OpenShift auth handler for v2 docker registry#1472
OpenShift auth handler for v2 docker registry#1472openshift-bot merged 2 commits intoopenshift:masterfrom
Conversation
pkg/dockerregistry/auth/openshift.go
Outdated
There was a problem hiding this comment.
I would remove this method and just return http.StatusUnauthorized directly in ServeHTTP
3e4df76 to
d02d9d6
Compare
|
@ncdc tested the code (docker push/pull is working as expected) |
5bdf21d to
a0deb83
Compare
|
@ncdc updated, please review |
|
Looks like you might need to run gofmt on test/integration/v2_docker_registry_test.go, according to travis. |
a0deb83 to
05edc87
Compare
pkg/dockerregistry/auth/openshift.go
Outdated
There was a problem hiding this comment.
I'm not sure I like this being a struct. Could we remove it and modify VerifyOpenShiftAccess to take in the 4 fields as arguments instead?
05edc87 to
f39ef9c
Compare
|
@ncdc updated as per your feedback, please review |
There was a problem hiding this comment.
Don't use println. t.Logf is ok
f39ef9c to
e384ee7
Compare
|
@ncdc PTAL |
|
[test] Sent from my iPhone
|
|
continuous-integration/openshift-jenkins/test SUCCESS (https://ci.openshift.redhat.com/jenkins/job/test_pull_requests_openshift3/1737/) |
|
[test] |
|
[test] Sent from my iPhone
|
|
LGTM [merge] |
|
continuous-integration/openshift-jenkins/merge SUCCESS (https://ci.openshift.redhat.com/jenkins/job/test_pull_requests_openshift3/1737/) (Image: devenv-fedora_1235) |
|
exec flake, [merge] |
|
Evaluated for origin up to e384ee7 |
|
Is there a link to a story or a short description somewhere of what this PR enables? I'm guessing this will start enforcing who can push/pull images to the registry. |
|
I see the policy is being updated to have a 'images' group. |
|
@brenton the card is here: https://trello.com/c/IdJ6y0Wt/295-5-registry-authentication-authorization-imageregistry-codefreeze A user will be able to push to an image repository in the OpenShift registry if they have edit or admin rights to a project. For pull, view/edit/admin rights. Once Docker 1.6 is out and we've switching to using the v2 registry, we'll be securing access to /images and /imageStreamMappings so that only the v2 registry may access those routes. Users will be allowed to access /imageStreams, /imageStreamTags, and /imageStreamImages. See #1652 |
|
Thanks Andy. This is perfect. |
…service-catalog/' changes from 892b0368f0..3064247d05 3064247d05 origin build: add origin tooling 48ecff1 Chart changes for 0.1.2 (openshift#1527) 8727247 Fix change validator to look up serviceclass properly (openshift#1518) b0b138b Broker Reconciliation occurs too frequently (openshift#1514) cc816eb When a SI is unbindable, mark the binding request failed. (openshift#1522) 41290e9 Clarify semantics around RelistDuration (openshift#1516) 6bcb593 Send Context with UpdateInstanceRequest (openshift#1517) c3b72d8 Enforce stricly increasing broker relistRequests (openshift#1515) 01d81e5 Follow up from openshift#1450 and openshift#1444 (openshift#1504) 5e77882 Retry failed deprovision requests (openshift#1505) f6c891d Allow updates of instances that failed a previous update. (openshift#1502) 5107086 Use Plan ID from ExternalProperties when deprovisioning instance (openshift#1501) d897c60 Adding message builder for expected event strings (openshift#1465) 9f6152e update osb client and freeze gorilla context (openshift#1496) c63277e Add unit tests verifying deleting a resource with an on-going operation or in orphan mitigation. (openshift#1490) 4ecca16 Pretty logging for controller_instance.go (openshift#1472) c232db4 Register qemu statics when building non-amd64 images (openshift#1494) 0e54c57 fix 'Spring Cloud Services -> Configuring with Vault' link in docs (openshift#1495) REVERT: 892b0368f0 origin build: add origin tooling git-subtree-dir: cmd/service-catalog/go/src/github.com/kubernetes-incubator/service-catalog git-subtree-split: 3064247d0544aa43f976d93caea0a11771434ef7
* Working on controller instance. * Finished working controller_instance.go.
No description provided.