| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223 |
- package convert
- import (
- "encoding/base64"
- "errors"
- "fmt"
- "io/ioutil"
- "strings"
- "github.com/Azure/azure-sdk-for-go/profiles/latest/containerinstance/mgmt/containerinstance"
- "github.com/Azure/go-autorest/autorest/to"
- "github.com/compose-spec/compose-go/types"
- "github.com/docker/api/compose"
- "github.com/docker/api/context/store"
- "github.com/sirupsen/logrus"
- )
- const (
- azureFileDriverName = "azure_file"
- volumeDriveroptsShareNameKey = "share_name"
- volumeDriveroptsAccountNameKey = "storage_account_name"
- volumeDriveroptsAccountKeyKey = "storage_account_key"
- singleContainerName = "single--container--aci"
- )
- func ToContainerGroup(aciContext store.AciContext, p compose.Project) (containerinstance.ContainerGroup, error) {
- project := projectAciHelper(p)
- containerGroupName := strings.ToLower(project.Name)
- volumesCache, volumesSlice, err := project.getAciFileVolumes()
- if err != nil {
- return containerinstance.ContainerGroup{}, err
- }
- secretVolumes, err := project.getAciSecretVolumes()
- if err != nil {
- return containerinstance.ContainerGroup{}, err
- }
- allVolumes := append(volumesSlice, secretVolumes...)
- var volumes *[]containerinstance.Volume
- if len(allVolumes) == 0 {
- volumes = nil
- } else {
- volumes = &allVolumes
- }
- var containers []containerinstance.Container
- groupDefinition := containerinstance.ContainerGroup{
- Name: &containerGroupName,
- Location: &aciContext.Location,
- ContainerGroupProperties: &containerinstance.ContainerGroupProperties{
- OsType: containerinstance.Linux,
- Containers: &containers,
- Volumes: volumes,
- },
- }
- for _, s := range project.Services {
- service := serviceConfigAciHelper(s)
- if s.Name != singleContainerName {
- logrus.Debugf("Adding %q\n", service.Name)
- }
- containerDefinition, err := service.getAciContainer(volumesCache)
- if err != nil {
- return containerinstance.ContainerGroup{}, err
- }
- if service.Ports != nil {
- var containerPorts []containerinstance.ContainerPort
- var groupPorts []containerinstance.Port
- for _, portConfig := range service.Ports {
- if portConfig.Published != 0 && portConfig.Published != portConfig.Target {
- msg := fmt.Sprintf("Port mapping is not supported with ACI, cannot map port %d to %d for container %s",
- portConfig.Published, portConfig.Target, service.Name)
- return groupDefinition, errors.New(msg)
- }
- portNumber := int32(portConfig.Target)
- containerPorts = append(containerPorts, containerinstance.ContainerPort{
- Port: to.Int32Ptr(portNumber),
- })
- groupPorts = append(groupPorts, containerinstance.Port{
- Port: to.Int32Ptr(portNumber),
- Protocol: containerinstance.TCP,
- })
- }
- containerDefinition.ContainerProperties.Ports = &containerPorts
- groupDefinition.ContainerGroupProperties.IPAddress = &containerinstance.IPAddress{
- Type: containerinstance.Public,
- Ports: &groupPorts,
- }
- }
- containers = append(containers, containerDefinition)
- }
- groupDefinition.ContainerGroupProperties.Containers = &containers
- return groupDefinition, nil
- }
- type projectAciHelper compose.Project
- func (p projectAciHelper) getAciSecretVolumes() ([]containerinstance.Volume, error) {
- var secretVolumes []containerinstance.Volume
- for secretName, filepathToRead := range p.Secrets {
- var data []byte
- if strings.HasPrefix(filepathToRead.File, compose.SecretInlineMark) {
- data = []byte(filepathToRead.File[len(compose.SecretInlineMark):])
- } else {
- var err error
- data, err = ioutil.ReadFile(filepathToRead.File)
- if err != nil {
- return secretVolumes, err
- }
- }
- if len(data) == 0 {
- continue
- }
- dataStr := base64.StdEncoding.EncodeToString(data)
- secretVolumes = append(secretVolumes, containerinstance.Volume{
- Name: to.StringPtr(secretName),
- Secret: map[string]*string{
- secretName: &dataStr,
- },
- })
- }
- return secretVolumes, nil
- }
- func (p projectAciHelper) getAciFileVolumes() (map[string]bool, []containerinstance.Volume, error) {
- azureFileVolumesMap := make(map[string]bool, len(p.Volumes))
- var azureFileVolumesSlice []containerinstance.Volume
- for name, v := range p.Volumes {
- if v.Driver == azureFileDriverName {
- shareName, ok := v.DriverOpts[volumeDriveroptsShareNameKey]
- if !ok {
- return nil, nil, fmt.Errorf("cannot retrieve share name for Azurefile")
- }
- accountName, ok := v.DriverOpts[volumeDriveroptsAccountNameKey]
- if !ok {
- return nil, nil, fmt.Errorf("cannot retrieve account name for Azurefile")
- }
- accountKey, ok := v.DriverOpts[volumeDriveroptsAccountKeyKey]
- if !ok {
- return nil, nil, fmt.Errorf("cannot retrieve account key for Azurefile")
- }
- aciVolume := containerinstance.Volume{
- Name: to.StringPtr(name),
- AzureFile: &containerinstance.AzureFileVolume{
- ShareName: to.StringPtr(shareName),
- StorageAccountName: to.StringPtr(accountName),
- StorageAccountKey: to.StringPtr(accountKey),
- },
- }
- azureFileVolumesMap[name] = true
- azureFileVolumesSlice = append(azureFileVolumesSlice, aciVolume)
- }
- }
- return azureFileVolumesMap, azureFileVolumesSlice, nil
- }
- type serviceConfigAciHelper types.ServiceConfig
- func (s serviceConfigAciHelper) getAciFileVolumeMounts(volumesCache map[string]bool) ([]containerinstance.VolumeMount, error) {
- var aciServiceVolumes []containerinstance.VolumeMount
- for _, sv := range s.Volumes {
- if !volumesCache[sv.Source] {
- return []containerinstance.VolumeMount{}, fmt.Errorf("could not find volume source %q", sv.Source)
- }
- aciServiceVolumes = append(aciServiceVolumes, containerinstance.VolumeMount{
- Name: to.StringPtr(sv.Source),
- MountPath: to.StringPtr(sv.Target),
- })
- }
- return aciServiceVolumes, nil
- }
- func (s serviceConfigAciHelper) getAciSecretsVolumeMounts() []containerinstance.VolumeMount {
- var secretVolumeMounts []containerinstance.VolumeMount
- for _, secret := range s.Secrets {
- secretsMountPath := "/run/secrets"
- if secret.Target == "" {
- secret.Target = secret.Source
- }
- // Specifically use "/" here and not filepath.Join() to avoid windows path being sent and used inside containers
- secretsMountPath = secretsMountPath + "/" + secret.Target
- vmName := strings.Split(secret.Source, "=")[0]
- vm := containerinstance.VolumeMount{
- Name: to.StringPtr(vmName),
- MountPath: to.StringPtr(secretsMountPath),
- ReadOnly: to.BoolPtr(true), // TODO Confirm if the secrets are read only
- }
- secretVolumeMounts = append(secretVolumeMounts, vm)
- }
- return secretVolumeMounts
- }
- func (s serviceConfigAciHelper) getAciContainer(volumesCache map[string]bool) (containerinstance.Container, error) {
- secretVolumeMounts := s.getAciSecretsVolumeMounts()
- aciServiceVolumes, err := s.getAciFileVolumeMounts(volumesCache)
- if err != nil {
- return containerinstance.Container{}, err
- }
- allVolumes := append(aciServiceVolumes, secretVolumeMounts...)
- var volumes *[]containerinstance.VolumeMount
- if len(allVolumes) == 0 {
- volumes = nil
- } else {
- volumes = &allVolumes
- }
- return containerinstance.Container{
- Name: to.StringPtr(s.Name),
- ContainerProperties: &containerinstance.ContainerProperties{
- Image: to.StringPtr(s.Image),
- Resources: &containerinstance.ResourceRequirements{
- Limits: &containerinstance.ResourceLimits{
- MemoryInGB: to.Float64Ptr(1),
- CPU: to.Float64Ptr(1),
- },
- Requests: &containerinstance.ResourceRequests{
- MemoryInGB: to.Float64Ptr(1),
- CPU: to.Float64Ptr(1),
- },
- },
- VolumeMounts: volumes,
- },
- }, nil
- }
|