@Dan_Woolf I can confirm that it works when we use an admin user access key. Thanks! It's a workaround, I suppose, but it's of course not optimal to give proget such wide permissions to the registry. Scope mapped tokens will be supported in a future version of proget, I hope?
Posts made by guyk
-
RE: Docker image pull through connector fails
-
RE: Docker image pull through connector fails
@Dan_Woolf It does look OK on our end, I've tried the following:
$ read -s pw [pasted the token I sent you] $ echo $pw | docker login -u tokenname --password-stdin registryname.azurecr.io WARNING! Your password will be stored unencrypted in /home/x/.docker/config.json. Configure a credential helper to remove this warning. See https://docs.docker.com/engine/reference/commandline/login/#credentials-store Login Succeeded $
I was then able to pull images from the registry.
-
RE: Docker image pull through connector fails
@Dan_Woolf Thank you, I have now sent an email as suggested.
-
RE: Docker image pull through connector fails
@atripp That's not so easy, I'm afraid. It would take a while to get someone to change the firewall config for me, and it sort of goes against the policy here anyway.
I might try to setup a proget instance on my laptop instead, just to test. But it does seem like a pretty long shot, the post you're referring to is talking about a different type of proxy. Also, as squid is tunnelling TLS traffic in our case (on both sides), I don't think it would be able to screw with the contents of HTTP headers tbh.
Is it by the way possible to disable the proxy for only the one connector or feed, isn't that a global setting?
-
RE: Docker image pull through connector fails
@Dan_Woolf Thanks for the info!
We're using a private Azure registry, and I've tried multiple repositories.
Fiddling around with
az acr manifest list
I'm pretty sure I've ascertained that all of the images use the same format,application/vnd.docker.container.image.v1+json
.We're using a squid proxy both between the clients and the proget server, and between the proget server and the Internet. Nothing in the squid logs indicate that they interfere with the traffic.
For authentication, we're using a scope mapped token with the scope
_repositories_pull
, and I've verified that I'm able to login with such a token usingpodman login
andpodman image pull
. -
RE: Docker image pull through connector fails
@Dan_Woolf yes, it seems like that did the trick, thanks. :)
Looking at the other sources we use, which include quay.io, public.ecr.aws, ghcr.io, registry.k8s.io and our own registry in Azure (which requires authentication), I got all of them working except our Azure registry. It also seems important to keep the "Attempt to search the container registry" checkbox cleared, by the way.
It looks like the "not found: manifest unknown: manifest unknown" error message will display no matter the reason for the failure, which might include wrong endpoint setting, the "Attempt to search..." being checked, registry redirects not being allowed through the proxy or maybe also authentication errors?
I wish I'd get some more detailed information on connector errors, as it's hard to get the Azure registry working as it is now.
-
RE: Docker image pull through connector fails
@Dan_Woolf Thanks, here is the connector setup:
There are no cached images.
-
RE: Docker image pull through connector fails
@stevedennis we've tried upgrading to 2023.8, as there is a relevant-ish fix in there (https://inedo.myjetbrains.com/youtrack/issue/PG-2388), but unfortunately, there was no change in the behavior.
-
RE: Docker image pull through connector fails
@stevedennis we've upgraded ProGet multiple times, so it's a bit tricky to be sure in which version this stopped working. Looking at the published dates of the working container images, however, it might very well be when we upgraded from 2022.0.28 to 2023.0.3. We're using amd64 only, and the problem occurs also with our own images, which aren't multi-platform.
-
Docker image pull through connector fails
Re: Can't pull docker image from remote connector
Is it possible that this issue has resurfaced? We're seeing the same symptoms with version 2023.7:
$ docker image pull proget.server/docker.io/bitnami/sealed-secrets-controller:v0.20.5 Error response from daemon: manifest for proget.server/docker.io/bitnami/sealed-secrets-controller:v0.20.5 not found: manifest unknown: manifest unknown
It works if I pull an already cached image, but new images fail.
Our ProGet is installed on Windows, and we have configured ProGet to use a squid proxy.
-
RE: [ProGet] The jetstack helm repo breaks our internal helm feed
Many thanks, version 2023.7 did the trick. :)
-
[ProGet] The jetstack helm repo breaks our internal helm feed
Adding the jetstack repo (https://charts.jetstack.io/) as a connector works fine, and it passes the health checks. When we add it to our internal helm feed, however, all operations involving the feed fail with the following error message:
Helm chart version "0.15-alpha.3" is invalid.
Details:
Inedo.ProGet.InvalidPackageException: Helm chart version "0.15-alpha.3" is invalid.
at Inedo.ProGet.Feeds.Helm.HelmChart..ctor(YamlMappingNode node, Nullable1 feedId, List1 images)
at Inedo.ProGet.Feeds.Helm.HelmConnector.GetChartsAsync(String name)
at Inedo.ProGet.Feeds.Helm.HelmFeed.GetChartsAsync(String name)
at Inedo.ProGet.Feeds.Helm.HelmFeed.SearchPackagesAsync(String query, Int32 maxCount, Boolean includePrerelease)
at Inedo.ProGet.WebApplication.Pages.Packages.ListPackagesPage.PackageList.InitializeAsyncInternal()
at Inedo.ProGet.WebApplication.Pages.Packages.ListPackagesPage.PackageList.InitializeAsync()This repo hosts the official cert-manager helm chart, which is a CNCF member project.
Issue encountered in version 2023.5 of ProGet on Windows, using the manual installer option.