-
Notifications
You must be signed in to change notification settings - Fork 566
crane: Support configuring unqualified search registries instead of only docker.io #1364
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
Thanks for filing this issue. Would you expect In Docker terms, a regular string like We could make It might be worthwhile to add a |
@imjasonh I definitely get that it's a convention with all of the libraries and I absolutely hate it due to the potential data leaks for no real gain. Honestly, if |
@imjasonh FWIW, I'm OK with something like a |
This could work. I'd want to make sure we don't accidentally load and parse that file every time we parse a reference, but that feels doable. Is there any prior art for this in Podman maybe today? I know they're also sometimes on a warpath about dockerisms leaking all over the place, I'd be surprised if they didn't have some solution for this we could |
I'm a long time Following that path would be an awesome solution since it would just fall in line with a lot of other generic tools. |
This issue is stale because it has been open for 90 days with no |
Dear Stale Issues Bot, I'd still like this. |
I think I'd be okay having We've had similar requests for configuring mirror repos (#1200), which I see registries.conf also supports. There don't seem to (currently) be too many options in that config that we'd have to worry about it being a burden supporting them all, or documenting what we do/don't support. If someone wants to pick this up I'd be happy to review a PR for it. |
Describe the bug
Running
crane
commands with typos leaks data todocker.io
To Reproduce
Run
crane ls secretprojectname
Expected behavior
crane
does not submitsecretprojectname
todocker.io
Actual behavior
Additional context
It is common for CI/CD systems to use variables in place of hostnames. Should one of these variables be misconfigured, then sensitive internal project names may be sent to
docker.io
without the users knowledge. Additionally, the hostnames themselves could be sensitive and a misconfiguration on the part of the project name could lead to the hostname leaking todocker.io
.This maps directly to OWASP M4: Unintended Data Leakage
Proposed Solution:
Ensure that the user must specify a default repository on all operations. Supporting a configuration file would be ideal.
crane version
:v0.8.0
The text was updated successfully, but these errors were encountered: