Skip to content

Commit 566178d

Browse files
authored
docs: refine content for container registries configuration
This update improves clarity, consistency, and readability in the "Registries" documentation: - Standardized capitalization in titles and headings. - Replaced verbose phrasing with simpler alternatives ("the majority of" → "most"). - Corrected vendor and brand casing (e.g., Red Hat, GitHub). - Polished YAML comments for accuracy and conciseness. - Fixed grammatical issues such as "permissions" → "permission" when referring to a single scope. - Improved overall readability to align with Layer5 documentation style. These refinements ensure a more professional and user-friendly guide for configuring container registries. Signed-off-by: Ahmed Samaila <ahmaduahmadu234@gmail.com>
1 parent 8b5e967 commit 566178d

1 file changed

Lines changed: 9 additions & 9 deletions

File tree

  • content/challenges/11111111-1111-1111-1111-111111111111/configure-argo-cd-image-updater-challenge/content/registries

content/challenges/11111111-1111-1111-1111-111111111111/configure-argo-cd-image-updater-challenge/content/registries/_index.md

Lines changed: 9 additions & 9 deletions
Original file line numberDiff line numberDiff line change
@@ -1,17 +1,17 @@
11
---
22
id: "registries"
3-
title: 'Registries'
3+
title: "Registries:"
44
description: ""
55
weight: 4
66
---
77

8-
### Configuring the container registries
8+
### Configuring Container Registries
99

10-
Let's configure the container registries that we are using. Argo CD Image Updater supports the majority of container registries (public and private), that implement Docker registry v2 API and has been tested against registries such as Docker Hub, Docker Registry v2 reference implementation (on-premise), Red Had Quay, Jfrog Artifactory, Github Container Registry, GitHub Packages Registry, GitLab Container Registry, and Google Container Registry.
10+
Let's configure the container registries that we are using. Argo CD Image Updater supports most container registries (public and private) that implement Docker registry v2 API and has been tested against registries such as Docker Hub, Docker Registry v2 reference implementation (on-premise), Red Hat Quay, Jfrog Artifactory, GitHub Container Registry, GitHub Packages Registry, GitLab Container Registry, and Google Container Registry.
1111

12-
In the following examples, we will configure two of the most widely used container registries Amazon Elastic Container Registry (ECR) and GitHub Container Registry (GHCR). In our case, we are working with private registries to ensure secure storage and access control for container images.
12+
In the following examples, we will configure two of the most widely used container registries: Amazon Elastic Container Registry (ECR) and GitHub Container Registry (GHCR). In our case, we are working with private registries to ensure secure storage and access control for container images.
1313

14-
### Amazon Elastic Container Registry (ECR) configuration
14+
### Amazon Elastic Container Registry (ECR) Configuration
1515

1616
```yaml
1717
registries:
@@ -28,9 +28,9 @@ For Amazon Elastic Container Registry, authentication is possible through a scri
2828
2929
```yaml
3030
authScripts:
31-
# -- Whether to mount the defined scripts that can be used to authenticate with a registry, the scripts will be mounted at `/scripts`
31+
# -- Whether to mount the defined scripts that can be used to authenticate with a registry. The scripts will be mounted at `/scripts`
3232
enabled: true
33-
# -- Map of key-value pairs where the key consists of the name of the script and the value the contents
33+
# -- Map of key-value pairs where the key consists of the name of the script and the value is its content.
3434
scripts:
3535
login.sh: |
3636
#!/bin/sh
@@ -63,7 +63,7 @@ The script is executed by the pod and is responsible for obtaining the ECR autho
6363
}
6464
```
6565

66-
### Github Container Registry configuration
66+
### Github Container Registry Configuration
6767

6868
```yaml
6969
registries:
@@ -77,7 +77,7 @@ registries:
7777
credentials: secret:argocd/ghcr-secret#token
7878
```
7979
80-
For registry authentication, in the credentials section, we are using a Kubernetes secret. The **#token** part refers to the specific key (usually containing a personal access token or authentication token) inside the secret. The token must have at least **read:packages** permissions. Here is a manifest of the Kubernetes secret which has to be applied in the **argocd** namespace:
80+
For registry authentication, in the credentials section, we are using a Kubernetes secret. The **#token** part refers to the specific key (usually containing a personal access token or authentication token) inside the secret. The token must have at least **read:packages** permission. Here is a manifest of the Kubernetes secret which has to be applied in the **argocd** namespace:
8181
8282
```yaml
8383
apiVersion: v1

0 commit comments

Comments
 (0)