server_linux.go 2.0 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889
  1. // +build linux
  2. package server
  3. import (
  4. "fmt"
  5. "net"
  6. "net/http"
  7. "github.com/Sirupsen/logrus"
  8. "github.com/docker/docker/engine"
  9. "github.com/docker/docker/pkg/systemd"
  10. )
  11. // NewServer sets up the required Server and does protocol specific checking.
  12. func NewServer(proto, addr string, conf *ServerConfig, eng *engine.Engine) (Server, error) {
  13. var (
  14. err error
  15. l net.Listener
  16. r = createRouter(
  17. eng,
  18. conf.Logging,
  19. conf.EnableCors,
  20. conf.CorsHeaders,
  21. conf.Version,
  22. )
  23. )
  24. switch proto {
  25. case "fd":
  26. ls, err := systemd.ListenFD(addr)
  27. if err != nil {
  28. return nil, err
  29. }
  30. chErrors := make(chan error, len(ls))
  31. // We don't want to start serving on these sockets until the
  32. // daemon is initialized and installed. Otherwise required handlers
  33. // won't be ready.
  34. <-activationLock
  35. // Since ListenFD will return one or more sockets we have
  36. // to create a go func to spawn off multiple serves
  37. for i := range ls {
  38. listener := ls[i]
  39. go func() {
  40. httpSrv := http.Server{Handler: r}
  41. chErrors <- httpSrv.Serve(listener)
  42. }()
  43. }
  44. for i := 0; i < len(ls); i++ {
  45. if err := <-chErrors; err != nil {
  46. return nil, err
  47. }
  48. }
  49. return nil, nil
  50. case "tcp":
  51. if !conf.TlsVerify {
  52. logrus.Warn("/!\\ DON'T BIND ON ANY IP ADDRESS WITHOUT setting -tlsverify IF YOU DON'T KNOW WHAT YOU'RE DOING /!\\")
  53. }
  54. if l, err = NewTcpSocket(addr, tlsConfigFromServerConfig(conf)); err != nil {
  55. return nil, err
  56. }
  57. if err := allocateDaemonPort(addr); err != nil {
  58. return nil, err
  59. }
  60. case "unix":
  61. if l, err = NewUnixSocket(addr, conf.SocketGroup); err != nil {
  62. return nil, err
  63. }
  64. default:
  65. return nil, fmt.Errorf("Invalid protocol format: %q", proto)
  66. }
  67. return &HttpServer{
  68. &http.Server{
  69. Addr: addr,
  70. Handler: r,
  71. },
  72. l,
  73. }, nil
  74. }
  75. func AcceptConnections() {
  76. // Tell the init daemon we are accepting requests
  77. go systemd.SdNotify("READY=1")
  78. // close the lock so the listeners start accepting connections
  79. select {
  80. case <-activationLock:
  81. default:
  82. close(activationLock)
  83. }
  84. }