Update config/secret handling: Copy files into containers instead of bind mounting
Currently, Docker Compose copies a config or secret into the container if the source is an environment variable or inlined content. However, if the source is a file, the file is bind mounted into the container. This approach fails when Docker Compose is invoked on a different filesystem than the Docker daemon host filesystem (e.g., when called from within a container or remotely using the -H option).
This PR changes the behavior for file-based config/secret sources to match the handling of environment variables and inlined content. Specifically, it reads the file from the filesystem where Docker Compose is executed (like Docker Stack) and copies it into the container.
This update enhances the functionality of Docker Compose when run "remotely," providing the ability to push configuration files, a feature previously available only with Docker Stack/Swarm.
What I did:
- Updated the behavior for handling configs and secrets sourced from files.
- Ensured consistency with the documentation and the behavior of Docker Stack.
- Enabled Docker Compose to push configuration files when run remotely, aligning with Docker Stack/Swarm capabilities.
I realized that this PR is a duplicate of #11871.
I think the PR #11871 could benefit from the changes in the file pkg/compose/create.go made in this PR. It basically keeps some checks and adds a preflight check to ensure the file used as the source for config/secret can be accessed so that if it's not the case it will fail before creating the container.
I will also add this suggestion in a comment on #11871.