You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/edge/builder.md
+99-11Lines changed: 99 additions & 11 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -11,20 +11,83 @@ The builder runs as a non-root user making use of user namespaces in Linux.
11
11
* Docker must not be installed on the host system.
12
12
* faasd-pro version 0.2.23 or later is required.
13
13
14
-
## Create a registry secret
14
+
## Configure a registry
15
15
16
-
For testing purposes, you can use an ephemeral registry which requires no authentication such as [ttl.sh](https://ttl.sh).
16
+
We will be deploying a local container registry as an additional service with faasd and configure the function builder to push images to it.
17
17
18
-
Bear in mind that this ephemeral cluster is public, and have much more latency than your final production setup.
18
+
Create the credentials that will be used to login to the registry. The following commands create credentials for a user named faasd.
19
+
The credentials are saved to the file `/var/lib/faasd/registry/auth/htpasswd` in a hashed format, you’ll also need to take a copy of the plaintext version of the password, so that you can authenticate
20
+
to the registry.
19
21
20
-
```bash
21
-
sudo tee /var/lib/faasd/secrets/docker-config <<EOF
For production use, create a secret with a proper authenticated registry, see the notes on the [Function Builder API for Kubernetes](/openfaas-pro/builder).
65
+
Create a crednetials file that can be use by faasd and the pro-builder to push and pull images from the registry. The faas-cli has a utility command that can be used to create the credentials file:
Just like the registry the function builder will be running as a faasd service and is able to reach the registry using the internal service name.
86
+
To be able to access the registry from the host machine, update the `/etc/hosts` file. This ensures the faasd-provider can also access the registry using the same service name.
0 commit comments