create.go 27 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993
  1. /*
  2. Copyright 2020 Docker Compose CLI authors
  3. Licensed under the Apache License, Version 2.0 (the "License");
  4. you may not use this file except in compliance with the License.
  5. You may obtain a copy of the License at
  6. http://www.apache.org/licenses/LICENSE-2.0
  7. Unless required by applicable law or agreed to in writing, software
  8. distributed under the License is distributed on an "AS IS" BASIS,
  9. WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
  10. See the License for the specific language governing permissions and
  11. limitations under the License.
  12. */
  13. package compose
  14. import (
  15. "context"
  16. "fmt"
  17. "path"
  18. "path/filepath"
  19. "strconv"
  20. "strings"
  21. "github.com/compose-spec/compose-go/types"
  22. moby "github.com/docker/docker/api/types"
  23. "github.com/docker/docker/api/types/blkiodev"
  24. "github.com/docker/docker/api/types/container"
  25. "github.com/docker/docker/api/types/mount"
  26. "github.com/docker/docker/api/types/network"
  27. "github.com/docker/docker/api/types/strslice"
  28. volume_api "github.com/docker/docker/api/types/volume"
  29. "github.com/docker/docker/errdefs"
  30. "github.com/docker/go-connections/nat"
  31. "github.com/docker/go-units"
  32. "github.com/pkg/errors"
  33. "github.com/sirupsen/logrus"
  34. "github.com/docker/compose-cli/pkg/api"
  35. "github.com/docker/compose-cli/pkg/progress"
  36. "github.com/docker/compose-cli/pkg/utils"
  37. )
  38. func (s *composeService) Create(ctx context.Context, project *types.Project, options api.CreateOptions) error {
  39. return progress.Run(ctx, func(ctx context.Context) error {
  40. return s.create(ctx, project, options)
  41. })
  42. }
  43. func (s *composeService) create(ctx context.Context, project *types.Project, options api.CreateOptions) error {
  44. if len(options.Services) == 0 {
  45. options.Services = project.ServiceNames()
  46. }
  47. var observedState Containers
  48. observedState, err := s.getContainers(ctx, project.Name, oneOffInclude, true)
  49. if err != nil {
  50. return err
  51. }
  52. containerState := NewContainersState(observedState)
  53. ctx = context.WithValue(ctx, ContainersKey{}, containerState)
  54. err = s.ensureImagesExists(ctx, project, observedState, options.QuietPull)
  55. if err != nil {
  56. return err
  57. }
  58. prepareNetworks(project)
  59. err = prepareVolumes(project)
  60. if err != nil {
  61. return err
  62. }
  63. if err := s.ensureNetworks(ctx, project.Networks); err != nil {
  64. return err
  65. }
  66. if err := s.ensureProjectVolumes(ctx, project); err != nil {
  67. return err
  68. }
  69. allServices := project.AllServices()
  70. allServiceNames := []string{}
  71. for _, service := range allServices {
  72. allServiceNames = append(allServiceNames, service.Name)
  73. }
  74. orphans := observedState.filter(isNotService(allServiceNames...))
  75. if len(orphans) > 0 {
  76. if options.RemoveOrphans {
  77. w := progress.ContextWriter(ctx)
  78. err := s.removeContainers(ctx, w, orphans, nil, false)
  79. if err != nil {
  80. return err
  81. }
  82. } else {
  83. logrus.Warnf("Found orphan containers (%s) for this project. If "+
  84. "you removed or renamed this service in your compose "+
  85. "file, you can run this command with the "+
  86. "--remove-orphans flag to clean it up.", orphans.names())
  87. }
  88. }
  89. prepareServicesDependsOn(project)
  90. return InDependencyOrder(ctx, project, func(c context.Context, service types.ServiceConfig) error {
  91. if utils.StringContains(options.Services, service.Name) {
  92. return s.ensureService(c, project, service, options.Recreate, options.Inherit, options.Timeout)
  93. }
  94. return s.ensureService(c, project, service, options.RecreateDependencies, options.Inherit, options.Timeout)
  95. })
  96. }
  97. func prepareVolumes(p *types.Project) error {
  98. for i := range p.Services {
  99. volumesFrom, dependServices, err := getVolumesFrom(p, p.Services[i].VolumesFrom)
  100. if err != nil {
  101. return err
  102. }
  103. p.Services[i].VolumesFrom = volumesFrom
  104. if len(dependServices) > 0 {
  105. if p.Services[i].DependsOn == nil {
  106. p.Services[i].DependsOn = make(types.DependsOnConfig, len(dependServices))
  107. }
  108. for _, service := range p.Services {
  109. if utils.StringContains(dependServices, service.Name) {
  110. p.Services[i].DependsOn[service.Name] = types.ServiceDependency{
  111. Condition: types.ServiceConditionStarted,
  112. }
  113. }
  114. }
  115. }
  116. }
  117. return nil
  118. }
  119. func prepareNetworks(project *types.Project) {
  120. for k, network := range project.Networks {
  121. network.Labels = network.Labels.Add(api.NetworkLabel, k)
  122. network.Labels = network.Labels.Add(api.ProjectLabel, project.Name)
  123. network.Labels = network.Labels.Add(api.VersionLabel, api.ComposeVersion)
  124. project.Networks[k] = network
  125. }
  126. }
  127. func prepareServicesDependsOn(p *types.Project) {
  128. outLoop:
  129. for i := range p.Services {
  130. networkDependency := getDependentServiceFromMode(p.Services[i].NetworkMode)
  131. ipcDependency := getDependentServiceFromMode(p.Services[i].Ipc)
  132. pidDependency := getDependentServiceFromMode(p.Services[i].Pid)
  133. if networkDependency == "" && ipcDependency == "" && pidDependency == "" {
  134. continue
  135. }
  136. if p.Services[i].DependsOn == nil {
  137. p.Services[i].DependsOn = make(types.DependsOnConfig)
  138. }
  139. for _, service := range p.Services {
  140. if service.Name == networkDependency || service.Name == ipcDependency || service.Name == pidDependency {
  141. p.Services[i].DependsOn[service.Name] = types.ServiceDependency{
  142. Condition: types.ServiceConditionStarted,
  143. }
  144. continue outLoop
  145. }
  146. }
  147. }
  148. }
  149. func (s *composeService) ensureNetworks(ctx context.Context, networks types.Networks) error {
  150. for _, network := range networks {
  151. err := s.ensureNetwork(ctx, network)
  152. if err != nil {
  153. return err
  154. }
  155. }
  156. return nil
  157. }
  158. func (s *composeService) ensureProjectVolumes(ctx context.Context, project *types.Project) error {
  159. for k, volume := range project.Volumes {
  160. volume.Labels = volume.Labels.Add(api.VolumeLabel, k)
  161. volume.Labels = volume.Labels.Add(api.ProjectLabel, project.Name)
  162. volume.Labels = volume.Labels.Add(api.VersionLabel, api.ComposeVersion)
  163. err := s.ensureVolume(ctx, volume)
  164. if err != nil {
  165. return err
  166. }
  167. }
  168. return nil
  169. }
  170. func getImageName(service types.ServiceConfig, projectName string) string {
  171. imageName := service.Image
  172. if imageName == "" {
  173. imageName = projectName + "_" + service.Name
  174. }
  175. return imageName
  176. }
  177. func (s *composeService) getCreateOptions(ctx context.Context, p *types.Project, service types.ServiceConfig, number int, inherit *moby.Container,
  178. autoRemove bool) (*container.Config, *container.HostConfig, *network.NetworkingConfig, error) {
  179. hash, err := ServiceHash(service)
  180. if err != nil {
  181. return nil, nil, nil, err
  182. }
  183. labels := map[string]string{}
  184. for k, v := range service.Labels {
  185. labels[k] = v
  186. }
  187. labels[api.ProjectLabel] = p.Name
  188. labels[api.ServiceLabel] = service.Name
  189. labels[api.VersionLabel] = api.ComposeVersion
  190. if _, ok := service.Labels[api.OneoffLabel]; !ok {
  191. labels[api.OneoffLabel] = "False"
  192. }
  193. labels[api.ConfigHashLabel] = hash
  194. labels[api.WorkingDirLabel] = p.WorkingDir
  195. labels[api.ConfigFilesLabel] = strings.Join(p.ComposeFiles, ",")
  196. labels[api.ContainerNumberLabel] = strconv.Itoa(number)
  197. var (
  198. runCmd strslice.StrSlice
  199. entrypoint strslice.StrSlice
  200. )
  201. if len(service.Command) > 0 {
  202. runCmd = strslice.StrSlice(service.Command)
  203. }
  204. if len(service.Entrypoint) > 0 {
  205. entrypoint = strslice.StrSlice(service.Entrypoint)
  206. }
  207. var (
  208. tty = service.Tty
  209. stdinOpen = service.StdinOpen
  210. attachStdin = false
  211. )
  212. volumeMounts, binds, mounts, err := s.buildContainerVolumes(ctx, *p, service, inherit)
  213. if err != nil {
  214. return nil, nil, nil, err
  215. }
  216. containerConfig := container.Config{
  217. Hostname: service.Hostname,
  218. Domainname: service.DomainName,
  219. User: service.User,
  220. ExposedPorts: buildContainerPorts(service),
  221. Tty: tty,
  222. OpenStdin: stdinOpen,
  223. StdinOnce: attachStdin && stdinOpen,
  224. AttachStdin: attachStdin,
  225. AttachStderr: true,
  226. AttachStdout: true,
  227. Cmd: runCmd,
  228. Image: getImageName(service, p.Name),
  229. WorkingDir: service.WorkingDir,
  230. Entrypoint: entrypoint,
  231. NetworkDisabled: service.NetworkMode == "disabled",
  232. MacAddress: service.MacAddress,
  233. Labels: labels,
  234. StopSignal: service.StopSignal,
  235. Env: ToMobyEnv(service.Environment),
  236. Healthcheck: ToMobyHealthCheck(service.HealthCheck),
  237. Volumes: volumeMounts,
  238. StopTimeout: ToSeconds(service.StopGracePeriod),
  239. }
  240. portBindings := buildContainerPortBindingOptions(service)
  241. resources := getDeployResources(service)
  242. networkMode, err := getMode(ctx, service.Name, service.NetworkMode)
  243. if err != nil {
  244. return nil, nil, nil, err
  245. }
  246. if networkMode == "" {
  247. networkMode = getDefaultNetworkMode(p, service)
  248. }
  249. var networkConfig *network.NetworkingConfig
  250. for _, id := range service.NetworksByPriority() {
  251. net := p.Networks[id]
  252. config := service.Networks[id]
  253. networkConfig = &network.NetworkingConfig{
  254. EndpointsConfig: map[string]*network.EndpointSettings{
  255. net.Name: {
  256. Aliases: getAliases(service, config),
  257. },
  258. },
  259. }
  260. break
  261. }
  262. ipcmode, err := getMode(ctx, service.Name, service.Ipc)
  263. if err != nil {
  264. return nil, nil, nil, err
  265. }
  266. tmpfs := map[string]string{}
  267. for _, t := range service.Tmpfs {
  268. if arr := strings.SplitN(t, ":", 2); len(arr) > 1 {
  269. tmpfs[arr[0]] = arr[1]
  270. } else {
  271. tmpfs[arr[0]] = ""
  272. }
  273. }
  274. var logConfig container.LogConfig
  275. if service.Logging != nil {
  276. logConfig = container.LogConfig{
  277. Type: service.Logging.Driver,
  278. Config: service.Logging.Options,
  279. }
  280. }
  281. hostConfig := container.HostConfig{
  282. AutoRemove: autoRemove,
  283. Binds: binds,
  284. Mounts: mounts,
  285. CapAdd: strslice.StrSlice(service.CapAdd),
  286. CapDrop: strslice.StrSlice(service.CapDrop),
  287. NetworkMode: container.NetworkMode(networkMode),
  288. Init: service.Init,
  289. IpcMode: container.IpcMode(ipcmode),
  290. ReadonlyRootfs: service.ReadOnly,
  291. RestartPolicy: getRestartPolicy(service),
  292. ShmSize: int64(service.ShmSize),
  293. Sysctls: service.Sysctls,
  294. PortBindings: portBindings,
  295. Resources: resources,
  296. VolumeDriver: service.VolumeDriver,
  297. VolumesFrom: service.VolumesFrom,
  298. DNS: service.DNS,
  299. DNSSearch: service.DNSSearch,
  300. DNSOptions: service.DNSOpts,
  301. ExtraHosts: service.ExtraHosts,
  302. SecurityOpt: service.SecurityOpt,
  303. UsernsMode: container.UsernsMode(service.UserNSMode),
  304. Privileged: service.Privileged,
  305. PidMode: container.PidMode(service.Pid),
  306. Tmpfs: tmpfs,
  307. Isolation: container.Isolation(service.Isolation),
  308. LogConfig: logConfig,
  309. }
  310. return &containerConfig, &hostConfig, networkConfig, nil
  311. }
  312. func getDefaultNetworkMode(project *types.Project, service types.ServiceConfig) string {
  313. mode := "none"
  314. if len(project.Networks) > 0 {
  315. for name := range getNetworksForService(service) {
  316. mode = project.Networks[name].Name
  317. break
  318. }
  319. }
  320. return mode
  321. }
  322. func getRestartPolicy(service types.ServiceConfig) container.RestartPolicy {
  323. var restart container.RestartPolicy
  324. if service.Restart != "" {
  325. split := strings.Split(service.Restart, ":")
  326. var attempts int
  327. if len(split) > 1 {
  328. attempts, _ = strconv.Atoi(split[1])
  329. }
  330. restart = container.RestartPolicy{
  331. Name: split[0],
  332. MaximumRetryCount: attempts,
  333. }
  334. }
  335. if service.Deploy != nil && service.Deploy.RestartPolicy != nil {
  336. policy := *service.Deploy.RestartPolicy
  337. var attempts int
  338. if policy.MaxAttempts != nil {
  339. attempts = int(*policy.MaxAttempts)
  340. }
  341. restart = container.RestartPolicy{
  342. Name: policy.Condition,
  343. MaximumRetryCount: attempts,
  344. }
  345. }
  346. return restart
  347. }
  348. func getDeployResources(s types.ServiceConfig) container.Resources {
  349. var swappiness *int64
  350. if s.MemSwappiness != 0 {
  351. val := int64(s.MemSwappiness)
  352. swappiness = &val
  353. }
  354. resources := container.Resources{
  355. CgroupParent: s.CgroupParent,
  356. Memory: int64(s.MemLimit),
  357. MemorySwap: int64(s.MemSwapLimit),
  358. MemorySwappiness: swappiness,
  359. MemoryReservation: int64(s.MemReservation),
  360. CPUCount: s.CPUCount,
  361. CPUPeriod: s.CPUPeriod,
  362. CPUQuota: s.CPUQuota,
  363. CPURealtimePeriod: s.CPURTPeriod,
  364. CPURealtimeRuntime: s.CPURTRuntime,
  365. CPUShares: s.CPUShares,
  366. CPUPercent: int64(s.CPUS * 100),
  367. CpusetCpus: s.CPUSet,
  368. }
  369. setBlkio(s.BlkioConfig, &resources)
  370. if s.Deploy != nil {
  371. setLimits(s.Deploy.Resources.Limits, &resources)
  372. setReservations(s.Deploy.Resources.Reservations, &resources)
  373. }
  374. for _, device := range s.Devices {
  375. // FIXME should use docker/cli parseDevice, unfortunately private
  376. src := ""
  377. dst := ""
  378. permissions := "rwm"
  379. arr := strings.Split(device, ":")
  380. switch len(arr) {
  381. case 3:
  382. permissions = arr[2]
  383. fallthrough
  384. case 2:
  385. dst = arr[1]
  386. fallthrough
  387. case 1:
  388. src = arr[0]
  389. }
  390. resources.Devices = append(resources.Devices, container.DeviceMapping{
  391. PathOnHost: src,
  392. PathInContainer: dst,
  393. CgroupPermissions: permissions,
  394. })
  395. }
  396. for name, u := range s.Ulimits {
  397. soft := u.Single
  398. if u.Soft != 0 {
  399. soft = u.Soft
  400. }
  401. hard := u.Single
  402. if u.Hard != 0 {
  403. hard = u.Hard
  404. }
  405. resources.Ulimits = append(resources.Ulimits, &units.Ulimit{
  406. Name: name,
  407. Hard: int64(hard),
  408. Soft: int64(soft),
  409. })
  410. }
  411. return resources
  412. }
  413. func setReservations(reservations *types.Resource, resources *container.Resources) {
  414. if reservations == nil {
  415. return
  416. }
  417. for _, device := range reservations.Devices {
  418. resources.DeviceRequests = append(resources.DeviceRequests, container.DeviceRequest{
  419. Capabilities: [][]string{device.Capabilities},
  420. Count: int(device.Count),
  421. DeviceIDs: device.IDs,
  422. Driver: device.Driver,
  423. })
  424. }
  425. }
  426. func setLimits(limits *types.Resource, resources *container.Resources) {
  427. if limits == nil {
  428. return
  429. }
  430. if limits.MemoryBytes != 0 {
  431. resources.Memory = int64(limits.MemoryBytes)
  432. }
  433. if limits.NanoCPUs != "" {
  434. i, _ := strconv.ParseInt(limits.NanoCPUs, 10, 64)
  435. resources.NanoCPUs = i
  436. }
  437. }
  438. func setBlkio(blkio *types.BlkioConfig, resources *container.Resources) {
  439. if blkio == nil {
  440. return
  441. }
  442. resources.BlkioWeight = blkio.Weight
  443. for _, b := range blkio.WeightDevice {
  444. resources.BlkioWeightDevice = append(resources.BlkioWeightDevice, &blkiodev.WeightDevice{
  445. Path: b.Path,
  446. Weight: b.Weight,
  447. })
  448. }
  449. for _, b := range blkio.DeviceReadBps {
  450. resources.BlkioDeviceReadBps = append(resources.BlkioDeviceReadBps, &blkiodev.ThrottleDevice{
  451. Path: b.Path,
  452. Rate: b.Rate,
  453. })
  454. }
  455. for _, b := range blkio.DeviceReadIOps {
  456. resources.BlkioDeviceReadIOps = append(resources.BlkioDeviceReadIOps, &blkiodev.ThrottleDevice{
  457. Path: b.Path,
  458. Rate: b.Rate,
  459. })
  460. }
  461. for _, b := range blkio.DeviceWriteBps {
  462. resources.BlkioDeviceWriteBps = append(resources.BlkioDeviceWriteBps, &blkiodev.ThrottleDevice{
  463. Path: b.Path,
  464. Rate: b.Rate,
  465. })
  466. }
  467. for _, b := range blkio.DeviceWriteIOps {
  468. resources.BlkioDeviceWriteIOps = append(resources.BlkioDeviceWriteIOps, &blkiodev.ThrottleDevice{
  469. Path: b.Path,
  470. Rate: b.Rate,
  471. })
  472. }
  473. }
  474. func buildContainerPorts(s types.ServiceConfig) nat.PortSet {
  475. ports := nat.PortSet{}
  476. for _, p := range s.Ports {
  477. p := nat.Port(fmt.Sprintf("%d/%s", p.Target, p.Protocol))
  478. ports[p] = struct{}{}
  479. }
  480. return ports
  481. }
  482. func buildContainerPortBindingOptions(s types.ServiceConfig) nat.PortMap {
  483. bindings := nat.PortMap{}
  484. for _, port := range s.Ports {
  485. p := nat.Port(fmt.Sprintf("%d/%s", port.Target, port.Protocol))
  486. bind := bindings[p]
  487. binding := nat.PortBinding{
  488. HostIP: port.HostIP,
  489. }
  490. if port.Published > 0 {
  491. binding.HostPort = fmt.Sprint(port.Published)
  492. }
  493. bind = append(bind, binding)
  494. bindings[p] = bind
  495. }
  496. return bindings
  497. }
  498. func getVolumesFrom(project *types.Project, volumesFrom []string) ([]string, []string, error) {
  499. var volumes = []string{}
  500. var services = []string{}
  501. // parse volumes_from
  502. if len(volumesFrom) == 0 {
  503. return volumes, services, nil
  504. }
  505. for _, vol := range volumesFrom {
  506. spec := strings.Split(vol, ":")
  507. if len(spec) == 0 {
  508. continue
  509. }
  510. if spec[0] == "container" {
  511. volumes = append(volumes, strings.Join(spec[1:], ":"))
  512. continue
  513. }
  514. serviceName := spec[0]
  515. services = append(services, serviceName)
  516. service, err := project.GetService(serviceName)
  517. if err != nil {
  518. return nil, nil, err
  519. }
  520. firstContainer := getContainerName(project.Name, service, 1)
  521. v := fmt.Sprintf("%s:%s", firstContainer, strings.Join(spec[1:], ":"))
  522. volumes = append(volumes, v)
  523. }
  524. return volumes, services, nil
  525. }
  526. func getDependentServiceFromMode(mode string) string {
  527. if strings.HasPrefix(mode, types.NetworkModeServicePrefix) {
  528. return mode[len(types.NetworkModeServicePrefix):]
  529. }
  530. return ""
  531. }
  532. func (s *composeService) buildContainerVolumes(ctx context.Context, p types.Project, service types.ServiceConfig,
  533. inherit *moby.Container) (map[string]struct{}, []string, []mount.Mount, error) {
  534. var mounts = []mount.Mount{}
  535. image := getImageName(service, p.Name)
  536. imgInspect, _, err := s.apiClient.ImageInspectWithRaw(ctx, image)
  537. if err != nil {
  538. return nil, nil, nil, err
  539. }
  540. mountOptions, err := buildContainerMountOptions(p, service, imgInspect, inherit)
  541. if err != nil {
  542. return nil, nil, nil, err
  543. }
  544. volumeMounts := map[string]struct{}{}
  545. binds := []string{}
  546. MOUNTS:
  547. for _, m := range mountOptions {
  548. volumeMounts[m.Target] = struct{}{}
  549. // `Bind` API is used when host path need to be created if missing, `Mount` is preferred otherwise
  550. if m.Type == mount.TypeBind || m.Type == mount.TypeNamedPipe {
  551. for _, v := range service.Volumes {
  552. if v.Target == m.Target && v.Bind != nil && v.Bind.CreateHostPath {
  553. mode := "rw"
  554. if m.ReadOnly {
  555. mode = "ro"
  556. }
  557. binds = append(binds, fmt.Sprintf("%s:%s:%s", m.Source, m.Target, mode))
  558. continue MOUNTS
  559. }
  560. }
  561. }
  562. mounts = append(mounts, m)
  563. }
  564. return volumeMounts, binds, mounts, nil
  565. }
  566. func buildContainerMountOptions(p types.Project, s types.ServiceConfig, img moby.ImageInspect, inherit *moby.Container) ([]mount.Mount, error) {
  567. var mounts = map[string]mount.Mount{}
  568. if inherit != nil {
  569. for _, m := range inherit.Mounts {
  570. if m.Type == "tmpfs" {
  571. continue
  572. }
  573. src := m.Source
  574. if m.Type == "volume" {
  575. src = m.Name
  576. }
  577. m.Destination = path.Clean(m.Destination)
  578. if img.Config != nil {
  579. if _, ok := img.Config.Volumes[m.Destination]; ok {
  580. // inherit previous container's anonymous volume
  581. mounts[m.Destination] = mount.Mount{
  582. Type: m.Type,
  583. Source: src,
  584. Target: m.Destination,
  585. ReadOnly: !m.RW,
  586. }
  587. }
  588. }
  589. }
  590. }
  591. mounts, err := fillBindMounts(p, s, mounts)
  592. if err != nil {
  593. return nil, err
  594. }
  595. values := make([]mount.Mount, 0, len(mounts))
  596. for _, v := range mounts {
  597. values = append(values, v)
  598. }
  599. return values, nil
  600. }
  601. func fillBindMounts(p types.Project, s types.ServiceConfig, m map[string]mount.Mount) (map[string]mount.Mount, error) {
  602. for _, v := range s.Volumes {
  603. bindMount, err := buildMount(p, v)
  604. if err != nil {
  605. return nil, err
  606. }
  607. m[bindMount.Target] = bindMount
  608. }
  609. secrets, err := buildContainerSecretMounts(p, s)
  610. if err != nil {
  611. return nil, err
  612. }
  613. for _, s := range secrets {
  614. if _, found := m[s.Target]; found {
  615. continue
  616. }
  617. m[s.Target] = s
  618. }
  619. configs, err := buildContainerConfigMounts(p, s)
  620. if err != nil {
  621. return nil, err
  622. }
  623. for _, c := range configs {
  624. if _, found := m[c.Target]; found {
  625. continue
  626. }
  627. m[c.Target] = c
  628. }
  629. return m, nil
  630. }
  631. func buildContainerConfigMounts(p types.Project, s types.ServiceConfig) ([]mount.Mount, error) {
  632. var mounts = map[string]mount.Mount{}
  633. configsBaseDir := "/"
  634. for _, config := range s.Configs {
  635. target := config.Target
  636. if config.Target == "" {
  637. target = configsBaseDir + config.Source
  638. } else if !isUnixAbs(config.Target) {
  639. target = configsBaseDir + config.Target
  640. }
  641. definedConfig := p.Configs[config.Source]
  642. if definedConfig.External.External {
  643. return nil, fmt.Errorf("unsupported external config %s", definedConfig.Name)
  644. }
  645. bindMount, err := buildMount(p, types.ServiceVolumeConfig{
  646. Type: types.VolumeTypeBind,
  647. Source: definedConfig.File,
  648. Target: target,
  649. ReadOnly: true,
  650. })
  651. if err != nil {
  652. return nil, err
  653. }
  654. mounts[target] = bindMount
  655. }
  656. values := make([]mount.Mount, 0, len(mounts))
  657. for _, v := range mounts {
  658. values = append(values, v)
  659. }
  660. return values, nil
  661. }
  662. func buildContainerSecretMounts(p types.Project, s types.ServiceConfig) ([]mount.Mount, error) {
  663. var mounts = map[string]mount.Mount{}
  664. secretsDir := "/run/secrets/"
  665. for _, secret := range s.Secrets {
  666. target := secret.Target
  667. if secret.Target == "" {
  668. target = secretsDir + secret.Source
  669. } else if !isUnixAbs(secret.Target) {
  670. target = secretsDir + secret.Target
  671. }
  672. definedSecret := p.Secrets[secret.Source]
  673. if definedSecret.External.External {
  674. return nil, fmt.Errorf("unsupported external secret %s", definedSecret.Name)
  675. }
  676. mount, err := buildMount(p, types.ServiceVolumeConfig{
  677. Type: types.VolumeTypeBind,
  678. Source: definedSecret.File,
  679. Target: target,
  680. ReadOnly: true,
  681. })
  682. if err != nil {
  683. return nil, err
  684. }
  685. mounts[target] = mount
  686. }
  687. values := make([]mount.Mount, 0, len(mounts))
  688. for _, v := range mounts {
  689. values = append(values, v)
  690. }
  691. return values, nil
  692. }
  693. func isUnixAbs(path string) bool {
  694. return strings.HasPrefix(path, "/")
  695. }
  696. func buildMount(project types.Project, volume types.ServiceVolumeConfig) (mount.Mount, error) {
  697. source := volume.Source
  698. // on windows, filepath.IsAbs(source) is false for unix style abs path like /var/run/docker.sock.
  699. // do not replace these with filepath.Abs(source) that will include a default drive.
  700. if volume.Type == types.VolumeTypeBind && !filepath.IsAbs(source) && !strings.HasPrefix(source, "/") {
  701. // volume source has already been prefixed with workdir if required, by compose-go project loader
  702. var err error
  703. source, err = filepath.Abs(source)
  704. if err != nil {
  705. return mount.Mount{}, err
  706. }
  707. }
  708. if volume.Type == types.VolumeTypeVolume {
  709. if volume.Source != "" {
  710. pVolume, ok := project.Volumes[volume.Source]
  711. if ok {
  712. source = pVolume.Name
  713. }
  714. }
  715. }
  716. bind, vol, tmpfs := buildMountOptions(volume)
  717. volume.Target = path.Clean(volume.Target)
  718. return mount.Mount{
  719. Type: mount.Type(volume.Type),
  720. Source: source,
  721. Target: volume.Target,
  722. ReadOnly: volume.ReadOnly,
  723. Consistency: mount.Consistency(volume.Consistency),
  724. BindOptions: bind,
  725. VolumeOptions: vol,
  726. TmpfsOptions: tmpfs,
  727. }, nil
  728. }
  729. func buildMountOptions(volume types.ServiceVolumeConfig) (*mount.BindOptions, *mount.VolumeOptions, *mount.TmpfsOptions) {
  730. switch volume.Type {
  731. case "bind":
  732. if volume.Volume != nil {
  733. logrus.Warnf("mount of type `bind` should not define `volume` option")
  734. }
  735. if volume.Tmpfs != nil {
  736. logrus.Warnf("mount of type `tmpfs` should not define `tmpfs` option")
  737. }
  738. return buildBindOption(volume.Bind), nil, nil
  739. case "volume":
  740. if volume.Bind != nil {
  741. logrus.Warnf("mount of type `volume` should not define `bind` option")
  742. }
  743. if volume.Tmpfs != nil {
  744. logrus.Warnf("mount of type `volume` should not define `tmpfs` option")
  745. }
  746. return nil, buildVolumeOptions(volume.Volume), nil
  747. case "tmpfs":
  748. if volume.Bind != nil {
  749. logrus.Warnf("mount of type `tmpfs` should not define `bind` option")
  750. }
  751. if volume.Tmpfs != nil {
  752. logrus.Warnf("mount of type `tmpfs` should not define `volumeZ` option")
  753. }
  754. return nil, nil, buildTmpfsOptions(volume.Tmpfs)
  755. }
  756. return nil, nil, nil
  757. }
  758. func buildBindOption(bind *types.ServiceVolumeBind) *mount.BindOptions {
  759. if bind == nil {
  760. return nil
  761. }
  762. return &mount.BindOptions{
  763. Propagation: mount.Propagation(bind.Propagation),
  764. // NonRecursive: false, FIXME missing from model ?
  765. }
  766. }
  767. func buildVolumeOptions(vol *types.ServiceVolumeVolume) *mount.VolumeOptions {
  768. if vol == nil {
  769. return nil
  770. }
  771. return &mount.VolumeOptions{
  772. NoCopy: vol.NoCopy,
  773. // Labels: , // FIXME missing from model ?
  774. // DriverConfig: , // FIXME missing from model ?
  775. }
  776. }
  777. func buildTmpfsOptions(tmpfs *types.ServiceVolumeTmpfs) *mount.TmpfsOptions {
  778. if tmpfs == nil {
  779. return nil
  780. }
  781. return &mount.TmpfsOptions{
  782. SizeBytes: tmpfs.Size,
  783. // Mode: , // FIXME missing from model ?
  784. }
  785. }
  786. func getAliases(s types.ServiceConfig, c *types.ServiceNetworkConfig) []string {
  787. aliases := []string{s.Name}
  788. if c != nil {
  789. aliases = append(aliases, c.Aliases...)
  790. }
  791. return aliases
  792. }
  793. func getMode(ctx context.Context, serviceName string, mode string) (string, error) {
  794. cState, err := GetContextContainerState(ctx)
  795. if err != nil {
  796. return "", nil
  797. }
  798. observedState := cState.GetContainers()
  799. depService := getDependentServiceFromMode(mode)
  800. if depService != "" {
  801. depServiceContainers := observedState.filter(isService(depService))
  802. if len(depServiceContainers) > 0 {
  803. return types.NetworkModeContainerPrefix + depServiceContainers[0].ID, nil
  804. }
  805. return "", fmt.Errorf(`no containers started for %q in service %q -> %v`,
  806. mode, serviceName, observedState)
  807. }
  808. return mode, nil
  809. }
  810. func getNetworksForService(s types.ServiceConfig) map[string]*types.ServiceNetworkConfig {
  811. if len(s.Networks) > 0 {
  812. return s.Networks
  813. }
  814. if s.NetworkMode != "" {
  815. return nil
  816. }
  817. return map[string]*types.ServiceNetworkConfig{"default": nil}
  818. }
  819. func (s *composeService) ensureNetwork(ctx context.Context, n types.NetworkConfig) error {
  820. _, err := s.apiClient.NetworkInspect(ctx, n.Name, moby.NetworkInspectOptions{})
  821. if err != nil {
  822. if errdefs.IsNotFound(err) {
  823. if n.External.External {
  824. return fmt.Errorf("network %s declared as external, but could not be found", n.Name)
  825. }
  826. createOpts := moby.NetworkCreate{
  827. // TODO NameSpace Labels
  828. Labels: n.Labels,
  829. Driver: n.Driver,
  830. Options: n.DriverOpts,
  831. Internal: n.Internal,
  832. Attachable: n.Attachable,
  833. }
  834. if n.Ipam.Driver != "" || len(n.Ipam.Config) > 0 {
  835. createOpts.IPAM = &network.IPAM{}
  836. }
  837. if n.Ipam.Driver != "" {
  838. createOpts.IPAM.Driver = n.Ipam.Driver
  839. }
  840. for _, ipamConfig := range n.Ipam.Config {
  841. config := network.IPAMConfig{
  842. Subnet: ipamConfig.Subnet,
  843. }
  844. createOpts.IPAM.Config = append(createOpts.IPAM.Config, config)
  845. }
  846. networkEventName := fmt.Sprintf("Network %s", n.Name)
  847. w := progress.ContextWriter(ctx)
  848. w.Event(progress.CreatingEvent(networkEventName))
  849. if _, err := s.apiClient.NetworkCreate(ctx, n.Name, createOpts); err != nil {
  850. w.Event(progress.ErrorEvent(networkEventName))
  851. return errors.Wrapf(err, "failed to create network %s", n.Name)
  852. }
  853. w.Event(progress.CreatedEvent(networkEventName))
  854. return nil
  855. }
  856. return err
  857. }
  858. return nil
  859. }
  860. func (s *composeService) removeNetwork(ctx context.Context, networkID string, networkName string) error {
  861. w := progress.ContextWriter(ctx)
  862. eventName := fmt.Sprintf("Network %s", networkName)
  863. w.Event(progress.RemovingEvent(eventName))
  864. if err := s.apiClient.NetworkRemove(ctx, networkID); err != nil {
  865. w.Event(progress.ErrorEvent(eventName))
  866. return errors.Wrapf(err, fmt.Sprintf("failed to remove network %s", networkID))
  867. }
  868. w.Event(progress.RemovedEvent(eventName))
  869. return nil
  870. }
  871. func (s *composeService) ensureVolume(ctx context.Context, volume types.VolumeConfig) error {
  872. // TODO could identify volume by label vs name
  873. _, err := s.apiClient.VolumeInspect(ctx, volume.Name)
  874. if err != nil {
  875. if !errdefs.IsNotFound(err) {
  876. return err
  877. }
  878. eventName := fmt.Sprintf("Volume %q", volume.Name)
  879. w := progress.ContextWriter(ctx)
  880. w.Event(progress.CreatingEvent(eventName))
  881. _, err := s.apiClient.VolumeCreate(ctx, volume_api.VolumeCreateBody{
  882. Labels: volume.Labels,
  883. Name: volume.Name,
  884. Driver: volume.Driver,
  885. DriverOpts: volume.DriverOpts,
  886. })
  887. if err != nil {
  888. w.Event(progress.ErrorEvent(eventName))
  889. return err
  890. }
  891. w.Event(progress.CreatedEvent(eventName))
  892. }
  893. return nil
  894. }