Skip to content

Commit ac28f0b

Browse files
committed
add notes on building oci artifacts as well as using plain http
1 parent e5451a5 commit ac28f0b

File tree

1 file changed

+18
-0
lines changed

1 file changed

+18
-0
lines changed

docs/book/src/03_topics/02_configuration/01_air-gapped-environtment.md

Lines changed: 18 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -80,6 +80,8 @@ Example layout for a `kubeadm` provider may look like:
8080
- `control-plane-components.yaml`
8181
- `bootstrap-components.yaml`
8282

83+
See the [plugin docs](../03_plugin/03_publish_subcommand.md) for more information on how to properly build and publish the OCI artifacts to the air-gapped registry.
84+
8385
To fetch provider components which are stored as an OCI artifact, you can configure `fetchConfig.oci` field to pull them directly from an OCI registry:
8486

8587
```yaml
@@ -96,6 +98,22 @@ spec:
9698
oci: "my-oci-registry.example.com/my-provider:v1.9.3"
9799
```
98100

101+
You can likewise configure `fetchConfig.oci` to use plain http rather than https if so desired. This should only be used for development purposes as it can be insecure:
102+
103+
```yaml
104+
apiVersion: operator.cluster.x-k8s.io/v1alpha2
105+
kind: InfrastructureProvider
106+
metadata:
107+
name: azure
108+
namespace: capz-system
109+
spec:
110+
version: v1.9.3
111+
configSecret:
112+
name: azure-variables
113+
fetchConfig:
114+
oci: "http://my-oci-registry.example.com/my-provider:v1.9.3"
115+
```
116+
99117
## OCI Authentication
100118

101119
To securely authenticate with an OCI registry, environment variables are used for user credentials. The following environment variables are involved:

0 commit comments

Comments
 (0)