-
Notifications
You must be signed in to change notification settings - Fork 1.3k
Enable use of private Docker images #1699
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
For self-hosted you can use your own docker registry: https://www.gitpod.io/docs/self-hosted/latest/install/docker-registry/ |
Can this be set up to use the internal docker registry for workspace image builds (default), but also have access to the external docker registries we have our images in (Docker Hub and Gitlab) ? I would expect that if the docker credentials in the kubernetes secret are correctly created, it would contain logins to multiple registries and work as long as the correct secret is referenced. |
Hi @asthomasdk , this is not well (yet) supported in the config surface, but the code should be capable of doing so. Let's see if we can make it work (I assume you have a working config derived from the Gitpod self-hosted repo)
Just add entries for your domains. There are several possibillites for the
This is not easy for sure or straigth forward and we're working on streamlining things. But it's the best with the state right now. |
This issue has been automatically marked as stale because it has not had recent activity. It will be closed if no further activity occurs. Thank you for your contributions. |
It was requested in the community again: https://community.gitpod.io/t/using-private-docker-images-in-dockerfile/4001/2 |
Any news or development thoughts on this? I have managed to work around this by adding envrionment variables through my profile in gitpod. This is hack though, as it is very unsecure. It would make sense to have custom docker registries that can be setup and managed just like the integrations to external git repos. Having to manually create secrets in kubernetes is a little clumsy ;-) |
Reading this again - does that mean that if I have the |
And not for the self-hosted environment ? Thanks ;-) |
We would love to have support for this cloud version. I am not sure if I should add an extra issue for this since this was labeled with "self-hosted". Optimally, the integration would work for the pre-builds. gitlab registry would work for us or ECR. As a workaround, being able to inject private environment variables into the prebuilt might help -- but it is not ideal. |
we also need this, quite urgently fopr the cloud version. We have to use some private libraries & images so at the moment the prebuild stage does the docker login, then pulls the images and copies the required folders from the image into the workspace. This is extremely inefficient , as we have 2x the required disk space (the docker image and the folder) but also slows down the prebuild. It also means that we can't take advantage of the docker layers for efficiency this could be implemented either as
|
Gitpod installer makes references to this as if that was already supported in the Container Registry section. I was trying to set up this againts a gitlab repository but it is not working. |
I need to use a development Docker image derived from our production Docker image to stay as close as possible to the production environment. |
We could make image builds aware of private registries. For example, we could introduce a special environment variable (on user and project level), e.g.
This would NOT enable a
It would however, enable the use of private images. As an addendum, we could merge the credentials provided this way with the docker config in regular workspaces, so that Docker in regular workspaces (and prebuilds) would gain access to that private registry. |
that would work for us |
Please add support for private docker registries in Gitpod - especially the self-hosted version.
We use a lot of private Docker images in our various stacks - also for development.
Not being able to set this up for Gitpod means that we are unable to configure Gitpod workspaces for anything but simple repo editing.
I would expect that for the self-hosted version, using secrets or docker credentials from kubernetes would be a good option to support this.
The text was updated successfully, but these errors were encountered: