-
Notifications
You must be signed in to change notification settings - Fork 4.7k
OpenShift auth handler for v2 docker registry #1472
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OpenShift auth handler for v2 docker registry #1472
Conversation
} | ||
|
||
// Status returns the HTTP Response Status Code for this authChallenge. | ||
func (ac *authChallenge) Status() int { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I would remove this method and just return http.StatusUnauthorized
directly in ServeHTTP
3e4df76
to
d02d9d6
Compare
@ncdc tested the code (docker push/pull is working as expected) |
5bdf21d
to
a0deb83
Compare
@ncdc updated, please review |
Looks like you might need to run gofmt on test/integration/v2_docker_registry_test.go, according to travis. |
a0deb83
to
05edc87
Compare
|
||
var _ registryauth.Challenge = &authChallenge{} | ||
|
||
type OpenShiftAccess struct { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I'm not sure I like this being a struct. Could we remove it and modify VerifyOpenShiftAccess
to take in the 4 fields as arguments instead?
05edc87
to
f39ef9c
Compare
@ncdc updated as per your feedback, please review |
}, | ||
} | ||
for _, item := range table { | ||
fmt.Println("Processing item: %s", item) |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Don't use println. t.Logf is ok
expectedError: nil, | ||
}, | ||
} | ||
for _, item := range table { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
rename item to test
f39ef9c
to
e384ee7
Compare
@ncdc PTAL |
[test] Sent from my iPhone
|
continuous-integration/openshift-jenkins/test SUCCESS (https://ci.openshift.redhat.com/jenkins/job/test_pull_requests_openshift3/1737/) |
[test] |
[test] Sent from my iPhone
|
LGTM [merge] |
continuous-integration/openshift-jenkins/merge SUCCESS (https://ci.openshift.redhat.com/jenkins/job/test_pull_requests_openshift3/1737/) (Image: devenv-fedora_1235) |
exec flake, [merge] |
Evaluated for origin up to e384ee7 |
Is there a link to a story or a short description somewhere of what this PR enables? I'm guessing this will start enforcing who can push/pull images to the registry. |
I see the policy is being updated to have a 'images' group. |
@brenton the card is here: https://trello.com/c/IdJ6y0Wt/295-5-registry-authentication-authorization-imageregistry-codefreeze A user will be able to push to an image repository in the OpenShift registry if they have edit or admin rights to a project. For pull, view/edit/admin rights. Once Docker 1.6 is out and we've switching to using the v2 registry, we'll be securing access to /images and /imageStreamMappings so that only the v2 registry may access those routes. Users will be allowed to access /imageStreams, /imageStreamTags, and /imageStreamImages. See #1652 |
Thanks Andy. This is perfect. |
…service-catalog/' changes from 892b0368f0..3064247d05 3064247d05 origin build: add origin tooling 48ecff1 Chart changes for 0.1.2 (openshift#1527) 8727247 Fix change validator to look up serviceclass properly (openshift#1518) b0b138b Broker Reconciliation occurs too frequently (openshift#1514) cc816eb When a SI is unbindable, mark the binding request failed. (openshift#1522) 41290e9 Clarify semantics around RelistDuration (openshift#1516) 6bcb593 Send Context with UpdateInstanceRequest (openshift#1517) c3b72d8 Enforce stricly increasing broker relistRequests (openshift#1515) 01d81e5 Follow up from openshift#1450 and openshift#1444 (openshift#1504) 5e77882 Retry failed deprovision requests (openshift#1505) f6c891d Allow updates of instances that failed a previous update. (openshift#1502) 5107086 Use Plan ID from ExternalProperties when deprovisioning instance (openshift#1501) d897c60 Adding message builder for expected event strings (openshift#1465) 9f6152e update osb client and freeze gorilla context (openshift#1496) c63277e Add unit tests verifying deleting a resource with an on-going operation or in orphan mitigation. (openshift#1490) 4ecca16 Pretty logging for controller_instance.go (openshift#1472) c232db4 Register qemu statics when building non-amd64 images (openshift#1494) 0e54c57 fix 'Spring Cloud Services -> Configuring with Vault' link in docs (openshift#1495) REVERT: 892b0368f0 origin build: add origin tooling git-subtree-dir: cmd/service-catalog/go/src/github.com/kubernetes-incubator/service-catalog git-subtree-split: 3064247d0544aa43f976d93caea0a11771434ef7
* Working on controller instance. * Finished working controller_instance.go.
No description provided.