-
Notifications
You must be signed in to change notification settings - Fork 1.8k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
ServiceAccount without ImagePullSecrets should not fail to fetch #585
ServiceAccount without ImagePullSecrets should not fail to fetch #585
Conversation
/assign @pivotal-nader-ziada |
actually @abayer I think if you remove all that code and just have what do you think? |
@pivotal-nader-ziada Nice! Switching now. |
2915bb8
to
b4243ea
Compare
ha, this will also deal with cases of multiple |
if err != nil { | ||
return nil, fmt.Errorf("Failed to create k8schain: %v", err) | ||
} | ||
if serviceAccountName == "" { |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Library does this piece of code as well. Pass the serviceAccountName
(empty or not) to k8schain library
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Whoops, I actually had that thought and then it slipped my mind. Updated.
While `ImagePullSecret`s would still be needed for any private registry, not having any on the specified service account shouldn't cause a failure to even try to fetch the image. Fixes tektoncd#584
b4243ea
to
db60cf7
Compare
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
/lgtm
[APPROVALNOTIFIER] This PR is APPROVED This pull-request has been approved by: abayer, shashwathi The full list of commands accepted by this bot can be found here. The pull request process is described here
Needs approval from an approver in each of these files:
Approvers can indicate their approval by writing |
The following is the coverage report on pkg/.
|
Thanks @abayer and @shashwathi for the quick fix |
@pivotal-nader-ziada Happy to help! I'm glad I started work on switching Jenkins X over as early as I did, or who knows when we would have found this. |
Changes
While
ImagePullSecret
s would still be needed for any privateregistry, not having any on the specified service account shouldn't
cause a failure to even try to fetch the image.
Fixes #584
Submitter Checklist
These are the criteria that every PR should meet, please check them off as you
review them:
Release Notes
n/a