github.com/adityamillind98/moby@v23.0.0-rc.4+incompatible/client/request.go (about) 1 package client // import "github.com/docker/docker/client" 2 3 import ( 4 "bytes" 5 "context" 6 "encoding/json" 7 "fmt" 8 "io" 9 "net" 10 "net/http" 11 "net/url" 12 "os" 13 "strings" 14 15 "github.com/docker/docker/api/types" 16 "github.com/docker/docker/api/types/versions" 17 "github.com/docker/docker/errdefs" 18 "github.com/pkg/errors" 19 ) 20 21 // serverResponse is a wrapper for http API responses. 22 type serverResponse struct { 23 body io.ReadCloser 24 header http.Header 25 statusCode int 26 reqURL *url.URL 27 } 28 29 // head sends an http request to the docker API using the method HEAD. 30 func (cli *Client) head(ctx context.Context, path string, query url.Values, headers map[string][]string) (serverResponse, error) { 31 return cli.sendRequest(ctx, http.MethodHead, path, query, nil, headers) 32 } 33 34 // get sends an http request to the docker API using the method GET with a specific Go context. 35 func (cli *Client) get(ctx context.Context, path string, query url.Values, headers map[string][]string) (serverResponse, error) { 36 return cli.sendRequest(ctx, http.MethodGet, path, query, nil, headers) 37 } 38 39 // post sends an http request to the docker API using the method POST with a specific Go context. 40 func (cli *Client) post(ctx context.Context, path string, query url.Values, obj interface{}, headers map[string][]string) (serverResponse, error) { 41 body, headers, err := encodeBody(obj, headers) 42 if err != nil { 43 return serverResponse{}, err 44 } 45 return cli.sendRequest(ctx, http.MethodPost, path, query, body, headers) 46 } 47 48 func (cli *Client) postRaw(ctx context.Context, path string, query url.Values, body io.Reader, headers map[string][]string) (serverResponse, error) { 49 return cli.sendRequest(ctx, http.MethodPost, path, query, body, headers) 50 } 51 52 func (cli *Client) put(ctx context.Context, path string, query url.Values, obj interface{}, headers map[string][]string) (serverResponse, error) { 53 body, headers, err := encodeBody(obj, headers) 54 if err != nil { 55 return serverResponse{}, err 56 } 57 return cli.sendRequest(ctx, http.MethodPut, path, query, body, headers) 58 } 59 60 // putRaw sends an http request to the docker API using the method PUT. 61 func (cli *Client) putRaw(ctx context.Context, path string, query url.Values, body io.Reader, headers map[string][]string) (serverResponse, error) { 62 return cli.sendRequest(ctx, http.MethodPut, path, query, body, headers) 63 } 64 65 // delete sends an http request to the docker API using the method DELETE. 66 func (cli *Client) delete(ctx context.Context, path string, query url.Values, headers map[string][]string) (serverResponse, error) { 67 return cli.sendRequest(ctx, http.MethodDelete, path, query, nil, headers) 68 } 69 70 type headers map[string][]string 71 72 func encodeBody(obj interface{}, headers headers) (io.Reader, headers, error) { 73 if obj == nil { 74 return nil, headers, nil 75 } 76 77 body, err := encodeData(obj) 78 if err != nil { 79 return nil, headers, err 80 } 81 if headers == nil { 82 headers = make(map[string][]string) 83 } 84 headers["Content-Type"] = []string{"application/json"} 85 return body, headers, nil 86 } 87 88 func (cli *Client) buildRequest(method, path string, body io.Reader, headers headers) (*http.Request, error) { 89 expectedPayload := (method == http.MethodPost || method == http.MethodPut) 90 if expectedPayload && body == nil { 91 body = bytes.NewReader([]byte{}) 92 } 93 94 req, err := http.NewRequest(method, path, body) 95 if err != nil { 96 return nil, err 97 } 98 req = cli.addHeaders(req, headers) 99 100 if cli.proto == "unix" || cli.proto == "npipe" { 101 // For local communications, it doesn't matter what the host is. We just 102 // need a valid and meaningful host name. (See #189) 103 req.Host = "docker" 104 } 105 106 req.URL.Host = cli.addr 107 req.URL.Scheme = cli.scheme 108 109 if expectedPayload && req.Header.Get("Content-Type") == "" { 110 req.Header.Set("Content-Type", "text/plain") 111 } 112 return req, nil 113 } 114 115 func (cli *Client) sendRequest(ctx context.Context, method, path string, query url.Values, body io.Reader, headers headers) (serverResponse, error) { 116 req, err := cli.buildRequest(method, cli.getAPIPath(ctx, path, query), body, headers) 117 if err != nil { 118 return serverResponse{}, err 119 } 120 121 resp, err := cli.doRequest(ctx, req) 122 switch { 123 case errors.Is(err, context.Canceled): 124 return serverResponse{}, errdefs.Cancelled(err) 125 case errors.Is(err, context.DeadlineExceeded): 126 return serverResponse{}, errdefs.Deadline(err) 127 case err == nil: 128 err = cli.checkResponseErr(resp) 129 } 130 return resp, errdefs.FromStatusCode(err, resp.statusCode) 131 } 132 133 func (cli *Client) doRequest(ctx context.Context, req *http.Request) (serverResponse, error) { 134 serverResp := serverResponse{statusCode: -1, reqURL: req.URL} 135 136 req = req.WithContext(ctx) 137 resp, err := cli.client.Do(req) 138 if err != nil { 139 if cli.scheme != "https" && strings.Contains(err.Error(), "malformed HTTP response") { 140 return serverResp, fmt.Errorf("%v.\n* Are you trying to connect to a TLS-enabled daemon without TLS?", err) 141 } 142 143 if cli.scheme == "https" && strings.Contains(err.Error(), "bad certificate") { 144 return serverResp, errors.Wrap(err, "the server probably has client authentication (--tlsverify) enabled; check your TLS client certification settings") 145 } 146 147 // Don't decorate context sentinel errors; users may be comparing to 148 // them directly. 149 if errors.Is(err, context.Canceled) || errors.Is(err, context.DeadlineExceeded) { 150 return serverResp, err 151 } 152 153 if nErr, ok := err.(*url.Error); ok { 154 if nErr, ok := nErr.Err.(*net.OpError); ok { 155 if os.IsPermission(nErr.Err) { 156 return serverResp, errors.Wrapf(err, "permission denied while trying to connect to the Docker daemon socket at %v", cli.host) 157 } 158 } 159 } 160 161 if err, ok := err.(net.Error); ok { 162 if err.Timeout() { 163 return serverResp, ErrorConnectionFailed(cli.host) 164 } 165 if strings.Contains(err.Error(), "connection refused") || strings.Contains(err.Error(), "dial unix") { 166 return serverResp, ErrorConnectionFailed(cli.host) 167 } 168 } 169 170 // Although there's not a strongly typed error for this in go-winio, 171 // lots of people are using the default configuration for the docker 172 // daemon on Windows where the daemon is listening on a named pipe 173 // `//./pipe/docker_engine, and the client must be running elevated. 174 // Give users a clue rather than the not-overly useful message 175 // such as `error during connect: Get http://%2F%2F.%2Fpipe%2Fdocker_engine/v1.26/info: 176 // open //./pipe/docker_engine: The system cannot find the file specified.`. 177 // Note we can't string compare "The system cannot find the file specified" as 178 // this is localised - for example in French the error would be 179 // `open //./pipe/docker_engine: Le fichier spécifié est introuvable.` 180 if strings.Contains(err.Error(), `open //./pipe/docker_engine`) { 181 // Checks if client is running with elevated privileges 182 if f, elevatedErr := os.Open("\\\\.\\PHYSICALDRIVE0"); elevatedErr == nil { 183 err = errors.Wrap(err, "in the default daemon configuration on Windows, the docker client must be run with elevated privileges to connect") 184 } else { 185 f.Close() 186 err = errors.Wrap(err, "this error may indicate that the docker daemon is not running") 187 } 188 } 189 190 return serverResp, errors.Wrap(err, "error during connect") 191 } 192 193 if resp != nil { 194 serverResp.statusCode = resp.StatusCode 195 serverResp.body = resp.Body 196 serverResp.header = resp.Header 197 } 198 return serverResp, nil 199 } 200 201 func (cli *Client) checkResponseErr(serverResp serverResponse) error { 202 if serverResp.statusCode >= 200 && serverResp.statusCode < 400 { 203 return nil 204 } 205 206 var body []byte 207 var err error 208 if serverResp.body != nil { 209 bodyMax := 1 * 1024 * 1024 // 1 MiB 210 bodyR := &io.LimitedReader{ 211 R: serverResp.body, 212 N: int64(bodyMax), 213 } 214 body, err = io.ReadAll(bodyR) 215 if err != nil { 216 return err 217 } 218 if bodyR.N == 0 { 219 return fmt.Errorf("request returned %s with a message (> %d bytes) for API route and version %s, check if the server supports the requested API version", http.StatusText(serverResp.statusCode), bodyMax, serverResp.reqURL) 220 } 221 } 222 if len(body) == 0 { 223 return fmt.Errorf("request returned %s for API route and version %s, check if the server supports the requested API version", http.StatusText(serverResp.statusCode), serverResp.reqURL) 224 } 225 226 var ct string 227 if serverResp.header != nil { 228 ct = serverResp.header.Get("Content-Type") 229 } 230 231 var errorMessage string 232 if (cli.version == "" || versions.GreaterThan(cli.version, "1.23")) && ct == "application/json" { 233 var errorResponse types.ErrorResponse 234 if err := json.Unmarshal(body, &errorResponse); err != nil { 235 return errors.Wrap(err, "Error reading JSON") 236 } 237 errorMessage = strings.TrimSpace(errorResponse.Message) 238 } else { 239 errorMessage = strings.TrimSpace(string(body)) 240 } 241 242 return errors.Wrap(errors.New(errorMessage), "Error response from daemon") 243 } 244 245 func (cli *Client) addHeaders(req *http.Request, headers headers) *http.Request { 246 // Add CLI Config's HTTP Headers BEFORE we set the Docker headers 247 // then the user can't change OUR headers 248 for k, v := range cli.customHTTPHeaders { 249 if versions.LessThan(cli.version, "1.25") && http.CanonicalHeaderKey(k) == "User-Agent" { 250 continue 251 } 252 req.Header.Set(k, v) 253 } 254 255 for k, v := range headers { 256 req.Header[http.CanonicalHeaderKey(k)] = v 257 } 258 return req 259 } 260 261 func encodeData(data interface{}) (*bytes.Buffer, error) { 262 params := bytes.NewBuffer(nil) 263 if data != nil { 264 if err := json.NewEncoder(params).Encode(data); err != nil { 265 return nil, err 266 } 267 } 268 return params, nil 269 } 270 271 func ensureReaderClosed(response serverResponse) { 272 if response.body != nil { 273 // Drain up to 512 bytes and close the body to let the Transport reuse the connection 274 io.CopyN(io.Discard, response.body, 512) 275 response.body.Close() 276 } 277 }