-
Notifications
You must be signed in to change notification settings - Fork 2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Reading dockercfg files for authenticating with private registries #773
Conversation
LGTM. Related? #702 |
Reading dockercfg files for authenticating with private registries
This issue is bigger than just having the https:// on the beginning of the repo address (you should never have to hand edit the auths section of config.json -- that part is generated by In docker.go it uses if authConfiguration, ok := authConfigurations.Configs[repo]; ok {
authOptions = authConfiguration
} But {
"auths": {
"https://gcro.io": {
"auth": "<some token>",
"email": "[email protected]"
}
}
} What should happen is either:
|
@diptanu why is this closed, @trenton42 is correct, this is still broken unless you manually re-write the |
@waziers I think this did actually get fixed recently. The hitch I found is that it does look at the SSL flag in the docker driver config of the job, so I had to set that to true. |
@waziers @trenton42 So what we have implemented there is Nomad to be able to use the dockercfg file specified by an operator. Nomad doesn't automatically do The reason why this is hard to do is that the space is very fragmented and every registry provider has created their own way of authenticating with the registry and generate the credentials. Also as @trenton42 has mentioned, if a registry is behind SSL, the |
I'm going to lock this pull request because it has been closed for 120 days ⏳. This helps our maintainers find and focus on the active contributions. |
Fixed #660 and #702