mirror of https://github.com/docker/docs.git
Merge pull request #469 from endophage/fixing_468
Offline operation when server not reachable
This commit is contained in:
commit
b6b5acb0a1
|
@ -395,10 +395,11 @@ func getTransport(config *viper.Viper, gun string, readOnly bool) http.RoundTrip
|
|||
TLSClientConfig: tlsConfig,
|
||||
DisableKeepAlives: true,
|
||||
}
|
||||
return tokenAuth(config, base, gun, readOnly)
|
||||
trustServerURL := getRemoteTrustServer(config)
|
||||
return tokenAuth(trustServerURL, base, gun, readOnly)
|
||||
}
|
||||
|
||||
func tokenAuth(config *viper.Viper, baseTransport *http.Transport, gun string,
|
||||
func tokenAuth(trustServerURL string, baseTransport *http.Transport, gun string,
|
||||
readOnly bool) http.RoundTripper {
|
||||
|
||||
// TODO(dmcgowan): add notary specific headers
|
||||
|
@ -407,7 +408,6 @@ func tokenAuth(config *viper.Viper, baseTransport *http.Transport, gun string,
|
|||
Transport: authTransport,
|
||||
Timeout: 5 * time.Second,
|
||||
}
|
||||
trustServerURL := getRemoteTrustServer(config)
|
||||
endpoint, err := url.Parse(trustServerURL)
|
||||
if err != nil {
|
||||
fatalf("Could not parse remote trust server url (%s): %s", trustServerURL, err.Error())
|
||||
|
@ -426,9 +426,20 @@ func tokenAuth(config *viper.Viper, baseTransport *http.Transport, gun string,
|
|||
}
|
||||
resp, err := pingClient.Do(req)
|
||||
if err != nil {
|
||||
fatalf(err.Error())
|
||||
logrus.Errorf("could not reach %s: %s", trustServerURL, err.Error())
|
||||
logrus.Info("continuing in offline mode")
|
||||
return nil
|
||||
}
|
||||
// non-nil err means we must close body
|
||||
defer resp.Body.Close()
|
||||
if resp.StatusCode < http.StatusOK || resp.StatusCode >= http.StatusMultipleChoices {
|
||||
// If we didn't get a 2XX range status code, we're not talking to a notary server.
|
||||
// The http client should be configured to handle redirects so at this point, 3XX is
|
||||
// not a valid status code.
|
||||
logrus.Errorf("could not reach %s: %d", trustServerURL, resp.StatusCode)
|
||||
logrus.Info("continuing in offline mode")
|
||||
return nil
|
||||
}
|
||||
|
||||
challengeManager := auth.NewSimpleChallengeManager()
|
||||
if err := challengeManager.AddResponse(resp); err != nil {
|
||||
|
|
|
@ -0,0 +1,34 @@
|
|||
package main
|
||||
|
||||
import (
|
||||
"net/http"
|
||||
"net/http/httptest"
|
||||
"testing"
|
||||
|
||||
"github.com/stretchr/testify/require"
|
||||
)
|
||||
|
||||
func TestTokenAuth(t *testing.T) {
|
||||
var (
|
||||
readOnly bool
|
||||
baseTransport = &http.Transport{}
|
||||
gun = "test"
|
||||
)
|
||||
require.Nil(t, tokenAuth("https://localhost:9999", baseTransport, gun, readOnly))
|
||||
}
|
||||
|
||||
func NotFoundTestHandler(w http.ResponseWriter, r *http.Request) {
|
||||
w.WriteHeader(404)
|
||||
}
|
||||
|
||||
func TestTokenAuthNon200Status(t *testing.T) {
|
||||
var (
|
||||
readOnly bool
|
||||
baseTransport = &http.Transport{}
|
||||
gun = "test"
|
||||
)
|
||||
s := httptest.NewServer(http.HandlerFunc(NotFoundTestHandler))
|
||||
defer s.Close()
|
||||
|
||||
require.Nil(t, tokenAuth(s.URL, baseTransport, gun, readOnly))
|
||||
}
|
|
@ -85,6 +85,9 @@ func NewHTTPStore(baseURL, metaPrefix, metaExtension, targetsPrefix, keyExtensio
|
|||
if !base.IsAbs() {
|
||||
return nil, errors.New("HTTPStore requires an absolute baseURL")
|
||||
}
|
||||
if roundTrip == nil {
|
||||
return &OfflineStore{}, nil
|
||||
}
|
||||
return &HTTPStore{
|
||||
baseURL: *base,
|
||||
metaPrefix: metaPrefix,
|
||||
|
|
|
@ -260,3 +260,9 @@ func TestHTTPStoreRemoveAll(t *testing.T) {
|
|||
err = store.RemoveAll()
|
||||
assert.Error(t, err)
|
||||
}
|
||||
|
||||
func TestHTTPOffline(t *testing.T) {
|
||||
s, err := NewHTTPStore("https://localhost/", "", "", "", "", nil)
|
||||
assert.NoError(t, err)
|
||||
assert.IsType(t, &OfflineStore{}, s)
|
||||
}
|
||||
|
|
Loading…
Reference in New Issue