Matthias Baur
Matthias Baur
So best way I could find is this: # List registry repositories Within a project -> https://docs.gitlab.com/ee/api/container_registry.html#within-a-project ```bash $ curl -s --header "PRIVATE-TOKEN: $GITLAB_API_PRIVATE_TOKEN" "https://gitlab.example.de/api/v4/projects/mygroup%2Fterratest/registry/repositories" | jq '.' [ {...
> BTW if you configure username+password in a host rule in Renovate, it will be treated as Basic authentication Interesting, thanks! 🤔 Wasn't aware that Docker registry uses basic auth...
On Premise Helm Chart configuration needed: ```yaml extraEnvVars: - name: RENOVATE_DETECT_HOST_RULES_FROM_ENV value: 'true' - name: DOCKER_REGISTRY_EXAMPLE_DE_USERNAME value: renovate-bot - name: DOCKER_REGISTRY_EXAMPLE_DE_PASSWORD valueFrom: secretKeyRef: key: mendRnvGitlabPat name: mend-renovate-ce ```
This has been implemented for _Github_ with: * https://github.com/renovatebot/renovate/issues/17705 * https://github.com/renovatebot/renovate/pull/25214
Having the same problem. cadvisor is deployed like this: ```yaml cadvisor: image: gcr.io/cadvisor/cadvisor:v0.49.1 container_name: cadvisor restart: unless-stopped privileged: true pid: host networks: - backend volumes: - /:/rootfs:ro - /var/run:/var/run:ro -...
I'm interested in this as well! @luka6000 and @adonno seem to be the authors of those code. Could you please add some documentation for it? Thanks a lot!
We also depend on variables in the destroy provisioner command to revoke the Puppet certificate of a instance. ```terraform provisioner "local-exec" { when = destroy command = "${path.module}/scripts/puppet_cert_clean.sh ${local.instance_prefix}.${var.instance_name}${format("%02d", count.index...
Wow, thank you @sdesousa86! :) I just didn't see it but it was so obvious to just use `self.name` for my example above.
That's correct, yes. Sorry for being inaccurate about this!
@nikParasyr Thanks for the review! :) I've fix the indention. About https://github.com/terraform-provider-openstack/terraform-provider-openstack/issues/1456, that's correctly implemented for `openstack_networking_secgroup_v2` - it will just deletes the full security group, leaving the rules to...