2016-09-08 13:11:39 -04:00
package service
import (
2017-01-19 18:27:37 -05:00
"errors"
2016-09-08 13:11:39 -04:00
"fmt"
"strconv"
"strings"
"time"
2016-10-13 14:28:32 -04:00
"github.com/docker/docker/api/types/container"
2016-09-08 13:11:39 -04:00
"github.com/docker/docker/api/types/swarm"
"github.com/docker/docker/opts"
runconfigopts "github.com/docker/docker/runconfig/opts"
2017-03-15 16:49:52 -04:00
"github.com/spf13/pflag"
2016-09-08 13:11:39 -04:00
)
type int64Value interface {
Value ( ) int64
}
2016-10-13 14:28:32 -04:00
// PositiveDurationOpt is an option type for time.Duration that uses a pointer.
// It bahave similarly to DurationOpt but only allows positive duration values.
type PositiveDurationOpt struct {
DurationOpt
}
// Set a new value on the option. Setting a negative duration value will cause
// an error to be returned.
func ( d * PositiveDurationOpt ) Set ( s string ) error {
err := d . DurationOpt . Set ( s )
if err != nil {
return err
}
if * d . DurationOpt . value < 0 {
return fmt . Errorf ( "duration cannot be negative" )
}
return nil
}
2016-09-08 13:11:39 -04:00
// DurationOpt is an option type for time.Duration that uses a pointer. This
// allows us to get nil values outside, instead of defaulting to 0
type DurationOpt struct {
value * time . Duration
}
// Set a new value on the option
func ( d * DurationOpt ) Set ( s string ) error {
v , err := time . ParseDuration ( s )
d . value = & v
return err
}
2016-11-08 10:06:07 -05:00
// Type returns the type of this option, which will be displayed in `--help` output
2016-09-08 13:11:39 -04:00
func ( d * DurationOpt ) Type ( ) string {
2016-11-08 10:06:07 -05:00
return "duration"
2016-09-08 13:11:39 -04:00
}
// String returns a string repr of this option
func ( d * DurationOpt ) String ( ) string {
if d . value != nil {
return d . value . String ( )
}
2016-12-15 09:12:33 -05:00
return ""
2016-09-08 13:11:39 -04:00
}
// Value returns the time.Duration
func ( d * DurationOpt ) Value ( ) * time . Duration {
return d . value
}
// Uint64Opt represents a uint64.
type Uint64Opt struct {
value * uint64
}
// Set a new value on the option
func ( i * Uint64Opt ) Set ( s string ) error {
v , err := strconv . ParseUint ( s , 0 , 64 )
i . value = & v
return err
}
2016-11-08 10:06:07 -05:00
// Type returns the type of this option, which will be displayed in `--help` output
2016-09-08 13:11:39 -04:00
func ( i * Uint64Opt ) Type ( ) string {
2016-11-08 10:06:07 -05:00
return "uint"
2016-09-08 13:11:39 -04:00
}
// String returns a string repr of this option
func ( i * Uint64Opt ) String ( ) string {
if i . value != nil {
return fmt . Sprintf ( "%v" , * i . value )
}
2016-12-15 09:12:33 -05:00
return ""
2016-09-08 13:11:39 -04:00
}
// Value returns the uint64
func ( i * Uint64Opt ) Value ( ) * uint64 {
return i . value
}
2016-11-08 10:06:07 -05:00
type floatValue float32
func ( f * floatValue ) Set ( s string ) error {
v , err := strconv . ParseFloat ( s , 32 )
* f = floatValue ( v )
return err
}
func ( f * floatValue ) Type ( ) string {
return "float"
}
func ( f * floatValue ) String ( ) string {
return strconv . FormatFloat ( float64 ( * f ) , 'g' , - 1 , 32 )
}
func ( f * floatValue ) Value ( ) float32 {
return float32 ( * f )
}
2017-01-19 18:27:37 -05:00
// placementPrefOpts holds a list of placement preferences.
type placementPrefOpts struct {
prefs [ ] swarm . PlacementPreference
strings [ ] string
}
func ( opts * placementPrefOpts ) String ( ) string {
if len ( opts . strings ) == 0 {
return ""
}
return fmt . Sprintf ( "%v" , opts . strings )
}
// Set validates the input value and adds it to the internal slices.
// Note: in the future strategies other than "spread", may be supported,
// as well as additional comma-separated options.
func ( opts * placementPrefOpts ) Set ( value string ) error {
fields := strings . Split ( value , "=" )
if len ( fields ) != 2 {
return errors . New ( ` placement preference must be of the format "<strategy>=<arg>" ` )
}
if fields [ 0 ] != "spread" {
return fmt . Errorf ( "unsupported placement preference %s (only spread is supported)" , fields [ 0 ] )
}
opts . prefs = append ( opts . prefs , swarm . PlacementPreference {
Spread : & swarm . SpreadOver {
SpreadDescriptor : fields [ 1 ] ,
} ,
} )
opts . strings = append ( opts . strings , value )
return nil
}
// Type returns a string name for this Option type
func ( opts * placementPrefOpts ) Type ( ) string {
return "pref"
}
2016-09-08 13:11:39 -04:00
type updateOptions struct {
2016-09-02 17:12:05 -04:00
parallelism uint64
delay time . Duration
monitor time . Duration
onFailure string
2016-11-08 10:06:07 -05:00
maxFailureRatio floatValue
2016-09-08 13:11:39 -04:00
}
2017-02-15 19:04:30 -05:00
func ( opts updateOptions ) config ( ) * swarm . UpdateConfig {
return & swarm . UpdateConfig {
Parallelism : opts . parallelism ,
Delay : opts . delay ,
Monitor : opts . monitor ,
FailureAction : opts . onFailure ,
MaxFailureRatio : opts . maxFailureRatio . Value ( ) ,
}
}
2016-09-08 13:11:39 -04:00
type resourceOptions struct {
2016-11-01 13:12:29 -04:00
limitCPU opts . NanoCPUs
2016-12-25 04:11:12 -05:00
limitMemBytes opts . MemBytes
2016-11-01 13:12:29 -04:00
resCPU opts . NanoCPUs
2016-12-25 04:11:12 -05:00
resMemBytes opts . MemBytes
2016-09-08 13:11:39 -04:00
}
func ( r * resourceOptions ) ToResourceRequirements ( ) * swarm . ResourceRequirements {
return & swarm . ResourceRequirements {
Limits : & swarm . Resources {
NanoCPUs : r . limitCPU . Value ( ) ,
MemoryBytes : r . limitMemBytes . Value ( ) ,
} ,
Reservations : & swarm . Resources {
NanoCPUs : r . resCPU . Value ( ) ,
MemoryBytes : r . resMemBytes . Value ( ) ,
} ,
}
}
type restartPolicyOptions struct {
condition string
delay DurationOpt
maxAttempts Uint64Opt
window DurationOpt
}
func ( r * restartPolicyOptions ) ToRestartPolicy ( ) * swarm . RestartPolicy {
return & swarm . RestartPolicy {
Condition : swarm . RestartPolicyCondition ( r . condition ) ,
Delay : r . delay . Value ( ) ,
MaxAttempts : r . maxAttempts . Value ( ) ,
Window : r . window . Value ( ) ,
}
}
func convertNetworks ( networks [ ] string ) [ ] swarm . NetworkAttachmentConfig {
nets := [ ] swarm . NetworkAttachmentConfig { }
for _ , network := range networks {
nets = append ( nets , swarm . NetworkAttachmentConfig { Target : network } )
}
return nets
}
type endpointOptions struct {
2016-12-08 16:32:10 -05:00
mode string
publishPorts opts . PortOpt
2016-09-08 13:11:39 -04:00
}
func ( e * endpointOptions ) ToEndpointSpec ( ) * swarm . EndpointSpec {
return & swarm . EndpointSpec {
Mode : swarm . ResolutionMode ( strings . ToLower ( e . mode ) ) ,
2016-12-08 16:32:10 -05:00
Ports : e . publishPorts . Value ( ) ,
2016-09-08 13:11:39 -04:00
}
}
type logDriverOptions struct {
name string
opts opts . ListOpts
}
func newLogDriverOptions ( ) logDriverOptions {
2016-12-23 14:09:12 -05:00
return logDriverOptions { opts : opts . NewListOpts ( opts . ValidateEnv ) }
2016-09-08 13:11:39 -04:00
}
func ( ldo * logDriverOptions ) toLogDriver ( ) * swarm . Driver {
if ldo . name == "" {
return nil
}
// set the log driver only if specified.
return & swarm . Driver {
Name : ldo . name ,
Options : runconfigopts . ConvertKVStringsToMap ( ldo . opts . GetAll ( ) ) ,
}
}
2016-10-13 14:28:32 -04:00
type healthCheckOptions struct {
cmd string
interval PositiveDurationOpt
timeout PositiveDurationOpt
retries int
noHealthcheck bool
}
func ( opts * healthCheckOptions ) toHealthConfig ( ) ( * container . HealthConfig , error ) {
var healthConfig * container . HealthConfig
haveHealthSettings := opts . cmd != "" ||
opts . interval . Value ( ) != nil ||
opts . timeout . Value ( ) != nil ||
opts . retries != 0
if opts . noHealthcheck {
if haveHealthSettings {
return nil , fmt . Errorf ( "--%s conflicts with --health-* options" , flagNoHealthcheck )
}
healthConfig = & container . HealthConfig { Test : [ ] string { "NONE" } }
} else if haveHealthSettings {
var test [ ] string
if opts . cmd != "" {
test = [ ] string { "CMD-SHELL" , opts . cmd }
}
var interval , timeout time . Duration
if ptr := opts . interval . Value ( ) ; ptr != nil {
interval = * ptr
}
if ptr := opts . timeout . Value ( ) ; ptr != nil {
timeout = * ptr
}
healthConfig = & container . HealthConfig {
Test : test ,
Interval : interval ,
Timeout : timeout ,
Retries : opts . retries ,
}
}
return healthConfig , nil
}
2016-11-03 11:05:00 -04:00
// convertExtraHostsToSwarmHosts converts an array of extra hosts in cli
// <host>:<ip>
// into a swarmkit host format:
// IP_address canonical_hostname [aliases...]
// This assumes input value (<host>:<ip>) has already been validated
func convertExtraHostsToSwarmHosts ( extraHosts [ ] string ) [ ] string {
hosts := [ ] string { }
for _ , extraHost := range extraHosts {
parts := strings . SplitN ( extraHost , ":" , 2 )
hosts = append ( hosts , fmt . Sprintf ( "%s %s" , parts [ 1 ] , parts [ 0 ] ) )
}
return hosts
}
2016-09-08 13:11:39 -04:00
type serviceOptions struct {
name string
labels opts . ListOpts
containerLabels opts . ListOpts
image string
args [ ] string
2016-10-27 07:44:19 -04:00
hostname string
2016-09-08 13:11:39 -04:00
env opts . ListOpts
2016-07-20 02:58:32 -04:00
envFile opts . ListOpts
2016-09-08 13:11:39 -04:00
workdir string
user string
2016-11-08 10:06:07 -05:00
groups opts . ListOpts
2017-02-06 00:22:57 -05:00
stopSignal string
2016-11-04 14:31:44 -04:00
tty bool
2017-01-14 03:12:19 -05:00
readOnly bool
2016-10-24 23:26:54 -04:00
mounts opts . MountOpt
2016-10-19 20:07:44 -04:00
dns opts . ListOpts
dnsSearch opts . ListOpts
2016-11-08 21:29:10 -05:00
dnsOption opts . ListOpts
2016-11-03 11:05:00 -04:00
hosts opts . ListOpts
2016-09-08 13:11:39 -04:00
resources resourceOptions
stopGrace DurationOpt
replicas Uint64Opt
mode string
2017-01-19 18:27:37 -05:00
restartPolicy restartPolicyOptions
constraints opts . ListOpts
placementPrefs placementPrefOpts
update updateOptions
2017-02-15 19:04:30 -05:00
rollback updateOptions
2017-01-19 18:27:37 -05:00
networks opts . ListOpts
endpoint endpointOptions
2016-09-08 13:11:39 -04:00
registryAuth bool
logDriver logDriverOptions
2016-10-13 14:28:32 -04:00
healthcheck healthCheckOptions
2016-11-03 11:08:22 -04:00
secrets opts . SecretOpt
2016-09-08 13:11:39 -04:00
}
func newServiceOptions ( ) * serviceOptions {
return & serviceOptions {
2016-12-23 14:09:12 -05:00
labels : opts . NewListOpts ( opts . ValidateEnv ) ,
2016-11-08 10:06:07 -05:00
constraints : opts . NewListOpts ( nil ) ,
2016-12-23 14:09:12 -05:00
containerLabels : opts . NewListOpts ( opts . ValidateEnv ) ,
env : opts . NewListOpts ( opts . ValidateEnv ) ,
2016-07-20 02:58:32 -04:00
envFile : opts . NewListOpts ( nil ) ,
2016-12-08 16:32:10 -05:00
groups : opts . NewListOpts ( nil ) ,
logDriver : newLogDriverOptions ( ) ,
dns : opts . NewListOpts ( opts . ValidateIPAddress ) ,
dnsOption : opts . NewListOpts ( nil ) ,
dnsSearch : opts . NewListOpts ( opts . ValidateDNSSearch ) ,
2016-12-23 14:09:12 -05:00
hosts : opts . NewListOpts ( opts . ValidateExtraHost ) ,
2016-12-08 16:32:10 -05:00
networks : opts . NewListOpts ( nil ) ,
2016-09-08 13:11:39 -04:00
}
}
2017-01-16 03:58:23 -05:00
func ( opts * serviceOptions ) ToServiceMode ( ) ( swarm . ServiceMode , error ) {
serviceMode := swarm . ServiceMode { }
switch opts . mode {
case "global" :
if opts . replicas . Value ( ) != nil {
return serviceMode , fmt . Errorf ( "replicas can only be used with replicated mode" )
}
serviceMode . Global = & swarm . GlobalService { }
case "replicated" :
serviceMode . Replicated = & swarm . ReplicatedService {
Replicas : opts . replicas . Value ( ) ,
}
default :
return serviceMode , fmt . Errorf ( "Unknown mode: %s, only replicated and global supported" , opts . mode )
}
return serviceMode , nil
}
2016-09-08 13:11:39 -04:00
func ( opts * serviceOptions ) ToService ( ) ( swarm . ServiceSpec , error ) {
var service swarm . ServiceSpec
2016-07-20 02:58:32 -04:00
envVariables , err := runconfigopts . ReadKVStrings ( opts . envFile . GetAll ( ) , opts . env . GetAll ( ) )
if err != nil {
return service , err
}
currentEnv := make ( [ ] string , 0 , len ( envVariables ) )
for _ , env := range envVariables { // need to process each var, in order
k := strings . SplitN ( env , "=" , 2 ) [ 0 ]
for i , current := range currentEnv { // remove duplicates
if current == env {
continue // no update required, may hide this behind flag to preserve order of envVariables
}
if strings . HasPrefix ( current , k + "=" ) {
currentEnv = append ( currentEnv [ : i ] , currentEnv [ i + 1 : ] ... )
}
}
currentEnv = append ( currentEnv , env )
}
2017-01-16 03:58:23 -05:00
healthConfig , err := opts . healthcheck . toHealthConfig ( )
if err != nil {
return service , err
}
serviceMode , err := opts . ToServiceMode ( )
if err != nil {
return service , err
}
2016-09-08 13:11:39 -04:00
service = swarm . ServiceSpec {
Annotations : swarm . Annotations {
Name : opts . name ,
Labels : runconfigopts . ConvertKVStringsToMap ( opts . labels . GetAll ( ) ) ,
} ,
TaskTemplate : swarm . TaskSpec {
ContainerSpec : swarm . ContainerSpec {
2017-02-06 00:22:57 -05:00
Image : opts . image ,
Args : opts . args ,
Env : currentEnv ,
Hostname : opts . hostname ,
Labels : runconfigopts . ConvertKVStringsToMap ( opts . containerLabels . GetAll ( ) ) ,
Dir : opts . workdir ,
User : opts . user ,
Groups : opts . groups . GetAll ( ) ,
StopSignal : opts . stopSignal ,
TTY : opts . tty ,
ReadOnly : opts . readOnly ,
Mounts : opts . mounts . Value ( ) ,
2016-10-19 20:07:44 -04:00
DNSConfig : & swarm . DNSConfig {
Nameservers : opts . dns . GetAll ( ) ,
Search : opts . dnsSearch . GetAll ( ) ,
2016-11-08 21:29:10 -05:00
Options : opts . dnsOption . GetAll ( ) ,
2016-10-19 20:07:44 -04:00
} ,
2016-11-03 11:05:00 -04:00
Hosts : convertExtraHostsToSwarmHosts ( opts . hosts . GetAll ( ) ) ,
2016-09-08 13:11:39 -04:00
StopGracePeriod : opts . stopGrace . Value ( ) ,
2016-10-27 03:41:32 -04:00
Secrets : nil ,
2017-01-16 03:58:23 -05:00
Healthcheck : healthConfig ,
2016-09-08 13:11:39 -04:00
} ,
2016-11-08 10:06:07 -05:00
Networks : convertNetworks ( opts . networks . GetAll ( ) ) ,
2016-09-08 13:11:39 -04:00
Resources : opts . resources . ToResourceRequirements ( ) ,
RestartPolicy : opts . restartPolicy . ToRestartPolicy ( ) ,
Placement : & swarm . Placement {
2016-11-08 10:06:07 -05:00
Constraints : opts . constraints . GetAll ( ) ,
2017-01-19 18:27:37 -05:00
Preferences : opts . placementPrefs . prefs ,
2016-09-08 13:11:39 -04:00
} ,
LogDriver : opts . logDriver . toLogDriver ( ) ,
} ,
2017-02-15 19:04:30 -05:00
Networks : convertNetworks ( opts . networks . GetAll ( ) ) ,
Mode : serviceMode ,
UpdateConfig : opts . update . config ( ) ,
RollbackConfig : opts . rollback . config ( ) ,
EndpointSpec : opts . endpoint . ToEndpointSpec ( ) ,
2016-09-08 13:11:39 -04:00
}
return service , nil
}
// addServiceFlags adds all flags that are common to both `create` and `update`.
// Any flags that are not common are added separately in the individual command
2017-03-15 16:49:52 -04:00
func addServiceFlags ( flags * pflag . FlagSet , opts * serviceOptions ) {
2016-09-08 13:11:39 -04:00
flags . StringVarP ( & opts . workdir , flagWorkdir , "w" , "" , "Working directory inside the container" )
flags . StringVarP ( & opts . user , flagUser , "u" , "" , "Username or UID (format: <name|uid>[:<group|gid>])" )
2016-11-23 14:42:56 -05:00
flags . StringVar ( & opts . hostname , flagHostname , "" , "Container hostname" )
2017-01-16 11:57:26 -05:00
flags . SetAnnotation ( flagHostname , "version" , [ ] string { "1.25" } )
2016-09-08 13:11:39 -04:00
flags . Var ( & opts . resources . limitCPU , flagLimitCPU , "Limit CPUs" )
flags . Var ( & opts . resources . limitMemBytes , flagLimitMemory , "Limit Memory" )
flags . Var ( & opts . resources . resCPU , flagReserveCPU , "Reserve CPUs" )
flags . Var ( & opts . resources . resMemBytes , flagReserveMemory , "Reserve Memory" )
2016-11-11 20:44:42 -05:00
flags . Var ( & opts . stopGrace , flagStopGracePeriod , "Time to wait before force killing a container (ns|us|ms|s|m|h)" )
2016-09-08 13:11:39 -04:00
flags . Var ( & opts . replicas , flagReplicas , "Number of tasks" )
2017-02-08 03:31:16 -05:00
flags . StringVar ( & opts . restartPolicy . condition , flagRestartCondition , "" , ` Restart when condition is met ("none"|"on-failure"|"any") ` )
2016-11-11 20:44:42 -05:00
flags . Var ( & opts . restartPolicy . delay , flagRestartDelay , "Delay between restart attempts (ns|us|ms|s|m|h)" )
2016-09-08 13:11:39 -04:00
flags . Var ( & opts . restartPolicy . maxAttempts , flagRestartMaxAttempts , "Maximum number of restarts before giving up" )
2016-11-11 20:44:42 -05:00
flags . Var ( & opts . restartPolicy . window , flagRestartWindow , "Window used to evaluate the restart policy (ns|us|ms|s|m|h)" )
2016-09-08 13:11:39 -04:00
flags . Uint64Var ( & opts . update . parallelism , flagUpdateParallelism , 1 , "Maximum number of tasks updated simultaneously (0 to update all at once)" )
2016-10-25 08:22:07 -04:00
flags . DurationVar ( & opts . update . delay , flagUpdateDelay , time . Duration ( 0 ) , "Delay between updates (ns|us|ms|s|m|h) (default 0s)" )
flags . DurationVar ( & opts . update . monitor , flagUpdateMonitor , time . Duration ( 0 ) , "Duration after each task update to monitor for failure (ns|us|ms|s|m|h) (default 0s)" )
2017-01-16 11:57:26 -05:00
flags . SetAnnotation ( flagUpdateMonitor , "version" , [ ] string { "1.25" } )
2017-02-15 17:53:58 -05:00
flags . StringVar ( & opts . update . onFailure , flagUpdateFailureAction , "pause" , ` Action on update failure ("pause"|"continue"|"rollback") ` )
2016-11-08 10:06:07 -05:00
flags . Var ( & opts . update . maxFailureRatio , flagUpdateMaxFailureRatio , "Failure rate to tolerate during an update" )
2017-01-16 11:57:26 -05:00
flags . SetAnnotation ( flagUpdateMaxFailureRatio , "version" , [ ] string { "1.25" } )
2016-09-08 13:11:39 -04:00
2017-02-15 19:04:30 -05:00
flags . Uint64Var ( & opts . rollback . parallelism , flagRollbackParallelism , 1 , "Maximum number of tasks rolled back simultaneously (0 to roll back all at once)" )
2017-03-13 21:31:48 -04:00
flags . SetAnnotation ( flagRollbackParallelism , "version" , [ ] string { "1.28" } )
2017-02-15 19:04:30 -05:00
flags . DurationVar ( & opts . rollback . delay , flagRollbackDelay , time . Duration ( 0 ) , "Delay between task rollbacks (ns|us|ms|s|m|h) (default 0s)" )
2017-03-13 21:31:48 -04:00
flags . SetAnnotation ( flagRollbackDelay , "version" , [ ] string { "1.28" } )
2017-02-15 19:04:30 -05:00
flags . DurationVar ( & opts . rollback . monitor , flagRollbackMonitor , time . Duration ( 0 ) , "Duration after each task rollback to monitor for failure (ns|us|ms|s|m|h) (default 0s)" )
2017-03-13 21:31:48 -04:00
flags . SetAnnotation ( flagRollbackMonitor , "version" , [ ] string { "1.28" } )
2017-02-15 19:04:30 -05:00
flags . StringVar ( & opts . rollback . onFailure , flagRollbackFailureAction , "pause" , ` Action on rollback failure ("pause"|"continue") ` )
2017-03-13 21:31:48 -04:00
flags . SetAnnotation ( flagRollbackFailureAction , "version" , [ ] string { "1.28" } )
2017-02-15 19:04:30 -05:00
flags . Var ( & opts . rollback . maxFailureRatio , flagRollbackMaxFailureRatio , "Failure rate to tolerate during a rollback" )
2017-03-13 21:31:48 -04:00
flags . SetAnnotation ( flagRollbackMaxFailureRatio , "version" , [ ] string { "1.28" } )
2017-02-15 19:04:30 -05:00
2017-01-16 03:58:23 -05:00
flags . StringVar ( & opts . endpoint . mode , flagEndpointMode , "vip" , "Endpoint mode (vip or dnsrr)" )
2016-09-08 13:11:39 -04:00
flags . BoolVar ( & opts . registryAuth , flagRegistryAuth , false , "Send registry authentication details to swarm agents" )
flags . StringVar ( & opts . logDriver . name , flagLogDriver , "" , "Logging driver for service" )
flags . Var ( & opts . logDriver . opts , flagLogOpt , "Logging driver options" )
2016-10-13 14:28:32 -04:00
flags . StringVar ( & opts . healthcheck . cmd , flagHealthCmd , "" , "Command to run to check health" )
2017-01-16 11:57:26 -05:00
flags . SetAnnotation ( flagHealthCmd , "version" , [ ] string { "1.25" } )
2016-11-11 20:44:42 -05:00
flags . Var ( & opts . healthcheck . interval , flagHealthInterval , "Time between running the check (ns|us|ms|s|m|h)" )
2017-01-16 11:57:26 -05:00
flags . SetAnnotation ( flagHealthInterval , "version" , [ ] string { "1.25" } )
2016-11-11 20:44:42 -05:00
flags . Var ( & opts . healthcheck . timeout , flagHealthTimeout , "Maximum time to allow one check to run (ns|us|ms|s|m|h)" )
2017-01-16 11:57:26 -05:00
flags . SetAnnotation ( flagHealthTimeout , "version" , [ ] string { "1.25" } )
2016-10-13 14:28:32 -04:00
flags . IntVar ( & opts . healthcheck . retries , flagHealthRetries , 0 , "Consecutive failures needed to report unhealthy" )
2017-01-16 11:57:26 -05:00
flags . SetAnnotation ( flagHealthRetries , "version" , [ ] string { "1.25" } )
2016-10-13 14:28:32 -04:00
flags . BoolVar ( & opts . healthcheck . noHealthcheck , flagNoHealthcheck , false , "Disable any container-specified HEALTHCHECK" )
2017-01-16 11:57:26 -05:00
flags . SetAnnotation ( flagNoHealthcheck , "version" , [ ] string { "1.25" } )
2016-11-04 14:31:44 -04:00
flags . BoolVarP ( & opts . tty , flagTTY , "t" , false , "Allocate a pseudo-TTY" )
2017-01-16 11:57:26 -05:00
flags . SetAnnotation ( flagTTY , "version" , [ ] string { "1.25" } )
2017-01-14 03:12:19 -05:00
flags . BoolVar ( & opts . readOnly , flagReadOnly , false , "Mount the container's root filesystem as read only" )
2017-03-13 21:31:48 -04:00
flags . SetAnnotation ( flagReadOnly , "version" , [ ] string { "1.28" } )
2017-02-06 00:22:57 -05:00
flags . StringVar ( & opts . stopSignal , flagStopSignal , "" , "Signal to stop the container" )
2017-03-13 21:31:48 -04:00
flags . SetAnnotation ( flagStopSignal , "version" , [ ] string { "1.28" } )
2016-09-08 13:11:39 -04:00
}
const (
2017-02-15 19:04:30 -05:00
flagPlacementPref = "placement-pref"
flagPlacementPrefAdd = "placement-pref-add"
flagPlacementPrefRemove = "placement-pref-rm"
flagConstraint = "constraint"
flagConstraintRemove = "constraint-rm"
flagConstraintAdd = "constraint-add"
flagContainerLabel = "container-label"
flagContainerLabelRemove = "container-label-rm"
flagContainerLabelAdd = "container-label-add"
flagDNS = "dns"
flagDNSRemove = "dns-rm"
flagDNSAdd = "dns-add"
flagDNSOption = "dns-option"
flagDNSOptionRemove = "dns-option-rm"
flagDNSOptionAdd = "dns-option-add"
flagDNSSearch = "dns-search"
flagDNSSearchRemove = "dns-search-rm"
flagDNSSearchAdd = "dns-search-add"
flagEndpointMode = "endpoint-mode"
flagHost = "host"
flagHostAdd = "host-add"
flagHostRemove = "host-rm"
flagHostname = "hostname"
flagEnv = "env"
flagEnvFile = "env-file"
flagEnvRemove = "env-rm"
flagEnvAdd = "env-add"
flagGroup = "group"
flagGroupAdd = "group-add"
flagGroupRemove = "group-rm"
flagLabel = "label"
flagLabelRemove = "label-rm"
flagLabelAdd = "label-add"
flagLimitCPU = "limit-cpu"
flagLimitMemory = "limit-memory"
flagMode = "mode"
flagMount = "mount"
flagMountRemove = "mount-rm"
flagMountAdd = "mount-add"
flagName = "name"
flagNetwork = "network"
flagPublish = "publish"
flagPublishRemove = "publish-rm"
flagPublishAdd = "publish-add"
flagReadOnly = "read-only"
flagReplicas = "replicas"
flagReserveCPU = "reserve-cpu"
flagReserveMemory = "reserve-memory"
flagRestartCondition = "restart-condition"
flagRestartDelay = "restart-delay"
flagRestartMaxAttempts = "restart-max-attempts"
flagRestartWindow = "restart-window"
flagRollbackDelay = "rollback-delay"
flagRollbackFailureAction = "rollback-failure-action"
flagRollbackMaxFailureRatio = "rollback-max-failure-ratio"
flagRollbackMonitor = "rollback-monitor"
flagRollbackParallelism = "rollback-parallelism"
flagStopGracePeriod = "stop-grace-period"
flagStopSignal = "stop-signal"
flagTTY = "tty"
flagUpdateDelay = "update-delay"
flagUpdateFailureAction = "update-failure-action"
flagUpdateMaxFailureRatio = "update-max-failure-ratio"
flagUpdateMonitor = "update-monitor"
flagUpdateParallelism = "update-parallelism"
flagUser = "user"
flagWorkdir = "workdir"
flagRegistryAuth = "with-registry-auth"
flagLogDriver = "log-driver"
flagLogOpt = "log-opt"
flagHealthCmd = "health-cmd"
flagHealthInterval = "health-interval"
flagHealthRetries = "health-retries"
flagHealthTimeout = "health-timeout"
flagNoHealthcheck = "no-healthcheck"
flagSecret = "secret"
flagSecretAdd = "secret-add"
flagSecretRemove = "secret-rm"
2016-09-08 13:11:39 -04:00
)