github.com/kaisenlinux/docker.io@v0.0.0-20230510090727-ea55db55fac7/engine/client/request.go (about)

     1  package client // import "github.com/docker/docker/client"
     2  
     3  import (
     4  	"bytes"
     5  	"context"
     6  	"encoding/json"
     7  	"fmt"
     8  	"io"
     9  	"net"
    10  	"net/http"
    11  	"net/url"
    12  	"os"
    13  	"strings"
    14  
    15  	"github.com/docker/docker/api/types"
    16  	"github.com/docker/docker/api/types/versions"
    17  	"github.com/docker/docker/errdefs"
    18  	"github.com/pkg/errors"
    19  )
    20  
    21  // serverResponse is a wrapper for http API responses.
    22  type serverResponse struct {
    23  	body       io.ReadCloser
    24  	header     http.Header
    25  	statusCode int
    26  	reqURL     *url.URL
    27  }
    28  
    29  // head sends an http request to the docker API using the method HEAD.
    30  func (cli *Client) head(ctx context.Context, path string, query url.Values, headers map[string][]string) (serverResponse, error) {
    31  	return cli.sendRequest(ctx, http.MethodHead, path, query, nil, headers)
    32  }
    33  
    34  // get sends an http request to the docker API using the method GET with a specific Go context.
    35  func (cli *Client) get(ctx context.Context, path string, query url.Values, headers map[string][]string) (serverResponse, error) {
    36  	return cli.sendRequest(ctx, http.MethodGet, path, query, nil, headers)
    37  }
    38  
    39  // post sends an http request to the docker API using the method POST with a specific Go context.
    40  func (cli *Client) post(ctx context.Context, path string, query url.Values, obj interface{}, headers map[string][]string) (serverResponse, error) {
    41  	body, headers, err := encodeBody(obj, headers)
    42  	if err != nil {
    43  		return serverResponse{}, err
    44  	}
    45  	return cli.sendRequest(ctx, http.MethodPost, path, query, body, headers)
    46  }
    47  
    48  func (cli *Client) postRaw(ctx context.Context, path string, query url.Values, body io.Reader, headers map[string][]string) (serverResponse, error) {
    49  	return cli.sendRequest(ctx, http.MethodPost, path, query, body, headers)
    50  }
    51  
    52  // putRaw sends an http request to the docker API using the method PUT.
    53  func (cli *Client) putRaw(ctx context.Context, path string, query url.Values, body io.Reader, headers map[string][]string) (serverResponse, error) {
    54  	return cli.sendRequest(ctx, http.MethodPut, path, query, body, headers)
    55  }
    56  
    57  // delete sends an http request to the docker API using the method DELETE.
    58  func (cli *Client) delete(ctx context.Context, path string, query url.Values, headers map[string][]string) (serverResponse, error) {
    59  	return cli.sendRequest(ctx, http.MethodDelete, path, query, nil, headers)
    60  }
    61  
    62  type headers map[string][]string
    63  
    64  func encodeBody(obj interface{}, headers headers) (io.Reader, headers, error) {
    65  	if obj == nil {
    66  		return nil, headers, nil
    67  	}
    68  
    69  	body, err := encodeData(obj)
    70  	if err != nil {
    71  		return nil, headers, err
    72  	}
    73  	if headers == nil {
    74  		headers = make(map[string][]string)
    75  	}
    76  	headers["Content-Type"] = []string{"application/json"}
    77  	return body, headers, nil
    78  }
    79  
    80  func (cli *Client) buildRequest(method, path string, body io.Reader, headers headers) (*http.Request, error) {
    81  	expectedPayload := (method == http.MethodPost || method == http.MethodPut)
    82  	if expectedPayload && body == nil {
    83  		body = bytes.NewReader([]byte{})
    84  	}
    85  
    86  	req, err := http.NewRequest(method, path, body)
    87  	if err != nil {
    88  		return nil, err
    89  	}
    90  	req = cli.addHeaders(req, headers)
    91  
    92  	if cli.proto == "unix" || cli.proto == "npipe" {
    93  		// For local communications, it doesn't matter what the host is. We just
    94  		// need a valid and meaningful host name. (See #189)
    95  		req.Host = "docker"
    96  	}
    97  
    98  	req.URL.Host = cli.addr
    99  	req.URL.Scheme = cli.scheme
   100  
   101  	if expectedPayload && req.Header.Get("Content-Type") == "" {
   102  		req.Header.Set("Content-Type", "text/plain")
   103  	}
   104  	return req, nil
   105  }
   106  
   107  func (cli *Client) sendRequest(ctx context.Context, method, path string, query url.Values, body io.Reader, headers headers) (serverResponse, error) {
   108  	req, err := cli.buildRequest(method, cli.getAPIPath(ctx, path, query), body, headers)
   109  	if err != nil {
   110  		return serverResponse{}, err
   111  	}
   112  	resp, err := cli.doRequest(ctx, req)
   113  	if err != nil {
   114  		return resp, errdefs.FromStatusCode(err, resp.statusCode)
   115  	}
   116  	err = cli.checkResponseErr(resp)
   117  	return resp, errdefs.FromStatusCode(err, resp.statusCode)
   118  }
   119  
   120  func (cli *Client) doRequest(ctx context.Context, req *http.Request) (serverResponse, error) {
   121  	serverResp := serverResponse{statusCode: -1, reqURL: req.URL}
   122  
   123  	req = req.WithContext(ctx)
   124  	resp, err := cli.client.Do(req)
   125  	if err != nil {
   126  		if cli.scheme != "https" && strings.Contains(err.Error(), "malformed HTTP response") {
   127  			return serverResp, fmt.Errorf("%v.\n* Are you trying to connect to a TLS-enabled daemon without TLS?", err)
   128  		}
   129  
   130  		if cli.scheme == "https" && strings.Contains(err.Error(), "bad certificate") {
   131  			return serverResp, errors.Wrap(err, "the server probably has client authentication (--tlsverify) enabled; check your TLS client certification settings")
   132  		}
   133  
   134  		// Don't decorate context sentinel errors; users may be comparing to
   135  		// them directly.
   136  		if errors.Is(err, context.Canceled) || errors.Is(err, context.DeadlineExceeded) {
   137  			return serverResp, err
   138  		}
   139  
   140  		if nErr, ok := err.(*url.Error); ok {
   141  			if nErr, ok := nErr.Err.(*net.OpError); ok {
   142  				if os.IsPermission(nErr.Err) {
   143  					return serverResp, errors.Wrapf(err, "permission denied while trying to connect to the Docker daemon socket at %v", cli.host)
   144  				}
   145  			}
   146  		}
   147  
   148  		if err, ok := err.(net.Error); ok {
   149  			if err.Timeout() {
   150  				return serverResp, ErrorConnectionFailed(cli.host)
   151  			}
   152  			if strings.Contains(err.Error(), "connection refused") || strings.Contains(err.Error(), "dial unix") {
   153  				return serverResp, ErrorConnectionFailed(cli.host)
   154  			}
   155  		}
   156  
   157  		// Although there's not a strongly typed error for this in go-winio,
   158  		// lots of people are using the default configuration for the docker
   159  		// daemon on Windows where the daemon is listening on a named pipe
   160  		// `//./pipe/docker_engine, and the client must be running elevated.
   161  		// Give users a clue rather than the not-overly useful message
   162  		// such as `error during connect: Get http://%2F%2F.%2Fpipe%2Fdocker_engine/v1.26/info:
   163  		// open //./pipe/docker_engine: The system cannot find the file specified.`.
   164  		// Note we can't string compare "The system cannot find the file specified" as
   165  		// this is localised - for example in French the error would be
   166  		// `open //./pipe/docker_engine: Le fichier spécifié est introuvable.`
   167  		if strings.Contains(err.Error(), `open //./pipe/docker_engine`) {
   168  			// Checks if client is running with elevated privileges
   169  			if f, elevatedErr := os.Open("\\\\.\\PHYSICALDRIVE0"); elevatedErr == nil {
   170  				err = errors.Wrap(err, "in the default daemon configuration on Windows, the docker client must be run with elevated privileges to connect")
   171  			} else {
   172  				f.Close()
   173  				err = errors.Wrap(err, "this error may indicate that the docker daemon is not running")
   174  			}
   175  		}
   176  
   177  		return serverResp, errors.Wrap(err, "error during connect")
   178  	}
   179  
   180  	if resp != nil {
   181  		serverResp.statusCode = resp.StatusCode
   182  		serverResp.body = resp.Body
   183  		serverResp.header = resp.Header
   184  	}
   185  	return serverResp, nil
   186  }
   187  
   188  func (cli *Client) checkResponseErr(serverResp serverResponse) error {
   189  	if serverResp.statusCode >= 200 && serverResp.statusCode < 400 {
   190  		return nil
   191  	}
   192  
   193  	var body []byte
   194  	var err error
   195  	if serverResp.body != nil {
   196  		bodyMax := 1 * 1024 * 1024 // 1 MiB
   197  		bodyR := &io.LimitedReader{
   198  			R: serverResp.body,
   199  			N: int64(bodyMax),
   200  		}
   201  		body, err = io.ReadAll(bodyR)
   202  		if err != nil {
   203  			return err
   204  		}
   205  		if bodyR.N == 0 {
   206  			return fmt.Errorf("request returned %s with a message (> %d bytes) for API route and version %s, check if the server supports the requested API version", http.StatusText(serverResp.statusCode), bodyMax, serverResp.reqURL)
   207  		}
   208  	}
   209  	if len(body) == 0 {
   210  		return fmt.Errorf("request returned %s for API route and version %s, check if the server supports the requested API version", http.StatusText(serverResp.statusCode), serverResp.reqURL)
   211  	}
   212  
   213  	var ct string
   214  	if serverResp.header != nil {
   215  		ct = serverResp.header.Get("Content-Type")
   216  	}
   217  
   218  	var errorMessage string
   219  	if (cli.version == "" || versions.GreaterThan(cli.version, "1.23")) && ct == "application/json" {
   220  		var errorResponse types.ErrorResponse
   221  		if err := json.Unmarshal(body, &errorResponse); err != nil {
   222  			return errors.Wrap(err, "Error reading JSON")
   223  		}
   224  		errorMessage = strings.TrimSpace(errorResponse.Message)
   225  	} else {
   226  		errorMessage = strings.TrimSpace(string(body))
   227  	}
   228  
   229  	return errors.Wrap(errors.New(errorMessage), "Error response from daemon")
   230  }
   231  
   232  func (cli *Client) addHeaders(req *http.Request, headers headers) *http.Request {
   233  	// Add CLI Config's HTTP Headers BEFORE we set the Docker headers
   234  	// then the user can't change OUR headers
   235  	for k, v := range cli.customHTTPHeaders {
   236  		if versions.LessThan(cli.version, "1.25") && k == "User-Agent" {
   237  			continue
   238  		}
   239  		req.Header.Set(k, v)
   240  	}
   241  
   242  	for k, v := range headers {
   243  		req.Header[k] = v
   244  	}
   245  	return req
   246  }
   247  
   248  func encodeData(data interface{}) (*bytes.Buffer, error) {
   249  	params := bytes.NewBuffer(nil)
   250  	if data != nil {
   251  		if err := json.NewEncoder(params).Encode(data); err != nil {
   252  			return nil, err
   253  		}
   254  	}
   255  	return params, nil
   256  }
   257  
   258  func ensureReaderClosed(response serverResponse) {
   259  	if response.body != nil {
   260  		// Drain up to 512 bytes and close the body to let the Transport reuse the connection
   261  		io.CopyN(io.Discard, response.body, 512)
   262  		response.body.Close()
   263  	}
   264  }