mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
11085b2260
Signed-off-by: Tonis Tiigi <tonistiigi@gmail.com>
166 lines
5.3 KiB
Go
166 lines
5.3 KiB
Go
package convert
|
|
|
|
import (
|
|
"fmt"
|
|
"strings"
|
|
"time"
|
|
|
|
"golang.org/x/crypto/bcrypt"
|
|
|
|
types "github.com/docker/engine-api/types/swarm"
|
|
swarmapi "github.com/docker/swarmkit/api"
|
|
"github.com/docker/swarmkit/protobuf/ptypes"
|
|
)
|
|
|
|
// SwarmFromGRPC converts a grpc Cluster to a Swarm.
|
|
func SwarmFromGRPC(c swarmapi.Cluster) types.Swarm {
|
|
swarm := types.Swarm{
|
|
ID: c.ID,
|
|
Spec: types.Spec{
|
|
Orchestration: types.OrchestrationConfig{
|
|
TaskHistoryRetentionLimit: c.Spec.Orchestration.TaskHistoryRetentionLimit,
|
|
},
|
|
Raft: types.RaftConfig{
|
|
SnapshotInterval: c.Spec.Raft.SnapshotInterval,
|
|
KeepOldSnapshots: c.Spec.Raft.KeepOldSnapshots,
|
|
LogEntriesForSlowFollowers: c.Spec.Raft.LogEntriesForSlowFollowers,
|
|
HeartbeatTick: c.Spec.Raft.HeartbeatTick,
|
|
ElectionTick: c.Spec.Raft.ElectionTick,
|
|
},
|
|
},
|
|
}
|
|
|
|
heartbeatPeriod, _ := ptypes.Duration(c.Spec.Dispatcher.HeartbeatPeriod)
|
|
swarm.Spec.Dispatcher.HeartbeatPeriod = uint64(heartbeatPeriod)
|
|
|
|
swarm.Spec.CAConfig.NodeCertExpiry, _ = ptypes.Duration(c.Spec.CAConfig.NodeCertExpiry)
|
|
|
|
for _, ca := range c.Spec.CAConfig.ExternalCAs {
|
|
swarm.Spec.CAConfig.ExternalCAs = append(swarm.Spec.CAConfig.ExternalCAs, &types.ExternalCA{
|
|
Protocol: types.ExternalCAProtocol(strings.ToLower(ca.Protocol.String())),
|
|
URL: ca.URL,
|
|
Options: ca.Options,
|
|
})
|
|
}
|
|
|
|
// Meta
|
|
swarm.Version.Index = c.Meta.Version.Index
|
|
swarm.CreatedAt, _ = ptypes.Timestamp(c.Meta.CreatedAt)
|
|
swarm.UpdatedAt, _ = ptypes.Timestamp(c.Meta.UpdatedAt)
|
|
|
|
// Annotations
|
|
swarm.Spec.Name = c.Spec.Annotations.Name
|
|
swarm.Spec.Labels = c.Spec.Annotations.Labels
|
|
|
|
for _, policy := range c.Spec.AcceptancePolicy.Policies {
|
|
p := types.Policy{
|
|
Role: types.NodeRole(strings.ToLower(policy.Role.String())),
|
|
Autoaccept: policy.Autoaccept,
|
|
}
|
|
if policy.Secret != nil {
|
|
secret := string(policy.Secret.Data)
|
|
p.Secret = &secret
|
|
}
|
|
swarm.Spec.AcceptancePolicy.Policies = append(swarm.Spec.AcceptancePolicy.Policies, p)
|
|
}
|
|
|
|
return swarm
|
|
}
|
|
|
|
// SwarmSpecToGRPCandMerge converts a Spec to a grpc ClusterSpec and merge AcceptancePolicy from an existing grpc ClusterSpec if provided.
|
|
func SwarmSpecToGRPCandMerge(s types.Spec, existingSpec *swarmapi.ClusterSpec) (swarmapi.ClusterSpec, error) {
|
|
spec := swarmapi.ClusterSpec{
|
|
Annotations: swarmapi.Annotations{
|
|
Name: s.Name,
|
|
Labels: s.Labels,
|
|
},
|
|
Orchestration: swarmapi.OrchestrationConfig{
|
|
TaskHistoryRetentionLimit: s.Orchestration.TaskHistoryRetentionLimit,
|
|
},
|
|
Raft: swarmapi.RaftConfig{
|
|
SnapshotInterval: s.Raft.SnapshotInterval,
|
|
KeepOldSnapshots: s.Raft.KeepOldSnapshots,
|
|
LogEntriesForSlowFollowers: s.Raft.LogEntriesForSlowFollowers,
|
|
HeartbeatTick: s.Raft.HeartbeatTick,
|
|
ElectionTick: s.Raft.ElectionTick,
|
|
},
|
|
Dispatcher: swarmapi.DispatcherConfig{
|
|
HeartbeatPeriod: ptypes.DurationProto(time.Duration(s.Dispatcher.HeartbeatPeriod)),
|
|
},
|
|
CAConfig: swarmapi.CAConfig{
|
|
NodeCertExpiry: ptypes.DurationProto(s.CAConfig.NodeCertExpiry),
|
|
},
|
|
}
|
|
|
|
for _, ca := range s.CAConfig.ExternalCAs {
|
|
protocol, ok := swarmapi.ExternalCA_CAProtocol_value[strings.ToUpper(string(ca.Protocol))]
|
|
if !ok {
|
|
return swarmapi.ClusterSpec{}, fmt.Errorf("invalid protocol: %q", ca.Protocol)
|
|
}
|
|
spec.CAConfig.ExternalCAs = append(spec.CAConfig.ExternalCAs, &swarmapi.ExternalCA{
|
|
Protocol: swarmapi.ExternalCA_CAProtocol(protocol),
|
|
URL: ca.URL,
|
|
Options: ca.Options,
|
|
})
|
|
}
|
|
|
|
if err := SwarmSpecUpdateAcceptancePolicy(&spec, s.AcceptancePolicy, existingSpec); err != nil {
|
|
return swarmapi.ClusterSpec{}, err
|
|
}
|
|
|
|
return spec, nil
|
|
}
|
|
|
|
// SwarmSpecUpdateAcceptancePolicy updates a grpc ClusterSpec using AcceptancePolicy.
|
|
func SwarmSpecUpdateAcceptancePolicy(spec *swarmapi.ClusterSpec, acceptancePolicy types.AcceptancePolicy, oldSpec *swarmapi.ClusterSpec) error {
|
|
spec.AcceptancePolicy.Policies = nil
|
|
hashs := make(map[string][]byte)
|
|
|
|
for _, p := range acceptancePolicy.Policies {
|
|
role, ok := swarmapi.NodeRole_value[strings.ToUpper(string(p.Role))]
|
|
if !ok {
|
|
return fmt.Errorf("invalid Role: %q", p.Role)
|
|
}
|
|
|
|
policy := &swarmapi.AcceptancePolicy_RoleAdmissionPolicy{
|
|
Role: swarmapi.NodeRole(role),
|
|
Autoaccept: p.Autoaccept,
|
|
}
|
|
|
|
if p.Secret != nil {
|
|
if *p.Secret == "" { // if provided secret is empty, it means erase previous secret.
|
|
policy.Secret = nil
|
|
} else { // if provided secret is not empty, we generate a new one.
|
|
hashPwd, ok := hashs[*p.Secret]
|
|
if !ok {
|
|
hashPwd, _ = bcrypt.GenerateFromPassword([]byte(*p.Secret), 0)
|
|
hashs[*p.Secret] = hashPwd
|
|
}
|
|
policy.Secret = &swarmapi.AcceptancePolicy_RoleAdmissionPolicy_HashedSecret{
|
|
Data: hashPwd,
|
|
Alg: "bcrypt",
|
|
}
|
|
}
|
|
} else if oldSecret := getOldSecret(oldSpec, policy.Role); oldSecret != nil { // else use the old one.
|
|
policy.Secret = &swarmapi.AcceptancePolicy_RoleAdmissionPolicy_HashedSecret{
|
|
Data: oldSecret.Data,
|
|
Alg: oldSecret.Alg,
|
|
}
|
|
}
|
|
|
|
spec.AcceptancePolicy.Policies = append(spec.AcceptancePolicy.Policies, policy)
|
|
}
|
|
return nil
|
|
}
|
|
|
|
func getOldSecret(oldSpec *swarmapi.ClusterSpec, role swarmapi.NodeRole) *swarmapi.AcceptancePolicy_RoleAdmissionPolicy_HashedSecret {
|
|
if oldSpec == nil {
|
|
return nil
|
|
}
|
|
for _, p := range oldSpec.AcceptancePolicy.Policies {
|
|
if p.Role == role {
|
|
return p.Secret
|
|
}
|
|
}
|
|
return nil
|
|
}
|