Manage images as OCI image layout
OCI image layout is a directory structure that contains files and folders that refer to an OCI image. OCI image layout is defined in OCI image spec. Using OCI image layout, you can sign images on local disk before pushing them to the remote registry.
Important
This feature is experimental. It is not recommended for production use.Create OCI image layout for an image
Use docker buildx build
with the --output type=oci
flag to create an OCI image layout for an image.
For example, create a Dockerfile with the following content:
Use docker buildx create
and docker buildx build
to create an OCI image layout for the image defined in the Dockerfile.
The above example sets output=hello-world.tar
to save the OCI image layout as a tar file named hello-world.tar
. To view the OCI image layout as a directory structure, extract the tar file.
Important
You must extract the tar file before you can sign an image as an OCI image layout.Sign an image as an OCI image layout
To sign an existing image as an OCI image layout, enable the NOTATION_EXPERIMENTAL
environment variable and use the notation sign
command with the --oci-layout
flag. The following example enables the NOTATION_EXPERIMENTAL
environment variable, creates a self-signed certificate, and signs the image hello-world:v1
as an OCI image layout.
Note
Signatures are stored in the same OCI image layout directory, and associated with OCI image.Use notation list --oci-layout
to list signatures associated with an OCI image layout.
Verify an image as an OCI image layout
You can verify an image as an OCI image layout using notation verify --scope
and setting registryScopes
in your trust policy. For example, the following trust policy has registryScopes
set to local/hello-world
:
The following command imports permissive-trustpolicy.json
:
Use notation verify
with --scope
set to the same value you set in your trust policy to verify the image against signatures:
Push an OCI image layout to a remote registry
You can push an image to a remote registry as an OCI image layout on local disk using the oras CLI.
If you need a remote registry, you can create and run an OCI-compatible registry on your development computer using the distribution/distribution with the image deletion enabled. The following command creates a registry that is accessible at localhost:5001
.
Use oras cp
to push the OCI image layout to the remote registry. For example:
Important
You must use the flag-r
so that the signatures are copied together with the image.
Use notation list
and notation verify
to list and verify the image signatures. For example:
OCI-compliant registries
For a full list of OCI-compliant registries compatible with notation
, see OCI-compliant registries.