Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Adds support for ECR auth when running concourse on an EC2 instance #96

Closed
wants to merge 1 commit into from

Conversation

nealedj
Copy link

@nealedj nealedj commented Feb 7, 2020

I run concourse on an EC2 instance which has an instance role which already allows it ECR permissions.

The existing implementation would have forced me to some static credentials available within concourse and I'd rather not if possible as credentials are already available from the metadata API.

There's a similar PR open on the s3-resource: concourse/s3-resource#115

…C2 instance

Signed-off-by: David Neale <neale.dj@gmail.com>
@nealedj nealedj changed the title Adds support for authenticating to ECR when running concourse on an E… Adds support for ECR auth when running concourse on an EC2 instance Feb 7, 2020
@nealedj nealedj requested a review from vito February 10, 2020 09:33
@hjribeiro
Copy link

+1

@vito
Copy link
Member

vito commented Mar 25, 2020

Sorry but I can't merge this because it breaks the security model of sharing version history.

More context here: concourse/concourse#3023

tl;dr: Resources are identified entirely by their configuration. If credentials are not in the configuration, the version history will become 'shared' to people who shouldn't have access. Future plans for supporting ECR auth are described in #3023.

Thanks for the PR though. 🙂 You're welcome to use a fork until proper support is implemented, I just don't want to adopt this pattern in our core resource types.

@vito vito closed this Mar 25, 2020
@analytically
Copy link

This breaks our flow as well. The docker-image breaks in 6.3.0 and I don't want to be adding credentials in my pipelines.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

4 participants