You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
When a 200 OK or 401 Unauthorized response is returned, the “Docker-Distribution-API-Version” header should be set to “registry/2.0”. Clients may require this header value to determine if the endpoint serves this API.
So the implicit assumption is that if you only want to ping, the 401 is as good a response as 200.
However, currently reg regards 401 as a ping error.
reg version
reg:
version :
git hash :
go version : go1.13.4
go compiler : gc
platform : linux/amd64
reg tags quay.io/kubernetes-ingress-controller/nginx-ingress-controller
INFO[0000] domain: quay.io
INFO[0000] server address: quay.io
Get https://quay.io/v2/: http: non-successful response (status=401 body="{\"error\": \"Invalid bearer token format\"}")
reg tags --skip-ping quay.io/kubernetes-ingress-controller/nginx-ingress-controller
INFO[0000] domain: quay.io
INFO[0000] server address: quay.io
0
0.10.0
0.10.1
Impact: when using quay.io registry (and also azure cloud registry and other less popular ones) every user needs to wildly troubleshoot until they discover they need --skip-ping option. That's confusing.
The text was updated successfully, but these errors were encountered:
Per Docker v2 API Specification:
So the implicit assumption is that if you only want to ping, the 401 is as good a response as 200.
However, currently
reg
regards 401 as a ping error.Impact: when using quay.io registry (and also azure cloud registry and other less popular ones) every user needs to wildly troubleshoot until they discover they need
--skip-ping
option. That's confusing.The text was updated successfully, but these errors were encountered: