This validation is now handled by the API-client since [moby@5d6b566],
so no longer needed to be done in the cli. This function was only used
internally and has no external consumers, so removing it without
deprecating first.
[moby@5d6b566]: 5d6b56699d
Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
204 lines
8.5 KiB
Go
204 lines
8.5 KiB
Go
package service
|
|
|
|
import (
|
|
"context"
|
|
"fmt"
|
|
|
|
"github.com/docker/cli/cli"
|
|
"github.com/docker/cli/cli/command"
|
|
"github.com/docker/cli/cli/command/completion"
|
|
cliopts "github.com/docker/cli/opts"
|
|
"github.com/docker/docker/api/types"
|
|
"github.com/docker/docker/api/types/swarm"
|
|
"github.com/docker/docker/api/types/versions"
|
|
"github.com/docker/docker/client"
|
|
"github.com/spf13/cobra"
|
|
"github.com/spf13/pflag"
|
|
)
|
|
|
|
func newCreateCommand(dockerCLI command.Cli) *cobra.Command {
|
|
opts := newServiceOptions()
|
|
|
|
cmd := &cobra.Command{
|
|
Use: "create [OPTIONS] IMAGE [COMMAND] [ARG...]",
|
|
Short: "Create a new service",
|
|
Args: cli.RequiresMinArgs(1),
|
|
RunE: func(cmd *cobra.Command, args []string) error {
|
|
opts.image = args[0]
|
|
if len(args) > 1 {
|
|
opts.args = args[1:]
|
|
}
|
|
return runCreate(cmd.Context(), dockerCLI, cmd.Flags(), opts)
|
|
},
|
|
ValidArgsFunction: completion.NoComplete,
|
|
}
|
|
flags := cmd.Flags()
|
|
flags.StringVar(&opts.mode, flagMode, "replicated", `Service mode ("replicated", "global", "replicated-job", "global-job")`)
|
|
flags.StringVar(&opts.name, flagName, "", "Service name")
|
|
|
|
addServiceFlags(flags, opts, buildServiceDefaultFlagMapping())
|
|
|
|
flags.VarP(&opts.labels, flagLabel, "l", "Service labels")
|
|
flags.Var(&opts.containerLabels, flagContainerLabel, "Container labels")
|
|
flags.VarP(&opts.env, flagEnv, "e", "Set environment variables")
|
|
flags.Var(&opts.envFile, flagEnvFile, "Read in a file of environment variables")
|
|
flags.Var(&opts.mounts, flagMount, "Attach a filesystem mount to the service")
|
|
flags.Var(&opts.constraints, flagConstraint, "Placement constraints")
|
|
flags.Var(&opts.placementPrefs, flagPlacementPref, "Add a placement preference")
|
|
flags.SetAnnotation(flagPlacementPref, "version", []string{"1.28"})
|
|
flags.Var(&opts.networks, flagNetwork, "Network attachments")
|
|
flags.Var(&opts.secrets, flagSecret, "Specify secrets to expose to the service")
|
|
flags.SetAnnotation(flagSecret, "version", []string{"1.25"})
|
|
flags.Var(&opts.configs, flagConfig, "Specify configurations to expose to the service")
|
|
flags.SetAnnotation(flagConfig, "version", []string{"1.30"})
|
|
flags.VarP(&opts.endpoint.publishPorts, flagPublish, "p", "Publish a port as a node port")
|
|
flags.Var(&opts.groups, flagGroup, "Set one or more supplementary user groups for the container")
|
|
flags.SetAnnotation(flagGroup, "version", []string{"1.25"})
|
|
flags.Var(&opts.dns, flagDNS, "Set custom DNS servers")
|
|
flags.SetAnnotation(flagDNS, "version", []string{"1.25"})
|
|
flags.Var(&opts.dnsOption, flagDNSOption, "Set DNS options")
|
|
flags.SetAnnotation(flagDNSOption, "version", []string{"1.25"})
|
|
flags.Var(&opts.dnsSearch, flagDNSSearch, "Set custom DNS search domains")
|
|
flags.SetAnnotation(flagDNSSearch, "version", []string{"1.25"})
|
|
flags.Var(&opts.hosts, flagHost, "Set one or more custom host-to-IP mappings (host:ip)")
|
|
flags.SetAnnotation(flagHost, "version", []string{"1.25"})
|
|
flags.BoolVar(&opts.init, flagInit, false, "Use an init inside each service container to forward signals and reap processes")
|
|
flags.SetAnnotation(flagInit, "version", []string{"1.37"})
|
|
flags.Var(&opts.sysctls, flagSysCtl, "Sysctl options")
|
|
flags.SetAnnotation(flagSysCtl, "version", []string{"1.40"})
|
|
flags.Var(&opts.ulimits, flagUlimit, "Ulimit options")
|
|
flags.SetAnnotation(flagUlimit, "version", []string{"1.41"})
|
|
flags.Int64Var(&opts.oomScoreAdj, flagOomScoreAdj, 0, "Tune host's OOM preferences (-1000 to 1000) ")
|
|
flags.SetAnnotation(flagOomScoreAdj, "version", []string{"1.46"})
|
|
|
|
flags.Var(cliopts.NewListOptsRef(&opts.resources.resGenericResources, ValidateSingleGenericResource), "generic-resource", "User defined resources")
|
|
flags.SetAnnotation(flagHostAdd, "version", []string{"1.32"})
|
|
|
|
flags.SetInterspersed(false)
|
|
|
|
// TODO(thaJeztah): add completion for capabilities, stop-signal (currently non-exported in container package)
|
|
// _ = cmd.RegisterFlagCompletionFunc(flagCapAdd, completeLinuxCapabilityNames)
|
|
// _ = cmd.RegisterFlagCompletionFunc(flagCapDrop, completeLinuxCapabilityNames)
|
|
// _ = cmd.RegisterFlagCompletionFunc(flagStopSignal, completeSignals)
|
|
|
|
_ = cmd.RegisterFlagCompletionFunc(flagMode, completion.FromList("replicated", "global", "replicated-job", "global-job"))
|
|
_ = cmd.RegisterFlagCompletionFunc(flagEnv, completion.EnvVarNames) // TODO(thaJeztah): flagEnvRemove (needs to read current env-vars on the service)
|
|
_ = cmd.RegisterFlagCompletionFunc(flagEnvFile, completion.FileNames)
|
|
_ = cmd.RegisterFlagCompletionFunc(flagNetwork, completion.NetworkNames(dockerCLI))
|
|
_ = cmd.RegisterFlagCompletionFunc(flagRestartCondition, completion.FromList("none", "on-failure", "any"))
|
|
_ = cmd.RegisterFlagCompletionFunc(flagRollbackOrder, completion.FromList("start-first", "stop-first"))
|
|
_ = cmd.RegisterFlagCompletionFunc(flagRollbackFailureAction, completion.FromList("pause", "continue"))
|
|
_ = cmd.RegisterFlagCompletionFunc(flagUpdateOrder, completion.FromList("start-first", "stop-first"))
|
|
_ = cmd.RegisterFlagCompletionFunc(flagUpdateFailureAction, completion.FromList("pause", "continue", "rollback"))
|
|
|
|
flags.VisitAll(func(flag *pflag.Flag) {
|
|
// Set a default completion function if none was set. We don't look
|
|
// up if it does already have one set, because Cobra does this for
|
|
// us, and returns an error (which we ignore for this reason).
|
|
_ = cmd.RegisterFlagCompletionFunc(flag.Name, completion.NoComplete)
|
|
})
|
|
return cmd
|
|
}
|
|
|
|
func runCreate(ctx context.Context, dockerCLI command.Cli, flags *pflag.FlagSet, opts *serviceOptions) error {
|
|
apiClient := dockerCLI.Client()
|
|
createOpts := types.ServiceCreateOptions{}
|
|
|
|
service, err := opts.ToService(ctx, apiClient, flags)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
specifiedSecrets := opts.secrets.Value()
|
|
if len(specifiedSecrets) > 0 {
|
|
// parse and validate secrets
|
|
secrets, err := ParseSecrets(ctx, apiClient, specifiedSecrets)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
service.TaskTemplate.ContainerSpec.Secrets = secrets
|
|
}
|
|
|
|
if err := setConfigs(ctx, apiClient, &service, opts); err != nil {
|
|
return err
|
|
}
|
|
|
|
if err := resolveServiceImageDigestContentTrust(dockerCLI, &service); err != nil {
|
|
return err
|
|
}
|
|
|
|
// only send auth if flag was set
|
|
if opts.registryAuth {
|
|
// Retrieve encoded auth token from the image reference
|
|
encodedAuth, err := command.RetrieveAuthTokenFromImage(dockerCLI.ConfigFile(), opts.image)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
createOpts.EncodedRegistryAuth = encodedAuth
|
|
}
|
|
|
|
// query registry if flag disabling it was not set
|
|
if !opts.noResolveImage && versions.GreaterThanOrEqualTo(apiClient.ClientVersion(), "1.30") {
|
|
createOpts.QueryRegistry = true
|
|
}
|
|
|
|
response, err := apiClient.ServiceCreate(ctx, service, createOpts)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
|
|
for _, warning := range response.Warnings {
|
|
_, _ = fmt.Fprintln(dockerCLI.Err(), warning)
|
|
}
|
|
|
|
_, _ = fmt.Fprintln(dockerCLI.Out(), response.ID)
|
|
|
|
if opts.detach || versions.LessThan(apiClient.ClientVersion(), "1.29") {
|
|
return nil
|
|
}
|
|
|
|
return WaitOnService(ctx, dockerCLI, response.ID, opts.quiet)
|
|
}
|
|
|
|
// setConfigs does double duty: it both sets the ConfigReferences of the
|
|
// service, and it sets the service CredentialSpec. This is because there is an
|
|
// interplay between the CredentialSpec and the Config it depends on.
|
|
func setConfigs(ctx context.Context, apiClient client.ConfigAPIClient, service *swarm.ServiceSpec, opts *serviceOptions) error {
|
|
specifiedConfigs := opts.configs.Value()
|
|
// if the user has requested to use a Config, for the CredentialSpec add it
|
|
// to the specifiedConfigs as a RuntimeTarget.
|
|
if cs := opts.credentialSpec.Value(); cs != nil && cs.Config != "" {
|
|
specifiedConfigs = append(specifiedConfigs, &swarm.ConfigReference{
|
|
ConfigName: cs.Config,
|
|
Runtime: &swarm.ConfigReferenceRuntimeTarget{},
|
|
})
|
|
}
|
|
if len(specifiedConfigs) > 0 {
|
|
// parse and validate configs
|
|
configs, err := ParseConfigs(ctx, apiClient, specifiedConfigs)
|
|
if err != nil {
|
|
return err
|
|
}
|
|
service.TaskTemplate.ContainerSpec.Configs = configs
|
|
// if we have a CredentialSpec Config, find its ID and rewrite the
|
|
// field on the spec
|
|
//
|
|
// we check the opts instead of the service directly because there are
|
|
// a few layers of nullable objects in the service, which is a PITA
|
|
// to traverse, but the existence of the option implies that those are
|
|
// non-null.
|
|
if cs := opts.credentialSpec.Value(); cs != nil && cs.Config != "" {
|
|
for _, config := range configs {
|
|
if config.ConfigName == cs.Config {
|
|
service.TaskTemplate.ContainerSpec.Privileges.CredentialSpec.Config = config.ConfigID
|
|
// we've found the right config, no need to keep iterating
|
|
// through the rest of them.
|
|
break
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
return nil
|
|
}
|