|
@@ -69,7 +69,8 @@ func ResolveRepositoryName(reposName string) (string, string, error) {
|
|
return "", "", ErrInvalidRepositoryName
|
|
return "", "", ErrInvalidRepositoryName
|
|
}
|
|
}
|
|
nameParts := strings.SplitN(reposName, "/", 2)
|
|
nameParts := strings.SplitN(reposName, "/", 2)
|
|
- if !strings.Contains(nameParts[0], ".") && !strings.Contains(nameParts[0], ":") {
|
|
|
|
|
|
+ if !strings.Contains(nameParts[0], ".") && !strings.Contains(nameParts[0], ":") &&
|
|
|
|
+ nameParts[0] != "localhost" {
|
|
// This is a Docker Index repos (ex: samalba/hipache or ubuntu)
|
|
// This is a Docker Index repos (ex: samalba/hipache or ubuntu)
|
|
err := validateRepositoryName(reposName)
|
|
err := validateRepositoryName(reposName)
|
|
return auth.IndexServerAddress(), reposName, err
|
|
return auth.IndexServerAddress(), reposName, err
|
|
@@ -100,13 +101,6 @@ func ResolveRepositoryName(reposName string) (string, string, error) {
|
|
return endpoint, reposName, err
|
|
return endpoint, reposName, err
|
|
}
|
|
}
|
|
|
|
|
|
-// VersionInfo is used to model entities which has a version.
|
|
|
|
-// It is basically a tupple with name and version.
|
|
|
|
-type VersionInfo interface {
|
|
|
|
- Name() string
|
|
|
|
- Version() string
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
func doWithCookies(c *http.Client, req *http.Request) (*http.Response, error) {
|
|
func doWithCookies(c *http.Client, req *http.Request) (*http.Response, error) {
|
|
for _, cookie := range c.Jar.Cookies(req.URL) {
|
|
for _, cookie := range c.Jar.Cookies(req.URL) {
|
|
req.AddCookie(cookie)
|
|
req.AddCookie(cookie)
|
|
@@ -121,33 +115,18 @@ func doWithCookies(c *http.Client, req *http.Request) (*http.Response, error) {
|
|
return res, err
|
|
return res, err
|
|
}
|
|
}
|
|
|
|
|
|
-// Set the user agent field in the header based on the versions provided
|
|
|
|
-// in NewRegistry() and extra.
|
|
|
|
-func (r *Registry) setUserAgent(req *http.Request, extra ...VersionInfo) {
|
|
|
|
- if len(r.baseVersions)+len(extra) == 0 {
|
|
|
|
- return
|
|
|
|
- }
|
|
|
|
- if len(extra) == 0 {
|
|
|
|
- req.Header.Set("User-Agent", r.baseVersionsStr)
|
|
|
|
- } else {
|
|
|
|
- req.Header.Set("User-Agent", appendVersions(r.baseVersionsStr, extra...))
|
|
|
|
- }
|
|
|
|
- return
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
// Retrieve the history of a given image from the Registry.
|
|
// Retrieve the history of a given image from the Registry.
|
|
// Return a list of the parent's json (requested image included)
|
|
// Return a list of the parent's json (requested image included)
|
|
func (r *Registry) GetRemoteHistory(imgID, registry string, token []string) ([]string, error) {
|
|
func (r *Registry) GetRemoteHistory(imgID, registry string, token []string) ([]string, error) {
|
|
- req, err := http.NewRequest("GET", registry+"images/"+imgID+"/ancestry", nil)
|
|
|
|
|
|
+ req, err := r.reqFactory.NewRequest("GET", registry+"images/"+imgID+"/ancestry", nil)
|
|
if err != nil {
|
|
if err != nil {
|
|
return nil, err
|
|
return nil, err
|
|
}
|
|
}
|
|
req.Header.Set("Authorization", "Token "+strings.Join(token, ", "))
|
|
req.Header.Set("Authorization", "Token "+strings.Join(token, ", "))
|
|
- r.setUserAgent(req)
|
|
|
|
res, err := doWithCookies(r.client, req)
|
|
res, err := doWithCookies(r.client, req)
|
|
if err != nil || res.StatusCode != 200 {
|
|
if err != nil || res.StatusCode != 200 {
|
|
if res != nil {
|
|
if res != nil {
|
|
- return nil, fmt.Errorf("Internal server error: %d trying to fetch remote history for %s", res.StatusCode, imgID)
|
|
|
|
|
|
+ return nil, utils.NewHTTPRequestError(fmt.Sprintf("Internal server error: %d trying to fetch remote history for %s", res.StatusCode, imgID), res)
|
|
}
|
|
}
|
|
return nil, err
|
|
return nil, err
|
|
}
|
|
}
|
|
@@ -170,7 +149,7 @@ func (r *Registry) GetRemoteHistory(imgID, registry string, token []string) ([]s
|
|
func (r *Registry) LookupRemoteImage(imgID, registry string, token []string) bool {
|
|
func (r *Registry) LookupRemoteImage(imgID, registry string, token []string) bool {
|
|
rt := &http.Transport{Proxy: http.ProxyFromEnvironment}
|
|
rt := &http.Transport{Proxy: http.ProxyFromEnvironment}
|
|
|
|
|
|
- req, err := http.NewRequest("GET", registry+"images/"+imgID+"/json", nil)
|
|
|
|
|
|
+ req, err := r.reqFactory.NewRequest("GET", registry+"images/"+imgID+"/json", nil)
|
|
if err != nil {
|
|
if err != nil {
|
|
return false
|
|
return false
|
|
}
|
|
}
|
|
@@ -185,19 +164,18 @@ func (r *Registry) LookupRemoteImage(imgID, registry string, token []string) boo
|
|
// Retrieve an image from the Registry.
|
|
// Retrieve an image from the Registry.
|
|
func (r *Registry) GetRemoteImageJSON(imgID, registry string, token []string) ([]byte, int, error) {
|
|
func (r *Registry) GetRemoteImageJSON(imgID, registry string, token []string) ([]byte, int, error) {
|
|
// Get the JSON
|
|
// Get the JSON
|
|
- req, err := http.NewRequest("GET", registry+"images/"+imgID+"/json", nil)
|
|
|
|
|
|
+ req, err := r.reqFactory.NewRequest("GET", registry+"images/"+imgID+"/json", nil)
|
|
if err != nil {
|
|
if err != nil {
|
|
return nil, -1, fmt.Errorf("Failed to download json: %s", err)
|
|
return nil, -1, fmt.Errorf("Failed to download json: %s", err)
|
|
}
|
|
}
|
|
req.Header.Set("Authorization", "Token "+strings.Join(token, ", "))
|
|
req.Header.Set("Authorization", "Token "+strings.Join(token, ", "))
|
|
- r.setUserAgent(req)
|
|
|
|
res, err := doWithCookies(r.client, req)
|
|
res, err := doWithCookies(r.client, req)
|
|
if err != nil {
|
|
if err != nil {
|
|
return nil, -1, fmt.Errorf("Failed to download json: %s", err)
|
|
return nil, -1, fmt.Errorf("Failed to download json: %s", err)
|
|
}
|
|
}
|
|
defer res.Body.Close()
|
|
defer res.Body.Close()
|
|
if res.StatusCode != 200 {
|
|
if res.StatusCode != 200 {
|
|
- return nil, -1, fmt.Errorf("HTTP code %d", res.StatusCode)
|
|
|
|
|
|
+ return nil, -1, utils.NewHTTPRequestError(fmt.Sprintf("HTTP code %d", res.StatusCode), res)
|
|
}
|
|
}
|
|
|
|
|
|
imageSize, err := strconv.Atoi(res.Header.Get("X-Docker-Size"))
|
|
imageSize, err := strconv.Atoi(res.Header.Get("X-Docker-Size"))
|
|
@@ -213,12 +191,11 @@ func (r *Registry) GetRemoteImageJSON(imgID, registry string, token []string) ([
|
|
}
|
|
}
|
|
|
|
|
|
func (r *Registry) GetRemoteImageLayer(imgID, registry string, token []string) (io.ReadCloser, error) {
|
|
func (r *Registry) GetRemoteImageLayer(imgID, registry string, token []string) (io.ReadCloser, error) {
|
|
- req, err := http.NewRequest("GET", registry+"images/"+imgID+"/layer", nil)
|
|
|
|
|
|
+ req, err := r.reqFactory.NewRequest("GET", registry+"images/"+imgID+"/layer", nil)
|
|
if err != nil {
|
|
if err != nil {
|
|
return nil, fmt.Errorf("Error while getting from the server: %s\n", err)
|
|
return nil, fmt.Errorf("Error while getting from the server: %s\n", err)
|
|
}
|
|
}
|
|
req.Header.Set("Authorization", "Token "+strings.Join(token, ", "))
|
|
req.Header.Set("Authorization", "Token "+strings.Join(token, ", "))
|
|
- r.setUserAgent(req)
|
|
|
|
res, err := doWithCookies(r.client, req)
|
|
res, err := doWithCookies(r.client, req)
|
|
if err != nil {
|
|
if err != nil {
|
|
return nil, err
|
|
return nil, err
|
|
@@ -239,7 +216,6 @@ func (r *Registry) GetRemoteTags(registries []string, repository string, token [
|
|
return nil, err
|
|
return nil, err
|
|
}
|
|
}
|
|
req.Header.Set("Authorization", "Token "+strings.Join(token, ", "))
|
|
req.Header.Set("Authorization", "Token "+strings.Join(token, ", "))
|
|
- r.setUserAgent(req)
|
|
|
|
res, err := doWithCookies(r.client, req)
|
|
res, err := doWithCookies(r.client, req)
|
|
if err != nil {
|
|
if err != nil {
|
|
return nil, err
|
|
return nil, err
|
|
@@ -281,7 +257,6 @@ func (r *Registry) GetRepositoryData(indexEp, remote string) (*RepositoryData, e
|
|
req.SetBasicAuth(r.authConfig.Username, r.authConfig.Password)
|
|
req.SetBasicAuth(r.authConfig.Username, r.authConfig.Password)
|
|
}
|
|
}
|
|
req.Header.Set("X-Docker-Token", "true")
|
|
req.Header.Set("X-Docker-Token", "true")
|
|
- r.setUserAgent(req)
|
|
|
|
|
|
|
|
res, err := r.client.Do(req)
|
|
res, err := r.client.Do(req)
|
|
if err != nil {
|
|
if err != nil {
|
|
@@ -289,12 +264,12 @@ func (r *Registry) GetRepositoryData(indexEp, remote string) (*RepositoryData, e
|
|
}
|
|
}
|
|
defer res.Body.Close()
|
|
defer res.Body.Close()
|
|
if res.StatusCode == 401 {
|
|
if res.StatusCode == 401 {
|
|
- return nil, fmt.Errorf("Please login first (HTTP code %d)", res.StatusCode)
|
|
|
|
|
|
+ return nil, utils.NewHTTPRequestError(fmt.Sprintf("Please login first (HTTP code %d)", res.StatusCode), res)
|
|
}
|
|
}
|
|
// TODO: Right now we're ignoring checksums in the response body.
|
|
// TODO: Right now we're ignoring checksums in the response body.
|
|
// In the future, we need to use them to check image validity.
|
|
// In the future, we need to use them to check image validity.
|
|
if res.StatusCode != 200 {
|
|
if res.StatusCode != 200 {
|
|
- return nil, fmt.Errorf("HTTP code: %d", res.StatusCode)
|
|
|
|
|
|
+ return nil, utils.NewHTTPRequestError(fmt.Sprintf("HTTP code: %d", res.StatusCode), res)
|
|
}
|
|
}
|
|
|
|
|
|
var tokens []string
|
|
var tokens []string
|
|
@@ -339,7 +314,7 @@ func (r *Registry) PushImageChecksumRegistry(imgData *ImgData, registry string,
|
|
|
|
|
|
utils.Debugf("[registry] Calling PUT %s", registry+"images/"+imgData.ID+"/checksum")
|
|
utils.Debugf("[registry] Calling PUT %s", registry+"images/"+imgData.ID+"/checksum")
|
|
|
|
|
|
- req, err := http.NewRequest("PUT", registry+"images/"+imgData.ID+"/checksum", nil)
|
|
|
|
|
|
+ req, err := r.reqFactory.NewRequest("PUT", registry+"images/"+imgData.ID+"/checksum", nil)
|
|
if err != nil {
|
|
if err != nil {
|
|
return err
|
|
return err
|
|
}
|
|
}
|
|
@@ -375,13 +350,12 @@ func (r *Registry) PushImageJSONRegistry(imgData *ImgData, jsonRaw []byte, regis
|
|
|
|
|
|
utils.Debugf("[registry] Calling PUT %s", registry+"images/"+imgData.ID+"/json")
|
|
utils.Debugf("[registry] Calling PUT %s", registry+"images/"+imgData.ID+"/json")
|
|
|
|
|
|
- req, err := http.NewRequest("PUT", registry+"images/"+imgData.ID+"/json", bytes.NewReader(jsonRaw))
|
|
|
|
|
|
+ req, err := r.reqFactory.NewRequest("PUT", registry+"images/"+imgData.ID+"/json", bytes.NewReader(jsonRaw))
|
|
if err != nil {
|
|
if err != nil {
|
|
return err
|
|
return err
|
|
}
|
|
}
|
|
req.Header.Add("Content-type", "application/json")
|
|
req.Header.Add("Content-type", "application/json")
|
|
req.Header.Set("Authorization", "Token "+strings.Join(token, ","))
|
|
req.Header.Set("Authorization", "Token "+strings.Join(token, ","))
|
|
- r.setUserAgent(req)
|
|
|
|
|
|
|
|
res, err := doWithCookies(r.client, req)
|
|
res, err := doWithCookies(r.client, req)
|
|
if err != nil {
|
|
if err != nil {
|
|
@@ -391,7 +365,7 @@ func (r *Registry) PushImageJSONRegistry(imgData *ImgData, jsonRaw []byte, regis
|
|
if res.StatusCode != 200 {
|
|
if res.StatusCode != 200 {
|
|
errBody, err := ioutil.ReadAll(res.Body)
|
|
errBody, err := ioutil.ReadAll(res.Body)
|
|
if err != nil {
|
|
if err != nil {
|
|
- return fmt.Errorf("HTTP code %d while uploading metadata and error when trying to parse response body: %s", res.StatusCode, err)
|
|
|
|
|
|
+ return utils.NewHTTPRequestError(fmt.Sprint("HTTP code %d while uploading metadata and error when trying to parse response body: %s", res.StatusCode, err), res)
|
|
}
|
|
}
|
|
var jsonBody map[string]string
|
|
var jsonBody map[string]string
|
|
if err := json.Unmarshal(errBody, &jsonBody); err != nil {
|
|
if err := json.Unmarshal(errBody, &jsonBody); err != nil {
|
|
@@ -399,7 +373,7 @@ func (r *Registry) PushImageJSONRegistry(imgData *ImgData, jsonRaw []byte, regis
|
|
} else if jsonBody["error"] == "Image already exists" {
|
|
} else if jsonBody["error"] == "Image already exists" {
|
|
return ErrAlreadyExists
|
|
return ErrAlreadyExists
|
|
}
|
|
}
|
|
- return fmt.Errorf("HTTP code %d while uploading metadata: %s", res.StatusCode, errBody)
|
|
|
|
|
|
+ return utils.NewHTTPRequestError(fmt.Sprintf("HTTP code %d while uploading metadata: %s", res.StatusCode, errBody), res)
|
|
}
|
|
}
|
|
return nil
|
|
return nil
|
|
}
|
|
}
|
|
@@ -410,14 +384,13 @@ func (r *Registry) PushImageLayerRegistry(imgID string, layer io.Reader, registr
|
|
|
|
|
|
tarsumLayer := &utils.TarSum{Reader: layer}
|
|
tarsumLayer := &utils.TarSum{Reader: layer}
|
|
|
|
|
|
- req, err := http.NewRequest("PUT", registry+"images/"+imgID+"/layer", tarsumLayer)
|
|
|
|
|
|
+ req, err := r.reqFactory.NewRequest("PUT", registry+"images/"+imgID+"/layer", tarsumLayer)
|
|
if err != nil {
|
|
if err != nil {
|
|
return "", err
|
|
return "", err
|
|
}
|
|
}
|
|
req.ContentLength = -1
|
|
req.ContentLength = -1
|
|
req.TransferEncoding = []string{"chunked"}
|
|
req.TransferEncoding = []string{"chunked"}
|
|
req.Header.Set("Authorization", "Token "+strings.Join(token, ","))
|
|
req.Header.Set("Authorization", "Token "+strings.Join(token, ","))
|
|
- r.setUserAgent(req)
|
|
|
|
res, err := doWithCookies(r.client, req)
|
|
res, err := doWithCookies(r.client, req)
|
|
if err != nil {
|
|
if err != nil {
|
|
return "", fmt.Errorf("Failed to upload layer: %s", err)
|
|
return "", fmt.Errorf("Failed to upload layer: %s", err)
|
|
@@ -427,15 +400,15 @@ func (r *Registry) PushImageLayerRegistry(imgID string, layer io.Reader, registr
|
|
if res.StatusCode != 200 {
|
|
if res.StatusCode != 200 {
|
|
errBody, err := ioutil.ReadAll(res.Body)
|
|
errBody, err := ioutil.ReadAll(res.Body)
|
|
if err != nil {
|
|
if err != nil {
|
|
- return "", fmt.Errorf("HTTP code %d while uploading metadata and error when trying to parse response body: %s", res.StatusCode, err)
|
|
|
|
|
|
+ return "", utils.NewHTTPRequestError(fmt.Sprintf("HTTP code %d while uploading metadata and error when trying to parse response body: %s", res.StatusCode, err), res)
|
|
}
|
|
}
|
|
- return "", fmt.Errorf("Received HTTP code %d while uploading layer: %s", res.StatusCode, errBody)
|
|
|
|
|
|
+ return "", utils.NewHTTPRequestError(fmt.Sprintf("Received HTTP code %d while uploading layer: %s", res.StatusCode, errBody), res)
|
|
}
|
|
}
|
|
return tarsumLayer.Sum(jsonRaw), nil
|
|
return tarsumLayer.Sum(jsonRaw), nil
|
|
}
|
|
}
|
|
|
|
|
|
func (r *Registry) opaqueRequest(method, urlStr string, body io.Reader) (*http.Request, error) {
|
|
func (r *Registry) opaqueRequest(method, urlStr string, body io.Reader) (*http.Request, error) {
|
|
- req, err := http.NewRequest(method, urlStr, body)
|
|
|
|
|
|
+ req, err := r.reqFactory.NewRequest(method, urlStr, body)
|
|
if err != nil {
|
|
if err != nil {
|
|
return nil, err
|
|
return nil, err
|
|
}
|
|
}
|
|
@@ -455,7 +428,6 @@ func (r *Registry) PushRegistryTag(remote, revision, tag, registry string, token
|
|
}
|
|
}
|
|
req.Header.Add("Content-type", "application/json")
|
|
req.Header.Add("Content-type", "application/json")
|
|
req.Header.Set("Authorization", "Token "+strings.Join(token, ","))
|
|
req.Header.Set("Authorization", "Token "+strings.Join(token, ","))
|
|
- r.setUserAgent(req)
|
|
|
|
req.ContentLength = int64(len(revision))
|
|
req.ContentLength = int64(len(revision))
|
|
res, err := doWithCookies(r.client, req)
|
|
res, err := doWithCookies(r.client, req)
|
|
if err != nil {
|
|
if err != nil {
|
|
@@ -463,7 +435,7 @@ func (r *Registry) PushRegistryTag(remote, revision, tag, registry string, token
|
|
}
|
|
}
|
|
res.Body.Close()
|
|
res.Body.Close()
|
|
if res.StatusCode != 200 && res.StatusCode != 201 {
|
|
if res.StatusCode != 200 && res.StatusCode != 201 {
|
|
- return fmt.Errorf("Internal server error: %d trying to push tag %s on %s", res.StatusCode, tag, remote)
|
|
|
|
|
|
+ return utils.NewHTTPRequestError(fmt.Sprintf("Internal server error: %d trying to push tag %s on %s", res.StatusCode, tag, remote), res)
|
|
}
|
|
}
|
|
return nil
|
|
return nil
|
|
}
|
|
}
|
|
@@ -500,7 +472,6 @@ func (r *Registry) PushImageJSONIndex(indexEp, remote string, imgList []*ImgData
|
|
req.SetBasicAuth(r.authConfig.Username, r.authConfig.Password)
|
|
req.SetBasicAuth(r.authConfig.Username, r.authConfig.Password)
|
|
req.ContentLength = int64(len(imgListJSON))
|
|
req.ContentLength = int64(len(imgListJSON))
|
|
req.Header.Set("X-Docker-Token", "true")
|
|
req.Header.Set("X-Docker-Token", "true")
|
|
- r.setUserAgent(req)
|
|
|
|
if validate {
|
|
if validate {
|
|
req.Header["X-Docker-Endpoints"] = regs
|
|
req.Header["X-Docker-Endpoints"] = regs
|
|
}
|
|
}
|
|
@@ -521,7 +492,6 @@ func (r *Registry) PushImageJSONIndex(indexEp, remote string, imgList []*ImgData
|
|
req.SetBasicAuth(r.authConfig.Username, r.authConfig.Password)
|
|
req.SetBasicAuth(r.authConfig.Username, r.authConfig.Password)
|
|
req.ContentLength = int64(len(imgListJSON))
|
|
req.ContentLength = int64(len(imgListJSON))
|
|
req.Header.Set("X-Docker-Token", "true")
|
|
req.Header.Set("X-Docker-Token", "true")
|
|
- r.setUserAgent(req)
|
|
|
|
if validate {
|
|
if validate {
|
|
req.Header["X-Docker-Endpoints"] = regs
|
|
req.Header["X-Docker-Endpoints"] = regs
|
|
}
|
|
}
|
|
@@ -540,7 +510,7 @@ func (r *Registry) PushImageJSONIndex(indexEp, remote string, imgList []*ImgData
|
|
if err != nil {
|
|
if err != nil {
|
|
return nil, err
|
|
return nil, err
|
|
}
|
|
}
|
|
- return nil, fmt.Errorf("Error: Status %d trying to push repository %s: %s", res.StatusCode, remote, errBody)
|
|
|
|
|
|
+ return nil, utils.NewHTTPRequestError(fmt.Sprintf("Error: Status %d trying to push repository %s: %s", res.StatusCode, remote, errBody), res)
|
|
}
|
|
}
|
|
if res.Header.Get("X-Docker-Token") != "" {
|
|
if res.Header.Get("X-Docker-Token") != "" {
|
|
tokens = res.Header["X-Docker-Token"]
|
|
tokens = res.Header["X-Docker-Token"]
|
|
@@ -564,7 +534,7 @@ func (r *Registry) PushImageJSONIndex(indexEp, remote string, imgList []*ImgData
|
|
if err != nil {
|
|
if err != nil {
|
|
return nil, err
|
|
return nil, err
|
|
}
|
|
}
|
|
- return nil, fmt.Errorf("Error: Status %d trying to push checksums %s: %s", res.StatusCode, remote, errBody)
|
|
|
|
|
|
+ return nil, utils.NewHTTPRequestError(fmt.Sprintf("Error: Status %d trying to push checksums %s: %s", res.StatusCode, remote, errBody), res)
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
|
|
@@ -576,7 +546,7 @@ func (r *Registry) PushImageJSONIndex(indexEp, remote string, imgList []*ImgData
|
|
|
|
|
|
func (r *Registry) SearchRepositories(term string) (*SearchResults, error) {
|
|
func (r *Registry) SearchRepositories(term string) (*SearchResults, error) {
|
|
u := auth.IndexServerAddress() + "search?q=" + url.QueryEscape(term)
|
|
u := auth.IndexServerAddress() + "search?q=" + url.QueryEscape(term)
|
|
- req, err := http.NewRequest("GET", u, nil)
|
|
|
|
|
|
+ req, err := r.reqFactory.NewRequest("GET", u, nil)
|
|
if err != nil {
|
|
if err != nil {
|
|
return nil, err
|
|
return nil, err
|
|
}
|
|
}
|
|
@@ -586,7 +556,7 @@ func (r *Registry) SearchRepositories(term string) (*SearchResults, error) {
|
|
}
|
|
}
|
|
defer res.Body.Close()
|
|
defer res.Body.Close()
|
|
if res.StatusCode != 200 {
|
|
if res.StatusCode != 200 {
|
|
- return nil, fmt.Errorf("Unexepected status code %d", res.StatusCode)
|
|
|
|
|
|
+ return nil, utils.NewHTTPRequestError(fmt.Sprintf("Unexepected status code %d", res.StatusCode), res)
|
|
}
|
|
}
|
|
rawData, err := ioutil.ReadAll(res.Body)
|
|
rawData, err := ioutil.ReadAll(res.Body)
|
|
if err != nil {
|
|
if err != nil {
|
|
@@ -628,52 +598,12 @@ type ImgData struct {
|
|
}
|
|
}
|
|
|
|
|
|
type Registry struct {
|
|
type Registry struct {
|
|
- client *http.Client
|
|
|
|
- authConfig *auth.AuthConfig
|
|
|
|
- baseVersions []VersionInfo
|
|
|
|
- baseVersionsStr string
|
|
|
|
|
|
+ client *http.Client
|
|
|
|
+ authConfig *auth.AuthConfig
|
|
|
|
+ reqFactory *utils.HTTPRequestFactory
|
|
}
|
|
}
|
|
|
|
|
|
-func validVersion(version VersionInfo) bool {
|
|
|
|
- stopChars := " \t\r\n/"
|
|
|
|
- if strings.ContainsAny(version.Name(), stopChars) {
|
|
|
|
- return false
|
|
|
|
- }
|
|
|
|
- if strings.ContainsAny(version.Version(), stopChars) {
|
|
|
|
- return false
|
|
|
|
- }
|
|
|
|
- return true
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-// Convert versions to a string and append the string to the string base.
|
|
|
|
-//
|
|
|
|
-// Each VersionInfo will be converted to a string in the format of
|
|
|
|
-// "product/version", where the "product" is get from the Name() method, while
|
|
|
|
-// version is get from the Version() method. Several pieces of verson information
|
|
|
|
-// will be concatinated and separated by space.
|
|
|
|
-func appendVersions(base string, versions ...VersionInfo) string {
|
|
|
|
- if len(versions) == 0 {
|
|
|
|
- return base
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- var buf bytes.Buffer
|
|
|
|
- if len(base) > 0 {
|
|
|
|
- buf.Write([]byte(base))
|
|
|
|
- }
|
|
|
|
-
|
|
|
|
- for _, v := range versions {
|
|
|
|
- if !validVersion(v) {
|
|
|
|
- continue
|
|
|
|
- }
|
|
|
|
- buf.Write([]byte(v.Name()))
|
|
|
|
- buf.Write([]byte("/"))
|
|
|
|
- buf.Write([]byte(v.Version()))
|
|
|
|
- buf.Write([]byte(" "))
|
|
|
|
- }
|
|
|
|
- return buf.String()
|
|
|
|
-}
|
|
|
|
-
|
|
|
|
-func NewRegistry(root string, authConfig *auth.AuthConfig, baseVersions ...VersionInfo) (r *Registry, err error) {
|
|
|
|
|
|
+func NewRegistry(root string, authConfig *auth.AuthConfig, factory *utils.HTTPRequestFactory) (r *Registry, err error) {
|
|
httpTransport := &http.Transport{
|
|
httpTransport := &http.Transport{
|
|
DisableKeepAlives: true,
|
|
DisableKeepAlives: true,
|
|
Proxy: http.ProxyFromEnvironment,
|
|
Proxy: http.ProxyFromEnvironment,
|
|
@@ -689,7 +619,7 @@ func NewRegistry(root string, authConfig *auth.AuthConfig, baseVersions ...Versi
|
|
if err != nil {
|
|
if err != nil {
|
|
return nil, err
|
|
return nil, err
|
|
}
|
|
}
|
|
- r.baseVersions = baseVersions
|
|
|
|
- r.baseVersionsStr = appendVersions("", baseVersions...)
|
|
|
|
|
|
+
|
|
|
|
+ r.reqFactory = factory
|
|
return r, nil
|
|
return r, nil
|
|
}
|
|
}
|