-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Support service account authorization #151
Labels
meaty-juicy-coding-work
This task is mostly about implementation!!! And docs and tests of course but that's a given
Comments
bobcatfish
added
the
meaty-juicy-coding-work
This task is mostly about implementation!!! And docs and tests of course but that's a given
label
Oct 12, 2018
/assign @shashwathi |
tanner-bruce
pushed a commit
to tanner-bruce/build-pipeline
that referenced
this issue
Oct 16, 2018
Adds `github.com/google/go-containerregistry` as a dependency for accessing container registries Adds `KANIKO_SECRET_CONFIG_FILE` for adding a service account to the kaniko task when running e2e test locally to ensure kaniko is able to push to a gcr.io registry.. This is necessary for running the e2e tests locally unless the kubernetes nodes provide another way of authenticating to the registry, such as provisioning them with a storage admin scope. Once tektoncd#151 is in place, we will be able to update this code to create a service account and use that in the BuildSpec. Fixes tektoncd#150
tanner-bruce
pushed a commit
to tanner-bruce/build-pipeline
that referenced
this issue
Oct 17, 2018
Adds `github.com/google/go-containerregistry` as a dependency for accessing container registries Adds `KANIKO_SECRET_CONFIG_FILE` for adding a service account to the kaniko task when running e2e test locally to ensure kaniko is able to push to a gcr.io registry.. This is necessary for running the e2e tests locally unless the kubernetes nodes provide another way of authenticating to the registry, such as provisioning them with a storage admin scope. Once tektoncd#151 is in place, we will be able to update this code to create a service account and use that in the BuildSpec. Fixes tektoncd#150
knative-prow-robot
pushed a commit
that referenced
this issue
Oct 17, 2018
Adds `github.com/google/go-containerregistry` as a dependency for accessing container registries Adds `KANIKO_SECRET_CONFIG_FILE` for adding a service account to the kaniko task when running e2e test locally to ensure kaniko is able to push to a gcr.io registry.. This is necessary for running the e2e tests locally unless the kubernetes nodes provide another way of authenticating to the registry, such as provisioning them with a storage admin scope. Once #151 is in place, we will be able to update this code to create a service account and use that in the BuildSpec. Fixes #150
sthaha
pushed a commit
to sthaha/build-pipeline
that referenced
this issue
Oct 30, 2019
Adds OpenShift monitoring config
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Labels
meaty-juicy-coding-work
This task is mostly about implementation!!! And docs and tests of course but that's a given
Expected Behavior
In
PipelineParams
, we have aServiceAccount
field, which should be passed to the build) when creating Tasks.Actual Behavior
We do nothing with the the
ServiceAccount
field.Steps to Reproduce the Problem
You could reproduce the issue by trying to do something like push to an image repo that your user is not authorized to push to (see #144)
The text was updated successfully, but these errors were encountered: