diff -up docker-2a2f26c1979cdaed884c765ea3dd203543e7e284/registry/registry.go.entitlement docker-2a2f26c1979cdaed884c765ea3dd203543e7e284/registry/registry.go
--- docker-2a2f26c1979cdaed884c765ea3dd203543e7e284/registry/registry.go.entitlement 2014-10-30 12:47:19.638087268 -0400
+++ docker-2a2f26c1979cdaed884c765ea3dd203543e7e284/registry/registry.go 2014-10-30 12:48:30.778233169 -0400
@@ -91,12 +91,6 @@ func doRequest(req *http.Request, jar ht
if err != nil && !os.IsNotExist(err) {
return nil, nil, err
}
- hostDir = path.Join(" /etc/pki/entitlement", req.URL.Host)
- if fs1, err := ioutil.ReadDir(hostDir); err == nil {
- for _, f := range fs1 {
- fs = append(fs, f)
- }
- }
var (
pool *x509.CertPool
@@ -124,33 +118,6 @@ func doRequest(req *http.Request, jar ht
cert, err := tls.LoadX509KeyPair(path.Join(hostDir, certName), path.Join(hostDir, keyName))
if err != nil {
return nil, nil, err
- }
- certs = append(certs, &cert)
- }
- }
- if strings.HasSuffix(f.Name(), ".key") {
- keyName := f.Name()
- certName := keyName[:len(keyName)-4] + ".cert"
- if !hasFile(fs, certName) {
- return nil, nil, fmt.Errorf("Missing certificate %s for key %s", certName, keyName)
- }
- }
- if strings.HasSuffix(f.Name(), ".pem") {
- if strings.HasSuffix(f.Name(), "-key.pem") {
- keyName := f.Name()
- certName := keyName[:len(keyName)-len("-key.pem")] + ".pem"
- if !hasFile(fs, certName) {
- return nil, nil, fmt.Errorf("Missing certificate %s for key %s", certName, keyName)
- }
- } else {
- certName := f.Name()
- keyName := certName[:len(certName)-len(".pem")] + "-key.pem"
- if !hasFile(fs, keyName) {
- return nil, nil, fmt.Errorf("Missing key %s for certificate %s", keyName, certName)
- }
- cert, err := tls.LoadX509KeyPair(path.Join(hostDir, certName), path.Join(hostDir, keyName))
- if err != nil {
- return nil, nil, err
}
certs = append(certs, &cert)
}