
- Allow creating sigstore signatures via --sign-by-sigstore-private-key . Like existing --sign-by, it does not work remote (in this case because we would have to copy the private key to the server). - Allow passing a passphrase (which is mandatory for sigstore private keys) via --sign-passphrase-file; if it is not provided, prompt interactively. - Also, use that passphrase for --sign-by as well, allowing non-interactive GPG use. (But --sign-passphrase-file can only be used with _one of_ --sign-by and --sign-by-sigstore-private-key.) Note that unlike the existing code, (podman build) does not yet implement sigstore (I'm not sure why it needs to, it seems not to push images?) because Buildah does not expose the feature yet. Also, (podman image sign) was not extended to support sigstore. The test for this follows existing (podman image sign) tests and doesn't work rootless; that could be improved by exposing a registries.d override option. The test for push is getting large; I didn't want to start yet another registry container, but that would be an alternative. In the future, Ginkgo's Ordered/BeforeAll would allow starting a registry once and using it for two tests. Signed-off-by: Miloslav Trmač <mitr@redhat.com>
4.5 KiB
% podman-manifest-push(1)
NAME
podman-manifest-push - Push a manifest list or image index to a registry
SYNOPSIS
podman manifest push [options] listnameorindexname [destination]
DESCRIPTION
Pushes a manifest list or image index to a registry.
RETURN VALUE
The list image's ID and the digest of the image's manifest.
OPTIONS
--all
Push the images mentioned in the manifest list or image index, in addition to the list or index itself. (Default true)
--authfile=path
Path of the authentication file. Default is ${XDG_RUNTIME_DIR}/containers/auth.json, which is set using podman login
.
If the authorization state is not found there, $HOME/.docker/config.json is checked, which is set using docker login
.
Note: You can also override the default path of the authentication file by setting the REGISTRY_AUTH_FILE
environment variable. export REGISTRY_AUTH_FILE=path
--cert-dir=path
Use certificates at path (*.crt, *.cert, *.key) to connect to the registry. (Default: /etc/containers/certs.d) Please refer to containers-certs.d(5) for details. (This option is not available with the remote Podman client, including Mac and Windows (excluding WSL2) machines)
--creds=creds
The [username[:password]] to use to authenticate with the registry if required. If one or both values are not supplied, a command line prompt will appear and the value can be entered. The password is entered without echo.
--digestfile=Digestfile
After copying the image, write the digest of the resulting image to the file.
--format, -f=format
Manifest list type (oci or v2s2) to use when pushing the list (default is oci).
--quiet, -q
When writing the manifest, suppress progress output
--remove-signatures
Don't copy signatures when pushing images.
--rm
Delete the manifest list or image index from local storage if pushing succeeds.
--sign-by=fingerprint
Sign the pushed images with a “simple signing” signature using the specified key. (This option is not available with the remote Podman client, including Mac and Windows (excluding WSL2) machines)
--sign-by-sigstore-private-key=path
Sign the pushed images with a sigstore signature using a private key at the specified path. (This option is not available with the remote Podman client, including Mac and Windows (excluding WSL2) machines)
--sign-passphrase-file=path
If signing the image (using either --sign-by or --sign-by-sigstore-private-key), read the passphrase to use from the specified path.
--tls-verify
Require HTTPS and verify certificates when talking to container registries. (defaults to true)
DESTINATION
The DESTINATION is a location to store container images The Image "DESTINATION" uses a "transport":"details" format. If a transport is not given, podman push will attempt to push to a registry.
Multiple transports are supported:
dir:path An existing local directory path storing the manifest, layer tarballs and signatures as individual files. This is a non-standardized format, primarily useful for debugging or noninvasive container inspection.
$ podman manifest push mylist:v1.11 dir:/tmp/mylist
docker://docker-reference
An image in a registry implementing the "Docker Registry HTTP API V2". By default, uses the authorization state in $XDG_RUNTIME_DIR/containers/auth.json
, which is set using (podman login)
. If the authorization state is not found there, $HOME/.docker/config.json
is checked, which is set using (docker login)
.
$ podman manifest push mylist:v1.11 docker://registry.example.org/mylist:v1.11
docker-archive:path[:docker-reference]
An image is stored in the docker save
formatted file. docker-reference is only used when creating such a file, and it must not contain a digest.
$ podman manifest push mylist:v1.11 docker-archive:/tmp/mylist
docker-daemon:docker-reference An image in docker-reference format stored in the docker daemon internal storage. docker-reference must contain a tag.
$ podman manifest push mylist:v1.11 docker-daemon:registry.example.org/mylist:v1.11
oci-archive:path:tag An image tag in a directory compliant with "Open Container Image Layout Specification" at path.
$ podman manifest push mylist:v1.11 oci-archive:/tmp/mylist
EXAMPLE
podman manifest push mylist:v1.11 docker://registry.example.org/mylist:v1.11