2019-01-21 13:52:46 +00:00
|
|
|
package client
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"net"
|
|
|
|
"net/http"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
|
|
|
|
|
|
|
"github.com/docker/go-connections/sockets"
|
|
|
|
"github.com/docker/go-connections/tlsconfig"
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
)
|
|
|
|
|
2019-04-09 23:11:53 +00:00
|
|
|
// Opt is a configuration option to initialize a client
|
|
|
|
type Opt func(*Client) error
|
|
|
|
|
2019-01-21 13:52:46 +00:00
|
|
|
// FromEnv configures the client with values from environment variables.
|
|
|
|
//
|
|
|
|
// Supported environment variables:
|
|
|
|
// DOCKER_HOST to set the url to the docker server.
|
|
|
|
// DOCKER_API_VERSION to set the version of the API to reach, leave empty for latest.
|
|
|
|
// DOCKER_CERT_PATH to load the TLS certificates from.
|
|
|
|
// DOCKER_TLS_VERIFY to enable or disable TLS verification, off by default.
|
|
|
|
func FromEnv(c *Client) error {
|
|
|
|
if dockerCertPath := os.Getenv("DOCKER_CERT_PATH"); dockerCertPath != "" {
|
|
|
|
options := tlsconfig.Options{
|
|
|
|
CAFile: filepath.Join(dockerCertPath, "ca.pem"),
|
|
|
|
CertFile: filepath.Join(dockerCertPath, "cert.pem"),
|
|
|
|
KeyFile: filepath.Join(dockerCertPath, "key.pem"),
|
|
|
|
InsecureSkipVerify: os.Getenv("DOCKER_TLS_VERIFY") == "",
|
|
|
|
}
|
|
|
|
tlsc, err := tlsconfig.Client(options)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
c.client = &http.Client{
|
|
|
|
Transport: &http.Transport{TLSClientConfig: tlsc},
|
|
|
|
CheckRedirect: CheckRedirect,
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if host := os.Getenv("DOCKER_HOST"); host != "" {
|
|
|
|
if err := WithHost(host)(c); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if version := os.Getenv("DOCKER_API_VERSION"); version != "" {
|
2019-03-19 21:12:08 +00:00
|
|
|
if err := WithVersion(version)(c); err != nil {
|
|
|
|
return err
|
|
|
|
}
|
2019-01-21 13:52:46 +00:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// WithDialer applies the dialer.DialContext to the client transport. This can be
|
|
|
|
// used to set the Timeout and KeepAlive settings of the client.
|
|
|
|
// Deprecated: use WithDialContext
|
2019-04-09 23:11:53 +00:00
|
|
|
func WithDialer(dialer *net.Dialer) Opt {
|
2019-01-21 13:52:46 +00:00
|
|
|
return WithDialContext(dialer.DialContext)
|
|
|
|
}
|
|
|
|
|
|
|
|
// WithDialContext applies the dialer to the client transport. This can be
|
|
|
|
// used to set the Timeout and KeepAlive settings of the client.
|
2019-04-09 23:11:53 +00:00
|
|
|
func WithDialContext(dialContext func(ctx context.Context, network, addr string) (net.Conn, error)) Opt {
|
2019-01-21 13:52:46 +00:00
|
|
|
return func(c *Client) error {
|
|
|
|
if transport, ok := c.client.Transport.(*http.Transport); ok {
|
|
|
|
transport.DialContext = dialContext
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return errors.Errorf("cannot apply dialer to transport: %T", c.client.Transport)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// WithHost overrides the client host with the specified one.
|
2019-04-09 23:11:53 +00:00
|
|
|
func WithHost(host string) Opt {
|
2019-01-21 13:52:46 +00:00
|
|
|
return func(c *Client) error {
|
|
|
|
hostURL, err := ParseHostURL(host)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
c.host = host
|
|
|
|
c.proto = hostURL.Scheme
|
|
|
|
c.addr = hostURL.Host
|
|
|
|
c.basePath = hostURL.Path
|
|
|
|
if transport, ok := c.client.Transport.(*http.Transport); ok {
|
|
|
|
return sockets.ConfigureTransport(transport, c.proto, c.addr)
|
|
|
|
}
|
|
|
|
return errors.Errorf("cannot apply host to transport: %T", c.client.Transport)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// WithHTTPClient overrides the client http client with the specified one
|
2019-04-09 23:11:53 +00:00
|
|
|
func WithHTTPClient(client *http.Client) Opt {
|
2019-01-21 13:52:46 +00:00
|
|
|
return func(c *Client) error {
|
|
|
|
if client != nil {
|
|
|
|
c.client = client
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// WithHTTPHeaders overrides the client default http headers
|
2019-04-09 23:11:53 +00:00
|
|
|
func WithHTTPHeaders(headers map[string]string) Opt {
|
2019-01-21 13:52:46 +00:00
|
|
|
return func(c *Client) error {
|
|
|
|
c.customHTTPHeaders = headers
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// WithScheme overrides the client scheme with the specified one
|
2019-04-09 23:11:53 +00:00
|
|
|
func WithScheme(scheme string) Opt {
|
2019-01-21 13:52:46 +00:00
|
|
|
return func(c *Client) error {
|
|
|
|
c.scheme = scheme
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// WithTLSClientConfig applies a tls config to the client transport.
|
2019-04-09 23:11:53 +00:00
|
|
|
func WithTLSClientConfig(cacertPath, certPath, keyPath string) Opt {
|
2019-01-21 13:52:46 +00:00
|
|
|
return func(c *Client) error {
|
|
|
|
opts := tlsconfig.Options{
|
|
|
|
CAFile: cacertPath,
|
|
|
|
CertFile: certPath,
|
|
|
|
KeyFile: keyPath,
|
|
|
|
ExclusiveRootPools: true,
|
|
|
|
}
|
|
|
|
config, err := tlsconfig.Client(opts)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "failed to create tls config")
|
|
|
|
}
|
|
|
|
if transport, ok := c.client.Transport.(*http.Transport); ok {
|
|
|
|
transport.TLSClientConfig = config
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return errors.Errorf("cannot apply tls config to transport: %T", c.client.Transport)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-09 22:54:16 +00:00
|
|
|
// WithVersion overrides the client version with the specified one. If an empty
|
|
|
|
// version is specified, the value will be ignored to allow version negotiation.
|
2019-04-09 23:11:53 +00:00
|
|
|
func WithVersion(version string) Opt {
|
2019-01-21 13:52:46 +00:00
|
|
|
return func(c *Client) error {
|
2019-04-09 22:54:16 +00:00
|
|
|
if version != "" {
|
|
|
|
c.version = version
|
|
|
|
c.manualOverride = true
|
|
|
|
}
|
2019-01-21 13:52:46 +00:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|