-
Notifications
You must be signed in to change notification settings - Fork 4.3k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feature request: docker registry secret backend #2275
Comments
Big +1 |
Huge +1 |
Any progress on this? |
+1 for this one, would be great |
Hi there, I'm not entirely sure if this is what you all have been looking for you may find this tool useful: |
Cool! I was more thinking about making a Secret Engine that generates temporary credentials using Vault. Maybe working together with something like: https://github.com/cesanta/docker_auth |
this feels like it might work, the only feasible way I can see though would be:
I thought about the idea of the Docker Registry authenticating against Vault using OIDC/Token Auth, but I think that's not the right "type" of auth plugin/backend (auth instead of secret?). https://docs.docker.com/registry/spec/auth/jwt/ https://www.vaultproject.io/docs/auth/jwt Pretty sure the https://github.com/cesanta/docker_auth approach (with an appropriate place to store the temp generated credentials) is probably the better answer. |
Bunch of feature requests on https://github.com/cesanta/docker_auth for "where to store credentials" (which Vault would generate + insert over there via $somemethod): In addition to the suggested Static List of Users + OpenLDAP mentioned above. Static List of Users is actually YAML it seems - you'd want to have some (separate?) file that Vault can manipulate that https://github.com/cesanta/docker_auth can read to make it work I suspect. Would avoid the dependence on any specific database/storage implementation... |
I started one, really alpha state, it's my first |
It would be great to be able to use vault in front of the private docker registry to control revokable access to read/push to certain images/groups. It could work in conjunction with the LDAP auth backend to add/remove a user from access to push as well as you could use AppID to allow CI/CD to push images after successful builds.
This would be HUGE in enterprise where people are just now getting started with on-prem docker.
Thank you.
The text was updated successfully, but these errors were encountered: