The Airlock Microgatway container images can be obtained from our Quay.io repositories. The repositories are public, and the images can be pulled without special permissions.
Airlock Microgateway repositories on Quay.io
- Image link-list:
- Microgateway Operator – quay.io/airlock/microgateway-operator
- Microgateway CNI plugin – quay.io/airlock/microgateway-cni
- Microgateway Engine – quay.io/airlock/microgateway-engine
- Microgateway Session Agent – quay.io/airlock/microgateway-session-agent
Visit the Airlock Microgateway repositories online to see all available tags.
Verify the image signature
The Airlock Microgateway images are signed using Cosign, which can be verified easily by running the following command.
List of images:
Verifying the image signature with the cosign.pub
key can be automated by a policy controller such as sigstore policy-controller, Kyverno, or Connaisseur.
Using a custom image registry
There might be reasons to pull the container images only from internal image registries, not directly from external registries like Quay.io or GitHub. To do so, follow along with this guide.
How to use your custom image registry
- Copy the Airlock Microgateway images into your custom image registry.
- Adjust the Airlock Microgateway CNI helm chart values, i.e. with a
pullsecret
(if required) and therepository
information, for example: - Adjust the Airlock Microgateway Operator helm chart values, i.e. with a
pullsecret
(if required) and therepository
information, for example: - With the adjustments, the images will be pulled from the custom image registries. The pull secret for the custom registry containing the Engine image must be added to application Pods with injected Airlock Microgateway Engines. Subsequently, the Pods must be restarted to be updated.
For example, copy a remote image from <SRC>
to <DST>
while retaining the digest value running:
Further information and links
- Internal links:
- Container image repositories and registries
- Repositories for License texts