mirror of
https://github.com/fluxcd/flux2.git
synced 2026-02-23 16:11:48 +00:00
Add artifact contents to spec
Signed-off-by: Stefan Prodan <stefan.prodan@gmail.com>
This commit is contained in:
parent
d6113982c7
commit
ae9f3128e8
1 changed files with 15 additions and 0 deletions
|
|
@ -82,6 +82,14 @@ Artifacts pushed to the registry:
|
||||||
- `<registry-url>/<flux-manifests>:<checksum>` (immutable artifact)
|
- `<registry-url>/<flux-manifests>:<checksum>` (immutable artifact)
|
||||||
- `<registry-url>/<flux-manifests>:<tag>` (tag pointing to the immutable artifact)
|
- `<registry-url>/<flux-manifests>:<tag>` (tag pointing to the immutable artifact)
|
||||||
|
|
||||||
|
The OCI artifact has the following content:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
./flux-system/
|
||||||
|
├── gotk_components.yaml
|
||||||
|
└── kustomization.yaml
|
||||||
|
```
|
||||||
|
|
||||||
Objects created by the command in the `flux-system` namespace:
|
Objects created by the command in the `flux-system` namespace:
|
||||||
- `flux-components` Secret
|
- `flux-components` Secret
|
||||||
- `flux-components` OCIRepository
|
- `flux-components` OCIRepository
|
||||||
|
|
@ -110,6 +118,13 @@ Objects created by the command in the `flux-system` namespace:
|
||||||
If the cluster registry is the same as the Flux components registry, the command could reuse the
|
If the cluster registry is the same as the Flux components registry, the command could reuse the
|
||||||
`flux-components` image pull secret.
|
`flux-components` image pull secret.
|
||||||
|
|
||||||
|
If the cluster OCI artifact is not found, the generated one contains the following:
|
||||||
|
|
||||||
|
```shell
|
||||||
|
./clusters/my-cluster/ # taken from --cluster-path
|
||||||
|
└── kustomization.yaml # empty overlay with no resources
|
||||||
|
```
|
||||||
|
|
||||||
### Registry authentication
|
### Registry authentication
|
||||||
|
|
||||||
The `flux bootstrap oci` command supports the following authentication methods:
|
The `flux bootstrap oci` command supports the following authentication methods:
|
||||||
|
|
|
||||||
Loading…
Reference in a new issue