mirror of
https://github.com/moby/moby.git
synced 2022-11-09 12:21:53 -05:00
registry: return "errdefs" compatible error types
Adding some small utility functions to make generating them easier. Signed-off-by: Sebastiaan van Stijn <github@gone.nl>
This commit is contained in:
parent
98202c86ad
commit
79aa65c1fa
8 changed files with 48 additions and 38 deletions
|
@ -1,7 +1,6 @@
|
||||||
package registry // import "github.com/docker/docker/registry"
|
package registry // import "github.com/docker/docker/registry"
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"fmt"
|
|
||||||
"net"
|
"net"
|
||||||
"net/url"
|
"net/url"
|
||||||
"regexp"
|
"regexp"
|
||||||
|
@ -97,17 +96,17 @@ func (config *serviceConfig) loadAllowNondistributableArtifacts(registries []str
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if hasScheme(r) {
|
if hasScheme(r) {
|
||||||
return fmt.Errorf("allow-nondistributable-artifacts registry %s should not contain '://'", r)
|
return invalidParamf("allow-nondistributable-artifacts registry %s should not contain '://'", r)
|
||||||
}
|
}
|
||||||
|
|
||||||
if _, ipnet, err := net.ParseCIDR(r); err == nil {
|
if _, ipnet, err := net.ParseCIDR(r); err == nil {
|
||||||
// Valid CIDR.
|
// Valid CIDR.
|
||||||
cidrs[ipnet.String()] = (*registrytypes.NetIPNet)(ipnet)
|
cidrs[ipnet.String()] = (*registrytypes.NetIPNet)(ipnet)
|
||||||
} else if err := validateHostPort(r); err == nil {
|
} else if err = validateHostPort(r); err == nil {
|
||||||
// Must be `host:port` if not CIDR.
|
// Must be `host:port` if not CIDR.
|
||||||
hostnames[r] = true
|
hostnames[r] = true
|
||||||
} else {
|
} else {
|
||||||
return fmt.Errorf("allow-nondistributable-artifacts registry %s is not valid: %v", r, err)
|
return invalidParamWrapf(err, "allow-nondistributable-artifacts registry %s is not valid", r)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -188,7 +187,7 @@ skip:
|
||||||
// before returning err, roll back to original data
|
// before returning err, roll back to original data
|
||||||
config.ServiceConfig.InsecureRegistryCIDRs = originalCIDRs
|
config.ServiceConfig.InsecureRegistryCIDRs = originalCIDRs
|
||||||
config.ServiceConfig.IndexConfigs = originalIndexInfos
|
config.ServiceConfig.IndexConfigs = originalIndexInfos
|
||||||
return fmt.Errorf("insecure registry %s should not contain '://'", r)
|
return invalidParamf("insecure registry %s should not contain '://'", r)
|
||||||
}
|
}
|
||||||
// Check if CIDR was passed to --insecure-registry
|
// Check if CIDR was passed to --insecure-registry
|
||||||
_, ipnet, err := net.ParseCIDR(r)
|
_, ipnet, err := net.ParseCIDR(r)
|
||||||
|
@ -207,8 +206,7 @@ skip:
|
||||||
if err := validateHostPort(r); err != nil {
|
if err := validateHostPort(r); err != nil {
|
||||||
config.ServiceConfig.InsecureRegistryCIDRs = originalCIDRs
|
config.ServiceConfig.InsecureRegistryCIDRs = originalCIDRs
|
||||||
config.ServiceConfig.IndexConfigs = originalIndexInfos
|
config.ServiceConfig.IndexConfigs = originalIndexInfos
|
||||||
return fmt.Errorf("insecure registry %s is not valid: %v", r, err)
|
return invalidParamWrapf(err, "insecure registry %s is not valid", r)
|
||||||
|
|
||||||
}
|
}
|
||||||
// Assume `host:port` if not CIDR.
|
// Assume `host:port` if not CIDR.
|
||||||
config.IndexConfigs[r] = ®istrytypes.IndexInfo{
|
config.IndexConfigs[r] = ®istrytypes.IndexInfo{
|
||||||
|
@ -310,18 +308,18 @@ func isCIDRMatch(cidrs []*registrytypes.NetIPNet, URLHost string) bool {
|
||||||
func ValidateMirror(val string) (string, error) {
|
func ValidateMirror(val string) (string, error) {
|
||||||
uri, err := url.Parse(val)
|
uri, err := url.Parse(val)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", fmt.Errorf("invalid mirror: %q is not a valid URI", val)
|
return "", invalidParamWrapf(err, "invalid mirror: %q is not a valid URI", val)
|
||||||
}
|
}
|
||||||
if uri.Scheme != "http" && uri.Scheme != "https" {
|
if uri.Scheme != "http" && uri.Scheme != "https" {
|
||||||
return "", fmt.Errorf("invalid mirror: unsupported scheme %q in %q", uri.Scheme, uri)
|
return "", invalidParamf("invalid mirror: unsupported scheme %q in %q", uri.Scheme, uri)
|
||||||
}
|
}
|
||||||
if (uri.Path != "" && uri.Path != "/") || uri.RawQuery != "" || uri.Fragment != "" {
|
if (uri.Path != "" && uri.Path != "/") || uri.RawQuery != "" || uri.Fragment != "" {
|
||||||
return "", fmt.Errorf("invalid mirror: path, query, or fragment at end of the URI %q", uri)
|
return "", invalidParamf("invalid mirror: path, query, or fragment at end of the URI %q", uri)
|
||||||
}
|
}
|
||||||
if uri.User != nil {
|
if uri.User != nil {
|
||||||
// strip password from output
|
// strip password from output
|
||||||
uri.User = url.UserPassword(uri.User.Username(), "xxxxx")
|
uri.User = url.UserPassword(uri.User.Username(), "xxxxx")
|
||||||
return "", fmt.Errorf("invalid mirror: username/password not allowed in URI %q", uri)
|
return "", invalidParamf("invalid mirror: username/password not allowed in URI %q", uri)
|
||||||
}
|
}
|
||||||
return strings.TrimSuffix(val, "/") + "/", nil
|
return strings.TrimSuffix(val, "/") + "/", nil
|
||||||
}
|
}
|
||||||
|
@ -333,7 +331,7 @@ func ValidateIndexName(val string) (string, error) {
|
||||||
val = "docker.io"
|
val = "docker.io"
|
||||||
}
|
}
|
||||||
if strings.HasPrefix(val, "-") || strings.HasSuffix(val, "-") {
|
if strings.HasPrefix(val, "-") || strings.HasSuffix(val, "-") {
|
||||||
return "", fmt.Errorf("invalid index name (%s). Cannot begin or end with a hyphen", val)
|
return "", invalidParamf("invalid index name (%s). Cannot begin or end with a hyphen", val)
|
||||||
}
|
}
|
||||||
return val, nil
|
return val, nil
|
||||||
}
|
}
|
||||||
|
@ -352,7 +350,7 @@ func validateHostPort(s string) error {
|
||||||
// If match against the `host:port` pattern fails,
|
// If match against the `host:port` pattern fails,
|
||||||
// it might be `IPv6:port`, which will be captured by net.ParseIP(host)
|
// it might be `IPv6:port`, which will be captured by net.ParseIP(host)
|
||||||
if !validHostPortRegex.MatchString(s) && net.ParseIP(host) == nil {
|
if !validHostPortRegex.MatchString(s) && net.ParseIP(host) == nil {
|
||||||
return fmt.Errorf("invalid host %q", host)
|
return invalidParamf("invalid host %q", host)
|
||||||
}
|
}
|
||||||
if port != "" {
|
if port != "" {
|
||||||
v, err := strconv.Atoi(port)
|
v, err := strconv.Atoi(port)
|
||||||
|
@ -360,7 +358,7 @@ func validateHostPort(s string) error {
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
if v < 0 || v > 65535 {
|
if v < 0 || v > 65535 {
|
||||||
return fmt.Errorf("invalid port %q", port)
|
return invalidParamf("invalid port %q", port)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
return nil
|
return nil
|
||||||
|
|
|
@ -6,6 +6,7 @@ import (
|
||||||
"strings"
|
"strings"
|
||||||
"testing"
|
"testing"
|
||||||
|
|
||||||
|
"github.com/docker/docker/errdefs"
|
||||||
"gotest.tools/v3/assert"
|
"gotest.tools/v3/assert"
|
||||||
is "gotest.tools/v3/assert/cmp"
|
is "gotest.tools/v3/assert/cmp"
|
||||||
)
|
)
|
||||||
|
@ -255,9 +256,8 @@ func TestLoadInsecureRegistries(t *testing.T) {
|
||||||
if err == nil {
|
if err == nil {
|
||||||
t.Fatalf("expect error '%s', got no error", testCase.err)
|
t.Fatalf("expect error '%s', got no error", testCase.err)
|
||||||
}
|
}
|
||||||
if !strings.Contains(err.Error(), testCase.err) {
|
assert.ErrorContains(t, err, testCase.err)
|
||||||
t.Fatalf("expect error '%s', got '%s'", testCase.err, err)
|
assert.Check(t, errdefs.IsInvalidParameter(err))
|
||||||
}
|
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
@ -313,6 +313,7 @@ func TestNewServiceConfig(t *testing.T) {
|
||||||
_, err := newServiceConfig(testCase.opts)
|
_, err := newServiceConfig(testCase.opts)
|
||||||
if testCase.errStr != "" {
|
if testCase.errStr != "" {
|
||||||
assert.Check(t, is.Error(err, testCase.errStr))
|
assert.Check(t, is.Error(err, testCase.errStr))
|
||||||
|
assert.Check(t, errdefs.IsInvalidParameter(err))
|
||||||
} else {
|
} else {
|
||||||
assert.Check(t, err)
|
assert.Check(t, err)
|
||||||
}
|
}
|
||||||
|
@ -377,5 +378,6 @@ func TestValidateIndexNameWithError(t *testing.T) {
|
||||||
for _, testCase := range invalid {
|
for _, testCase := range invalid {
|
||||||
_, err := ValidateIndexName(testCase.index)
|
_, err := ValidateIndexName(testCase.index)
|
||||||
assert.Check(t, is.Error(err, testCase.err))
|
assert.Check(t, is.Error(err, testCase.err))
|
||||||
|
assert.Check(t, errdefs.IsInvalidParameter(err))
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -3,7 +3,6 @@ package registry // import "github.com/docker/docker/registry"
|
||||||
import (
|
import (
|
||||||
"crypto/tls"
|
"crypto/tls"
|
||||||
"encoding/json"
|
"encoding/json"
|
||||||
"fmt"
|
|
||||||
"io"
|
"io"
|
||||||
"net/http"
|
"net/http"
|
||||||
"net/url"
|
"net/url"
|
||||||
|
@ -64,7 +63,7 @@ func validateEndpoint(endpoint *v1Endpoint) error {
|
||||||
if endpoint.IsSecure {
|
if endpoint.IsSecure {
|
||||||
// If registry is secure and HTTPS failed, show user the error and tell them about `--insecure-registry`
|
// If registry is secure and HTTPS failed, show user the error and tell them about `--insecure-registry`
|
||||||
// in case that's what they need. DO NOT accept unknown CA certificates, and DO NOT fallback to HTTP.
|
// in case that's what they need. DO NOT accept unknown CA certificates, and DO NOT fallback to HTTP.
|
||||||
return fmt.Errorf("invalid registry endpoint %s: %v. If this private registry supports only HTTP or HTTPS with an unknown CA certificate, please add `--insecure-registry %s` to the daemon's arguments. In the case of HTTPS, if you have access to the registry's CA certificate, no need for the flag; simply place the CA certificate at /etc/docker/certs.d/%s/ca.crt", endpoint, err, endpoint.URL.Host, endpoint.URL.Host)
|
return invalidParamf("invalid registry endpoint %s: %v. If this private registry supports only HTTP or HTTPS with an unknown CA certificate, please add `--insecure-registry %s` to the daemon's arguments. In the case of HTTPS, if you have access to the registry's CA certificate, no need for the flag; simply place the CA certificate at /etc/docker/certs.d/%s/ca.crt", endpoint, err, endpoint.URL.Host, endpoint.URL.Host)
|
||||||
}
|
}
|
||||||
|
|
||||||
// If registry is insecure and HTTPS failed, fallback to HTTP.
|
// If registry is insecure and HTTPS failed, fallback to HTTP.
|
||||||
|
@ -76,7 +75,7 @@ func validateEndpoint(endpoint *v1Endpoint) error {
|
||||||
return nil
|
return nil
|
||||||
}
|
}
|
||||||
|
|
||||||
return fmt.Errorf("invalid registry endpoint %q. HTTPS attempt: %v. HTTP attempt: %v", endpoint, err, err2)
|
return invalidParamf("invalid registry endpoint %q. HTTPS attempt: %v. HTTP attempt: %v", endpoint, err, err2)
|
||||||
}
|
}
|
||||||
|
|
||||||
return nil
|
return nil
|
||||||
|
@ -99,7 +98,7 @@ func trimV1Address(address string) (string, error) {
|
||||||
|
|
||||||
for k, v := range apiVersions {
|
for k, v := range apiVersions {
|
||||||
if k != APIVersion1 && apiVersionStr == v {
|
if k != APIVersion1 && apiVersionStr == v {
|
||||||
return "", fmt.Errorf("unsupported V1 version path %s", apiVersionStr)
|
return "", invalidParamf("unsupported V1 version path %s", apiVersionStr)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
||||||
|
@ -118,7 +117,7 @@ func newV1EndpointFromStr(address string, tlsConfig *tls.Config, userAgent strin
|
||||||
|
|
||||||
uri, err := url.Parse(address)
|
uri, err := url.Parse(address)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, invalidParam(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
// TODO(tiborvass): make sure a ConnectTimeout transport is used
|
// TODO(tiborvass): make sure a ConnectTimeout transport is used
|
||||||
|
@ -148,19 +147,19 @@ func (e *v1Endpoint) ping() (v1PingResult, error) {
|
||||||
pingURL := e.String() + "_ping"
|
pingURL := e.String() + "_ping"
|
||||||
req, err := http.NewRequest(http.MethodGet, pingURL, nil)
|
req, err := http.NewRequest(http.MethodGet, pingURL, nil)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return v1PingResult{}, err
|
return v1PingResult{}, invalidParam(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
resp, err := e.client.Do(req)
|
resp, err := e.client.Do(req)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return v1PingResult{}, err
|
return v1PingResult{}, invalidParam(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
defer resp.Body.Close()
|
defer resp.Body.Close()
|
||||||
|
|
||||||
jsonString, err := io.ReadAll(resp.Body)
|
jsonString, err := io.ReadAll(resp.Body)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return v1PingResult{}, fmt.Errorf("error while reading the http response: %s", err)
|
return v1PingResult{}, invalidParamWrapf(err, "error while reading response from %s", pingURL)
|
||||||
}
|
}
|
||||||
|
|
||||||
// If the header is absent, we assume true for compatibility with earlier
|
// If the header is absent, we assume true for compatibility with earlier
|
||||||
|
|
|
@ -5,6 +5,7 @@ import (
|
||||||
|
|
||||||
"github.com/docker/distribution/registry/api/errcode"
|
"github.com/docker/distribution/registry/api/errcode"
|
||||||
"github.com/docker/docker/errdefs"
|
"github.com/docker/docker/errdefs"
|
||||||
|
"github.com/pkg/errors"
|
||||||
)
|
)
|
||||||
|
|
||||||
func translateV2AuthError(err error) error {
|
func translateV2AuthError(err error) error {
|
||||||
|
@ -21,3 +22,15 @@ func translateV2AuthError(err error) error {
|
||||||
|
|
||||||
return err
|
return err
|
||||||
}
|
}
|
||||||
|
|
||||||
|
func invalidParam(err error) error {
|
||||||
|
return errdefs.InvalidParameter(err)
|
||||||
|
}
|
||||||
|
|
||||||
|
func invalidParamf(format string, args ...interface{}) error {
|
||||||
|
return errdefs.InvalidParameter(errors.Errorf(format, args...))
|
||||||
|
}
|
||||||
|
|
||||||
|
func invalidParamWrapf(err error, format string, args ...interface{}) error {
|
||||||
|
return errdefs.InvalidParameter(errors.Wrapf(err, format, args...))
|
||||||
|
}
|
||||||
|
|
|
@ -3,7 +3,6 @@ package registry // import "github.com/docker/docker/registry"
|
||||||
|
|
||||||
import (
|
import (
|
||||||
"crypto/tls"
|
"crypto/tls"
|
||||||
"fmt"
|
|
||||||
"net"
|
"net"
|
||||||
"net/http"
|
"net/http"
|
||||||
"os"
|
"os"
|
||||||
|
@ -53,7 +52,7 @@ func hasFile(files []os.DirEntry, name string) bool {
|
||||||
func ReadCertsDirectory(tlsConfig *tls.Config, directory string) error {
|
func ReadCertsDirectory(tlsConfig *tls.Config, directory string) error {
|
||||||
fs, err := os.ReadDir(directory)
|
fs, err := os.ReadDir(directory)
|
||||||
if err != nil && !os.IsNotExist(err) {
|
if err != nil && !os.IsNotExist(err) {
|
||||||
return err
|
return invalidParam(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, f := range fs {
|
for _, f := range fs {
|
||||||
|
@ -61,7 +60,7 @@ func ReadCertsDirectory(tlsConfig *tls.Config, directory string) error {
|
||||||
if tlsConfig.RootCAs == nil {
|
if tlsConfig.RootCAs == nil {
|
||||||
systemPool, err := tlsconfig.SystemCertPool()
|
systemPool, err := tlsconfig.SystemCertPool()
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return fmt.Errorf("unable to get system cert pool: %v", err)
|
return invalidParamWrapf(err, "unable to get system cert pool")
|
||||||
}
|
}
|
||||||
tlsConfig.RootCAs = systemPool
|
tlsConfig.RootCAs = systemPool
|
||||||
}
|
}
|
||||||
|
@ -77,7 +76,7 @@ func ReadCertsDirectory(tlsConfig *tls.Config, directory string) error {
|
||||||
keyName := certName[:len(certName)-5] + ".key"
|
keyName := certName[:len(certName)-5] + ".key"
|
||||||
logrus.Debugf("cert: %s", filepath.Join(directory, f.Name()))
|
logrus.Debugf("cert: %s", filepath.Join(directory, f.Name()))
|
||||||
if !hasFile(fs, keyName) {
|
if !hasFile(fs, keyName) {
|
||||||
return fmt.Errorf("missing key %s for client certificate %s. Note that CA certificates should use the extension .crt", keyName, certName)
|
return invalidParamf("missing key %s for client certificate %s. CA certificates must use the extension .crt", keyName, certName)
|
||||||
}
|
}
|
||||||
cert, err := tls.LoadX509KeyPair(filepath.Join(directory, certName), filepath.Join(directory, keyName))
|
cert, err := tls.LoadX509KeyPair(filepath.Join(directory, certName), filepath.Join(directory, keyName))
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
@ -90,7 +89,7 @@ func ReadCertsDirectory(tlsConfig *tls.Config, directory string) error {
|
||||||
certName := keyName[:len(keyName)-4] + ".cert"
|
certName := keyName[:len(keyName)-4] + ".cert"
|
||||||
logrus.Debugf("key: %s", filepath.Join(directory, f.Name()))
|
logrus.Debugf("key: %s", filepath.Join(directory, f.Name()))
|
||||||
if !hasFile(fs, certName) {
|
if !hasFile(fs, certName) {
|
||||||
return fmt.Errorf("Missing client certificate %s for key %s", certName, keyName)
|
return invalidParamf("missing client certificate %s for key %s", certName, keyName)
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -13,7 +13,6 @@ import (
|
||||||
"github.com/docker/docker/api/types"
|
"github.com/docker/docker/api/types"
|
||||||
registrytypes "github.com/docker/docker/api/types/registry"
|
registrytypes "github.com/docker/docker/api/types/registry"
|
||||||
"github.com/docker/docker/errdefs"
|
"github.com/docker/docker/errdefs"
|
||||||
"github.com/pkg/errors"
|
|
||||||
"github.com/sirupsen/logrus"
|
"github.com/sirupsen/logrus"
|
||||||
)
|
)
|
||||||
|
|
||||||
|
@ -117,7 +116,7 @@ func (s *defaultService) Auth(ctx context.Context, authConfig *types.AuthConfig,
|
||||||
}
|
}
|
||||||
u, err := url.Parse(serverAddress)
|
u, err := url.Parse(serverAddress)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", "", errdefs.InvalidParameter(errors.Errorf("unable to parse server address: %v", err))
|
return "", "", invalidParamWrapf(err, "unable to parse server address")
|
||||||
}
|
}
|
||||||
registryHostName = u.Host
|
registryHostName = u.Host
|
||||||
}
|
}
|
||||||
|
@ -127,7 +126,7 @@ func (s *defaultService) Auth(ctx context.Context, authConfig *types.AuthConfig,
|
||||||
// to a mirror.
|
// to a mirror.
|
||||||
endpoints, err := s.LookupPushEndpoints(registryHostName)
|
endpoints, err := s.LookupPushEndpoints(registryHostName)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return "", "", errdefs.InvalidParameter(err)
|
return "", "", invalidParam(err)
|
||||||
}
|
}
|
||||||
|
|
||||||
for _, endpoint := range endpoints {
|
for _, endpoint := range endpoints {
|
||||||
|
@ -162,7 +161,7 @@ func splitReposSearchTerm(reposName string) (string, string) {
|
||||||
func (s *defaultService) Search(ctx context.Context, term string, limit int, authConfig *types.AuthConfig, userAgent string, headers map[string][]string) (*registrytypes.SearchResults, error) {
|
func (s *defaultService) Search(ctx context.Context, term string, limit int, authConfig *types.AuthConfig, userAgent string, headers map[string][]string) (*registrytypes.SearchResults, error) {
|
||||||
// TODO Use ctx when searching for repositories
|
// TODO Use ctx when searching for repositories
|
||||||
if hasScheme(term) {
|
if hasScheme(term) {
|
||||||
return nil, errors.New(`invalid repository name (ex: "registry.domain.tld/myrepos")`)
|
return nil, invalidParamf("invalid repository name: repository name (%s) should not have a scheme", term)
|
||||||
}
|
}
|
||||||
|
|
||||||
indexName, remoteName := splitReposSearchTerm(term)
|
indexName, remoteName := splitReposSearchTerm(term)
|
||||||
|
|
|
@ -16,7 +16,7 @@ func (s *defaultService) lookupV2Endpoints(hostname string) (endpoints []APIEndp
|
||||||
}
|
}
|
||||||
mirrorURL, err := url.Parse(mirror)
|
mirrorURL, err := url.Parse(mirror)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, err
|
return nil, invalidParam(err)
|
||||||
}
|
}
|
||||||
mirrorTLSConfig, err := s.tlsConfig(mirrorURL.Host)
|
mirrorTLSConfig, err := s.tlsConfig(mirrorURL.Host)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
|
|
|
@ -169,7 +169,7 @@ func authorizeClient(client *http.Client, authConfig *types.AuthConfig, endpoint
|
||||||
|
|
||||||
jar, err := cookiejar.New(nil)
|
jar, err := cookiejar.New(nil)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return errors.New("cookiejar.New is not supposed to return an error")
|
return errdefs.System(errors.New("cookiejar.New is not supposed to return an error"))
|
||||||
}
|
}
|
||||||
client.Jar = jar
|
client.Jar = jar
|
||||||
|
|
||||||
|
@ -187,14 +187,14 @@ func newSession(client *http.Client, endpoint *v1Endpoint) *session {
|
||||||
// searchRepositories performs a search against the remote repository
|
// searchRepositories performs a search against the remote repository
|
||||||
func (r *session) searchRepositories(term string, limit int) (*registrytypes.SearchResults, error) {
|
func (r *session) searchRepositories(term string, limit int) (*registrytypes.SearchResults, error) {
|
||||||
if limit < 1 || limit > 100 {
|
if limit < 1 || limit > 100 {
|
||||||
return nil, errdefs.InvalidParameter(errors.Errorf("Limit %d is outside the range of [1, 100]", limit))
|
return nil, invalidParamf("limit %d is outside the range of [1, 100]", limit)
|
||||||
}
|
}
|
||||||
logrus.Debugf("Index server: %s", r.indexEndpoint)
|
logrus.Debugf("Index server: %s", r.indexEndpoint)
|
||||||
u := r.indexEndpoint.String() + "search?q=" + url.QueryEscape(term) + "&n=" + url.QueryEscape(fmt.Sprintf("%d", limit))
|
u := r.indexEndpoint.String() + "search?q=" + url.QueryEscape(term) + "&n=" + url.QueryEscape(fmt.Sprintf("%d", limit))
|
||||||
|
|
||||||
req, err := http.NewRequest(http.MethodGet, u, nil)
|
req, err := http.NewRequest(http.MethodGet, u, nil)
|
||||||
if err != nil {
|
if err != nil {
|
||||||
return nil, errors.Wrap(errdefs.InvalidParameter(err), "Error building request")
|
return nil, invalidParamWrapf(err, "error building request")
|
||||||
}
|
}
|
||||||
// Have the AuthTransport send authentication, when logged in.
|
// Have the AuthTransport send authentication, when logged in.
|
||||||
req.Header.Set("X-Docker-Token", "true")
|
req.Header.Set("X-Docker-Token", "true")
|
||||||
|
|
Loading…
Add table
Reference in a new issue