2021-06-08 15:11:18 -05:00
|
|
|
package config
|
2019-06-20 18:36:40 -05:00
|
|
|
|
|
|
|
import (
|
2023-09-06 11:58:00 -05:00
|
|
|
"encoding/json"
|
2022-08-10 17:28:52 -05:00
|
|
|
"os"
|
2022-02-09 19:51:35 -05:00
|
|
|
"time"
|
2021-05-13 13:59:12 -05:00
|
|
|
|
2021-05-21 15:47:28 -05:00
|
|
|
distspec "github.com/opencontainers/distribution-spec/specs-go"
|
2022-10-20 11:39:20 -05:00
|
|
|
|
2021-12-03 22:50:58 -05:00
|
|
|
extconf "zotregistry.io/zot/pkg/extensions/config"
|
2023-05-26 13:08:19 -05:00
|
|
|
storageConstants "zotregistry.io/zot/pkg/storage/constants"
|
2019-06-20 18:36:40 -05:00
|
|
|
)
|
|
|
|
|
2021-02-12 19:52:02 -05:00
|
|
|
var (
|
2022-10-05 05:21:14 -05:00
|
|
|
Commit string //nolint: gochecknoglobals
|
2022-10-11 11:01:59 -05:00
|
|
|
ReleaseTag string //nolint: gochecknoglobals
|
2022-10-05 05:21:14 -05:00
|
|
|
BinaryType string //nolint: gochecknoglobals
|
|
|
|
GoVersion string //nolint: gochecknoglobals
|
2023-07-19 11:27:04 -05:00
|
|
|
|
2023-08-24 04:33:35 -05:00
|
|
|
openIDSupportedProviders = [...]string{"google", "gitlab", "oidc"} //nolint: gochecknoglobals
|
|
|
|
oauth2SupportedProviders = [...]string{"github"} //nolint: gochecknoglobals
|
2023-07-19 11:27:04 -05:00
|
|
|
|
2021-02-12 19:52:02 -05:00
|
|
|
)
|
2019-09-16 13:01:59 -05:00
|
|
|
|
2019-06-20 18:36:40 -05:00
|
|
|
type StorageConfig struct {
|
2023-11-01 11:16:18 -05:00
|
|
|
RootDirectory string
|
|
|
|
Dedupe bool
|
|
|
|
RemoteCache bool
|
|
|
|
GC bool
|
|
|
|
Commit bool
|
|
|
|
GCDelay time.Duration // applied for blobs
|
|
|
|
GCInterval time.Duration
|
|
|
|
Retention ImageRetention
|
|
|
|
StorageDriver map[string]interface{} `mapstructure:",omitempty"`
|
|
|
|
CacheDriver map[string]interface{} `mapstructure:",omitempty"`
|
|
|
|
}
|
|
|
|
|
|
|
|
type ImageRetention struct {
|
|
|
|
DryRun bool
|
|
|
|
Delay time.Duration // applied for referrers and untagged
|
|
|
|
Policies []RetentionPolicy
|
|
|
|
}
|
|
|
|
|
|
|
|
type RetentionPolicy struct {
|
|
|
|
Repositories []string
|
|
|
|
DeleteReferrers bool
|
|
|
|
DeleteUntagged *bool
|
|
|
|
KeepTags []KeepTagsPolicy
|
|
|
|
}
|
|
|
|
|
|
|
|
type KeepTagsPolicy struct {
|
|
|
|
Patterns []string
|
|
|
|
PulledWithin *time.Duration
|
|
|
|
PushedWithin *time.Duration
|
|
|
|
MostRecentlyPushedCount int
|
|
|
|
MostRecentlyPulledCount int
|
2019-06-20 18:36:40 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
type TLSConfig struct {
|
|
|
|
Cert string
|
|
|
|
Key string
|
|
|
|
CACert string
|
|
|
|
}
|
|
|
|
|
|
|
|
type AuthHTPasswd struct {
|
|
|
|
Path string
|
|
|
|
}
|
|
|
|
|
|
|
|
type AuthConfig struct {
|
|
|
|
FailDelay int
|
|
|
|
HTPasswd AuthHTPasswd
|
2019-08-15 11:34:54 -05:00
|
|
|
LDAP *LDAPConfig
|
2020-01-24 16:32:38 -05:00
|
|
|
Bearer *BearerConfig
|
2023-07-07 11:27:10 -05:00
|
|
|
OpenID *OpenIDConfig
|
2023-08-02 13:58:34 -05:00
|
|
|
APIKey bool
|
2020-01-24 16:32:38 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
type BearerConfig struct {
|
|
|
|
Realm string
|
|
|
|
Service string
|
|
|
|
Cert string
|
2019-06-20 18:36:40 -05:00
|
|
|
}
|
|
|
|
|
2023-07-07 11:27:10 -05:00
|
|
|
type OpenIDConfig struct {
|
|
|
|
Providers map[string]OpenIDProviderConfig
|
|
|
|
}
|
|
|
|
|
|
|
|
type OpenIDProviderConfig struct {
|
2023-08-24 04:33:35 -05:00
|
|
|
Name string
|
2023-07-07 11:27:10 -05:00
|
|
|
ClientID string
|
|
|
|
ClientSecret string
|
|
|
|
KeyPath string
|
|
|
|
Issuer string
|
|
|
|
Scopes []string
|
|
|
|
}
|
|
|
|
|
2022-01-21 15:30:09 -05:00
|
|
|
type MethodRatelimitConfig struct {
|
|
|
|
Method string
|
|
|
|
Rate int
|
|
|
|
}
|
|
|
|
|
|
|
|
type RatelimitConfig struct {
|
|
|
|
Rate *int // requests per second
|
|
|
|
Methods []MethodRatelimitConfig `mapstructure:",omitempty"`
|
|
|
|
}
|
|
|
|
|
2023-07-07 11:27:10 -05:00
|
|
|
//nolint:maligned
|
2019-06-20 18:36:40 -05:00
|
|
|
type HTTPConfig struct {
|
2023-03-08 14:47:15 -05:00
|
|
|
Address string
|
2023-08-09 11:11:21 -05:00
|
|
|
ExternalURL string `mapstructure:",omitempty"`
|
2023-03-08 14:47:15 -05:00
|
|
|
Port string
|
|
|
|
AllowOrigin string // comma separated
|
|
|
|
TLS *TLSConfig
|
|
|
|
Auth *AuthConfig
|
2023-03-09 13:43:26 -05:00
|
|
|
AccessControl *AccessControlConfig `mapstructure:"accessControl,omitempty"`
|
2023-03-08 14:47:15 -05:00
|
|
|
Realm string
|
|
|
|
Ratelimit *RatelimitConfig `mapstructure:",omitempty"`
|
2019-06-20 18:36:40 -05:00
|
|
|
}
|
|
|
|
|
2023-07-04 03:03:29 -05:00
|
|
|
type SchedulerConfig struct {
|
|
|
|
NumWorkers int
|
|
|
|
}
|
|
|
|
|
2023-11-14 19:21:36 -05:00
|
|
|
type LDAPCredentials struct {
|
|
|
|
BindDN string
|
|
|
|
BindPassword string
|
|
|
|
}
|
|
|
|
|
2019-08-15 11:34:54 -05:00
|
|
|
type LDAPConfig struct {
|
2023-11-14 19:21:36 -05:00
|
|
|
CredentialsFile string
|
2023-03-08 14:47:15 -05:00
|
|
|
Port int
|
|
|
|
Insecure bool
|
|
|
|
StartTLS bool // if !Insecure, then StartTLS or LDAPs
|
|
|
|
SkipVerify bool
|
|
|
|
SubtreeSearch bool
|
|
|
|
Address string
|
2023-11-14 19:21:36 -05:00
|
|
|
bindDN string `json:"-"`
|
|
|
|
bindPassword string `json:"-"`
|
2023-03-08 14:47:15 -05:00
|
|
|
UserGroupAttribute string
|
|
|
|
BaseDN string
|
|
|
|
UserAttribute string
|
|
|
|
CACert string
|
2019-08-15 11:34:54 -05:00
|
|
|
}
|
|
|
|
|
2023-11-14 19:21:36 -05:00
|
|
|
func (ldapConf *LDAPConfig) BindDN() string {
|
|
|
|
return ldapConf.bindDN
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ldapConf *LDAPConfig) SetBindDN(bindDN string) *LDAPConfig {
|
|
|
|
ldapConf.bindDN = bindDN
|
|
|
|
|
|
|
|
return ldapConf
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ldapConf *LDAPConfig) BindPassword() string {
|
|
|
|
return ldapConf.bindPassword
|
|
|
|
}
|
|
|
|
|
|
|
|
func (ldapConf *LDAPConfig) SetBindPassword(bindPassword string) *LDAPConfig {
|
|
|
|
ldapConf.bindPassword = bindPassword
|
|
|
|
|
|
|
|
return ldapConf
|
|
|
|
}
|
|
|
|
|
2019-06-20 18:36:40 -05:00
|
|
|
type LogConfig struct {
|
|
|
|
Level string
|
|
|
|
Output string
|
2021-05-25 03:38:21 -05:00
|
|
|
Audit string
|
2019-06-20 18:36:40 -05:00
|
|
|
}
|
|
|
|
|
2021-04-05 19:40:33 -05:00
|
|
|
type GlobalStorageConfig struct {
|
2022-11-02 17:53:08 -05:00
|
|
|
StorageConfig `mapstructure:",squash"`
|
2021-04-05 19:40:33 -05:00
|
|
|
SubPaths map[string]StorageConfig
|
|
|
|
}
|
|
|
|
|
2021-06-08 15:11:18 -05:00
|
|
|
type AccessControlConfig struct {
|
2023-03-08 14:47:15 -05:00
|
|
|
Repositories Repositories `json:"repositories" mapstructure:"repositories"`
|
2021-06-08 15:11:18 -05:00
|
|
|
AdminPolicy Policy
|
2023-03-08 14:47:15 -05:00
|
|
|
Groups Groups
|
2023-10-20 02:33:26 -05:00
|
|
|
Metrics Metrics
|
2021-06-08 15:11:18 -05:00
|
|
|
}
|
|
|
|
|
2023-06-22 06:29:45 -05:00
|
|
|
func (config *AccessControlConfig) AnonymousPolicyExists() bool {
|
|
|
|
if config == nil {
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, repository := range config.Repositories {
|
|
|
|
if len(repository.AnonymousPolicy) > 0 {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2023-03-08 14:47:15 -05:00
|
|
|
type (
|
|
|
|
Repositories map[string]PolicyGroup
|
|
|
|
Groups map[string]Group
|
|
|
|
)
|
|
|
|
|
|
|
|
type Group struct {
|
|
|
|
Users []string
|
|
|
|
}
|
2021-06-08 15:11:18 -05:00
|
|
|
|
|
|
|
type PolicyGroup struct {
|
2022-07-14 10:13:46 -05:00
|
|
|
Policies []Policy
|
|
|
|
DefaultPolicy []string
|
|
|
|
AnonymousPolicy []string
|
2021-06-08 15:11:18 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
type Policy struct {
|
|
|
|
Users []string
|
|
|
|
Actions []string
|
2023-03-08 14:47:15 -05:00
|
|
|
Groups []string
|
2021-06-08 15:11:18 -05:00
|
|
|
}
|
|
|
|
|
2023-10-20 02:33:26 -05:00
|
|
|
type Metrics struct {
|
|
|
|
Users []string
|
|
|
|
}
|
|
|
|
|
2019-06-20 18:36:40 -05:00
|
|
|
type Config struct {
|
2022-03-07 07:50:15 -05:00
|
|
|
DistSpecVersion string `json:"distSpecVersion" mapstructure:"distSpecVersion"`
|
|
|
|
GoVersion string
|
|
|
|
Commit string
|
2022-10-11 11:01:59 -05:00
|
|
|
ReleaseTag string
|
2022-03-07 07:50:15 -05:00
|
|
|
BinaryType string
|
|
|
|
Storage GlobalStorageConfig
|
|
|
|
HTTP HTTPConfig
|
|
|
|
Log *LogConfig
|
|
|
|
Extensions *extconf.ExtensionConfig
|
2023-07-04 03:03:29 -05:00
|
|
|
Scheduler *SchedulerConfig `json:"scheduler" mapstructure:",omitempty"`
|
2019-06-20 18:36:40 -05:00
|
|
|
}
|
|
|
|
|
2021-06-08 15:11:18 -05:00
|
|
|
func New() *Config {
|
2019-06-20 18:36:40 -05:00
|
|
|
return &Config{
|
2022-03-07 07:50:15 -05:00
|
|
|
DistSpecVersion: distspec.Version,
|
|
|
|
GoVersion: GoVersion,
|
|
|
|
Commit: Commit,
|
2022-10-11 11:01:59 -05:00
|
|
|
ReleaseTag: ReleaseTag,
|
2022-03-07 07:50:15 -05:00
|
|
|
BinaryType: BinaryType,
|
2022-11-02 17:53:08 -05:00
|
|
|
Storage: GlobalStorageConfig{
|
2023-08-07 14:55:19 -05:00
|
|
|
StorageConfig: StorageConfig{
|
2023-11-01 11:16:18 -05:00
|
|
|
Dedupe: true,
|
|
|
|
GC: true,
|
|
|
|
GCDelay: storageConstants.DefaultGCDelay,
|
|
|
|
GCInterval: storageConstants.DefaultGCInterval,
|
|
|
|
Retention: ImageRetention{},
|
2023-08-07 14:55:19 -05:00
|
|
|
},
|
2022-11-02 17:53:08 -05:00
|
|
|
},
|
|
|
|
HTTP: HTTPConfig{Address: "127.0.0.1", Port: "8080", Auth: &AuthConfig{FailDelay: 0}},
|
|
|
|
Log: &LogConfig{Level: "debug"},
|
2019-08-15 11:34:54 -05:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-08-10 17:28:52 -05:00
|
|
|
func (expConfig StorageConfig) ParamsEqual(actConfig StorageConfig) bool {
|
|
|
|
return expConfig.GC == actConfig.GC && expConfig.Dedupe == actConfig.Dedupe &&
|
|
|
|
expConfig.GCDelay == actConfig.GCDelay && expConfig.GCInterval == actConfig.GCInterval
|
|
|
|
}
|
|
|
|
|
|
|
|
// SameFile compare two files.
|
|
|
|
// This method will first do the stat of two file and compare using os.SameFile method.
|
|
|
|
func SameFile(str1, str2 string) (bool, error) {
|
|
|
|
sFile, err := os.Stat(str1)
|
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
|
|
|
|
tFile, err := os.Stat(str2)
|
|
|
|
if err != nil {
|
|
|
|
return false, err
|
|
|
|
}
|
|
|
|
|
|
|
|
return os.SameFile(sFile, tFile), nil
|
|
|
|
}
|
|
|
|
|
2023-09-06 11:58:00 -05:00
|
|
|
func DeepCopy(src, dst interface{}) error {
|
|
|
|
bytes, err := json.Marshal(src)
|
|
|
|
if err != nil {
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
err = json.Unmarshal(bytes, dst)
|
|
|
|
|
|
|
|
return err
|
|
|
|
}
|
|
|
|
|
2020-05-11 17:13:24 -05:00
|
|
|
// Sanitize makes a sanitized copy of the config removing any secrets.
|
2019-08-15 11:34:54 -05:00
|
|
|
func (c *Config) Sanitize() *Config {
|
2021-12-13 14:23:31 -05:00
|
|
|
sanitizedConfig := &Config{}
|
2023-09-06 11:58:00 -05:00
|
|
|
|
|
|
|
if err := DeepCopy(c, sanitizedConfig); err != nil {
|
2021-06-08 15:11:18 -05:00
|
|
|
panic(err)
|
|
|
|
}
|
2019-12-13 00:53:18 -05:00
|
|
|
|
2023-11-14 19:21:36 -05:00
|
|
|
if c.HTTP.Auth != nil && c.HTTP.Auth.LDAP != nil && c.HTTP.Auth.LDAP.bindPassword != "" {
|
2021-12-13 14:23:31 -05:00
|
|
|
sanitizedConfig.HTTP.Auth.LDAP = &LDAPConfig{}
|
2019-12-13 00:53:18 -05:00
|
|
|
|
2023-09-06 11:58:00 -05:00
|
|
|
if err := DeepCopy(c.HTTP.Auth.LDAP, sanitizedConfig.HTTP.Auth.LDAP); err != nil {
|
2019-08-15 11:34:54 -05:00
|
|
|
panic(err)
|
|
|
|
}
|
2019-12-13 00:53:18 -05:00
|
|
|
|
2023-11-14 19:21:36 -05:00
|
|
|
sanitizedConfig.HTTP.Auth.LDAP.bindPassword = "******"
|
2019-08-15 11:34:54 -05:00
|
|
|
}
|
2019-12-13 00:53:18 -05:00
|
|
|
|
2021-12-13 14:23:31 -05:00
|
|
|
return sanitizedConfig
|
2019-08-15 11:34:54 -05:00
|
|
|
}
|
2023-07-19 11:27:04 -05:00
|
|
|
|
|
|
|
func (c *Config) IsLdapAuthEnabled() bool {
|
|
|
|
if c.HTTP.Auth != nil && c.HTTP.Auth.LDAP != nil {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2023-09-01 13:13:53 -05:00
|
|
|
func (c *Config) IsMTLSAuthEnabled() bool {
|
|
|
|
if c.HTTP.TLS != nil &&
|
|
|
|
c.HTTP.TLS.Key != "" &&
|
|
|
|
c.HTTP.TLS.Cert != "" &&
|
|
|
|
c.HTTP.TLS.CACert != "" &&
|
|
|
|
!c.IsBasicAuthnEnabled() &&
|
|
|
|
!c.HTTP.AccessControl.AnonymousPolicyExists() {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2023-07-19 11:27:04 -05:00
|
|
|
func (c *Config) IsHtpasswdAuthEnabled() bool {
|
|
|
|
if c.HTTP.Auth != nil && c.HTTP.Auth.HTPasswd.Path != "" {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Config) IsBearerAuthEnabled() bool {
|
|
|
|
if c.HTTP.Auth != nil &&
|
|
|
|
c.HTTP.Auth.Bearer != nil &&
|
|
|
|
c.HTTP.Auth.Bearer.Cert != "" &&
|
|
|
|
c.HTTP.Auth.Bearer.Realm != "" &&
|
|
|
|
c.HTTP.Auth.Bearer.Service != "" {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Config) IsOpenIDAuthEnabled() bool {
|
|
|
|
if c.HTTP.Auth != nil &&
|
|
|
|
c.HTTP.Auth.OpenID != nil {
|
|
|
|
for provider := range c.HTTP.Auth.OpenID.Providers {
|
|
|
|
if isOpenIDAuthProviderEnabled(c, provider) {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Config) IsAPIKeyEnabled() bool {
|
2023-08-02 13:58:34 -05:00
|
|
|
if c.HTTP.Auth != nil && c.HTTP.Auth.APIKey {
|
2023-07-19 11:27:04 -05:00
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Config) IsBasicAuthnEnabled() bool {
|
|
|
|
if c.IsHtpasswdAuthEnabled() || c.IsLdapAuthEnabled() ||
|
|
|
|
c.IsOpenIDAuthEnabled() || c.IsAPIKeyEnabled() {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func isOpenIDAuthProviderEnabled(config *Config, provider string) bool {
|
|
|
|
if providerConfig, ok := config.HTTP.Auth.OpenID.Providers[provider]; ok {
|
|
|
|
if IsOpenIDSupported(provider) {
|
|
|
|
if providerConfig.ClientID != "" || providerConfig.Issuer != "" ||
|
|
|
|
len(providerConfig.Scopes) > 0 {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
} else if IsOauth2Supported(provider) {
|
|
|
|
if providerConfig.ClientID != "" || len(providerConfig.Scopes) > 0 {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2023-09-15 06:49:34 -05:00
|
|
|
func (c *Config) IsMetricsEnabled() bool {
|
|
|
|
return c.Extensions != nil && c.Extensions.Metrics != nil && *c.Extensions.Metrics.Enable
|
|
|
|
}
|
|
|
|
|
2023-08-02 13:58:34 -05:00
|
|
|
func (c *Config) IsSearchEnabled() bool {
|
|
|
|
return c.Extensions != nil && c.Extensions.Search != nil && *c.Extensions.Search.Enable
|
|
|
|
}
|
|
|
|
|
2023-09-22 13:49:17 -05:00
|
|
|
func (c *Config) IsCveScanningEnabled() bool {
|
|
|
|
return c.IsSearchEnabled() && c.Extensions.Search.CVE != nil
|
|
|
|
}
|
|
|
|
|
2023-08-02 13:58:34 -05:00
|
|
|
func (c *Config) IsUIEnabled() bool {
|
|
|
|
return c.Extensions != nil && c.Extensions.UI != nil && *c.Extensions.UI.Enable
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Config) AreUserPrefsEnabled() bool {
|
|
|
|
return c.IsSearchEnabled() && c.IsUIEnabled()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Config) IsMgmtEnabled() bool {
|
2023-08-26 15:32:41 -05:00
|
|
|
return c.IsSearchEnabled()
|
2023-08-02 13:58:34 -05:00
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Config) IsImageTrustEnabled() bool {
|
|
|
|
return c.Extensions != nil && c.Extensions.Trust != nil && *c.Extensions.Trust.Enable
|
|
|
|
}
|
|
|
|
|
2023-11-01 11:16:18 -05:00
|
|
|
// check if tags retention is enabled.
|
|
|
|
func (c *Config) IsRetentionEnabled() bool {
|
|
|
|
var needsMetaDB bool
|
|
|
|
|
|
|
|
for _, retentionPolicy := range c.Storage.Retention.Policies {
|
|
|
|
for _, tagRetentionPolicy := range retentionPolicy.KeepTags {
|
|
|
|
if c.isTagsRetentionEnabled(tagRetentionPolicy) {
|
|
|
|
needsMetaDB = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, subpath := range c.Storage.SubPaths {
|
|
|
|
for _, retentionPolicy := range subpath.Retention.Policies {
|
|
|
|
for _, tagRetentionPolicy := range retentionPolicy.KeepTags {
|
|
|
|
if c.isTagsRetentionEnabled(tagRetentionPolicy) {
|
|
|
|
needsMetaDB = true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return needsMetaDB
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Config) isTagsRetentionEnabled(tagRetentionPolicy KeepTagsPolicy) bool {
|
|
|
|
if tagRetentionPolicy.MostRecentlyPulledCount != 0 ||
|
|
|
|
tagRetentionPolicy.MostRecentlyPushedCount != 0 ||
|
|
|
|
tagRetentionPolicy.PulledWithin != nil ||
|
|
|
|
tagRetentionPolicy.PushedWithin != nil {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
2023-08-02 13:58:34 -05:00
|
|
|
func (c *Config) IsCosignEnabled() bool {
|
|
|
|
return c.IsImageTrustEnabled() && c.Extensions.Trust.Cosign
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Config) IsNotationEnabled() bool {
|
|
|
|
return c.IsImageTrustEnabled() && c.Extensions.Trust.Notation
|
|
|
|
}
|
|
|
|
|
|
|
|
func (c *Config) IsSyncEnabled() bool {
|
|
|
|
return c.Extensions != nil && c.Extensions.Sync != nil && *c.Extensions.Sync.Enable
|
|
|
|
}
|
|
|
|
|
2023-07-19 11:27:04 -05:00
|
|
|
func IsOpenIDSupported(provider string) bool {
|
|
|
|
for _, supportedProvider := range openIDSupportedProviders {
|
|
|
|
if supportedProvider == provider {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|
|
|
|
|
|
|
|
func IsOauth2Supported(provider string) bool {
|
|
|
|
for _, supportedProvider := range oauth2SupportedProviders {
|
|
|
|
if supportedProvider == provider {
|
|
|
|
return true
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return false
|
|
|
|
}
|