Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

feat(cmd/registry/auth/basic): allow to specify credentials as cli flags #314

Closed
wants to merge 1 commit into from

Conversation

maxgio92
Copy link
Member

What type of PR is this?

Uncomment one (or more) /kind <> lines:

/kind feature

Any specific area of the project related to this PR?

Uncomment one (or more) /area <> lines:

/area cli

What this PR does / why we need it:

Introduces credentials CLI flags for the registry basic HTTP authentication.

Which issue(s) this PR fixes:

Fixes #134

Special notes for your reviewer:

NA

@poiana
Copy link
Contributor

poiana commented Aug 23, 2023

[APPROVALNOTIFIER] This PR is APPROVED

This pull-request has been approved by: maxgio92

The full list of commands accepted by this bot can be found here.

The pull request process is described here

Needs approval from an approver in each of these files:

Approvers can indicate their approval by writing /approve in a comment
Approvers can cancel approval by writing /approve cancel in a comment

@maxgio92
Copy link
Member Author

Hey @alacuku I've just proposed this to accomplish #134. I assumed you referred to the basic authentication in that enhancement issue. If not, please let me know if I missed something.
Thank you

@alacuku
Copy link
Member

alacuku commented Aug 30, 2023

Hi @maxgio92, that's correct the issue is about the basic auth.

The linter is complaining, could you have a look and let me know when it's ready for review?

@maxgio92
Copy link
Member Author

maxgio92 commented Oct 5, 2023

Hey @alacuku, sorry for my late response, I missed it. The PR is now ready

return err
}
o.Printer.Verbosef("credentials added to credential store")
o.Printer.Success.Println("Login succeeded")

return nil
}

func (o *loginOptions) ensureCredentials() error {
Copy link
Member

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Could we support the use case where the username is given on the command line flag and the password from stdin?

@poiana
Copy link
Contributor

poiana commented Jan 16, 2024

Issues go stale after 90d of inactivity.

Mark the issue as fresh with /remove-lifecycle stale.

Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Provide feedback via https://github.com/falcosecurity/community.

/lifecycle stale

@poiana
Copy link
Contributor

poiana commented Feb 15, 2024

Stale issues rot after 30d of inactivity.

Mark the issue as fresh with /remove-lifecycle rotten.

Rotten issues close after an additional 30d of inactivity.

If this issue is safe to close now please do so with /close.

Provide feedback via https://github.com/falcosecurity/community.

/lifecycle rotten

@poiana
Copy link
Contributor

poiana commented Mar 16, 2024

Rotten issues close after 30d of inactivity.

Reopen the issue with /reopen.

Mark the issue as fresh with /remove-lifecycle rotten.

Provide feedback via https://github.com/falcosecurity/community.
/close

@poiana poiana closed this Mar 16, 2024
@poiana
Copy link
Contributor

poiana commented Mar 16, 2024

@poiana: Closed this PR.

In response to this:

Rotten issues close after 30d of inactivity.

Reopen the issue with /reopen.

Mark the issue as fresh with /remove-lifecycle rotten.

Provide feedback via https://github.com/falcosecurity/community.
/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@FedeDP
Copy link
Contributor

FedeDP commented Mar 16, 2024

/reopen
/remove-lifecycle rotten

@poiana poiana reopened this Mar 16, 2024
@poiana
Copy link
Contributor

poiana commented Mar 16, 2024

@FedeDP: Reopened this PR.

In response to this:

/reopen
/remove-lifecycle rotten

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@leogr
Copy link
Member

leogr commented Mar 26, 2024

Hey @maxgio92

Any update on this?

I guess the PR needs to be rebased and also we should address this comment #314 (review)

@alacuku
Copy link
Member

alacuku commented Jun 17, 2024

#588 supersedes this pr.

@alacuku
Copy link
Member

alacuku commented Jul 25, 2024

hey @maxgio92, we can close this PR since thee #588 has been merged.
/close

@poiana poiana closed this Jul 25, 2024
@poiana
Copy link
Contributor

poiana commented Jul 25, 2024

@alacuku: Closed this PR.

In response to this:

hey @maxgio92, we can close this PR since thee #588 has been merged.
/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes-sigs/prow repository.

@maxgio92
Copy link
Member Author

Thank you @alacuku, my bad.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

falcoctl registry login: enhancements
5 participants