-
Notifications
You must be signed in to change notification settings - Fork 702
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Add credentials when pulling img in CI #5080
Conversation
Signed-off-by: Antonio Gamez Diaz <agamez@vmware.com>
Signed-off-by: Antonio Gamez Diaz <agamez@vmware.com>
✅ Deploy Preview for kubeapps-dev canceled.
|
I would like to understand why this change is necessary.
Have we hit the rate limits of Docker registry due to using CI? What happens with forked repos? Those won't have the |
I don't think so (yet), but Circle CI does recommend adding the credentials, see:
So that's why I'm sending this PR. Otherwise, #2985 should have been closed when triaging.
I guess it will roll back to the un-authenticated behavior, that is, using the circleci default account. |
Some months ago we had problems, as a PR introduced those variables, but it was making forked CI runs to fail as variables were missing in those forked repos. The CI definition yaml is cloned too into the forked repos, as any other file. CI execution is done accordingly, having as a context the forked repo, therefore it fails. |
Yes, of course, a good idea to double-check our assumptions 😅 . I've merged this branch into my branch's main and, as supposed it falls back to the unauth behavior:
|
Great, thanks for checking!! |
Description of the change
This trivial PR just adds the docker registry credentials when pulling the images used in the CircleCI runners.
Benefits
Avoid rate limits, maybe?
Possible drawbacks
N/A
Applicable issues
Additional information
After and before: