-
Notifications
You must be signed in to change notification settings - Fork 1.4k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix support for insecure registry #169
Fix support for insecure registry #169
Conversation
What's left on this? |
This PR needs google/go-containerregistry#125 |
@guilhermebr are you still planning on fixing this? |
@dlorenc Yes I will back this week to solve this! sorry for the delay |
I'm looking forward to this. |
Is there any progress on this one? |
Any updates? |
Waiting for google/go-containerregistry#125 |
You can install your own set of root-certificates and volume map them into the kaniko deployment as a possible alternative to using HTTP or ignoring bad SSL...
I extract my CA authorities from a known good source, and then build a configmap mentioned above:
For example, the ca trust chain is typically found on |
I think the change got into go-containerregistry now, still interested in porting it over here now? |
When is this issue going to be resolved? |
f017283
to
4d90ee7
Compare
PTAL @dlorenc |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM, thanks for fixing this!
fixes #168