mirror of
https://github.com/docker/compose.git
synced 2025-07-21 20:54:32 +02:00
Support absolute paths for secrets
Signed-off-by: Ulysses Souza <ulyssessouza@gmail.com>
This commit is contained in:
parent
50a2ae1100
commit
06e44a813c
@ -23,6 +23,7 @@ import (
|
|||||||
"io/ioutil"
|
"io/ioutil"
|
||||||
"math"
|
"math"
|
||||||
"os"
|
"os"
|
||||||
|
"path/filepath"
|
||||||
"strconv"
|
"strconv"
|
||||||
"strings"
|
"strings"
|
||||||
|
|
||||||
@ -50,7 +51,8 @@ const (
|
|||||||
volumeDriveroptsAccountNameKey = "storage_account_name"
|
volumeDriveroptsAccountNameKey = "storage_account_name"
|
||||||
volumeReadOnly = "read_only"
|
volumeReadOnly = "read_only"
|
||||||
|
|
||||||
serviceSecretPrefix = "aci-service-secret-"
|
defaultSecretsPath = "/run/secrets"
|
||||||
|
serviceSecretAbsPathPrefix = "aci-service-secret-path-"
|
||||||
)
|
)
|
||||||
|
|
||||||
// ToContainerGroup converts a compose project into a ACI container group
|
// ToContainerGroup converts a compose project into a ACI container group
|
||||||
@ -188,13 +190,15 @@ func getDNSSidecar(containers []containerinstance.Container) containerinstance.C
|
|||||||
|
|
||||||
type projectAciHelper types.Project
|
type projectAciHelper types.Project
|
||||||
|
|
||||||
|
func getServiceSecretKey(serviceName, targetDir string) string {
|
||||||
|
return fmt.Sprintf("%s-%s--%s",
|
||||||
|
serviceSecretAbsPathPrefix, serviceName, strings.ReplaceAll(targetDir, "/", "-"))
|
||||||
|
}
|
||||||
|
|
||||||
func (p projectAciHelper) getAciSecretVolumes() ([]containerinstance.Volume, error) {
|
func (p projectAciHelper) getAciSecretVolumes() ([]containerinstance.Volume, error) {
|
||||||
var secretVolumes []containerinstance.Volume
|
var secretVolumes []containerinstance.Volume
|
||||||
for _, svc := range p.Services {
|
for _, svc := range p.Services {
|
||||||
secretServiceVolume := containerinstance.Volume{
|
squashedTargetVolumes := make(map[string]containerinstance.Volume)
|
||||||
Name: to.StringPtr(serviceSecretPrefix + svc.Name),
|
|
||||||
Secret: make(map[string]*string),
|
|
||||||
}
|
|
||||||
for _, scr := range svc.Secrets {
|
for _, scr := range svc.Secrets {
|
||||||
data, err := ioutil.ReadFile(p.Secrets[scr.Source].File)
|
data, err := ioutil.ReadFile(p.Secrets[scr.Source].File)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
@ -207,14 +211,31 @@ func (p projectAciHelper) getAciSecretVolumes() ([]containerinstance.Volume, err
|
|||||||
if scr.Target == "" {
|
if scr.Target == "" {
|
||||||
scr.Target = scr.Source
|
scr.Target = scr.Source
|
||||||
}
|
}
|
||||||
if strings.ContainsAny(scr.Target, "\\/") {
|
|
||||||
|
if !filepath.IsAbs(scr.Target) && strings.ContainsAny(scr.Target, "\\/") {
|
||||||
return []containerinstance.Volume{},
|
return []containerinstance.Volume{},
|
||||||
errors.Errorf("in service %q, secret with source %q cannot have a path as target. Found %q", svc.Name, scr.Source, scr.Target)
|
errors.Errorf("in service %q, secret with source %q cannot have a relative path as target. "+
|
||||||
|
"Only absolute paths are allowed. Found %q",
|
||||||
|
svc.Name, scr.Source, scr.Target)
|
||||||
}
|
}
|
||||||
secretServiceVolume.Secret[scr.Target] = &dataStr
|
|
||||||
|
if !filepath.IsAbs(scr.Target) {
|
||||||
|
scr.Target = filepath.Join(defaultSecretsPath, scr.Target)
|
||||||
}
|
}
|
||||||
if len(secretServiceVolume.Secret) > 0 {
|
|
||||||
secretVolumes = append(secretVolumes, secretServiceVolume)
|
targetDir := filepath.Dir(scr.Target)
|
||||||
|
targetDirKey := getServiceSecretKey(svc.Name, targetDir)
|
||||||
|
if _, ok := squashedTargetVolumes[targetDir]; !ok {
|
||||||
|
squashedTargetVolumes[targetDir] = containerinstance.Volume{
|
||||||
|
Name: to.StringPtr(targetDirKey),
|
||||||
|
Secret: make(map[string]*string),
|
||||||
|
}
|
||||||
|
}
|
||||||
|
|
||||||
|
squashedTargetVolumes[targetDir].Secret[filepath.Base(scr.Target)] = &dataStr
|
||||||
|
}
|
||||||
|
for _, v := range squashedTargetVolumes {
|
||||||
|
secretVolumes = append(secretVolumes, v)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
@ -326,15 +347,62 @@ func (s serviceConfigAciHelper) getAciFileVolumeMounts(volumesCache map[string]b
|
|||||||
return aciServiceVolumes, nil
|
return aciServiceVolumes, nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s serviceConfigAciHelper) getAciSecretsVolumeMount() *containerinstance.VolumeMount {
|
func (s serviceConfigAciHelper) getAciSecretsVolumeMounts() ([]containerinstance.VolumeMount, error) {
|
||||||
if len(s.Secrets) == 0 {
|
vms := []containerinstance.VolumeMount{}
|
||||||
return nil
|
presenceSet := make(map[string]bool)
|
||||||
|
for _, scr := range s.Secrets {
|
||||||
|
if scr.Target == "" {
|
||||||
|
scr.Target = scr.Source
|
||||||
}
|
}
|
||||||
return &containerinstance.VolumeMount{
|
if !filepath.IsAbs(scr.Target) {
|
||||||
Name: to.StringPtr(serviceSecretPrefix + s.Name),
|
scr.Target = filepath.Join(defaultSecretsPath, scr.Target)
|
||||||
MountPath: to.StringPtr("/run/secrets"),
|
}
|
||||||
|
|
||||||
|
presenceKey := filepath.Dir(scr.Target)
|
||||||
|
if !presenceSet[presenceKey] {
|
||||||
|
vms = append(vms, containerinstance.VolumeMount{
|
||||||
|
Name: to.StringPtr(getServiceSecretKey(s.Name, filepath.Dir(scr.Target))),
|
||||||
|
MountPath: to.StringPtr(filepath.Dir(scr.Target)),
|
||||||
ReadOnly: to.BoolPtr(true),
|
ReadOnly: to.BoolPtr(true),
|
||||||
|
})
|
||||||
|
presenceSet[presenceKey] = true
|
||||||
}
|
}
|
||||||
|
}
|
||||||
|
err := validateMountPathCollisions(vms)
|
||||||
|
if err != nil {
|
||||||
|
return []containerinstance.VolumeMount{}, err
|
||||||
|
}
|
||||||
|
return vms, nil
|
||||||
|
}
|
||||||
|
|
||||||
|
func validateMountPathCollisions(vms []containerinstance.VolumeMount) error {
|
||||||
|
for i, vm1 := range vms {
|
||||||
|
for j, vm2 := range vms {
|
||||||
|
if i == j {
|
||||||
|
continue
|
||||||
|
}
|
||||||
|
var (
|
||||||
|
biggerVMPath = strings.Split(*vm1.MountPath, string(filepath.Separator))
|
||||||
|
smallerVMPath = strings.Split(*vm2.MountPath, string(filepath.Separator))
|
||||||
|
)
|
||||||
|
if len(smallerVMPath) > len(biggerVMPath) {
|
||||||
|
tmp := biggerVMPath
|
||||||
|
biggerVMPath = smallerVMPath
|
||||||
|
smallerVMPath = tmp
|
||||||
|
}
|
||||||
|
isPrefixed := true
|
||||||
|
for i := 0; i < len(smallerVMPath); i++ {
|
||||||
|
if smallerVMPath[i] != biggerVMPath[i] {
|
||||||
|
isPrefixed = false
|
||||||
|
break
|
||||||
|
}
|
||||||
|
}
|
||||||
|
if isPrefixed {
|
||||||
|
return errors.Errorf("mount paths %q and %q collide. A volume mount cannot include another one.", *vm1.MountPath, *vm2.MountPath)
|
||||||
|
}
|
||||||
|
}
|
||||||
|
}
|
||||||
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
func (s serviceConfigAciHelper) getAciContainer(volumesCache map[string]bool) (containerinstance.Container, error) {
|
func (s serviceConfigAciHelper) getAciContainer(volumesCache map[string]bool) (containerinstance.Container, error) {
|
||||||
@ -342,11 +410,11 @@ func (s serviceConfigAciHelper) getAciContainer(volumesCache map[string]bool) (c
|
|||||||
if err != nil {
|
if err != nil {
|
||||||
return containerinstance.Container{}, err
|
return containerinstance.Container{}, err
|
||||||
}
|
}
|
||||||
allVolumes := aciServiceVolumes
|
serviceSecretVolumes, err := s.getAciSecretsVolumeMounts()
|
||||||
secretVolumeMount := s.getAciSecretsVolumeMount()
|
if err != nil {
|
||||||
if secretVolumeMount != nil {
|
return containerinstance.Container{}, err
|
||||||
allVolumes = append(allVolumes, *secretVolumeMount)
|
|
||||||
}
|
}
|
||||||
|
allVolumes := append(aciServiceVolumes, serviceSecretVolumes...)
|
||||||
var volumes *[]containerinstance.VolumeMount
|
var volumes *[]containerinstance.VolumeMount
|
||||||
if len(allVolumes) > 0 {
|
if len(allVolumes) > 0 {
|
||||||
volumes = &allVolumes
|
volumes = &allVolumes
|
||||||
|
@ -18,7 +18,10 @@ package convert
|
|||||||
|
|
||||||
import (
|
import (
|
||||||
"context"
|
"context"
|
||||||
|
"fmt"
|
||||||
|
"io/ioutil"
|
||||||
"os"
|
"os"
|
||||||
|
"path/filepath"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
"github.com/stretchr/testify/mock"
|
"github.com/stretchr/testify/mock"
|
||||||
@ -712,6 +715,151 @@ func TestConvertContainerGroupStatus(t *testing.T) {
|
|||||||
assert.Equal(t, "Unknown", GetStatus(container(nil), group(nil)))
|
assert.Equal(t, "Unknown", GetStatus(container(nil), group(nil)))
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func TestConvertSecrets(t *testing.T) {
|
||||||
|
serviceName := "testservice"
|
||||||
|
secretName := "testsecret"
|
||||||
|
absBasePath := "/home/user"
|
||||||
|
tmpFile, err := ioutil.TempFile(os.TempDir(), "TestConvertProjectSecrets-")
|
||||||
|
assert.NilError(t, err)
|
||||||
|
_, err = tmpFile.Write([]byte("test content"))
|
||||||
|
assert.NilError(t, err)
|
||||||
|
t.Cleanup(func() {
|
||||||
|
assert.NilError(t, os.Remove(tmpFile.Name()))
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("mix default and absolute", func(t *testing.T) {
|
||||||
|
pSquashedDefaultAndAbs := projectAciHelper{
|
||||||
|
Services: []types.ServiceConfig{
|
||||||
|
{
|
||||||
|
Name: serviceName,
|
||||||
|
Secrets: []types.ServiceSecretConfig{
|
||||||
|
{
|
||||||
|
Source: secretName,
|
||||||
|
Target: "some_target1",
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Source: secretName,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Source: secretName,
|
||||||
|
Target: filepath.Join(defaultSecretsPath, "some_target2"),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Source: secretName,
|
||||||
|
Target: filepath.Join(absBasePath, "some_target3"),
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Source: secretName,
|
||||||
|
Target: filepath.Join(absBasePath, "some_target4"),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Secrets: map[string]types.SecretConfig{
|
||||||
|
secretName: {
|
||||||
|
File: tmpFile.Name(),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
vs, err := pSquashedDefaultAndAbs.getAciSecretVolumes()
|
||||||
|
assert.NilError(t, err)
|
||||||
|
assert.Equal(t, len(vs), 2)
|
||||||
|
|
||||||
|
defaultVolumeName := getServiceSecretKey(serviceName, defaultSecretsPath)
|
||||||
|
assert.Equal(t, *vs[0].Name, defaultVolumeName)
|
||||||
|
assert.Equal(t, len(vs[0].Secret), 3)
|
||||||
|
|
||||||
|
homeVolumeName := getServiceSecretKey(serviceName, absBasePath)
|
||||||
|
assert.Equal(t, *vs[1].Name, homeVolumeName)
|
||||||
|
assert.Equal(t, len(vs[1].Secret), 2)
|
||||||
|
|
||||||
|
s := serviceConfigAciHelper(pSquashedDefaultAndAbs.Services[0])
|
||||||
|
vms, err := s.getAciSecretsVolumeMounts()
|
||||||
|
assert.NilError(t, err)
|
||||||
|
assert.Equal(t, len(vms), 2)
|
||||||
|
|
||||||
|
assert.Equal(t, *vms[0].Name, defaultVolumeName)
|
||||||
|
assert.Equal(t, *vms[0].MountPath, defaultSecretsPath)
|
||||||
|
|
||||||
|
assert.Equal(t, *vms[1].Name, homeVolumeName)
|
||||||
|
assert.Equal(t, *vms[1].MountPath, absBasePath)
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("convert invalid target", func(t *testing.T) {
|
||||||
|
targetName := "some/invalid/relative/path/target"
|
||||||
|
pInvalidRelativePathTarget := projectAciHelper{
|
||||||
|
Services: []types.ServiceConfig{
|
||||||
|
{
|
||||||
|
Name: serviceName,
|
||||||
|
Secrets: []types.ServiceSecretConfig{
|
||||||
|
{
|
||||||
|
Source: secretName,
|
||||||
|
Target: targetName,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
},
|
||||||
|
Secrets: map[string]types.SecretConfig{
|
||||||
|
secretName: {
|
||||||
|
File: tmpFile.Name(),
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
_, err := pInvalidRelativePathTarget.getAciSecretVolumes()
|
||||||
|
assert.Equal(t, err.Error(),
|
||||||
|
fmt.Sprintf(`in service %q, secret with source %q cannot have a relative path as target. Only absolute paths are allowed. Found %q`,
|
||||||
|
serviceName, secretName, targetName))
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("convert colliding default targets", func(t *testing.T) {
|
||||||
|
targetName1 := filepath.Join(defaultSecretsPath, "target1")
|
||||||
|
targetName2 := filepath.Join(defaultSecretsPath, "sub/folder/target2")
|
||||||
|
|
||||||
|
service := serviceConfigAciHelper{
|
||||||
|
Name: serviceName,
|
||||||
|
Secrets: []types.ServiceSecretConfig{
|
||||||
|
{
|
||||||
|
Source: secretName,
|
||||||
|
Target: targetName1,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Source: secretName,
|
||||||
|
Target: targetName2,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err := service.getAciSecretsVolumeMounts()
|
||||||
|
assert.Equal(t, err.Error(),
|
||||||
|
fmt.Sprintf(`mount paths %q and %q collide. A volume mount cannot include another one.`,
|
||||||
|
filepath.Dir(targetName1), filepath.Dir(targetName2)))
|
||||||
|
})
|
||||||
|
|
||||||
|
t.Run("convert colliding absolute targets", func(t *testing.T) {
|
||||||
|
targetName1 := filepath.Join(absBasePath, "target1")
|
||||||
|
targetName2 := filepath.Join(absBasePath, "sub/folder/target2")
|
||||||
|
|
||||||
|
service := serviceConfigAciHelper{
|
||||||
|
Name: serviceName,
|
||||||
|
Secrets: []types.ServiceSecretConfig{
|
||||||
|
{
|
||||||
|
Source: secretName,
|
||||||
|
Target: targetName1,
|
||||||
|
},
|
||||||
|
{
|
||||||
|
Source: secretName,
|
||||||
|
Target: targetName2,
|
||||||
|
},
|
||||||
|
},
|
||||||
|
}
|
||||||
|
|
||||||
|
_, err := service.getAciSecretsVolumeMounts()
|
||||||
|
assert.Equal(t, err.Error(),
|
||||||
|
fmt.Sprintf(`mount paths %q and %q collide. A volume mount cannot include another one.`,
|
||||||
|
filepath.Dir(targetName1), filepath.Dir(targetName2)))
|
||||||
|
})
|
||||||
|
}
|
||||||
|
|
||||||
func container(status *string) containerinstance.Container {
|
func container(status *string) containerinstance.Container {
|
||||||
var state *containerinstance.ContainerState = nil
|
var state *containerinstance.ContainerState = nil
|
||||||
if status != nil {
|
if status != nil {
|
||||||
|
@ -566,17 +566,10 @@ func TestUpSecrets(t *testing.T) {
|
|||||||
var (
|
var (
|
||||||
basefilePath = filepath.Join("..", "composefiles", composeProjectName)
|
basefilePath = filepath.Join("..", "composefiles", composeProjectName)
|
||||||
composefilePath = filepath.Join(basefilePath, "compose.yml")
|
composefilePath = filepath.Join(basefilePath, "compose.yml")
|
||||||
composefileInvalidTargetPath = filepath.Join(basefilePath, "compose-invalid-target.yml")
|
|
||||||
)
|
)
|
||||||
c := NewParallelE2eCLI(t, binDir)
|
c := NewParallelE2eCLI(t, binDir)
|
||||||
_, _, _ = setupTestResourceGroup(t, c)
|
_, _, _ = setupTestResourceGroup(t, c)
|
||||||
|
|
||||||
t.Run("compose up invalid target", func(t *testing.T) {
|
|
||||||
res := c.RunDockerOrExitError("compose", "up", "-f", composefileInvalidTargetPath, "--project-name", composeProjectName)
|
|
||||||
assert.Equal(t, res.ExitCode, 1)
|
|
||||||
assert.Equal(t, res.Combined(), "in service \"web\", secret with source \"mysecret1\" cannot have a path as target. Found \"my/invalid/target1\"\n")
|
|
||||||
})
|
|
||||||
|
|
||||||
t.Run("compose up", func(t *testing.T) {
|
t.Run("compose up", func(t *testing.T) {
|
||||||
c.RunDockerCmd("compose", "up", "-f", composefilePath, "--project-name", composeProjectName)
|
c.RunDockerCmd("compose", "up", "-f", composefilePath, "--project-name", composeProjectName)
|
||||||
res := c.RunDockerCmd("ps")
|
res := c.RunDockerCmd("ps")
|
||||||
|
@ -1,16 +0,0 @@
|
|||||||
services:
|
|
||||||
web:
|
|
||||||
build: .
|
|
||||||
image: ulyssessouza/secrets_server
|
|
||||||
ports:
|
|
||||||
- "80:80"
|
|
||||||
secrets:
|
|
||||||
- source: mysecret1
|
|
||||||
target: my/invalid/target1
|
|
||||||
- mysecret2
|
|
||||||
|
|
||||||
secrets:
|
|
||||||
mysecret1:
|
|
||||||
file: ./my_secret1.txt
|
|
||||||
mysecret2:
|
|
||||||
file: ./my_secret2.txt
|
|
Loading…
x
Reference in New Issue
Block a user