2024-05-27 22:20:58 +00:00
|
|
|
#!/bin/sh
|
|
|
|
set -o errexit
|
|
|
|
|
2024-06-29 03:45:22 +00:00
|
|
|
if [ -z "${ENV}" ]; then \
|
|
|
|
echo "Error: ENV variable is not defined. Please set to one of development|staging|production"; exit 1; \
|
|
|
|
fi
|
|
|
|
|
|
|
|
if [ "${ENV}" != "development" ]; then \
|
2024-07-10 02:34:23 +00:00
|
|
|
echo "kind is only for development environment. Skipping local registry creation."
|
2024-06-29 03:45:22 +00:00
|
|
|
exit 0
|
|
|
|
fi
|
|
|
|
|
|
|
|
|
2024-05-27 22:20:58 +00:00
|
|
|
# 1. Create registry container unless it already exists
|
|
|
|
reg_name='kind-registry'
|
|
|
|
reg_port='5001'
|
|
|
|
if [ "$(docker inspect -f '{{.State.Running}}' "${reg_name}" 2>/dev/null || true)" != 'true' ]; then
|
|
|
|
docker run \
|
|
|
|
-d --restart=always -p "127.0.0.1:${reg_port}:5000" --network bridge --name "${reg_name}" \
|
|
|
|
registry:2
|
|
|
|
fi
|
|
|
|
|
|
|
|
# 2. Create kind cluster with containerd registry config dir enabled
|
|
|
|
# TODO: kind will eventually enable this by default and this patch will
|
|
|
|
# be unnecessary.
|
|
|
|
#
|
|
|
|
# See:
|
|
|
|
# https://github.com/kubernetes-sigs/kind/issues/2875
|
|
|
|
# https://github.com/containerd/containerd/blob/main/docs/cri/config.md#registry-configuration
|
|
|
|
# See: https://github.com/containerd/containerd/blob/main/docs/hosts.md
|
|
|
|
cat <<EOF | kind create cluster --config=-
|
|
|
|
kind: Cluster
|
|
|
|
apiVersion: kind.x-k8s.io/v1alpha4
|
|
|
|
nodes:
|
|
|
|
- role: control-plane
|
|
|
|
- role: worker
|
|
|
|
- role: worker
|
|
|
|
- role: worker
|
|
|
|
- role: worker
|
2024-08-13 21:18:01 +00:00
|
|
|
- role: worker
|
2024-05-27 22:20:58 +00:00
|
|
|
containerdConfigPatches:
|
|
|
|
- |-
|
|
|
|
[plugins."io.containerd.grpc.v1.cri".registry]
|
|
|
|
config_path = "/etc/containerd/certs.d"
|
|
|
|
EOF
|
|
|
|
|
|
|
|
# 3. Add the registry config to the nodes
|
|
|
|
#
|
|
|
|
# This is necessary because localhost resolves to loopback addresses that are
|
|
|
|
# network-namespace local.
|
|
|
|
# In other words: localhost in the container is not localhost on the host.
|
|
|
|
#
|
|
|
|
# We want a consistent name that works from both ends, so we tell containerd to
|
|
|
|
# alias localhost:${reg_port} to the registry container when pulling images
|
|
|
|
REGISTRY_DIR="/etc/containerd/certs.d/localhost:${reg_port}"
|
|
|
|
for node in $(kind get nodes); do
|
|
|
|
docker exec "${node}" mkdir -p "${REGISTRY_DIR}"
|
|
|
|
cat <<EOF | docker exec -i "${node}" cp /dev/stdin "${REGISTRY_DIR}/hosts.toml"
|
|
|
|
[host."http://${reg_name}:5000"]
|
|
|
|
EOF
|
|
|
|
done
|
|
|
|
|
|
|
|
# 4. Connect the registry to the cluster network if not already connected
|
|
|
|
# This allows kind to bootstrap the network but ensures they're on the same network
|
|
|
|
if [ "$(docker inspect -f='{{json .NetworkSettings.Networks.kind}}' "${reg_name}")" = 'null' ]; then
|
|
|
|
docker network connect "kind" "${reg_name}"
|
|
|
|
fi
|
|
|
|
|
|
|
|
# 5. Document the local registry
|
|
|
|
# https://github.com/kubernetes/enhancements/tree/master/keps/sig-cluster-lifecycle/generic/1755-communicating-a-local-registry
|
|
|
|
cat <<EOF | kubectl apply -f -
|
|
|
|
apiVersion: v1
|
|
|
|
kind: ConfigMap
|
|
|
|
metadata:
|
|
|
|
name: local-registry-hosting
|
|
|
|
namespace: kube-public
|
|
|
|
data:
|
|
|
|
localRegistryHosting.v1: |
|
|
|
|
host: "localhost:${reg_port}"
|
|
|
|
help: "https://kind.sigs.k8s.io/docs/user/local-registry/"
|
|
|
|
EOF
|