Skip to content
This repository was archived by the owner on Dec 13, 2018. It is now read-only.

Allow passing hashed HTTP auth credentials #107

Merged
merged 1 commit into from
Jan 23, 2017

Conversation

michal-kocarek
Copy link

@michal-kocarek michal-kocarek commented Sep 10, 2016

Currently, an image supports to pass only non-hashed original passwords through the environment variables. This may be quite dangerous if there are more people managing e.g. the Docker Cloud account.

Patch adds functionality for passing HTTP auth credentials with hashed password as well.

Backward compatibility is preserved, hashes are passed using new environment variable. Existing configuration with insecure passwords still applies.

Tests are passing.


PS: I am newbie to Python and would appreciate code style comments.

@michal-kocarek
Copy link
Author

michal-kocarek commented Sep 26, 2016

May I ask sincerely admins of this repository (@tifayuki, maybe), what do you think about this pull request?

We are currently sharing Docker cloud access between more users and it is really unwise to let everyone read unprotected passwords in the environment variables.

Thank you for the reply.

@tifayuki tifayuki changed the base branch from master to staging January 23, 2017 23:09
@tifayuki tifayuki merged commit 822d75d into docker-archive:staging Jan 23, 2017
@tifayuki
Copy link
Contributor

Sorry for the late response.
I have merged the PR into staging.
Thank you :)

tifayuki pushed a commit that referenced this pull request Feb 15, 2017
* Adds option for turning off basic auth for selected services (#154)

* Allow a service to be configured as failover for another service in the same backend (#120)

* Added support for hot-failover mode

* Updated README

* Add ability to pass hashed password credentials to HAproxy. (#107)

* Remove DHE-RSA-AES128-SHA from SSL_BIND_CIPHERS (#103)

* fixed tests error by PRs

* do not return haproxy ingress network (#160)

* fix the error introduced by EXCLUDE_BASIC_AUTH

* bump version
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants