https://github.com/alexellis/registry-creds
Replicate Kubernetes ImagePullSecrets to all namespaces
https://github.com/alexellis/registry-creds
Last synced: about 1 month ago
JSON representation
Replicate Kubernetes ImagePullSecrets to all namespaces
- Host: GitHub
- URL: https://github.com/alexellis/registry-creds
- Owner: alexellis
- License: mit
- Created: 2020-08-18T14:24:50.000Z (almost 5 years ago)
- Default Branch: master
- Last Pushed: 2024-12-21T13:24:00.000Z (6 months ago)
- Last Synced: 2025-04-08T16:09:08.289Z (2 months ago)
- Language: Go
- Homepage:
- Size: 488 KB
- Stars: 345
- Watchers: 7
- Forks: 38
- Open Issues: 4
-
Metadata Files:
- Readme: README.md
- License: LICENSE
- Roadmap: ROADMAP.md
Awesome Lists containing this project
- awesome-hacking-lists - alexellis/registry-creds - Replicate Kubernetes ImagePullSecrets to all namespaces (Go)
README
## registry-creds operator
[](https://github.com/sponsors/alexellis) [](https://github.com/alexellis/registry-creds/actions/workflows/build.yaml) [](https://opensource.org/licenses/MIT)
This operator can be used to propagate a single ImagePullSecret to all namespaces within your cluster, so that images are pulled using authentication.
See also: [ROADMAP.md](/ROADMAP.md)
### Use-case 1: Propagate a private registry secret to all namespaces
The second use-case for this operator is to take an authentication token which is required to pull images from a private registry, and to make sure it's available and configured for each and every namespace.
For example, if you were running a multi-tenant service, where each tenant has their own namespaces, and every image is sourced from a common private registry. You could use this operator to propagate the pull secret for each namespace.
### Use-case 2: Docker Hub Rate Limits
The original need for this operator, was to make it easier for users of Kubernetes to consume images from the Docker Hub after [recent pricing and rate-limiting changes](https://www.docker.com/pricing) were brought in, an authenticated account is now required to pull images.
These are the limits as understood at time of writing:
* Unauthenticated users: 100 pulls / 6 hours
* Authenticated users: 200 pulls / 6 hours
* Paying, authenticated users: unlimited downloadsRead also: [Docker Hub rate limits & pricing](https://www.docker.com/pricing)
Pulling images with authentication is required in two scenarios:
* To extend the Docker Hub anonymous pull limits to a practical number
* To access private registries or repos on the Docker HubThe normal process is as follows, which becomes tedious and repetitive when you have more than one namespace in a cluster.
* Create a secret
* Edit your service account, and add the name of the secret to `imagePullSecrets`## Getting Started
* [Install the tool](GUIDE.md)
## Do you use `registry-creds`?
`k3sup` was created by [Alex Ellis](https://github.com/users/alexellis/sponsorship) - the founder of [OpenFaaS ®](https://www.openfaas.com/) & [inlets](https://inlets.dev/).
Want to see continued development? [Sponsor alexellis on GitHub](https://github.com/users/alexellis/sponsorship)
## License
MIT