You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
You can create robot accounts to run automated operations. Robot accounts have the following limitations:
Robot Accounts cannot log in to the Harbor interface.
Robot Accounts can only perform operations by using the Docker and Helm CLIs.
The text was updated successfully, but these errors were encountered:
Using a robot token to clean up the container registry with werf is not supported yet. To untag images with the token werf should use Harbor API instead Docker Registry HTTP API V2 for Harbor. Nevertheless, a regular token with delete permissions works well.
For now, this is not a priority task, but we strongly encourage and help with contributions from the community. Implementation is not difficult and similar to deleting the repository in Harbor.
Before proceeding
Version
v1.2.219+fix3
How to reproduce
Result
Error: unable to remove repo image. DELETE https:/example.com/v2/example/example-operator/manifests/sha256:xxx: UNAUTHORIZED: unauthorized to access repository: example/example-operator, action: delete: unauthorized to access repository: example/example-operator, action: delete
Expected result
Successful cleanup
Additional information
From Harbor docs about robot accounts:
https://goharbor.io/docs/1.10/working-with-projects/project-configuration/create-robot-accounts/
The text was updated successfully, but these errors were encountered: