You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: cli/image-scanning-by-using-the-roxctl-cli.adoc
+1-1Lines changed: 1 addition & 1 deletion
Original file line number
Diff line number
Diff line change
@@ -16,7 +16,7 @@ By specifying the appropriate cluster in the delegated scanning configuration or
16
16
17
17
[IMPORTANT]
18
18
====
19
-
For more information about how to configure delegated image scanning, see xref:../operating/examine-images-for-vulnerabilities.adoc#configuring-delegated-image-scanning_examine-images-for-vulnerabilities[Configuring delegated image scanning].
19
+
For more information about how to configure delegated image scanning, see xref:../operating/examine-images-for-vulnerabilities.adoc#accessing-delegated-image-scanning_examine-images-for-vulnerabilities[Accessing delegated image scanning].
* xref:../integration/integrate-with-image-vulnerability-scanners.adoc#integrate-with-qcr-scanner_integrate-with-image-vulnerability-scanners[Integrating with Quay Container Registry to scan images]
Copy file name to clipboardExpand all lines: modules/manual-configuration-image-registry-qcr.adoc
+10-6Lines changed: 10 additions & 6 deletions
Original file line number
Diff line number
Diff line change
@@ -7,9 +7,13 @@
7
7
8
8
You can integrate {product-title} ({product-title-short}) with Quay Container Registry. You can integrate with Quay by using the following methods:
9
9
10
-
- Integrating with the Quay public repository (registry): This method does not require authentication.
11
-
- Integrating with a Quay private registry by using a robot account: This method requires that you create a robot account to use with Quay (recommended). See the link:https://access.redhat.com/documentation/en-us/red_hat_quay/3/html/use_red_hat_quay/use-quay-manage-repo#allow-robot-access-user-repo[Quay documentation] for more information.
12
-
- Integrating with Quay to use the Quay scanner rather than the {product-title-short} scanner: This method uses the API and requires an OAuth token for authentication. See "Integrating with Quay Container Registry to scan images" in the "Additional Resources" section.
10
+
* Integrating with the Quay public repository (registry): This method does not require authentication.
11
+
* Integrating with a Quay private registry:
12
+
13
+
** By using a robot account: This method requires that you create a robot account to use with Quay (recommended). See the link:https://docs.redhat.com/en/documentation/red_hat_quay/3.14/html/about_quay_io/allow-robot-access-user-repo[Red{nbsp}Hat Quay Robot Account overview] topic in Quay documentation for more information.
14
+
** By using keyless authentication with external secret: This method uses OIDC federation and the External Secrets Operator (ESO). For more information, see "Enabling Quay registry keyless authentication using external secret".
15
+
16
+
* Integrating with Quay to use the Quay scanner rather than the {product-title-short} scanner: This method uses the API and requires an OAuth token for authentication. For more information, see "Integrating with Quay Container Registry to scan images" in the "Additional resources" section.
13
17
14
18
.Prerequisites
15
19
* For authentication with a Quay private registry, you need the credentials associated with a robot account or an OAuth token (deprecated).
@@ -20,16 +24,16 @@ You can integrate {product-title} ({product-title-short}) with Quay Container Re
20
24
. Click *New integration*.
21
25
. Enter the *Integration name.*
22
26
. Enter the *Endpoint*, or the address of the registry.
23
-
.. If you are integrating with the Quay public repository, under *Type*, select *Registry*, and then go to the next step.
27
+
.. If you are integrating with the Quay public repository, under *Type*, select *Registry*, and then go to the next step.
24
28
.. If you are integrating with a Quay private registry, under *Type*, select *Registry* and enter information in the following fields:
25
29
***Robot username*: If you are accessing the registry by using a Quay robot account, enter the user name in the format `_<namespace>+<accountname>_`.
26
30
***Robot password*: If you are accessing the registry by using a Quay robot account, enter the password for the robot account user name.
27
-
***OAuth token*: If you are accessing the registry by using an OAuth token (deprecated), enter it in this field.
31
+
***OAuth token*: If you are accessing the registry by using an OAuth token (deprecated), enter it in this field.
28
32
. Optional: If you are not using a TLS certificate when connecting to the registry, select *Disable TLS certificate validation (insecure)*.
29
33
. Optional: To create the integration without testing, select *Create integration without testing*.
30
34
. Select *Save*.
31
35
32
36
[NOTE]
33
37
====
34
-
If you are editing a Quay integration but do not want to update your credentials, verify that *Update stored credentials* is not selected.
38
+
If you are editing a Quay integration but do not want to update your credentials, verify that *Update stored credentials* is not selected.
= Enabling Quay registry keyless authentication using external secret
7
+
8
+
For validating images stored in Quay private registries, you can configure {product-title-short} to use keyless authentication with Red{nbsp}Hat Quay registries. This method uses the External Secrets Operator (ESO) and OpenID Connect (OIDC) federation.
9
+
10
+
.Prerequisites
11
+
12
+
* You have enabled delegated scanning in {product-title-short}. For more information, see "Accessing delegated image scanning" in the "Additional resources" section.
13
+
* The Central endpoint configured for the Secured Cluster `centralEndpoint: central.stackrox:443` or similar.
14
+
* A robot account created in Red{nbsp}Hat Quay with OIDC federation configured.
15
+
+
16
+
--
17
+
* The issuer URL in the Quay robot identity federation configuration must match the service account token issuer of your {ocp} cluster.
18
+
* The `sub claim` subject must match the service account name and namespace that you configure in your cluster.
19
+
--
20
+
+
21
+
See the link:https://docs.redhat.com/en/documentation/red_hat_quay/latest/html/about_quay_io/allow-robot-access-user-repo[Red Hat Quay Robot Account overview] topic in Quay documentation for more information.
22
+
23
+
.Procedure
24
+
25
+
. In your Quay instance, navigate to your robot account settings and configure OIDC federation.
26
+
+
27
+
Ensure the *Issuer URL* and *Subject* fields are correctly set to match your {ocp} service account that ESO uses. See the link:https://docs.redhat.com/en/documentation/red_hat_quay/latest/html/about_quay_io/allow-robot-access-user-repo#setting-robot-federation[Setting up robot account federation] topic in the Red Hat Quay documentation for more information.
28
+
29
+
. If ESO is not already present in your cluster, install it using Helm or another preferred method.
. Define and apply the following Kubernetes resources. This example creates a `ServiceAccount` resource, a `QuayAccessToken` generator resource provided by the ESO installation, and an `ExternalSecret` resource that uses the generator to create a `kubernetes.io/dockerconfigjson` secret in the specified namespace.
41
+
+
42
+
[IMPORTANT]
43
+
====
44
+
Update the `robotAccount` field in the `QuayAccessToken` resource to match the name of your Quay robot account.
0 commit comments