2016-06-13 22:56:23 -04:00
package service
import (
"fmt"
2016-08-04 23:51:28 -04:00
"sort"
2016-06-20 12:57:57 -04:00
"strings"
2016-06-13 22:56:23 -04:00
"time"
"golang.org/x/net/context"
2016-09-06 14:18:12 -04:00
"github.com/docker/docker/api/types"
2016-10-13 14:28:32 -04:00
"github.com/docker/docker/api/types/container"
2016-09-06 14:18:12 -04:00
mounttypes "github.com/docker/docker/api/types/mount"
"github.com/docker/docker/api/types/swarm"
2016-06-13 22:56:23 -04:00
"github.com/docker/docker/cli"
2016-09-08 13:11:39 -04:00
"github.com/docker/docker/cli/command"
2016-10-27 18:51:02 -04:00
"github.com/docker/docker/client"
2016-06-13 22:56:23 -04:00
"github.com/docker/docker/opts"
runconfigopts "github.com/docker/docker/runconfig/opts"
"github.com/docker/go-connections/nat"
2016-06-24 15:03:26 -04:00
shlex "github.com/flynn-archive/go-shlex"
2016-06-13 22:56:23 -04:00
"github.com/spf13/cobra"
"github.com/spf13/pflag"
)
2016-09-08 13:11:39 -04:00
func newUpdateCommand ( dockerCli * command . DockerCli ) * cobra . Command {
2016-12-08 16:32:10 -05:00
serviceOpts := newServiceOptions ( )
2016-06-13 22:56:23 -04:00
cmd := & cobra . Command {
Use : "update [OPTIONS] SERVICE" ,
Short : "Update a service" ,
Args : cli . ExactArgs ( 1 ) ,
RunE : func ( cmd * cobra . Command , args [ ] string ) error {
2016-06-17 11:01:46 -04:00
return runUpdate ( dockerCli , cmd . Flags ( ) , args [ 0 ] )
2016-06-13 22:56:23 -04:00
} ,
}
2016-06-17 11:01:46 -04:00
flags := cmd . Flags ( )
2016-06-13 22:56:23 -04:00
flags . String ( "image" , "" , "Service image tag" )
2016-06-24 15:03:26 -04:00
flags . String ( "args" , "" , "Service command args" )
2016-09-02 17:12:05 -04:00
flags . Bool ( "rollback" , false , "Rollback to previous specification" )
2016-10-20 15:04:01 -04:00
flags . Bool ( "force" , false , "Force update even if no changes require it" )
2016-12-08 16:32:10 -05:00
addServiceFlags ( cmd , serviceOpts )
2016-06-29 12:28:33 -04:00
flags . Var ( newListOptsVar ( ) , flagEnvRemove , "Remove an environment variable" )
2016-11-07 21:40:47 -05:00
flags . Var ( newListOptsVar ( ) , flagGroupRemove , "Remove a previously added supplementary user group from the container" )
2016-06-29 12:28:33 -04:00
flags . Var ( newListOptsVar ( ) , flagLabelRemove , "Remove a label by its key" )
2016-07-25 05:38:01 -04:00
flags . Var ( newListOptsVar ( ) , flagContainerLabelRemove , "Remove a container label by its key" )
2016-06-29 12:28:33 -04:00
flags . Var ( newListOptsVar ( ) , flagMountRemove , "Remove a mount by its target path" )
2016-12-08 16:32:10 -05:00
// flags.Var(newListOptsVar().WithValidator(validatePublishRemove), flagPublishRemove, "Remove a published port by its target port")
flags . Var ( & opts . PortOpt { } , flagPublishRemove , "Remove a published port by its target port" )
2016-06-29 12:28:33 -04:00
flags . Var ( newListOptsVar ( ) , flagConstraintRemove , "Remove a constraint" )
2016-11-08 21:29:10 -05:00
flags . Var ( newListOptsVar ( ) , flagDNSRemove , "Remove a custom DNS server" )
flags . Var ( newListOptsVar ( ) , flagDNSOptionRemove , "Remove a DNS option" )
flags . Var ( newListOptsVar ( ) , flagDNSSearchRemove , "Remove a DNS search domain" )
2016-11-03 11:05:00 -04:00
flags . Var ( newListOptsVar ( ) , flagHostRemove , "Remove a custom host-to-IP mapping (host:ip)" )
2016-12-08 16:32:10 -05:00
flags . Var ( & serviceOpts . labels , flagLabelAdd , "Add or update a service label" )
flags . Var ( & serviceOpts . containerLabels , flagContainerLabelAdd , "Add or update a container label" )
flags . Var ( & serviceOpts . env , flagEnvAdd , "Add or update an environment variable" )
2016-10-27 18:51:02 -04:00
flags . Var ( newListOptsVar ( ) , flagSecretRemove , "Remove a secret" )
2016-12-08 16:32:10 -05:00
flags . Var ( & serviceOpts . secrets , flagSecretAdd , "Add or update a secret on a service" )
flags . Var ( & serviceOpts . mounts , flagMountAdd , "Add or update a mount on a service" )
flags . Var ( & serviceOpts . constraints , flagConstraintAdd , "Add or update a placement constraint" )
flags . Var ( & serviceOpts . endpoint . publishPorts , flagPublishAdd , "Add or update a published port" )
flags . Var ( & serviceOpts . groups , flagGroupAdd , "Add an additional supplementary user group to the container" )
flags . Var ( & serviceOpts . dns , flagDNSAdd , "Add or update a custom DNS server" )
flags . Var ( & serviceOpts . dnsOption , flagDNSOptionAdd , "Add or update a DNS option" )
flags . Var ( & serviceOpts . dnsSearch , flagDNSSearchAdd , "Add or update a custom DNS search domain" )
flags . Var ( & serviceOpts . hosts , flagHostAdd , "Add or update a custom host-to-IP mapping (host:ip)" )
2016-10-26 23:05:39 -04:00
2016-06-13 22:56:23 -04:00
return cmd
}
2016-06-29 12:28:33 -04:00
func newListOptsVar ( ) * opts . ListOpts {
return opts . NewListOptsRef ( & [ ] string { } , nil )
}
2016-09-08 13:11:39 -04:00
func runUpdate ( dockerCli * command . DockerCli , flags * pflag . FlagSet , serviceID string ) error {
2016-06-15 14:50:49 -04:00
apiClient := dockerCli . Client ( )
2016-06-13 22:56:23 -04:00
ctx := context . Background ( )
2016-07-05 11:20:49 -04:00
updateOpts := types . ServiceUpdateOptions { }
2016-06-13 22:56:23 -04:00
2016-06-29 20:08:00 -04:00
service , _ , err := apiClient . ServiceInspectWithRaw ( ctx , serviceID )
2016-06-13 22:56:23 -04:00
if err != nil {
return err
}
2016-09-02 17:12:05 -04:00
rollback , err := flags . GetBool ( "rollback" )
if err != nil {
return err
}
spec := & service . Spec
if rollback {
spec = service . PreviousSpec
if spec == nil {
return fmt . Errorf ( "service does not have a previous specification to roll back to" )
}
}
err = updateService ( flags , spec )
2016-06-13 22:56:23 -04:00
if err != nil {
return err
}
2016-12-05 20:02:26 -05:00
if flags . Changed ( "image" ) {
if err := resolveServiceImageDigest ( dockerCli , spec ) ; err != nil {
return err
}
}
2016-10-27 18:51:02 -04:00
updatedSecrets , err := getUpdatedSecrets ( apiClient , flags , spec . TaskTemplate . ContainerSpec . Secrets )
if err != nil {
return err
}
spec . TaskTemplate . ContainerSpec . Secrets = updatedSecrets
2016-06-29 20:08:00 -04:00
// only send auth if flag was set
sendAuth , err := flags . GetBool ( flagRegistryAuth )
2016-06-13 22:56:23 -04:00
if err != nil {
return err
}
2016-06-29 20:08:00 -04:00
if sendAuth {
// Retrieve encoded auth token from the image reference
// This would be the old image if it didn't change in this update
2016-09-02 17:12:05 -04:00
image := spec . TaskTemplate . ContainerSpec . Image
2016-09-09 15:38:00 -04:00
encodedAuth , err := command . RetrieveAuthTokenFromImage ( ctx , dockerCli , image )
2016-06-29 20:08:00 -04:00
if err != nil {
return err
}
2016-07-05 11:20:49 -04:00
updateOpts . EncodedRegistryAuth = encodedAuth
2016-09-02 17:12:05 -04:00
} else if rollback {
updateOpts . RegistryAuthFrom = types . RegistryAuthFromPreviousSpec
} else {
updateOpts . RegistryAuthFrom = types . RegistryAuthFromSpec
2016-06-29 20:08:00 -04:00
}
2016-06-15 14:50:49 -04:00
2016-11-14 21:08:24 -05:00
response , err := apiClient . ServiceUpdate ( ctx , service . ID , service . Version , * spec , updateOpts )
2016-06-13 22:56:23 -04:00
if err != nil {
return err
}
2016-11-14 21:08:24 -05:00
for _ , warning := range response . Warnings {
fmt . Fprintln ( dockerCli . Err ( ) , warning )
}
2016-06-13 22:56:23 -04:00
fmt . Fprintf ( dockerCli . Out ( ) , "%s\n" , serviceID )
return nil
}
2016-06-29 12:38:23 -04:00
func updateService ( flags * pflag . FlagSet , spec * swarm . ServiceSpec ) error {
2016-06-17 19:24:07 -04:00
updateString := func ( flag string , field * string ) {
2016-06-13 22:56:23 -04:00
if flags . Changed ( flag ) {
* field , _ = flags . GetString ( flag )
}
}
2016-06-17 19:24:07 -04:00
updateInt64Value := func ( flag string , field * int64 ) {
2016-06-13 22:56:23 -04:00
if flags . Changed ( flag ) {
* field = flags . Lookup ( flag ) . Value . ( int64Value ) . Value ( )
}
}
2016-11-08 10:06:07 -05:00
updateFloatValue := func ( flag string , field * float32 ) {
2016-09-02 17:12:05 -04:00
if flags . Changed ( flag ) {
2016-11-08 10:06:07 -05:00
* field = flags . Lookup ( flag ) . Value . ( * floatValue ) . Value ( )
2016-09-02 17:12:05 -04:00
}
}
2016-06-17 19:24:07 -04:00
updateDuration := func ( flag string , field * time . Duration ) {
2016-06-13 22:56:23 -04:00
if flags . Changed ( flag ) {
* field , _ = flags . GetDuration ( flag )
}
}
2016-07-26 02:53:20 -04:00
updateDurationOpt := func ( flag string , field * * time . Duration ) {
2016-06-13 22:56:23 -04:00
if flags . Changed ( flag ) {
2016-07-26 02:53:20 -04:00
val := * flags . Lookup ( flag ) . Value . ( * DurationOpt ) . Value ( )
* field = & val
2016-06-13 22:56:23 -04:00
}
}
2016-06-17 19:24:07 -04:00
updateUint64 := func ( flag string , field * uint64 ) {
2016-06-13 22:56:23 -04:00
if flags . Changed ( flag ) {
* field , _ = flags . GetUint64 ( flag )
}
}
2016-07-26 02:53:20 -04:00
updateUint64Opt := func ( flag string , field * * uint64 ) {
2016-06-13 22:56:23 -04:00
if flags . Changed ( flag ) {
2016-07-26 02:53:20 -04:00
val := * flags . Lookup ( flag ) . Value . ( * Uint64Opt ) . Value ( )
* field = & val
2016-06-13 22:56:23 -04:00
}
}
cspec := & spec . TaskTemplate . ContainerSpec
task := & spec . TaskTemplate
2016-06-17 11:01:46 -04:00
taskResources := func ( ) * swarm . ResourceRequirements {
if task . Resources == nil {
task . Resources = & swarm . ResourceRequirements { }
}
return task . Resources
}
2016-06-17 19:24:07 -04:00
updateLabels ( flags , & spec . Labels )
2016-07-25 05:38:01 -04:00
updateContainerLabels ( flags , & cspec . Labels )
2016-06-17 19:24:07 -04:00
updateString ( "image" , & cspec . Image )
2016-06-24 15:03:26 -04:00
updateStringToSlice ( flags , "args" , & cspec . Args )
2016-06-20 12:57:57 -04:00
updateEnvironment ( flags , & cspec . Env )
2016-08-01 14:45:28 -04:00
updateString ( flagWorkdir , & cspec . Dir )
2016-06-17 11:01:46 -04:00
updateString ( flagUser , & cspec . User )
2016-11-23 14:42:56 -05:00
updateString ( flagHostname , & cspec . Hostname )
2016-08-24 04:30:54 -04:00
if err := updateMounts ( flags , & cspec . Mounts ) ; err != nil {
return err
}
2016-06-13 22:56:23 -04:00
2016-06-14 18:37:27 -04:00
if flags . Changed ( flagLimitCPU ) || flags . Changed ( flagLimitMemory ) {
2016-06-17 11:01:46 -04:00
taskResources ( ) . Limits = & swarm . Resources { }
2016-06-17 19:24:07 -04:00
updateInt64Value ( flagLimitCPU , & task . Resources . Limits . NanoCPUs )
updateInt64Value ( flagLimitMemory , & task . Resources . Limits . MemoryBytes )
2016-06-14 18:37:27 -04:00
}
if flags . Changed ( flagReserveCPU ) || flags . Changed ( flagReserveMemory ) {
2016-06-17 11:01:46 -04:00
taskResources ( ) . Reservations = & swarm . Resources { }
2016-06-17 19:24:07 -04:00
updateInt64Value ( flagReserveCPU , & task . Resources . Reservations . NanoCPUs )
updateInt64Value ( flagReserveMemory , & task . Resources . Reservations . MemoryBytes )
2016-06-14 18:37:27 -04:00
}
2016-06-13 22:56:23 -04:00
2016-07-26 02:53:20 -04:00
updateDurationOpt ( flagStopGracePeriod , & cspec . StopGracePeriod )
2016-06-13 22:56:23 -04:00
2016-06-17 11:01:46 -04:00
if anyChanged ( flags , flagRestartCondition , flagRestartDelay , flagRestartMaxAttempts , flagRestartWindow ) {
2016-06-14 18:37:27 -04:00
if task . RestartPolicy == nil {
task . RestartPolicy = & swarm . RestartPolicy { }
}
if flags . Changed ( flagRestartCondition ) {
value , _ := flags . GetString ( flagRestartCondition )
task . RestartPolicy . Condition = swarm . RestartPolicyCondition ( value )
}
2016-07-26 02:53:20 -04:00
updateDurationOpt ( flagRestartDelay , & task . RestartPolicy . Delay )
updateUint64Opt ( flagRestartMaxAttempts , & task . RestartPolicy . MaxAttempts )
updateDurationOpt ( flagRestartWindow , & task . RestartPolicy . Window )
2016-06-14 18:37:27 -04:00
}
2016-06-29 12:28:33 -04:00
if anyChanged ( flags , flagConstraintAdd , flagConstraintRemove ) {
2016-06-24 11:53:49 -04:00
if task . Placement == nil {
task . Placement = & swarm . Placement { }
}
updatePlacement ( flags , task . Placement )
2016-06-20 12:57:57 -04:00
}
2016-06-13 22:56:23 -04:00
2016-06-17 14:14:36 -04:00
if err := updateReplicas ( flags , & spec . Mode ) ; err != nil {
2016-06-13 22:56:23 -04:00
return err
}
2016-09-02 17:12:05 -04:00
if anyChanged ( flags , flagUpdateParallelism , flagUpdateDelay , flagUpdateMonitor , flagUpdateFailureAction , flagUpdateMaxFailureRatio ) {
2016-06-14 18:37:27 -04:00
if spec . UpdateConfig == nil {
spec . UpdateConfig = & swarm . UpdateConfig { }
}
2016-06-17 19:24:07 -04:00
updateUint64 ( flagUpdateParallelism , & spec . UpdateConfig . Parallelism )
updateDuration ( flagUpdateDelay , & spec . UpdateConfig . Delay )
2016-09-02 17:12:05 -04:00
updateDuration ( flagUpdateMonitor , & spec . UpdateConfig . Monitor )
2016-07-22 14:35:51 -04:00
updateString ( flagUpdateFailureAction , & spec . UpdateConfig . FailureAction )
2016-11-08 10:06:07 -05:00
updateFloatValue ( flagUpdateMaxFailureRatio , & spec . UpdateConfig . MaxFailureRatio )
2016-06-14 18:37:27 -04:00
}
2016-06-13 22:56:23 -04:00
2016-06-14 12:33:50 -04:00
if flags . Changed ( flagEndpointMode ) {
value , _ := flags . GetString ( flagEndpointMode )
2016-07-26 02:53:20 -04:00
if spec . EndpointSpec == nil {
spec . EndpointSpec = & swarm . EndpointSpec { }
}
2016-06-13 22:56:23 -04:00
spec . EndpointSpec . Mode = swarm . ResolutionMode ( value )
}
2016-08-01 21:34:51 -04:00
if anyChanged ( flags , flagGroupAdd , flagGroupRemove ) {
if err := updateGroups ( flags , & cspec . Groups ) ; err != nil {
return err
}
}
2016-12-08 16:32:10 -05:00
if anyChanged ( flags , flagPublishAdd , flagPublishRemove ) {
2016-06-14 18:37:27 -04:00
if spec . EndpointSpec == nil {
spec . EndpointSpec = & swarm . EndpointSpec { }
}
2016-08-04 23:51:28 -04:00
if err := updatePorts ( flags , & spec . EndpointSpec . Ports ) ; err != nil {
return err
}
2016-06-14 18:37:27 -04:00
}
2016-07-08 21:44:18 -04:00
2016-11-08 21:29:10 -05:00
if anyChanged ( flags , flagDNSAdd , flagDNSRemove , flagDNSOptionAdd , flagDNSOptionRemove , flagDNSSearchAdd , flagDNSSearchRemove ) {
2016-10-26 23:05:39 -04:00
if cspec . DNSConfig == nil {
cspec . DNSConfig = & swarm . DNSConfig { }
}
if err := updateDNSConfig ( flags , & cspec . DNSConfig ) ; err != nil {
return err
}
}
2016-11-03 11:05:00 -04:00
if anyChanged ( flags , flagHostAdd , flagHostRemove ) {
if err := updateHosts ( flags , & cspec . Hosts ) ; err != nil {
return err
}
}
2016-07-08 21:44:18 -04:00
if err := updateLogDriver ( flags , & spec . TaskTemplate ) ; err != nil {
return err
}
2016-10-20 15:04:01 -04:00
force , err := flags . GetBool ( "force" )
if err != nil {
return err
}
if force {
spec . TaskTemplate . ForceUpdate ++
}
2016-10-13 14:28:32 -04:00
if err := updateHealthcheck ( flags , cspec ) ; err != nil {
return err
}
2016-11-04 14:31:44 -04:00
if flags . Changed ( flagTTY ) {
tty , err := flags . GetBool ( flagTTY )
if err != nil {
return err
}
cspec . TTY = tty
}
2016-06-13 22:56:23 -04:00
return nil
}
2016-06-24 15:03:26 -04:00
func updateStringToSlice ( flags * pflag . FlagSet , flag string , field * [ ] string ) error {
if ! flags . Changed ( flag ) {
return nil
}
value , _ := flags . GetString ( flag )
valueSlice , err := shlex . Split ( value )
* field = valueSlice
return err
}
2016-06-20 12:57:57 -04:00
func anyChanged ( flags * pflag . FlagSet , fields ... string ) bool {
for _ , flag := range fields {
if flags . Changed ( flag ) {
return true
}
2016-06-13 22:56:23 -04:00
}
2016-06-20 12:57:57 -04:00
return false
}
2016-06-24 11:53:49 -04:00
func updatePlacement ( flags * pflag . FlagSet , placement * swarm . Placement ) {
2016-11-08 10:06:07 -05:00
if flags . Changed ( flagConstraintAdd ) {
values := flags . Lookup ( flagConstraintAdd ) . Value . ( * opts . ListOpts ) . GetAll ( )
placement . Constraints = append ( placement . Constraints , values ... )
}
2016-06-24 11:53:49 -04:00
toRemove := buildToRemoveSet ( flags , flagConstraintRemove )
2016-11-08 10:06:07 -05:00
newConstraints := [ ] string { }
for _ , constraint := range placement . Constraints {
if _ , exists := toRemove [ constraint ] ; ! exists {
newConstraints = append ( newConstraints , constraint )
}
}
// Sort so that result is predictable.
sort . Strings ( newConstraints )
placement . Constraints = newConstraints
2016-06-24 11:53:49 -04:00
}
2016-07-25 05:38:01 -04:00
func updateContainerLabels ( flags * pflag . FlagSet , field * map [ string ] string ) {
if flags . Changed ( flagContainerLabelAdd ) {
2016-07-25 22:17:06 -04:00
if * field == nil {
2016-07-25 05:38:01 -04:00
* field = map [ string ] string { }
}
values := flags . Lookup ( flagContainerLabelAdd ) . Value . ( * opts . ListOpts ) . GetAll ( )
for key , value := range runconfigopts . ConvertKVStringsToMap ( values ) {
( * field ) [ key ] = value
}
}
2016-07-25 22:17:06 -04:00
if * field != nil && flags . Changed ( flagContainerLabelRemove ) {
2016-07-25 05:38:01 -04:00
toRemove := flags . Lookup ( flagContainerLabelRemove ) . Value . ( * opts . ListOpts ) . GetAll ( )
for _ , label := range toRemove {
delete ( * field , label )
}
}
}
2016-06-20 12:57:57 -04:00
func updateLabels ( flags * pflag . FlagSet , field * map [ string ] string ) {
2016-06-29 12:28:33 -04:00
if flags . Changed ( flagLabelAdd ) {
2016-07-25 15:54:38 -04:00
if * field == nil {
2016-06-20 12:57:57 -04:00
* field = map [ string ] string { }
}
2016-06-13 22:56:23 -04:00
2016-06-29 12:28:33 -04:00
values := flags . Lookup ( flagLabelAdd ) . Value . ( * opts . ListOpts ) . GetAll ( )
2016-06-20 12:57:57 -04:00
for key , value := range runconfigopts . ConvertKVStringsToMap ( values ) {
( * field ) [ key ] = value
}
}
2016-06-17 19:24:07 -04:00
2016-07-25 15:54:38 -04:00
if * field != nil && flags . Changed ( flagLabelRemove ) {
2016-06-29 12:28:33 -04:00
toRemove := flags . Lookup ( flagLabelRemove ) . Value . ( * opts . ListOpts ) . GetAll ( )
2016-06-20 12:57:57 -04:00
for _ , label := range toRemove {
delete ( * field , label )
}
2016-06-13 22:56:23 -04:00
}
}
2016-06-20 12:57:57 -04:00
func updateEnvironment ( flags * pflag . FlagSet , field * [ ] string ) {
2016-08-04 23:08:22 -04:00
envSet := map [ string ] string { }
for _ , v := range * field {
envSet [ envKey ( v ) ] = v
}
2016-06-29 12:28:33 -04:00
if flags . Changed ( flagEnvAdd ) {
value := flags . Lookup ( flagEnvAdd ) . Value . ( * opts . ListOpts )
2016-08-04 23:08:22 -04:00
for _ , v := range value . GetAll ( ) {
envSet [ envKey ( v ) ] = v
}
2016-06-20 12:57:57 -04:00
}
2016-08-04 23:08:22 -04:00
* field = [ ] string { }
for _ , v := range envSet {
* field = append ( * field , v )
}
2016-06-24 11:53:49 -04:00
toRemove := buildToRemoveSet ( flags , flagEnvRemove )
2016-07-13 15:59:23 -04:00
* field = removeItems ( * field , toRemove , envKey )
2016-06-17 11:01:46 -04:00
}
2016-10-27 18:51:02 -04:00
func getUpdatedSecrets ( apiClient client . APIClient , flags * pflag . FlagSet , secrets [ ] * swarm . SecretReference ) ( [ ] * swarm . SecretReference , error ) {
if flags . Changed ( flagSecretAdd ) {
2016-11-03 11:08:22 -04:00
values := flags . Lookup ( flagSecretAdd ) . Value . ( * opts . SecretOpt ) . Value ( )
2016-10-27 18:51:02 -04:00
addSecrets , err := parseSecrets ( apiClient , values )
if err != nil {
return nil , err
}
secrets = append ( secrets , addSecrets ... )
}
toRemove := buildToRemoveSet ( flags , flagSecretRemove )
newSecrets := [ ] * swarm . SecretReference { }
for _ , secret := range secrets {
if _ , exists := toRemove [ secret . SecretName ] ; ! exists {
newSecrets = append ( newSecrets , secret )
}
}
return newSecrets , nil
}
2016-06-20 12:57:57 -04:00
func envKey ( value string ) string {
kv := strings . SplitN ( value , "=" , 2 )
return kv [ 0 ]
}
2016-07-13 15:59:23 -04:00
func itemKey ( value string ) string {
return value
}
2016-06-24 11:53:49 -04:00
func buildToRemoveSet ( flags * pflag . FlagSet , flag string ) map [ string ] struct { } {
var empty struct { }
toRemove := make ( map [ string ] struct { } )
if ! flags . Changed ( flag ) {
return toRemove
}
2016-06-29 12:28:33 -04:00
toRemoveSlice := flags . Lookup ( flag ) . Value . ( * opts . ListOpts ) . GetAll ( )
2016-06-24 11:53:49 -04:00
for _ , key := range toRemoveSlice {
toRemove [ key ] = empty
}
return toRemove
}
2016-07-13 15:59:23 -04:00
func removeItems (
seq [ ] string ,
toRemove map [ string ] struct { } ,
keyFunc func ( string ) string ,
) [ ] string {
newSeq := [ ] string { }
for _ , item := range seq {
if _ , exists := toRemove [ keyFunc ( item ) ] ; ! exists {
newSeq = append ( newSeq , item )
}
}
return newSeq
}
2016-08-24 04:30:54 -04:00
type byMountSource [ ] mounttypes . Mount
func ( m byMountSource ) Len ( ) int { return len ( m ) }
func ( m byMountSource ) Swap ( i , j int ) { m [ i ] , m [ j ] = m [ j ] , m [ i ] }
func ( m byMountSource ) Less ( i , j int ) bool {
a , b := m [ i ] , m [ j ]
if a . Source == b . Source {
return a . Target < b . Target
}
return a . Source < b . Source
}
func updateMounts ( flags * pflag . FlagSet , mounts * [ ] mounttypes . Mount ) error {
mountsByTarget := map [ string ] mounttypes . Mount { }
2016-06-29 12:28:33 -04:00
if flags . Changed ( flagMountAdd ) {
2016-10-24 23:26:54 -04:00
values := flags . Lookup ( flagMountAdd ) . Value . ( * opts . MountOpt ) . Value ( )
2016-08-24 04:30:54 -04:00
for _ , mount := range values {
if _ , ok := mountsByTarget [ mount . Target ] ; ok {
return fmt . Errorf ( "duplicate mount target" )
}
mountsByTarget [ mount . Target ] = mount
}
2016-06-20 12:57:57 -04:00
}
2016-07-13 15:59:23 -04:00
2016-08-24 04:30:54 -04:00
// Add old list of mount points minus updated one.
2016-07-13 15:59:23 -04:00
for _ , mount := range * mounts {
2016-08-24 04:30:54 -04:00
if _ , ok := mountsByTarget [ mount . Target ] ; ! ok {
mountsByTarget [ mount . Target ] = mount
}
}
newMounts := [ ] mounttypes . Mount { }
toRemove := buildToRemoveSet ( flags , flagMountRemove )
for _ , mount := range mountsByTarget {
2016-07-13 15:59:23 -04:00
if _ , exists := toRemove [ mount . Target ] ; ! exists {
newMounts = append ( newMounts , mount )
2016-06-20 12:57:57 -04:00
}
2016-06-13 22:56:23 -04:00
}
2016-08-24 04:30:54 -04:00
sort . Sort ( byMountSource ( newMounts ) )
2016-07-13 15:59:23 -04:00
* mounts = newMounts
2016-08-24 04:30:54 -04:00
return nil
2016-06-13 22:56:23 -04:00
}
2016-08-01 21:34:51 -04:00
func updateGroups ( flags * pflag . FlagSet , groups * [ ] string ) error {
if flags . Changed ( flagGroupAdd ) {
2016-11-08 10:06:07 -05:00
values := flags . Lookup ( flagGroupAdd ) . Value . ( * opts . ListOpts ) . GetAll ( )
2016-08-01 21:34:51 -04:00
* groups = append ( * groups , values ... )
}
toRemove := buildToRemoveSet ( flags , flagGroupRemove )
newGroups := [ ] string { }
for _ , group := range * groups {
if _ , exists := toRemove [ group ] ; ! exists {
newGroups = append ( newGroups , group )
}
}
// Sort so that result is predictable.
sort . Strings ( newGroups )
* groups = newGroups
return nil
}
2016-10-26 23:05:39 -04:00
func removeDuplicates ( entries [ ] string ) [ ] string {
hit := map [ string ] bool { }
newEntries := [ ] string { }
for _ , v := range entries {
if ! hit [ v ] {
newEntries = append ( newEntries , v )
hit [ v ] = true
}
}
return newEntries
}
func updateDNSConfig ( flags * pflag . FlagSet , config * * swarm . DNSConfig ) error {
newConfig := & swarm . DNSConfig { }
nameservers := ( * config ) . Nameservers
if flags . Changed ( flagDNSAdd ) {
values := flags . Lookup ( flagDNSAdd ) . Value . ( * opts . ListOpts ) . GetAll ( )
nameservers = append ( nameservers , values ... )
}
nameservers = removeDuplicates ( nameservers )
toRemove := buildToRemoveSet ( flags , flagDNSRemove )
for _ , nameserver := range nameservers {
if _ , exists := toRemove [ nameserver ] ; ! exists {
newConfig . Nameservers = append ( newConfig . Nameservers , nameserver )
}
}
// Sort so that result is predictable.
sort . Strings ( newConfig . Nameservers )
search := ( * config ) . Search
if flags . Changed ( flagDNSSearchAdd ) {
values := flags . Lookup ( flagDNSSearchAdd ) . Value . ( * opts . ListOpts ) . GetAll ( )
search = append ( search , values ... )
}
search = removeDuplicates ( search )
toRemove = buildToRemoveSet ( flags , flagDNSSearchRemove )
for _ , entry := range search {
if _ , exists := toRemove [ entry ] ; ! exists {
newConfig . Search = append ( newConfig . Search , entry )
}
}
// Sort so that result is predictable.
sort . Strings ( newConfig . Search )
options := ( * config ) . Options
2016-11-08 21:29:10 -05:00
if flags . Changed ( flagDNSOptionAdd ) {
values := flags . Lookup ( flagDNSOptionAdd ) . Value . ( * opts . ListOpts ) . GetAll ( )
2016-10-26 23:05:39 -04:00
options = append ( options , values ... )
}
options = removeDuplicates ( options )
2016-11-08 21:29:10 -05:00
toRemove = buildToRemoveSet ( flags , flagDNSOptionRemove )
2016-10-26 23:05:39 -04:00
for _ , option := range options {
if _ , exists := toRemove [ option ] ; ! exists {
newConfig . Options = append ( newConfig . Options , option )
}
}
// Sort so that result is predictable.
sort . Strings ( newConfig . Options )
* config = newConfig
return nil
}
2016-08-04 23:51:28 -04:00
type byPortConfig [ ] swarm . PortConfig
func ( r byPortConfig ) Len ( ) int { return len ( r ) }
func ( r byPortConfig ) Swap ( i , j int ) { r [ i ] , r [ j ] = r [ j ] , r [ i ] }
func ( r byPortConfig ) Less ( i , j int ) bool {
// We convert PortConfig into `port/protocol`, e.g., `80/tcp`
// In updatePorts we already filter out with map so there is duplicate entries
return portConfigToString ( & r [ i ] ) < portConfigToString ( & r [ j ] )
}
func portConfigToString ( portConfig * swarm . PortConfig ) string {
protocol := portConfig . Protocol
2016-11-10 15:13:26 -05:00
mode := portConfig . PublishMode
return fmt . Sprintf ( "%v:%v/%s/%s" , portConfig . PublishedPort , portConfig . TargetPort , protocol , mode )
2016-08-04 23:51:28 -04:00
}
2016-12-08 16:32:10 -05:00
// FIXME(vdemeester) port to opts.PortOpt
2016-08-18 21:09:07 -04:00
// This validation is only used for `--publish-rm`.
// The `--publish-rm` takes:
// <TargetPort>[/<Protocol>] (e.g., 80, 80/tcp, 53/udp)
func validatePublishRemove ( val string ) ( string , error ) {
proto , port := nat . SplitProtoPort ( val )
if proto != "tcp" && proto != "udp" {
return "" , fmt . Errorf ( "invalid protocol '%s' for %s" , proto , val )
}
if strings . Contains ( port , ":" ) {
return "" , fmt . Errorf ( "invalid port format: '%s', should be <TargetPort>[/<Protocol>] (e.g., 80, 80/tcp, 53/udp)" , port )
}
if _ , err := nat . ParsePort ( port ) ; err != nil {
return "" , err
}
return val , nil
}
2016-08-04 23:51:28 -04:00
func updatePorts ( flags * pflag . FlagSet , portConfig * [ ] swarm . PortConfig ) error {
// The key of the map is `port/protocol`, e.g., `80/tcp`
portSet := map [ string ] swarm . PortConfig { }
2016-06-13 22:56:23 -04:00
2016-12-09 15:17:57 -05:00
// Build the current list of portConfig
2016-08-04 23:51:28 -04:00
for _ , entry := range * portConfig {
if _ , ok := portSet [ portConfigToString ( & entry ) ] ; ! ok {
portSet [ portConfigToString ( & entry ) ] = entry
}
2016-07-13 15:59:23 -04:00
}
2016-08-04 23:51:28 -04:00
2016-07-13 15:59:23 -04:00
newPorts := [ ] swarm . PortConfig { }
2016-12-09 15:17:57 -05:00
// Clean current ports
toRemove := flags . Lookup ( flagPublishRemove ) . Value . ( * opts . PortOpt ) . Value ( )
2016-07-13 15:59:23 -04:00
portLoop :
2016-08-04 23:51:28 -04:00
for _ , port := range portSet {
2016-12-08 16:32:10 -05:00
for _ , pConfig := range toRemove {
2016-11-10 15:13:26 -05:00
if equalProtocol ( port . Protocol , pConfig . Protocol ) &&
port . TargetPort == pConfig . TargetPort &&
equalPublishMode ( port . PublishMode , pConfig . PublishMode ) {
continue portLoop
}
}
2016-07-13 15:59:23 -04:00
newPorts = append ( newPorts , port )
2016-06-13 22:56:23 -04:00
}
2016-11-10 15:13:26 -05:00
2016-12-09 15:17:57 -05:00
// Check to see if there are any conflict in flags.
if flags . Changed ( flagPublishAdd ) {
ports := flags . Lookup ( flagPublishAdd ) . Value . ( * opts . PortOpt ) . Value ( )
for _ , port := range ports {
if v , ok := portSet [ portConfigToString ( & port ) ] ; ok {
if v != port {
fmt . Println ( "v" , v )
return fmt . Errorf ( "conflicting port mapping between %v:%v/%s and %v:%v/%s" , port . PublishedPort , port . TargetPort , port . Protocol , v . PublishedPort , v . TargetPort , v . Protocol )
}
continue
}
//portSet[portConfigToString(&port)] = port
newPorts = append ( newPorts , port )
}
}
2016-08-04 23:51:28 -04:00
// Sort the PortConfig to avoid unnecessary updates
sort . Sort ( byPortConfig ( newPorts ) )
2016-07-13 15:59:23 -04:00
* portConfig = newPorts
2016-08-04 23:51:28 -04:00
return nil
2016-07-13 15:59:23 -04:00
}
2016-11-10 15:13:26 -05:00
func equalProtocol ( prot1 , prot2 swarm . PortConfigProtocol ) bool {
return prot1 == prot2 ||
( prot1 == swarm . PortConfigProtocol ( "" ) && prot2 == swarm . PortConfigProtocolTCP ) ||
( prot2 == swarm . PortConfigProtocol ( "" ) && prot1 == swarm . PortConfigProtocolTCP )
}
func equalPublishMode ( mode1 , mode2 swarm . PortConfigPublishMode ) bool {
return mode1 == mode2 ||
( mode1 == swarm . PortConfigPublishMode ( "" ) && mode2 == swarm . PortConfigPublishModeIngress ) ||
( mode2 == swarm . PortConfigPublishMode ( "" ) && mode1 == swarm . PortConfigPublishModeIngress )
}
2016-07-13 15:59:23 -04:00
func equalPort ( targetPort nat . Port , port swarm . PortConfig ) bool {
return ( string ( port . Protocol ) == targetPort . Proto ( ) &&
port . TargetPort == uint32 ( targetPort . Int ( ) ) )
2016-06-13 22:56:23 -04:00
}
2016-06-17 14:14:36 -04:00
func updateReplicas ( flags * pflag . FlagSet , serviceMode * swarm . ServiceMode ) error {
if ! flags . Changed ( flagReplicas ) {
2016-06-13 22:56:23 -04:00
return nil
}
2016-07-26 02:53:20 -04:00
if serviceMode == nil || serviceMode . Replicated == nil {
2016-06-13 22:56:23 -04:00
return fmt . Errorf ( "replicas can only be used with replicated mode" )
}
2016-06-17 14:14:36 -04:00
serviceMode . Replicated . Replicas = flags . Lookup ( flagReplicas ) . Value . ( * Uint64Opt ) . Value ( )
2016-06-13 22:56:23 -04:00
return nil
}
2016-07-08 21:44:18 -04:00
2016-11-03 11:05:00 -04:00
func updateHosts ( flags * pflag . FlagSet , hosts * [ ] string ) error {
// Combine existing Hosts (in swarmkit format) with the host to add (convert to swarmkit format)
if flags . Changed ( flagHostAdd ) {
values := convertExtraHostsToSwarmHosts ( flags . Lookup ( flagHostAdd ) . Value . ( * opts . ListOpts ) . GetAll ( ) )
* hosts = append ( * hosts , values ... )
}
// Remove duplicate
* hosts = removeDuplicates ( * hosts )
keysToRemove := make ( map [ string ] struct { } )
if flags . Changed ( flagHostRemove ) {
var empty struct { }
extraHostsToRemove := flags . Lookup ( flagHostRemove ) . Value . ( * opts . ListOpts ) . GetAll ( )
for _ , entry := range extraHostsToRemove {
key := strings . SplitN ( entry , ":" , 2 ) [ 0 ]
keysToRemove [ key ] = empty
}
}
newHosts := [ ] string { }
for _ , entry := range * hosts {
// Since this is in swarmkit format, we need to find the key, which is canonical_hostname of:
// IP_address canonical_hostname [aliases...]
parts := strings . Fields ( entry )
if len ( parts ) > 1 {
key := parts [ 1 ]
if _ , exists := keysToRemove [ key ] ; ! exists {
newHosts = append ( newHosts , entry )
}
} else {
newHosts = append ( newHosts , entry )
}
}
// Sort so that result is predictable.
sort . Strings ( newHosts )
* hosts = newHosts
return nil
}
2016-07-08 21:44:18 -04:00
// updateLogDriver updates the log driver only if the log driver flag is set.
// All options will be replaced with those provided on the command line.
func updateLogDriver ( flags * pflag . FlagSet , taskTemplate * swarm . TaskSpec ) error {
if ! flags . Changed ( flagLogDriver ) {
return nil
}
name , err := flags . GetString ( flagLogDriver )
if err != nil {
return err
}
if name == "" {
return nil
}
taskTemplate . LogDriver = & swarm . Driver {
Name : name ,
Options : runconfigopts . ConvertKVStringsToMap ( flags . Lookup ( flagLogOpt ) . Value . ( * opts . ListOpts ) . GetAll ( ) ) ,
}
return nil
}
2016-10-13 14:28:32 -04:00
func updateHealthcheck ( flags * pflag . FlagSet , containerSpec * swarm . ContainerSpec ) error {
if ! anyChanged ( flags , flagNoHealthcheck , flagHealthCmd , flagHealthInterval , flagHealthRetries , flagHealthTimeout ) {
return nil
}
if containerSpec . Healthcheck == nil {
containerSpec . Healthcheck = & container . HealthConfig { }
}
noHealthcheck , err := flags . GetBool ( flagNoHealthcheck )
if err != nil {
return err
}
if noHealthcheck {
if ! anyChanged ( flags , flagHealthCmd , flagHealthInterval , flagHealthRetries , flagHealthTimeout ) {
containerSpec . Healthcheck = & container . HealthConfig {
Test : [ ] string { "NONE" } ,
}
return nil
}
return fmt . Errorf ( "--%s conflicts with --health-* options" , flagNoHealthcheck )
}
if len ( containerSpec . Healthcheck . Test ) > 0 && containerSpec . Healthcheck . Test [ 0 ] == "NONE" {
containerSpec . Healthcheck . Test = nil
}
if flags . Changed ( flagHealthInterval ) {
val := * flags . Lookup ( flagHealthInterval ) . Value . ( * PositiveDurationOpt ) . Value ( )
containerSpec . Healthcheck . Interval = val
}
if flags . Changed ( flagHealthTimeout ) {
val := * flags . Lookup ( flagHealthTimeout ) . Value . ( * PositiveDurationOpt ) . Value ( )
containerSpec . Healthcheck . Timeout = val
}
if flags . Changed ( flagHealthRetries ) {
containerSpec . Healthcheck . Retries , _ = flags . GetInt ( flagHealthRetries )
}
if flags . Changed ( flagHealthCmd ) {
cmd , _ := flags . GetString ( flagHealthCmd )
if cmd != "" {
containerSpec . Healthcheck . Test = [ ] string { "CMD-SHELL" , cmd }
} else {
containerSpec . Healthcheck . Test = nil
}
}
return nil
}