123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108 |
- package runconfig
- import (
- "encoding/json"
- "fmt"
- "io"
- "github.com/docker/docker/api/types/container"
- networktypes "github.com/docker/docker/api/types/network"
- "github.com/docker/docker/pkg/sysinfo"
- "github.com/docker/docker/volume"
- )
- // ContainerDecoder implements httputils.ContainerDecoder
- // calling DecodeContainerConfig.
- type ContainerDecoder struct{}
- // DecodeConfig makes ContainerDecoder to implement httputils.ContainerDecoder
- func (r ContainerDecoder) DecodeConfig(src io.Reader) (*container.Config, *container.HostConfig, *networktypes.NetworkingConfig, error) {
- return DecodeContainerConfig(src)
- }
- // DecodeHostConfig makes ContainerDecoder to implement httputils.ContainerDecoder
- func (r ContainerDecoder) DecodeHostConfig(src io.Reader) (*container.HostConfig, error) {
- return DecodeHostConfig(src)
- }
- // DecodeContainerConfig decodes a json encoded config into a ContainerConfigWrapper
- // struct and returns both a Config and a HostConfig struct
- // Be aware this function is not checking whether the resulted structs are nil,
- // it's your business to do so
- func DecodeContainerConfig(src io.Reader) (*container.Config, *container.HostConfig, *networktypes.NetworkingConfig, error) {
- var w ContainerConfigWrapper
- decoder := json.NewDecoder(src)
- if err := decoder.Decode(&w); err != nil {
- return nil, nil, nil, err
- }
- hc := w.getHostConfig()
- // Perform platform-specific processing of Volumes and Binds.
- if w.Config != nil && hc != nil {
- // Initialize the volumes map if currently nil
- if w.Config.Volumes == nil {
- w.Config.Volumes = make(map[string]struct{})
- }
- // Now validate all the volumes and binds
- if err := validateMountSettings(w.Config, hc); err != nil {
- return nil, nil, nil, err
- }
- }
- // Certain parameters need daemon-side validation that cannot be done
- // on the client, as only the daemon knows what is valid for the platform.
- if err := validateNetMode(w.Config, hc); err != nil {
- return nil, nil, nil, err
- }
- // Validate isolation
- if err := validateIsolation(hc); err != nil {
- return nil, nil, nil, err
- }
- // Validate QoS
- if err := validateQoS(hc); err != nil {
- return nil, nil, nil, err
- }
- // Validate Resources
- if err := validateResources(hc, sysinfo.New(true)); err != nil {
- return nil, nil, nil, err
- }
- // Validate Privileged
- if err := validatePrivileged(hc); err != nil {
- return nil, nil, nil, err
- }
- // Validate ReadonlyRootfs
- if err := validateReadonlyRootfs(hc); err != nil {
- return nil, nil, nil, err
- }
- return w.Config, hc, w.NetworkingConfig, nil
- }
- // validateMountSettings validates each of the volumes and bind settings
- // passed by the caller to ensure they are valid.
- func validateMountSettings(c *container.Config, hc *container.HostConfig) error {
- // it is ok to have len(hc.Mounts) > 0 && (len(hc.Binds) > 0 || len (c.Volumes) > 0 || len (hc.Tmpfs) > 0 )
- // Ensure all volumes and binds are valid.
- for spec := range c.Volumes {
- if _, err := volume.ParseMountRaw(spec, hc.VolumeDriver); err != nil {
- return fmt.Errorf("invalid volume spec %q: %v", spec, err)
- }
- }
- for _, spec := range hc.Binds {
- if _, err := volume.ParseMountRaw(spec, hc.VolumeDriver); err != nil {
- return fmt.Errorf("invalid bind mount spec %q: %v", spec, err)
- }
- }
- return nil
- }
|