2015-02-13 14:46:14 -05:00
|
|
|
// +build linux
|
|
|
|
|
|
|
|
package server
|
|
|
|
|
|
|
|
import (
|
|
|
|
"fmt"
|
2015-03-31 16:37:49 -04:00
|
|
|
"net"
|
2015-02-13 14:46:14 -05:00
|
|
|
"net/http"
|
|
|
|
|
2015-03-31 16:37:49 -04:00
|
|
|
"github.com/Sirupsen/logrus"
|
2015-04-17 17:32:18 -04:00
|
|
|
"github.com/docker/docker/daemon"
|
2015-02-13 18:08:42 -05:00
|
|
|
"github.com/docker/docker/pkg/systemd"
|
2015-02-13 14:46:14 -05:00
|
|
|
)
|
|
|
|
|
2015-04-17 17:32:18 -04:00
|
|
|
// newServer sets up the required serverCloser and does protocol specific checking.
|
|
|
|
func (s *Server) newServer(proto, addr string) (serverCloser, error) {
|
2015-03-31 16:37:49 -04:00
|
|
|
var (
|
|
|
|
err error
|
|
|
|
l net.Listener
|
|
|
|
)
|
2015-02-13 14:46:14 -05:00
|
|
|
switch proto {
|
|
|
|
case "fd":
|
2015-03-31 16:37:49 -04:00
|
|
|
ls, err := systemd.ListenFD(addr)
|
|
|
|
if err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
chErrors := make(chan error, len(ls))
|
|
|
|
// We don't want to start serving on these sockets until the
|
|
|
|
// daemon is initialized and installed. Otherwise required handlers
|
|
|
|
// won't be ready.
|
2015-04-17 17:32:18 -04:00
|
|
|
<-s.start
|
2015-03-31 16:37:49 -04:00
|
|
|
// Since ListenFD will return one or more sockets we have
|
|
|
|
// to create a go func to spawn off multiple serves
|
|
|
|
for i := range ls {
|
|
|
|
listener := ls[i]
|
|
|
|
go func() {
|
2015-04-17 17:32:18 -04:00
|
|
|
httpSrv := http.Server{Handler: s.router}
|
2015-03-31 16:37:49 -04:00
|
|
|
chErrors <- httpSrv.Serve(listener)
|
|
|
|
}()
|
|
|
|
}
|
|
|
|
for i := 0; i < len(ls); i++ {
|
|
|
|
if err := <-chErrors; err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return nil, nil
|
2015-02-13 14:46:14 -05:00
|
|
|
case "tcp":
|
2015-04-17 17:32:18 -04:00
|
|
|
if !s.cfg.TlsVerify {
|
2015-04-17 06:05:30 -04:00
|
|
|
logrus.Warn("/!\\ DON'T BIND ON ANY IP ADDRESS WITHOUT setting -tlsverify IF YOU DON'T KNOW WHAT YOU'RE DOING /!\\")
|
2015-03-31 16:37:49 -04:00
|
|
|
}
|
2015-04-17 17:32:18 -04:00
|
|
|
if l, err = NewTcpSocket(addr, tlsConfigFromServerConfig(s.cfg), s.start); err != nil {
|
2015-03-31 16:37:49 -04:00
|
|
|
return nil, err
|
|
|
|
}
|
|
|
|
if err := allocateDaemonPort(addr); err != nil {
|
|
|
|
return nil, err
|
|
|
|
}
|
2015-02-13 14:46:14 -05:00
|
|
|
case "unix":
|
2015-04-17 17:32:18 -04:00
|
|
|
if l, err = NewUnixSocket(addr, s.cfg.SocketGroup, s.start); err != nil {
|
2015-03-31 16:37:49 -04:00
|
|
|
return nil, err
|
2015-02-13 18:08:42 -05:00
|
|
|
}
|
2015-03-31 16:37:49 -04:00
|
|
|
default:
|
|
|
|
return nil, fmt.Errorf("Invalid protocol format: %q", proto)
|
2015-02-13 18:08:42 -05:00
|
|
|
}
|
2015-03-31 16:37:49 -04:00
|
|
|
return &HttpServer{
|
|
|
|
&http.Server{
|
|
|
|
Addr: addr,
|
2015-04-17 17:32:18 -04:00
|
|
|
Handler: s.router,
|
2015-03-31 16:37:49 -04:00
|
|
|
},
|
|
|
|
l,
|
|
|
|
}, nil
|
2015-02-13 18:08:42 -05:00
|
|
|
}
|
|
|
|
|
2015-04-17 17:32:18 -04:00
|
|
|
func (s *Server) AcceptConnections(d *daemon.Daemon) {
|
2015-02-13 18:08:42 -05:00
|
|
|
// Tell the init daemon we are accepting requests
|
2015-04-17 17:32:18 -04:00
|
|
|
s.daemon = d
|
2015-02-13 18:08:42 -05:00
|
|
|
go systemd.SdNotify("READY=1")
|
|
|
|
// close the lock so the listeners start accepting connections
|
2015-03-31 18:12:15 -04:00
|
|
|
select {
|
2015-04-17 17:32:18 -04:00
|
|
|
case <-s.start:
|
2015-03-31 18:12:15 -04:00
|
|
|
default:
|
2015-04-17 17:32:18 -04:00
|
|
|
close(s.start)
|
2015-02-13 18:08:42 -05:00
|
|
|
}
|
|
|
|
}
|