Skip to content

Commit 162ce35

Browse files
Merge pull request #274606 from tejaswikolli-web/importimage
Import image cross tenant
2 parents 1e5fa89 + d39f2cd commit 162ce35

File tree

1 file changed

+5
-6
lines changed

1 file changed

+5
-6
lines changed

articles/container-registry/container-registry-import-images.md

Lines changed: 5 additions & 6 deletions
Original file line numberDiff line numberDiff line change
@@ -27,7 +27,7 @@ Image import into an Azure container registry has the following benefits over us
2727

2828
* If you import multi-architecture images (such as official Docker images), images for all architectures and platforms specified in the manifest list get copied.
2929

30-
* If you access to the target registry, it doesn't have to use the registry's public endpoint.
30+
* If you have access to the target registry, you don't require the registry's public endpoint.
3131

3232
> [!IMPORTANT]
3333
>* Importing images requires the external registry support [RFC 7233](https://www.rfc-editor.org/rfc/rfc7233#section-2.3). We recommend using a registry that supports RFC 7233 ranges while using az acr import command with the registry URI to avoid failures.
@@ -165,7 +165,7 @@ You can import an image from an Azure container registry in the same AD tenant u
165165

166166
* The registry can be in the same or a different Azure subscription in the same Active Directory tenant.
167167

168-
* [Public access](container-registry-access-selected-networks.md#disable-public-network-access) to the source registry may be disabled. If public access is disabled, specify the source registry by resource ID instead of by registry login server name.
168+
* [Public access](container-registry-access-selected-networks.md#disable-public-network-access) to the source registry is disabled. If public access is disabled, specify the source registry by resource ID instead of by registry login server name.
169169

170170
* The source registry and/or the target registry with a private endpoint or registry firewall rules must ensure the restricted registry [allows trusted services](allow-access-trusted-services.md) to access the network.
171171

@@ -300,6 +300,8 @@ Import-AzContainerRegistryImage -RegistryName myregistry -ResourceGroupName myRe
300300

301301
### Cross-tenant import with access token
302302

303+
* Cross-tenant import over public access disabled registry is not supported.
304+
303305
To access the source registry using an identity in the source tenant that has registry permissions, you can get an access token:
304306

305307
### [Azure CLI](#tab/azure-cli)
@@ -340,10 +342,6 @@ Import-AzContainerRegistryImage -RegistryName myregistry -ResourceGroupName myRe
340342

341343
---
342344

343-
> [!NOTE]
344-
> Cross-tenant doesn't work across the clouds. Cross-tenant import over private endpoints is also not supported.
345-
346-
347345
## Import from a non-Azure private container registry
348346

349347
Import an image from a non-Azure private registry by specifying credentials that enable pull access to the registry. For example, pull an image from a private Docker registry:
@@ -367,6 +365,7 @@ Import-AzContainerRegistryImage -RegistryName myregistry -ResourceGroupName myRe
367365
> If you're importing from a non-Azure private registry with IP rules, [follow these steps.](container-registry-access-selected-networks.md)
368366
369367
### Troubleshoot Import Container Images
368+
370369
#### Symptoms and Causes
371370
- `The remote server may not be RFC 7233 compliant`
372371
- The [distribution-spec](https://github.com/opencontainers/distribution-spec/blob/main/spec.md) allows range header form of `Range: bytes=<start>-<end>`. However, the remote server may not be RFC 7233 compliant.

0 commit comments

Comments
 (0)