The page has been translated by Gen AI.

Managing Repository

The repository is a logical management unit of images within the registry. Using a repository allows you to set the default security policy for images created below it.

Create a repository

To create a repository, follow the following procedure.

  1. All services > Container > Container Registry menu is clicked. It moves to the Service Home page of Container Registry.
  2. Service Home page, click the Repository menu. It moves to the Repository list page.
  3. Repository list page, click the Create Repository button. Move to the Create Repository page.
  • Repository list page top, click the Settings icon to select an existing registry, or click Create new to create a registry.
  1. Repository creation page where you enter the necessary information and select detailed options.
  • Service Information Input area, please enter or select the required information.
    Classification
    Mandatory
    Detailed Description
    RegistryRequiredSelect the registry name to create the repository
    • If no registry is created, it can be newly created through the New Creation button
    Repository NameRequiredName of the repository to be created
    • Enter 3-30 characters using lowercase English letters, numbers, and special characters (-) (only lowercase English letters and numbers are allowed at the beginning and end)
    Table. Repository Essential Information Input Items
  • Repository basic policy input area, please enter or select the required information.
    Classification
    Mandatory
    Detailed Description
    Image ScanOptionsRepository-generated image vulnerability automatic scan and scan exclusion policy setting
    • The default scan policy that can be applied when an image is created in the repository can be set
    • If auto-scan is set to use, the vulnerability of the image is automatically checked when the image is pushed, and the vulnerability check cost is charged
    • If the scan exclusion policy is set to use, you can specify the inspection target and vulnerability to be excluded from the image scan as follows
      • Exclusion setting possible inspection targets
        • Language Package inspection exclusion
        • Secret inspection exclusion
        • Exclusion of vulnerabilities without Fix Version
      • Exclusion setting possible vulnerabilities: one of the following levels can be selected
        • (None / Unknown / Negligible / Low / Medium / High / Critical) level or lower vulnerabilities are excluded
    Image Pull LimitOptionPolicy setting for the image Pull limit function used in the repository and the limited value
    • The default Pull limit policy that can be applied when an image is created in the repository can be set
    • If the unscanned image Pull limit is set to use, Pull of unscanned images for vulnerability checking is not allowed
    • If the vulnerable image Pull limit policy is set to use, Pull of images with Critical or High level vulnerabilities exceeding the entered value is not allowed. The values that can be entered and selected in this policy are as follows
      • Critical: 1(default) ~ 9,999,999
      • High: 1(default) ~ 9,999,999
      • Excluding vulnerabilities without Fix Version
        • If use is selected, vulnerabilities without Fix Version (when there is no patch version for vulnerable packages/libraries) are excluded from the Pull limit policy
    Image Lock StatusOptionYou can set a lock to prevent all images in the repository from being deleted or updated
    • If the image lock status of the repository is Lock, the Lock/Unlock function of individual images in the repository is deactivated
    • If the lock status of the repository’s image lock status is changed to Unlock, the Lock/Unlock function of individual images is activated
    • New image Push is possible
    Image tag deletionOptionYou can set an automatic image deletion policy stored in the repository
    • Selecting Use for deletion policy activation applies the image deletion policy
    • Selecting Untagged Image automatic deletion and Old Image automatic deletion as Use applies the corresponding image deletion policy
    • Enter the automatic deletion period for the deletion policy, and the image will be automatically deleted after the set period has passed since it was first pushed
    Table. Repository Basic Policy Input Items
  • Additional Information Input area, please enter or select the required information.
    Classification
    Mandatory
    Detailed Description
    DescriptionSelectionRepository Description
    • Enter the repository description
    TagSelectionAdd Tag
    • Up to 50 can be added per resource
    • Click the Add Tag button and enter or select Key, Value
    Table. Input items for adding repository information
Reference
  • Repository basic policy input items are used to set the default (initial) policy for the Image created in the Repository. (It plays the role of a policy setting template applied when creating an Image)
  • This setting can be changed in the detailed view screen after creating the Repository, and the changed policy will be applied to the Image created after changing the Repository basic policy input item. The policy of the Image created before the change will not be changed.
  • The default policy set for the Image can be modified in the Image detail screen.
  1. Summary panel, review the detailed information generated and the estimated billing amount, and click the Complete button.
  • Once creation is complete, check the created resource on the Repository list page.

Repository detailed information check

Repository 서비스는 전체 자원 목록과 상세 정보를 확인하고 수정할 수 있습니다. Repository details 페이지에서는 details, tags, work history 탭으로 구성되어 있습니다.

To check the repository details, follow the next procedure.

  1. All services > Container > Container Registry menu is clicked. It moves to the Service Home page of Container Registry.
  2. Service Home page, click the Repository menu. It moves to the Repository list page.
  3. Repository list page, click on the resource (Repository) to check the detailed information. It moves to the Repository details page.
  • Repository details page displays the status information and detailed information of the Repository, and consists of details, tags, work history tabs.
    ClassificationDetailed Description
    Repository StatusExpresses the status of the repository
    • Active: Available status
    • Deleting: Being deleted status
    • Inactive: Failed to delete and unavailable status (only deletion request is possible)
    • Editing: Settings are being modified or sub-resources (images, tags) within the image are being deleted
    Usage GuideRepository Usage Guide
    • CLI-based commands to use images within the repository can be checked
    Repository DeleteButton to delete the repository
    Table. Status Information and Additional Functions

Detailed Information

Repository list page where you can check the detailed information of the selected resource and modify the information if necessary.

ClassificationDetailed Description
ServiceService Name
Resource TypeResource Type
SRNUnique resource ID in Samsung Cloud Platform
  • In Repository, it means the repository SRN
Resource NameResource Name
  • In Repository, it means the name of the repository
Resource IDUnique resource ID in the service
CreatorThe user who created the repository
Creation TimeRepository Creation Time
EditorThe user who modified the repository
Revision TimeRepository Revision Time
Repository NameThe repository name created by the user
Imagelink to view the list of images stored in the repository
DescriptionThe description that the user entered for the created repository
Image ScanRepository-generated image vulnerability automatic scan and scan exclusion policy setting
  • Set the default scan policy applied when an image is created in the repository (policy setting template role applied when creating an image)
  • Click the Edit button to change the image vulnerability automatic scan and scan exclusion policy usage and detailed policy
    • If automatic scanning is set to Use, the vulnerability of the image is automatically checked when the image is Pushed. This setting is applied from the image pushed after setting the automatic scan to use, and the vulnerability check cost is charged during automatic scanning
    • If the scan exclusion policy is set to Use, you can specify the inspection target and vulnerability to be excluded during image scanning as follows
      • Exclusion setting possible inspection targets
        • Language Package exclusion
        • Secret exclusion
        • Exclusion of vulnerabilities without Fix Version
      • Exclusion setting possible vulnerabilities: One of the following levels can be selected
        • Exclude vulnerabilities with a level of (None / Unknown / Negligible / Low / Medium / High / Critical) or lower
Image Pull LimitPolicy setting for the image Pull limit function used in the repository and the limited value
  • The default Pull limit policy that can be applied when an image is created in the repository can be set (policy setting template role applied when creating an image)
  • The Modify button can be clicked to change the image Pull limit function usage and limited value
    • If the unscanned image Pull limit is set to Use, Pull of unscanned images for vulnerability checking is not allowed
    • If the vulnerable image Pull limit is set to Use, Pull of images with Critical or High level vulnerabilities exceeding the entered value is not allowed; the input and selectable values in this policy are as follows
      • Critical: 1(default) ~ 9,999,999
      • High: 1(default) ~ 9,999,999
      • Excluding vulnerabilities without Fix Version
        • If Use is selected, vulnerabilities without Fix Version (no patch version for vulnerable packages/libraries) are excluded from the Pull limit policy
Image LockSet lock to prevent deletion or update of all images within the repository
  • Modify button can be clicked to change the image lock
  • If the image lock of the repository is Lock, the Lock/Unlock function of individual images within the repository is deactivated
  • If the image lock of the repository in the Lock state is changed to Unlock, the Lock/Unlock function of individual images is activated
  • New image Push is possible
Image Tag DeletionSet the automatic image deletion policy stored in the repository
  • Modify button can be clicked to change the image tag deletion policy
  • If the deletion policy is set to Use, the image tag deletion policy can be applied
  • If Untagged Image Auto Deletion and Old Image Auto Deletion items of the deletion policy are selected as Use, the corresponding image deletion policy is applied
  • Enter the automatic deletion period in the deletion policy, and the image will be automatically deleted after the set period has passed since it was first pushed
Table. Repository detailed information items

Tag

Repository list page where you can check the tag information of the selected resource, and add, change or delete it.

ClassificationDetailed Description
Tag ListTag list
  • Check Key, Value information of the tag
  • Up to 50 tags can be added per resource
  • Search and select from existing Key and Value lists when entering tags
Fig. Repository tag tab items

Work History

Repository list page where you can check the work history of the selected resource.

ClassificationDetailed Description
work history listresource change history
  • work time, resource type, resource name, work details, work result, worker name, path information can be checked
Table. Work history tab detailed information items

Delete repository

To delete a Repository, follow the following procedure.

  1. All services > Container > Container Registry menu is clicked. It moves to the Service Home page of Container Registry.
  2. Service Home page, click the Repository menu. It moves to the Repository list page.
  3. Repository list page, click on the resource (Repository) to check the detailed information. It moves to the Repository details page.
  4. Repository details page, click Delete Repository.
  5. Repository deletion popup window where you enter the Repository name.
  6. Repository name has been entered correctly, then the Confirm button will be activated. Click the Confirm button.
  7. Once the cancellation is complete, check if the resource has been cancelled on the Repository list page.
Caution
Repository 내 Image가 존재하면 Repository를 삭제할 수 없습니다. Repository를 삭제하려면 해당 Repository 내 모든 Image를 먼저 삭제한 후, Repository를 삭제하세요. -> If an Image exists in the Repository, you cannot delete the Repository. To delete the Repository, delete all Images in the Repository first, then delete the Repository.
How-to guides
Managing Images and Tags