-
Notifications
You must be signed in to change notification settings - Fork 405
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Include cred helpers in keychain #581
Conversation
Codecov Report
@@ Coverage Diff @@
## main #581 +/- ##
=======================================
Coverage 48.58% 48.58%
=======================================
Files 43 43
Lines 2221 2221
=======================================
Hits 1079 1079
Misses 956 956
Partials 186 186
Continue to review full report at Codecov.
|
lol: https://github.com/google/ko/runs/5045688219?check_suite_focus=true Pulling distroless attempts to use gcloud auth, which is not configured, so it fails closed, instead of falling back to trying anonymous, which would succeed. 🤔 |
6445e67
to
7443e56
Compare
This adds implicit support for Google, Amazon, Azure and GitHub container registries if the environment provides credentials. Binary size increases from 22 MB -> 26 MB
7443e56
to
eb157b2
Compare
This should be RFAL now. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
🤩
Supercedes kubernetes#25383, where in kubernetes#25383 the logic is in the pod where tests run, the problem there is that imagePullSecret defined on job pod is not accessible, which limits it's use case. The other problem is that the containers inside a test pod are not aware of the image they are from, so it's a little bit weird to let them know about it. This PR moves the logic to plank, which feels more natural ----------------------------- This is an unfortunate fact of prow, that user need to explictly set the entrypoint. The migration of prow images from being built with bazel to ko introduced a side effect of all prow jobs that use gcr.io/k8s-prow images, such as robots/comment, robots/pr-creator etc. would fail due to the location of default entrypoint change. It would be trivial amount of work to update the binary location in prow jobs definition, but would like to use this opportunity to try to get this fixed. (This PR was an effort baked on top of separate offline brainstorming with @cjwagner and @BenTheElder ) (The entrypoint extraction and docker auth parts were mainly from @imjasonh's work at ko-build/ko#581)
Supercedes kubernetes#25383, where in kubernetes#25383 the logic is in the pod where tests run, the problem there is that imagePullSecret defined on job pod is not accessible, which limits it's use case. The other problem is that the containers inside a test pod are not aware of the image they are from, so it's a little bit weird to let them know about it. This PR moves the logic to plank, which feels more natural ----------------------------- This is an unfortunate fact of prow, that user need to explictly set the entrypoint. The migration of prow images from being built with bazel to ko introduced a side effect of all prow jobs that use gcr.io/k8s-prow images, such as robots/comment, robots/pr-creator etc. would fail due to the location of default entrypoint change. It would be trivial amount of work to update the binary location in prow jobs definition, but would like to use this opportunity to try to get this fixed. (This PR was an effort baked on top of separate offline brainstorming with @cjwagner and @BenTheElder ) (The entrypoint extraction and docker auth parts were mainly from @imjasonh's work at ko-build/ko#581)
This adds implicit support for Google, Amazon, Azure and GitHub container registries if the environment provides credentials.
Binary size increases from 22 MB -> 26 MB