docker.go 2.5 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115
  1. package main
  2. import (
  3. "crypto/tls"
  4. "crypto/x509"
  5. "fmt"
  6. "io/ioutil"
  7. "log"
  8. "os"
  9. "strings"
  10. "github.com/docker/docker/api"
  11. "github.com/docker/docker/api/client"
  12. "github.com/docker/docker/dockerversion"
  13. flag "github.com/docker/docker/pkg/mflag"
  14. "github.com/docker/docker/reexec"
  15. "github.com/docker/docker/utils"
  16. )
  17. const (
  18. defaultCaFile = "ca.pem"
  19. defaultKeyFile = "key.pem"
  20. defaultCertFile = "cert.pem"
  21. )
  22. func main() {
  23. if reexec.Init() {
  24. return
  25. }
  26. flag.Parse()
  27. // FIXME: validate daemon flags here
  28. if *flVersion {
  29. showVersion()
  30. return
  31. }
  32. if *flDebug {
  33. os.Setenv("DEBUG", "1")
  34. }
  35. if len(flHosts) == 0 {
  36. defaultHost := os.Getenv("DOCKER_HOST")
  37. if defaultHost == "" || *flDaemon {
  38. // If we do not have a host, default to unix socket
  39. defaultHost = fmt.Sprintf("unix://%s", api.DEFAULTUNIXSOCKET)
  40. }
  41. if _, err := api.ValidateHost(defaultHost); err != nil {
  42. log.Fatal(err)
  43. }
  44. flHosts = append(flHosts, defaultHost)
  45. }
  46. if *flDaemon {
  47. mainDaemon()
  48. return
  49. }
  50. if len(flHosts) > 1 {
  51. log.Fatal("Please specify only one -H")
  52. }
  53. protoAddrParts := strings.SplitN(flHosts[0], "://", 2)
  54. var (
  55. cli *client.DockerCli
  56. tlsConfig tls.Config
  57. )
  58. tlsConfig.InsecureSkipVerify = true
  59. // If we should verify the server, we need to load a trusted ca
  60. if *flTlsVerify {
  61. *flTls = true
  62. certPool := x509.NewCertPool()
  63. file, err := ioutil.ReadFile(*flCa)
  64. if err != nil {
  65. log.Fatalf("Couldn't read ca cert %s: %s", *flCa, err)
  66. }
  67. certPool.AppendCertsFromPEM(file)
  68. tlsConfig.RootCAs = certPool
  69. tlsConfig.InsecureSkipVerify = false
  70. }
  71. // If tls is enabled, try to load and send client certificates
  72. if *flTls || *flTlsVerify {
  73. _, errCert := os.Stat(*flCert)
  74. _, errKey := os.Stat(*flKey)
  75. if errCert == nil && errKey == nil {
  76. *flTls = true
  77. cert, err := tls.LoadX509KeyPair(*flCert, *flKey)
  78. if err != nil {
  79. log.Fatalf("Couldn't load X509 key pair: %s. Key encrypted?", err)
  80. }
  81. tlsConfig.Certificates = []tls.Certificate{cert}
  82. }
  83. }
  84. if *flTls || *flTlsVerify {
  85. cli = client.NewDockerCli(os.Stdin, os.Stdout, os.Stderr, protoAddrParts[0], protoAddrParts[1], &tlsConfig)
  86. } else {
  87. cli = client.NewDockerCli(os.Stdin, os.Stdout, os.Stderr, protoAddrParts[0], protoAddrParts[1], nil)
  88. }
  89. if err := cli.Cmd(flag.Args()...); err != nil {
  90. if sterr, ok := err.(*utils.StatusError); ok {
  91. if sterr.Status != "" {
  92. log.Println(sterr.Status)
  93. }
  94. os.Exit(sterr.StatusCode)
  95. }
  96. log.Fatal(err)
  97. }
  98. }
  99. func showVersion() {
  100. fmt.Printf("Docker version %s, build %s\n", dockerversion.VERSION, dockerversion.GITCOMMIT)
  101. }