Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Managing images: reference and insecure import policies #3890

Merged
merged 1 commit into from
Mar 13, 2017

Conversation

miminar
Copy link

@miminar miminar commented Mar 8, 2017

Documenting the latest changes to handling image stream tags annotated
with above policies.

@miminar
Copy link
Author

miminar commented Mar 8, 2017

@legionus for technical review.
@mfojtik for the referencePolicy part.

Copy link

@legionus legionus left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

LGTM

@miminar
Copy link
Author

miminar commented Mar 9, 2017

@ahardin-rh could you please take a look?

be mirrored locally by the registry. As a result, they will be available in
shorter time next time they are needed. The flag also allows for pulling from
insecure registries without a need to supply `--insecure-registry` to the
Docker daemon if the image stream has an xref:#insecure-registries[insecure
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You can drop the # within an xref if pointing to a section on the same page

shorter time next time they are needed. The flag also allows for pulling from
insecure registries without a need to supply `--insecure-registry` to the
Docker daemon if the image stream has an xref:#insecure-registries[insecure
annotation] or the tag has an xref:#insecure-tag-importpolicy[insecure import
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Same here. No # needed.

@ahardin-rh
Copy link
Contributor

@miminar Is this targeted for 3.5?

Overall, this looks good. I am going make some general style edits in a follow-up PR. Thanks!

Documenting the latest changes to handling image stream tags annotated
with above policies.

Signed-off-by: Michal Minář <miminar@redhat.com>
@miminar
Copy link
Author

miminar commented Mar 13, 2017

Thanks! Comments addressed.

@ahardin-rh yes, 3.5.

@ahardin-rh
Copy link
Contributor

Thank you!

@ahardin-rh ahardin-rh merged commit d864987 into openshift:master Mar 13, 2017
@ahardin-rh
Copy link
Contributor

[rev_history]
|xref:../dev_guide/managing_images.adoc#dev-guide-managing-images[Managing Images]
|Added new sections about the xref:../dev_guide/managing_images.adoc#insecure-tag-import-policy[Insecure Tag Import Policy] and xref:../dev_guide/managing_images.adoc#reference-policy[Reference Policy].
%

@vikram-redhat vikram-redhat modified the milestones: Future Release, Staging, OCP 3.5 GA Apr 12, 2017
@vikram-redhat vikram-redhat modified the milestones: OCP 3.5 GA, Staging May 2, 2017
@vikram-redhat vikram-redhat modified the milestones: Staging, OCP 3.5 GA May 2, 2017
@miminar miminar deleted the insecure-image-import branch June 27, 2017 10:09
@vikram-redhat vikram-redhat modified the milestones: OCP 3.5 GA, Staging Sep 5, 2017
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

None yet

4 participants