docker_client.py 3.3 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104
  1. from __future__ import absolute_import
  2. from __future__ import unicode_literals
  3. import logging
  4. import os.path
  5. import ssl
  6. from docker import APIClient
  7. from docker.errors import TLSParameterError
  8. from docker.tls import TLSConfig
  9. from docker.utils import kwargs_from_env
  10. from ..const import HTTP_TIMEOUT
  11. from .errors import UserError
  12. from .utils import generate_user_agent
  13. from .utils import unquote_path
  14. log = logging.getLogger(__name__)
  15. def get_tls_version(environment):
  16. compose_tls_version = environment.get('COMPOSE_TLS_VERSION', None)
  17. if not compose_tls_version:
  18. return None
  19. tls_attr_name = "PROTOCOL_{}".format(compose_tls_version)
  20. if not hasattr(ssl, tls_attr_name):
  21. log.warn(
  22. 'The "{}" protocol is unavailable. You may need to update your '
  23. 'version of Python or OpenSSL. Falling back to TLSv1 (default).'
  24. .format(compose_tls_version)
  25. )
  26. return None
  27. return getattr(ssl, tls_attr_name)
  28. def tls_config_from_options(options, environment=None):
  29. environment = environment or {}
  30. cert_path = environment.get('DOCKER_CERT_PATH') or None
  31. tls = options.get('--tls', False)
  32. ca_cert = unquote_path(options.get('--tlscacert'))
  33. cert = unquote_path(options.get('--tlscert'))
  34. key = unquote_path(options.get('--tlskey'))
  35. verify = options.get('--tlsverify', environment.get('DOCKER_TLS_VERIFY'))
  36. skip_hostname_check = options.get('--skip-hostname-check', False)
  37. if cert_path is not None and not any((ca_cert, cert, key)):
  38. # FIXME: Modify TLSConfig to take a cert_path argument and do this internally
  39. cert = os.path.join(cert_path, 'cert.pem')
  40. key = os.path.join(cert_path, 'key.pem')
  41. ca_cert = os.path.join(cert_path, 'ca.pem')
  42. tls_version = get_tls_version(environment)
  43. advanced_opts = any([ca_cert, cert, key, verify, tls_version])
  44. if tls is True and not advanced_opts:
  45. return True
  46. elif advanced_opts: # --tls is a noop
  47. client_cert = None
  48. if cert or key:
  49. client_cert = (cert, key)
  50. return TLSConfig(
  51. client_cert=client_cert, verify=verify, ca_cert=ca_cert,
  52. assert_hostname=False if skip_hostname_check else None,
  53. ssl_version=tls_version
  54. )
  55. return None
  56. def docker_client(environment, version=None, tls_config=None, host=None,
  57. tls_version=None):
  58. """
  59. Returns a docker-py client configured using environment variables
  60. according to the same logic as the official Docker client.
  61. """
  62. try:
  63. kwargs = kwargs_from_env(environment=environment, ssl_version=tls_version)
  64. except TLSParameterError:
  65. raise UserError(
  66. "TLS configuration is invalid - make sure your DOCKER_TLS_VERIFY "
  67. "and DOCKER_CERT_PATH are set correctly.\n"
  68. "You might need to run `eval \"$(docker-machine env default)\"`")
  69. if host:
  70. kwargs['base_url'] = host
  71. if tls_config:
  72. kwargs['tls'] = tls_config
  73. if version:
  74. kwargs['version'] = version
  75. timeout = environment.get('COMPOSE_HTTP_TIMEOUT')
  76. if timeout:
  77. kwargs['timeout'] = int(timeout)
  78. else:
  79. kwargs['timeout'] = HTTP_TIMEOUT
  80. kwargs['user_agent'] = generate_user_agent()
  81. return APIClient(**kwargs)