-
Notifications
You must be signed in to change notification settings - Fork 4.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Limit Proxy Cache Images #13231
Comments
can you expand? how does this save a lot of replication rules? @phin1x |
If i create a proxy project (for example docker hub), all users with pull permission can pull all images from the proxied registry. if i want to limit the images, which can be pulled (for example only dockerhub library images should be allowed), i cannot use the proxy cache project type. |
I would just like to add my +1 to this feature request. |
This feature would allow us to open the proxy to internet without worrying about people using our proxy to circumvent docker hub restrictions. |
This issue is being marked stale due to a period of inactivity. If this issue is still relevant, please comment or remove the stale label. Otherwise, this issue will close in 30 days. |
I also believe that this feature would be of great value. A common setup would be to host a Harbor instance on a cluster and set policies to only allow pulling images from that Harbor instance for security reasons. However, it would be quite redundant in many cases to also replicate all images that are maintained by some known and trusted publisher. In this case I would like to define a proxy cache to a single Docker Hub publisher/user/project/repository while not opening up the ability to pull images from any public repository that is hosted at Docker Hub. Is anyone looking at or working on implementing this kind of feature? |
We would need this feature too! |
This feature will be really useful! |
+1 |
+1 |
+1 |
That would be amazing! +1 |
+1 |
+1 |
I agree with @atchadwick . This feature would greatly increase our security measures against malicious images. |
+1 This would definitely be a helpful feature to ensure only trusted sources from docker hub would be available, right now. Every few weeks there's another article about the rise of malicious images on docker hub since it's the defacto default registry. |
+1 |
I'de also desperately need this feature for a customer. With only a few projects in place yet, we already have a big mess of replication rules because of the company policies where security needs to allow which images to use. As proxy cache can't be filtered, we have to replicate each and every image, The problem is, that replication rules with stuff like library/{alpine,centos,ubuntu} do also not work, because without tag specification it would sync may to many images. So basically we end up with doing a replication job for every single allowd image with the tags we need. Would be much easier if there's a whitelist for proxy caches. |
With the new version of Harbor it can now be used as a proxy cache. As administrator I would like to have the possibility to restrict the images that are pulled (whitelist). This would save us a lot of replication rules.
The text was updated successfully, but these errors were encountered: