![]() |
![]()
| ![]() |
![]()
NAMEpodman-image-trust - Manage container registry image trust policy SYNOPSISpodman image trust set|show [options] registry[/repository] DESCRIPTIONManages which registries to trust as a source of container images based on its location. (This option is not available with the remote Podman client, including Mac and Windows (excluding WSL2) machines) The location is determined by the transport and the registry host of the image. Using this container image docker://docker.io/library/busybox as an example, docker is the transport and docker.io is the registry host. Trust is defined in /etc/containers/policy.json and is enforced when a user attempts to pull a remote image from a registry. The trust policy in policy.json describes a registry scope (registry and/or repository) for the trust. This trust can use public keys for signed images. The scope of the trust is evaluated from most specific to the least specific. In other words, a policy may be:
The following list are examples of valid scope values used in policy.json from most specific to the least specific: docker.io/library/busybox:notlatest docker.io/library/busybox docker.io/library docker.io If no configuration is found for any of these scopes, the default value (specified by using "default" instead of REGISTRY[/REPOSITORY]) is used. Trust type provides a way to: Allowlist ("accept") or Denylist ("reject") registries or Require a simple signing signature (“signedBy”), Require a sigstore signature ("sigstoreSigned"). Trust may be updated using the command podman image trust set for an existing trust scope. OPTIONS--help, -hPrint usage statement. set OPTIONS--pubkeysfile, -f=KEY1A path to an exported public key on the local system. Key paths
--type, -t=valueThe trust type for this policy entry.
show OPTIONS--json, -jOutput trust as JSON for machine parsing --noheading, -nOmit the table headings from the listing. --rawOutput trust policy file as raw JSON EXAMPLESAccept all unsigned images from a registry: sudo podman image trust set --type accept docker.io Modify default trust policy: sudo podman image trust set -t reject default Display system trust policy: podman image trust show TRANSPORT NAME TYPE ID STORE all default reject repository docker.io/library accept repository registry.access.redhat.com signed security@redhat.com https://access.redhat.com/webassets/docker/content/sigstore repository registry.redhat.io signed security@redhat.com https://registry.redhat.io/containers/sigstore repository docker.io reject docker-daemon accept Display trust policy file: podman image trust show --raw { Display trust as JSON: podman image trust show --json [ SEE ALSOcontainers-policy.json(5) HISTORYJanuary 2019, updated by Tom Sweeney (tsweeney at redhat dot com) December 2018, originally compiled by Qi Wang (qiwan at redhat dot com)
|