mirror of
https://github.com/containers/podman.git
synced 2025-07-15 03:02:52 +08:00

SpecGen is our primary container creation abstraction, and is used to connect our CLI to the Libpod container creation backend. Because container creation has a million options (I exaggerate only slightly), the struct is composed of several other structs, many of which are quite large. The core problem is that SpecGen is also an API type - it's used in remote Podman. There, we have a client and a server, and we want to respect the server's containers.conf. But how do we tell what parts of SpecGen were set by the client explicitly, and what parts were not? If we're not using nullable values, an explicit empty string and a value never being set are identical - and we can't tell if it's safe to grab a default from the server's containers.conf. Fortunately, we only really need to do this for booleans. An empty string is sufficient to tell us that a string was unset (even if the user explicitly gave us an empty string for an option, filling in a default from the config file is acceptable). This makes things a lot simpler. My initial attempt at this changed everything, including strings, and it was far larger and more painful. Also, begin the first steps of removing all uses of containers.conf defaults from client-side. Two are gone entirely, the rest are marked as remove-when-possible. [NO NEW TESTS NEEDED] This is just a refactor. Signed-off-by: Matt Heon <mheon@redhat.com>
160 lines
5.6 KiB
Go
160 lines
5.6 KiB
Go
package specgen
|
|
|
|
import (
|
|
"errors"
|
|
"fmt"
|
|
"strings"
|
|
|
|
"github.com/containers/podman/v4/libpod/define"
|
|
"golang.org/x/exp/slices"
|
|
)
|
|
|
|
var (
|
|
// ErrInvalidSpecConfig describes an error that the given SpecGenerator is invalid
|
|
ErrInvalidSpecConfig = errors.New("invalid configuration")
|
|
// SystemDValues describes the only values that SystemD can be
|
|
SystemDValues = []string{"true", "false", "always"}
|
|
// ImageVolumeModeValues describes the only values that ImageVolumeMode can be
|
|
ImageVolumeModeValues = []string{"ignore", define.TypeTmpfs, "anonymous"}
|
|
)
|
|
|
|
func exclusiveOptions(opt1, opt2 string) error {
|
|
return fmt.Errorf("%s and %s are mutually exclusive options", opt1, opt2)
|
|
}
|
|
|
|
// Validate verifies that the given SpecGenerator is valid and satisfies required
|
|
// input for creating a container.
|
|
func (s *SpecGenerator) Validate() error {
|
|
// Containers being added to a pod cannot have certain network attributes
|
|
// associated with them because those should be on the infra container.
|
|
if len(s.Pod) > 0 && s.NetNS.NSMode == FromPod {
|
|
if len(s.Networks) > 0 {
|
|
return fmt.Errorf("networks must be defined when the pod is created: %w", define.ErrNetworkOnPodContainer)
|
|
}
|
|
if len(s.PortMappings) > 0 || (s.PublishExposedPorts != nil && *s.PublishExposedPorts) {
|
|
return fmt.Errorf("published or exposed ports must be defined when the pod is created: %w", define.ErrNetworkOnPodContainer)
|
|
}
|
|
if len(s.HostAdd) > 0 {
|
|
return fmt.Errorf("extra host entries must be specified on the pod: %w", define.ErrNetworkOnPodContainer)
|
|
}
|
|
}
|
|
|
|
if s.NetNS.IsContainer() && len(s.HostAdd) > 0 {
|
|
return fmt.Errorf("cannot set extra host entries when the container is joined to another containers network namespace: %w", ErrInvalidSpecConfig)
|
|
}
|
|
|
|
//
|
|
// ContainerBasicConfig
|
|
//
|
|
// Rootfs and Image cannot both populated
|
|
if len(s.ContainerStorageConfig.Image) > 0 && len(s.ContainerStorageConfig.Rootfs) > 0 {
|
|
return fmt.Errorf("both image and rootfs cannot be simultaneously: %w", ErrInvalidSpecConfig)
|
|
}
|
|
// Cannot set hostname and utsns
|
|
if len(s.ContainerBasicConfig.Hostname) > 0 && !s.ContainerBasicConfig.UtsNS.IsPrivate() {
|
|
if s.ContainerBasicConfig.UtsNS.IsPod() {
|
|
return fmt.Errorf("cannot set hostname when joining the pod UTS namespace: %w", ErrInvalidSpecConfig)
|
|
}
|
|
|
|
return fmt.Errorf("cannot set hostname when running in the host UTS namespace: %w", ErrInvalidSpecConfig)
|
|
}
|
|
// systemd values must be true, false, or always
|
|
if len(s.ContainerBasicConfig.Systemd) > 0 && !slices.Contains(SystemDValues, strings.ToLower(s.ContainerBasicConfig.Systemd)) {
|
|
return fmt.Errorf("--systemd values must be one of %q: %w", strings.Join(SystemDValues, ", "), ErrInvalidSpecConfig)
|
|
}
|
|
|
|
if err := define.ValidateSdNotifyMode(s.ContainerBasicConfig.SdNotifyMode); err != nil {
|
|
return err
|
|
}
|
|
|
|
//
|
|
// ContainerStorageConfig
|
|
//
|
|
// rootfs and image cannot both be set
|
|
if len(s.ContainerStorageConfig.Image) > 0 && len(s.ContainerStorageConfig.Rootfs) > 0 {
|
|
return exclusiveOptions("rootfs", "image")
|
|
}
|
|
// imagevolumemode must be one of ignore, tmpfs, or anonymous if given
|
|
if len(s.ContainerStorageConfig.ImageVolumeMode) > 0 && !slices.Contains(ImageVolumeModeValues, strings.ToLower(s.ContainerStorageConfig.ImageVolumeMode)) {
|
|
return fmt.Errorf("invalid ImageVolumeMode %q, value must be one of %s",
|
|
s.ContainerStorageConfig.ImageVolumeMode, strings.Join(ImageVolumeModeValues, ","))
|
|
}
|
|
// shmsize conflicts with IPC namespace
|
|
if s.ContainerStorageConfig.ShmSize != nil && (s.ContainerStorageConfig.IpcNS.IsHost() || s.ContainerStorageConfig.IpcNS.IsNone()) {
|
|
return fmt.Errorf("cannot set shmsize when running in the %s IPC Namespace", s.ContainerStorageConfig.IpcNS)
|
|
}
|
|
|
|
//
|
|
// ContainerSecurityConfig
|
|
//
|
|
// userns and idmappings conflict
|
|
if s.UserNS.IsPrivate() && s.IDMappings == nil {
|
|
return fmt.Errorf("IDMappings are required when not creating a User namespace: %w", ErrInvalidSpecConfig)
|
|
}
|
|
|
|
//
|
|
// ContainerCgroupConfig
|
|
//
|
|
//
|
|
// None for now
|
|
|
|
//
|
|
// ContainerNetworkConfig
|
|
//
|
|
// useimageresolveconf conflicts with dnsserver, dnssearch, dnsoption
|
|
if s.UseImageResolvConf != nil && *s.UseImageResolvConf {
|
|
if len(s.DNSServers) > 0 {
|
|
return exclusiveOptions("UseImageResolvConf", "DNSServer")
|
|
}
|
|
if len(s.DNSSearch) > 0 {
|
|
return exclusiveOptions("UseImageResolvConf", "DNSSearch")
|
|
}
|
|
if len(s.DNSOptions) > 0 {
|
|
return exclusiveOptions("UseImageResolvConf", "DNSOption")
|
|
}
|
|
}
|
|
// UseImageHosts and HostAdd are exclusive
|
|
if (s.UseImageHosts != nil && *s.UseImageHosts) && len(s.HostAdd) > 0 {
|
|
return exclusiveOptions("UseImageHosts", "HostAdd")
|
|
}
|
|
|
|
// TODO the specgen does not appear to handle this? Should it
|
|
// switch config.Cgroup.Cgroups {
|
|
// case "disabled":
|
|
// if addedResources {
|
|
// return errors.New("cannot specify resource limits when cgroups are disabled is specified")
|
|
// }
|
|
// configSpec.Linux.Resources = &spec.LinuxResources{}
|
|
// case "enabled", "no-conmon", "":
|
|
// // Do nothing
|
|
// default:
|
|
// return errors.New("unrecognized option for cgroups; supported are 'default', 'disabled', 'no-conmon'")
|
|
// }
|
|
// Namespaces
|
|
if err := s.UtsNS.validate(); err != nil {
|
|
return err
|
|
}
|
|
if err := validateIPCNS(&s.IpcNS); err != nil {
|
|
return err
|
|
}
|
|
if err := s.PidNS.validate(); err != nil {
|
|
return err
|
|
}
|
|
if err := s.CgroupNS.validate(); err != nil {
|
|
return err
|
|
}
|
|
if err := validateUserNS(&s.UserNS); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := validateNetNS(&s.NetNS); err != nil {
|
|
return err
|
|
}
|
|
if s.NetNS.NSMode != Bridge && len(s.Networks) > 0 {
|
|
// Note that we also get the ip and mac in the networks map
|
|
return errors.New("networks and static ip/mac address can only be used with Bridge mode networking")
|
|
}
|
|
|
|
return nil
|
|
}
|