Details
-
Type:
Bug
-
Status: Closed
-
Priority:
Major
-
Resolution: Not A Bug
-
Affects Version/s: 3.0.0, 3.28.1
-
Fix Version/s: None
-
Component/s: Docker
-
Labels:
-
Notability:2
Description
How to configure the Docker CLI to work with bintray is documented here:
https://www.jfrog.com/confluence/display/BT/Docker+Repositories#DockerRepositories-ConfiguringDocker
Essentially you give the Docker CLI a username, and a password, where the password value is an API Key from bintray. The API Key is long-lived and can be retrieved using a REST API / https://www.jfrog.com/confluence/display/BT/Bintray+REST+API#BintrayRESTAPI-Entitlements
When one configures Docker CLI with a username and an Bintray API key as the password, the docker cli can pull images from a bintray registry.
However, when one configures a NXRM Docker proxy repo with HTTP auth using the same credentials, then NXRM cannot successfully pull the bintray images.
This is a case where someone using docker CLI can use a bintray remote registry perfectly fine, but NXRM cannot proxy that same registry, even if NXRM has valid username and password values entered in the proxy repo HTTP authentication settings.
Expected
Make NXRM Docker proxy repos work using similar configuration (username/accesskey password) as Docker CLI, when pointing at Pro or enterprise bintray repos.
Attachments
Issue Links
- is duplicated by
-
NEXUS-25468 Add support for bearer token authentication to proxied upstream docker private repositories
-
- Closed
-
- is related to
-
NEXUS-21306 Cannot proxy Docker repos on Bintray
-
- Closed
-
-
NEXUS-12022 Allow preemptive authentication for maven proxy repositories
-
- Done
-
-
NEXUS-26450 Add bearer authentication type support for Docker
-
- Done
-
- supercedes
-
NEXUS-25468 Add support for bearer token authentication to proxied upstream docker private repositories
-
- Closed
-
- mentioned in
-
Page Loading...