Replies: 6 comments 35 replies
-
ref to myself at #3405 (comment) At peer side Peer does NOT compile CC or prepare Docker Image User installs CC package containing Docker Image URL/Service URL/Source code link(some Customer resource definition). |
Beta Was this translation helpful? Give feedback.
-
Fyi, I just updated the k8s builder docs to take advantage of a prebuilt chaincode package, which eliminates the nasty |
Beta Was this translation helpful? Give feedback.
-
If the service account running the peers does not have permissions to create pods in Kubernetes, the options are:
For restricted Kube clusters that do NOT want to grant access for the service account to create pods : Use CCaaS and have a Kube Administrator manage the CC / pod lifecycle. |
Beta Was this translation helpful? Give feedback.
-
my most concern is from principle of least privilege for peer pod.
if fabric-builder-k8s able to provide more features above fabric-ccs-builder without additional permission, that's cool. |
Beta Was this translation helpful? Give feedback.
-
Hi all, In the interest of moving this discussion and design forward, may I propose the following compromise:
|
Beta Was this translation helpful? Give feedback.
-
Bundle a default k8s Chaincode Builder into the peer #3405
In this discussion: Converge on an approach for running an external chaincode builder / chaincode pods on Kubernetes.
Requirements:
Easy to use / works "out of the box" with minimal (ideally zero) configuration or Kubernetes expertise
Extensible / customizable for deployments with additional integration needs
Chaincode image build is run independently from Fabric: assume a CC image exists and is available at a container registry.
No Docker in anything
Retain the existing chaincode / peer builder lifecycle
The current / best stake is @jt-nti approach articulated in fabric-builder-k8s
Beta Was this translation helpful? Give feedback.
All reactions