registry_index_spec.rst 22 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622
  1. :title: Registry Documentation
  2. :description: Documentation for docker Registry and Registry API
  3. :keywords: docker, registry, api, index
  4. .. _registryindexspec:
  5. =====================
  6. Registry & Index Spec
  7. =====================
  8. 1. The 3 roles
  9. ===============
  10. 1.1 Index
  11. ---------
  12. The Index is responsible for centralizing information about:
  13. - User accounts
  14. - Checksums of the images
  15. - Public namespaces
  16. The Index has different components:
  17. - Web UI
  18. - Meta-data store (comments, stars, list public repositories)
  19. - Authentication service
  20. - Tokenization
  21. The index is authoritative for those information.
  22. We expect that there will be only one instance of the index, run and managed by Docker Inc.
  23. 1.2 Registry
  24. ------------
  25. - It stores the images and the graph for a set of repositories
  26. - It does not have user accounts data
  27. - It has no notion of user accounts or authorization
  28. - It delegates authentication and authorization to the Index Auth service using tokens
  29. - It supports different storage backends (S3, cloud files, local FS)
  30. - It doesn’t have a local database
  31. - `Source Code <https://github.com/dotcloud/docker-registry>`_
  32. We expect that there will be multiple registries out there. To help to grasp the context, here are some examples of registries:
  33. - **sponsor registry**: such a registry is provided by a third-party hosting infrastructure as a convenience for their customers and the docker community as a whole. Its costs are supported by the third party, but the management and operation of the registry are supported by dotCloud. It features read/write access, and delegates authentication and authorization to the Index.
  34. - **mirror registry**: such a registry is provided by a third-party hosting infrastructure but is targeted at their customers only. Some mechanism (unspecified to date) ensures that public images are pulled from a sponsor registry to the mirror registry, to make sure that the customers of the third-party provider can “docker pull” those images locally.
  35. - **vendor registry**: such a registry is provided by a software vendor, who wants to distribute docker images. It would be operated and managed by the vendor. Only users authorized by the vendor would be able to get write access. Some images would be public (accessible for anyone), others private (accessible only for authorized users). Authentication and authorization would be delegated to the Index. The goal of vendor registries is to let someone do “docker pull basho/riak1.3” and automatically push from the vendor registry (instead of a sponsor registry); i.e. get all the convenience of a sponsor registry, while retaining control on the asset distribution.
  36. - **private registry**: such a registry is located behind a firewall, or protected by an additional security layer (HTTP authorization, SSL client-side certificates, IP address authorization...). The registry is operated by a private entity, outside of dotCloud’s control. It can optionally delegate additional authorization to the Index, but it is not mandatory.
  37. .. note::
  38. The latter implies that while HTTP is the protocol of choice for a registry, multiple schemes are possible (and in some cases, trivial):
  39. - HTTP with GET (and PUT for read-write registries);
  40. - local mount point;
  41. - remote docker addressed through SSH.
  42. The latter would only require two new commands in docker, e.g. ``registryget``
  43. and ``registryput``, wrapping access to the local filesystem (and optionally
  44. doing consistency checks). Authentication and authorization are then delegated
  45. to SSH (e.g. with public keys).
  46. 1.3 Docker
  47. ----------
  48. On top of being a runtime for LXC, Docker is the Registry client. It supports:
  49. - Push / Pull on the registry
  50. - Client authentication on the Index
  51. 2. Workflow
  52. ===========
  53. 2.1 Pull
  54. --------
  55. .. image:: /static_files/docker_pull_chart.png
  56. 1. Contact the Index to know where I should download “samalba/busybox”
  57. 2. Index replies:
  58. a. ``samalba/busybox`` is on Registry A
  59. b. here are the checksums for ``samalba/busybox`` (for all layers)
  60. c. token
  61. 3. Contact Registry A to receive the layers for ``samalba/busybox`` (all of them to the base image). Registry A is authoritative for “samalba/busybox” but keeps a copy of all inherited layers and serve them all from the same location.
  62. 4. registry contacts index to verify if token/user is allowed to download images
  63. 5. Index returns true/false lettings registry know if it should proceed or error out
  64. 6. Get the payload for all layers
  65. It's possible to run:
  66. .. code-block:: bash
  67. docker pull https://<registry>/repositories/samalba/busybox
  68. In this case, Docker bypasses the Index. However the security is not guaranteed
  69. (in case Registry A is corrupted) because there won’t be any checksum checks.
  70. Currently registry redirects to s3 urls for downloads, going forward all
  71. downloads need to be streamed through the registry. The Registry will then
  72. abstract the calls to S3 by a top-level class which implements sub-classes for
  73. S3 and local storage.
  74. Token is only returned when the ``X-Docker-Token`` header is sent with request.
  75. Basic Auth is required to pull private repos. Basic auth isn't required for
  76. pulling public repos, but if one is provided, it needs to be valid and for an
  77. active account.
  78. API (pulling repository foo/bar):
  79. ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  80. 1. (Docker -> Index) GET /v1/repositories/foo/bar/images
  81. **Headers**:
  82. Authorization: Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ==
  83. X-Docker-Token: true
  84. **Action**:
  85. (looking up the foo/bar in db and gets images and checksums for that repo (all if no tag is specified, if tag, only checksums for those tags) see part 4.4.1)
  86. 2. (Index -> Docker) HTTP 200 OK
  87. **Headers**:
  88. - Authorization: Token signature=123abc,repository=”foo/bar”,access=write
  89. - X-Docker-Endpoints: registry.docker.io [, registry2.docker.io]
  90. **Body**:
  91. Jsonified checksums (see part 4.4.1)
  92. 3. (Docker -> Registry) GET /v1/repositories/foo/bar/tags/latest
  93. **Headers**:
  94. Authorization: Token signature=123abc,repository=”foo/bar”,access=write
  95. 4. (Registry -> Index) GET /v1/repositories/foo/bar/images
  96. **Headers**:
  97. Authorization: Token signature=123abc,repository=”foo/bar”,access=read
  98. **Body**:
  99. <ids and checksums in payload>
  100. **Action**:
  101. ( Lookup token see if they have access to pull.)
  102. If good:
  103. HTTP 200 OK
  104. Index will invalidate the token
  105. If bad:
  106. HTTP 401 Unauthorized
  107. 5. (Docker -> Registry) GET /v1/images/928374982374/ancestry
  108. **Action**:
  109. (for each image id returned in the registry, fetch /json + /layer)
  110. .. note::
  111. If someone makes a second request, then we will always give a new token, never reuse tokens.
  112. 2.2 Push
  113. --------
  114. .. image:: /static_files/docker_push_chart.png
  115. 1. Contact the index to allocate the repository name “samalba/busybox” (authentication required with user credentials)
  116. 2. If authentication works and namespace available, “samalba/busybox” is allocated and a temporary token is returned (namespace is marked as initialized in index)
  117. 3. Push the image on the registry (along with the token)
  118. 4. Registry A contacts the Index to verify the token (token must corresponds to the repository name)
  119. 5. Index validates the token. Registry A starts reading the stream pushed by docker and store the repository (with its images)
  120. 6. docker contacts the index to give checksums for upload images
  121. .. note::
  122. **It’s possible not to use the Index at all!** In this case, a deployed version of the Registry is deployed to store and serve images. Those images are not authenticated and the security is not guaranteed.
  123. .. note::
  124. **Index can be replaced!** For a private Registry deployed, a custom Index can be used to serve and validate token according to different policies.
  125. Docker computes the checksums and submit them to the Index at the end of the
  126. push. When a repository name does not have checksums on the Index, it means
  127. that the push is in progress (since checksums are submitted at the end).
  128. API (pushing repos foo/bar):
  129. ^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  130. 1. (Docker -> Index) PUT /v1/repositories/foo/bar/
  131. **Headers**:
  132. Authorization: Basic sdkjfskdjfhsdkjfh==
  133. X-Docker-Token: true
  134. **Action**::
  135. - in index, we allocated a new repository, and set to initialized
  136. **Body**::
  137. (The body contains the list of images that are going to be pushed, with empty checksums. The checksums will be set at the end of the push)::
  138. [{“id”: “9e89cc6f0bc3c38722009fe6857087b486531f9a779a0c17e3ed29dae8f12c4f”}]
  139. 2. (Index -> Docker) 200 Created
  140. **Headers**:
  141. - WWW-Authenticate: Token signature=123abc,repository=”foo/bar”,access=write
  142. - X-Docker-Endpoints: registry.docker.io [, registry2.docker.io]
  143. 3. (Docker -> Registry) PUT /v1/images/98765432_parent/json
  144. **Headers**:
  145. Authorization: Token signature=123abc,repository=”foo/bar”,access=write
  146. 4. (Registry->Index) GET /v1/repositories/foo/bar/images
  147. **Headers**:
  148. Authorization: Token signature=123abc,repository=”foo/bar”,access=write
  149. **Action**::
  150. - Index:
  151. will invalidate the token.
  152. - Registry:
  153. grants a session (if token is approved) and fetches the images id
  154. 5. (Docker -> Registry) PUT /v1/images/98765432_parent/json
  155. **Headers**::
  156. - Authorization: Token signature=123abc,repository=”foo/bar”,access=write
  157. - Cookie: (Cookie provided by the Registry)
  158. 6. (Docker -> Registry) PUT /v1/images/98765432/json
  159. **Headers**:
  160. Cookie: (Cookie provided by the Registry)
  161. 7. (Docker -> Registry) PUT /v1/images/98765432_parent/layer
  162. **Headers**:
  163. Cookie: (Cookie provided by the Registry)
  164. 8. (Docker -> Registry) PUT /v1/images/98765432/layer
  165. **Headers**:
  166. X-Docker-Checksum: sha256:436745873465fdjkhdfjkgh
  167. 9. (Docker -> Registry) PUT /v1/repositories/foo/bar/tags/latest
  168. **Headers**:
  169. Cookie: (Cookie provided by the Registry)
  170. **Body**:
  171. “98765432”
  172. 10. (Docker -> Index) PUT /v1/repositories/foo/bar/images
  173. **Headers**:
  174. Authorization: Basic 123oislifjsldfj==
  175. X-Docker-Endpoints: registry1.docker.io (no validation on this right now)
  176. **Body**:
  177. (The image, id’s, tags and checksums)
  178. [{“id”: “9e89cc6f0bc3c38722009fe6857087b486531f9a779a0c17e3ed29dae8f12c4f”,
  179. “checksum”: “b486531f9a779a0c17e3ed29dae8f12c4f9e89cc6f0bc3c38722009fe6857087”}]
  180. **Return** HTTP 204
  181. .. note::
  182. If push fails and they need to start again, what happens in the index, there will already be a record for the namespace/name, but it will be initialized. Should we allow it, or mark as name already used? One edge case could be if someone pushes the same thing at the same time with two different shells.
  183. If it's a retry on the Registry, Docker has a cookie (provided by the registry after token validation). So the Index won’t have to provide a new token.
  184. 2.3 Delete
  185. ----------
  186. If you need to delete something from the index or registry, we need a nice
  187. clean way to do that. Here is the workflow.
  188. 1. Docker contacts the index to request a delete of a repository ``samalba/busybox`` (authentication required with user credentials)
  189. 2. If authentication works and repository is valid, ``samalba/busybox`` is marked as deleted and a temporary token is returned
  190. 3. Send a delete request to the registry for the repository (along with the token)
  191. 4. Registry A contacts the Index to verify the token (token must corresponds to the repository name)
  192. 5. Index validates the token. Registry A deletes the repository and everything associated to it.
  193. 6. docker contacts the index to let it know it was removed from the registry, the index removes all records from the database.
  194. .. note::
  195. The Docker client should present an "Are you sure?" prompt to confirm the deletion before starting the process. Once it starts it can't be undone.
  196. API (deleting repository foo/bar):
  197. ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  198. 1. (Docker -> Index) DELETE /v1/repositories/foo/bar/
  199. **Headers**:
  200. Authorization: Basic sdkjfskdjfhsdkjfh==
  201. X-Docker-Token: true
  202. **Action**::
  203. - in index, we make sure it is a valid repository, and set to deleted (logically)
  204. **Body**::
  205. Empty
  206. 2. (Index -> Docker) 202 Accepted
  207. **Headers**:
  208. - WWW-Authenticate: Token signature=123abc,repository=”foo/bar”,access=delete
  209. - X-Docker-Endpoints: registry.docker.io [, registry2.docker.io] # list of endpoints where this repo lives.
  210. 3. (Docker -> Registry) DELETE /v1/repositories/foo/bar/
  211. **Headers**:
  212. Authorization: Token signature=123abc,repository=”foo/bar”,access=delete
  213. 4. (Registry->Index) PUT /v1/repositories/foo/bar/auth
  214. **Headers**:
  215. Authorization: Token signature=123abc,repository=”foo/bar”,access=delete
  216. **Action**::
  217. - Index:
  218. will invalidate the token.
  219. - Registry:
  220. deletes the repository (if token is approved)
  221. 5. (Registry -> Docker) 200 OK
  222. 200 If success
  223. 403 if forbidden
  224. 400 if bad request
  225. 404 if repository isn't found
  226. 6. (Docker -> Index) DELETE /v1/repositories/foo/bar/
  227. **Headers**:
  228. Authorization: Basic 123oislifjsldfj==
  229. X-Docker-Endpoints: registry-1.docker.io (no validation on this right now)
  230. **Body**:
  231. Empty
  232. **Return** HTTP 200
  233. 3. How to use the Registry in standalone mode
  234. =============================================
  235. The Index has two main purposes (along with its fancy social features):
  236. - Resolve short names (to avoid passing absolute URLs all the time)
  237. - username/projectname -> \https://registry.docker.io/users/<username>/repositories/<projectname>/
  238. - team/projectname -> \https://registry.docker.io/team/<team>/repositories/<projectname>/
  239. - Authenticate a user as a repos owner (for a central referenced repository)
  240. 3.1 Without an Index
  241. --------------------
  242. Using the Registry without the Index can be useful to store the images on a
  243. private network without having to rely on an external entity controlled by
  244. Docker Inc.
  245. In this case, the registry will be launched in a special mode (--standalone?
  246. --no-index?). In this mode, the only thing which changes is that Registry will
  247. never contact the Index to verify a token. It will be the Registry owner
  248. responsibility to authenticate the user who pushes (or even pulls) an image
  249. using any mechanism (HTTP auth, IP based, etc...).
  250. In this scenario, the Registry is responsible for the security in case of data
  251. corruption since the checksums are not delivered by a trusted entity.
  252. As hinted previously, a standalone registry can also be implemented by any HTTP
  253. server handling GET/PUT requests (or even only GET requests if no write access
  254. is necessary).
  255. 3.2 With an Index
  256. -----------------
  257. The Index data needed by the Registry are simple:
  258. - Serve the checksums
  259. - Provide and authorize a Token
  260. In the scenario of a Registry running on a private network with the need of
  261. centralizing and authorizing, it’s easy to use a custom Index.
  262. The only challenge will be to tell Docker to contact (and trust) this custom
  263. Index. Docker will be configurable at some point to use a specific Index, it’ll
  264. be the private entity responsibility (basically the organization who uses
  265. Docker in a private environment) to maintain the Index and the Docker’s
  266. configuration among its consumers.
  267. 4. The API
  268. ==========
  269. The first version of the api is available here: https://github.com/jpetazzo/docker/blob/acd51ecea8f5d3c02b00a08176171c59442df8b3/docs/images-repositories-push-pull.md
  270. 4.1 Images
  271. ----------
  272. The format returned in the images is not defined here (for layer and JSON),
  273. basically because Registry stores exactly the same kind of information as
  274. Docker uses to manage them.
  275. The format of ancestry is a line-separated list of image ids, in age order,
  276. i.e. the image’s parent is on the last line, the parent of the parent on the
  277. next-to-last line, etc.; if the image has no parent, the file is empty.
  278. .. code-block:: bash
  279. GET /v1/images/<image_id>/layer
  280. PUT /v1/images/<image_id>/layer
  281. GET /v1/images/<image_id>/json
  282. PUT /v1/images/<image_id>/json
  283. GET /v1/images/<image_id>/ancestry
  284. PUT /v1/images/<image_id>/ancestry
  285. 4.2 Users
  286. ---------
  287. 4.2.1 Create a user (Index)
  288. ^^^^^^^^^^^^^^^^^^^^^^^^^^^
  289. POST /v1/users
  290. **Body**:
  291. {"email": "sam@dotcloud.com", "password": "toto42", "username": "foobar"'}
  292. **Validation**:
  293. - **username**: min 4 character, max 30 characters, must match the regular
  294. expression [a-z0-9\_].
  295. - **password**: min 5 characters
  296. **Valid**: return HTTP 200
  297. Errors: HTTP 400 (we should create error codes for possible errors)
  298. - invalid json
  299. - missing field
  300. - wrong format (username, password, email, etc)
  301. - forbidden name
  302. - name already exists
  303. .. note::
  304. A user account will be valid only if the email has been validated (a validation link is sent to the email address).
  305. 4.2.2 Update a user (Index)
  306. ^^^^^^^^^^^^^^^^^^^^^^^^^^^
  307. PUT /v1/users/<username>
  308. **Body**:
  309. {"password": "toto"}
  310. .. note::
  311. We can also update email address, if they do, they will need to reverify their new email address.
  312. 4.2.3 Login (Index)
  313. ^^^^^^^^^^^^^^^^^^^
  314. Does nothing else but asking for a user authentication. Can be used to validate
  315. credentials. HTTP Basic Auth for now, maybe change in future.
  316. GET /v1/users
  317. **Return**:
  318. - Valid: HTTP 200
  319. - Invalid login: HTTP 401
  320. - Account inactive: HTTP 403 Account is not Active
  321. 4.3 Tags (Registry)
  322. -------------------
  323. The Registry does not know anything about users. Even though repositories are
  324. under usernames, it’s just a namespace for the registry. Allowing us to
  325. implement organizations or different namespaces per user later, without
  326. modifying the Registry’s API.
  327. The following naming restrictions apply:
  328. - Namespaces must match the same regular expression as usernames (See 4.2.1.)
  329. - Repository names must match the regular expression [a-zA-Z0-9-_.]
  330. 4.3.1 Get all tags
  331. ^^^^^^^^^^^^^^^^^^
  332. GET /v1/repositories/<namespace>/<repository_name>/tags
  333. **Return**: HTTP 200
  334. {
  335. "latest": "9e89cc6f0bc3c38722009fe6857087b486531f9a779a0c17e3ed29dae8f12c4f",
  336. “0.1.1”: “b486531f9a779a0c17e3ed29dae8f12c4f9e89cc6f0bc3c38722009fe6857087”
  337. }
  338. 4.3.2 Read the content of a tag (resolve the image id)
  339. ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  340. GET /v1/repositories/<namespace>/<repo_name>/tags/<tag>
  341. **Return**:
  342. "9e89cc6f0bc3c38722009fe6857087b486531f9a779a0c17e3ed29dae8f12c4f"
  343. 4.3.3 Delete a tag (registry)
  344. ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  345. DELETE /v1/repositories/<namespace>/<repo_name>/tags/<tag>
  346. 4.4 Images (Index)
  347. ------------------
  348. For the Index to “resolve” the repository name to a Registry location, it uses
  349. the X-Docker-Endpoints header. In other terms, this requests always add a
  350. ``X-Docker-Endpoints`` to indicate the location of the registry which hosts this
  351. repository.
  352. 4.4.1 Get the images
  353. ^^^^^^^^^^^^^^^^^^^^^
  354. GET /v1/repositories/<namespace>/<repo_name>/images
  355. **Return**: HTTP 200
  356. [{“id”: “9e89cc6f0bc3c38722009fe6857087b486531f9a779a0c17e3ed29dae8f12c4f”, “checksum”: “md5:b486531f9a779a0c17e3ed29dae8f12c4f9e89cc6f0bc3c38722009fe6857087”}]
  357. 4.4.2 Add/update the images
  358. ^^^^^^^^^^^^^^^^^^^^^^^^^^^
  359. You always add images, you never remove them.
  360. PUT /v1/repositories/<namespace>/<repo_name>/images
  361. **Body**:
  362. [ {“id”: “9e89cc6f0bc3c38722009fe6857087b486531f9a779a0c17e3ed29dae8f12c4f”, “checksum”: “sha256:b486531f9a779a0c17e3ed29dae8f12c4f9e89cc6f0bc3c38722009fe6857087”} ]
  363. **Return** 204
  364. 4.5 Repositories
  365. ----------------
  366. 4.5.1 Remove a Repository (Registry)
  367. ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  368. DELETE /v1/repositories/<namespace>/<repo_name>
  369. Return 200 OK
  370. 4.5.2 Remove a Repository (Index)
  371. ^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^^
  372. This starts the delete process. see 2.3 for more details.
  373. DELETE /v1/repositories/<namespace>/<repo_name>
  374. Return 202 OK
  375. 5. Chaining Registries
  376. ======================
  377. It’s possible to chain Registries server for several reasons:
  378. - Load balancing
  379. - Delegate the next request to another server
  380. When a Registry is a reference for a repository, it should host the entire
  381. images chain in order to avoid breaking the chain during the download.
  382. The Index and Registry use this mechanism to redirect on one or the other.
  383. Example with an image download:
  384. On every request, a special header can be returned::
  385. X-Docker-Endpoints: server1,server2
  386. On the next request, the client will always pick a server from this list.
  387. 6. Authentication & Authorization
  388. =================================
  389. 6.1 On the Index
  390. -----------------
  391. The Index supports both “Basic” and “Token” challenges. Usually when there is a
  392. ``401 Unauthorized``, the Index replies this::
  393. 401 Unauthorized
  394. WWW-Authenticate: Basic realm="auth required",Token
  395. You have 3 options:
  396. 1. Provide user credentials and ask for a token
  397. **Header**:
  398. - Authorization: Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ==
  399. - X-Docker-Token: true
  400. In this case, along with the 200 response, you’ll get a new token (if user auth is ok):
  401. If authorization isn't correct you get a 401 response.
  402. If account isn't active you will get a 403 response.
  403. **Response**:
  404. - 200 OK
  405. - X-Docker-Token: Token signature=123abc,repository=”foo/bar”,access=read
  406. 2. Provide user credentials only
  407. **Header**:
  408. Authorization: Basic QWxhZGRpbjpvcGVuIHNlc2FtZQ==
  409. 3. Provide Token
  410. **Header**:
  411. Authorization: Token signature=123abc,repository=”foo/bar”,access=read
  412. 6.2 On the Registry
  413. -------------------
  414. The Registry only supports the Token challenge::
  415. 401 Unauthorized
  416. WWW-Authenticate: Token
  417. The only way is to provide a token on ``401 Unauthorized`` responses::
  418. Authorization: Token signature=123abc,repository="foo/bar",access=read
  419. Usually, the Registry provides a Cookie when a Token verification succeeded.
  420. Every time the Registry passes a Cookie, you have to pass it back the same
  421. cookie.::
  422. 200 OK
  423. Set-Cookie: session="wD/J7LqL5ctqw8haL10vgfhrb2Q=?foo=UydiYXInCnAxCi4=&timestamp=RjEzNjYzMTQ5NDcuNDc0NjQzCi4="; Path=/; HttpOnly
  424. Next request::
  425. GET /(...)
  426. Cookie: session="wD/J7LqL5ctqw8haL10vgfhrb2Q=?foo=UydiYXInCnAxCi4=&timestamp=RjEzNjYzMTQ5NDcuNDc0NjQzCi4="
  427. 7 Document Version
  428. ====================
  429. - 1.0 : May 6th 2013 : initial release
  430. - 1.1 : June 1st 2013 : Added Delete Repository and way to handle new source namespace.