You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: content/challenges/11111111-1111-1111-1111-111111111111/configure-argo-cd-image-updater-challenge/content/registries/_index.md
+9-9Lines changed: 9 additions & 9 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -1,17 +1,17 @@
1
1
---
2
2
id: "registries"
3
-
title: 'Registries'
3
+
title: "Registries:"
4
4
description: ""
5
5
weight: 4
6
6
---
7
7
8
-
### Configuring the container registries
8
+
### Configuring Container Registries
9
9
10
-
Let's configure the container registries that we are using. Argo CD Image Updater supports the majority of container registries (public and private), that implement Docker registry v2 API and has been tested against registries such as Docker Hub, Docker Registry v2 reference implementation (on-premise), Red Had Quay, Jfrog Artifactory, Github Container Registry, GitHub Packages Registry, GitLab Container Registry, and Google Container Registry.
10
+
Let's configure the container registries that we are using. Argo CD Image Updater supports most container registries (public and private) that implement Docker registry v2 API and has been tested against registries such as Docker Hub, Docker Registry v2 reference implementation (on-premise), Red Hat Quay, Jfrog Artifactory, GitHub Container Registry, GitHub Packages Registry, GitLab Container Registry, and Google Container Registry.
11
11
12
-
In the following examples, we will configure two of the most widely used container registries – Amazon Elastic Container Registry (ECR) and GitHub Container Registry (GHCR). In our case, we are working with private registries to ensure secure storage and access control for container images.
12
+
In the following examples, we will configure two of the most widely used container registries: Amazon Elastic Container Registry (ECR) and GitHub Container Registry (GHCR). In our case, we are working with private registries to ensure secure storage and access control for container images.
@@ -28,9 +28,9 @@ For Amazon Elastic Container Registry, authentication is possible through a scri
28
28
29
29
```yaml
30
30
authScripts:
31
-
# -- Whether to mount the defined scripts that can be used to authenticate with a registry, the scripts will be mounted at `/scripts`
31
+
# -- Whether to mount the defined scripts that can be used to authenticate with a registry. The scripts will be mounted at `/scripts`
32
32
enabled: true
33
-
# -- Map of key-value pairs where the key consists of the name of the script and the value the contents
33
+
# -- Map of key-value pairs where the key consists of the name of the script and the value is its content.
34
34
scripts:
35
35
login.sh: |
36
36
#!/bin/sh
@@ -63,7 +63,7 @@ The script is executed by the pod and is responsible for obtaining the ECR autho
63
63
}
64
64
```
65
65
66
-
### Github Container Registry configuration
66
+
### Github Container Registry Configuration
67
67
68
68
```yaml
69
69
registries:
@@ -77,7 +77,7 @@ registries:
77
77
credentials: secret:argocd/ghcr-secret#token
78
78
```
79
79
80
-
For registry authentication, in the credentials section, we are using a Kubernetes secret. The **#token** part refers to the specific key (usually containing a personal access token or authentication token) inside the secret. The token must have at least **read:packages** permissions. Here is a manifest of the Kubernetes secret which has to be applied in the **argocd** namespace:
80
+
For registry authentication, in the credentials section, we are using a Kubernetes secret. The **#token** part refers to the specific key (usually containing a personal access token or authentication token) inside the secret. The token must have at least **read:packages** permission. Here is a manifest of the Kubernetes secret which has to be applied in the **argocd** namespace:
0 commit comments