convert.go 7.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223
  1. package convert
  2. import (
  3. "encoding/base64"
  4. "errors"
  5. "fmt"
  6. "io/ioutil"
  7. "strings"
  8. "github.com/Azure/azure-sdk-for-go/profiles/latest/containerinstance/mgmt/containerinstance"
  9. "github.com/Azure/go-autorest/autorest/to"
  10. "github.com/compose-spec/compose-go/types"
  11. "github.com/docker/api/compose"
  12. "github.com/docker/api/context/store"
  13. "github.com/sirupsen/logrus"
  14. )
  15. const (
  16. azureFileDriverName = "azure_file"
  17. volumeDriveroptsShareNameKey = "share_name"
  18. volumeDriveroptsAccountNameKey = "storage_account_name"
  19. volumeDriveroptsAccountKeyKey = "storage_account_key"
  20. singleContainerName = "single--container--aci"
  21. )
  22. func ToContainerGroup(aciContext store.AciContext, p compose.Project) (containerinstance.ContainerGroup, error) {
  23. project := projectAciHelper(p)
  24. containerGroupName := strings.ToLower(project.Name)
  25. volumesCache, volumesSlice, err := project.getAciFileVolumes()
  26. if err != nil {
  27. return containerinstance.ContainerGroup{}, err
  28. }
  29. secretVolumes, err := project.getAciSecretVolumes()
  30. if err != nil {
  31. return containerinstance.ContainerGroup{}, err
  32. }
  33. allVolumes := append(volumesSlice, secretVolumes...)
  34. var volumes *[]containerinstance.Volume
  35. if len(allVolumes) == 0 {
  36. volumes = nil
  37. } else {
  38. volumes = &allVolumes
  39. }
  40. var containers []containerinstance.Container
  41. groupDefinition := containerinstance.ContainerGroup{
  42. Name: &containerGroupName,
  43. Location: &aciContext.Location,
  44. ContainerGroupProperties: &containerinstance.ContainerGroupProperties{
  45. OsType: containerinstance.Linux,
  46. Containers: &containers,
  47. Volumes: volumes,
  48. },
  49. }
  50. for _, s := range project.Services {
  51. service := serviceConfigAciHelper(s)
  52. if s.Name != singleContainerName {
  53. logrus.Debugf("Adding %q\n", service.Name)
  54. }
  55. containerDefinition, err := service.getAciContainer(volumesCache)
  56. if err != nil {
  57. return containerinstance.ContainerGroup{}, err
  58. }
  59. if service.Ports != nil {
  60. var containerPorts []containerinstance.ContainerPort
  61. var groupPorts []containerinstance.Port
  62. for _, portConfig := range service.Ports {
  63. if portConfig.Published != 0 && portConfig.Published != portConfig.Target {
  64. msg := fmt.Sprintf("Port mapping is not supported with ACI, cannot map port %d to %d for container %s",
  65. portConfig.Published, portConfig.Target, service.Name)
  66. return groupDefinition, errors.New(msg)
  67. }
  68. portNumber := int32(portConfig.Target)
  69. containerPorts = append(containerPorts, containerinstance.ContainerPort{
  70. Port: to.Int32Ptr(portNumber),
  71. })
  72. groupPorts = append(groupPorts, containerinstance.Port{
  73. Port: to.Int32Ptr(portNumber),
  74. Protocol: containerinstance.TCP,
  75. })
  76. }
  77. containerDefinition.ContainerProperties.Ports = &containerPorts
  78. groupDefinition.ContainerGroupProperties.IPAddress = &containerinstance.IPAddress{
  79. Type: containerinstance.Public,
  80. Ports: &groupPorts,
  81. }
  82. }
  83. containers = append(containers, containerDefinition)
  84. }
  85. groupDefinition.ContainerGroupProperties.Containers = &containers
  86. return groupDefinition, nil
  87. }
  88. type projectAciHelper compose.Project
  89. func (p projectAciHelper) getAciSecretVolumes() ([]containerinstance.Volume, error) {
  90. var secretVolumes []containerinstance.Volume
  91. for secretName, filepathToRead := range p.Secrets {
  92. var data []byte
  93. if strings.HasPrefix(filepathToRead.File, compose.SecretInlineMark) {
  94. data = []byte(filepathToRead.File[len(compose.SecretInlineMark):])
  95. } else {
  96. var err error
  97. data, err = ioutil.ReadFile(filepathToRead.File)
  98. if err != nil {
  99. return secretVolumes, err
  100. }
  101. }
  102. if len(data) == 0 {
  103. continue
  104. }
  105. dataStr := base64.StdEncoding.EncodeToString(data)
  106. secretVolumes = append(secretVolumes, containerinstance.Volume{
  107. Name: to.StringPtr(secretName),
  108. Secret: map[string]*string{
  109. secretName: &dataStr,
  110. },
  111. })
  112. }
  113. return secretVolumes, nil
  114. }
  115. func (p projectAciHelper) getAciFileVolumes() (map[string]bool, []containerinstance.Volume, error) {
  116. azureFileVolumesMap := make(map[string]bool, len(p.Volumes))
  117. var azureFileVolumesSlice []containerinstance.Volume
  118. for name, v := range p.Volumes {
  119. if v.Driver == azureFileDriverName {
  120. shareName, ok := v.DriverOpts[volumeDriveroptsShareNameKey]
  121. if !ok {
  122. return nil, nil, fmt.Errorf("cannot retrieve share name for Azurefile")
  123. }
  124. accountName, ok := v.DriverOpts[volumeDriveroptsAccountNameKey]
  125. if !ok {
  126. return nil, nil, fmt.Errorf("cannot retrieve account name for Azurefile")
  127. }
  128. accountKey, ok := v.DriverOpts[volumeDriveroptsAccountKeyKey]
  129. if !ok {
  130. return nil, nil, fmt.Errorf("cannot retrieve account key for Azurefile")
  131. }
  132. aciVolume := containerinstance.Volume{
  133. Name: to.StringPtr(name),
  134. AzureFile: &containerinstance.AzureFileVolume{
  135. ShareName: to.StringPtr(shareName),
  136. StorageAccountName: to.StringPtr(accountName),
  137. StorageAccountKey: to.StringPtr(accountKey),
  138. },
  139. }
  140. azureFileVolumesMap[name] = true
  141. azureFileVolumesSlice = append(azureFileVolumesSlice, aciVolume)
  142. }
  143. }
  144. return azureFileVolumesMap, azureFileVolumesSlice, nil
  145. }
  146. type serviceConfigAciHelper types.ServiceConfig
  147. func (s serviceConfigAciHelper) getAciFileVolumeMounts(volumesCache map[string]bool) ([]containerinstance.VolumeMount, error) {
  148. var aciServiceVolumes []containerinstance.VolumeMount
  149. for _, sv := range s.Volumes {
  150. if !volumesCache[sv.Source] {
  151. return []containerinstance.VolumeMount{}, fmt.Errorf("could not find volume source %q", sv.Source)
  152. }
  153. aciServiceVolumes = append(aciServiceVolumes, containerinstance.VolumeMount{
  154. Name: to.StringPtr(sv.Source),
  155. MountPath: to.StringPtr(sv.Target),
  156. })
  157. }
  158. return aciServiceVolumes, nil
  159. }
  160. func (s serviceConfigAciHelper) getAciSecretsVolumeMounts() []containerinstance.VolumeMount {
  161. var secretVolumeMounts []containerinstance.VolumeMount
  162. for _, secret := range s.Secrets {
  163. secretsMountPath := "/run/secrets"
  164. if secret.Target == "" {
  165. secret.Target = secret.Source
  166. }
  167. // Specifically use "/" here and not filepath.Join() to avoid windows path being sent and used inside containers
  168. secretsMountPath = secretsMountPath + "/" + secret.Target
  169. vmName := strings.Split(secret.Source, "=")[0]
  170. vm := containerinstance.VolumeMount{
  171. Name: to.StringPtr(vmName),
  172. MountPath: to.StringPtr(secretsMountPath),
  173. ReadOnly: to.BoolPtr(true), // TODO Confirm if the secrets are read only
  174. }
  175. secretVolumeMounts = append(secretVolumeMounts, vm)
  176. }
  177. return secretVolumeMounts
  178. }
  179. func (s serviceConfigAciHelper) getAciContainer(volumesCache map[string]bool) (containerinstance.Container, error) {
  180. secretVolumeMounts := s.getAciSecretsVolumeMounts()
  181. aciServiceVolumes, err := s.getAciFileVolumeMounts(volumesCache)
  182. if err != nil {
  183. return containerinstance.Container{}, err
  184. }
  185. allVolumes := append(aciServiceVolumes, secretVolumeMounts...)
  186. var volumes *[]containerinstance.VolumeMount
  187. if len(allVolumes) == 0 {
  188. volumes = nil
  189. } else {
  190. volumes = &allVolumes
  191. }
  192. return containerinstance.Container{
  193. Name: to.StringPtr(s.Name),
  194. ContainerProperties: &containerinstance.ContainerProperties{
  195. Image: to.StringPtr(s.Image),
  196. Resources: &containerinstance.ResourceRequirements{
  197. Limits: &containerinstance.ResourceLimits{
  198. MemoryInGB: to.Float64Ptr(1),
  199. CPU: to.Float64Ptr(1),
  200. },
  201. Requests: &containerinstance.ResourceRequests{
  202. MemoryInGB: to.Float64Ptr(1),
  203. CPU: to.Float64Ptr(1),
  204. },
  205. },
  206. VolumeMounts: volumes,
  207. },
  208. }, nil
  209. }