1
0
mirror of https://github.com/quay/quay.git synced 2026-01-26 06:21:37 +03:00

11 Commits

Author SHA1 Message Date
Deirdre Malone
e8790e844d chore(deps): update go version to 1.24.8 (PROJQUAY-9842) (#4653)
Update go version 1.24.8
Fix for CVE-2025-58183
2025-12-02 15:54:36 +00:00
Ryan Wallace
4ac6522bd5 feat: add IRSA support when creating Quay.io clients (PROJQUAY-9228) (#4312) 2025-11-19 09:51:47 -05:00
Shubhra Deshpande
49ff0da0c2 feat: Added Redis database and Redis flush worker (PROJQUAY-7176) (#4321)
* Added redis database and redis flush worker

* updated digest validation

* adding test coverage for scan_keys function

* adding test coverage

* added tests for scan function

* added coverage for flush to database function

* added coverage for gnuicorn worker initialization

* Replaced mock methods in the test with actual function calls

---------

Co-authored-by: shudeshp <shudeshp@redhat.com>
2025-10-17 09:27:11 -04:00
Mathieu Bouchard
acbe6c2278 [Feature] storage: Modify the STS S3 implementation of the storage backend to use Web Identity Tokens when available (PROJQUAY-8576) (#3670)
When deploying Quay in a Secure AWS environment, we can't use IAM Access Keys or Secrets since these credentials are often blocked for multiple reasons (credentials are long-lived, can be shared / stolen, etc.). So the preferred deployment method is to use an alternative method, like the Web Identity Token files that are automatically created in a Kubernetes cluster that has a federation link with IAM using the OIDC provider federation.

The current code of Quay force the use of an IAM account that is then used to assume another role that has S3 access to store the image files. The current pull request removes the need to use that IAM account and allows to directly assume the correct role using Web Identity Tokens while retaining compatibility with the old method of using IAM credentials.

The code relies on the automatic detection of the correct configurations using environment variables where possible. The code has been tested on an OpenShift cluster deployed using manual mode with AWS STS.
2025-03-13 14:44:24 -04:00
Sunandadadi
b8b75a932f configtool: default namespace autoprune policy validation (PROJQUAY-7407) (#3026)
config-tool: default namespace autoprune policy validation (PROJQUAY-7407)
2024-07-15 13:05:08 -04:00
Brandon Caton
7ef664a646 autoprune: Registry level autopruning (PROJQUAY-7392) (#2950)
Allows for adding a default autopruning policy that will be applied to all namespaces.
2024-06-26 16:43:31 -04:00
Jonathan King
233c128849 sts: Add STS support for S3 (PROJQUAY-6362) (#2632)
- Add STS authentication to s3
- Add STS validation to config tool
- PR automatically refreshes token on expiry
2024-02-22 10:50:54 -05:00
Michaela Lang
2c24975dbb federationuser(ldap): fixing keepalive settings for LDAP connections (PROJQUAY-5137) (#2440)
fixed field names for keepalive attributes.

* scenario1: config-tool empty configuration
** expectation: empty config for DB_CONNECTION_ARGS
```
$ curl -s http://localhost/api/v1/config | jq -r '."config.yaml".DB_CONNECTION_ARGS'
{}
```

* scenario2: config-tool with populated DB_CONNECTION_ARGS
** expectation: values are returned in DB_CONNECTION_ARGS
```
$ curl -s http://localhost/api/v1/config | jq -r '."config.yaml".DB_CONNECTION_ARGS'
{
  "autorollback": true,
  "keepalives": 1,
  "keepalives_count": 5,
  "keepalives_idle": 3,
  "keepalives_interval": 4,
  "max_connections": 30,
  "sslcompression": 1,
  "stale_timeout": 300,
  "tcp_user_timeout": 1000
}
```

* scenario3: config-tool with populated DB_CONNECTION_ARGS wrong type
** expectation: config-tool validate will bailout the wrong type in the
parameter
```
$ podman run -ti --rm --name config-tool -v config.yaml:/tmp/config.yaml config-tool:latest validate --configDir /tmp -m online
FATA[0000] An error occurred during validation. Process could not marshal config.yaml. This is most likely due to an incorrect type.
More info: keepalives must be of type int
```
2023-11-07 16:58:30 +01:00
Oleg Bulatov
9ab64f2052 feat(config-tool): add SSL client authentication (PROJQUAY-2417) (#2157)
* Add SSL client authentication by extending libpg connection parameter support as well as network parameters

* chore: go fmt

---------

Co-authored-by: Michaela Lang <milang@redhat.com>
2023-08-29 10:47:37 +02:00
Oleg Bulatov
02463a7e1a chore: Rename github.com/quay/config-tool to github.com/quay/quay/config-tool 2023-07-31 17:28:58 +02:00
Oleg Bulatov
0429d79696 chore: Move config-tool into its own directory 2023-07-28 16:34:05 +02:00