Commit graph

19 commits

Author SHA1 Message Date
Jess Frazelle d959057b30
fix staticcheck
Signed-off-by: Jess Frazelle <acidburn@microsoft.com>
2019-01-02 11:55:23 -05:00
Jessica Tracy 32589e90be Passing context (#163)
* passing context in layer calls

* more contexting

* clair folder and context in handlers

* fixed token transport to reuse request context

* tests

* taking out context pass in server handlers
2018-12-29 12:09:10 -05:00
Pirmin Tapken 56104f3f9b Fix token transport memory leak (#165)
* Test for TokenTransport proving memory leak

* Fix memory leak on wrong auth challenge header

* Add test for memory leak during authentication

The body of the first request must be closed before doing the request to
the authentication service

* Fix memory leak during authentication
2018-12-11 15:12:21 -05:00
Jamie 83c621c4a7 support 'access_token' for compatibility with OAuth 2.0 https://docs.docker.com/registry/spec/auth/token/#requesting-a-token (#124) 2018-11-14 10:01:36 -05:00
Knut Ahlers eb4e1cc686 Fix vuln scanning on GCR (#152)
Signed-off-by: Knut Ahlers <knut@ahlers.me>
2018-10-17 00:53:20 -07:00
Pat Gavlin 65b2c0329d Use a distinguished error value for basic auth. (#120)
Rather than returning an error that requires pattern-matching from
`parseChallenge` when the challenge header requires basic
authentication, return a distinguished error value. This makes checking
for this error a bit easier.

This commit also updates the check in `r.Headers` to use the new error
value and adds a couple of regression tests.
2018-07-26 14:13:58 -07:00
Jan-Otto Kröpke a8549a2c40 when uploading layers reuse token so reader isn't closed premature. (#103) 2018-07-08 09:42:04 -04:00
Jess Frazelle 73712bf067
add clair integration tests
Signed-off-by: Jess Frazelle <acidburn@microsoft.com>
2018-06-12 10:04:35 -04:00
Jess Frazelle 5f1abe4779
cleanup
Signed-off-by: Jess Frazelle <acidburn@microsoft.com>
2018-06-11 13:33:09 -04:00
Jess Frazelle 294bae7b50
fix token
Signed-off-by: Jess Frazelle <acidburn@microsoft.com>
2018-06-06 15:47:08 -04:00
Casey Lee 17625873c8 use the http transport on the registry to support -k (#77) 2018-03-06 11:53:19 -05:00
Jess Frazelle e3777763fb
cleanup staticcheck errors
Signed-off-by: Jess Frazelle <acidburn@microsoft.com>
2017-12-11 13:39:02 -05:00
Jess Frazelle 83ba4b225a
add versions and binaries
Signed-off-by: Jess Frazelle <acidburn@google.com>
2017-06-05 17:46:12 -04:00
Jess Frazelle 0dbc9338a6
auth service fix for token
Signed-off-by: Jess Frazelle <acidburn@google.com>
2017-06-05 15:08:35 -04:00
Stefan Majer 827d869f0c RFC: some enhancements for registries with lots of images (#17)
* Add flag to trust ssl certificates signed by unknown authority

* Use registry http client instead of pure http client

* Add Bearer token only if required

* Create clair client instance with configurable debug option

* Limit number of parallel vuln scann´s to 20 to reduce load

* No need to throttle anymore because parallism is limited

* Make number of workers configurable

* During first run do not create clair vulns report details
2017-04-04 10:11:24 -04:00
Jess Frazelle 3075c58bc1
add vulns command
Signed-off-by: Jess Frazelle <acidburn@google.com>
2017-02-12 18:45:47 -08:00
Jess Frazelle e33d3e5526
cleanup
Signed-off-by: Jess Frazelle <acidburn@google.com>
2016-12-19 21:13:34 -08:00
Jess Frazelle 1af74c42c2
fixes
Signed-off-by: Jess Frazelle <me@jessfraz.com>
2016-09-05 19:44:19 -07:00
Jess Frazelle b5406104f2
prepare reg for junk
Signed-off-by: Jess Frazelle <me@jessfraz.com>
2016-08-12 22:23:13 -07:00