Skip to content

Commit 1745e71

Browse files
Merge branch 'master' into layer5-certification
2 parents 89587f2 + dcd78b3 commit 1745e71

2 files changed

Lines changed: 10 additions & 10 deletions

File tree

  • .github/workflows
  • content/challenges/11111111-1111-1111-1111-111111111111/configure-argo-cd-image-updater-challenge/content/registries

.github/workflows/slack.yml

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -38,4 +38,4 @@ jobs:
3838
token: ${{ secrets.SLACK_BOT_TOKEN }}
3939
payload: |
4040
channel: C019426UBNY
41-
text: ":new: Good first issue up for grabs: <${{ github.event.issue.title }}|${{ github.event.issue.html_url }}>"
41+
text: ":new: Good first issue up for grabs: <${{ github.event.issue.html_url }}|${{ github.event.issue.title }}>"

content/challenges/11111111-1111-1111-1111-111111111111/configure-argo-cd-image-updater-challenge/content/registries/_index.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
22
id: "registries"
3-
title: 'Registries'
3+
title: "Registries:"
44
description: ""
55
weight: 4
66
---
77

8-
### Configuring the container registries
8+
### Configuring Container Registries
99

10-
Let's configure the container registries that we are using. Argo CD Image Updater supports the majority of container registries (public and private), that implement Docker registry v2 API and has been tested against registries such as Docker Hub, Docker Registry v2 reference implementation (on-premise), Red Had Quay, Jfrog Artifactory, Github Container Registry, GitHub Packages Registry, GitLab Container Registry, and Google Container Registry.
10+
Let's configure the container registries that we are using. Argo CD Image Updater supports most container registries (public and private) that implement Docker registry v2 API and has been tested against registries such as Docker Hub, Docker Registry v2 reference implementation (on-premise), Red Hat Quay, Jfrog Artifactory, GitHub Container Registry, GitHub Packages Registry, GitLab Container Registry, and Google Container Registry.
1111

12-
In the following examples, we will configure two of the most widely used container registries Amazon Elastic Container Registry (ECR) and GitHub Container Registry (GHCR). In our case, we are working with private registries to ensure secure storage and access control for container images.
12+
In the following examples, we will configure two of the most widely used container registries: Amazon Elastic Container Registry (ECR) and GitHub Container Registry (GHCR). In our case, we are working with private registries to ensure secure storage and access control for container images.
1313

14-
### Amazon Elastic Container Registry (ECR) configuration
14+
### Amazon Elastic Container Registry (ECR) Configuration
1515

1616
```yaml
1717
registries:
@@ -28,9 +28,9 @@ For Amazon Elastic Container Registry, authentication is possible through a scri
2828
2929
```yaml
3030
authScripts:
31-
# -- Whether to mount the defined scripts that can be used to authenticate with a registry, the scripts will be mounted at `/scripts`
31+
# -- Whether to mount the defined scripts that can be used to authenticate with a registry. The scripts will be mounted at `/scripts`
3232
enabled: true
33-
# -- Map of key-value pairs where the key consists of the name of the script and the value the contents
33+
# -- Map of key-value pairs where the key consists of the name of the script and the value is its content.
3434
scripts:
3535
login.sh: |
3636
#!/bin/sh
@@ -63,7 +63,7 @@ The script is executed by the pod and is responsible for obtaining the ECR autho
6363
}
6464
```
6565

66-
### Github Container Registry configuration
66+
### Github Container Registry Configuration
6767

6868
```yaml
6969
registries:
@@ -77,7 +77,7 @@ registries:
7777
credentials: secret:argocd/ghcr-secret#token
7878
```
7979
80-
For registry authentication, in the credentials section, we are using a Kubernetes secret. The **#token** part refers to the specific key (usually containing a personal access token or authentication token) inside the secret. The token must have at least **read:packages** permissions. Here is a manifest of the Kubernetes secret which has to be applied in the **argocd** namespace:
80+
For registry authentication, in the credentials section, we are using a Kubernetes secret. The **#token** part refers to the specific key (usually containing a personal access token or authentication token) inside the secret. The token must have at least **read:packages** permission. Here is a manifest of the Kubernetes secret which has to be applied in the **argocd** namespace:
8181
8282
```yaml
8383
apiVersion: v1

0 commit comments

Comments
 (0)