docker trust sign

DescriptionSign an image
Usagedocker trust sign IMAGE:TAG

Description

docker trust sign adds signatures to tags to create signed repositories.

Options

OptionDefaultDescription
--localSign a locally tagged image

Examples

Sign a tag as a repository admin

Given an image:

$ docker trust inspect --pretty example/trust-demo  SIGNED TAG          DIGEST                                                             SIGNERS v1                  c24134c079c35e698060beabe110bb83ab285d0d978de7d92fed2c8c83570a41   (Repo Admin)  Administrative keys for example/trust-demo: Repository Key: 36d4c3601102fa7c5712a343c03b94469e5835fb27c191b529c06fd19c14a942 Root Key:       246d360f7c53a9021ee7d4259e3c5692f3f1f7ad4737b1ea8c7b8da741ad980b 

Sign a new tag with docker trust sign:

$ docker trust sign example/trust-demo:v2  Signing and pushing trust metadata for example/trust-demo:v2 The push refers to a repository [docker.io/example/trust-demo] eed4e566104a: Layer already exists 77edfb6d1e3c: Layer already exists c69f806905c2: Layer already exists 582f327616f1: Layer already exists a3fbb648f0bd: Layer already exists 5eac2de68a97: Layer already exists 8d4d1ab5ff74: Layer already exists v2: digest: sha256:8f6f460abf0436922df7eb06d28b3cdf733d2cac1a185456c26debbff0839c56 size: 1787 Signing and pushing trust metadata Enter passphrase for repository key with ID 36d4c36: Successfully signed docker.io/example/trust-demo:v2 

Use docker trust inspect --pretty to list the new signature:

$ docker trust inspect --pretty example/trust-demo  SIGNED TAG          DIGEST                                                             SIGNERS v1                  c24134c079c35e698060beabe110bb83ab285d0d978de7d92fed2c8c83570a41   (Repo Admin) v2                  8f6f460abf0436922df7eb06d28b3cdf733d2cac1a185456c26debbff0839c56   (Repo Admin)  Administrative keys for example/trust-demo: Repository Key: 36d4c3601102fa7c5712a343c03b94469e5835fb27c191b529c06fd19c14a942 Root Key:       246d360f7c53a9021ee7d4259e3c5692f3f1f7ad4737b1ea8c7b8da741ad980b 

Sign a tag as a signer

Given an image:

$ docker trust inspect --pretty example/trust-demo  No signatures for example/trust-demo   List of signers and their keys for example/trust-demo:  SIGNER              KEYS alice               05e87edcaecb bob                 5600f5ab76a2  Administrative keys for example/trust-demo: Repository Key: ecc457614c9fc399da523a5f4e24fe306a0a6ee1cc79a10e4555b3c6ab02f71e Root Key:       3cb2228f6561e58f46dbc4cda4fcaff9d5ef22e865a94636f82450d1d2234949 

Sign a new tag with docker trust sign:

$ docker trust sign example/trust-demo:v1  Signing and pushing trust metadata for example/trust-demo:v1 The push refers to a repository [docker.io/example/trust-demo] 26b126eb8632: Layer already exists 220d34b5f6c9: Layer already exists 8a5132998025: Layer already exists aca233ed29c3: Layer already exists e5d2f035d7a4: Layer already exists v1: digest: sha256:74d4bfa917d55d53c7df3d2ab20a8d926874d61c3da5ef6de15dd2654fc467c4 size: 1357 Signing and pushing trust metadata Enter passphrase for delegation key with ID 27d42a8: Successfully signed docker.io/example/trust-demo:v1 

docker trust inspect --pretty lists the new signature:

$ docker trust inspect --pretty example/trust-demo  SIGNED TAG          DIGEST                                                             SIGNERS v1                  74d4bfa917d55d53c7df3d2ab20a8d926874d61c3da5ef6de15dd2654fc467c4   alice  List of signers and their keys for example/trust-demo:  SIGNER              KEYS alice               05e87edcaecb bob                 5600f5ab76a2  Administrative keys for example/trust-demo: Repository Key: ecc457614c9fc399da523a5f4e24fe306a0a6ee1cc79a10e4555b3c6ab02f71e Root Key:       3cb2228f6561e58f46dbc4cda4fcaff9d5ef22e865a94636f82450d1d2234949