2013-01-19 16:07:19 -08:00
package main
import (
2014-02-27 13:47:59 +01:00
"crypto/tls"
"crypto/x509"
2013-04-10 12:24:15 +02:00
"fmt"
2014-02-27 13:47:59 +01:00
"io/ioutil"
2014-02-01 03:38:39 -08:00
"log"
"os"
"strings"
2014-01-29 19:26:54 +00:00
"github.com/dotcloud/docker/api"
2014-03-28 22:59:29 +00:00
"github.com/dotcloud/docker/api/client"
2014-02-19 15:27:57 -08:00
"github.com/dotcloud/docker/builtins"
2014-02-11 16:05:45 -08:00
"github.com/dotcloud/docker/dockerversion"
2013-11-07 12:19:24 -08:00
"github.com/dotcloud/docker/engine"
2014-03-10 21:10:23 +00:00
"github.com/dotcloud/docker/opts"
2013-12-23 11:43:54 -08:00
flag "github.com/dotcloud/docker/pkg/mflag"
2013-10-10 10:53:38 +02:00
"github.com/dotcloud/docker/sysinit"
2013-05-14 22:37:35 +00:00
"github.com/dotcloud/docker/utils"
2013-01-23 23:14:46 -08:00
)
2014-02-27 13:47:59 +01:00
const (
defaultCaFile = "ca.pem"
defaultKeyFile = "key.pem"
defaultCertFile = "cert.pem"
)
var (
dockerConfDir = os . Getenv ( "HOME" ) + "/.docker/"
)
2013-01-19 16:07:19 -08:00
func main ( ) {
2014-02-25 10:54:41 -08:00
if selfPath := utils . SelfPath ( ) ; strings . Contains ( selfPath , ".dockerinit" ) {
2013-03-13 00:29:40 -07:00
// Running in init mode
2013-10-10 10:53:38 +02:00
sysinit . SysInit ( )
2013-03-13 00:29:40 -07:00
return
2013-01-25 11:26:18 -08:00
}
2013-11-26 17:46:06 +00:00
2013-11-26 17:47:58 +00:00
var (
2013-12-23 11:43:54 -08:00
flVersion = flag . Bool ( [ ] string { "v" , "-version" } , false , "Print version information and quit" )
flDaemon = flag . Bool ( [ ] string { "d" , "-daemon" } , false , "Enable daemon mode" )
flDebug = flag . Bool ( [ ] string { "D" , "-debug" } , false , "Enable debug mode" )
flAutoRestart = flag . Bool ( [ ] string { "r" , "-restart" } , true , "Restart previously running containers" )
bridgeName = flag . String ( [ ] string { "b" , "-bridge" } , "" , "Attach containers to a pre-existing network bridge; use 'none' to disable container networking" )
bridgeIp = flag . String ( [ ] string { "#bip" , "-bip" } , "" , "Use this CIDR notation address for the network bridge's IP, not compatible with -b" )
pidfile = flag . String ( [ ] string { "p" , "-pidfile" } , "/var/run/docker.pid" , "Path to use for daemon PID file" )
flRoot = flag . String ( [ ] string { "g" , "-graph" } , "/var/lib/docker" , "Path to use as the root of the docker runtime" )
2014-01-24 16:18:02 -08:00
flSocketGroup = flag . String ( [ ] string { "G" , "-group" } , "docker" , "Group to assign the unix socket specified by -H when running in daemon mode; use '' (the empty string) to disable setting of a group" )
2013-12-23 11:43:54 -08:00
flEnableCors = flag . Bool ( [ ] string { "#api-enable-cors" , "-api-enable-cors" } , false , "Enable CORS headers in the remote API" )
2014-02-11 18:46:55 -08:00
flDns = opts . NewListOpts ( opts . ValidateIp4Address )
2014-02-07 11:48:14 -05:00
flDnsSearch = opts . NewListOpts ( opts . ValidateDomain )
2014-03-12 13:44:01 +09:00
flEnableIptables = flag . Bool ( [ ] string { "#iptables" , "-iptables" } , true , "Enable Docker's addition of iptables rules" )
flEnableIpForward = flag . Bool ( [ ] string { "#ip-forward" , "-ip-forward" } , true , "Enable net.ipv4.ip_forward" )
2013-12-23 11:43:54 -08:00
flDefaultIp = flag . String ( [ ] string { "#ip" , "-ip" } , "0.0.0.0" , "Default IP address to use when binding container ports" )
flInterContainerComm = flag . Bool ( [ ] string { "#icc" , "-icc" } , true , "Enable inter-container communication" )
flGraphDriver = flag . String ( [ ] string { "s" , "-storage-driver" } , "" , "Force the docker runtime to use a specific storage driver" )
2014-02-24 20:41:09 -08:00
flExecDriver = flag . String ( [ ] string { "e" , "-exec-driver" } , "native" , "Force the docker runtime to use a specific exec driver" )
2014-02-11 18:46:55 -08:00
flHosts = opts . NewListOpts ( api . ValidateHost )
2014-02-21 10:51:51 -05:00
flMtu = flag . Int ( [ ] string { "#mtu" , "-mtu" } , 0 , "Set the containers network MTU; if no value is provided: default to the default route MTU or 1500 if no default route is available" )
2014-02-27 13:47:59 +01:00
flTls = flag . Bool ( [ ] string { "-tls" } , false , "Use TLS; implied by tls-verify flags" )
flTlsVerify = flag . Bool ( [ ] string { "-tlsverify" } , false , "Use TLS and verify the remote (daemon: verify client, client: verify daemon)" )
flCa = flag . String ( [ ] string { "-tlscacert" } , dockerConfDir + defaultCaFile , "Trust only remotes providing a certificate signed by the CA given here" )
flCert = flag . String ( [ ] string { "-tlscert" } , dockerConfDir + defaultCertFile , "Path to TLS certificate file" )
flKey = flag . String ( [ ] string { "-tlskey" } , dockerConfDir + defaultKeyFile , "Path to TLS key file" )
2013-11-26 17:47:58 +00:00
)
2013-12-23 11:43:54 -08:00
flag . Var ( & flDns , [ ] string { "#dns" , "-dns" } , "Force docker to use specific DNS servers" )
2014-02-07 11:48:14 -05:00
flag . Var ( & flDnsSearch , [ ] string { "-dns-search" } , "Force Docker to use specific DNS search domains" )
2014-01-21 12:47:27 -08:00
flag . Var ( & flHosts , [ ] string { "H" , "-host" } , "tcp://host:port, unix://path/to/socket, fd://* or fd://socketfd to use in daemon mode. Multiple sockets can be specified" )
2013-10-04 19:25:15 -07:00
2013-03-13 00:29:40 -07:00
flag . Parse ( )
2013-10-04 19:25:15 -07:00
2013-08-06 20:51:12 -07:00
if * flVersion {
showVersion ( )
return
}
2013-11-26 17:50:43 +00:00
if flHosts . Len ( ) == 0 {
2013-12-20 19:30:41 -05:00
defaultHost := os . Getenv ( "DOCKER_HOST" )
if defaultHost == "" || * flDaemon {
// If we do not have a host, default to unix socket
2014-01-29 19:26:54 +00:00
defaultHost = fmt . Sprintf ( "unix://%s" , api . DEFAULTUNIXSOCKET )
2013-12-20 19:30:41 -05:00
}
2014-02-17 11:35:26 -08:00
if _ , err := api . ValidateHost ( defaultHost ) ; err != nil {
log . Fatal ( err )
}
2013-12-20 19:30:41 -05:00
flHosts . Set ( defaultHost )
2013-06-19 12:31:54 +00:00
}
2013-12-13 10:47:19 -05:00
if * bridgeName != "" && * bridgeIp != "" {
2013-12-23 11:43:54 -08:00
log . Fatal ( "You specified -b & --bip, mutually exclusive options. Please specify only one." )
2013-12-13 10:47:19 -05:00
}
2013-04-02 10:58:16 -07:00
if * flDebug {
os . Setenv ( "DEBUG" , "1" )
}
2014-02-27 13:47:59 +01:00
2013-03-28 20:12:23 -04:00
if * flDaemon {
2013-03-13 00:29:40 -07:00
if flag . NArg ( ) != 0 {
flag . Usage ( )
return
}
2013-12-18 11:15:09 -07:00
2014-02-24 23:10:06 +02:00
// set up the TempDir to use a canonical path
tmp := os . TempDir ( )
realTmp , err := utils . ReadSymlinkedDirectory ( tmp )
if err != nil {
log . Fatalf ( "Unable to get the full path to the TempDir (%s): %s" , tmp , err )
}
os . Setenv ( "TMPDIR" , realTmp )
// get the canonical path to the Docker root directory
root := * flRoot
var realRoot string
if _ , err := os . Stat ( root ) ; err != nil && os . IsNotExist ( err ) {
realRoot = root
} else {
realRoot , err = utils . ReadSymlinkedDirectory ( root )
if err != nil {
log . Fatalf ( "Unable to get the full path to root (%s): %s" , root , err )
}
}
eng , err := engine . New ( realRoot )
2013-10-21 10:04:42 -06:00
if err != nil {
log . Fatal ( err )
2013-10-04 19:25:15 -07:00
}
2014-02-19 15:27:57 -08:00
// Load builtins
builtins . Register ( eng )
2014-02-15 20:49:50 -08:00
// load the daemon in the background so we can immediately start
// the http api so that connections don't fail while the daemon
// is booting
go func ( ) {
// Load plugin: httpapi
job := eng . Job ( "initserver" )
job . Setenv ( "Pidfile" , * pidfile )
2014-02-24 23:10:06 +02:00
job . Setenv ( "Root" , realRoot )
2014-02-15 20:49:50 -08:00
job . SetenvBool ( "AutoRestart" , * flAutoRestart )
job . SetenvList ( "Dns" , flDns . GetAll ( ) )
2014-02-07 11:48:14 -05:00
job . SetenvList ( "DnsSearch" , flDnsSearch . GetAll ( ) )
2014-02-15 20:49:50 -08:00
job . SetenvBool ( "EnableIptables" , * flEnableIptables )
job . SetenvBool ( "EnableIpForward" , * flEnableIpForward )
job . Setenv ( "BridgeIface" , * bridgeName )
job . Setenv ( "BridgeIP" , * bridgeIp )
job . Setenv ( "DefaultIp" , * flDefaultIp )
job . SetenvBool ( "InterContainerCommunication" , * flInterContainerComm )
job . Setenv ( "GraphDriver" , * flGraphDriver )
2014-02-17 16:54:36 -05:00
job . Setenv ( "ExecDriver" , * flExecDriver )
2014-02-15 20:49:50 -08:00
job . SetenvInt ( "Mtu" , * flMtu )
if err := job . Run ( ) ; err != nil {
log . Fatal ( err )
}
// after the daemon is done setting up we can tell the api to start
// accepting connections
if err := eng . Job ( "acceptconnections" ) . Run ( ) ; err != nil {
log . Fatal ( err )
}
} ( )
2014-04-03 10:54:54 -04:00
// TODO actually have a resolved graphdriver to show?
log . Printf ( "docker daemon: %s %s; execdriver: %s; graphdriver: %s" ,
dockerversion . VERSION ,
dockerversion . GITCOMMIT ,
* flExecDriver ,
* flGraphDriver )
2013-10-26 17:19:35 -07:00
// Serve api
2014-02-15 20:49:50 -08:00
job := eng . Job ( "serveapi" , flHosts . GetAll ( ) ... )
2013-11-05 19:57:40 +00:00
job . SetenvBool ( "Logging" , true )
2014-01-29 00:20:51 +00:00
job . SetenvBool ( "EnableCors" , * flEnableCors )
2014-02-11 16:05:45 -08:00
job . Setenv ( "Version" , dockerversion . VERSION )
2014-01-24 16:18:02 -08:00
job . Setenv ( "SocketGroup" , * flSocketGroup )
2014-02-27 13:47:59 +01:00
job . SetenvBool ( "Tls" , * flTls )
job . SetenvBool ( "TlsVerify" , * flTlsVerify )
job . Setenv ( "TlsCa" , * flCa )
job . Setenv ( "TlsCert" , * flCert )
job . Setenv ( "TlsKey" , * flKey )
2013-10-27 07:06:43 +00:00
if err := job . Run ( ) ; err != nil {
2013-10-26 17:19:35 -07:00
log . Fatal ( err )
}
2013-03-13 00:29:40 -07:00
} else {
2013-11-26 17:46:06 +00:00
if flHosts . Len ( ) > 1 {
2013-06-19 12:31:54 +00:00
log . Fatal ( "Please specify only one -H" )
}
2013-11-26 17:46:06 +00:00
protoAddrParts := strings . SplitN ( flHosts . GetAll ( ) [ 0 ] , "://" , 2 )
2014-02-27 13:47:59 +01:00
var (
2014-03-28 22:59:29 +00:00
cli * client . DockerCli
2014-02-27 13:47:59 +01:00
tlsConfig tls . Config
)
tlsConfig . InsecureSkipVerify = true
// If we should verify the server, we need to load a trusted ca
if * flTlsVerify {
* flTls = true
certPool := x509 . NewCertPool ( )
file , err := ioutil . ReadFile ( * flCa )
if err != nil {
log . Fatalf ( "Couldn't read ca cert %s: %s" , * flCa , err )
}
certPool . AppendCertsFromPEM ( file )
tlsConfig . RootCAs = certPool
tlsConfig . InsecureSkipVerify = false
}
// If tls is enabled, try to load and send client certificates
if * flTls || * flTlsVerify {
_ , errCert := os . Stat ( * flCert )
_ , errKey := os . Stat ( * flKey )
if errCert == nil && errKey == nil {
* flTls = true
cert , err := tls . LoadX509KeyPair ( * flCert , * flKey )
if err != nil {
log . Fatalf ( "Couldn't load X509 key pair: %s. Key encrypted?" , err )
}
tlsConfig . Certificates = [ ] tls . Certificate { cert }
}
}
if * flTls || * flTlsVerify {
2014-03-28 22:59:29 +00:00
cli = client . NewDockerCli ( os . Stdin , os . Stdout , os . Stderr , protoAddrParts [ 0 ] , protoAddrParts [ 1 ] , & tlsConfig )
2014-02-27 13:47:59 +01:00
} else {
2014-03-28 22:59:29 +00:00
cli = client . NewDockerCli ( os . Stdin , os . Stdout , os . Stderr , protoAddrParts [ 0 ] , protoAddrParts [ 1 ] , nil )
2014-02-27 13:47:59 +01:00
}
2014-03-19 22:03:11 +00:00
2014-03-14 00:47:13 +00:00
if err := cli . ParseCommands ( flag . Args ( ) ... ) ; err != nil {
2013-09-09 21:26:35 +00:00
if sterr , ok := err . ( * utils . StatusError ) ; ok {
2013-10-12 14:14:52 +02:00
if sterr . Status != "" {
log . Println ( sterr . Status )
}
os . Exit ( sterr . StatusCode )
2013-09-09 21:26:35 +00:00
}
2013-03-13 00:29:40 -07:00
log . Fatal ( err )
}
}
}
2013-08-06 20:51:12 -07:00
func showVersion ( ) {
2014-02-11 16:05:45 -08:00
fmt . Printf ( "Docker version %s, build %s\n" , dockerversion . VERSION , dockerversion . GITCOMMIT )
2013-08-06 20:51:12 -07:00
}