From c335a2bea32bc63b7816c78400a11f96177c3f1e Mon Sep 17 00:00:00 2001 From: Simon Emms Date: Thu, 7 Nov 2024 14:54:39 +0000 Subject: [PATCH] feat(azure-gitlab): authorise external container registry (#454) --- internal/controller/cluster.go | 6 +++--- 1 file changed, 3 insertions(+), 3 deletions(-) diff --git a/internal/controller/cluster.go b/internal/controller/cluster.go index 34e012c2..3c1387a9 100644 --- a/internal/controller/cluster.go +++ b/internal/controller/cluster.go @@ -434,7 +434,7 @@ func (clctrl *ClusterController) ContainerRegistryAuth() (string, error) { } return containerRegistryAuthToken, nil - case "civo", "digitalocean", "vultr", "k3s": + case "azure", "civo", "digitalocean", "vultr", "k3s": var err error kcfg, err = k8s.CreateKubeConfig(false, clctrl.ProviderConfig.Kubeconfig) if err != nil { @@ -478,7 +478,7 @@ func (clctrl *ClusterController) WaitForClusterReady() error { if err != nil { return fmt.Errorf("failed to create eks config: %w", err) } - case "civo", "digitalocean", "vultr", "k3s": + case "azure", "civo", "digitalocean", "vultr", "k3s": var err error kcfg, err = k8s.CreateKubeConfig(false, clctrl.ProviderConfig.Kubeconfig) if err != nil { @@ -495,7 +495,7 @@ func (clctrl *ClusterController) WaitForClusterReady() error { var dnsDeployment *v1.Deployment var err error switch clctrl.CloudProvider { - case "aws", "civo", "digitalocean", "vultr", "k3s": + case "aws", "azure", "civo", "digitalocean", "vultr", "k3s": dnsDeployment, err = k8s.ReturnDeploymentObject( kcfg.Clientset, "kubernetes.io/name",