You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
However, sinker doesn't use the docker client for every registry interaction. When it doesn't, it uses the go container registry client with basic auth.
Due to this, for container registries that are TLS enabled and where basic auth isn't possible, sinker won't completely work.
I think there may be a fix, though. The docker client exposes its TLS-configured HTTPClient.Transport, which can be provided to the go-containerregistry remote client. For example:
The other alternative is to just use the docker client for all registry interactions, but that may not be advised if the goal is to support all OCI images.
The docker client will configure its HTTP client transport to use TLS if you configure it properly through environment variables:
However, sinker doesn't use the docker client for every registry interaction. When it doesn't, it uses the go container registry client with basic auth.
For example: https://github.com/plexsystems/sinker/blob/v0.17.0/internal/docker/docker.go#L178
Due to this, for container registries that are TLS enabled and where basic auth isn't possible, sinker won't completely work.
I think there may be a fix, though. The docker client exposes its TLS-configured
HTTPClient.Transport
, which can be provided to thego-containerregistry
remote client. For example:This way, if the environment is configured correctly then the docker client will load client certs which can be used in comms in sinker.
It's completely possible i'm approaching this incorrectly. If this is possible without code changes, please enlighten me 😄
I'm also happy to raise a PR. If my proposed solution seems reasonable, I'll raise one.
The text was updated successfully, but these errors were encountered: