-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Deprecate the old tcp port for docker-env #9229
Comments
There is now an implementation in PR #9548, to allow you to try this out... There are some quirks with this yet, to be sorted out by Docker upstream.
You will have to add the key, otherwise it will ask for the password every time.
You will have to add the host key too, since there is no setting to "ignore hosts". (currently done by choosing answer "yes") Podman has variables for this, but Docker doesn't have those features available. Will look at saving the ssh host key on boot, instead of just disabling that ssh feature:
But it is a separate feature, docker has no support but delegates everything to ssh... It has been in the dead One approach, which is not as secure, would be to get the current host keys using ssh:
UPDATE: now implemented as "ssh-host" (since "ssh-key" was already taken)
|
You can make podman use ssh as well, by removing the variable with the key and adding secure:
Then it will also talk to the ssh-agent for the identity, and check ~/.ssh/known_hosts for the host key. See #9535 The podman default is to ignore the host key, and use the private key in the path of the variable:
This makes the environment variables stand-alone, without having to involve ssh-add and ssh-keyscan. |
Two issues with the host key handling are:
The identity key handling is a little smarter. |
Added an option to add the key automatically:
You can run it at the same time as env, like so:
This only needs to be run on the first invocation. You can view the current agent identities with |
Added an option to do this automatically:
|
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
Stale issues rot after 30d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
Issues go stale after 90d of inactivity. If this issue is safe to close now please do so with Send feedback to sig-contributor-experience at kubernetes/community. |
The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs. This bot triages issues and PRs according to the following rules:
You can:
Please send feedback to sig-contributor-experience at kubernetes/community. /lifecycle rotten |
Currently we are using a standalone
tcp://
docker daemon, listening on port 2376.We can use
ssh://
and connect directly to the unix socket instead, simplifying things.This could use either the current ssh shell tunnel, or we could use the regular address...
But we wouldn't have to manage all the extra ssl certificates for https, when using ssh.
And this allows for having the docker-daemon socket-activated (on-demand) in the future...
Requirements: Docker 18.09 or later
Note that we already support both methods of connecting, so it can be a gradual change.
Current config:
/usr/bin/dockerd -H tcp://0.0.0.0:2376 -H unix:///var/run/docker.sock
https://docs.docker.com/engine/reference/commandline/dockerd/#daemon-socket-option
See #9232
The text was updated successfully, but these errors were encountered: