You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Error: INSTALLATION FAILED: failed to download "oci://ghcr.io/spinframework/charts/spin-operator" at version "0.6.1"
26
26
```
27
27
28
28
To fix, either re-authenticate with the registry with a valid token (e.g. `docker login ghcr.io`) or log out of the registry and pull the chart anonymously (e.g. `docker logout ghcr.io`).
29
29
30
30
## No endpoints available for service "spin-operator-webhook-service"
31
31
32
32
When following the quickstart guide the following error can occur when running the `kubectl apply -f
Error from server (InternalError): error when creating "https://github.com/spinframework/spin-operator/releases/download/v0.6.0/spin-operator.shim-executor.yaml": Internal error occurred: failed calling webhook "mspinappexecutor.kb.io": failed to call webhook: Post "https://spin-operator-webhook-service.spin-operator.svc:443/mutate-core-spinkube-dev-v1alpha1-spinappexecutor?timeout=10s": no endpoints available for service "spin-operator-webhook-service"
37
+
Error from server (InternalError): error when creating "https://github.com/spinframework/spin-operator/releases/download/v0.6.1/spin-operator.shim-executor.yaml": Internal error occurred: failed calling webhook "mspinappexecutor.kb.io": failed to call webhook: Post "https://spin-operator-webhook-service.spin-operator.svc:443/mutate-core-spinkube-dev-v1alpha1-spinappexecutor?timeout=10s": no endpoints available for service "spin-operator-webhook-service"
38
38
```
39
39
40
40
To address the error above, first look to see if Spin Operator is running:
@@ -80,13 +80,13 @@ To resolve this issue, please try to install the Spin Operator again. Except thi
80
80
helm upgrade --install spin-operator \
81
81
--namespace spin-operator \
82
82
--create-namespace \
83
-
--version 0.6.0 \
83
+
--version 0.6.1 \
84
84
--wait \
85
85
oci://ghcr.io/spinframework/charts/spin-operator
86
86
```
87
87
88
88
Once the Spin Operator is installed you can try and run the `kubectl apply -f
Copy file name to clipboardExpand all lines: content/en/docs/reference/spin-app.md
+2-2Lines changed: 2 additions & 2 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1835,7 +1835,7 @@ A failure to resolve or pull the image during pod startup will block containers
1835
1835
The types of objects that may be mounted by this volume are defined by the container runtime implementation on a host machine and at minimum must include all valid types supported by the container image field.
1836
1836
The OCI object gets mounted in a single directory (spec.containers[*].volumeMounts.mountPath) by merging the manifest layers in the same way as for container images.
1837
1837
The volume will be mounted read-only (ro) and non-executable files (noexec).
1838
-
Sub path mounts for containers are not supported (spec.containers[*].volumeMounts.subpath).
1838
+
Sub path mounts for containers are not supported (spec.containers[*].volumeMounts.subpath) before 1.33.
1839
1839
The field spec.securityContext.fsGroupChangePolicy has no effect on this volume type.<br/>
1840
1840
</td>
1841
1841
<td>false</td>
@@ -3646,7 +3646,7 @@ A failure to resolve or pull the image during pod startup will block containers
3646
3646
The types of objects that may be mounted by this volume are defined by the container runtime implementation on a host machine and at minimum must include all valid types supported by the container image field.
3647
3647
The OCI object gets mounted in a single directory (spec.containers[*].volumeMounts.mountPath) by merging the manifest layers in the same way as for container images.
3648
3648
The volume will be mounted read-only (ro) and non-executable files (noexec).
3649
-
Sub path mounts for containers are not supported (spec.containers[*].volumeMounts.subpath).
3649
+
Sub path mounts for containers are not supported (spec.containers[*].volumeMounts.subpath) before 1.33.
3650
3650
The field spec.securityContext.fsGroupChangePolicy has no effect on this volume type.
0 commit comments