@@ -47,6 +47,61 @@ Some container builds may use parent images from registries that require authent
47
47
. Enter the password for the registry in **Password**.
48
48
. Click **Add secret**.
49
49
50
+ == Example of creating a quay.io secret
51
+ . Login to Konflux console your workspace (https://console.redhat.com/application-pipeline/workspaces/<your workspace>/applications)
52
+ . Click on `Secrets` on the left menu.
53
+ . Click on `Add Secret`
54
+ . Choose `Image pull secret` for `Secret type`
55
+ . Enter `Secret name` , for example `my-quay-secret`
56
+ . Choose `Image registry credentials` in `Authentication type` field
57
+ . Enter `quay.io` in `Registry server address`
58
+ . Enter your Quay.io username in `Username`
59
+ . Enter your Quay.io API token in `Password` field.
60
+ . Click on `Add secret`
61
+ . Email is optional
62
+
63
+ Once all is information is valid and adding secret successful you can see it appears in the secrets list,
64
+ Here is the yaml file of the secret looks like:
65
+
66
+
67
+ [source,yaml]
68
+ ----
69
+ apiVersion: v1
70
+ data:
71
+ .dockerconfigjson: <your base64 generated token>
72
+ kind: Secret
73
+ metadata:
74
+ creationTimestamp: "2025-01-28T17:45:04Z"
75
+ name: my-quay-secret
76
+ namespace: <your workspace- tenant>
77
+ resourceVersion: "3088423929"
78
+ uid: 4af266b0-c63a-4aed-b808-a29cbd0cadfe
79
+ type: kubernetes.io/dockerconfigjson
80
+
81
+ ----
82
+
83
+ In below an example how to use the secret within a Tekton task
84
+
85
+ [source, yaml]
86
+ ----
87
+ apiVersion: tekton.dev/v1beta1
88
+ kind: TaskRun
89
+ metadata:
90
+ name: build-container
91
+ spec:
92
+ taskRef:
93
+ name: build-container
94
+ params:
95
+ - name: image
96
+ value: quay.io/my-image:latest
97
+ workspaces:
98
+ - name: source
99
+ subPath: src
100
+ volumes:
101
+ - name: registry-credentials
102
+ secret:
103
+ secretName: my-quay-secret
104
+ ----
50
105
51
106
[NOTE]
52
107
====
0 commit comments