Skip to content

kubermatic-labs/registryman

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

Go Reference CI


Registryman

Registryman (Registry Manager) allows you to declare your Docker registry projects, project members and project replication rules in a declarative way (by virtue of YAML files or Kubernetes resources), which will then be applied to your Docker registries. This enables consistent, always up-to-date team members and access rules.

Features

  • Managing replication rules and project membership on a project level.
  • Dry-runs of any action taken, for greater peace of mind.
  • Configuration via config files or Kubernetes resources
  • Dual mode of operation: CLI or Kubernetes operator

Installation

There is no official release yet.

Build From Source

This project uses Go 1.16 and Go modules for its dependencies. You can get it via go get:

GO111MODULE=on go get github.com/kubermatic-labs/registryman

Concept

Registryman can get the configuration from 2 kinds of source. It can either read Kubernetes resources from a Kubernetes API server or read the same Kubernetes resource definitions as yaml files from the filesystem.

Registryman supports three types of resources:

  • Registry
  • Project
  • Scanner

The Registry resources describe the Docker registries of the system. Each registry configures the API endpoint and the credentials. From replication perspective you can configure up to 1 global and arbitrary number of local registries.

Currently, the following Registry providers are supported:

The Project resources describe the members of the project. Each member has a type (User, Group or Robot) and a Role. The role shows the capabilities for the given member, e.g. Guest, ProjectAdmin, etc.

From replication point of view, a Project can be either local or global. While a global project is automatically provisioned in each registry, a local project is provisioned in the specified registries only.

Replication rules are automatically provisioned for each project so that the repositories of a global project are synchronized from the global registry to the local registries.

Scanner describes an external vulnerability scanner that can be assigned to a project.

Registry and Project resources are declaratively configured as separate files. For examples, see the examples directory.

For more details, feel free to review the content of the Documentaion folder.

Usage

Applying the configuration in CLI mode

Since Registryman works in a declarative way, first you describe the expected state as configuration (.yaml) files and then you apply them.

$ registryman apply <path-to-configuration-dir>

If you omit the path to the configuration directory, the resources definitions will be fetched from the configured Kubernetes API server.

$ registryman apply --context my-kubernetes

An example output of such executions could be:

1.6230650316837864e+09	info	reading config files	{"dir": "testdata/state1/"}
1.6230650316861527e+09	info	inspecting registry	{"registry_name": "harbor-1"}
1.6230650320118732e+09	info	ACTIONS:
1.623065032011928e+09	info	adding project os-images
1.6230650321776721e+09	info	adding member alpha to os-images
1.6230650322818873e+09	info	adding member beta to os-images
1.623065032417013e+09	info	adding replication rule for os-images: harbor-2 [Push] on EventBased
1.6230650325978034e+09	info	inspecting registry	{"registry_name": "harbor-2"}
1.6230650328970125e+09	info	ACTIONS:
1.6230650328970747e+09	info	removing project test
1.6230650329916346e+09	info	adding project os-images
1.6230650331280136e+09	info	adding member alpha to os-images
1.6230650332148027e+09	info	adding member beta to os-images
1.623065033302417e+09	info	adding project app-images
1.6230650334264066e+09	info	adding member alpha to app-images
1.6230650335348642e+09	info	adding member beta to app-images

You can see the registries which are configured by Registryman and for each registry you can see the performed action.

With the dry-run flag you can simulate the operation without performing any action on the Docker registries, e.g.

$ registryman apply <path-to-configuration-dir> --dry-run

1.623065212853344e+09	info	reading config files	{"dir": "testdata/init"}
1.6230652128544164e+09	info	inspecting registry	{"registry_name": "harbor-1"}
1.6230652131570046e+09	info	ACTIONS:
1.623065213157117e+09	info	removing replication rule for os-images: harbor-2 [Push] on EventBased	{"dry-run": true}
1.6230652131571586e+09	info	removing project os-images	{"dry-run": true}
1.623065213157202e+09	info	inspecting registry	{"registry_name": "harbor-2"}
1.6230652135110424e+09	info	ACTIONS:
1.6230652135110905e+09	info	removing project app-images	{"dry-run": true}
1.6230652135111215e+09	info	removing project os-images	{"dry-run": true}

With the force-delete flag, you can remove projects, even if they have repositories under them. In this case, they will be deleted before of the removal of the project.

You can use registryman.kubermatic.com/forceDelete annotation in Registry resources with true or false value, to control this behaviour per repository. Annotations are always prioritized, CLI flags are used only when they are omitted.

Annotation usage example:

apiVersion: registryman.kubermatic.com/v1alpha1
kind: Registry
metadata:
  name: global
  annotations:
    "registryman.kubermatic.com/forceDelete": "true"
spec:
  provider: harbor
  role: GlobalHub
  apiEndpoint: http://core.harbor-1.demo
  username: admin
  password: admin

Checking the actual registry status in CLI mode

Registryman can generate the status of the managed registries using the status command. Similarly to apply, you have to specify the directory where the YAML files describing the registries reside.

$ registryman status <path-to-configuration-dir>

If you omit the path to the configuration directory, the resources definitions will be fetched from the configured Kubernetes API server.

$ registryman status --context my-kubernetes

By default, all configured registried are checked. You can filter for registries using the -r flag.

$ registryman status -r harbor-1,harbor-2

The default output format is JSON. It's possible to output the result as YAML too.

$ registryman status -r harbor-1 -o yaml

Validating the config files in CLI mode

Registryman can validate the configuration files using the validate command.

$ registryman validate <path-to-configuration-dir>

1.6251336698573446e+09	info	validating config files	{"dir": "<path-to-configuration-dir>"}
1.6251336698603425e+09	warn	Local registry does not exist	{"project_name": "node", "registry_name": "global"}
1.6251336698603656e+09	warn	Local registry does not exist	{"project_name": "node", "registry_name": "global2"}
1.6251336698603873e+09	warn	config files are not valid	{"error": "validation error: project contains invalid registry name"}

Generating the Swagger API

Registryman can generate the API definition in Swagger format using

$ registryman swagger

The Swagger schema is generated on the standard out in JSON format.

Starting in operator mode

Registryman can be started in operator mode with the help of the operator command.

$ registryman operator

Development

Generating the code

Some of the source code is generated by tools. These tools are vendored, so before generating the source code first you have to reset the vendor directory:

$ go mod vendor

Then you can call the script that regenerates the source code files:

$ hack/update-codegen.sh