Skip to content

Commit 6fa29de

Browse files
author
OpenShift Bot
authored
Merge pull request #13260 from liggitt/docker-registry-tls-1.5
Merged by openshift-bot
2 parents 788e4d1 + eb4caca commit 6fa29de

File tree

1 file changed

+27
-1
lines changed

1 file changed

+27
-1
lines changed

pkg/cmd/dockerregistry/dockerregistry.go

+27-1
Original file line numberDiff line numberDiff line change
@@ -36,6 +36,8 @@ import (
3636
_ "github.com/docker/distribution/registry/storage/driver/s3-aws"
3737
_ "github.com/docker/distribution/registry/storage/driver/swift"
3838

39+
"strings"
40+
3941
"github.com/openshift/origin/pkg/cmd/server/crypto"
4042
"github.com/openshift/origin/pkg/dockerregistry/server"
4143
"github.com/openshift/origin/pkg/dockerregistry/server/audit"
@@ -123,7 +125,31 @@ func Execute(configFile io.Reader) {
123125
context.GetLogger(app).Fatalln(err)
124126
}
125127
} else {
126-
tlsConf := crypto.SecureTLSConfig(&tls.Config{ClientAuth: tls.NoClientCert})
128+
var (
129+
minVersion uint16
130+
cipherSuites []uint16
131+
)
132+
if s := os.Getenv("REGISTRY_HTTP_TLS_MINVERSION"); len(s) > 0 {
133+
minVersion, err = crypto.TLSVersion(s)
134+
if err != nil {
135+
context.GetLogger(app).Fatalln(fmt.Errorf("invalid TLS version %q specified in REGISTRY_HTTP_TLS_MINVERSION: %v (valid values are %q)", s, err, crypto.ValidTLSVersions()))
136+
}
137+
}
138+
if s := os.Getenv("REGISTRY_HTTP_TLS_CIPHERSUITES"); len(s) > 0 {
139+
for _, cipher := range strings.Split(s, ",") {
140+
cipherSuite, err := crypto.CipherSuite(cipher)
141+
if err != nil {
142+
context.GetLogger(app).Fatalln(fmt.Errorf("invalid cipher suite %q specified in REGISTRY_HTTP_TLS_CIPHERSUITES: %v (valid suites are %q)", s, err, crypto.ValidCipherSuites()))
143+
}
144+
cipherSuites = append(cipherSuites, cipherSuite)
145+
}
146+
}
147+
148+
tlsConf := crypto.SecureTLSConfig(&tls.Config{
149+
ClientAuth: tls.NoClientCert,
150+
MinVersion: minVersion,
151+
CipherSuites: cipherSuites,
152+
})
127153

128154
if len(config.HTTP.TLS.ClientCAs) != 0 {
129155
pool := x509.NewCertPool()

0 commit comments

Comments
 (0)