Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Error when using docker registry password longer than 1000 chars (for example Amazon Elasstic Container Registry tokens) #1141

Closed
MatthiasWinzeler opened this issue May 15, 2018 · 3 comments

Comments

@MatthiasWinzeler
Copy link

MatthiasWinzeler commented May 15, 2018

Issue

Pushing a Docker application with a private Docker registry using a password of more than 1000 characters results in a server-side error.

Context

https://stackoverflow.com/questions/49015047/cannot-deploy-docker-image-form-aws-private-registry

Cloud controller's log shows the following:

/var/vcap/sys/log/cloud_controller_ng/cloud_controller_ng.log.5.gz:{"timestamp":1526311559.8367982,"message":"Request failed: 500: {\"error_code\"=>\"UnknownError\", \"description\"=>\"An unknown error occurred.\", \"code\"=>10001, \"test_mode_info\"=>{\"description\"=>\"docker_password can be up to 1,000 characters\",

From inspecting the cloud controller code, it looks that the limit was reduced from 16000 chars to 1000 chars: e06d71d

The user in this post mentioned to us that

We are using the Amazon Elastic Container Registry and the passwords generated are really long (around 2k characters) because they are signed tokens.
So I guess there are valid use cases for these long passwords.

Is there a reason for this limit? Could we increase it?

@cf-gitbot
Copy link

We have created an issue in Pivotal Tracker to manage this:

https://www.pivotaltracker.com/story/show/157592841

The labels on this github issue will be updated when the story is started.

@zrob
Copy link
Contributor

zrob commented Jun 4, 2018

Actually the limit was around 255 before, I know that commit is confusing, but it came from this issue #843.

It seems reasonable to bump it again.

@zrob
Copy link
Contributor

zrob commented Jun 8, 2018

should be resolved in linked story and available in the next capi-release 1.61.0

please re-open if the issue persists after that version

@zrob zrob closed this as completed Jun 8, 2018
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

4 participants