2020-06-23 00:09:42 +05:30
---
stage: Package
group: Package
info: To determine the technical writer assigned to the Stage/Group associated with this page, see https://about.gitlab.com/handbook/engineering/ux/technical-writing/#designated-technical-writers
---
2019-12-04 20:38:33 +05:30
# GitLab Container Registry
2020-03-13 15:44:24 +05:30
> - [Introduced](https://gitlab.com/gitlab-org/gitlab-foss/-/merge_requests/4040) in GitLab 8.8.
2019-12-04 20:38:33 +05:30
> - Docker Registry manifest `v1` support was added in GitLab 8.9 to support Docker
> versions earlier than 1.10.
> - Starting from GitLab 8.12, if you have 2FA enabled in your account, you need
> to pass a [personal access token](../../profile/personal_access_tokens.md) instead of your password in order to
> login to GitLab's Container Registry.
> - Multiple level image names support was added in GitLab 9.1.
2020-04-22 19:07:51 +05:30
> - The group level Container Registry was [introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/23315) in GitLab 12.10.
2020-05-24 23:13:21 +05:30
> - Searching by image repository name was [introduced](https://gitlab.com/gitlab-org/gitlab/-/merge_requests/31322) in GitLab 13.0.
2019-12-04 20:38:33 +05:30
NOTE: **Note:**
This document is the user guide. To learn how to enable GitLab Container
Registry across your GitLab instance, visit the
[administrator documentation ](../../../administration/packages/container_registry.md ).
With the Docker Container Registry integrated into GitLab, every project can
have its own space to store its Docker images.
You can read more about Docker Registry at < https: / / docs . docker . com / registry / introduction / > .
2020-06-23 00:09:42 +05:30
![Container Registry repositories ](img/container_registry_repositories_v13_1.png )
2020-04-22 19:07:51 +05:30
2019-12-04 20:38:33 +05:30
## Enable the Container Registry for your project
2020-03-13 15:44:24 +05:30
CAUTION: **Warning:**
The Container Registry follows the visibility settings of the project. If the project is public, so is the Container Registry.
2020-05-24 23:13:21 +05:30
If you cannot find the **Packages & Registries > Container Registry** entry under your
2019-12-04 20:38:33 +05:30
project's sidebar, it is not enabled in your GitLab instance. Ask your
administrator to enable GitLab Container Registry following the
[administration documentation ](../../../administration/packages/container_registry.md ).
If you are using GitLab.com, this is enabled by default so you can start using
the Registry immediately. Currently there is a soft (10GB) size restriction for
Registry on GitLab.com, as part of the [repository size limit ](../../project/repository/index.md ).
Once enabled for your GitLab instance, to enable Container Registry for your
project:
1. Go to your project's **Settings > General** page.
1. Expand the **Visibility, project features, permissions** section
and enable the **Container Registry** feature on your project. For new
projects this might be enabled by default. For existing projects
(prior GitLab 8.8), you will have to explicitly enable it.
1. Press **Save changes** for the changes to take effect. You should now be able
2020-05-24 23:13:21 +05:30
to see the **Packages & Registries > Container Registry** link in the sidebar.
2019-12-04 20:38:33 +05:30
2020-03-13 15:44:24 +05:30
## Control Container Registry from within GitLab
2020-04-22 19:07:51 +05:30
GitLab offers a simple Container Registry management panel. This management panel is available
for both projects and groups.
### Control Container Registry for your project
2020-05-24 23:13:21 +05:30
Navigate to your project's ** {package}** **Packages & Registries > Container Registry** .
2020-04-22 19:07:51 +05:30
2020-06-23 00:09:42 +05:30
![Container Registry project repositories ](img/container_registry_repositories_with_quickstart_v13_1.png )
2020-04-22 19:07:51 +05:30
This view will:
- Show all the image repositories that belong to the project.
2020-05-24 23:13:21 +05:30
- Allow you to filter image repositories by their name.
2020-04-22 19:07:51 +05:30
- Allow you to [delete ](#delete-images-from-within-gitlab ) one or more image repository.
- Allow you to navigate to the image repository details page.
- Show a **Quick start** dropdown with the most common commands to log in, build and push
- Optionally, a banner will be visible if the [expiration policy ](#expiration-policy ) is enabled for this project.
### Control Container Registry for your group
2020-05-24 23:13:21 +05:30
Navigate to your groups's ** {package}** **Packages & Registries > Container Registry** .
2020-04-22 19:07:51 +05:30
2020-06-23 00:09:42 +05:30
![Container Registry group repositories ](img/container_registry_group_repositories_v13_1.png )
2020-04-22 19:07:51 +05:30
This view will:
- Show all the image repositories of the projects that belong to this group.
- Allow to [delete ](#delete-images-from-within-gitlab ) one or more image repositories.
- Allow to navigate to a specific image repository details page.
### Image Repository details page
2020-03-13 15:44:24 +05:30
2020-04-22 19:07:51 +05:30
Clicking on the name of any image repository will navigate to the details.
2020-05-24 23:13:21 +05:30
![Container Registry project repository details ](img/container_registry_repository_details_v13.0.png )
2020-04-22 19:07:51 +05:30
NOTE: **Note:**
The following page has the same functionalities both in the **Group level container registry**
and in the **Project level container registry** .
This view:
- Shows all the image repository details.
- Shows all the tags of the image repository.
- Allows you to quickly copy the tag path (by clicking on the clipboard button near the tag name).
- Allows you to [delete one or more tags ](#delete-images-from-within-gitlab ).
2020-03-13 15:44:24 +05:30
## Use images from GitLab Container Registry
To download and run a container from images hosted in GitLab Container Registry,
use `docker run` :
```shell
docker run [options] registry.example.com/group/project/image [arguments]
```
For more information on running Docker containers, visit the
[Docker documentation ](https://docs.docker.com/engine/userguide/intro/ ).
2019-12-04 20:38:33 +05:30
2020-03-13 15:44:24 +05:30
## Authenticating to the GitLab Container Registry
2019-12-04 20:38:33 +05:30
2020-05-24 23:13:21 +05:30
If you visit the **Packages & Registries > Container Registry** link under your project's
2019-12-04 20:38:33 +05:30
menu, you can see the explicit instructions to login to the Container Registry
using your GitLab credentials.
For example if the Registry's URL is `registry.example.com` , then you should be
able to login with:
2020-03-13 15:44:24 +05:30
```shell
2019-12-04 20:38:33 +05:30
docker login registry.example.com
```
2020-03-13 15:44:24 +05:30
NOTE: **Note:**
If you have [2 Factor Authentication ](../../profile/account/two_factor_authentication.md )
enabled in your account, you need to pass a
[personal access token ](../../profile/personal_access_tokens.md ) instead
of your password in order to login to GitLab's Container Registry.
If a project is private, credentials will need to be provided for authorization.
There are two ways to do this:
- By using a [personal access token ](../../profile/personal_access_tokens.md ).
- By using a [deploy token ](../../project/deploy_tokens/index.md ).
The minimum scope needed for both of them is `read_registry` .
Example of using a token:
2020-05-24 23:13:21 +05:30
```shell
2020-03-13 15:44:24 +05:30
docker login registry.example.com -u < username > -p < token >
```
## Build and push images from your local machine
2019-12-04 20:38:33 +05:30
Building and publishing images should be a straightforward process. Just make
sure that you are using the Registry URL with the namespace and project name
that is hosted on GitLab:
2020-03-13 15:44:24 +05:30
```shell
2019-12-04 20:38:33 +05:30
docker build -t registry.example.com/group/project/image .
docker push registry.example.com/group/project/image
```
Your image will be named after the following scheme:
2020-05-24 23:13:21 +05:30
```plaintext
2019-12-04 20:38:33 +05:30
< registry URL > /< namespace > /< project > /< image >
```
GitLab supports up to three levels of image repository names.
2020-03-13 15:44:24 +05:30
The following examples of image tags are valid:
2019-12-04 20:38:33 +05:30
2020-05-24 23:13:21 +05:30
```plaintext
2019-12-04 20:38:33 +05:30
registry.example.com/group/project:some-tag
registry.example.com/group/project/image:latest
registry.example.com/group/project/my/image:rc1
```
2020-03-13 15:44:24 +05:30
## Build and push images using GitLab CI/CD
While you can build and push your images from your local machine, the true
power of the Container Registry comes when you combine it with GitLab CI/CD.
You can then create workflows and automate any processes that involve testing,
building, and eventually deploying your project from the Docker image you
created.
Before diving into the details, some things you should be aware of:
- You must [authenticate to the container registry ](#authenticating-to-the-container-registry-with-gitlab-cicd )
before running any commands. You can do this in the `before_script` if multiple
jobs depend on it.
- Using `docker build --pull` fetches any changes to base
images before building in case your cache is stale. It takes slightly
longer, but it means you don’ t get stuck without security patches for base images.
- Doing an explicit `docker pull` before each `docker run` fetches
the latest image that was just built. This is especially important if you are
using multiple Runners that cache images locally. Using the Git SHA in your
image tag makes this less necessary since each job will be unique and you
shouldn't ever have a stale image. However, it's still possible to have a
stale image if you re-build a given commit after a dependency has changed.
- You don't want to build directly to `latest` tag in case there are multiple jobs
happening simultaneously.
### Authenticating to the Container Registry with GitLab CI/CD
There are three ways to authenticate to the Container Registry via
[GitLab CI/CD ](../../../ci/yaml/README.md ) which depend on the visibility of
your project.
Available for all projects, though more suitable for public ones:
- **Using the special `CI_REGISTRY_USER` variable**: The user specified by this variable is created for you in order to
push to the Registry connected to your project. Its password is automatically
set with the `CI_REGISTRY_PASSWORD` variable. This allows you to automate building and deploying
your Docker images and has read/write access to the Registry. This is ephemeral,
so it's only valid for one job. You can use the following example as-is:
2020-05-24 23:13:21 +05:30
```shell
2020-03-13 15:44:24 +05:30
docker login -u $CI_REGISTRY_USER -p $CI_REGISTRY_PASSWORD $CI_REGISTRY
```
For private and internal projects:
- **Using a personal access token**: You can create and use a
[personal access token ](../../profile/personal_access_tokens.md )
in case your project is private:
- For read (pull) access, the scope should be `read_registry` .
- For read/write (pull/push) access, use `api` .
Replace the `<username>` and `<access_token>` in the following example:
2020-05-24 23:13:21 +05:30
```shell
2020-03-13 15:44:24 +05:30
docker login -u < username > -p < access_token > $CI_REGISTRY
```
- **Using the GitLab Deploy Token**: You can create and use a
[special deploy token ](../../project/deploy_tokens/index.md#gitlab-deploy-token )
with your private projects. It provides read-only (pull) access to the Registry.
Once created, you can use the special environment variables, and GitLab CI/CD
will fill them in for you. You can use the following example as-is:
2020-05-24 23:13:21 +05:30
```shell
2020-03-13 15:44:24 +05:30
docker login -u $CI_DEPLOY_USER -p $CI_DEPLOY_PASSWORD $CI_REGISTRY
```
### Container Registry examples with GitLab CI/CD
2020-06-23 00:09:42 +05:30
If you're using Docker-in-Docker on your Runners, this is how your `.gitlab-ci.yml`
2020-03-13 15:44:24 +05:30
should look similar to this:
```yaml
build:
2020-06-23 00:09:42 +05:30
image: docker:19.03.11
2020-03-13 15:44:24 +05:30
stage: build
services:
2020-06-23 00:09:42 +05:30
- docker:19.03.11-dind
2020-03-13 15:44:24 +05:30
script:
- docker login -u $CI_REGISTRY_USER -p $CI_REGISTRY_PASSWORD $CI_REGISTRY
- docker build -t $CI_REGISTRY/group/project/image:latest .
- docker push $CI_REGISTRY/group/project/image:latest
```
2019-12-04 20:38:33 +05:30
2020-06-23 00:09:42 +05:30
You can also make use of [other variables ](../../../ci/variables/README.md ) to avoid hard-coding:
2020-03-13 15:44:24 +05:30
```yaml
build:
2020-06-23 00:09:42 +05:30
image: docker:19.03.11
2020-03-13 15:44:24 +05:30
stage: build
services:
2020-06-23 00:09:42 +05:30
- docker:19.03.11-dind
2020-03-13 15:44:24 +05:30
variables:
IMAGE_TAG: $CI_REGISTRY_IMAGE:$CI_COMMIT_REF_SLUG
script:
- docker login -u $CI_REGISTRY_USER -p $CI_REGISTRY_PASSWORD $CI_REGISTRY
- docker build -t $IMAGE_TAG .
- docker push $IMAGE_TAG
```
2019-12-04 20:38:33 +05:30
2020-03-13 15:44:24 +05:30
Here, `$CI_REGISTRY_IMAGE` would be resolved to the address of the registry tied
to this project. Since `$CI_COMMIT_REF_NAME` resolves to the branch or tag name,
and your branch-name can contain forward slashes (e.g., feature/my-feature), it is
safer to use `$CI_COMMIT_REF_SLUG` as the image tag. This is due to that image tags
cannot contain forward slashes. We also declare our own variable, `$IMAGE_TAG` ,
combining the two to save us some typing in the `script` section.
Here's a more elaborate example that splits up the tasks into 4 pipeline stages,
including two tests that run in parallel. The `build` is stored in the container
registry and used by subsequent stages, downloading the image
when needed. Changes to `master` also get tagged as `latest` and deployed using
an application-specific deploy script:
```yaml
2020-06-23 00:09:42 +05:30
image: docker:19.03.11
2020-03-13 15:44:24 +05:30
services:
2020-06-23 00:09:42 +05:30
- docker:19.03.11-dind
2020-03-13 15:44:24 +05:30
stages:
- build
- test
- release
- deploy
variables:
# Use TLS https://docs.gitlab.com/ee/ci/docker/using_docker_build.html#tls-enabled
DOCKER_HOST: tcp://docker:2376
DOCKER_TLS_CERTDIR: "/certs"
CONTAINER_TEST_IMAGE: $CI_REGISTRY_IMAGE:$CI_COMMIT_REF_SLUG
CONTAINER_RELEASE_IMAGE: $CI_REGISTRY_IMAGE:latest
before_script:
- docker login -u $CI_REGISTRY_USER -p $CI_REGISTRY_PASSWORD $CI_REGISTRY
build:
stage: build
script:
- docker build --pull -t $CONTAINER_TEST_IMAGE .
- docker push $CONTAINER_TEST_IMAGE
test1:
stage: test
script:
- docker pull $CONTAINER_TEST_IMAGE
- docker run $CONTAINER_TEST_IMAGE /script/to/run/tests
test2:
stage: test
script:
- docker pull $CONTAINER_TEST_IMAGE
- docker run $CONTAINER_TEST_IMAGE /script/to/run/another/test
release-image:
stage: release
script:
- docker pull $CONTAINER_TEST_IMAGE
- docker tag $CONTAINER_TEST_IMAGE $CONTAINER_RELEASE_IMAGE
- docker push $CONTAINER_RELEASE_IMAGE
only:
- master
deploy:
stage: deploy
script:
- ./deploy.sh
only:
- master
2019-12-04 20:38:33 +05:30
```
2020-03-13 15:44:24 +05:30
NOTE: **Note:**
This example explicitly calls `docker pull` . If you prefer to implicitly pull the
built image using `image:` , and use either the [Docker ](https://docs.gitlab.com/runner/executors/docker.html )
or [Kubernetes ](https://docs.gitlab.com/runner/executors/kubernetes.html ) executor,
make sure that [`pull_policy` ](https://docs.gitlab.com/runner/executors/docker.html#how-pull-policies-work )
is set to `always` .
2020-06-23 00:09:42 +05:30
### Using a Docker-in-Docker image from your Container Registry
2020-03-13 15:44:24 +05:30
2020-06-23 00:09:42 +05:30
If you want to use your own Docker images for Docker-in-Docker, there are a few
2020-03-13 15:44:24 +05:30
things you need to do in addition to the steps in the
2020-06-23 00:09:42 +05:30
[Docker-in-Docker ](../../../ci/docker/using_docker_build.md#use-docker-in-docker-workflow-with-docker-executor ) section:
2020-03-13 15:44:24 +05:30
1. Update the `image` and `service` to point to your registry.
1. Add a service [alias ](../../../ci/yaml/README.md#servicesalias ).
Below is an example of what your `.gitlab-ci.yml` should look like:
```yaml
build:
2020-06-23 00:09:42 +05:30
image: $CI_REGISTRY/group/project/docker:19.03.11
2020-03-13 15:44:24 +05:30
services:
2020-06-23 00:09:42 +05:30
- name: $CI_REGISTRY/group/project/docker:19.03.11-dind
2020-03-13 15:44:24 +05:30
alias: docker
stage: build
script:
- docker build -t my-docker-image .
- docker run my-docker-image /script/to/run/tests
```
2019-12-04 20:38:33 +05:30
2020-06-23 00:09:42 +05:30
If you forget to set the service alias, the `docker:19.03.11` image won't find the
2020-03-13 15:44:24 +05:30
`dind` service, and an error like the following will be thrown:
2019-12-04 20:38:33 +05:30
2020-03-13 15:44:24 +05:30
```plaintext
error during connect: Get http://docker:2376/v1.39/info: dial tcp: lookup docker on 192.168.0.1:53: no such host
```
2019-12-04 20:38:33 +05:30
2020-04-22 19:07:51 +05:30
## Delete images
You can delete images from your Container Registry in multiple ways.
CAUTION: **Warning:**
Deleting images is a destructive action and can't be undone. To restore
a deleted image, you must rebuild and re-upload it.
NOTE: **Note:**
Administrators should review how to
[garbage collect ](../../../administration/packages/container_registry.md#container-registry-garbage-collection )
the deleted images.
### Delete images from within GitLab
To delete images from within GitLab:
2020-05-24 23:13:21 +05:30
1. Navigate to your project's or group's ** {package}** **Packages & Registries > Container Registry** .
2020-04-22 19:07:51 +05:30
1. From the **Container Registry** page, you can select what you want to delete,
by either:
- Deleting the entire repository, and all the tags it contains, by clicking
the red ** {remove}** **Trash** icon.
- Navigating to the repository, and deleting tags individually or in bulk
by clicking the red ** {remove}** **Trash** icon next to the tag you want
to delete.
1. In the dialog box, click **Remove tag** .
2020-05-24 23:13:21 +05:30
![Container Registry tags ](img/container_registry_repository_details_v13.0.png )
2020-04-22 19:07:51 +05:30
### Delete images using the API
If you want to automate the process of deleting images, GitLab provides an API. For more
information, see the following endpoints:
- [Delete a Registry repository ](../../../api/container_registry.md#delete-registry-repository )
- [Delete an individual Registry repository tag ](../../../api/container_registry.md#delete-a-registry-repository-tag )
- [Delete Registry repository tags in bulk ](../../../api/container_registry.md#delete-registry-repository-tags-in-bulk )
### Delete images using GitLab CI/CD
CAUTION: **Warning:**
GitLab CI/CD doesn't provide a built-in way to remove your images, but this example
uses a third-party tool called [reg ](https://github.com/genuinetools/reg )
that talks to the GitLab Registry API. You are responsible for your own actions.
For assistance with this tool, see
[the issue queue for reg ](https://github.com/genuinetools/reg/issues ).
The following example defines two stages: `build` , and `clean` . The
`build_image` job builds the Docker image for the branch, and the
`delete_image` job deletes it. The `reg` executable is downloaded and used to
remove the image matching the `$CI_PROJECT_PATH:$CI_COMMIT_REF_SLUG`
[environment variable ](../../../ci/variables/predefined_variables.md ).
To use this example, change the `IMAGE_TAG` variable to match your needs:
```yaml
stages:
- build
- clean
build_image:
2020-06-23 00:09:42 +05:30
image: docker:19.03.11
2020-04-22 19:07:51 +05:30
stage: build
services:
2020-06-23 00:09:42 +05:30
- docker:19.03.11-dind
2020-04-22 19:07:51 +05:30
variables:
IMAGE_TAG: $CI_REGISTRY_IMAGE:$CI_COMMIT_REF_SLUG
script:
- docker login -u $CI_REGISTRY_USER -p $CI_REGISTRY_PASSWORD $CI_REGISTRY
- docker build -t $IMAGE_TAG .
- docker push $IMAGE_TAG
only:
- branches
except:
- master
delete_image:
2020-06-23 00:09:42 +05:30
image: docker:19.03.11
2020-04-22 19:07:51 +05:30
stage: clean
services:
2020-06-23 00:09:42 +05:30
- docker:19.03.11-dind
2020-04-22 19:07:51 +05:30
variables:
IMAGE_TAG: $CI_PROJECT_PATH:$CI_COMMIT_REF_SLUG
REG_SHA256: ade837fc5224acd8c34732bf54a94f579b47851cc6a7fd5899a98386b782e228
REG_VERSION: 0.16.1
before_script:
- apk add --no-cache curl
- curl --fail --show-error --location "https://github.com/genuinetools/reg/releases/download/v$REG_VERSION/reg-linux-amd64" --output /usr/local/bin/reg
- echo "$REG_SHA256 /usr/local/bin/reg" | sha256sum -c -
- chmod a+x /usr/local/bin/reg
script:
- /usr/local/bin/reg rm -d --auth-url $CI_REGISTRY -u $CI_REGISTRY_USER -p $CI_REGISTRY_PASSWORD $IMAGE_TAG
only:
- branches
except:
- master
```
TIP: **Tip:**
You can download the latest `reg` release from
[the releases page ](https://github.com/genuinetools/reg/releases ), then update
the code example by changing the `REG_SHA256` and `REG_VERSION` variables
defined in the `delete_image` job.
### Delete images using an expiration policy
You can create a per-project [expiration policy ](#expiration-policy ) to ensure
older tags and images are regularly removed from the Container Registry.
2020-03-13 15:44:24 +05:30
## Expiration policy
2019-12-04 20:38:33 +05:30
2020-06-23 00:09:42 +05:30
> [Introduced](https://gitlab.com/gitlab-org/gitlab/-/issues/15398) in GitLab 12.8.
2019-12-04 20:38:33 +05:30
2020-04-22 19:07:51 +05:30
NOTE: **Note:**
2020-06-23 00:09:42 +05:30
For GitLab.com, expiration policies are not available for projects created before GitLab 12.8.
For self-managed instances, expiration policies may be enabled by an admin in the
[CI/CD Package Registry settings ](./../../admin_area/settings/index.md#cicd ).
2020-05-24 23:13:21 +05:30
Note the inherent [risks involved ](./index.md#use-with-external-container-registries ).
2020-04-22 19:07:51 +05:30
2020-03-13 15:44:24 +05:30
It is possible to create a per-project expiration policy, so that you can make sure that
older tags and images are regularly removed from the Container Registry.
2019-12-04 20:38:33 +05:30
2020-03-13 15:44:24 +05:30
The expiration policy algorithm starts by collecting all the tags for a given repository in a list,
then goes through a process of excluding tags from it until only the ones to be deleted remain:
2019-12-04 20:38:33 +05:30
2020-03-13 15:44:24 +05:30
1. Collect all the tags for a given repository in a list.
1. Excludes the tag named `latest` from the list.
1. Evaluates the `name_regex` , excluding non-matching names from the list.
1. Excludes any tags that do not have a manifest (not part of the options).
1. Orders the remaining tags by `created_date` .
2020-05-24 23:13:21 +05:30
1. Excludes from the list the N tags based on the `keep_n` value (Number of tags to retain).
2020-06-23 00:09:42 +05:30
1. Excludes from the list the tags more recent than the `older_than` value (Expiration interval).
2020-05-24 23:13:21 +05:30
1. Excludes from the list any tags matching the `name_regex_keep` value (Images to preserve).
2020-03-13 15:44:24 +05:30
1. Finally, the remaining tags in the list are deleted from the Container Registry.
2019-12-04 20:38:33 +05:30
2020-04-22 19:07:51 +05:30
### Managing project expiration policy through the UI
To manage project expiration policy, navigate to ** {settings}** **Settings > CI/CD > Container Registry tag expiration policy** .
2020-05-24 23:13:21 +05:30
![Expiration Policy App ](img/expiration_policy_app_v13_0.png )
2020-04-22 19:07:51 +05:30
The UI allows you to configure the following:
- **Expiration policy:** enable or disable the expiration policy.
- **Expiration interval:** how long tags are exempt from being deleted.
- **Expiration schedule:** how often the cron job checking the tags should run.
2020-05-24 23:13:21 +05:30
- **Number of tags to retain:** how many tags to _always_ keep for each image.
2020-04-22 19:07:51 +05:30
- **Docker tags with names matching this regex pattern will expire:** the regex used to determine what tags should be expired. To qualify all tags for expiration, use the default value of `.*` .
2020-05-24 23:13:21 +05:30
- **Docker tags with names matching this regex pattern will be preserved:** the regex used to determine what tags should be preserved. To preserve all tags, use the default value of `.*` .
2020-04-22 19:07:51 +05:30
2020-06-23 00:09:42 +05:30
#### Troubleshooting expiration policies
If you see the following message:
"Something went wrong while updating the expiration policy."
Check the regex patterns to ensure they are valid.
You can use [Rubular ](https://rubular.com/ ) to check your regex.
View some common [regex pattern examples ](#regex-pattern-examples ).
2020-03-13 15:44:24 +05:30
### Managing project expiration policy through the API
2019-12-04 20:38:33 +05:30
2020-03-13 15:44:24 +05:30
You can set, update, and disable the expiration policies using the GitLab API.
2019-12-04 20:38:33 +05:30
2020-03-13 15:44:24 +05:30
Examples:
2019-12-04 20:38:33 +05:30
2020-05-24 23:13:21 +05:30
- Select all tags, keep at least 1 tag per image, expire any tag older than 14 days, run once a month, preserve any images with the name `master` and the policy is enabled:
2019-12-04 20:38:33 +05:30
2020-03-13 15:44:24 +05:30
```shell
2020-05-24 23:13:21 +05:30
curl --request PUT --header 'Content-Type: application/json;charset=UTF-8' --header "PRIVATE-TOKEN: < your_access_token > " --data-binary '{"container_expiration_policy_attributes":{"cadence":"1month","enabled":true,"keep_n":1,"older_than":"14d","name_regex":"","name_regex_delete":".*","name_regex_keep":".*-master"}}' 'https://gitlab.example.com/api/v4/projects/2'
2020-03-13 15:44:24 +05:30
```
See the API documentation for further details: [Edit project ](../../../api/projects.md#edit-project ).
2020-04-22 19:07:51 +05:30
### Use with external container registries
2020-03-13 15:44:24 +05:30
2020-04-22 19:07:51 +05:30
When using an [external container registry ](./../../../administration/packages/container_registry.md#use-an-external-container-registry-with-gitlab-as-an-auth-endpoint ),
2020-05-24 23:13:21 +05:30
running an expiration policy on a project may have some performance risks. If a project is going to run
2020-04-22 19:07:51 +05:30
a policy that will remove large quantities of tags (in the thousands), the GitLab background jobs that
run the policy may get backed up or fail completely. It is recommended you only enable container expiration
policies for projects that were created before GitLab 12.8 if you are confident the amount of tags
being cleaned up will be minimal.
2020-03-13 15:44:24 +05:30
2020-06-23 00:09:42 +05:30
### Regex pattern examples
Expiration policies use regex patterns to determine which tags should be preserved or removed, both in the UI and the API.
Here are examples of regex patterns you may want to use:
- Match all tags:
```plaintext
.*
```
- Match tags that start with `v` :
```plaintext
v.+
```
- Match tags that contain `master` :
```plaintext
master
```
- Match tags that either start with `v` , contain `master` , or contain `release` :
```plaintext
(?:v.+|master|release)
```
2020-03-13 15:44:24 +05:30
## Limitations
2020-05-24 23:13:21 +05:30
- Moving or renaming existing Container Registry repositories is not supported
2020-03-13 15:44:24 +05:30
once you have pushed images, because the images are signed, and the
signature includes the repository name. To move or rename a repository with a
Container Registry, you will have to delete all existing images.
2020-05-24 23:13:21 +05:30
- Prior to GitLab 12.10, any tags that use the same image ID as the `latest` tag
will not be deleted by the expiration policy.
2019-12-04 20:38:33 +05:30
## Troubleshooting the GitLab Container Registry
### Docker connection error
A Docker connection error can occur when there are special characters in either the group,
project or branch name. Special characters can include:
- Leading underscore
- Trailing hyphen/dash
To get around this, you can [change the group path ](../../group/index.md#changing-a-groups-path ),
[change the project path ](../../project/settings/index.md#renaming-a-repository ) or change the branch
name.
### Troubleshoot as a GitLab server admin
Troubleshooting the GitLab Container Registry, most of the times, requires
administration access to the GitLab server.
[Read how to troubleshoot the Container Registry ](../../../administration/packages/container_registry.md#troubleshooting ).
2020-05-24 23:13:21 +05:30
### Unable to change path or transfer a project
If you try to change a project's path or transfer a project to a new namespace,
you may receive one of the following errors:
- "Project cannot be transferred, because tags are present in its container registry."
- "Namespace cannot be moved because at least one project has tags in container registry."
This issue occurs when the project has images in the Container Registry.
You must delete or move these images before you can change the path or transfer
the project.
The following procedure uses these sample project names:
- For the current project: `example.gitlab.com/org/build/sample_project/cr:v2.9.1`
- For the new project: `example.gitlab.com/new_org/build/new_sample_project/cr:v2.9.1`
Use your own URLs to complete the following steps:
1. Download the Docker images on your computer:
```shell
docker login example.gitlab.com
docker pull example.gitlab.com/org/build/sample_project/cr:v2.9.1
```
1. Rename the images to match the new project name:
```shell
docker tag example.gitlab.com/org/build/sample_project/cr:v2.9.1 example.gitlab.com/new_org/build/new_sample_project/cr:v2.9.1
```
1. Delete the images in both projects by using the [UI ](#delete-images ) or [API ](../../../api/packages.md#delete-a-project-package ).
There may be a delay while the images are queued and deleted.
1. Change the path or transfer the project by going to **Settings > General**
and expanding **Advanced** .
1. Restore the images:
```shell
docker push example.gitlab.com/new_org/build/new_sample_project/cr:v2.9.1
```
Follow [this issue ](https://gitlab.com/gitlab-org/gitlab/-/issues/18383 ) for details.