|
@@ -16,6 +16,7 @@ import (
|
|
"time"
|
|
"time"
|
|
|
|
|
|
"github.com/Sirupsen/logrus"
|
|
"github.com/Sirupsen/logrus"
|
|
|
|
+ distreference "github.com/docker/distribution/reference"
|
|
apierrors "github.com/docker/docker/api/errors"
|
|
apierrors "github.com/docker/docker/api/errors"
|
|
apitypes "github.com/docker/docker/api/types"
|
|
apitypes "github.com/docker/docker/api/types"
|
|
"github.com/docker/docker/api/types/backend"
|
|
"github.com/docker/docker/api/types/backend"
|
|
@@ -69,7 +70,7 @@ var ErrSwarmJoinTimeoutReached = fmt.Errorf("Timeout was reached before node was
|
|
// ErrSwarmLocked is returned if the swarm is encrypted and needs a key to unlock it.
|
|
// ErrSwarmLocked is returned if the swarm is encrypted and needs a key to unlock it.
|
|
var ErrSwarmLocked = fmt.Errorf("Swarm is encrypted and needs to be unlocked before it can be used. Please use \"docker swarm unlock\" to unlock it.")
|
|
var ErrSwarmLocked = fmt.Errorf("Swarm is encrypted and needs to be unlocked before it can be used. Please use \"docker swarm unlock\" to unlock it.")
|
|
|
|
|
|
-// ErrSwarmCertificatesExipred is returned if docker was not started for the whole validity period and they had no chance to renew automatically.
|
|
|
|
|
|
+// ErrSwarmCertificatesExpired is returned if docker was not started for the whole validity period and they had no chance to renew automatically.
|
|
var ErrSwarmCertificatesExpired = errors.New("Swarm certificates have expired. To replace them, leave the swarm and join again.")
|
|
var ErrSwarmCertificatesExpired = errors.New("Swarm certificates have expired. To replace them, leave the swarm and join again.")
|
|
|
|
|
|
// NetworkSubnetsProvider exposes functions for retrieving the subnets
|
|
// NetworkSubnetsProvider exposes functions for retrieving the subnets
|
|
@@ -587,6 +588,15 @@ func (c *Cluster) GetUnlockKey() (string, error) {
|
|
|
|
|
|
// UnlockSwarm provides a key to decrypt data that is encrypted at rest.
|
|
// UnlockSwarm provides a key to decrypt data that is encrypted at rest.
|
|
func (c *Cluster) UnlockSwarm(req types.UnlockRequest) error {
|
|
func (c *Cluster) UnlockSwarm(req types.UnlockRequest) error {
|
|
|
|
+ c.RLock()
|
|
|
|
+ if !c.isActiveManager() {
|
|
|
|
+ if err := c.errNoManager(); err != ErrSwarmLocked {
|
|
|
|
+ c.RUnlock()
|
|
|
|
+ return err
|
|
|
|
+ }
|
|
|
|
+ }
|
|
|
|
+ c.RUnlock()
|
|
|
|
+
|
|
key, err := encryption.ParseHumanReadableKey(req.UnlockKey)
|
|
key, err := encryption.ParseHumanReadableKey(req.UnlockKey)
|
|
if err != nil {
|
|
if err != nil {
|
|
return err
|
|
return err
|
|
@@ -1008,16 +1018,25 @@ func (c *Cluster) GetServices(options apitypes.ServiceListOptions) ([]types.Serv
|
|
|
|
|
|
// imageWithDigestString takes an image such as name or name:tag
|
|
// imageWithDigestString takes an image such as name or name:tag
|
|
// and returns the image pinned to a digest, such as name@sha256:34234...
|
|
// and returns the image pinned to a digest, such as name@sha256:34234...
|
|
|
|
+// Due to the difference between the docker/docker/reference, and the
|
|
|
|
+// docker/distribution/reference packages, we're parsing the image twice.
|
|
|
|
+// As the two packages converge, this function should be simplified.
|
|
|
|
+// TODO(nishanttotla): After the packages converge, the function must
|
|
|
|
+// convert distreference.Named -> distreference.Canonical, and the logic simplified.
|
|
func (c *Cluster) imageWithDigestString(ctx context.Context, image string, authConfig *apitypes.AuthConfig) (string, error) {
|
|
func (c *Cluster) imageWithDigestString(ctx context.Context, image string, authConfig *apitypes.AuthConfig) (string, error) {
|
|
- ref, err := reference.ParseNamed(image)
|
|
|
|
|
|
+ ref, err := distreference.ParseNamed(image)
|
|
if err != nil {
|
|
if err != nil {
|
|
return "", err
|
|
return "", err
|
|
}
|
|
}
|
|
// only query registry if not a canonical reference (i.e. with digest)
|
|
// only query registry if not a canonical reference (i.e. with digest)
|
|
- if _, ok := ref.(reference.Canonical); !ok {
|
|
|
|
- ref = reference.WithDefaultTag(ref)
|
|
|
|
-
|
|
|
|
- namedTaggedRef, ok := ref.(reference.NamedTagged)
|
|
|
|
|
|
+ if _, ok := ref.(distreference.Canonical); !ok {
|
|
|
|
+ // create a docker/docker/reference Named object because GetRepository needs it
|
|
|
|
+ dockerRef, err := reference.ParseNamed(image)
|
|
|
|
+ if err != nil {
|
|
|
|
+ return "", err
|
|
|
|
+ }
|
|
|
|
+ dockerRef = reference.WithDefaultTag(dockerRef)
|
|
|
|
+ namedTaggedRef, ok := dockerRef.(reference.NamedTagged)
|
|
if !ok {
|
|
if !ok {
|
|
return "", fmt.Errorf("unable to cast image to NamedTagged reference object")
|
|
return "", fmt.Errorf("unable to cast image to NamedTagged reference object")
|
|
}
|
|
}
|
|
@@ -1031,28 +1050,23 @@ func (c *Cluster) imageWithDigestString(ctx context.Context, image string, authC
|
|
return "", err
|
|
return "", err
|
|
}
|
|
}
|
|
|
|
|
|
- // TODO(nishanttotla): Currently, the service would lose the tag while calling WithDigest
|
|
|
|
- // To prevent this, we create the image string manually, which is a bad idea in general
|
|
|
|
- // This will be fixed when https://github.com/docker/distribution/pull/2044 is vendored
|
|
|
|
- // namedDigestedRef, err := reference.WithDigest(ref, dscrptr.Digest)
|
|
|
|
- // if err != nil {
|
|
|
|
- // return "", err
|
|
|
|
- // }
|
|
|
|
- // return namedDigestedRef.String(), nil
|
|
|
|
- return image + "@" + dscrptr.Digest.String(), nil
|
|
|
|
- } else {
|
|
|
|
- // reference already contains a digest, so just return it
|
|
|
|
- return ref.String(), nil
|
|
|
|
|
|
+ namedDigestedRef, err := distreference.WithDigest(distreference.EnsureTagged(ref), dscrptr.Digest)
|
|
|
|
+ if err != nil {
|
|
|
|
+ return "", err
|
|
|
|
+ }
|
|
|
|
+ return namedDigestedRef.String(), nil
|
|
}
|
|
}
|
|
|
|
+ // reference already contains a digest, so just return it
|
|
|
|
+ return ref.String(), nil
|
|
}
|
|
}
|
|
|
|
|
|
// CreateService creates a new service in a managed swarm cluster.
|
|
// CreateService creates a new service in a managed swarm cluster.
|
|
-func (c *Cluster) CreateService(s types.ServiceSpec, encodedAuth string) (string, error) {
|
|
|
|
|
|
+func (c *Cluster) CreateService(s types.ServiceSpec, encodedAuth string) (*apitypes.ServiceCreateResponse, error) {
|
|
c.RLock()
|
|
c.RLock()
|
|
defer c.RUnlock()
|
|
defer c.RUnlock()
|
|
|
|
|
|
if !c.isActiveManager() {
|
|
if !c.isActiveManager() {
|
|
- return "", c.errNoManager()
|
|
|
|
|
|
+ return nil, c.errNoManager()
|
|
}
|
|
}
|
|
|
|
|
|
ctx, cancel := c.getRequestContext()
|
|
ctx, cancel := c.getRequestContext()
|
|
@@ -1060,17 +1074,17 @@ func (c *Cluster) CreateService(s types.ServiceSpec, encodedAuth string) (string
|
|
|
|
|
|
err := c.populateNetworkID(ctx, c.client, &s)
|
|
err := c.populateNetworkID(ctx, c.client, &s)
|
|
if err != nil {
|
|
if err != nil {
|
|
- return "", err
|
|
|
|
|
|
+ return nil, err
|
|
}
|
|
}
|
|
|
|
|
|
serviceSpec, err := convert.ServiceSpecToGRPC(s)
|
|
serviceSpec, err := convert.ServiceSpecToGRPC(s)
|
|
if err != nil {
|
|
if err != nil {
|
|
- return "", err
|
|
|
|
|
|
+ return nil, err
|
|
}
|
|
}
|
|
|
|
|
|
ctnr := serviceSpec.Task.GetContainer()
|
|
ctnr := serviceSpec.Task.GetContainer()
|
|
if ctnr == nil {
|
|
if ctnr == nil {
|
|
- return "", fmt.Errorf("service does not use container tasks")
|
|
|
|
|
|
+ return nil, fmt.Errorf("service does not use container tasks")
|
|
}
|
|
}
|
|
|
|
|
|
if encodedAuth != "" {
|
|
if encodedAuth != "" {
|
|
@@ -1084,11 +1098,15 @@ func (c *Cluster) CreateService(s types.ServiceSpec, encodedAuth string) (string
|
|
logrus.Warnf("invalid authconfig: %v", err)
|
|
logrus.Warnf("invalid authconfig: %v", err)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
+
|
|
|
|
+ resp := &apitypes.ServiceCreateResponse{}
|
|
|
|
+
|
|
// pin image by digest
|
|
// pin image by digest
|
|
if os.Getenv("DOCKER_SERVICE_PREFER_OFFLINE_IMAGE") != "1" {
|
|
if os.Getenv("DOCKER_SERVICE_PREFER_OFFLINE_IMAGE") != "1" {
|
|
digestImage, err := c.imageWithDigestString(ctx, ctnr.Image, authConfig)
|
|
digestImage, err := c.imageWithDigestString(ctx, ctnr.Image, authConfig)
|
|
if err != nil {
|
|
if err != nil {
|
|
logrus.Warnf("unable to pin image %s to digest: %s", ctnr.Image, err.Error())
|
|
logrus.Warnf("unable to pin image %s to digest: %s", ctnr.Image, err.Error())
|
|
|
|
+ resp.Warnings = append(resp.Warnings, fmt.Sprintf("unable to pin image %s to digest: %s", ctnr.Image, err.Error()))
|
|
} else {
|
|
} else {
|
|
logrus.Debugf("pinning image %s by digest: %s", ctnr.Image, digestImage)
|
|
logrus.Debugf("pinning image %s by digest: %s", ctnr.Image, digestImage)
|
|
ctnr.Image = digestImage
|
|
ctnr.Image = digestImage
|
|
@@ -1097,10 +1115,11 @@ func (c *Cluster) CreateService(s types.ServiceSpec, encodedAuth string) (string
|
|
|
|
|
|
r, err := c.client.CreateService(ctx, &swarmapi.CreateServiceRequest{Spec: &serviceSpec})
|
|
r, err := c.client.CreateService(ctx, &swarmapi.CreateServiceRequest{Spec: &serviceSpec})
|
|
if err != nil {
|
|
if err != nil {
|
|
- return "", err
|
|
|
|
|
|
+ return nil, err
|
|
}
|
|
}
|
|
|
|
|
|
- return r.Service.ID, nil
|
|
|
|
|
|
+ resp.ID = r.Service.ID
|
|
|
|
+ return resp, nil
|
|
}
|
|
}
|
|
|
|
|
|
// GetService returns a service based on an ID or name.
|
|
// GetService returns a service based on an ID or name.
|
|
@@ -1123,12 +1142,12 @@ func (c *Cluster) GetService(input string) (types.Service, error) {
|
|
}
|
|
}
|
|
|
|
|
|
// UpdateService updates existing service to match new properties.
|
|
// UpdateService updates existing service to match new properties.
|
|
-func (c *Cluster) UpdateService(serviceIDOrName string, version uint64, spec types.ServiceSpec, encodedAuth string, registryAuthFrom string) error {
|
|
|
|
|
|
+func (c *Cluster) UpdateService(serviceIDOrName string, version uint64, spec types.ServiceSpec, encodedAuth string, registryAuthFrom string) (*apitypes.ServiceUpdateResponse, error) {
|
|
c.RLock()
|
|
c.RLock()
|
|
defer c.RUnlock()
|
|
defer c.RUnlock()
|
|
|
|
|
|
if !c.isActiveManager() {
|
|
if !c.isActiveManager() {
|
|
- return c.errNoManager()
|
|
|
|
|
|
+ return nil, c.errNoManager()
|
|
}
|
|
}
|
|
|
|
|
|
ctx, cancel := c.getRequestContext()
|
|
ctx, cancel := c.getRequestContext()
|
|
@@ -1136,22 +1155,22 @@ func (c *Cluster) UpdateService(serviceIDOrName string, version uint64, spec typ
|
|
|
|
|
|
err := c.populateNetworkID(ctx, c.client, &spec)
|
|
err := c.populateNetworkID(ctx, c.client, &spec)
|
|
if err != nil {
|
|
if err != nil {
|
|
- return err
|
|
|
|
|
|
+ return nil, err
|
|
}
|
|
}
|
|
|
|
|
|
serviceSpec, err := convert.ServiceSpecToGRPC(spec)
|
|
serviceSpec, err := convert.ServiceSpecToGRPC(spec)
|
|
if err != nil {
|
|
if err != nil {
|
|
- return err
|
|
|
|
|
|
+ return nil, err
|
|
}
|
|
}
|
|
|
|
|
|
currentService, err := getService(ctx, c.client, serviceIDOrName)
|
|
currentService, err := getService(ctx, c.client, serviceIDOrName)
|
|
if err != nil {
|
|
if err != nil {
|
|
- return err
|
|
|
|
|
|
+ return nil, err
|
|
}
|
|
}
|
|
|
|
|
|
newCtnr := serviceSpec.Task.GetContainer()
|
|
newCtnr := serviceSpec.Task.GetContainer()
|
|
if newCtnr == nil {
|
|
if newCtnr == nil {
|
|
- return fmt.Errorf("service does not use container tasks")
|
|
|
|
|
|
+ return nil, fmt.Errorf("service does not use container tasks")
|
|
}
|
|
}
|
|
|
|
|
|
if encodedAuth != "" {
|
|
if encodedAuth != "" {
|
|
@@ -1165,14 +1184,14 @@ func (c *Cluster) UpdateService(serviceIDOrName string, version uint64, spec typ
|
|
ctnr = currentService.Spec.Task.GetContainer()
|
|
ctnr = currentService.Spec.Task.GetContainer()
|
|
case apitypes.RegistryAuthFromPreviousSpec:
|
|
case apitypes.RegistryAuthFromPreviousSpec:
|
|
if currentService.PreviousSpec == nil {
|
|
if currentService.PreviousSpec == nil {
|
|
- return fmt.Errorf("service does not have a previous spec")
|
|
|
|
|
|
+ return nil, fmt.Errorf("service does not have a previous spec")
|
|
}
|
|
}
|
|
ctnr = currentService.PreviousSpec.Task.GetContainer()
|
|
ctnr = currentService.PreviousSpec.Task.GetContainer()
|
|
default:
|
|
default:
|
|
- return fmt.Errorf("unsupported registryAuthFromValue")
|
|
|
|
|
|
+ return nil, fmt.Errorf("unsupported registryAuthFromValue")
|
|
}
|
|
}
|
|
if ctnr == nil {
|
|
if ctnr == nil {
|
|
- return fmt.Errorf("service does not use container tasks")
|
|
|
|
|
|
+ return nil, fmt.Errorf("service does not use container tasks")
|
|
}
|
|
}
|
|
newCtnr.PullOptions = ctnr.PullOptions
|
|
newCtnr.PullOptions = ctnr.PullOptions
|
|
// update encodedAuth so it can be used to pin image by digest
|
|
// update encodedAuth so it can be used to pin image by digest
|
|
@@ -1188,11 +1207,15 @@ func (c *Cluster) UpdateService(serviceIDOrName string, version uint64, spec typ
|
|
logrus.Warnf("invalid authconfig: %v", err)
|
|
logrus.Warnf("invalid authconfig: %v", err)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
+
|
|
|
|
+ resp := &apitypes.ServiceUpdateResponse{}
|
|
|
|
+
|
|
// pin image by digest
|
|
// pin image by digest
|
|
if os.Getenv("DOCKER_SERVICE_PREFER_OFFLINE_IMAGE") != "1" {
|
|
if os.Getenv("DOCKER_SERVICE_PREFER_OFFLINE_IMAGE") != "1" {
|
|
digestImage, err := c.imageWithDigestString(ctx, newCtnr.Image, authConfig)
|
|
digestImage, err := c.imageWithDigestString(ctx, newCtnr.Image, authConfig)
|
|
if err != nil {
|
|
if err != nil {
|
|
logrus.Warnf("unable to pin image %s to digest: %s", newCtnr.Image, err.Error())
|
|
logrus.Warnf("unable to pin image %s to digest: %s", newCtnr.Image, err.Error())
|
|
|
|
+ resp.Warnings = append(resp.Warnings, fmt.Sprintf("unable to pin image %s to digest: %s", newCtnr.Image, err.Error()))
|
|
} else if newCtnr.Image != digestImage {
|
|
} else if newCtnr.Image != digestImage {
|
|
logrus.Debugf("pinning image %s by digest: %s", newCtnr.Image, digestImage)
|
|
logrus.Debugf("pinning image %s by digest: %s", newCtnr.Image, digestImage)
|
|
newCtnr.Image = digestImage
|
|
newCtnr.Image = digestImage
|
|
@@ -1209,7 +1232,8 @@ func (c *Cluster) UpdateService(serviceIDOrName string, version uint64, spec typ
|
|
},
|
|
},
|
|
},
|
|
},
|
|
)
|
|
)
|
|
- return err
|
|
|
|
|
|
+
|
|
|
|
+ return resp, err
|
|
}
|
|
}
|
|
|
|
|
|
// RemoveService removes a service from a managed swarm cluster.
|
|
// RemoveService removes a service from a managed swarm cluster.
|
|
@@ -1369,7 +1393,7 @@ func (c *Cluster) GetNode(input string) (types.Node, error) {
|
|
}
|
|
}
|
|
|
|
|
|
// UpdateNode updates existing nodes properties.
|
|
// UpdateNode updates existing nodes properties.
|
|
-func (c *Cluster) UpdateNode(nodeID string, version uint64, spec types.NodeSpec) error {
|
|
|
|
|
|
+func (c *Cluster) UpdateNode(input string, version uint64, spec types.NodeSpec) error {
|
|
c.RLock()
|
|
c.RLock()
|
|
defer c.RUnlock()
|
|
defer c.RUnlock()
|
|
|
|
|
|
@@ -1385,10 +1409,15 @@ func (c *Cluster) UpdateNode(nodeID string, version uint64, spec types.NodeSpec)
|
|
ctx, cancel := c.getRequestContext()
|
|
ctx, cancel := c.getRequestContext()
|
|
defer cancel()
|
|
defer cancel()
|
|
|
|
|
|
|
|
+ currentNode, err := getNode(ctx, c.client, input)
|
|
|
|
+ if err != nil {
|
|
|
|
+ return err
|
|
|
|
+ }
|
|
|
|
+
|
|
_, err = c.client.UpdateNode(
|
|
_, err = c.client.UpdateNode(
|
|
ctx,
|
|
ctx,
|
|
&swarmapi.UpdateNodeRequest{
|
|
&swarmapi.UpdateNodeRequest{
|
|
- NodeID: nodeID,
|
|
|
|
|
|
+ NodeID: currentNode.ID,
|
|
Spec: &nodeSpec,
|
|
Spec: &nodeSpec,
|
|
NodeVersion: &swarmapi.Version{
|
|
NodeVersion: &swarmapi.Version{
|
|
Index: version,
|
|
Index: version,
|