2018-02-05 16:05:59 -05:00
package client // import "github.com/docker/docker/client"
2016-09-06 14:46:37 -04:00
import (
2018-04-19 18:30:59 -04:00
"context"
2016-09-06 14:46:37 -04:00
"encoding/json"
2017-04-05 18:43:17 -04:00
"fmt"
2017-07-07 18:10:15 -04:00
"strings"
2016-09-06 14:46:37 -04:00
2017-04-05 18:43:17 -04:00
"github.com/docker/distribution/reference"
2016-09-06 14:46:37 -04:00
"github.com/docker/docker/api/types"
"github.com/docker/docker/api/types/swarm"
2019-08-05 10:37:47 -04:00
digest "github.com/opencontainers/go-digest"
2017-06-07 13:07:01 -04:00
"github.com/pkg/errors"
2016-09-06 14:46:37 -04:00
)
// ServiceCreate creates a new Service.
func ( cli * Client ) ServiceCreate ( ctx context . Context , service swarm . ServiceSpec , options types . ServiceCreateOptions ) ( types . ServiceCreateResponse , error ) {
2020-04-16 07:03:39 -04:00
var response types . ServiceCreateResponse
2017-05-12 16:51:52 -04:00
headers := map [ string ] [ ] string {
"version" : { cli . version } ,
}
2016-09-06 14:46:37 -04:00
if options . EncodedRegistryAuth != "" {
2017-05-12 16:51:52 -04:00
headers [ "X-Registry-Auth" ] = [ ] string { options . EncodedRegistryAuth }
2016-09-06 14:46:37 -04:00
}
2017-06-07 13:07:01 -04:00
// Make sure containerSpec is not nil when no runtime is set or the runtime is set to container
if service . TaskTemplate . ContainerSpec == nil && ( service . TaskTemplate . Runtime == "" || service . TaskTemplate . Runtime == swarm . RuntimeContainer ) {
service . TaskTemplate . ContainerSpec = & swarm . ContainerSpec { }
}
if err := validateServiceSpec ( service ) ; err != nil {
2020-04-16 07:03:39 -04:00
return response , err
2017-05-18 18:00:25 -04:00
}
2017-06-07 13:07:01 -04:00
// ensure that the image is tagged
2020-04-16 07:03:39 -04:00
var resolveWarning string
switch {
case service . TaskTemplate . ContainerSpec != nil :
2017-06-07 13:07:01 -04:00
if taggedImg := imageWithTagString ( service . TaskTemplate . ContainerSpec . Image ) ; taggedImg != "" {
service . TaskTemplate . ContainerSpec . Image = taggedImg
}
if options . QueryRegistry {
2020-04-16 07:42:47 -04:00
resolveWarning = resolveContainerSpecImage ( ctx , cli , & service . TaskTemplate , options . EncodedRegistryAuth )
2017-04-05 18:43:17 -04:00
}
2020-04-16 07:03:39 -04:00
case service . TaskTemplate . PluginSpec != nil :
2017-06-07 13:07:01 -04:00
if taggedImg := imageWithTagString ( service . TaskTemplate . PluginSpec . Remote ) ; taggedImg != "" {
service . TaskTemplate . PluginSpec . Remote = taggedImg
}
if options . QueryRegistry {
2020-04-16 07:42:47 -04:00
resolveWarning = resolvePluginSpecRemote ( ctx , cli , & service . TaskTemplate , options . EncodedRegistryAuth )
2017-06-07 13:07:01 -04:00
}
}
2016-09-06 14:46:37 -04:00
resp , err := cli . post ( ctx , "/services/create" , nil , service , headers )
2019-02-11 07:26:12 -05:00
defer ensureReaderClosed ( resp )
2016-09-06 14:46:37 -04:00
if err != nil {
return response , err
}
err = json . NewDecoder ( resp . body ) . Decode ( & response )
2020-04-16 07:03:39 -04:00
if resolveWarning != "" {
response . Warnings = append ( response . Warnings , resolveWarning )
2017-04-05 18:43:17 -04:00
}
2016-09-06 14:46:37 -04:00
return response , err
}
2017-04-05 18:43:17 -04:00
2020-04-16 07:42:47 -04:00
func resolveContainerSpecImage ( ctx context . Context , cli DistributionAPIClient , taskSpec * swarm . TaskSpec , encodedAuth string ) string {
var warning string
if img , imgPlatforms , err := imageDigestAndPlatforms ( ctx , cli , taskSpec . ContainerSpec . Image , encodedAuth ) ; err != nil {
warning = digestWarning ( taskSpec . ContainerSpec . Image )
} else {
taskSpec . ContainerSpec . Image = img
if len ( imgPlatforms ) > 0 {
if taskSpec . Placement == nil {
taskSpec . Placement = & swarm . Placement { }
}
taskSpec . Placement . Platforms = imgPlatforms
}
}
return warning
}
func resolvePluginSpecRemote ( ctx context . Context , cli DistributionAPIClient , taskSpec * swarm . TaskSpec , encodedAuth string ) string {
var warning string
if img , imgPlatforms , err := imageDigestAndPlatforms ( ctx , cli , taskSpec . PluginSpec . Remote , encodedAuth ) ; err != nil {
warning = digestWarning ( taskSpec . PluginSpec . Remote )
} else {
taskSpec . PluginSpec . Remote = img
if len ( imgPlatforms ) > 0 {
if taskSpec . Placement == nil {
taskSpec . Placement = & swarm . Placement { }
}
taskSpec . Placement . Platforms = imgPlatforms
}
}
return warning
}
2017-08-23 18:21:41 -04:00
func imageDigestAndPlatforms ( ctx context . Context , cli DistributionAPIClient , image , encodedAuth string ) ( string , [ ] swarm . Platform , error ) {
2017-06-07 13:07:01 -04:00
distributionInspect , err := cli . DistributionInspect ( ctx , image , encodedAuth )
var platforms [ ] swarm . Platform
if err != nil {
return "" , nil , err
}
2017-09-08 18:00:14 -04:00
imageWithDigest := imageWithDigestString ( image , distributionInspect . Descriptor . Digest )
2017-06-07 13:07:01 -04:00
if len ( distributionInspect . Platforms ) > 0 {
platforms = make ( [ ] swarm . Platform , 0 , len ( distributionInspect . Platforms ) )
for _ , p := range distributionInspect . Platforms {
2017-07-07 18:10:15 -04:00
// clear architecture field for arm. This is a temporary patch to address
// https://github.com/docker/swarmkit/issues/2294. The issue is that while
// image manifests report "arm" as the architecture, the node reports
// something like "armv7l" (includes the variant), which causes arm images
// to stop working with swarm mode. This patch removes the architecture
// constraint for arm images to ensure tasks get scheduled.
2017-09-08 18:00:14 -04:00
arch := p . Architecture
if strings . ToLower ( arch ) == "arm" {
2017-07-07 18:10:15 -04:00
arch = ""
}
2017-06-07 13:07:01 -04:00
platforms = append ( platforms , swarm . Platform {
2017-09-08 18:00:14 -04:00
Architecture : arch ,
2017-06-07 13:07:01 -04:00
OS : p . OS ,
} )
}
}
return imageWithDigest , platforms , err
}
2017-04-05 18:43:17 -04:00
// imageWithDigestString takes an image string and a digest, and updates
2017-05-18 18:00:25 -04:00
// the image string if it didn't originally contain a digest. It returns
2020-04-16 07:20:38 -04:00
// image unmodified in other situations.
2017-04-05 18:43:17 -04:00
func imageWithDigestString ( image string , dgst digest . Digest ) string {
2017-05-18 18:00:25 -04:00
namedRef , err := reference . ParseNormalizedNamed ( image )
2017-04-05 18:43:17 -04:00
if err == nil {
2017-05-18 18:00:25 -04:00
if _ , isCanonical := namedRef . ( reference . Canonical ) ; ! isCanonical {
// ensure that image gets a default tag if none is provided
2017-04-05 18:43:17 -04:00
img , err := reference . WithDigest ( namedRef , dgst )
if err == nil {
2017-05-18 18:00:25 -04:00
return reference . FamiliarString ( img )
2017-04-05 18:43:17 -04:00
}
}
}
2020-04-16 07:20:38 -04:00
return image
2017-04-05 18:43:17 -04:00
}
2017-05-18 18:00:25 -04:00
// imageWithTagString takes an image string, and returns a tagged image
// string, adding a 'latest' tag if one was not provided. It returns an
2018-05-15 21:15:43 -04:00
// empty string if a canonical reference was provided
2017-05-18 18:00:25 -04:00
func imageWithTagString ( image string ) string {
namedRef , err := reference . ParseNormalizedNamed ( image )
if err == nil {
return reference . FamiliarString ( reference . TagNameOnly ( namedRef ) )
}
return ""
}
2017-04-05 18:43:17 -04:00
// digestWarning constructs a formatted warning string using the
// image name that could not be pinned by digest. The formatting
// is hardcoded, but could me made smarter in the future
func digestWarning ( image string ) string {
return fmt . Sprintf ( "image %s could not be accessed on a registry to record\nits digest. Each node will access %s independently,\npossibly leading to different nodes running different\nversions of the image.\n" , image , image )
}
2017-06-07 13:07:01 -04:00
func validateServiceSpec ( s swarm . ServiceSpec ) error {
if s . TaskTemplate . ContainerSpec != nil && s . TaskTemplate . PluginSpec != nil {
return errors . New ( "must not specify both a container spec and a plugin spec in the task template" )
}
if s . TaskTemplate . PluginSpec != nil && s . TaskTemplate . Runtime != swarm . RuntimePlugin {
return errors . New ( "mismatched runtime with plugin spec" )
}
if s . TaskTemplate . ContainerSpec != nil && ( s . TaskTemplate . Runtime != "" && s . TaskTemplate . Runtime != swarm . RuntimeContainer ) {
return errors . New ( "mismatched runtime with container spec" )
}
return nil
}