/vendor/github.com/moby/buildkit/frontend/dockerfile/instructions/commands_runmount.go

https://github.com/dotcloud/docker · Go · 283 lines · 249 code · 32 blank · 2 comment · 98 complexity · 4017bafd3e292c863a875ce2f04cf97c MD5 · raw file

  1. package instructions
  2. import (
  3. "encoding/csv"
  4. "regexp"
  5. "strconv"
  6. "strings"
  7. "github.com/pkg/errors"
  8. )
  9. const MountTypeBind = "bind"
  10. const MountTypeCache = "cache"
  11. const MountTypeTmpfs = "tmpfs"
  12. const MountTypeSecret = "secret"
  13. const MountTypeSSH = "ssh"
  14. var allowedMountTypes = map[string]struct{}{
  15. MountTypeBind: {},
  16. MountTypeCache: {},
  17. MountTypeTmpfs: {},
  18. MountTypeSecret: {},
  19. MountTypeSSH: {},
  20. }
  21. const MountSharingShared = "shared"
  22. const MountSharingPrivate = "private"
  23. const MountSharingLocked = "locked"
  24. var allowedSharingTypes = map[string]struct{}{
  25. MountSharingShared: {},
  26. MountSharingPrivate: {},
  27. MountSharingLocked: {},
  28. }
  29. type mountsKeyT string
  30. var mountsKey = mountsKeyT("dockerfile/run/mounts")
  31. func init() {
  32. parseRunPreHooks = append(parseRunPreHooks, runMountPreHook)
  33. parseRunPostHooks = append(parseRunPostHooks, runMountPostHook)
  34. }
  35. func isValidMountType(s string) bool {
  36. if s == "secret" {
  37. if !isSecretMountsSupported() {
  38. return false
  39. }
  40. }
  41. if s == "ssh" {
  42. if !isSSHMountsSupported() {
  43. return false
  44. }
  45. }
  46. _, ok := allowedMountTypes[s]
  47. return ok
  48. }
  49. func runMountPreHook(cmd *RunCommand, req parseRequest) error {
  50. st := &mountState{}
  51. st.flag = req.flags.AddStrings("mount")
  52. cmd.setExternalValue(mountsKey, st)
  53. return nil
  54. }
  55. func runMountPostHook(cmd *RunCommand, req parseRequest) error {
  56. return setMountState(cmd, nil)
  57. }
  58. func setMountState(cmd *RunCommand, expander SingleWordExpander) error {
  59. st := getMountState(cmd)
  60. if st == nil {
  61. return errors.Errorf("no mount state")
  62. }
  63. var mounts []*Mount
  64. for _, str := range st.flag.StringValues {
  65. m, err := parseMount(str, expander)
  66. if err != nil {
  67. return err
  68. }
  69. mounts = append(mounts, m)
  70. }
  71. st.mounts = mounts
  72. return nil
  73. }
  74. func getMountState(cmd *RunCommand) *mountState {
  75. v := cmd.getExternalValue(mountsKey)
  76. if v == nil {
  77. return nil
  78. }
  79. return v.(*mountState)
  80. }
  81. func GetMounts(cmd *RunCommand) []*Mount {
  82. return getMountState(cmd).mounts
  83. }
  84. type mountState struct {
  85. flag *Flag
  86. mounts []*Mount
  87. }
  88. type Mount struct {
  89. Type string
  90. From string
  91. Source string
  92. Target string
  93. ReadOnly bool
  94. CacheID string
  95. CacheSharing string
  96. Required bool
  97. Mode *uint64
  98. UID *uint64
  99. GID *uint64
  100. }
  101. func parseMount(value string, expander SingleWordExpander) (*Mount, error) {
  102. csvReader := csv.NewReader(strings.NewReader(value))
  103. fields, err := csvReader.Read()
  104. if err != nil {
  105. return nil, errors.Wrap(err, "failed to parse csv mounts")
  106. }
  107. m := &Mount{Type: MountTypeBind}
  108. roAuto := true
  109. for _, field := range fields {
  110. parts := strings.SplitN(field, "=", 2)
  111. key := strings.ToLower(parts[0])
  112. if len(parts) == 1 {
  113. switch key {
  114. case "readonly", "ro":
  115. m.ReadOnly = true
  116. roAuto = false
  117. continue
  118. case "readwrite", "rw":
  119. m.ReadOnly = false
  120. roAuto = false
  121. continue
  122. case "required":
  123. if m.Type == "secret" || m.Type == "ssh" {
  124. m.Required = true
  125. continue
  126. } else {
  127. return nil, errors.Errorf("unexpected key '%s' for mount type '%s'", key, m.Type)
  128. }
  129. }
  130. }
  131. if len(parts) != 2 {
  132. return nil, errors.Errorf("invalid field '%s' must be a key=value pair", field)
  133. }
  134. value := parts[1]
  135. // check for potential variable
  136. if expander != nil {
  137. processed, err := expander(value)
  138. if err != nil {
  139. return nil, err
  140. }
  141. value = processed
  142. } else if key == "from" {
  143. if matched, err := regexp.MatchString(`\$.`, value); err != nil { //nolint
  144. return nil, err
  145. } else if matched {
  146. return nil, errors.Errorf("'%s' doesn't support variable expansion, define alias stage instead", key)
  147. }
  148. } else {
  149. // if we don't have an expander, defer evaluation to later
  150. continue
  151. }
  152. switch key {
  153. case "type":
  154. if !isValidMountType(strings.ToLower(value)) {
  155. return nil, errors.Errorf("unsupported mount type %q", value)
  156. }
  157. m.Type = strings.ToLower(value)
  158. case "from":
  159. m.From = value
  160. case "source", "src":
  161. m.Source = value
  162. case "target", "dst", "destination":
  163. m.Target = value
  164. case "readonly", "ro":
  165. m.ReadOnly, err = strconv.ParseBool(value)
  166. if err != nil {
  167. return nil, errors.Errorf("invalid value for %s: %s", key, value)
  168. }
  169. roAuto = false
  170. case "readwrite", "rw":
  171. rw, err := strconv.ParseBool(value)
  172. if err != nil {
  173. return nil, errors.Errorf("invalid value for %s: %s", key, value)
  174. }
  175. m.ReadOnly = !rw
  176. roAuto = false
  177. case "required":
  178. if m.Type == "secret" || m.Type == "ssh" {
  179. v, err := strconv.ParseBool(value)
  180. if err != nil {
  181. return nil, errors.Errorf("invalid value for %s: %s", key, value)
  182. }
  183. m.Required = v
  184. } else {
  185. return nil, errors.Errorf("unexpected key '%s' for mount type '%s'", key, m.Type)
  186. }
  187. case "id":
  188. m.CacheID = value
  189. case "sharing":
  190. if _, ok := allowedSharingTypes[strings.ToLower(value)]; !ok {
  191. return nil, errors.Errorf("unsupported sharing value %q", value)
  192. }
  193. m.CacheSharing = strings.ToLower(value)
  194. case "mode":
  195. mode, err := strconv.ParseUint(value, 8, 32)
  196. if err != nil {
  197. return nil, errors.Errorf("invalid value %s for mode", value)
  198. }
  199. m.Mode = &mode
  200. case "uid":
  201. uid, err := strconv.ParseUint(value, 10, 32)
  202. if err != nil {
  203. return nil, errors.Errorf("invalid value %s for uid", value)
  204. }
  205. m.UID = &uid
  206. case "gid":
  207. gid, err := strconv.ParseUint(value, 10, 32)
  208. if err != nil {
  209. return nil, errors.Errorf("invalid value %s for gid", value)
  210. }
  211. m.GID = &gid
  212. default:
  213. return nil, errors.Errorf("unexpected key '%s' in '%s'", key, field)
  214. }
  215. }
  216. fileInfoAllowed := m.Type == MountTypeSecret || m.Type == MountTypeSSH || m.Type == MountTypeCache
  217. if m.Mode != nil && !fileInfoAllowed {
  218. return nil, errors.Errorf("mode not allowed for %q type mounts", m.Type)
  219. }
  220. if m.UID != nil && !fileInfoAllowed {
  221. return nil, errors.Errorf("uid not allowed for %q type mounts", m.Type)
  222. }
  223. if m.GID != nil && !fileInfoAllowed {
  224. return nil, errors.Errorf("gid not allowed for %q type mounts", m.Type)
  225. }
  226. if roAuto {
  227. if m.Type == MountTypeCache || m.Type == MountTypeTmpfs {
  228. m.ReadOnly = false
  229. } else {
  230. m.ReadOnly = true
  231. }
  232. }
  233. if m.CacheSharing != "" && m.Type != MountTypeCache {
  234. return nil, errors.Errorf("invalid cache sharing set for %v mount", m.Type)
  235. }
  236. if m.Type == MountTypeSecret {
  237. if m.From != "" {
  238. return nil, errors.Errorf("secret mount should not have a from")
  239. }
  240. if m.CacheSharing != "" {
  241. return nil, errors.Errorf("secret mount should not define sharing")
  242. }
  243. if m.Source == "" && m.Target == "" && m.CacheID == "" {
  244. return nil, errors.Errorf("invalid secret mount. one of source, target required")
  245. }
  246. if m.Source != "" && m.CacheID != "" {
  247. return nil, errors.Errorf("both source and id can't be set")
  248. }
  249. }
  250. return m, nil
  251. }