-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
CIDR insecure registries not supported for containerd #15597
Comments
@afbjorklund hello ! do you need other information to consider it as an issue ? thanks ! |
For clarity, CIDR insecure registries are working well with docker as container runtime but are not with containerd (this issue). IMO, this could become a wider problem as almost everybody will move to containerd sooner or later (because of deprecation). @afbjorklund what do you think ? |
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
/remove-lifecycle rotten |
I don't think this is implemented, the minikube registry still uses the EDIT: Actually it does look implemented, but only for the hosts.toml https://github.com/containerd/containerd/blob/main/docs/hosts.md
|
The Kubernetes project currently lacks enough contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle stale |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues. This bot triages un-triaged issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /close not-planned |
@k8s-triage-robot: Closing this issue, marking it as "Not Planned". In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
What Happened?
During our tests to replace docker by containerd as container runtime, we can't declare insecure registry in CIDR format
minikube start --driver virtualbox --container-runtime containerd --insecure-registry 10.10.0.0/16
The VM is created but any subsequent pulls on insecure registries resolved to the declared CIDR are failing as if it tries to securely pull (usual message of kind: x509: certificate signed by unknown authority)
containerd insecure registry configuration is taken into account but the created directory hierarchy is invalid because of CIDR format (the slash).
On top of that, I'm not sure IP resolving will work like with docker (if I declare 10.10.0.0/16 with docker and if dockerhub.xxx.com resolves to 10.10.0.1, then any pull to this registry will be done insecurely)
In docker, the insecure registry configuration is done this way (in /lib/systemd/system/docker.service)
Attach the log file
--- No minikube logs as VM is created normally, error is seen during its usage ---
Operating System
Windows
Driver
VirtualBox
The text was updated successfully, but these errors were encountered: