docker.go 2.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116
  1. package main
  2. import (
  3. "crypto/tls"
  4. "crypto/x509"
  5. "fmt"
  6. "io/ioutil"
  7. "os"
  8. "strings"
  9. "github.com/docker/docker/api"
  10. "github.com/docker/docker/api/client"
  11. "github.com/docker/docker/dockerversion"
  12. "github.com/docker/docker/pkg/log"
  13. flag "github.com/docker/docker/pkg/mflag"
  14. "github.com/docker/docker/reexec"
  15. "github.com/docker/docker/utils"
  16. )
  17. const (
  18. defaultCaFile = "ca.pem"
  19. defaultKeyFile = "key.pem"
  20. defaultCertFile = "cert.pem"
  21. )
  22. func main() {
  23. if reexec.Init() {
  24. return
  25. }
  26. flag.Parse()
  27. // FIXME: validate daemon flags here
  28. if *flVersion {
  29. showVersion()
  30. return
  31. }
  32. if *flDebug {
  33. os.Setenv("DEBUG", "1")
  34. }
  35. if len(flHosts) == 0 {
  36. defaultHost := os.Getenv("DOCKER_HOST")
  37. if defaultHost == "" || *flDaemon {
  38. // If we do not have a host, default to unix socket
  39. defaultHost = fmt.Sprintf("unix://%s", api.DEFAULTUNIXSOCKET)
  40. }
  41. defaultHost, err := api.ValidateHost(defaultHost)
  42. if err != nil {
  43. log.Fatal(err)
  44. }
  45. flHosts = append(flHosts, defaultHost)
  46. }
  47. if *flDaemon {
  48. mainDaemon()
  49. return
  50. }
  51. if len(flHosts) > 1 {
  52. log.Fatal("Please specify only one -H")
  53. }
  54. protoAddrParts := strings.SplitN(flHosts[0], "://", 2)
  55. var (
  56. cli *client.DockerCli
  57. tlsConfig tls.Config
  58. )
  59. tlsConfig.InsecureSkipVerify = true
  60. // If we should verify the server, we need to load a trusted ca
  61. if *flTlsVerify {
  62. *flTls = true
  63. certPool := x509.NewCertPool()
  64. file, err := ioutil.ReadFile(*flCa)
  65. if err != nil {
  66. log.Fatalf("Couldn't read ca cert %s: %s", *flCa, err)
  67. }
  68. certPool.AppendCertsFromPEM(file)
  69. tlsConfig.RootCAs = certPool
  70. tlsConfig.InsecureSkipVerify = false
  71. }
  72. // If tls is enabled, try to load and send client certificates
  73. if *flTls || *flTlsVerify {
  74. _, errCert := os.Stat(*flCert)
  75. _, errKey := os.Stat(*flKey)
  76. if errCert == nil && errKey == nil {
  77. *flTls = true
  78. cert, err := tls.LoadX509KeyPair(*flCert, *flKey)
  79. if err != nil {
  80. log.Fatalf("Couldn't load X509 key pair: %s. Key encrypted?", err)
  81. }
  82. tlsConfig.Certificates = []tls.Certificate{cert}
  83. }
  84. }
  85. if *flTls || *flTlsVerify {
  86. cli = client.NewDockerCli(os.Stdin, os.Stdout, os.Stderr, protoAddrParts[0], protoAddrParts[1], &tlsConfig)
  87. } else {
  88. cli = client.NewDockerCli(os.Stdin, os.Stdout, os.Stderr, protoAddrParts[0], protoAddrParts[1], nil)
  89. }
  90. if err := cli.Cmd(flag.Args()...); err != nil {
  91. if sterr, ok := err.(*utils.StatusError); ok {
  92. if sterr.Status != "" {
  93. log.Infof("%s", sterr.Status)
  94. }
  95. os.Exit(sterr.StatusCode)
  96. }
  97. log.Fatal(err)
  98. }
  99. }
  100. func showVersion() {
  101. fmt.Printf("Docker version %s, build %s\n", dockerversion.VERSION, dockerversion.GITCOMMIT)
  102. }