-
Notifications
You must be signed in to change notification settings - Fork 106
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add ECR as a first-class source #110
Comments
Can you explain a little more what you're looking for? Is it a task to handle authentication to ECR 'on demand' so you don't run into a 12 hour expiry but get a fresh token each build? Or something else? |
Right! So when I use ECR as a source for the container that Azure Devops executes all its commands through, I have no way of configuring it to avoid getting snagged by that 12 hour restriction. So, in my
I switched to using Azure's container registry because it has passwords that don't expire after 12 hours. That connection is configured as a first class connection in the project settings of Azure Devops. I'm thinking for AWS to be satisfied, it needs to provide a container registry type that does the song & dance to acquire tokens on the fly when being accessed. |
Sidenote: I understand why AWS does this, obviously long lived tokens like this are not great for security. But the ecosystem is not aware of any conventions AWS chooses to layer overtop, which causes situations like this. |
same here. |
I would like to use a docker image for my build pipelines, but unfortunately I have no way of automating authentication in the pipeline prior the the container being downloaded.
The 12 hour key restriction for ECR makes it basically impossible to use containers from ECR for my builds.
The text was updated successfully, but these errors were encountered: