The page has been translated by Gen AI.

Manage Repository

A repository is a logical management unit for images within a registry. By using a repository, you can set the default security policy for images generated underneath.

Create Repository

To create a repository, follow the steps below. ​

  1. All Services > Container > Container Registry Click the menu. Go to the Service Home page of Container Registry.
  2. Service Home page, click the Repository menu. Navigate to the Repository list page.
  3. Click the Repository List page’s Create Repository button. It navigates to the Create Repository page.
  • Repository list at the top of the page, click the Settings icon to select an existing registry, or click Create New to create a registry.
  1. Enter the required information on the Create Repository page and select the detailed options.
    • Service Information Input Enter or select the required information in the area.
      Category
      Required or not
      Detailed description
      Registry NameRequiredSelect the registry name to create the repository
      • If no registry has been created, you can create a new one via the Create New button
      Repository NameRequiredName of the repository to create
      • Enter 3 to 30 characters using lowercase English letters, numbers, and the special character (-) (the start and end must be lowercase English letters or numbers)
      Table. Repository Service Information Input Items
    • Repository Basic Policy Input Enter or select the required information in the area.
      Category
      Required
      Detailed description
      Image ScanOptionAutomatic scanning of image vulnerabilities generated in the repository and setting scan exclusion policies
      • Ability to set a default scan policy applied when an image is created in the repository
      • If automatic scanning is set to Enabled, the image’s vulnerabilities are automatically checked when the image is pushed. In this case, the vulnerability scanning cost is charged
      • If the scan exclusion policy is set to Enabled, you can specify the inspection targets and vulnerabilities to exclude during image scanning
        • Option to exclude Language Package checks, Secret checks, and vulnerabilities without a Fix Version
      • Excludable vulnerabilities: you can select one of the following levels
        • Exclude vulnerabilities at or below the (None / Unknown / Negligible / Low / Medium / High / Critical) level
      Image Pull RestrictionOptionPolicy settings for using the image Pull restriction feature generated in the repository and its limit values
      • You can set the default Pull restriction policy applied when an image is created in the repository
      • If you set the unscanned image Pull restriction to Enabled, pulling images that have not been vulnerability scanned is not allowed
      • If you set the vulnerable image Pull restriction policy to Enabled, pulling images is not allowed when Critical or High level vulnerabilities exceeding the entered value are found. The input and selectable values for this policy are as follows
        • Critical: 1 (default) ~ 9,999,999
        • High: 1 (default) ~ 9,999,999
        • Exclude vulnerabilities without a Fix Version
          • If Enabled is selected, vulnerabilities without a Fix Version (when there is no patch version for the vulnerable package/library) are excluded from the Pull restriction policy
      Image lock statusOptionYou can set a lock to prevent deleting or updating any images inside the repository
      • If the repository’s image lock status is Lock, the individual image Lock/Unlock functions within the repository are disabled
      • Changing the image lock status of a repository that is in Lock state to Unlock enables the individual image Lock/Unlock functions
      • Pushing new images is allowed
      Image Tag DeletionOptionYou can set an automatic image deletion policy for images stored in the repository
      • If you select Enabled for policy activation, the image deletion policy is applied
      • Untagged Image automatic deletion, Old Image automatic deletion items set to Enabled will apply the respective image deletion policies
      • Enter an automatic deletion period in the policy; the image will be automatically deleted after the specified period has passed since its initial push
      Table. Repository Basic Policy Input Items
    • Additional Information Input area, please enter or select the required information.
      Category
      Required or not
      Detailed description
      ExplanationSelectRepository description
      • Enter repository description
      TagSelectAdd Tag
      • Up to 50 can be added per resource
      • After clicking the Add Tag button, enter or select Key, Value values
      Table. Repository Additional Information Input Items
Reference
  • Repository default policy input items are used for the default (initial) policy settings of Images created in the Repository. (Acts as a policy setting template applied when creating an Image)
  • This setting can be changed on the detail view screen after creating a Repository, and from the Image created after changing the Repository default policy input items, it will be set to the changed policy. The Image policy created before the change will not be changed.
  • The default policy set on the Image can be modified in the Image detail screen.
  1. Summary Check the detailed information and estimated billing amount generated in the panel, and click the Create button.
    • When creation is complete, check the created resources on the Repository List page.

Check repository detailed information

Repository service can view and edit the full resource list and detailed information. Repository Detail page consists of Detailed Information, Tags, Work History tabs.

To view repository details, follow the steps below.

  1. All Services > Container > Container Registry Click the menu. Navigate to the Service Home page of Container Registry.
  2. Click the Repository menu on the Service Home page. Navigate to the Repository list page.
  3. Repository List page, click the resource (Repository) for which you want to view detailed information. You will be taken to the Repository Details page.
    • Repository Details page displays the repository’s status information and detailed information, and consists of Details, Tags, Activity History tabs.
      CategoryDetailed description
      Repository StatusDisplay repository status
      • Active: Available state
      • Deleting: Deleting state
      • Inactive: State not available due to failure during deletion (only deletion request possible)
      • Editing: State where settings are being modified or sub-resources (images, tags) within the image are being deleted
      User GuideRepository Usage Guide
      • Commands to use images within the repository via CLI can be checked
      Delete RepositoryButton to delete the repository
      Table. Status Information and Additional Functions

Detailed Information

Repository list page allows you to view detailed information of the selected resource and, if necessary, edit the information.

CategoryDetailed description
serviceservice name
Resource TypeResource Type
SRNUnique resource ID in Samsung Cloud Platform
  • In Repository, it means repository SRN
Resource NameResource Name
  • In Repository, it means repository name
Resource IDUnique resource ID in the service
CreatorUser who created the repository
Creation TimeRepository Creation Time
EditorUser who modified the repository
Modification Date/TimeRepository Modification Date/Time
Repository NameRepository name created by the user
Registry NameName of the registry to which the repository is connected
  • Click on the resource name to go to the detail page
DescriptionUser-entered description for the generated repository
  • Edit icon can be clicked to change settings
ImageLink to view list of stored images in repository
Image ScanAutomatic image vulnerability scanning generated in repository and scan exclusion policy settings
  • Set the default scan policy applied when an image is created in the repository (acts as a policy setting template applied at image creation)
  • Edit icon click to change automatic image vulnerability scan enablement, scan exclusion policy usage, and detailed policies
    • If automatic scanning is set to Enabled, the image’s vulnerabilities are automatically checked when the image is pushed. This setting applies only to images pushed after automatic scanning is enabled, and vulnerability checking costs are billed during automatic scanning.
    • If the scan exclusion policy is set to Enabled, you can specify inspection targets and vulnerabilities to exclude during image scanning as follows
      • Excludable inspection targets
        • Exclude Language Packages
        • Exclude Secrets
        • Exclude vulnerabilities without a Fix Version
      • Excludable vulnerabilities: select one of the following levels
        • Exclude vulnerabilities at or below (None / Unknown / Negligible / Low / Medium / High / Critical) level
Image Pull RestrictionPolicy settings for whether to use the image Pull restriction feature and its limit values for images generated in the repository
  • You can set the default Pull restriction policy applied when an image is created in the repository (acts as a policy setting template applied at image creation)
  • Click the Edit icon to change whether the image Pull restriction feature is used and its limit values
    • If you set the unscanned image Pull restriction to Enabled, pulling images that have not been vulnerability scanned is not allowed
    • If you set the vulnerable image Pull restriction to Enabled, pulling images is not allowed when Critical or High level vulnerabilities exceeding the entered value are found. The input and selectable values for this policy are as follows
      • Critical: 1(default) ~ 9,999,999
      • High: 1(default) ~ 9,999,999
      • Exclude vulnerabilities without a Fix Version
        • If Enabled is selected, vulnerabilities without a Fix Version (i.e., when there is no patch version for the vulnerable package/library) are excluded from the Pull restriction policy
Image lock statusLock can be set to prevent deleting or updating any images inside the repository
  • Click the Edit icon to change the image lock status
  • If the repository’s image lock status is Lock, the Lock/Unlock function for individual images within the repository is disabled
  • If the image lock status of a repository that is in Lock state is set to Unlock, the Lock/Unlock function for individual images becomes enabled
  • Pushing new images is allowed
Image Tag DeletionSet automatic deletion policy for images stored in the repository
  • Edit icon can be clicked to change the image tag deletion policy
  • If the deletion policy is set to Enabled, the image tag deletion policy can be applied
  • Select Enabled for the Untagged Image automatic deletion, Old Image automatic deletion items of the deletion policy to apply those image deletion policies
  • Enter the automatic deletion period in the deletion policy; the image will be automatically deleted after the set period has passed since it was first pushed
Table. Repository Detailed Information Tab Items

Tag

On the Repository list page, you can view the tag information of the selected resource, and you can add, modify, or delete it.

CategoryDetailed description
Tag ListTag List
  • You can view the Key and Value information of tags
  • Up to 50 tags can be added per resource
  • When entering tags, search and select from the previously created Key and Value list
Table. Repository Tag Tab Items

Work History

You can view the operation history of the selected resource on the Repository list page.

CategoryDetailed description
Work History ListResource Change History
  • Work date and time, resource type, resource name, work details, work result, operator name, path information can be checked
Table. Work History Tab Items

Delete Repository

Caution
If an Image exists in the Repository, you cannot delete the Repository. To delete the Repository, first delete all Images in that Repository, then delete the Repository.

To delete a repository, follow the steps below.

  1. All Services > Container > Container Registry Click the menu. Navigate to the Service Home page of Container Registry.
  2. On the Service Home page, click the Repository menu. Go to the Repository list page.
  3. Click the resource (Repository) for which you want to view detailed information on the Repository List page. You will be taken to the Repository Details page.
  4. On the Repository Details page, click Delete Repository.
  5. Delete Repository In the popup window, please enter the Repository name.
  6. If you enter the Repository name correctly, the Confirm button will be enabled. Click the Confirm button.
  7. If termination is completed, check on the Repository list page whether the resource has been terminated.
How-to guides
Image and Tag Management