-
Notifications
You must be signed in to change notification settings - Fork 4.7k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Pod unable to pull image from private registry on Docker Hub #18932
Comments
@openshift/sig-developer-experience |
@php-coder this is pods/deployments pulling from dockerhub, so @openshift/sig-master or @openshift/sig-pod @mxxk one possiblity is some issues w/ the secret creation command generating invalid docker secret formats. Have you tried creating a dockerconfig secret by hand (supplying your .docker/config.json as a key named dockerconfigjson to a secret). you can see an example of how to create the secret in this fashion here: https://docs.openshift.org/latest/dev_guide/builds/build_inputs.html#using-docker-credentials-for-private-registries
|
Thanks @php-coder, @bparees. I definitely tried both docker secret formats, and at one point embedded more than one entry (i.e. multiple hostnames) in both .dockerconfigjson and .dockercfg formats to see if it would help. Ultimately I determined the problem to not be with docker secret formats, since I was able to pull images from a private registry hosted on gitlab.com. It's docker.io private registries which were having issues. It would be good to repeat the test with a third private docker registry host (I'm thinking codefresh.io), to have another data point. |
Okay, for that third data point, I just confirmed that OpenShift is able to pull from a private registry on codefresh.io. I did not test for multiple types of secrets, and instead used the newrer .dockerconfigjson format (rather than .dockercfg). Here's a little more information about how I found out I needed two secrets in order to get the gitlab.com repo to work... Since I pushed my image to registry.gitlab.com, I used
What caught my attention is the docker.io is confusing because their actual domain name for registry pulls is index.docker.io (can anyone confirm?), and their
Looks like they use auth.docker.io for their auth realm. In spite of all this, adding secrets to OpenShift for three domain names simultaneously (docker.io, index.docker.io, auth.docker.io), did not make for a successful deployment 😞 |
I can confirm (for OpenShift Online) that pods cannot pull private images from docker.io. I tried like every instruction I could find on the internet but none of them worked 😞 . Interesting though is the fact that at some point it worked (around 6th of February) but a few days later it again stopped working. It also works on a dedicated instance that I have access to, which has the version v3.6.173.0.49, although it didn't work there a few days ago neither (maybe because a different version was deployed then, didn't check that). |
@sjenning @mfojtik @derekwaynecarr @eparis who can look into this reported issue that openshift online pods can't pull images from private docker.io registries? |
I struggle with the same, very new to OpenShift.
Using Authentication Type = Image Registry Credentials it also doesn't work from the UI. I also tried to use the dockercfg with |
OK, thanks @bparees that command works for me
But as a Docker4Mac user I had to disable the preferences in General tab -> Securely store docker logins in macOS keychain and run |
@StefanScherer ok, so this sounds like the known issues w/ @mxxk can you confirm the same workaround works for you? it's not clear to me from your comment in #18932 (comment) if you actually tried to create the secret from a working .docker/config.json file on disk? |
@StefanScherer – there are two places where the docker image secret get used:
In this issue I described how (1) works fine but (2) fails. In your two comments it sounds like you had an issue with (1) regardless of using @bparees – Though I believe @StefanScherer's observation is not related to this issue (see above), I tried the workaround for posterity and can confirm that the deployment still fails at pod creation, step (2). And yes, here are all of the permutations of image pull secret creation I've tried:
All of the above permutations produce valid, correctly-formatted docker image pull secrets, and I can verify this because step (1) image stream creation succeeds and imports image metadata. But all fail at step (2) 😢 |
Thanks @mxxk |
Well I also created a template with |
Sure, fix for this was merged in kubernetes/kubernetes#57463 upstream |
Issues go stale after 90d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle stale |
/remove-lifecycle stale |
I'm having the same issue, where a pod is getting the error when pulling the image Has anyone been able to resolve this? |
@PatKayongo This is an example that works for me in OpenShift 3.9. - kind: ImageStream
apiVersion: v1
metadata:
name: yourimage
labels:
app: yourimage
tier: application
spec:
dockerImageRepository: docker.io/yourorg/yourimage
tags:
- annotations: null
from:
kind: DockerImage
name: docker.io/yourorg/yourimage:yourtag
generation: 2
importPolicy: {}
name: yourtag
referencePolicy:
type: Source
- kind: DeploymentConfig
apiVersion: v1
metadata:
name: yourservice
generation: 1
labels:
app: yourservice
tier: application
spec:
replicas: 1
selector:
app: yourservice
deploymentconfig: yourservice
tier: application
strategy:
activeDeadlineSeconds: 21600
resources: {}
rollingParams:
intervalSeconds: 1
maxSurge: 25%
maxUnavailable: 25%
timeoutSeconds: 600
updatePeriodSeconds: 1
type: Rolling
template:
metadata:
labels:
app: yourservice
deploymentconfig: yourservice
tier: application
spec:
containers:
- name: yourservice
image: yourimage
imagePullPolicy: Always
env:
- name: SOME_ENVS
value: somevalue
ports:
- containerPort: 3000
protocol: TCP
resources: {}
terminationMessagePath: /dev/termination-log
terminationMessagePolicy: File
volumeMounts:
- name: data
mountPath: /data
dnsPolicy: ClusterFirst
restartPolicy: Always
schedulerName: default-scheduler
securityContext: {}
terminationGracePeriodSeconds: 30
volumes:
- name: data
emptyDir: {}
test: false
triggers:
- imageChangeParams:
automatic: true
containerNames:
- yourservice
from:
kind: ImageStreamTag
name: yourimage:yourtag
type: ImageChange
- type: ConfigChange
status: {} |
I still seem to get the same error:
This works fine on an OpenShift Origin cluster, but it seems to be failing on an OpenShift Container Platform cluster. I've created, and recreated the secrets to no avail. |
@PatKayongo what command are you using to create your docker-registry secret (oc create secret ..., oc secret create ...)? |
This is a known issue: We've made a few attempts to fix it but have always introduced regressions elsewhere. tl;dr the cause is an interaction between the dockershim in the kubelet stripping out the docker.io domain from the image path before making the call to docker and our docker (projectatomic/docker) supporting registry search lists. |
I could not pull from private docker hub repo too: I tried setting off 'Securely store docker logins in macOS keychain' in docker preferences for mac,
|
I struggled with this issue for a day and verified the solution suggested by @StefanScherer work. Use a secret of type generic instead of docker-registry
Add an entry for your external registery to the
e.g. oc login ..
oc project <your project>
export reg_username=xxxuser
export reg_password=xxxpass
export authtoken=$(echo -n ${reg_username}:${reg_password} | base64 )
cat >./config.json <<EOL
{
"auths": {
"<docker_registry_hostname e.g. nexusrepo.xyz.com>:<docker_registry_port e.g 5000>": {
"auth": "${authtoken}"
}
}
}
EOL
oc create secret generic external-registry \
--from-file=.dockerconfigjson=./config.json \
--type=kubernetes.io/dockerconfigjson
oc secrets link default external-registry --for=pull
Now you should be able to install an image from your external registry. oc new-app <registry_host>:<registry_port>/<image_path>--name <application name>
|
@ajarv it's not working for me. |
If you use service account in our deployment config in my case I used spserviceuser so the spserviceuser have to have access to pull your private registry.
If you don't specify any service user then please link the secrete default service user In my case
This is problem is occuring only when we don't use the default service account in deployment config. Thanks, |
Still not working at version 3.11. |
Issues go stale after 90d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle stale |
/remove-lifecycle stale |
Are there any updates on this for OpenShift 3.11? I have tried all workarounds mentioned here and couldn't pull an image from a private repository on Docker Hub. Pulling the image using |
We have moved away from Docker Hub to use Quay instead. Works as a charm both on 3.9 and 3.11. |
I'm also lost with pulling images from private docker repos.
|
I also spent hours trying to get an image from private registries (github then gitlab), until I found this thread. |
For anyone else that winds up here due to image pull issues when running a build that is based on an ImageStream tied to a private repo -- I struggled getting a builder pod to be able to pull from a private repo because I had only linked the secret to builder with
Once I linked with
Incidentally, the default value for |
We also encountered problems when trying to pull a private builder image from Dockerhub, which is why I'm here. First of all, our OpenShift Version:
We're setting up the following resources (which works perfectly on 3.7):
Unfortunately, on 3.10 and 3.11 every build fails:
Possible solutions mentioned above did not work for us.
Problem is, we do not really understand why the change from reference policy 'source' to 'local' makes it possible to pull the image from Dockerhub. |
Issues go stale after 90d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle stale |
@mxxk Is this still an issue, I don't see this as a podman problem? |
@rhatdan I haven't checked back on this issue for a very long time, since I stopped using OpenShift shortly after reporting it. Other folks on this thread have a more up-to-date handle on whether it has been fixed or not. |
/remove-lifecycle stale |
The workaround seems to work that @s1hofmann mentioned. Removing lifecycle/stale as the issue still persists in Azure Red Hat OpenShift v3.11. |
Issues go stale after 90d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle stale |
Stale issues rot after 30d of inactivity. Mark the issue as fresh by commenting If this issue is safe to close now please do so with /lifecycle rotten |
Rotten issues close after 30d of inactivity. Reopen the issue by commenting /close |
@openshift-bot: Closing this issue. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
Hello OpenShift folks!
I have a private registry on docker.io (or hub.docker.com aka Docker Hub) and I'm running into a particularly funky issue. OpenShift is able to import the image when creating an image stream (and see the image metadata in the UI when going to Add to Project -> Image Name -> 🔍), but then fail spectacularly when the newly created pod is trying to pull the same image from the registry.
Yes, I did make sure the image pull secret is made available to the pod by editing the deployment config and specifying it to be used, and double-checked that it is there (see commands in repro steps below).
and verified that it is being set with
kubectl get pod/my-image-failing-pod -o yaml | grep -i imagePullSecrets: -A1
add the image pull secret to the Deployment Config (an alternative is to add is )Funny thing, this exact thing was possible two weeks ago, as I created a deployment
Version
Steps To Reproduce
docker login
into docker.ioCurrent Result
The pod never comes to life, and instead a grab-bag of events like:
Error: ImagePullBackOff
Back-off pulling image "docker.io/user/private-reg@sha256:hash
Failed to pull image "docker.io/user/private-reg@sha256:hash": rpc error: code = Unknown desc = unauthorized: authentication required
Expected Result
Pod is able to pull image and start doing those fun things pods do when they come to life.
Additional Information
The text was updated successfully, but these errors were encountered: