josephschorr
9b65b37011
Merge pull request #2245 from coreos-inc/recaptcha
...
Add support for recaptcha during the create account flow
2017-01-17 11:34:23 -05:00
Joseph Schorr
7e0fbeb625
Custom SSL certificates config panel
...
Adds a new panel to the superuser config tool, for managing custom SSL certificates in the config bundle
[Delivers #135586525 ]
2017-01-13 14:34:35 -05:00
Joseph Schorr
3eb17b7caa
Add support for recaptcha during the create account flow
...
If the feature is enabled and recaptcha keys are given in config, then a recaptcha box is displayed in the UI when creating a user and a recaptcha response code *must* be sent with the create API call for it to succeed.
2017-01-09 11:08:21 -05:00
Jimmy Zelinskie
f9d0ec7d1b
requirments.txt: lock breaking dependencies
2016-10-18 15:41:26 -04:00
Jake Moshenko
f04b018805
Write our users to Marketo as leads.
2016-10-14 16:29:11 -04:00
Joseph Schorr
db60df827d
Implement V2 interfaces and remaining V1 interfaces
...
Also adds some tests to registry tests for V1 stuff.
Note: All *registry* tests currently pass, but as verbs are not yet converted, the verb tests in registry_tests.py currently fail.
2016-09-26 14:49:04 -04:00
Joseph Schorr
b459581637
Fix handling of dates in logs view
...
- Fixes #1742
- Also fixes the time zone on the aggregated logs API
2016-08-17 16:27:06 -04:00
Jimmy Zelinskie
75ddaba0a0
requirements: migrate back to upstream PyGithub ( #1592 )
2016-07-01 11:49:41 -04:00
Jimmy Zelinskie
8810157586
remove GPL'd timeparse library
2016-06-02 12:27:49 -04:00
Jimmy Zelinskie
70f794b0af
replace rfc3987 library with urlparse
...
The former is GPL licensed.
2016-05-26 13:29:48 -04:00
Joseph Schorr
dc9bcec9ce
Add pre shared generation tool
2016-04-29 14:09:37 -04:00
Evan Cordell
0450604e71
Update nover APScheduler
2016-04-06 18:54:49 -04:00
Evan Cordell
df3daacb8c
Document process for freezing dependencies and freeze git dependencies
...
to commits
2016-04-06 13:52:42 -04:00
Evan Cordell
59dbff6ced
Freeze requirements
2016-04-05 14:48:55 -04:00
Joseph Schorr
eab6af2b87
Add mocked unit tests for cloud storage engine
2016-03-23 12:13:54 -04:00
Joseph Schorr
c0374d71c9
Refactor the security worker and API calls and add a bunch of tests
2016-02-25 12:29:41 -05:00
Jake Moshenko
97be6d3e3d
Downgrade pymysql because phusion/baseimage has old python
2016-01-29 15:12:53 -05:00
Jake Moshenko
69d4cd68dc
Fix conflict by removing pycrypto, dump python dep list
2016-01-28 14:11:41 -05:00
Jake Moshenko
d7332a725b
Freeze our version of cryptography to work around segfault
2016-01-28 11:36:49 -05:00
Joseph Schorr
9a36e8820c
Add missing benode requirement
2016-01-08 13:52:50 -05:00
Jake Moshenko
766d60493f
Add the ability to blacklist v2 for specific versions
2015-12-15 18:27:10 -05:00
Joseph Schorr
544fa40a5f
Add a base class for a global worker that locks via Redis
2015-11-24 16:18:45 -05:00
Jake Moshenko
ab340e20ea
Merge remote-tracking branch 'upstream/master' into python-registry-v2
2015-11-11 16:41:40 -05:00
Jake Moshenko
dc24e8b1a1
Backfill by allocating and selecting ids in random blocks
...
Fixes #826
2015-11-09 22:29:17 -05:00
Jake Moshenko
8723fc4def
Remove edit marks in requirements-nover
2015-11-03 11:18:57 -05:00
Jake Moshenko
2c10d28afc
Merge remote-tracking branch 'upstream/master' into python-registry-v2
2015-10-26 14:44:16 -04:00
Jake Moshenko
f0d19dbbc8
Add the resumeable hashlib requirement
2015-10-24 15:31:32 -04:00
Jake Moshenko
e7a6176594
Merge remote-tracking branch 'upstream/v2-phase4' into python-registry-v2
2015-10-22 16:59:28 -04:00
Jimmy Zelinskie
231d463400
specify gitlab branch in req-no-ver
2015-10-22 15:07:31 -04:00
Joseph Schorr
49b575afb6
Start refactoring of the trigger system:
...
- Move each trigger handler into its own file
- Add dictionary helper classes for easier reading and writing of dict-based data
- Extract the web hook payload -> internal representation building for each trigger system
- Add tests for this transformation
- Remove support for Github archived-based building
2015-09-21 16:36:48 -04:00
Jake Moshenko
26cea9a07c
Merge remote-tracking branch 'upstream/master' into python-registry-v2
2015-09-17 16:16:27 -04:00
Joseph Schorr
840e4cd64b
Add missing requirement
2015-09-10 11:57:43 -04:00
Jake Moshenko
210ed7cf02
Merge remote-tracking branch 'upstream/master' into python-registry-v2
2015-09-04 16:32:01 -04:00
Joseph Schorr
b87427aefb
Add missing pyjwkest dependency
2015-08-25 14:18:07 -04:00
Joseph Schorr
f092c00621
Allow builds to be started with an external archive URL
...
Fixes #114
2015-08-17 17:01:49 -04:00
Jake Moshenko
e1b3e9e6ae
Another huge batch of registry v2 changes
...
Add patch support and resumeable sha
Implement all actual registry methods
Add a simple database generation option
2015-08-12 16:41:12 -04:00
Jake Moshenko
2109d24483
Add the toposort dependency.
2015-07-17 11:50:41 -04:00
Jake Moshenko
1fb676d1f6
Refresh the dependencies and switch back to upstream peewee now that coleifer has added a fix.
2015-07-06 15:02:52 -04:00
Jimmy Zelinskie
3fb052be3c
reqs: fallback to vendored python-etcd
...
We need to figure out why this is a problem, but it can't block our
deployment for now.
2015-06-24 16:20:07 -04:00
Jimmy Zelinskie
a88144543a
reqs: remove unused dependencies
2015-06-24 15:05:32 -04:00
Jimmy Zelinskie
d9111fb51d
reqs: use packaged python-etcd
...
After updating our apt-get cache, using the fix in our vendored version
is no longer necessary.
2015-06-24 14:02:13 -04:00
Jake Moshenko
5f1d23c6e8
Use a UNION query instead of a multitude of left outer joins for performance reasons.
...
Fixes #159
2015-06-23 17:18:37 -04:00
Jake Moshenko
2a2414d6af
Merge pull request #60 from coreos-inc/jwtauthentication
...
Add support for an external JWT-based authentication system
2015-06-05 13:37:42 -04:00
Joseph Schorr
8aac3fd86e
Add support for an external JWT-based authentication system
...
This authentication system hits two HTTP endpoints to check and verify the existence of users:
Existance endpoint:
GET http://endpoint/ with Authorization: Basic (username:) =>
Returns 200 if the username/email exists, 4** otherwise
Verification endpoint:
GET http://endpoint/ with Authorization: Basic (username:password) =>
Returns 200 and a signed JWT with the user's username and email address if the username+password validates, 4** otherwise with the body containing an optional error message
The JWT produced by the endpoint must be issued with an issuer matching that configured in the config.yaml, and the audience must be "quay.io/jwtauthn". The JWT is signed using a private key and then validated on the Quay.io side with the associated public key, found as "jwt-authn.cert" in the conf/stack directory.
2015-06-05 13:20:10 -04:00
Joseph Schorr
698f62388e
Switch the python-etcd client to the sslfix branch
...
This fixes an issue with urllib3 and SSL
2015-06-03 14:32:32 -04:00
Jake Moshenko
7bc5f7a1ca
Merge pull request #53 from coreos-inc/v1test
...
Add tests for the registry that mimic Docker's calls
2015-06-02 12:24:42 -04:00
Joseph Schorr
9585e2a765
End-to-end registry tests
2015-06-01 16:35:30 -04:00
josephschorr
491de200f6
Merge pull request #45 from coreos-inc/ldapreferfix
...
Fix LDAP referral and multiple pair handling
2015-06-01 14:11:00 -04:00
Joseph Schorr
e4e82790ca
Remove unneeded avatar library
2015-06-01 13:32:57 -04:00
Joseph Schorr
386b1710ed
Merge branch 'master' into ldapreferfix
2015-05-27 15:15:47 -04:00