Creating registry pull secrets
Some container builds may use parent images from registries that require authentication, for example, registry.redhat.io. Until these credentials have been configured, the builds will continue to fail due to the system being unable to pull the required images.
-
Obtain the username and password login credentials for the container registry.
-
For access to
registry.redhat.io, you can create a registry service account at https://access.redhat.com/terms-based-registry/accounts.
-
-
In the correct Konflux tenant namespace, go to Secrets.
-
Click Add secret.
-
For Secret type, select Image pull secret.
-
For Authentication type, select Image registry credentials.
-
For Registry server address enter the image registry (for example
registry.redhat.io). -
Enter the username for the registry in Username.
-
Enter the password for the registry in Password.
-
Click Add secret.
Example of creating a quay.io secret
-
Login to Konflux console your tenant namespace
-
Click on
Secretson the left menu. -
Click on
Add Secret -
Choose
Image pull secretforSecret type -
Enter
Secret name, for examplemy-quay-secret -
From
Link secret optionsselect eitherAll existing and future components in the namespaceorSelect components in the namespaceand specify components -
Choose
Image registry credentialsinAuthentication typefield -
Enter
quay.io/repository_full_pathinRegistry server address(specify full repository path, e.g. quay.io/test_organization/test-repository) -
Enter your Quay.io username in
Username -
Enter your Quay.io API token in
Passwordfield. -
Click on
Add secret -
Email is optional
Here is the YAML representation of the secret (for reference):
apiVersion: v1
data:
.dockerconfigjson: <base64-encoded-credentials>
kind: Secret
metadata:
name: my-quay-secret
namespace: <your-tenant>
type: kubernetes.io/dockerconfigjson
|