1skopeo-delete(1)() skopeo-delete(1)()
2
3
4
6 skopeo-delete - Mark the image-name for later deletion by the reg‐
7 istry's garbage collector.
8
9
11 skopeo delete [options] image-name
12
13
15 Mark image-name for deletion. The effect of this is registry-specific;
16 many registries don’t support this operation, or don’t allow it in some
17 circumstances / configurations.
18
19
20 WARNING: If image-name contains a digest, this affects the referenced
21 manifest, and may delete all tags (within the current repository?)
22 pointing to that manifest.
23
24
25 WARNING: If image-name contains a tag (but not a digest), in the cur‐
26 rent version of Skopeo this resolves the tag into a digest, and then
27 deletes the manifest by digest, as described above (possibly deleting
28 all tags pointing to that manifest, not just the provided tag). This
29 behavior may change in the future.
30
31
32 When using the github.com/distribution/distribution registry server: To
33 release the allocated disk space, you must login to the container reg‐
34 istry server and execute the container registry garbage collector.
35 E.g.,
36
37
38 /usr/bin/registry garbage-collect /etc/docker-distribution/registry/config.yml
39
40
41
42 Note: sometimes the config.yml is stored in /etc/docker/registry/con‐
43 fig.yml
44
45
46 If you are running the container registry inside of a container you
47 would execute something like:
48
49
50 $ docker exec -it registry /usr/bin/registry garbage-collect /etc/docker-distribution/registry/config.yml
51
52
53
55 --authfile path
56
57
58 Path of the authentication file. Default is ${XDG_RUNTIME_DIR}/contain‐
59 ers/auth.json, which is set using skopeo login. If the authorization
60 state is not found there, $HOME/.docker/config.json is checked, which
61 is set using docker login.
62
63
64 --creds username[:password]
65
66
67 Credentials for accessing the registry.
68
69
70 --cert-dir path
71
72
73 Use certificates at path (*.crt, *.cert, *.key) to connect to the reg‐
74 istry.
75
76
77 --daemon-host host
78
79
80 Use docker daemon host at host (docker-daemon: transport only)
81
82
83 --help, -h
84
85
86 Print usage statement
87
88
89 --no-creds
90
91
92 Access the registry anonymously.
93
94
95 Additionally, the registry must allow deletions by setting REG‐
96 ISTRY_STORAGE_DELETE_ENABLED=true for the registry daemon.
97
98
99 --registry-token token
100
101
102 Bearer token for accessing the registry.
103
104
105 --retry-times
106
107
108 The number of times to retry. Retry wait time will be exponentially in‐
109 creased based on the number of failed attempts.
110
111
112 --shared-blob-dir directory
113
114
115 Directory to use to share blobs across OCI repositories.
116
117
118 --tls-verify=bool
119
120
121 Require HTTPS and verify certificates when talking to the container
122 registry or daemon. Default to registry.conf setting.
123
124
125 --username
126
127
128 The username to access the registry.
129
130
131 --password
132
133
134 The password to access the registry.
135
136
138 Mark image example/pause for deletion from the registry.example.com
139 registry:
140
141
142 $ skopeo delete docker://registry.example.com/example/pause:latest
143
144
145
146 See above for additional details on using the command delete.
147
148
150 skopeo(1), skopeo-login(1), docker-login(1), containers-auth.json(5)
151
152
154 Antonio Murdaca runcom@redhat.com ⟨mailto:runcom@redhat.com⟩, Miloslav
155 Trmac mitr@redhat.com ⟨mailto:mitr@redhat.com⟩, Jhon Honce jhonce@red‐
156 hat.com ⟨mailto:jhonce@redhat.com⟩
157
158
159
160 skopeo-delete(1)()