summaryrefslogtreecommitdiff
path: root/docker/auth/auth.py
diff options
context:
space:
mode:
authorJoffrey F <joffrey@docker.com>2014-08-22 17:28:59 +0200
committerJoffrey F <joffrey@docker.com>2014-08-22 17:28:59 +0200
commitbe831c1130cbd7ded46c2245f81bee92fdc5a167 (patch)
tree827b32086d434891729870c9795aa403bd36e0f3 /docker/auth/auth.py
parentc76fd8d91481d33cee6fcfaa61025c12caa95b98 (diff)
downloaddocker-py-insecure_registry.tar.gz
Don't fallback to HTTP unless insecure_registry is specified when pushing/pullinginsecure_registry
Diffstat (limited to 'docker/auth/auth.py')
-rw-r--r--docker/auth/auth.py18
1 files changed, 12 insertions, 6 deletions
diff --git a/docker/auth/auth.py b/docker/auth/auth.py
index 0bd386d..c13eed4 100644
--- a/docker/auth/auth.py
+++ b/docker/auth/auth.py
@@ -34,17 +34,22 @@ def swap_protocol(url):
return url
-def expand_registry_url(hostname):
+def expand_registry_url(hostname, insecure=False):
if hostname.startswith('http:') or hostname.startswith('https:'):
if '/' not in hostname[9:]:
hostname = hostname + '/v1/'
return hostname
if utils.ping('https://' + hostname + '/v1/_ping'):
return 'https://' + hostname + '/v1/'
- return 'http://' + hostname + '/v1/'
+ elif insecure:
+ return 'http://' + hostname + '/v1/'
+ else:
+ raise errors.DockerException(
+ "HTTPS endpoint unresponsive and insecure mode isn't enabled."
+ )
-def resolve_repository_name(repo_name):
+def resolve_repository_name(repo_name, insecure=False):
if '://' in repo_name:
raise errors.InvalidRepository(
'Repository name cannot contain a scheme ({0})'.format(repo_name))
@@ -56,11 +61,12 @@ def resolve_repository_name(repo_name):
raise errors.InvalidRepository(
'Invalid repository name ({0})'.format(repo_name))
- if 'index.docker.io' in parts[0]:
+ if 'index.docker.io' in parts[0] or 'registry.hub.docker.com' in parts[0]:
raise errors.InvalidRepository(
- 'Invalid repository name, try "{0}" instead'.format(parts[1]))
+ 'Invalid repository name, try "{0}" instead'.format(parts[1])
+ )
- return expand_registry_url(parts[0]), parts[1]
+ return expand_registry_url(parts[0], insecure), parts[1]
def resolve_authconfig(authconfig, registry=None):