service_create.go 5.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156
  1. package client
  2. import (
  3. "encoding/json"
  4. "fmt"
  5. "github.com/docker/distribution/reference"
  6. "github.com/docker/docker/api/types"
  7. "github.com/docker/docker/api/types/swarm"
  8. digest "github.com/opencontainers/go-digest"
  9. "github.com/pkg/errors"
  10. "golang.org/x/net/context"
  11. )
  12. // ServiceCreate creates a new Service.
  13. func (cli *Client) ServiceCreate(ctx context.Context, service swarm.ServiceSpec, options types.ServiceCreateOptions) (types.ServiceCreateResponse, error) {
  14. var distErr error
  15. headers := map[string][]string{
  16. "version": {cli.version},
  17. }
  18. if options.EncodedRegistryAuth != "" {
  19. headers["X-Registry-Auth"] = []string{options.EncodedRegistryAuth}
  20. }
  21. // Make sure containerSpec is not nil when no runtime is set or the runtime is set to container
  22. if service.TaskTemplate.ContainerSpec == nil && (service.TaskTemplate.Runtime == "" || service.TaskTemplate.Runtime == swarm.RuntimeContainer) {
  23. service.TaskTemplate.ContainerSpec = &swarm.ContainerSpec{}
  24. }
  25. if err := validateServiceSpec(service); err != nil {
  26. return types.ServiceCreateResponse{}, err
  27. }
  28. // ensure that the image is tagged
  29. var imgPlatforms []swarm.Platform
  30. if service.TaskTemplate.ContainerSpec != nil {
  31. if taggedImg := imageWithTagString(service.TaskTemplate.ContainerSpec.Image); taggedImg != "" {
  32. service.TaskTemplate.ContainerSpec.Image = taggedImg
  33. }
  34. if options.QueryRegistry {
  35. var img string
  36. img, imgPlatforms, distErr = imageDigestAndPlatforms(ctx, cli, service.TaskTemplate.ContainerSpec.Image, options.EncodedRegistryAuth)
  37. if img != "" {
  38. service.TaskTemplate.ContainerSpec.Image = img
  39. }
  40. }
  41. }
  42. // ensure that the image is tagged
  43. if service.TaskTemplate.PluginSpec != nil {
  44. if taggedImg := imageWithTagString(service.TaskTemplate.PluginSpec.Remote); taggedImg != "" {
  45. service.TaskTemplate.PluginSpec.Remote = taggedImg
  46. }
  47. if options.QueryRegistry {
  48. var img string
  49. img, imgPlatforms, distErr = imageDigestAndPlatforms(ctx, cli, service.TaskTemplate.PluginSpec.Remote, options.EncodedRegistryAuth)
  50. if img != "" {
  51. service.TaskTemplate.PluginSpec.Remote = img
  52. }
  53. }
  54. }
  55. if service.TaskTemplate.Placement == nil && len(imgPlatforms) > 0 {
  56. service.TaskTemplate.Placement = &swarm.Placement{}
  57. }
  58. if len(imgPlatforms) > 0 {
  59. service.TaskTemplate.Placement.Platforms = imgPlatforms
  60. }
  61. var response types.ServiceCreateResponse
  62. resp, err := cli.post(ctx, "/services/create", nil, service, headers)
  63. if err != nil {
  64. return response, err
  65. }
  66. err = json.NewDecoder(resp.body).Decode(&response)
  67. if distErr != nil {
  68. response.Warnings = append(response.Warnings, digestWarning(service.TaskTemplate.ContainerSpec.Image))
  69. }
  70. ensureReaderClosed(resp)
  71. return response, err
  72. }
  73. func imageDigestAndPlatforms(ctx context.Context, cli DistributionAPIClient, image, encodedAuth string) (string, []swarm.Platform, error) {
  74. distributionInspect, err := cli.DistributionInspect(ctx, image, encodedAuth)
  75. imageWithDigest := image
  76. var platforms []swarm.Platform
  77. if err != nil {
  78. return "", nil, err
  79. }
  80. imageWithDigest = imageWithDigestString(image, distributionInspect.Descriptor.Digest)
  81. if len(distributionInspect.Platforms) > 0 {
  82. platforms = make([]swarm.Platform, 0, len(distributionInspect.Platforms))
  83. for _, p := range distributionInspect.Platforms {
  84. platforms = append(platforms, swarm.Platform{
  85. Architecture: p.Architecture,
  86. OS: p.OS,
  87. })
  88. }
  89. }
  90. return imageWithDigest, platforms, err
  91. }
  92. // imageWithDigestString takes an image string and a digest, and updates
  93. // the image string if it didn't originally contain a digest. It returns
  94. // an empty string if there are no updates.
  95. func imageWithDigestString(image string, dgst digest.Digest) string {
  96. namedRef, err := reference.ParseNormalizedNamed(image)
  97. if err == nil {
  98. if _, isCanonical := namedRef.(reference.Canonical); !isCanonical {
  99. // ensure that image gets a default tag if none is provided
  100. img, err := reference.WithDigest(namedRef, dgst)
  101. if err == nil {
  102. return reference.FamiliarString(img)
  103. }
  104. }
  105. }
  106. return ""
  107. }
  108. // imageWithTagString takes an image string, and returns a tagged image
  109. // string, adding a 'latest' tag if one was not provided. It returns an
  110. // emptry string if a canonical reference was provided
  111. func imageWithTagString(image string) string {
  112. namedRef, err := reference.ParseNormalizedNamed(image)
  113. if err == nil {
  114. return reference.FamiliarString(reference.TagNameOnly(namedRef))
  115. }
  116. return ""
  117. }
  118. // digestWarning constructs a formatted warning string using the
  119. // image name that could not be pinned by digest. The formatting
  120. // is hardcoded, but could me made smarter in the future
  121. func digestWarning(image string) string {
  122. return fmt.Sprintf("image %s could not be accessed on a registry to record\nits digest. Each node will access %s independently,\npossibly leading to different nodes running different\nversions of the image.\n", image, image)
  123. }
  124. func validateServiceSpec(s swarm.ServiceSpec) error {
  125. if s.TaskTemplate.ContainerSpec != nil && s.TaskTemplate.PluginSpec != nil {
  126. return errors.New("must not specify both a container spec and a plugin spec in the task template")
  127. }
  128. if s.TaskTemplate.PluginSpec != nil && s.TaskTemplate.Runtime != swarm.RuntimePlugin {
  129. return errors.New("mismatched runtime with plugin spec")
  130. }
  131. if s.TaskTemplate.ContainerSpec != nil && (s.TaskTemplate.Runtime != "" && s.TaskTemplate.Runtime != swarm.RuntimeContainer) {
  132. return errors.New("mismatched runtime with container spec")
  133. }
  134. return nil
  135. }