Skip to content

Commit 3370c30

Browse files
authored
Merge pull request #30805 from ahardin-rh/issue-27612
Issue 27612, updated registry path
2 parents 55c3006 + 33f47d1 commit 3370c30

File tree

2 files changed

+7
-7
lines changed

2 files changed

+7
-7
lines changed

modules/machineconfig-modify-registry.adoc

Lines changed: 4 additions & 4 deletions
Original file line numberDiff line numberDiff line change
@@ -7,7 +7,7 @@
77

88
Settings that define the registries that {product-title} uses to get container images are held in the `/etc/containers/registries.conf` file by default. In that file, you can set registries to not require authentication (insecure), point to mirrored registries, or set which registries are searched for unqualified container image requests.
99

10-
Rather than change `registries.conf` directly, you can drop configuration files into the `/etc/containers/registries.d` directory that are then automatically appended to the system's existing `registries.conf` settings.
10+
Rather than change `registries.conf` directly, you can drop configuration files into the `/etc/containers/registries.conf.d` directory that are then automatically appended to the system's existing `registries.conf` settings.
1111

1212
This procedure describes how to create a `registries.d` file (`/etc/containers/registries.s/99-worker-unqualified-search-registries.conf`) that adds `quay.io` as an unqualified search registry (one that {product-title} can search when it tries to pull an image name that does not include the registry name). It includes base64-encoded content that you can examine as follows:
1313

@@ -25,7 +25,7 @@ See the `containers-registries.conf` man page for the format for the `registries
2525

2626
.Procedure
2727

28-
. Create a YAML file (`myregistry.yaml`) to hold the contents of the `/etc/containers/registries.d/99-worker-unqualified-search-registries.conf` file, including the encoded base64 contents for that file. For example:
28+
. Create a YAML file (`myregistry.yaml`) to hold the contents of the `/etc/containers/registries.conf.d/99-worker-unqualified-search-registries.conf` file, including the encoded base64 contents for that file. For example:
2929
+
3030
[source,terminal]
3131
----
@@ -46,7 +46,7 @@ spec:
4646
source: data:text/plain;charset=utf-8;base64,dW5xdWFsaWZpZWQtc2VhcmNoLXJlZ2lzdHJpZXMgPSBbJ3JlZ2lzdHJ5LmFjY2Vzcy5yZWRoYXQuY29tJywgJ2RvY2tlci5pbycsICdxdWF5LmlvJ10K
4747
filesystem: root
4848
mode: 0420
49-
path: /etc/containers/registries.d/99-worker-unqualified-search-registries.conf
49+
path: /etc/containers/registries.conf.d/99-worker-unqualified-search-registries.conf
5050
EOF
5151
----
5252

@@ -102,7 +102,7 @@ Starting pod/ip-10-0-141-142us-east-2computeinternal-debug ...
102102
[source,terminal]
103103
----
104104
sh-4.2# chroot /host
105-
sh-4.4# cat /etc/containers/registries.d/99-worker-unqualified-search-registries.conf
105+
sh-4.4# cat /etc/containers/registries.conf.d/99-worker-unqualified-search-registries.conf
106106
unqualified-search-registries = ['registry.access.redhat.com', 'docker.io', 'quay.io']
107107
sh-4.4# exit
108108
----

modules/security-deploy-signature.adoc

Lines changed: 3 additions & 3 deletions
Original file line numberDiff line numberDiff line change
@@ -20,7 +20,7 @@ configuration is required.
2020
Signatures that use the `docker` transport type are served by local file or web
2121
server. These signatures are more flexible; you can serve images from any
2222
container image registry and use an independent server to deliver binary
23-
signatures.
23+
signatures.
2424

2525
However, the `docker` transport type requires additional configuration. You must
2626
configure the nodes with the URI of the signature server by placing
@@ -38,9 +38,9 @@ docker:
3838

3939
In this example, the Red Hat Registry, `access.redhat.com`, is the signature
4040
server that provides signatures for the `docker` transport type. Its URI is
41-
defined in the `sigstore` parameter. You might name this file
41+
defined in the `sigstore` parameter. You might name this file
4242
`/etc/containers/registries.d/redhat.com.yaml` and use the Machine Config
4343
Operator to
4444
automatically place the file on each node in your cluster. No service
4545
restart is required since policy and `registries.d` files are dynamically
46-
loaded by the container runtime.
46+
loaded by the container runtime.

0 commit comments

Comments
 (0)