Skip to content

docs: clarify proxy cache trust boundary for upstream token-service discovery#706

Merged
OrlinVasilev merged 1 commit intogoharbor:mainfrom
1seal:codex/docs-proxy-cache-trust-model
Feb 26, 2026
Merged

docs: clarify proxy cache trust boundary for upstream token-service discovery#706
OrlinVasilev merged 1 commit intogoharbor:mainfrom
1seal:codex/docs-proxy-cache-trust-model

Conversation

@1seal
Copy link
Contributor

@1seal 1seal commented Feb 9, 2026

docs: clarify proxy cache trust boundary for upstream token-service discovery

what this changes

this PR adds documentation notes in two places:

  • docs/administration/configure-proxy-cache/_index.md
  • docs/administration/configuring-replication/create-replication-endpoints.md

the notes clarify that:

  • Harbor proxy cache follows upstream WWW-Authenticate authentication challenges to obtain tokens
  • token service endpoints can be on a different host/domain than the registry
  • operators should configure only trusted upstream endpoints and use least-privilege credentials

why

this makes the existing trust model explicit for operators using proxy cache, without changing Harbor behavior or adding new configuration.

compatibility

  • no runtime behavior changes
  • no API changes
  • no migration needed

validation

  • docs-only diff reviewed locally

related context

this PR follows maintainer guidance to submit this clarification in goharbor/website.

…iscovery

document that proxy cache follows upstream WWW-Authenticate bearer realm challenges when obtaining tokens. clarify that token service endpoints can differ from the registry host, and recommend trusted endpoints plus least-privilege upstream credentials. docs-only change; no behavior or config changes.
@1seal 1seal requested review from a team as code owners February 9, 2026 12:49
@OrlinVasilev OrlinVasilev merged commit b7195cb into goharbor:main Feb 26, 2026
5 of 6 checks passed
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

5 participants