Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Pullthrough broken registry server #13283

Conversation

legionus
Copy link
Contributor

@legionus legionus commented Mar 7, 2017

If remote registry server does not return all necessary headers (such as Content-Range or Content-Length) we can not use http.ServeContent to pull through it. In this case we fallback to io.Copy.

@legionus legionus requested a review from miminar March 7, 2017 16:33
@legionus
Copy link
Contributor Author

legionus commented Mar 7, 2017

@mfojtik FYI

@legionus legionus requested a review from soltysh March 7, 2017 16:34
@legionus legionus self-assigned this Mar 7, 2017
Copy link
Contributor

@smarterclayton smarterclayton left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Needs a test


// Check whether remoteReader is seekable. The remoteReader' Seek method must work: ServeContent uses
// a seek to the end of the content to determine its size.
if _, err := remoteReader.Seek(0, os.SEEK_END); err != nil {
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This seems fairly fragile - how do we actually verify this doesn't regress in the future?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@smarterclayton This test is about the acknowledgment that the remoteReader is really io.ReadSeeker. Acording documentation the http.ServeContent uses a seek to the end of the content to determine its size.

Basically, the problem hidden deeply inside the docker's client library. They return an object with io.ReadSeeker interface which in fact isn't seekable. I can understand them, because if they don't know the final size of the content, it's impossible to move through it.

So the regression can't happen until the http.ServeContent accepts io.ReadSeeker as argument. If it stops doing that, then it will regress in golang.

/cc @mfojtik @dmage

return distribution.Descriptor{}, err
}

if contentHandled {
return desc, nil
}
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

This should set Content-Length as well.

Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Only when ServeContent doesn't run.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@smarterclayton ServeContent will replace anyway.

Copy link
Contributor

@soltysh soltysh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Needs a test, I agree with Clayton on that. Otherwise I'm ok with it.

@legionus legionus force-pushed the dockerregistry-pullthrough-broken-registry branch 2 times, most recently from da363f7 to baf3234 Compare March 10, 2017 12:16
@legionus
Copy link
Contributor Author

Comments addressed.

Copy link
Contributor

@soltysh soltysh left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

lgtm

@@ -104,10 +107,40 @@ func (pbs *pullthroughBlobStore) Get(ctx context.Context, dgst digest.Digest) ([
// setResponseHeaders sets the appropriate content serving headers
func setResponseHeaders(w http.ResponseWriter, length int64, mediaType string, digest digest.Digest) {
w.Header().Set("Content-Type", mediaType)
w.Header().Set("Content-Length", fmt.Sprintf("%d", length))
Copy link

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Let http.ServeContent set this. The value will be shorter than length for range requests. Set it only in case http.ServeContent doesn't run.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@miminar done

@legionus legionus force-pushed the dockerregistry-pullthrough-broken-registry branch from baf3234 to f298117 Compare March 13, 2017 10:03
@miminar
Copy link

miminar commented Mar 13, 2017

[test]

@miminar
Copy link

miminar commented Mar 13, 2017

@legionus
Copy link
Contributor Author

Flake #13288

@legionus
Copy link
Contributor Author

[test]

@openshift-bot
Copy link
Contributor

Evaluated for origin test up to f298117

@openshift-bot
Copy link
Contributor

continuous-integration/openshift-jenkins/test SUCCESS (https://ci.openshift.redhat.com/jenkins/job/test_pull_request_origin/181/) (Base Commit: f617108)

@legionus
Copy link
Contributor Author

[merge]

@mfojtik
Copy link
Contributor

mfojtik commented Mar 14, 2017

LGTM

@openshift-bot
Copy link
Contributor

Evaluated for origin merge up to f298117

@openshift-bot
Copy link
Contributor

openshift-bot commented Mar 14, 2017

continuous-integration/openshift-jenkins/merge SUCCESS (https://ci.openshift.redhat.com/jenkins/job/merge_pull_request_origin/79/) (Base Commit: c9eff77) (Image: devenv-rhel7_6067)

@openshift-bot openshift-bot merged commit 1ae9449 into openshift:master Mar 14, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants