123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226 |
- package client
- import (
- "bytes"
- "encoding/json"
- "fmt"
- "io"
- "io/ioutil"
- "net"
- "net/http"
- "net/url"
- "os"
- "strings"
- "github.com/docker/docker/api/types"
- "github.com/docker/docker/api/types/versions"
- "github.com/pkg/errors"
- "golang.org/x/net/context"
- "golang.org/x/net/context/ctxhttp"
- )
- // serverResponse is a wrapper for http API responses.
- type serverResponse struct {
- body io.ReadCloser
- header http.Header
- statusCode int
- }
- // head sends an http request to the docker API using the method HEAD.
- func (cli *Client) head(ctx context.Context, path string, query url.Values, headers map[string][]string) (serverResponse, error) {
- return cli.sendRequest(ctx, "HEAD", path, query, nil, headers)
- }
- // getWithContext sends an http request to the docker API using the method GET with a specific go context.
- func (cli *Client) get(ctx context.Context, path string, query url.Values, headers map[string][]string) (serverResponse, error) {
- return cli.sendRequest(ctx, "GET", path, query, nil, headers)
- }
- // postWithContext sends an http request to the docker API using the method POST with a specific go context.
- func (cli *Client) post(ctx context.Context, path string, query url.Values, obj interface{}, headers map[string][]string) (serverResponse, error) {
- return cli.sendRequest(ctx, "POST", path, query, obj, headers)
- }
- func (cli *Client) postRaw(ctx context.Context, path string, query url.Values, body io.Reader, headers map[string][]string) (serverResponse, error) {
- return cli.sendClientRequest(ctx, "POST", path, query, body, headers)
- }
- // put sends an http request to the docker API using the method PUT.
- func (cli *Client) put(ctx context.Context, path string, query url.Values, obj interface{}, headers map[string][]string) (serverResponse, error) {
- return cli.sendRequest(ctx, "PUT", path, query, obj, headers)
- }
- // put sends an http request to the docker API using the method PUT.
- func (cli *Client) putRaw(ctx context.Context, path string, query url.Values, body io.Reader, headers map[string][]string) (serverResponse, error) {
- return cli.sendClientRequest(ctx, "PUT", path, query, body, headers)
- }
- // delete sends an http request to the docker API using the method DELETE.
- func (cli *Client) delete(ctx context.Context, path string, query url.Values, headers map[string][]string) (serverResponse, error) {
- return cli.sendRequest(ctx, "DELETE", path, query, nil, headers)
- }
- func (cli *Client) sendRequest(ctx context.Context, method, path string, query url.Values, obj interface{}, headers map[string][]string) (serverResponse, error) {
- var body io.Reader
- if obj != nil {
- var err error
- body, err = encodeData(obj)
- if err != nil {
- return serverResponse{}, err
- }
- if headers == nil {
- headers = make(map[string][]string)
- }
- headers["Content-Type"] = []string{"application/json"}
- }
- return cli.sendClientRequest(ctx, method, path, query, body, headers)
- }
- func (cli *Client) sendClientRequest(ctx context.Context, method, path string, query url.Values, body io.Reader, headers map[string][]string) (serverResponse, error) {
- serverResp := serverResponse{
- body: nil,
- statusCode: -1,
- }
- expectedPayload := (method == "POST" || method == "PUT")
- if expectedPayload && body == nil {
- body = bytes.NewReader([]byte{})
- }
- req, err := cli.newRequest(method, path, query, body, headers)
- if err != nil {
- return serverResp, err
- }
- if cli.proto == "unix" || cli.proto == "npipe" {
- // For local communications, it doesn't matter what the host is. We just
- // need a valid and meaningful host name. (See #189)
- req.Host = "docker"
- }
- scheme, err := resolveScheme(cli.client.Transport)
- if err != nil {
- return serverResp, err
- }
- req.URL.Host = cli.addr
- req.URL.Scheme = scheme
- if expectedPayload && req.Header.Get("Content-Type") == "" {
- req.Header.Set("Content-Type", "text/plain")
- }
- resp, err := ctxhttp.Do(ctx, cli.client, req)
- if err != nil {
- if scheme == "https" && strings.Contains(err.Error(), "malformed HTTP response") {
- return serverResp, fmt.Errorf("%v.\n* Are you trying to connect to a TLS-enabled daemon without TLS?", err)
- }
- if scheme == "https" && strings.Contains(err.Error(), "bad certificate") {
- return serverResp, fmt.Errorf("The server probably has client authentication (--tlsverify) enabled. Please check your TLS client certification settings: %v", err)
- }
- // Don't decorate context sentinel errors; users may be comparing to
- // them directly.
- switch err {
- case context.Canceled, context.DeadlineExceeded:
- return serverResp, err
- }
- if nErr, ok := err.(*url.Error); ok {
- if nErr, ok := nErr.Err.(*net.OpError); ok {
- if os.IsPermission(nErr.Err) {
- return serverResp, errors.Wrapf(err, "Got permission denied while trying to connect to the Docker daemon socket at %v", cli.host)
- }
- }
- }
- if err, ok := err.(net.Error); ok {
- if err.Timeout() {
- return serverResp, ErrorConnectionFailed(cli.host)
- }
- if !err.Temporary() {
- if strings.Contains(err.Error(), "connection refused") || strings.Contains(err.Error(), "dial unix") {
- return serverResp, ErrorConnectionFailed(cli.host)
- }
- }
- }
- return serverResp, errors.Wrap(err, "error during connect")
- }
- if resp != nil {
- serverResp.statusCode = resp.StatusCode
- }
- if serverResp.statusCode < 200 || serverResp.statusCode >= 400 {
- body, err := ioutil.ReadAll(resp.Body)
- if err != nil {
- return serverResp, err
- }
- if len(body) == 0 {
- return serverResp, fmt.Errorf("Error: request returned %s for API route and version %s, check if the server supports the requested API version", http.StatusText(serverResp.statusCode), req.URL)
- }
- var errorMessage string
- if (cli.version == "" || versions.GreaterThan(cli.version, "1.23")) &&
- resp.Header.Get("Content-Type") == "application/json" {
- var errorResponse types.ErrorResponse
- if err := json.Unmarshal(body, &errorResponse); err != nil {
- return serverResp, fmt.Errorf("Error reading JSON: %v", err)
- }
- errorMessage = errorResponse.Message
- } else {
- errorMessage = string(body)
- }
- return serverResp, fmt.Errorf("Error response from daemon: %s", strings.TrimSpace(errorMessage))
- }
- serverResp.body = resp.Body
- serverResp.header = resp.Header
- return serverResp, nil
- }
- func (cli *Client) newRequest(method, path string, query url.Values, body io.Reader, headers map[string][]string) (*http.Request, error) {
- apiPath := cli.getAPIPath(path, query)
- req, err := http.NewRequest(method, apiPath, body)
- if err != nil {
- return nil, err
- }
- // Add CLI Config's HTTP Headers BEFORE we set the Docker headers
- // then the user can't change OUR headers
- for k, v := range cli.customHTTPHeaders {
- req.Header.Set(k, v)
- }
- if headers != nil {
- for k, v := range headers {
- req.Header[k] = v
- }
- }
- return req, nil
- }
- func encodeData(data interface{}) (*bytes.Buffer, error) {
- params := bytes.NewBuffer(nil)
- if data != nil {
- if err := json.NewEncoder(params).Encode(data); err != nil {
- return nil, err
- }
- }
- return params, nil
- }
- func ensureReaderClosed(response serverResponse) {
- if body := response.body; body != nil {
- // Drain up to 512 bytes and close the body to let the Transport reuse the connection
- io.CopyN(ioutil.Discard, body, 512)
- response.body.Close()
- }
- }
|