Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

DockerHub Description automated process is broken since 2 months (at least?) #777

Closed
dduportal opened this issue Mar 18, 2024 · 8 comments
Closed

Comments

@dduportal
Copy link
Contributor

Each time there is a release, the automated process used to push the updated README to DockerHub is failing:

Acquiring token
Sending PATCH request
Error: Forbidden

It's been at least 2 months with this failure:

Capture d’écran 2024-03-18 à 18 41 53

I'm not sure why, and how to fix it yet (haven't looked at it) but opening issue for awareness

cc @lemeurherve @MarkEWaite @NotMyFault @gounthar @timja

@itayporezky
Copy link
Contributor

I reached here to submit a issue to update the description and saw this,
I believe the dockerhub description is about ~7 months out of date... seeing as the description has mentions of bullseye and no mentions of bookworm.

@lemeurherve
Copy link
Member

lemeurherve commented May 5, 2024

I don't have access to the jenkins docker hub account to check if the GitHub repository secrets are valid.

Looking at the code of the GHA used to update description and short description on hub.docker.com at https://github.com/peter-evans/dockerhub-description/blob/main/src/dockerhub-helper.ts, I'm wondering if we shouldn't do these 2 API calls ourselves in a pipeline library function (for example) where Docker hub username and password are already used.

That would avoid setting up and keep up to date GitHub secrets on this repository, and reuse this new function in other docker repositories in @jenkinsci & @jenkins-infra orgs.

WDYT?

@MarkEWaite
Copy link
Contributor

That would avoid setting up and keep up to date GitHub secrets on this repository, and reuse this new function in other docker repositories in @jenkinsci & @jenkins-infra orgs.

WDYT?

That seems very reasonable to me. If the credentials are already used in the Pipeline job and if there is a relatively easy API call that will do the work, then let's call the API directly from the Pipeline.

@timja
Copy link
Member

timja commented May 6, 2024

The reason it was done like this is because the delete permission is required and delete wasn’t wanted on the main credential

@dduportal
Copy link
Contributor Author

What @timja said. Separating these credentials is key to safety (and avoid mistakes)

@timja
Copy link
Member

timja commented May 6, 2024

I've fixed this by setting the right permissions on the agent image for robots (admin).

inbound-agent already had the right permissions


Yes the permissions aren't ideal but we've gone through this at length previously and it's a docker hub limitation.

@timja timja closed this as completed May 6, 2024
@timja
Copy link
Member

timja commented May 6, 2024

I reached here to submit a issue to update the description and saw this, I believe the dockerhub description is about ~7 months out of date... seeing as the description has mentions of bullseye and no mentions of bookworm.

https://hub.docker.com/r/jenkins/agent now has bookworm references.

@itayporezky
Copy link
Contributor

Might be worth to update the description even more, there aren't any mentions of bookworm jdk21 (and maybe some reformatting in general)
I might open a PR for that, thumb up if sounds good.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

5 participants