1skopeo-delete(1)() skopeo-delete(1)()
2
3
4
6 skopeo-delete - Mark the image-name for later deletion by the reg‐
7 istry's garbage collector.
8
9
11 skopeo delete [options] image-name
12
13
15 Mark image-name for deletion. The effect of this is registry-specific;
16 many registries don’t support this operation, or don’t allow it in some
17 circumstances / configurations.
18
19
20 WARNING: If image-name contains a digest, this affects the referenced
21 manifest, and may delete all tags (within the current repository?)
22 pointing to that manifest.
23
24
25 WARNING: If image-name contains a tag (but not a digest), in the cur‐
26 rent version of Skopeo this resolves the tag into a digest, and then
27 deletes the manifest by digest, as described above (possibly deleting
28 all tags pointing to that manifest, not just the provided tag). This
29 behavior may change in the future.
30
31
32 When using the github.com/distribution/distribution registry server: To
33 release the allocated disk space, you must login to the container reg‐
34 istry server and execute the container registry garbage collector.
35 E.g.,
36
37 /usr/bin/registry garbage-collect /etc/docker-distribution/registry/config.yml
38
39
40
41 Note: sometimes the config.yml is stored in /etc/docker/registry/con‐
42 fig.yml
43
44
45 If you are running the container registry inside of a container you
46 would execute something like:
47
48 $ docker exec -it registry /usr/bin/registry garbage-collect /etc/docker-distribution/registry/config.yml
49
50
51
53 See also skopeo(1) for options placed before the subcommand name.
54
55
56 --authfile path
57
58
59 Path of the authentication file. Default is ${XDG_RUNTIME_DIR}/contain‐
60 ers/auth.json, which is set using skopeo login. If the authorization
61 state is not found there, $HOME/.docker/config.json is checked, which
62 is set using docker login.
63
64
65 --creds username[:password]
66
67
68 Credentials for accessing the registry.
69
70
71 --cert-dir path
72
73
74 Use certificates at path (*.crt, *.cert, *.key) to connect to the reg‐
75 istry.
76
77
78 --daemon-host host
79
80
81 Use docker daemon host at host (docker-daemon: transport only)
82
83
84 --help, -h
85
86
87 Print usage statement
88
89
90 --no-creds
91
92
93 Access the registry anonymously.
94
95
96 Additionally, the registry must allow deletions by setting REG‐
97 ISTRY_STORAGE_DELETE_ENABLED=true for the registry daemon.
98
99
100 --registry-token token
101
102
103 Bearer token for accessing the registry.
104
105
106 --retry-times
107
108
109 The number of times to retry. Retry wait time will be exponentially in‐
110 creased based on the number of failed attempts.
111
112
113 --shared-blob-dir directory
114
115
116 Directory to use to share blobs across OCI repositories.
117
118
119 --tls-verify=bool
120
121
122 Require HTTPS and verify certificates when talking to the container
123 registry or daemon. Default to registry.conf setting.
124
125
126 --username
127
128
129 The username to access the registry.
130
131
132 --password
133
134
135 The password to access the registry.
136
137
139 Mark image example/pause for deletion from the registry.example.com
140 registry:
141
142 $ skopeo delete docker://registry.example.com/example/pause:latest
143
144
145
146 See above for additional details on using the command delete.
147
148
150 skopeo(1), skopeo-login(1), docker-login(1), containers-auth.json(5)
151
152
154 Antonio Murdaca runcom@redhat.com ⟨mailto:runcom@redhat.com⟩, Miloslav
155 Trmac mitr@redhat.com ⟨mailto:mitr@redhat.com⟩, Jhon Honce jhonce@red‐
156 hat.com ⟨mailto:jhonce@redhat.com⟩
157
158
159
160 skopeo-delete(1)()