From d668d985910fa17b969f3770b5e5be8378aa384b Mon Sep 17 00:00:00 2001 From: megh Date: Thu, 19 Oct 2023 15:23:02 -0600 Subject: [PATCH] redundant comments --- .../Carrier/ContainerRegistryApi/Authorization.hs | 12 ------------ 1 file changed, 12 deletions(-) diff --git a/src/Control/Carrier/ContainerRegistryApi/Authorization.hs b/src/Control/Carrier/ContainerRegistryApi/Authorization.hs index b4f609d2e5..693770bfa7 100644 --- a/src/Control/Carrier/ContainerRegistryApi/Authorization.hs +++ b/src/Control/Carrier/ContainerRegistryApi/Authorization.hs @@ -100,18 +100,6 @@ applyAuthToken (Just (BearerAuthToken token)) r = -- blobs/manifest are retrieved cloud vendor may throw 'Bad Request' error. stripAuthHeaderOnRedirect :: Request -> Request stripAuthHeaderOnRedirect r = r{shouldStripHeaderOnRedirect = (== hAuthorization)} - -- if ((isAwsECR || isAzure || isDocker) && (method r == methodGet || method r == methodHead)) - -- then r{shouldStripHeaderOnRedirect = (== hAuthorization)} - -- else r - -- where - -- isAwsECR :: Bool - -- isAwsECR = "amazonaws.com" `isInfixOf` decodeUtf8 (host r) - - -- isAzure :: Bool - -- isAzure = "azurecr.io" `isInfixOf` decodeUtf8 (host r) - - -- isDocker :: Bool - -- isDocker = "docker.io" `isInfixOf` decodeUtf8 (host r) -- | Generates Auth Token For Request. --