You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/spec/v1beta2/helmrepositories.md
+28Lines changed: 28 additions & 0 deletions
Original file line number
Diff line number
Diff line change
@@ -459,10 +459,16 @@ a deprecation warning will be logged.
459
459
460
460
### Cert secret reference
461
461
462
+
<<<<<<< HEAD
462
463
**Note:** TLS authentication is not yet supported by OCI Helm repositories.
463
464
464
465
`.spec.certSecretRef.name`is an optional field to specify a secret containing TLS
465
466
certificate data. The secret can contain the following keys:
467
+
=======
468
+
To provide TLS credentials to use while connecting with the Helm repository,
469
+
the referenced Secret is expected to contain `.data.certFile` and
470
+
`.data.keyFile`, and/or `.data.caFile` values.
471
+
>>>>>>> 3df4c49 (refactoring and fix tests)
466
472
467
473
* `certFile` and `keyFile`, to specify the client certificate and private key used for
468
474
TLS client authentication. These must be used in conjunction, i.e. specifying one without
@@ -509,6 +515,28 @@ data:
509
515
caFile: <BASE64>
510
516
```
511
517
518
+
#### Provide TLS credentials in a secret of type kubernetes.io/dockerconfigjson
519
+
520
+
For OCI Helm repositories, Kubernetes secrets of type [kubernetes.io/dockerconfigjson](https://kubernetes.io/docs/concepts/configuration/secret/#secret-types)
521
+
are also supported. It is possible to append TLS credentials to the secret data.
522
+
523
+
For example:
524
+
525
+
```yaml
526
+
apiVersion: v1
527
+
kind: Secret
528
+
metadata:
529
+
name: example-tls
530
+
namespace: default
531
+
type: kubernetes.io/dockerconfigjson
532
+
data:
533
+
.dockerconfigjson: <BASE64>
534
+
certFile: <BASE64>
535
+
keyFile: <BASE64>
536
+
# NOTE: Can be supplied without the above values
537
+
caFile: <BASE64>
538
+
```
539
+
512
540
### Pass credentials
513
541
514
542
`.spec.passCredentials`is an optional field to allow the credentials from the
0 commit comments