123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437 |
- from __future__ import absolute_import
- from __future__ import unicode_literals
- import functools
- import logging
- import os
- import string
- import sys
- from collections import namedtuple
- import six
- import yaml
- from cached_property import cached_property
- from . import types
- from .. import const
- from ..const import COMPOSEFILE_V1 as V1
- from ..const import COMPOSEFILE_V2_1 as V2_1
- from ..const import COMPOSEFILE_V2_3 as V2_3
- from ..const import COMPOSEFILE_V3_0 as V3_0
- from ..const import COMPOSEFILE_V3_4 as V3_4
- from ..utils import build_string_dict
- from ..utils import json_hash
- from ..utils import parse_bytes
- from ..utils import parse_nanoseconds_int
- from ..utils import splitdrive
- from ..version import ComposeVersion
- from .environment import env_vars_from_file
- from .environment import Environment
- from .environment import split_env
- from .errors import CircularReference
- from .errors import ComposeFileNotFound
- from .errors import ConfigurationError
- from .errors import DuplicateOverrideFileFound
- from .errors import VERSION_EXPLANATION
- from .interpolation import interpolate_environment_variables
- from .sort_services import get_container_name_from_network_mode
- from .sort_services import get_service_name_from_network_mode
- from .sort_services import sort_service_dicts
- from .types import MountSpec
- from .types import parse_extra_hosts
- from .types import parse_restart_spec
- from .types import SecurityOpt
- from .types import ServiceLink
- from .types import ServicePort
- from .types import VolumeFromSpec
- from .types import VolumeSpec
- from .validation import match_named_volumes
- from .validation import validate_against_config_schema
- from .validation import validate_config_section
- from .validation import validate_cpu
- from .validation import validate_depends_on
- from .validation import validate_extends_file_path
- from .validation import validate_healthcheck
- from .validation import validate_links
- from .validation import validate_network_mode
- from .validation import validate_pid_mode
- from .validation import validate_service_constraints
- from .validation import validate_top_level_object
- from .validation import validate_ulimits
- DOCKER_CONFIG_KEYS = [
- 'cap_add',
- 'cap_drop',
- 'cgroup_parent',
- 'command',
- 'cpu_count',
- 'cpu_percent',
- 'cpu_period',
- 'cpu_quota',
- 'cpu_shares',
- 'cpus',
- 'cpuset',
- 'detach',
- 'device_cgroup_rules',
- 'devices',
- 'dns',
- 'dns_search',
- 'dns_opt',
- 'domainname',
- 'entrypoint',
- 'env_file',
- 'environment',
- 'extra_hosts',
- 'group_add',
- 'hostname',
- 'healthcheck',
- 'image',
- 'ipc',
- 'labels',
- 'links',
- 'mac_address',
- 'mem_limit',
- 'mem_reservation',
- 'memswap_limit',
- 'mem_swappiness',
- 'net',
- 'oom_score_adj',
- 'oom_kill_disable',
- 'pid',
- 'ports',
- 'privileged',
- 'read_only',
- 'restart',
- 'runtime',
- 'secrets',
- 'security_opt',
- 'shm_size',
- 'pids_limit',
- 'stdin_open',
- 'stop_signal',
- 'sysctls',
- 'tty',
- 'user',
- 'userns_mode',
- 'volume_driver',
- 'volumes',
- 'volumes_from',
- 'working_dir',
- ]
- ALLOWED_KEYS = DOCKER_CONFIG_KEYS + [
- 'blkio_config',
- 'build',
- 'container_name',
- 'credential_spec',
- 'dockerfile',
- 'log_driver',
- 'log_opt',
- 'logging',
- 'network_mode',
- 'init',
- 'scale',
- 'stop_grace_period',
- ]
- DOCKER_VALID_URL_PREFIXES = (
- 'http://',
- 'https://',
- 'git://',
- 'github.com/',
- 'git@',
- )
- SUPPORTED_FILENAMES = [
- 'docker-compose.yml',
- 'docker-compose.yaml',
- ]
- DEFAULT_OVERRIDE_FILENAMES = ('docker-compose.override.yml', 'docker-compose.override.yaml')
- log = logging.getLogger(__name__)
- class ConfigDetails(namedtuple('_ConfigDetails', 'working_dir config_files environment')):
- """
- :param working_dir: the directory to use for relative paths in the config
- :type working_dir: string
- :param config_files: list of configuration files to load
- :type config_files: list of :class:`ConfigFile`
- :param environment: computed environment values for this project
- :type environment: :class:`environment.Environment`
- """
- def __new__(cls, working_dir, config_files, environment=None):
- if environment is None:
- environment = Environment.from_env_file(working_dir)
- return super(ConfigDetails, cls).__new__(
- cls, working_dir, config_files, environment
- )
- class ConfigFile(namedtuple('_ConfigFile', 'filename config')):
- """
- :param filename: filename of the config file
- :type filename: string
- :param config: contents of the config file
- :type config: :class:`dict`
- """
- @classmethod
- def from_filename(cls, filename):
- return cls(filename, load_yaml(filename))
- @cached_property
- def version(self):
- if 'version' not in self.config:
- return V1
- version = self.config['version']
- if isinstance(version, dict):
- log.warn('Unexpected type for "version" key in "{}". Assuming '
- '"version" is the name of a service, and defaulting to '
- 'Compose file version 1.'.format(self.filename))
- return V1
- if not isinstance(version, six.string_types):
- raise ConfigurationError(
- 'Version in "{}" is invalid - it should be a string.'
- .format(self.filename))
- if version == '1':
- raise ConfigurationError(
- 'Version in "{}" is invalid. {}'
- .format(self.filename, VERSION_EXPLANATION)
- )
- if version == '2':
- return const.COMPOSEFILE_V2_0
- if version == '3':
- return const.COMPOSEFILE_V3_0
- return ComposeVersion(version)
- def get_service(self, name):
- return self.get_service_dicts()[name]
- def get_service_dicts(self):
- return self.config if self.version == V1 else self.config.get('services', {})
- def get_volumes(self):
- return {} if self.version == V1 else self.config.get('volumes', {})
- def get_networks(self):
- return {} if self.version == V1 else self.config.get('networks', {})
- def get_secrets(self):
- return {} if self.version < const.COMPOSEFILE_V3_1 else self.config.get('secrets', {})
- def get_configs(self):
- return {} if self.version < const.COMPOSEFILE_V3_3 else self.config.get('configs', {})
- class Config(namedtuple('_Config', 'version services volumes networks secrets configs')):
- """
- :param version: configuration version
- :type version: int
- :param services: List of service description dictionaries
- :type services: :class:`list`
- :param volumes: Dictionary mapping volume names to description dictionaries
- :type volumes: :class:`dict`
- :param networks: Dictionary mapping network names to description dictionaries
- :type networks: :class:`dict`
- :param secrets: Dictionary mapping secret names to description dictionaries
- :type secrets: :class:`dict`
- :param configs: Dictionary mapping config names to description dictionaries
- :type configs: :class:`dict`
- """
- class ServiceConfig(namedtuple('_ServiceConfig', 'working_dir filename name config')):
- @classmethod
- def with_abs_paths(cls, working_dir, filename, name, config):
- if not working_dir:
- raise ValueError("No working_dir for ServiceConfig.")
- return cls(
- os.path.abspath(working_dir),
- os.path.abspath(filename) if filename else filename,
- name,
- config)
- def find(base_dir, filenames, environment, override_dir=None):
- if filenames == ['-']:
- return ConfigDetails(
- os.path.abspath(override_dir) if override_dir else os.getcwd(),
- [ConfigFile(None, yaml.safe_load(sys.stdin))],
- environment
- )
- if filenames:
- filenames = [os.path.join(base_dir, f) for f in filenames]
- else:
- filenames = get_default_config_files(base_dir)
- log.debug("Using configuration files: {}".format(",".join(filenames)))
- return ConfigDetails(
- override_dir if override_dir else os.path.dirname(filenames[0]),
- [ConfigFile.from_filename(f) for f in filenames],
- environment
- )
- def validate_config_version(config_files):
- main_file = config_files[0]
- validate_top_level_object(main_file)
- for next_file in config_files[1:]:
- validate_top_level_object(next_file)
- if main_file.version != next_file.version:
- raise ConfigurationError(
- "Version mismatch: file {0} specifies version {1} but "
- "extension file {2} uses version {3}".format(
- main_file.filename,
- main_file.version,
- next_file.filename,
- next_file.version))
- def get_default_config_files(base_dir):
- (candidates, path) = find_candidates_in_parent_dirs(SUPPORTED_FILENAMES, base_dir)
- if not candidates:
- raise ComposeFileNotFound(SUPPORTED_FILENAMES)
- winner = candidates[0]
- if len(candidates) > 1:
- log.warn("Found multiple config files with supported names: %s", ", ".join(candidates))
- log.warn("Using %s\n", winner)
- return [os.path.join(path, winner)] + get_default_override_file(path)
- def get_default_override_file(path):
- override_files_in_path = [os.path.join(path, override_filename) for override_filename
- in DEFAULT_OVERRIDE_FILENAMES
- if os.path.exists(os.path.join(path, override_filename))]
- if len(override_files_in_path) > 1:
- raise DuplicateOverrideFileFound(override_files_in_path)
- return override_files_in_path
- def find_candidates_in_parent_dirs(filenames, path):
- """
- Given a directory path to start, looks for filenames in the
- directory, and then each parent directory successively,
- until found.
- Returns tuple (candidates, path).
- """
- candidates = [filename for filename in filenames
- if os.path.exists(os.path.join(path, filename))]
- if not candidates:
- parent_dir = os.path.join(path, '..')
- if os.path.abspath(parent_dir) != os.path.abspath(path):
- return find_candidates_in_parent_dirs(filenames, parent_dir)
- return (candidates, path)
- def check_swarm_only_config(service_dicts, compatibility=False):
- warning_template = (
- "Some services ({services}) use the '{key}' key, which will be ignored. "
- "Compose does not support '{key}' configuration - use "
- "`docker stack deploy` to deploy to a swarm."
- )
- def check_swarm_only_key(service_dicts, key):
- services = [s for s in service_dicts if s.get(key)]
- if services:
- log.warn(
- warning_template.format(
- services=", ".join(sorted(s['name'] for s in services)),
- key=key
- )
- )
- if not compatibility:
- check_swarm_only_key(service_dicts, 'deploy')
- check_swarm_only_key(service_dicts, 'credential_spec')
- check_swarm_only_key(service_dicts, 'configs')
- def load(config_details, compatibility=False):
- """Load the configuration from a working directory and a list of
- configuration files. Files are loaded in order, and merged on top
- of each other to create the final configuration.
- Return a fully interpolated, extended and validated configuration.
- """
- validate_config_version(config_details.config_files)
- processed_files = [
- process_config_file(config_file, config_details.environment)
- for config_file in config_details.config_files
- ]
- config_details = config_details._replace(config_files=processed_files)
- main_file = config_details.config_files[0]
- volumes = load_mapping(
- config_details.config_files, 'get_volumes', 'Volume'
- )
- networks = load_mapping(
- config_details.config_files, 'get_networks', 'Network'
- )
- secrets = load_mapping(
- config_details.config_files, 'get_secrets', 'Secret', config_details.working_dir
- )
- configs = load_mapping(
- config_details.config_files, 'get_configs', 'Config', config_details.working_dir
- )
- service_dicts = load_services(config_details, main_file, compatibility)
- if main_file.version != V1:
- for service_dict in service_dicts:
- match_named_volumes(service_dict, volumes)
- check_swarm_only_config(service_dicts, compatibility)
- version = V2_3 if compatibility and main_file.version >= V3_0 else main_file.version
- return Config(version, service_dicts, volumes, networks, secrets, configs)
- def load_mapping(config_files, get_func, entity_type, working_dir=None):
- mapping = {}
- for config_file in config_files:
- for name, config in getattr(config_file, get_func)().items():
- mapping[name] = config or {}
- if not config:
- continue
- external = config.get('external')
- if external:
- validate_external(entity_type, name, config, config_file.version)
- if isinstance(external, dict):
- config['name'] = external.get('name')
- elif not config.get('name'):
- config['name'] = name
- if 'driver_opts' in config:
- config['driver_opts'] = build_string_dict(
- config['driver_opts']
- )
- if 'labels' in config:
- config['labels'] = parse_labels(config['labels'])
- if 'file' in config:
- config['file'] = expand_path(working_dir, config['file'])
- return mapping
- def validate_external(entity_type, name, config, version):
- if (version < V2_1 or (version >= V3_0 and version < V3_4)) and len(config.keys()) > 1:
- raise ConfigurationError(
- "{} {} declared as external but specifies additional attributes "
- "({}).".format(
- entity_type, name, ', '.join(k for k in config if k != 'external')))
- def load_services(config_details, config_file, compatibility=False):
- def build_service(service_name, service_dict, service_names):
- service_config = ServiceConfig.with_abs_paths(
- config_details.working_dir,
- config_file.filename,
- service_name,
- service_dict)
- resolver = ServiceExtendsResolver(
- service_config, config_file, environment=config_details.environment
- )
- service_dict = process_service(resolver.run())
- service_config = service_config._replace(config=service_dict)
- validate_service(service_config, service_names, config_file)
- service_dict = finalize_service(
- service_config,
- service_names,
- config_file.version,
- config_details.environment,
- compatibility
- )
- return service_dict
- def build_services(service_config):
- service_names = service_config.keys()
- return sort_service_dicts([
- build_service(name, service_dict, service_names)
- for name, service_dict in service_config.items()
- ])
- def merge_services(base, override):
- all_service_names = set(base) | set(override)
- return {
- name: merge_service_dicts_from_files(
- base.get(name, {}),
- override.get(name, {}),
- config_file.version)
- for name in all_service_names
- }
- service_configs = [
- file.get_service_dicts() for file in config_details.config_files
- ]
- service_config = service_configs[0]
- for next_config in service_configs[1:]:
- service_config = merge_services(service_config, next_config)
- return build_services(service_config)
- def interpolate_config_section(config_file, config, section, environment):
- validate_config_section(config_file.filename, config, section)
- return interpolate_environment_variables(
- config_file.version,
- config,
- section,
- environment
- )
- def process_config_file(config_file, environment, service_name=None):
- services = interpolate_config_section(
- config_file,
- config_file.get_service_dicts(),
- 'service',
- environment)
- if config_file.version > V1:
- processed_config = dict(config_file.config)
- processed_config['services'] = services
- processed_config['volumes'] = interpolate_config_section(
- config_file,
- config_file.get_volumes(),
- 'volume',
- environment)
- processed_config['networks'] = interpolate_config_section(
- config_file,
- config_file.get_networks(),
- 'network',
- environment)
- if config_file.version >= const.COMPOSEFILE_V3_1:
- processed_config['secrets'] = interpolate_config_section(
- config_file,
- config_file.get_secrets(),
- 'secret',
- environment)
- if config_file.version >= const.COMPOSEFILE_V3_3:
- processed_config['configs'] = interpolate_config_section(
- config_file,
- config_file.get_configs(),
- 'config',
- environment
- )
- else:
- processed_config = services
- config_file = config_file._replace(config=processed_config)
- validate_against_config_schema(config_file)
- if service_name and service_name not in services:
- raise ConfigurationError(
- "Cannot extend service '{}' in {}: Service not found".format(
- service_name, config_file.filename))
- return config_file
- class ServiceExtendsResolver(object):
- def __init__(self, service_config, config_file, environment, already_seen=None):
- self.service_config = service_config
- self.working_dir = service_config.working_dir
- self.already_seen = already_seen or []
- self.config_file = config_file
- self.environment = environment
- @property
- def signature(self):
- return self.service_config.filename, self.service_config.name
- def detect_cycle(self):
- if self.signature in self.already_seen:
- raise CircularReference(self.already_seen + [self.signature])
- def run(self):
- self.detect_cycle()
- if 'extends' in self.service_config.config:
- service_dict = self.resolve_extends(*self.validate_and_construct_extends())
- return self.service_config._replace(config=service_dict)
- return self.service_config
- def validate_and_construct_extends(self):
- extends = self.service_config.config['extends']
- if not isinstance(extends, dict):
- extends = {'service': extends}
- config_path = self.get_extended_config_path(extends)
- service_name = extends['service']
- if config_path == self.config_file.filename:
- try:
- service_config = self.config_file.get_service(service_name)
- except KeyError:
- raise ConfigurationError(
- "Cannot extend service '{}' in {}: Service not found".format(
- service_name, config_path)
- )
- else:
- extends_file = ConfigFile.from_filename(config_path)
- validate_config_version([self.config_file, extends_file])
- extended_file = process_config_file(
- extends_file, self.environment, service_name=service_name
- )
- service_config = extended_file.get_service(service_name)
- return config_path, service_config, service_name
- def resolve_extends(self, extended_config_path, service_dict, service_name):
- resolver = ServiceExtendsResolver(
- ServiceConfig.with_abs_paths(
- os.path.dirname(extended_config_path),
- extended_config_path,
- service_name,
- service_dict),
- self.config_file,
- already_seen=self.already_seen + [self.signature],
- environment=self.environment
- )
- service_config = resolver.run()
- other_service_dict = process_service(service_config)
- validate_extended_service_dict(
- other_service_dict,
- extended_config_path,
- service_name)
- return merge_service_dicts(
- other_service_dict,
- self.service_config.config,
- self.config_file.version)
- def get_extended_config_path(self, extends_options):
- """Service we are extending either has a value for 'file' set, which we
- need to obtain a full path too or we are extending from a service
- defined in our own file.
- """
- filename = self.service_config.filename
- validate_extends_file_path(
- self.service_config.name,
- extends_options,
- filename)
- if 'file' in extends_options:
- return expand_path(self.working_dir, extends_options['file'])
- return filename
- def resolve_environment(service_dict, environment=None):
- """Unpack any environment variables from an env_file, if set.
- Interpolate environment values if set.
- """
- env = {}
- for env_file in service_dict.get('env_file', []):
- env.update(env_vars_from_file(env_file))
- env.update(parse_environment(service_dict.get('environment')))
- return dict(resolve_env_var(k, v, environment) for k, v in six.iteritems(env))
- def resolve_build_args(buildargs, environment):
- args = parse_build_arguments(buildargs)
- return dict(resolve_env_var(k, v, environment) for k, v in six.iteritems(args))
- def validate_extended_service_dict(service_dict, filename, service):
- error_prefix = "Cannot extend service '%s' in %s:" % (service, filename)
- if 'links' in service_dict:
- raise ConfigurationError(
- "%s services with 'links' cannot be extended" % error_prefix)
- if 'volumes_from' in service_dict:
- raise ConfigurationError(
- "%s services with 'volumes_from' cannot be extended" % error_prefix)
- if 'net' in service_dict:
- if get_container_name_from_network_mode(service_dict['net']):
- raise ConfigurationError(
- "%s services with 'net: container' cannot be extended" % error_prefix)
- if 'network_mode' in service_dict:
- if get_service_name_from_network_mode(service_dict['network_mode']):
- raise ConfigurationError(
- "%s services with 'network_mode: service' cannot be extended" % error_prefix)
- if 'depends_on' in service_dict:
- raise ConfigurationError(
- "%s services with 'depends_on' cannot be extended" % error_prefix)
- def validate_service(service_config, service_names, config_file):
- service_dict, service_name = service_config.config, service_config.name
- validate_service_constraints(service_dict, service_name, config_file)
- validate_paths(service_dict)
- validate_cpu(service_config)
- validate_ulimits(service_config)
- validate_network_mode(service_config, service_names)
- validate_pid_mode(service_config, service_names)
- validate_depends_on(service_config, service_names)
- validate_links(service_config, service_names)
- validate_healthcheck(service_config)
- if not service_dict.get('image') and has_uppercase(service_name):
- raise ConfigurationError(
- "Service '{name}' contains uppercase characters which are not valid "
- "as part of an image name. Either use a lowercase service name or "
- "use the `image` field to set a custom name for the service image."
- .format(name=service_name))
- def process_service(service_config):
- working_dir = service_config.working_dir
- service_dict = dict(service_config.config)
- if 'env_file' in service_dict:
- service_dict['env_file'] = [
- expand_path(working_dir, path)
- for path in to_list(service_dict['env_file'])
- ]
- if 'build' in service_dict:
- process_build_section(service_dict, working_dir)
- if 'volumes' in service_dict and service_dict.get('volume_driver') is None:
- service_dict['volumes'] = resolve_volume_paths(working_dir, service_dict)
- if 'sysctls' in service_dict:
- service_dict['sysctls'] = build_string_dict(parse_sysctls(service_dict['sysctls']))
- if 'labels' in service_dict:
- service_dict['labels'] = parse_labels(service_dict['labels'])
- service_dict = process_depends_on(service_dict)
- for field in ['dns', 'dns_search', 'tmpfs']:
- if field in service_dict:
- service_dict[field] = to_list(service_dict[field])
- service_dict = process_security_opt(process_blkio_config(process_ports(
- process_healthcheck(service_dict)
- )))
- return service_dict
- def process_build_section(service_dict, working_dir):
- if isinstance(service_dict['build'], six.string_types):
- service_dict['build'] = resolve_build_path(working_dir, service_dict['build'])
- elif isinstance(service_dict['build'], dict):
- if 'context' in service_dict['build']:
- path = service_dict['build']['context']
- service_dict['build']['context'] = resolve_build_path(working_dir, path)
- if 'labels' in service_dict['build']:
- service_dict['build']['labels'] = parse_labels(service_dict['build']['labels'])
- def process_ports(service_dict):
- if 'ports' not in service_dict:
- return service_dict
- ports = []
- for port_definition in service_dict['ports']:
- if isinstance(port_definition, ServicePort):
- ports.append(port_definition)
- else:
- ports.extend(ServicePort.parse(port_definition))
- service_dict['ports'] = ports
- return service_dict
- def process_depends_on(service_dict):
- if 'depends_on' in service_dict and not isinstance(service_dict['depends_on'], dict):
- service_dict['depends_on'] = dict([
- (svc, {'condition': 'service_started'}) for svc in service_dict['depends_on']
- ])
- return service_dict
- def process_blkio_config(service_dict):
- if not service_dict.get('blkio_config'):
- return service_dict
- for field in ['device_read_bps', 'device_write_bps']:
- if field in service_dict['blkio_config']:
- for v in service_dict['blkio_config'].get(field, []):
- rate = v.get('rate', 0)
- v['rate'] = parse_bytes(rate)
- if v['rate'] is None:
- raise ConfigurationError('Invalid format for bytes value: "{}"'.format(rate))
- for field in ['device_read_iops', 'device_write_iops']:
- if field in service_dict['blkio_config']:
- for v in service_dict['blkio_config'].get(field, []):
- try:
- v['rate'] = int(v.get('rate', 0))
- except ValueError:
- raise ConfigurationError(
- 'Invalid IOPS value: "{}". Must be a positive integer.'.format(v.get('rate'))
- )
- return service_dict
- def process_healthcheck(service_dict):
- if 'healthcheck' not in service_dict:
- return service_dict
- hc = service_dict['healthcheck']
- if 'disable' in hc:
- del hc['disable']
- hc['test'] = ['NONE']
- for field in ['interval', 'timeout', 'start_period']:
- if field not in hc or isinstance(hc[field], six.integer_types):
- continue
- hc[field] = parse_nanoseconds_int(hc[field])
- return service_dict
- def finalize_service_volumes(service_dict, environment):
- if 'volumes' in service_dict:
- finalized_volumes = []
- normalize = environment.get_boolean('COMPOSE_CONVERT_WINDOWS_PATHS')
- win_host = environment.get_boolean('COMPOSE_FORCE_WINDOWS_HOST')
- for v in service_dict['volumes']:
- if isinstance(v, dict):
- finalized_volumes.append(MountSpec.parse(v, normalize, win_host))
- else:
- finalized_volumes.append(VolumeSpec.parse(v, normalize, win_host))
- service_dict['volumes'] = finalized_volumes
- return service_dict
- def finalize_service(service_config, service_names, version, environment, compatibility):
- service_dict = dict(service_config.config)
- if 'environment' in service_dict or 'env_file' in service_dict:
- service_dict['environment'] = resolve_environment(service_dict, environment)
- service_dict.pop('env_file', None)
- if 'volumes_from' in service_dict:
- service_dict['volumes_from'] = [
- VolumeFromSpec.parse(vf, service_names, version)
- for vf in service_dict['volumes_from']
- ]
- service_dict = finalize_service_volumes(service_dict, environment)
- if 'net' in service_dict:
- network_mode = service_dict.pop('net')
- container_name = get_container_name_from_network_mode(network_mode)
- if container_name and container_name in service_names:
- service_dict['network_mode'] = 'service:{}'.format(container_name)
- else:
- service_dict['network_mode'] = network_mode
- if 'networks' in service_dict:
- service_dict['networks'] = parse_networks(service_dict['networks'])
- if 'restart' in service_dict:
- service_dict['restart'] = parse_restart_spec(service_dict['restart'])
- if 'secrets' in service_dict:
- service_dict['secrets'] = [
- types.ServiceSecret.parse(s) for s in service_dict['secrets']
- ]
- if 'configs' in service_dict:
- service_dict['configs'] = [
- types.ServiceConfig.parse(c) for c in service_dict['configs']
- ]
- normalize_build(service_dict, service_config.working_dir, environment)
- if compatibility:
- service_dict, ignored_keys = translate_deploy_keys_to_container_config(
- service_dict
- )
- if ignored_keys:
- log.warn(
- 'The following deploy sub-keys are not supported in compatibility mode and have'
- ' been ignored: {}'.format(', '.join(ignored_keys))
- )
- service_dict['name'] = service_config.name
- return normalize_v1_service_format(service_dict)
- def translate_resource_keys_to_container_config(resources_dict, service_dict):
- if 'limits' in resources_dict:
- service_dict['mem_limit'] = resources_dict['limits'].get('memory')
- if 'cpus' in resources_dict['limits']:
- service_dict['cpus'] = float(resources_dict['limits']['cpus'])
- if 'reservations' in resources_dict:
- service_dict['mem_reservation'] = resources_dict['reservations'].get('memory')
- if 'cpus' in resources_dict['reservations']:
- return ['resources.reservations.cpus']
- return []
- def convert_restart_policy(name):
- try:
- return {
- 'any': 'always',
- 'none': 'no',
- 'on-failure': 'on-failure'
- }[name]
- except KeyError:
- raise ConfigurationError('Invalid restart policy "{}"'.format(name))
- def translate_deploy_keys_to_container_config(service_dict):
- if 'deploy' not in service_dict:
- return service_dict, []
- deploy_dict = service_dict['deploy']
- ignored_keys = [
- k for k in ['endpoint_mode', 'labels', 'update_config', 'placement']
- if k in deploy_dict
- ]
- if 'replicas' in deploy_dict and deploy_dict.get('mode', 'replicated') == 'replicated':
- service_dict['scale'] = deploy_dict['replicas']
- if 'restart_policy' in deploy_dict:
- service_dict['restart'] = {
- 'Name': convert_restart_policy(deploy_dict['restart_policy'].get('condition', 'any')),
- 'MaximumRetryCount': deploy_dict['restart_policy'].get('max_attempts', 0)
- }
- for k in deploy_dict['restart_policy'].keys():
- if k != 'condition' and k != 'max_attempts':
- ignored_keys.append('restart_policy.{}'.format(k))
- ignored_keys.extend(
- translate_resource_keys_to_container_config(
- deploy_dict.get('resources', {}), service_dict
- )
- )
- del service_dict['deploy']
- if 'credential_spec' in service_dict:
- del service_dict['credential_spec']
- if 'configs' in service_dict:
- del service_dict['configs']
- return service_dict, ignored_keys
- def normalize_v1_service_format(service_dict):
- if 'log_driver' in service_dict or 'log_opt' in service_dict:
- if 'logging' not in service_dict:
- service_dict['logging'] = {}
- if 'log_driver' in service_dict:
- service_dict['logging']['driver'] = service_dict['log_driver']
- del service_dict['log_driver']
- if 'log_opt' in service_dict:
- service_dict['logging']['options'] = service_dict['log_opt']
- del service_dict['log_opt']
- if 'dockerfile' in service_dict:
- service_dict['build'] = service_dict.get('build', {})
- service_dict['build'].update({
- 'dockerfile': service_dict.pop('dockerfile')
- })
- return service_dict
- def merge_service_dicts_from_files(base, override, version):
- """When merging services from multiple files we need to merge the `extends`
- field. This is not handled by `merge_service_dicts()` which is used to
- perform the `extends`.
- """
- new_service = merge_service_dicts(base, override, version)
- if 'extends' in override:
- new_service['extends'] = override['extends']
- elif 'extends' in base:
- new_service['extends'] = base['extends']
- return new_service
- class MergeDict(dict):
- """A dict-like object responsible for merging two dicts into one."""
- def __init__(self, base, override):
- self.base = base
- self.override = override
- def needs_merge(self, field):
- return field in self.base or field in self.override
- def merge_field(self, field, merge_func, default=None):
- if not self.needs_merge(field):
- return
- self[field] = merge_func(
- self.base.get(field, default),
- self.override.get(field, default))
- def merge_mapping(self, field, parse_func=None):
- if not self.needs_merge(field):
- return
- if parse_func is None:
- def parse_func(m):
- return m or {}
- self[field] = parse_func(self.base.get(field))
- self[field].update(parse_func(self.override.get(field)))
- def merge_sequence(self, field, parse_func):
- def parse_sequence_func(seq):
- return to_mapping((parse_func(item) for item in seq), 'merge_field')
- if not self.needs_merge(field):
- return
- merged = parse_sequence_func(self.base.get(field, []))
- merged.update(parse_sequence_func(self.override.get(field, [])))
- self[field] = [item.repr() for item in sorted(merged.values())]
- def merge_scalar(self, field):
- if self.needs_merge(field):
- self[field] = self.override.get(field, self.base.get(field))
- def merge_service_dicts(base, override, version):
- md = MergeDict(base, override)
- md.merge_mapping('environment', parse_environment)
- md.merge_mapping('labels', parse_labels)
- md.merge_mapping('ulimits', parse_flat_dict)
- md.merge_mapping('networks', parse_networks)
- md.merge_mapping('sysctls', parse_sysctls)
- md.merge_mapping('depends_on', parse_depends_on)
- md.merge_sequence('links', ServiceLink.parse)
- md.merge_sequence('secrets', types.ServiceSecret.parse)
- md.merge_sequence('configs', types.ServiceConfig.parse)
- md.merge_mapping('extra_hosts', parse_extra_hosts)
- for field in ['volumes', 'devices']:
- md.merge_field(field, merge_path_mappings)
- for field in [
- 'cap_add', 'cap_drop', 'expose', 'external_links',
- 'security_opt', 'volumes_from', 'device_cgroup_rules',
- ]:
- md.merge_field(field, merge_unique_items_lists, default=[])
- for field in ['dns', 'dns_search', 'env_file', 'tmpfs']:
- md.merge_field(field, merge_list_or_string)
- md.merge_field('logging', merge_logging, default={})
- merge_ports(md, base, override)
- md.merge_field('blkio_config', merge_blkio_config, default={})
- md.merge_field('healthcheck', merge_healthchecks, default={})
- md.merge_field('deploy', merge_deploy, default={})
- for field in set(ALLOWED_KEYS) - set(md):
- md.merge_scalar(field)
- if version == V1:
- legacy_v1_merge_image_or_build(md, base, override)
- elif md.needs_merge('build'):
- md['build'] = merge_build(md, base, override)
- return dict(md)
- def merge_unique_items_lists(base, override):
- override = [str(o) for o in override]
- base = [str(b) for b in base]
- return sorted(set().union(base, override))
- def merge_healthchecks(base, override):
- if override.get('disabled') is True:
- return override
- result = base.copy()
- result.update(override)
- return result
- def merge_ports(md, base, override):
- def parse_sequence_func(seq):
- acc = []
- for item in seq:
- acc.extend(ServicePort.parse(item))
- return to_mapping(acc, 'merge_field')
- field = 'ports'
- if not md.needs_merge(field):
- return
- merged = parse_sequence_func(md.base.get(field, []))
- merged.update(parse_sequence_func(md.override.get(field, [])))
- md[field] = [item for item in sorted(merged.values(), key=lambda x: x.target)]
- def merge_build(output, base, override):
- def to_dict(service):
- build_config = service.get('build', {})
- if isinstance(build_config, six.string_types):
- return {'context': build_config}
- return build_config
- md = MergeDict(to_dict(base), to_dict(override))
- md.merge_scalar('context')
- md.merge_scalar('dockerfile')
- md.merge_scalar('network')
- md.merge_scalar('target')
- md.merge_scalar('shm_size')
- md.merge_mapping('args', parse_build_arguments)
- md.merge_field('cache_from', merge_unique_items_lists, default=[])
- md.merge_mapping('labels', parse_labels)
- md.merge_mapping('extra_hosts', parse_extra_hosts)
- return dict(md)
- def merge_deploy(base, override):
- md = MergeDict(base or {}, override or {})
- md.merge_scalar('mode')
- md.merge_scalar('endpoint_mode')
- md.merge_scalar('replicas')
- md.merge_mapping('labels', parse_labels)
- md.merge_mapping('update_config')
- md.merge_mapping('restart_policy')
- if md.needs_merge('resources'):
- resources_md = MergeDict(md.base.get('resources') or {}, md.override.get('resources') or {})
- resources_md.merge_mapping('limits')
- resources_md.merge_field('reservations', merge_reservations, default={})
- md['resources'] = dict(resources_md)
- if md.needs_merge('placement'):
- placement_md = MergeDict(md.base.get('placement') or {}, md.override.get('placement') or {})
- placement_md.merge_field('constraints', merge_unique_items_lists, default=[])
- placement_md.merge_field('preferences', merge_unique_objects_lists, default=[])
- md['placement'] = dict(placement_md)
- return dict(md)
- def merge_reservations(base, override):
- md = MergeDict(base, override)
- md.merge_scalar('cpus')
- md.merge_scalar('memory')
- md.merge_sequence('generic_resources', types.GenericResource.parse)
- return dict(md)
- def merge_unique_objects_lists(base, override):
- result = dict((json_hash(i), i) for i in base + override)
- return [i[1] for i in sorted([(k, v) for k, v in result.items()], key=lambda x: x[0])]
- def merge_blkio_config(base, override):
- md = MergeDict(base, override)
- md.merge_scalar('weight')
- def merge_blkio_limits(base, override):
- index = dict((b['path'], b) for b in base)
- for o in override:
- index[o['path']] = o
- return sorted(list(index.values()), key=lambda x: x['path'])
- for field in [
- "device_read_bps", "device_read_iops", "device_write_bps",
- "device_write_iops", "weight_device",
- ]:
- md.merge_field(field, merge_blkio_limits, default=[])
- return dict(md)
- def merge_logging(base, override):
- md = MergeDict(base, override)
- md.merge_scalar('driver')
- if md.get('driver') == base.get('driver') or base.get('driver') is None:
- md.merge_mapping('options', lambda m: m or {})
- elif override.get('options'):
- md['options'] = override.get('options', {})
- return dict(md)
- def legacy_v1_merge_image_or_build(output, base, override):
- output.pop('image', None)
- output.pop('build', None)
- if 'image' in override:
- output['image'] = override['image']
- elif 'build' in override:
- output['build'] = override['build']
- elif 'image' in base:
- output['image'] = base['image']
- elif 'build' in base:
- output['build'] = base['build']
- def merge_environment(base, override):
- env = parse_environment(base)
- env.update(parse_environment(override))
- return env
- def merge_labels(base, override):
- labels = parse_labels(base)
- labels.update(parse_labels(override))
- return labels
- def split_kv(kvpair):
- if '=' in kvpair:
- return kvpair.split('=', 1)
- else:
- return kvpair, ''
- def parse_dict_or_list(split_func, type_name, arguments):
- if not arguments:
- return {}
- if isinstance(arguments, list):
- return dict(split_func(e) for e in arguments)
- if isinstance(arguments, dict):
- return dict(arguments)
- raise ConfigurationError(
- "%s \"%s\" must be a list or mapping," %
- (type_name, arguments)
- )
- parse_build_arguments = functools.partial(parse_dict_or_list, split_env, 'build arguments')
- parse_environment = functools.partial(parse_dict_or_list, split_env, 'environment')
- parse_labels = functools.partial(parse_dict_or_list, split_kv, 'labels')
- parse_networks = functools.partial(parse_dict_or_list, lambda k: (k, None), 'networks')
- parse_sysctls = functools.partial(parse_dict_or_list, split_kv, 'sysctls')
- parse_depends_on = functools.partial(
- parse_dict_or_list, lambda k: (k, {'condition': 'service_started'}), 'depends_on'
- )
- def parse_flat_dict(d):
- if not d:
- return {}
- if isinstance(d, dict):
- return dict(d)
- raise ConfigurationError("Invalid type: expected mapping")
- def resolve_env_var(key, val, environment):
- if val is not None:
- return key, val
- elif environment and key in environment:
- return key, environment[key]
- else:
- return key, None
- def resolve_volume_paths(working_dir, service_dict):
- return [
- resolve_volume_path(working_dir, volume)
- for volume in service_dict['volumes']
- ]
- def resolve_volume_path(working_dir, volume):
- if isinstance(volume, dict):
- if volume.get('source', '').startswith('.') and volume['type'] == 'bind':
- volume['source'] = expand_path(working_dir, volume['source'])
- return volume
- mount_params = None
- container_path, mount_params = split_path_mapping(volume)
- if mount_params is not None:
- host_path, mode = mount_params
- if host_path is None:
- return container_path
- if host_path.startswith('.'):
- host_path = expand_path(working_dir, host_path)
- host_path = os.path.expanduser(host_path)
- return u"{}:{}{}".format(host_path, container_path, (':' + mode if mode else ''))
- return container_path
- def normalize_build(service_dict, working_dir, environment):
- if 'build' in service_dict:
- build = {}
- # Shortcut where specifying a string is treated as the build context
- if isinstance(service_dict['build'], six.string_types):
- build['context'] = service_dict.pop('build')
- else:
- build.update(service_dict['build'])
- if 'args' in build:
- build['args'] = build_string_dict(
- resolve_build_args(build.get('args'), environment)
- )
- service_dict['build'] = build
- def resolve_build_path(working_dir, build_path):
- if is_url(build_path):
- return build_path
- return expand_path(working_dir, build_path)
- def is_url(build_path):
- return build_path.startswith(DOCKER_VALID_URL_PREFIXES)
- def validate_paths(service_dict):
- if 'build' in service_dict:
- build = service_dict.get('build', {})
- if isinstance(build, six.string_types):
- build_path = build
- elif isinstance(build, dict) and 'context' in build:
- build_path = build['context']
- else:
- # We have a build section but no context, so nothing to validate
- return
- if (
- not is_url(build_path) and
- (not os.path.exists(build_path) or not os.access(build_path, os.R_OK))
- ):
- raise ConfigurationError(
- "build path %s either does not exist, is not accessible, "
- "or is not a valid URL." % build_path)
- def merge_path_mappings(base, override):
- d = dict_from_path_mappings(base)
- d.update(dict_from_path_mappings(override))
- return path_mappings_from_dict(d)
- def dict_from_path_mappings(path_mappings):
- if path_mappings:
- return dict(split_path_mapping(v) for v in path_mappings)
- else:
- return {}
- def path_mappings_from_dict(d):
- return [join_path_mapping(v) for v in sorted(d.items())]
- def split_path_mapping(volume_path):
- """
- Ascertain if the volume_path contains a host path as well as a container
- path. Using splitdrive so windows absolute paths won't cause issues with
- splitting on ':'.
- """
- if isinstance(volume_path, dict):
- return (volume_path.get('target'), volume_path)
- drive, volume_config = splitdrive(volume_path)
- if ':' in volume_config:
- (host, container) = volume_config.split(':', 1)
- container_drive, container_path = splitdrive(container)
- mode = None
- if ':' in container_path:
- container_path, mode = container_path.rsplit(':', 1)
- return (container_drive + container_path, (drive + host, mode))
- else:
- return (volume_path, None)
- def process_security_opt(service_dict):
- security_opts = service_dict.get('security_opt', [])
- result = []
- for value in security_opts:
- result.append(SecurityOpt.parse(value))
- if result:
- service_dict['security_opt'] = result
- return service_dict
- def join_path_mapping(pair):
- (container, host) = pair
- if isinstance(host, dict):
- return host
- elif host is None:
- return container
- else:
- host, mode = host
- result = ":".join((host, container))
- if mode:
- result += ":" + mode
- return result
- def expand_path(working_dir, path):
- return os.path.abspath(os.path.join(working_dir, os.path.expanduser(path)))
- def merge_list_or_string(base, override):
- return to_list(base) + to_list(override)
- def to_list(value):
- if value is None:
- return []
- elif isinstance(value, six.string_types):
- return [value]
- else:
- return value
- def to_mapping(sequence, key_field):
- return {getattr(item, key_field): item for item in sequence}
- def has_uppercase(name):
- return any(char in string.ascii_uppercase for char in name)
- def load_yaml(filename):
- try:
- with open(filename, 'r') as fh:
- return yaml.safe_load(fh)
- except (IOError, yaml.YAMLError) as e:
- error_name = getattr(e, '__module__', '') + '.' + e.__class__.__name__
- raise ConfigurationError(u"{}: {}".format(error_name, e))
|