-
Notifications
You must be signed in to change notification settings - Fork 95
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Prepare usage of registry.redhat.io registry #124
Conversation
4e1a6be
to
676f37b
Compare
5fb1bbb
to
d043201
Compare
676f37b
to
5606a8f
Compare
d043201
to
124d66e
Compare
8c39747
to
69c6c2f
Compare
@@ -575,7 +575,7 @@ func (ampImages *AmpImages) buildQuayServiceAccount() *v1.ServiceAccount { | |||
}, | |||
ImagePullSecrets: []v1.LocalObjectReference{ | |||
v1.LocalObjectReference{ | |||
Name: "quay-auth"}}} | |||
Name: "threescale-registry-auth"}}} |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
function still called buildQuayServiceAccount
, kind of weird. isn't it?
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
fixed
69c6c2f
to
4220a0a
Compare
4220a0a
to
7388dd9
Compare
7388dd9
to
25ca587
Compare
Code Climate has analyzed commit 25ca587 and detected 0 issues on this pull request. View more on Code Climate. |
PR to prepare for the use of registry.redhat.io in the images for 2.6 releases and newer ones.
The old RedHat registry access.redhat.com will be deprecated and newer images are not going to be published on it. New images are going to be published in registry.redhat.io. This registry requires authentication.
This PR allows configuring the authentication credentials for the registry.redhat.io via a secret called 'threescale-registry-auth'. This secret is associated to the "amp" ServiceAccount that has been assigned to all the DeploymentConfig elements of the platform.
The final user is the only one that knows the credentials it has so the secret must be created by them with the specific fields needed and values needed before deploying the APIManager/the templates. Otherwise, the deploy will fail.
We can think of making the secret name configurable, but for the moment to already have something we can merge it this way.
In case of making it configurable I would:
In the templates we could:
In the operator we could: