-
Notifications
You must be signed in to change notification settings - Fork 10
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support Private Registries #17
Comments
To avoid storing registry credentials as clear text on disk, we can utilize the fact that secrets used for registry authentication are of the However, this approach has a limitation. The secret would need to be recreated each time the k2d server is restarted. We'll start by supporting the creation of a secret that leverages an existing
And potentially support the following method to create a registry secret:
|
If support k8s CRI, the ImageService may be useful. If only consider secrets when deploying, in-memory map should be enough. |
as long as secrets are re-presented to docker for image pulls on deployment updates, then all good for it to be in memory.. as there is no cluster, images are already on the hosts, so a host restart would still just see docker restart the container using the cached image. |
In the alpha, images could only come from public/open registries. In reality, this would be uncommon in production environments, so we need to support the ability to do a "docker login" at deployment time based off the image pull secret provided in the application manifest. We should not hold this on disk, it should be used solely at deploy time.
The text was updated successfully, but these errors were encountered: