Merge pull request #1583 from bacongobbler/registry-addon
introduce the "registry" addonpull/1600/head
commit
c978526a3f
|
@ -151,6 +151,12 @@ var settings = []Setting{
|
|||
validations: []setFn{IsValidAddon},
|
||||
callbacks: []setFn{EnableOrDisableAddon},
|
||||
},
|
||||
{
|
||||
name: "registry",
|
||||
set: SetBool,
|
||||
validations: []setFn{IsValidAddon},
|
||||
callbacks: []setFn{EnableOrDisableAddon},
|
||||
},
|
||||
{
|
||||
name: "registry-creds",
|
||||
set: SetBool,
|
||||
|
|
|
@ -293,7 +293,7 @@ func init() {
|
|||
startCmd.Flags().StringArrayVar(&dockerOpt, "docker-opt", nil, "Specify arbitrary flags to pass to the Docker daemon. (format: key=value)")
|
||||
startCmd.Flags().String(apiServerName, constants.APIServerName, "The apiserver name which is used in the generated certificate for localkube/kubernetes. This can be used if you want to make the apiserver available from outside the machine")
|
||||
startCmd.Flags().String(dnsDomain, constants.ClusterDNSDomain, "The cluster dns domain name used in the kubernetes cluster")
|
||||
startCmd.Flags().StringSliceVar(&insecureRegistry, "insecure-registry", nil, "Insecure Docker registries to pass to the Docker daemon")
|
||||
startCmd.Flags().StringSliceVar(&insecureRegistry, "insecure-registry", []string{util.DefaultServiceClusterIP + "/24"}, "Insecure Docker registries to pass to the Docker daemon")
|
||||
startCmd.Flags().StringSliceVar(®istryMirror, "registry-mirror", nil, "Registry mirrors to pass to the Docker daemon")
|
||||
startCmd.Flags().String(kubernetesVersion, constants.DefaultKubernetesVersion, "The kubernetes version that the minikube VM will use (ex: v1.2.3) \n OR a URI which contains a localkube binary (ex: https://storage.googleapis.com/minikube/k8sReleases/v1.3.0/localkube-linux-amd64)")
|
||||
startCmd.Flags().String(containerRuntime, "", "The container runtime to be used")
|
||||
|
|
|
@ -0,0 +1,24 @@
|
|||
apiVersion: v1
|
||||
kind: ReplicationController
|
||||
metadata:
|
||||
labels:
|
||||
kubernetes.io/minikube-addons: registry
|
||||
addonmanager.kubernetes.io/mode: Reconcile
|
||||
name: registry
|
||||
namespace: kube-system
|
||||
spec:
|
||||
replicas: 1
|
||||
selector:
|
||||
addonmanager.kubernetes.io/mode: Reconcile
|
||||
template:
|
||||
metadata:
|
||||
labels:
|
||||
addonmanager.kubernetes.io/mode: Reconcile
|
||||
spec:
|
||||
containers:
|
||||
- image: registry:2.6.1
|
||||
imagePullPolicy: IfNotPresent
|
||||
name: registry
|
||||
ports:
|
||||
- containerPort: 5000
|
||||
protocol: TCP
|
|
@ -0,0 +1,15 @@
|
|||
apiVersion: v1
|
||||
kind: Service
|
||||
metadata:
|
||||
labels:
|
||||
kubernetes.io/minikube-addons: registry
|
||||
addonmanager.kubernetes.io/mode: Reconcile
|
||||
name: registry
|
||||
namespace: kube-system
|
||||
spec:
|
||||
type: ClusterIP
|
||||
ports:
|
||||
- port: 80
|
||||
targetPort: 5000
|
||||
selector:
|
||||
kubernetes.io/minikube-addons: registry
|
|
@ -142,6 +142,18 @@ var Addons = map[string]*Addon{
|
|||
"ingress-svc.yaml",
|
||||
"0640"),
|
||||
}, false, "ingress"),
|
||||
"registry": NewAddon([]*MemoryAsset{
|
||||
NewMemoryAsset(
|
||||
"deploy/addons/registry/registry-rc.yaml",
|
||||
constants.AddonsPath,
|
||||
"registry-rc.yaml",
|
||||
"0640"),
|
||||
NewMemoryAsset(
|
||||
"deploy/addons/registry/registry-svc.yaml",
|
||||
constants.AddonsPath,
|
||||
"registry-svc.yaml",
|
||||
"0640"),
|
||||
}, false, "registry"),
|
||||
"registry-creds": NewAddon([]*MemoryAsset{
|
||||
NewMemoryAsset(
|
||||
"deploy/addons/registry-creds/registry-creds-rc.yaml",
|
||||
|
|
Loading…
Reference in New Issue