-
Notifications
You must be signed in to change notification settings - Fork 102
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug]: Can't login to Trow registry when secured with password #391
Comments
Hi, thanks for the report. Locally it seems to work:
I'll check if the helm chart is not rendering correctly.
Latest version of the helm chart is 0.8.1, latest version of trow is 0.6.4 (the helm release CI action creates confusing release names :/). |
Thanks for the answer. The thing is that in my case this
But About the Trow version - in Git there is the |
Ah sorry, indeed I can reproduce:
The error:
Yes |
Thanks. So it seems there is an actual bug.
|
Describe the bug
I deploy trow on a GKE cluster using Helm chart. When I set user/password to protect it, I can't
docker login
to list/push/pull images:However, when I give wrong credentials an error is different:
I'm sure that the network setup (Service, Ingress, TLS cert) is fine - when I comment out user/password in
values.yaml
all works fine - I can list/push/pull images.I also checked the K8s password Secret value and it's mount as a file in the Trow container - they are fine. The file's content is the same as the password I enter into
values.yaml
.To Reproduce
GKE cluster version: 1.30.x
GKE node pools version: 1.30.x
trow chart version: 0.8.1
trow image tag: 0.6.4
trow is set up with Google Managed Certificates on GKE as in HELM_INSTALL.md
values.yaml
content (password and domain masked):Expected behavior
I should be able to protect Trow registry with user and password and be able to log in with proper credentials.
Output/Logs
During failed
docker login
attempts (the ones with proper credentials) I can see in trow pod logs:With improper credentials logs are different:
Trow Info
trow chart version: trow-0.8.1
trow image tag: 0.6.4
Kubernetes
Additional context
Trow seems great and it covers my use case perfectly but I can't use it when exposed unprotected to the Internet as this would mean exposing company's closed code. It has to be somehow secured. Maybe it's possible to provide a setup when it's protected on networking level, but password protection seems easier (except I can't make it work 😅 ).
What's interesting is that I can get a proper JWT token with:
I wonder if building Trow image from the master branch and using it during deployment could solve this problem? Newest version is 0.8.1, whereas the newest available Docker image is from 0.6.4 version.
The text was updated successfully, but these errors were encountered: