Resolver Type
This resolver responds to typecluster.
Parameters
The kind of resource to fetch.Options:
task, pipeline, stepactionThe name of the resource to fetch.Example:
some-pipeline, some-taskThe namespace containing the resource.Example:
default, other-namespaceOptional cache mode for the resolver.Options:
always, never, autoRequirements
- A cluster running Tekton Pipeline v0.41.0 or later
- Built-in remote resolvers installed
- The
enable-cluster-resolverfeature flag set totruein theresolvers-feature-flagsConfigMap - Beta features enabled
Configuration
The Cluster Resolver uses thecluster-resolver-config ConfigMap in the tekton-pipelines-resolvers namespace.
Configuration Options
default-kind
Default resource kind if not specified (e.g.,
task, pipeline)default-namespace
Default namespace if not specified (e.g.,
default)allowed-namespaces
Comma-separated list of allowed namespaces (empty = all allowed)
blocked-namespaces
Comma-separated list of blocked namespaces (
* = block all except allowed)Namespace Access Control
Control which namespaces the resolver can access:Cache Configuration
The cluster resolver supports caching, but only when explicitly enabled withcache: always:
| Cache Mode | Description |
|---|---|
always | Always cache the resolved resource |
never | Never cache the resolved resource |
auto | Never cache (cluster resources lack immutable references) |
| (not specified) | Never cache (same as auto) |
Global Cache Configuration
Usage Examples
Task Resolution
Task Resolution with Caching
Task Resolution without Caching
Pipeline Resolution
StepAction Resolution
Cross-Namespace Task Reuse
ResolutionRequest Status
TheResolutionRequest.Status.RefSource field captures source metadata:
uri
Namespace-scoped resource URI with UID (format:
<resource-uri>@<uid>)digest
SHA-256 checksum of the resource spec content
Understanding the URI Format
The URI follows Kubernetes resource URI conventions:Understanding the Digest
The digest is a hex-encoded SHA-256 checksum of the resource’s spec field only. This enables supply chain verification tools like Tekton Chains to detect malicious changes, even if metadata (like annotations) is modified.The entrypoint field is empty because path information is already available in the URI field.
Use Cases
Shared Libraries
Create a central namespace with reusable Tasks and Pipelines
Multi-Tenancy
Allow teams to share common resources across namespaces
Platform Teams
Platform teams provide standard tasks to application teams
Testing
Reference test resources from dedicated test namespaces
Best Practices
Access Control
Use
allowed-namespaces to restrict which namespaces can be accessedCache Carefully
Only use
cache: always for truly immutable resourcesNaming Conventions
Use clear naming conventions for shared resources
RBAC
Ensure the resolver ServiceAccount has read access to target namespaces