-
Notifications
You must be signed in to change notification settings - Fork 1.2k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Airgapped installs of Gitpod force the use of installation registry #10298
Comments
Good call @mrzarquon. The reason for this is actually a limitation in ContextIn a normal Kubernetes deployment, the
This will either exit successfully if it can pull the image, or exit with an error code and bubble that up to the Kubernetes control plane for a human to decide what to do. The problemThe My understanding is that it first tries without any credentials and then tries with the given credentials. This subtle difference between For an airgapped installation, all the images come from a private registry with a different The solutionThis is dependent upon @gitpod-io/engineering-workspace amending |
Currently blocked by #10396 |
Bug description
Currently if one installs Gitpod via a private registry (in airgap) we silently enforce that registry as the place to store user images, by overwriting the gitpod install yaml instead of surfacing the options in the configuration screen.
Since we want users to use the kots installer screen, at minimum this information should be exposed there.
This also complicates situations where some users can docker pull from the URL, but it's not the same URL to get an HTTP status of the image, due to networking and proxy limitations. The result is kubernetes can deploy from it, but registry facade's own status checks fail against it.
Steps to reproduce
Install gitpod in airgapped mode, block port 80 access to a target registry from the POD network, but not the Node network, and see that the services can be deployed, but now the services themselves (running in the PODs) can't access the same registry.
Workspace affected
No response
Expected behavior
The Container Registry our configuration page displays explains that this is where gitpod needs to store container images, mostly for user workspaces. One would expect this could be a separate registry than where Gitpod is installed from and can be configured separately.
Example repository
No response
Anything else?
The fact that in an airgapped installation Gitpod will store an image built by a user alongside where it retrieves the images for it's own services has multiple consequences:
Scenarios
There are two different uses of Registries for Gitpod: Service Images and User Images. A solution should consider the following iterations when being developed:
Dependent Tasks
The text was updated successfully, but these errors were encountered: