mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
534a90a993
As described in our ROADMAP.md, introduce new Swarm management API endpoints relying on swarmkit to deploy services. It currently vendors docker/engine-api changes. This PR is fully backward compatible (joining a Swarm is an optional feature of the Engine, and existing commands are not impacted). Signed-off-by: Tonis Tiigi <tonistiigi@gmail.com> Signed-off-by: Victor Vieux <vieux@docker.com> Signed-off-by: Daniel Nephin <dnephin@docker.com> Signed-off-by: Jana Radhakrishnan <mrjana@docker.com> Signed-off-by: Madhu Venugopal <madhu@docker.com>
116 lines
3.5 KiB
Go
116 lines
3.5 KiB
Go
package convert
|
|
|
|
import (
|
|
"fmt"
|
|
"strings"
|
|
|
|
"golang.org/x/crypto/bcrypt"
|
|
|
|
types "github.com/docker/engine-api/types/swarm"
|
|
swarmapi "github.com/docker/swarmkit/api"
|
|
"github.com/docker/swarmkit/protobuf/ptypes"
|
|
)
|
|
|
|
// SwarmFromGRPC converts a grpc Cluster to a Swarm.
|
|
func SwarmFromGRPC(c swarmapi.Cluster) types.Swarm {
|
|
swarm := types.Swarm{
|
|
ID: c.ID,
|
|
Spec: types.Spec{
|
|
Orchestration: types.OrchestrationConfig{
|
|
TaskHistoryRetentionLimit: c.Spec.Orchestration.TaskHistoryRetentionLimit,
|
|
},
|
|
Raft: types.RaftConfig{
|
|
SnapshotInterval: c.Spec.Raft.SnapshotInterval,
|
|
KeepOldSnapshots: c.Spec.Raft.KeepOldSnapshots,
|
|
LogEntriesForSlowFollowers: c.Spec.Raft.LogEntriesForSlowFollowers,
|
|
HeartbeatTick: c.Spec.Raft.HeartbeatTick,
|
|
ElectionTick: c.Spec.Raft.ElectionTick,
|
|
},
|
|
Dispatcher: types.DispatcherConfig{
|
|
HeartbeatPeriod: c.Spec.Dispatcher.HeartbeatPeriod,
|
|
},
|
|
},
|
|
}
|
|
|
|
swarm.Spec.CAConfig.NodeCertExpiry, _ = ptypes.Duration(c.Spec.CAConfig.NodeCertExpiry)
|
|
|
|
// Meta
|
|
swarm.Version.Index = c.Meta.Version.Index
|
|
swarm.CreatedAt, _ = ptypes.Timestamp(c.Meta.CreatedAt)
|
|
swarm.UpdatedAt, _ = ptypes.Timestamp(c.Meta.UpdatedAt)
|
|
|
|
// Annotations
|
|
swarm.Spec.Name = c.Spec.Annotations.Name
|
|
swarm.Spec.Labels = c.Spec.Annotations.Labels
|
|
|
|
for _, policy := range c.Spec.AcceptancePolicy.Policies {
|
|
p := types.Policy{
|
|
Role: types.NodeRole(strings.ToLower(policy.Role.String())),
|
|
Autoaccept: policy.Autoaccept,
|
|
}
|
|
if policy.Secret != nil {
|
|
p.Secret = string(policy.Secret.Data)
|
|
}
|
|
swarm.Spec.AcceptancePolicy.Policies = append(swarm.Spec.AcceptancePolicy.Policies, p)
|
|
}
|
|
|
|
return swarm
|
|
}
|
|
|
|
// SwarmSpecToGRPC converts a Spec to a grpc ClusterSpec.
|
|
func SwarmSpecToGRPC(s types.Spec) (swarmapi.ClusterSpec, error) {
|
|
spec := swarmapi.ClusterSpec{
|
|
Annotations: swarmapi.Annotations{
|
|
Name: s.Name,
|
|
Labels: s.Labels,
|
|
},
|
|
Orchestration: swarmapi.OrchestrationConfig{
|
|
TaskHistoryRetentionLimit: s.Orchestration.TaskHistoryRetentionLimit,
|
|
},
|
|
Raft: swarmapi.RaftConfig{
|
|
SnapshotInterval: s.Raft.SnapshotInterval,
|
|
KeepOldSnapshots: s.Raft.KeepOldSnapshots,
|
|
LogEntriesForSlowFollowers: s.Raft.LogEntriesForSlowFollowers,
|
|
HeartbeatTick: s.Raft.HeartbeatTick,
|
|
ElectionTick: s.Raft.ElectionTick,
|
|
},
|
|
Dispatcher: swarmapi.DispatcherConfig{
|
|
HeartbeatPeriod: s.Dispatcher.HeartbeatPeriod,
|
|
},
|
|
CAConfig: swarmapi.CAConfig{
|
|
NodeCertExpiry: ptypes.DurationProto(s.CAConfig.NodeCertExpiry),
|
|
},
|
|
}
|
|
|
|
if err := SwarmSpecUpdateAcceptancePolicy(&spec, s.AcceptancePolicy); err != nil {
|
|
return swarmapi.ClusterSpec{}, err
|
|
}
|
|
return spec, nil
|
|
}
|
|
|
|
// SwarmSpecUpdateAcceptancePolicy updates a grpc ClusterSpec using AcceptancePolicy.
|
|
func SwarmSpecUpdateAcceptancePolicy(spec *swarmapi.ClusterSpec, acceptancePolicy types.AcceptancePolicy) error {
|
|
spec.AcceptancePolicy.Policies = nil
|
|
for _, p := range acceptancePolicy.Policies {
|
|
role, ok := swarmapi.NodeRole_value[strings.ToUpper(string(p.Role))]
|
|
if !ok {
|
|
return fmt.Errorf("invalid Role: %q", p.Role)
|
|
}
|
|
|
|
policy := &swarmapi.AcceptancePolicy_RoleAdmissionPolicy{
|
|
Role: swarmapi.NodeRole(role),
|
|
Autoaccept: p.Autoaccept,
|
|
}
|
|
|
|
if p.Secret != "" {
|
|
hashPwd, _ := bcrypt.GenerateFromPassword([]byte(p.Secret), 0)
|
|
policy.Secret = &swarmapi.AcceptancePolicy_RoleAdmissionPolicy_HashedSecret{
|
|
Data: hashPwd,
|
|
Alg: "bcrypt",
|
|
}
|
|
}
|
|
|
|
spec.AcceptancePolicy.Policies = append(spec.AcceptancePolicy.Policies, policy)
|
|
}
|
|
return nil
|
|
}
|