Skip to main content
Version: latest

Advanced CLI Configuration

You can modify the deployment of the pack registry by providing a YAML configuration file. You can also override default configuration options through the usage of environment variables.

The configuration file is divided into keys and values. The following is an example of a YAML configuration.

version: 0.1
log:
level: info
fields:
environment: test

The key version has a number value. The log key has a value with multiple keys, which in turn have more keys.

To override the value of log.level you can specify an environment variable named REGISTRY_LOG_LEVEL.

export REGISTRY_LOG_LEVEL=debug

Default Configuration

The docker image for the registry contains the following default configuration values.

version: 0.1
log:
fields:
service: registry
storage:
cache:
blobdescriptor: inmemory
filesystem:
rootdirectory: /data/.spectro-server
http:
addr: :5000
headers:
X-Content-Type-Options: [nosniff]
Strict-Transport-Security: [max-age=63072000; includeSubdomains; preload]
Content-Security-Policy: [img-src 'self'; script-src 'self'; style-src 'self]
X-Frame-Options: [DENY]
X-XSS-Protection: [1; mode=block]
Referrer-Policy: [same-origin]
auth:
htpasswd:
realm: basic-realm
path: /auth/htpasswd-basic

The server is started with the command registy serve /etc/spectro/config.yml. You can override the default values with specific values through environment variables, or you can use your own configuration file.

For example, you can start the docker container image with the following environment by using the variables to override the basic auth realm and logging level. In the following example, the -e flag is used to provide environment variables to the container.

docker run -d \
--rm \
-p 443:5000 \
--name spectro-registry\
--volume $(pwd)/spectropaxconfig/:/etc/spectropaxconfig/
-e REGISTRY_LOG_LEVEL=debug \
-e REGISTRY_AUTH=htpasswd \
-e REGISTRY_AUTH_HTPASSWD_REALM="My Enterprise Realm" \
gcr.io/spectro-images-public/release/spectro-registry:4.0.2

Alternatively, you can start the container by mounting a directory with a new configuration file and pointing the server command to the configuration file.

docker run -d \
--rm \
-p 443:5000 \
--name spectro-registry \
--volume $(pwd)/myconfig.yml:/etc/myconfig.yml \
gcr.io/spectro-images-public/release/spectro-registry:4.0.2 \
serve /etc/spectropaxconfig/myconfig.yml

Storage Backend

The pack registry can store data on a file system through a mounted volume, or you can specify object storage such as AWS S3.

The following is an example of a configuration using a file system backend.

storage:
cache:
blobdescriptor: inmemory
filesystem:
rootdirectory: /tmp/registry/data/.spectro-server

If you are using S3 Storage, ensure you specify the required S3 parameters.

storage:
cache:
blobdescriptor: inmemory
s3:
region: us-east-1
bucket: my-bucket
rootdirectory: /registry
encrypt: true|false
secure: false|true
accesskey: SAMPLEACCESSKEY
secretkey: SUPERSECRET
host: OPTIONAL_MINIO_HOST_IF_USING
port: OPTIONAL_MINIO_PORT_IF_USING

You can also use ephemeral storage. We recommend using ephemeral storage for testing purposes. Production environments should use object storage or a file system.

storage: inmemory

Authentication

You can configure basic HTTP Auth. Basic Auth requires providing the pack registry server with an httppasswd file containing the credentials.

auth:
htpasswd:
realm: basic-realm
path: /auth/htpasswd-basic

HTTP

The following options are available for modifying HTTP transport:

Server and Port

For serving content on all interfaces on port 5000:

http:
addr: :5000

Alternatively, the server can bind to a single IP and different port:

http:
addr: 192.168.122.77:25000

HTTP Headers

The following headers are the default, and can be overridden:

http:
headers:
X-Content-Type-Options: [nosniff]
Strict-Transport-Security: [max-age=63072000; includeSubdomains; preload]
Content-Security-Policy: [img-src 'self'; script-src 'self'; style-src 'self]
X-Frame-Options: [DENY]
X-XSS-Protection: [1; mode=block]
Referrer-Policy: [same-origin]

TLS

TLS can be configured using Let's Encrypt or custom TLS certificates:

When using Let's Encrypt, your registry server must be assigned to a public IP address accessible for HTTP-based validation by the Let's Encrypt services. Check out the Deploy Pack Registry Server with Let's Encrypt guide to learn more.

http:
addr: :5000
tls:
letsencrypt:
cachefile: le-cache
email: oz@spectrocloud.com
hosts:
- pax-registry.spectrocloud.com

Let's Encrypt limits the number of free certificates issued for each domain for a set time. We recommend you mount a volume where the certificates are permanently stored. Use the option cachefile to enable this behavior.

You can specify custom certificates by providing the file path to the certificate files.

http:
tls:
certificate: /path/to/x509/certificate/file
key: /pat/to/x509/key/file/which contains/private key/for x509 certificate above
clientcas: /path/to/file/with one or more/CA certificates encoded as PEM
minimumtls: minimum tls version to use