2017-02-17 03:28:08 -05:00
package stack
import (
"fmt"
2017-08-22 11:41:12 -04:00
"io"
2017-02-17 03:28:08 -05:00
"io/ioutil"
"os"
2017-04-12 12:42:35 -04:00
"path/filepath"
2017-02-17 03:28:08 -05:00
"sort"
"strings"
2017-04-17 18:07:56 -04:00
"github.com/docker/cli/cli/command"
"github.com/docker/cli/cli/compose/convert"
"github.com/docker/cli/cli/compose/loader"
composetypes "github.com/docker/cli/cli/compose/types"
2017-02-17 03:28:08 -05:00
"github.com/docker/docker/api/types"
2017-05-25 22:50:08 -04:00
"github.com/docker/docker/api/types/container"
2017-02-17 03:28:08 -05:00
"github.com/docker/docker/api/types/swarm"
2017-05-08 13:51:30 -04:00
apiclient "github.com/docker/docker/client"
dockerclient "github.com/docker/docker/client"
2017-03-14 12:39:26 -04:00
"github.com/pkg/errors"
2017-02-17 03:28:08 -05:00
"golang.org/x/net/context"
)
2017-05-03 17:58:52 -04:00
func deployCompose ( ctx context . Context , dockerCli command . Cli , opts deployOptions ) error {
2017-08-22 11:41:12 -04:00
configDetails , err := getConfigDetails ( opts . composefile , dockerCli . In ( ) )
2017-02-17 03:28:08 -05:00
if err != nil {
return err
}
config , err := loader . Load ( configDetails )
if err != nil {
if fpe , ok := err . ( * loader . ForbiddenPropertiesError ) ; ok {
2017-03-09 13:23:45 -05:00
return errors . Errorf ( "Compose file contains unsupported options:\n\n%s\n" ,
2017-02-17 03:28:08 -05:00
propertyWarnings ( fpe . Properties ) )
}
return err
}
unsupportedProperties := loader . GetUnsupportedProperties ( configDetails )
if len ( unsupportedProperties ) > 0 {
fmt . Fprintf ( dockerCli . Err ( ) , "Ignoring unsupported options: %s\n\n" ,
strings . Join ( unsupportedProperties , ", " ) )
}
deprecatedProperties := loader . GetDeprecatedProperties ( configDetails )
if len ( deprecatedProperties ) > 0 {
fmt . Fprintf ( dockerCli . Err ( ) , "Ignoring deprecated options:\n\n%s\n\n" ,
propertyWarnings ( deprecatedProperties ) )
}
if err := checkDaemonIsSwarmManager ( ctx , dockerCli ) ; err != nil {
return err
}
namespace := convert . NewNamespace ( opts . namespace )
2017-02-22 15:43:13 -05:00
if opts . prune {
services := map [ string ] struct { } { }
for _ , service := range config . Services {
services [ service . Name ] = struct { } { }
}
pruneServices ( ctx , dockerCli , namespace , services )
}
2017-02-17 03:28:08 -05:00
2017-02-22 15:43:13 -05:00
serviceNetworks := getServicesDeclaredNetworks ( config . Services )
2017-02-17 03:28:08 -05:00
networks , externalNetworks := convert . Networks ( namespace , config . Networks , serviceNetworks )
2017-05-26 12:15:23 -04:00
if err := validateExternalNetworks ( ctx , dockerCli . Client ( ) , externalNetworks ) ; err != nil {
2017-02-17 03:28:08 -05:00
return err
}
if err := createNetworks ( ctx , dockerCli , namespace , networks ) ; err != nil {
return err
}
secrets , err := convert . Secrets ( namespace , config . Secrets )
if err != nil {
return err
}
2017-05-26 12:15:23 -04:00
if err := createSecrets ( ctx , dockerCli , secrets ) ; err != nil {
2017-02-17 03:28:08 -05:00
return err
}
2017-05-15 11:19:32 -04:00
configs , err := convert . Configs ( namespace , config . Configs )
if err != nil {
return err
}
2017-05-26 12:15:23 -04:00
if err := createConfigs ( ctx , dockerCli , configs ) ; err != nil {
2017-05-15 11:19:32 -04:00
return err
}
2017-02-17 03:28:08 -05:00
services , err := convert . Services ( namespace , config , dockerCli . Client ( ) )
if err != nil {
return err
}
2017-06-02 19:21:41 -04:00
return deployServices ( ctx , dockerCli , services , namespace , opts . sendRegistryAuth , opts . resolveImage )
2017-02-17 03:28:08 -05:00
}
func getServicesDeclaredNetworks ( serviceConfigs [ ] composetypes . ServiceConfig ) map [ string ] struct { } {
serviceNetworks := map [ string ] struct { } { }
for _ , serviceConfig := range serviceConfigs {
if len ( serviceConfig . Networks ) == 0 {
serviceNetworks [ "default" ] = struct { } { }
continue
}
for network := range serviceConfig . Networks {
serviceNetworks [ network ] = struct { } { }
}
}
return serviceNetworks
}
func propertyWarnings ( properties map [ string ] string ) string {
var msgs [ ] string
for name , description := range properties {
msgs = append ( msgs , fmt . Sprintf ( "%s: %s" , name , description ) )
}
sort . Strings ( msgs )
return strings . Join ( msgs , "\n\n" )
}
2017-08-22 11:41:12 -04:00
func getConfigDetails ( composefile string , stdin io . Reader ) ( composetypes . ConfigDetails , error ) {
2017-02-17 03:28:08 -05:00
var details composetypes . ConfigDetails
2017-08-22 11:41:12 -04:00
if composefile == "-" {
workingDir , err := os . Getwd ( )
if err != nil {
return details , err
}
details . WorkingDir = workingDir
} else {
absPath , err := filepath . Abs ( composefile )
if err != nil {
return details , err
}
details . WorkingDir = filepath . Dir ( absPath )
2017-02-17 03:28:08 -05:00
}
2017-08-22 11:41:12 -04:00
configFile , err := getConfigFile ( composefile , stdin )
2017-02-17 03:28:08 -05:00
if err != nil {
return details , err
}
// TODO: support multiple files
details . ConfigFiles = [ ] composetypes . ConfigFile { * configFile }
2017-03-14 12:39:26 -04:00
details . Environment , err = buildEnvironment ( os . Environ ( ) )
2017-06-09 17:42:16 -04:00
return details , err
2017-02-17 03:28:08 -05:00
}
2017-03-14 12:39:26 -04:00
func buildEnvironment ( env [ ] string ) ( map [ string ] string , error ) {
result := make ( map [ string ] string , len ( env ) )
2017-02-07 04:44:47 -05:00
for _ , s := range env {
// if value is empty, s is like "K=", not "K".
if ! strings . Contains ( s , "=" ) {
2017-03-14 12:39:26 -04:00
return result , errors . Errorf ( "unexpected environment %q" , s )
2017-02-07 04:44:47 -05:00
}
kv := strings . SplitN ( s , "=" , 2 )
2017-03-14 12:39:26 -04:00
result [ kv [ 0 ] ] = kv [ 1 ]
2017-02-07 04:44:47 -05:00
}
2017-03-14 12:39:26 -04:00
return result , nil
2017-02-17 03:28:08 -05:00
}
2017-08-22 11:41:12 -04:00
func getConfigFile ( filename string , stdin io . Reader ) ( * composetypes . ConfigFile , error ) {
var bytes [ ] byte
var err error
if filename == "-" {
bytes , err = ioutil . ReadAll ( stdin )
} else {
bytes , err = ioutil . ReadFile ( filename )
}
2017-02-17 03:28:08 -05:00
if err != nil {
return nil , err
}
2017-08-22 11:41:12 -04:00
2017-02-17 03:28:08 -05:00
config , err := loader . ParseYAML ( bytes )
if err != nil {
return nil , err
}
2017-08-22 11:41:12 -04:00
2017-02-17 03:28:08 -05:00
return & composetypes . ConfigFile {
Filename : filename ,
Config : config ,
} , nil
}
func validateExternalNetworks (
ctx context . Context ,
2017-05-26 12:15:23 -04:00
client dockerclient . NetworkAPIClient ,
externalNetworks [ ] string ,
) error {
2017-02-17 03:28:08 -05:00
for _ , networkName := range externalNetworks {
2017-07-19 19:01:13 -04:00
if ! container . NetworkMode ( networkName ) . IsUserDefined ( ) {
// Networks that are not user defined always exist on all nodes as
// local-scoped networks, so there's no need to inspect them.
continue
}
2017-06-12 22:53:53 -04:00
network , err := client . NetworkInspect ( ctx , networkName , types . NetworkInspectOptions { } )
2017-05-26 12:15:23 -04:00
switch {
case dockerclient . IsErrNotFound ( err ) :
return errors . Errorf ( "network %q is declared as external, but could not be found. You need to create a swarm-scoped network before the stack is deployed" , networkName )
case err != nil :
2017-02-17 03:28:08 -05:00
return err
2017-07-19 19:01:13 -04:00
case network . Scope != "swarm" :
2017-05-26 12:15:23 -04:00
return errors . Errorf ( "network %q is declared as external, but it is not in the right scope: %q instead of \"swarm\"" , networkName , network . Scope )
2017-02-17 03:28:08 -05:00
}
}
return nil
}
func createSecrets (
ctx context . Context ,
2017-05-03 17:58:52 -04:00
dockerCli command . Cli ,
2017-02-17 03:28:08 -05:00
secrets [ ] swarm . SecretSpec ,
) error {
client := dockerCli . Client ( )
for _ , secretSpec := range secrets {
secret , _ , err := client . SecretInspectWithRaw ( ctx , secretSpec . Name )
2017-06-01 14:50:07 -04:00
switch {
case err == nil :
2017-02-17 03:28:08 -05:00
// secret already exists, then we update that
if err := client . SecretUpdate ( ctx , secret . ID , secret . Meta . Version , secretSpec ) ; err != nil {
2017-06-01 14:50:07 -04:00
return errors . Wrapf ( err , "failed to update secret %s" , secretSpec . Name )
2017-02-17 03:28:08 -05:00
}
2017-10-03 05:38:15 -04:00
case apiclient . IsErrNotFound ( err ) :
2017-02-17 03:28:08 -05:00
// secret does not exist, then we create a new one.
2017-10-03 05:30:45 -04:00
fmt . Fprintf ( dockerCli . Out ( ) , "Creating secret %s\n" , secretSpec . Name )
2017-02-17 03:28:08 -05:00
if _ , err := client . SecretCreate ( ctx , secretSpec ) ; err != nil {
2017-06-01 14:50:07 -04:00
return errors . Wrapf ( err , "failed to create secret %s" , secretSpec . Name )
2017-02-17 03:28:08 -05:00
}
2017-06-01 14:50:07 -04:00
default :
2017-02-17 03:28:08 -05:00
return err
}
}
return nil
}
2017-05-15 11:19:32 -04:00
func createConfigs (
ctx context . Context ,
dockerCli command . Cli ,
configs [ ] swarm . ConfigSpec ,
) error {
client := dockerCli . Client ( )
for _ , configSpec := range configs {
config , _ , err := client . ConfigInspectWithRaw ( ctx , configSpec . Name )
2017-06-01 14:50:07 -04:00
switch {
case err == nil :
2017-05-15 11:19:32 -04:00
// config already exists, then we update that
if err := client . ConfigUpdate ( ctx , config . ID , config . Meta . Version , configSpec ) ; err != nil {
2017-06-01 14:50:07 -04:00
errors . Wrapf ( err , "failed to update config %s" , configSpec . Name )
2017-05-15 11:19:32 -04:00
}
2017-10-03 05:38:15 -04:00
case apiclient . IsErrNotFound ( err ) :
2017-05-15 11:19:32 -04:00
// config does not exist, then we create a new one.
2017-10-03 05:30:45 -04:00
fmt . Fprintf ( dockerCli . Out ( ) , "Creating config %s\n" , configSpec . Name )
2017-05-15 11:19:32 -04:00
if _ , err := client . ConfigCreate ( ctx , configSpec ) ; err != nil {
2017-06-01 14:50:07 -04:00
errors . Wrapf ( err , "failed to create config %s" , configSpec . Name )
2017-05-15 11:19:32 -04:00
}
2017-06-01 14:50:07 -04:00
default :
2017-05-15 11:19:32 -04:00
return err
}
}
return nil
}
2017-02-17 03:28:08 -05:00
func createNetworks (
ctx context . Context ,
2017-05-03 17:58:52 -04:00
dockerCli command . Cli ,
2017-02-17 03:28:08 -05:00
namespace convert . Namespace ,
networks map [ string ] types . NetworkCreate ,
) error {
client := dockerCli . Client ( )
existingNetworks , err := getStackNetworks ( ctx , client , namespace . Name ( ) )
if err != nil {
return err
}
existingNetworkMap := make ( map [ string ] types . NetworkResource )
for _ , network := range existingNetworks {
existingNetworkMap [ network . Name ] = network
}
for internalName , createOpts := range networks {
name := namespace . Scope ( internalName )
if _ , exists := existingNetworkMap [ name ] ; exists {
continue
}
if createOpts . Driver == "" {
createOpts . Driver = defaultNetworkDriver
}
fmt . Fprintf ( dockerCli . Out ( ) , "Creating network %s\n" , name )
if _ , err := client . NetworkCreate ( ctx , name , createOpts ) ; err != nil {
2017-06-01 14:50:07 -04:00
return errors . Wrapf ( err , "failed to create network %s" , internalName )
2017-02-17 03:28:08 -05:00
}
}
return nil
}
func deployServices (
ctx context . Context ,
2017-05-03 17:58:52 -04:00
dockerCli command . Cli ,
2017-02-17 03:28:08 -05:00
services map [ string ] swarm . ServiceSpec ,
namespace convert . Namespace ,
sendAuth bool ,
2017-06-02 19:21:41 -04:00
resolveImage string ,
2017-02-17 03:28:08 -05:00
) error {
apiClient := dockerCli . Client ( )
out := dockerCli . Out ( )
existingServices , err := getServices ( ctx , apiClient , namespace . Name ( ) )
if err != nil {
return err
}
existingServiceMap := make ( map [ string ] swarm . Service )
for _ , service := range existingServices {
existingServiceMap [ service . Spec . Name ] = service
}
for internalName , serviceSpec := range services {
name := namespace . Scope ( internalName )
encodedAuth := ""
2017-05-22 17:06:36 -04:00
image := serviceSpec . TaskTemplate . ContainerSpec . Image
2017-02-17 03:28:08 -05:00
if sendAuth {
// Retrieve encoded auth token from the image reference
encodedAuth , err = command . RetrieveAuthTokenFromImage ( ctx , dockerCli , image )
if err != nil {
return err
}
}
if service , exists := existingServiceMap [ name ] ; exists {
fmt . Fprintf ( out , "Updating service %s (id: %s)\n" , name , service . ID )
2017-05-22 17:06:36 -04:00
updateOpts := types . ServiceUpdateOptions { EncodedRegistryAuth : encodedAuth }
2017-07-26 09:33:57 -04:00
switch {
case resolveImage == resolveImageAlways || ( resolveImage == resolveImageChanged && image != service . Spec . Labels [ convert . LabelImage ] ) :
// image should be updated by the server using QueryRegistry
2017-06-02 19:21:41 -04:00
updateOpts . QueryRegistry = true
2017-07-26 09:33:57 -04:00
case image == service . Spec . Labels [ convert . LabelImage ] :
// image has not changed; update the serviceSpec with the
// existing information that was set by QueryRegistry on the
// previous deploy. Otherwise this will trigger an incorrect
// service update.
serviceSpec . TaskTemplate . ContainerSpec . Image = service . Spec . TaskTemplate . ContainerSpec . Image
2017-05-22 17:06:36 -04:00
}
2017-02-17 03:28:08 -05:00
response , err := apiClient . ServiceUpdate (
ctx ,
service . ID ,
service . Version ,
serviceSpec ,
2017-05-22 17:06:36 -04:00
updateOpts ,
2017-02-17 03:28:08 -05:00
)
if err != nil {
2017-06-01 14:50:07 -04:00
return errors . Wrapf ( err , "failed to update service %s" , name )
2017-02-17 03:28:08 -05:00
}
for _ , warning := range response . Warnings {
fmt . Fprintln ( dockerCli . Err ( ) , warning )
}
} else {
fmt . Fprintf ( out , "Creating service %s\n" , name )
2017-06-01 14:50:07 -04:00
createOpts := types . ServiceCreateOptions { EncodedRegistryAuth : encodedAuth }
2017-05-22 17:06:36 -04:00
// query registry if flag disabling it was not set
2017-06-02 19:21:41 -04:00
if resolveImage == resolveImageAlways || resolveImage == resolveImageChanged {
2017-05-22 17:06:36 -04:00
createOpts . QueryRegistry = true
}
2017-02-17 03:28:08 -05:00
if _ , err := apiClient . ServiceCreate ( ctx , serviceSpec , createOpts ) ; err != nil {
2017-06-01 14:50:07 -04:00
return errors . Wrapf ( err , "failed to create service %s" , name )
2017-02-17 03:28:08 -05:00
}
}
}
return nil
}