-
Notifications
You must be signed in to change notification settings - Fork 472
Add an "internal" policy for namespaces #606
Comments
Right now this is not possible. As discussed with issue #279 we are open to the introduction of a "protected" level in addition to "public" and "private". |
Maybe instead of |
I've changed the title to reflect better what's this feature actually about :) |
Within the context of this ticket, I think an |
Just to summarize the discussion (even if it would be clear for involved people) and to add a possible piece for documentation: Namespaces carry an attribute according to their policy for read access. Read access is required to
As a special case the global namespace can only have the access policy protected or public. BTW: I don't like the term internal if not only for the fact that private is kind of internal as well. |
This is relegated to teams. Team admins assign which kind of policy do members have onto the belonging namespaces.
I think that we never discussed this specific case actually :) I think it's fine to allow admins to set the global namespace as protected (note that push access would still be allowed only for admins).
Fair enough 😉 |
Whether a namespace is public or not is defined at the namespace level (I doubble-checked - look at pic from doc. At team level there is a defintion of additional rights (write access for all kinds of namespaces and read access for private namespaces)
I was more stating, that the global namespace could not be a private one. But just strike |
Seems like I miss-understood what you were saying, sorry 😅 |
Hello!
First of all thank you for your project.
I have deployed Portus at our own environment and was able to connet it with our private docker registry. And I found that I cannot change permission access for global namespace.
I need configure restricted access to our docker registry. So that everybody could pull/push docker images to/from registry only after authentication.
Can I do such behavior using Portus?
Thanks.
The text was updated successfully, but these errors were encountered: