Skip to content

Registry Credentials

If your applications use private Docker images, you need to configure registry credentials so Reoclo can authenticate when pulling images during deployments.

RegistryTypeDefault URL
Docker Hubdocker_hubdocker.io
GitHub Container Registryghcrghcr.io
AWS Elastic Container Registryaws_ecr(your ECR URL)
Google Artifact Registrygoogle_artifact_registry(your GAR URL)
Azure Container Registryazure_acr(your ACR URL)
Harborharbor(your Harbor URL)
Generic (any Docker v2 registry)generic(your registry URL)
  1. Navigate to Registry Credentials in the sidebar
  2. Click Add Credential
  3. Select the registry type
  4. Fill in the connection details:
    • Name: descriptive label (e.g., “Production GHCR”)
    • Registry URL: auto-filled for Docker Hub and GHCR, required for others
    • Username: registry username or access key
    • Password / Token: authentication secret (encrypted at rest)
  5. Click Test Connection to verify before saving
  6. Click Save

Docker Hub: Use your Docker Hub username and a Personal Access Token (not your account password).

GitHub Container Registry (GHCR): Use your GitHub username and a Personal Access Token with read:packages scope.

AWS ECR: Use your AWS Access Key ID as username. For the credential, provide a JSON object:

{"aws_secret_access_key": "your-secret-key", "region": "us-east-1"}

Google Artifact Registry: Use _json_key as the username and paste your full service account JSON key as the credential.

When creating or configuring an application, select the registry credential in the build configuration. Reoclo will use it to authenticate with the registry when pulling base images or pushing built images.

Before saving, use the Test Connection button to verify Reoclo can authenticate with the registry. The test will report success or failure with a latency measurement.

  • Passwords and tokens are encrypted at rest using AES-256-GCM envelope encryption
  • Credentials are never exposed in the dashboard after creation
  • Each credential is encrypted with its own unique key
  • Credentials are only decrypted during deployment operations

You can delete a credential only if no applications are using it. If applications reference the credential, you’ll need to update them to use a different credential (or none) before deleting.