1
0
Fork 0
mirror of https://github.com/moby/moby.git synced 2022-11-09 12:21:53 -05:00
moby--moby/daemon/cluster/executor/container/validate.go
Drew Erny 240a9fcb83
Add Swarm cluster volume supports
Adds code to support Cluster Volumes in Swarm using CSI drivers.

Signed-off-by: Drew Erny <derny@mirantis.com>
2022-05-13 00:55:44 +02:00

47 lines
1.5 KiB
Go

package container // import "github.com/docker/docker/daemon/cluster/executor/container"
import (
"errors"
"fmt"
"path/filepath"
"github.com/moby/swarmkit/v2/api"
)
func validateMounts(mounts []api.Mount) error {
for _, mount := range mounts {
// Target must always be absolute
// except if target is Windows named pipe
if !filepath.IsAbs(mount.Target) && mount.Type != api.MountTypeNamedPipe {
return fmt.Errorf("invalid mount target, must be an absolute path: %s", mount.Target)
}
switch mount.Type {
// The checks on abs paths are required due to the container API confusing
// volume mounts as bind mounts when the source is absolute (and vice-versa)
// See #25253
// TODO: This is probably not necessary once #22373 is merged
case api.MountTypeBind:
if !filepath.IsAbs(mount.Source) {
return fmt.Errorf("invalid bind mount source, must be an absolute path: %s", mount.Source)
}
case api.MountTypeVolume:
if filepath.IsAbs(mount.Source) {
return fmt.Errorf("invalid volume mount source, must not be an absolute path: %s", mount.Source)
}
case api.MountTypeTmpfs:
if mount.Source != "" {
return errors.New("invalid tmpfs source, source must be empty")
}
case api.MountTypeNamedPipe:
if mount.Source == "" {
return errors.New("invalid npipe source, source must not be empty")
}
case api.MountTypeCSI:
// nothing to do here.
default:
return fmt.Errorf("invalid mount type: %s", mount.Type)
}
}
return nil
}