-
Notifications
You must be signed in to change notification settings - Fork 408
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ko publish --insecure-registry falls back to HTTP for communication #488
Comments
Just to make sure I understand the issue, This is a bit unfortunate, since it will be thorny to change the semantics of the existing Let me think about it some more and see if anything comes out of it. |
That is correct.
Indeed, that will be a challenge. My initial thought is to provide the following:
|
Played around with this today, unfortunately we have a collision with a deprecated kubectl flag --insecure-skip-tls-verify. We could go past deprecation and remove the flag, at the risk of breaking users who have untrusted kube apiservers 😱. |
This issue is stale because it has been open for 90 days with no |
When the
--insecure-registry
option is passed toko publish
, ko falls back to using HTTP for image registry communication. This is problematic because some container registries (notably, OpenShift's internal registry) only publish HTTPS endpoints. Technically these image registries are secured - however they may be using untrusted/self-signed certificates.Based on the work in #369 and #396, this behavior appears intentional to work with a local docker/distribution instance (ex - using KinD). Would it make sense to add a second
--tls-verify
flag, which defaults totrue
, but whenfalse
will ignore X.509 certificate errors?The text was updated successfully, but these errors were encountered: