mirror of
https://github.com/nektos/act.git
synced 2026-04-26 01:15:51 +03:00
[GH-ISSUE #119] Login to AWS ECR fails #79
Labels
No labels
area/action
area/cli
area/docs
area/image
area/runner
area/workflow
backlog
confirmed/not-planned
kind/bug
kind/discussion
kind/external
kind/feature-request
kind/question
meta/duplicate
meta/invalid
meta/need-more-info
meta/resolved
meta/wontfix
meta/workaround
needs-work
pull-request
review/not-planned
size/M
size/XL
size/XXL
stale
stale-exempt
No milestone
No project
No assignees
1 participant
Notifications
Due date
No due date set.
Dependencies
No dependencies set.
Reference
starred/act#79
Loading…
Add table
Add a link
Reference in a new issue
No description provided.
Delete branch "%!s()"
Deleting a branch is permanent. Although the deleted branch may continue to exist for a short time before it actually gets removed, it CANNOT be undone in most cases. Continue?
Originally created by @mj3c on GitHub (Mar 3, 2020).
Original GitHub issue: https://github.com/nektos/act/issues/119
I am trying to execute the GitHub action to push a Docker image to AWS ECR, specifically this one. However, even after supplying the access key, secret key and region, this is the output:
Here is a job definition in order to reproduce this:
There is a
docker loginin theindex.jsof that action, I guess that is where it fails, but how can I make this pass? Am I doing something wrong or would this be a feature request?@cplee commented on GitHub (Mar 3, 2020):
Check out #107
Need to override the docker image that
actuses@mj3c commented on GitHub (Mar 3, 2020):
Ahh yes, I checked the other issues but not thoroughly enough.
It is a bit inconvenient that you have to choose between full compatibility with GitHub Actions by default and making your users pull an 18GB image, but your choice makes sense I think. This can be closed.
In any case, thank you for a prompt response and for providing an option for this!
@sirkuttin commented on GitHub (Aug 1, 2023):
which docker image can I use today to be able to perform the login via OIDC?
@matwerber1 commented on GitHub (Jan 3, 2024):
+1, I think I'm running into this issue.
Trying to use AWS's OIDC action. Partial excerpt below:
Getting this error:
@ChristopherHX commented on GitHub (Jan 3, 2024):
none.
If you could authenticate using act via OIDC to aws, an attacker could do it as well.
At most you could get locally a self-signed oidc token, which is rejected by aws as long as you don't register your own jwk key as a trusted oidc source.
If you want to go the self-signed oidc way I can help you to get this working by porting my fake oidc provider to nektos/act. This is implemented in my similiar project for emulatating GitHub Actions.
@dncrews commented on GitHub (Mar 14, 2025):
Same issue, but I got past it. I assume y'all figured this out too, but in case anyone in the future is as clueless about this as I was:
Just set the AWS credentials yourself:
Then I added this to the
aws-actionssteps to skip them:Now if I could just get my editor to stop complaining that the environment variable doesn't exist... [open issue]