Move ErrorCode logic to new errcode package
Make HTTP status codes match the ErrorCode by looking it up in the Descriptors Signed-off-by: Doug Davis <dug@us.ibm.com>master
							parent
							
								
									5f553b3cfc
								
							
						
					
					
						commit
						f565d6abb7
					
				| 
						 | 
				
			
			@ -0,0 +1,206 @@
 | 
			
		|||
package errcode
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"net/http"
 | 
			
		||||
	"strings"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// ErrorCode represents the error type. The errors are serialized via strings
 | 
			
		||||
// and the integer format may change and should *never* be exported.
 | 
			
		||||
type ErrorCode int
 | 
			
		||||
 | 
			
		||||
// ErrorDescriptor provides relevant information about a given error code.
 | 
			
		||||
type ErrorDescriptor struct {
 | 
			
		||||
	// Code is the error code that this descriptor describes.
 | 
			
		||||
	Code ErrorCode
 | 
			
		||||
 | 
			
		||||
	// Value provides a unique, string key, often captilized with
 | 
			
		||||
	// underscores, to identify the error code. This value is used as the
 | 
			
		||||
	// keyed value when serializing api errors.
 | 
			
		||||
	Value string
 | 
			
		||||
 | 
			
		||||
	// Message is a short, human readable decription of the error condition
 | 
			
		||||
	// included in API responses.
 | 
			
		||||
	Message string
 | 
			
		||||
 | 
			
		||||
	// Description provides a complete account of the errors purpose, suitable
 | 
			
		||||
	// for use in documentation.
 | 
			
		||||
	Description string
 | 
			
		||||
 | 
			
		||||
	// HTTPStatusCode provides the http status code that is associated with
 | 
			
		||||
	// this error condition.
 | 
			
		||||
	HTTPStatusCode int
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
var (
 | 
			
		||||
	errorCodeToDescriptors = map[ErrorCode]ErrorDescriptor{}
 | 
			
		||||
	idToDescriptors        = map[string]ErrorDescriptor{}
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
	// ErrorCodeUnknown is a catch-all for errors not defined below.
 | 
			
		||||
	ErrorCodeUnknown ErrorCode = 10000 + iota
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
var errorDescriptors = []ErrorDescriptor{
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeUnknown,
 | 
			
		||||
		Value:   "UNKNOWN",
 | 
			
		||||
		Message: "unknown error",
 | 
			
		||||
		Description: `Generic error returned when the error does not have an
 | 
			
		||||
									        API classification.`,
 | 
			
		||||
		HTTPStatusCode: http.StatusInternalServerError,
 | 
			
		||||
	},
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// LoadErrors will register a new set of Errors into the system
 | 
			
		||||
func LoadErrors(errs *[]ErrorDescriptor) {
 | 
			
		||||
	for _, descriptor := range *errs {
 | 
			
		||||
		if _, ok := idToDescriptors[descriptor.Value]; ok {
 | 
			
		||||
			panic(fmt.Sprintf("ErrorValue %s is already registered", descriptor.Value))
 | 
			
		||||
		}
 | 
			
		||||
		if _, ok := errorCodeToDescriptors[descriptor.Code]; ok {
 | 
			
		||||
			panic(fmt.Sprintf("ErrorCode %d is already registered", descriptor.Code))
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		errorCodeToDescriptors[descriptor.Code] = descriptor
 | 
			
		||||
		idToDescriptors[descriptor.Value] = descriptor
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// ParseErrorCode attempts to parse the error code string, returning
 | 
			
		||||
// ErrorCodeUnknown if the error is not known.
 | 
			
		||||
func ParseErrorCode(s string) ErrorCode {
 | 
			
		||||
	desc, ok := idToDescriptors[s]
 | 
			
		||||
 | 
			
		||||
	if !ok {
 | 
			
		||||
		return ErrorCodeUnknown
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return desc.Code
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Descriptor returns the descriptor for the error code.
 | 
			
		||||
func (ec ErrorCode) Descriptor() ErrorDescriptor {
 | 
			
		||||
	d, ok := errorCodeToDescriptors[ec]
 | 
			
		||||
 | 
			
		||||
	if !ok {
 | 
			
		||||
		return ErrorCodeUnknown.Descriptor()
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return d
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// String returns the canonical identifier for this error code.
 | 
			
		||||
func (ec ErrorCode) String() string {
 | 
			
		||||
	return ec.Descriptor().Value
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Message returned the human-readable error message for this error code.
 | 
			
		||||
func (ec ErrorCode) Message() string {
 | 
			
		||||
	return ec.Descriptor().Message
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// MarshalText encodes the receiver into UTF-8-encoded text and returns the
 | 
			
		||||
// result.
 | 
			
		||||
func (ec ErrorCode) MarshalText() (text []byte, err error) {
 | 
			
		||||
	return []byte(ec.String()), nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// UnmarshalText decodes the form generated by MarshalText.
 | 
			
		||||
func (ec *ErrorCode) UnmarshalText(text []byte) error {
 | 
			
		||||
	desc, ok := idToDescriptors[string(text)]
 | 
			
		||||
 | 
			
		||||
	if !ok {
 | 
			
		||||
		desc = ErrorCodeUnknown.Descriptor()
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	*ec = desc.Code
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Error provides a wrapper around ErrorCode with extra Details provided.
 | 
			
		||||
type Error struct {
 | 
			
		||||
	Code    ErrorCode   `json:"code"`
 | 
			
		||||
	Message string      `json:"message,omitempty"`
 | 
			
		||||
	Detail  interface{} `json:"detail,omitempty"`
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Error returns a human readable representation of the error.
 | 
			
		||||
func (e Error) Error() string {
 | 
			
		||||
	return fmt.Sprintf("%s: %s",
 | 
			
		||||
		strings.ToLower(strings.Replace(e.Code.String(), "_", " ", -1)),
 | 
			
		||||
		e.Message)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Errors provides the envelope for multiple errors and a few sugar methods
 | 
			
		||||
// for use within the application.
 | 
			
		||||
type Errors struct {
 | 
			
		||||
	Errors []Error `json:"errors,omitempty"`
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Push pushes an error on to the error stack, with the optional detail
 | 
			
		||||
// argument. It is a programming error (ie panic) to push more than one
 | 
			
		||||
// detail at a time.
 | 
			
		||||
func (errs *Errors) Push(code ErrorCode, details ...interface{}) {
 | 
			
		||||
	if len(details) > 1 {
 | 
			
		||||
		panic("please specify zero or one detail items for this error")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	var detail interface{}
 | 
			
		||||
	if len(details) > 0 {
 | 
			
		||||
		detail = details[0]
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err, ok := detail.(error); ok {
 | 
			
		||||
		detail = err.Error()
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	errs.PushErr(Error{
 | 
			
		||||
		Code:    code,
 | 
			
		||||
		Message: code.Message(),
 | 
			
		||||
		Detail:  detail,
 | 
			
		||||
	})
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// PushErr pushes an error interface onto the error stack.
 | 
			
		||||
func (errs *Errors) PushErr(err error) {
 | 
			
		||||
	switch err.(type) {
 | 
			
		||||
	case Error:
 | 
			
		||||
		errs.Errors = append(errs.Errors, err.(Error))
 | 
			
		||||
	default:
 | 
			
		||||
		errs.Errors = append(errs.Errors, Error{Message: err.Error()})
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (errs *Errors) Error() string {
 | 
			
		||||
	switch errs.Len() {
 | 
			
		||||
	case 0:
 | 
			
		||||
		return "<nil>"
 | 
			
		||||
	case 1:
 | 
			
		||||
		return errs.Errors[0].Error()
 | 
			
		||||
	default:
 | 
			
		||||
		msg := "errors:\n"
 | 
			
		||||
		for _, err := range errs.Errors {
 | 
			
		||||
			msg += err.Error() + "\n"
 | 
			
		||||
		}
 | 
			
		||||
		return msg
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Clear clears the errors.
 | 
			
		||||
func (errs *Errors) Clear() {
 | 
			
		||||
	errs.Errors = nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Len returns the current number of errors.
 | 
			
		||||
func (errs *Errors) Len() int {
 | 
			
		||||
	return len(errs.Errors)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// init loads the default errors that are part of the errcode package
 | 
			
		||||
func init() {
 | 
			
		||||
	LoadErrors(&errorDescriptors)
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			@ -1,11 +1,11 @@
 | 
			
		|||
package v2
 | 
			
		||||
package errcode
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"encoding/json"
 | 
			
		||||
	"reflect"
 | 
			
		||||
	// "reflect"
 | 
			
		||||
	"testing"
 | 
			
		||||
 | 
			
		||||
	"github.com/docker/distribution/digest"
 | 
			
		||||
	// "github.com/docker/distribution/digest"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// TestErrorCodes ensures that error code format, mappings and
 | 
			
		||||
| 
						 | 
				
			
			@ -56,6 +56,7 @@ func TestErrorCodes(t *testing.T) {
 | 
			
		|||
 | 
			
		||||
// TestErrorsManagement does a quick check of the Errors type to ensure that
 | 
			
		||||
// members are properly pushed and marshaled.
 | 
			
		||||
/*
 | 
			
		||||
func TestErrorsManagement(t *testing.T) {
 | 
			
		||||
	var errs Errors
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -163,3 +164,4 @@ func TestMarshalUnmarshal(t *testing.T) {
 | 
			
		|||
		t.Fatalf("errors not equal after round trip: %#v != %#v", unmarshaled, errors)
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
*/
 | 
			
		||||
| 
						 | 
				
			
			@ -5,6 +5,7 @@ import (
 | 
			
		|||
	"regexp"
 | 
			
		||||
 | 
			
		||||
	"github.com/docker/distribution/digest"
 | 
			
		||||
	"github.com/docker/distribution/registry/api/errcode"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
var (
 | 
			
		||||
| 
						 | 
				
			
			@ -98,7 +99,7 @@ var (
 | 
			
		|||
				Format:      "<length>",
 | 
			
		||||
			},
 | 
			
		||||
		},
 | 
			
		||||
		ErrorCodes: []ErrorCode{
 | 
			
		||||
		ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
			ErrorCodeUnauthorized,
 | 
			
		||||
		},
 | 
			
		||||
		Body: BodyDescriptor{
 | 
			
		||||
| 
						 | 
				
			
			@ -119,7 +120,7 @@ var (
 | 
			
		|||
				Format:      "<length>",
 | 
			
		||||
			},
 | 
			
		||||
		},
 | 
			
		||||
		ErrorCodes: []ErrorCode{
 | 
			
		||||
		ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
			ErrorCodeUnauthorized,
 | 
			
		||||
		},
 | 
			
		||||
		Body: BodyDescriptor{
 | 
			
		||||
| 
						 | 
				
			
			@ -174,7 +175,7 @@ var APIDescriptor = struct {
 | 
			
		|||
 | 
			
		||||
	// ErrorDescriptors provides a list of the error codes and their
 | 
			
		||||
	// associated documentation and metadata.
 | 
			
		||||
	ErrorDescriptors []ErrorDescriptor
 | 
			
		||||
	ErrorDescriptors []errcode.ErrorDescriptor
 | 
			
		||||
}{
 | 
			
		||||
	RouteDescriptors: routeDescriptors,
 | 
			
		||||
	ErrorDescriptors: errorDescriptors,
 | 
			
		||||
| 
						 | 
				
			
			@ -275,7 +276,7 @@ type ResponseDescriptor struct {
 | 
			
		|||
 | 
			
		||||
	// ErrorCodes enumerates the error codes that may be returned along with
 | 
			
		||||
	// the response.
 | 
			
		||||
	ErrorCodes []ErrorCode
 | 
			
		||||
	ErrorCodes []errcode.ErrorCode
 | 
			
		||||
 | 
			
		||||
	// Body describes the body of the response, if any.
 | 
			
		||||
	Body BodyDescriptor
 | 
			
		||||
| 
						 | 
				
			
			@ -317,30 +318,6 @@ type ParameterDescriptor struct {
 | 
			
		|||
	Examples []string
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// ErrorDescriptor provides relevant information about a given error code.
 | 
			
		||||
type ErrorDescriptor struct {
 | 
			
		||||
	// Code is the error code that this descriptor describes.
 | 
			
		||||
	Code ErrorCode
 | 
			
		||||
 | 
			
		||||
	// Value provides a unique, string key, often captilized with
 | 
			
		||||
	// underscores, to identify the error code. This value is used as the
 | 
			
		||||
	// keyed value when serializing api errors.
 | 
			
		||||
	Value string
 | 
			
		||||
 | 
			
		||||
	// Message is a short, human readable decription of the error condition
 | 
			
		||||
	// included in API responses.
 | 
			
		||||
	Message string
 | 
			
		||||
 | 
			
		||||
	// Description provides a complete account of the errors purpose, suitable
 | 
			
		||||
	// for use in documentation.
 | 
			
		||||
	Description string
 | 
			
		||||
 | 
			
		||||
	// HTTPStatusCodes provides a list of status under which this error
 | 
			
		||||
	// condition may arise. If it is empty, the error condition may be seen
 | 
			
		||||
	// for any status code.
 | 
			
		||||
	HTTPStatusCodes []int
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
var routeDescriptors = []RouteDescriptor{
 | 
			
		||||
	{
 | 
			
		||||
		Name:        RouteNameBase,
 | 
			
		||||
| 
						 | 
				
			
			@ -374,7 +351,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
									ContentType: "application/json; charset=utf-8",
 | 
			
		||||
									Format:      errorsBody,
 | 
			
		||||
								},
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeUnauthorized,
 | 
			
		||||
								},
 | 
			
		||||
							},
 | 
			
		||||
| 
						 | 
				
			
			@ -438,7 +415,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
									ContentType: "application/json; charset=utf-8",
 | 
			
		||||
									Format:      errorsBody,
 | 
			
		||||
								},
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeNameUnknown,
 | 
			
		||||
								},
 | 
			
		||||
							},
 | 
			
		||||
| 
						 | 
				
			
			@ -449,7 +426,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
									ContentType: "application/json; charset=utf-8",
 | 
			
		||||
									Format:      errorsBody,
 | 
			
		||||
								},
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeUnauthorized,
 | 
			
		||||
								},
 | 
			
		||||
							},
 | 
			
		||||
| 
						 | 
				
			
			@ -495,7 +472,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
							{
 | 
			
		||||
								Description: "The name or reference was invalid.",
 | 
			
		||||
								StatusCode:  http.StatusBadRequest,
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeNameInvalid,
 | 
			
		||||
									ErrorCodeTagInvalid,
 | 
			
		||||
								},
 | 
			
		||||
| 
						 | 
				
			
			@ -511,14 +488,14 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
									ContentType: "application/json; charset=utf-8",
 | 
			
		||||
									Format:      errorsBody,
 | 
			
		||||
								},
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeUnauthorized,
 | 
			
		||||
								},
 | 
			
		||||
							},
 | 
			
		||||
							{
 | 
			
		||||
								Description: "The named manifest is not known to the registry.",
 | 
			
		||||
								StatusCode:  http.StatusNotFound,
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeNameUnknown,
 | 
			
		||||
									ErrorCodeManifestUnknown,
 | 
			
		||||
								},
 | 
			
		||||
| 
						 | 
				
			
			@ -573,7 +550,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
									ContentType: "application/json; charset=utf-8",
 | 
			
		||||
									Format:      errorsBody,
 | 
			
		||||
								},
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeNameInvalid,
 | 
			
		||||
									ErrorCodeTagInvalid,
 | 
			
		||||
									ErrorCodeManifestInvalid,
 | 
			
		||||
| 
						 | 
				
			
			@ -588,7 +565,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
									ContentType: "application/json; charset=utf-8",
 | 
			
		||||
									Format:      errorsBody,
 | 
			
		||||
								},
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeUnauthorized,
 | 
			
		||||
								},
 | 
			
		||||
							},
 | 
			
		||||
| 
						 | 
				
			
			@ -596,7 +573,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
								Name:        "Missing Layer(s)",
 | 
			
		||||
								Description: "One or more layers may be missing during a manifest upload. If so, the missing layers will be enumerated in the error response.",
 | 
			
		||||
								StatusCode:  http.StatusBadRequest,
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeBlobUnknown,
 | 
			
		||||
								},
 | 
			
		||||
								Body: BodyDescriptor{
 | 
			
		||||
| 
						 | 
				
			
			@ -625,7 +602,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
										Format:      "<length>",
 | 
			
		||||
									},
 | 
			
		||||
								},
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeUnauthorized,
 | 
			
		||||
								},
 | 
			
		||||
								Body: BodyDescriptor{
 | 
			
		||||
| 
						 | 
				
			
			@ -660,7 +637,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
								Name:        "Invalid Name or Tag",
 | 
			
		||||
								Description: "The specified `name` or `tag` were invalid and the delete was unable to proceed.",
 | 
			
		||||
								StatusCode:  http.StatusBadRequest,
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeNameInvalid,
 | 
			
		||||
									ErrorCodeTagInvalid,
 | 
			
		||||
								},
 | 
			
		||||
| 
						 | 
				
			
			@ -680,7 +657,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
										Format:      "<length>",
 | 
			
		||||
									},
 | 
			
		||||
								},
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeUnauthorized,
 | 
			
		||||
								},
 | 
			
		||||
								Body: BodyDescriptor{
 | 
			
		||||
| 
						 | 
				
			
			@ -692,7 +669,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
								Name:        "Unknown Manifest",
 | 
			
		||||
								Description: "The specified `name` or `tag` are unknown to the registry and the delete was unable to proceed. Clients can assume the manifest was already deleted if this response is returned.",
 | 
			
		||||
								StatusCode:  http.StatusNotFound,
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeNameUnknown,
 | 
			
		||||
									ErrorCodeManifestUnknown,
 | 
			
		||||
								},
 | 
			
		||||
| 
						 | 
				
			
			@ -765,7 +742,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
							{
 | 
			
		||||
								Description: "There was a problem with the request that needs to be addressed by the client, such as an invalid `name` or `tag`.",
 | 
			
		||||
								StatusCode:  http.StatusBadRequest,
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeNameInvalid,
 | 
			
		||||
									ErrorCodeDigestInvalid,
 | 
			
		||||
								},
 | 
			
		||||
| 
						 | 
				
			
			@ -782,7 +759,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
									ContentType: "application/json; charset=utf-8",
 | 
			
		||||
									Format:      errorsBody,
 | 
			
		||||
								},
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeNameUnknown,
 | 
			
		||||
									ErrorCodeBlobUnknown,
 | 
			
		||||
								},
 | 
			
		||||
| 
						 | 
				
			
			@ -834,7 +811,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
							{
 | 
			
		||||
								Description: "There was a problem with the request that needs to be addressed by the client, such as an invalid `name` or `tag`.",
 | 
			
		||||
								StatusCode:  http.StatusBadRequest,
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeNameInvalid,
 | 
			
		||||
									ErrorCodeDigestInvalid,
 | 
			
		||||
								},
 | 
			
		||||
| 
						 | 
				
			
			@ -846,7 +823,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
							unauthorizedResponse,
 | 
			
		||||
							{
 | 
			
		||||
								StatusCode: http.StatusNotFound,
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeNameUnknown,
 | 
			
		||||
									ErrorCodeBlobUnknown,
 | 
			
		||||
								},
 | 
			
		||||
| 
						 | 
				
			
			@ -926,7 +903,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
							{
 | 
			
		||||
								Name:       "Invalid Name or Digest",
 | 
			
		||||
								StatusCode: http.StatusBadRequest,
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeDigestInvalid,
 | 
			
		||||
									ErrorCodeNameInvalid,
 | 
			
		||||
								},
 | 
			
		||||
| 
						 | 
				
			
			@ -970,7 +947,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
							{
 | 
			
		||||
								Name:       "Invalid Name or Digest",
 | 
			
		||||
								StatusCode: http.StatusBadRequest,
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeDigestInvalid,
 | 
			
		||||
									ErrorCodeNameInvalid,
 | 
			
		||||
								},
 | 
			
		||||
| 
						 | 
				
			
			@ -1024,7 +1001,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
							{
 | 
			
		||||
								Description: "There was an error processing the upload and it must be restarted.",
 | 
			
		||||
								StatusCode:  http.StatusBadRequest,
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeDigestInvalid,
 | 
			
		||||
									ErrorCodeNameInvalid,
 | 
			
		||||
									ErrorCodeBlobUploadInvalid,
 | 
			
		||||
| 
						 | 
				
			
			@ -1038,7 +1015,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
							{
 | 
			
		||||
								Description: "The upload is unknown to the registry. The upload must be restarted.",
 | 
			
		||||
								StatusCode:  http.StatusNotFound,
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeBlobUploadUnknown,
 | 
			
		||||
								},
 | 
			
		||||
								Body: BodyDescriptor{
 | 
			
		||||
| 
						 | 
				
			
			@ -1096,7 +1073,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
							{
 | 
			
		||||
								Description: "There was an error processing the upload and it must be restarted.",
 | 
			
		||||
								StatusCode:  http.StatusBadRequest,
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeDigestInvalid,
 | 
			
		||||
									ErrorCodeNameInvalid,
 | 
			
		||||
									ErrorCodeBlobUploadInvalid,
 | 
			
		||||
| 
						 | 
				
			
			@ -1110,7 +1087,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
							{
 | 
			
		||||
								Description: "The upload is unknown to the registry. The upload must be restarted.",
 | 
			
		||||
								StatusCode:  http.StatusNotFound,
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeBlobUploadUnknown,
 | 
			
		||||
								},
 | 
			
		||||
								Body: BodyDescriptor{
 | 
			
		||||
| 
						 | 
				
			
			@ -1175,7 +1152,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
							{
 | 
			
		||||
								Description: "There was an error processing the upload and it must be restarted.",
 | 
			
		||||
								StatusCode:  http.StatusBadRequest,
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeDigestInvalid,
 | 
			
		||||
									ErrorCodeNameInvalid,
 | 
			
		||||
									ErrorCodeBlobUploadInvalid,
 | 
			
		||||
| 
						 | 
				
			
			@ -1189,7 +1166,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
							{
 | 
			
		||||
								Description: "The upload is unknown to the registry. The upload must be restarted.",
 | 
			
		||||
								StatusCode:  http.StatusNotFound,
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeBlobUploadUnknown,
 | 
			
		||||
								},
 | 
			
		||||
								Body: BodyDescriptor{
 | 
			
		||||
| 
						 | 
				
			
			@ -1266,7 +1243,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
							{
 | 
			
		||||
								Description: "There was an error processing the upload and it must be restarted.",
 | 
			
		||||
								StatusCode:  http.StatusBadRequest,
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeDigestInvalid,
 | 
			
		||||
									ErrorCodeNameInvalid,
 | 
			
		||||
									ErrorCodeBlobUploadInvalid,
 | 
			
		||||
| 
						 | 
				
			
			@ -1280,7 +1257,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
							{
 | 
			
		||||
								Description: "The upload is unknown to the registry. The upload must be restarted.",
 | 
			
		||||
								StatusCode:  http.StatusNotFound,
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeBlobUploadUnknown,
 | 
			
		||||
								},
 | 
			
		||||
								Body: BodyDescriptor{
 | 
			
		||||
| 
						 | 
				
			
			@ -1321,7 +1298,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
							{
 | 
			
		||||
								Description: "An error was encountered processing the delete. The client may ignore this error.",
 | 
			
		||||
								StatusCode:  http.StatusBadRequest,
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeNameInvalid,
 | 
			
		||||
									ErrorCodeBlobUploadInvalid,
 | 
			
		||||
								},
 | 
			
		||||
| 
						 | 
				
			
			@ -1334,7 +1311,7 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
							{
 | 
			
		||||
								Description: "The upload is unknown to the registry. The client may ignore this error and assume the upload has been deleted.",
 | 
			
		||||
								StatusCode:  http.StatusNotFound,
 | 
			
		||||
								ErrorCodes: []ErrorCode{
 | 
			
		||||
								ErrorCodes: []errcode.ErrorCode{
 | 
			
		||||
									ErrorCodeBlobUploadUnknown,
 | 
			
		||||
								},
 | 
			
		||||
								Body: BodyDescriptor{
 | 
			
		||||
| 
						 | 
				
			
			@ -1350,143 +1327,11 @@ var routeDescriptors = []RouteDescriptor{
 | 
			
		|||
	},
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// ErrorDescriptors provides a list of HTTP API Error codes that may be
 | 
			
		||||
// encountered when interacting with the registry API.
 | 
			
		||||
var errorDescriptors = []ErrorDescriptor{
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeUnknown,
 | 
			
		||||
		Value:   "UNKNOWN",
 | 
			
		||||
		Message: "unknown error",
 | 
			
		||||
		Description: `Generic error returned when the error does not have an
 | 
			
		||||
		API classification.`,
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeUnsupported,
 | 
			
		||||
		Value:   "UNSUPPORTED",
 | 
			
		||||
		Message: "The operation is unsupported.",
 | 
			
		||||
		Description: `The operation was unsupported due to a missing
 | 
			
		||||
		implementation or invalid set of parameters.`,
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeUnauthorized,
 | 
			
		||||
		Value:   "UNAUTHORIZED",
 | 
			
		||||
		Message: "access to the requested resource is not authorized",
 | 
			
		||||
		Description: `The access controller denied access for the operation on
 | 
			
		||||
		a resource. Often this will be accompanied by a 401 Unauthorized
 | 
			
		||||
		response status.`,
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeDigestInvalid,
 | 
			
		||||
		Value:   "DIGEST_INVALID",
 | 
			
		||||
		Message: "provided digest did not match uploaded content",
 | 
			
		||||
		Description: `When a blob is uploaded, the registry will check that
 | 
			
		||||
		the content matches the digest provided by the client. The error may
 | 
			
		||||
		include a detail structure with the key "digest", including the
 | 
			
		||||
		invalid digest string. This error may also be returned when a manifest
 | 
			
		||||
		includes an invalid layer digest.`,
 | 
			
		||||
		HTTPStatusCodes: []int{http.StatusBadRequest, http.StatusNotFound},
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeSizeInvalid,
 | 
			
		||||
		Value:   "SIZE_INVALID",
 | 
			
		||||
		Message: "provided length did not match content length",
 | 
			
		||||
		Description: `When a layer is uploaded, the provided size will be
 | 
			
		||||
		checked against the uploaded content. If they do not match, this error
 | 
			
		||||
		will be returned.`,
 | 
			
		||||
		HTTPStatusCodes: []int{http.StatusBadRequest},
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeNameInvalid,
 | 
			
		||||
		Value:   "NAME_INVALID",
 | 
			
		||||
		Message: "invalid repository name",
 | 
			
		||||
		Description: `Invalid repository name encountered either during
 | 
			
		||||
		manifest validation or any API operation.`,
 | 
			
		||||
		HTTPStatusCodes: []int{http.StatusBadRequest, http.StatusNotFound},
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeTagInvalid,
 | 
			
		||||
		Value:   "TAG_INVALID",
 | 
			
		||||
		Message: "manifest tag did not match URI",
 | 
			
		||||
		Description: `During a manifest upload, if the tag in the manifest
 | 
			
		||||
		does not match the uri tag, this error will be returned.`,
 | 
			
		||||
		HTTPStatusCodes: []int{http.StatusBadRequest, http.StatusNotFound},
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeNameUnknown,
 | 
			
		||||
		Value:   "NAME_UNKNOWN",
 | 
			
		||||
		Message: "repository name not known to registry",
 | 
			
		||||
		Description: `This is returned if the name used during an operation is
 | 
			
		||||
		unknown to the registry.`,
 | 
			
		||||
		HTTPStatusCodes: []int{http.StatusNotFound},
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeManifestUnknown,
 | 
			
		||||
		Value:   "MANIFEST_UNKNOWN",
 | 
			
		||||
		Message: "manifest unknown",
 | 
			
		||||
		Description: `This error is returned when the manifest, identified by
 | 
			
		||||
		name and tag is unknown to the repository.`,
 | 
			
		||||
		HTTPStatusCodes: []int{http.StatusNotFound},
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeManifestInvalid,
 | 
			
		||||
		Value:   "MANIFEST_INVALID",
 | 
			
		||||
		Message: "manifest invalid",
 | 
			
		||||
		Description: `During upload, manifests undergo several checks ensuring
 | 
			
		||||
		validity. If those checks fail, this error may be returned, unless a
 | 
			
		||||
		more specific error is included. The detail will contain information
 | 
			
		||||
		the failed validation.`,
 | 
			
		||||
		HTTPStatusCodes: []int{http.StatusBadRequest},
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeManifestUnverified,
 | 
			
		||||
		Value:   "MANIFEST_UNVERIFIED",
 | 
			
		||||
		Message: "manifest failed signature verification",
 | 
			
		||||
		Description: `During manifest upload, if the manifest fails signature
 | 
			
		||||
		verification, this error will be returned.`,
 | 
			
		||||
		HTTPStatusCodes: []int{http.StatusBadRequest},
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeBlobUnknown,
 | 
			
		||||
		Value:   "BLOB_UNKNOWN",
 | 
			
		||||
		Message: "blob unknown to registry",
 | 
			
		||||
		Description: `This error may be returned when a blob is unknown to the
 | 
			
		||||
		registry in a specified repository. This can be returned with a
 | 
			
		||||
		standard get or if a manifest references an unknown layer during
 | 
			
		||||
		upload.`,
 | 
			
		||||
		HTTPStatusCodes: []int{http.StatusBadRequest, http.StatusNotFound},
 | 
			
		||||
	},
 | 
			
		||||
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeBlobUploadUnknown,
 | 
			
		||||
		Value:   "BLOB_UPLOAD_UNKNOWN",
 | 
			
		||||
		Message: "blob upload unknown to registry",
 | 
			
		||||
		Description: `If a blob upload has been cancelled or was never
 | 
			
		||||
		started, this error code may be returned.`,
 | 
			
		||||
		HTTPStatusCodes: []int{http.StatusNotFound},
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeBlobUploadInvalid,
 | 
			
		||||
		Value:   "BLOB_UPLOAD_INVALID",
 | 
			
		||||
		Message: "blob upload invalid",
 | 
			
		||||
		Description: `The blob upload encountered an error and can no
 | 
			
		||||
		longer proceed.`,
 | 
			
		||||
		HTTPStatusCodes: []int{http.StatusNotFound},
 | 
			
		||||
	},
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
var errorCodeToDescriptors map[ErrorCode]ErrorDescriptor
 | 
			
		||||
var idToDescriptors map[string]ErrorDescriptor
 | 
			
		||||
var routeDescriptorsMap map[string]RouteDescriptor
 | 
			
		||||
 | 
			
		||||
func init() {
 | 
			
		||||
	errorCodeToDescriptors = make(map[ErrorCode]ErrorDescriptor, len(errorDescriptors))
 | 
			
		||||
	idToDescriptors = make(map[string]ErrorDescriptor, len(errorDescriptors))
 | 
			
		||||
	routeDescriptorsMap = make(map[string]RouteDescriptor, len(routeDescriptors))
 | 
			
		||||
 | 
			
		||||
	for _, descriptor := range errorDescriptors {
 | 
			
		||||
		errorCodeToDescriptors[descriptor.Code] = descriptor
 | 
			
		||||
		idToDescriptors[descriptor.Value] = descriptor
 | 
			
		||||
	}
 | 
			
		||||
	for _, descriptor := range routeDescriptors {
 | 
			
		||||
		routeDescriptorsMap[descriptor.Name] = descriptor
 | 
			
		||||
	}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -1,20 +1,14 @@
 | 
			
		|||
package v2
 | 
			
		||||
 | 
			
		||||
import (
 | 
			
		||||
	"fmt"
 | 
			
		||||
	"strings"
 | 
			
		||||
	"net/http"
 | 
			
		||||
 | 
			
		||||
	"github.com/docker/distribution/registry/api/errcode"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// ErrorCode represents the error type. The errors are serialized via strings
 | 
			
		||||
// and the integer format may change and should *never* be exported.
 | 
			
		||||
type ErrorCode int
 | 
			
		||||
 | 
			
		||||
const (
 | 
			
		||||
	// ErrorCodeUnknown is a catch-all for errors not defined below.
 | 
			
		||||
	ErrorCodeUnknown ErrorCode = iota
 | 
			
		||||
 | 
			
		||||
	// ErrorCodeUnsupported is returned when an operation is not supported.
 | 
			
		||||
	ErrorCodeUnsupported
 | 
			
		||||
	ErrorCodeUnsupported = iota
 | 
			
		||||
 | 
			
		||||
	// ErrorCodeUnauthorized is returned if a request is not authorized.
 | 
			
		||||
	ErrorCodeUnauthorized
 | 
			
		||||
| 
						 | 
				
			
			@ -50,6 +44,10 @@ const (
 | 
			
		|||
	// signature verfication.
 | 
			
		||||
	ErrorCodeManifestUnverified
 | 
			
		||||
 | 
			
		||||
	// ErrorCodeManifestBlobUnknown is returned when a manifest blob is
 | 
			
		||||
	// unknown to the registry.
 | 
			
		||||
	ErrorCodeManifestBlobUnknown
 | 
			
		||||
 | 
			
		||||
	// ErrorCodeBlobUnknown is returned when a blob is unknown to the
 | 
			
		||||
	// registry. This can happen when the manifest references a nonexistent
 | 
			
		||||
	// layer or the result is not found by a blob fetch.
 | 
			
		||||
| 
						 | 
				
			
			@ -62,133 +60,133 @@ const (
 | 
			
		|||
	ErrorCodeBlobUploadInvalid
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
// ParseErrorCode attempts to parse the error code string, returning
 | 
			
		||||
// ErrorCodeUnknown if the error is not known.
 | 
			
		||||
func ParseErrorCode(s string) ErrorCode {
 | 
			
		||||
	desc, ok := idToDescriptors[s]
 | 
			
		||||
// ErrorDescriptors provides a list of HTTP API Error codes that may be
 | 
			
		||||
// encountered when interacting with the registry API.
 | 
			
		||||
var errorDescriptors = []errcode.ErrorDescriptor{
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeUnsupported,
 | 
			
		||||
		Value:   "UNSUPPORTED",
 | 
			
		||||
		Message: "The operation is unsupported.",
 | 
			
		||||
		Description: `The operation was unsupported due to a missing
 | 
			
		||||
		implementation or invalid set of parameters.`,
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeUnauthorized,
 | 
			
		||||
		Value:   "UNAUTHORIZED",
 | 
			
		||||
		Message: "access to the requested resource is not authorized",
 | 
			
		||||
		Description: `The access controller denied access for the operation on
 | 
			
		||||
		a resource. Often this will be accompanied by a 401 Unauthorized
 | 
			
		||||
		response status.`,
 | 
			
		||||
		HTTPStatusCode: http.StatusForbidden,
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeDigestInvalid,
 | 
			
		||||
		Value:   "DIGEST_INVALID",
 | 
			
		||||
		Message: "provided digest did not match uploaded content",
 | 
			
		||||
		Description: `When a blob is uploaded, the registry will check that
 | 
			
		||||
		the content matches the digest provided by the client. The error may
 | 
			
		||||
		include a detail structure with the key "digest", including the
 | 
			
		||||
		invalid digest string. This error may also be returned when a manifest
 | 
			
		||||
		includes an invalid layer digest.`,
 | 
			
		||||
		HTTPStatusCode: http.StatusBadRequest,
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeSizeInvalid,
 | 
			
		||||
		Value:   "SIZE_INVALID",
 | 
			
		||||
		Message: "provided length did not match content length",
 | 
			
		||||
		Description: `When a layer is uploaded, the provided size will be
 | 
			
		||||
		checked against the uploaded content. If they do not match, this error
 | 
			
		||||
		will be returned.`,
 | 
			
		||||
		HTTPStatusCode: http.StatusBadRequest,
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeNameInvalid,
 | 
			
		||||
		Value:   "NAME_INVALID",
 | 
			
		||||
		Message: "invalid repository name",
 | 
			
		||||
		Description: `Invalid repository name encountered either during
 | 
			
		||||
		manifest validation or any API operation.`,
 | 
			
		||||
		HTTPStatusCode: http.StatusBadRequest,
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeTagInvalid,
 | 
			
		||||
		Value:   "TAG_INVALID",
 | 
			
		||||
		Message: "manifest tag did not match URI",
 | 
			
		||||
		Description: `During a manifest upload, if the tag in the manifest
 | 
			
		||||
		does not match the uri tag, this error will be returned.`,
 | 
			
		||||
		HTTPStatusCode: http.StatusBadRequest,
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeNameUnknown,
 | 
			
		||||
		Value:   "NAME_UNKNOWN",
 | 
			
		||||
		Message: "repository name not known to registry",
 | 
			
		||||
		Description: `This is returned if the name used during an operation is
 | 
			
		||||
		unknown to the registry.`,
 | 
			
		||||
		HTTPStatusCode: http.StatusNotFound,
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeManifestUnknown,
 | 
			
		||||
		Value:   "MANIFEST_UNKNOWN",
 | 
			
		||||
		Message: "manifest unknown",
 | 
			
		||||
		Description: `This error is returned when the manifest, identified by
 | 
			
		||||
		name and tag is unknown to the repository.`,
 | 
			
		||||
		HTTPStatusCode: http.StatusNotFound,
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeManifestInvalid,
 | 
			
		||||
		Value:   "MANIFEST_INVALID",
 | 
			
		||||
		Message: "manifest invalid",
 | 
			
		||||
		Description: `During upload, manifests undergo several checks ensuring
 | 
			
		||||
		validity. If those checks fail, this error may be returned, unless a
 | 
			
		||||
		more specific error is included. The detail will contain information
 | 
			
		||||
		the failed validation.`,
 | 
			
		||||
		HTTPStatusCode: http.StatusBadRequest,
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeManifestUnverified,
 | 
			
		||||
		Value:   "MANIFEST_UNVERIFIED",
 | 
			
		||||
		Message: "manifest failed signature verification",
 | 
			
		||||
		Description: `During manifest upload, if the manifest fails signature
 | 
			
		||||
		verification, this error will be returned.`,
 | 
			
		||||
		HTTPStatusCode: http.StatusBadRequest,
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeManifestBlobUnknown,
 | 
			
		||||
		Value:   "MANIFEST_BLOB_UNKNOWN",
 | 
			
		||||
		Message: "blob unknown to registry",
 | 
			
		||||
		Description: `This error may be returned when a manifest blob is 
 | 
			
		||||
		unknown to the registry.`,
 | 
			
		||||
		HTTPStatusCode: http.StatusBadRequest,
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeBlobUnknown,
 | 
			
		||||
		Value:   "BLOB_UNKNOWN",
 | 
			
		||||
		Message: "blob unknown to registry",
 | 
			
		||||
		Description: `This error may be returned when a blob is unknown to the
 | 
			
		||||
		registry in a specified repository. This can be returned with a
 | 
			
		||||
		standard get or if a manifest references an unknown layer during
 | 
			
		||||
		upload.`,
 | 
			
		||||
		HTTPStatusCode: http.StatusNotFound,
 | 
			
		||||
	},
 | 
			
		||||
 | 
			
		||||
	if !ok {
 | 
			
		||||
		return ErrorCodeUnknown
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return desc.Code
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeBlobUploadUnknown,
 | 
			
		||||
		Value:   "BLOB_UPLOAD_UNKNOWN",
 | 
			
		||||
		Message: "blob upload unknown to registry",
 | 
			
		||||
		Description: `If a blob upload has been cancelled or was never
 | 
			
		||||
		started, this error code may be returned.`,
 | 
			
		||||
		HTTPStatusCode: http.StatusNotFound,
 | 
			
		||||
	},
 | 
			
		||||
	{
 | 
			
		||||
		Code:    ErrorCodeBlobUploadInvalid,
 | 
			
		||||
		Value:   "BLOB_UPLOAD_INVALID",
 | 
			
		||||
		Message: "blob upload invalid",
 | 
			
		||||
		Description: `The blob upload encountered an error and can no
 | 
			
		||||
		longer proceed.`,
 | 
			
		||||
		HTTPStatusCode: http.StatusNotFound,
 | 
			
		||||
	},
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Descriptor returns the descriptor for the error code.
 | 
			
		||||
func (ec ErrorCode) Descriptor() ErrorDescriptor {
 | 
			
		||||
	d, ok := errorCodeToDescriptors[ec]
 | 
			
		||||
 | 
			
		||||
	if !ok {
 | 
			
		||||
		return ErrorCodeUnknown.Descriptor()
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	return d
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// String returns the canonical identifier for this error code.
 | 
			
		||||
func (ec ErrorCode) String() string {
 | 
			
		||||
	return ec.Descriptor().Value
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Message returned the human-readable error message for this error code.
 | 
			
		||||
func (ec ErrorCode) Message() string {
 | 
			
		||||
	return ec.Descriptor().Message
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// MarshalText encodes the receiver into UTF-8-encoded text and returns the
 | 
			
		||||
// result.
 | 
			
		||||
func (ec ErrorCode) MarshalText() (text []byte, err error) {
 | 
			
		||||
	return []byte(ec.String()), nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// UnmarshalText decodes the form generated by MarshalText.
 | 
			
		||||
func (ec *ErrorCode) UnmarshalText(text []byte) error {
 | 
			
		||||
	desc, ok := idToDescriptors[string(text)]
 | 
			
		||||
 | 
			
		||||
	if !ok {
 | 
			
		||||
		desc = ErrorCodeUnknown.Descriptor()
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	*ec = desc.Code
 | 
			
		||||
 | 
			
		||||
	return nil
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Error provides a wrapper around ErrorCode with extra Details provided.
 | 
			
		||||
type Error struct {
 | 
			
		||||
	Code    ErrorCode   `json:"code"`
 | 
			
		||||
	Message string      `json:"message,omitempty"`
 | 
			
		||||
	Detail  interface{} `json:"detail,omitempty"`
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Error returns a human readable representation of the error.
 | 
			
		||||
func (e Error) Error() string {
 | 
			
		||||
	return fmt.Sprintf("%s: %s",
 | 
			
		||||
		strings.ToLower(strings.Replace(e.Code.String(), "_", " ", -1)),
 | 
			
		||||
		e.Message)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Errors provides the envelope for multiple errors and a few sugar methods
 | 
			
		||||
// for use within the application.
 | 
			
		||||
type Errors struct {
 | 
			
		||||
	Errors []Error `json:"errors,omitempty"`
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Push pushes an error on to the error stack, with the optional detail
 | 
			
		||||
// argument. It is a programming error (ie panic) to push more than one
 | 
			
		||||
// detail at a time.
 | 
			
		||||
func (errs *Errors) Push(code ErrorCode, details ...interface{}) {
 | 
			
		||||
	if len(details) > 1 {
 | 
			
		||||
		panic("please specify zero or one detail items for this error")
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	var detail interface{}
 | 
			
		||||
	if len(details) > 0 {
 | 
			
		||||
		detail = details[0]
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err, ok := detail.(error); ok {
 | 
			
		||||
		detail = err.Error()
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	errs.PushErr(Error{
 | 
			
		||||
		Code:    code,
 | 
			
		||||
		Message: code.Message(),
 | 
			
		||||
		Detail:  detail,
 | 
			
		||||
	})
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// PushErr pushes an error interface onto the error stack.
 | 
			
		||||
func (errs *Errors) PushErr(err error) {
 | 
			
		||||
	switch err.(type) {
 | 
			
		||||
	case Error:
 | 
			
		||||
		errs.Errors = append(errs.Errors, err.(Error))
 | 
			
		||||
	default:
 | 
			
		||||
		errs.Errors = append(errs.Errors, Error{Message: err.Error()})
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (errs *Errors) Error() string {
 | 
			
		||||
	switch errs.Len() {
 | 
			
		||||
	case 0:
 | 
			
		||||
		return "<nil>"
 | 
			
		||||
	case 1:
 | 
			
		||||
		return errs.Errors[0].Error()
 | 
			
		||||
	default:
 | 
			
		||||
		msg := "errors:\n"
 | 
			
		||||
		for _, err := range errs.Errors {
 | 
			
		||||
			msg += err.Error() + "\n"
 | 
			
		||||
		}
 | 
			
		||||
		return msg
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Clear clears the errors.
 | 
			
		||||
func (errs *Errors) Clear() {
 | 
			
		||||
	errs.Errors = errs.Errors[:0]
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// Len returns the current number of errors.
 | 
			
		||||
func (errs *Errors) Len() int {
 | 
			
		||||
	return len(errs.Errors)
 | 
			
		||||
// init registers our errors with the errcode system
 | 
			
		||||
func init() {
 | 
			
		||||
	errcode.LoadErrors(&errorDescriptors)
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -7,6 +7,7 @@ import (
 | 
			
		|||
	"testing"
 | 
			
		||||
 | 
			
		||||
	"github.com/docker/distribution"
 | 
			
		||||
	"github.com/docker/distribution/registry/api/errcode"
 | 
			
		||||
	"github.com/docker/distribution/registry/api/v2"
 | 
			
		||||
	"github.com/docker/distribution/testutil"
 | 
			
		||||
)
 | 
			
		||||
| 
						 | 
				
			
			@ -161,14 +162,14 @@ func TestUploadReadFrom(t *testing.T) {
 | 
			
		|||
	if err == nil {
 | 
			
		||||
		t.Fatalf("Expected error when not found")
 | 
			
		||||
	}
 | 
			
		||||
	if uploadErr, ok := err.(*v2.Errors); !ok {
 | 
			
		||||
	if uploadErr, ok := err.(*errcode.Errors); !ok {
 | 
			
		||||
		t.Fatalf("Wrong error type %T: %s", err, err)
 | 
			
		||||
	} else if len(uploadErr.Errors) != 1 {
 | 
			
		||||
		t.Fatalf("Unexpected number of errors: %d, expected 1", len(uploadErr.Errors))
 | 
			
		||||
	} else {
 | 
			
		||||
		v2Err := uploadErr.Errors[0]
 | 
			
		||||
		if v2Err.Code != v2.ErrorCodeBlobUploadInvalid {
 | 
			
		||||
			t.Fatalf("Unexpected error code: %s, expected %s", v2Err.Code.String(), v2.ErrorCodeBlobUploadInvalid.String())
 | 
			
		||||
			t.Fatalf("Unexpected error code: %s, expected %d", v2Err.Code.String(), v2.ErrorCodeBlobUploadInvalid)
 | 
			
		||||
		}
 | 
			
		||||
		if expected := "invalid upload identifier"; v2Err.Message != expected {
 | 
			
		||||
			t.Fatalf("Unexpected error message: %s, expected %s", v2Err.Message, expected)
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -7,6 +7,7 @@ import (
 | 
			
		|||
	"io/ioutil"
 | 
			
		||||
	"net/http"
 | 
			
		||||
 | 
			
		||||
	"github.com/docker/distribution/registry/api/errcode"
 | 
			
		||||
	"github.com/docker/distribution/registry/api/v2"
 | 
			
		||||
)
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -32,7 +33,7 @@ func (e *UnexpectedHTTPResponseError) Error() string {
 | 
			
		|||
}
 | 
			
		||||
 | 
			
		||||
func parseHTTPErrorResponse(r io.Reader) error {
 | 
			
		||||
	var errors v2.Errors
 | 
			
		||||
	var errors errcode.Errors
 | 
			
		||||
	body, err := ioutil.ReadAll(r)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		return err
 | 
			
		||||
| 
						 | 
				
			
			@ -51,7 +52,7 @@ func handleErrorResponse(resp *http.Response) error {
 | 
			
		|||
	if resp.StatusCode == 401 {
 | 
			
		||||
		err := parseHTTPErrorResponse(resp.Body)
 | 
			
		||||
		if uErr, ok := err.(*UnexpectedHTTPResponseError); ok {
 | 
			
		||||
			return &v2.Error{
 | 
			
		||||
			return &errcode.Error{
 | 
			
		||||
				Code:    v2.ErrorCodeUnauthorized,
 | 
			
		||||
				Message: "401 Unauthorized",
 | 
			
		||||
				Detail:  uErr.Response,
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -18,6 +18,7 @@ import (
 | 
			
		|||
	"github.com/docker/distribution/context"
 | 
			
		||||
	"github.com/docker/distribution/digest"
 | 
			
		||||
	"github.com/docker/distribution/manifest"
 | 
			
		||||
	"github.com/docker/distribution/registry/api/errcode"
 | 
			
		||||
	"github.com/docker/distribution/registry/api/v2"
 | 
			
		||||
	"github.com/docker/distribution/testutil"
 | 
			
		||||
)
 | 
			
		||||
| 
						 | 
				
			
			@ -668,7 +669,7 @@ func TestManifestUnauthorized(t *testing.T) {
 | 
			
		|||
	if err == nil {
 | 
			
		||||
		t.Fatal("Expected error fetching manifest")
 | 
			
		||||
	}
 | 
			
		||||
	v2Err, ok := err.(*v2.Error)
 | 
			
		||||
	v2Err, ok := err.(*errcode.Error)
 | 
			
		||||
	if !ok {
 | 
			
		||||
		t.Fatalf("Unexpected error type: %#v", err)
 | 
			
		||||
	}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -19,6 +19,7 @@ import (
 | 
			
		|||
	"github.com/docker/distribution/configuration"
 | 
			
		||||
	"github.com/docker/distribution/digest"
 | 
			
		||||
	"github.com/docker/distribution/manifest"
 | 
			
		||||
	"github.com/docker/distribution/registry/api/errcode"
 | 
			
		||||
	"github.com/docker/distribution/registry/api/v2"
 | 
			
		||||
	_ "github.com/docker/distribution/registry/storage/driver/inmemory"
 | 
			
		||||
	"github.com/docker/distribution/testutil"
 | 
			
		||||
| 
						 | 
				
			
			@ -373,7 +374,7 @@ func TestManifestAPI(t *testing.T) {
 | 
			
		|||
	_, p, counts := checkBodyHasErrorCodes(t, "getting unknown manifest tags", resp,
 | 
			
		||||
		v2.ErrorCodeManifestUnverified, v2.ErrorCodeBlobUnknown, v2.ErrorCodeDigestInvalid)
 | 
			
		||||
 | 
			
		||||
	expectedCounts := map[v2.ErrorCode]int{
 | 
			
		||||
	expectedCounts := map[errcode.ErrorCode]int{
 | 
			
		||||
		v2.ErrorCodeManifestUnverified: 1,
 | 
			
		||||
		v2.ErrorCodeBlobUnknown:        2,
 | 
			
		||||
		v2.ErrorCodeDigestInvalid:      2,
 | 
			
		||||
| 
						 | 
				
			
			@ -748,13 +749,13 @@ func checkResponse(t *testing.T, msg string, resp *http.Response, expectedStatus
 | 
			
		|||
// checkBodyHasErrorCodes ensures the body is an error body and has the
 | 
			
		||||
// expected error codes, returning the error structure, the json slice and a
 | 
			
		||||
// count of the errors by code.
 | 
			
		||||
func checkBodyHasErrorCodes(t *testing.T, msg string, resp *http.Response, errorCodes ...v2.ErrorCode) (v2.Errors, []byte, map[v2.ErrorCode]int) {
 | 
			
		||||
func checkBodyHasErrorCodes(t *testing.T, msg string, resp *http.Response, errorCodes ...errcode.ErrorCode) (errcode.Errors, []byte, map[errcode.ErrorCode]int) {
 | 
			
		||||
	p, err := ioutil.ReadAll(resp.Body)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		t.Fatalf("unexpected error reading body %s: %v", msg, err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	var errs v2.Errors
 | 
			
		||||
	var errs errcode.Errors
 | 
			
		||||
	if err := json.Unmarshal(p, &errs); err != nil {
 | 
			
		||||
		t.Fatalf("unexpected error decoding error response: %v", err)
 | 
			
		||||
	}
 | 
			
		||||
| 
						 | 
				
			
			@ -770,8 +771,8 @@ func checkBodyHasErrorCodes(t *testing.T, msg string, resp *http.Response, error
 | 
			
		|||
	// 		resp.Header.Get("Content-Type"))
 | 
			
		||||
	// }
 | 
			
		||||
 | 
			
		||||
	expected := map[v2.ErrorCode]struct{}{}
 | 
			
		||||
	counts := map[v2.ErrorCode]int{}
 | 
			
		||||
	expected := map[errcode.ErrorCode]struct{}{}
 | 
			
		||||
	counts := map[errcode.ErrorCode]int{}
 | 
			
		||||
 | 
			
		||||
	// Initialize map with zeros for expected
 | 
			
		||||
	for _, code := range errorCodes {
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -13,6 +13,7 @@ import (
 | 
			
		|||
	"github.com/docker/distribution/configuration"
 | 
			
		||||
	ctxu "github.com/docker/distribution/context"
 | 
			
		||||
	"github.com/docker/distribution/notifications"
 | 
			
		||||
	"github.com/docker/distribution/registry/api/errcode"
 | 
			
		||||
	"github.com/docker/distribution/registry/api/v2"
 | 
			
		||||
	"github.com/docker/distribution/registry/auth"
 | 
			
		||||
	registrymiddleware "github.com/docker/distribution/registry/middleware/registry"
 | 
			
		||||
| 
						 | 
				
			
			@ -350,7 +351,6 @@ func (app *App) dispatcher(dispatch dispatchFunc) http.Handler {
 | 
			
		|||
					context.Errors.Push(v2.ErrorCodeNameInvalid, err)
 | 
			
		||||
				}
 | 
			
		||||
 | 
			
		||||
				w.WriteHeader(http.StatusBadRequest)
 | 
			
		||||
				serveJSON(w, context.Errors)
 | 
			
		||||
				return
 | 
			
		||||
			}
 | 
			
		||||
| 
						 | 
				
			
			@ -363,8 +363,8 @@ func (app *App) dispatcher(dispatch dispatchFunc) http.Handler {
 | 
			
		|||
			context.Repository, err = applyRepoMiddleware(context.Repository, app.Config.Middleware["repository"])
 | 
			
		||||
			if err != nil {
 | 
			
		||||
				ctxu.GetLogger(context).Errorf("error initializing repository middleware: %v", err)
 | 
			
		||||
				context.Errors.Push(v2.ErrorCodeUnknown, err)
 | 
			
		||||
				w.WriteHeader(http.StatusInternalServerError)
 | 
			
		||||
				context.Errors.Push(errcode.ErrorCodeUnknown, err)
 | 
			
		||||
 | 
			
		||||
				serveJSON(w, context.Errors)
 | 
			
		||||
				return
 | 
			
		||||
			}
 | 
			
		||||
| 
						 | 
				
			
			@ -375,19 +375,14 @@ func (app *App) dispatcher(dispatch dispatchFunc) http.Handler {
 | 
			
		|||
		// own errors if they need different behavior (such as range errors
 | 
			
		||||
		// for layer upload).
 | 
			
		||||
		if context.Errors.Len() > 0 {
 | 
			
		||||
			if context.Value("http.response.status") == 0 {
 | 
			
		||||
				// TODO(stevvooe): Getting this value from the context is a
 | 
			
		||||
				// bit of a hack. We can further address with some of our
 | 
			
		||||
				// future refactoring.
 | 
			
		||||
				w.WriteHeader(http.StatusBadRequest)
 | 
			
		||||
			}
 | 
			
		||||
			app.logError(context, context.Errors)
 | 
			
		||||
 | 
			
		||||
			serveJSON(w, context.Errors)
 | 
			
		||||
		}
 | 
			
		||||
	})
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
func (app *App) logError(context context.Context, errors v2.Errors) {
 | 
			
		||||
func (app *App) logError(context context.Context, errors errcode.Errors) {
 | 
			
		||||
	for _, e := range errors.Errors {
 | 
			
		||||
		c := ctxu.WithValue(context, "err.code", e.Code)
 | 
			
		||||
		c = ctxu.WithValue(c, "err.message", e.Message)
 | 
			
		||||
| 
						 | 
				
			
			@ -444,11 +439,10 @@ func (app *App) authorized(w http.ResponseWriter, r *http.Request, context *Cont
 | 
			
		|||
			// base route is accessed. This section prevents us from making
 | 
			
		||||
			// that mistake elsewhere in the code, allowing any operation to
 | 
			
		||||
			// proceed.
 | 
			
		||||
			w.Header().Set("Content-Type", "application/json; charset=utf-8")
 | 
			
		||||
			w.WriteHeader(http.StatusForbidden)
 | 
			
		||||
 | 
			
		||||
			var errs v2.Errors
 | 
			
		||||
			var errs errcode.Errors
 | 
			
		||||
			errs.Push(v2.ErrorCodeUnauthorized)
 | 
			
		||||
 | 
			
		||||
			serveJSON(w, errs)
 | 
			
		||||
			return fmt.Errorf("forbidden: no repository name")
 | 
			
		||||
		}
 | 
			
		||||
| 
						 | 
				
			
			@ -458,10 +452,18 @@ func (app *App) authorized(w http.ResponseWriter, r *http.Request, context *Cont
 | 
			
		|||
	if err != nil {
 | 
			
		||||
		switch err := err.(type) {
 | 
			
		||||
		case auth.Challenge:
 | 
			
		||||
			// Since err.ServeHTTP will set the HTTP status code for us
 | 
			
		||||
			// we need to set the content-type here.  The serveJSON
 | 
			
		||||
			// func will try to do it but it'll be too late at that point.
 | 
			
		||||
			// I would have have preferred to just have the auth.Challenge
 | 
			
		||||
			// ServerHTTP func just add the WWW-Authenticate header and let
 | 
			
		||||
			// serveJSON set the HTTP status code and content-type but I wasn't
 | 
			
		||||
			// sure if that's an ok design change. STEVVOOE ?
 | 
			
		||||
			w.Header().Set("Content-Type", "application/json; charset=utf-8")
 | 
			
		||||
 | 
			
		||||
			err.ServeHTTP(w, r)
 | 
			
		||||
 | 
			
		||||
			var errs v2.Errors
 | 
			
		||||
			var errs errcode.Errors
 | 
			
		||||
			errs.Push(v2.ErrorCodeUnauthorized, accessRecords)
 | 
			
		||||
			serveJSON(w, errs)
 | 
			
		||||
		default:
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -9,6 +9,7 @@ import (
 | 
			
		|||
	"testing"
 | 
			
		||||
 | 
			
		||||
	"github.com/docker/distribution/configuration"
 | 
			
		||||
	"github.com/docker/distribution/registry/api/errcode"
 | 
			
		||||
	"github.com/docker/distribution/registry/api/v2"
 | 
			
		||||
	"github.com/docker/distribution/registry/auth"
 | 
			
		||||
	_ "github.com/docker/distribution/registry/auth/silly"
 | 
			
		||||
| 
						 | 
				
			
			@ -185,16 +186,18 @@ func TestNewApp(t *testing.T) {
 | 
			
		|||
		t.Fatalf("unexpected status code during request: %v", err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	/*
 | 
			
		||||
		if req.Header.Get("Content-Type") != "application/json; charset=utf-8" {
 | 
			
		||||
			t.Fatalf("unexpected content-type: %v != %v", req.Header.Get("Content-Type"), "application/json; charset=utf-8")
 | 
			
		||||
		}
 | 
			
		||||
	*/
 | 
			
		||||
 | 
			
		||||
	expectedAuthHeader := "Bearer realm=\"realm-test\",service=\"service-test\""
 | 
			
		||||
	if e, a := expectedAuthHeader, req.Header.Get("WWW-Authenticate"); e != a {
 | 
			
		||||
		t.Fatalf("unexpected WWW-Authenticate header: %q != %q", e, a)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	var errs v2.Errors
 | 
			
		||||
	var errs errcode.Errors
 | 
			
		||||
	dec := json.NewDecoder(req.Body)
 | 
			
		||||
	if err := dec.Decode(&errs); err != nil {
 | 
			
		||||
		t.Fatalf("error decoding error response: %v", err)
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -6,6 +6,7 @@ import (
 | 
			
		|||
	"github.com/docker/distribution"
 | 
			
		||||
	"github.com/docker/distribution/context"
 | 
			
		||||
	"github.com/docker/distribution/digest"
 | 
			
		||||
	"github.com/docker/distribution/registry/api/errcode"
 | 
			
		||||
	"github.com/docker/distribution/registry/api/v2"
 | 
			
		||||
	"github.com/gorilla/handlers"
 | 
			
		||||
)
 | 
			
		||||
| 
						 | 
				
			
			@ -17,7 +18,6 @@ func blobDispatcher(ctx *Context, r *http.Request) http.Handler {
 | 
			
		|||
 | 
			
		||||
		if err == errDigestNotAvailable {
 | 
			
		||||
			return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
 | 
			
		||||
				w.WriteHeader(http.StatusNotFound)
 | 
			
		||||
				ctx.Errors.Push(v2.ErrorCodeDigestInvalid, err)
 | 
			
		||||
			})
 | 
			
		||||
		}
 | 
			
		||||
| 
						 | 
				
			
			@ -53,17 +53,16 @@ func (bh *blobHandler) GetBlob(w http.ResponseWriter, r *http.Request) {
 | 
			
		|||
	desc, err := blobs.Stat(bh, bh.Digest)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		if err == distribution.ErrBlobUnknown {
 | 
			
		||||
			w.WriteHeader(http.StatusNotFound)
 | 
			
		||||
			bh.Errors.Push(v2.ErrorCodeBlobUnknown, bh.Digest)
 | 
			
		||||
		} else {
 | 
			
		||||
			bh.Errors.Push(v2.ErrorCodeUnknown, err)
 | 
			
		||||
			bh.Errors.Push(errcode.ErrorCodeUnknown, err)
 | 
			
		||||
		}
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err := blobs.ServeBlob(bh, w, r, desc.Digest); err != nil {
 | 
			
		||||
		context.GetLogger(bh).Debugf("unexpected error getting blob HTTP handler: %v", err)
 | 
			
		||||
		bh.Errors.Push(v2.ErrorCodeUnknown, err)
 | 
			
		||||
		bh.Errors.Push(errcode.ErrorCodeUnknown, err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
}
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -10,6 +10,7 @@ import (
 | 
			
		|||
	"github.com/docker/distribution"
 | 
			
		||||
	ctxu "github.com/docker/distribution/context"
 | 
			
		||||
	"github.com/docker/distribution/digest"
 | 
			
		||||
	"github.com/docker/distribution/registry/api/errcode"
 | 
			
		||||
	"github.com/docker/distribution/registry/api/v2"
 | 
			
		||||
	"github.com/gorilla/handlers"
 | 
			
		||||
)
 | 
			
		||||
| 
						 | 
				
			
			@ -36,7 +37,6 @@ func blobUploadDispatcher(ctx *Context, r *http.Request) http.Handler {
 | 
			
		|||
		if err != nil {
 | 
			
		||||
			return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
 | 
			
		||||
				ctxu.GetLogger(ctx).Infof("error resolving upload: %v", err)
 | 
			
		||||
				w.WriteHeader(http.StatusBadRequest)
 | 
			
		||||
				buh.Errors.Push(v2.ErrorCodeBlobUploadInvalid, err)
 | 
			
		||||
			})
 | 
			
		||||
		}
 | 
			
		||||
| 
						 | 
				
			
			@ -45,7 +45,6 @@ func blobUploadDispatcher(ctx *Context, r *http.Request) http.Handler {
 | 
			
		|||
		if state.Name != ctx.Repository.Name() {
 | 
			
		||||
			return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
 | 
			
		||||
				ctxu.GetLogger(ctx).Infof("mismatched repository name in upload state: %q != %q", state.Name, buh.Repository.Name())
 | 
			
		||||
				w.WriteHeader(http.StatusBadRequest)
 | 
			
		||||
				buh.Errors.Push(v2.ErrorCodeBlobUploadInvalid, err)
 | 
			
		||||
			})
 | 
			
		||||
		}
 | 
			
		||||
| 
						 | 
				
			
			@ -53,7 +52,6 @@ func blobUploadDispatcher(ctx *Context, r *http.Request) http.Handler {
 | 
			
		|||
		if state.UUID != buh.UUID {
 | 
			
		||||
			return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
 | 
			
		||||
				ctxu.GetLogger(ctx).Infof("mismatched uuid in upload state: %q != %q", state.UUID, buh.UUID)
 | 
			
		||||
				w.WriteHeader(http.StatusBadRequest)
 | 
			
		||||
				buh.Errors.Push(v2.ErrorCodeBlobUploadInvalid, err)
 | 
			
		||||
			})
 | 
			
		||||
		}
 | 
			
		||||
| 
						 | 
				
			
			@ -64,14 +62,12 @@ func blobUploadDispatcher(ctx *Context, r *http.Request) http.Handler {
 | 
			
		|||
			ctxu.GetLogger(ctx).Errorf("error resolving upload: %v", err)
 | 
			
		||||
			if err == distribution.ErrBlobUploadUnknown {
 | 
			
		||||
				return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
 | 
			
		||||
					w.WriteHeader(http.StatusNotFound)
 | 
			
		||||
					buh.Errors.Push(v2.ErrorCodeBlobUploadUnknown, err)
 | 
			
		||||
				})
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
			return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
 | 
			
		||||
				w.WriteHeader(http.StatusInternalServerError)
 | 
			
		||||
				buh.Errors.Push(v2.ErrorCodeUnknown, err)
 | 
			
		||||
				buh.Errors.Push(errcode.ErrorCodeUnknown, err)
 | 
			
		||||
			})
 | 
			
		||||
		}
 | 
			
		||||
		buh.Upload = upload
 | 
			
		||||
| 
						 | 
				
			
			@ -85,7 +81,6 @@ func blobUploadDispatcher(ctx *Context, r *http.Request) http.Handler {
 | 
			
		|||
				defer upload.Close()
 | 
			
		||||
				ctxu.GetLogger(ctx).Infof("error seeking blob upload: %v", err)
 | 
			
		||||
				return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
 | 
			
		||||
					w.WriteHeader(http.StatusBadRequest)
 | 
			
		||||
					buh.Errors.Push(v2.ErrorCodeBlobUploadInvalid, err)
 | 
			
		||||
					upload.Cancel(buh)
 | 
			
		||||
				})
 | 
			
		||||
| 
						 | 
				
			
			@ -93,7 +88,6 @@ func blobUploadDispatcher(ctx *Context, r *http.Request) http.Handler {
 | 
			
		|||
				defer upload.Close()
 | 
			
		||||
				ctxu.GetLogger(ctx).Infof("seek to wrong offest: %d != %d", nn, buh.State.Offset)
 | 
			
		||||
				return http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {
 | 
			
		||||
					w.WriteHeader(http.StatusBadRequest)
 | 
			
		||||
					buh.Errors.Push(v2.ErrorCodeBlobUploadInvalid, err)
 | 
			
		||||
					upload.Cancel(buh)
 | 
			
		||||
				})
 | 
			
		||||
| 
						 | 
				
			
			@ -125,8 +119,7 @@ func (buh *blobUploadHandler) StartBlobUpload(w http.ResponseWriter, r *http.Req
 | 
			
		|||
	blobs := buh.Repository.Blobs(buh)
 | 
			
		||||
	upload, err := blobs.Create(buh)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		w.WriteHeader(http.StatusInternalServerError) // Error conditions here?
 | 
			
		||||
		buh.Errors.Push(v2.ErrorCodeUnknown, err)
 | 
			
		||||
		buh.Errors.Push(errcode.ErrorCodeUnknown, err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -134,8 +127,7 @@ func (buh *blobUploadHandler) StartBlobUpload(w http.ResponseWriter, r *http.Req
 | 
			
		|||
	defer buh.Upload.Close()
 | 
			
		||||
 | 
			
		||||
	if err := buh.blobUploadResponse(w, r, true); err != nil {
 | 
			
		||||
		w.WriteHeader(http.StatusInternalServerError) // Error conditions here?
 | 
			
		||||
		buh.Errors.Push(v2.ErrorCodeUnknown, err)
 | 
			
		||||
		buh.Errors.Push(errcode.ErrorCodeUnknown, err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -146,7 +138,6 @@ func (buh *blobUploadHandler) StartBlobUpload(w http.ResponseWriter, r *http.Req
 | 
			
		|||
// GetUploadStatus returns the status of a given upload, identified by id.
 | 
			
		||||
func (buh *blobUploadHandler) GetUploadStatus(w http.ResponseWriter, r *http.Request) {
 | 
			
		||||
	if buh.Upload == nil {
 | 
			
		||||
		w.WriteHeader(http.StatusNotFound)
 | 
			
		||||
		buh.Errors.Push(v2.ErrorCodeBlobUploadUnknown)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
| 
						 | 
				
			
			@ -155,8 +146,7 @@ func (buh *blobUploadHandler) GetUploadStatus(w http.ResponseWriter, r *http.Req
 | 
			
		|||
	// resumable upload is supported. This will enable returning a non-zero
 | 
			
		||||
	// range for clients to begin uploading at an offset.
 | 
			
		||||
	if err := buh.blobUploadResponse(w, r, true); err != nil {
 | 
			
		||||
		w.WriteHeader(http.StatusInternalServerError) // Error conditions here?
 | 
			
		||||
		buh.Errors.Push(v2.ErrorCodeUnknown, err)
 | 
			
		||||
		buh.Errors.Push(errcode.ErrorCodeUnknown, err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -167,14 +157,13 @@ func (buh *blobUploadHandler) GetUploadStatus(w http.ResponseWriter, r *http.Req
 | 
			
		|||
// PatchBlobData writes data to an upload.
 | 
			
		||||
func (buh *blobUploadHandler) PatchBlobData(w http.ResponseWriter, r *http.Request) {
 | 
			
		||||
	if buh.Upload == nil {
 | 
			
		||||
		w.WriteHeader(http.StatusNotFound)
 | 
			
		||||
		buh.Errors.Push(v2.ErrorCodeBlobUploadUnknown)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	ct := r.Header.Get("Content-Type")
 | 
			
		||||
	if ct != "" && ct != "application/octet-stream" {
 | 
			
		||||
		w.WriteHeader(http.StatusBadRequest)
 | 
			
		||||
		buh.Errors.Push(errcode.ErrorCodeUnknown, fmt.Errorf("Bad Content-Type"))
 | 
			
		||||
		// TODO(dmcgowan): encode error
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
| 
						 | 
				
			
			@ -184,14 +173,12 @@ func (buh *blobUploadHandler) PatchBlobData(w http.ResponseWriter, r *http.Reque
 | 
			
		|||
	// Copy the data
 | 
			
		||||
	if _, err := io.Copy(buh.Upload, r.Body); err != nil {
 | 
			
		||||
		ctxu.GetLogger(buh).Errorf("unknown error copying into upload: %v", err)
 | 
			
		||||
		w.WriteHeader(http.StatusInternalServerError)
 | 
			
		||||
		buh.Errors.Push(v2.ErrorCodeUnknown, err)
 | 
			
		||||
		buh.Errors.Push(errcode.ErrorCodeUnknown, err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	if err := buh.blobUploadResponse(w, r, false); err != nil {
 | 
			
		||||
		w.WriteHeader(http.StatusInternalServerError) // Error conditions here?
 | 
			
		||||
		buh.Errors.Push(v2.ErrorCodeUnknown, err)
 | 
			
		||||
		buh.Errors.Push(errcode.ErrorCodeUnknown, err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -205,7 +192,6 @@ func (buh *blobUploadHandler) PatchBlobData(w http.ResponseWriter, r *http.Reque
 | 
			
		|||
// url of the blob.
 | 
			
		||||
func (buh *blobUploadHandler) PutBlobUploadComplete(w http.ResponseWriter, r *http.Request) {
 | 
			
		||||
	if buh.Upload == nil {
 | 
			
		||||
		w.WriteHeader(http.StatusNotFound)
 | 
			
		||||
		buh.Errors.Push(v2.ErrorCodeBlobUploadUnknown)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
| 
						 | 
				
			
			@ -214,7 +200,6 @@ func (buh *blobUploadHandler) PutBlobUploadComplete(w http.ResponseWriter, r *ht
 | 
			
		|||
 | 
			
		||||
	if dgstStr == "" {
 | 
			
		||||
		// no digest? return error, but allow retry.
 | 
			
		||||
		w.WriteHeader(http.StatusBadRequest)
 | 
			
		||||
		buh.Errors.Push(v2.ErrorCodeDigestInvalid, "digest missing")
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
| 
						 | 
				
			
			@ -222,7 +207,6 @@ func (buh *blobUploadHandler) PutBlobUploadComplete(w http.ResponseWriter, r *ht
 | 
			
		|||
	dgst, err := digest.ParseDigest(dgstStr)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		// no digest? return error, but allow retry.
 | 
			
		||||
		w.WriteHeader(http.StatusNotFound)
 | 
			
		||||
		buh.Errors.Push(v2.ErrorCodeDigestInvalid, "digest parsing failed")
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
| 
						 | 
				
			
			@ -230,8 +214,7 @@ func (buh *blobUploadHandler) PutBlobUploadComplete(w http.ResponseWriter, r *ht
 | 
			
		|||
	// Read in the data, if any.
 | 
			
		||||
	if _, err := io.Copy(buh.Upload, r.Body); err != nil {
 | 
			
		||||
		ctxu.GetLogger(buh).Errorf("unknown error copying into upload: %v", err)
 | 
			
		||||
		w.WriteHeader(http.StatusInternalServerError)
 | 
			
		||||
		buh.Errors.Push(v2.ErrorCodeUnknown, err)
 | 
			
		||||
		buh.Errors.Push(errcode.ErrorCodeUnknown, err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -246,17 +229,14 @@ func (buh *blobUploadHandler) PutBlobUploadComplete(w http.ResponseWriter, r *ht
 | 
			
		|||
	if err != nil {
 | 
			
		||||
		switch err := err.(type) {
 | 
			
		||||
		case distribution.ErrBlobInvalidDigest:
 | 
			
		||||
			w.WriteHeader(http.StatusBadRequest)
 | 
			
		||||
			buh.Errors.Push(v2.ErrorCodeDigestInvalid, err)
 | 
			
		||||
		default:
 | 
			
		||||
			switch err {
 | 
			
		||||
			case distribution.ErrBlobInvalidLength, distribution.ErrBlobDigestUnsupported:
 | 
			
		||||
				w.WriteHeader(http.StatusBadRequest)
 | 
			
		||||
				buh.Errors.Push(v2.ErrorCodeBlobUploadInvalid, err)
 | 
			
		||||
			default:
 | 
			
		||||
				ctxu.GetLogger(buh).Errorf("unknown error completing upload: %#v", err)
 | 
			
		||||
				w.WriteHeader(http.StatusInternalServerError)
 | 
			
		||||
				buh.Errors.Push(v2.ErrorCodeUnknown, err)
 | 
			
		||||
				buh.Errors.Push(errcode.ErrorCodeUnknown, err)
 | 
			
		||||
			}
 | 
			
		||||
 | 
			
		||||
		}
 | 
			
		||||
| 
						 | 
				
			
			@ -273,8 +253,7 @@ func (buh *blobUploadHandler) PutBlobUploadComplete(w http.ResponseWriter, r *ht
 | 
			
		|||
	// Build our canonical blob url
 | 
			
		||||
	blobURL, err := buh.urlBuilder.BuildBlobURL(buh.Repository.Name(), desc.Digest)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		buh.Errors.Push(v2.ErrorCodeUnknown, err)
 | 
			
		||||
		w.WriteHeader(http.StatusInternalServerError)
 | 
			
		||||
		buh.Errors.Push(errcode.ErrorCodeUnknown, err)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -287,7 +266,6 @@ func (buh *blobUploadHandler) PutBlobUploadComplete(w http.ResponseWriter, r *ht
 | 
			
		|||
// CancelBlobUpload cancels an in-progress upload of a blob.
 | 
			
		||||
func (buh *blobUploadHandler) CancelBlobUpload(w http.ResponseWriter, r *http.Request) {
 | 
			
		||||
	if buh.Upload == nil {
 | 
			
		||||
		w.WriteHeader(http.StatusNotFound)
 | 
			
		||||
		buh.Errors.Push(v2.ErrorCodeBlobUploadUnknown)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
| 
						 | 
				
			
			@ -295,7 +273,6 @@ func (buh *blobUploadHandler) CancelBlobUpload(w http.ResponseWriter, r *http.Re
 | 
			
		|||
	w.Header().Set("Docker-Upload-UUID", buh.UUID)
 | 
			
		||||
	if err := buh.Upload.Cancel(buh); err != nil {
 | 
			
		||||
		ctxu.GetLogger(buh).Errorf("error encountered canceling upload: %v", err)
 | 
			
		||||
		w.WriteHeader(http.StatusInternalServerError)
 | 
			
		||||
		buh.Errors.PushErr(err)
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -8,6 +8,7 @@ import (
 | 
			
		|||
	"github.com/docker/distribution"
 | 
			
		||||
	ctxu "github.com/docker/distribution/context"
 | 
			
		||||
	"github.com/docker/distribution/digest"
 | 
			
		||||
	"github.com/docker/distribution/registry/api/errcode"
 | 
			
		||||
	"github.com/docker/distribution/registry/api/v2"
 | 
			
		||||
	"golang.org/x/net/context"
 | 
			
		||||
)
 | 
			
		||||
| 
						 | 
				
			
			@ -27,7 +28,7 @@ type Context struct {
 | 
			
		|||
	// Errors is a collection of errors encountered during the request to be
 | 
			
		||||
	// returned to the client API. If errors are added to the collection, the
 | 
			
		||||
	// handler *must not* start the response via http.ResponseWriter.
 | 
			
		||||
	Errors v2.Errors
 | 
			
		||||
	Errors errcode.Errors
 | 
			
		||||
 | 
			
		||||
	urlBuilder *v2.URLBuilder
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -2,6 +2,7 @@ package handlers
 | 
			
		|||
 | 
			
		||||
import (
 | 
			
		||||
	"encoding/json"
 | 
			
		||||
	"github.com/docker/distribution/registry/api/errcode"
 | 
			
		||||
	"io"
 | 
			
		||||
	"net/http"
 | 
			
		||||
)
 | 
			
		||||
| 
						 | 
				
			
			@ -11,6 +12,17 @@ import (
 | 
			
		|||
// ResponseWriter.WriteHeader before this function.
 | 
			
		||||
func serveJSON(w http.ResponseWriter, v interface{}) error {
 | 
			
		||||
	w.Header().Set("Content-Type", "application/json; charset=utf-8")
 | 
			
		||||
	sc := http.StatusInternalServerError
 | 
			
		||||
 | 
			
		||||
	if errs, ok := v.(errcode.Errors); ok && errs.Len() > 0 {
 | 
			
		||||
		sc = errs.Errors[0].Code.Descriptor().HTTPStatusCode
 | 
			
		||||
		if sc == 0 {
 | 
			
		||||
			sc = http.StatusInternalServerError
 | 
			
		||||
		}
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	w.WriteHeader(sc)
 | 
			
		||||
 | 
			
		||||
	enc := json.NewEncoder(w)
 | 
			
		||||
 | 
			
		||||
	if err := enc.Encode(v); err != nil {
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -64,7 +64,6 @@ func (imh *imageManifestHandler) GetImageManifest(w http.ResponseWriter, r *http
 | 
			
		|||
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		imh.Errors.Push(v2.ErrorCodeManifestUnknown, err)
 | 
			
		||||
		w.WriteHeader(http.StatusNotFound)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -73,7 +72,6 @@ func (imh *imageManifestHandler) GetImageManifest(w http.ResponseWriter, r *http
 | 
			
		|||
		dgst, err := digestManifest(imh, sm)
 | 
			
		||||
		if err != nil {
 | 
			
		||||
			imh.Errors.Push(v2.ErrorCodeDigestInvalid, err)
 | 
			
		||||
			w.WriteHeader(http.StatusBadRequest)
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -95,14 +93,12 @@ func (imh *imageManifestHandler) PutImageManifest(w http.ResponseWriter, r *http
 | 
			
		|||
	var manifest manifest.SignedManifest
 | 
			
		||||
	if err := dec.Decode(&manifest); err != nil {
 | 
			
		||||
		imh.Errors.Push(v2.ErrorCodeManifestInvalid, err)
 | 
			
		||||
		w.WriteHeader(http.StatusBadRequest)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
	dgst, err := digestManifest(imh, &manifest)
 | 
			
		||||
	if err != nil {
 | 
			
		||||
		imh.Errors.Push(v2.ErrorCodeDigestInvalid, err)
 | 
			
		||||
		w.WriteHeader(http.StatusBadRequest)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -111,7 +107,6 @@ func (imh *imageManifestHandler) PutImageManifest(w http.ResponseWriter, r *http
 | 
			
		|||
		if manifest.Tag != imh.Tag {
 | 
			
		||||
			ctxu.GetLogger(imh).Errorf("invalid tag on manifest payload: %q != %q", manifest.Tag, imh.Tag)
 | 
			
		||||
			imh.Errors.Push(v2.ErrorCodeTagInvalid)
 | 
			
		||||
			w.WriteHeader(http.StatusBadRequest)
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -120,12 +115,10 @@ func (imh *imageManifestHandler) PutImageManifest(w http.ResponseWriter, r *http
 | 
			
		|||
		if dgst != imh.Digest {
 | 
			
		||||
			ctxu.GetLogger(imh).Errorf("payload digest does match: %q != %q", dgst, imh.Digest)
 | 
			
		||||
			imh.Errors.Push(v2.ErrorCodeDigestInvalid)
 | 
			
		||||
			w.WriteHeader(http.StatusBadRequest)
 | 
			
		||||
			return
 | 
			
		||||
		}
 | 
			
		||||
	} else {
 | 
			
		||||
		imh.Errors.Push(v2.ErrorCodeTagInvalid, "no tag or digest specified")
 | 
			
		||||
		w.WriteHeader(http.StatusBadRequest)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -152,7 +145,6 @@ func (imh *imageManifestHandler) PutImageManifest(w http.ResponseWriter, r *http
 | 
			
		|||
			imh.Errors.PushErr(err)
 | 
			
		||||
		}
 | 
			
		||||
 | 
			
		||||
		w.WriteHeader(http.StatusBadRequest)
 | 
			
		||||
		return
 | 
			
		||||
	}
 | 
			
		||||
 | 
			
		||||
| 
						 | 
				
			
			@ -180,7 +172,6 @@ func (imh *imageManifestHandler) DeleteImageManifest(w http.ResponseWriter, r *h
 | 
			
		|||
	// Once we work out schema version 2, the full deletion system will be
 | 
			
		||||
	// worked out and we can add support back.
 | 
			
		||||
	imh.Errors.Push(v2.ErrorCodeUnsupported)
 | 
			
		||||
	w.WriteHeader(http.StatusBadRequest)
 | 
			
		||||
}
 | 
			
		||||
 | 
			
		||||
// digestManifest takes a digest of the given manifest. This belongs somewhere
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
| 
						 | 
				
			
			@ -39,7 +39,6 @@ func (th *tagsHandler) GetTags(w http.ResponseWriter, r *http.Request) {
 | 
			
		|||
	if err != nil {
 | 
			
		||||
		switch err := err.(type) {
 | 
			
		||||
		case distribution.ErrRepositoryUnknown:
 | 
			
		||||
			w.WriteHeader(404)
 | 
			
		||||
			th.Errors.Push(v2.ErrorCodeNameUnknown, map[string]string{"name": th.Repository.Name()})
 | 
			
		||||
		default:
 | 
			
		||||
			th.Errors.PushErr(err)
 | 
			
		||||
| 
						 | 
				
			
			
 | 
			
		|||
		Loading…
	
		Reference in New Issue