Skip to content

Commit df60879

Browse files
author
Kasem Alem
committed
fix(KONFLUX-5917): adding tekton example of using secret
Signed-off-by: Kasem Alem <[email protected]>
1 parent 87185fb commit df60879

File tree

1 file changed

+44
-5
lines changed

1 file changed

+44
-5
lines changed

docs/modules/ROOT/pages/how-tos/configuring/creating-secrets.adoc

Lines changed: 44 additions & 5 deletions
Original file line numberDiff line numberDiff line change
@@ -30,6 +30,13 @@ NOTE: One such task is the link:https://github.com/konflux-ci/build-definitions/
3030
. Optional: Under **Labels**, add a label to tag or provide more context for your secret.
3131
. Click **Add secret**.
3232

33+
=== Notable task input secrets
34+
35+
* xref:/how-tos/configuring/activation-keys-subscription.adoc#adding-activation-keys-to-the-workspace[activation-key]
36+
* xref:/how-tos/configuring/prefetching-dependencies.adoc#creating-the-netrc-secret[netrc]
37+
* xref:/how-tos/testing/build/snyk.adoc[snyk-secret]
38+
* xref:/how-tos/testing/integration/third-parties/testing-farm.adoc[testing-farm-secret]
39+
3340
== Creating registry pull secrets
3441

3542
Some container builds may use parent images from registries that require authentication, for example, `registry.redhat.io`. Until these credentials have been configured, the builds will continue to fail due to the system being unable to pull the required images.
@@ -47,15 +54,47 @@ Some container builds may use parent images from registries that require authent
4754
. Enter the password for the registry in **Password**.
4855
. Click **Add secret**.
4956

57+
== Example of creating a quay.io secret
58+
. Login to Konflux console your workspace (https://console.redhat.com/application-pipeline/workspaces/<your workspace>/applications)
59+
. Click on `Secrets` on the left menu.
60+
. Click on `Add Secret`
61+
. Choose `Image pull secret` for `Secret type`
62+
. Enter `Secret name` , for example `my-quay-secret`
63+
. Choose `Image registry credentials` in `Authentication type` field
64+
. Enter `quay.io` in `Registry server address`
65+
. Enter your Quay.io username in `Username`
66+
. Enter your Quay.io API token in `Password` field.
67+
. Click on `Add secret`
68+
. Email is optional
69+
70+
71+
Here is the YAML representation of the secret (for reference):
72+
73+
[source,yaml]
74+
----
75+
apiVersion: v1
76+
data:
77+
.dockerconfigjson: <base64-encoded-credentials>
78+
kind: Secret
79+
metadata:
80+
name: my-quay-secret
81+
namespace: <your-workspace-tenant>
82+
type: kubernetes.io/dockerconfigjson
83+
----
84+
5085

5186
[NOTE]
5287
====
53-
Performing this operation through the UI will link the secret to the `appstudio-pipeline`
54-
`serviceaccount` automatically. If you instead wanted to add manually the secret to the
55-
namespace (creating the `secret` directly on the tenant
56-
workspace), you'll need to have the secret linked manually.
88+
* **Automatic Secret Linking via UI**
89+
The Konflux UI automatically links image pull secrets to the `appstudio-pipeline` ServiceAccount.
90+
- No pipeline YAML changes are required.
91+
- Tasks like the buildah task will use this secret automatically when pulling images from `quay.io`. (https://github.com/konflux-ci/build-definitions/blob/main/task/buildah-oci-ta/0.3/buildah-oci-ta.yaml in volumes)
92+
93+
* **Manual Secret Creation**
94+
If you create the secret manually (e.g., via `kubectl` or YAML), you must **manually link it** to the `appstudio-pipeline` ServiceAccount in your namespace.
5795
58-
please review the xref:/troubleshooting/index.adoc#check-if-the-secret-is-linked-to-the-service-account[troubleshooting section]) for more info.
96+
* **Troubleshooting**
97+
For issues with secret linking, review the xref:/troubleshooting/index.adoc#check-if-the-secret-is-linked-to-the-service-account[troubleshooting section].
5998
====
6099

61100
== Creating source control secrets

0 commit comments

Comments
 (0)