2016-10-19 12:22:02 -04:00
|
|
|
package cluster
|
|
|
|
|
|
|
|
import (
|
2016-12-07 11:06:07 -08:00
|
|
|
"fmt"
|
|
|
|
"strings"
|
|
|
|
|
2016-10-19 12:22:02 -04:00
|
|
|
apitypes "github.com/docker/docker/api/types"
|
|
|
|
types "github.com/docker/docker/api/types/swarm"
|
|
|
|
"github.com/docker/docker/daemon/cluster/convert"
|
|
|
|
swarmapi "github.com/docker/swarmkit/api"
|
2016-12-07 11:06:07 -08:00
|
|
|
"golang.org/x/net/context"
|
2016-10-19 12:22:02 -04:00
|
|
|
)
|
|
|
|
|
2016-12-07 11:06:07 -08:00
|
|
|
func getSecretByNameOrIDPrefix(ctx context.Context, state *nodeState, nameOrIDPrefix string) (*swarmapi.Secret, error) {
|
|
|
|
// attempt to lookup secret by full ID
|
|
|
|
if r, err := state.controlClient.GetSecret(ctx, &swarmapi.GetSecretRequest{
|
|
|
|
SecretID: nameOrIDPrefix,
|
|
|
|
}); err == nil {
|
|
|
|
return r.Secret, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// attempt to lookup secret by full name and partial ID
|
|
|
|
// Note here ListSecretRequest_Filters operate with `or`
|
|
|
|
r, err := state.controlClient.ListSecrets(ctx, &swarmapi.ListSecretsRequest{
|
|
|
|
Filters: &swarmapi.ListSecretsRequest_Filters{
|
|
|
|
Names: []string{nameOrIDPrefix},
|
|
|
|
IDPrefixes: []string{nameOrIDPrefix},
|
|
|
|
},
|
|
|
|
})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
// attempt to lookup secret by full name
|
|
|
|
for _, s := range r.Secrets {
|
|
|
|
if s.Spec.Annotations.Name == nameOrIDPrefix {
|
|
|
|
return s, nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// attempt to lookup secret by partial ID (prefix)
|
|
|
|
// return error if more than one matches found (ambiguous)
|
|
|
|
n := 0
|
|
|
|
var found *swarmapi.Secret
|
|
|
|
for _, s := range r.Secrets {
|
|
|
|
if strings.HasPrefix(s.ID, nameOrIDPrefix) {
|
|
|
|
found = s
|
|
|
|
n++
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if n > 1 {
|
|
|
|
return nil, fmt.Errorf("secret %s is ambiguous (%d matches found)", nameOrIDPrefix, n)
|
|
|
|
}
|
|
|
|
if found == nil {
|
|
|
|
return nil, fmt.Errorf("no such secret: %s", nameOrIDPrefix)
|
|
|
|
}
|
|
|
|
return found, nil
|
|
|
|
}
|
|
|
|
|
2016-10-19 12:22:02 -04:00
|
|
|
// GetSecret returns a secret from a managed swarm cluster
|
2016-12-07 11:06:07 -08:00
|
|
|
func (c *Cluster) GetSecret(nameOrIDPrefix string) (types.Secret, error) {
|
2016-11-16 14:17:18 -08:00
|
|
|
c.mu.RLock()
|
|
|
|
defer c.mu.RUnlock()
|
2016-11-13 12:39:02 +08:00
|
|
|
|
2016-11-16 14:17:18 -08:00
|
|
|
state := c.currentNodeState()
|
|
|
|
if !state.IsActiveManager() {
|
|
|
|
return types.Secret{}, c.errNoManager(state)
|
2016-11-13 12:39:02 +08:00
|
|
|
}
|
|
|
|
|
2016-10-19 12:22:02 -04:00
|
|
|
ctx, cancel := c.getRequestContext()
|
|
|
|
defer cancel()
|
|
|
|
|
2016-12-07 11:06:07 -08:00
|
|
|
secret, err := getSecretByNameOrIDPrefix(ctx, &state, nameOrIDPrefix)
|
2016-10-19 12:22:02 -04:00
|
|
|
if err != nil {
|
|
|
|
return types.Secret{}, err
|
|
|
|
}
|
2016-12-07 11:06:07 -08:00
|
|
|
return convert.SecretFromGRPC(secret), nil
|
2016-10-19 12:22:02 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// GetSecrets returns all secrets of a managed swarm cluster.
|
|
|
|
func (c *Cluster) GetSecrets(options apitypes.SecretListOptions) ([]types.Secret, error) {
|
2016-11-16 14:17:18 -08:00
|
|
|
c.mu.RLock()
|
|
|
|
defer c.mu.RUnlock()
|
2016-10-19 12:22:02 -04:00
|
|
|
|
2016-11-16 14:17:18 -08:00
|
|
|
state := c.currentNodeState()
|
|
|
|
if !state.IsActiveManager() {
|
|
|
|
return nil, c.errNoManager(state)
|
2016-10-19 12:22:02 -04:00
|
|
|
}
|
|
|
|
|
2016-11-03 14:09:13 -04:00
|
|
|
filters, err := newListSecretsFilters(options.Filters)
|
2016-10-19 12:22:02 -04:00
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
ctx, cancel := c.getRequestContext()
|
|
|
|
defer cancel()
|
|
|
|
|
2016-11-16 14:17:18 -08:00
|
|
|
r, err := state.controlClient.ListSecrets(ctx,
|
2016-10-19 12:22:02 -04:00
|
|
|
&swarmapi.ListSecretsRequest{Filters: filters})
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
|
|
|
|
secrets := []types.Secret{}
|
|
|
|
|
|
|
|
for _, secret := range r.Secrets {
|
|
|
|
secrets = append(secrets, convert.SecretFromGRPC(secret))
|
|
|
|
}
|
|
|
|
|
|
|
|
return secrets, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// CreateSecret creates a new secret in a managed swarm cluster.
|
|
|
|
func (c *Cluster) CreateSecret(s types.SecretSpec) (string, error) {
|
2016-11-16 14:17:18 -08:00
|
|
|
c.mu.RLock()
|
|
|
|
defer c.mu.RUnlock()
|
2016-10-19 12:22:02 -04:00
|
|
|
|
2016-11-16 14:17:18 -08:00
|
|
|
state := c.currentNodeState()
|
|
|
|
if !state.IsActiveManager() {
|
|
|
|
return "", c.errNoManager(state)
|
2016-10-19 12:22:02 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
ctx, cancel := c.getRequestContext()
|
|
|
|
defer cancel()
|
|
|
|
|
2016-10-26 13:30:53 -07:00
|
|
|
secretSpec := convert.SecretSpecToGRPC(s)
|
2016-10-19 12:22:02 -04:00
|
|
|
|
2016-11-16 14:17:18 -08:00
|
|
|
r, err := state.controlClient.CreateSecret(ctx,
|
2016-10-19 12:22:02 -04:00
|
|
|
&swarmapi.CreateSecretRequest{Spec: &secretSpec})
|
|
|
|
if err != nil {
|
|
|
|
return "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
return r.Secret.ID, nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// RemoveSecret removes a secret from a managed swarm cluster.
|
2016-12-07 11:06:07 -08:00
|
|
|
func (c *Cluster) RemoveSecret(nameOrIDPrefix string) error {
|
2016-11-16 14:17:18 -08:00
|
|
|
c.mu.RLock()
|
|
|
|
defer c.mu.RUnlock()
|
2016-10-19 12:22:02 -04:00
|
|
|
|
2016-11-16 14:17:18 -08:00
|
|
|
state := c.currentNodeState()
|
|
|
|
if !state.IsActiveManager() {
|
|
|
|
return c.errNoManager(state)
|
2016-10-19 12:22:02 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
ctx, cancel := c.getRequestContext()
|
|
|
|
defer cancel()
|
|
|
|
|
2016-12-07 11:06:07 -08:00
|
|
|
secret, err := getSecretByNameOrIDPrefix(ctx, &state, nameOrIDPrefix)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2016-10-19 12:22:02 -04:00
|
|
|
req := &swarmapi.RemoveSecretRequest{
|
2016-12-07 11:06:07 -08:00
|
|
|
SecretID: secret.ID,
|
2016-10-19 12:22:02 -04:00
|
|
|
}
|
|
|
|
|
2016-12-07 11:06:07 -08:00
|
|
|
_, err = state.controlClient.RemoveSecret(ctx, req)
|
2017-01-03 11:31:41 +08:00
|
|
|
return err
|
2016-10-19 12:22:02 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
// UpdateSecret updates a secret in a managed swarm cluster.
|
2016-11-03 14:09:13 -04:00
|
|
|
// Note: this is not exposed to the CLI but is available from the API only
|
2016-10-19 12:22:02 -04:00
|
|
|
func (c *Cluster) UpdateSecret(id string, version uint64, spec types.SecretSpec) error {
|
2016-11-16 14:17:18 -08:00
|
|
|
c.mu.RLock()
|
|
|
|
defer c.mu.RUnlock()
|
2016-10-19 12:22:02 -04:00
|
|
|
|
2016-11-16 14:17:18 -08:00
|
|
|
state := c.currentNodeState()
|
|
|
|
if !state.IsActiveManager() {
|
|
|
|
return c.errNoManager(state)
|
2016-10-19 12:22:02 -04:00
|
|
|
}
|
|
|
|
|
|
|
|
ctx, cancel := c.getRequestContext()
|
|
|
|
defer cancel()
|
|
|
|
|
2016-10-26 13:30:53 -07:00
|
|
|
secretSpec := convert.SecretSpecToGRPC(spec)
|
2016-10-19 12:22:02 -04:00
|
|
|
|
2017-01-03 11:31:41 +08:00
|
|
|
_, err := state.controlClient.UpdateSecret(ctx,
|
2016-10-19 12:22:02 -04:00
|
|
|
&swarmapi.UpdateSecretRequest{
|
|
|
|
SecretID: id,
|
|
|
|
SecretVersion: &swarmapi.Version{
|
|
|
|
Index: version,
|
|
|
|
},
|
|
|
|
Spec: &secretSpec,
|
2017-01-03 11:31:41 +08:00
|
|
|
})
|
|
|
|
return err
|
2016-10-19 12:22:02 -04:00
|
|
|
}
|