4 comments

  • remram 14 hours ago
    I wonder if you can build this into your container runtime config instead. Automatically rewriting is nice but you will still see the rewritten image when reading from the API server.
  • flemzord 1 day ago
    I’ve developed a Kubernetes mutating admission webhook that intercepts Pod creation and update requests to automatically rewrite container image references based on configurable rules. This facilitates redirecting images from public registries (like Docker Hub, GCR, Quay.io) to internal mirrors or caches, enhancing reliability and security.
    • remram 14 hours ago
      I thought this was possible to do with CEL but it looks like this has barely reached alpha: https://kubernetes.io/docs/reference/access-authn-authz/muta...

      Webhooks like yours will still be needed for a while (or programmable frameworks like Kyverno).

    • antonvs 14 hours ago
      How would this interact with IaC systems like ArgoCD - I imagine conflicts would be detected and ArgoCD would try to autosync to restore the cluster state to match the repo.
  • sscarduzio 10 hours ago
    Would this help in case of air gapped environments? You just run the registry in the internal network and use the rewrite. Am I right? Any catch?
  • nonameiguess 14 hours ago
    You can do this with containerd registry mirrors. The syntax of the rewrite rules is even the same.
    • athorax 14 hours ago
      Yeah curious what the benefit would be here vs configuring containerd mirrors https://github.com/containerd/containerd/blob/main/docs/host...

      I guess if you don't control the platform you are running on this is a way to do it in "userspace"

      • doctorpangloss 13 hours ago
        Of course, being able to deploy this inside of Kubernetes itself is a huge boon.

        It was a mistake to make the image registry and its configuration hosted outside the cluster. It makes no sense. You should be able to configure containerd registries effortlessly from inside the cluster.