Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Remove imagepullsecret after open sourcing #31

Closed
wants to merge 2 commits into from

Conversation

pns-nirmata
Copy link
Contributor

@pns-nirmata pns-nirmata commented Dec 1, 2022

Since the repo is open source, we don't need imagepull secrets.

Fixes #30

@pns-nirmata pns-nirmata requested a review from anusha94 December 1, 2022 09:47
@eddycharly
Copy link
Collaborator

Some users will mirror the image on a private repo though.

@anusha94
Copy link
Contributor

anusha94 commented Dec 1, 2022

Some users will mirror the image on a private repo though.

That's a good use case. Then can we add that appropriate comment for the field?

Something like "registry credentials if pulling from your private repository" ?

@eddycharly
Copy link
Collaborator

Some users will mirror the image on a private repo though.

That's a good use case. Then can we add that appropriate comment for the field?

Something like "registry credentials if pulling from your private repository" ?

We should introduce imagePullSecrets as a value, users won't put the credentials in clear text here. They will want to reference an existing secret in the cluster (bring your own image pull secret ;-)

@anusha94
Copy link
Contributor

anusha94 commented Dec 1, 2022

bring your own image pull secret

@eddycharly Love it!

Let's open a new issue for it and address it separately. We can go ahead with removing this IMO.

@eddycharly
Copy link
Collaborator

Yeah, this is trivial to add.

Co-authored-by: Charles-Edouard Brétéché <[email protected]>
@eddycharly
Copy link
Collaborator

@anusha94 see #33

@@ -8,29 +8,12 @@ You’ll need an [EKS](https://aws.amazon.com/eks/) cluster to run against.

### Running on the EKS cluster
1. Make sure that you have configured an [IAM role for the service account](#IAM-Role-for-Service-Account) `kyverno-aws-adapter-sa` in your desired namespace (configured in `values.yaml`) and specified the role's ARN in the `roleArn` field inside `values.yaml` file.

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

specified the role's ARN in the roleArn field inside values.yaml file.

Where do I get this values.yaml file from? 🤔

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Yes. The documentation needs to be changed. To specify the roleArn at helm install time.

@anusha94
Copy link
Contributor

anusha94 commented Dec 1, 2022

I think we can close this PR in favor of #33

@pns-nirmata
Copy link
Contributor Author

Closing this PR in favour of #33

@pns-nirmata pns-nirmata closed this Dec 1, 2022
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging this pull request may close these issues.

Remove registryConfig from values.yaml
4 participants