-
Notifications
You must be signed in to change notification settings - Fork 174
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Zarf doesn't update zarf-registry secrets #330
Comments
Can you confirm this is true if you add the remove components flag on destroy? We should still fix it either way, but that will help to know. |
When doing |
We are having some strange behavior that may be related to this, I see that this issue was fixed so probably not, I just want to double confirm. So the questions:
|
@YrrepNoj is working on the docs currently, so sorry they suck 😭. But the idea is:
Does that clarify? I plan on doing some more videos on this very soon to explain things better. |
@jeff-mccoy Currently, Context: we are looking at a use case where we "prep" a cluster for zarf packages, and do the deployment(s) as part of a separate workflow. |
😱 no that is not by design. This must have been missed when we moved this into the cluster secret. You do need to run init before trying to do k8s things with deploy in zarf (note if it's just file or scripts you don't need to have a zarf cluster yet, that's how the k3s and eks packages work). The tests missed this because they are running on the same machine, we should blow those away @YrrepNoj during tests to verify functionality. Also we should do this for git secrets too. |
I'll make an issue and look at getting this address by the end of the week. Thanks for pointing this out @vyta! |
@YrrepNoj Just checking in on this.. I have a fix on my fork, happy to create an issue + PR if the work isn't already in flight |
The zarf-registry secret stores the credentials for the docker registry zarf hosts. If you run
zarf destroy --confirm && zarf init --confirm
a new docker registry is created and a new secret is created in thezarf
namespace with valid credentials to to access the registry however any preexistingzarf-registry
secrets in other namespaces are not updated leading to an imagePullBackOff if you try to deploy something else in that namespace.Steps To Reproduce:
The text was updated successfully, but these errors were encountered: