcheck']    if 'disable' in hc:        del hc['disable']        hc['test'] = ['NONE']    for field in ['interval', 'timeout', 'start_period']:        if field not in hc or isinstance(hc[field], six.integer_types):            continue        hc[field] = parse_nanoseconds_int(hc[field])    return service_dictdef finalize_service_volumes(service_dict, environment):    if 'volumes' in service_dict:        finalized_volumes = []        normalize = environment.get_boolean('COMPOSE_CONVERT_WINDOWS_PATHS')        win_host = environment.get_boolean('COMPOSE_FORCE_WINDOWS_HOST')        for v in service_dict['volumes']:            if isinstance(v, dict):                finalized_volumes.append(MountSpec.parse(v, normalize, win_host))            else:                finalized_volumes.append(VolumeSpec.parse(v, normalize, win_host))        service_dict['volumes'] = finalized_volumes    return service_dictdef finalize_service(service_config, service_names, version, environment, compatibility):    service_dict = dict(service_config.config)    if 'environment' in service_dict or 'env_file' in service_dict:        service_dict['environment'] = resolve_environment(service_dict, environment)        service_dict.pop('env_file', None)    if 'volumes_from' in service_dict:        service_dict['volumes_from'] = [            VolumeFromSpec.parse(vf, service_names, version)            for vf in service_dict['volumes_from']        ]    service_dict = finalize_service_volumes(service_dict, environment)    if 'net' in service_dict:        network_mode = service_dict.pop('net')        container_name = get_container_name_from_network_mode(network_mode)        if container_name and container_name in service_names:            service_dict['network_mode'] = 'service:{}'.format(container_name)        else:            service_dict['network_mode'] = network_mode    if 'networks' in service_dict:        service_dict['networks'] = parse_networks(service_dict['networks'])    if 'restart' in service_dict:        service_dict['restart'] = parse_restart_spec(service_dict['restart'])    if 'secrets' in service_dict:        service_dict['secrets'] = [            types.ServiceSecret.parse(s) for s in service_dict['secrets']        ]    if 'configs' in service_dict:        service_dict['configs'] = [            types.ServiceConfig.parse(c) for c in service_dict['configs']        ]    normalize_build(service_dict, service_config.working_dir, environment)    if compatibility:        service_dict, ignored_keys = translate_deploy_keys_to_container_config(            service_dict        )        if ignored_keys:            log.warn(                'The following deploy sub-keys are not supported in compatibility mode and have'                ' been ignored: {}'.format(', '.join(ignored_keys))            )    service_dict['name'] = service_config.name    return normalize_v1_service_format(service_dict)def translate_resource_keys_to_container_config(resources_dict, service_dict):    if 'limits' in resources_dict:        service_dict['mem_limit'] = resources_dict['limits'].get('memory')        if 'cpus' in resources_dict['limits']:            service_dict['cpus'] = float(resources_dict['limits']['cpus'])    if 'reservations' in resources_dict:        service_dict['mem_reservation'] = resources_dict['reservations'].get('memory')        if 'cpus' in resources_dict['reservations']:            return ['resources.reservations.cpus']    return []def convert_restart_policy(name):    try:        return {            'any': 'always',            'none': 'no',            'on-failure': 'on-failure'        }[name]    except KeyError:        raise ConfigurationError('Invalid restart policy "{}"'.format(name))def translate_deploy_keys_to_container_config(service_dict):    if 'credential_spec' in service_dict:        del service_dict['credential_spec']    if 'configs' in service_dict:        del service_dict['configs']    if 'deploy' not in service_dict:        return service_dict, []    deploy_dict = service_dict['deploy']    ignored_keys = [        k for k in ['endpoint_mode', 'labels', 'update_config', 'rollback_config', 'placement']        if k in deploy_dict    ]    if 'replicas' in deploy_dict and deploy_dict.get('mode', 'replicated') == 'replicated':        service_dict['scale'] = deploy_dict['replicas']    if 'restart_policy' in deploy_dict:        service_dict['restart'] = {            'Name': convert_restart_policy(deploy_dict['restart_policy'].get('condition', 'any')),            'MaximumRetryCount': deploy_dict['restart_policy'].get('max_attempts', 0)        }        for k in deploy_dict['restart_policy'].keys():            if k != 'condition' and k != 'max_attempts':                ignored_keys.append('restart_policy.{}'.format(k))    ignored_keys.extend(        translate_resource_keys_to_container_config(            deploy_dict.get('resources', {}), service_dict        )    )    del service_dict['deploy']    return service_dict, ignored_keysdef normalize_v1_service_format(service_dict):    if 'log_driver' in service_dict or 'log_opt' in service_dict:        if 'logging' not in service_dict:            service_dict['logging'] = {}        if 'log_driver' in service_dict:            service_dict['logging']['driver'] = service_dict['log_driver']            del service_dict['log_driver']        if 'log_opt' in service_dict:            service_dict['logging']['options'] = service_dict['log_opt']            del service_dict['log_opt']    if 'dockerfile' in service_dict:        service_dict['build'] = service_dict.get('build', {})        service_dict['build'].update({            'dockerfile': service_dict.pop('dockerfile')        })    return service_dictdef merge_service_dicts_from_files(base, override, version):    """When merging services from multiple files we need to merge the `extends`    field. This is not handled by `merge_service_dicts()` which is used to    perform the `extends`.    """    new_service = merge_service_dicts(base, override, version)    if 'extends' in override:        new_service['extends'] = override['extends']    elif 'extends' in base:        new_service['extends'] = base['extends']    return new_serviceclass MergeDict(dict):    """A dict-like object responsible for merging two dicts into one."""    def __init__(self, base, override):        self.base = base        self.override = override    def needs_merge(self, field):        return field in self.base or field in self.override    def merge_field(self, field, merge_func, default=None):        if not self.needs_merge(field):            return        self[field] = merge_func(            self.base.get(field, default),            self.override.get(field, default))    def merge_mapping(self, field, parse_func=None):        if not self.needs_merge(field):            return        if parse_func is None:            def parse_func(m):                return m or {}        self[field] = parse_func(self.base.get(field))        self[field].update(parse_func(self.override.get(field)))    def merge_sequence(self, field, parse_func):        def parse_sequence_func(seq):            return to_mapping((parse_func(item) for item in seq), 'merge_field')        if not self.needs_merge(field):            return        merged = parse_sequence_func(self.base.get(field, []))        merged.update(parse_sequence_func(self.override.get(field, [])))        self[field] = [item.repr() for item in sorted(merged.values())]    def merge_scalar(self, field):        if self.needs_merge(field):            self[field] = self.override.get(field, self.base.get(field))def merge_service_dicts(base, override, version):    md = MergeDict(base, override)    md.merge_mapping('environment', parse_environment)    md.merge_mapping('labels', parse_labels)    md.merge_mapping('ulimits', parse_flat_dict)    md.merge_mapping('networks', parse_networks)    md.merge_mapping('sysctls', parse_sysctls)    md.merge_mapping('depends_on', parse_depends_on)    md.merge_sequence('links', ServiceLink.parse)    md.merge_sequence('secrets', types.ServiceSecret.parse)    md.merge_sequence('configs', types.ServiceConfig.parse)    md.merge_sequence('security_opt', types.SecurityOpt.parse)    md.merge_mapping('extra_hosts', parse_extra_hosts)    for field in ['volumes', 'devices']:        md.merge_field(field, merge_path_mappings)    for field in [        'cap_add', 'cap_drop', 'expose', 'external_links',        'volumes_from', 'device_cgroup_rules',    ]:        md.merge_field(field, merge_unique_items_lists, default=[])    for field in ['dns', 'dns_search', 'env_file', 'tmpfs']:        md.merge_field(field, merge_list_or_string)    md.merge_field('logging', merge_logging, default={})    merge_ports(md, base, override)    md.merge_field('blkio_config', merge_blkio_config, default={})    md.merge_field('healthcheck', merge_healthchecks, default={})    md.merge_field('deploy', merge_deploy, default={})    for field in set(ALLOWED_KEYS) - set(md):        md.merge_scalar(field)    if version == V1:        legacy_v1_merge_image_or_build(md, base, override)    elif md.needs_merge('build'):        md['build'] = merge_build(md, base, override)    return dict(md)def merge_unique_items_lists(base, override):    override = [str(o) for o in override]    base = [str(b) for b in base]    return sorted(set().union(base, override))def merge_healthchecks(base, override):    if override.get('disabled') is True:        return override    result = base.copy()    result.update(override)    return resultdef merge_ports(md, base, override):    def parse_sequence_func(seq):        acc = []        for item in seq:            acc.extend(ServicePort.parse(item))        return to_mapping(acc, 'merge_field')    field = 'ports'    if not md.needs_merge(field):        return    merged = parse_sequence_func(md.base.get(field, []))    merged.update(parse_sequence_func(md.override.get(field, [])))    md[field] = [item for item in sorted(merged.values(), key=lambda x: x.target)]def merge_build(output, base, override):    def to_dict(service):        build_config = service.get('build', {})        if isinstance(build_config, six.string_types):            return {'context': build_config}        return build_config    md = MergeDict(to_dict(base), to_dict(override))    md.merge_scalar('context')    md.merge_scalar('dockerfile')    md.merge_scalar('network')    md.merge_scalar('target')    md.merge_scalar('shm_size')    md.merge_scalar('isolation')    md.merge_mapping('args', parse_build_arguments)    md.merge_field('cache_from', merge_unique_items_lists, default=[])    md.merge_mapping('labels', parse_labels)    md.merge_mapping('extra_hosts', parse_extra_hosts)    return dict(md)def merge_deploy(base, override):    md = MergeDict(base or {}, override or {})    md.merge_scalar('mode')    md.merge_scalar('endpoint_mode')    md.merge_scalar('replicas')    md.merge_mapping('labels', parse_labels)    md.merge_mapping('update_config')    md.merge_mapping('rollback_config')    md.merge_mapping('restart_policy')    if md.needs_merge('resources'):        resources_md = MergeDict(md.base.get('resources') or {}, md.override.get('resources') or {})        resources_md.merge_mapping('limits')        resources_md.merge_field('reservations', merge_reservations, default={})        md['resources'] = dict(resources_md)    if md.needs_merge('placement'):        placement_md = MergeDict(md.base.get('placement') or {}, md.override.get('placement') or {})        placement_md.merge_field('constraints', merge_unique_items_lists, default=[])        placement_md.merge_field('preferences', merge_unique_objects_lists, default=[])        md['placement'] = dict(placement_md)    return dict(md)def merge_reservations(base, override):    md = MergeDict(base, override)    md.merge_scalar('cpus')    md.merge_scalar('memory')    md.merge_sequence('generic_resources', types.GenericResource.parse)    return dict(md)def merge_unique_objects_lists(base, override):    result = dict((json_hash(i), i) for i in base + override)    return [i[1] for i in sorted([(k, v) for k, v in result.items()], key=lambda x: x[0])]def merge_blkio_config(base, override):    md = MergeDict(base, override)    md.merge_scalar('weight')    def merge_blkio_limits(base, override):        index = dict((b['path'], b) for b in base)        for o in override:            index[o['path']] = o        return sorted(list(index.values()), key=lambda x: x['path'])    for field in [            "device_read_bps", "device_read_iops", "device_write_bps",            "device_write_iops", "weight_device",    ]:        md.merge_field(field, merge_blkio_limits, default=[])    return dict(md)def merge_logging(base, override):    md = MergeDict(base, override)    md.merge_scalar('driver')    if md.get('driver') == base.get('driver') or base.get('driver') is None:        md.merge_mapping('options', lambda m: m or {})    elif override.get('options'):        md['options'] = override.get('options', {})    return dict(md)def legacy_v1_merge_image_or_build(output, base, override):    output.pop('image', None)    output.pop('build', None)    if 'image' in override:        output['image'] = override['image']    elif 'build' in override:        output['build'] = override['build']    elif 'image' in base:        output['image'] = base['image']    elif 'build' in base:        output['build'] = base['build']def merge_environment(base, override):    env = parse_environment(base)    env.update(parse_environment(override))    return envdef merge_labels(base, override):    labels = parse_labels(base)    labels.update(parse_labels(override))    return labelsdef split_kv(kvpair):    if '=' in kvpair:        return kvpair.split('=', 1)    else:        return kvpair, ''def parse_dict_or_list(split_func, type_name, arguments):    if not arguments:        return {}    if isinstance(arguments, list):        return dict(split_func(e) for e in arguments)    if isinstance(arguments, dict):        return dict(arguments)    raise ConfigurationError(        "%s \"%s\" must be a list or mapping," %        (type_name, arguments)    )parse_build_arguments = functools.partial(parse_dict_or_list, split_env, 'build arguments')parse_environment = functools.partial(parse_dict_or_list, split_env, 'environment')parse_labels = functools.partial(parse_dict_or_list, split_kv, 'labels')parse_networks = functools.partial(parse_dict_or_list, lambda k: (k, None), 'networks')parse_sysctls = functools.partial(parse_dict_or_list, split_kv, 'sysctls')parse_depends_on = functools.partial(    parse_dict_or_list, lambda k: (k, {'condition': 'service_started'}), 'depends_on')def parse_flat_dict(d):    if not d:        return {}    if isinstance(d, dict):        return dict(d)    raise ConfigurationError("Invalid type: expected mapping")def resolve_env_var(key, val, environment):    if val is not None:        return key, val    elif environment and key in environment:        return key, environment[key]    else:        return key, Nonedef resolve_volume_paths(working_dir, service_dict):    return [        resolve_volume_path(working_dir, volume)        for volume in service_dict['volumes']    ]def resolve_volume_path(working_dir, volume):    if isinstance(volume, dict):        if volume.get('source', '').startswith(('.', '~')) and volume['type'] == 'bind':            volume['source'] = expand_path(working_dir, volume['source'])        return volume    mount_params = None    container_path, mount_params = split_path_mapping(volume)    if mount_params is not None:        host_path, mode = mount_params        if host_path is None:            return container_path        if host_path.startswith('.'):            host_path = expand_path(working_dir, host_path)        host_path = os.path.expanduser(host_path)        return u"{}:{}{}".format(host_path, container_path, (':' + mode if mode else ''))    return container_pathdef normalize_build(service_dict, working_dir, environment):    if 'build' in service_dict:        build = {}        # Shortcut where specifying a string is treated as the build context        if isinstance(service_dict['build'], six.string_types):            build['context'] = service_dict.pop('build')        else:            build.update(service_dict['build'])            if 'args' in build:                build['args'] = build_string_dict(                    resolve_build_args(build.get('args'), environment)                )        service_dict['build'] = builddef resolve_build_path(working_dir, build_path):    if is_url(build_path):        return build_path    return expand_path(working_dir, build_path)def is_url(build_path):    return build_path.startswith(DOCKER_VALID_URL_PREFIXES)def validate_paths(service_dict):    if 'build' in service_dict:        build = service_dict.get('build', {})        if isinstance(build, six.string_types):            build_path = build        elif isinstance(build, dict) and 'context' in build:            build_path = build['context']        else:            # We have a build section but no context, so nothing to validate            return        if (            not is_url(build_path) and            (not os.path.exists(build_path) or not os.access(build_path, os.R_OK))        ):            raise ConfigurationError(                "build path %s either does not exist, is not accessible, "                "or is not a valid URL." % build_path)def merge_path_mappings(base, override):    d = dict_from_path_mappings(base)    d.update(dict_from_path_mappings(override))    return path_mappings_from_dict(d)def dict_from_path_mappings(path_mappings):    if path_mappings:        return dict(split_path_mapping(v) for v in path_mappings)    else:        return {}def path_mappings_from_dict(d):    return [join_path_mapping(v) for v in sorted(d.items())]def split_path_mapping(volume_path):    """    Ascertain if the volume_path contains a host path as well as a container    path. Using splitdrive so windows absolute paths won't cause issues with    splitting on ':'.    """    if isinstance(volume_path, dict):        return (volume_path.get('target'), volume_path)    drive, volume_config = splitdrive(volume_path)    if ':' in volume_config:        (host, container) = volume_config.split(':', 1)        container_drive, container_path = splitdrive(container)        mode = None        if ':' in container_path:            container_path, mode = container_path.rsplit(':', 1)        return (container_drive + container_path, (drive + host, mode))    else:        return (volume_path, None)def process_security_opt(service_dict):    security_opts = service_dict.get('security_opt', [])    result = []    for value in security_opts:        result.append(SecurityOpt.parse(value))    if result:        service_dict['security_opt'] = result    return service_dictdef join_path_mapping(pair):    (container, host) = pair    if isinstance(host, dict):        return host    elif host is None:        return container    else:        host, mode = host        result = ":".join((host, container))        if mode:            result += ":" + mode        return resultdef expand_path(working_dir, path):    return os.path.abspath(os.path.join(working_dir, os.path.expanduser(path)))def merge_list_or_string(base, override):    return to_list(base) + to_list(override)def to_list(value):    if value is None:        return []    elif isinstance(value, six.string_types):        return [value]    else:        return valuedef to_mapping(sequence, key_field):    return {getattr(item, key_field): item for item in sequence}def has_uppercase(name):    return any(char in string.ascii_uppercase for char in name)def load_yaml(filename, encoding=None, binary=True):    try:        with io.open(filename, 'rb' if binary else 'r', encoding=encoding) as fh:            return yaml.safe_load(fh)    except (IOError, yaml.YAMLError, UnicodeDecodeError) as e:        if encoding is None:            # Sometimes the user's locale sets an encoding that doesn't match            # the YAML files. Im such cases, retry once with the "default"            # UTF-8 encoding            return load_yaml(filename, encoding='utf-8-sig', binary=False)        error_name = getattr(e, '__module__', '') + '.' + e.__class__.__name__        raise ConfigurationError(u"{}: {}".format(error_name, e))
 |