Skip to content

Commit 62c862b

Browse files
authored
Merge pull request #41760 from Vilsol/patch-1
A secret type must be used for pull secret to work
2 parents 6b38d98 + d3fc857 commit 62c862b

File tree

1 file changed

+6
-4
lines changed
  • content/en/docs/concepts/configuration

1 file changed

+6
-4
lines changed

content/en/docs/concepts/configuration/secret.md

Lines changed: 6 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -277,8 +277,8 @@ for information on referencing service account credentials from within Pods.
277277

278278
### Docker config Secrets
279279

280-
You can use one of the following `type` values to create a Secret to
281-
store the credentials for accessing a container image registry:
280+
If you are creating a Secret to store credentials for accessing a container image registry,
281+
you must use one of the following `type` values for that Secret:
282282

283283
- `kubernetes.io/dockercfg`
284284
- `kubernetes.io/dockerconfigjson`
@@ -354,10 +354,12 @@ Docker configuration file):
354354
}
355355
```
356356

357-
{{< note >}}
357+
{{< caution >}}
358358
The `auth` value there is base64 encoded; it is obscured but not secret.
359359
Anyone who can read that Secret can learn the registry access bearer token.
360-
{{< /note >}}
360+
361+
It is suggested to use [credential providers](/docs/tasks/administer-cluster/kubelet-credential-provider/) to dynamically and securely provide pull secrets on-demand.
362+
{{< /caution >}}
361363

362364
### Basic authentication Secret
363365

0 commit comments

Comments
 (0)