-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
OCI: Downloading policy images from AWS private repository failure #7092
Comments
I'm not very familiar with the oci downloader. @carabasdaniel you and @DerGut have more insight into this. @DerGut anything you see that can help to resolve this. |
Hi @ashutosh-narkar, I'm not very familiar with the authorizer plugin mechanism used by the rest client. In this scenario I suspect the issue might be related to something like #6728. I've tried to use the policy CLI with the private registry and that one seems to work without any issues using the default docker resolver in the OCI package. I suspect the rest client used by the docker resolver might be the cause behind this as I mentioned. I hope @DerGut knows this better and can help us out. |
This issue has been automatically marked as inactive because it has not had any activity in the last 30 days. Although currently inactive, the issue could still be considered and actively worked on in the future. More details about the use-case this issue attempts to address, the value provided by completing it or possible solutions to resolve it would help to prioritize the issue. |
Perhaps you could join @bluebrown in their efforts on #7189 -- it's similar in nature, something goes wrong downloading OCI bundles, and it's probably got to do with auth headers of some sort. |
First of all, well done 🚀. There is, however, a potential problem. Given that this auth plugin is shared between OCI and others, testing it only for OCI There is a chance that someone uses the bearer auth plugin for something that That was one of the reasons why I was looking into the HTTP spec. As mentioned in |
That's a good point @bluebrown. Can we update the code to incorporate this? cc @carabasdaniel. I'm re-opening this issue to track this change. |
Trying to use a policy image from an AWS private repository fails to download all image layers. Getting a 400 Bad Request when trying to download the blob.
Steps to reproduce:
aws ecr get-login-password --region us-east-2
opa run -c <config.yaml> -l debug
From my initial investigation it seems that only the tarball layer fails to download while the manifest and config layer are loaded.
I've also tried using the rest aws plugin but getting the same results.
Can someone please take a look at what might be the cause of this issue and if there is a possible workaround ?
The text was updated successfully, but these errors were encountered: