Conversation
|
Thanks, this looks really interesting. I was looking more towards protecting API with nginx and basic auth if required, but this brings out of the box solution which might be good enough. |
|
The documentation should recommend the usage of nginx/apache as SSL proxy. I am planning to use the api in conjunction with a continuous delivery server to update mirrors, create snapshots, publish tehm and as preparation for web frontends. The return code for the SIGINT termination (t07_serve) of the process seems to be different when using go 1.5 / go 1.6 in the travis ci builds (1.5 -> 2, 1.6 -> **-**2). |
|
Also this ;) https://morph027.gitlab.io/post/push-deb-packages-from-ci-jobs-to-aptly-repo/ If you'd like, i can take care of the documentation for nginx/ssl setup here (once i figured out your gitlab-pages structure g) |
|
@morph027 any docs are really welcome as PRs to https://github.com/aptly-dev/aptly-dev.github.io repository |
|
Sure, will have a look at it tomorrow! |
|
has this been rejected? |
@smira
Thank you for making aptly, I really enjoy using it.
For secure api access I've included gin-jwt and implemented the basic authorization and authentication pattern.
New config file content:
(string containing the api secret key)
(dict containing username, password and array of roles)
Example:
Modified system test:
Modified Makefile:
Question:
Should we test the api with and without authentication when running default system test? We could do so if we add the task system-test.api to the default sytem-test or all.
Anonymous access without authentication is still granted if api users are not defined in the config file (backwards compatibility).
Currently there is only support for the role admin.
Security note:
Aptly config file should be read protected (plain passwords)
Secure api access with SSL to prevent security issues (Nginx, Apache, ...)