e2e81a
% containers-registries.d 5 Registries.d Man Page
5dd126
% Miloslav Trmač
5dd126
% August 2016
5dd126
5dd126
# NAME
5dd126
containers-registries.d - Directory for various registries configurations
5dd126
5dd126
# DESCRIPTION
5dd126
5dd126
The registries configuration directory contains configuration for various registries
5dd126
(servers storing remote container images), and for content stored in them,
5dd126
so that the configuration does not have to be provided in command-line options over and over for every command,
5dd126
and so that it can be shared by all users of containers/image.
5dd126
5dd126
By default, the registries configuration directory is `$HOME/.config/containers/registries.d` if it exists, otherwise `/etc/containers/registries.d` (unless overridden at compile-time);
5dd126
applications may allow using a different directory instead.
5dd126
5dd126
## Directory Structure
5dd126
5dd126
The directory may contain any number of files with the extension `.yaml`,
5dd126
each using the YAML format.  Other than the mandatory extension, names of the files
5dd126
don’t matter.
5dd126
5dd126
The contents of these files are merged together; to have a well-defined and easy to understand
5dd126
behavior, there can be only one configuration section describing a single namespace within a registry
5dd126
(in particular there can be at most one one `default-docker` section across all files,
5dd126
and there can be at most one instance of any key under the `docker` section;
5dd126
these sections are documented later).
5dd126
5dd126
Thus, it is forbidden to have two conflicting configurations for a single registry or scope,
5dd126
and it is also forbidden to split a configuration for a single registry or scope across
5dd126
more than one file (even if they are not semantically in conflict).
5dd126
5dd126
## Registries, Scopes and Search Order
5dd126
5dd126
Each YAML file must contain a “YAML mapping” (key-value pairs).  Two top-level keys are defined:
5dd126
5dd126
- `default-docker` is the _configuration section_ (as documented below)
5dd126
   for registries implementing "Docker Registry HTTP API V2".
5dd126
5dd126
   This key is optional.
5dd126
5dd126
- `docker` is a mapping, using individual registries implementing "Docker Registry HTTP API V2",
5dd126
   or namespaces and individual images within these registries, as keys;
5dd126
   the value assigned to any such key is a _configuration section_.
5dd126
5dd126
   This key is optional.
5dd126
5dd126
   Scopes matching individual images are named Docker references *in the fully expanded form*, either
5dd126
   using a tag or digest. For example, `docker.io/library/busybox:latest` (*not* `busybox:latest`).
5dd126
5dd126
   More general scopes are prefixes of individual-image scopes, and specify a repository (by omitting the tag or digest),
5dd126
   a repository namespace, or a registry host (and a port if it differs from the default).
5dd126
5dd126
   Note that if a registry is accessed using a hostname+port configuration, the port-less hostname
5dd126
   is _not_ used as parent scope.
5dd126
5dd126
When searching for a configuration to apply for an individual container image, only
5dd126
the configuration for the most-precisely matching scope is used; configuration using
5dd126
more general scopes is ignored.  For example, if _any_ configuration exists for
5dd126
`docker.io/library/busybox`, the configuration for `docker.io` is ignored
5dd126
(even if some element of the configuration is defined for `docker.io` and not for `docker.io/library/busybox`).
5dd126
5dd126
### Built-in Defaults
5dd126
169ddb
If no `docker` section can be found for the container image, and no `default-docker` section is configured:
169ddb
169ddb
- The default directory, `/var/lib/containers/sigstore` for root and `$HOME/.local/share/containers/sigstore` for unprivileged user,  will be used for reading and writing signatures.
169ddb
- Sigstore attachments will not be read/written.
5dd126
5dd126
## Individual Configuration Sections
5dd126
5dd126
A single configuration section is selected for a container image using the process
5dd126
described above.  The configuration section is a YAML mapping, with the following keys:
5dd126
169ddb
169ddb
169ddb
- `lookaside-staging` defines an URL of of the signature storage, used for editing it (adding or deleting signatures).
5dd126
169ddb
   This key is optional; if it is missing, `lookaside` below is used.
5dd126
169ddb
- `lookaside` defines an URL of the signature storage.
5dd126
   This URL is used for reading existing signatures,
169ddb
   and if `lookaside-staging` does not exist, also for adding or removing them.
5dd126
5dd126
   This key is optional; if it is missing, no signature storage is defined (no signatures
169ddb
   are download along with images, adding new signatures is possible only if `lookaside-staging` is defined).
5dd126
169ddb
- `use-sigstore-attachments` specifies whether sigstore image attachments (signatures, attestations and the like) are going to be read/written along with the image.
169ddb
   If disabled, the images are treated as if no attachments exist; attempts to write attachments fail.
5dd126
5dd126
## Examples
5dd126
5dd126
### Using Containers from Various Origins
5dd126
5dd126
The following demonstrates how to to consume and run images from various registries and namespaces:
5dd126
5dd126
```yaml
5dd126
docker:
5dd126
    registry.database-supplier.com:
169ddb
        lookaside: https://lookaside.database-supplier.com
5dd126
    distribution.great-middleware.org:
169ddb
        lookaside: https://security-team.great-middleware.org/lookaside
5dd126
    docker.io/web-framework:
169ddb
        lookaside: https://lookaside.web-framework.io:8080
5dd126
```
5dd126
5dd126
### Developing and Signing Containers, Staging Signatures
5dd126
5dd126
For developers in `example.com`:
5dd126
5dd126
- Consume most container images using the public servers also used by clients.
5dd126
- Use a separate signature storage for an container images in a namespace corresponding to the developers' department, with a staging storage used before publishing signatures.
5dd126
- Craft an individual exception for a single branch a specific developer is working on locally.
5dd126
5dd126
```yaml
5dd126
docker:
5dd126
    registry.example.com:
169ddb
        lookaside: https://registry-lookaside.example.com
5dd126
    registry.example.com/mydepartment:
169ddb
        lookaside: https://lookaside.mydepartment.example.com
169ddb
        lookaside-staging: file:///mnt/mydepartment/lookaside-staging
5dd126
    registry.example.com/mydepartment/myproject:mybranch:
169ddb
        lookaside: http://localhost:4242/lookaside
169ddb
        lookaside-staging: file:///home/useraccount/webroot/lookaside
5dd126
```
5dd126
5dd126
### A Global Default
5dd126
5dd126
If a company publishes its products using a different domain, and different registry hostname for each of them, it is still possible to use a single signature storage server
5dd126
without listing each domain individually. This is expected to rarely happen, usually only for staging new signatures.
5dd126
5dd126
```yaml
5dd126
default-docker:
169ddb
    lookaside-staging: file:///mnt/company/common-lookaside-staging
5dd126
```
5dd126
5dd126
# AUTHORS
5dd126
5dd126
Miloslav Trmač <mitr@redhat.com>