Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add support for authenticating with Amazon ECR private registry using repository policies and/or IAM policies #240

Open
m-the-magnificent opened this issue Aug 15, 2024 · 1 comment
Labels
area/security Security related kind/enhancement Enhancement, improvement, extension

Comments

@m-the-magnificent
Copy link

How to categorize this issue?

/area security
/kind enhancement

What would you like to be added:
I would like the registry cache to be able to pull and cache images where

  1. the upstream registry is an Amazon ECR private registry, and,
  2. access is managed by Repository policies,
  3. without explicit credentials being used.

In this use case, the AWS account where the shoot is deployed, and the registry cache pod is running, already has pull access to the repositories in Amazon ECR private registry via repository policies.

Why is this needed:

  • We have a large number of large shoots in AWS, where services use Amazon ECR private registry as their registry to pull images from. Access to the private registry is managed via repository policies. There are no explicit credentials being used (e.g., username / password).
  • We would like to leverage the registry cache extension to cache images.
@gardener-prow gardener-prow bot added area/security Security related kind/enhancement Enhancement, improvement, extension labels Aug 15, 2024
@ialidzhikov
Copy link
Member

As we talked offline, the limitation comes from the Distribution project, see distribution/distribution#4281.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/security Security related kind/enhancement Enhancement, improvement, extension
Projects
None yet
Development

No branches or pull requests

2 participants