You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
{{ message }}
This repository was archived by the owner on Nov 5, 2024. It is now read-only.
Copy file name to clipboardExpand all lines: docs/modules/ROOT/pages/how-to-guides/Secure-your-supply-chain/proc_java_dependencies.adoc
+79-6Lines changed: 79 additions & 6 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -26,10 +26,6 @@ The JVM build service addressed this concern by allowing you to rebuild your app
26
26
27
27
.*Procedure*
28
28
29
-
. Configure the secret that is used to authenticate against the image registry. This is a standard `kubernetes.io/dockerconfigjson` secret that holds a `.dockerconfigjson` secret key. The easiest way to create this is to log into the image registry with `docker login`, and then run: `kubectl create secret generic jvm-build-image-secrets --from-file=.dockerconfigjson=$HOME/.docker/config.json --type=kubernetes.io/dockerconfigjson`.
30
-
+
31
-
WARNING: This command includes all your docker logins, therefore, before running it, make sure that the `config.json` only contains information for the relevant repository. A good way to do this is to temporarily move your existing file somewhere else, do a `docker login`, create the secret, then move the old file back.
32
-
33
29
. Create a file, for example, `config.yaml`.
34
30
35
31
. In the `config.yaml` file, create a *JBSConfig* resource with the following data:
<2> The URL of the registry that holds the images of your rebuild dependencies.
57
53
<3> The organization ID.
58
54
<4> The repository to store the images in.
55
+
<5> List any additional Maven repositories here.
59
56
60
57
. Run `kubectl apply -f config.yaml` while logged into the build namespace.
61
58
59
+
Now we have added the configuration we need to setup the Quay.io credentials to be able to push to our repository. The JVM
60
+
Build Service uses the https://github.com/redhat-appstudio/service-provider-integration-operator[Service Provider Integration Operator] to store credentials in AWS Secrets Manager.
61
+
62
+
To upload our secret first we need to run a command to get the name of the `SPIAccessToken` we need to update, to do this
63
+
run the following command:
64
+
65
+
----
66
+
kubectl get spiaccesstokenbindings.appstudio.redhat.com jvm-build-image-secrets -o yaml`
0 commit comments