|
|
5c9f13 |
# For more information on this configuration file, see containers-registries.conf(5).
|
|
|
5c9f13 |
#
|
|
|
5c9f13 |
# NOTE: RISK OF USING UNQUALIFIED IMAGE NAMES
|
|
|
5c9f13 |
# We recommend always using fully qualified image names including the registry
|
|
|
5c9f13 |
# server (full dns name), namespace, image name, and tag
|
|
|
5c9f13 |
# (e.g., registry.redhat.io/ubi8/ubi:latest). Pulling by digest (i.e.,
|
|
|
5c9f13 |
# quay.io/repository/name@digest) further eliminates the ambiguity of tags.
|
|
|
5c9f13 |
# When using short names, there is always an inherent risk that the image being
|
|
|
5c9f13 |
# pulled could be spoofed. For example, a user wants to pull an image named
|
|
|
5c9f13 |
# `foobar` from a registry and expects it to come from myregistry.com. If
|
|
|
5c9f13 |
# myregistry.com is not first in the search list, an attacker could place a
|
|
|
5c9f13 |
# different `foobar` image at a registry earlier in the search list. The user
|
|
|
5c9f13 |
# would accidentally pull and run the attacker's image and code rather than the
|
|
|
5c9f13 |
# intended content. We recommend only adding registries which are completely
|
|
|
5c9f13 |
# trusted (i.e., registries which don't allow unknown or anonymous users to
|
|
|
5c9f13 |
# create accounts with arbitrary names). This will prevent an image from being
|
|
|
5c9f13 |
# spoofed, squatted or otherwise made insecure. If it is necessary to use one
|
|
|
5c9f13 |
# of these registries, it should be added at the end of the list.
|
|
|
5c9f13 |
#
|
|
|
5c9f13 |
# # An array of host[:port] registries to try when pulling an unqualified image, in order.
|
|
|
5c9f13 |
|
|
|
a066e6 |
unqualified-search-registries = ["registry.access.redhat.com", "registry.redhat.io", "docker.io"]
|
|
|
5c9f13 |
|
|
|
5c9f13 |
# [[registry]]
|
|
|
5c9f13 |
# # The "prefix" field is used to choose the relevant [[registry]] TOML table;
|
|
|
5c9f13 |
# # (only) the TOML table with the longest match for the input image name
|
|
|
5c9f13 |
# # (taking into account namespace/repo/tag/digest separators) is used.
|
|
|
5c9f13 |
# #
|
|
|
5c9f13 |
# # The prefix can also be of the form: *.example.com for wildcard subdomain
|
|
|
5c9f13 |
# # matching.
|
|
|
5c9f13 |
# #
|
|
|
5c9f13 |
# # If the prefix field is missing, it defaults to be the same as the "location" field.
|
|
|
5c9f13 |
# prefix = "example.com/foo"
|
|
|
5c9f13 |
#
|
|
|
5c9f13 |
# # If true, unencrypted HTTP as well as TLS connections with untrusted
|
|
|
5c9f13 |
# # certificates are allowed.
|
|
|
5c9f13 |
# insecure = false
|
|
|
5c9f13 |
#
|
|
|
5c9f13 |
# # If true, pulling images with matching names is forbidden.
|
|
|
5c9f13 |
# blocked = false
|
|
|
5c9f13 |
#
|
|
|
5c9f13 |
# # The physical location of the "prefix"-rooted namespace.
|
|
|
5c9f13 |
# #
|
|
|
5c9f13 |
# # By default, this is equal to "prefix" (in which case "prefix" can be omitted
|
|
|
5c9f13 |
# # and the [[registry]] TOML table can only specify "location").
|
|
|
5c9f13 |
# #
|
|
|
5c9f13 |
# # Example: Given
|
|
|
5c9f13 |
# # prefix = "example.com/foo"
|
|
|
5c9f13 |
# # location = "internal-registry-for-example.net/bar"
|
|
|
5c9f13 |
# # requests for the image example.com/foo/myimage:latest will actually work with the
|
|
|
5c9f13 |
# # internal-registry-for-example.net/bar/myimage:latest image.
|
|
|
5c9f13 |
#
|
|
|
5c9f13 |
# # The location can be empty iff prefix is in a
|
|
|
5c9f13 |
# # wildcarded format: "*.example.com". In this case, the input reference will
|
|
|
5c9f13 |
# # be used as-is without any rewrite.
|
|
|
5c9f13 |
# location = internal-registry-for-example.com/bar"
|
|
|
5c9f13 |
#
|
|
|
5c9f13 |
# # (Possibly-partial) mirrors for the "prefix"-rooted namespace.
|
|
|
5c9f13 |
# #
|
|
|
5c9f13 |
# # The mirrors are attempted in the specified order; the first one that can be
|
|
|
5c9f13 |
# # contacted and contains the image will be used (and if none of the mirrors contains the image,
|
|
|
5c9f13 |
# # the primary location specified by the "registry.location" field, or using the unmodified
|
|
|
5c9f13 |
# # user-specified reference, is tried last).
|
|
|
5c9f13 |
# #
|
|
|
5c9f13 |
# # Each TOML table in the "mirror" array can contain the following fields, with the same semantics
|
|
|
5c9f13 |
# # as if specified in the [[registry]] TOML table directly:
|
|
|
5c9f13 |
# # - location
|
|
|
5c9f13 |
# # - insecure
|
|
|
5c9f13 |
# [[registry.mirror]]
|
|
|
5c9f13 |
# location = "example-mirror-0.local/mirror-for-foo"
|
|
|
5c9f13 |
# [[registry.mirror]]
|
|
|
5c9f13 |
# location = "example-mirror-1.local/mirrors/foo"
|
|
|
5c9f13 |
# insecure = true
|
|
|
5c9f13 |
# # Given the above, a pull of example.com/foo/image:latest will try:
|
|
|
5c9f13 |
# # 1. example-mirror-0.local/mirror-for-foo/image:latest
|
|
|
5c9f13 |
# # 2. example-mirror-1.local/mirrors/foo/image:latest
|
|
|
5c9f13 |
# # 3. internal-registry-for-example.net/bar/image:latest
|
|
|
5c9f13 |
# # in order, and use the first one that exists.
|
|
|
5c9f13 |
short-name-mode = "permissive"
|