atomic-trust (1) - Linux Manuals
atomic-trust: Manage system container trust policy
NAME
atomic-trust - Manage system container trust policy
SYNOPSIS
atomic trust add|delete|default|reset|show [-h|--help] [-j|--json] [--raw] [-k|--pubkeys KEY1 [-k|--pubkeys KEY2,...]] [-f|--pubkeysfile KEY1 [f|--pubkeysfile KEY2,...]] [--keytype GPGKeys] [-t|--type signedBy|insecureAcceptAnything|reject] [-s|--sigstore <https://URL[:PORT][/PATH]|file:///PATH>] [--sigstoretype web|atomic|local] REGISTRY[/REPOSITORY]
DESCRIPTION
atomic trust manages the trust policy of the host system. Trust policy describes a registry scope (registry and/or repository) that must be signed by public keys. Trust is defined in /etc/containers/policy.json. Trust is enforced when a user attempts to pull an image from a registry.
Trust scope is evaluated by most specific to least specific. In other words, policy may be defined for an entire registry, but refined for a particular repository in that registry. See below for examples.
Trust type provides a way to whitelist ("insecureAcceptAnything") or blacklist ("reject") registries.
Signature servers, or sigstores, configure where image signatures are served for a particular registry scope. This cofiguration is a flat list of arbitrarily named YAML files in /etc/containers/registries.d/. Filenames must end in .yaml. A sigstore may be either an absolute path to a local directory (file:///PATH) or a remote web server ( <https://URL>).
Trust may be updated using the command atomic trust add for an existing trust scope.
The default trust policy is managed by the default command. Options are accept or reject.
The default /etc/containers/policy.json file may be overriden using environment variable TRUST_POLICY. This is typically only useful for testing.
OPTIONS
-h --help
-k --pubkeys
-f --pubkeysfile
--keytype
-t --type
-u --sigstore
-s --sigstoretype
--save-sigstore
The default trust policy is managed by the default command. Options are accept or reject.
--raw
-j --json
Resets policy.json to the default. Removes all YAML files in
Add public key trust to specific registry repository
Modify a trust scope, adding a second public key and changing
the sigstore web server
Accept all unsigned images from a registry
Remove a trust scope
Remove a trust scope but retain the sigstore configuration
Modify default trust policy
Display system trust policy
Display trust policy file
Display trust as JSON
September 2016, originally compiled by Aaron Weitekamp (aweiteka at redhat dot com)
delete OPTIONS
default OPTIONS
show OPTIONS
reset
EXAMPLES
atomic trust add \
--pubkeys /etc/pki/containers/foo [at] example.com \
--sigstore https://s3.bucket/foobar/sigstore/ \
docker.io/foobar
atomic trust add \
--pubkeys https://example.com/keys/example.pub \
--pubkeys /etc/pki/containers/foo [at] example.com \
--sigstore https://server.example.com/foobar/sigstore/ \
docker.io/foobar
atomic trust add --type insecureAcceptAnything docker.io
atomic trust delete docker.io
atomic trust delete docker.io --sigstore
atomic trust default reject
atomic trust show
atomic trust show --raw
atomic trust show --json
HISTORY