$ atomic trust show
REPO ACTION SIGSTORE
---- ------ --------
docker.io accept
docker.io/centos require signature https://s3.amazonaws.com/centos-sigstore/
registry.access.redhat.com require signature https://cdn.redhat.com/containers/sigstore
* reject
$ atomic trust show --raw
{
... # Raw policy.json file
}
$ atomic trust show docker.io/fedora
accept
$ atomic trust show docker.io/centos
Requires signature: /etc/pki/containers/[email protected]
$ atomic trust show registry.private-registry.example.com
reject
Last active
September 18, 2016 11:05
-
-
Save aweiteka/9027d8c999290f1c2a9ea88ca06cc202 to your computer and use it in GitHub Desktop.
Trust policy show output
But I like this and we really need it. Since we do not tell the user anything about the policy.conf right now, they have no idea how to review their policy.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
It might be good to show in hierarchy order.
Looking at your display I am not sure if Centos images would or would not requie signatures if pulled from docker.io?