Fixed dkregistry secret
This commit is contained in:
@@ -11,15 +11,13 @@ ingress:
|
|||||||
# className: traefik
|
# className: traefik
|
||||||
annotations:
|
annotations:
|
||||||
cert-manager.io/cluster-issuer: letsencrypt-production
|
cert-manager.io/cluster-issuer: letsencrypt-production
|
||||||
|
## kubernetes.io/ingress.class: traefik
|
||||||
|
# traefik.ingress.kubernetes.io/router.entrypoints: websecure
|
||||||
|
# traefik.ingress.kubernetes.io/router.tls: 'true'
|
||||||
tls:
|
tls:
|
||||||
- secretName: xai-corp-production-tls-registry
|
- secretName: xai-corp-production-tls-registry
|
||||||
hosts:
|
hosts:
|
||||||
- dkregistry.xai-corp.net
|
- dkregistry.xai-corp.net
|
||||||
# annotations:
|
|
||||||
# cert-manager.io/cluster-issuer: letsencrypt-production
|
|
||||||
## kubernetes.io/ingress.class: traefik
|
|
||||||
# traefik.ingress.kubernetes.io/router.entrypoints: websecure
|
|
||||||
# traefik.ingress.kubernetes.io/router.tls: 'true'
|
|
||||||
|
|
||||||
persistence:
|
persistence:
|
||||||
enabled: true
|
enabled: true
|
||||||
|
|||||||
@@ -33,10 +33,10 @@
|
|||||||
kind: Secret
|
kind: Secret
|
||||||
type: Opaque
|
type: Opaque
|
||||||
metadata:
|
metadata:
|
||||||
name: auth-secret
|
name: auth-secret-2025
|
||||||
namespace: "{{apps.dkregistry.namespace}}"
|
namespace: "{{apps.dkregistry.namespace}}"
|
||||||
stringData:
|
stringData:
|
||||||
htpasswd: "richard:$2y$05$Zp.GEiUbsGYYVOYWE71truuERCAE.D5wwGzU3Xi3wIVAWjH60t/U."
|
htpasswd: "richard:$2y$05$E7B3.iHmoLLSyFZJJWEj3u6eMdm2gPGBu1vAn7VPo9Axk3Wbict2m"
|
||||||
become: true
|
become: true
|
||||||
|
|
||||||
- name: create docker-registry resources
|
- name: create docker-registry resources
|
||||||
|
|||||||
@@ -21,13 +21,13 @@ spec:
|
|||||||
- name: auth-secret
|
- name: auth-secret
|
||||||
mountPath: "/auth"
|
mountPath: "/auth"
|
||||||
readOnly: true
|
readOnly: true
|
||||||
# env:
|
env:
|
||||||
# - name: REGISTRY_AUTH
|
- name: REGISTRY_AUTH
|
||||||
# value: "htpasswd"
|
value: "htpasswd"
|
||||||
# - name: REGISTRY_AUTH_HTPASSWD_REALM
|
- name: REGISTRY_AUTH_HTPASSWD_REALM
|
||||||
# value: "Registry Realm"
|
value: "Registry Realm"
|
||||||
# - name: REGISTRY_AUTH_HTPASSWD_PATH
|
- name: REGISTRY_AUTH_HTPASSWD_PATH
|
||||||
# value: "/auth/htpasswd"
|
value: "/auth/htpasswd"
|
||||||
# - name: REGISTRY_HTTP_SECRET
|
# - name: REGISTRY_HTTP_SECRET
|
||||||
# value: "/auth/htpasswd"
|
# value: "/auth/htpasswd"
|
||||||
# - name: REGISTRY_HTTP_TLS_CERTIFICATE
|
# - name: REGISTRY_HTTP_TLS_CERTIFICATE
|
||||||
@@ -44,4 +44,4 @@ spec:
|
|||||||
|
|
||||||
- name: auth-secret
|
- name: auth-secret
|
||||||
secret:
|
secret:
|
||||||
secretName: auth-secret
|
secretName: auth-secret-2025
|
||||||
|
|||||||
@@ -23,3 +23,5 @@ spec:
|
|||||||
|
|
||||||
tls: # < placing a host in the TLS config will determine what ends up in the cert's subjectAltNames
|
tls: # < placing a host in the TLS config will determine what ends up in the cert's subjectAltNames
|
||||||
- secretName: xai-corp-production-tls
|
- secretName: xai-corp-production-tls
|
||||||
|
hosts:
|
||||||
|
- dkregistry.xai-corp.net
|
||||||
|
|||||||
Reference in New Issue
Block a user