|
|
|
|
@@ -8,7 +8,7 @@ toc::[]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Description::
|
|
|
|
|
Image governs policies related to imagestream imports and runtime configuration for external registries. It allows cluster admins to configure which registries OpenShift is allowed to import images from, extra CA trust bundles for external registries, and policies to block or allow registry hostnames. When exposing OpenShift's image registry to the public, this also lets cluster admins specify the external hostname.
|
|
|
|
|
Image governs policies related to image stream imports and runtime configuration for external registries. It allows cluster admins to configure which registries OpenShift is allowed to import images from, extra CA trust bundles for external registries, and policies to block or allow registry hostnames. When exposing the OpenShift image registry to the public, this also lets cluster admins specify the external hostname.
|
|
|
|
|
|
|
|
|
|
Type::
|
|
|
|
|
`object`
|
|
|
|
|
@@ -25,11 +25,11 @@ Required::
|
|
|
|
|
|
|
|
|
|
| `.apiVersion`
|
|
|
|
|
| `string`
|
|
|
|
|
| APIVersion defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
|
|
|
|
|
| `apiVersion` defines the versioned schema of this representation of an object. Servers should convert recognized schemas to the latest internal value, and may reject unrecognized values. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#resources
|
|
|
|
|
|
|
|
|
|
| `.kind`
|
|
|
|
|
| `string`
|
|
|
|
|
| Kind is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
|
|
|
| `kind` is a string value representing the REST resource this object represents. Servers may infer this from the endpoint the client submits requests to. Cannot be updated. In CamelCase. More info: https://git.k8s.io/community/contributors/devel/sig-architecture/api-conventions.md#types-kinds
|
|
|
|
|
|
|
|
|
|
| `.metadata`
|
|
|
|
|
| xref:../objects/index.adoc#objectmeta-meta-v1[`ObjectMeta meta/v1`]
|
|
|
|
|
@@ -37,16 +37,16 @@ Required::
|
|
|
|
|
|
|
|
|
|
| `.spec`
|
|
|
|
|
| `object`
|
|
|
|
|
| spec holds user settable values for configuration
|
|
|
|
|
| `spec` holds user settable values for configuration
|
|
|
|
|
|
|
|
|
|
| `.status`
|
|
|
|
|
| `object`
|
|
|
|
|
| status holds observed values from the cluster. They may not be overridden.
|
|
|
|
|
| `status` holds observed values from the cluster. They may not be overridden.
|
|
|
|
|
|
|
|
|
|
|===
|
|
|
|
|
..spec
|
|
|
|
|
Description::
|
|
|
|
|
spec holds user settable values for configuration
|
|
|
|
|
`spec` holds user settable values for configuration
|
|
|
|
|
|
|
|
|
|
Type::
|
|
|
|
|
`object`
|
|
|
|
|
@@ -60,28 +60,28 @@ Type::
|
|
|
|
|
|
|
|
|
|
| `additionalTrustedCA`
|
|
|
|
|
| `object`
|
|
|
|
|
| additionalTrustedCA is a reference to a ConfigMap containing additional CAs that should be trusted during imagestream import, pod image pull, build image pull, and imageregistry pullthrough. The namespace for this config map is openshift-config.
|
|
|
|
|
| `additionalTrustedCA` is a reference to a `ConfigMap` object containing additional CAs that should be trusted during image stream import, pod image pull, build image pull, and imageregistry pullthrough. The namespace for this config map is `openshift-config`.
|
|
|
|
|
|
|
|
|
|
| `allowedRegistriesForImport`
|
|
|
|
|
| `array`
|
|
|
|
|
| allowedRegistriesForImport limits the container image registries that normal users may import images from. Set this list to the registries that you trust to contain valid Docker images and that you want applications to be able to import from. Users with permission to create Images or ImageStreamMappings via the API are not affected by this policy - typically only administrators or system integrations will have those permissions.
|
|
|
|
|
| `allowedRegistriesForImport` limits the container image registries that normal users may import images from. Set this list to the registries that you trust to contain valid Docker images and that you want applications to be able to import from. Users with permission to create images or image stream mappings via the API are not affected by this policy - typically only administrators or system integrations will have those permissions.
|
|
|
|
|
|
|
|
|
|
| `allowedRegistriesForImport[]`
|
|
|
|
|
| `object`
|
|
|
|
|
| RegistryLocation contains a location of the registry specified by the registry domain name. The domain name might include wildcards, like '*' or '??'.
|
|
|
|
|
| `RegistryLocation` contains a location of the registry specified by the registry domain name. The domain name might include wildcards, like '*' or '??'.
|
|
|
|
|
|
|
|
|
|
| `externalRegistryHostnames`
|
|
|
|
|
| `array (string)`
|
|
|
|
|
| externalRegistryHostnames provides the hostnames for the default external image registry. The external hostname should be set only when the image registry is exposed externally. The first value is used in 'publicDockerImageRepository' field in ImageStreams. The value must be in "hostname[:port]" format.
|
|
|
|
|
| `externalRegistryHostnames` provides the hostnames for the default external image registry. The external hostname should be set only when the image registry is exposed externally. The first value is used in 'publicDockerImageRepository' field in image streams. The value must be in "hostname[:port]" format.
|
|
|
|
|
|
|
|
|
|
| `registrySources`
|
|
|
|
|
| `object`
|
|
|
|
|
| registrySources contains configuration that determines how the container runtime should treat individual registries when accessing images for builds+pods. (e.g. whether or not to allow insecure access). It does not contain configuration for the internal cluster registry.
|
|
|
|
|
| `registrySources` contains configuration that determines how the container runtime should treat individual registries when accessing images for builds and pods. (e.g. whether or not to allow insecure access). It does not contain configuration for the internal cluster registry.
|
|
|
|
|
|
|
|
|
|
|===
|
|
|
|
|
..spec.additionalTrustedCA
|
|
|
|
|
Description::
|
|
|
|
|
additionalTrustedCA is a reference to a ConfigMap containing additional CAs that should be trusted during imagestream import, pod image pull, build image pull, and imageregistry pullthrough. The namespace for this config map is openshift-config.
|
|
|
|
|
`additionalTrustedCA` is a reference to a `ConfigMap` object containing additional CAs that should be trusted during image stream import, pod image pull, build image pull, and imageregistry pullthrough. The namespace for this config map is `openshift-config`.
|
|
|
|
|
|
|
|
|
|
Type::
|
|
|
|
|
`object`
|
|
|
|
|
@@ -97,12 +97,12 @@ Required::
|
|
|
|
|
|
|
|
|
|
| `name`
|
|
|
|
|
| `string`
|
|
|
|
|
| name is the metadata.name of the referenced config map
|
|
|
|
|
| `name` is the `metadata.name` of the referenced config map
|
|
|
|
|
|
|
|
|
|
|===
|
|
|
|
|
..spec.allowedRegistriesForImport
|
|
|
|
|
Description::
|
|
|
|
|
allowedRegistriesForImport limits the container image registries that normal users may import images from. Set this list to the registries that you trust to contain valid Docker images and that you want applications to be able to import from. Users with permission to create Images or ImageStreamMappings via the API are not affected by this policy - typically only administrators or system integrations will have those permissions.
|
|
|
|
|
`allowedRegistriesForImport` limits the container image registries that normal users may import images from. Set this list to the registries that you trust to contain valid Docker images and that you want applications to be able to import from. Users with permission to create images or image stream mappings via the API are not affected by this policy - typically only administrators or system integrations will have those permissions.
|
|
|
|
|
|
|
|
|
|
Type::
|
|
|
|
|
`array`
|
|
|
|
|
@@ -112,7 +112,7 @@ Type::
|
|
|
|
|
|
|
|
|
|
..spec.allowedRegistriesForImport[]
|
|
|
|
|
Description::
|
|
|
|
|
RegistryLocation contains a location of the registry specified by the registry domain name. The domain name might include wildcards, like '*' or '??'.
|
|
|
|
|
`RegistryLocation` contains a location of the registry specified by the registry domain name. The domain name might include wildcards, like `*` or `?`.
|
|
|
|
|
|
|
|
|
|
Type::
|
|
|
|
|
`object`
|
|
|
|
|
@@ -126,16 +126,16 @@ Type::
|
|
|
|
|
|
|
|
|
|
| `domainName`
|
|
|
|
|
| `string`
|
|
|
|
|
| domainName specifies a domain name for the registry In case the registry use non-standard (80 or 443) port, the port should be included in the domain name as well.
|
|
|
|
|
| `domainName` specifies a domain name for the registry In case the registry use non-standard (80 or 443) port, the port should be included in the domain name as well.
|
|
|
|
|
|
|
|
|
|
| `insecure`
|
|
|
|
|
| `boolean`
|
|
|
|
|
| insecure indicates whether the registry is secure (https) or insecure (http) By default (if not specified) the registry is assumed as secure.
|
|
|
|
|
| `insecure` indicates whether the registry is secure (https) or insecure (http) By default (if not specified) the registry is assumed as secure.
|
|
|
|
|
|
|
|
|
|
|===
|
|
|
|
|
..spec.registrySources
|
|
|
|
|
Description::
|
|
|
|
|
registrySources contains configuration that determines how the container runtime should treat individual registries when accessing images for builds+pods. (e.g. whether or not to allow insecure access). It does not contain configuration for the internal cluster registry.
|
|
|
|
|
`registrySources` contains configuration that determines how the container runtime should treat individual registries when accessing images for builds and pods. (e.g. whether or not to allow insecure access). It does not contain configuration for the internal cluster registry.
|
|
|
|
|
|
|
|
|
|
Type::
|
|
|
|
|
`object`
|
|
|
|
|
@@ -149,22 +149,22 @@ Type::
|
|
|
|
|
|
|
|
|
|
| `allowedRegistries`
|
|
|
|
|
| `array (string)`
|
|
|
|
|
| allowedRegistries are the only registries permitted for image pull and push actions. All other registries are denied.
|
|
|
|
|
| `allowedRegistries` are the only registries permitted for image pull and push actions. All other registries are denied.
|
|
|
|
|
Only one of BlockedRegistries or AllowedRegistries may be set.
|
|
|
|
|
|
|
|
|
|
| `blockedRegistries`
|
|
|
|
|
| `array (string)`
|
|
|
|
|
| blockedRegistries cannot be used for image pull and push actions. All other registries are permitted.
|
|
|
|
|
| `blockedRegistries` cannot be used for image pull and push actions. All other registries are permitted.
|
|
|
|
|
Only one of BlockedRegistries or AllowedRegistries may be set.
|
|
|
|
|
|
|
|
|
|
| `insecureRegistries`
|
|
|
|
|
| `array (string)`
|
|
|
|
|
| insecureRegistries are registries which do not have a valid TLS certificates or only support HTTP connections.
|
|
|
|
|
| `insecureRegistries` are registries which do not have a valid TLS certificates or only support HTTP connections.
|
|
|
|
|
|
|
|
|
|
|===
|
|
|
|
|
..status
|
|
|
|
|
Description::
|
|
|
|
|
status holds observed values from the cluster. They may not be overridden.
|
|
|
|
|
`status` holds observed values from the cluster. They may not be overridden.
|
|
|
|
|
|
|
|
|
|
Type::
|
|
|
|
|
`object`
|
|
|
|
|
@@ -178,11 +178,11 @@ Type::
|
|
|
|
|
|
|
|
|
|
| `externalRegistryHostnames`
|
|
|
|
|
| `array (string)`
|
|
|
|
|
| externalRegistryHostnames provides the hostnames for the default external image registry. The external hostname should be set only when the image registry is exposed externally. The first value is used in 'publicDockerImageRepository' field in ImageStreams. The value must be in "hostname[:port]" format.
|
|
|
|
|
| `externalRegistryHostnames` provides the hostnames for the default external image registry. The external hostname should be set only when the image registry is exposed externally. The first value is used in `publicDockerImageRepository` field in image streams. The value must be in `hostname[:port]` format.
|
|
|
|
|
|
|
|
|
|
| `internalRegistryHostname`
|
|
|
|
|
| `string`
|
|
|
|
|
| internalRegistryHostname sets the hostname for the default internal image registry. The value must be in "hostname[:port]" format. This value is set by the image registry operator which controls the internal registry hostname. For backward compatibility, users can still use OPENSHIFT_DEFAULT_REGISTRY environment variable but this setting overrides the environment variable.
|
|
|
|
|
| `internalRegistryHostname` sets the hostname for the default internal image registry. The value must be in `hostname[:port]` format. This value is set by the Image Registry Operator which controls the internal registry hostname. For backward compatibility, users can still use `OPENSHIFT_DEFAULT_REGISTRY` environment variable but this setting overrides the environment variable.
|
|
|
|
|
|
|
|
|
|
|===
|
|
|
|
|
|
|
|
|
|
@@ -269,7 +269,7 @@ Defaults to unset
|
|
|
|
|
.HTTP responses
|
|
|
|
|
[cols="1,1",options="header"]
|
|
|
|
|
|===
|
|
|
|
|
| HTTP code | Reponse body
|
|
|
|
|
| HTTP code | Response body
|
|
|
|
|
| 200 - OK
|
|
|
|
|
| xref:../objects/index.adoc#status-meta-v1[`Status meta/v1`]
|
|
|
|
|
| 401 - Unauthorized
|
|
|
|
|
@@ -328,7 +328,7 @@ Defaults to unset
|
|
|
|
|
.HTTP responses
|
|
|
|
|
[cols="1,1",options="header"]
|
|
|
|
|
|===
|
|
|
|
|
| HTTP code | Reponse body
|
|
|
|
|
| HTTP code | Response body
|
|
|
|
|
| 200 - OK
|
|
|
|
|
| xref:../objects/index.adoc#imagelist-config-openshift-io-v1[`ImageList config.openshift.io/v1`]
|
|
|
|
|
| 401 - Unauthorized
|
|
|
|
|
@@ -360,13 +360,13 @@ Description::
|
|
|
|
|
| Parameter | Type | Description
|
|
|
|
|
| `body`
|
|
|
|
|
| xref:../config_apis/image-config-openshift-io-v1.adoc#image-config-openshift-io-v1[`Image config.openshift.io/v1`]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|===
|
|
|
|
|
|
|
|
|
|
.HTTP responses
|
|
|
|
|
[cols="1,1",options="header"]
|
|
|
|
|
|===
|
|
|
|
|
| HTTP code | Reponse body
|
|
|
|
|
| HTTP code | Response body
|
|
|
|
|
| 200 - OK
|
|
|
|
|
| xref:../config_apis/image-config-openshift-io-v1.adoc#image-config-openshift-io-v1[`Image config.openshift.io/v1`]
|
|
|
|
|
| 201 - Created
|
|
|
|
|
@@ -429,13 +429,13 @@ Description::
|
|
|
|
|
| Parameter | Type | Description
|
|
|
|
|
| `body`
|
|
|
|
|
| xref:../objects/index.adoc#deleteoptions-meta-v1[`DeleteOptions meta/v1`]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|===
|
|
|
|
|
|
|
|
|
|
.HTTP responses
|
|
|
|
|
[cols="1,1",options="header"]
|
|
|
|
|
|===
|
|
|
|
|
| HTTP code | Reponse body
|
|
|
|
|
| HTTP code | Response body
|
|
|
|
|
| 200 - OK
|
|
|
|
|
| xref:../objects/index.adoc#status-meta-v1[`Status meta/v1`]
|
|
|
|
|
| 202 - Accepted
|
|
|
|
|
@@ -466,7 +466,7 @@ Defaults to unset
|
|
|
|
|
.HTTP responses
|
|
|
|
|
[cols="1,1",options="header"]
|
|
|
|
|
|===
|
|
|
|
|
| HTTP code | Reponse body
|
|
|
|
|
| HTTP code | Response body
|
|
|
|
|
| 200 - OK
|
|
|
|
|
| xref:../config_apis/image-config-openshift-io-v1.adoc#image-config-openshift-io-v1[`Image config.openshift.io/v1`]
|
|
|
|
|
| 401 - Unauthorized
|
|
|
|
|
@@ -498,13 +498,13 @@ Description::
|
|
|
|
|
| Parameter | Type | Description
|
|
|
|
|
| `body`
|
|
|
|
|
| xref:../objects/index.adoc#patch-meta-v1[`Patch meta/v1`]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|===
|
|
|
|
|
|
|
|
|
|
.HTTP responses
|
|
|
|
|
[cols="1,1",options="header"]
|
|
|
|
|
|===
|
|
|
|
|
| HTTP code | Reponse body
|
|
|
|
|
| HTTP code | Response body
|
|
|
|
|
| 200 - OK
|
|
|
|
|
| xref:../config_apis/image-config-openshift-io-v1.adoc#image-config-openshift-io-v1[`Image config.openshift.io/v1`]
|
|
|
|
|
| 401 - Unauthorized
|
|
|
|
|
@@ -536,13 +536,13 @@ Description::
|
|
|
|
|
| Parameter | Type | Description
|
|
|
|
|
| `body`
|
|
|
|
|
| xref:../config_apis/image-config-openshift-io-v1.adoc#image-config-openshift-io-v1[`Image config.openshift.io/v1`]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|===
|
|
|
|
|
|
|
|
|
|
.HTTP responses
|
|
|
|
|
[cols="1,1",options="header"]
|
|
|
|
|
|===
|
|
|
|
|
| HTTP code | Reponse body
|
|
|
|
|
| HTTP code | Response body
|
|
|
|
|
| 200 - OK
|
|
|
|
|
| xref:../config_apis/image-config-openshift-io-v1.adoc#image-config-openshift-io-v1[`Image config.openshift.io/v1`]
|
|
|
|
|
| 201 - Created
|
|
|
|
|
@@ -594,7 +594,7 @@ Defaults to unset
|
|
|
|
|
.HTTP responses
|
|
|
|
|
[cols="1,1",options="header"]
|
|
|
|
|
|===
|
|
|
|
|
| HTTP code | Reponse body
|
|
|
|
|
| HTTP code | Response body
|
|
|
|
|
| 200 - OK
|
|
|
|
|
| xref:../config_apis/image-config-openshift-io-v1.adoc#image-config-openshift-io-v1[`Image config.openshift.io/v1`]
|
|
|
|
|
| 401 - Unauthorized
|
|
|
|
|
@@ -626,13 +626,13 @@ Description::
|
|
|
|
|
| Parameter | Type | Description
|
|
|
|
|
| `body`
|
|
|
|
|
| xref:../objects/index.adoc#patch-meta-v1[`Patch meta/v1`]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|===
|
|
|
|
|
|
|
|
|
|
.HTTP responses
|
|
|
|
|
[cols="1,1",options="header"]
|
|
|
|
|
|===
|
|
|
|
|
| HTTP code | Reponse body
|
|
|
|
|
| HTTP code | Response body
|
|
|
|
|
| 200 - OK
|
|
|
|
|
| xref:../config_apis/image-config-openshift-io-v1.adoc#image-config-openshift-io-v1[`Image config.openshift.io/v1`]
|
|
|
|
|
| 401 - Unauthorized
|
|
|
|
|
@@ -664,13 +664,13 @@ Description::
|
|
|
|
|
| Parameter | Type | Description
|
|
|
|
|
| `body`
|
|
|
|
|
| xref:../config_apis/image-config-openshift-io-v1.adoc#image-config-openshift-io-v1[`Image config.openshift.io/v1`]
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|===
|
|
|
|
|
|
|
|
|
|
.HTTP responses
|
|
|
|
|
[cols="1,1",options="header"]
|
|
|
|
|
|===
|
|
|
|
|
| HTTP code | Reponse body
|
|
|
|
|
| HTTP code | Response body
|
|
|
|
|
| 200 - OK
|
|
|
|
|
| xref:../config_apis/image-config-openshift-io-v1.adoc#image-config-openshift-io-v1[`Image config.openshift.io/v1`]
|
|
|
|
|
| 201 - Created
|
|
|
|
|
@@ -678,5 +678,3 @@ Description::
|
|
|
|
|
| 401 - Unauthorized
|
|
|
|
|
| Empty
|
|
|
|
|
|===
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|