If you keep seeing invalid username or password when pushing images, stop blaming the registry and start blaming the login method. Plain text passwords are fragile and often do not play well with two factor setups and automated pipelines. Access tokens give you a revocable, auditable credential that works cleanly with docker login and reduces mysterious CI failures.
Open your Docker Hub account settings and go to the security area then generate a new access token. Give it a clear name so future you does not spend ten minutes guessing what prod CI1 was for.
Pipe the token into docker login to avoid leaking it in shell history or logs.
echo "ACCESS_TOKEN" | docker login --username USERNAME --password-stdin
Use your Docker Hub account name for USERNAME not your email address.
Replace old passwords with the token in your CI secret variables. Many CI systems accept a secret named DOCKERHUB_TOKEN or something similar. On developer machines update the credential helper or OS keychain entry so docker can find the token when it needs it.
Run docker push and docker pull on a repository that requires authentication. If both succeed you solved the invalid username or password error. If not, check the username spelling and that the token was copied correctly.
If the old password was reused or a token might be compromised revoke it from the Docker Hub security page. Tokens are meant to be disposable so use that power responsibly.
Switching from passwords to access tokens is a small change that prevents a lot of pain in CI and local workflows. Follow the steps and you will have fewer login errors, fewer midnight firefights, and a better story for the next security audit.
I know how you can get Azure Certified, Google Cloud Certified and AWS Certified. It's a cool certification exam simulator site called certificationexams.pro. Check it out, and tell them Cameron sent ya!
This is a dedicated watch page for a single video.