4f0d95fa |
package runconfig // import "github.com/docker/docker/runconfig" |
6393c383 |
import ( |
767df67e |
"encoding/json"
"io" |
040afcce |
"strings" |
0b187b90 |
|
91e197d6 |
"github.com/docker/docker/api/types/container" |
6393c383 |
)
|
5170a2c0 |
// DecodeHostConfig creates a HostConfig based on the specified Reader.
// It assumes the content of the reader will be JSON, and decodes it. |
ebcb7d6b |
func decodeHostConfig(src io.Reader) (*container.HostConfig, error) { |
767df67e |
decoder := json.NewDecoder(src)
|
eb97de7d |
var w ContainerConfigWrapper |
767df67e |
if err := decoder.Decode(&w); err != nil {
return nil, err |
8344b6d7 |
} |
d9753ba2 |
|
f6ed5905 |
hc := w.getHostConfig() |
767df67e |
return hc, nil |
6393c383 |
} |
f6ed5905 |
// SetDefaultNetModeIfBlank changes the NetworkMode in a HostConfig structure
// to default if it is not populated. This ensures backwards compatibility after
// the validation of the network mode was moved from the docker CLI to the
// docker daemon. |
7917a36c |
func SetDefaultNetModeIfBlank(hc *container.HostConfig) { |
f6ed5905 |
if hc != nil { |
7ac4232e |
if hc.NetworkMode == container.NetworkMode("") {
hc.NetworkMode = container.NetworkMode("default") |
f6ed5905 |
}
}
} |
040afcce |
|
4af3389d |
// validateNetContainerMode ensures that the various combinations of requested |
040afcce |
// network settings wrt container mode are valid. |
4af3389d |
func validateNetContainerMode(c *container.Config, hc *container.HostConfig) error { |
040afcce |
// We may not be passed a host config, such as in the case of docker commit
if hc == nil {
return nil
}
parts := strings.Split(string(hc.NetworkMode), ":")
if parts[0] == "container" {
if len(parts) < 2 || parts[1] == "" { |
ebcb7d6b |
return validationError("Invalid network mode: invalid container format container:<name|id>") |
040afcce |
}
}
if hc.NetworkMode.IsContainer() && c.Hostname != "" {
return ErrConflictNetworkHostname
}
if hc.NetworkMode.IsContainer() && len(hc.Links) > 0 {
return ErrConflictContainerNetworkAndLinks
}
if hc.NetworkMode.IsContainer() && len(hc.DNS) > 0 {
return ErrConflictNetworkAndDNS
}
if hc.NetworkMode.IsContainer() && len(hc.ExtraHosts) > 0 {
return ErrConflictNetworkHosts
}
if (hc.NetworkMode.IsContainer() || hc.NetworkMode.IsHost()) && c.MacAddress != "" {
return ErrConflictContainerNetworkAndMac
}
|
f7f101d5 |
if hc.NetworkMode.IsContainer() && (len(hc.PortBindings) > 0 || hc.PublishAllPorts) { |
040afcce |
return ErrConflictNetworkPublishPorts
}
if hc.NetworkMode.IsContainer() && len(c.ExposedPorts) > 0 {
return ErrConflictNetworkExposePorts
}
return nil
} |