-
Notifications
You must be signed in to change notification settings - Fork 122
Add support to --secrets when building container images
#603
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: main
Are you sure you want to change the base?
Conversation
Signed-off-by: Guilherme Silva <gmpas4444@gmail.com>
|
[APPROVALNOTIFIER] This PR is NOT APPROVED This pull-request has been approved by: gsilva00 The full list of commands accepted by this bot can be found here.
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
|
Hi, Now that most pipeline checks have finished, I'm stumped on the results of the failing ones:
Looking forward to your feedback! EDIT: I've also noticed that I left a temporary |
Weird indeed. Locally, it's a green check for me
this however fails, consistently with CI. I'll take a quick look now to see if I catch the issue, and if not I'll come back tomorrow with a fresh mind |
|
update: reproduces the behavior of github. The python env for that action (3.14) follows latest fedora (43) and probably tmt run into some issues since it's not up to date. the version in Edit: typo |
Signed-off-by: Guilherme Silva <gmpas4444@gmail.com>
Signed-off-by: Guilherme Silva <gmpas4444@gmail.com>
|
Hi @inknos , About I ran the tests on the same OSes as the testing farms (not exactly their setup, but the error showed up nonetheless). It happened because the I don't understand why this happens:
I didn't explore further than this, but would like to understand the root cause of this issue better. In any case, the test should now pass. |
Closes #526.
With the proposed changes it is now possible to pass secrets into the build context in a way that they won't be stored in the final image (equivalent to
podman build --secret ...). They are temporarily mounted during the build process, in ContainerfileRUN --mount=type=secret,id=<some_id>instructions, where the<some_id>matches the id specified in the corresponding--secretoption of thepodman buildcommand.Changes:
--secretsargument into the expected manifest query parameter when making requests;client.images.buildfunction to include the added field. Description text extracted from the Podman CLI itself (with some additional info about the possibility of passing env variables)--secretargument is mapped into the expected query parameter;