Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Show non-admin-enabled Azure container registries in tree #359

Closed
StephenWeatherford opened this issue Aug 6, 2018 · 4 comments · Fixed by #341
Closed

Show non-admin-enabled Azure container registries in tree #359

StephenWeatherford opened this issue Aug 6, 2018 · 4 comments · Fixed by #341
Milestone

Comments

@StephenWeatherford
Copy link
Contributor

No description provided.

@StephenWeatherford
Copy link
Contributor Author

@fiveisprime, @chrisdias This is the feature that Esteban's PR (#341) is fixing - now non-admin-enabled container registries show up in the tree. Which I assume is a good thing, but... All CLI-driven features like Push will fail for these container registries. Should we allow the PR but show an error if they try to Push etc.?

@fiveisprime
Copy link
Member

We talked a little about this last week and I seem to remember concluding that it's possible to use an RBAC service principal to fix the push when the admin user is disabled (#351). What will it take to automate SP auth and get admin disabled pushes working?

Ideally, we wouldn't expose "unsupported" registries to avoid confusion - can we land those together?

@StephenWeatherford
Copy link
Contributor Author

@estebanreyl Is there a way to set up docker to use an Azure registry container that's not admin-enabled?

@estebanreyl
Copy link

It is possible, both with service principals and a refresh token, in fact for the latter I have a working example. As for service principals, not sure how you would set that up for a user but automating auth using the tokens to enable push pull, etc should be easy enough. As a further note, the existing docker extension doesn't really support, admin enabled/non admin enabled registries for purposes of push, in fact in order to make a successful push to ACR people currently need to have the CLI and have done az acr login (I think issue #177 was referring to this). As a result we wouldn't be exposing anything that wasn't already unsupported for push. Going forward we could for example extend docker push, identify if an app is pushing to an azure container registry and if so ask the user if they would like us to login for them using a refresh token allowing push and pull functionality. We are currently working on this as well.

@vscodebot vscodebot bot locked and limited conversation to collaborators Feb 18, 2019
Sign up for free to subscribe to this conversation on GitHub. Already have an account? Sign in.
Projects
None yet
Development

Successfully merging a pull request may close this issue.

3 participants