-
Notifications
You must be signed in to change notification settings - Fork 58
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat: support auth from docker config #2560
Conversation
|
GitGuardian id | GitGuardian status | Secret | Commit | Filename | |
---|---|---|---|---|---|
14330135 | Triggered | Generic High Entropy Secret | 961d487 | container-engine-lib/lib/backend_impls/docker/docker_manager/docker_auth_test.go | View secret |
14330135 | Triggered | Generic High Entropy Secret | 41451af | container-engine-lib/lib/backend_impls/docker/docker_manager/docker_auth_test.go | View secret |
🛠 Guidelines to remediate hardcoded secrets
- Understand the implications of revoking this secret by investigating where it is used in your code.
- Replace and store your secrets safely. Learn here the best practices.
- Revoke and rotate these secrets.
- If possible, rewrite git history. Rewriting git history is not a trivial act. You might completely break other contributing developers' workflow and you risk accidentally deleting legitimate data.
To avoid such incidents in the future consider
- following these best practices for managing and storing secrets including API keys and other credentials
- install secret detection on pre-commit to catch secret before it leaves your machine and ease remediation.
🦉 GitGuardian detects secrets in your source code to help developers and security teams secure the modern development process. You are seeing this because you or someone else with access to this repository has authorized GitGuardian to scan your pull request.
False positive, it's just |
As @pk910 mentioned it to me, this will probably not work since the engine is running in its own container, so there's no access to the users config file there. So we might need to:
|
container-engine-lib/lib/backend_impls/docker/docker_manager/docker_auth_test.go
Outdated
Show resolved
Hide resolved
container-engine-lib/lib/backend_impls/docker/docker_manager/docker_auth_test.go
Show resolved
Hide resolved
@tedim52 I've updated the PR, but I'm strugeling testing this end-to-end. I'm building the engine with I noticed that when I build the engine it gets some tag locally.. e.g. Example: I wanted to change this specific line for debugging purposes: return stacktrace.Propagate(err, "Tried pulling image '%v' with platform '%v' but failed: %v", imageName, platform), false To this: return stacktrace.Propagate(err, "Tried pulling image '%v' with platform '%v' but failed. XXXXX: %v", imageName, platform, imagePullOptions), false But I don't see that change, even after running Any idea? |
This is awesome! You likely have to run an engine restart |
Yeah, I did something similar. I did stop it and then start it with the version flag. I also verified that it was running the right image using ‘engine status’ and also via ‘docker ps’, and it did. But somehow the code change was still not there. I’ll try to figure out the problem today. I was just wondering if I’m doing anything wrong on the local dev workflow.
…On Fri, Oct 25, 2024 at 08:26, Tedi Mitiku ***@***.***(mailto:On Fri, Oct 25, 2024 at 08:26, Tedi Mitiku <<a href=)> wrote:
This is awesome! You likely have to run an engine restart cli/cli/dist/cli_darwin_arm64/kurtosis engine restart --version 04c515-dirty. Running an engine start on an already running engine won't start it again even if provided a different version. Once you've restarted, run engine status to ensure the version is 04c515-dirty.
—
Reply to this email directly, [view it on GitHub](#2560 (comment)), or [unsubscribe](https://github.com/notifications/unsubscribe-auth/AALONWGJSCESZNWL2Y4JKETZ5HQCLAVCNFSM6AAAAABPHVMKESVHI2DSMVQWIX3LMV43OSLTON2WKQ3PNVWWK3TUHMZDIMZWHE3TSMZTGI).
You are receiving this because you authored the thread.Message ID: ***@***.***>
|
@tedim52 I think I'm starting to understand the problem. I did that change to that stackTrace.Propagate message and was expecting it to show up at some point at the So, this means that the part that is trying to get the docker auth from the |
fyi @tedim52 , I just added the volume mount also to the So the way it works now is that:
Some caveats:
|
Hey @skylenet I think this approach is really good - and yes regarding where the |
...osis_backend/engine_functions/docker_config_storage_creator/docker_config_storage_creator.go
Show resolved
Hide resolved
container-engine-lib/lib/backend_impls/docker/docker_manager/docker_auth.go
Outdated
Show resolved
Hide resolved
...osis_backend/engine_functions/docker_config_storage_creator/docker_config_storage_creator.go
Outdated
Show resolved
Hide resolved
container-engine-lib/lib/backend_impls/docker/docker_manager/docker_auth_test.go
Outdated
Show resolved
Hide resolved
@tedim52 thank you for the review 🙏 I just updated the PR with the changes that you've requested. |
container-engine-lib/lib/backend_impls/docker/docker_manager/docker_auth.go
Outdated
Show resolved
Hide resolved
container-engine-lib/lib/backend_impls/docker/docker_manager/docker_auth.go
Show resolved
Hide resolved
d8f2a10
to
7912ab8
Compare
dab4470
Reverts #701 Depends on kurtosis-tech/kurtosis#2560
🤖 I have created a release *beep* *boop* --- ## [1.4.0](1.3.1...1.4.0) (2024-10-29) ### Features * support auth from docker config ([#2560](#2560)) ([dab4470](dab4470)) --- This PR was generated with [Release Please](https://github.com/googleapis/release-please). See [documentation](https://github.com/googleapis/release-please#release-please). --------- Co-authored-by: kurtosisbot <[email protected]>
Description
Supports docker credentials from config (
~/.docker/config.json
). Read #2503Is this change user facing?
yes
References (if applicable)
Fixes #2503