Update to grab latest man pages and configuration files, also switch to using some main rather then master branches
This commit is contained in:
parent
abac6aa948
commit
fcf99dc5d1
@ -23,7 +23,20 @@ user to container image registries. The file can have zero to many entries and
|
||||
is created by a `login` command from a container tool such as `podman login`,
|
||||
`buildah login` or `skopeo login`. Each entry includes the name of the registry and then an auth
|
||||
token in the form of a base64 encoded string from the concatenation of the
|
||||
username, a colon, and the password.
|
||||
username, a colon, and the password. The registry name can additionally contain
|
||||
a path or repository name (an image name without tag or digest). The path (or
|
||||
namespace) is matched in its hierarchical order when checking for available
|
||||
authentications. For example, an image pull for
|
||||
`my-registry.local/namespace/user/image:latest` will result in a lookup in
|
||||
`auth.json` in the following order:
|
||||
|
||||
- `my-registry.local/namespace/user/image`
|
||||
- `my-registry.local/namespace/user`
|
||||
- `my-registry.local/namespace`
|
||||
- `my-registry.local`
|
||||
|
||||
This way it is possible to setup multiple credentials for a single registry
|
||||
which can be distinguished by their path.
|
||||
|
||||
The following example shows the values found in auth.json after the user logged in to
|
||||
their accounts on quay.io and docker.io:
|
||||
@ -41,6 +54,25 @@ their accounts on quay.io and docker.io:
|
||||
}
|
||||
```
|
||||
|
||||
This example demonstrates how to use multiple paths for a single registry, while
|
||||
preserving a fallback for `my-registry.local`:
|
||||
|
||||
```
|
||||
{
|
||||
"auths": {
|
||||
"my-registry.local/foo/bar/image": {
|
||||
"auth": "…"
|
||||
},
|
||||
"my-registry.local/foo": {
|
||||
"auth": "…"
|
||||
},
|
||||
"my-registry.local": {
|
||||
"auth": "…"
|
||||
},
|
||||
}
|
||||
}
|
||||
```
|
||||
|
||||
An entry can be removed by using a `logout` command from a container
|
||||
tool such as `podman logout` or `buildah logout`.
|
||||
|
||||
|
@ -3,8 +3,8 @@
|
||||
# These vendored components must have the same version. If it is not the case,
|
||||
# pick the oldest version on c/image, c/common, c/storage vendored in
|
||||
# Buildah/Podman/Skopeo.
|
||||
%global skopeo_branch master
|
||||
%global podman_branch master
|
||||
%global skopeo_branch main
|
||||
%global podman_branch main
|
||||
%global image_branch main
|
||||
%global common_branch main
|
||||
%global storage_branch main
|
||||
@ -15,7 +15,7 @@
|
||||
Epoch: 4
|
||||
Name: containers-common
|
||||
Version: 1
|
||||
Release: 21%{?dist}
|
||||
Release: 22%{?dist}
|
||||
Summary: Common configuration and documentation for containers
|
||||
License: ASL 2.0
|
||||
BuildArch: noarch
|
||||
@ -136,6 +136,9 @@ ln -s %{_sysconfdir}/yum.repos.d/redhat.repo %{buildroot}%{_datadir}/rhel/secret
|
||||
%{_datadir}/rhel/secrets/*
|
||||
|
||||
%changelog
|
||||
* Thu Jul 15 2021 Dan Walsh <dwalsh@fedoraproject.org> - 4:1-22
|
||||
- Update to grab latest man pages and configuration files, also switch to using some main rather then master branches
|
||||
|
||||
* Tue Jun 29 2021 Lokesh Mandvekar <lsm5@fedoraproject.org> - 4:1-21
|
||||
- fetch latest upstream configs
|
||||
|
||||
|
@ -68,7 +68,7 @@ i.e. either specifying a complete name of a tagged image, or prefix denoting
|
||||
a host/namespace/image stream or a wildcarded expression for matching all
|
||||
subdomains. For wildcarded subdomain matching, `*.example.com` is a valid case, but `example*.*.com` is not.
|
||||
|
||||
*Note:* The _hostname_ and _port_ refer to the Docker registry host and port (the one used
|
||||
*Note:* The _hostname_ and _port_ refer to the container registry host and port (the one used
|
||||
e.g. for `docker pull`), _not_ to the OpenShift API host and port.
|
||||
|
||||
### `dir:`
|
||||
|
@ -39,8 +39,8 @@ Given an image name, a single `[[registry]]` TOML table is chosen based on its `
|
||||
The user-specified image name must start with the specified `prefix` (and continue
|
||||
with the appropriate separator) for a particular `[[registry]]` TOML table to be
|
||||
considered; (only) the TOML table with the longest match is used. It can
|
||||
also include wildcarded subdomains in the format `*.example.com` along as mentioned
|
||||
above. The wildcard should only be present at the beginning as shown in the formats
|
||||
also include wildcarded subdomains in the format `*.example.com`.
|
||||
The wildcard should only be present at the beginning as shown in the formats
|
||||
above. Other cases will not work. For example, `*.example.com` is valid but
|
||||
`example.*.com`, `*.example.com/foo` and `*.example.com:5000/foo/bar:baz` are not.
|
||||
|
||||
|
@ -189,6 +189,13 @@ log_driver = "journald"
|
||||
#
|
||||
# pids_limit = 2048
|
||||
|
||||
# Copy the content from the underlying image into the newly created volume
|
||||
# when the container is created instead of when it is started. If false,
|
||||
# the container engine will not copy the content until the container is started.
|
||||
# Setting it to true may have negative performance implications.
|
||||
#
|
||||
# prepare_volume_on_create = false
|
||||
|
||||
# Indicates the networking to be used for rootless containers
|
||||
# rootless_networking = "slirp4netns"
|
||||
|
||||
@ -243,6 +250,12 @@ log_driver = "journald"
|
||||
# The network table contains settings pertaining to the management of
|
||||
# CNI plugins.
|
||||
|
||||
[secrets]
|
||||
# driver = "file"
|
||||
|
||||
[secrets.opts]
|
||||
# root = "/example/directory"
|
||||
|
||||
[network]
|
||||
|
||||
# Path to directory where CNI plugin binaries are located.
|
||||
@ -503,9 +516,3 @@ log_driver = "journald"
|
||||
# TOML does not provide a way to end a table other than a further table being
|
||||
# defined, so every key hereafter will be part of [volume_plugins] and not the
|
||||
# main config.
|
||||
|
||||
[secret]
|
||||
# driver = "file"
|
||||
|
||||
[secret.opts]
|
||||
# root = "/example/directory"
|
||||
|
@ -219,6 +219,10 @@ Options are:
|
||||
Maximum number of processes allowed in a container. 0 indicates that no limit
|
||||
is imposed.
|
||||
|
||||
**prepare_volume_on_create**=false
|
||||
|
||||
Copy the content from the underlying image into the newly created volume when the container is created instead of when it is started. If `false`, the container engine will not copy the content until the container is started. Setting it to `true` may have negative performance implications.
|
||||
|
||||
**rootless_networking**="slirp4netns"
|
||||
|
||||
Set type of networking rootless containers should use. Valid options are `slirp4netns`
|
||||
@ -494,6 +498,11 @@ By default this will be configured relative to where containers/storage store
|
||||
containers. This convention is followed by the default volume driver, but may
|
||||
not be by other drivers.
|
||||
|
||||
**chown_copied_files**=true
|
||||
|
||||
Determines whether file copied into a container will have changed ownership to
|
||||
the primary uid/gid of the container.
|
||||
|
||||
## SERVICE DESTINATION TABLE
|
||||
The `service_destinations` table contains configuration options used to set up remote connections to the podman service for the podman API.
|
||||
|
||||
@ -530,7 +539,7 @@ Currently valid values are:
|
||||
* file
|
||||
* pass
|
||||
|
||||
**opts**={}
|
||||
**[secrets.opts]**
|
||||
|
||||
The driver specific options object.
|
||||
|
||||
|
Loading…
Reference in New Issue
Block a user