Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add authentication from config.json file #2

Open
wants to merge 3 commits into
base: master
Choose a base branch
from

Conversation

3r1co
Copy link

@3r1co 3r1co commented May 16, 2017

Hi,

I really like your tool, but I thought it might be cleaner to separate the login with AWS and the Registry Authentication. So I wrote an integration to read the users config.json file in order to copy images between two registries that have authentication enabled.

@mdlavin
Copy link
Owner

mdlavin commented May 16, 2017 via email

Copy link
Owner

@mdlavin mdlavin left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Does the config.json have support for working seamlessly with ECR or does it require a step before using copy-docker-image? I'm ok with making copy-docker-image more flexible to allow external authentication in addition to automatic ECR auth, but I don't want to lose the nice experience of letting the AWS take care of auth automatically.

}

registry, err := registry.New(url, username, password)
registry, err := registry.NewInsecure(url, username, password)
Copy link
Owner

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Switching to allow insecure connections seems like a dangerous thing to me. Can this be switched back to New instead?

@Vad1mo
Copy link

Vad1mo commented Apr 15, 2018

Hey @3r1co @mdlavin,
this is a nice repo. However I am missing exactly this feature from the PR reuse the config.json

Any plan to merge this feature?

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants