|
@@ -1050,12 +1050,12 @@ func (c *Cluster) imageWithDigestString(ctx context.Context, image string, authC
|
|
|
}
|
|
|
|
|
|
// CreateService creates a new service in a managed swarm cluster.
|
|
|
-func (c *Cluster) CreateService(s types.ServiceSpec, encodedAuth string) (string, error) {
|
|
|
+func (c *Cluster) CreateService(s types.ServiceSpec, encodedAuth string) (*apitypes.ServiceCreateResponse, error) {
|
|
|
c.RLock()
|
|
|
defer c.RUnlock()
|
|
|
|
|
|
if !c.isActiveManager() {
|
|
|
- return "", c.errNoManager()
|
|
|
+ return nil, c.errNoManager()
|
|
|
}
|
|
|
|
|
|
ctx, cancel := c.getRequestContext()
|
|
@@ -1063,17 +1063,17 @@ func (c *Cluster) CreateService(s types.ServiceSpec, encodedAuth string) (string
|
|
|
|
|
|
err := c.populateNetworkID(ctx, c.client, &s)
|
|
|
if err != nil {
|
|
|
- return "", err
|
|
|
+ return nil, err
|
|
|
}
|
|
|
|
|
|
serviceSpec, err := convert.ServiceSpecToGRPC(s)
|
|
|
if err != nil {
|
|
|
- return "", err
|
|
|
+ return nil, err
|
|
|
}
|
|
|
|
|
|
ctnr := serviceSpec.Task.GetContainer()
|
|
|
if ctnr == nil {
|
|
|
- return "", fmt.Errorf("service does not use container tasks")
|
|
|
+ return nil, fmt.Errorf("service does not use container tasks")
|
|
|
}
|
|
|
|
|
|
if encodedAuth != "" {
|
|
@@ -1087,11 +1087,15 @@ func (c *Cluster) CreateService(s types.ServiceSpec, encodedAuth string) (string
|
|
|
logrus.Warnf("invalid authconfig: %v", err)
|
|
|
}
|
|
|
}
|
|
|
+
|
|
|
+ resp := &apitypes.ServiceCreateResponse{}
|
|
|
+
|
|
|
// pin image by digest
|
|
|
if os.Getenv("DOCKER_SERVICE_PREFER_OFFLINE_IMAGE") != "1" {
|
|
|
digestImage, err := c.imageWithDigestString(ctx, ctnr.Image, authConfig)
|
|
|
if err != nil {
|
|
|
logrus.Warnf("unable to pin image %s to digest: %s", ctnr.Image, err.Error())
|
|
|
+ resp.Warnings = append(resp.Warnings, fmt.Sprintf("unable to pin image %s to digest: %s", ctnr.Image, err.Error()))
|
|
|
} else {
|
|
|
logrus.Debugf("pinning image %s by digest: %s", ctnr.Image, digestImage)
|
|
|
ctnr.Image = digestImage
|
|
@@ -1100,10 +1104,11 @@ func (c *Cluster) CreateService(s types.ServiceSpec, encodedAuth string) (string
|
|
|
|
|
|
r, err := c.client.CreateService(ctx, &swarmapi.CreateServiceRequest{Spec: &serviceSpec})
|
|
|
if err != nil {
|
|
|
- return "", err
|
|
|
+ return nil, err
|
|
|
}
|
|
|
|
|
|
- return r.Service.ID, nil
|
|
|
+ resp.ID = r.Service.ID
|
|
|
+ return resp, nil
|
|
|
}
|
|
|
|
|
|
// GetService returns a service based on an ID or name.
|
|
@@ -1126,12 +1131,12 @@ func (c *Cluster) GetService(input string) (types.Service, error) {
|
|
|
}
|
|
|
|
|
|
// UpdateService updates existing service to match new properties.
|
|
|
-func (c *Cluster) UpdateService(serviceIDOrName string, version uint64, spec types.ServiceSpec, encodedAuth string, registryAuthFrom string) error {
|
|
|
+func (c *Cluster) UpdateService(serviceIDOrName string, version uint64, spec types.ServiceSpec, encodedAuth string, registryAuthFrom string) (*apitypes.ServiceUpdateResponse, error) {
|
|
|
c.RLock()
|
|
|
defer c.RUnlock()
|
|
|
|
|
|
if !c.isActiveManager() {
|
|
|
- return c.errNoManager()
|
|
|
+ return nil, c.errNoManager()
|
|
|
}
|
|
|
|
|
|
ctx, cancel := c.getRequestContext()
|
|
@@ -1139,22 +1144,22 @@ func (c *Cluster) UpdateService(serviceIDOrName string, version uint64, spec typ
|
|
|
|
|
|
err := c.populateNetworkID(ctx, c.client, &spec)
|
|
|
if err != nil {
|
|
|
- return err
|
|
|
+ return nil, err
|
|
|
}
|
|
|
|
|
|
serviceSpec, err := convert.ServiceSpecToGRPC(spec)
|
|
|
if err != nil {
|
|
|
- return err
|
|
|
+ return nil, err
|
|
|
}
|
|
|
|
|
|
currentService, err := getService(ctx, c.client, serviceIDOrName)
|
|
|
if err != nil {
|
|
|
- return err
|
|
|
+ return nil, err
|
|
|
}
|
|
|
|
|
|
newCtnr := serviceSpec.Task.GetContainer()
|
|
|
if newCtnr == nil {
|
|
|
- return fmt.Errorf("service does not use container tasks")
|
|
|
+ return nil, fmt.Errorf("service does not use container tasks")
|
|
|
}
|
|
|
|
|
|
if encodedAuth != "" {
|
|
@@ -1168,14 +1173,14 @@ func (c *Cluster) UpdateService(serviceIDOrName string, version uint64, spec typ
|
|
|
ctnr = currentService.Spec.Task.GetContainer()
|
|
|
case apitypes.RegistryAuthFromPreviousSpec:
|
|
|
if currentService.PreviousSpec == nil {
|
|
|
- return fmt.Errorf("service does not have a previous spec")
|
|
|
+ return nil, fmt.Errorf("service does not have a previous spec")
|
|
|
}
|
|
|
ctnr = currentService.PreviousSpec.Task.GetContainer()
|
|
|
default:
|
|
|
- return fmt.Errorf("unsupported registryAuthFromValue")
|
|
|
+ return nil, fmt.Errorf("unsupported registryAuthFromValue")
|
|
|
}
|
|
|
if ctnr == nil {
|
|
|
- return fmt.Errorf("service does not use container tasks")
|
|
|
+ return nil, fmt.Errorf("service does not use container tasks")
|
|
|
}
|
|
|
newCtnr.PullOptions = ctnr.PullOptions
|
|
|
// update encodedAuth so it can be used to pin image by digest
|
|
@@ -1191,11 +1196,15 @@ func (c *Cluster) UpdateService(serviceIDOrName string, version uint64, spec typ
|
|
|
logrus.Warnf("invalid authconfig: %v", err)
|
|
|
}
|
|
|
}
|
|
|
+
|
|
|
+ resp := &apitypes.ServiceUpdateResponse{}
|
|
|
+
|
|
|
// pin image by digest
|
|
|
if os.Getenv("DOCKER_SERVICE_PREFER_OFFLINE_IMAGE") != "1" {
|
|
|
digestImage, err := c.imageWithDigestString(ctx, newCtnr.Image, authConfig)
|
|
|
if err != nil {
|
|
|
logrus.Warnf("unable to pin image %s to digest: %s", newCtnr.Image, err.Error())
|
|
|
+ resp.Warnings = append(resp.Warnings, fmt.Sprintf("unable to pin image %s to digest: %s", newCtnr.Image, err.Error()))
|
|
|
} else if newCtnr.Image != digestImage {
|
|
|
logrus.Debugf("pinning image %s by digest: %s", newCtnr.Image, digestImage)
|
|
|
newCtnr.Image = digestImage
|
|
@@ -1212,7 +1221,8 @@ func (c *Cluster) UpdateService(serviceIDOrName string, version uint64, spec typ
|
|
|
},
|
|
|
},
|
|
|
)
|
|
|
- return err
|
|
|
+
|
|
|
+ return resp, err
|
|
|
}
|
|
|
|
|
|
// RemoveService removes a service from a managed swarm cluster.
|