@@ -64,10 +64,12 @@ which is the default.
64
64
65
65
Specify one of the following types to trigger minimal server-side validation to ensure the presence of specific key names in the secret data:
66
66
67
- * `kubernetes.io/service-account-token`. Uses a service account token.
68
- * `kubernetes.io/basic-auth`. Use with Basic Authentication.
69
- * `kubernetes.io/ssh-auth`. Use with SSH Key Authentication.
70
- * `kubernetes.io/tls`. Use with TLS certificate authorities.
67
+ * `kubernetes.io/basic-auth`: Use with Basic authentication
68
+ * `kubernetes.io/dockercfg`: Use as an image pull secret
69
+ * `kubernetes.io/dockerconfigjson`: Use as an image pull secret
70
+ * `kubernetes.io/service-account-token`: Use to obtain a legacy service account API token
71
+ * `kubernetes.io/ssh-auth`: Use with SSH key authentication
72
+ * `kubernetes.io/tls`: Use with TLS certificate authorities
71
73
72
74
Specify `type: Opaque` if you do not want validation, which means the secret does not claim to conform to any convention for key names or values.
73
75
An _opaque_ secret, allows for unstructured `key:value` pairs that can contain arbitrary values.
@@ -78,7 +80,7 @@ You can specify other arbitrary types, such as `example.com/my-secret-type`. The
78
80
but indicate that the creator of the secret intended to conform to the key/value requirements of that type.
79
81
====
80
82
81
- For examples of different secret types, see the code samples in _Using Secrets_ .
83
+ For examples of creating different types of secrets , see _Understanding how to create secrets_ .
82
84
83
85
[id="nodes-pods-secrets-about-keys_{context}"]
84
86
== Secret data keys
0 commit comments