*: implement additional pull registries
Signed-off-by: Antonio Murdaca <runcom@redhat.com>
This commit is contained in:
parent
7351786411
commit
a35727c80b
13 changed files with 337 additions and 43 deletions
|
@ -16,11 +16,13 @@ crio - OCI Kubernetes Container Runtime daemon
|
|||
[**--debug**]
|
||||
[**--default-transport**=[*value*]]
|
||||
[**--help**|**-h**]
|
||||
[**--insecure-registry**=[*value*]]
|
||||
[**--listen**=[*value*]]
|
||||
[**--log**=[*value*]]
|
||||
[**--log-format value**]
|
||||
[**--pause-command**=[*value*]]
|
||||
[**--pause-image**=[*value*]]
|
||||
[**--registry**=[*value*]]
|
||||
[**--root**=[*value*]]
|
||||
[**--runroot**=[*value*]]
|
||||
[**--runtime**=[*value*]]
|
||||
|
@ -73,6 +75,20 @@ set the CPU profile file path
|
|||
**--help, -h**
|
||||
Print usage statement
|
||||
|
||||
**--insecure-registry=**
|
||||
Enable insecure registry communication, i.e., enable un-encrypted
|
||||
and/or untrusted communication.
|
||||
|
||||
List of insecure registries can contain an element with CIDR notation
|
||||
to specify a whole subnet. Insecure registries accept HTTP and/or
|
||||
accept HTTPS with certificates from unknown CAs.
|
||||
|
||||
Enabling --insecure-registry is useful when running a local registry.
|
||||
However, because its use creates security vulnerabilities it should
|
||||
ONLY be enabled for testing purposes. For increased security, users
|
||||
should add their CA to their system's list of trusted CAs instead of
|
||||
using --insecure-registry.
|
||||
|
||||
**--image-volumes**=""
|
||||
Image volume handling ('mkdir' or 'ignore') (default: "mkdir")
|
||||
|
||||
|
@ -97,6 +113,9 @@ set the CPU profile file path
|
|||
**--root**=""
|
||||
CRIO root dir (default: "/var/lib/containers/storage")
|
||||
|
||||
**--registry**=""
|
||||
Registry host which will be prepended to unqualified images, can be specified multiple times
|
||||
|
||||
**--runroot**=""
|
||||
CRIO state dir (default: "/var/run/containers/storage")
|
||||
|
||||
|
|
|
@ -77,15 +77,33 @@ The `crio` table supports the following options:
|
|||
**default_transport**
|
||||
A prefix to prepend to image names that can't be pulled as-is (default: "docker://")
|
||||
|
||||
**--image_volumes**=""
|
||||
**image_volumes**=""
|
||||
Image volume handling ('mkdir' or 'ignore') (default: "mkdir")
|
||||
|
||||
**insecure_registries**=""
|
||||
Enable insecure registry communication, i.e., enable un-encrypted
|
||||
and/or untrusted communication.
|
||||
|
||||
List of insecure registries can contain an element with CIDR notation
|
||||
to specify a whole subnet. Insecure registries accept HTTP and/or
|
||||
accept HTTPS with certificates from unknown CAs.
|
||||
|
||||
Enabling --insecure-registry is useful when running a local registry.
|
||||
However, because its use creates security vulnerabilities it should
|
||||
ONLY be enabled for testing purposes. For increased security, users
|
||||
should add their CA to their system's list of trusted CAs instead of
|
||||
using --insecure-registry.
|
||||
|
||||
**pause_command**=""
|
||||
Path to the pause executable in the pause image (default: "/pause")
|
||||
|
||||
**pause_image**=""
|
||||
Image which contains the pause executable (default: "kubernetes/pause")
|
||||
|
||||
**registries**=""
|
||||
Comma separated list of registries that will be prepended when pulling
|
||||
unqualified images
|
||||
|
||||
## CRIO.NETWORK TABLE
|
||||
|
||||
**network_dir**=""
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue