Be more explicit about non-TLS TCP access deprecation
Turn warnings into a deprecation notice and highlight that it will prevent daemon startup in future releases. Signed-off-by: Paweł Gronowski <pawel.gronowski@docker.com>
This commit is contained in:
parent
825635a5bf
commit
bcb4794eea
2 changed files with 4 additions and 2 deletions
|
@ -844,6 +844,7 @@ func loadListeners(cfg *config.Config, tlsConfig *tls.Config) ([]net.Listener, [
|
||||||
if proto == "tcp" && !authEnabled {
|
if proto == "tcp" && !authEnabled {
|
||||||
log.G(ctx).WithField("host", protoAddr).Warn("Binding to IP address without --tlsverify is insecure and gives root access on this machine to everyone who has access to your network.")
|
log.G(ctx).WithField("host", protoAddr).Warn("Binding to IP address without --tlsverify is insecure and gives root access on this machine to everyone who has access to your network.")
|
||||||
log.G(ctx).WithField("host", protoAddr).Warn("Binding to an IP address, even on localhost, can also give access to scripts run in a browser. Be safe out there!")
|
log.G(ctx).WithField("host", protoAddr).Warn("Binding to an IP address, even on localhost, can also give access to scripts run in a browser. Be safe out there!")
|
||||||
|
log.G(ctx).WithField("host", protoAddr).Warn("[DEPRECATION NOTICE] In future versions this will be a hard failure preventing the daemon from starting! Learn more at: https://docs.docker.com/go/api-security/")
|
||||||
time.Sleep(time.Second)
|
time.Sleep(time.Second)
|
||||||
|
|
||||||
// If TLSVerify is explicitly set to false we'll take that as "Please let me shoot myself in the foot"
|
// If TLSVerify is explicitly set to false we'll take that as "Please let me shoot myself in the foot"
|
||||||
|
|
|
@ -241,12 +241,13 @@ func (daemon *Daemon) fillAPIInfo(v *system.Info, cfg *config.Config) {
|
||||||
if proto != "tcp" {
|
if proto != "tcp" {
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
|
const removal = "In future versions this will be a hard failure preventing the daemon from starting! Learn more at: https://docs.docker.com/go/api-security/"
|
||||||
if cfg.TLS == nil || !*cfg.TLS {
|
if cfg.TLS == nil || !*cfg.TLS {
|
||||||
v.Warnings = append(v.Warnings, fmt.Sprintf("WARNING: API is accessible on http://%s without encryption.%s", addr, warn))
|
v.Warnings = append(v.Warnings, fmt.Sprintf("[DEPRECATION NOTICE]: API is accessible on http://%s without encryption.%s\n%s", addr, warn, removal))
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
if cfg.TLSVerify == nil || !*cfg.TLSVerify {
|
if cfg.TLSVerify == nil || !*cfg.TLSVerify {
|
||||||
v.Warnings = append(v.Warnings, fmt.Sprintf("WARNING: API is accessible on https://%s without TLS client verification.%s", addr, warn))
|
v.Warnings = append(v.Warnings, fmt.Sprintf("[DEPRECATION NOTICE]: API is accessible on https://%s without TLS client verification.%s\n%s", addr, warn, removal))
|
||||||
continue
|
continue
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in a new issue