-
Notifications
You must be signed in to change notification settings - Fork 5.7k
Allow pulls from an insecure registry #490
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Conversation
|
I wonder if this should be a short ( |
|
+1, I hit this as well, I'd be fine with either short or long option |
|
+1 long flag. And it should be |
|
Ok. A commit with |
|
Great, thanks! Original commit still needs signing off though. You can squash all of this with |
|
I took care of the signoff in the squash, and I believe the ball is back in your court. |
|
Great stuff, thanks! |
|
I just realized that this kwarg ( |
|
Not sure why the travis build hasn't run on this branch, but I'm also getting a couple flake8 errors |
|
Oops. We've replaced Travis with Wercker, so this needs rebasing to get CI run on it. |
|
I've fixed the docker-py dependency. I'll worry about rebasing (where should I rebase to? I see an "All is well -- build finished" on the PR) and figuring out the flakes tomorrow. |
|
We only recently added the file that makes the build work. If you rebase on to the current master, it'll get the |
|
I've rebased, but I'm still cleaning up the branch. |
Signed-off-by: Jason Bernardino Alonso <jalonso@luminoso.com>
Signed-off-by: Jason Bernardino Alonso <jalonso@luminoso.com>
|
Ok. A third force-push later, I believe I have cleaned up this PR. |
|
LGTM |
|
Don't think it's easy to test this without mocking out docker-py. :/ |
|
At the very least a simple unit test that asserts the right docker.client function was called wouldn't hurt. |
|
Oh cool, forgot about that. @jbalonso – would be great to get a test! |
Signed-off-by: Moss Collum <mcollum@luminoso.com>
|
I've added the missing unit test to |
|
LGTM |
Allow pulls from an insecure registry
|
Hey guys, it seems like Fig will also attempt to pull needed images when running |
|
I kinda feel responsible for not catching that in my PR. I'll mention that I'm out of bandwidth to work on it myself at the moment. |
|
I've run into this as well. I got around it for now by always doing a I think your solution sounds appropriate. |
|
I've also run into this, and I really would like to call |
|
@torbjornvatn I was planning on submitting a PR tomorrow morning |
|
@tjrivera Nice! |
Allow pulls from an insecure registry Signed-off-by: Yuval Kohavi <yuval.kohavi@gmail.com>
PR docker#490 Provides the ability to pull from an insecure registry by passing --allow-insecure-ssl. This commit extends the work done in docker#490 and adds the ability to pass --allow-insecure-ssl to the up and run commands which will attempt to pull dependent images if they do not exist. Signed-off-by: Tyler Rivera <riverat2@email.chop.edu> Signed-off-by: Yuval Kohavi <yuval.kohavi@gmail.com>
We maintain a private docker registry without SSL (it isn't necessary). This PR adds an
-ioption tofig pullthat enables insecure mode.