-
Notifications
You must be signed in to change notification settings - Fork 2.5k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat(networks): add a quick network creation form #210
Merged
Conversation
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
chiptus
added a commit
that referenced
this pull request
Jul 27, 2021
…n kubernetes (#214) * feat(app): rework private registries and support private registries in kubernetes feat(docker/registries): remove the registry usage information panel (#202) feat(app/registries): introduce dockerhub anonymous (#205) feat(app/registries): introduce dockerhub authenticated (#206) * feat(app/registries): introduce dockerhub authenticated * feat(app/registries): allow multiple registries with same URL / prevent multiple registries with same URL and credentials * fix(app/registries): fix image push/pull feature following registries modifications feat(app/registries): registry access control (#208) * feat(app/registries): backport front end part * feat(registry): registry access control back update * feat(app/registries): add missing endpointId for registries * feat(k8s/resource-pool): add registry section * fix(registries): update registry access with stacks and images * fix(registries): remove old access functions * feat(app/registries): rebase + code cleanup / small fixes * refactor(app): unify registryTypes reference * fix(app/registries): update sidebar to allow endpointAdmins to manage registries accesses * fix(app/sidebar): fix sidebar authorizations * fix(api/registries): allow endpointAdmins to get all endpoint registries (partial fix) * fix(registries): replace registries resource controls by regsitryAccessPolicies map * fix(registries): fix registry update access * fix(registry): remove unused in registry create * feat(api/registries): restrict and verify access on registries related actions * feat(api/registries): allow users to query a single registry they are allowed to see + rework forbidden errors * feat(app-api/registries): access control per endpoint + split update access and update registry routes * fix(api/registries): endpoint admins can now update registry accesses * feat(k8s): support registries in application deployment (#210) Co-authored-by: MaximeBajeux <max.bajeux@gmail.com> Co-authored-by: xAt0mZ <baron_l@epitech.eu> Co-authored-by: LP B <xAt0mZ@users.noreply.github.com> fix(app): fix develop bugs feat(kubernetes): guard registry secrets (#244) * feat(kube/proxy): create proxy for secrets * feat(http): parse response yaml * refactor(proxy): marshal yaml body * feat(proxy/kube): filter registry secrets * feat(kube/registries): filter kube registry secrets * refactor(kube): rename proxy function * rebase(proxy/kube): separate transports * feat(proxy/k8s): filter update request * feat(http/kube): pass k8s client factory * refactor(http/k8s): pass endpoint * feat(kube/proxy): filter delete actions * refactor(k8s/proxy): rename proxy functions * fix(http): unmarshal json * feat(k8s/secrets): redirect if secret is not editable * refactor(http/proxy): rename utils package * refactor(http/proxy): use utils name * fix(api): go mod tidy refactor(docker): migrate dockerhub registry (#245) fix(app): remove DockerHubService leftovers feat(app/registries): filter users on registry access edition (#249) * fix(registries): filter users on registry accesses edition * fix(app/registry-accesses): failfast on filter when user is not allowed in endpoint feat(api/registries): create accesses on Dockerhub migration (#250) * feat(api/registries): create accesses on Dockerhub migration * feat(api/registries): only create accesses for non kubernetes endpoints fix(api/registries): update registry secret on kubernetes endpoints only fix(api/registries): add authorization for endpoint admins (#252) fix(app/sidebar): host subsections (#251) fix(api/migrator): fix DB migrations and add info logging fix(api/registries): resolve panic on registryAuthenticationHeader usage fix(k8s): invalid DI on endpoint configuration view + invalid params on registries accesses view fix(api/migrator): remove migration error if Dockerhub is not found in DB feat(api/migrator): invert features for DB versions 29 and 30 fix(app/registries): add dockerhub registry to endpoint registries list feat(app/registries): add the ability to create registries from endpoint registries view (#332) feat(k8s/resource-pool): create registry access when creating/updating resource pool (#340) * feat(k8s/resource-pool): add ability to allow registries on resource pool creation * feat(k8s/resource-pool): add ability to allow registries on resource pool update fix(app/sidebar): allow admins and endpoint admins to always see stacks feat(registries): On namespace deletion, remove namespace reference from all registries the namespace was authorized on (#347) fix(containers): fix di fix(kube/registries): use registry id from params fix(endpoints): show ns if allowed chore(webpack): ignore missing sourcemaps fix(registries): fetch registry config from url feat(kube/registries): ignore not found when deleting secret fix(registries): fix preview bugs (#413) * feat(rbac): remove registries auth * fix(endpoint/registries): fetch endpoint registries * fix(endpoint/registries): filter registries by namespace * filter(k8s): hide registries link to non admins * feat(kube): open tunnel if needed * feat(registries): restrict global registries path to admin * refactor(endpoints): add attributes feat(kube/configurations): tag registry secrets as system [EE-915] (#414) * feat(kube/secrets): show registry secrets for admins * feat(kube/configurations): tag registry secrets feat(db): move migration to db 31 fix(registries): pre-review bugs (#417) * feat(rbac): hide registries list * feat(rbac): hide registry access view * feat(kube/ns): list registries * feat(k8s/ns): show registries * feat(k8s): filter registry secrets * fix(images): pull image from private registry * fix(registries): move dockerhub to beginning feat(registries): filter by namespace if supplied feat(access-managment): filter users for registry (#429) * refactor(access-manage): move users selector to component * feat(access-managment): filter users for registry * fix(access-management): show roles refactor(registries): sync code with CE (#432) * fix(k8s) Adding a Kube app does not allow Global to be set after removing persisted folder EE-563 (#410) Co-authored-by: Simon Meng <simon.meng@portainer.io> * chore(gitignore): revert change * fix(db): rename migration functions * fix(kubernetes): log delete secret * fix(kubernetes): merge delete requests * style(portainer): change deprecation version * style(k8s/configure): remove unused variable * fix(kueb/namespaces): rename resource pool to namespace * chore(jsconfig): configure paths Co-authored-by: cong meng <mcpacino@gmail.com> Co-authored-by: Simon Meng <simon.meng@portainer.io> fix(app/registries): replace last registry api usage with endpoint registry api fix(api/endpoints): update registry access policies on endpoint deletion (#448) [EE-1027] fix(db): update db version * fix(dockerhub): fetch rate limits * fix(registry/tests): supply restricred context * fix(docker): fetch rates limits * feat(db): move migrations to db 32 Co-authored-by: fhanportainer <79428273+fhanportainer@users.noreply.github.com> Co-authored-by: Chaim Lev-Ari <chiptus@gmail.com>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.
This suggestion is invalid because no changes were made to the code.
Suggestions cannot be applied while the pull request is closed.
Suggestions cannot be applied while viewing a subset of changes.
Only one suggestion per line can be applied in a batch.
Add this suggestion to a batch that can be applied as a single commit.
Applying suggestions on deleted lines is not supported.
You must change the existing code in this line in order to create a valid suggestion.
Outdated suggestions cannot be applied.
This suggestion has been applied or marked resolved.
Suggestions cannot be applied from pending reviews.
Suggestions cannot be applied on multi-line comments.
Suggestions cannot be applied while the pull request is queued to merge.
Suggestion cannot be applied right now. Please check back later.
Close #195