Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Allow specifying imagePullSecret #897

Closed
jmatsushita opened this issue Dec 18, 2017 · 15 comments
Closed

Allow specifying imagePullSecret #897

jmatsushita opened this issue Dec 18, 2017 · 15 comments
Labels
lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed.

Comments

@jmatsushita
Copy link

Hi there,

How would one go about providing the imagePullSecret key to a deployment?

This could possibly help with #893 ? This might also be part of a broader discussion about "template-supported conversions", which would allow to make custom changes to the conversion outputs...

Cheers,

Jun

@jmatsushita
Copy link
Author

In fact, instead or in addition to "template-supported conversions", if the helm chart conversion template had a number of values interpolated, then the parameters could be passed to helm on deploy.

@Code0x58
Copy link
Contributor

Code0x58 commented Dec 20, 2017

The issue with the case you linked is that the code tries doing something like docker push my-namespace/image:tag instead of docker push my-registry.com:5000/my-namespace/image:tag, to do with pushing from the client, rather than pulling from pods.

I think pod ImagePullSecrets fall into the same boat as ingress TLS secrets, so whoever takes this on could use #896 as a point of reference for the code.

@berryp
Copy link

berryp commented Feb 14, 2018

Does this mean we cannot pull from external private registries right now?

@Code0x58
Copy link
Contributor

You can't pull from an private registry if you would need to authenticate from the node to pull an image.

@fejta-bot
Copy link

Issues go stale after 90d of inactivity.
Mark the issue as fresh with /remove-lifecycle stale.
Stale issues rot after an additional 30d of inactivity and eventually close.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/lifecycle stale

@k8s-ci-robot k8s-ci-robot added the lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. label May 15, 2018
@ysle
Copy link

ysle commented May 28, 2018

Hi,
okay, so this is to stay i simply can't use the lovely Kompose service as it if the given docker image is private right ?

@hangyan
Copy link
Contributor

hangyan commented Jun 6, 2018

@ysle In kubernetes, you can create a secret for you private registry and add it to the default serviceaccount ( in the same namespace). After this ,kubernetes will pull the image for you.

Check the doc: https://kubernetes.io/docs/concepts/configuration/secret/#arranging-for-imagepullsecrets-to-be-automatically-attached

@fejta-bot
Copy link

Stale issues rot after 30d of inactivity.
Mark the issue as fresh with /remove-lifecycle rotten.
Rotten issues close after an additional 30d of inactivity.

If this issue is safe to close now please do so with /close.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/lifecycle rotten
/remove-lifecycle stale

@k8s-ci-robot k8s-ci-robot added lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed. and removed lifecycle/stale Denotes an issue or PR has remained open with no activity and has become stale. labels Jul 6, 2018
@fejta-bot
Copy link

Rotten issues close after 30d of inactivity.
Reopen the issue with /reopen.
Mark the issue as fresh with /remove-lifecycle rotten.

Send feedback to sig-testing, kubernetes/test-infra and/or fejta.
/close

@jankal
Copy link

jankal commented Sep 14, 2018

/reopen
This is important for deploying docker-compose files to a kubernetes cluster.

@k8s-ci-robot
Copy link
Contributor

@jankal: You can't reopen an issue/PR unless you authored it or you are a collaborator.

In response to this:

/reopen
This is important for deploying docker-compose files to a kubernetes cluster.

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

@jankal
Copy link

jankal commented Sep 14, 2018

@Code0x58 anything new on this?

@Code0x58
Copy link
Contributor

I haven't kept up with the development of Kompose for months, but as I left it hangyan's comment was the best existing solution, but a Kompose fix would have been easy by doing something like #896 to add another label to provide ImagePullSecrets similar to #896. #1040 is an active PR on it, so probably worth reviewing for anyone who is interested and has time.

@k8s-triage-robot
Copy link

The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.

This bot triages issues and PRs according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Reopen this issue or PR with /reopen
  • Mark this issue or PR as fresh with /remove-lifecycle rotten
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/close

@k8s-ci-robot
Copy link
Contributor

@k8s-triage-robot: Closing this issue.

In response to this:

The Kubernetes project currently lacks enough active contributors to adequately respond to all issues and PRs.

This bot triages issues and PRs according to the following rules:

  • After 90d of inactivity, lifecycle/stale is applied
  • After 30d of inactivity since lifecycle/stale was applied, lifecycle/rotten is applied
  • After 30d of inactivity since lifecycle/rotten was applied, the issue is closed

You can:

  • Reopen this issue or PR with /reopen
  • Mark this issue or PR as fresh with /remove-lifecycle rotten
  • Offer to help out with Issue Triage

Please send feedback to sig-contributor-experience at kubernetes/community.

/close

Instructions for interacting with me using PR comments are available here. If you have questions or suggestions related to my behavior, please file an issue against the kubernetes/test-infra repository.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
lifecycle/rotten Denotes an issue or PR that has aged beyond stale and will be auto-closed.
Projects
None yet
Development

Successfully merging a pull request may close this issue.

9 participants