-
Notifications
You must be signed in to change notification settings - Fork 4
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Improve container credentials retrieval matching container repository names #224
Comments
This issue requires changes both on Tower and Wave side Tower
Wave sideThe credentials matching logic on Wave should be extend so that it tries to match the keys:
The relevant code is this
CaveatsWhen entering container credentials in Tower the keys are validated using this code, and invoking this service on Wave The service accepts a registry name i.e. |
Tagging @jimmypoms that can help on Tower side |
@pditommaso so this will allow collaborates to access private repos as described I can not add a collaborator to my docker account, |
I've added you to the |
please make this repository private |
I'd suggest using another repo for testing. Also, a bit more details about the expected behaviour. Given a container repository e.g.
The best match is clearly 3. When having partial matches, it should be taken the longest path having a partial match, for example, having those choices
it should be taken 2. Does it make sense? |
Do we get this list of possible choices from tower credentials? |
Yes, once the registry is modified to return (optionally) the repository name |
@pditommaso I have added functionality to check credentials against a repository wave/src/main/groovy/io/seqera/wave/controller/ValidateRegistryCredsRequest.groovy Lines 9 to 16 in d15f1c3
|
Here. Now it's fetches all container cedentials, and then check for first one having a mahcing registry name, see here. Instead, it should be assumed the field |
This issue has been linked to a Canny post: Authenticate to ECR using AWS roles 🎉 |
This issue has been unlinked from a Canny post: Authenticate to ECR using AWS roles 😢 |
Wave retrieves the container credentials to be used, querying Tower credentials for
container-reg
provider and looking for a matching registry name for the given repository e.g.docker.io
given the repositorydocker.io/library/ubuntu
.However, this approach limits the possibility of authenticating repositories in the same registry owned by different users or organisations, requiring different credentials.
This issue aims to extend the credentials retrieval mechanism so that the entire container repository name is used to discover the matching credentials to be used, not just the registry name.
The implementation of this feature also requires that Tower allows, optionally, storing the full container name,
The text was updated successfully, but these errors were encountered: