Skip to content
Image Management for Kubernetes Clusters
Branch: master
Clone or download
Latest commit 4d4f28a Apr 11, 2019
Permalink
Type Name Latest commit message Commit time
Failed to load latest commit information.
install Need to restart docker for mac. Apr 5, 2019
lib Refactored server to use builder pattern. Feb 5, 2019
src Validate config before starting grpc. Mar 20, 2019
tests Minor cleanup. Mar 19, 2019
.dockerignore Hopefully speed up builds. Sep 11, 2018
.gitignore
.travis.yml
Cargo.lock Added single user/pass combo. Mar 1, 2019
Cargo.toml
Dockerfile.debug
Dockerfile.debug.arm64 Fix dockerfile paths. Sep 11, 2018
Dockerfile.release
Dockerfile.release.arm64 Fix dockerfile paths. Sep 11, 2018
INSTALL.md Update INSTALL.md Apr 5, 2019
LICENSE
README.md Update README.md Apr 11, 2019
default.nix Rename! Mar 1, 2018
install.sh Fixes for Mac Apr 5, 2019
start-trow.sh

README.md

Trow

Image Management for Kubernetes

Build Status

We're building an image management solution for Kubernetes (and possibly other orchestrators). At its heart is the Trow Registry, which runs inside the cluster, is simple to set-up and fully integrated with Kubernetes, including support for auditing and RBAC.

Why "Trow"

"Trow" is a word with multiple, divergent meanings. In Shetland folklore a trow is a small, mischievous creature, similar to the Scandanavian troll. In England, it is a old style of cargo boat that transported goods on rivers. Finally, it is an archaic word meaning "to think, believe, or trust". The reader is free to choose which interpretation they like most, but it should be pronounced to rhyme with "brow".

Install

See INSTALL.md. Note that Trow is currently alpha and you can expect to find rough edges. This screencast shows how quick it is to get started:

asciicast

Use Cases

The primary goal for Trow is to create a registry that runs within Kubernetes and provides a secure and fast way to get containers running on the cluster.

We hope to make it possible for Kubernetes operators to verify and control the images that are run on their clusters. Proposed features include:

  • allowing operations such as approve/deny lists for images and external registries
  • auditing and authentication of image access
  • distributed architecture for HA and scalability

Notes

  • The project currently runs on Rust Nightly.
You can’t perform that action at this time.