-
Notifications
You must be signed in to change notification settings - Fork 1.3k
[installer] Support adding image pull secrets even when the internal (in-cluster) registry is used #10792
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Comments
|
Internal mention of this here |
Allow certificate or a dockerconfig, since uploading a dockerconfig directly from a file means they can validate that they've set the correct credentials with a docker push/pull, before uploading the file. Allow for multiple secrets and we merge them for one dockerconfig |
Started working on this. The planned resolution is to move Coming to the requirements that @mrzarquon specified,
We can only specify setting a certificate (aka secret) as taking a dockerconfig directly means that the we might be storing auth credentials in the config (which has complexities, even if we mask them). But, As the certificate is created by the user using the |
Created #12060 |
@Pothulapati does #12060 replace this one in that case, let's close this one and prioritise the other one :) |
@lucasvaltl This is still needed, as #12060 only tackles the components side of things, but we still need to move this config in the installer (but only after that is done) |
Currently, we can add image pull secrets only when an external registry is used like this:
However, when we use an in-cluster registry, customers would probably still want to add pull secrets for workspace base images.
I would suggest to deprecate the
certificate
block underexternal
and moving it directly undercontainerRegistry
. Like this:(probably rename “certificate” to “credentials”, however, we probably want to keep this consistent to other occurences of “credentials”, e.g. for the object storage)
That would also allow adding workspace pull secrets when the in-cluster registry is used like this (see also #10791):
In this case, we need to merge the in-cluster container secret with the secret given here to allow accessing both registries.
The text was updated successfully, but these errors were encountered: