docker trust inspect --pretty google/apigee-mart-server:1.2.0Signatures for google/apigee-mart-server:1.2.0
SIGNED TAG DIGEST SIGNERSbeta2
a607b0e7acba41544e5db8e74b039e9314fdcfdc6f1acf73094d3179fc2af322 asf-admin
List of signers and their keys for google/apigee-mart-server:1.2.0
SIGNER KEYSasf-admin 7d4abdbb7bfd
Administrative keys for google/apigee-mart-server:1.2.0
Repository Key: 80f86b047965f6dec0c056b1938a7f8cfb894ba8014fba36a18d0923173d394a
Root Key: 6f2d60f90a0d78dd6254d3d47613a4dd6eb0880f83411e6f8b122b84dbef69ca
[[["わかりやすい","easyToUnderstand","thumb-up"],["問題の解決に役立った","solvedMyProblem","thumb-up"],["その他","otherUp","thumb-up"]],[["わかりにくい","hardToUnderstand","thumb-down"],["情報またはサンプルコードが不正確","incorrectInformationOrSampleCode","thumb-down"],["必要な情報 / サンプルがない","missingTheInformationSamplesINeed","thumb-down"],["翻訳に関する問題","translationIssue","thumb-down"],["その他","otherDown","thumb-down"]],["最終更新日 2025-08-30 UTC。"],[[["\u003cp\u003eApigee hybrid version 1.2 is end-of-life and should be upgraded to a newer version, as detailed in the supported versions documentation.\u003c/p\u003e\n"],["\u003cp\u003eAll Apigee hybrid runtime container images on Docker Hub are now signed using Docker Content Trust, allowing for verification of image integrity and publisher.\u003c/p\u003e\n"],["\u003cp\u003eSigned hybrid images can be downloaded using the \u003ccode\u003edocker pull\u003c/code\u003e command, with specific tags for each image, such as \u003ccode\u003e1.2.0\u003c/code\u003e for \u003ccode\u003eapigee-synchronizer\u003c/code\u003e.\u003c/p\u003e\n"],["\u003cp\u003eFor Kubernetes clusters without internet access, signed container images can be downloaded to a local container registry for deployment of hybrid runtime services.\u003c/p\u003e\n"],["\u003cp\u003eThe \u003ccode\u003edocker trust inspect\u003c/code\u003e command can be used to verify the signature of a container image, and will display information about the signer and their keys.\u003c/p\u003e\n"]]],[],null,["# Download signed images from Docker Hub\n\n| You are currently viewing version 1.2 of the Apigee hybrid documentation. **This version is end of life.** You should upgrade to a newer version. For more information, see [Supported versions](/apigee/docs/hybrid/supported-platforms#supported-versions).\n\n\nTo ensure the integrity of all runtime container images published and downloaded for production systems,\nimage signing support is now available for all Apigee hybrid images using Docker Hub. All hybrid runtime\nimages are publicly available for download from the [Google Docker Hub](https://hub.docker.com/u/google) account.\n\n\nHybrid images are signed with [Docker Content Trust](https://docs.docker.com/engine/security/trust/content_trust/), a feature that lets users verify the integrity and publisher of every image\nbuilt and running in a Docker registry. These signatures allow client-side or runtime verification\nof specific image tags against publisher keys, ensuring that the image is exactly what the publisher created and pushed for publication.\n\nDownload signed container images\n--------------------------------\n\nIf you are using a Kubernetes cluster without internet access to deploy your hybrid runtime services,\nyou will need to download the container images to a local container registry and then access the registry\nfrom your Kubernetes cluster.\n\n\nTo download a signed container image, you should have [Docker](https://docs.docker.com/get-started/)\ninstalled and use the `docker pull` command as follows. Be sure to append the correct tag\nto each image name. For example, the tag for `apigee-synchronizer` is `1.2.0`,\nas shown below.\n\nIstio images: \n\n```\ndocker pull google/apigee-istio-pilot:1.4.6\ndocker pull google/apigee-istio-kubectl:1.4.6\"\ndocker pull google/apigee-istio-galley:1.4.6\"\ndocker pull google/apigee-istio-node-agent-k8s:1.4.6\"\ndocker pull google/apigee-istio-proxyv2:1.4.6\"\ndocker pull google/apigee-istio-mixer:1.4.6\"\ndocker pull google/apigee-istio-citadel:1.4.6\"\ndocker pull google/apigee-istio-sidecar-injector:1.4.6\"\n```\n\nCert Manager images: \n\n```\ndocker pull google/apigee-cert-manager-controller:v0.12.0\"\ndocker pull google/apigee-cert-manager-webhook:v0.12.0\"\ndocker pull google/apigee-cert-manager-cainjector:v0.12.0\"\n```\n\nstack-driver images: \n\n```\ndocker pull google/apigee-stackdriver-logging-agent:1.6.8\"\ndocker pull google/apigee-stackdriver-prometheus-sidecar:0.7.1\"\n```\n\nPrometheus images: \n\n```\ndocker pull google/apigee-prom-prometheus:v2.9.2\n```\n\nKube-rbac-proxy images: \n\n```\ngoogle/apigee-kube-rbac-proxy:v0.4.1\n```\n\nApigee images: \n\n```\ndocker pull google/apigee-authn-authz:1.2.0\ndocker pull google/apigee-mart-server:1.2.0\ndocker pull google/apigee-synchronizer:1.2.0\ndocker pull google/apigee-runtime:1.2.0\ndocker pull google/apigee-hybrid-cassandra-client:1.2.0\ndocker pull google/apigee-hybrid-cassandra:1.2.0\ndocker pull google/apigee-cassandra-backup-utility:1.2.0\ndocker pull google/apigee-udca:1.2.0\ndocker pull google/apigee-connect-agent:1.2.0\ndocker pull google/apigee-operators:1.2.0\n```\n\nVerify container image signer and signatures\n--------------------------------------------\n\n\nTo verify that an image has been signed, run the following command: \n\n```\ndocker trust inspect --pretty $IMAGE_NAME:$IMAGE_TAG\n```\n\n\nThe output of this command will let you know whether the tagged image is signed, the name of the signers,\nand a list of signers and keys. For example: \n\n docker trust inspect --pretty google/apigee-mart-server:1.2.0\n\n Signatures for google/apigee-mart-server:1.2.0\n SIGNED TAG DIGEST SIGNERSbeta2\n a607b0e7acba41544e5db8e74b039e9314fdcfdc6f1acf73094d3179fc2af322 asf-admin\n List of signers and their keys for google/apigee-mart-server:1.2.0\n SIGNER KEYSasf-admin 7d4abdbb7bfd\n Administrative keys for google/apigee-mart-server:1.2.0\n Repository Key: 80f86b047965f6dec0c056b1938a7f8cfb894ba8014fba36a18d0923173d394a\n Root Key: 6f2d60f90a0d78dd6254d3d47613a4dd6eb0880f83411e6f8b122b84dbef69ca"]]