Johnson Shi
Johnson Shi
Yes, with the reference types working group merged, I agree with the approach of: * having an annotation-only artifact manifest that contains end-of-life information * this annotation-only artifact manifest `refers`...
I think including the required apiVersions in the examples are a good idea. Prevents user confusion.
Perhaps we should also include backends for `non-matches` (which we don't have) and backends for `matches` (which we have).
I really like your examples and thought about them, but I having a key for explicit default backends would be less confusing. Right now, if a TrafficSplit does not match...
This is nice work @jedevc! I think the experience of allowing multiple `--annotation` flags (like the example below) would allow image builders to support [OCI Annotations](https://github.com/opencontainers/image-spec/blob/main/annotations.md#pre-defined-annotation-keys). ```bash docker buildx build...
> I think we should explicitly avoid allowing using anything other than the manifest annotation type, directing users to manually add the output attribute if they want more advanced behavior....
Hi @davidkarlsen, We're working on GA'ing https://github.com/Azure/acr/issues/412 (Repository-Scoped Permissions using Tokens and Scope Maps). That feature needs to be GA'd first before the other feature first because of internal engineering...
Hi @Spaanseh, @jabbera, @alvispu, @mot256, @michaelgrossopt, @shana, @AntonioNaranjo1, @MadCat33, and @alexdegroot, The timeline for namespace permissions (ability to scope permissions and tokens at the namespace level) will be Preview around...
Hi @dpaardenkooper and @dhanesh012, Johnson here from the Azure Container Registry team. We currently have frequent internal syncs on our side as we're marshalling the dev resources to GA this...
@thgossler Attribute-Based Access Control (ABAC) is an extension on top of RBAC role assignments that allows you to specify attribute conditions during role assignments. This allows you to grant role...