Use the Web Interface to Find Images¶
Using a browser, you can browse a zot repository for container images and artifacts. The web interface also provides the commands for downloading an image using popular third-party tools.
If a zot registry is built with the optional zui
package, the registry has a web interface.
Access the registry¶
Depending on the security configuration of the zot registry, you might need to authenticate before being given access.
The initial page of the registry displays a sampling of the most popular images and recently updated images. To view all available images in the registry, click the View all
link in the upper right of the page to go to the /explore
page.
Wherever an image name appears, two icons follow the name, indicating the results of the vulnerability scan and the signature status. These icons are described in Icons and their meanings.
Find an image¶
To assist you in finding images specific to your requirements, the /explore
page provides several sorting options along with faceted navigation in addition to a general search box.
-
Sorting criteria include relevance, most recently updated, alphabetical, and most downloaded.
-
Navigation facets include operating system, CPU architecture, and signature status.
When you locate the desired image, click its tile.
Inspect the image properties¶
The OVERVIEW
tab of the initial image description page contains a brief description of the image along with several details, such as the repository URL, number of downloads, last published, size, and license type.
Click the TAGS
tab to view the available versions of the image.
Click the tag link of the desired version of the image. In the resulting page, you can view detailed information about the image, including its digest hash, and you can obtain a command to pull the image from the repository.
Tabs on this page provide the following information:
Tab | Description |
---|---|
LAYERS | The build command and the digest hash |
USES | A list of images used by this image |
USED BY | A list of images that use this image |
VULNERABILITIES | A list of known vulnerabilities |
From the LAYERS
tab, click Details
to view an example of the image build command and the layer's digest hash.
Pull an image¶
After opening the tag link of the desired image, click the Pull Image
drop-down list to display the available pull commands. Docker, podman, and skopeo image management tools are supported.
Select a tool and click the pages icon next to the command to copy the full command to your clipboard. An example of the pull command using podman is:
podman pull zothub.io/c3/debian/base-amd64:bullseye
Paste the pull command into your terminal to pull the image.
For information about using image management tools to pull images, see Push and Pull Image Content.
Adding Bookmarks¶
To mark an image so that it can be easily found later, click the bookmark icon on the image page. Bookmarked images appear in search queries when the Bookmarked option is enabled.
The bookmark icon before selection:
The bookmark icon after selection:
Icons and their meanings¶
These icons appear next to the image name, indicating the results of the vulnerability scan and the signature status.
Icon | Description |
---|---|
A vulnerability scan of the image found no vulnerabilities | |
A vulnerability scan of the image failed (See severity icon in VULNERABILITIES tab) | |
Critical severity | |
High severity | |
Medium severity | |
Low severity | |
The image signature is verified | |
The image signature is not verified | |
The image is not bookmarked by the user | |
The image is bookmarked by the user |