Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat: add support for client tls on a per registry basis #708

Closed
wants to merge 7 commits into from

Conversation

darkdragn
Copy link

Added a --registry-tls switch, using key=value style string, supporting keys [registry,cert,key] allowing multiple tls certs.

@googlebot
Copy link

Thanks for your pull request. It looks like this may be your first contribution to a Google open source project (if not, look below for help). Before we can look at your pull request, you'll need to sign a Contributor License Agreement (CLA).

📝 Please visit https://cla.developers.google.com/ to sign.

Once you've signed (or fixed any issues), please reply here (e.g. I signed it!) and we'll verify it.


What to do if you already signed the CLA

Individual signers
Corporate signers

ℹ️ Googlers: Go here for more info.

@darkdragn
Copy link
Author

I signed it!

@googlebot
Copy link

CLAs look good, thanks!

ℹ️ Googlers: Go here for more info.

@darkdragn darkdragn changed the title Added support for client tls on a per registry basis feat: add support for client tls on a per registry basis Jun 29, 2019
Copy link
Contributor

@tejal29 tejal29 left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@darkdragn Thanks for the PR.
Can you please add some tests?

@darkdragn
Copy link
Author

@tejal29 Sorry about the delay, it's been a busy week. I'll try adding some throughout the week, but I'll have some up by this weekend at the latest. Let me know if that time frame doesn't work, if we're trying to make it into a beta/milestone/something, and I'll do what I can to move some work around and get to it earlier.

@tejal29
Copy link
Contributor

tejal29 commented Sep 21, 2019

no worries @darkdragn. Thanks!

@bputt
Copy link

bputt commented Jan 9, 2020

@darkdragn thanks for this PR, it's extremely useful and I'd love to see it merged. Would you be able to write the tests?

@tejal29
Copy link
Contributor

tejal29 commented Jan 30, 2020

@bputt do you want to take this up?

@bputt
Copy link

bputt commented Jan 30, 2020

@tejal29 I'm not a go dev, but prob could figure it out if I want this to get merged into master ;)....Can confirm it works in prod (test it live!)

@antechrestos
Copy link
Contributor

antechrestos commented Feb 6, 2020

@tejal29 @darkdragn this job looks great. I am eager to take this up if needed. It would be too bad to lose it.

@bputt
Copy link

bputt commented Feb 6, 2020

@antechrestos feel free, it'd be much appreciated

@antechrestos
Copy link
Contributor

@bputt to do so I have two scenarios

  1. create another pull request with a cherry-pick of @darkdragn job

  2. ask @darkdragn to make me contributor of his cloned repository

@bputt
Copy link

bputt commented Feb 6, 2020

@antechrestos I like option 1

@antechrestos
Copy link
Contributor

I would like @tejal29 's point of view. Best of all would be @darkdragn 's return 😏

@antechrestos
Copy link
Contributor

antechrestos commented Feb 7, 2020

@tejal29 @bputt in fact I've just tested it against my companies' registry that uses a self-signed certificate and found out that this change does not bring what I was looking for. Looking further, I found out that this change uses an ssl authentication and does not import the registry certificate. I tested to use ssl authentication on gitlab registry and did not succeeded.

I am going to submit a new PR that allows user to import a registry certificate.

See #1037

@antechrestos
Copy link
Contributor

@darkdragn does the change brought by #1037 suits your needs? If so, could you close this PR?
Thanks.

@bputt
Copy link

bputt commented Mar 16, 2020

@antechrestos I can test the change once you release a newer version and push it up to dockerhub

@antechrestos
Copy link
Contributor

@bputt I am not a core contributor. Hence I cannot make a release.

However you may checkout the project and run a make image to build the image locally. Otherwise we shall wait for 0.19 to be released.

@googlebot googlebot added the cla: yes CLA signed by all commit authors label May 20, 2020
@tejal29
Copy link
Contributor

tejal29 commented May 20, 2020

@antechrestos you can make a docker image and push it docker hub if you have access to a public registry.

All you have to do is run make images

REGISTRY=<your-registry> make images

and then you can push the images via docker command.

@antechrestos
Copy link
Contributor

@bputt #1037 was released in 0.19 and the current version is 0.22.
Can you confirm us that your problem is solved?

@tejal29 the current change brought by this pull request was to provide a key pair of key to authenticate against a private registry?

It seems to be the analogue of protecting the daemon socket

Because currently we already have options to provide per registry certificates option.

@darkdragn can you confirm us that this pull request can be closed?

@tejal29
Copy link
Contributor

tejal29 commented May 20, 2020

@bputt #1037 was released in 0.19 and the current version is 0.22.
Can you confirm us that your problem is solved?

@tejal29 the current change brought by this pull request was to provide a key pair of key to authenticate against a private registry?

It seems to be the analogue of protecting the daemon socket

Because currently we already have options to provide per registry certificates option.

@darkdragn can you confirm us that this pull request can be closed?

Thanks @antechrestos for the explanation. Will wait for @darkdragn response.

@tejal29
Copy link
Contributor

tejal29 commented Jul 28, 2020

closing due to inactivity

@tejal29 tejal29 closed this Jul 28, 2020
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
cla: yes CLA signed by all commit authors needs-rebase needs-unit-tests
Projects
None yet
Development

Successfully merging this pull request may close these issues.

6 participants