-
-
Notifications
You must be signed in to change notification settings - Fork 36
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add auth feature to manage download crates #45
Comments
@Stargateur, check out #30. It might be close to what you're looking for. |
To be more precise: the openid feature doesn't prevent from downloading crates, nothing can prevent it as far as I know. It only allows to a specific list of users to publish packages on the registry. The difference might matter for your use case. A cargo registry has basically 2 locations where you might control read access:
The openid thing only controls push/ownership access, which is currently useful for us to have our own technical CI user to push crates, and to make it easier for anyone in the company to publish and use private package when hacking on some PoCs |
Thx for the detailed inside, I see the link I guess limit the user creation / limit on who can upload crates would be nice too, thus it would be funny to see who would use a "public" registry with a private git repository index ^^. But that indeed not what I need for now, you confirm that until the implementation of the RFC is done and release there no simple way to do what I need. Can't wait. |
I have create a PR #50 to require authorization for public APIs. I will start testing after the RFC #3139 implementation merge into cargo. |
I wanted to try out a private registry in the company where I work to allow better way than submodules and https clone for internal dependencies. But it seems that there is no way to limit crates download thus the crates are totally public.
I found out there is talk about this feature since a year and a RFC have been accepted about it rust-lang/cargo#10474.
So this issue is about tracking the implementation of this feature in ktra.
The text was updated successfully, but these errors were encountered: