123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133 |
- package controlapi
- import (
- "regexp"
- "strings"
- "github.com/docker/docker/pkg/plugingetter"
- "github.com/docker/libnetwork/ipamapi"
- "github.com/docker/swarmkit/api"
- "github.com/docker/swarmkit/manager/allocator/networkallocator"
- "github.com/docker/swarmkit/manager/state/store"
- "google.golang.org/grpc"
- "google.golang.org/grpc/codes"
- )
- var isValidDNSName = regexp.MustCompile(`^[a-zA-Z0-9](?:[-_]*[A-Za-z0-9]+)*$`)
- // configs and secrets have different naming requirements from tasks and services
- var isValidConfigOrSecretName = regexp.MustCompile(`^[a-zA-Z0-9]+(?:[a-zA-Z0-9-_.]*[a-zA-Z0-9])?$`)
- func buildFilters(by func(string) store.By, values []string) store.By {
- filters := make([]store.By, 0, len(values))
- for _, v := range values {
- filters = append(filters, by(v))
- }
- return store.Or(filters...)
- }
- func filterContains(match string, candidates []string) bool {
- if len(candidates) == 0 {
- return true
- }
- for _, c := range candidates {
- if c == match {
- return true
- }
- }
- return false
- }
- func filterContainsPrefix(match string, candidates []string) bool {
- if len(candidates) == 0 {
- return true
- }
- for _, c := range candidates {
- if strings.HasPrefix(match, c) {
- return true
- }
- }
- return false
- }
- func filterMatchLabels(match map[string]string, candidates map[string]string) bool {
- if len(candidates) == 0 {
- return true
- }
- for k, v := range candidates {
- c, ok := match[k]
- if !ok {
- return false
- }
- if v != "" && v != c {
- return false
- }
- }
- return true
- }
- func validateAnnotations(m api.Annotations) error {
- if m.Name == "" {
- return grpc.Errorf(codes.InvalidArgument, "meta: name must be provided")
- }
- if !isValidDNSName.MatchString(m.Name) {
- // if the name doesn't match the regex
- return grpc.Errorf(codes.InvalidArgument, "name must be valid as a DNS name component")
- }
- if len(m.Name) > 63 {
- // DNS labels are limited to 63 characters
- return grpc.Errorf(codes.InvalidArgument, "name must be 63 characters or fewer")
- }
- return nil
- }
- func validateConfigOrSecretAnnotations(m api.Annotations) error {
- if m.Name == "" {
- return grpc.Errorf(codes.InvalidArgument, "name must be provided")
- } else if len(m.Name) > 64 || !isValidConfigOrSecretName.MatchString(m.Name) {
- // if the name doesn't match the regex
- return grpc.Errorf(codes.InvalidArgument,
- "invalid name, only 64 [a-zA-Z0-9-_.] characters allowed, and the start and end character must be [a-zA-Z0-9]")
- }
- return nil
- }
- func validateDriver(driver *api.Driver, pg plugingetter.PluginGetter, pluginType string) error {
- if driver == nil {
- // It is ok to not specify the driver. We will choose
- // a default driver.
- return nil
- }
- if driver.Name == "" {
- return grpc.Errorf(codes.InvalidArgument, "driver name: if driver is specified name is required")
- }
- // First check against the known drivers
- switch pluginType {
- case ipamapi.PluginEndpointType:
- if strings.ToLower(driver.Name) == ipamapi.DefaultIPAM {
- return nil
- }
- default:
- if networkallocator.IsBuiltInDriver(driver.Name) {
- return nil
- }
- }
- if pg == nil {
- return grpc.Errorf(codes.InvalidArgument, "plugin %s not supported", driver.Name)
- }
- p, err := pg.Get(driver.Name, pluginType, plugingetter.Lookup)
- if err != nil {
- return grpc.Errorf(codes.InvalidArgument, "error during lookup of plugin %s", driver.Name)
- }
- if p.IsV1() {
- return grpc.Errorf(codes.InvalidArgument, "legacy plugin %s of type %s is not supported in swarm mode", driver.Name, pluginType)
- }
- return nil
- }
|