-
Notifications
You must be signed in to change notification settings - Fork 550
feat(auth) - support aws sdk v2 for registry auth #3806
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Conversation
Eclipse JKube CI ReportStarted new GH workflow run for #3806 (2025-12-05T15:19:13Z) ⚙️ JKube E2E Tests (19933929469)
|
|
Codecov Report❌ Patch coverage is
Additional details and impacted files@@ Coverage Diff @@
## master #3806 +/- ##
=============================================
+ Coverage 59.36% 72.13% +12.77%
- Complexity 4586 4845 +259
=============================================
Files 500 492 -8
Lines 21211 19259 -1952
Branches 2830 2569 -261
=============================================
+ Hits 12591 13892 +1301
+ Misses 7370 4160 -3210
+ Partials 1250 1207 -43 ☔ View full report in Codecov by Sentry. 🚀 New features to boost your workflow:
|
|
Since we don't have access to a real AWS instance, we might be able to leverage https://github.com/localstack/localstack to ensure the changes are working |
|




Description
Fixes #3732
Adds AWS SDK v2 support for ECR authentication while maintaining backward compatibility with AWS SDK v1.
Changes
1. AWS SDK v2 Support
New Architecture:
AbstractAwsSdkHelper- Abstract base class with common AWS credential handling logicAwsSdkHelperV1- AWS SDK v1 implementationAwsSdkHelperV2- AWS SDK v2 implementationAwsSdkAuthHelperinterface - Contract for SDK version abstractionKey Features:
AWS_ACCESS_KEY_ID,AWS_SECRET_ACCESS_KEY,AWS_SESSION_TOKEN)AWS_CONTAINER_CREDENTIALS_RELATIVE_URI)2. LocalStack Support & Error Handling
LocalStack Registry Support for development and testing:
*.dkr.ecr.*.localhost.localstack.cloud:PORTAWS_ENDPOINT_URLenvironment variable support for custom ECR endpoints. If set, uses custom ECR instead of real ECR for signing requestsEnhanced Error Messages:
AWS authentication failure. Status: 400, Response: {"__type": "AccessDeniedException", "message": "User: arn:aws:iam::000000000000:user/ash is not authorized to perform: ecr:GetAuthorizationToken..."}
Fully backward compatible
Type of change
test, version modification, documentation, etc.)
Checklist