docker.go 2.7 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119
  1. package main
  2. import (
  3. "crypto/tls"
  4. "crypto/x509"
  5. "fmt"
  6. "io/ioutil"
  7. "log"
  8. "os"
  9. "strings"
  10. "github.com/docker/docker/api"
  11. "github.com/docker/docker/api/client"
  12. "github.com/docker/docker/dockerversion"
  13. flag "github.com/docker/docker/pkg/mflag"
  14. "github.com/docker/docker/reexec"
  15. "github.com/docker/docker/utils"
  16. )
  17. const (
  18. defaultTrustKeyFile = "key.json"
  19. defaultCaFile = "ca.pem"
  20. defaultKeyFile = "key.pem"
  21. defaultCertFile = "cert.pem"
  22. )
  23. func main() {
  24. if reexec.Init() {
  25. return
  26. }
  27. flag.Parse()
  28. // FIXME: validate daemon flags here
  29. if *flVersion {
  30. showVersion()
  31. return
  32. }
  33. if *flDebug {
  34. os.Setenv("DEBUG", "1")
  35. }
  36. if len(flHosts) == 0 {
  37. defaultHost := os.Getenv("DOCKER_HOST")
  38. if defaultHost == "" || *flDaemon {
  39. // If we do not have a host, default to unix socket
  40. defaultHost = fmt.Sprintf("unix://%s", api.DEFAULTUNIXSOCKET)
  41. }
  42. defaultHost, err := api.ValidateHost(defaultHost)
  43. if err != nil {
  44. log.Fatal(err)
  45. }
  46. flHosts = append(flHosts, defaultHost)
  47. }
  48. if *flDaemon {
  49. mainDaemon()
  50. return
  51. }
  52. if len(flHosts) > 1 {
  53. log.Fatal("Please specify only one -H")
  54. }
  55. protoAddrParts := strings.SplitN(flHosts[0], "://", 2)
  56. var (
  57. cli *client.DockerCli
  58. tlsConfig tls.Config
  59. )
  60. tlsConfig.InsecureSkipVerify = true
  61. // If we should verify the server, we need to load a trusted ca
  62. if *flTlsVerify {
  63. *flTls = true
  64. certPool := x509.NewCertPool()
  65. file, err := ioutil.ReadFile(*flCa)
  66. if err != nil {
  67. log.Fatalf("Couldn't read ca cert %s: %s", *flCa, err)
  68. }
  69. certPool.AppendCertsFromPEM(file)
  70. tlsConfig.RootCAs = certPool
  71. tlsConfig.InsecureSkipVerify = false
  72. }
  73. // If tls is enabled, try to load and send client certificates
  74. if *flTls || *flTlsVerify {
  75. _, errCert := os.Stat(*flCert)
  76. _, errKey := os.Stat(*flKey)
  77. if errCert == nil && errKey == nil {
  78. *flTls = true
  79. cert, err := tls.LoadX509KeyPair(*flCert, *flKey)
  80. if err != nil {
  81. log.Fatalf("Couldn't load X509 key pair: %s. Key encrypted?", err)
  82. }
  83. tlsConfig.Certificates = []tls.Certificate{cert}
  84. }
  85. // Avoid fallback to SSL protocols < TLS1.0
  86. tlsConfig.MinVersion = tls.VersionTLS10
  87. }
  88. if *flTls || *flTlsVerify {
  89. cli = client.NewDockerCli(os.Stdin, os.Stdout, os.Stderr, nil, protoAddrParts[0], protoAddrParts[1], &tlsConfig)
  90. } else {
  91. cli = client.NewDockerCli(os.Stdin, os.Stdout, os.Stderr, nil, protoAddrParts[0], protoAddrParts[1], nil)
  92. }
  93. if err := cli.Cmd(flag.Args()...); err != nil {
  94. if sterr, ok := err.(*utils.StatusError); ok {
  95. if sterr.Status != "" {
  96. log.Println(sterr.Status)
  97. }
  98. os.Exit(sterr.StatusCode)
  99. }
  100. log.Fatal(err)
  101. }
  102. }
  103. func showVersion() {
  104. fmt.Printf("Docker version %s, build %s\n", dockerversion.VERSION, dockerversion.GITCOMMIT)
  105. }