Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fork - Consider Replacing HashiCorp Container Mirror #98

Open
cipherboy opened this issue Feb 2, 2024 · 2 comments
Open

Fork - Consider Replacing HashiCorp Container Mirror #98

cipherboy opened this issue Feb 2, 2024 · 2 comments
Labels

Comments

@cipherboy
Copy link
Member

The Docker container registry has put steep rate limits in place, so upstream uses a caching registry mirror. I think this is partly because the CI tests refresh the image every time they run. We likely can't add new containers, as the list isn't in a public repository.

We should decide if we're keeping the mirror, if we're replacing it, or if we're just removing it without replacement.

@joewxboy
Copy link
Contributor

joewxboy commented Feb 2, 2024

Is this need specifically for a registry for the CI/CD process, or would it also include public released container assets?

I'm in the process of applying for our DockerHub account to be recognized as an open source project to remove rate limits, but I don't know if that would apply to the specific case your mention, @cipherboy . For the CI/CD process, do we want to consider using GitHub-based tools, including their registry?

@cipherboy
Copy link
Member Author

cipherboy commented Feb 2, 2024

@joewxboy This is for CI/CD and local testing of third-party integrations, not (just) for pulling our own images we publish. I don't think open source classification was sufficient as I'd occasionally run into this locally when testing larger changes. Even things like Postgres were hitting the limits for me, which I imagine has to have an OSS account... I suspect it was traffic source IP rate limiting, to encourage organizations (with office presence) to pay for the service (or run mirrors).

Container caching on GitHub, yes, would help this, but we might also need to consider a local cache in that case too.

naphelps pushed a commit that referenced this issue Feb 2, 2024
* Automated dependency upgrades

* use ldap 3.4.4 to match Vault

* update changelog

---------

Co-authored-by: hc-github-team-secure-vault-ecosystem <[email protected]>
Co-authored-by: JM Faircloth <[email protected]>
@naphelps naphelps added this to the GA milestone Feb 5, 2024
@cipherboy cipherboy removed this from the 2.0.0 - GA milestone Jun 20, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Projects
None yet
Development

No branches or pull requests

3 participants