Date   

Re: Incubation Proposal: CredHub (credential manager)

Justin Smith
 

It makes sense to build CredHub for many reasons. A few that come to mind quickly are below.

1) The service must start and restart without human intervention. This immediately means the key encrypting key resides in a Hardware Security Module (HSM) of some kind. We think this is a first-class feature and should be part of CredHub open source.
2) CloudFoundry runs in production in some of the most restricted environments in the world. These environments tend towards favoring crypto stacks they have seen and reviewed before. The Java ecosystem contains several. The Go ecosystem will eventually get there, but it isn't right now. We're fully aware there are tons of great Go apps (including large chunks of CloudFoundry) that perform crypto today. We received credible feedback that showed a Java preference for this type of application.
3) Authorization is an important part of credential management in CF. Authorization can be an incredibly difficult problem, and an authorization implementation can be very hard to change after it is built. We didn't see anything available that had the right feature set. We could have bolted something in front of another product, but we decided it made more sense to build something new.

MVP certainly requires hitting a threshold of capabilities, but it also requires leaving runway for what's ahead.

App secrets are a mainline scenario. Let's take it as a given that apps must have access to plaintext secrets. From there, the discussion centers on two questions: 1) what's the chain of custody of the secret and what has access to it, and 2) how is the secret made available to the app. (1) is all about CredHub and (2) is mostly about Diego. We'll engage in a discussion on these in the weeks ahead.


Re: consul_z1/0 is failing after update

Yitao Jiang
 

we once had the same issue which causing by network issue, the consul
server follower couldn't connect to the leader, but what difference is that
we are running on openstack.

On Tue, Dec 20, 2016 at 12:32 AM, Sylvain Gibier <
sylvain(a)munichconsulting.de> wrote:

Hi,

Diego has been default in my CF installation (H/A over 3 AZ) - and today,
while trying a simple BOSH CF update of a stemcell - the consul_z1/0 keeps
on "failing after update".

If I look in the log file - I can see the following:

"
++ logger -p user.info -t vcap.consul-agent
++ tee -a /var/vcap/sys/log/consul_agent/consul_agent.stdout.log error
during start: 2/30 nodes reported failure
2016/12/19 14:49:50 [ERR] agent.client: Failed to decode response header:
EOF
2016/12/19 14:49:50 [ERR] agent.client: Failed to decode response header:
EOF
"
Also it seems that I have a bunch of errors:

"
2016/12/19 13:54:32 [INFO] consul: adding server consul-z3-0 (Addr:
10.10.30.37:8300) (DC: dc1)
2016/12/19 13:54:32 [INFO] consul: adding server consul-z2-0 (Addr:
10.10.20.37:8300) (DC: dc1)
2016/12/19 13:54:32 [ERR] agent: failed to sync remote state: No
cluster leader
2016/12/19 13:54:32 [INFO] agent: Joining cluster...
2016/12/19 13:54:32 [INFO] agent: (LAN) joining: [10.10.10.37
10.10.20.37 10.10.30.37]
2016/12/19 13:54:32 [INFO] agent: (LAN) joined: 3 Err: <nil>
2016/12/19 13:54:32 [INFO] agent: Join completed. Synced with 3
initial agents
2016/12/19 13:54:32 [WARN] raft: Failed to get previous log: 503710
log not found (last: 503708)
2016/12/19 13:54:32 [INFO] raft: Removed ourself, transitioning to
follower
"
I can definitely confirm in my case - that consul_z3 is the Leader (via
consul info) in my current setup.

Any help/point on how to fix that ?


Releases: CF: v234, Diego: 0.1467.0
IaaS: AWS



--

Regards,

Yitao


Re: Incubation Proposal: CredHub (credential manager)

Allan Beck
 

I am supportive of the proposal. We have our own credentials store implementation to encrypt the service credentials passed to applications (so devops staff can’t see credentials to production services). CredHub will be a useful addition to CF and will allow us to use this community component rather than our bespoke implementation.

Regards,
Allan.

On 19 Dec 2016, at 06:42, John Feminella <jxf(a)pivotal.io> wrote:

Questions:
To what extent are CredHub's use cases and architecture covered (or not) by a combination of something like Hashicorp's Vault and integration effort? (I'm not singling out Vault specifically here, just using it as a representative member of a class.)
People who use CF want the properties outlined by CredHub, but CredHub doesn't exist yet. What do those people do instead? To what extent are their current solutions sufficient or deficient?
best,
~ jf
--
John Feminella
Advisory Platform Architect
✉ · jxf(a)pivotal.io <mailto:jxf(a)pivotal.io>
t · @jxxf





On Fri, Dec 16, 2016 6:15 PM, Dan Jahner djahner(a)pivotal.io <mailto:djahner(a)pivotal.io> wrote:
Hello Everyone,

Pivotal would like to propose to the Extensions PMC a new incubation project focusing on credential management in Cloud Foundry. This product may be used in a Cloud Foundry environment to centralize and secure credential generation, storage, lifecycle management and access.

Project name: CredHub
Project proposal: https://docs.google.com/document/d/1iG28J2Lm8RY3BXCZqqNWO7v-G1ppcdK8cizlhbN_o4g/edit?usp=sharing <https://docs.google.com/document/d/1iG28J2Lm8RY3BXCZqqNWO7v-G1ppcdK8cizlhbN_o4g/edit?usp=sharing>
Proposed Project Lead: Dan Jahner (Pivotal)
Proposed Scope: See “Proposed Scope” in the proposal
Development Operating Model: Pairing Model
Technical Approach: See “Basic Architecture” and “BOSH Manifest Implementation” in the proposal
Initial team committed: 6 engineers from Pivotal


Please let me know if you have any questions.

Thanks,
Dan Jahner
djahner(a)pivotal.io <mailto:djahner(a)pivotal.io>


Re: container restart on logout

Jon Price
 

This is something that has been on our wishlist as well but I haven't seen any discussion about it in quite some time. Here is one of the original discussions about it: https://lists.cloudfoundry.org/archives/list/cf-dev(a)lists.cloudfoundry.org/thread/GCFOOYRUT5ARBMUHDGINID46KFNORNYM/

It would go a long way with our security team if we could have some sort of recycling policy for containers in some of our more secure environments.

Jon Price
Intel Corporation


Re: Incubation Proposal: CredHub (credential manager)

David Illsley <davidillsley@...>
 

It seems like the initial focus is solving the operator problems (via BOSH)
rather than app developer problems. Do you have any sketches of how it
might be used for application secrets (broker and user provided)?

On Fri, Dec 16, 2016 at 11:15 PM, Dan Jahner <djahner(a)pivotal.io> wrote:

Hello Everyone,

Pivotal would like to propose to the Extensions PMC a new incubation
project focusing on credential management in Cloud Foundry. This product
may be used in a Cloud Foundry environment to centralize and secure
credential generation, storage, lifecycle management and access.

Project name: CredHub
Project proposal: https://docs.google.com/document/d/
1iG28J2Lm8RY3BXCZqqNWO7v-G1ppcdK8cizlhbN_o4g/edit?usp=sharing
Proposed Project Lead: Dan Jahner (Pivotal)
Proposed Scope: See “Proposed Scope” in the proposal
Development Operating Model: Pairing Model
Technical Approach: See “Basic Architecture” and “BOSH Manifest
Implementation” in the proposal
Initial team committed: 6 engineers from Pivotal


Please let me know if you have any questions.

Thanks,
Dan Jahner
djahner(a)pivotal.io


consul_z1/0 is failing after update

Sylvain Gibier
 

Hi,

Diego has been default in my CF installation (H/A over 3 AZ) - and today,
while trying a simple BOSH CF update of a stemcell - the consul_z1/0 keeps
on "failing after update".

If I look in the log file - I can see the following:

"
++ logger -p user.info -t vcap.consul-agent
++ tee -a /var/vcap/sys/log/consul_agent/consul_agent.stdout.log error
during start: 2/30 nodes reported failure
2016/12/19 14:49:50 [ERR] agent.client: Failed to decode response header:
EOF
2016/12/19 14:49:50 [ERR] agent.client: Failed to decode response header:
EOF
"
Also it seems that I have a bunch of errors:

"
2016/12/19 13:54:32 [INFO] consul: adding server consul-z3-0 (Addr:
10.10.30.37:8300) (DC: dc1)
2016/12/19 13:54:32 [INFO] consul: adding server consul-z2-0 (Addr:
10.10.20.37:8300) (DC: dc1)
2016/12/19 13:54:32 [ERR] agent: failed to sync remote state: No
cluster leader
2016/12/19 13:54:32 [INFO] agent: Joining cluster...
2016/12/19 13:54:32 [INFO] agent: (LAN) joining: [10.10.10.37
10.10.20.37 10.10.30.37]
2016/12/19 13:54:32 [INFO] agent: (LAN) joined: 3 Err: <nil>
2016/12/19 13:54:32 [INFO] agent: Join completed. Synced with 3 initial
agents
2016/12/19 13:54:32 [WARN] raft: Failed to get previous log: 503710 log
not found (last: 503708)
2016/12/19 13:54:32 [INFO] raft: Removed ourself, transitioning to
follower
"
I can definitely confirm in my case - that consul_z3 is the Leader (via
consul info) in my current setup.

Any help/point on how to fix that ?


Releases: CF: v234, Diego: 0.1467.0
IaaS: AWS


container restart on logout

DHR
 

Hi,

Last year when ‘cf ssh’ functionality was being discussed, I’m pretty sure that the concept of automatically restarting containers following an SSH session was discussed.
It was to protect against creating app container snowflakes.

I’m fairly sure that protection hasn’t been introduced yet: I tested cf ssh-ing into a PCFDEV container today, writing a file & was able to log back in to the container later and see that it was still present.

Is this feature or any other app container snowflake protection still planned?
I couldn’t see anything in the Diego backlog (https://www.pivotaltracker.com/n/projects/1003146 <https://www.pivotaltracker.com/n/projects/1003146>).

Thanks
Dave


Re: Incubation Proposal: CredHub (credential manager)

John Feminella <jxf@...>
 

Questions: * To what extent are CredHub's use cases and architecture covered
(or not) by a combination of something like Hashicorp's Vault and integration
effort? (I'm not singling out Vault specifically here, just using it as a
representative member of a class.)

* People who use CF want the properties outlined by CredHub, but CredHub
doesn't exist yet. What do those people do instead? To what extent are their
current solutions sufficient or deficient?

best,
~ jf--John Feminella
Advisory Platform Architect
✉ ·jxf(a)pivotal.io
t · @jxxf

On Fri, Dec 16, 2016 6:15 PM, Dan Jahner djahner(a)pivotal.io
wrote:
Hello Everyone,

Pivotal would like to propose to the Extensions PMC a new incubation project
focusing on credential management in Cloud Foundry. This product may be used in
a Cloud Foundry environment to centralize and secure credential generation,
storage, lifecycle management and access.
Project name: CredHubProject proposal:
https://docs.google.com/document/d/1iG28J2Lm8RY3BXCZqqNWO7v-G1ppcdK8cizlhbN_o4g/edit?usp=sharing
Proposed Project Lead: Dan Jahner (Pivotal)Proposed Scope: See “Proposed Scope”
in the proposalDevelopment Operating Model: Pairing ModelTechnical Approach: See
“Basic Architecture” and “BOSH Manifest Implementation” in the proposalInitial
team committed: 6 engineers from Pivotal

Please let me know if you have any questions.
Thanks,Dan Jahnerdjahner(a)pivotal.io


Hardcoded port in HM9k code & DEA job templates

Ronak Banka
 

Hello,

Recently we caught a hardcoded port in hm9k code which was mentioned nowhere
in release notes , and is still sitting there in hm9k code and dea job
templates.

Would be interested to know , how other cf operators are tracking this ,
specially from security point of view where ACL can break whole platform.

Opened a issue on cf-release
https://github.com/cloudfoundry/cf-release/issues/1128

Thanks
Ronak
Rakuten Inc.



--
View this message in context: http://cf-dev.70369.x6.nabble.com/Hardcoded-port-in-HM9k-code-DEA-job-templates-tp6249.html
Sent from the CF Dev mailing list archive at Nabble.com.


Re: Introducing hummus

Ronak Banka
 

Hi Adi,

Thanks for sharing , but i am not sure how this project is related to
cloudfoundry core or related projects ?

Thanks
Ronak



--
View this message in context: http://cf-dev.70369.x6.nabble.com/cf-dev-Introducing-hummus-tp6247p6248.html
Sent from the CF Dev mailing list archive at Nabble.com.


Introducing hummus

Aditya Anchuri
 

Hi all,

I worked on a little side project recently in order to create what I
believe to be a simpler way of generating JSON in Go (especially when
dealing with nested objects/arrays, or when cherry-picking elements from
one JSON message in order to create another JSON message).

I'd like to share it with everybody, hoping you'd find this useful. The
README is pretty self-explanatory, but let me know if you have any
questions.

https://github.com/aditya87/hummus

Thanks,
-Adi


Introducing hummus

Aditya Anchuri
 

Hi all,

I worked on a little side project recently in order to create what I
believe to be a simpler way of generating JSON in Go (especially when
dealing with nested objects/arrays, or when cherry-picking elements from
one JSON message in order to create another JSON message).

I'd like to share it with everybody, hoping you'd find this useful. The
README is pretty self-explanatory, but let me know if you have any
questions.

https://github.com/aditya87/hummus

Thanks,
-Adi


CF Diego Operator Toolkit: now on your Diego VMs!

Eric Malm <emalm@...>
 

Hi, all,

Over the past few months, the Diego team has been working on a new,
operator-focused CLI tool, which we call cfdot, the CF Diego Operator
Toolkit (https://github.com/cloudfoundry/cfdot).

We have focused initially on providing commands for the Diego BBS API,
mainly representing its endpoints (https://github.com/
cloudfoundry/bbs/tree/master/doc) directly. At present, we've added
commands for inspecting and manipulating DesiredLRPs and ActualLRPs, which
correspond to your CF app definitions and instances, and we have stories to
fill out commands for Tasks and Cells next. These BBS commands all return a
stream of JSON values on stdout, for easy processing with tools such as jq.
We plan eventually to build cfdot out at least to match the most valuable
capabilities of the previous "veritas" tool that some of you may have used
in the past.

If you're interested in trying it out, and you have a Diego deployment
based on the manifest-generation scripts in diego-release, it's already
available for you! Simply bosh ssh to any Diego job and run source
/var/vcap/jobs/cfdot/bin/setup: this command will put a BOSH-deployed cfdot
binary on your PATH and configure some environment variables for cfdot to
communicate with the BBS API for that deployment. It also adds a
BOSH-deployed jq binary to the PATH, for easier manipulation of those JSON
streams.

As an example, here's one way to add up the total number of app instances
CC has told Diego to run:

$ cfdot desired-lrp-scheduling-infos | jq '.instances' | jq -s 'add'
26

At this point, we have focused on making cfdot self-discoverable via help
and usage text instead of producing much external documentation about it.
If you do try it out, we would certainly appreciate feedback about it:
what's delightful, what's frustrating, what problems you are solving or
would like to solve with it that we can help you solve more directly, and
so forth. As an example, we've already received feedback that it would be
useful to have a script that sets up the environment to communicate with
the BBS in the standard BOSH-Lite deployment. Please feel free to reply on
this mailing list thread or open issues and PRs on the cfdot GitHub
repository linked above.

Thanks,
Eric, CF Runtime Diego PM


Incubation Proposal: CredHub (credential manager)

Dan Jahner
 

Hello Everyone,

Pivotal would like to propose to the Extensions PMC a new incubation
project focusing on credential management in Cloud Foundry. This product
may be used in a Cloud Foundry environment to centralize and secure
credential generation, storage, lifecycle management and access.

Project name: CredHub
Project proposal:
https://docs.google.com/document/d/1iG28J2Lm8RY3BXCZqqNWO7v-G1ppcdK8cizlhbN_o4g/edit?usp=sharing
Proposed Project Lead: Dan Jahner (Pivotal)
Proposed Scope: See “Proposed Scope” in the proposal
Development Operating Model: Pairing Model
Technical Approach: See “Basic Architecture” and “BOSH Manifest
Implementation” in the proposal
Initial team committed: 6 engineers from Pivotal


Please let me know if you have any questions.

Thanks,
Dan Jahner
djahner(a)pivotal.io


Re: Cloud Foundry Diego v1.0.0 released, starting EOL schedule for DEAs

Gwenn Etourneau
 

Hi Jason,

You can take a look here
https://www.cloudfoundry.org/250k-containers-in-production-a-real-test-for-the-real-world/

On Fri, Dec 16, 2016 at 4:47 AM, Jason Huang <jasonxs.huang(a)gmail.com>
wrote:

Hi Eric,

It's great to see that "The Diego team has succeeded in running 200,000
CF apps with a total of 250,000 instances on a large, Diego-backed CF
deployment on GCP.". Do you know how many cells are used in the test and
the resource allocation for each of the cells?

Thanks,

Jason

On Tue, Nov 29, 2016 at 9:53 AM, Eric Malm <emalm(a)pivotal.io> wrote:

Hi, all,

I'm extremely pleased to report that the Cloud Foundry Diego team has now
released version 1.0.0 of diego-release, after having successfully
validated its ambitious scaling targets in a full Cloud Foundry setting. If
you've been following in our public tracker at
https://www.pivotaltracker.com/n/projects/1003146, or joined the
Community Advisory Board discussion earlier this month, you'll have seen
that the Diego team has succeeded in running 200,000 CF apps with a total
of 250,000 instances on a large, Diego-backed CF deployment on GCP.

A key part of achieving this milestone has been replacing the etcd
key-value store with a relational data store, and from version 1.0.0
forward Diego officially supports only MySQL and Postgres databases.
Consequently, if you haven't done so already, please conduct your migration
to one of these two relational stores as soon as possible. Throughout major
version 1, Diego will support migrating data from existing etcd data stores
to MySQL or Postgres, but not standalone etcd deployments. We also
recommend that operators adopt a new set of more granular database
configuration properties introduced in Diego v0.1490.0 instead of the
original monolithic connection string.

As a reminder, the release of Diego v1.0.0 also officially starts the
six-month end-of-life schedule for the DEAs. Please see more details in the
earlier announcement at https://lists.cloudfoundry.org
/archives/list/cf-dev(a)lists.cloudfoundry.org/message/GMXXJ
TTM2Q6SIRGVXSQH4TPLHTVHKNNG/.

Finally, a tremendous thank-you to all of the past and present members of
the Diego team, stretching all the way back to January 2014!

Thanks,
Eric Malm, CF Runtime Diego PM


Re: CVE-2016-8218: Unauthenticated JWT signing algorithm in routing

Molly Crowther
 

After some discussion with Shannon, it appears that the affected release
versions in the initial notice were not correct. We have corrected the
version numbers in the notice on cloudfoundry.org.

The versions vulnerable to this exploit are:

- routing-release versions prior to 0.142.0
- cf-release versions 203 to 231


Please review and let us know if you have any questions. Apologies for the
confusion.

https://www.cloudfoundry.org/cve-2016-8218/

Thanks,
Molly Crowther
CFF Security Team

On Wed, Dec 14, 2016 at 11:14 AM, Shannon Coen <scoen(a)pivotal.io> wrote:

Additional clarification:

The Routing API component was included with cf-releases v203-231 during
early experimental development. These releases are quite old (v231 was
released a year ago) and we expect most operators have upgraded since then,
but if you have not you should do so now.

Shannon Coen
Product Manager, Cloud Foundry
Pivotal, Inc.

On Sat, Dec 10, 2016 at 12:34 PM, Shannon Coen <scoen(a)pivotal.io> wrote:

Clarification:

The routing-api job is not deployed with cf-release. It is deployed with
the routing-release [1], which provides support for TCP routing to apps on
Diego. If you have not deployed the routing-release specifically, then
chances are you do not have the routing-api job deployed and no action is
required.

To confirm, look at your BOSH deployments.

$ bosh deployments

For those who have deployed the routing-release, we recommend upgrading
now to version 0.142.0 which contains a fix for the vulnerability:
https://github.com/cloudfoundry-incubator/routing-release/releases/tag/0.
142.0

[1] https://github.com/cloudfoundry-incubator/routing-release

Best,

Shannon Coen
Product Manager, Cloud Foundry
Pivotal, Inc.

On Fri, Dec 9, 2016 at 11:00 PM, Molly Crowther <
mcrowther(a)cloudfoundry.org> wrote:

A new cf-release has been cut to mitigate the following issue. This
notice can also be found at https://www.cloudfoundry.org/cve-2016-8218/.
An RSS feed of Cloud Foundry vulnerabilities is available at
https://www.cloudfoundry.org/category/security/feed/.


CVE-2016-8218: Unauthenticated JWT signing algorithm in routing
Severity

Critical
Vendor

Cloud Foundry Foundation
Versions Affected

-

cf-release versions prior to 237, if:
-

any versions of routing release have been uploaded, AND
-

the routing API is enabled through a manifest property on
cf-release
-

cf-release versions 237 and later, prior to v249

Description

Incomplete validation logic in JSON Web Token (JWT) libraries can
allow unprivileged attackers to impersonate other users to the routing API.
Mitigation

OSS users of affected versions are strongly encouraged to:

-

Upgrade to Cloud Foundry v249 [1] or later

Credit

The issue was responsibly reported by a Pivotal team member.
References

-

[1] https://github.com/cloudfoundry/cf-release/releases

History2016-12-09: Initial vulnerability report published


Re: Important: do not use Diego v1.3.0 if you manually set the Diego cells' disk or memory capacity

Eric Malm <emalm@...>
 

Hi, all,

Diego v1.3.1 is now out with a fix for this regression: https://github.
com/cloudfoundry/diego-release/releases/tag/v1.3.1.

Apologies again,
Eric

On Thu, Dec 15, 2016 at 12:16 PM, Eric Malm <emalm(a)pivotal.io> wrote:

Hi, all,

If you set the diego.executor.disk_capacity_mb or diego.executor.memory_
capacity_mb BOSH properties to numeric values in your Diego manifest, *please
do not use Diego v1.3.0*. It contains a configuration regression wherein
the cell rep fails to start when these values are numeric. Those values
both default to the string value "auto", meaning that the cell
auto-configures those capacities based on what its local garden reports
them to be.

The Diego team will release Diego v1.3.1 as soon as possible with a fix
for this regression. We apologize for the inconvenience.

Thanks,
Eric, CF Runtime Diego PM


Important: do not use Diego v1.3.0 if you manually set the Diego cells' disk or memory capacity

Eric Malm <emalm@...>
 

Hi, all,

If you set the diego.executor.disk_capacity_mb or
diego.executor.memory_capacity_mb BOSH properties to numeric values in your
Diego manifest, *please do not use Diego v1.3.0*. It contains a
configuration regression wherein the cell rep fails to start when these
values are numeric. Those values both default to the string value "auto",
meaning that the cell auto-configures those capacities based on what its
local garden reports them to be.

The Diego team will release Diego v1.3.1 as soon as possible with a fix for
this regression. We apologize for the inconvenience.

Thanks,
Eric, CF Runtime Diego PM


Re: Cloud Foundry Diego v1.0.0 released, starting EOL schedule for DEAs

Jason Huang
 

Hi Eric,

It's great to see that "The Diego team has succeeded in running 200,000 CF
apps with a total of 250,000 instances on a large, Diego-backed CF
deployment on GCP.". Do you know how many cells are used in the test and
the resource allocation for each of the cells?

Thanks,

Jason

On Tue, Nov 29, 2016 at 9:53 AM, Eric Malm <emalm(a)pivotal.io> wrote:

Hi, all,

I'm extremely pleased to report that the Cloud Foundry Diego team has now
released version 1.0.0 of diego-release, after having successfully
validated its ambitious scaling targets in a full Cloud Foundry setting. If
you've been following in our public tracker at https://www.pivotaltracker.
com/n/projects/1003146, or joined the Community Advisory Board discussion
earlier this month, you'll have seen that the Diego team has succeeded in
running 200,000 CF apps with a total of 250,000 instances on a large,
Diego-backed CF deployment on GCP.

A key part of achieving this milestone has been replacing the etcd
key-value store with a relational data store, and from version 1.0.0
forward Diego officially supports only MySQL and Postgres databases.
Consequently, if you haven't done so already, please conduct your migration
to one of these two relational stores as soon as possible. Throughout major
version 1, Diego will support migrating data from existing etcd data stores
to MySQL or Postgres, but not standalone etcd deployments. We also
recommend that operators adopt a new set of more granular database
configuration properties introduced in Diego v0.1490.0 instead of the
original monolithic connection string.

As a reminder, the release of Diego v1.0.0 also officially starts the
six-month end-of-life schedule for the DEAs. Please see more details in the
earlier announcement at https://lists.cloudfoundry.
org/archives/list/cf-dev(a)lists.cloudfoundry.org/message/
GMXXJTTM2Q6SIRGVXSQH4TPLHTVHKNNG/.

Finally, a tremendous thank-you to all of the past and present members of
the Diego team, stretching all the way back to January 2014!

Thanks,
Eric Malm, CF Runtime Diego PM


Deprecating the `garden.docker_registry_endpoint` property?

Will Pragnell <wpragnell@...>
 

Hi all,

We're considering deprecating (sort of, see below) the
`garden.default_docker_registry` property, but would like to know if anyone
is using it first.

When I say deprecating, what I really mean is that we're considering not
implementing it or an equivalent for GrootFS, which would mean that this
feature would no longer be available when GrootFS ships next year.

We think this feature has never worked correctly in the Cloud Foundry
deployment case anyway. There's no way to set it for Docker app staging at
present, and therefore staging would try to pull container image metadata
from a different registry than the one Garden would pull the actual image
from if this property is set.

If anyone is setting this property in their CF deployment, We'd love to
hear about it and understand why. Otherwise, we probably won't implement an
equivalent property for GrootFS.

Thanks,
Will