NAME
podman-image-trust - Manage container registry image trust policySYNOPSIS
podman image trust set|show [options] registry[/repository]DESCRIPTION
Manages which registries you trust as a source of container images based on its location. (This option is not available with the remote Podman client, including Mac and Windows (excluding WSL2) machines)OPTIONS
--help, -h
Print usage statement.set OPTIONS
--pubkeysfile, -f=KEY1
A path to an exported public key on the local system. Key pathswill be referenced in policy.json. Any path to a file may be used but locating the file in /etc/pki/containers is recommended. Options may be used multiple times to
require an image be signed by multiple keys. The --pubkeysfile option is required for the signedBy and sigstoreSigned types.
--type, -t=value
The trust type for this policy entry.Accepted values:
signedBy (default): Require simple signing signatures with corresponding list of
public keys
sigstoreSigned: Require sigstore signatures with corresponding list of
public keys
accept: do not require any signatures for this
registry scope
reject: do not accept images for this registry scope
show OPTIONS
--json, -j
Output trust as JSON for machine parsing--noheading, -n
Omit the table headings from the trust listings--raw
Output trust policy file as raw JSONEXAMPLES
Accept all unsigned images from a registrysudo podman image trust set --type accept docker.io
sudo podman image trust set -t reject default
podman image trust show
TRANSPORT NAME TYPE ID STORE all default reject repository docker.io/library accept repository registry.access.redhat.com signed [email protected] https://access.redhat.com/webassets/docker/content/sigstore repository registry.redhat.io signed [email protected] https://registry.redhat.io/containers/sigstore repository docker.io reject docker-daemon accept
podman image trust show --raw
{ "default": [ { "type": "reject" } ], "transports": { "docker": { "docker.io": [ { "type": "reject" } ], "docker.io/library": [ { "type": "insecureAcceptAnything" } ], "registry.access.redhat.com": [ { "type": "signedBy", "keyType": "GPGKeys", "keyPath": "/etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release" } ], "registry.redhat.io": [ { "type": "signedBy", "keyType": "GPGKeys", "keyPath": "/etc/pki/rpm-gpg/RPM-GPG-KEY-redhat-release" } ] }, "docker-daemon": { "": [ { "type": "insecureAcceptAnything" } ] } } }
podman image trust show --json
[ { "transport": "all", "name": "* (default)", "repo_name": "default", "type": "reject" }, { "transport": "repository", "name": "docker.io", "repo_name": "docker.io", "type": "reject" }, { "transport": "repository", "name": "docker.io/library", "repo_name": "docker.io/library", "type": "accept" }, { "transport": "repository", "name": "registry.access.redhat.com", "repo_name": "registry.access.redhat.com", "sigstore": "https://access.redhat.com/webassets/docker/content/sigstore", "type": "signed", "gpg_id": "[email protected]" }, { "transport": "repository", "name": "registry.redhat.io", "repo_name": "registry.redhat.io", "sigstore": "https://registry.redhat.io/containers/sigstore", "type": "signed", "gpg_id": "[email protected]" }, { "transport": "docker-daemon", "type": "accept" } ]