Browse code

Changing docs to reflect new names

Signed-off-by: Diogo Monica <diogo@docker.com>

Diogo Monica authored on 2015/10/10 04:14:46
Showing 7 changed files
... ...
@@ -197,14 +197,17 @@ func (cli *DockerCli) getPassphraseRetriever() passphrase.Retriever {
197 197
 	}
198 198
 
199 199
 	// Backwards compatibility with old env names. We should remove this in 1.10
200
+	if env["root"] == "" {
201
+		env["root"] = os.Getenv("DOCKER_CONTENT_TRUST_OFFLINE_PASSPHRASE")
202
+		fmt.Fprintf(cli.err, "[DEPRECATED] The environment variable DOCKER_CONTENT_TRUST_OFFLINE_PASSPHRASE has been deprecated and will be removed in v1.10. Please use DOCKER_CONTENT_TRUST_ROOT_PASSPHRASE\n")
203
+
204
+	}
200 205
 	if env["snapshot"] == "" || env["targets"] == "" {
201 206
 		env["snapshot"] = os.Getenv("DOCKER_CONTENT_TRUST_TAGGING_PASSPHRASE")
202 207
 		env["targets"] = os.Getenv("DOCKER_CONTENT_TRUST_TAGGING_PASSPHRASE")
208
+		fmt.Fprintf(cli.err, "[DEPRECATED] The environment variable DOCKER_CONTENT_TRUST_TAGGING_PASSPHRASE has been deprecated and will be removed in v1.10. Please use DOCKER_CONTENT_TRUST_REPOSITORY_PASSPHRASE\n")
203 209
 
204 210
 	}
205
-	if env["root"] == "" {
206
-		env["root"] = os.Getenv("DOCKER_CONTENT_TRUST_OFFLINE_PASSPHRASE")
207
-	}
208 211
 
209 212
 	return func(keyName string, alias string, createNew bool, numAttempts int) (string, bool, error) {
210 213
 		if v := env[alias]; v != "" {
... ...
@@ -105,4 +105,9 @@ the path does not exist.
105 105
 
106 106
 Version 1.9 adds a flag (`--disable-legacy-registry=false`) which prevents the docker daemon from `pull`, `push`, and `login` operations against v1 registries.  Though disabled by default, this signals the intent to deprecate the v1 protocol.
107 107
 
108
+### Docker Content Trust ENV passphrase variables name change
108 109
 
110
+As of 1.9, Docker Content Trust Offline key will be renamed to Root key and the Tagging key will be renamed to Repository key. Due to this renaming, we're also changing the corresponding environment variables
111
+
112
+- DOCKER_CONTENT_TRUST_OFFLINE_PASSPHRASE will now be named DOCKER_CONTENT_TRUST_ROOT_PASSPHRASE
113
+- DOCKER_CONTENT_TRUST_TAGGING_PASSPHRASE will now be named DOCKER_CONTENT_TRUST_REPOSITORY_PASSPHRASE
109 114
\ No newline at end of file
... ...
@@ -106,12 +106,12 @@ $ docker pull someimage@sha256:d149ab53f8718e987c3a3024bb8aa0e2caadf6c0328f1d9d8
106 106
 
107 107
 Trust for an image tag is managed through the use of signing keys. A key set is
108 108
 created when an operation using content trust is first invoked. Docker's content
109
-trust makes use of four different keys: 
109
+trust makes use of four different keys:
110 110
 
111 111
 | Key                 | Description                                                                                                                                                                                                                                                                                                                                                                         |
112 112
 |---------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------|
113
-| offline key         | Root of content trust for a image tag. When content trust is enabled, you create the offline key once. |
114
-| target and snapshot | These two keys are known together as the "tagging" key. When content trust is enabled, you create this key when you add a new image repository. If you have the offline key, you can export the tagging key and allow other publishers to sign the image tags.    |
113
+| root key         | Root of content trust for a image tag. When content trust is enabled, you create the root key once. |
114
+| target and snapshot | These two keys are known together as the "repository" key. When content trust is enabled, you create this key when you add a new image repository. If you have the root key, you can export the repository key and allow other publishers to sign the image tags.    |
115 115
 | timestamp           | This key applies to a repository. It allows Docker repositories to have freshness security guarantees without requiring periodic content refreshes on the client's side.                                                                                                              |
116 116
 
117 117
 With the exception of the timestamp, all the keys are generated and stored locally
... ...
@@ -123,16 +123,16 @@ The following image depicts the various signing keys and their relationships:
123 123
 
124 124
 ![Content trust components](../images/trust_components.png)
125 125
 
126
->**WARNING**: Loss of the offline key is **very difficult** to recover from.
126
+>**WARNING**: Loss of the root key is **very difficult** to recover from.
127 127
 >Correcting this loss requires intervention from [Docker
128 128
 >Support](https://support.docker.com) to reset the repository state. This loss
129 129
 >also requires **manual intervention** from every consumer that used a signed
130 130
 >tag from this repository prior to the loss.
131 131
 
132
-You should backup the offline key somewhere safe. Given that it is only required
132
+You should backup the root key somewhere safe. Given that it is only required
133 133
 to create new repositories, it is a good idea to store it offline. Make sure you
134 134
 read [Manage keys for content trust](/security/trust/trust_key_mng) information
135
-for details on securing, and backing up your keys. 
135
+for details on securing, and backing up your keys.
136 136
 
137 137
 ## Survey of typical content trust operations
138 138
 
... ...
@@ -185,27 +185,27 @@ The push refers to a repository [docker.io/docker/trusttest] (len: 1)
185 185
 902b87aaaec9: Image already exists
186 186
 latest: digest: sha256:d02adacee0ac7a5be140adb94fa1dae64f4e71a68696e7f8e7cbf9db8dd49418 size: 3220
187 187
 Signing and pushing trust metadata
188
-You are about to create a new offline signing key passphrase. This passphrase
188
+You are about to create a new root signing key passphrase. This passphrase
189 189
 will be used to protect the most sensitive key in your signing system. Please
190 190
 choose a long, complex passphrase and be careful to keep the password and the
191 191
 key file itself secure and backed up. It is highly recommended that you use a
192 192
 password manager to generate the passphrase and keep it safe. There will be no
193 193
 way to recover this key. You can find the key in your config directory.
194
-Enter passphrase for new offline key with id a1d96fb:
195
-Repeat passphrase for new offline key with id a1d96fb:
196
-Enter passphrase for new tagging key with id docker.io/docker/trusttest (3a932f1):
197
-Repeat passphrase for new tagging key with id docker.io/docker/trusttest (3a932f1):
194
+Enter passphrase for new root key with id a1d96fb:
195
+Repeat passphrase for new root key with id a1d96fb:
196
+Enter passphrase for new repository key with id docker.io/docker/trusttest (3a932f1):
197
+Repeat passphrase for new repository key with id docker.io/docker/trusttest (3a932f1):
198 198
 Finished initializing "docker.io/docker/trusttest"
199 199
 ```
200 200
 When you push your first tagged image with content trust enabled, the  `docker`
201 201
 client recognizes this is your first push and:
202 202
 
203
- - alerts you that it will create a new offline key
203
+ - alerts you that it will create a new root key
204 204
  - requests a passphrase for the key
205
- - generates an offline key in the `~/.docker/trust` directory
206
- - generates a tagging key for in the `~/.docker/trust` directory
205
+ - generates a root key in the `~/.docker/trust` directory
206
+ - generates a repository key for in the `~/.docker/trust` directory
207 207
 
208
-The passphrase you chose for both the offline key and your content key-pair
208
+The passphrase you chose for both the root key and your content key-pair
209 209
 should be randomly generated and stored in a *password manager*.
210 210
 
211 211
 > **NOTE**: If you omit the `latest` tag, content trust is skipped. This is true
... ...
@@ -223,8 +223,8 @@ No tag specified, skipping trust metadata push
223 223
 It is skipped because as the message states, you did not supply an image `TAG`
224 224
 value. In Docker content trust, signatures are associated with tags.
225 225
 
226
-Once you have an offline key on your system, subsequent images repositories
227
-you create can use that same offline key:
226
+Once you have a root key on your system, subsequent images repositories
227
+you create can use that same root key:
228 228
 
229 229
 ```bash
230 230
 $ docker push docker.io/docker/seaside:latest
... ...
@@ -233,13 +233,13 @@ a9539b34a6ab: Image successfully pushed
233 233
 b3dbab3810fc: Image successfully pushed
234 234
 latest: digest: sha256:d2ba1e603661a59940bfad7072eba698b79a8b20ccbb4e3bfb6f9e367ea43939 size: 3346
235 235
 Signing and pushing trust metadata
236
-Enter key passphrase for offline key with id a1d96fb:
237
-Enter passphrase for new tagging key with id docker.io/docker/seaside (bb045e3):
238
-Repeat passphrase for new tagging key with id docker.io/docker/seaside (bb045e3):
236
+Enter key passphrase for root key with id a1d96fb:
237
+Enter passphrase for new repository key with id docker.io/docker/seaside (bb045e3):
238
+Repeat passphrase for new repository key with id docker.io/docker/seaside (bb045e3):
239 239
 Finished initializing "docker.io/docker/seaside"
240 240
 ```
241 241
 
242
-The new image has its own tagging key and timestamp key. The `latest` tag is signed with both of
242
+The new image has its own repository key and timestamp key. The `latest` tag is signed with both of
243 243
 these.
244 244
 
245 245
 
... ...
@@ -18,16 +18,16 @@ To allow tools to wrap docker and push trusted content, there are two
18 18
 environment variables that allow you to provide the passphrases without an
19 19
 expect script, or typing them in:
20 20
 
21
- - `DOCKER_CONTENT_TRUST_OFFLINE_PASSPHRASE`
22
- - `DOCKER_CONTENT_TRUST_TAGGING_PASSPHRASE`
21
+ - `DOCKER_CONTENT_TRUST_ROOT_PASSPHRASE`
22
+ - `DOCKER_CONTENT_TRUST_REPOSITORY_PASSPHRASE`
23 23
 
24 24
 Docker attempts to use the contents of these environment variables as passphrase
25 25
 for the keys. For example, an image publisher can export the repository `target`
26 26
 and `snapshot` passphrases:
27 27
 
28 28
 ```bash
29
-$  export DOCKER_CONTENT_TRUST_OFFLINE_PASSPHRASE="u7pEQcGoebUHm6LHe6"
30
-$  export DOCKER_CONTENT_TRUST_TAGGING_PASSPHRASE="l7pEQcTKJjUHm6Lpe4"
29
+$  export DOCKER_CONTENT_TRUST_ROOT_PASSPHRASE="u7pEQcGoebUHm6LHe6"
30
+$  export DOCKER_CONTENT_TRUST_REPOSITORY_PASSPHRASE="l7pEQcTKJjUHm6Lpe4"
31 31
 ```
32 32
 
33 33
 Then, when pushing a new tag the Docker client does not request these values but signs automatically:
... ...
@@ -43,7 +43,7 @@ Signing and pushing trust metadata
43 43
 
44 44
 ## Building with content trust
45 45
 
46
-You can also build with content trust. Before running the `docker build` command, you should set the environment variable `DOCKER_CONTENT_TRUST` either manually or in in a scripted fashion. Consider the simple Dockerfile below. 
46
+You can also build with content trust. Before running the `docker build` command, you should set the environment variable `DOCKER_CONTENT_TRUST` either manually or in in a scripted fashion. Consider the simple Dockerfile below.
47 47
 
48 48
 ```Dockerfile
49 49
 FROM docker/trusttest:latest
... ...
@@ -73,7 +73,7 @@ unable to process Dockerfile: No trust data for notrust
73 73
 
74 74
 ## Related information
75 75
 
76
-* [Content trust in Docker](/security/trust/content_trust) 
76
+* [Content trust in Docker](/security/trust/content_trust)
77 77
 * [Manage keys for content trust](/security/trust/trust_key_mng)
78 78
 * [Play in a content trust sandbox](/security/trust/trust_sandbox)
79 79
 
... ...
@@ -11,12 +11,12 @@ parent= "smn_content_trust"
11 11
 # Manage keys for content trust
12 12
 
13 13
 Trust for an image tag is managed through the use of keys. Docker's content
14
-trust makes use four different keys: 
14
+trust makes use four different keys:
15 15
 
16 16
 | Key                 | Description                                                                                                                                                                                                                                                                                                                                                                         |
17 17
 |---------------------|---------------------------------------------------------------------------------------------------------------------------------------------------------------------|
18
-| offline key         | Root of content trust for a image tag. When content trust is enabled, you create the offline key once. |
19
-| target and snapshot | These two keys are known together as the "tagging" key. When content trust is enabled, you create this key when you add a new image repository. If you have the offline key, you can export the tagging key and allow other publishers to sign the image tags.    |
18
+| root key         | Root of content trust for a image tag. When content trust is enabled, you create the root key once. |
19
+| target and snapshot | These two keys are known together as the "repository" key. When content trust is enabled, you create this key when you add a new image repository. If you have the root key, you can export the repository key and allow other publishers to sign the image tags.    |
20 20
 | timestamp           | This key applies to a repository. It allows Docker repositories to have freshness security guarantees without requiring periodic content refreshes on the client's side.                                                                                                              |
21 21
 
22 22
 With the exception of the timestamp, all the keys are generated and stored locally
... ...
@@ -26,11 +26,11 @@ service that isn't directly exposed to the internet and are encrypted at rest.
26 26
 
27 27
 ## Choosing a passphrase
28 28
 
29
-The passphrases you chose for both the offline key and your tagging key should
30
-be randomly generated and stored in a password manager.  Having the tagging key
29
+The passphrases you chose for both the root key and your repository key should
30
+be randomly generated and stored in a password manager.  Having the repository key
31 31
 allow users to sign image tags on a repository. Passphrases are used to encrypt
32 32
 your keys at rest and ensures that a lost laptop or an unintended backup doesn't
33
-put the private key material at risk. 
33
+put the private key material at risk.
34 34
 
35 35
 ## Back up your keys
36 36
 
... ...
@@ -39,7 +39,7 @@ on creation. Even so, you should still take care of the location where you back
39 39
 Good practice is to create two encrypted USB keys.
40 40
 
41 41
 It is very important that you backup your keys to a safe, secure location. Loss
42
-of the tagging key is recoverable; loss of the offline key is not. 
42
+of the repository key is recoverable; loss of the root key is not.
43 43
 
44 44
 The Docker client stores the keys in the `~/.docker/trust/private` directory.
45 45
 Before backing them up, you should `tar` them into an archive:
... ...
@@ -53,7 +53,7 @@ $ umask 077; tar -zcvf private_keys_backup.tar.gz ~/.docker/trust/private; umask
53 53
 If a publisher loses keys it means losing the ability to sign trusted content for
54 54
 your repositories.  If you lose a key, contact [Docker
55 55
 Support](https://support.docker.com) (support@docker.com) to reset the repository
56
-state. 
56
+state.
57 57
 
58 58
 This loss also requires **manual intervention** from every consumer that pulled
59 59
 the tagged image prior to the loss. Image consumers would get an error for
... ...
@@ -64,10 +64,10 @@ could not validate the path to a trusted root: failed to validate data with curr
64 64
 ```
65 65
 
66 66
 To correct this, they need to download a new image tag with that is signed with
67
-the new key. 
67
+the new key.
68 68
 
69 69
 ## Related information
70 70
 
71
-* [Content trust in Docker](/security/trust/content_trust) 
71
+* [Content trust in Docker](/security/trust/content_trust)
72 72
 * [Automation with content trust](/security/trust/trust_automation)
73 73
 * [Play in a content trust sandbox](/security/trust/trust_sandbox)
... ...
@@ -12,7 +12,7 @@ parent= "smn_content_trust"
12 12
 
13 13
 This page explains how to set up and use a sandbox for experimenting with trust.
14 14
 The sandbox allows you to configure and try trust operations locally without
15
-impacting your production images. 
15
+impacting your production images.
16 16
 
17 17
 Before working through this sandbox, you should have read through the [trust
18 18
 overview](/security/trust/content_trust).
... ...
@@ -48,7 +48,7 @@ The sandbox uses the Docker daemon on your local system. Within the `notarysandb
48 48
 you interact with a local registry rather than the Docker Hub. This means
49 49
 your everyday image repositories are not used. They are protected while you play.
50 50
 
51
-When you play in the sandbox, you'll also create root and tagging keys. The
51
+When you play in the sandbox, you'll also create root and repository keys. The
52 52
 sandbox is configured to store all the keys and files inside the `notarysandbox`
53 53
 container. Since the keys you create in the sandbox are for play only,
54 54
 destroying the container destroys them as well.
... ...
@@ -68,9 +68,9 @@ client inside the `notarysandbox` container connects to them over your network.
68 68
 So, you'll need an entry for both the servers in your local `/etc/hosts` file.
69 69
 
70 70
 1. Add an entry for the `notaryserver` to `/etc/hosts`.
71
-      
71
+
72 72
         $ sudo sh -c 'echo "127.0.0.1 notaryserver" >> /etc/hosts'
73
-        
73
+
74 74
 2. Add an entry for the `sandboxregistry` to `/etc/hosts`.
75 75
 
76 76
         $ sudo sh -c 'echo "127.0.0.1 sandboxregistry" >> /etc/hosts'
... ...
@@ -113,7 +113,7 @@ So, you'll need an entry for both the servers in your local `/etc/hosts` file.
113 113
         RUN update-ca-certificates
114 114
 
115 115
         ENTRYPOINT ["bash"]
116
-        
116
+
117 117
 6. Save and close the file.
118 118
 
119 119
 7. Build the testing container.
... ...
@@ -123,7 +123,7 @@ So, you'll need an entry for both the servers in your local `/etc/hosts` file.
123 123
         Step 1 : FROM debian:jessie
124 124
          ...
125 125
          Successfully built 5683f17e9d72
126
-     
126
+
127 127
 
128 128
 ### Build and start up the trust servers
129 129
 
... ...
@@ -137,7 +137,7 @@ Then, you'll use Docker Compose to build and start them on your local system.
137 137
 2. Clone the `notary` project.
138 138
 
139 139
           $ git clone -b trust-sandbox https://github.com/docker/notary.git
140
-          
140
+
141 141
 3. Clone the `distribution` project.
142 142
 
143 143
         $ git clone https://github.com/docker/distribution.git
... ...
@@ -152,31 +152,31 @@ Then, you'll use Docker Compose to build and start them on your local system.
152 152
 
153 153
 5. Build the server images.
154 154
 
155
-        $  docker-compose build 
156
-        
155
+        $  docker-compose build
156
+
157 157
     The first time you run this, the build takes some time.
158
-        
158
+
159 159
 6. Run the server containers on your local system.
160 160
 
161 161
         $ docker-compose up -d
162 162
 
163 163
     Once the trust services are up, you'll setup a local version of the Docker
164
-    Registry v2. 
165
-    
164
+    Registry v2.
165
+
166 166
 7. Change to the `notarysandbox/distribution` directory.
167 167
 
168 168
 8. Build the `sandboxregistry` server.
169 169
 
170 170
         $ docker build -t sandboxregistry .
171 171
 
172
-9. Start the `sandboxregistry` server running. 
173
-        
172
+9. Start the `sandboxregistry` server running.
173
+
174 174
         $ docker run -p 5000:5000 --name sandboxregistry sandboxregistry &
175 175
 
176 176
 ## Playing in the sandbox
177 177
 
178 178
 Now that everything is setup, you can go into your `notarysandbox` container and
179
-start testing Docker content trust. 
179
+start testing Docker content trust.
180 180
 
181 181
 
182 182
 ### Start the notarysandbox container
... ...
@@ -187,7 +187,7 @@ communication among the containers.
187 187
 
188 188
 ```
189 189
 $ docker run -it -v /var/run/docker.sock:/var/run/docker.sock --link notary_notaryserver_1:notaryserver --link sandboxregistry:sandboxregistry notarysandbox
190
-root@0710762bb59a:/# 
190
+root@0710762bb59a:/#
191 191
 ```
192 192
 
193 193
 Mounting the `docker.sock` gives the `notarysandbox` access to the `docker`
... ...
@@ -196,28 +196,28 @@ container.  When you destroy the container, you destroy the "play" keys.
196 196
 
197 197
 ### Test some trust operations
198 198
 
199
-Now, you'll pull some images. 
199
+Now, you'll pull some images.
200 200
 
201 201
 1. Download a `docker` image to test with.
202 202
 
203
-        # docker pull docker/trusttest 
203
+        # docker pull docker/trusttest
204 204
         docker pull docker/trusttest
205 205
         Using default tag: latest
206 206
         latest: Pulling from docker/trusttest
207 207
 
208
-        b3dbab3810fc: Pull complete 
209
-        a9539b34a6ab: Pull complete 
208
+        b3dbab3810fc: Pull complete
209
+        a9539b34a6ab: Pull complete
210 210
         Digest: sha256:d149ab53f8718e987c3a3024bb8aa0e2caadf6c0328f1d9d850b2a2a67f2819a
211 211
         Status: Downloaded newer image for docker/trusttest:latest
212 212
 
213
-2. Tag it to be pushed to our sandbox registry: 
213
+2. Tag it to be pushed to our sandbox registry:
214 214
 
215 215
         # docker tag docker/trusttest sandboxregistry:5000/test/trusttest:latest
216 216
 
217 217
 3. Enable content trust.
218 218
 
219 219
         # export DOCKER_CONTENT_TRUST=1
220
-        
220
+
221 221
 4. Identify the trust server.
222 222
 
223 223
         # export DOCKER_CONTENT_TRUST_SERVER=https://notaryserver:4443
... ...
@@ -237,8 +237,8 @@ Now, you'll pull some images.
237 237
 
238 238
         # docker push sandboxregistry:5000/test/trusttest:latest
239 239
         The push refers to a repository [sandboxregistry:5000/test/trusttest] (len: 1)
240
-        a9539b34a6ab: Image successfully pushed 
241
-        b3dbab3810fc: Image successfully pushed 
240
+        a9539b34a6ab: Image successfully pushed
241
+        b3dbab3810fc: Image successfully pushed
242 242
         latest: digest: sha256:1d871dcb16805f0604f10d31260e79c22070b35abc71a3d1e7ee54f1042c8c7c size: 3348
243 243
         Signing and pushing trust metadata
244 244
         You are about to create a new root signing key passphrase. This passphrase
... ...
@@ -247,22 +247,22 @@ Now, you'll pull some images.
247 247
         key file itself secure and backed up. It is highly recommended that you use a
248 248
         password manager to generate the passphrase and keep it safe. There will be no
249 249
         way to recover this key. You can find the key in your config directory.
250
-        Enter passphrase for new offline key with id 8c69e04: 
251
-        Repeat passphrase for new offline key with id 8c69e04: 
252
-        Enter passphrase for new tagging key with id sandboxregistry:5000/test/trusttest (93c362a): 
253
-        Repeat passphrase for new tagging key with id sandboxregistry:5000/test/trusttest (93c362a): 
250
+        Enter passphrase for new root key with id 8c69e04:
251
+        Repeat passphrase for new root key with id 8c69e04:
252
+        Enter passphrase for new repository key with id sandboxregistry:5000/test/trusttest (93c362a):
253
+        Repeat passphrase for new repository key with id sandboxregistry:5000/test/trusttest (93c362a):
254 254
         Finished initializing "sandboxregistry:5000/test/trusttest"
255 255
         latest: digest: sha256:d149ab53f8718e987c3a3024bb8aa0e2caadf6c0328f1d9d850b2a2a67f2819a size: 3355
256 256
         Signing and pushing trust metadata
257 257
 
258 258
 7. Try pulling the image you just pushed:
259 259
 
260
-        # docker pull sandboxregistry:5000/test/trusttest  
260
+        # docker pull sandboxregistry:5000/test/trusttest
261 261
         Using default tag: latest
262 262
         Pull (1 of 1): sandboxregistry:5000/test/trusttest:latest@sha256:1d871dcb16805f0604f10d31260e79c22070b35abc71a3d1e7ee54f1042c8c7c
263 263
         sha256:1d871dcb16805f0604f10d31260e79c22070b35abc71a3d1e7ee54f1042c8c7c: Pulling from test/trusttest
264
-        b3dbab3810fc: Already exists 
265
-        a9539b34a6ab: Already exists 
264
+        b3dbab3810fc: Already exists
265
+        a9539b34a6ab: Already exists
266 266
         Digest: sha256:1d871dcb16805f0604f10d31260e79c22070b35abc71a3d1e7ee54f1042c8c7c
267 267
         Status: Downloaded newer image for sandboxregistry:5000/test/trusttest@sha256:1d871dcb16805f0604f10d31260e79c22070b35abc71a3d1e7ee54f1042c8c7c
268 268
         Tagging sandboxregistry:5000/test/trusttest@sha256:1d871dcb16805f0604f10d31260e79c22070b35abc71a3d1e7ee54f1042c8c7c as sandboxregistry:5000/test/trusttest:latest
... ...
@@ -281,7 +281,7 @@ data. Then, you try and pull it.
281 281
         $ docker exec -it sandboxregistry bash
282 282
         296db6068327#
283 283
 
284
-3. Change into the registry storage. 
284
+3. Change into the registry storage.
285 285
 
286 286
     You'll need to provide the `sha` you received when you pushed the image.
287 287
 
... ...
@@ -314,8 +314,8 @@ data. Then, you try and pull it.
314 314
         # docker pull sandboxregistry:5000/test/trusttest
315 315
         Using default tag: latest
316 316
         ...
317
-        b3dbab3810fc: Verifying Checksum 
318
-        a9539b34a6ab: Pulling fs layer 
317
+        b3dbab3810fc: Verifying Checksum
318
+        a9539b34a6ab: Pulling fs layer
319 319
         filesystem layer verification failed for digest sha256:aac0c133338db2b18ff054943cee3267fe50c75cdee969aed88b1992539ed042
320 320
 
321 321
       You'll see the the pull did not complete because the trust system was
... ...
@@ -125,11 +125,11 @@ func (s *DockerTrustSuite) trustedCmdWithServer(cmd *exec.Cmd, server string) {
125 125
 }
126 126
 
127 127
 func (s *DockerTrustSuite) trustedCmdWithPassphrases(cmd *exec.Cmd, rootPwd, repositoryPwd string) {
128
-	trustCmdEnv(cmd, s.not.address(), rootPwd, repositoryPwd)
128
+	trustCmdEnv(cmd, notaryURL, rootPwd, repositoryPwd)
129 129
 }
130 130
 
131 131
 func (s *DockerTrustSuite) trustedCmdWithDeprecatedEnvPassphrases(cmd *exec.Cmd, offlinePwd, taggingPwd string) {
132
-	trustCmdDeprecatedEnv(cmd, s.not.address(), offlinePwd, taggingPwd)
132
+	trustCmdDeprecatedEnv(cmd, notaryURL, offlinePwd, taggingPwd)
133 133
 }
134 134
 
135 135
 func trustCmdEnv(cmd *exec.Cmd, server, rootPwd, repositoryPwd string) {