-
-
Notifications
You must be signed in to change notification settings - Fork 62
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Adds support for new OCI registries #658
Conversation
Thanks for opening the pullrequest. I did some testing with `quay.io/ansible/ansible-runner:latest
|
Hi @olblak ! Thanks for the review. I tried to reproduced the issue with the following pipeline: title: Ansible runner
sources:
ansible-runner:
name: Ansible Runner
kind: dockerDigest
spec:
hostname: quay.io
image: quay.io/ansible/ansible-runner
tag: latest
targets:
ansible-runner:
name: Update YAML
kind: yaml
sourceID: ansible-runner
spec:
file: tests/out.yaml
key: ansible-runner And it seems that I'm getting the same error as you I will investigate. 👍 |
While investigate this issue, someone shared with me containerd/containerd#6471 |
I read the OCI registry specs Indeed, when dealing with standalone image manifests, the correct way to get a pullable digest is be reading the "Docker-Content-Digest" HTTP header.
But earlier, the spec says:
Note: I left the original behavior where the architecture is not checked for standalone manifests. We can retrieve the architecture from the configuration layer at the expense of an extra HTTP request. If needed, I can implement it in another PR. |
I did some experimentation and it seems to introduce a regression for dockerhub For example jenkins/jenkins:latest would return
But if I put back
Then both work quay.io and dockerhub My understanding is |
I need more investigation. |
Try another image than |
Signed-off-by: Olblak <me@olblak.com>
@nmasse-itix I opened this PR nmasse-itix#1 on your fork. |
@nmasse-itix @olblak you're on fire folks, many thanks for taking care of this! (sorry I'm really busy these days did not have enough time to review/test) |
Add dockerhub registry v2 support back
For information, the linter issues appears because I recently updated the golangci-linter version, in this pullrquest https://github.com/updatecli/updatecli/pull/652/files I'll fix the warning in a different pullrequest |
I successfully tested this pullrequest and I get the following result.
|
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Thanks a lot @nmasse-itix for the pull request.
Adds support for new OCI registries
Fix #605
Test
To test this pull request, you can run the following commands:
go test -v ./pkg/plugins/utils/docker/dockerregistry
I also made sure to test a real pipeline such as:
I tested such a pipeline with the following images: