Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[Proposal] a new way to handle none https registry #16578

Closed
catrixs opened this issue Sep 25, 2015 · 4 comments
Closed

[Proposal] a new way to handle none https registry #16578

catrixs opened this issue Sep 25, 2015 · 4 comments
Labels
area/distribution area/security kind/feature Functionality or other elements that the project doesn't currently have. Features are new and shiny

Comments

@catrixs
Copy link

catrixs commented Sep 25, 2015

Problem

In private cluster, we run docker registry in none https way, and may multiple registries. But docker must set daemon parameter --insecure-registry. This is not easy to use. For example, some team builds a docker cluster, they must modify docker daemon parameter and restart hole cluster in order to use a new none https registry.

Proposal Request

We prefer to add docker cli to support this. like this:

docker registry add --insecure-registry registry.xxx.xxx.com
@cpuguy83 cpuguy83 added area/distribution kind/feature Functionality or other elements that the project doesn't currently have. Features are new and shiny labels Oct 2, 2015
@azurezk
Copy link
Contributor

azurezk commented Oct 9, 2015

#dibs

@LK4D4
Copy link
Contributor

LK4D4 commented Sep 16, 2016

@aaronlehmann @stevvooe @NathanMcCauley does this still makes sense? #15365 was merged.

@aaronlehmann
Copy link
Contributor

It's still an issue. #22337 will help a bit. In general we discourage using registries without TLS. The latest version of Registry has support for LetsEncrypt so it's even easier to set up TLS now. I don't think we're going to put much effort into making it easier to avoid TLS.

@LK4D4
Copy link
Contributor

LK4D4 commented Sep 16, 2016

I'm closing this then. TLS is nice thing.
Thanks @aaronlehmann

@LK4D4 LK4D4 closed this as completed Sep 16, 2016
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
area/distribution area/security kind/feature Functionality or other elements that the project doesn't currently have. Features are new and shiny
Projects
None yet
Development

No branches or pull requests

6 participants