You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
/var/vcap/sys/log/cloud_controller_ng/cloud_controller_ng.log.5.gz:{"timestamp":1526311559.8367982,"message":"Request failed: 500: {\"error_code\"=>\"UnknownError\", \"description\"=>\"An unknown error occurred.\", \"code\"=>10001, \"test_mode_info\"=>{\"description\"=>\"docker_password can be up to 1,000 characters\",
From inspecting the cloud controller code, it looks that the limit was reduced from 16000 chars to 1000 chars: e06d71d
The user in this post mentioned to us that
We are using the Amazon Elastic Container Registry and the passwords generated are really long (around 2k characters) because they are signed tokens.
So I guess there are valid use cases for these long passwords.
Is there a reason for this limit? Could we increase it?
The text was updated successfully, but these errors were encountered:
Issue
Pushing a Docker application with a private Docker registry using a password of more than 1000 characters results in a server-side error.
Context
https://stackoverflow.com/questions/49015047/cannot-deploy-docker-image-form-aws-private-registry
Cloud controller's log shows the following:
From inspecting the cloud controller code, it looks that the limit was reduced from 16000 chars to 1000 chars: e06d71d
The user in this post mentioned to us that
Is there a reason for this limit? Could we increase it?
The text was updated successfully, but these errors were encountered: