New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adding TLS options to the sign logic. #162
Conversation
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: ybettan The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
/cc @chr15p |
@ybettan: GitHub didn't allow me to request PR reviews from the following users: chr15p. Note that only kubernetes-sigs members and repo collaborators can review this PR, and authors cannot review their own PRs. In response to this:
Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository. |
This PR is following on #86 (comment) |
/hold |
/unhold |
Codecov ReportBase: 73.92% // Head: 74.07% // Increases project coverage by
Additional details and impacted files@@ Coverage Diff @@
## main #162 +/- ##
==========================================
+ Coverage 73.92% 74.07% +0.15%
==========================================
Files 26 26
Lines 2558 2573 +15
==========================================
+ Hits 1891 1906 +15
Misses 582 582
Partials 85 85
Help us with your feedback. Take ten seconds to tell us how you rate us. Have a feature suggestion? Share it here. ☔ View full report at Codecov. |
/hold |
9123d8e
to
91dce79
Compare
Waiting to see the resolution of #164 |
Fixes #164 |
39d8b73
to
d0537d3
Compare
@qbarrand @yevgeny-shnaidman PTAL. |
/unhold |
1 similar comment
/unhold |
Will be rebased on top #156 once merged. |
✅ Deploy Preview for kubernetes-sigs-kmm ready!
To edit notification comments on pull requests, go to your Netlify site settings. |
/lgtm |
/hold |
When checking if the `signed` image already exist or when pulling the image to sign, we should be able to set some TLS options. This flow follows the same logic we have for builds. In additions, this commit also update the type of the `ModuleLoaderContainerSpec.RegistryTLS` API so we use the default values when not specified. Signed-off-by: Yoni Bettan <yonibettan@gmail.com>
/unhold |
/lgtm |
Adding TLS options to the sign logic.
When checking if the
signed
image already exist or when pulling theimage to sign, we should be able to set some TLS options.
This flow follows the same logic we have for builds.
In additions, this commit also update the type of the
ModuleLoaderContainerSpec.RegistryTLS
API so we use the default valueswhen not specified.
Signed-off-by: Yoni Bettan yonibettan@gmail.com