Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Helm chart Add support for image pull secrets #3837

Open
villanisaac-kr opened this issue Mar 1, 2024 · 3 comments
Open

Helm chart Add support for image pull secrets #3837

villanisaac-kr opened this issue Mar 1, 2024 · 3 comments
Assignees
Milestone

Comments

@villanisaac-kr
Copy link

villanisaac-kr commented Mar 1, 2024

Describe the current behavior
A description of how things are today.
Today we can't use images that are stored in a virtual repository due to the lack of a input values for imagePullSecrets

Describe the improvement
How should things be changed or improved?
Need to add pull secrets input value on values.yaml file

Like this

image:
  repository: mcr.microsoft.com/k8s/azureserviceoperator:v2.6.0
  kubeRBACProxy: gcr.io/kubebuilder/kube-rbac-proxy:v0.13.1
  pullSecrets: [] 

Need to add the pull secrets to Deployment and Job templates under /spec/template/spec like below example:

      {{- with .Values.image.pullSecrets }}
      imagePullSecrets:
        {{- toYaml . | nindent 8 }}
      {{- end }}

Additional context
Add any other context about the suggested improvement.

Tasks

No tasks being tracked yet.
@villanisaac-kr villanisaac-kr changed the title Helm chart allow image pull secrets Helm chart Add support for image pull secrets Mar 1, 2024
@matthchr
Copy link
Member

matthchr commented Mar 4, 2024

Can you expand on why you want this?

Is it related to supply-chain security? Worried about the mcr image tag being maliciously updated? Or something else?

Note: Might be worth seeing if other projects like CAPI support this.

@matthchr matthchr added waiting-on-user-response Waiting on more information from the original user before progressing. and removed needs-triage 🔍 labels Mar 4, 2024
@villanisaac-kr
Copy link
Author

villanisaac-kr commented Mar 5, 2024

Hi Yes I would say supply chain security is correct. At the org I work for all AKS clusters are deployed to private VNets and the firewall restricts access to third party artifacts to use private registry only. So my cluster is not allowed to connect directly to mcr. Also many open source projects support imagePullSecrets.
@matthchr

@matthchr matthchr added needs-triage 🔍 and removed waiting-on-user-response Waiting on more information from the original user before progressing. labels Mar 11, 2024
@matthchr matthchr added this to the v2.8.0 milestone Mar 11, 2024
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
Development

No branches or pull requests

3 participants