Merge "docs: trivial: clarify pull secrets for OCI image access"
This commit is contained in:
@@ -106,7 +106,10 @@ As such, there are three available paths for providing configuration:
|
|||||||
utilized to retrieve an image artifact, but is not intended for pulling
|
utilized to retrieve an image artifact, but is not intended for pulling
|
||||||
other artifacts like kernels or ramdisks used as part of a deployment
|
other artifacts like kernels or ramdisks used as part of a deployment
|
||||||
process. As with all other ``instance_info`` field values, this value
|
process. As with all other ``instance_info`` field values, this value
|
||||||
is deleted once the node has been unprovisioned.
|
is deleted once the node has been unprovisioned. The way this field is
|
||||||
|
used, is by supplying the pre-shared secret token value. This is the same
|
||||||
|
value which you would normally have in your Docker ``config.json`` file
|
||||||
|
``auth`` field for the top level domain your accessing.
|
||||||
* A node ``driver_info`` value of ``image_pull_secret``. This setting is
|
* A node ``driver_info`` value of ``image_pull_secret``. This setting is
|
||||||
similar to the ``instance_info`` setting, but may be utilized by an
|
similar to the ``instance_info`` setting, but may be utilized by an
|
||||||
administrator of a baremetal node to define the specific registry
|
administrator of a baremetal node to define the specific registry
|
||||||
@@ -128,10 +131,10 @@ example.
|
|||||||
{
|
{
|
||||||
"auths": {
|
"auths": {
|
||||||
"quay.io": {
|
"quay.io": {
|
||||||
"auth": "<secret_here>",
|
"auth": "<pull_secret_here>"
|
||||||
},
|
},
|
||||||
"private-registry.tld": {
|
"private-registry.tld": {
|
||||||
"auth": "<secret_here>",
|
"auth": "<pull_secret_here>"
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
@@ -142,6 +145,15 @@ example.
|
|||||||
due Ironic's secret value santiization, which prevents sensitive
|
due Ironic's secret value santiization, which prevents sensitive
|
||||||
values from being visible, and are instead returned as '******'.
|
values from being visible, and are instead returned as '******'.
|
||||||
|
|
||||||
|
.. NOTE::
|
||||||
|
If you need to extract the pull secret from a config.json file,
|
||||||
|
you may want to explore using the ``jq`` command with a syntax
|
||||||
|
along the lines of `jq '.auths."domain.tld".auth' config.json`
|
||||||
|
which will return the quoted string you can then populate. Other
|
||||||
|
command line oriented ways exist for users to retrieve such a value
|
||||||
|
once a login has completed to a container platform, meaning you can
|
||||||
|
use that same token value if desired.
|
||||||
|
|
||||||
Available URL Formats
|
Available URL Formats
|
||||||
---------------------
|
---------------------
|
||||||
|
|
||||||
|
Reference in New Issue
Block a user