@@ -188,7 +188,7 @@ sigstore_config_uri = "kbs:///default/sigstore-config/test"
188
188
image_security_policy_uri = "kbs:///default/security-policy/test"
189
189
authenticated_registry_credentials_uri = "kbs:///default/credential/test"
190
190
extra_root_certificates = ["cert1", "cert2"]
191
- image_pull_proxy = "http://127.0.0.1:8080"
191
+ https_proxy = "http://127.0.0.1:8080"
192
192
"# ,
193
193
Some ( CdhConfig {
194
194
kbc: KbsConfig {
@@ -202,8 +202,9 @@ image_pull_proxy = "http://127.0.0.1:8080"
202
202
sigstore_config_uri: Some ( "kbs:///default/sigstore-config/test" . to_string( ) ) ,
203
203
image_security_policy_uri: Some ( "kbs:///default/security-policy/test" . to_string( ) ) ,
204
204
authenticated_registry_credentials_uri: Some ( "kbs:///default/credential/test" . to_string( ) ) ,
205
- image_pull_proxy: Some ( "http://127.0.0.1:8080" . into( ) ) ,
206
- skip_proxy_ips: None ,
205
+ https_proxy: Some ( "http://127.0.0.1:8080" . into( ) ) ,
206
+ http_proxy: None ,
207
+ no_proxy: None ,
207
208
extra_root_certificates: vec![ "cert1" . into( ) , "cert2" . into( ) ] ,
208
209
..Default :: default ( )
209
210
} ,
@@ -239,8 +240,9 @@ name = "offline_fs_kbc"
239
240
sigstore_config_uri: None ,
240
241
image_security_policy_uri: None ,
241
242
authenticated_registry_credentials_uri: None ,
242
- image_pull_proxy: None ,
243
- skip_proxy_ips: None ,
243
+ https_proxy: None ,
244
+ http_proxy: None ,
245
+ no_proxy: None ,
244
246
..Default :: default ( )
245
247
} ,
246
248
socket: DEFAULT_CDH_SOCKET_ADDR . to_string( ) ,
@@ -265,8 +267,9 @@ some_undefined_field = "unknown value"
265
267
sigstore_config_uri: None ,
266
268
image_security_policy_uri: None ,
267
269
authenticated_registry_credentials_uri: None ,
268
- image_pull_proxy: None ,
269
- skip_proxy_ips: None ,
270
+ https_proxy: None ,
271
+ http_proxy: None ,
272
+ no_proxy: None ,
270
273
..Default :: default ( )
271
274
} ,
272
275
socket: DEFAULT_CDH_SOCKET_ADDR . to_string( ) ,
0 commit comments