listeners_linux.go 3.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108
  1. package listeners // import "github.com/docker/docker/daemon/listeners"
  2. import (
  3. "context"
  4. "crypto/tls"
  5. "net"
  6. "os"
  7. "strconv"
  8. "github.com/containerd/log"
  9. "github.com/coreos/go-systemd/v22/activation"
  10. "github.com/docker/docker/pkg/homedir"
  11. "github.com/docker/go-connections/sockets"
  12. "github.com/pkg/errors"
  13. )
  14. // Init creates new listeners for the server.
  15. // TODO: Clean up the fact that socketGroup and tlsConfig aren't always used.
  16. func Init(proto, addr, socketGroup string, tlsConfig *tls.Config) ([]net.Listener, error) {
  17. ls := []net.Listener{}
  18. switch proto {
  19. case "fd":
  20. fds, err := listenFD(addr, tlsConfig)
  21. if err != nil {
  22. return nil, err
  23. }
  24. ls = append(ls, fds...)
  25. case "tcp":
  26. l, err := sockets.NewTCPSocket(addr, tlsConfig)
  27. if err != nil {
  28. return nil, err
  29. }
  30. ls = append(ls, l)
  31. case "unix":
  32. gid, err := lookupGID(socketGroup)
  33. if err != nil {
  34. if socketGroup != "" {
  35. if socketGroup != defaultSocketGroup {
  36. return nil, err
  37. }
  38. log.G(context.TODO()).Warnf("could not change group %s to %s: %v", addr, defaultSocketGroup, err)
  39. }
  40. gid = os.Getgid()
  41. }
  42. l, err := sockets.NewUnixSocket(addr, gid)
  43. if err != nil {
  44. return nil, errors.Wrapf(err, "can't create unix socket %s", addr)
  45. }
  46. if _, err := homedir.StickRuntimeDirContents([]string{addr}); err != nil {
  47. // StickRuntimeDirContents returns nil error if XDG_RUNTIME_DIR is just unset
  48. log.G(context.TODO()).WithError(err).Warnf("cannot set sticky bit on socket %s under XDG_RUNTIME_DIR", addr)
  49. }
  50. ls = append(ls, l)
  51. default:
  52. return nil, errors.Errorf("invalid protocol format: %q", proto)
  53. }
  54. return ls, nil
  55. }
  56. // listenFD returns the specified socket activated files as a slice of
  57. // net.Listeners or all of the activated files if "*" is given.
  58. func listenFD(addr string, tlsConfig *tls.Config) ([]net.Listener, error) {
  59. var (
  60. err error
  61. listeners []net.Listener
  62. )
  63. // socket activation
  64. if tlsConfig != nil {
  65. listeners, err = activation.TLSListeners(tlsConfig)
  66. } else {
  67. listeners, err = activation.Listeners()
  68. }
  69. if err != nil {
  70. return nil, err
  71. }
  72. if len(listeners) == 0 {
  73. return nil, errors.New("no sockets found via socket activation: make sure the service was started by systemd")
  74. }
  75. // default to all fds just like unix:// and tcp://
  76. if addr == "" || addr == "*" {
  77. return listeners, nil
  78. }
  79. fdNum, err := strconv.Atoi(addr)
  80. if err != nil {
  81. return nil, errors.Errorf("failed to parse systemd fd address: should be a number: %v", addr)
  82. }
  83. fdOffset := fdNum - 3
  84. if len(listeners) < fdOffset+1 {
  85. return nil, errors.New("too few socket activated files passed in by systemd")
  86. }
  87. if listeners[fdOffset] == nil {
  88. return nil, errors.Errorf("failed to listen on systemd activated file: fd %d", fdOffset+3)
  89. }
  90. for i, ls := range listeners {
  91. if i == fdOffset || ls == nil {
  92. continue
  93. }
  94. if err := ls.Close(); err != nil {
  95. return nil, errors.Wrapf(err, "failed to close systemd activated file: fd %d", fdOffset+3)
  96. }
  97. }
  98. return []net.Listener{listeners[fdOffset]}, nil
  99. }