feat: virtual cluster instances update implementation
feat: space instances update implementation
fix: commands not working when cluster is unavailable
Merge pull request #2494 from lizardruss/main
Local Registry being used with insecure registry
Merge pull request #2495 from lizardruss/commands-no-context
Section commands such as devspace run [command] do not work when the k8s cluster is unavailable
refactor: always use buildkit for local registry
fix: allow os.Args also for command variables
Merge pull request #2499 from FabianKramm/main
refactor: always use buildkit for local registry
docs: note on terminal
container replacement
Merge pull request #2502 from ninjaprox/patch-1
docs: note on terminal
container replacement
feat: add support for InlineManifest blocks in Kubectl deployments. Fixes ENG-652
Signed-off-by: Luca Di Maio luca.dimaio1@gmail.com
Merge pull request #2500 from 89luca89/main
Feature: Add support for InlineManifest blocks in Kubectl deployments
docs: add documentation page for inline manifests. Fix ENG-652
Signed-off-by: Luca Di Maio luca.dimaio1@gmail.com
Create MAINTAINERS.md
Merge pull request #2505 from devspace-sh/FabianKramm-patch-1
Create MAINTAINERS.md
Update README.md
Merge pull request #2506 from devspace-sh/FabianKramm-patch-1
Update README.md
Update README.md
Merge pull request #2507 from devspace-sh/FabianKramm-patch-1
Update README.md
Update README.md
Merge pull request #2508 from devspace-sh/FabianKramm-patch-1
Update README.md
Merge pull request #2503 from 89luca89/main
docs: add documentation page for inline manifests. Fix ENG-652
fix: add pull secret config for images during v5->v6 schema upgrade
fix: ui download URL
test: pull secrets for images during v1beta11 conversion
Merge pull request #2512 from lizardruss/pull-secrets-upgrade
fix: add pull secret config for images during v5->v6 schema upgrade
What issue type does this pull request address? (keep at least one, remove the others) /kind bugfix
What does this pull request do? Which issues does it resolve? Fixes ENG-922
Please provide a short message that should be published in the DevSpace release notes Fixed an issue where DevSpace no longer creates image pull secrets for all images for v1beta11 schemas
docs: add back runtime variables page from 5.x. Fix ENG-878
Signed-off-by: Luca Di Maio luca.dimaio1@gmail.com
Merge pull request #2510 from 89luca89/main
docs: add back runtime variables page from 5.x. Fix ENG-878
What issue type does this pull request address? (keep at least one, remove the others) /kind documentation
Please provide a short message that should be published in the DevSpace release notes Adding back the Runtime Variables page in the docs. It is present DevSpace v5 docs but not in v6 anymore
Fixes ENG-878
test: pull secrets for images during v1beta11 conversion
feat: project update implementation
fix: add pull secret config for images during v5->v6 schema upgrade
What issue type does this pull request address? (keep at least one, remove the others) /kind bugfix
What does this pull request do? Which issues does it resolve? Fixes ENG-922
Please provide a short message that should be published in the DevSpace release notes Fixed an issue where DevSpace no longer creates image pull secrets for all images for v1beta11 schemas
fix: rename repository URLs
Merge pull request #2511 from lizardruss/registry-url-rename
fix: rename repository URLs
What issue type does this pull request address? (keep at least one, remove the others) /kind bugfix
What does this pull request do? Which issues does it resolve? (use resolves #<issue_number>
if possible)
Updates registry URLs
What issue type does this pull request address? (keep at least one, remove the others) /kind bugfix
What does this pull request do? Which issues does it resolve? (use resolves #<issue_number>
if possible)
Updates registry URLs
Hello! Sorry to hear that you're having difficulty. The newer version of DevSpace no longer falls back to Kaniko, and instead uses docker or buildkit for image building and the localRegistry feature to make images available to the cluster. This doesn't help your case, since you'd like to continue using Kaniko.
For Kaniko, DevSpace relies on pulling the registry credentials from the local docker credential store to correctly configure the service accounts for the Kaniko build pods. For GCR they strongly recommend using gcloud credential helper, which configures the docker credential store. Opting out of this means you'll need to provide the username
and password
, according to the cloud providers instructions. I believe for GCP this would involve using an access token, however this is a short lived token, so you may need to continually refresh it.
Regarding your questions about the different configuration options, they become a little more clear when you understand the options for creating a Kubernetes docker registry secret. The email
option corresponds to the --docker-email
flag, and secret
maps to the <name>
of the secret. You probably don't need to set these, since the defaults should be sufficient.
Likewise serviceAccounts string[]
refers to adding the registry pull secret to one or more service accounts. The serviceAccounts
option is only needed if you want to use a different service account. DevSpace will automatically use default
unless you specify otherwise. As for when you would use this and how, that is probably best covered by the kubernetes docs Configure Service Accounts for Pods.
Hopefully this adds some clarity. I'll discuss with my colleagues about what documentation updates we'd like to make.
feat: project create and read implementation
refactor: add nil checks before setting properties during create
test: implement basic create virtual cluster instance test
feat: project and virtual cluster delete implementation
fix: update urls to fix latest version check
Merge pull request #311 from loft-sh/fix-latest-check
fix: update urls to fix latest version check
Fixes the DevSpace repository URL so that latest redirect gives the latest version url.
Fixes the DevSpace repository URL so that latest redirect gives the latest version url.
feat: generate create and read implementations