1
0
Fork 0
mirror of https://github.com/moby/moby.git synced 2022-11-09 12:21:53 -05:00
moby--moby/docs/sources/docker-hub/repos.md
Mary Anthony 29d01b7dde Removing sudo from command line examples
We now advise people to configure docker group and
add to sudo.  Mac shouldn't use sudo.  Removed sudo
from command examples.  Left in installation to be removed
in installation doc sweep -- removing requires finer
grain control.

Signed-off-by: Mary Anthony <mary@docker.com>
2015-03-26 11:12:37 -07:00

7.2 KiB

page_title: Repositories and Images on Docker Hub page_description: Repositories and Images on Docker Hub page_keywords: Docker, docker, registry, accounts, plans, Dockerfile, Docker Hub, webhooks, docs, documentation

Repositories and Images on Docker Hub

repositories

Searching for repositories and images

You can search for all the publicly available repositories and images using Docker.

$ docker search ubuntu

This will show you a list of the currently available repositories on the Docker Hub which match the provided keyword.

If a repository is private it won't be listed on the repository search results. To see repository statuses, you can look at your profile page on Docker Hub.

Repositories

Your Docker Hub repositories have a number of useful features.

Stars

Your repositories can be starred and you can star repositories in return. Stars are a way to show that you like a repository. They are also an easy way of bookmarking your favorites.

Comments

You can interact with other members of the Docker community and maintainers by leaving comments on repositories. If you find any comments that are not appropriate, you can flag them for review.

Collaborators and their role

A collaborator is someone you want to give access to a private repository. Once designated, they can push and pull to your repositories. They will not be allowed to perform any administrative tasks such as deleting the repository or changing its status from private to public.

Note: A collaborator cannot add other collaborators. Only the owner of the repository has administrative access.

You can also collaborate on Docker Hub with organizations and groups. You can read more about that here.

Official Repositories

The Docker Hub contains a number of official repositories. These are certified repositories from vendors and contributors to Docker. They contain Docker images from vendors like Canonical, Oracle, and Red Hat that you can use to build applications and services.

If you use Official Repositories you know you're using a supported, optimized and up-to-date image to power your applications.

Note: If you would like to contribute an official repository for your organization, product or team you can see more information here.

Private Repositories

Private repositories allow you to have repositories that contain images that you want to keep private, either to your own account or within an organization or group.

To work with a private repository on Docker Hub, you will need to add one via the Add Repository link. You get one private repository for free with your Docker Hub account. If you need more accounts you can upgrade your Docker Hub plan.

Once the private repository is created, you can push and pull images to and from it using Docker.

Note: You need to be signed in and have access to work with a private repository.

Private repositories are just like public ones. However, it isn't possible to browse them or search their content on the public registry. They do not get cached the same way as a public repository either.

It is possible to give access to a private repository to those whom you designate (i.e., collaborators) from its Settings page. From there, you can also switch repository status (public to private, or vice-versa). You will need to have an available private repository slot open before you can do such a switch. If you don't have any available, you can always upgrade your Docker Hub plan.

Webhooks

You can configure webhooks for your repositories on the Repository Settings page. A webhook is called only after a successful push is made. The webhook calls are HTTP POST requests with a JSON payload similar to the example shown below.

Example webhook JSON payload:

{
  "callback_url": "https://registry.hub.docker.com/u/svendowideit/busybox/hook/2141bc0cdec4hebec411i4c1g40242eg110020/",
  "push_data": {
    "images": [
        "27d47432a69bca5f2700e4dff7de0388ed65f9d3fb1ec645e2bc24c223dc1cc3",
        "51a9c7c1f8bb2fa19bcd09789a34e63f35abb80044bc10196e304f6634cc582c",
        ...
    ],
    "pushed_at": 1.417566822e+09,
    "pusher": "svendowideit"
  },
  "repository": {
    "comment_count": 0,
    "date_created": 1.417566665e+09,
    "description": "",
    "full_description": "webhook triggered from a 'docker push'",
    "is_official": false,
    "is_private": false,
    "is_trusted": false,
    "name": "busybox",
    "namespace": "svendowideit",
    "owner": "svendowideit",
    "repo_name": "svendowideit/busybox",
    "repo_url": "https://registry.hub.docker.com/u/svendowideit/busybox/",
    "star_count": 0,
    "status": "Active"
}

Webhooks allow you to notify people, services and other applications of new updates to your images and repositories. To get started adding webhooks, go to the desired repository in the Hub, and click "Webhooks" under the "Settings" box.

Note: For testing, you can try an HTTP request tool like requestb.in.

Note

: The Docker Hub servers are currently in the IP range 162.242.195.64 - 162.242.195.127, so you can restrict your webhooks to accept webhook requests from that set of IP addresses.

Webhook chains

Webhook chains allow you to chain calls to multiple services. For example, you can use this to trigger a deployment of your container only after it has been successfully tested, then update a separate Changelog once the deployment is complete. After clicking the "Add webhook" button, simply add as many URLs as necessary in your chain.

The first webhook in a chain will be called after a successful push. Subsequent URLs will be contacted after the callback has been validated.

Validating a callback

In order to validate a callback in a webhook chain, you need to

  1. Retrieve the callback_url value in the request's JSON payload.
  2. Send a POST request to this URL containing a valid JSON body.

Note

: A chain request will only be considered complete once the last callback has been validated.

To help you debug or simply view the results of your webhook(s), view the "History" of the webhook available on its settings page.

Callback JSON data

The following parameters are recognized in callback data:

  • state (required): Accepted values are success, failure and error. If the state isn't success, the webhook chain will be interrupted.
  • description: A string containing miscellaneous information that will be available on the Docker Hub. Maximum 255 characters.
  • context: A string containing the context of the operation. Can be retrieved from the Docker Hub. Maximum 100 characters.
  • target_url: The URL where the results of the operation can be found. Can be retrieved on the Docker Hub.

Example callback payload:

{
  "state": "success",
  "description": "387 tests PASSED",
  "context": "Continuous integration by Acme CI",
  "target_url": "http://ci.acme.com/results/afd339c1c3d27"
}