ceph-csi/vendor/k8s.io/apimachinery/pkg/util/proxy/dial.go

118 lines
3.3 KiB
Go
Raw Normal View History

2018-01-09 18:57:14 +00:00
/*
Copyright 2015 The Kubernetes Authors.
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package proxy
import (
2018-11-26 18:23:56 +00:00
"context"
2018-01-09 18:57:14 +00:00
"crypto/tls"
"fmt"
"net"
"net/http"
"net/url"
2018-11-26 18:23:56 +00:00
"k8s.io/klog"
2018-01-09 18:57:14 +00:00
utilnet "k8s.io/apimachinery/pkg/util/net"
"k8s.io/apimachinery/third_party/forked/golang/netutil"
)
2018-11-26 18:23:56 +00:00
func DialURL(ctx context.Context, url *url.URL, transport http.RoundTripper) (net.Conn, error) {
2018-01-09 18:57:14 +00:00
dialAddr := netutil.CanonicalAddr(url)
dialer, err := utilnet.DialerFor(transport)
if err != nil {
2018-11-26 18:23:56 +00:00
klog.V(5).Infof("Unable to unwrap transport %T to get dialer: %v", transport, err)
2018-01-09 18:57:14 +00:00
}
switch url.Scheme {
case "http":
if dialer != nil {
2018-11-26 18:23:56 +00:00
return dialer(ctx, "tcp", dialAddr)
2018-01-09 18:57:14 +00:00
}
2018-11-26 18:23:56 +00:00
var d net.Dialer
return d.DialContext(ctx, "tcp", dialAddr)
2018-01-09 18:57:14 +00:00
case "https":
// Get the tls config from the transport if we recognize it
var tlsConfig *tls.Config
var tlsConn *tls.Conn
var err error
tlsConfig, err = utilnet.TLSClientConfig(transport)
if err != nil {
2018-11-26 18:23:56 +00:00
klog.V(5).Infof("Unable to unwrap transport %T to get at TLS config: %v", transport, err)
2018-01-09 18:57:14 +00:00
}
if dialer != nil {
// We have a dialer; use it to open the connection, then
// create a tls client using the connection.
2018-11-26 18:23:56 +00:00
netConn, err := dialer(ctx, "tcp", dialAddr)
2018-01-09 18:57:14 +00:00
if err != nil {
return nil, err
}
if tlsConfig == nil {
// tls.Client requires non-nil config
2018-11-26 18:23:56 +00:00
klog.Warningf("using custom dialer with no TLSClientConfig. Defaulting to InsecureSkipVerify")
2018-01-09 18:57:14 +00:00
// tls.Handshake() requires ServerName or InsecureSkipVerify
tlsConfig = &tls.Config{
InsecureSkipVerify: true,
}
} else if len(tlsConfig.ServerName) == 0 && !tlsConfig.InsecureSkipVerify {
// tls.Handshake() requires ServerName or InsecureSkipVerify
// infer the ServerName from the hostname we're connecting to.
inferredHost := dialAddr
if host, _, err := net.SplitHostPort(dialAddr); err == nil {
inferredHost = host
}
// Make a copy to avoid polluting the provided config
tlsConfigCopy := tlsConfig.Clone()
tlsConfigCopy.ServerName = inferredHost
tlsConfig = tlsConfigCopy
}
tlsConn = tls.Client(netConn, tlsConfig)
if err := tlsConn.Handshake(); err != nil {
netConn.Close()
return nil, err
}
} else {
2018-11-26 18:23:56 +00:00
// Dial. This Dial method does not allow to pass a context unfortunately
2018-01-09 18:57:14 +00:00
tlsConn, err = tls.Dial("tcp", dialAddr, tlsConfig)
if err != nil {
return nil, err
}
}
// Return if we were configured to skip validation
if tlsConfig != nil && tlsConfig.InsecureSkipVerify {
return tlsConn, nil
}
// Verify
host, _, _ := net.SplitHostPort(dialAddr)
if tlsConfig != nil && len(tlsConfig.ServerName) > 0 {
host = tlsConfig.ServerName
}
if err := tlsConn.VerifyHostname(host); err != nil {
tlsConn.Close()
return nil, err
}
return tlsConn, nil
default:
return nil, fmt.Errorf("Unknown scheme: %s", url.Scheme)
}
}