@@ -552,6 +552,36 @@ By default, all service accounts in a project have rights to pull any image in
552
552
the same project, and the *builder* service account has rights to push any image
553
553
in the same project.
554
554
555
+ ifdef::openshift-origin,openshift-enterprise,openshift-dedicated,atomic-registry[]
556
+ === Listing repositories
557
+
558
+ Listing of repositories (or rather ImageStream names) is supported via `/v2/_catalog` endpoint as
559
+ documented
560
+ link:https://github.com/docker/distribution/blob/master/docs/spec/api.md#listing-repositories[upstream].
561
+ The only requirement is that the authenticated user must have `list` rights on the `imagestreams`
562
+ in the whole cluster.
563
+
564
+ Here is one example of granting a permission to list ImageStreams to a user:
565
+
566
+ ----
567
+ $ oc adm policy add-cluster-role-to-user registry-viewer user
568
+ ----
569
+
570
+ .A CLI example of listing repositories
571
+ ----
572
+ $ oc login -u user
573
+ $ curl -v -u unused:$(oc whoami -t) https://<registry_server>:<port>/v2/_catalog?n=100
574
+ ----
575
+
576
+ [IMPORTANT]
577
+ ====
578
+ This API call is very expensive for a high number of image streams in the cluster. We strongly
579
+ recommend to use
580
+ link:https://github.com/docker/distribution/blob/master/docs/spec/api.md#pagination[pagination]
581
+ instead of listing all image streams.
582
+ ====
583
+ endif::openshift-origin,openshift-enterprise,openshift-dedicated,atomic-registry[]
584
+
555
585
ifdef::openshift-origin,openshift-online,openshift-enterprise,openshift-dedicated[]
556
586
[[using-image-pull-secrets]]
557
587
== Using Image Pull Secrets
0 commit comments