Provided by: golang-github-containers-image_5.29.2-2_all bug

NAME

       containers-auth.json - syntax for the registry authentication file

DESCRIPTION

       A  file  in  JSON  format  controlling  authentication  against  container image registries.  The primary
       (read/write) file is stored at ${XDG_RUNTIME_DIR}/containers/auth.json on Linux; on Windows and macOS, at
       $HOME/.config/containers/auth.json.

       When searching for the credential for a registry, the following files will be read in sequence until  the
       valid credential is found: first reading the primary (read/write) file, or the explicit override using an
       option  of  the  calling  application.   If  credentials  are  not present there, the search continues in
       ${XDG_CONFIG_HOME}/containers/auth.json             (usually             ~/.config/containers/auth.json),
       $HOME/.docker/config.json, $HOME/.dockercfg.

       Except  for  the primary (read/write) file, other files are read-only unless the user, using an option of
       the calling application, explicitly points at it as an override.

FORMAT

       The auth.json file stores, or references, credentials that allow the user to  authenticate  to  container
       image registries.  It is primarily managed by a login command from a container tool such as podman login,
       buildah login, or skopeo login.

       Each  entry  contains  a single hostname (e.g., docker.io) or a namespace (e.g., quay.io/user/image) as a
       key, and credentials in the form of a base64-encoded string as value of auth. The  base64-encoded  string
       contains a concatenation of the username, a colon, and the password.

       When checking for available credentials, the relevant repository is matched against available keys in its
       hierarchical  order,  going  from  most-specific  to  least-specific.  For example, an image pull for my-
       registry.local/namespace/user/image:latest will result in a lookup in auth.json in the following order:

              • my-registry.local/namespace/user/imagemy-registry.local/namespace/usermy-registry.local/namespacemy-registry.local

       This way it is possible to setup multiple credentials for a single registry which can be distinguished by
       their path.

       The following example shows the values found in auth.json after the user logged in to their  accounts  on
       quay.io and docker.io:

       {
            "auths": {
                 "docker.io": {
                      "auth": "erfi7sYi89234xJUqaqxgmzcnQ2rRFWM5aJX0EC="
                 },
                 "quay.io": {
                      "auth": "juQAqGmz5eR1ipzx8Evn6KGdw8fEa1w5MWczmgY="
                 }
            }
       }

       This  example  demonstrates  how to use multiple paths for a single registry, while preserving a fallback
       for my-registry.local:

       {
            "auths": {
                 "my-registry.local/foo/bar/image": {
                      "auth": "…"
                 },
                 "my-registry.local/foo": {
                      "auth": "…"
                 },
                 "my-registry.local": {
                      "auth": "…"
                 },
            }
       }

       An entry can be removed by using a logout command from a container tool such as podman logout or  buildah
       logout.

       In  addition,  credential  helpers  can be configured for specific registries, and the credentials-helper
       software can be used to manage the credentials more securely than storing only base64-encoded credentials
       in auth.json.

       When the credential helper is in use on a Linux platform, the auth.json  file  would  contain  keys  that
       specify  the  registry  domain, and values that specify the suffix of the program to use (i.e. everything
       after docker-credential-).  For example:

       {
           "auths": {
               "localhost:5001": {}
           },
           "credHelpers": {
                 "registry.example.com": "secretservice"
            }
       }

       For more information on credential helpers, please reference the GitHub docker-credential-helpers project
       ⟨https://github.com/docker/docker-credential-helpers/releases⟩.

SEE ALSO

       buildah-login(1), buildah-logout(1), podman-login(1), podman-logout(1), skopeo-login(1), skopeo-logout(1)

HISTORY

       Feb 2020, Originally compiled by Tom Sweeney tsweeney@redhat.commailto:tsweeney@redhat.comcontainers-auth.json(5)