-
Notifications
You must be signed in to change notification settings - Fork 8
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Feature: Add imagePullSecrets support to Policy Decision Point chart #302
Comments
lemuelwatts
changed the title
Feature: Add imagePullSecrets support to Policy Decision Point charts
Feature: Add imagePullSecrets support to Policy Decision Point chart
Aug 27, 2024
DoD completed with @meliz19 |
OTS completed with @jacksondelametter |
jaebchoi
added a commit
that referenced
this issue
Oct 9, 2024
jaebchoi
added a commit
that referenced
this issue
Oct 9, 2024
jaebchoi
added a commit
that referenced
this issue
Oct 9, 2024
jaebchoi
added a commit
that referenced
this issue
Oct 10, 2024
jaebchoi
added a commit
that referenced
this issue
Oct 10, 2024
…ort-to-Policy-Decision-Point-chart #302 imagePullSecrets support to Policy Decision Point chart
Final test completed |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Description
The v2 charts for Policy Decision Point do not currently allow for the user to add an imagePullSecret so that images can be pulled from private image registries. We would like to add this functionality to the chart so that it can be used more easily in downstream projects that require the use of a private image registry.
DOD
Test Strategy/Script
On Github, Go to Settings,
On left tab Go to Developer setting.
Click on personal access token (classic) and generate classic token.
Scope should be something like this:
Copy the gpg key ( personal access token)
Create secret with this command
kubectl create secret docker-registry regcred --docker-server=ghcr.io --docker-username={your github name} --docker-password={your Personal access token}
Check to see if you have any PDP docker images by running command
docker image
something like this:
{projectname}-policy-decision-point-docker tilt-16367d62958476b5 16367d629584 23 hours ago 417MB
NOTE: if you don't have any pdp-docker image, run downstream project with pdp and deploy, then this docker image will be generated.
Change Docker tag to your private registry.
docker tag {projectname}-policy-decision-point-docker:{tilt-tag} ghcr.io/{github username}/issue-302-policy-decision-point-docker:1.0.0-SNAPSHOT
push docker tag to your private registry
docker push ghcr.io/{github username}/issue-302-policy-decision-point-docker:1.0.0-SNAPSHOT
check to confirm you have package uploaded
https://github.com/{your github username}?tab=packages
pull in latest dev branch of aissemble
make sure build is successful
Build downstream project using following command:
SparkPipeline.json
{downstream-project}/{downstream-project}-pipeline-models/src/main/resources/pipelines
{downstream-project}-deploy/src/main/resources/apps/policy-decision-point/values.yaml,
update imagePullSecret set toregcred
Example: disregard -4 appended in the image name.
References/Additional Context
Pull an image from a private registry
The text was updated successfully, but these errors were encountered: