2019-01-21 08:52:46 -05:00
|
|
|
package client
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"net"
|
|
|
|
"net/http"
|
|
|
|
"os"
|
|
|
|
"path/filepath"
|
2019-04-09 04:07:30 -04:00
|
|
|
"time"
|
2019-01-21 08:52:46 -05:00
|
|
|
|
|
|
|
"github.com/docker/go-connections/sockets"
|
|
|
|
"github.com/docker/go-connections/tlsconfig"
|
|
|
|
"github.com/pkg/errors"
|
|
|
|
)
|
|
|
|
|
2019-04-09 19:11:53 -04:00
|
|
|
// Opt is a configuration option to initialize a client
|
|
|
|
type Opt func(*Client) error
|
|
|
|
|
2019-01-21 08:52:46 -05:00
|
|
|
// FromEnv configures the client with values from environment variables.
|
|
|
|
//
|
2022-03-07 05:29:38 -05:00
|
|
|
// FromEnv uses the following environment variables:
|
|
|
|
//
|
2022-03-07 05:50:22 -05:00
|
|
|
// DOCKER_HOST (EnvOverrideHost) to set the URL to the docker server.
|
2022-03-07 05:29:38 -05:00
|
|
|
//
|
2022-03-07 05:50:22 -05:00
|
|
|
// DOCKER_API_VERSION (EnvOverrideAPIVersion) to set the version of the API to
|
2022-03-07 05:29:38 -05:00
|
|
|
// use, leave empty for latest.
|
|
|
|
//
|
2022-03-07 05:50:22 -05:00
|
|
|
// DOCKER_CERT_PATH (EnvOverrideCertPath) to specify the directory from which to
|
2022-03-07 05:29:38 -05:00
|
|
|
// load the TLS certificates (ca.pem, cert.pem, key.pem).
|
|
|
|
//
|
2022-03-07 05:50:22 -05:00
|
|
|
// DOCKER_TLS_VERIFY (EnvTLSVerify) to enable or disable TLS verification (off by
|
2022-03-07 05:29:38 -05:00
|
|
|
// default).
|
2019-01-21 08:52:46 -05:00
|
|
|
func FromEnv(c *Client) error {
|
2021-03-30 09:15:42 -04:00
|
|
|
ops := []Opt{
|
|
|
|
WithTLSClientConfigFromEnv(),
|
|
|
|
WithHostFromEnv(),
|
|
|
|
WithVersionFromEnv(),
|
2019-01-21 08:52:46 -05:00
|
|
|
}
|
2021-03-30 09:15:42 -04:00
|
|
|
for _, op := range ops {
|
|
|
|
if err := op(c); err != nil {
|
2019-03-19 17:12:08 -04:00
|
|
|
return err
|
|
|
|
}
|
2019-01-21 08:52:46 -05:00
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
|
|
|
|
// WithDialer applies the dialer.DialContext to the client transport. This can be
|
|
|
|
// used to set the Timeout and KeepAlive settings of the client.
|
|
|
|
// Deprecated: use WithDialContext
|
2019-04-09 19:11:53 -04:00
|
|
|
func WithDialer(dialer *net.Dialer) Opt {
|
2019-01-21 08:52:46 -05:00
|
|
|
return WithDialContext(dialer.DialContext)
|
|
|
|
}
|
|
|
|
|
|
|
|
// WithDialContext applies the dialer to the client transport. This can be
|
|
|
|
// used to set the Timeout and KeepAlive settings of the client.
|
2019-04-09 19:11:53 -04:00
|
|
|
func WithDialContext(dialContext func(ctx context.Context, network, addr string) (net.Conn, error)) Opt {
|
2019-01-21 08:52:46 -05:00
|
|
|
return func(c *Client) error {
|
|
|
|
if transport, ok := c.client.Transport.(*http.Transport); ok {
|
|
|
|
transport.DialContext = dialContext
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return errors.Errorf("cannot apply dialer to transport: %T", c.client.Transport)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// WithHost overrides the client host with the specified one.
|
2019-04-09 19:11:53 -04:00
|
|
|
func WithHost(host string) Opt {
|
2019-01-21 08:52:46 -05:00
|
|
|
return func(c *Client) error {
|
|
|
|
hostURL, err := ParseHostURL(host)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
c.host = host
|
|
|
|
c.proto = hostURL.Scheme
|
|
|
|
c.addr = hostURL.Host
|
|
|
|
c.basePath = hostURL.Path
|
|
|
|
if transport, ok := c.client.Transport.(*http.Transport); ok {
|
|
|
|
return sockets.ConfigureTransport(transport, c.proto, c.addr)
|
|
|
|
}
|
|
|
|
return errors.Errorf("cannot apply host to transport: %T", c.client.Transport)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-30 09:15:42 -04:00
|
|
|
// WithHostFromEnv overrides the client host with the host specified in the
|
2022-03-07 05:50:22 -05:00
|
|
|
// DOCKER_HOST (EnvOverrideHost) environment variable. If DOCKER_HOST is not set,
|
2022-03-07 05:29:38 -05:00
|
|
|
// or set to an empty value, the host is not modified.
|
2021-03-30 09:15:42 -04:00
|
|
|
func WithHostFromEnv() Opt {
|
|
|
|
return func(c *Client) error {
|
2022-03-07 05:50:22 -05:00
|
|
|
if host := os.Getenv(EnvOverrideHost); host != "" {
|
2021-03-30 09:15:42 -04:00
|
|
|
return WithHost(host)(c)
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-21 08:52:46 -05:00
|
|
|
// WithHTTPClient overrides the client http client with the specified one
|
2019-04-09 19:11:53 -04:00
|
|
|
func WithHTTPClient(client *http.Client) Opt {
|
2019-01-21 08:52:46 -05:00
|
|
|
return func(c *Client) error {
|
|
|
|
if client != nil {
|
|
|
|
c.client = client
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-09 04:07:30 -04:00
|
|
|
// WithTimeout configures the time limit for requests made by the HTTP client
|
|
|
|
func WithTimeout(timeout time.Duration) Opt {
|
|
|
|
return func(c *Client) error {
|
|
|
|
c.client.Timeout = timeout
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-01-21 08:52:46 -05:00
|
|
|
// WithHTTPHeaders overrides the client default http headers
|
2019-04-09 19:11:53 -04:00
|
|
|
func WithHTTPHeaders(headers map[string]string) Opt {
|
2019-01-21 08:52:46 -05:00
|
|
|
return func(c *Client) error {
|
|
|
|
c.customHTTPHeaders = headers
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// WithScheme overrides the client scheme with the specified one
|
2019-04-09 19:11:53 -04:00
|
|
|
func WithScheme(scheme string) Opt {
|
2019-01-21 08:52:46 -05:00
|
|
|
return func(c *Client) error {
|
|
|
|
c.scheme = scheme
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// WithTLSClientConfig applies a tls config to the client transport.
|
2019-04-09 19:11:53 -04:00
|
|
|
func WithTLSClientConfig(cacertPath, certPath, keyPath string) Opt {
|
2019-01-21 08:52:46 -05:00
|
|
|
return func(c *Client) error {
|
|
|
|
opts := tlsconfig.Options{
|
|
|
|
CAFile: cacertPath,
|
|
|
|
CertFile: certPath,
|
|
|
|
KeyFile: keyPath,
|
|
|
|
ExclusiveRootPools: true,
|
|
|
|
}
|
|
|
|
config, err := tlsconfig.Client(opts)
|
|
|
|
if err != nil {
|
|
|
|
return errors.Wrap(err, "failed to create tls config")
|
|
|
|
}
|
|
|
|
if transport, ok := c.client.Transport.(*http.Transport); ok {
|
|
|
|
transport.TLSClientConfig = config
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
return errors.Errorf("cannot apply tls config to transport: %T", c.client.Transport)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2021-03-30 09:15:42 -04:00
|
|
|
// WithTLSClientConfigFromEnv configures the client's TLS settings with the
|
|
|
|
// settings in the DOCKER_CERT_PATH and DOCKER_TLS_VERIFY environment variables.
|
|
|
|
// If DOCKER_CERT_PATH is not set or empty, TLS configuration is not modified.
|
|
|
|
//
|
2022-03-07 05:29:38 -05:00
|
|
|
// WithTLSClientConfigFromEnv uses the following environment variables:
|
|
|
|
//
|
2022-03-07 05:50:22 -05:00
|
|
|
// DOCKER_CERT_PATH (EnvOverrideCertPath) to specify the directory from which to
|
2022-03-07 05:29:38 -05:00
|
|
|
// load the TLS certificates (ca.pem, cert.pem, key.pem).
|
|
|
|
//
|
2022-03-07 05:50:22 -05:00
|
|
|
// DOCKER_TLS_VERIFY (EnvTLSVerify) to enable or disable TLS verification (off by
|
2022-03-07 05:29:38 -05:00
|
|
|
// default).
|
2021-03-30 09:15:42 -04:00
|
|
|
func WithTLSClientConfigFromEnv() Opt {
|
|
|
|
return func(c *Client) error {
|
2022-03-07 05:50:22 -05:00
|
|
|
dockerCertPath := os.Getenv(EnvOverrideCertPath)
|
2021-03-30 09:15:42 -04:00
|
|
|
if dockerCertPath == "" {
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
options := tlsconfig.Options{
|
|
|
|
CAFile: filepath.Join(dockerCertPath, "ca.pem"),
|
|
|
|
CertFile: filepath.Join(dockerCertPath, "cert.pem"),
|
|
|
|
KeyFile: filepath.Join(dockerCertPath, "key.pem"),
|
2022-03-07 05:50:22 -05:00
|
|
|
InsecureSkipVerify: os.Getenv(EnvTLSVerify) == "",
|
2021-03-30 09:15:42 -04:00
|
|
|
}
|
|
|
|
tlsc, err := tlsconfig.Client(options)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
|
|
|
c.client = &http.Client{
|
|
|
|
Transport: &http.Transport{TLSClientConfig: tlsc},
|
|
|
|
CheckRedirect: CheckRedirect,
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-09 18:54:16 -04:00
|
|
|
// WithVersion overrides the client version with the specified one. If an empty
|
|
|
|
// version is specified, the value will be ignored to allow version negotiation.
|
2019-04-09 19:11:53 -04:00
|
|
|
func WithVersion(version string) Opt {
|
2019-01-21 08:52:46 -05:00
|
|
|
return func(c *Client) error {
|
2019-04-09 18:54:16 -04:00
|
|
|
if version != "" {
|
|
|
|
c.version = version
|
|
|
|
c.manualOverride = true
|
|
|
|
}
|
2019-01-21 08:52:46 -05:00
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|
2019-04-08 08:14:07 -04:00
|
|
|
|
2021-03-30 09:15:42 -04:00
|
|
|
// WithVersionFromEnv overrides the client version with the version specified in
|
|
|
|
// the DOCKER_API_VERSION environment variable. If DOCKER_API_VERSION is not set,
|
|
|
|
// the version is not modified.
|
|
|
|
func WithVersionFromEnv() Opt {
|
|
|
|
return func(c *Client) error {
|
2022-03-07 05:50:22 -05:00
|
|
|
return WithVersion(os.Getenv(EnvOverrideAPIVersion))(c)
|
2021-03-30 09:15:42 -04:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-04-08 08:14:07 -04:00
|
|
|
// WithAPIVersionNegotiation enables automatic API version negotiation for the client.
|
|
|
|
// With this option enabled, the client automatically negotiates the API version
|
|
|
|
// to use when making requests. API version negotiation is performed on the first
|
|
|
|
// request; subsequent requests will not re-negotiate.
|
|
|
|
func WithAPIVersionNegotiation() Opt {
|
|
|
|
return func(c *Client) error {
|
|
|
|
c.negotiateVersion = true
|
|
|
|
return nil
|
|
|
|
}
|
|
|
|
}
|