feat: support private registries for e2e#112
feat: support private registries for e2e#112GabriFedi97 wants to merge 11 commits intocloudnative-pg:mainfrom
Conversation
f08538e to
2e3a98b
Compare
|
I realized there might be more convenient way to set up private credentials for e2e, which is configuring them directly in the kind nodes as docker config at path |
6505091 to
f2b151a
Compare
|
I confirm the new approach works fine and looks cleaner. Although the |
mbiagetti
left a comment
There was a problem hiding this comment.
LGTM
proposed also an improvement on the docs, see GabriFedi97#3
Support passing credentials for testing values generation in the dagger module. Signed-off-by: Gabriele Fedi <gabriele.fedi@enterprisedb.com>
Support passing extra arguments to Chainsaw test execution. This way the test cmd can be customised by external callers and it can support more complex use-cases Signed-off-by: Gabriele Fedi <gabriele.fedi@enterprisedb.com>
Signed-off-by: Gabriele Fedi <gabriele.fedi@enterprisedb.com>
Signed-off-by: Gabriele Fedi <gabriele.fedi@enterprisedb.com>
Signed-off-by: Gabriele Fedi <gabriele.fedi@enterprisedb.com>
Signed-off-by: Gabriele Fedi <gabriele.fedi@enterprisedb.com>
Signed-off-by: Gabriele Fedi <gabriele.fedi@enterprisedb.com>
Signed-off-by: Matteo <matteo.biagetti@enterprisedb.com>
The cluster.yaml templates referenced a pull_secret value that was never generated, breaking all test runs. Kubelet-level credentials configured during e2e:setup-env are sufficient for private registry access. Also remove misleading --values example from EXTRA_ARGS docs. Signed-off-by: Marco Nenciarini <marco.nenciarini@enterprisedb.com>
Only apply registry authentication when both username and password are non-empty. Prevents sending empty-credentials auth headers to public registries when no credentials are configured. Signed-off-by: Marco Nenciarini <marco.nenciarini@enterprisedb.com>
Signed-off-by: Gabriele Fedi <gabriele.fedi@enterprisedb.com>
Add support for passing extra arguments to the Chainsaw test command exposed by the dagger module. This way, a docker-credentials secret can be created beforehand in a dedicated namespace and the same namespace can be used by Chainsaw by passing the extra args "
--namespace,<namespace>".Add also the options to pass credentials for generating Chainsaw testing values for container images hosted in private registries.
closes: #105