-
Notifications
You must be signed in to change notification settings - Fork 191
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[OCI] Static credentials should take precedence over the OIDC provider #884
Conversation
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM
Thanks @souleb
This has been tested on eks:
|
Thanks @souleb for all the testing 🥇 |
please don't merge this. I have to to add the tests for the |
eaab1a0
to
473b546
Compare
@darkowlzz this is ready now. Note that the |
For the tests and the scenarios that result in
I think it's not a big concern to be addressed in this PR. We can do it separately later. |
@darkowlzz I put your comment in an issue: #894. |
if secretRef is provided, we do not attempt to resolve oidc Signed-off-by: Soule BA <soule@weave.works>
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
LGTM!
I suspect that the CI failure may be due to the existence of AWS secrets in the env vars that were added in github actions recently. The contextual login tries to use the credentials to actually log into a non-existing repository and fails.
fixes #874
If
spec.SecretRef
orspec.ServiceAccountName
is provided, the controller will use the static credentials from the referenced secret.Otherwise, if a non-generic provider is present in the definition, the controller will try to resolve credentials from the provider.
Signed-off-by: Soule BA soule@weave.works