Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

private registries and node based authorization #226

Closed
maehld opened this issue Jun 12, 2018 · 6 comments
Closed

private registries and node based authorization #226

maehld opened this issue Jun 12, 2018 · 6 comments

Comments

@maehld
Copy link

maehld commented Jun 12, 2018

Here is the new bug report as suggested in #50. We're currently investigating using keel.sh as a way to roll out new image versions.

We're not using imagePullSecrets but instead configured the k8s nodes as described here: (as described here https://kubernetes.io/docs/concepts/containers/images/#using-a-private-registry under "Configuring Nodes to Authenticate to a Private Repository"

We use docker/registry:v2 as our main registry (hosted on the same cluster) and are protecting it with basic auth. I already found a way to install our custom ca certificates via a volumeMount but I found no way to provide keel.sh with our basic auth credentials.

@rusenask
Copy link
Collaborator

rusenask commented Jun 12, 2018 via email

@maehld
Copy link
Author

maehld commented Jun 12, 2018

Yeah, that would be possible but I'm trying to avoid deployment secrets due to needing them in every deployment and this would be same as adding an imagePullSecret but at a different place in the same yaml, correct?

Ideally I could specify an environment variable for keel like so:

REGISTRY_SECRET=secretNameHere@privateRegistryNameHere

What do you think?

@rusenask
Copy link
Collaborator

Hmm, I guess if we use dockerconfig secret format, it would support multiple registries:

{
        "auths": {
                "registryaddress": {
                        "auth": "auth string",
                        "email": "email@domain.com"
                }
        }
}

@maehld
Copy link
Author

maehld commented Jun 12, 2018

Reusing the dockerconfig format is a nice idea. If keel uses this from a file instead of a direct secret it would even be possible to mount a node dockerconfig into the container. That way should also work with a secret when it is mounted.

If I can help, let me know.

@rusenask
Copy link
Collaborator

Hi, available in the new release https://github.com/keel-hq/keel/releases/tag/0.9.3, if it doesn't work for your use case either post it here or create a new issue :)

@maehld
Copy link
Author

maehld commented Jul 6, 2018

Hi. I was OoO but had time to test this today and can confirm that it works and solves my use case. Thank you very much.

knechtionscoding pushed a commit to knechtionscoding/keel that referenced this issue Aug 12, 2024
…hq#226)

Bumps [docker/build-push-action](https://github.com/docker/build-push-action) from 6.2.0 to 6.3.0.
- [Release notes](https://github.com/docker/build-push-action/releases)
- [Commits](docker/build-push-action@1556069...1a16264)

---
updated-dependencies:
- dependency-name: docker/build-push-action
  dependency-type: direct:production
  update-type: version-update:semver-minor
...

Signed-off-by: dependabot[bot] <support@github.com>
Co-authored-by: dependabot[bot] <49699333+dependabot[bot]@users.noreply.github.com>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

No branches or pull requests

2 participants